SlideShare a Scribd company logo
1 of 16
Seminar PresentationSeminar Presentation
ONON
Wi-Fi Wireless NetworkWi-Fi Wireless Network
Presented ByPresented By
SYED JAUWADSYED JAUWAD
DIPLOMA COMPUTER SEMINARDIPLOMA COMPUTER SEMINAR
OUTLINEOUTLINE
 INTRODUCTIONINTRODUCTION
 WIRELESS NETWORKING COMPONENTSWIRELESS NETWORKING COMPONENTS
 WI-FI OPERATING MODESWI-FI OPERATING MODES
 HOW IT WORKS?HOW IT WORKS?
 DIRECT SEQUENCE SPREAD SPECTRUMDIRECT SEQUENCE SPREAD SPECTRUM
 WI-FI SECURITYWI-FI SECURITY
 ADVANTAGESADVANTAGES
 OBSTACLES TO WI-FIOBSTACLES TO WI-FI
 CONCLUSIONCONCLUSION
 BIBLIOGRAPHYBIBLIOGRAPHY
DIPLOMA COMPUTERDIPLOMA COMPUTER
SEMINARSEMINAR
 INTRODUCTIONINTRODUCTION
What is wi-fi ?What is wi-fi ?
Abbreviation for Wireless Fidelity
General name for wireless technologies Industry
standard
Services that provide short range, high speed Internet
connections
Another name for Wi-Fi is 802.11b
Other Wi-Fi technologies
– 802.11g
– 802.11a
DIPLOMA COMPUTERDIPLOMA COMPUTER
SEMINARSEMINAR
INTRODUCTION(CONTD)INTRODUCTION(CONTD) FeaturesFeatures
 At the physical layer, IEEE 802.11b operates at theAt the physical layer, IEEE 802.11b operates at the
radio frequency of 2.45 gigahertz (GHz) with aradio frequency of 2.45 gigahertz (GHz) with a
maximum bit rate of 11 Mbps.maximum bit rate of 11 Mbps.
 It uses the direct sequence spread spectrum (DSSS)It uses the direct sequence spread spectrum (DSSS)
transmission technique.transmission technique.
 At the MAC sublayer of the Data Link layer, 802.11bAt the MAC sublayer of the Data Link layer, 802.11b
uses the Carrier Sense Multiple Access withuses the Carrier Sense Multiple Access with
Collision AvoidanceCollision Avoidance
 (CSMA/CA)(CSMA/CA)
DIPLOMA COMPUTERDIPLOMA COMPUTER
SEMINARSEMINAR
 Wireless networking componentsWireless networking components
 StationStation
 Wireless Access PointWireless Access Point
 PortsPorts
DIPLOMA COMPUTERDIPLOMA COMPUTER
SEMINARSEMINAR
 Wi-Fi operating modesWi-Fi operating modes
 Ad Hoc Mode (peer-to-peer mode)Ad Hoc Mode (peer-to-peer mode)
 wireless clients communicate directly withwireless clients communicate directly with
each othereach other
 Infrastructure modeInfrastructure mode
 At least one wireless AP and one wirelessAt least one wireless AP and one wireless
clientsclients
DIPLOMA COMPUTERDIPLOMA COMPUTER
SEMINARSEMINAR
 How it works ?How it works ?
 Roaming Node periodically sends probe frameRoaming Node periodically sends probe frame
 All APs within range reply with a probe responseAll APs within range reply with a probe response
frameframe
 Roaming node chooses best AP and replies to it withRoaming node chooses best AP and replies to it with
association requestassociation request
 AP acknowledges request with association response.AP acknowledges request with association response.
 AP notifies previous AP (if any) of the establishedAP notifies previous AP (if any) of the established
association(handover).association(handover).
DIPLOMA COMPUTERDIPLOMA COMPUTER
SEMINARSEMINAR
 Direct Sequence Spread SpectrumDirect Sequence Spread Spectrum
 What is spread spectrum ?What is spread spectrum ?
