Your SlideShare is downloading. ×
0
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Wireless Fidelity
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Wireless Fidelity

5,220

Published on

MASTER~JAI

MASTER~JAI

Published in: Education, Technology, Business
0 Comments
4 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
5,220
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
616
Comments
0
Likes
4
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Wi-Fi Technologies JAI~MCA
  • 2. <ul><li>JAI ~MCA </li></ul><ul><li>MCA~ (GGITS) </li></ul><ul><li>ROLL NO. 20 </li></ul>Wi-Fi (Wireless-Fidelity) Technologies
  • 3. Wi-Fi Tech. Agenda <ul><li>Introduction </li></ul><ul><li>Purpose </li></ul><ul><li>Wi-Fi Alliance </li></ul><ul><li>The Wi-Fi Technology </li></ul><ul><li>Elements of a WI-FI Network </li></ul><ul><li>How a Wi-Fi Network Works </li></ul><ul><li>Wi-Fi Network Topologies </li></ul><ul><li>Wi-Fi Configurations </li></ul><ul><li>Wi-Fi Applications </li></ul><ul><li>Wi-Fi Security </li></ul><ul><li>Authentication </li></ul><ul><li>Advantages & Disadvantages </li></ul>
  • 4. Intro. <ul><li>Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless mode. </li></ul><ul><li>Wi-Fi (Wireless Fidelity) is a generic term that refers to the IEEE 802.11 communications standard for Wireless Local Area Networks (WLANs). </li></ul><ul><li>Wi-Fi Network connect computers to each other, to the internet and to the wired network. </li></ul><ul><li>Wi-Fi works on physical and data link layer. </li></ul>
  • 5. Purpose <ul><li> The purpose of Wi-Fi is to hide complexity by enabling wireless access to applications and data, media and streams. </li></ul><ul><li>The main aims of Wi-Fi are the following: </li></ul><ul><li>make access to information easier </li></ul><ul><li>ensure compatibility and co-existence of devices </li></ul><ul><li>eliminate cabling and wiring </li></ul><ul><li>eliminate switches, adapters, plugs, pins and connectors </li></ul>
  • 6. Wi-Fi Alliance <ul><li>The Alliance promotes standards with the aim of improving the interoperability of wireless local area network products based on the IEEE 802.11 standards. The Wi-Fi Alliance, a consortium of separate and independent companies, agrees on a set of common interoperable products based on the family of IEEE 802.11 standards.The Wi-Fi Alliance certifies products via a set of defined test-procedures to establish interoperability. The Wi-Fi Alliance initially complicated matters by stating that it actually stood for &quot;Wireless Fidelity&quot;, as with the advertising slogan&quot;The Standard for Wireless Fidelity&quot;, but later removed the phrase from their marketing. </li></ul>
  • 7. The Wi-Fi Technology <ul><li>Wi-Fi Networks use Radio Technologies to transmit & receive data at high speed: </li></ul><ul><ul><li>IEEE 802.11b </li></ul></ul><ul><ul><li>IEEE 802.11a </li></ul></ul><ul><ul><li>IEEE 802.11g </li></ul></ul><ul><ul><li>IEEE 802.11n </li></ul></ul>
  • 8. IEEE 802.11b <ul><li>Appear in late 1999 </li></ul><ul><li>Operates at 2.4GHz radio spectrum </li></ul><ul><li>11 Mbps (theoretical speed) - within 30 m Range </li></ul><ul><li>4-6 Mbps (actual speed) </li></ul><ul><li>100 -150 feet range </li></ul><ul><li>Most popular, Least Expensive </li></ul><ul><li>Interference from mobile phones and Bluetooth devices which can reduce the transmission speed. </li></ul>
  • 9. IEEE 802.11a <ul><li>Introduced in 2001 </li></ul><ul><li>Operates at 5 GHz (less popular) </li></ul><ul><li>54 Mbps (theoretical speed) </li></ul><ul><li>15-20 Mbps (Actual speed) </li></ul><ul><li>50-75 feet range </li></ul><ul><li>More expensive </li></ul><ul><li>Not compatible with 802.11b </li></ul>
  • 10. IEEE 802.11g <ul><li>Introduced in 2003 </li></ul><ul><li>Combine the feature of both standards (a,b) </li></ul><ul><li>100-150 feet range </li></ul><ul><li>54 Mbps Speed </li></ul><ul><li>2.4 GHz radio frequencies </li></ul><ul><li>Compatible with ‘b’ </li></ul>
