SlideShare a Scribd company logo
Wi-Fi
the
802.11 Standard
VIPUL KUMAR MAURYA
CSE Department, 3rd Year
Introduction
Wi-Fi Stands for Wireless Fidelity
Wireless Fidelity is generic term refers to (The Institute of
Electrical and Electronics Engineers ) IEEE 802.11 standards
for Wireless Local Area Network.
Wi-Fi is a wireless technology that uses radio frequency to
transmit data through the air.
Wi-Fi Network Connects Computer to each other, to the
internet and to the wired network.
Wi-Fi Works On IEEE 802.11 Standards
 802.11 is primarily concerned with the
lower layers of the OSI model.
 Data Link Layer
 Logical Link Control (LLC).
 Medium Access Control (MAC).
 Physical Layer
 Physical Layer Convergence Procedure
(PLCP).
 Physical Medium Dependent (PMD).
802.11 Standards
IEEE 802 .11 b
IEEE 802 .11a
IEEE 802 .11g
IEEE 802 .11n
IEEE 802 .11ac
IEEE 802.11 is a set of media access control (MAC) and physical
layer (PHY) specifications for implementing wireless local area
network (WLAN) computer communication in the 2.4, 3.6, 5, and
60 GHz frequency bands
802.11b Standard
 Appears in late 1999
 Operates at 2.44Ghz radio spectrum
 11Mbps (theoretical speed)- within 30 meter Range
 4-6 Mbps Actual Speed
 100-150 feet range
 Limits the number of access points in range of each other
to three
 Most Popular , Least Expensive
 Interference from Mobile Phones and Bluetooth device
which can reduce transmission speed
 Uses direct-sequence spread-spectrum technology
802.11a Standard
 Introduce in 2001
 Operates at 5GHz
 Less popular and Less interfered
 54 Mbps (theoretical Speed)
 15-20 Mbps (Actual Speed)
 50-75 feet range
 More Expensive
 Highly Obstructed
 Not Compatible with 802.11b
 Uses frequency division multiplexing
802.11g Standard
 Introduce in 2003
 Combine features of both a and b
 100-150 feet range
 54 Mbps (theoretical speed)
 20-25 Mbps (actual Speed)
 2.4 GHz radio frequency
 Compatible with b
 Uses frequency division multiplexing
802.11n Standard
 802.11n also known as Wireless N
 802.11n Ratified in 2009
 802.11n builds upon previous 802.11 standards by adding
multiple-input multiple-output (MIMO).
 Operates on Both 2.4Ghz and 5Ghz
 Provide Bandwidth up to 300Mbps
 Backward-compatible with 802.11b/g gear
 Increased Speed and range
802.11ac Standard
 Builds on 802.11n ,Published in 2013
 The addition of Multi-user MIMO (MU-MIMO)
 Utilizes dual band wireless technology
 Support Connection both 2.4 GHz and 5GHz
 Backward compatibility to 802.11b/g/n
 Bandwidth rated up to 1300 Mbps on the 5 GHz
 bandwidth rated up to 450 Mbps on the 2.4 GHz
Elements Of Wi-Fi
 Access Point- The AP is wireless LAN radio transceiver or “base
station” that can connect to one or many wireless devices
simultaneously to internet.
 Wi –Fi Card- They accept wireless signal and relay information. They
can be external or internal.
 Safeguards – Firewalls and anti-virus protects from uninvited users
and keep information secure.
Wi-Fi Network Topologies
 Peer to Peer Topology (Ad-hoc mode)
 AP – Based Topology (Infrastructure mode)
Peer to Peer Topology
 AP is not required
 Client devices can communicate with each other directly
 Useful to create wireless network easily and quickly
Infrastructure Network
 The client communicate through Access point
 Any Communication has to go through AP
 If a Mobile station like PDA, Computer has to
communicate with other Mobile station, it need to sends
information to AP first , then AP sends Info to destination
mobile station
How Wi-Fi Works?
 A Wi-Fi hotspot is created by installing an access point to an
internet connection.
 An Access Point acts as base station
 When a Wi-Fi enabled device encounters a hotspot the device
can then connect to that network wirelessly.
 A computer’s adapter translate data into radio signals and
transmits it using antenna
 A Wireless router receives the signals and decode it. Router
sends the information
 Many access points can connected to each other via Ethernet
cables to create a single large network.
CSMA/CA
 Carrier Sense Multiple Access with Collision Avoidance
 CSMA/CA is used by Data Link Layer.
 MS (mobile station) sends its packets, it checks to see if someone else is
sending information. Only when the medium is free can an MS sends packets.
 If some station is sending or receiving signal, the MS that intends to send will
generate a random waiting time and wait for its turn. If several MSs are all
waiting for their turns, since their waiting times are randomly generated and
thus not equal, they will not start sending simultaneously. Thus collision (two
or more MSs sending signals simultaneously) is avoided.
Security
 Wired Equivalency Protocol (WEP)
 Wi-Fi Protected Access (WPA)
 Wi-Fi Protected Access 2 (WPA2)
 Extensible Authentication Protocol (EAP)
 Firewall
Advantages
 Freedom – You can work from any location that you can
get a signal.
 Setup Cost – No cabling required.
 Flexibility – Quick and easy to setup in temp or permanent
space.
 Scalable – Can be expanded with growth.
 Mobile Access – Can access the network on the move.
Disadvantages
 Speed – Slower than cable.
 Range – Affected by various medium.
 Travels best through open space.
 Reduced by walls, glass, water, etc
 Security – Greater exposure to risks.
 Unauthorized access.
 Compromising data.
 Denial of service.
Thank You

