Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Vimeo
    Let's Tech It Easy
    Subscribe Login
    • Homepage
    • About
    • Blog
      • Computers
      • Cloud
      • Gaming
      • Cyber Security
      • iPhone
      • Mac
      • Windows
      • Android
    • Contact
    • My Tickets
    • Submit Ticket
    Let's Tech It Easy
    Home»Computers»Wireless Network Protocols
    Computers

    Wireless Network Protocols

    SamikshyaBy Samikshya23 February 2021No Comments5 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Wireless protocol is the set of rules that determines set of rules that determine how data is transmitted between different devices. Essentially, it allows connected devices to communicates with each other, regardless of any differences in their internal processes, structure and design. There are many wireless protocols established these days but the main protocols are Bluetooth, WiMax and Zigbee. In this blog we willexplain about these protocols in shortly.

    Bluetooth:

    Bluetooth is described under IEEE 802.15.1 as a wireless communication technology which works under a limited space around a distance of 10 meters. Bluetooth works under the range of 2.4GHZ. to communicate with another Bluetooth device we need the another Bluetooth dvice using the same technology i.e. a special Bluetooth card. Generally 802.11 technology is used in the smart phones and laptops.  Bluetooth uses FHSS( frequency Hopping Spread Spectrum) due which the interference is very less as compared to other wireless technologies. The data rate for the Bluetooth is up to 1mbps.

    Bluetooth operate in three security models:

    • Unprotected mode: No any encryption technique and authentication technique is used in this process.
    • Service based mode: if a connection is made between the devices the security manager does the authentication which restricts access to device.
    • MAC address Encryption: In service mode connecting is made first and authentication is done but in this case authentication is done before the connection is made.

    Strength of Bluetooth:

    • Bluetooth creates adhoc network without any wires and the connection is made very fast.
    • The power consumption by Bluetooth is very less.
    • The voice and data transfer can be made by Bluetooth.
    • The Bluetooth frequency can pass through different obstacle such as walls.
    • The interference is very less as compared to other technologies.

    Security Weakness of Bluetooth:

    • Bluetooth provides the communication system base on the Bluetooth devices address, blueoothdoensont provides orginalclient verification so this is the authentication problem in Bluetooth.
    • Confidentiality:ONnly devices connected to the bluetooh should view the content but in some case it does not happen so the confidentiality is lost.
    • Authorization: Authentication is very simple because the shared key can be suspected in one response.

    Zigbee:It is an wireless technology which uses low power radio signal for Personal area network. It is an IEEE 802.15.4 which is mainly used to create the network which need low data transfer rate, and for secure networkingZigbee is mainly used in home automation, medical data collection, aloso used in wireless sensor networks, smoke alarms and mainly it is designed to small projects which uses low power and low bandwidth. It is mainly used for short distance which is about 20 meters and can be passed over long distance by intermediate devices in a mesh network.

    Zigbee operate in a band of 2.4GHz worldwide but it runs in 784MHZ in china and 868 MHz in Europe and 915 MHz in Australia and USA. It is cheaper than Bluetooth and WIFI. Zig Bee supports tree, star and mesh networking.

     

    Advantages of zibbee:

    • It is not centrally controlled and load is distributed equally in every network.
    • Setup is very easy
    • Very easy to control the home appliances.
    • The power consumption is very low.

    Disadvantages of zigbee:

    • It is not widely used protocol so high knowledge is require to operate the zigbee compliant devices.
    • It is not secure as WIFI using system.
    • It is easily attacked by unauthorized person.
    • The range is very low so it cannot be used for outdoor communication system.

    Security threats of ZIgbee:

    Zigbee uses the symmetric key cryptography. It uses the three types of key i.e. Master key, Link key and network key.

    Majority of the zigbee nodes are low battery powered so they have little memory and power, the weakness of the zigbee can be derived from this point. Zigbee uses symmetric key cryptography and and the memory is very less so the intruder can easily read the key from the memory. If the intruder have physical access to the device then they can he/she can easily access the security software of the zigbee. So the feature low power consumption is the main security weakness of the zigbee.

