This is a ppt about the recent trends in tech and wireless communication. As the is good document to read we are requesting to study the wireless communal harmony and peace to you. Aster that I have a great day and I will be available from June to September to December to February to the same here to visit our frequently asked questions about HTML5.
And ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha Akshar cholk Thai ne na jato ko bhi 6 baje uthta hai ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye 5.
The document discusses free computer science eBooks and technology news that are being provided. It includes links to blogs sharing this free content and encourages clicking on advertisements to support their work. It then discusses the topics of wireless technologies and Wi-Fi networks in particular, covering introductions, architectures, elements, how they work, topologies and configurations.
The document discusses learning outcomes related to wireless technologies, building wireless LANs, and implementing wireless LAN security. It covers topics such as wireless standards, WLAN components, setting up infrastructure and ad-hoc modes, wireless channels, authentication methods, encryption protocols like WEP and WPA, and traffic filtering. The goal is to understand wireless concepts and how to properly setup and secure a wireless local area network.
This document discusses Wi-Fi technology, including its history and standards, how Wi-Fi networks work, common network topologies, applications, security techniques and advantages/disadvantages. It introduces Wi-Fi as a wireless alternative to wired networks that uses radio technologies like 802.11b, 802.11a and 802.11g to transmit data at high speeds. Key components of a Wi-Fi network include access points and Wi-Fi cards. [/SUMMARY]
The document discusses Wi-Fi technology, including its standards, architecture, security techniques, and applications. It describes the IEEE 802.11 standards for Wi-Fi networks, including 802.11b, 802.11a, and 802.11g. It outlines the basic components of a Wi-Fi network including access points, Wi-Fi cards, and security measures. It also summarizes common Wi-Fi network configurations, topologies, and applications as well as security techniques such as SSID, WEP, WPA, and 802.1x access control.
Wireless networks use radio waves to connect devices without cables. They integrate with wired networks through access points and allow mobility as users move between coverage areas. The 802.11 standards define the physical and data link layers for wireless LANs and include specifications like 802.11a, b, g which provide different speeds and frequencies. Security is important for wireless networks and features like WEP have known vulnerabilities. Careful planning of access point placement and antennas is needed for effective coverage.
This document provides an overview of wireless networks and the IEEE 802.11 wireless LAN standards. It discusses how wireless LANs connect to wired networks through access points and allow mobility. The 802.11 standards including 802.11a, 802.11b, 802.11g, and 802.11e are described in terms of their data rates, frequencies used, and other characteristics. The document also covers wireless LAN security features like authentication, encryption, and integrity checking provided by Wired Equivalent Privacy (WEP) as well as problems with WEP security.
This document provides an overview of wireless local area networks (WLANs). It discusses wireless technology and standards including 802.11, WLAN topologies, how they integrate with wired networks, security considerations, and performance comparisons between standards such as 802.11a, 802.11b, and 802.11g. Wireless LANs use radio waves to connect devices within a building and bridge to the wired network backbone. Standards specify protocols for authentication, encryption, and quality of service, though some early security features like WEP have proven vulnerable. Migration to wireless offers mobility but introduces new design challenges.
This document provides an overview of wireless networks and the IEEE 802.11 wireless LAN standards. It discusses how wireless LANs connect to wired networks through access points and allow mobility. The 802.11 standards including 802.11a, 802.11b, 802.11g, and 802.11e are summarized, outlining their data rates, frequencies, and other key aspects. Security features of 802.11 such as Wired Equivalent Privacy (WEP) are also summarized, noting vulnerabilities in the authentication and encryption methods.
The document discusses free computer science eBooks and technology news that are being provided. It includes links to blogs sharing this free content and encourages clicking on advertisements to support their work. It then discusses the topics of wireless technologies and Wi-Fi networks in particular, covering introductions, architectures, elements, how they work, topologies and configurations.
The document discusses learning outcomes related to wireless technologies, building wireless LANs, and implementing wireless LAN security. It covers topics such as wireless standards, WLAN components, setting up infrastructure and ad-hoc modes, wireless channels, authentication methods, encryption protocols like WEP and WPA, and traffic filtering. The goal is to understand wireless concepts and how to properly setup and secure a wireless local area network.
This document discusses Wi-Fi technology, including its history and standards, how Wi-Fi networks work, common network topologies, applications, security techniques and advantages/disadvantages. It introduces Wi-Fi as a wireless alternative to wired networks that uses radio technologies like 802.11b, 802.11a and 802.11g to transmit data at high speeds. Key components of a Wi-Fi network include access points and Wi-Fi cards. [/SUMMARY]
The document discusses Wi-Fi technology, including its standards, architecture, security techniques, and applications. It describes the IEEE 802.11 standards for Wi-Fi networks, including 802.11b, 802.11a, and 802.11g. It outlines the basic components of a Wi-Fi network including access points, Wi-Fi cards, and security measures. It also summarizes common Wi-Fi network configurations, topologies, and applications as well as security techniques such as SSID, WEP, WPA, and 802.1x access control.
Wireless networks use radio waves to connect devices without cables. They integrate with wired networks through access points and allow mobility as users move between coverage areas. The 802.11 standards define the physical and data link layers for wireless LANs and include specifications like 802.11a, b, g which provide different speeds and frequencies. Security is important for wireless networks and features like WEP have known vulnerabilities. Careful planning of access point placement and antennas is needed for effective coverage.
