SlideShare a Scribd company logo
1 of 10
WI-FI
Presented By
Monali Ahire
Manjiri Kharat
Monali Kolapkar
Felsita Mekapogu
WHAT IS WI-FI ?






Wi-Fi suggests Wireless-Fidelitycompared with
the long established audio recording term High
Fidelity or Hi-Fi.
Wi-Fi is simply a trademarked term meaning
IEEE 802.11x.

It’s like a common language that all the devices
use to communicate to each other. If you have a
standard, people can make all sorts of devices
that can work with each other.
WHEN WI-FI ORIGINATED ?






The precursor to Wi-Fi was invented in 1991 by
NCR corporation in Nieuwegein,the Netherland.

The first wireless products were brought on the
market under the name WaveLAn with speeds of
1 Mbit/s to 2 Mbit/s.
Vic Hayes has been named as father of “Wi-Fi”.
HOW WI-FI WORKS ?




WiFi is used to transmit data, allow computers to
the internet and allow computers to connect to
wireless resources such as hard drives, printers
and other external devices.
One could connect to a wireless printer, camera,
or hard-drive using a mobile phone or PDA. This
would allow to save documents onto a wireless
hard-drive like Time Machine which could be
wirelessly accessed by a PDA or mobile
phone and wirelessly printed which would
remove the need for starting up a computer or
laptop.
HOW WI-FI CONNECTS ?
TECHNOLOGIES
Wi-Fi has now become a very common technology
and is available widely and cheaply on a range of
devices.
Examples of this include:
 iPhone
 Other phones
 Cameras
 Printers
 Laptops
 Game Consoles
 iPod touch
SECURITY






WiFi has the capabilities for high levels of
security but often it requires people to set up
complicated passwords, user-names and access
keys.
This is without using certificates to limit usage
of network resources.

Wi-Fi has three main security protocols, WEP
WPA WPA2. Each of these standards has
differing levels of security.
ADVANTAGES OF WI-FI








Wi-Fi can mahe access publicly available at wi-fi
hotspots.
Does not require regulatory approval for
individual.
Wi-Fi network can support roaming.
Wi-Fi allows local area network to deployed
without for client devices.
THANK YOU

More Related Content

What's hot (20)

Wi fi and it’s applications
Wi fi and it’s applicationsWi fi and it’s applications
Wi fi and it’s applications
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wireless Fidelity ppt
 
Wifi technology
Wifi technologyWifi technology
Wifi technology
 
wi-fi ppt
wi-fi pptwi-fi ppt
wi-fi ppt
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
 
Wifi technology
Wifi technologyWifi technology
Wifi technology
 
WIFI
WIFIWIFI
WIFI
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
 
wifi ppt
wifi pptwifi ppt
wifi ppt
 
WIFI[autosaved]
WIFI[autosaved]WIFI[autosaved]
WIFI[autosaved]
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Wi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank SaxenaWi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank Saxena
 
Wifi tecnology
Wifi tecnology Wifi tecnology
Wifi tecnology
 
Wi fi ppt project by Mubeen Momin
Wi fi ppt project by Mubeen MominWi fi ppt project by Mubeen Momin
Wi fi ppt project by Mubeen Momin
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wifi presentation
Wifi presentation Wifi presentation
Wifi presentation
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology Writeup
 

Similar to WiFI (20)

Wi Fi
Wi FiWi Fi
Wi Fi
 
wi-fi
wi-fiwi-fi
wi-fi
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wi fi network
Wi fi networkWi fi network
Wi fi network
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi fi Technology
Wi fi TechnologyWi fi Technology
Wi fi Technology
 
3
33
3
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
972003
972003972003
972003
 
Wifi
WifiWifi
Wifi
 
wifi tech-1.pptx
wifi tech-1.pptxwifi tech-1.pptx
wifi tech-1.pptx
 
Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02
 
Wi-Fi technology
Wi-Fi technologyWi-Fi technology
Wi-Fi technology
 
Wi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification ProcessWi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification Process
 
Wi fi
Wi fiWi fi
Wi fi
 
WiFi Technology & IEEE
WiFi Technology & IEEEWiFi Technology & IEEE
WiFi Technology & IEEE
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
 
wireless networks.pptx
wireless networks.pptxwireless networks.pptx
wireless networks.pptx
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi Architecture
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

WiFI

  • 2. Presented By Monali Ahire Manjiri Kharat Monali Kolapkar Felsita Mekapogu
  • 3. WHAT IS WI-FI ?    Wi-Fi suggests Wireless-Fidelitycompared with the long established audio recording term High Fidelity or Hi-Fi. Wi-Fi is simply a trademarked term meaning IEEE 802.11x. It’s like a common language that all the devices use to communicate to each other. If you have a standard, people can make all sorts of devices that can work with each other.
  • 4. WHEN WI-FI ORIGINATED ?    The precursor to Wi-Fi was invented in 1991 by NCR corporation in Nieuwegein,the Netherland. The first wireless products were brought on the market under the name WaveLAn with speeds of 1 Mbit/s to 2 Mbit/s. Vic Hayes has been named as father of “Wi-Fi”.
  • 5. HOW WI-FI WORKS ?   WiFi is used to transmit data, allow computers to the internet and allow computers to connect to wireless resources such as hard drives, printers and other external devices. One could connect to a wireless printer, camera, or hard-drive using a mobile phone or PDA. This would allow to save documents onto a wireless hard-drive like Time Machine which could be wirelessly accessed by a PDA or mobile phone and wirelessly printed which would remove the need for starting up a computer or laptop.
  • 7. TECHNOLOGIES Wi-Fi has now become a very common technology and is available widely and cheaply on a range of devices. Examples of this include:  iPhone  Other phones  Cameras  Printers  Laptops  Game Consoles  iPod touch
  • 8. SECURITY    WiFi has the capabilities for high levels of security but often it requires people to set up complicated passwords, user-names and access keys. This is without using certificates to limit usage of network resources. Wi-Fi has three main security protocols, WEP WPA WPA2. Each of these standards has differing levels of security.
  • 9. ADVANTAGES OF WI-FI     Wi-Fi can mahe access publicly available at wi-fi hotspots. Does not require regulatory approval for individual. Wi-Fi network can support roaming. Wi-Fi allows local area network to deployed without for client devices.