SlideShare a Scribd company logo
CONTENT
What is Wi-Fi network ?
Why we need Wi-Fi network ?
How a Wi-Fi network works ?
Advantages and disadvantages of Wi-Fi
Elements of Wi-Fi network
Technologies of Wi-Fi network
Topologies of Wi-Fi network
Applications of Wi-Fi network
Security threats of Wi-Fi network
Wi-Fi network security
Limitations of Wi-Fi network
Summery
What is a Wi-Fi network
 Wi-Fi is the name of a popular wireless
networking technology that uses radio
waves to provide wireless high-speed
Internet and network connections.
 In other words, Wi-Fi is a technology
that allows an electronic device to
exchange data or connect to the
internet wirelessly using 2.4 GHz UHF
and 5 GHz SHF radio waves.
Why we need Wi-Fi?
The purpose of Wi-Fi is to hide complexity by
enabling wireless access to applications
and data, media and streams.
The main aims of Wi-Fi are the following:
 make access to information easier
 ensure compatibility and co-existence of
devices
 eliminate complex cabling
 eliminate switches, adapters, plugs, pins
and connectors
How Wi-Fi works
A Wi-Fi network uses electromagnetic waves
to transmit data across a wireless network,
like a two-way radio.
A Wireless router, or access point acts as a
central hub that other wireless devices can
connect to (either for connecting to the
internet, or sharing data between devices
on the same network).
 Using a bunch of clever data compression
techniques data is converted to radio
waves, like cell phones and OTA (over the
air) TV signals, sent from one device to the
other through the air then converted
back into data.
 It is important to note that Wireless
devices are capable of two-way
communication; they can both send and
receive wireless data.
Advantages of Wi-Fi
Mobility
Ease of Installation
Flexibility
Cost
Reliability
Security
Use unlicensed part of the radio spectrum
Roaming
Speed
Disadvantages of Wi-Fi
 Wi-Fi can be less secure than wired
connections.
 To no longer the use of Wi-Fi band is
2.4GHz does not require a license in
most countries provided that is stays
below limit of 100mW
 And one accepts interference from
other sources; including interference
which causes the user devices
function.
Elements of Wi-Fi
Access point (AP) - The AP is a wireless LAN
transceiver or “base station” that can
connect one or many wireless devices
simultaneously to the Internet.
Wi-Fi cards – They accept the wireless signal
and relay information.
Safe guards - Firewalls and anti-virus
software protect networks from uninvited
users and keep information secure.
The Wi-Fi Technology
TECHNOLOGI
ES
IEEE 802.11b
IEEE 802.11a
IEEE 802.11g
IEEE 802.11b
Appear in late 1999
Operates at 2.4GHz radio spectrum
11 Mbps (theoretical speed)- within 30m
range
4-6 Mbps (actual speed)
100-150 feet range
Most popular
Least expensive
Interference from mobile phones
and Bluetooth devices which can
reduce the transmission speed
IEEE 802.11a
Introduced in 2001
Operates at 5GHz (less popular)
54Mbps (theoretical speed) & 15-20Mbps
(actual speed)
50-75 feet range
More expensive
Not compatible with IEEE802.11b
IEEE802.11g
Introduced in 2003
Combined the features of both standards
(a,b)
100-150 feet range
2.4GHz radio frequencies
Compatible with ‘b’
Topologies of Wi-Fi
Wi-Fi
topologies
AP based
Peer-to-peer
Point-to-multipoint
AP based topology
(Infrastructure mode)
The client communicate through Access
Point.
BSA-RF coverage provided by an AP.
ESA-It consists of 2 or more BSA.
ESA cell includes 10-15% overlap to allow
roaming.
Peer-to-peer topology
(ad-hoc mode)
AP is not required.
Client devices within a cell can
communicate directly with each
other.
It is useful for setting up of a wireless
network quickly and easily.
Point-to-multipoint topology
 This is used to connect a LAN in one
building to a LANs in other buildings even
if the buildings are miles apart. These
conditions receive a clear line of sight
between buildings.
 The line-of-sight range varies based on the
type of wireless bridge and antenna used
as well as the environmental conditions.
Applications of Wi-Fi network
 Home
 Small business
 Large corporations and campus
 Health care
 Wireless ISP (WISP)
 Travelers
Security threats of Wi-Fi
 Eavesdropping
 Man-in-the-middle attack
 Denial of service
Eavesdropping
 Eavesdropping is secretly listening to
the private conversation of others
without their consent.
 Eavesdropping can also be done over
telephone lines (wiretapping), email,
instant messaging, and other methods
of communication considered private.
Man-in-the-middle attack
 The man-in-the-middle attack in
cryptography and computer security is a
form of active eavesdropping in which
the attacker makes independent
connections with the victims and relays
messages between them, making them
believe that they are talking directly to
each other over a private connection,
when in fact the entire conversation is
controlled by the attacker.
 A man-in-the-middle attack can succeed
only when the attacker can impersonate
each endpoint to the satisfaction of the
other; it is an attack on mutual
authentication.
Denial of service
 In computing, a denial-of-service (DoS) or
distributed denial-of-service (DDoS) attack is
an attempt to make a machine or network
resource unavailable to its intended users.
 Perpetrators of DoS attacks typically target
sites or services hosted on high-profile web
servers such as banks, credit card payment
gateways, and even root name servers.
 One common method of attack involves
saturating the target machine with
external communications requests, so
much so that it cannot respond to
legitimate traffic or responds so slowly as
to be rendered essentially unavailable.
Wi-Fi network security
Authentication is the act of
confirming the truth of an attribute
of a single piece of data (datum) or
entity.
Authentication is the process of
actually confirming that identity.
It might involve confirming the identity of a
person by validating their
identity documents,
verifying the validity of a website with a
digital certificate,
tracing the age of an artifact by carbon
dating,
 ensuring that a product is what its
packaging and labeling claim to be.
In other words, Authentication often involves
verifying the validity of at least one form of
identification.
Limitations of Wi-Fi
Interference
Degradation in performance
High power consumption
Limited range
CONCLUSION
Thus, the simple to use Wi-Fi technology is
finding a wide range of applications in
various fields and is revolutionizing wireless
communication.
Both technology and skills goes hand-in-
hand, those who can design better
architecture of networks can lead Wi-Fi
networks.
Wireless Fidelity is common now.
We are expecting more on this technology
in future.
Let’s hope for that. . .

