SlideShare a Scribd company logo
1 of 20
Wi-Fi
                        Technology
                   Eyad R. Manaa
Prepared by :      Mohammed A. Hassona
                   Raed M. Jibreel

Supervised by :

            Prof. Mohammed Alhanjouri

                   The Islamic University of Gaza
                  Computer engineering Department
                                                    1
                            May 19,2010
Outlines
   Introduction
   What is Wi-Fi ?
   Wi-Fi Standards
   Hotspots
   Wi-Fi Network Elements
   How a Wi-Fi Network Works
   Advantages and Limitations of Wi-Fi
   Wi-Fi Security
   Conclusion
   The Future of Wi-Fi
                                          2
Introduction

 Imagine working on your laptop or checking e-mail
from anywhere in your home.

 Imagine being able to connect to your office
network from an airport or coffee shop.

 Now , imagine doing all these
things easily and quickly, without
worrying about finding a wired
network connection.
That is Wi-Fi !
                                                      3
What is Wi-Fi?

   Wi-Fi (Wireless Fidelity) is a generic term that refers to
    the IEEE 802.11 communications standard for
    Wireless Local Area Networks (WLANs).

   Wireless Technology is an alternative to Wired
    Technology, which is commonly used, for connecting
    devices in wireless using radio waves.

   Allows you to access the Internet while on the move ;
    you can remain online while moving from one area to
    another, without a disconnection or loss in coverage.
                                                                 4
IEEE 802.11 standard

   In 1997, the Institute of Electrical and Electronic
    Engineers (IEEE) drafted the 802.11 standard for
    wireless local area networking.

   In 1999, networking hardware companies accepted the
    standard and began manufacturing products using the
    802.11b protocol which operated in the 2.4 GHz range
    and was capable of transmitting at speeds of 11 Mbps.

   The 802.11a protocol was also released in 1999,
    operating at 5 GHz with transmissions speeds of 54
    Mbps, but its cost was high.
                                                        5
IEEE 802.11 standard
(cont.)

           Maximum
Network               Range      Frequency    Power
            Speed                                         Cost
standard              (feet)       (GHz)      drain
            (Mbps)
 802.11b     11      100-150        2.4      Moderate     Low

 802.11a     54       60-100        5          High       High

 802.11g     54      150-250        2.4      Moderate   Moderate

                     Up to 300
 802.11n     200                  2.4 & 5    Moderate   Moderate
                       feet

                                                                   6
Hotspot

    What is a Hotspot ?

   A Hotspot is any location where Wi-Fi
    network access is made publicly available.

   Hotspots are equipped with a Broadband Internet
    connection, and one or more Access Points that
    allow users to access the Internet wirelessly.
   Hotspots can be setup in any public location that
    can support an Internet connection. All the locations
    discussed below are examples of Hotspots.               7
Wi-Fi Hotspot Locations


  Airports
  Hotels & Resorts
  Restaurants
  Coffee Shops
  Bookstores
  Shopping Malls

 There are several online services
  allow you find hotspot locations.   8
Hotspot Revolution




                     9
Elements of a Wi-Fi Network

   Access Point (AP) - The AP is a wireless LAN
    transceiver or “base station” that can connect one or
    many wireless devices in the same time to the Internet.

   Safeguards - Firewalls and anti-virus software protect
    networks from uninvited users and keep information
    secure.

   Wi-Fi cards (Adapters) - They accept the wireless
    signal and relay information. They can be internal and
    external.                                              10
PCI and USB adapters

          For Desktop               For Laptop
PCI adapter      USB adapter     PCMCIA adapter
  (Internal)        (External)




                                                 11
How a Wi-Fi Network Works ?
 A Wi-Fi connection works through a transmitting
  antenna, which is usually connected to a DSL or cable
  Internet connection. The antenna on the router will then
  beam radio signals through a specific range. Another
  antenna, which is on the laptop or personal computer,
  receives the signal.




                                                             12
Advantages of Wi-Fi

   No Wires     - A truly wireless networking solution.

   No Waiting   - Fast, easy deployments.

   No Worries - A wireless networking system that is
    secure, easy to manage, and built to grow with you.

   Ease of Installation - Quick, easy setup.

   Fast data transfer rates                               13
Limitations of Wi-Fi
   Limited range

   Data security risks :a huge challenge for Wi-Fi
    networks.

   Interference from other devices : such as
    telephones, microwave ovens.

   High power consumption :making battery life and
    heat a concern .
                                                      14
Basic Wi-Fi Security Techniques

   WEP(Wired Equivalent Privacy) : The original encryption
    technique specified by the IEEE 802.11 standard.

   WPA(Wi-Fi Protected Access ): A new standard that
    provides improved encryption security over WEP.

   WPA2 : is an improved version of WPA that uses
    Advanced Encryption Standard (AES) technology.


