You need a WAP - WIreless Access Point. This is a bridge device that connects the two types of networks together. Or, use a router.
You will need to obtain a compatible wireless adapter for your wired device.
This device is called a wireless access point.
NIC (network interface controller) on your computer, their are also different nodes such as servers, hubs, switches etc.
Wireless Access Point (WAP)
Wireless Hub/ Router
A wireless router.
The simple wireless configuration technique that can make the network invisible to unauthorized users are disable SSID broadcasting. This will disable the network from being broadcasted.
It means its waiting for wireless connections to join your area.
For either a personal or a business wireless network, it's to protect it from unauthorized users.
Ssid broadcast
Isolation
network printer
You need to disable broadcasting of SSID.
The initial setup of a wireless connection infrastructure that implements security is not complicated as that of wired connections. The disadvantage of wireless security is that most of the encryption methods are common and have weaknesses.
Authentication
A router. One possible solution to the problem of the overloaded network is to add a second networking device, such as a larger integrated service router (ISR). When adding a device, it is a good practice to place the wired and wireless users on separate local subnetworks to increase security. The original wireless router can still be used to provide the wireless users with connectivity and security on one network. Hubs or switches connecting the wired users can then be directly connected to the new ISR using a different network. The ISR and the wireless router can then be directly connected with a third network. This new network configuration requires that the existing Class C network be divided into at least three subnetworks. Using classful subnetting, at least two bits must be taken from the host portion of the address to meet the customer requirements. This subnetting scheme results in the creation of four individual networks, each with 62 available host addresses (64 possible addresses, minus the all-0s and all-1s addresses).
Strangers won't see your wireless network, making it more difficult to hack. The downside is that when you want to add new devices, they won't be able to see it automtically either. You will need to manually enter the network ID.