SlideShare a Scribd company logo
1 of 28
Wi – Fi ( 802.11)
Why we go for Wi - Fi
 Data Transfer rate is about 250-600 Mbps
 Coverage Distance is about 100m.
 Here More number of devices can be connected
( Depending upon the Router ) whereas in
Bluetooth only 7 devices are supported for
transmission
Definition of Wi - Fi
 It is a Wireless Technology that uses “ Radio
Waves” to provide high speed Internet Access.
 It has no physical cables like Coaxial, UTP, STP
etc.
Built In Wireless Transmitter
 The Pc’s and Laptops which are available
today all have Built In Wireless Transmitter.
(i.e. It is very easy to connect to a Wi – Fi ).
 If the Pc’s and Laptops does not have a Built
In Wireless Transmitter, the Wi-Fi can be
accessed by using Wi- Fi Dongle which should
be connected in any USB ports.
d
Hotspot
The area or location where a Wi – Fi access is
available is called a Hotspot.
SSID
 An SSID is the name of a wireless local area
network (WLAN).
 All wireless devices on a WLAN must employ
the same SSID in order to communicate with
each other.
 SSID is a 32 alphanumeric character unique
identifier.
Types of 802.11
a) 802.11 a -> It can support upto a data rate of
54 Mbps.
b) 802.11 b -> It is the low speed version of Wi-
Fi. It supports upto a speed of 11 Mbps.
Types of 802.11
c) 802.11 n -> It can support upto a data rate of
110 Mbps. It is a Backward Compatible and
Forward Compatible one.
Backward Compatible is defined as suppose if
the Wi – Fi Dongle is designed for Windows 8
OS, the same Dongle must also supports
Windows 7, Windows XP, Linux, Fedora OS.
Types of 802.11
d) 802.11 AC
-> It was introduced in the year 2013.
-> It can support upto a data rate of 450
Mbps.
-> It is also a Backward Compatible one.
Access Point
 It is a device that allows Wireless devices to
connect to wired network.
 It is also called as a Base Station because it
transmit and receive signal from it.
 It also provides Security Mechanisms so that
only Authenticated users can able to access
the Network.
Access Point
-> The data rate of Access Point depends upon
the number of users using the network (i.e.
Data rate is shared amongst all the users)
( Ex) If the data rate speed of Access Point is 10
Mbps, suppose if there are 5 users are there
each will get 2 Mbps data rate.
Access Point
-> A single Access Point can support upto a
maximum of 20-25 users ( or) clients at a time.
-> If the number of users are increasing the data
rate is going to be greatly reduced.
Hidden Station Problem
Explanation
 B is called the Access Point ( otherwise called a
Base Station).
A, C and D are within the range of Access Point.
 Suppose if A wants to access the channel and at
the same time C wants to access the same
channel, A doesn’t knows C and C doesn’t knows
A.
B can provide channel to any one either A or C.
How to resolve the Hidden Station
Problem
RTS, CTS and NAV
 RTS -> Request to Send ( I capture the
channel)
 CTS -> Clear to Send ( I don’t hear any other
requests you can use my channel).
 NAV -> Negative Allocation Vector ( Keeps
other Station Quiet).
Exposed Station Problem
Exposed Station Problem
Architecture of Wi-Fi
Architecture of Wi - Fi
 Each computer, mobile, portable or fixed, is
referred to as a station in 802.11
 When two or more stations come together to
communicate with each other, they form a
Basic Service Set (BSS).
Architecture of Wi - Fi
 A BSS that stands alone and is not connected
to a base station ( or ) Access Point is called
an Independent Basic Service Set (IBSS).
 Two or more BSS's are interconnected using a
Distribution System or DS. Entry to the DS is
accomplished with the use of Access Points
(AP).
Architecture of Wi - Fi
 A Portal is the logical integration between
wired LANs and 802.11.
 All data going to an 802.11 LAN from an 802.X
LAN must pass through a portal.
Security Measures in Wi - Fi
1) Media Access Control Address Filtering
 It never asks any password to authendicate to
wi – fi access, instead all the Machine Address
are registered first, so that only registered
users can access the network others not.
Security Measures in Wi - Fi
2) Wired Equivalent Privacy ( WEP)
The goal of WEP is to make Wireless network a
more secure one.
Types of WEP
a) OFF -> No security Mechanisms is provided
here. (i.e.) Everyone can access the Wi-Fi
network without any Authentication
mechanism.
Security Measures in Wi - Fi
b) 128 Bit
 Client sends an Authentication request to
Access Point (i.e. Username and Password )
If the Client request matches it sends a
positive reply to your device to you to access
to the network.
Pros of Wi - Fi
 The Internet access can be accessed
anywhere where the wi fi signalexists.
 Low cost when compared to wired network.
 Wi – Fi is compatible with all OS.
 Simple Setup.
Cons of Wi - Fi
 Security is the greatest disadvantage in
Wireless network.
 Scalability is the main problem ( i.e.) The
number of users are limited here to use the
Wi- Fi.
 Coverage distance of an Access Point is very
low here.

