This blog is created to discuss all things related to the world of networking. Desgin, installation and configuration of networks. Maintenance and monitoring of networks and discussion of latest networking related technologies.
Wireless communication technology inside cell phones and other mobile devices has evolved over several decades. Dozens of different wireless connection and data transfer methods have been developed over the years - for improved speed, reach and/or reliability - although many are now obsolete.
People sometimes refer to wireless networking as “Wi-Fi” even when the network uses a totally unrelated kind of wireless technology. While it might seem ideal that all of the world’s wireless devices should use one common network protocol such as Wi-Fi, today’s networks support a wide variety of different protocols instead. The reason: No one protocol in existence provides an optimal solution for all of the different wireless usages people want.
Unfortunately, no computer network is truly secure. It's always theoretically possible for eavesdroppers to view or "snoop" the traffic on any network, and it's often possible to add or "inject" unwelcome traffic as well. However, some networks are built and managed much more securely than others. For both wired and wireless networks alike, the real question to answer becomes - is it secure enough?
Anyone who relies on personal mobile devices like smartphones or tablets sooner or later faces issues with data usage on the online network services they subscribe to. Online services normally restrict the total amount of data traffic each subscriber can generate on the network during a given time period. This data usage can quickly grow out of control if not properly managed.