 coding technique for digital transmission.coding technique for digital transmission.
 transforms an information signal so that it lookstransforms an information signal so that it looks
more like noise.more like noise.
 At receiving end filter converts noise signal intoAt receiving end filter converts noise signal into
original signaloriginal signal
 Implemented for two processesImplemented for two processes
 Frequency HoppingFrequency Hopping
 Direct Sequence.Direct Sequence.
DIPLOMA COMPUTERDIPLOMA COMPUTER
SEMINARSEMINAR
 Direct Sequence Spread Spectrum (contd.)Direct Sequence Spread Spectrum (contd.)
 Direct sequenceDirect sequence
 The carrierThe carrier phasephase of the transmitter abruptlyof the transmitter abruptly
changes in accordance with a pseudo-randomchanges in accordance with a pseudo-random
code sequence.code sequence.
DIPLOMA COMPUTERDIPLOMA COMPUTER
SEMINARSEMINAR
 Wi-Fi SecurityWi-Fi Security
 Authentication through the open system andAuthentication through the open system and
shared keyshared key
 Data confidentiality through WiredData confidentiality through Wired
Equivalent Privacy (WEP)Equivalent Privacy (WEP)
DIPLOMA COMPUTERDIPLOMA COMPUTER
SEMINARSEMINAR
 AdvantagesAdvantages
 No cablesNo cables
 Typical area of coverage 100 to 500 feetTypical area of coverage 100 to 500 feet
 Very high speed internet connectionsVery high speed internet connections
 –– 802.11b downloads at 11Mbps, or 200 x802.11b downloads at 11Mbps, or 200 x
fasterfaster
 than dial-up modemsthan dial-up modems
 –– 802.11g downloads at 54 Mbps802.11g downloads at 54 Mbps
DIPLOMA COMPUTERDIPLOMA COMPUTER
SEMINARSEMINAR
 Obstacles to Wi-FiObstacles to Wi-Fi
 SecuritySecurity
 WEP was BrokenWEP was Broken
 Solutions are available nowSolutions are available now
 Deployment CostDeployment Cost
 Scaling CoverageScaling Coverage
 CapacityCapacity
 Large Enterprise & service provider scenariosLarge Enterprise & service provider scenarios
require higher capacity systemrequire higher capacity system
DIPLOMA COMPUTERDIPLOMA COMPUTER
SEMINARSEMINAR
 ConclusionConclusion
 wireless networks can make work easier andwireless networks can make work easier and
life more fun , today wi-fi is the good solutionlife more fun , today wi-fi is the good solution
for wireless networkfor wireless network
 802.11b has became the standard wireless802.11b has became the standard wireless
ethernet networking technology for bothethernet networking technology for both
business and homebusiness and home
DIPLOMA COMPUTERDIPLOMA COMPUTER
SEMINARSEMINAR
 BibliographyBibliography
 [1].[1]. Sultan Weatherspoon, “Overview of IEEESultan Weatherspoon, “Overview of IEEE
802.11b Security”, Intel technology journal802.11b Security”, Intel technology journal
Q2,2000Q2,2000
 [2]. Martin Heusse, Franck Rousseau,Gilles[2]. Martin Heusse, Franck Rousseau,Gilles
Berger-Sabbatel, Andrzej Duda,“PerformanceBerger-Sabbatel, Andrzej Duda,“Performance
Anomaly of 802.11b”, proceeding of IEEEAnomaly of 802.11b”, proceeding of IEEE
INFOCOM 2003, pp 0-7803-7753-2/03.INFOCOM 2003, pp 0-7803-7753-2/03.
DIPLOMA COMPUTERDIPLOMA COMPUTER
SEMINARSEMINAR
DIPLOMA COMPUTERDIPLOMA COMPUTER
SEMINARSEMINAR