    WiMAX:WiMAX stands for Worldwide Interoperability for microwave access which is wirless union dedicated in the advancement of 802.16 standards. It is designed for BWA( Broadband Wireless Network). According to WIMAX forum the main purpose of the WiMAX is to promote the thecompatibility of the devices which depends upon 802.16.

    The data transfer for the WiMaX is 10Megabits per seconds for download and upload. The range is about 10km form the base station.  Till 135 countries are using WiMAX which includes 455 WiMAX centers.

    WiMAX  is based on the MAN technology. The main working of the WiMAX is similar to the WIFI but it operates at the higher speed and over greater distance. It is mainly used in the pace where the wired infrastructure is difficult to develop.

    Advantages of WiMAX:

    • Only one station can serve thousands of user.
    • It is much faster than other wired networks and WIFI.
    • The transmission speed is 10Mbps with range of 10km.
    • No any obstacles can stop the transmission of signals.

    Disadvantages of WiMAX:

    • For the longer connection line of sight is required.
    • Interrupt of signal can occur due to the rain.
    • The main problem with WiMAX is that other wireless device can cause interference.
    • Big electrical power is required to operate.

    Security issue of Wimax:

    Authentication: WiMAXdoes not uses the authentication for base station or service provider thus the WiMAX network is susceptible to man in middle attack.

    Denial of services: the intruder can force the base station to take the large number of handoffs and then lunch the Denial of service attack.

    Eavesdropping: during the process of connection messages are sent in plain text and these message are properly authenticated so that the attacker can easily lunch the attack.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticleHome Network Hardware Components
    Next Article WIRELESS SECURITY PROTOCOLS
    Samikshya

    Related Posts

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025
    Leave A Reply Cancel Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Demo
    Our Picks
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Business

    Windows 10 End of Service: What Must Be Done

    By Uneeb19 March 20250

    On October 14, 2025, Microsoft will officially end support for Windows 10, signalling a major shift…

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    You too can join us

    If you also think about technology and want to contribute either as a mentor or even from a learner’s perspective, look no further and join us. Write us at [email protected] and share your opinion. Our team will get back by sending you an invite to join the platform as a contributor. Empower others, empower yourself so each one of us can play with the technology safely one day without being scared.

    Subscribe Here
    Loading
    For Partnership Worldwide

    Contact:

    [email protected]

     

    About Us
    About Us

    “Let’s Tech It Easy” or popularly known as “LTIE” is the blogging platform for everyone who wants to share and learn about technology. It is an initiative by the serial techpreneur Vish when he realized the wide gap between the pace at which the technology is evolving and at which it is getting adopted by a wider audience.

    Email Us: [email protected]

    Latest Posts

    Upgrading RAM

    10 March 2023

    Desktop Vs Laptop

    10 March 2023

    Data Recovery

    3 March 2023

    MacOS on Windows Virtual Box

    10 February 2023

    macOS Monterey and what’s new in it?

    12 April 2022
    New Comments
    • How to Troubleshoot Sound and Mic on Windows 10 - Let's Tech It Easy on How to Access Troubleshooters on Windows 10
    • How to Stay Safe While Using Public Wi-Fi Networks - Let's Tech It Easy on Internet Security for Home Users – VPN 101
    • How to Set up Oracle VirtualBox on a Mac - Let's Tech It Easy on How to Install Windows 10 on a Mac Using Boot Camp Assistant
    • DoS Attack Implementation and Prevention in Ubuntu – Let's Tech It Easy on Top Kali Linux Commands
    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About
    • Blog
    • Contact
    • Computers
    • Cloud
    • Gaming
    • Cyber Security
    • iPhone
    • Mac
    • Windows
    • My Tickets
    • Submit Ticket
    © 2025 LetsTechitEasy. Designed by Sukrit Infotech.

    Type above and press Enter to search. Press Esc to cancel.

    Sign In or Register

    Welcome Back!

    Login below or Register Now.

    Lost password?

    Register Now!

    Already registered? Login.

    A password will be e-mailed to you.