SlideShare a Scribd company logo
Sumang Singha
VI-E, Roll No 31
Introduction
Wireless Technology is an alternative to Wired
Technology, which is commonly used, for connecting
devices in wireless mode.
Wi-Fi is a generic term that refers to the IEEE 802.11
communications standard for Wireless Local Area
Networks (WLANs).
Wi-Fi Network connect computers to each other, to the
internet and to the wired network.
Wi-Fi works on physical and data link layer.
Need of Wi-Fi
Technology
Freedom from wires!!
Purpose
 The purpose of Wi-Fi is to hide complexity by enabling
wireless access to applications and data, media and
streams.
 The main aims of Wi-Fi are:
 make access to information easier
 ensure compatibility and co-existence of devices
 eliminate complex cabling
 eliminate switches, adapters, plugs, pins and
connectors
Wi-Fi Technology
How a Wi-Fi Network Works
Devices & Components
PCI adapter
(inside)
USB adapter
(outside)
PCMCIA Card (Portables)
Wi-Fi Technology
Interference
Cardboard
Wood Paper
Electrical
Transformers
Microwave
Ovens
Fluorescent
Lighting
Firewalls
Wi-Fi Technology
Wi-Fi Technology
Wifi
Phones Wi-Fi Camera
Innovations
9
Advantages
 Freedom – You can work from any location
that you can get a signal.
 Setup Cost – No cabling required.
 Flexibility – Quick and easy to setup in temp
or permanent space.
 Scaleable – Can be expanded with growth.
 Mobile Access – Can access the network
on the move.
10
Disadvantages
 Speed – Slower than cable.
 Range – Affected by various medium.
 Travels best through open space.
 Reduced by walls, glass, water, etc
 Security – Greater exposure to risks.
 Unauthorized access.
 Compromising data.
 Denial of service.
11
Uses of Wifi
1. Connecting to Internet
2. Turn Your Smartphone into a Remote Control
3. Send Documents to Your Printer from Any Computer
4. Forward Notifications from Your Smartphone to Your PC
5. Tether Your Smartphone to Your Computer for Internet
Anywhere
6. Share Files with Nearby Computers
7. Wirelessly Transfer Photos from Your Digital Camera
8. Many electronic devices use Wi-Fi due to its simple functions.
9. Companies use Wi-Fi to create wireless networks within their
company.
10.Phone companies such as use Wi-Fi Hot Spots for their users
to get free calling/internet access.
11.Gaming companies like Nintendo use Wi-Fi to synch their
products and to use global network usage
12
Health Risks
1. Contributes to the Development of Insomn
2. Damaging to Childhood Development
3. Affects Cell Growth
4. Derails Brain Function
5. Reduces Brain Activity in Females
6. Neutralizes Sperm
7. May Impact Fertility
8. Provokes Cardiac Stress
9. Linked to Cancer?
13
What Makes them
Dangerous ?
1.Wireless routers – as well as Bluetooth and
similar wireless systems – give off
electromagnetic radiation in the low-
gigahertz frequency. This level is considered
potentially dangerous to people.
2.The wireless signals can pass through walls.
3.. Most routers are not turned off at night, so
you are exposed 24/7.
14
If you're not ready to completely get rid of wireless stuff, you can at least reduce
your family's radiation by:
• Tell your family to try to not use their cell phone: Put your cell phone in Airplane
Mode, or turn it off, then just turn it on to check messages or make a quick call, then turn i
back off. Keep it for emergencies. As long as your cell phone is on, it emits radiation
continually (to you and everyone within 10 feet of you), even when you are not actually
making a call.
• Children Should NEVER Use Cell Phones:
• Use a corded phone at home and at work
• Reduce or stop using other wireless devices
• Keep laptops away from the body and don’t use a laptop while it rests on the lap.
• Use your cell phone only where reception is good
• Keep your cell phone away from your body when it’s on
• Use safer headset technology
Thank
You

More Related Content

What's hot

Monitroniics power point for business
Monitroniics power point for businessMonitroniics power point for business
Monitroniics power point for businessKeith Blake
 
Internet Security
Internet SecurityInternet Security
Internet Security
Chris Rodgers
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
dkp205
 
WIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my lifeWIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my life
Rahul Barick
 
BCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going OnBCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going On
Gareth Niblett
 
Cyber Espionage: Are You Being Hunted?
Cyber Espionage: Are You Being Hunted?Cyber Espionage: Are You Being Hunted?
Cyber Espionage: Are You Being Hunted?
5 Minute Webinars
 