More Related Content

What's hot

Wifi ppt
Wifi pptWifi ppt
Wifi ppt
Yousaf Sahota
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentationEyad Manna
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...Lindsey Landolfi
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi Architecture
Arnab Ghosal
 
Grouping
GroupingGrouping
Grouping
AJAL A J
 
How Does Wifi Work
How Does Wifi WorkHow Does Wifi Work
How Does Wifi Work
dwight barrientos
 
WIFI TECHNOLOGY
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
Ajnish Rana
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology WriteupShital Kat
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
Ravi Rajput
 
ppt on WIFI
ppt on WIFIppt on WIFI
ppt on WIFI
Rohit Lakkabathini
 
Wifi
WifiWifi
Wi fi and it’s applications
Wi fi and it’s applicationsWi fi and it’s applications
Wi fi and it’s applicationsSaad Mazhar
 
Wi Fi
Wi FiWi Fi
Wi fi ppt project by Mubeen Momin
Wi fi ppt project by Mubeen MominWi fi ppt project by Mubeen Momin
Wi fi ppt project by Mubeen Momin
mubeenm50
 

What's hot (20)

Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentation
 
972003
972003972003
972003
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi Architecture
 
Grouping
GroupingGrouping
Grouping
 
How Does Wifi Work
How Does Wifi WorkHow Does Wifi Work
How Does Wifi Work
 
WIFI TECHNOLOGY
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology Writeup
 
Wi fi
Wi fiWi fi
Wi fi
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
 
Wifi technology ppt
Wifi technology pptWifi technology ppt
Wifi technology ppt
 
WiFi Technology & IEEE
WiFi Technology & IEEEWiFi Technology & IEEE
WiFi Technology & IEEE
 
ppt on WIFI
ppt on WIFIppt on WIFI
ppt on WIFI
 
Wifi
WifiWifi
Wifi
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi fi and it’s applications
Wi fi and it’s applicationsWi fi and it’s applications
Wi fi and it’s applications
 
The mfn 3
The mfn 3The mfn 3
The mfn 3
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wi fi ppt project by Mubeen Momin
Wi fi ppt project by Mubeen MominWi fi ppt project by Mubeen Momin
Wi fi ppt project by Mubeen Momin
 

Viewers also liked

Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
Purushottam Naidu
 
Wi-fi tecnology
Wi-fi tecnologyWi-fi tecnology
Wi-fi tecnology
manisha9kathuria
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
sai kumar R
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
Wi fi technology & wap
Wi fi technology & wap Wi fi technology & wap
Wi fi technology & wap
Divakar Triple H
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
Naveen Kumar
 

