Access Point

An Access Point is a type of device that enables wireless stations to connect to a wired local area network (LAN). An access point, therefore, provides wireless stations with access to resources on a network.

Access Point connection to an Ethernet LAN

Access Point
The access point allows the laptop computer, using a wireless network card, accessing the ethernet LAN.

How It Works

In typical wireless networking implementations, an access point is a device connected to a wired network, such as an Ethernet network. The access point is a transceiver, transmitting and receiving signals using either direct sequencing or frequency hopping methods in spread spectrum communication technologies. The access point provides a point of access to the wired network for mobile computers.

To communicate with the access point, a mobile computer can use either a special wireless PCMCIA card or a network interface card (NIC), or it can use station adapters, which are devices that plug into the standard 10BaseT port of the computer’s Ethernet card.

For spread spectrum communication in the 2.4 GHz range, access points typically support 1–3 Mbps communication over distances of up to about 3 kilometers. The area covered by an access point is called a cell. An access point can generally support 15 to 25 wireless stations, while still maintaining optimal data transfer rates. The access points allow wireless stations to be quickly and easily connected to a wired LAN.


Many wired networks base the security on physical access control, trusting all the users on the local network, but if wireless access points are connected to the network, anybody within range of the AP (which typically extends farther than the intended area) can attach to the network.

Modern access points come with built-in encryption. The first generation encryption scheme, WEP, proved easy to crack; the second and third generation schemes, WPA and WPA2, are considered secure if a strong enough password or passphrase is used.

Some Access Points support hotspot style authentication using RADIUS and other authentication servers.


Articles posted after being checked by editors.

Recent Posts

link to Root


Root is the base of a hierarchical file system. It can also be the UNIX superuser or the CERN Data Analysis Framework, and more. Just read the article.