This popularity is due even to its main characteristics: lack of cables. Computers connect on the network without the need for cables or connectors. It’s a dream come true for those who use mobile PCs (laptops and PDAs) and obtain total freedom of movement within the area covered by the wireless network.
Consider the usual firm, which has the principal office at the 8th floor meeting room on the 2nd floor of an office building.
Wireless network equipment has the main component that is called an Access Point. He is a relay that sends and receives radio waves to and from devices in its range.
In the example above we considered the network are two access points. One on the 8th floor of the building principal office and the other in the meeting room on the 2nd floor. Director can go to meetings taking with him the laptop and although it is not in his office can ask information to secretary or email to inquire for the latest news, all without having to connect any cables.
There is a reverse of the medal itself for wireless networks. Besides the easiest use and the most flexibility, a wireless network is also the most exposed in terms of vulnerability to unauthorized interception.
At the physical level, anyone can access a wireless network. There is no need to cut cables because the data propagation medium is air. They can pass through windows, as well as can pass through thin walls of ordinary offices. Fortunately, it is not generally enough to have access to the physical layer to achieve the effective network access, as communications equipment manufacturers have developed ways of data encryption that make them inaccessible to intruders. Wireless network security is a very bright moot point, because of the reasons unknowingly of users or unprofessionalism of directors, or to allow easy connection, these protective features are not always enabled.
The future is probably a combination of the above technologies, which will also add features coming from the mobile world.