More Related Content

What's hot

Cambium networks prensent
Cambium networks prensentCambium networks prensent
Cambium networks prensentjmmypham
 
Radio-Over-IP Presentation
Radio-Over-IP PresentationRadio-Over-IP Presentation
Radio-Over-IP PresentationBriCom Solutions
 
Meru Summary Sheet
Meru Summary SheetMeru Summary Sheet
Meru Summary Sheetmacmillant
 
SIP Trunking overview
SIP Trunking overviewSIP Trunking overview
SIP Trunking overviewJohn Downing
 
Voice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using AsteriskVoice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using AsteriskSameer Verma
 
Aruba utilities on mobile devices v30
Aruba utilities on mobile devices v30Aruba utilities on mobile devices v30
Aruba utilities on mobile devices v30Marcello Marchesini
 
Sales training part 1-2
Sales training part 1-2Sales training part 1-2
Sales training part 1-2Callture Inc
 
VoIP - Technology To Business Models
VoIP - Technology To Business ModelsVoIP - Technology To Business Models
VoIP - Technology To Business Modelsguesta5f2fb
 
hSo Guide To SIP Trunking
hSo Guide To SIP TrunkinghSo Guide To SIP Trunking
hSo Guide To SIP TrunkinghSo
 
Video Conferencing Solutions
Video Conferencing SolutionsVideo Conferencing Solutions
Video Conferencing SolutionsVideoguy
 
Radwin Fiber-like broadband solution
Radwin Fiber-like broadband solutionRadwin Fiber-like broadband solution
Radwin Fiber-like broadband solutionŁukasz Grzelak
 
Kevin Withnall VoIP In 5 Minutes with Asterisk
Kevin Withnall VoIP In 5 Minutes with AsteriskKevin Withnall VoIP In 5 Minutes with Asterisk
Kevin Withnall VoIP In 5 Minutes with AsteriskICT Illawarra
 
Business Calls And Lines Services
Business Calls And Lines ServicesBusiness Calls And Lines Services
Business Calls And Lines ServicesMark Halpin
 
Sip Trunking Getting It Right The 1st Time
Sip Trunking   Getting It Right The 1st TimeSip Trunking   Getting It Right The 1st Time
Sip Trunking Getting It Right The 1st TimeGraham Francis
 
BriCom - BriPUSH Push to talk Service White Paper
BriCom - BriPUSH Push to talk Service White PaperBriCom - BriPUSH Push to talk Service White Paper
BriCom - BriPUSH Push to talk Service White PaperBriCom Solutions
 
Voip phone system
Voip phone systemVoip phone system
Voip phone systemIPPBX LLC
 
New Fixed Outdoor Wireless Broadband: Connect the under or unconnected
New Fixed Outdoor Wireless Broadband: Connect the under or unconnectedNew Fixed Outdoor Wireless Broadband: Connect the under or unconnected
New Fixed Outdoor Wireless Broadband: Connect the under or unconnectedROOTS Communications Pte Ltd
 

What's hot (20)

Cambium networks prensent
Cambium networks prensentCambium networks prensent
Cambium networks prensent
 
ePMP Overview 2016
ePMP Overview 2016ePMP Overview 2016
ePMP Overview 2016
 
Radio-Over-IP Presentation
Radio-Over-IP PresentationRadio-Over-IP Presentation
Radio-Over-IP Presentation
 
Meru Summary Sheet
Meru Summary SheetMeru Summary Sheet
Meru Summary Sheet
 
SIP Trunking overview
SIP Trunking overviewSIP Trunking overview
SIP Trunking overview
 
Voice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using AsteriskVoice over Internet Protocol (VoIP) using Asterisk
Voice over Internet Protocol (VoIP) using Asterisk
 
Belfast 21062016 cambium
Belfast 21062016 cambiumBelfast 21062016 cambium
Belfast 21062016 cambium
 
Aruba utilities on mobile devices v30
Aruba utilities on mobile devices v30Aruba utilities on mobile devices v30
Aruba utilities on mobile devices v30
 
Sales training part 1-2
Sales training part 1-2Sales training part 1-2
Sales training part 1-2
 
VoIP - Technology To Business Models
VoIP - Technology To Business ModelsVoIP - Technology To Business Models
VoIP - Technology To Business Models
 
hSo Guide To SIP Trunking
hSo Guide To SIP TrunkinghSo Guide To SIP Trunking
hSo Guide To SIP Trunking
 
