SlideShare a Scribd company logo
802.11
The evolution
of Wi-Fi
BONEY MAUNDU
What is IEEE 802.11?
IEEE 802 is a collection of Local Area networking standards that specify and describe communication
protocols for technologies such as Ethernet and wireless.
802.11 is therefore a standard that describes procedures, values, algorithms, and limits to establish a
Wireless Local Area Network connection, what has come to be popularly referred to simply as Wi-Fi.
IEEE 802.11 is the foundation for Wi-Fi devices. The Wi-Fi Alliance owns the trademark Wi-Fi, which verifies the
interoperability of all products using the Wi-Fi trademark using established testing.
Since its inception in 1997, Wi-Fi standards have changed throughout time, bringing with them improvements to data
transfer rates, signal ranges, and connections that are more reliable and secure.
802.11
It’s the pioneering Wi-Fi standard, introduced in 1997 and operating at 2.4 GHz. It’s the basis for all
subsequent Wi-Fi wireless network standards, the world's most widely used wireless computer networking
protocols.
It uses the CSMA/CA protocol (Carrier Sense Multiple Access with Collision Avoidance), which supports
data rates of up to 2 mbps and two transmission technologies: Frequency Hopping Spread Spectrum and
Direct Sequence Spread Spectrum. This standard is now all but obsolete.
802.11b (Wi-Fi 1)
First introduced in 1999, it had a theoretical maximum data rate of 11 Mbps and also used the CSMA/CA
medium access method as its predecessor. The substantial increase in throughput encouraged its wide
uptake as a wireless technology.
This standard shares the same frequency bandwidth as other wireless standards and can be susceptible to signal
interference in a home setting with other wireless devices like cordless phones, microwave ovens, and blue tooth
devices.
802.11a (Wi-Fi 2)
Also introduced in 1999, it operates at 5 GHz and uses Orthogonal Frequency Division Multiplexing (OFDM) with a
maximum theoretical data rate of 54 Mbps.
The 5 GHz frequency gave it a significant advantage over its predecessor with the 2.4 GHz Frequency due
to its lower susceptibility to signal interference, but the downside was that its overall range was shorter,
and it was therefore not widely accepted because of this fact. In addition, 5 GHz devices were costlier and
incompatible with 802.11b.
802.11g (Wi-Fi 3)
Introduced in 2003. Like its predecessor, it uses OFDM and supports a maximum theoretical rate of 54
Mbps, but it operates on a 2.4 GHz frequency, which gives it better range but makes it more susceptible to
interference. It’s also backwards compatible with 802.11b, which means 802.11b devices can connect to an
802.11g access point.
802.11n (Wi-Fi 4)
The introduction of 802.11n in 2009 made Wi-Fi quicker and more dependable by adopting MIMO (Multiple-
Input, Multiple-Output), a technique for increasing a radio link's capacity by using multiple transmit and
receive antennas to take advantage of multipath signal propagation.
It can support maximum theoretical throughput of 600 Mbps and operates on both 2.4 GHz and 5 GHz
frequencies and its backwards compatible to Wi-Fi 3, 2 and 1.
802.11ac (Wi-Fi 5)
It was introduced in 2013 and could support a maximum theoretical throughput of 3.5 Gbps, a feat that
was achieved by improving 802.11n concepts that included wider bandwidth, MU-MIMO (multi-use MIMO),
beam forming, and high density modulations.
Wi-Fi 5 operates exclusively on a 5 GHz frequency.
802.11ax (W-Fi 6)
It’s the sixth generation of Wi-Fi and the most recent, having been introduced in 2021. Its theoretical data
rate is 9.6 Gbps, though its main strength is its ability to work well in places with dense, pervasive Wi-Fi
traffic, like concert halls and stadiums or even homes with a lot of wireless devices, where 2.4 GHz and 5
GHz frequencies would greatly degrade due to over-interference.
It achieves this through denser modulation, mechanisms to support longer-range outdoor deployments,
and reduced subcarrier spacing, even though it operates on both 2.4 GHz and 5 GHz frequencies. It’s also
backwards compatible with 802.11a/g/n/ac devices.
Wi-Fi 6E is an extension of Wi-Fi 6 and uses the 6 GHz frequency band, but it's only limited to 6 GHz-capable
devices and applications.
802.11be (Wi-Fi 7)
Wi-Fi 7, which is still under development, is slated for deployment in 2024 and might achieve data rates of
about 40 Gbps and almost double the bandwidth of Wi-Fi 6.
Wi-Fi 7 technology will be substantially quicker, have much lower latency, support many more devices, and
perform much better in crowded Wi-Fi locations and where Wi-Fi networks overlap as a result of all these
technical advancements.

