IT 231: IT and Application
By the end of this chapter, you will be able to:
Wireless networking allows devices to connect and communicate without physical cables, using radio waves.
The most common technology we use for this is...
A Wireless Local Area Network (WLAN) has two main parts:
A device that broadcasts the wireless signal. In your home, this is your wireless router.
A component inside your device (laptop, phone) that receives the signal. (Network Interface Card)
The Access Point creates a "bubble" of Wi-Fi coverage.
Devices with a wireless NIC within range can connect to the network without cables.
Wireless signals are broadcast through the air. Anyone in range can potentially "listen in" or access your network if it's not secured.
Many cafes, restaurants, and public spaces in Kathmandu offer free Wi-Fi.
The Risk: These networks are often unsecured or use weak passwords.
An attacker on the same network could potentially intercept your data (a "Man-in-the-Middle" attack).
Rule of Thumb: Avoid logging into sensitive accounts (banking, email) on public Wi-Fi. Use a VPN for added security.
Security protocols have improved over time to fight new threats.
β Obsolete
Wired Equivalent Privacy. Very insecure and easily broken. NEVER USE.
β οΈ Legacy
Wi-Fi Protected Access. WPA2 was the standard for years and is still common.
β Current Standard
The latest and most secure protocol. Offers much stronger encryption.
WPA3 (Wi-Fi Protected Access 3) is the most secure protocol available for Wi-Fi networks today.
Your home network and modern devices should always be configured to use WPA3 if available.
How do you check what security your home Wi-Fi is using?
Goal: It should say WPA2 or, ideally, WPA3.
Any questions?