More Related Content

What's hot

Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
Rahul Hada
 
Gsm channels concept
Gsm channels conceptGsm channels concept
Gsm channels concept
Telebeansolutions
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
Manish8976
 
Wireless Local Loop
Wireless Local LoopWireless Local Loop
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
VijayaLakshmi514
 
Hiperlan
HiperlanHiperlan
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmission
Saba Rathinam
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
Parthipan Parthi
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
Mateen Shahid
 
Utran architecture(rashmi)
Utran architecture(rashmi)Utran architecture(rashmi)
Utran architecture(rashmi)
Dr. ABHISHEK K PANDEY
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
ashiesh0007
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
rahul kundu
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
N.Jagadish Kumar
 
Ethernet
EthernetEthernet
Ethernet
Jaya Yadav
 
WiMAX
WiMAXWiMAX
Ethernet
EthernetEthernet
Ethernet
sijil chacko
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Data link layer
Data link layer Data link layer
Data link layer
Mukesh Chinta
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
Ankur Kumar
 

What's hot (20)

Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Gsm channels concept
Gsm channels conceptGsm channels concept
Gsm channels concept
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
Wireless Local Loop
Wireless Local LoopWireless Local Loop
Wireless Local Loop
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmission
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Utran architecture(rashmi)
Utran architecture(rashmi)Utran architecture(rashmi)
Utran architecture(rashmi)
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Ethernet
EthernetEthernet
Ethernet
 
WiMAX
WiMAXWiMAX
WiMAX
 
Ethernet
EthernetEthernet
Ethernet
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Data link layer
Data link layer Data link layer
Data link layer
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 

Similar to Wifi & 802.11 Standards

Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
Alok Pandey (AP)
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
dxmuthu
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
pmuthumca51
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
SUBBIAH SURESH
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
Ash Technologies
 
Darsh
DarshDarsh
8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).ppt
SAMBIT34
 
Wi Fi
Wi FiWi Fi
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
M Sabir Saeed
 
Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)
Darpan Patel
 
J010216776
J010216776J010216776
J010216776
IOSR Journals
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
Joe Christensen
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Eric Vanderburg
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
Faiq Ali Sayed
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
tardeep
 
Wi fi[1]
Wi fi[1]Wi fi[1]
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
alanfhall8953
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
Kathirvel Ayyaswamy
 
What is a Wifi?
What is a Wifi?What is a Wifi?
What is a Wifi?
karan saini
 
Wi-Fi
Wi-FiWi-Fi

Similar to Wifi & 802.11 Standards (20)

Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
Darsh
DarshDarsh
Darsh
 
8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).ppt
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 
Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)
 
J010216776
J010216776J010216776
J010216776
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
Wi fi[1]
Wi fi[1]Wi fi[1]
Wi fi[1]
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
What is a Wifi?
What is a Wifi?What is a Wifi?
What is a Wifi?
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 

Recently uploaded

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 

Recently uploaded (20)