More Related Content

Similar to The Evolution of Wi-Fi Standards - Boney Maundu.pdf

4.report (gi fi technology)
4.report (gi fi technology)4.report (gi fi technology)
4.report (gi fi technology)
JIEMS Akkalkuwa
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
Nitin .
 
WI-FI
WI-FIWI-FI
2.4 GHz vs 5 GHz Wi-Fi.pdf
2.4 GHz vs 5 GHz Wi-Fi.pdf2.4 GHz vs 5 GHz Wi-Fi.pdf
2.4 GHz vs 5 GHz Wi-Fi.pdf
Boney Maundu Slim
 
Wi fi
Wi fiWi fi
Wi gig abstract
Wi gig abstractWi gig abstract
Wi gig abstract
Abida Zama
 
Gigabit fidelity
Gigabit fidelityGigabit fidelity
Gigabit fidelity
misbha afreen
 
WI-FI and Wi Max
WI-FI and Wi MaxWI-FI and Wi Max
WI-FI and Wi Max
Siyad Ca
 
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
ijtsrd
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
Hem Pokhrel
 
W I R E L E S S F I D E L I T Y
W I R E L E S S  F I D E L I T YW I R E L E S S  F I D E L I T Y
W I R E L E S S F I D E L I T Ygou145
 
53415140 a-paper-presentation-on-wimax
53415140 a-paper-presentation-on-wimax53415140 a-paper-presentation-on-wimax
53415140 a-paper-presentation-on-wimaxSuneel Dogra
 
WI FI VS LI FI
WI FI VS LI FIWI FI VS LI FI
WI FI VS LI FI
QASIM ANWAR CHAUDARY
 
Intro to Enterprise Wi-Fi Troubleshooting
Intro to Enterprise Wi-Fi TroubleshootingIntro to Enterprise Wi-Fi Troubleshooting
Intro to Enterprise Wi-Fi Troubleshooting
Fast Lane Consulting and Education, Inc.
 
Wireless technology BY ARUN
Wireless technology BY ARUNWireless technology BY ARUN
Wireless technology BY ARUNArun Franco
 
Ieee 802 standards
Ieee 802 standardsIeee 802 standards

Similar to The Evolution of Wi-Fi Standards - Boney Maundu.pdf (20)

4.report (gi fi technology)
4.report (gi fi technology)4.report (gi fi technology)
4.report (gi fi technology)
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
WI-FI
WI-FIWI-FI
WI-FI
 
2.4 GHz vs 5 GHz Wi-Fi.pdf
2.4 GHz vs 5 GHz Wi-Fi.pdf2.4 GHz vs 5 GHz Wi-Fi.pdf
2.4 GHz vs 5 GHz Wi-Fi.pdf
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi gig abstract
Wi gig abstractWi gig abstract
Wi gig abstract
 
Gigabit fidelity
Gigabit fidelityGigabit fidelity
Gigabit fidelity
 
WI-FI and Wi Max
WI-FI and Wi MaxWI-FI and Wi Max
WI-FI and Wi Max
 
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
W I R E L E S S F I D E L I T Y
W I R E L E S S  F I D E L I T YW I R E L E S S  F I D E L I T Y
W I R E L E S S F I D E L I T Y
 
53415140 a-paper-presentation-on-wimax
53415140 a-paper-presentation-on-wimax53415140 a-paper-presentation-on-wimax
53415140 a-paper-presentation-on-wimax
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
Wi-fi
Wi-fiWi-fi
Wi-fi
 
WI FI VS LI FI
WI FI VS LI FIWI FI VS LI FI
WI FI VS LI FI
 
Intro to Enterprise Wi-Fi Troubleshooting
Intro to Enterprise Wi-Fi TroubleshootingIntro to Enterprise Wi-Fi Troubleshooting
Intro to Enterprise Wi-Fi Troubleshooting
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
11ac the next evolution of wi fi
11ac the next evolution of wi fi11ac the next evolution of wi fi
11ac the next evolution of wi fi
 
Wireless technology BY ARUN
Wireless technology BY ARUNWireless technology BY ARUN
Wireless technology BY ARUN
 
Ieee 802 standards
Ieee 802 standardsIeee 802 standards
Ieee 802 standards
 

More from Boney Maundu Slim

DO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdf
DO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdfDO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdf
DO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdf
Boney Maundu Slim
 