Viewers also liked (9)

WI FI
WI FIWI FI
WI FI
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
 
Wi-fi tecnology
Wi-fi tecnologyWi-fi tecnology
Wi-fi tecnology
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wi fi technology & wap
Wi fi technology & wap Wi fi technology & wap
Wi fi technology & wap
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
wi-fi ppt
wi-fi pptwi-fi ppt
wi-fi ppt
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 

Similar to Wi fi Technilogy

Wi Fi
Wi FiWi Fi
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
SeanHussey8
 
WIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my lifeWIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my life
Rahul Barick
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Philippine Association of Academic/Research Librarians
 
Wi-Fi Tecnology
Wi-Fi TecnologyWi-Fi Tecnology
Wi-Fi Tecnology
kataria Arvind
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
HemanthGowdaN1
 
Wi-Fi technology
Wi-Fi technologyWi-Fi technology
Wi-Fi technology
Nazrin Parveen
 
Wlan security
Wlan securityWlan security
Wlan security
Upasona Roy
 
Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02
Zameer Abdul Azeez Mulla
 
Wi fi
Wi fiWi fi
Wifi
Wifi Wifi
Wireless Fidelity
Wireless FidelityWireless Fidelity
Wireless Fidelity
JAI MCA-STUDENT
 
Wifi Rental services- RAC IT Solution
Wifi Rental services- RAC IT SolutionWifi Rental services- RAC IT Solution
Wifi Rental services- RAC IT Solution
RAC IT Solutions Pvt. Ltd
 
Wireless Communication
Wireless CommunicationWireless Communication
Wireless CommunicationAwais Alam
 
wifi-technology-601-cG83h8O.pptx
wifi-technology-601-cG83h8O.pptxwifi-technology-601-cG83h8O.pptx
wifi-technology-601-cG83h8O.pptx
AbhishekMudale1
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
Gurpreet Singh
 

Similar to Wi fi Technilogy (20)

Wi Fi
Wi FiWi Fi
Wi Fi
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
 
WIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my lifeWIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my life
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
 
Wi-Fi Tecnology
Wi-Fi TecnologyWi-Fi Tecnology
Wi-Fi Tecnology
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wi-Fi technology
Wi-Fi technologyWi-Fi technology
Wi-Fi technology
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02
 
Wi fi
Wi fiWi fi
Wi fi
 
Wifi
Wifi Wifi
Wifi
 
Wireless Fidelity
Wireless FidelityWireless Fidelity
Wireless Fidelity
 
wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
Wifi Rental services- RAC IT Solution
Wifi Rental services- RAC IT SolutionWifi Rental services- RAC IT Solution
Wifi Rental services- RAC IT Solution
 
WIFI[autosaved]
WIFI[autosaved]WIFI[autosaved]
WIFI[autosaved]
 
Wifi clear idea
Wifi clear ideaWifi clear idea
Wifi clear idea
 
Wireless Communication
Wireless CommunicationWireless Communication
Wireless Communication
 
wifi-technology-601-cG83h8O.pptx
wifi-technology-601-cG83h8O.pptxwifi-technology-601-cG83h8O.pptx
wifi-technology-601-cG83h8O.pptx
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 