This document provides an overview of wireless networks and the IEEE 802.11 wireless LAN standards. It discusses how wireless LANs connect to wired networks through access points and allow mobility. The 802.11 standards including 802.11a, 802.11b, 802.11g, and 802.11e are described in terms of their data rates, frequencies used, and other characteristics. The document also covers wireless LAN security features like authentication, encryption, and integrity checking provided by Wired Equivalent Privacy (WEP) as well as problems with WEP security.
This document provides an overview of wireless local area networks (WLANs). It discusses wireless technology and standards including 802.11, WLAN topologies, how they integrate with wired networks, security considerations, and performance comparisons between standards such as 802.11a, 802.11b, and 802.11g. Wireless LANs use radio waves to connect devices within a building and bridge to the wired network backbone. Standards specify protocols for authentication, encryption, and quality of service, though some early security features like WEP have proven vulnerable. Migration to wireless offers mobility but introduces new design challenges.
This document provides an overview of wireless networks and the IEEE 802.11 wireless LAN standards. It discusses how wireless LANs connect to wired networks through access points and allow mobility. The 802.11 standards including 802.11a, 802.11b, 802.11g, and 802.11e are summarized, outlining their data rates, frequencies, and other key aspects. Security features of 802.11 such as Wired Equivalent Privacy (WEP) are also summarized, noting vulnerabilities in the authentication and encryption methods.
Wi-Fi (or wireless fidelity) refers to wireless local area network (WLAN) technology that allows electronic devices to connect to the internet and communicate with one another wirelessly. It operates in the 2.4GHz and 5GHz radio bands and uses protocols like direct sequence spread spectrum (DSSS) to transmit data across multiple partially overlapping channels. The basic components of a Wi-Fi network include an access point that connects wireless devices like laptops and smartphones to the internet, Wi-Fi cards or adapters in the devices, and security measures like firewalls. Wi-Fi networks can be configured in different topologies like point-to-multipoint. Authentication and encryption techniques are used to secure wireless communications and prevent
Wireless lan electronics and communication engineeringeceb9198
The document discusses wireless local area networks (WLANs) and the IEEE 802.11 standards. It provides an overview of WLAN fundamentals and network architecture, describing components like access points, distribution systems, and stations. It then summarizes the various 802.11 standards from 802.11 to 802.11ac, outlining their key features such as modulation schemes and data rates. The document also covers topics like WLAN security protocols, wireless hotspots, virtual private networks, and an alternative WLAN standard called HIPERLAN.
Wi-Fi technology refers to wireless local area network (WLAN) standards for devices to connect to the Internet wirelessly. The document discusses Wi-Fi standards including 802.11b, 802.11a, and 802.11g. It describes Wi-Fi network components, topologies, configurations, applications, security techniques and threats. Wi-Fi provides mobility and flexibility but has limitations such as potential interference, performance degradation, and limited range.
This document provides an overview of wireless networks and the IEEE 802.11 wireless LAN standards. It discusses how wireless LANs operate similarly to wired LANs but use radio waves instead of cables for the last link to users. Access points are used to bridge wireless traffic to a wired network backbone. The document also covers wireless topologies, standards such as 802.11a, 802.11b, 802.11g, and security features like WEP as well as their limitations. It provides guidance on planning a wireless LAN migration including access point placement and site surveys.
Wi-Fi is a wireless technology standard that allows electronic devices to connect to the internet or communicate with each other wirelessly. The presentation discusses Wi-Fi technologies like 802.11b, 802.11a, and 802.11g. It explains the basic components of a Wi-Fi network including access points, Wi-Fi cards, and security measures. It also covers Wi-Fi configurations, applications, security techniques and topologies like AP-based, peer-to-peer, and point-to-multipoint bridge.
Wi-Fi technology uses radio waves to transmit and receive data wirelessly. It uses standards such as 802.11b, 802.11a, and 802.11g. A Wi-Fi network consists of access points that broadcast a wireless signal to connect devices like computers, phones and tablets. Security measures for Wi-Fi include encrypting data transmission and authenticating users and servers to prevent eavesdropping, spoofing and denial of service attacks. Common configurations and applications of Wi-Fi include home and office networks, as well as use by travelers.
The document discusses wireless local area networks (WLANs) and the IEEE 802.11 standards. It provides an overview of wireless technology, outlines the 802.11 standards including 802.11a, 802.11b, 802.11g, security features, and challenges. It also summarizes how WLANs integrate with existing networks through access points and allow roaming between coverage areas.
The document discusses wireless local area networks (WLANs) and the IEEE 802.11 standards. It provides an overview of wireless technology, outlines the 802.11 standards including 802.11a, 802.11b, 802.11g, security features, and challenges. It also summarizes how WLANs integrate with existing networks through access points and allow roaming between coverage areas.
Wi-Fi (or wireless fidelity) refers to wireless local area network (WLAN) technology based on the IEEE 802.11 standards. It allows electronic devices to connect to a wireless network, mainly using 2.4GHz UHF and 5GHz SHF radio frequencies. Wi-Fi uses access points that broadcast its SSID to wireless devices, which can then connect to the internet or wired network. Common Wi-Fi technologies include 802.11b, 802.11a, and 802.11g. Security measures for Wi-Fi networks include authentication, encryption, and restricting access through passwords or MAC address filtering to prevent unauthorized access.
This document provides an overview of wireless networks and the 802.11 wireless LAN standard. It describes how wireless LANs connect to wired LANs through access points and can also operate as independent ad hoc networks. Key aspects of 802.11 wireless LANs covered include the physical and data link layers, integration with existing networks through roaming between access points, security considerations, interoperability requirements, hardware requirements, and performance differences from wired LANs. Specific 802.11 standards like 802.11a, 802.11b, 802.11g, 802.11e, and 802.11f are also summarized.
