SlideShare a Scribd company logo
1 of 24
By VINAY KUMAR
Roll No.- 180324
Mob.- 8395959587
V
What is Wireless Networking? V
 RANGE: 30 kHz to 300 GHz
 This signals is fall under the category of EM waves.
 This signals is invisible and use to send messages
from one device to another
 Uses: FM Radio station use RF signals to broadcast
signals. The frequency is used as the station
name(like 93.5 RED FM)
V
V
 Network Interface Card(NIC) used for wireless
network
 NIC use antenna unlike the RJ45 cable.
 Access Point for Generating signal and establish
connection between devices.
 Devices which has wireless signal adapter.
V
 Based on the size Wireless Networks are divided
into four categories
 Wireless LAN
 Wireless MAN
 Wireless WAN
 Wireless PAN
V
 This is a network where two or more computers
are connected that covers only a limited area.
 The NIC is used in this connection where has a
small range to cover.
 We often called this peer to peer Network.
 This is also called Ad Hoc Network which is being
set up for temporary purposes.
V
 Unlike switch in a wired Network, A specil device is
used in WLAN, which is called Access Point.
 WLAN which uses Access Point are called BSS(Basic
Service Set)
 This acts as a coordinator between different
devices.
V
V
 Wireless Fidelity.
 RF signal Frequency: 2.4 GHz or 5 GHz
 Range: About 100 meters.
 Wi-Fi products are certified and tested by Wi-Fi
alliance. We can see their trademarks in most of
the Wi-Fi devices.
V
WMAN(Wireless Metropolitan area Network)
 Collected unit of many WLAN located at various.
 It uses WIMAX(Worldwide Interoperability for
Microwave Access) which is controlled by WiMAX
Forum
 Maximum speed 1Bits/sec
 IEEE 802.16
V
 WWAN is a very large network which is spread over
a very large area. It connects many cites together.
Mobile Phones use WWAN to make communication
possible
 The technology in WWAN are subdivided in many
generations
 2G, 3G, 4G.
 The communication system which was used before
the emergence of 2G is called 1G used in 1980
 This technology used in most of the Analog
devices.
V
 Examples of 2nd generation technologies are
 GPRS(General Packet Radio Service)
 EDRS(Enhanced Data rates for GSM Evolution)
V
 Example of 3rd generation technologies are:
 CDMA(Code Division Multiple Access)
 UMTS(Universal Mobile Telecommunication
System)
 HSPA(High Speed Packet Access)
 HSPA+(Evolved High Speed Packet Access)
V
 High Speed Network accessibility can be
achieved in this technology. The examples of
4th generation technologies are:
 LTE(Long Term Evolution)
 VOLTE(Voice Over term Evolution)
V
V
 The Wireless Networks that are used in
smaller distance are know as WPAN.
 The communication between a mobile phone
and its Bluetooth headset is a typical example
of WPAN
 Two kinds of Wireless technologies are used
for WPAN
 Bluetooth and Infrared Data Association.
V
 It is used to connect devices in personal area
without using cables
 Use ISM band 2.4 GHz
 Speed up to 721 Kbps
 Range 10 to 100 meters
V
 Data can be easily hacked in Wireless
network without using proper security. The
RF signal can be intercepted by Antenna.
 Three commonly used security system:
1. Wired Equivalent Privacy(WEP)
2. Wi-Fi Protected Access(WPA)
3. Wi-Fi Protected Access(WPA2)
V
 Security standard released in 1997.
 The Encryption Algorithm used in WEP was
easily Breakable by Hackers.
 Encryption refers to the technique of
converting data in such a way that it’s
understood only by the Sender and Receiver.
V
 Released in 2003
 Invented by Wi-Fi Alliance
 Required Firmware up gradation instead of
changing any hardware component.
 Better Security than WEP.
V
 Released in 2004
 Advanced security features are available
 Advanced Encryption Standard
 Algorithm is used for better security
V
 It is helpful for portable devices such as
Laptops, mobiles, tablets etc.
 Establish a network connection is easy.
 Introducing a new device in the Network is
easy.
 Security system is more featured in wireless
networks.
V
V

More Related Content

What's hot

Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)Ankur Kumar
 
data communication
data communicationdata communication
data communicationRajat Singla
 
Wireless Communication
Wireless CommunicationWireless Communication
Wireless CommunicationAwais Alam
 
Evolution of mobile communication
Evolution of mobile communicationEvolution of mobile communication
Evolution of mobile communicationMohamed Reda
 
Wireless technology
Wireless technologyWireless technology
Wireless technologyFatma Ala'a
 
Wired and wireless technologies
Wired and  wireless  technologiesWired and  wireless  technologies
Wired and wireless technologiesAkhil Sabu
 