MESH WIFI NETWORK : An understanding of Mesh Networking
MESH WIFI NETWORK : An understanding of Mesh NetworkingMESH WIFI NETWORK : An understanding of Mesh Networking
MESH WIFI NETWORK : An understanding of Mesh Networking
Boney Maundu Slim
 
MESH WIFI.pdf
MESH WIFI.pdfMESH WIFI.pdf
MESH WIFI.pdf
Boney Maundu Slim
 
INCOGNITO MODE - IT'S NOT AS PRIVATE AS YOU THINK.pdf
INCOGNITO MODE - IT'S NOT AS PRIVATE AS YOU THINK.pdfINCOGNITO MODE - IT'S NOT AS PRIVATE AS YOU THINK.pdf
INCOGNITO MODE - IT'S NOT AS PRIVATE AS YOU THINK.pdf
Boney Maundu Slim
 
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdfPHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
Boney Maundu Slim
 
WIFI CAMERA JAMMER.pdf
WIFI CAMERA JAMMER.pdfWIFI CAMERA JAMMER.pdf
WIFI CAMERA JAMMER.pdf
Boney Maundu Slim
 
WI-FI EXTENDER VS WIRELESS ACCESS POINT.pdf
WI-FI EXTENDER VS WIRELESS ACCESS POINT.pdfWI-FI EXTENDER VS WIRELESS ACCESS POINT.pdf
WI-FI EXTENDER VS WIRELESS ACCESS POINT.pdf
Boney Maundu Slim
 
SURVEILLANCE HARD DRIVE vs DESKTOP HARD DRIVE.pdf
SURVEILLANCE HARD DRIVE vs DESKTOP HARD DRIVE.pdfSURVEILLANCE HARD DRIVE vs DESKTOP HARD DRIVE.pdf
SURVEILLANCE HARD DRIVE vs DESKTOP HARD DRIVE.pdf
Boney Maundu Slim
 
REGULAR CAR BATTERY VS DEEP CYCCLE BATTERY.pdf
REGULAR CAR BATTERY VS DEEP CYCCLE BATTERY.pdfREGULAR CAR BATTERY VS DEEP CYCCLE BATTERY.pdf
REGULAR CAR BATTERY VS DEEP CYCCLE BATTERY.pdf
Boney Maundu Slim
 
CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for business own...
CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for business own...CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for business own...
CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for business own...
Boney Maundu Slim
 
CELL SIGNAL - What Causes Poor Cellphone SIgnal.pdf
CELL SIGNAL - What Causes Poor Cellphone SIgnal.pdfCELL SIGNAL - What Causes Poor Cellphone SIgnal.pdf
CELL SIGNAL - What Causes Poor Cellphone SIgnal.pdf
Boney Maundu Slim
 
PARALLEL VS SERIES BATTERY CONNECTION.pdf
PARALLEL VS SERIES BATTERY CONNECTION.pdfPARALLEL VS SERIES BATTERY CONNECTION.pdf
PARALLEL VS SERIES BATTERY CONNECTION.pdf
Boney Maundu Slim
 
LAN CABLES - A comparative understanding of types of Cable for Local Area Ne...
LAN CABLES -  A comparative understanding of types of Cable for Local Area Ne...LAN CABLES -  A comparative understanding of types of Cable for Local Area Ne...
LAN CABLES - A comparative understanding of types of Cable for Local Area Ne...
Boney Maundu Slim
 
Stand Alone Security Cameras - A Guide.pdf
Stand Alone Security Cameras - A Guide.pdfStand Alone Security Cameras - A Guide.pdf
Stand Alone Security Cameras - A Guide.pdf
Boney Maundu Slim
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Boney Maundu Slim
 
Analog vs IP CCTV Security Systems: A Buyer's Guide
Analog vs IP CCTV Security Systems: A Buyer's GuideAnalog vs IP CCTV Security Systems: A Buyer's Guide
Analog vs IP CCTV Security Systems: A Buyer's Guide
Boney Maundu Slim
 
Security Camera Systems - Buyers' guide and Best Practices for home owners.pdf
Security Camera Systems - Buyers' guide and Best Practices for home owners.pdfSecurity Camera Systems - Buyers' guide and Best Practices for home owners.pdf
Security Camera Systems - Buyers' guide and Best Practices for home owners.pdf
Boney Maundu Slim
 
CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for Business Own...
CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for Business Own...CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for Business Own...
CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for Business Own...
Boney Maundu Slim
 
Slim bz smart wifi camera
Slim bz   smart wifi cameraSlim bz   smart wifi camera
Slim bz smart wifi camera
Boney Maundu Slim
 

