SlideShare a Scribd company logo
1 of 18
Wireless Networking
Presented By:
Saikat Rahman
Md. Islam Khan
Biprojit Saha
Fahad Sarkar Siam
What is Wireless Networking?
With the help of wireless
technology we can transfer data
from one device to another
without using wire or cables.
Using this technology we can
establish network which is more
flexible, intangible and ease to
access.
Wireless Networking Data
Transmission
Generally implemented and administered
using:
Radio Transmission (Mostly)
Light Transmission
Infrared and Millimeter waves
Microwave Transmission
Components Requirements
The important components required for
setting up a wireless network are:
Medium
Access point and Extension point
Wireless bridges and Power line
bridges
Antennas
Wireless adapters
Wireless Station and Server
Software
Md Islam Khan
Types of Wireless Networks
Based on the size Wireless Networks are
divided into four categories .
 Wireless LAN
 Wireless MAN
 Wireless WAN
 Wireless PAN
Wireless LAN
This is a network where two or more
computers are connected that covers only a
limited area.
The NIC ( Network Interface Card)is used in
this connection where has a small range to
cover.
 We often called this peer to peer Network.
Wireless MAN
Collected unit of many WLAN located at
various.
 It uses WIMAX(World wide Interoperability
for Microwave Access) which is controlled by
WiMAX Forum.
 Maximum speed 1Bits/sec.
Wireless WAN
WWAN is a very large network which is spread
over a very large area. It connects many cites
together.
The technology in WWAN are subdivided in
many generations: 2G, 3G, 4G.
 This technology used in most of the Analog
devices.
Wireless PAN
The Wireless Networks that are used in
smaller distance are know as WPAN.
 The communication between a mobile phone
and its Bluetooth headset.
Two kinds of Wireless technologies are used
for WPAN.
 Bluetooth and Infrared Data Association.
Biprojith Saha
Security Options in Wireless
Network
Data can be easily hacked in Wireless network without
using proper security.
Three commonly used security system:
1. Wired Equivalent Privacy(WEP)
2. Wi—Fi Protected Access(WPA)
3. Wi—Fi Protected Access(WPA2)
WEP:
1. Security standard released in 1997.
2. The Encryption Algorithm used in WEP was easily
Breakable by Hackers.
WPA
1. Released in 2003, Invented by Wi—Fi Alliance
2. Required Firmware up gradation instead of changing any
hardware component.
WPA2
1. Released in 2004
2. Advanced security features are available
3. Advanced Encryption Standard
Why we use wireless
Networking?
It is helpful for portable devices such as
Laptops, mobiles, tablets etc.
Establish a network connection is easy.
Introducing a new device in the
Network is easy.
Security system is more featured in
wireless Networks.
Fahad Sarkar Siam
Advantages of wireless
Networking
Access and accessibility improved.
Backwards compatible as standards
improve.
Cost Savings.
Speed of installation.
Disadvantages of wireless
Networking
Conflict of standards.
Security.
Transmission speeds can fluctuate.
Slower then wired.
wireless networking

More Related Content

What's hot (20)

Wi fi
Wi fiWi fi
Wi fi
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib Zeeshan
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
 
Wi fi
Wi fiWi fi
Wi fi
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wi-Fi Tecnology
Wi-Fi TecnologyWi-Fi Tecnology
Wi-Fi Tecnology
 
Wifi slide by G.K.Sourav
Wifi slide by G.K.SouravWifi slide by G.K.Sourav
Wifi slide by G.K.Sourav
 
Wireless intelligent network
Wireless intelligent networkWireless intelligent network
Wireless intelligent network
 
Wi-Fi (MIS)
Wi-Fi   (MIS)Wi-Fi   (MIS)
Wi-Fi (MIS)
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Wi-fi tecnology
Wi-fi tecnologyWi-fi tecnology
Wi-fi tecnology
 
