Some disadvantages of wireless communication include a limited amount of bandwidth for communication and breaches of network security. Wireless transmissions can be seen or heard by others on the network, unless security is set so that only registered devices within the network are able to receive data.Continue Reading
The lack of security is often why a user will receive a pop-up on an open wireless network that is unsecured. Personal information, such as passwords, are easily viewable by others on the network if they decide to do so. However, with secure and password-encrypted networks, the risk of this type of security breach is much less.
Wireless networks require many radio signals to power them. In areas where there is not an adequate signal, bandwidth will be constrained. Wireless communication bandwidth is fairly widespread in modern times, but areas still exist where the possibility of having too many users at once could be an issue.
There are also many advantages of wireless communication, such as quality transmission speeds. Another advantage of wireless communication is mobility. Wireless networks and devices allow the user to move from place to place with their device while still acquiring a signal. Wireless networks are also self-configuring, for ease of use.Learn more about Internet & Networking
In most cases, the only way to set up your Wi-Fi network to prevent hackers from breaking WEP codes is by switching to a different network security protocol. WEP has security vulnerabilities that let hackers easily steal wireless passwords, often in as little as minutes. Newer wireless security protocols offer a much greater degree of protection.Full Answer >
WEP is a standard for wireless network security and stands for Wired Equivalent Privacy. To access a secured network, a user has to use a WEP key. WEP keys have exactly 10 or 26 hexadecimal digits, that is, numerical characters 0 to 9 and letters A to F.Full Answer >
A firewall can be a vital piece of network security that keeps hackers out of a computer system, but it can be complicated to set up properly. Firewalls are designed to scan any traffic that passes through them, allowing only legitimate packets and blocking anything unauthorized. However, they can also inadvertently block legitimate traffic, especially if misconfigured, and make Internet communication programs harder to use.Full Answer >
When bandwidth is exceeded on a device or service, it means that the user has gone over the resources allotted to his or her account for a given time period. Larger images, video files and other media use more bandwidth, and bandwidth is consumed every time a user accesses that media.Full Answer >