Introduction Wireless Technology
Introduction Wireless TechnologyIntroduction Wireless Technology
Introduction Wireless Technologypriyankpatel2811
 
Unguided Media
Unguided  MediaUnguided  Media
Unguided MediaAmit Kundu
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network pptBasil John
 
5 g communication systems
5 g communication systems5 g communication systems
5 g communication systemsAkash R
 
Wireless communication
Wireless communicationWireless communication
Wireless communicationizhar ul haq
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMANajeeb Khan
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs BluetoothArun ACE
 
Overview of telecom networks
Overview of telecom networksOverview of telecom networks
Overview of telecom networkssnehitha reddy
 
Telecommunication basics
Telecommunication basicsTelecommunication basics
Telecommunication basicsYoohyun Kim
 
Telecommunication
TelecommunicationTelecommunication
Telecommunicationhamza javed
 

What's hot (20)

Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
 
data communication
data communicationdata communication
data communication
 
Seminar presentation on 5G
Seminar presentation on 5GSeminar presentation on 5G
Seminar presentation on 5G
 
Wireless Communication
Wireless CommunicationWireless Communication
Wireless Communication
 
Evolution of mobile communication
Evolution of mobile communicationEvolution of mobile communication
Evolution of mobile communication
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
 
Wired and wireless technologies
Wired and  wireless  technologiesWired and  wireless  technologies
Wired and wireless technologies
 
Introduction Wireless Technology
Introduction Wireless TechnologyIntroduction Wireless Technology
Introduction Wireless Technology
 
WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
 
5G Technology
5G Technology5G Technology
5G Technology
 
Unguided Media
Unguided  MediaUnguided  Media
Unguided Media
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 
5 g communication systems
5 g communication systems5 g communication systems
5 g communication systems
 
Network
NetworkNetwork
Network
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMA
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs Bluetooth
 
Overview of telecom networks
Overview of telecom networksOverview of telecom networks
Overview of telecom networks
 
Telecommunication basics
Telecommunication basicsTelecommunication basics
Telecommunication basics
 
Telecommunication
TelecommunicationTelecommunication
Telecommunication
 

Similar to Wireless networking

Wireless Netwok.pptx
Wireless Netwok.pptxWireless Netwok.pptx
Wireless Netwok.pptxSajibMandal2
 
wireless networking and Library
 wireless networking and Library wireless networking and Library
wireless networking and Librarysanjay thakur
 
wireless networking
wireless networkingwireless networking
wireless networkingEstiak Khan
 
8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).pptSAMBIT34
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxalanfhall8953
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Wireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptxWireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptxJosephCristian8
 
Chap 01 introduction to wirelless
Chap 01 introduction to wirelless Chap 01 introduction to wirelless
Chap 01 introduction to wirelless EngkaderAMuse
 
Wireless networks
Wireless networksWireless networks
Wireless networksyirle93
 
Wireless LAN and bluetooth technology
Wireless LAN and bluetooth technologyWireless LAN and bluetooth technology
Wireless LAN and bluetooth technologyRAVIKIRAN ANANDE
 
Wireless network Project Class 12
Wireless network Project Class 12Wireless network Project Class 12
Wireless network Project Class 12Rishabh-Rawat
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-FiBhushan Jadhav
 
Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologiesChandrakant Choure
 
WIRE LESS TECHNOLOGY .pptx
WIRE LESS TECHNOLOGY .pptxWIRE LESS TECHNOLOGY .pptx
WIRE LESS TECHNOLOGY .pptxMohanVeerabomala
 
Tutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and SecurityTutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and Securitydpd
 

Similar to Wireless networking (20)

Wireless Netwok.pptx
Wireless Netwok.pptxWireless Netwok.pptx
Wireless Netwok.pptx
 
wireless networking and Library
 wireless networking and Library wireless networking and Library
wireless networking and Library
 
wireless networking
wireless networkingwireless networking
wireless networking
 
8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).ppt
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Wimax technology
Wimax technologyWimax technology
Wimax technology
 
Wireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptxWireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptx
 
Chap 01 introduction to wirelless
Chap 01 introduction to wirelless Chap 01 introduction to wirelless
Chap 01 introduction to wirelless
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Wireless LAN and bluetooth technology
Wireless LAN and bluetooth technologyWireless LAN and bluetooth technology
Wireless LAN and bluetooth technology
 
Wireless network Project Class 12
Wireless network Project Class 12Wireless network Project Class 12
Wireless network Project Class 12
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
 
Wireless LANs and Mobile Networks
Wireless LANs and Mobile NetworksWireless LANs and Mobile Networks
Wireless LANs and Mobile Networks
 