More Related Content

What's hot

WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.pptUmme habiba
 
summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer Dheeraj Giri
 
High level architecture of isp .55
High level architecture of isp .55High level architecture of isp .55
High level architecture of isp .55myrajendra
 
Ip, subnet, gateway and routers
Ip, subnet, gateway and routersIp, subnet, gateway and routers
Ip, subnet, gateway and routersAdrian Suarez
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...Tarun Khaneja
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Alan Mark
 
Ethernet networks and media converter
Ethernet networks and media converterEthernet networks and media converter
Ethernet networks and media converterRichTull
 
Wireless router
Wireless routerWireless router
Wireless routerroza921
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksPradeep Kumar TS
 

What's hot (19)

IEEE 80211 ah
IEEE 80211 ahIEEE 80211 ah
IEEE 80211 ah
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.ppt
 
summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer
 
High level architecture of isp .55
High level architecture of isp .55High level architecture of isp .55
High level architecture of isp .55
 
Wi-Fi Module
Wi-Fi ModuleWi-Fi Module
Wi-Fi Module
 
Ip, subnet, gateway and routers
Ip, subnet, gateway and routersIp, subnet, gateway and routers
Ip, subnet, gateway and routers
 
Wimax
WimaxWimax
Wimax
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 
ip versions.pdf
ip versions.pdfip versions.pdf
ip versions.pdf
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Ethernet networks and media converter
Ethernet networks and media converterEthernet networks and media converter
Ethernet networks and media converter
 
Ieee 802 standard
Ieee 802 standardIeee 802 standard
Ieee 802 standard
 
Bse 3106 wifi
Bse 3106 wifiBse 3106 wifi
Bse 3106 wifi
 
Wireless router
Wireless routerWireless router
Wireless router
 
Network layers
Network layersNetwork layers
Network layers
 
Wi fi / Wireless Fidelity
Wi fi / Wireless FidelityWi fi / Wireless Fidelity
Wi fi / Wireless Fidelity
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
 

Similar to Wi – fi ( 802.11)

Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comphanleson
 
wirelessnetworks-ppt-140909071911-phpapp02.pdf
wirelessnetworks-ppt-140909071911-phpapp02.pdfwirelessnetworks-ppt-140909071911-phpapp02.pdf
wirelessnetworks-ppt-140909071911-phpapp02.pdfkouyepwanko
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologyAkhil Kumar
 
Wi fi technology ppt mine
Wi fi technology ppt mineWi fi technology ppt mine
Wi fi technology ppt mineRoshni Ayappan
 
Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Praveen Reddy
 
wifi-technology
 wifi-technology wifi-technology
wifi-technologytardeep
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Hem Pokhrel
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxalanfhall8953
 