Video Conferencing Solutions
Video Conferencing SolutionsVideo Conferencing Solutions
Video Conferencing Solutions
 
Radwin Fiber-like broadband solution
Radwin Fiber-like broadband solutionRadwin Fiber-like broadband solution
Radwin Fiber-like broadband solution
 
XO Enterprise SIP
XO Enterprise SIPXO Enterprise SIP
XO Enterprise SIP
 
Kevin Withnall VoIP In 5 Minutes with Asterisk
Kevin Withnall VoIP In 5 Minutes with AsteriskKevin Withnall VoIP In 5 Minutes with Asterisk
Kevin Withnall VoIP In 5 Minutes with Asterisk
 
Business Calls And Lines Services
Business Calls And Lines ServicesBusiness Calls And Lines Services
Business Calls And Lines Services
 
Sip Trunking Getting It Right The 1st Time
Sip Trunking   Getting It Right The 1st TimeSip Trunking   Getting It Right The 1st Time
Sip Trunking Getting It Right The 1st Time
 
BriCom - BriPUSH Push to talk Service White Paper
BriCom - BriPUSH Push to talk Service White PaperBriCom - BriPUSH Push to talk Service White Paper
BriCom - BriPUSH Push to talk Service White Paper
 
Voip phone system
Voip phone systemVoip phone system
Voip phone system
 
New Fixed Outdoor Wireless Broadband: Connect the under or unconnected
New Fixed Outdoor Wireless Broadband: Connect the under or unconnectedNew Fixed Outdoor Wireless Broadband: Connect the under or unconnected
New Fixed Outdoor Wireless Broadband: Connect the under or unconnected
 

Viewers also liked

2015 wi fi summit presentation rev2 be
2015 wi fi summit presentation rev2 be2015 wi fi summit presentation rev2 be
2015 wi fi summit presentation rev2 beScott Morrison
 
Wi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank SaxenaWi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank SaxenaMayank Saxena
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentationdayansaji
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentationEyad Manna
 
Li-fi Presentation by Debika sadhukhan
Li-fi Presentation by Debika sadhukhanLi-fi Presentation by Debika sadhukhan
Li-fi Presentation by Debika sadhukhanAmrit Mandal
 
Wi fi technology ppt mine
Wi fi technology ppt mineWi fi technology ppt mine
Wi fi technology ppt mineRoshni Ayappan
 

Viewers also liked (11)

2015 wi fi summit presentation rev2 be
2015 wi fi summit presentation rev2 be2015 wi fi summit presentation rev2 be
2015 wi fi summit presentation rev2 be
 
WI FI
WI FIWI FI
WI FI
 
Wi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank SaxenaWi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank Saxena
 
Wifi Ppt
Wifi PptWifi Ppt
Wifi Ppt
 
wi-fi ppt
wi-fi pptwi-fi ppt
wi-fi ppt
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentation
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
Lifi ppt
Lifi pptLifi ppt
Lifi ppt
 
Li-fi Presentation by Debika sadhukhan
Li-fi Presentation by Debika sadhukhanLi-fi Presentation by Debika sadhukhan
Li-fi Presentation by Debika sadhukhan
 
Wi fi technology ppt mine
Wi fi technology ppt mineWi fi technology ppt mine
Wi fi technology ppt mine
 

Similar to Wi fi wireless network

Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-FiBhushan Jadhav
 
Aruba Remote Networks
Aruba Remote NetworksAruba Remote Networks
Aruba Remote Networkshypknight
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi ArchitectureArnab Ghosal
 
4 wireless pan, lan and man
4 wireless pan, lan and man4 wireless pan, lan and man
4 wireless pan, lan and manManigandan BE
 
Deliberant - Apc 2 mi-rp
Deliberant - Apc 2 mi-rpDeliberant - Apc 2 mi-rp
Deliberant - Apc 2 mi-rpTelcomms
 
