BRY DAWGS SITE

Chapter 7 summary

   In the beginning of module 7 the chapter focused on wireless phones. My first introduction to the first-generation (1G) wireless phones was from seeing them in 1980s movies; they were depicted as being very large and usually kept in cars. Second-generation (2G) wireless phones included improved text message capability; if you wanted to type the letter b you had to push 2 twice. Eventually came fourth generation (4G) wireless phones with even more improved capabilities such as three different cameras which I question the necessity for. 

    A wireless local area network (wireless LAN) is a network in which devices use high-frequency radio waves instead of wires or cables to communicate with a base station to connect to the Internet. A common type of wireless network is called Wi- Fi. I remember taking my laptop computer and my 3DS to Barnes n Nobles when I did not have internet access to use their Wi-Fi. I did not know you could get a wireless router that you can keep in your pocket that provides a battery-operated, mobile, personal hotspot for connecting Wi-Fi devices to the internet. I may want to purchase one of these.

    Personal area networking (PAN) refers to the wireless network that connects personal devices to each other. Bluetooth uses radio waves to create short-range connections between compatible devices. Bluetooth that I use frequently includes my phone which connects to my car and my skull-candy headphones to my phone. Bluetooth is great because it eliminates extra cables and avoids knots in the wires which is very frustrating especially if you need to get those knots out like me. The only thing that The Internet of things (IoT) that I am familiar with is my girlfriend’s Fitbit watch that connects to her iPhone. 

   Media Access Control address, or MAC address, is a unique number to identify the network interface card of your computer; I always thought MAC address referred to Macintosh computers. My neighbor’s wireless network was unprotected for years. Understanding security threats to wireless devices was very informative because I frequently use Wi-Fi in public places. I was not familiar with the security concerns for Bluetooth-enabled devices like bluejacking, bluesnarfing and bluebugging; all seemingly comical words. After reading module 7 I have a better understanding of the different types of networks available and I have increased knowledge regarding securing wireless networks.