Recently uploaded

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

Wi fi Technilogy

  • 1.
  • 2. CONTENT What is Wi-Fi network ? Why we need Wi-Fi network ? How a Wi-Fi network works ? Advantages and disadvantages of Wi-Fi Elements of Wi-Fi network Technologies of Wi-Fi network Topologies of Wi-Fi network Applications of Wi-Fi network Security threats of Wi-Fi network Wi-Fi network security Limitations of Wi-Fi network Summery
  • 3. What is a Wi-Fi network  Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections.  In other words, Wi-Fi is a technology that allows an electronic device to exchange data or connect to the internet wirelessly using 2.4 GHz UHF and 5 GHz SHF radio waves.
  • 4. Why we need Wi-Fi? The purpose of Wi-Fi is to hide complexity by enabling wireless access to applications and data, media and streams. The main aims of Wi-Fi are the following:  make access to information easier  ensure compatibility and co-existence of devices  eliminate complex cabling  eliminate switches, adapters, plugs, pins and connectors
  • 5. How Wi-Fi works A Wi-Fi network uses electromagnetic waves to transmit data across a wireless network, like a two-way radio. A Wireless router, or access point acts as a central hub that other wireless devices can connect to (either for connecting to the internet, or sharing data between devices on the same network).
  • 6.  Using a bunch of clever data compression techniques data is converted to radio waves, like cell phones and OTA (over the air) TV signals, sent from one device to the other through the air then converted back into data.  It is important to note that Wireless devices are capable of two-way communication; they can both send and receive wireless data.
  • 7. Advantages of Wi-Fi Mobility Ease of Installation Flexibility Cost Reliability Security Use unlicensed part of the radio spectrum Roaming Speed
  • 8. Disadvantages of Wi-Fi  Wi-Fi can be less secure than wired connections.  To no longer the use of Wi-Fi band is 2.4GHz does not require a license in most countries provided that is stays below limit of 100mW  And one accepts interference from other sources; including interference which causes the user devices function.
  • 9. Elements of Wi-Fi Access point (AP) - The AP is a wireless LAN transceiver or “base station” that can connect one or many wireless devices simultaneously to the Internet. Wi-Fi cards – They accept the wireless signal and relay information. Safe guards - Firewalls and anti-virus software protect networks from uninvited users and keep information secure.
  • 10. The Wi-Fi Technology TECHNOLOGI ES IEEE 802.11b IEEE 802.11a IEEE 802.11g
  • 11. IEEE 802.11b Appear in late 1999 Operates at 2.4GHz radio spectrum 11 Mbps (theoretical speed)- within 30m range 4-6 Mbps (actual speed) 100-150 feet range
  • 12. Most popular Least expensive Interference from mobile phones and Bluetooth devices which can reduce the transmission speed
  • 13. IEEE 802.11a Introduced in 2001 Operates at 5GHz (less popular) 54Mbps (theoretical speed) & 15-20Mbps (actual speed) 50-75 feet range More expensive Not compatible with IEEE802.11b
  • 14. IEEE802.11g Introduced in 2003 Combined the features of both standards (a,b) 100-150 feet range 2.4GHz radio frequencies Compatible with ‘b’
  • 15. Topologies of Wi-Fi Wi-Fi topologies AP based Peer-to-peer Point-to-multipoint
  • 16. AP based topology (Infrastructure mode) The client communicate through Access Point. BSA-RF coverage provided by an AP. ESA-It consists of 2 or more BSA. ESA cell includes 10-15% overlap to allow roaming.
  • 17. Peer-to-peer topology (ad-hoc mode) AP is not required. Client devices within a cell can communicate directly with each other. It is useful for setting up of a wireless network quickly and easily.
  • 18. Point-to-multipoint topology  This is used to connect a LAN in one building to a LANs in other buildings even if the buildings are miles apart. These conditions receive a clear line of sight between buildings.  The line-of-sight range varies based on the type of wireless bridge and antenna used as well as the environmental conditions.
  • 19. Applications of Wi-Fi network  Home  Small business  Large corporations and campus  Health care  Wireless ISP (WISP)  Travelers
  • 20. Security threats of Wi-Fi  Eavesdropping  Man-in-the-middle attack  Denial of service
  • 21. Eavesdropping  Eavesdropping is secretly listening to the private conversation of others without their consent.  Eavesdropping can also be done over telephone lines (wiretapping), email, instant messaging, and other methods of communication considered private.
  • 22. Man-in-the-middle attack  The man-in-the-middle attack in cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.
  • 23.  A man-in-the-middle attack can succeed only when the attacker can impersonate each endpoint to the satisfaction of the other; it is an attack on mutual authentication.
  • 24. Denial of service  In computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users.  Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root name servers.
  • 25.  One common method of attack involves saturating the target machine with external communications requests, so much so that it cannot respond to legitimate traffic or responds so slowly as to be rendered essentially unavailable.
  • 26. Wi-Fi network security Authentication is the act of confirming the truth of an attribute of a single piece of data (datum) or entity. Authentication is the process of actually confirming that identity.
  • 27. It might involve confirming the identity of a person by validating their identity documents, verifying the validity of a website with a digital certificate, tracing the age of an artifact by carbon dating,  ensuring that a product is what its packaging and labeling claim to be. In other words, Authentication often involves verifying the validity of at least one form of identification.
  • 28. Limitations of Wi-Fi Interference Degradation in performance High power consumption Limited range
  • 29. CONCLUSION Thus, the simple to use Wi-Fi technology is finding a wide range of applications in various fields and is revolutionizing wireless communication. Both technology and skills goes hand-in- hand, those who can design better architecture of networks can lead Wi-Fi networks. Wireless Fidelity is common now. We are expecting more on this technology in future. Let’s hope for that. . .