WIFI[autosaved]
WIFI[autosaved]WIFI[autosaved]
WIFI[autosaved]
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wi-Fi technology
Wi-Fi technologyWi-Fi technology
Wi-Fi technology
 
pp mobile computing
pp mobile computingpp mobile computing
pp mobile computing
 

Similar to wireless networking

wireless networking and Library
 wireless networking and Library wireless networking and Library
wireless networking and Librarysanjay thakur
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingRzvinay
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Wireless Netwok.pptx
Wireless Netwok.pptxWireless Netwok.pptx
Wireless Netwok.pptxSajibMandal2
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesYogesh Kumar
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networksSweta Kumari Barnwal
 
Wireless technology
Wireless technologyWireless technology
Wireless technologyNaveena D
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.pptabenimelos
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Saravana Kumar
 
Network Trends
Network TrendsNetwork Trends
Network TrendsArun ACE
 
Wireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptxWireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptxJosephCristian8
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-FiBhushan Jadhav
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISIJNSA Journal
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
ROUTING ASSOCIATE PRESENTATION-very good.pptx
ROUTING ASSOCIATE PRESENTATION-very good.pptxROUTING ASSOCIATE PRESENTATION-very good.pptx
ROUTING ASSOCIATE PRESENTATION-very good.pptxAbhradipChatterjee2
 
8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).pptSAMBIT34
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityGurpreet Singh
 

Similar to wireless networking (20)

wireless networking and Library
 wireless networking and Library wireless networking and Library
wireless networking and Library
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Wireless Netwok.pptx
Wireless Netwok.pptxWireless Netwok.pptx
Wireless Netwok.pptx
 
WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Network Trends
Network TrendsNetwork Trends
Network Trends
 
Wireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptxWireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptx
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
 
Wireless Multimedia
Wireless Multimedia Wireless Multimedia
Wireless Multimedia
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
ROUTING ASSOCIATE PRESENTATION-very good.pptx
ROUTING ASSOCIATE PRESENTATION-very good.pptxROUTING ASSOCIATE PRESENTATION-very good.pptx
ROUTING ASSOCIATE PRESENTATION-very good.pptx
 
8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).ppt
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 

More from Estiak Khan

Steps in simulation study
Steps in simulation studySteps in simulation study
Steps in simulation studyEstiak Khan
 
Smart bajarlist wireless
Smart bajarlist wirelessSmart bajarlist wireless
Smart bajarlist wirelessEstiak Khan
 
Scrum agile-process
Scrum agile-processScrum agile-process
Scrum agile-processEstiak Khan
 
Graphical user-interface
Graphical user-interfaceGraphical user-interface
Graphical user-interfaceEstiak Khan
 
Graphical User Interface (GUI)
Graphical User Interface (GUI)Graphical User Interface (GUI)
Graphical User Interface (GUI)Estiak Khan
 
Graphical user-interface (GUI)
Graphical user-interface (GUI)Graphical user-interface (GUI)
Graphical user-interface (GUI)Estiak Khan
 
Future operating system
Future operating systemFuture operating system
Future operating systemEstiak Khan
 
Android operating system
Android operating systemAndroid operating system
Android operating systemEstiak Khan
 
Disadvantages of cloud computing
Disadvantages of cloud computingDisadvantages of cloud computing
Disadvantages of cloud computingEstiak Khan
 
Determinants of supply
Determinants of supplyDeterminants of supply
Determinants of supplyEstiak Khan
 
Distributed systems-analysis-and-design
Distributed systems-analysis-and-designDistributed systems-analysis-and-design
Distributed systems-analysis-and-designEstiak Khan
 
Online Banking System
Online Banking SystemOnline Banking System
Online Banking SystemEstiak Khan
 

More from Estiak Khan (20)

Decision tree
Decision treeDecision tree
Decision tree
 
Steps in simulation study
Steps in simulation studySteps in simulation study
Steps in simulation study
 
Smart bajarlist wireless
Smart bajarlist wirelessSmart bajarlist wireless
Smart bajarlist wireless
 
Spiral model
Spiral modelSpiral model
Spiral model
 
Scrum agile-process
Scrum agile-processScrum agile-process
Scrum agile-process
 
Waterfall model
Waterfall modelWaterfall model
Waterfall model
 
V model
V modelV model
V model
 
Use case-slide
Use case-slideUse case-slide
Use case-slide
 
Graphical user-interface
Graphical user-interfaceGraphical user-interface
Graphical user-interface
 
