SlideShare a Scribd company logo
WIRELESS-FIDELITY
1
BASIC KNOWLEDGE OF WI-FI
Wi-Fi stand for wireless Fidelity.
Wi-Fi is a mean of connecting
wireless devices to Each other in
order to exchange Data.
Wi-Fi is the of a wireless networking
Technology that uses radio waves to
provide high speed network and
internet connection.
2
Waves
3
MEANING OF WIRELESS
The Word wireless is Dictionary
defined as “having no wires”.
In Networking Terminology ,
wireless is the term used to
described any computer network
where there no Physical wire
Connection..
4
CONTINUE…
between Sender and Receiver, But
rather the Network is connected by
radio Waves and or microwaves to
maintain Communication.
5
WHAT IS WI-FI?
Wi-Fi is Actually a Brand Name for
a Set of Security and Hardware
function protocols which aim to help
Ensure that a Wi-Fi connectivity is
Secure And Easy to configure.
Established These approved
protocols Creates a Wi-Fi certified
Network, 6
CONTINUE...
Which can Help connect Your
Business Data And Ensure a
Secure connection .
Wi-Fi brand means that your
products and their configure follow
hardware and security
requirements.
7
MAIN AIM OF WI-FI
Eliminate cabling and wiring.
Eliminate Switches, plug, pins and
connectors.
8
STANDARD OF WI-FI
802.11,
802.11b,
802.11a,
802.11g.
9
802.11 AND 802.11B STANDARD
802.11 standard only supported a
maximum network bandwidth of 2
mbps too for most application.
802.11a It support bandwidth up
to 11 mbps
10
802.11a STANDARD
It support bandwidth up to 54
mbps .
It fast maximum speed.
Highest cost
11
HOW WI-FI WORKS?
A wireless access point(WAP)
connects a group of wireless
devices to an adjacent wired LAN.
Wireless adapters allow devices
to connect to a wireless network.
12
Continue…
Wireless routers integrate Wireless
Access Points.
A wireless router allows wired and
wireless Ethernet LAN devices to
connect to a single WAN device such
as a cable modem or a DSL modem.
13
Continue…
To connect to a Wi-Fi LAN, a
computer or device has to be
equipped with a wireless network
interface controller.
The combination of computer and
interface controller is called a
station.
14
Continue…
All station share a single radio
frequency communication channel.
Transmissions on this channel are
received by all station within range.
15
16
INTERNET ACCESS
A Wi-Fi enabled device can connect
to the internet when within range of a
wireless network.
The coverage of one or more access
point called hotspots.
17
Continue…
Wi-Fi provides service in private homes,
streets, and independent businesses as
well as in public spaces.
Router that incorporate a DSL modem of a
cable modem and a Wi-Fi access point,
often set up in homes and other buildings,
provide internet access to all devices
connected to them.
18
19
Continue…
Now a day there is city wide Wi-
Fi, campus wide Wi-Fi that
provides a services to that areas.
Wi-Fi also allows a
communication directly from one
computer to another without an
access point intermediary called
ad hoc Wi-Fi transmission.
20
Continue…
The wireless ad hoc network mode
has proven popular with digital
cameras, game consoles and other
consumer electronics devices.
Some devices can also share their
internet connection using ad-hoc,
becoming hotspots or “virtual
routers”. 21
22
RANGE
 Wi-Fi network have limited range. A typical wireless
access point using 802.11b or 802.11g with a stock
antenna might have a range of 32 m indoors and
95m outdoors.
 Range also varies with frequency band. Wi-Fi in the
2.4 GHz frequency block has slightly better range
than Wi-Fi in the 5 GHz frequency block which is
used by 802.11a and optionally by 802.11n.
 On wireless routers with detachable antennas, it is
possible to improve range by fitting upgraded
antennas which have higher gain in particular
directions.
23
SECURITY
 In Wi-Fi The most common wireless
encryption-standard, Wired Equivalent
Privacy (WEP), has been shown to be easily
breakable.
 After that Wi-Fi Protected Access (WPA and
WPA2) encryption standards develop which
solve the security problem of WEP.
24
ADVANTAGES
Wi-Fi allows cheaper deployment of LANs.
Also spaces where cables cannot be run,
such as outdoor areas and historical
buildings, can host wireless LANs.
Wi-Fi Protect Access encryption (WPA2) is
considered secure, provided a strong
passphrase is used.
25
LIMITATION
 Wi-Fi connections can be disrupted or the
internet speed lowered by having other
devices in the same area.
 Wi-Fi is a wireless technology which can
only be used for limited geographical area.
 The major weakness of Wi-Fi is that it does
not allow clear and quality media streaming
because of weak signal transfer rate.
26
27
SUMMARY
 Introduction of Wi-Fi..
 How it works..
 Internet Access..
 Security...
 Range...
 Advantages...
 Limitation...
 Video...
28
THANK YOU…
29