Wi-Fi is a wireless technology standard that allows electronic devices to connect to the internet or communicate with each other wirelessly. It uses radio waves to provide wireless network connections between devices like computers, phones, and more. The Wi-Fi Alliance promotes standards to improve compatibility between wireless products using IEEE 802.11 standards. Wi-Fi networks use access points, wireless cards, and security measures like authentication and encryption to create secure wireless connections between devices.
This document provides an overview of wireless communication and networking. It defines wireless communication and discusses wireless network topologies and integration with wired networks. It describes the IEEE 802.11 wireless standards including 802.11a, 802.11b, 802.11g and 802.11n. It also discusses wireless networking devices such as access points, wireless LAN controllers, and bridges. Finally, it covers common wireless security measures including SSID hiding, MAC address filtering, static IP addressing, 802.1X authentication, WEP, WPA, and WPA2 encryption.
Wi-Fi is a wireless technology standard that allows electronic devices to connect to the internet or communicate with each other wirelessly. It uses radio waves to provide wireless network connections between devices like computers, phones, and more. The Wi-Fi Alliance promotes standards to improve compatibility between wireless products using IEEE 802.11 standards. Wi-Fi networks use access points, wireless cards, and security measures like authentication and encryption to create secure wireless connections.
The document discusses wireless local area networks (WLANs), including an overview of common WLAN standards such as 802.11b, 802.11a, and 802.11g. It covers topics such as how WLANs integrate with existing wired networks using access points, security considerations for WLANs, and factors to consider when migrating to a wireless network such as performing a site survey.
This document provides an overview of Wi-Fi technology. It defines Wi-Fi as a wireless networking standard based on the IEEE 802.11 specifications. It outlines the various 802.11 standards including 802.11b, 802.11a, 802.11g, and 802.11n, and describes their characteristics such as speed and frequency band. It also discusses Wi-Fi network elements, channels and association, mobility, network topologies of infrastructure and ad-hoc modes, and long-range Wi-Fi applications. Security and limitations of Wi-Fi are also mentioned.
This document discusses wireless internet and wireless local area networks (WLANs). It provides an introduction to wireless networking, describing how WLANs use radio waves to connect devices without cables. It discusses technologies like IEEE 802.11 and protocols used for voice and video services over WLANs. The document also covers topics like wireless LAN architecture, wireless internet protocol, TCP/IP optimization for wireless networks, wireless security, and defines hotspots as publicly available Wi-Fi access points.
The document discusses wireless local area networks (WLANs) and the mobile internet. It describes the IEEE 802.11 communication protocol used in WLANs and the development of WiFi. It also discusses wireless network configurations including independent basic service sets, distributed systems, and extended service sets. The layers of the IEEE 802.11 protocol are described along with the Wireless Application Protocol used for wireless internet access.
Understanding IT Network Security for Wireless and Wired Measurement Applicat...cmstiernberg
The document discusses network security considerations for merging IT and engineering networks. It provides an overview of common network security technologies for wired and wireless networks, including firewalls, VLANs, QoS, 802.11i/WPA2 encryption and authentication for wireless, and 802.15.4 security incorporated in ZigBee networks. The document emphasizes that properly implementing these security standards is critical to realizing the benefits of convergence while managing risks to process control and measurement systems.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
More Related Content
Similar to Recent Trends in Wireless communication
Wi-Fi (or wireless fidelity) refers to wireless local area network (WLAN) technology that allows electronic devices to connect to the internet and communicate with one another wirelessly. It operates in the 2.4GHz and 5GHz radio bands and uses protocols like direct sequence spread spectrum (DSSS) to transmit data across multiple partially overlapping channels. The basic components of a Wi-Fi network include an access point that connects wireless devices like laptops and smartphones to the internet, Wi-Fi cards or adapters in the devices, and security measures like firewalls. Wi-Fi networks can be configured in different topologies like point-to-multipoint. Authentication and encryption techniques are used to secure wireless communications and prevent
Wireless lan electronics and communication engineeringeceb9198
The document discusses wireless local area networks (WLANs) and the IEEE 802.11 standards. It provides an overview of WLAN fundamentals and network architecture, describing components like access points, distribution systems, and stations. It then summarizes the various 802.11 standards from 802.11 to 802.11ac, outlining their key features such as modulation schemes and data rates. The document also covers topics like WLAN security protocols, wireless hotspots, virtual private networks, and an alternative WLAN standard called HIPERLAN.
Wi-Fi technology refers to wireless local area network (WLAN) standards for devices to connect to the Internet wirelessly. The document discusses Wi-Fi standards including 802.11b, 802.11a, and 802.11g. It describes Wi-Fi network components, topologies, configurations, applications, security techniques and threats. Wi-Fi provides mobility and flexibility but has limitations such as potential interference, performance degradation, and limited range.
This document provides an overview of wireless networks and the IEEE 802.11 wireless LAN standards. It discusses how wireless LANs operate similarly to wired LANs but use radio waves instead of cables for the last link to users. Access points are used to bridge wireless traffic to a wired network backbone. The document also covers wireless topologies, standards such as 802.11a, 802.11b, 802.11g, and security features like WEP as well as their limitations. It provides guidance on planning a wireless LAN migration including access point placement and site surveys.
