SlideShare a Scribd company logo
1 of 8
Download to read offline
Wireless
Adapters
Michael Emory
February 28, 2021
NAME OR LOGO 2
What Are Wireless
Adapters and How
Do They Work?
Wireless adapters are electronic devices
that allow computers to connect to the
Internet and to other computers without
using wires.
They work by sending data through radio
waves to routers which pass the data on to
broadband modems or internal networks.
NAME OR LOGO 3
What Types Of Adapters Are
There?
The most common type of adapter is the kind that is
already built into the device. However, a lot of older
computers and devices without a built-in wireless
adapter must rely on wireless cards in order to access
a wireless connection.
For a desktop computer, there are two types of
adapters; one that plugs into a PCI slot inside the
computer case and one that plugs into a USB port
from the outside.
For laptops without built-in wireless connectivity,
there are wireless adapting cards to fit into either the
PCMCIA slot or the PCI slot.
For tablets and notebooks, there are cards that can
be inserted into the memory card slot.
NAME OR LOGO
What Are Wireless
Standards?
Wireless standards are the standards which
determine the speed of data transfer at
which wireless adapters broadcast.
Radio waves used by wireless adapters
must satisfy one of the 802.11 broadcast
standards of the IEEE.
4
NAME OR LOGO 5
How Fast Are Wireless
Adapters?
With the oldest wireless standard, IEEE 802.11b,
broadcast speeds are specified to be up to 11 Mbps.
The later model wireless adapters, which broadcast at
IEEE 802.11g, can reach speeds that can reach up to
54 Mbps.
With the IEEE 802.11n standard, wireless adapters
can theoretically reach speeds of up to 300 Mbps,
however, since the radio frequencies are crowded and
there is interference, the adapters using this standard
are generally slower.
With the IEEE 802.11ac standard, wireless adapters
will be able to theoretically achieve speeds of up to 1
Gbps because this standard will be able to operate in
the 5GHz frequency band.
NAME OR LOGO
How Do Wireless
Adapters Keep Your
Information Secure?
Since wireless adapters broadcast signals
from devices with a range of around 200
feet, anyone with a wireless adapter could
potentially pick up one's signals and access
their files.
To prevent this, wireless adapters use
encryption protocols to keep their signals
secure. These protocols are WEP, WPA,
and WPA2 and they offer password-
protected and encrypted transmissions for
wireless networks.
6
References
Markgraf, B. (2017, November 21). How does a wireless adapter work?
Retrieved March 01, 2021, from
https://smallbusiness.chron.com/wireless-adapter-work-
61042.html
Thank
You
Michael Emory
+1 864 123 4567
mtemory@uscupstate.edu
http://www.awebsite.com/

More Related Content

What's hot (20)

Wi fi
Wi fiWi fi
Wi fi
 
Zig Bee
Zig BeeZig Bee
Zig Bee
 
Wireless
WirelessWireless
Wireless
 
WIFI[autosaved]
WIFI[autosaved]WIFI[autosaved]
WIFI[autosaved]
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Bse 3106 wifi
Bse 3106 wifiBse 3106 wifi
Bse 3106 wifi
 
Introduction Wireless Technology
Introduction Wireless TechnologyIntroduction Wireless Technology
Introduction Wireless Technology
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
Zigbee - Building Smart Homes
Zigbee - Building Smart HomesZigbee - Building Smart Homes
Zigbee - Building Smart Homes
 
Tech sem on zig 1
Tech sem on zig 1Tech sem on zig 1
Tech sem on zig 1
 
Zigbee technology ppt
Zigbee technology pptZigbee technology ppt
Zigbee technology ppt
 
Wireless fidelity (a.k.a Wi-Fi)
Wireless fidelity (a.k.a Wi-Fi)Wireless fidelity (a.k.a Wi-Fi)
Wireless fidelity (a.k.a Wi-Fi)
 
Wi-Fi / Sumiet23
Wi-Fi / Sumiet23Wi-Fi / Sumiet23
Wi-Fi / Sumiet23
 
wireless networking
wireless networkingwireless networking
wireless networking
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Li-Fi vs. Wi-Fi
Li-Fi vs. Wi-FiLi-Fi vs. Wi-Fi
Li-Fi vs. Wi-Fi
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Communication hardware
Communication hardwareCommunication hardware
Communication hardware
 

Similar to Wireless Adapters

Wireless home networks (11)
Wireless home networks (11)Wireless home networks (11)
Wireless home networks (11)ayshariasat
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxalanfhall8953
 
Wireless technology BY ARUN
Wireless technology BY ARUNWireless technology BY ARUN
Wireless technology BY ARUNArun Franco
 