More Related Content

What's hot

Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
Ravi Rajput
 
WIFI Technology
WIFI TechnologyWIFI Technology
WIFI Technology
Mohamed Hafez
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
Gurpreet Singh
 
Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Concept
kodela3
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
Shubham Singh
 
Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558
Praveen Reddy
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
Hem Pokhrel
 
Wifi technology
Wifi technologyWifi technology
Wifi technology
Biju Patnaik University
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
Zul Fikri
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
HasanMaster
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
Yousaf Sahota
 
WIFI TECHNOLOGY
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
Ajnish Rana
 
WIFI
WIFIWIFI
Wi-Fi Technology Presentation
Wi-Fi Technology PresentationWi-Fi Technology Presentation
Wi-Fi Technology Presentation
SIDJD
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology WriteupShital Kat
 

What's hot (20)

Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
 
WIFI Technology
WIFI TechnologyWIFI Technology
WIFI Technology
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 
WIFI[autosaved]
WIFI[autosaved]WIFI[autosaved]
WIFI[autosaved]
 
Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Concept
 
wifi ppt
wifi pptwifi ppt
wifi ppt
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558
 
wi-fi ppt
wi-fi pptwi-fi ppt
wi-fi ppt
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wi fi
Wi fiWi fi
Wi fi
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
Wifi technology
Wifi technologyWifi technology
Wifi technology
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
WIFI TECHNOLOGY
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
 
WIFI
WIFIWIFI
WIFI
 
Wi-Fi Technology Presentation
Wi-Fi Technology PresentationWi-Fi Technology Presentation
Wi-Fi Technology Presentation
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology Writeup
 

Viewers also liked

Historie pi en
Historie pi enHistorie pi en
Historie pi en
etwinning123
 
Social commerce
Social commerceSocial commerce
Social commerce
Jose A. del Moral
 
Seminar
SeminarSeminar
Seminar
cnnithin
 
Lunch2.0 - Geolocation - July 2010
Lunch2.0 - Geolocation - July 2010Lunch2.0 - Geolocation - July 2010
Lunch2.0 - Geolocation - July 2010
Jeff Schneidewind
 
Wireless fidelity (a.k.a Wi-Fi)
Wireless fidelity (a.k.a Wi-Fi)Wireless fidelity (a.k.a Wi-Fi)
Wireless fidelity (a.k.a Wi-Fi)
Vineet Sansare
 
Chek mate geolocation analyzer
Chek mate geolocation analyzerChek mate geolocation analyzer
Chek mate geolocation analyzer
priyal mistry
 
HTML5 Geolocation API
HTML5 Geolocation APIHTML5 Geolocation API
HTML5 Geolocation APIFilip Mares
 
Pi number results_questionnaire_en
Pi number results_questionnaire_enPi number results_questionnaire_en
Pi number results_questionnaire_en
etwinning123
 