Wi-Fi is a wireless technology standard that allows electronic devices to connect to the internet or communicate with each other wirelessly. The presentation discusses Wi-Fi technologies like 802.11b, 802.11a, and 802.11g. It explains the basic components of a Wi-Fi network including access points, Wi-Fi cards, and security measures. It also covers Wi-Fi configurations, applications, security techniques and topologies like AP-based, peer-to-peer, and point-to-multipoint bridge.
Wi-Fi technology uses radio waves to transmit and receive data wirelessly. It uses standards such as 802.11b, 802.11a, and 802.11g. A Wi-Fi network consists of access points that broadcast a wireless signal to connect devices like computers, phones and tablets. Security measures for Wi-Fi include encrypting data transmission and authenticating users and servers to prevent eavesdropping, spoofing and denial of service attacks. Common configurations and applications of Wi-Fi include home and office networks, as well as use by travelers.
The document discusses wireless local area networks (WLANs) and the IEEE 802.11 standards. It provides an overview of wireless technology, outlines the 802.11 standards including 802.11a, 802.11b, 802.11g, security features, and challenges. It also summarizes how WLANs integrate with existing networks through access points and allow roaming between coverage areas.
The document discusses wireless local area networks (WLANs) and the IEEE 802.11 standards. It provides an overview of wireless technology, outlines the 802.11 standards including 802.11a, 802.11b, 802.11g, security features, and challenges. It also summarizes how WLANs integrate with existing networks through access points and allow roaming between coverage areas.
Wi-Fi (or wireless fidelity) refers to wireless local area network (WLAN) technology based on the IEEE 802.11 standards. It allows electronic devices to connect to a wireless network, mainly using 2.4GHz UHF and 5GHz SHF radio frequencies. Wi-Fi uses access points that broadcast its SSID to wireless devices, which can then connect to the internet or wired network. Common Wi-Fi technologies include 802.11b, 802.11a, and 802.11g. Security measures for Wi-Fi networks include authentication, encryption, and restricting access through passwords or MAC address filtering to prevent unauthorized access.
This document provides an overview of wireless networks and the 802.11 wireless LAN standard. It describes how wireless LANs connect to wired LANs through access points and can also operate as independent ad hoc networks. Key aspects of 802.11 wireless LANs covered include the physical and data link layers, integration with existing networks through roaming between access points, security considerations, interoperability requirements, hardware requirements, and performance differences from wired LANs. Specific 802.11 standards like 802.11a, 802.11b, 802.11g, 802.11e, and 802.11f are also summarized.
Wi-Fi is a wireless technology standard that allows electronic devices to connect to the internet or communicate with each other wirelessly. It uses radio waves to provide wireless network connections between devices like computers, phones, and more. The Wi-Fi Alliance promotes standards to improve compatibility between wireless products using IEEE 802.11 standards. Wi-Fi networks use access points, wireless cards, and security measures like authentication and encryption to create secure wireless connections between devices.
This document provides an overview of wireless communication and networking. It defines wireless communication and discusses wireless network topologies and integration with wired networks. It describes the IEEE 802.11 wireless standards including 802.11a, 802.11b, 802.11g and 802.11n. It also discusses wireless networking devices such as access points, wireless LAN controllers, and bridges. Finally, it covers common wireless security measures including SSID hiding, MAC address filtering, static IP addressing, 802.1X authentication, WEP, WPA, and WPA2 encryption.
Wi-Fi is a wireless technology standard that allows electronic devices to connect to the internet or communicate with each other wirelessly. It uses radio waves to provide wireless network connections between devices like computers, phones, and more. The Wi-Fi Alliance promotes standards to improve compatibility between wireless products using IEEE 802.11 standards. Wi-Fi networks use access points, wireless cards, and security measures like authentication and encryption to create secure wireless connections.
The document discusses wireless local area networks (WLANs), including an overview of common WLAN standards such as 802.11b, 802.11a, and 802.11g. It covers topics such as how WLANs integrate with existing wired networks using access points, security considerations for WLANs, and factors to consider when migrating to a wireless network such as performing a site survey.
This document provides an overview of Wi-Fi technology. It defines Wi-Fi as a wireless networking standard based on the IEEE 802.11 specifications. It outlines the various 802.11 standards including 802.11b, 802.11a, 802.11g, and 802.11n, and describes their characteristics such as speed and frequency band. It also discusses Wi-Fi network elements, channels and association, mobility, network topologies of infrastructure and ad-hoc modes, and long-range Wi-Fi applications. Security and limitations of Wi-Fi are also mentioned.
This document discusses wireless internet and wireless local area networks (WLANs). It provides an introduction to wireless networking, describing how WLANs use radio waves to connect devices without cables. It discusses technologies like IEEE 802.11 and protocols used for voice and video services over WLANs. The document also covers topics like wireless LAN architecture, wireless internet protocol, TCP/IP optimization for wireless networks, wireless security, and defines hotspots as publicly available Wi-Fi access points.
The document discusses wireless local area networks (WLANs) and the mobile internet. It describes the IEEE 802.11 communication protocol used in WLANs and the development of WiFi. It also discusses wireless network configurations including independent basic service sets, distributed systems, and extended service sets. The layers of the IEEE 802.11 protocol are described along with the Wireless Application Protocol used for wireless internet access.
Understanding IT Network Security for Wireless and Wired Measurement Applicat...cmstiernberg
The document discusses network security considerations for merging IT and engineering networks. It provides an overview of common network security technologies for wired and wireless networks, including firewalls, VLANs, QoS, 802.11i/WPA2 encryption and authentication for wireless, and 802.15.4 security incorporated in ZigBee networks. The document emphasizes that properly implementing these security standards is critical to realizing the benefits of convergence while managing risks to process control and measurement systems.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
3. Introduction
• Wireless Technology is an alternative to Wired Technology, which is commonly
used, for connecting devices in wireless mode.