Deliberant - Apc 5 mi-v2
Deliberant - Apc 5 mi-v2Deliberant - Apc 5 mi-v2
Deliberant - Apc 5 mi-v2Telcomms
 
Hospitality ruckus wireless
Hospitality ruckus wirelessHospitality ruckus wireless
Hospitality ruckus wirelessayman khder
 
Zcom Wireless products application overview
Zcom Wireless products application overviewZcom Wireless products application overview
Zcom Wireless products application overviewRajesh Kapoor
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Wail Hassan
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15winiravmahida
 
Easy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi TechnologyEasy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi Technologygainspan
 

Similar to Wi fi wireless network (20)

Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
Wi fi
Wi fiWi fi
Wi fi
 
Aruba Remote Networks
Aruba Remote NetworksAruba Remote Networks
Aruba Remote Networks
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi Architecture
 
4 wireless pan, lan and man
4 wireless pan, lan and man4 wireless pan, lan and man
4 wireless pan, lan and man
 
wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
Deliberant - Apc 2 mi-rp
Deliberant - Apc 2 mi-rpDeliberant - Apc 2 mi-rp
Deliberant - Apc 2 mi-rp
 
VoIP for Dummies
VoIP for DummiesVoIP for Dummies
VoIP for Dummies
 
Deliberant - Apc 5 mi-v2
Deliberant - Apc 5 mi-v2Deliberant - Apc 5 mi-v2
Deliberant - Apc 5 mi-v2
 
WLAN
WLANWLAN
WLAN
 
Vpn
Vpn Vpn
Vpn
 
Hospitality ruckus wireless
Hospitality ruckus wirelessHospitality ruckus wireless
Hospitality ruckus wireless
 
Wireless
WirelessWireless
Wireless
 
Zcom Wireless products application overview
Zcom Wireless products application overviewZcom Wireless products application overview
Zcom Wireless products application overview
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
Net Basics
Net BasicsNet Basics
Net Basics
 
Easy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi TechnologyEasy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi Technology
 
Wi fi technology & wap
Wi fi technology & wap Wi fi technology & wap
Wi fi technology & wap
 

More from JauwadSyed

Data mining / data extraction 2024
Data mining       / data extraction 2024Data mining       / data extraction 2024
Data mining / data extraction 2024JauwadSyed
 
Fractal and Bayesian Networks Inference
Fractal  and  Bayesian Networks InferenceFractal  and  Bayesian Networks Inference
Fractal and Bayesian Networks InferenceJauwadSyed
 
The Koch Snowflake SELF SIMILAR CONCEPTS
The Koch Snowflake SELF SIMILAR CONCEPTSThe Koch Snowflake SELF SIMILAR CONCEPTS
The Koch Snowflake SELF SIMILAR CONCEPTSJauwadSyed
 
Fractal Geometry A new branch of mathematics
Fractal GeometryA new branch of mathematicsFractal GeometryA new branch of mathematics
Fractal Geometry A new branch of mathematicsJauwadSyed
 
BRAIN COMPUTER INTERFACE AND TECHNOLOGY
BRAIN  COMPUTER  INTERFACE AND TECHNOLOGYBRAIN  COMPUTER  INTERFACE AND TECHNOLOGY
BRAIN COMPUTER INTERFACE AND TECHNOLOGYJauwadSyed
 
EYE GAZE IN TURNTAKING IN SIGN LANGUAGE INTERACTION
EYE GAZE IN TURNTAKING IN SIGN LANGUAGE INTERACTIONEYE GAZE IN TURNTAKING IN SIGN LANGUAGE INTERACTION
EYE GAZE IN TURNTAKING IN SIGN LANGUAGE INTERACTIONJauwadSyed
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
WIRELESS COMMUNICATION IN HEALTH CARE.ppt
WIRELESS COMMUNICATION IN HEALTH CARE.pptWIRELESS COMMUNICATION IN HEALTH CARE.ppt
WIRELESS COMMUNICATION IN HEALTH CARE.pptJauwadSyed
 
zigbee operates TRENDING TECHNOLOGY 2024
zigbee operates TRENDING TECHNOLOGY  2024zigbee operates TRENDING TECHNOLOGY  2024
zigbee operates TRENDING TECHNOLOGY 2024JauwadSyed
 