Wi-Fi Technology Presentation
Wi-Fi Technology PresentationWi-Fi Technology Presentation
Wi-Fi Technology PresentationSIDJD
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEric Vanderburg
 

Similar to Wi – fi ( 802.11) (20)

Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
 
wirelessnetworks-ppt-140909071911-phpapp02.pdf
wirelessnetworks-ppt-140909071911-phpapp02.pdfwirelessnetworks-ppt-140909071911-phpapp02.pdf
wirelessnetworks-ppt-140909071911-phpapp02.pdf
 
Wireless Fidelity
Wireless FidelityWireless Fidelity
Wireless Fidelity
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
wifi technology
wifi technologywifi technology
wifi technology
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wi fi technology ppt mine
Wi fi technology ppt mineWi fi technology ppt mine
Wi fi technology ppt mine
 
Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
wireless networks.pptx
wireless networks.pptxwireless networks.pptx
wireless networks.pptx
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wi-Fi Technology Presentation
Wi-Fi Technology PresentationWi-Fi Technology Presentation
Wi-Fi Technology Presentation
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 

More from KABILESH RAMAR

More from KABILESH RAMAR (20)

Online i os
Online i osOnline i os
Online i os
 
Linux and windows
Linux and windowsLinux and windows
Linux and windows
 
Android os versions and architecture
Android os versions and architectureAndroid os versions and architecture
Android os versions and architecture
 
Turtle Graphics in CG
Turtle Graphics in CGTurtle Graphics in CG
Turtle Graphics in CG
 
Ray Tracing in Computer Graphics
Ray Tracing in Computer GraphicsRay Tracing in Computer Graphics
Ray Tracing in Computer Graphics
 
Email security
Email securityEmail security
Email security
 
Visible surface detection methods
Visible surface detection methodsVisible surface detection methods
Visible surface detection methods
 
Raster scan and random scan
Raster scan and random scanRaster scan and random scan
Raster scan and random scan
 
Properties of light
Properties of lightProperties of light
Properties of light
 
Polygon mesh
Polygon meshPolygon mesh
Polygon mesh
 
Liquid crystal display
Liquid crystal displayLiquid crystal display
Liquid crystal display
 
Ink jet printer
Ink jet printerInk jet printer
Ink jet printer
 
Illumination models
Illumination modelsIllumination models
Illumination models
 
Dot matrix printers
Dot matrix printersDot matrix printers
Dot matrix printers
 
Cathode ray tubes
Cathode ray tubesCathode ray tubes
Cathode ray tubes
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
RFID
RFIDRFID
RFID
 
Digital libraries
Digital librariesDigital libraries
Digital libraries
 
Covert networks
Covert networksCovert networks
Covert networks
 
Ethernet
EthernetEthernet
Ethernet
 

Recently uploaded

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 

Recently uploaded (20)

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 

Wi – fi ( 802.11)