• Wi-Fi (Wireless Fidelity) is a generic term that refers to the IEEE 802.11
communications standard for Wireless Local Area Networks (WLANs).
• Wi-Fi Network connect computers to each other, to the internet and to the wired
network.
4. IEEE 802.11 Architecture
IEEE 802.11 standard, popularly known as WiFi, lays down the architecture and specifications of
wireless LANs (WLANs). WiFi or WLAN uses high-frequency radio waves instead of cables for
connecting the devices in LAN. Users connected by WLANs can move around within the area of
network coverage.
5. IEEE 802.11 Architecture
Stations (STA) − Stations comprises of all devices and equipment that are connected to the
wireless LAN. A station can be of two types−
Wireless Access Point (WAP) − WAPs or simply access points (AP) are generally wireless routers that form the
base stations or access.
Client. Clients are workstations, computers, laptops, printers, smartphones, etc.
Each station has a wireless network interface controller.
6. IEEE 802.11 Architecture
Basic Service Set (BSS) − A basic service set is a group of stations communicating at the
physical layer level. BSS can be of two categories depending upon the mode of operation−
Infrastructure BSS − Here, the devices communicate with other devices through access points.
Independent BSS − Here, the devices communicate in a peer-to-peer basis in an ad hoc manner.
Extended Service Set (ESS) − It is a set of all connected BSS.
Distribution System (DS) − It connects access points in ESS.
8. Frame Format of IEEE 802.11
The main fields of a frame of wireless LANs as laid down by IEEE 802.11 are −
Frame Control − It is a 2 bytes starting field composed of 11 subfields. It contains control
information of the frame.
Duration − It is a 2-byte field that specifies the time period for which the frame and its
acknowledgment occupy the channel.
Address fields − There are three 6-byte address fields containing addresses of source, immediate
destination, and final endpoint respectively.
Sequence − It a 2 bytes field that stores the frame numbers.
Data − This is a variable-sized field that carries the data from the upper layers. The maximum
size of the data field is 2312 bytes.
Check Sequence − It is a 4-byte field containing error detection information.
9. The Wi-Fi Technology
Wi-Fi Networks use Radio Technologies to transmit & receive data at high speed:
• IEEE 802.11b
• IEEE 802.11a
• IEEE 802.11g
10. IEEE 802.11b
• Appear in late 1999
• Operates at 2.4GHz radio spectrum
• 11 Mbps (theoretical speed) - within 30 m Range
• 4-6 Mbps (actual speed)
• 100 -150 feet range
• Most popular, Least Expensive
• Interference from mobile phones and Bluetooth devices which can reduce the
transmission speed.
11. IEEE 802.11a
• Introduced in 2001
• Operates at 5 GHz (less popular)
• 54 Mbps (theoretical speed)
• 15-20 Mbps (Actual speed)
• 50-75 feet range
• More expensive
• Not compatible with 802.11b
12. IEEE 802.11g
• Introduced in 2003
• Combine the feature of both standards (a,b)
• 100-150 feet range
• 54 Mbps Speed
• 2.4 GHz radio frequencies
• Compatible with ‘b’
13. 802.11 Physical Layer
There are three sublayers in physical layer:
• Direct Sequence Spread Spectrum (DSSS)
• Frequency Hoping Spread Spectrum (FHSS)
• Diffused Infrared (DFIR) - Wide angle
14. DSSS
• Direct sequence signaling technique divides the 2.4 GHz band into 11 22-MHz channels. Adjacent channels overlap
one another partially, with three of the 11 being completely non-overlapping. Data is sent across one of these 22
MHz channels without hopping to other channels.
15. IEEE 802.11 Data Link Layer
The data link layer consists of two sublayers :
• Logical Link Control (LLC)
• Media Access Control (MAC).
802.11 uses the same 802.2 LLC and 48-bit addressing as other 802 LANs, allowing for very simple bridging
from wireless to IEEE wired networks, but the MAC is unique to WLANs.
16. 802.11 Media Access Control
• Carrier Sense Medium Access with collision avoidance protocol (CSMA/CA)
• Listen before talking
• Avoid collision by explicit Acknowledgement (ACK)
• Problem: additional overhead of ACK packets, so slow performance
• Request to Send/Clear to Send (RTS/CTS) protocol
• Solution for “hidden node” problem
• Problem: Adds additional overhead by temporarily reserving the medium, so used for large
size packets only retransmission would be expensive
17. 802.11 Media Access Control(cont.)
• Power Management
• MAC supports power conservation to extend the battery life of portable devices
• Power utilization modes
• Continuous Aware Mode
• Radio is always on and drawing power
• Power Save Polling Mode
• Radio is “dozing” with access point queuing any data for it
• The client radio will wake up periodically in time to receive regular beacon signals from the access point.
• The beacon includes information regarding which stations have traffic waiting for them
• The client awake on beacon notification and receive its data
18. 802.11 Media Access Control(cont.)
• Fragmentation
• CRC checksum
• Each pkt has a CRC checksum calculated and attached to ensure that the data was not corrupted in transit
• Association & Roaming
19. Elements of a WI-FI Network
• Access Point (AP) - The AP is a wireless LAN transceiver or “base station” that can connect
one or many wireless devices simultaneously to the Internet.