Interdisciplinary
InterdisciplinaryInterdisciplinary
InterdisciplinaryJauwadSyed
 
Cognitive development
Cognitive developmentCognitive development
Cognitive developmentJauwadSyed
 
Noise abatement training presentation
Noise abatement training presentationNoise abatement training presentation
Noise abatement training presentationJauwadSyed
 
GREEN CLOUD COMPUTING
GREEN CLOUD COMPUTINGGREEN CLOUD COMPUTING
GREEN CLOUD COMPUTINGJauwadSyed
 
wildlife-conseravtion
wildlife-conseravtionwildlife-conseravtion
wildlife-conseravtionJauwadSyed
 
Presentation on eu ets & aviation for iffaad
Presentation on eu ets & aviation for iffaadPresentation on eu ets & aviation for iffaad
Presentation on eu ets & aviation for iffaadJauwadSyed
 
Disaster Management in India Past, Present and Future
Disaster Management in India Past, Present and FutureDisaster Management in India Past, Present and Future
Disaster Management in India Past, Present and FutureJauwadSyed
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsJauwadSyed
 
Noise Reduction for Internal Combustion Engines
 Noise Reduction for Internal Combustion Engines Noise Reduction for Internal Combustion Engines
Noise Reduction for Internal Combustion EnginesJauwadSyed
 

More from JauwadSyed (20)

Data mining / data extraction 2024
Data mining       / data extraction 2024Data mining       / data extraction 2024
Data mining / data extraction 2024
 
Fractal and Bayesian Networks Inference
Fractal  and  Bayesian Networks InferenceFractal  and  Bayesian Networks Inference
Fractal and Bayesian Networks Inference
 
The Koch Snowflake SELF SIMILAR CONCEPTS
The Koch Snowflake SELF SIMILAR CONCEPTSThe Koch Snowflake SELF SIMILAR CONCEPTS
The Koch Snowflake SELF SIMILAR CONCEPTS
 
Fractal Geometry A new branch of mathematics
Fractal GeometryA new branch of mathematicsFractal GeometryA new branch of mathematics
Fractal Geometry A new branch of mathematics
 
BRAIN COMPUTER INTERFACE AND TECHNOLOGY
BRAIN  COMPUTER  INTERFACE AND TECHNOLOGYBRAIN  COMPUTER  INTERFACE AND TECHNOLOGY
BRAIN COMPUTER INTERFACE AND TECHNOLOGY
 
EYE GAZE IN TURNTAKING IN SIGN LANGUAGE INTERACTION
EYE GAZE IN TURNTAKING IN SIGN LANGUAGE INTERACTIONEYE GAZE IN TURNTAKING IN SIGN LANGUAGE INTERACTION
EYE GAZE IN TURNTAKING IN SIGN LANGUAGE INTERACTION
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
WIRELESS COMMUNICATION IN HEALTH CARE.ppt
WIRELESS COMMUNICATION IN HEALTH CARE.pptWIRELESS COMMUNICATION IN HEALTH CARE.ppt
WIRELESS COMMUNICATION IN HEALTH CARE.ppt
 
zigbee operates TRENDING TECHNOLOGY 2024
zigbee operates TRENDING TECHNOLOGY  2024zigbee operates TRENDING TECHNOLOGY  2024
zigbee operates TRENDING TECHNOLOGY 2024
 
Interdisciplinary
InterdisciplinaryInterdisciplinary
Interdisciplinary
 
Cognitive development
Cognitive developmentCognitive development
Cognitive development
 
Noise abatement training presentation
Noise abatement training presentationNoise abatement training presentation
Noise abatement training presentation
 
GREEN CLOUD COMPUTING
GREEN CLOUD COMPUTINGGREEN CLOUD COMPUTING
GREEN CLOUD COMPUTING
 
wildlife-conseravtion
wildlife-conseravtionwildlife-conseravtion
wildlife-conseravtion
 
