SlideShare a Scribd company logo
1 of 12
SCHOOL OF COMPUTING
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
1156CS501- SEMINAR 1
WINTER SEMESTER(19-20)
“Wireless Communication – Issues, Challenges and
Applications”
PRESENTED BY
Akash Kumar Sahani
SUPERVISED BY
Associate Professor
Dr. SPRaja
AGENDA
2
OBJECTIVE
JUSTIFICATION OF TITLE
ABSTRACT
INTRODUCTION
LITERATURE REVIEW
ISSUES
CHALLENGES
APPLICATION
CONCLUSION
OBJECTIVES
3
Aim of the Project:
 To learn about the issues , challenges of Wireless
communication
Application of Wireless communication
Scope of the Project:
The scope of the project is to learn and research about
issues due to wireless communication, challenges during
wireless communication and their application
BATCH NO: PRESENTED DATE:
JUSTIFICATION OF
TITLE
This Title “Wireless Communication –
Issues ,Challenges and Application”
It tells about the issues creating due to
wireless communication , challenges we
are facing from that and various
applications of wireless communication.
This title is suitable for this seminar
because it directly point out the direction
in which field we are going to present.
ABSTRACT
This presentation slide basically deals
about wireless communication. Initially,
discussing about Issues of
we are
Wireless Communication moreover
challenges in wireless communication
along with their applications. Finally, the
topic includes the various literature
survey done by us. In Literature survey
we are focusing on about issues,
challenges and Application of Wireless
Communication in detail. At last,We
Summarize our Survey and give our
views about The Topic.
Introduction
• Sharing of data by Electromagnetic Waves.
• Free from Wires.
• Portable.
• Easy installation.
• Easy Maintenance.
• Cheap.
LITERATURE
REVIEW
• Security issues and attacks in Wireless Sensor Network –
World Applied Science ,February 2014.
• Wireless communication infrastructure in a military
environment – IEEE 2004
• Wireless Sensor Network: Security issues, Challenges
and Solutions –International Journal Of Information &
Computation Technology
• Wireless communication in Medical Devices : Research
Challenges – IEEE 2018
ISSUES
Authentication:-
The receiver node can easily
we found and misused.
Network limitation:-
In specific network.
Signal Jamming Attack:-
The connection and signal can
easily traced and jammed to
attack in your privacy.
Tempering :–
Accessing or interfering data.
CHALLENGES
Infrastructure in a Military Environment
1. Multipoint microwave radios for linking line-of-sight
enclaves .
2. IEEE 802.11-based wireless LAN for mobile users.
3. Diffused infrared wireless network devices for secure , short
range applications
4. VoIP technology for secure and non secure voice
Hostile Environment
1. Capture by attackers
2. Challenges for security researchers.
Medical Devices: Research
1. Wireless Blood Pressure cuff
2. Wireless oximeter
3. Atextile based fluidic channel for the collection and analysis
of sweat
4. AWireless implantable device for measuring blood glucose
and calcium levels
APPLICATION
Military Application:-
Detecting & monitoring forces
,equipment and ammunition.
Nuclear, biological and chemical attack
detection.
Environmental Application:-
Detection of environmental conditions
eg-Forest fire and flood.
Health Application:-
Tracking and monitoring.
Other application:-
Iot, Interactive toys.
CONCLUSION
After this survey we came to acknowledge about different
types of wireless devices. The working model of Wireless
Communication along with the principle behind it. We also
came to know about the issues and challenges faced in
wireless networking. As there are many issues and
challenges but there are a lot of applications of Wireless
Communication.
THANK YOU

More Related Content

Similar to Wireless Communication – Issues, Challenges and Applications

Implementing Wireless Network For Computer Communication...
Implementing Wireless Network For Computer Communication...Implementing Wireless Network For Computer Communication...
Implementing Wireless Network For Computer Communication...
Karen Gilchrist
 
Secure communications over wireless broadcast networks
Secure communications over wireless broadcast networksSecure communications over wireless broadcast networks
Secure communications over wireless broadcast networks
praveen369
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
subhradeep mitra
 
Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...
FaizanMahmood28
 
biuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfbiuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdf
JOMan21
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities Survey
Clayton Hatathlie
 

Similar to Wireless Communication – Issues, Challenges and Applications (20)

My project proposal 2
My project proposal 2My project proposal 2
My project proposal 2
 
an overview of wireless local area networks and security system
an overview of wireless local area networks and security systeman overview of wireless local area networks and security system
an overview of wireless local area networks and security system
 
Implementing Wireless Network For Computer Communication...
Implementing Wireless Network For Computer Communication...Implementing Wireless Network For Computer Communication...
Implementing Wireless Network For Computer Communication...
 