• Wi-Fi cards - They accept the wireless signal and relay information.They can be internal and
external.(e.g PCMCIA Card for Laptop and PCI Card for Desktop PC)
• Safeguards - Firewalls and anti-virus software protect networks from uninvited users and keep
information secure.
20. How a Wi-Fi Network Works
• Basic concept is same as Walkie talkies.
• A Wi-Fi hotspot is created by installing an access point to an internet connection.
• An access point acts as a base station.
• When Wi-Fi enabled device encounters a hotspot the device can then connect to that network
wirelessly.
• A single access point can support up to 30 users and can function within a range of 100 – 150
feet indoors and up to 300 feet outdoors.
• Many access points can be connected to each other via Ethernet cables to create a single large
network.
22. AP-based topology
• The client communicate through Access Point.
• BSA-RF coverage provided by an AP.
• ESA-It consists of 2 or more BSA.
• ESA cell includes 10-15% overlap to allow roaming.
23. Peer-to-peer topology
• AP is not required.
• Client devices within a cell can communicate directly with each other.
• It is useful for setting up of a wireless network quickly and easily.
24. Point-to-multipoint bridge topology
This is used to connect a LAN in one building to a LANs in other buildings even if the buildings
are miles apart.These conditions receive a clear line of sight between buildings. The line-of-sight
range varies based on the type of wireless bridge and antenna used as well as the environmental
conditions.
25. Wi-Fi Applications
• Home
• Small Businesses or SOHO
• Large Corporations & Campuses
• Health Care
• Wireless ISP (WISP)
• Travellers
26. Wi-Fi Security Threats
• Wireless technology doesn’t remove any old security issues, but introduces new ones
• Eavesdropping
• Man-in-the-middle attacks
• Denial of Service
27. Eavesdropping
• Easy to perform, almost impossible to detect
• By default, everything is transmitted in clear text
• Usernames, passwords, content ...
• No security offered by the transmission medium
• Different tools available on the internet
• Network sniffers, protocol analysers . . .
• Password collectors
• With the right equipment, it’s possible to eavesdrop traffic from few kilometers
away
28. MITM Attack
1. Attacker spoofes a disassociate message from the victim
2. The victim starts to look for a new access point, and the attacker advertises his own AP on a
different channel, using the real AP’s MAC address
3. The attacker connects to the real AP using victim’s MAC address
29. Denial of Service
• Attack on transmission frequecy used
• Frequency jamming
• Not very technical, but works
• Attack on MAC layer
• Spoofed deauthentication / disassociation messages
• can target one specific user
• Attacks on higher layer protocol (TCP/IP protocol)
• SYN Flooding
30. Wi-Fi Security
The requirements for Wi-Fi network security can be broken down into two primary components:
• Authentication
User Authentication
Server Authentication
• Privacy
31. Authentication
• Keeping unauthorized users off the network
• User Authentication
• Authentication Server is used
• Username and password
• Risk:
• Data (username & password) send before secure channel established
• Prone to passive eavesdropping by attacker
• Solution
• Establishing a encrypted channel before sending username and password
32. Authentication (cont..)
• Server Authentication
• Digital Certificate is used
• Validation of digital certificate occurs automatically within client software
33. Wi-Fi Security Techniques
• Service Set Identifier (SSID)
• Wired Equivalent Privacy (WEP)
• 802.1X Access Control
• Wireless Protected Access (WPA)
• IEEE 802.11i
34. Service Set Identifier (SSID)
• SSID is used to identify an 802.11 network
• It can be pre-configured or advertised in beacon broadcast
• It is transmitted in clear text
• Provide very little security
35. Wired Equivalent Privacy (WEP)
• Provide same level of security as by wired network
• Original security solution offered by the IEEE 802.11 standard
• Uses RC4 encryption with pre-shared keys and 24 bit initialization vectors (IV)
• key schedule is generated by concatenating the shared secret key with a random generated 24-
bit IV
• 32 bit ICV (Integrity check value)
• No. of bits in keyschedule is equal to sum of length of the plaintext and ICV
36. Wired Equivalent Privacy (WEP) (cont.)
• 64 bit preshared key-WEP
• 128 bit preshared key-WEP2
• Encrypt data only between 802.11 stations.once it enters the wired side of the network (between
access point) WEP is no longer valid
• Security Issue with WEP
• Short IV
• Static key
• Offers very little security at all
37. 802.1x Access Control
• Designed as a general purpose network access control mechanism
• Not Wi-Fi specific
• Authenticate each client connected to AP (for WLAN) or switch port (for Ethernet)
• Authentication is done with the RADIUS server, which ”tells” the access point whether access to controlled ports
should be allowed or not
• AP forces the user into an unauthorized state
• user send an EAP start message
• AP return an EAP message requesting the user’s identity
• Identity send by user is then forwared to the authentication server by AP
• Authentication server authenticate user and return an accept or reject message back to the AP
• If accept message is return, the AP changes the client’s state to authorized and normal traffic flows
39. Wireless Protected Access (WPA)
• WPA is a specification of standard based, interoperable security enhancements that strongly increase the level of
data protection and access control for existing and future wireless LAN system.