Presentation on eu ets & aviation for iffaad
Presentation on eu ets & aviation for iffaadPresentation on eu ets & aviation for iffaad
Presentation on eu ets & aviation for iffaad
 
Bearing
BearingBearing
Bearing
 
Technology
TechnologyTechnology
Technology
 
Disaster Management in India Past, Present and Future
Disaster Management in India Past, Present and FutureDisaster Management in India Past, Present and Future
Disaster Management in India Past, Present and Future
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Noise Reduction for Internal Combustion Engines
 Noise Reduction for Internal Combustion Engines Noise Reduction for Internal Combustion Engines
Noise Reduction for Internal Combustion Engines
 

Recently uploaded

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 

Wi fi wireless network

  • 1. Seminar PresentationSeminar Presentation ONON Wi-Fi Wireless NetworkWi-Fi Wireless Network Presented ByPresented By SYED JAUWADSYED JAUWAD
  • 2. DIPLOMA COMPUTER SEMINARDIPLOMA COMPUTER SEMINAR OUTLINEOUTLINE  INTRODUCTIONINTRODUCTION  WIRELESS NETWORKING COMPONENTSWIRELESS NETWORKING COMPONENTS  WI-FI OPERATING MODESWI-FI OPERATING MODES  HOW IT WORKS?HOW IT WORKS?  DIRECT SEQUENCE SPREAD SPECTRUMDIRECT SEQUENCE SPREAD SPECTRUM  WI-FI SECURITYWI-FI SECURITY  ADVANTAGESADVANTAGES  OBSTACLES TO WI-FIOBSTACLES TO WI-FI  CONCLUSIONCONCLUSION  BIBLIOGRAPHYBIBLIOGRAPHY
  • 3. DIPLOMA COMPUTERDIPLOMA COMPUTER SEMINARSEMINAR  INTRODUCTIONINTRODUCTION What is wi-fi ?What is wi-fi ? Abbreviation for Wireless Fidelity General name for wireless technologies Industry standard Services that provide short range, high speed Internet connections Another name for Wi-Fi is 802.11b Other Wi-Fi technologies – 802.11g – 802.11a
  • 4. DIPLOMA COMPUTERDIPLOMA COMPUTER SEMINARSEMINAR INTRODUCTION(CONTD)INTRODUCTION(CONTD) FeaturesFeatures  At the physical layer, IEEE 802.11b operates at theAt the physical layer, IEEE 802.11b operates at the radio frequency of 2.45 gigahertz (GHz) with aradio frequency of 2.45 gigahertz (GHz) with a maximum bit rate of 11 Mbps.maximum bit rate of 11 Mbps.  It uses the direct sequence spread spectrum (DSSS)It uses the direct sequence spread spectrum (DSSS) transmission technique.transmission technique.  At the MAC sublayer of the Data Link layer, 802.11bAt the MAC sublayer of the Data Link layer, 802.11b uses the Carrier Sense Multiple Access withuses the Carrier Sense Multiple Access with Collision AvoidanceCollision Avoidance  (CSMA/CA)(CSMA/CA)
  • 5. DIPLOMA COMPUTERDIPLOMA COMPUTER SEMINARSEMINAR  Wireless networking componentsWireless networking components  StationStation  Wireless Access PointWireless Access Point  PortsPorts
  • 6. DIPLOMA COMPUTERDIPLOMA COMPUTER SEMINARSEMINAR  Wi-Fi operating modesWi-Fi operating modes  Ad Hoc Mode (peer-to-peer mode)Ad Hoc Mode (peer-to-peer mode)  wireless clients communicate directly withwireless clients communicate directly with each othereach other  Infrastructure modeInfrastructure mode  At least one wireless AP and one wirelessAt least one wireless AP and one wireless clientsclients
  • 7. DIPLOMA COMPUTERDIPLOMA COMPUTER SEMINARSEMINAR  How it works ?How it works ?  Roaming Node periodically sends probe frameRoaming Node periodically sends probe frame  All APs within range reply with a probe responseAll APs within range reply with a probe response frameframe  Roaming node chooses best AP and replies to it withRoaming node chooses best AP and replies to it with association requestassociation request  AP acknowledges request with association response.AP acknowledges request with association response.  AP notifies previous AP (if any) of the establishedAP notifies previous AP (if any) of the established association(handover).association(handover).