Site survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiSite survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiAgreeta Sharma
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Wail Hassan
 
wirless lan 802.11
wirless lan 802.11wirless lan 802.11
wirless lan 802.11mankuuu
 
Wireless network security
Wireless network security Wireless network security
Wireless network security Aurobindo Nayak
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and StandardsRubal Sagwal
 
Ieee institute of electrical and electronics engineers
Ieee  institute of electrical and electronics engineersIeee  institute of electrical and electronics engineers
Ieee institute of electrical and electronics engineershimanshu yadav
 
Wireless computing
Wireless computingWireless computing
Wireless computingMukul Kumar
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptdxmuthu
 
Wireless network Project Class 12
Wireless network Project Class 12Wireless network Project Class 12
Wireless network Project Class 12Rishabh-Rawat
 

Similar to Wireless Adapters (20)

WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
Wireless home networks (11)
Wireless home networks (11)Wireless home networks (11)
Wireless home networks (11)
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
 
Wireless technology BY ARUN
Wireless technology BY ARUNWireless technology BY ARUN
Wireless technology BY ARUN
 
Wifi
WifiWifi
Wifi
 
Wireless Router: This is how it Benefits
Wireless Router: This is how it BenefitsWireless Router: This is how it Benefits
Wireless Router: This is how it Benefits
 
Site survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiSite survey- Deployement of Wi Fi
Site survey- Deployement of Wi Fi
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
 
wirless lan 802.11
wirless lan 802.11wirless lan 802.11
wirless lan 802.11
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
Lan
LanLan
Lan
 
Ieee institute of electrical and electronics engineers
Ieee  institute of electrical and electronics engineersIeee  institute of electrical and electronics engineers
Ieee institute of electrical and electronics engineers
 
Wireless computing
Wireless computingWireless computing
Wireless computing
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless network Project Class 12
Wireless network Project Class 12Wireless network Project Class 12
Wireless network Project Class 12
 
Characteristics of the 6 wireless protocols
Characteristics of the 6 wireless protocolsCharacteristics of the 6 wireless protocols
Characteristics of the 6 wireless protocols
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Wireless Adapters

  • 2. NAME OR LOGO 2 What Are Wireless Adapters and How Do They Work? Wireless adapters are electronic devices that allow computers to connect to the Internet and to other computers without using wires. They work by sending data through radio waves to routers which pass the data on to broadband modems or internal networks.
  • 3. NAME OR LOGO 3 What Types Of Adapters Are There? The most common type of adapter is the kind that is already built into the device. However, a lot of older computers and devices without a built-in wireless adapter must rely on wireless cards in order to access a wireless connection. For a desktop computer, there are two types of adapters; one that plugs into a PCI slot inside the computer case and one that plugs into a USB port from the outside. For laptops without built-in wireless connectivity, there are wireless adapting cards to fit into either the PCMCIA slot or the PCI slot. For tablets and notebooks, there are cards that can be inserted into the memory card slot.
  • 4. NAME OR LOGO What Are Wireless Standards? Wireless standards are the standards which determine the speed of data transfer at which wireless adapters broadcast. Radio waves used by wireless adapters must satisfy one of the 802.11 broadcast standards of the IEEE. 4
  • 5. NAME OR LOGO 5 How Fast Are Wireless Adapters? With the oldest wireless standard, IEEE 802.11b, broadcast speeds are specified to be up to 11 Mbps. The later model wireless adapters, which broadcast at IEEE 802.11g, can reach speeds that can reach up to 54 Mbps. With the IEEE 802.11n standard, wireless adapters can theoretically reach speeds of up to 300 Mbps, however, since the radio frequencies are crowded and there is interference, the adapters using this standard are generally slower. With the IEEE 802.11ac standard, wireless adapters will be able to theoretically achieve speeds of up to 1 Gbps because this standard will be able to operate in the 5GHz frequency band.
  • 6. NAME OR LOGO How Do Wireless Adapters Keep Your Information Secure? Since wireless adapters broadcast signals from devices with a range of around 200 feet, anyone with a wireless adapter could potentially pick up one's signals and access their files. To prevent this, wireless adapters use encryption protocols to keep their signals secure. These protocols are WEP, WPA, and WPA2 and they offer password- protected and encrypted transmissions for wireless networks. 6
  • 7. References Markgraf, B. (2017, November 21). How does a wireless adapter work? Retrieved March 01, 2021, from https://smallbusiness.chron.com/wireless-adapter-work- 61042.html
  • 8. Thank You Michael Emory +1 864 123 4567 mtemory@uscupstate.edu http://www.awebsite.com/