How Does Wifi Work
How Does Wifi WorkHow Does Wifi Work
How Does Wifi Work
dwight barrientos
 
Ist 448 648 group presentation
Ist 448 648 group presentationIst 448 648 group presentation
Ist 448 648 group presentation
Michael Scinto
 
What happened on October 21
What happened on October 21What happened on October 21
What happened on October 21
San Diego Continuing Education
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTsIT Tech
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
Sanskar Gaur
 
New internet security
New internet securityNew internet security
New internet security
university of mumbai
 
Uses Of Wifi
Uses Of WifiUses Of Wifi
Uses Of Wifi
techbed
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 
Internet security
Internet securityInternet security
Internet security
rfukunaga
 
Uwuiit110042
Uwuiit110042Uwuiit110042
Uwuiit110042
Uditha Kekulawala
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
university of mumbai
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Arjun Chetry
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
Gerard Lamusse
 
Internet Security
Internet SecurityInternet Security
Internet Security
mjelson
 

What's hot (20)

Monitroniics power point for business
Monitroniics power point for businessMonitroniics power point for business
Monitroniics power point for business
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
WIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my lifeWIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my life
 
BCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going OnBCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going On
 
Cyber Espionage: Are You Being Hunted?
Cyber Espionage: Are You Being Hunted?Cyber Espionage: Are You Being Hunted?
Cyber Espionage: Are You Being Hunted?
 
How Does Wifi Work
How Does Wifi WorkHow Does Wifi Work
How Does Wifi Work
 
Ist 448 648 group presentation
Ist 448 648 group presentationIst 448 648 group presentation
Ist 448 648 group presentation
 
What happened on October 21
What happened on October 21What happened on October 21
What happened on October 21
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTs
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
New internet security
New internet securityNew internet security
New internet security
 
Uses Of Wifi
Uses Of WifiUses Of Wifi
Uses Of Wifi
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Internet security
Internet securityInternet security
Internet security
 
Uwuiit110042
Uwuiit110042Uwuiit110042
Uwuiit110042
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 

Similar to Sumang singhal wifi

Wifi tecnology
Wifi tecnology Wifi tecnology
Wifi tecnology
Tahseen Jawaid
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
gaurav koriya
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
Zul Fikri
 
Wifi
WifiWifi
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Saravana Kumar
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
HAYDEECAYDA
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology WriteupShital Kat
 
44.pptx
44.pptx44.pptx
44.pptx
jakjak36
 
Internet & it's concepts
Internet & it's conceptsInternet & it's concepts
Internet & it's concepts
AbhayDhupar
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
noyon2518
 
11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx
hyacinthshackley2629
 
Integrating wi fi for mobile networks
Integrating wi fi for mobile networksIntegrating wi fi for mobile networks
Integrating wi fi for mobile networksBev Anderson
 
How to Share Wifi Password from Your iPhone
How to Share Wifi Password from Your iPhoneHow to Share Wifi Password from Your iPhone
How to Share Wifi Password from Your iPhone
Howtonia
 
Mobile communication & vo ip
Mobile communication & vo ipMobile communication & vo ip
Mobile communication & vo ip
noyon2518
 
bhditi9xsvyq8jkyqibs-signature-d95a7be852fd787fe3daa50aff242cb4cf0ee27e0d0f4f...
bhditi9xsvyq8jkyqibs-signature-d95a7be852fd787fe3daa50aff242cb4cf0ee27e0d0f4f...bhditi9xsvyq8jkyqibs-signature-d95a7be852fd787fe3daa50aff242cb4cf0ee27e0d0f4f...
bhditi9xsvyq8jkyqibs-signature-d95a7be852fd787fe3daa50aff242cb4cf0ee27e0d0f4f...
20269vinay
 

Similar to Sumang singhal wifi (20)

Wi fi
Wi fiWi fi
Wi fi
 
Wifi tecnology
Wifi tecnology Wifi tecnology
Wifi tecnology
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
972003
972003972003
972003
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wifi
WifiWifi
Wifi
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Presentation2
Presentation2Presentation2
Presentation2
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology Writeup
 
44.pptx
44.pptx44.pptx
44.pptx
 
Internet & it's concepts
Internet & it's conceptsInternet & it's concepts
Internet & it's concepts
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx
 
Integrating wi fi for mobile networks
Integrating wi fi for mobile networksIntegrating wi fi for mobile networks
Integrating wi fi for mobile networks
 