• User Authentication
• 802.1x
• EAP
• TKIP (Temporal Key Integrity Protocol) encryption
• RC4, dynamic encryption keys (session based)
• 48 bit IV
• per packet key mixing function
• Fixes all issues found from WEP
• Uses Message Integrity Code (MIC) Michael
• Ensures data integrity
• Old hardware should be upgradeable to WPA
40. Wireless Protected Access (WPA)(cont.)
• WPA comes in two flavors
• WPA-PSK
• use pre-shared key
• For SOHO environments
• Single master key used for all users
• WPA Enterprise
• For large organisation
• Most secure method
• Unique keys for each user
• Separate username & password for each user
41. WPA and Security Threats
• Data is encrypted
• Protection against eavesdropping and man-in-the-middle attacks
• Denial of Service
• Attack based on fake massages can not be used.
• As a security precaution, if WPA equipment sees two packets with invalid MICs within a second, it disassociates all its
clients, and stops all activity for a minute
• Only two packets a minute enough to completely stop a wireless network
42. 802.11i
• Provides standard for WLAN security
• Authentication
• 802.1x
• Data encryption
• AES protocol is used
• Secure fast handoff-This allow roaming between APs without requiring client to fully
reauthenticate to every AP.
• Will require new hardware
43. Advantages
• Mobility
• Ease of Installation
• Flexibility
• Cost
• Reliability
• Security
• Use unlicensed part of the radio spectrum
• Roaming
• Speed
46. What is WiMax?
WiMax (Worldwide Interoperability for Microwave Access) is a standards-based
technology enabling the delivery of last mile wireless broadband access as an
alternative to cable and DSL.
The technology is specified by the Institute of Electrical and Electronics Engineers
Inc., as the IEEE 802.16 standard.
47. WiMax Forum
It is a non-profit industry body dedicated to promoting the adoption of this technology
and ensuring that different vendors’ products will interoperate.
It is doing this through developing conformance and interoperability test plans and
certification program.
WiMAX Forum Certified™ means a service provider can buy equipment from more than
one company and be confident that everything works together.
48. WiMax Technology
WiMAX is expected to provide fixed , nomadic, portable and, eventually, mobile wireless
broadband connectivity without the need for direct line-of-sight (LOS) with a base station.
In a typical cell radius deployment of three to ten kilometers, WiMAX Forum Certified™
systems can be expected to deliver capacity of up to 40 Mbps per channel, for fixed and
portable access applications.
Mobile network deployments are expected to provide up to 15 Mbps of capacity within a
typical cell radius deployment of up to three kilometers.
49. Why is it Interesting?
Simultaneously support hundreds of businesses with T-1 speed connectivity and thousands of
homes with DSL speed connectivity.
Promise of potential low cost and flexibility in building broadband networks.
Scalability, as extra channels and base stations can be added incrementally as bandwidth
demand grows.
Support for both voice and video as well as Internet data.
Semiconductor vendors envisage WiMax-enabled chips appearing in PCs in 2006 and in
notebook computers and PDAs by 2007
50. Wi-Fi: The Predecessor of WiMax
Wi-Fi (Wireless Fidelity) is a set of technologies that are based on the IEEE 802.11a,b, and
g standards.
Wi-Fi is considered to be one of the first widely deployed fixed broadband wireless
networks.
The Wi-Fi architecture consists of a base station that wireless hosts connect to in order
to access network resources.
As long as the users remain within 300 feet of the fixed wireless access point, they can
maintain broadband wireless connectivity.
51. Wi-Fi Standards
Standard Throughput Range Frequency
802.11a Up to 54 Mbps Up to 300 ft Between 5 and 6
Ghz
802.11b Up to 11 Mbps Up to 300 ft 2.4 Ghz
802.11g Up to 54 Mbps Up to 300 ft 2.4 Ghz
52. Strengths of Wi-Fi
Simplicity and ease of deployment given that it uses unlicensed radio spectrum which does not
require regulatory approval.
Cost of rolling out this wireless solution is low.
Users are able to be mobile for up to 300 feet from the access point.
There are many Wi-Fi compatible products that are available at a low cost and can interoperate
with other network technologies. Wi-Fi clients can work seamlessly in other countries with
minimal configuration.
53. Weaknesses of Wi-Fi
Limited level of mobility.
Susceptible to interference.
Designed technically for short-range operations and basically an indoors technology.
Security is a concern.
54. Relation of Wi-Fi and WiMax
WiMax eliminates the constraints of Wi-Fi.
Unlike Wi-Fi, WiMax is intended to work outdoors over long distances.
WiMax is a more complex technology and has to handle issues of importance such
as QoS guarantees, carrier-class reliability, NLOS.
WiMax is not intended to replace Wi-Fi. Instead, the two technologies complement
each other.
55. WiMax Standards
802.16 802.16a 802.16-2004 802.16e-2005
Date
Completed
December 2001 January 2003 June 2004 December 2005
Spectrum 10-66 GHz < 11 GHz < 11 GHz < 6 GHz
Operation LOS Non-LOS Non-LOS Non-LOS and
Mobile
Bit Rate 32-134 Mbps Up to 75 Mbps Up to 75
Mbps
Up to 15 Mbps
Cell Radius 1-3 miles 3-5 miles 3-5 miles 1-3 miles
56. WiMax is well suited to offer both fixed and mobile
access
57. How WiMax Works
WiMax can provide 2 forms of wireless service:
- Non-LOS, Wi-Fi sort of service, where a small antenna on a computer connects to the tower.
Uses lower frequency range (2 to 11 GHz).
- LOS, where a fixed antenna points straight at the WiMax tower from a rooftop or pole. The LOS
connection is stronger and more stable, so it is able to send a lot of data with fewer errors. Uses
higher frequencies, with ranges reaching a possible 66 GHz.
Through stronger LOS antennas, WiMax transmitting stations would send data to WiMax enabled
computers or routers set up within 30 (3,600 square miles of coverage) mile radius.