More from Boney Maundu Slim (19)

DO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdf
DO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdfDO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdf
DO SECURITY SIGNS DETER CRIMINALS AND CRIMINAL BEAHVIOUR.pdf
 
MESH WIFI NETWORK : An understanding of Mesh Networking
MESH WIFI NETWORK : An understanding of Mesh NetworkingMESH WIFI NETWORK : An understanding of Mesh Networking
MESH WIFI NETWORK : An understanding of Mesh Networking
 
MESH WIFI.pdf
MESH WIFI.pdfMESH WIFI.pdf
MESH WIFI.pdf
 
INCOGNITO MODE - IT'S NOT AS PRIVATE AS YOU THINK.pdf
INCOGNITO MODE - IT'S NOT AS PRIVATE AS YOU THINK.pdfINCOGNITO MODE - IT'S NOT AS PRIVATE AS YOU THINK.pdf
INCOGNITO MODE - IT'S NOT AS PRIVATE AS YOU THINK.pdf
 
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdfPHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
 
WIFI CAMERA JAMMER.pdf
WIFI CAMERA JAMMER.pdfWIFI CAMERA JAMMER.pdf
WIFI CAMERA JAMMER.pdf
 
WI-FI EXTENDER VS WIRELESS ACCESS POINT.pdf
WI-FI EXTENDER VS WIRELESS ACCESS POINT.pdfWI-FI EXTENDER VS WIRELESS ACCESS POINT.pdf
WI-FI EXTENDER VS WIRELESS ACCESS POINT.pdf
 
SURVEILLANCE HARD DRIVE vs DESKTOP HARD DRIVE.pdf
SURVEILLANCE HARD DRIVE vs DESKTOP HARD DRIVE.pdfSURVEILLANCE HARD DRIVE vs DESKTOP HARD DRIVE.pdf
SURVEILLANCE HARD DRIVE vs DESKTOP HARD DRIVE.pdf
 
REGULAR CAR BATTERY VS DEEP CYCCLE BATTERY.pdf
REGULAR CAR BATTERY VS DEEP CYCCLE BATTERY.pdfREGULAR CAR BATTERY VS DEEP CYCCLE BATTERY.pdf
REGULAR CAR BATTERY VS DEEP CYCCLE BATTERY.pdf
 
CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for business own...
CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for business own...CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for business own...
CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for business own...
 
CELL SIGNAL - What Causes Poor Cellphone SIgnal.pdf
CELL SIGNAL - What Causes Poor Cellphone SIgnal.pdfCELL SIGNAL - What Causes Poor Cellphone SIgnal.pdf
CELL SIGNAL - What Causes Poor Cellphone SIgnal.pdf
 
PARALLEL VS SERIES BATTERY CONNECTION.pdf
PARALLEL VS SERIES BATTERY CONNECTION.pdfPARALLEL VS SERIES BATTERY CONNECTION.pdf
PARALLEL VS SERIES BATTERY CONNECTION.pdf
 
LAN CABLES - A comparative understanding of types of Cable for Local Area Ne...
LAN CABLES -  A comparative understanding of types of Cable for Local Area Ne...LAN CABLES -  A comparative understanding of types of Cable for Local Area Ne...
LAN CABLES - A comparative understanding of types of Cable for Local Area Ne...
 
Stand Alone Security Cameras - A Guide.pdf
Stand Alone Security Cameras - A Guide.pdfStand Alone Security Cameras - A Guide.pdf
Stand Alone Security Cameras - A Guide.pdf
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
 
Analog vs IP CCTV Security Systems: A Buyer's Guide
Analog vs IP CCTV Security Systems: A Buyer's GuideAnalog vs IP CCTV Security Systems: A Buyer's Guide
Analog vs IP CCTV Security Systems: A Buyer's Guide
 
Security Camera Systems - Buyers' guide and Best Practices for home owners.pdf
Security Camera Systems - Buyers' guide and Best Practices for home owners.pdfSecurity Camera Systems - Buyers' guide and Best Practices for home owners.pdf
Security Camera Systems - Buyers' guide and Best Practices for home owners.pdf
 
CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for Business Own...
CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for Business Own...CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for Business Own...
CCTV SECURITY CAMERA SYSTEMS - Buyers guide & Best practices for Business Own...
 