  • 11. Elements of a WI-FI Network <ul><li>Access Point (AP) - The AP is a wireless LAN transceiver or “base station” that can connect one or many wireless devices simultaneously to the Internet. </li></ul><ul><li>Wi-Fi cards - They accept the wireless signal and relay information.They can be internal and external.(e.g PCMCIA Card for Laptop and PCI Card for Desktop PC) </li></ul><ul><li>Safeguards - Firewalls and anti-virus software protect networks from uninvited users and keep information secure. </li></ul>
  • 12. How a Wi-Fi Network Works <ul><li>Basic concept is same as Walkie talkies. </li></ul><ul><li>A Wi-Fi hotspot is created by installing an access point to an internet connection. </li></ul><ul><li>An access point acts as a base station. </li></ul><ul><li>When Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly. </li></ul><ul><li>A single access point can support up to 30 users and can function within a range of 100 up to 300 feet. </li></ul><ul><li>Many access points can be connected to each other via Ethernet cables to create a single large network. </li></ul>
  • 13. Wi-Fi Network Topologies <ul><li>AP-based topology (Infrastructure Mode) </li></ul><ul><li>Peer-to-peer topology (Ad-hoc Mode) </li></ul><ul><li>Point-to-multipoint bridge topology </li></ul>
  • 14. AP-based topology <ul><li>The client communicate through Access Point. </li></ul><ul><li>BSA-RF coverage provided by an AP. </li></ul><ul><li>ESA-It consists of 2 or more BSA. </li></ul><ul><li>ESA cell includes 10-15% overlap to allow roaming. </li></ul>
  • 15. Peer-to-peer topology <ul><li>AP is not required. </li></ul><ul><li>Client devices within a cell can communicate directly with each other. </li></ul><ul><li>It is useful for setting up of a wireless network quickly and easily. </li></ul>
  • 16. Point-to-multipoint bridge topology <ul><li>This is used to connect a LAN in one building to a LANs in other buildings even if the buildings are miles apart. These conditions receive a clear line of sight between buildings. The line-of-sight range varies based on the type of wireless bridge and antenna used as well as the environmental conditions. </li></ul>
  • 17. Wi-Fi Configurations <ul><li>Wi-Fi is composed of three main sectors: </li></ul><ul><li>Home (individual residences and apartment buildings) </li></ul><ul><li>Public (Round about 70,000 “hotspots” through out the world.) </li></ul><ul><li>Enterprise (corporations, universities, office parks) </li></ul>
  • 18. Wi-Fi Configurations
  • 19. Wi-Fi Configurations
  • 20. Wi-Fi Configurations
  • 21.  
  • 22. Employee Access
  • 23. Wi-Fi Applications <ul><li>Home </li></ul><ul><li>Small Businesses or SOHO </li></ul><ul><li>Large Corporations & Campuses </li></ul><ul><li>Health Care </li></ul><ul><li>Wireless ISP (WISP) </li></ul><ul><li>Travellers </li></ul>
  • 24. Wi-Fi Security <ul><li>The requirements for Wi-Fi network security can be broken down into two primary components: </li></ul><ul><li>Authentication </li></ul><ul><li>Privacy </li></ul>
  • 25. Wi-Fi Security Techniques <ul><ul><li>Service Set Identifier (SSID) </li></ul></ul><ul><ul><li>Wired Equivalent Privacy (WEP) </li></ul></ul><ul><ul><li>802.1X Access Control </li></ul></ul><ul><ul><li>Wireless Protected Access (WPA) </li></ul></ul><ul><ul><li>IEEE 802.11i </li></ul></ul>
  • 26. Authentication <ul><ul><li>Authentication Server is used </li></ul></ul><ul><ul><li>Username and password </li></ul></ul><ul><ul><li>Risk: </li></ul></ul><ul><ul><ul><li>Data (username & password) send before secure channel established </li></ul></ul></ul><ul><ul><li>Solution </li></ul></ul><ul><ul><ul><li>Establishing a encrypted channel before sending username and password </li></ul></ul></ul>
  • 27. Advantages <ul><li>Mobility </li></ul><ul><li>Ease of Installation </li></ul><ul><li>Flexibility </li></ul><ul><li>Cost </li></ul><ul><li>Reliability </li></ul><ul><li>Security </li></ul><ul><li>Use unlicensed part of the radio spectrum </li></ul><ul><li>Roaming </li></ul><ul><li>Speed </li></ul>
  • 28. Limitations OR Disadvantages <ul><li>Interference </li></ul><ul><li>Degradation in performance </li></ul><ul><li>High power consumption </li></ul><ul><li>Limited range </li></ul>
  • 29. THANK YOU

×