Wi-Fi Tecnology
Wi-Fi TecnologyWi-Fi Tecnology
Wi-Fi Tecnology
kataria Arvind
 
Vehicular sensor netwks ppt
Vehicular sensor netwks pptVehicular sensor netwks ppt
Vehicular sensor netwks ppt
Venkatesh Kaduru
 
W3C Geolocation API - Making Websites Location-aware
W3C Geolocation API - Making Websites Location-awareW3C Geolocation API - Making Websites Location-aware
W3C Geolocation API - Making Websites Location-aware
Ryan Sarver
 
Wlan 802.11n - MAC Sublayer
Wlan 802.11n - MAC SublayerWlan 802.11n - MAC Sublayer
Wlan 802.11n - MAC Sublayer
Md Syed Ahamad
 
What is Bluetooth Smart? - Technical Version
What is Bluetooth Smart? - Technical VersionWhat is Bluetooth Smart? - Technical Version
What is Bluetooth Smart? - Technical Version
Veacon
 
Vehicular ad hoc network
Vehicular ad hoc networkVehicular ad hoc network
Vehicular ad hoc network
Talesun Solar USA Ltd.
 
Vehicular network
Vehicular networkVehicular network
Vehicular network
Dr Shashikant Athawale
 
Mechanism of a Microwave Oven.
Mechanism of a Microwave Oven.Mechanism of a Microwave Oven.
Mechanism of a Microwave Oven.
Md. Afif Al Mamun
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
swatikamat
 

Viewers also liked (20)

Historie pi en
Historie pi enHistorie pi en
Historie pi en
 
Social commerce
Social commerceSocial commerce
Social commerce
 
Seminar
SeminarSeminar
Seminar
 
Lunch2.0 - Geolocation - July 2010
Lunch2.0 - Geolocation - July 2010Lunch2.0 - Geolocation - July 2010
Lunch2.0 - Geolocation - July 2010
 
Wireless fidelity (a.k.a Wi-Fi)
Wireless fidelity (a.k.a Wi-Fi)Wireless fidelity (a.k.a Wi-Fi)
Wireless fidelity (a.k.a Wi-Fi)
 
Chek mate geolocation analyzer
Chek mate geolocation analyzerChek mate geolocation analyzer
Chek mate geolocation analyzer
 
HTML5 Geolocation API
HTML5 Geolocation APIHTML5 Geolocation API
HTML5 Geolocation API
 
Pi number results_questionnaire_en
Pi number results_questionnaire_enPi number results_questionnaire_en
Pi number results_questionnaire_en
 
Wi-Fi Tecnology
Wi-Fi TecnologyWi-Fi Tecnology
Wi-Fi Tecnology
 
Vehicular sensor netwks ppt
Vehicular sensor netwks pptVehicular sensor netwks ppt
Vehicular sensor netwks ppt
 
W3C Geolocation API - Making Websites Location-aware
W3C Geolocation API - Making Websites Location-awareW3C Geolocation API - Making Websites Location-aware
W3C Geolocation API - Making Websites Location-aware
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
Vehicular Networks
Vehicular NetworksVehicular Networks
Vehicular Networks
 
Wlan 802.11n - MAC Sublayer
Wlan 802.11n - MAC SublayerWlan 802.11n - MAC Sublayer
Wlan 802.11n - MAC Sublayer
 
What is Bluetooth Smart? - Technical Version
What is Bluetooth Smart? - Technical VersionWhat is Bluetooth Smart? - Technical Version
What is Bluetooth Smart? - Technical Version
 
Microwave oven
Microwave ovenMicrowave oven
Microwave oven
 
Vehicular ad hoc network
Vehicular ad hoc networkVehicular ad hoc network
Vehicular ad hoc network
 
Vehicular network
Vehicular networkVehicular network
Vehicular network
 
Mechanism of a Microwave Oven.
Mechanism of a Microwave Oven.Mechanism of a Microwave Oven.
Mechanism of a Microwave Oven.
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
 