                                                          15
Basic Wi-Fi Security Techniques(cont.)

 Securing   Encryption Type
                              Security Level             Notes
  Method         Used


                                               No longer used; it is can be
  WEP        RC4 encryption        Low
                                                      hacked easily
               algorithm

                                                   provides improved
   WPA       TKIP Protocol        High          encryption security over
                                                          WEP

                                                 An improved version of
  WPA2       CCMP Protocol      Very High       WPA that uses Advanced
                                                  Encryption Standard
                                                                              16
Conclusion
   Wi-Fi is a simple, cost-effective way to connect to the
    Internet, without the need to physically connecting wires.
   In 1997 IEEE drafted the 802.11 standard for wireless
    local area networking.
   Hotspot is a geographic area setup in any public
    location, and has a readily accessible wireless network.
   Security is a huge challenge for Wi-Fi Networks, many
    Security Techniques are used to improve it.
   Wi-Fi Networks have a several limitations that should be
    concerned.

                                                            17
The Future of Wi-Fi
   The future of Wi-Fi is very bright. Its growing in
    popularity because of decreasing costs and the freedom
    it gives to users.
       Hotels offering Wi-Fi




                               35,000

                               30,000

                               25,000

                               20,000

                               15,000

                               10,000

                                5,000

                                   0
                                        2007   2008   2009   2010


                                                                    18
Wi-Fi technology presentation
Wi-Fi technology presentation

More Related Content

What's hot (20)

Li fi technology ppt
Li fi technology pptLi fi technology ppt
Li fi technology ppt
 
Wifi technology
Wifi technologyWifi technology
Wifi technology
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
Three types of wireless technology
Three types of wireless technologyThree types of wireless technology
Three types of wireless technology
 
Wireless network
Wireless networkWireless network
Wireless network
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
5G Presentation
5G Presentation5G Presentation
5G Presentation
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
5G TECHNOLOGY
5G TECHNOLOGY5G TECHNOLOGY
5G TECHNOLOGY
 
Wireless network
Wireless networkWireless network
Wireless network
 
Presentation on wireless technology
Presentation on wireless technologyPresentation on wireless technology
Presentation on wireless technology
 
Gi-Fi ppt
Gi-Fi pptGi-Fi ppt
Gi-Fi ppt
 
4 g wireless technology
4 g wireless technology4 g wireless technology
4 g wireless technology
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Wifi
WifiWifi
Wifi
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 

Viewers also liked

Choosing the Right Access Point Antenna
Choosing the Right Access Point AntennaChoosing the Right Access Point Antenna
Choosing the Right Access Point AntennaMimosa Networks
 
Interference Management with Limited Channel State Information in Wireless Ne...
Interference Management with Limited Channel State Information in Wireless Ne...Interference Management with Limited Channel State Information in Wireless Ne...
Interference Management with Limited Channel State Information in Wireless Ne...Mohamed Seif
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentationmrtheodisthorne2
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingOnline
 
Access cavity preparation
Access cavity preparationAccess cavity preparation
Access cavity preparationAnkita Varshney
 

Viewers also liked (6)

Choosing the Right Access Point Antenna
Choosing the Right Access Point AntennaChoosing the Right Access Point Antenna
Choosing the Right Access Point Antenna
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Interference Management with Limited Channel State Information in Wireless Ne...
Interference Management with Limited Channel State Information in Wireless Ne...Interference Management with Limited Channel State Information in Wireless Ne...
Interference Management with Limited Channel State Information in Wireless Ne...
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentation
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Access cavity preparation
Access cavity preparationAccess cavity preparation
Access cavity preparation
 

Similar to Wi-Fi technology presentation

Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Zameer Abdul Azeez Mulla
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi ArchitectureArnab Ghosal
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technologysai kumar R
 
Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Conceptkodela3
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technologyRavi Rajput
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentationdayansaji
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityGurpreet Singh
 
Report on Future of Telecommunication Technologies
Report on Future of Telecommunication TechnologiesReport on Future of Telecommunication Technologies
Report on Future of Telecommunication TechnologiesYashraj Nigam
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology WriteupShital Kat
 

Similar to Wi-Fi technology presentation (20)

Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02
 
wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi Architecture
 
wireless networks.pptx
wireless networks.pptxwireless networks.pptx
wireless networks.pptx
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
 
Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Concept
 
Wifi (1)
Wifi (1)Wifi (1)
Wifi (1)
 
WIFI TECHNOLOGY
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
 
Wifi tecnology
Wifi tecnology Wifi tecnology
Wifi tecnology
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
 
Wireless Fidelity
Wireless FidelityWireless Fidelity
Wireless Fidelity
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
Wifi Bsnl.
Wifi Bsnl.Wifi Bsnl.
Wifi Bsnl.
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi-Fi technology
Wi-Fi technologyWi-Fi technology
Wi-Fi technology
 
Report on Future of Telecommunication Technologies
Report on Future of Telecommunication TechnologiesReport on Future of Telecommunication Technologies
Report on Future of Telecommunication Technologies
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology Writeup
 

Recently uploaded

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Recently uploaded (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Wi-Fi technology presentation