Slim bz smart wifi camera
Slim bz   smart wifi cameraSlim bz   smart wifi camera
Slim bz smart wifi camera
 

Recently uploaded

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 

Recently uploaded (20)

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 

The Evolution of Wi-Fi Standards - Boney Maundu.pdf

  • 2. What is IEEE 802.11? IEEE 802 is a collection of Local Area networking standards that specify and describe communication protocols for technologies such as Ethernet and wireless. 802.11 is therefore a standard that describes procedures, values, algorithms, and limits to establish a Wireless Local Area Network connection, what has come to be popularly referred to simply as Wi-Fi. IEEE 802.11 is the foundation for Wi-Fi devices. The Wi-Fi Alliance owns the trademark Wi-Fi, which verifies the interoperability of all products using the Wi-Fi trademark using established testing. Since its inception in 1997, Wi-Fi standards have changed throughout time, bringing with them improvements to data transfer rates, signal ranges, and connections that are more reliable and secure. 802.11 It’s the pioneering Wi-Fi standard, introduced in 1997 and operating at 2.4 GHz. It’s the basis for all subsequent Wi-Fi wireless network standards, the world's most widely used wireless computer networking protocols. It uses the CSMA/CA protocol (Carrier Sense Multiple Access with Collision Avoidance), which supports data rates of up to 2 mbps and two transmission technologies: Frequency Hopping Spread Spectrum and Direct Sequence Spread Spectrum. This standard is now all but obsolete. 802.11b (Wi-Fi 1) First introduced in 1999, it had a theoretical maximum data rate of 11 Mbps and also used the CSMA/CA medium access method as its predecessor. The substantial increase in throughput encouraged its wide uptake as a wireless technology. This standard shares the same frequency bandwidth as other wireless standards and can be susceptible to signal interference in a home setting with other wireless devices like cordless phones, microwave ovens, and blue tooth devices. 802.11a (Wi-Fi 2) Also introduced in 1999, it operates at 5 GHz and uses Orthogonal Frequency Division Multiplexing (OFDM) with a maximum theoretical data rate of 54 Mbps. The 5 GHz frequency gave it a significant advantage over its predecessor with the 2.4 GHz Frequency due to its lower susceptibility to signal interference, but the downside was that its overall range was shorter, and it was therefore not widely accepted because of this fact. In addition, 5 GHz devices were costlier and incompatible with 802.11b.
  • 3. 802.11g (Wi-Fi 3) Introduced in 2003. Like its predecessor, it uses OFDM and supports a maximum theoretical rate of 54 Mbps, but it operates on a 2.4 GHz frequency, which gives it better range but makes it more susceptible to interference. It’s also backwards compatible with 802.11b, which means 802.11b devices can connect to an 802.11g access point. 802.11n (Wi-Fi 4) The introduction of 802.11n in 2009 made Wi-Fi quicker and more dependable by adopting MIMO (Multiple- Input, Multiple-Output), a technique for increasing a radio link's capacity by using multiple transmit and receive antennas to take advantage of multipath signal propagation. It can support maximum theoretical throughput of 600 Mbps and operates on both 2.4 GHz and 5 GHz frequencies and its backwards compatible to Wi-Fi 3, 2 and 1. 802.11ac (Wi-Fi 5) It was introduced in 2013 and could support a maximum theoretical throughput of 3.5 Gbps, a feat that was achieved by improving 802.11n concepts that included wider bandwidth, MU-MIMO (multi-use MIMO), beam forming, and high density modulations. Wi-Fi 5 operates exclusively on a 5 GHz frequency. 802.11ax (W-Fi 6) It’s the sixth generation of Wi-Fi and the most recent, having been introduced in 2021. Its theoretical data rate is 9.6 Gbps, though its main strength is its ability to work well in places with dense, pervasive Wi-Fi traffic, like concert halls and stadiums or even homes with a lot of wireless devices, where 2.4 GHz and 5 GHz frequencies would greatly degrade due to over-interference. It achieves this through denser modulation, mechanisms to support longer-range outdoor deployments, and reduced subcarrier spacing, even though it operates on both 2.4 GHz and 5 GHz frequencies. It’s also backwards compatible with 802.11a/g/n/ac devices. Wi-Fi 6E is an extension of Wi-Fi 6 and uses the 6 GHz frequency band, but it's only limited to 6 GHz-capable devices and applications. 802.11be (Wi-Fi 7) Wi-Fi 7, which is still under development, is slated for deployment in 2024 and might achieve data rates of about 40 Gbps and almost double the bandwidth of Wi-Fi 6. Wi-Fi 7 technology will be substantially quicker, have much lower latency, support many more devices, and perform much better in crowded Wi-Fi locations and where Wi-Fi networks overlap as a result of all these technical advancements.