Similar to Wi Fi

Wi Fi
Wi FiWi Fi
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
alanfhall8953
 
Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02
Zameer Abdul Azeez Mulla
 
Wi-Fi technology
Wi-Fi technologyWi-Fi technology
Wi-Fi technology
Nazrin Parveen
 
Wifi tecnology
Wifi tecnology Wifi tecnology
Wifi tecnology
Tahseen Jawaid
 
Wi-Fi
Wi-Fi Wi-Fi
Wi-Fi
sukhdeepK
 
W I R E L E S S F I D E L I T Y
W I R E L E S S  F I D E L I T YW I R E L E S S  F I D E L I T Y
W I R E L E S S F I D E L I T Ygou145
 
PPT ON WI-FI FROM JKC COLLEGE,GUNTUR
PPT ON WI-FI FROM JKC COLLEGE,GUNTURPPT ON WI-FI FROM JKC COLLEGE,GUNTUR
PPT ON WI-FI FROM JKC COLLEGE,GUNTUR
Ezra Sastry
 
wi-fi
wi-fiwi-fi
-Communication Engineering.pptx
-Communication Engineering.pptx-Communication Engineering.pptx
-Communication Engineering.pptx
18EUEE161VISHAALRAJT
 
wireless networks.pptx
wireless networks.pptxwireless networks.pptx
wireless networks.pptx
RiazAhmad521284
 
53415140 a-paper-presentation-on-wimax
53415140 a-paper-presentation-on-wimax53415140 a-paper-presentation-on-wimax
53415140 a-paper-presentation-on-wimaxSuneel Dogra
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentationdayansaji
 
Wi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification ProcessWi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification ProcessGopiNath Rko
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentationEyad Manna
 

Similar to Wi Fi (20)

wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
 
Wi fi network
Wi fi networkWi fi network
Wi fi network
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wi-Fi technology
Wi-Fi technologyWi-Fi technology
Wi-Fi technology
 
Wifi tecnology
Wifi tecnology Wifi tecnology
Wifi tecnology
 
Wi-Fi
Wi-Fi Wi-Fi
Wi-Fi
 
W I R E L E S S F I D E L I T Y
W I R E L E S S  F I D E L I T YW I R E L E S S  F I D E L I T Y
W I R E L E S S F I D E L I T Y
 
PPT ON WI-FI FROM JKC COLLEGE,GUNTUR
PPT ON WI-FI FROM JKC COLLEGE,GUNTURPPT ON WI-FI FROM JKC COLLEGE,GUNTUR
PPT ON WI-FI FROM JKC COLLEGE,GUNTUR
 
wi-fi
wi-fiwi-fi
wi-fi
 
-Communication Engineering.pptx
-Communication Engineering.pptx-Communication Engineering.pptx
-Communication Engineering.pptx
 
wireless networks.pptx
wireless networks.pptxwireless networks.pptx
wireless networks.pptx
 
53415140 a-paper-presentation-on-wimax
53415140 a-paper-presentation-on-wimax53415140 a-paper-presentation-on-wimax
53415140 a-paper-presentation-on-wimax
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
 
Wi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification ProcessWi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification Process
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentation
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 