  • 1. Wi – Fi ( 802.11)
  • 2. Why we go for Wi - Fi  Data Transfer rate is about 250-600 Mbps  Coverage Distance is about 100m.  Here More number of devices can be connected ( Depending upon the Router ) whereas in Bluetooth only 7 devices are supported for transmission
  • 3. Definition of Wi - Fi  It is a Wireless Technology that uses “ Radio Waves” to provide high speed Internet Access.  It has no physical cables like Coaxial, UTP, STP etc.
  • 4. Built In Wireless Transmitter  The Pc’s and Laptops which are available today all have Built In Wireless Transmitter. (i.e. It is very easy to connect to a Wi – Fi ).  If the Pc’s and Laptops does not have a Built In Wireless Transmitter, the Wi-Fi can be accessed by using Wi- Fi Dongle which should be connected in any USB ports.
  • 5. d
  • 6. Hotspot The area or location where a Wi – Fi access is available is called a Hotspot.
  • 7. SSID  An SSID is the name of a wireless local area network (WLAN).  All wireless devices on a WLAN must employ the same SSID in order to communicate with each other.  SSID is a 32 alphanumeric character unique identifier.
  • 8. Types of 802.11 a) 802.11 a -> It can support upto a data rate of 54 Mbps. b) 802.11 b -> It is the low speed version of Wi- Fi. It supports upto a speed of 11 Mbps.
  • 9. Types of 802.11 c) 802.11 n -> It can support upto a data rate of 110 Mbps. It is a Backward Compatible and Forward Compatible one. Backward Compatible is defined as suppose if the Wi – Fi Dongle is designed for Windows 8 OS, the same Dongle must also supports Windows 7, Windows XP, Linux, Fedora OS.
  • 10. Types of 802.11 d) 802.11 AC -> It was introduced in the year 2013. -> It can support upto a data rate of 450 Mbps. -> It is also a Backward Compatible one.
  • 11. Access Point  It is a device that allows Wireless devices to connect to wired network.  It is also called as a Base Station because it transmit and receive signal from it.  It also provides Security Mechanisms so that only Authenticated users can able to access the Network.
  • 12. Access Point -> The data rate of Access Point depends upon the number of users using the network (i.e. Data rate is shared amongst all the users) ( Ex) If the data rate speed of Access Point is 10 Mbps, suppose if there are 5 users are there each will get 2 Mbps data rate.
  • 13. Access Point -> A single Access Point can support upto a maximum of 20-25 users ( or) clients at a time. -> If the number of users are increasing the data rate is going to be greatly reduced.
  • 15. Explanation  B is called the Access Point ( otherwise called a Base Station). A, C and D are within the range of Access Point.  Suppose if A wants to access the channel and at the same time C wants to access the same channel, A doesn’t knows C and C doesn’t knows A. B can provide channel to any one either A or C.
  • 16. How to resolve the Hidden Station Problem
  • 17. RTS, CTS and NAV  RTS -> Request to Send ( I capture the channel)  CTS -> Clear to Send ( I don’t hear any other requests you can use my channel).  NAV -> Negative Allocation Vector ( Keeps other Station Quiet).
  • 21. Architecture of Wi - Fi  Each computer, mobile, portable or fixed, is referred to as a station in 802.11  When two or more stations come together to communicate with each other, they form a Basic Service Set (BSS).
  • 22. Architecture of Wi - Fi  A BSS that stands alone and is not connected to a base station ( or ) Access Point is called an Independent Basic Service Set (IBSS).  Two or more BSS's are interconnected using a Distribution System or DS. Entry to the DS is accomplished with the use of Access Points (AP).
  • 23. Architecture of Wi - Fi  A Portal is the logical integration between wired LANs and 802.11.  All data going to an 802.11 LAN from an 802.X LAN must pass through a portal.
  • 24. Security Measures in Wi - Fi 1) Media Access Control Address Filtering  It never asks any password to authendicate to wi – fi access, instead all the Machine Address are registered first, so that only registered users can access the network others not.
  • 25. Security Measures in Wi - Fi 2) Wired Equivalent Privacy ( WEP) The goal of WEP is to make Wireless network a more secure one. Types of WEP a) OFF -> No security Mechanisms is provided here. (i.e.) Everyone can access the Wi-Fi network without any Authentication mechanism.
  • 26. Security Measures in Wi - Fi b) 128 Bit  Client sends an Authentication request to Access Point (i.e. Username and Password ) If the Client request matches it sends a positive reply to your device to you to access to the network.
  • 27. Pros of Wi - Fi  The Internet access can be accessed anywhere where the wi fi signalexists.  Low cost when compared to wired network.  Wi – Fi is compatible with all OS.  Simple Setup.
  • 28. Cons of Wi - Fi  Security is the greatest disadvantage in Wireless network.  Scalability is the main problem ( i.e.) The number of users are limited here to use the Wi- Fi.  Coverage distance of an Access Point is very low here.