  • 8. DIPLOMA COMPUTERDIPLOMA COMPUTER SEMINARSEMINAR  Direct Sequence Spread SpectrumDirect Sequence Spread Spectrum  What is spread spectrum ?What is spread spectrum ?  coding technique for digital transmission.coding technique for digital transmission.  transforms an information signal so that it lookstransforms an information signal so that it looks more like noise.more like noise.  At receiving end filter converts noise signal intoAt receiving end filter converts noise signal into original signaloriginal signal  Implemented for two processesImplemented for two processes  Frequency HoppingFrequency Hopping  Direct Sequence.Direct Sequence.
  • 9. DIPLOMA COMPUTERDIPLOMA COMPUTER SEMINARSEMINAR  Direct Sequence Spread Spectrum (contd.)Direct Sequence Spread Spectrum (contd.)  Direct sequenceDirect sequence  The carrierThe carrier phasephase of the transmitter abruptlyof the transmitter abruptly changes in accordance with a pseudo-randomchanges in accordance with a pseudo-random code sequence.code sequence.
  • 10. DIPLOMA COMPUTERDIPLOMA COMPUTER SEMINARSEMINAR  Wi-Fi SecurityWi-Fi Security  Authentication through the open system andAuthentication through the open system and shared keyshared key  Data confidentiality through WiredData confidentiality through Wired Equivalent Privacy (WEP)Equivalent Privacy (WEP)
  • 11. DIPLOMA COMPUTERDIPLOMA COMPUTER SEMINARSEMINAR  AdvantagesAdvantages  No cablesNo cables  Typical area of coverage 100 to 500 feetTypical area of coverage 100 to 500 feet  Very high speed internet connectionsVery high speed internet connections  –– 802.11b downloads at 11Mbps, or 200 x802.11b downloads at 11Mbps, or 200 x fasterfaster  than dial-up modemsthan dial-up modems  –– 802.11g downloads at 54 Mbps802.11g downloads at 54 Mbps
  • 12. DIPLOMA COMPUTERDIPLOMA COMPUTER SEMINARSEMINAR  Obstacles to Wi-FiObstacles to Wi-Fi  SecuritySecurity  WEP was BrokenWEP was Broken  Solutions are available nowSolutions are available now  Deployment CostDeployment Cost  Scaling CoverageScaling Coverage  CapacityCapacity  Large Enterprise & service provider scenariosLarge Enterprise & service provider scenarios require higher capacity systemrequire higher capacity system
  • 13. DIPLOMA COMPUTERDIPLOMA COMPUTER SEMINARSEMINAR  ConclusionConclusion  wireless networks can make work easier andwireless networks can make work easier and life more fun , today wi-fi is the good solutionlife more fun , today wi-fi is the good solution for wireless networkfor wireless network  802.11b has became the standard wireless802.11b has became the standard wireless ethernet networking technology for bothethernet networking technology for both business and homebusiness and home
  • 14. DIPLOMA COMPUTERDIPLOMA COMPUTER SEMINARSEMINAR  BibliographyBibliography  [1].[1]. Sultan Weatherspoon, “Overview of IEEESultan Weatherspoon, “Overview of IEEE 802.11b Security”, Intel technology journal802.11b Security”, Intel technology journal Q2,2000Q2,2000  [2]. Martin Heusse, Franck Rousseau,Gilles[2]. Martin Heusse, Franck Rousseau,Gilles Berger-Sabbatel, Andrzej Duda,“PerformanceBerger-Sabbatel, Andrzej Duda,“Performance Anomaly of 802.11b”, proceeding of IEEEAnomaly of 802.11b”, proceeding of IEEE INFOCOM 2003, pp 0-7803-7753-2/03.INFOCOM 2003, pp 0-7803-7753-2/03.