IT 233: Business Information Systems
By the end of this chapter, you will be able to:
Wireless Technology: The building block for networks that connect devices without physical cables, primarily for creating WLANs and providing mobile internet access.
Think of it as invisible infrastructure, connecting everything from your laptop to your smartphone.
Limited area coverage like a home or office (e.g., Wi-Fi).
Wide area coverage for on-the-go access (e.g., 4G/5G).
A WLAN allows devices to connect and communicate wirelessly within a limited area. The dominant technology is Wi-Fi.
🏠 🏢 🏫
Commonly found in your home, office, or university campus, creating a "bubble" of connectivity.
Three core components work together to make your Wi-Fi function:
The broadcaster. Sends the Wi-Fi signal. Usually part of your wireless router at home.
The receiver. A component inside your laptop or phone that lets it "hear" the Wi-Fi signal.
The public network name. It's how you identify which Wi-Fi to connect to from a list.
The SSID (Service Set Identifier) is the public name that distinguishes one wireless network from another.
Example: When your phone shows a list of available networks...
...you are seeing a list of SSIDs broadcast by nearby Access Points.
Because Wi-Fi signals travel through the air, they can be intercepted. Security is not optional; it's essential.
The Goal: Ensure only authorized users can connect and that all data transmitted is unreadable to eavesdroppers through encryption.
Security protocols have improved dramatically over time.
⚡ Takeaway: Always choose WPA3 if available. If not, WPA2 is the minimum security you should accept.
When you leave your Wi-Fi zone, cellular networks take over.
Uses cell towers to provide wide-area internet access to your mobile devices, ensuring you're always connected.
Turns your smartphone into a portable Wi-Fi router, sharing its cellular data connection with other devices like your laptop.
Wireless technology is central to daily business and life in Nepal.
Restaurants in Thamel use Wi-Fi for Point-of-Sale systems. Co-working spaces in Kathmandu rely on high-speed WLANs for their clients.
Mobile data from providers like NTC and Ncell is critical for services like eSewa or Khalti payments and for ride-sharing apps on the go.
Scenario: You're working from a cafe in Pokhara. You connect to the cafe's SSID (WLAN), but if their internet fails, you can instantly create a mobile hotspot from your phone to continue working.
Hotspots in cafes, airports, and hotels offer convenience but come with significant security risks.
Major Risk: Open Networks
Many public hotspots are "open" — they don't require a password and don't encrypt your data. This means a hacker on the same network could spy on your activity (a "Man-in-the-Middle" attack).
🔍 Think of it like shouting your private information across a crowded room.
Protect yourself on untrusted networks with these best practices:
A Virtual Private Network (VPN) encrypts all your internet traffic, creating a secure, private tunnel. Even on an open network, your data becomes unreadable to snoops.
Any Questions?
Next Topic: Chapter 4 - Organizational Information Systems