Wireless LAN & WAN
Setting up a wireless LAN
Wireless LAN techniques (or wireless data communications) are not new. The technique to communicate wireless through Radio Frequency (RF) dates from the Second World War and the American army made gratefully use of it. In a company environment, the technique has been used for more than a decade, i.e. in logistics to create a link between the floor and the computer system, scanning barcodes.
When we speak of Wireless Networking of WLAN (Wireless Local Area Network), the expression Wireless Fidelity, known as Wi-Fi, is often used. It is a certificate label for wireless data-network products working according to the international standard, IEEE 802.11 (wireless Ethernet). Products made according to this standard use radiofrequencies in the 2.4 GHz and/or 5.0 GHz band with the condition that they can be used unlicensed.
A product is eligible for the Wi-Fi logo when an independent certification office has established that certain functionality, performance and inter-operational demands have been met. Especially the last aspect is of great importance because it guarantees that products with Wi-Fi logo can collaborate with products of other manufacturers
|Setting up a Wireless WAN…
WAN (Wide Area Network) is slightly different to LAN (Local Area Network). While LAN connects computers in a limited environment (office, building, campus…), the WAN connects remote areas (office in Brussels with office in another part of the world for example). Wi-Fi is a useful technology for connecting clients remotely and is the fastest growing technology offered by all the major players in this market. The advantage of wireless technology is its lack of the need of physical wire/copper or fibre to connect to the client. Here also, we can offer you the advice, services and products you need to perform your national/international business.
|Standards, channels and security:
The current IEEE (Institute of Electrical and Electronics Engineers) 802.11 group consists of six wireless modulation techniques, all using the same protocol. The most popular (and productive) techniques have been adapted, enhanced and completed with security protocols. The Wi-Fi spectrum is divided in 14 overlapping channels, separating the center of each channel by 5 megahertz. Great care has to be given to choosing the channels when installing a network close to other wireless networks in order to let them function without disturbing each other or causing interference. Via a WAP (Wireless Access Point) or AP (Access Point), the (unsecured) network can be accessed by any computer within range and equipped with a wireless network card. Therefore, it is very important to consider securing your network and disable access for non-related users. Wireless X, Speedboosters, WEP, WPA, encryption and MAC addresses are all expressions familiar to an IT manager, yet not always used to secure the wireless network.
|Tech Session Wireless LAN & WAN services helps you avoid coverage gaps, meet capacity requirements and access data reliably, in accordance with international standards and with great attention to securing the network against unwanted visitors.|