1.Introduction to Wireless Networks
Wireless network is a form of telecommunication in which the electromagnetic waves carry a signal to transfer data over a distance without the use of electrical conductors or wires.
This module discusses in detail about the wireless networks, history of wireless communications, types of wireless network, various advantages and disadvantages of wireless communications, and limitations of wireless communications. The module discusses various generations and uses of wireless technology.
2.Wireless Signal Propagation
Wireless is a generic word used to describe communications in which electromagnetic waves or RF waves carry a signal over a part of or the entire communication path. This module discusses in detail about the various concepts involved in wireless signal propagation, components of radio system, transmission directions, different types of signal switching, and analog and digital modulations.
3.Wireless Communication Standards
Many institutes offer wireless communication standards for high-speed wireless local area networking. IEEE standards encompass a range of industries; they address high-impact technologies, for the existing infrastructures to our society or disincline. This module discusses the various institutions that offer wireless communication standards. It also discusses various IEEE and ETSI standards.
4.WLAN and Operations
WLAN (wireless local area network) connects computers over a local network that exchanges data and other information without the use of cables.
This module discusses the basic components of WLAN, different types of WLAN, and advantages of using a WLAN. It also discusses the WLAN management, configuration process of WLAN, and troubleshooting of WLAN.
Wireless technology has revolutionized almost all areas of our day-to-day lives. Whether in a university, office, home, or shopping mall, wireless technology is a flexible and cost-effective solution for technology needs. This technology is used to connect computers, permit remote monitoring and data achievement, and to provide access control and security.
This module familiarizes with wireless technologies and types of wireless technologies that can be used to create a wireless network. It also discusses the fixed wireless broadband technologies, types of fixed wireless broadband technologies, and advantages of the fixed wireless broadband technologies.
6.Wireless Protocols and Communication Languages
Wireless protocols are the set of rules that govern the exchange of information between the wireless devices.
This module discusses the various wireless protocols used for wireless communication and programming languages used in the wireless devices.
A typical wireless infrastructure comprises devices that connect to the network. These devices are used to make up a typical wireless infrastructure.
This module discusses the various wireless devices that make up a typical wireless infrastructure. It also explains how to add wireless network to a wired network.
8.Fundamentals of RFID
RFID (Radio-Frequency Identification) is an automatic identification technique that stores and retrieves data using devices known as RFID tags, or transponders. It transmits the identity of an object in the form of a unique serial number with the help of radio waves. RFID wireless transmission of data takes place between the data-carrying devices and its reader.
This module discusses in detail about the fundamentals of RFID, components of RFID system, RFID system architecture, and applications of RFID system. It also discusses RFID standards used for automatic identification and item management.
Voice over Internet Protocol (VoIP) technology is used to route voice over the Internet or through any other Internet protocol–based network. It allows users to make voice calls using an Internet connection. With a VoIP system, users can make a call from a computer, special VoIP phone, or traditional phone with an adapter to another computer or phone.
This module familiarizes with Voice over Internet Protocol (VoIP), types of VoIP technologies, mobile VoIP, wireless VoIP, and wireless VoIP standards and protocols. This module also explains the need of software support for VoIP, challenges for building successful wireless VoIP products, and different attacks on wireless VoIP.
Wired and wireless network communications each have pros and cons; wired networks offer more and better security options than the wireless networks. A wireless network provides users the freedom to move from place to place within the network with uninterrupted connectivity.
This module familiarizes with wireless security, types of wireless attacks, WEP (Wired Equivalent Privacy), and SSID (Service Set Identifier). It also discusses the various steps for hacking wireless networks. It also explains how to secure the wireless network from the various attacks.