  • 1. Wi-Fi Technology Eyad R. Manaa Prepared by : Mohammed A. Hassona Raed M. Jibreel Supervised by : Prof. Mohammed Alhanjouri The Islamic University of Gaza Computer engineering Department 1 May 19,2010
  • 2. Outlines  Introduction  What is Wi-Fi ?  Wi-Fi Standards  Hotspots  Wi-Fi Network Elements  How a Wi-Fi Network Works  Advantages and Limitations of Wi-Fi  Wi-Fi Security  Conclusion  The Future of Wi-Fi 2
  • 3. Introduction  Imagine working on your laptop or checking e-mail from anywhere in your home.  Imagine being able to connect to your office network from an airport or coffee shop.  Now , imagine doing all these things easily and quickly, without worrying about finding a wired network connection. That is Wi-Fi ! 3
  • 4. What is Wi-Fi?  Wi-Fi (Wireless Fidelity) is a generic term that refers to the IEEE 802.11 communications standard for Wireless Local Area Networks (WLANs).  Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless using radio waves.  Allows you to access the Internet while on the move ; you can remain online while moving from one area to another, without a disconnection or loss in coverage. 4
  • 5. IEEE 802.11 standard  In 1997, the Institute of Electrical and Electronic Engineers (IEEE) drafted the 802.11 standard for wireless local area networking.  In 1999, networking hardware companies accepted the standard and began manufacturing products using the 802.11b protocol which operated in the 2.4 GHz range and was capable of transmitting at speeds of 11 Mbps.  The 802.11a protocol was also released in 1999, operating at 5 GHz with transmissions speeds of 54 Mbps, but its cost was high. 5
  • 6. IEEE 802.11 standard (cont.) Maximum Network Range Frequency Power Speed Cost standard (feet) (GHz) drain (Mbps) 802.11b 11 100-150 2.4 Moderate Low 802.11a 54 60-100 5 High High 802.11g 54 150-250 2.4 Moderate Moderate Up to 300 802.11n 200 2.4 & 5 Moderate Moderate feet 6
  • 7. Hotspot What is a Hotspot ?  A Hotspot is any location where Wi-Fi network access is made publicly available.  Hotspots are equipped with a Broadband Internet connection, and one or more Access Points that allow users to access the Internet wirelessly.  Hotspots can be setup in any public location that can support an Internet connection. All the locations discussed below are examples of Hotspots. 7
  • 8. Wi-Fi Hotspot Locations Airports Hotels & Resorts Restaurants Coffee Shops Bookstores Shopping Malls  There are several online services allow you find hotspot locations. 8
  • 10. Elements of a Wi-Fi Network  Access Point (AP) - The AP is a wireless LAN transceiver or “base station” that can connect one or many wireless devices in the same time to the Internet.  Safeguards - Firewalls and anti-virus software protect networks from uninvited users and keep information secure.  Wi-Fi cards (Adapters) - They accept the wireless signal and relay information. They can be internal and external. 10
  • 11. PCI and USB adapters For Desktop For Laptop PCI adapter USB adapter PCMCIA adapter (Internal) (External) 11
  • 12. How a Wi-Fi Network Works ?  A Wi-Fi connection works through a transmitting antenna, which is usually connected to a DSL or cable Internet connection. The antenna on the router will then beam radio signals through a specific range. Another antenna, which is on the laptop or personal computer, receives the signal. 12
  • 13. Advantages of Wi-Fi  No Wires - A truly wireless networking solution.  No Waiting - Fast, easy deployments.  No Worries - A wireless networking system that is secure, easy to manage, and built to grow with you.  Ease of Installation - Quick, easy setup.  Fast data transfer rates 13
  • 14. Limitations of Wi-Fi  Limited range  Data security risks :a huge challenge for Wi-Fi networks.  Interference from other devices : such as telephones, microwave ovens.  High power consumption :making battery life and heat a concern . 14
  • 15. Basic Wi-Fi Security Techniques  WEP(Wired Equivalent Privacy) : The original encryption technique specified by the IEEE 802.11 standard.  WPA(Wi-Fi Protected Access ): A new standard that provides improved encryption security over WEP.  WPA2 : is an improved version of WPA that uses Advanced Encryption Standard (AES) technology. 15
  • 16. Basic Wi-Fi Security Techniques(cont.) Securing Encryption Type Security Level Notes Method Used No longer used; it is can be WEP RC4 encryption Low hacked easily algorithm provides improved WPA TKIP Protocol High encryption security over WEP An improved version of WPA2 CCMP Protocol Very High WPA that uses Advanced Encryption Standard 16
  • 17. Conclusion  Wi-Fi is a simple, cost-effective way to connect to the Internet, without the need to physically connecting wires.  In 1997 IEEE drafted the 802.11 standard for wireless local area networking.  Hotspot is a geographic area setup in any public location, and has a readily accessible wireless network.  Security is a huge challenge for Wi-Fi Networks, many Security Techniques are used to improve it.  Wi-Fi Networks have a several limitations that should be concerned. 17
  • 18. The Future of Wi-Fi  The future of Wi-Fi is very bright. Its growing in popularity because of decreasing costs and the freedom it gives to users. Hotels offering Wi-Fi 35,000 30,000 25,000 20,000 15,000 10,000 5,000 0 2007 2008 2009 2010 18