Kablosuz İletişim ve Güvenlik
Kablosuz İletişim ve Güvenlik Kablosuz İletişim ve Güvenlik
Kablosuz İletişim ve Güvenlik
 
Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologies
 
WIRE LESS TECHNOLOGY .pptx
WIRE LESS TECHNOLOGY .pptxWIRE LESS TECHNOLOGY .pptx
WIRE LESS TECHNOLOGY .pptx
 
Tutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and SecurityTutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and Security
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wi Fi
Wi FiWi Fi
Wi Fi
 

Recently uploaded

Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 

Recently uploaded (20)

Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 

Wireless networking

  • 1. By VINAY KUMAR Roll No.- 180324 Mob.- 8395959587 V
  • 2. What is Wireless Networking? V
  • 3.  RANGE: 30 kHz to 300 GHz  This signals is fall under the category of EM waves.  This signals is invisible and use to send messages from one device to another  Uses: FM Radio station use RF signals to broadcast signals. The frequency is used as the station name(like 93.5 RED FM) V
  • 4. V
  • 5.  Network Interface Card(NIC) used for wireless network  NIC use antenna unlike the RJ45 cable.  Access Point for Generating signal and establish connection between devices.  Devices which has wireless signal adapter. V
  • 6.  Based on the size Wireless Networks are divided into four categories  Wireless LAN  Wireless MAN  Wireless WAN  Wireless PAN V
  • 7.  This is a network where two or more computers are connected that covers only a limited area.  The NIC is used in this connection where has a small range to cover.  We often called this peer to peer Network.  This is also called Ad Hoc Network which is being set up for temporary purposes. V
  • 8.  Unlike switch in a wired Network, A specil device is used in WLAN, which is called Access Point.  WLAN which uses Access Point are called BSS(Basic Service Set)  This acts as a coordinator between different devices. V
  • 9. V
  • 10.  Wireless Fidelity.  RF signal Frequency: 2.4 GHz or 5 GHz  Range: About 100 meters.  Wi-Fi products are certified and tested by Wi-Fi alliance. We can see their trademarks in most of the Wi-Fi devices. V
  • 11. WMAN(Wireless Metropolitan area Network)  Collected unit of many WLAN located at various.  It uses WIMAX(Worldwide Interoperability for Microwave Access) which is controlled by WiMAX Forum  Maximum speed 1Bits/sec  IEEE 802.16 V
  • 12.  WWAN is a very large network which is spread over a very large area. It connects many cites together. Mobile Phones use WWAN to make communication possible  The technology in WWAN are subdivided in many generations  2G, 3G, 4G.  The communication system which was used before the emergence of 2G is called 1G used in 1980  This technology used in most of the Analog devices. V
  • 13.  Examples of 2nd generation technologies are  GPRS(General Packet Radio Service)  EDRS(Enhanced Data rates for GSM Evolution) V
  • 14.  Example of 3rd generation technologies are:  CDMA(Code Division Multiple Access)  UMTS(Universal Mobile Telecommunication System)  HSPA(High Speed Packet Access)  HSPA+(Evolved High Speed Packet Access) V
  • 15.  High Speed Network accessibility can be achieved in this technology. The examples of 4th generation technologies are:  LTE(Long Term Evolution)  VOLTE(Voice Over term Evolution) V
  • 16. V
  • 17.  The Wireless Networks that are used in smaller distance are know as WPAN.  The communication between a mobile phone and its Bluetooth headset is a typical example of WPAN  Two kinds of Wireless technologies are used for WPAN  Bluetooth and Infrared Data Association. V
  • 18.  It is used to connect devices in personal area without using cables  Use ISM band 2.4 GHz  Speed up to 721 Kbps  Range 10 to 100 meters V
  • 19.  Data can be easily hacked in Wireless network without using proper security. The RF signal can be intercepted by Antenna.  Three commonly used security system: 1. Wired Equivalent Privacy(WEP) 2. Wi-Fi Protected Access(WPA) 3. Wi-Fi Protected Access(WPA2) V
  • 20.  Security standard released in 1997.  The Encryption Algorithm used in WEP was easily Breakable by Hackers.  Encryption refers to the technique of converting data in such a way that it’s understood only by the Sender and Receiver. V
  • 21.  Released in 2003  Invented by Wi-Fi Alliance  Required Firmware up gradation instead of changing any hardware component.  Better Security than WEP. V
  • 22.  Released in 2004  Advanced security features are available  Advanced Encryption Standard  Algorithm is used for better security V
  • 23.  It is helpful for portable devices such as Laptops, mobiles, tablets etc.  Establish a network connection is easy.  Introducing a new device in the Network is easy.  Security system is more featured in wireless networks. V
  • 24. V