Graphical User Interface (GUI)
Graphical User Interface (GUI)Graphical User Interface (GUI)
Graphical User Interface (GUI)
 
Graphical user-interface (GUI)
Graphical user-interface (GUI)Graphical user-interface (GUI)
Graphical user-interface (GUI)
 
Future operating system
Future operating systemFuture operating system
Future operating system
 
Android operating system
Android operating systemAndroid operating system
Android operating system
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Disadvantages of cloud computing
Disadvantages of cloud computingDisadvantages of cloud computing
Disadvantages of cloud computing
 
Determinants of supply
Determinants of supplyDeterminants of supply
Determinants of supply
 
Law of supply
Law of supplyLaw of supply
Law of supply
 
Distributed systems-analysis-and-design
Distributed systems-analysis-and-designDistributed systems-analysis-and-design
Distributed systems-analysis-and-design
 
Online Banking System
Online Banking SystemOnline Banking System
Online Banking System
 
Happy life
Happy lifeHappy life
Happy life
 

Recently uploaded

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

wireless networking

  • 1. Wireless Networking Presented By: Saikat Rahman Md. Islam Khan Biprojit Saha Fahad Sarkar Siam
  • 2. What is Wireless Networking? With the help of wireless technology we can transfer data from one device to another without using wire or cables. Using this technology we can establish network which is more flexible, intangible and ease to access.
  • 3. Wireless Networking Data Transmission Generally implemented and administered using: Radio Transmission (Mostly) Light Transmission Infrared and Millimeter waves Microwave Transmission
  • 4. Components Requirements The important components required for setting up a wireless network are: Medium Access point and Extension point Wireless bridges and Power line bridges Antennas Wireless adapters Wireless Station and Server Software
  • 6. Types of Wireless Networks Based on the size Wireless Networks are divided into four categories .  Wireless LAN  Wireless MAN  Wireless WAN  Wireless PAN
  • 7. Wireless LAN This is a network where two or more computers are connected that covers only a limited area. The NIC ( Network Interface Card)is used in this connection where has a small range to cover.  We often called this peer to peer Network.
  • 8. Wireless MAN Collected unit of many WLAN located at various.  It uses WIMAX(World wide Interoperability for Microwave Access) which is controlled by WiMAX Forum.  Maximum speed 1Bits/sec.
  • 9. Wireless WAN WWAN is a very large network which is spread over a very large area. It connects many cites together. The technology in WWAN are subdivided in many generations: 2G, 3G, 4G.  This technology used in most of the Analog devices.
  • 10. Wireless PAN The Wireless Networks that are used in smaller distance are know as WPAN.  The communication between a mobile phone and its Bluetooth headset. Two kinds of Wireless technologies are used for WPAN.  Bluetooth and Infrared Data Association.
  • 12. Security Options in Wireless Network Data can be easily hacked in Wireless network without using proper security. Three commonly used security system: 1. Wired Equivalent Privacy(WEP) 2. Wi—Fi Protected Access(WPA) 3. Wi—Fi Protected Access(WPA2)
  • 13. WEP: 1. Security standard released in 1997. 2. The Encryption Algorithm used in WEP was easily Breakable by Hackers. WPA 1. Released in 2003, Invented by Wi—Fi Alliance 2. Required Firmware up gradation instead of changing any hardware component. WPA2 1. Released in 2004 2. Advanced security features are available 3. Advanced Encryption Standard
  • 14. Why we use wireless Networking? It is helpful for portable devices such as Laptops, mobiles, tablets etc. Establish a network connection is easy. Introducing a new device in the Network is easy. Security system is more featured in wireless Networks.
  • 16. Advantages of wireless Networking Access and accessibility improved. Backwards compatible as standards improve. Cost Savings. Speed of installation.
  • 17. Disadvantages of wireless Networking Conflict of standards. Security. Transmission speeds can fluctuate. Slower then wired.