58. WiMax Rollout
WiMax Forum anticipates rollout of its technology in 3 phases:
- Phase 1: Fixed Location, Private Line Services, Hot Spot Backhaul.
- Phase 2: Broadband Wireless Access/Wireless DSL
- Phase 3: Mobile/Nomadic Users.
59. WiMax Spectrum
Broad Operating Range
WiMax Forum is focusing on 3 spectrum bands for global deployment:
Unlicensed 5 GHz: Includes bands between 5.25 and 5.85 GHz. In the upper 5 GHz band (5.725 –
5.850 GHz) many countries allow higher power output (4 Watts) that makes it attractive for
WiMax applications.
Licensed 3.5 GHz: Bands between 3.4 and 3.6 GHz have been allocated for BWA in majority of
countries.
Licensed 2.5 GHz: The bands between 2.5 and 2.6 GHz have been allocated in the US, Mexico,
Brazil and in some SEA countries. In US this spectrum is licensed for MDS and ITFS.
60. Benefits of Licensed and License-Exempt Solutions
Licensed Solution License-Exempt Solution
Better QoS Fast Rollout
Better NLOS reception at lower
frequencies
Lower Costs
Higher barriers for entrance More worldwide options
61. Technical Similarities and Differences Between Licensed and License-Exempt Bands
Both solutions are based on IEEE 802.16-2004 standard, which uses OFDM in the
physical (PHY) layer.
OFDM provides benefits such as increased SNR of subscriber stations and
improved resiliency to multi-path interference.
For creating bi-directional channels for uplink and downlink, licensed solutions use
FDD while license exempt solutions use TDD.
62. WiMax Mobility Issues
Device availability is a major issue
- Market introduction may be delayed
- High initial costs will limit adoption growth
In some markets spectrum availability is limited
- Bands < 3 GHz is better suited for mobile access
- Licenses for fixed WiMAX may not allow service provider to offer mobile services
Current demand for WiMax is mostly for fixed services.
- Underserved Regions, Developing Markets
63. WiMax Mobility Issues (Continued)
Demand for wireless data is growing, but still it is limited
- Mobile operators may see need for a data-only technology when demand is
higher
- Demand may drive additional spectrum allocations for wireless mobile data
service
WiMax is not going to supplant other wireless technologies
- It will not replace Wi-Fi in the LAN
- Cellular technologies may still be needed for voice and data in the WAN
64. WiMax Mobility Issues (Continued)
Competing technologies have a time-to-market advantage
- Many mobile operators have invested heavily in 3G systems.
Multiple technologies will co-exist as they meet different needs
Mobility may become a powerful differentiating factor when competing with DSL or
Cable
65. WiMax Applications
According to WiMax Forum it supports 5 classes of applications:
Multi-player Interactive Gaming.
VOIP and Video Conference
Streaming Media
Web Browsing and Instant Messaging
Media Content Downloads
67. WiMax Success Factors
It is crucial that WiMax becomes an important building block to enable
fixed/mobile convergence and to ensure its success.
Ability to offer ease of use is crucial to the success of WiMAX service
providers
Success of WiMAX may depend on the ability to combine fixed and
mobile access over the same infrastructure
68.
69.
70. What is Zigbee?
• ZigBee is a new wireless technology
• Technological Standard Created for Control and
Sensor Networks
• Based on the IEEE 802.15.4 Standard
• Created by the ZigBee Alliance
• Philips,Motorola,Intel,HP are all members of the
allience.
71. Zigbee
• Designed for low power consumption allowing
batteries to essentially last for ever
• ZigBee makes possible completely networked homes
where all devices are able to communicate and be
controlled by a single unit
• It provides network,security and application support
services operating on the top of IEEE
72. IEEE 802.15.4 & ZigBee
– “the software”
– Network, Security &
Application layers
– Brand management
IEEE 802.15.4
– “the hardware”
– Physical & Media Access
Control layers
PHY
868MHz / 915MHz / 2.4GHz
MAC
Network
Star / Mesh / Cluster-Tree
Security
32- / 64- / 128-bitencryption
Application
API
ZigBee
Alliance
IEEE
802.15.4
Customer
Silicon Stack App
73. Architecture
• Layered architecture
• These layers facilitate the features that make
ZigBee very attractive:
low cost
easy implementation
reliable data transfer
short-range operations
very low power consumption
adequate security features
75. Zigbee Device Types
• There are three different ZigBee device types that
operate on the layers in any self-organizing
application network
1. Zigbee Coordinator node
2. Full Function Device (FFD)
3. Reduced Function Device(RFD)
76. 1.Zigbee Coordinator Node
It is the root of network tree and a bridge to other network
Able to store information about the network
Only one ZCN for a network
It act as a repositary for other security keys
77. 2.The full Function Device
• An intermediatory router transmitting data from other
devices
• Needs lesser memory than Zigbee coordinator
node
• Lesser manufacturing cost
• Can operate on all topologies
• Also act as a coordinator
78. 3.The Reduced Function Device
• Device capable of talking in the network
• It cannot relay data from other devices
• Less memory
• Cheaper than FFD
• It talks only to the n/w coordinator
87. Characteristics
• Low power consumption with battery life ranging from
months to years
• High density of nodes per network
• Low cost
• Simple implementation
• Low data rate
• Small packet devices
88. Applications
• The ZigBee Alliance targets applications Across
consumer, commercial, industrial and government
markets worldwide
• Home networking
• Industrial control and management