Wi Fi

  • 2. BASIC KNOWLEDGE OF WI-FI Wi-Fi stand for wireless Fidelity. Wi-Fi is a mean of connecting wireless devices to Each other in order to exchange Data. Wi-Fi is the of a wireless networking Technology that uses radio waves to provide high speed network and internet connection. 2
  • 4. MEANING OF WIRELESS The Word wireless is Dictionary defined as “having no wires”. In Networking Terminology , wireless is the term used to described any computer network where there no Physical wire Connection.. 4
  • 5. CONTINUE… between Sender and Receiver, But rather the Network is connected by radio Waves and or microwaves to maintain Communication. 5
  • 6. WHAT IS WI-FI? Wi-Fi is Actually a Brand Name for a Set of Security and Hardware function protocols which aim to help Ensure that a Wi-Fi connectivity is Secure And Easy to configure. Established These approved protocols Creates a Wi-Fi certified Network, 6
  • 7. CONTINUE... Which can Help connect Your Business Data And Ensure a Secure connection . Wi-Fi brand means that your products and their configure follow hardware and security requirements. 7
  • 8. MAIN AIM OF WI-FI Eliminate cabling and wiring. Eliminate Switches, plug, pins and connectors. 8
  • 10. 802.11 AND 802.11B STANDARD 802.11 standard only supported a maximum network bandwidth of 2 mbps too for most application. 802.11a It support bandwidth up to 11 mbps 10
  • 11. 802.11a STANDARD It support bandwidth up to 54 mbps . It fast maximum speed. Highest cost 11
  • 12. HOW WI-FI WORKS? A wireless access point(WAP) connects a group of wireless devices to an adjacent wired LAN. Wireless adapters allow devices to connect to a wireless network. 12
  • 13. Continue… Wireless routers integrate Wireless Access Points. A wireless router allows wired and wireless Ethernet LAN devices to connect to a single WAN device such as a cable modem or a DSL modem. 13
  • 14. Continue… To connect to a Wi-Fi LAN, a computer or device has to be equipped with a wireless network interface controller. The combination of computer and interface controller is called a station. 14
  • 15. Continue… All station share a single radio frequency communication channel. Transmissions on this channel are received by all station within range. 15
  • 16. 16
  • 17. INTERNET ACCESS A Wi-Fi enabled device can connect to the internet when within range of a wireless network. The coverage of one or more access point called hotspots. 17
  • 18. Continue… Wi-Fi provides service in private homes, streets, and independent businesses as well as in public spaces. Router that incorporate a DSL modem of a cable modem and a Wi-Fi access point, often set up in homes and other buildings, provide internet access to all devices connected to them. 18
  • 19. 19
  • 20. Continue… Now a day there is city wide Wi- Fi, campus wide Wi-Fi that provides a services to that areas. Wi-Fi also allows a communication directly from one computer to another without an access point intermediary called ad hoc Wi-Fi transmission. 20
  • 21. Continue… The wireless ad hoc network mode has proven popular with digital cameras, game consoles and other consumer electronics devices. Some devices can also share their internet connection using ad-hoc, becoming hotspots or “virtual routers”. 21
  • 22. 22
  • 23. RANGE  Wi-Fi network have limited range. A typical wireless access point using 802.11b or 802.11g with a stock antenna might have a range of 32 m indoors and 95m outdoors.  Range also varies with frequency band. Wi-Fi in the 2.4 GHz frequency block has slightly better range than Wi-Fi in the 5 GHz frequency block which is used by 802.11a and optionally by 802.11n.  On wireless routers with detachable antennas, it is possible to improve range by fitting upgraded antennas which have higher gain in particular directions. 23
  • 24. SECURITY  In Wi-Fi The most common wireless encryption-standard, Wired Equivalent Privacy (WEP), has been shown to be easily breakable.  After that Wi-Fi Protected Access (WPA and WPA2) encryption standards develop which solve the security problem of WEP. 24
  • 25. ADVANTAGES Wi-Fi allows cheaper deployment of LANs. Also spaces where cables cannot be run, such as outdoor areas and historical buildings, can host wireless LANs. Wi-Fi Protect Access encryption (WPA2) is considered secure, provided a strong passphrase is used. 25
  • 26. LIMITATION  Wi-Fi connections can be disrupted or the internet speed lowered by having other devices in the same area.  Wi-Fi is a wireless technology which can only be used for limited geographical area.  The major weakness of Wi-Fi is that it does not allow clear and quality media streaming because of weak signal transfer rate. 26
  • 27. 27
  • 28. SUMMARY  Introduction of Wi-Fi..  How it works..  Internet Access..  Security...  Range...  Advantages...  Limitation...  Video... 28