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 

Wifi & 802.11 Standards

  • 1. Wi-Fi the 802.11 Standard VIPUL KUMAR MAURYA CSE Department, 3rd Year
  • 2. Introduction Wi-Fi Stands for Wireless Fidelity Wireless Fidelity is generic term refers to (The Institute of Electrical and Electronics Engineers ) IEEE 802.11 standards for Wireless Local Area Network. Wi-Fi is a wireless technology that uses radio frequency to transmit data through the air. Wi-Fi Network Connects Computer to each other, to the internet and to the wired network.
  • 3. Wi-Fi Works On IEEE 802.11 Standards  802.11 is primarily concerned with the lower layers of the OSI model.  Data Link Layer  Logical Link Control (LLC).  Medium Access Control (MAC).  Physical Layer  Physical Layer Convergence Procedure (PLCP).  Physical Medium Dependent (PMD).
  • 4. 802.11 Standards IEEE 802 .11 b IEEE 802 .11a IEEE 802 .11g IEEE 802 .11n IEEE 802 .11ac IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5, and 60 GHz frequency bands
  • 5. 802.11b Standard  Appears in late 1999  Operates at 2.44Ghz radio spectrum  11Mbps (theoretical speed)- within 30 meter Range  4-6 Mbps Actual Speed  100-150 feet range  Limits the number of access points in range of each other to three  Most Popular , Least Expensive  Interference from Mobile Phones and Bluetooth device which can reduce transmission speed  Uses direct-sequence spread-spectrum technology
  • 6. 802.11a Standard  Introduce in 2001  Operates at 5GHz  Less popular and Less interfered  54 Mbps (theoretical Speed)  15-20 Mbps (Actual Speed)  50-75 feet range  More Expensive  Highly Obstructed  Not Compatible with 802.11b  Uses frequency division multiplexing
  • 7. 802.11g Standard  Introduce in 2003  Combine features of both a and b  100-150 feet range  54 Mbps (theoretical speed)  20-25 Mbps (actual Speed)  2.4 GHz radio frequency  Compatible with b  Uses frequency division multiplexing
  • 8. 802.11n Standard  802.11n also known as Wireless N  802.11n Ratified in 2009  802.11n builds upon previous 802.11 standards by adding multiple-input multiple-output (MIMO).  Operates on Both 2.4Ghz and 5Ghz  Provide Bandwidth up to 300Mbps  Backward-compatible with 802.11b/g gear  Increased Speed and range
  • 9. 802.11ac Standard  Builds on 802.11n ,Published in 2013  The addition of Multi-user MIMO (MU-MIMO)  Utilizes dual band wireless technology  Support Connection both 2.4 GHz and 5GHz  Backward compatibility to 802.11b/g/n  Bandwidth rated up to 1300 Mbps on the 5 GHz  bandwidth rated up to 450 Mbps on the 2.4 GHz
  • 10. Elements Of Wi-Fi  Access Point- The AP is wireless LAN radio transceiver or “base station” that can connect to one or many wireless devices simultaneously to internet.  Wi –Fi Card- They accept wireless signal and relay information. They can be external or internal.  Safeguards – Firewalls and anti-virus protects from uninvited users and keep information secure.
  • 11. Wi-Fi Network Topologies  Peer to Peer Topology (Ad-hoc mode)  AP – Based Topology (Infrastructure mode)
  • 12. Peer to Peer Topology  AP is not required  Client devices can communicate with each other directly  Useful to create wireless network easily and quickly
  • 13. Infrastructure Network  The client communicate through Access point  Any Communication has to go through AP  If a Mobile station like PDA, Computer has to communicate with other Mobile station, it need to sends information to AP first , then AP sends Info to destination mobile station
  • 14. How Wi-Fi Works?  A Wi-Fi hotspot is created by installing an access point to an internet connection.  An Access Point acts as base station  When a Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly.  A computer’s adapter translate data into radio signals and transmits it using antenna  A Wireless router receives the signals and decode it. Router sends the information  Many access points can connected to each other via Ethernet cables to create a single large network.
  • 15. CSMA/CA  Carrier Sense Multiple Access with Collision Avoidance  CSMA/CA is used by Data Link Layer.  MS (mobile station) sends its packets, it checks to see if someone else is sending information. Only when the medium is free can an MS sends packets.  If some station is sending or receiving signal, the MS that intends to send will generate a random waiting time and wait for its turn. If several MSs are all waiting for their turns, since their waiting times are randomly generated and thus not equal, they will not start sending simultaneously. Thus collision (two or more MSs sending signals simultaneously) is avoided.
  • 16. Security  Wired Equivalency Protocol (WEP)  Wi-Fi Protected Access (WPA)  Wi-Fi Protected Access 2 (WPA2)  Extensible Authentication Protocol (EAP)  Firewall
  • 17. Advantages  Freedom – You can work from any location that you can get a signal.  Setup Cost – No cabling required.  Flexibility – Quick and easy to setup in temp or permanent space.  Scalable – Can be expanded with growth.  Mobile Access – Can access the network on the move.
  • 18. Disadvantages  Speed – Slower than cable.  Range – Affected by various medium.  Travels best through open space.  Reduced by walls, glass, water, etc  Security – Greater exposure to risks.  Unauthorized access.  Compromising data.  Denial of service.