How to Share Wifi Password from Your iPhone
How to Share Wifi Password from Your iPhoneHow to Share Wifi Password from Your iPhone
How to Share Wifi Password from Your iPhone
 
Mobile communication & vo ip
Mobile communication & vo ipMobile communication & vo ip
Mobile communication & vo ip
 
bhditi9xsvyq8jkyqibs-signature-d95a7be852fd787fe3daa50aff242cb4cf0ee27e0d0f4f...
bhditi9xsvyq8jkyqibs-signature-d95a7be852fd787fe3daa50aff242cb4cf0ee27e0d0f4f...bhditi9xsvyq8jkyqibs-signature-d95a7be852fd787fe3daa50aff242cb4cf0ee27e0d0f4f...
bhditi9xsvyq8jkyqibs-signature-d95a7be852fd787fe3daa50aff242cb4cf0ee27e0d0f4f...
 
The importance of wi fi
The importance of wi fiThe importance of wi fi
The importance of wi fi
 

Recently uploaded

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 

Sumang singhal wifi

  • 2. Introduction Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless mode. Wi-Fi is a generic term that refers to the IEEE 802.11 communications standard for Wireless Local Area Networks (WLANs). Wi-Fi Network connect computers to each other, to the internet and to the wired network. Wi-Fi works on physical and data link layer.
  • 4. Purpose  The purpose of Wi-Fi is to hide complexity by enabling wireless access to applications and data, media and streams.  The main aims of Wi-Fi are:  make access to information easier  ensure compatibility and co-existence of devices  eliminate complex cabling  eliminate switches, adapters, plugs, pins and connectors Wi-Fi Technology
  • 5. How a Wi-Fi Network Works
  • 6. Devices & Components PCI adapter (inside) USB adapter (outside) PCMCIA Card (Portables) Wi-Fi Technology
  • 9. 9 Advantages  Freedom – You can work from any location that you can get a signal.  Setup Cost – No cabling required.  Flexibility – Quick and easy to setup in temp or permanent space.  Scaleable – Can be expanded with growth.  Mobile Access – Can access the network on the move.
  • 10. 10 Disadvantages  Speed – Slower than cable.  Range – Affected by various medium.  Travels best through open space.  Reduced by walls, glass, water, etc  Security – Greater exposure to risks.  Unauthorized access.  Compromising data.  Denial of service.
  • 11. 11 Uses of Wifi 1. Connecting to Internet 2. Turn Your Smartphone into a Remote Control 3. Send Documents to Your Printer from Any Computer 4. Forward Notifications from Your Smartphone to Your PC 5. Tether Your Smartphone to Your Computer for Internet Anywhere 6. Share Files with Nearby Computers 7. Wirelessly Transfer Photos from Your Digital Camera 8. Many electronic devices use Wi-Fi due to its simple functions. 9. Companies use Wi-Fi to create wireless networks within their company. 10.Phone companies such as use Wi-Fi Hot Spots for their users to get free calling/internet access. 11.Gaming companies like Nintendo use Wi-Fi to synch their products and to use global network usage
  • 12. 12 Health Risks 1. Contributes to the Development of Insomn 2. Damaging to Childhood Development 3. Affects Cell Growth 4. Derails Brain Function 5. Reduces Brain Activity in Females 6. Neutralizes Sperm 7. May Impact Fertility 8. Provokes Cardiac Stress 9. Linked to Cancer?
  • 13. 13 What Makes them Dangerous ? 1.Wireless routers – as well as Bluetooth and similar wireless systems – give off electromagnetic radiation in the low- gigahertz frequency. This level is considered potentially dangerous to people. 2.The wireless signals can pass through walls. 3.. Most routers are not turned off at night, so you are exposed 24/7.
  • 14. 14 If you're not ready to completely get rid of wireless stuff, you can at least reduce your family's radiation by: • Tell your family to try to not use their cell phone: Put your cell phone in Airplane Mode, or turn it off, then just turn it on to check messages or make a quick call, then turn i back off. Keep it for emergencies. As long as your cell phone is on, it emits radiation continually (to you and everyone within 10 feet of you), even when you are not actually making a call. • Children Should NEVER Use Cell Phones: • Use a corded phone at home and at work • Reduce or stop using other wireless devices • Keep laptops away from the body and don’t use a laptop while it rests on the lap. • Use your cell phone only where reception is good • Keep your cell phone away from your body when it’s on • Use safer headset technology