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdfDigital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
 
14A81A05A0
14A81A05A014A81A05A0
14A81A05A0
 
Secure communications over wireless broadcast networks
Secure communications over wireless broadcast networksSecure communications over wireless broadcast networks
Secure communications over wireless broadcast networks
 
Wireless ad hoc
Wireless ad hocWireless ad hoc
Wireless ad hoc
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
ISM band interference on Wi-Fi
ISM band interference on Wi-FiISM band interference on Wi-Fi
ISM band interference on Wi-Fi
 
Wban
WbanWban
Wban
 
533 450-457
533 450-457533 450-457
533 450-457
 
Visible Light Communication Using LED's and LDR
Visible Light Communication Using LED's and LDRVisible Light Communication Using LED's and LDR
Visible Light Communication Using LED's and LDR
 
Principles of Electronics Communication system.ppt
Principles of Electronics Communication system.pptPrinciples of Electronics Communication system.ppt
Principles of Electronics Communication system.ppt
 
Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...
 
Standards for providing Internet Services over Wireless Networks
Standards for providing Internet Services over Wireless NetworksStandards for providing Internet Services over Wireless Networks
Standards for providing Internet Services over Wireless Networks
 
Ec2401 lp
Ec2401 lpEc2401 lp
Ec2401 lp
 
biuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfbiuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdf
 
Blackbook LIFI final
Blackbook LIFI finalBlackbook LIFI final
Blackbook LIFI final
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities Survey
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Wireless Communication – Issues, Challenges and Applications

  • 1. SCHOOL OF COMPUTING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 1156CS501- SEMINAR 1 WINTER SEMESTER(19-20) “Wireless Communication – Issues, Challenges and Applications” PRESENTED BY Akash Kumar Sahani SUPERVISED BY Associate Professor Dr. SPRaja
  • 2. AGENDA 2 OBJECTIVE JUSTIFICATION OF TITLE ABSTRACT INTRODUCTION LITERATURE REVIEW ISSUES CHALLENGES APPLICATION CONCLUSION
  • 3. OBJECTIVES 3 Aim of the Project:  To learn about the issues , challenges of Wireless communication Application of Wireless communication Scope of the Project: The scope of the project is to learn and research about issues due to wireless communication, challenges during wireless communication and their application BATCH NO: PRESENTED DATE:
  • 4. JUSTIFICATION OF TITLE This Title “Wireless Communication – Issues ,Challenges and Application” It tells about the issues creating due to wireless communication , challenges we are facing from that and various applications of wireless communication. This title is suitable for this seminar because it directly point out the direction in which field we are going to present.
  • 5. ABSTRACT This presentation slide basically deals about wireless communication. Initially, discussing about Issues of we are Wireless Communication moreover challenges in wireless communication along with their applications. Finally, the topic includes the various literature survey done by us. In Literature survey we are focusing on about issues, challenges and Application of Wireless Communication in detail. At last,We Summarize our Survey and give our views about The Topic.
  • 6. Introduction • Sharing of data by Electromagnetic Waves. • Free from Wires. • Portable. • Easy installation. • Easy Maintenance. • Cheap.
  • 7. LITERATURE REVIEW • Security issues and attacks in Wireless Sensor Network – World Applied Science ,February 2014. • Wireless communication infrastructure in a military environment – IEEE 2004 • Wireless Sensor Network: Security issues, Challenges and Solutions –International Journal Of Information & Computation Technology • Wireless communication in Medical Devices : Research Challenges – IEEE 2018
  • 8. ISSUES Authentication:- The receiver node can easily we found and misused. Network limitation:- In specific network. Signal Jamming Attack:- The connection and signal can easily traced and jammed to attack in your privacy. Tempering :– Accessing or interfering data.
  • 9. CHALLENGES Infrastructure in a Military Environment 1. Multipoint microwave radios for linking line-of-sight enclaves . 2. IEEE 802.11-based wireless LAN for mobile users. 3. Diffused infrared wireless network devices for secure , short range applications 4. VoIP technology for secure and non secure voice Hostile Environment 1. Capture by attackers 2. Challenges for security researchers. Medical Devices: Research 1. Wireless Blood Pressure cuff 2. Wireless oximeter 3. Atextile based fluidic channel for the collection and analysis of sweat 4. AWireless implantable device for measuring blood glucose and calcium levels
  • 10. APPLICATION Military Application:- Detecting & monitoring forces ,equipment and ammunition. Nuclear, biological and chemical attack detection. Environmental Application:- Detection of environmental conditions eg-Forest fire and flood. Health Application:- Tracking and monitoring. Other application:- Iot, Interactive toys.
  • 11. CONCLUSION After this survey we came to acknowledge about different types of wireless devices. The working model of Wireless Communication along with the principle behind it. We also came to know about the issues and challenges faced in wireless networking. As there are many issues and challenges but there are a lot of applications of Wireless Communication.