SlideShare a Scribd company logo
1 of 19
Wi-Fi
the
802.11 Standard
VIPUL KUMAR MAURYA
CSE Department, 3rd Year
Introduction
Wi-Fi Stands for Wireless Fidelity
Wireless Fidelity is generic term refers to (The Institute of
Electrical and Electronics Engineers ) IEEE 802.11 standards
for Wireless Local Area Network.
Wi-Fi is a wireless technology that uses radio frequency to
transmit data through the air.
Wi-Fi Network Connects Computer to each other, to the
internet and to the wired network.
Wi-Fi Works On IEEE 802.11 Standards
 802.11 is primarily concerned with the
lower layers of the OSI model.
 Data Link Layer
 Logical Link Control (LLC).
 Medium Access Control (MAC).
 Physical Layer
 Physical Layer Convergence Procedure
(PLCP).
 Physical Medium Dependent (PMD).
802.11 Standards
IEEE 802 .11 b
IEEE 802 .11a
IEEE 802 .11g
IEEE 802 .11n
IEEE 802 .11ac
IEEE 802.11 is a set of media access control (MAC) and physical
layer (PHY) specifications for implementing wireless local area
network (WLAN) computer communication in the 2.4, 3.6, 5, and
60 GHz frequency bands
802.11b Standard
 Appears in late 1999
 Operates at 2.44Ghz radio spectrum
 11Mbps (theoretical speed)- within 30 meter Range
 4-6 Mbps Actual Speed
 100-150 feet range
 Limits the number of access points in range of each other
to three
 Most Popular , Least Expensive
 Interference from Mobile Phones and Bluetooth device
which can reduce transmission speed
 Uses direct-sequence spread-spectrum technology
802.11a Standard
 Introduce in 2001
 Operates at 5GHz
 Less popular and Less interfered
 54 Mbps (theoretical Speed)
 15-20 Mbps (Actual Speed)
 50-75 feet range
 More Expensive
 Highly Obstructed
 Not Compatible with 802.11b
 Uses frequency division multiplexing
802.11g Standard
 Introduce in 2003
 Combine features of both a and b
 100-150 feet range
 54 Mbps (theoretical speed)
 20-25 Mbps (actual Speed)
 2.4 GHz radio frequency
 Compatible with b
 Uses frequency division multiplexing
802.11n Standard
 802.11n also known as Wireless N
 802.11n Ratified in 2009
 802.11n builds upon previous 802.11 standards by adding
multiple-input multiple-output (MIMO).
 Operates on Both 2.4Ghz and 5Ghz
 Provide Bandwidth up to 300Mbps
 Backward-compatible with 802.11b/g gear
 Increased Speed and range
802.11ac Standard
 Builds on 802.11n ,Published in 2013
 The addition of Multi-user MIMO (MU-MIMO)
 Utilizes dual band wireless technology
 Support Connection both 2.4 GHz and 5GHz
 Backward compatibility to 802.11b/g/n
 Bandwidth rated up to 1300 Mbps on the 5 GHz
 bandwidth rated up to 450 Mbps on the 2.4 GHz
Elements Of Wi-Fi
 Access Point- The AP is wireless LAN radio transceiver or “base
station” that can connect to one or many wireless devices
simultaneously to internet.
 Wi –Fi Card- They accept wireless signal and relay information. They
can be external or internal.
 Safeguards – Firewalls and anti-virus protects from uninvited users
and keep information secure.
Wi-Fi Network Topologies
 Peer to Peer Topology (Ad-hoc mode)
 AP – Based Topology (Infrastructure mode)
Peer to Peer Topology
 AP is not required
 Client devices can communicate with each other directly
 Useful to create wireless network easily and quickly
Infrastructure Network
 The client communicate through Access point
 Any Communication has to go through AP
 If a Mobile station like PDA, Computer has to
communicate with other Mobile station, it need to sends
information to AP first , then AP sends Info to destination
mobile station
How Wi-Fi Works?
 A Wi-Fi hotspot is created by installing an access point to an
internet connection.
 An Access Point acts as base station
 When a Wi-Fi enabled device encounters a hotspot the device
can then connect to that network wirelessly.
 A computer’s adapter translate data into radio signals and
transmits it using antenna
 A Wireless router receives the signals and decode it. Router
sends the information
 Many access points can connected to each other via Ethernet
cables to create a single large network.
CSMA/CA
 Carrier Sense Multiple Access with Collision Avoidance
 CSMA/CA is used by Data Link Layer.
 MS (mobile station) sends its packets, it checks to see if someone else is
sending information. Only when the medium is free can an MS sends packets.
 If some station is sending or receiving signal, the MS that intends to send will
generate a random waiting time and wait for its turn. If several MSs are all
waiting for their turns, since their waiting times are randomly generated and
thus not equal, they will not start sending simultaneously. Thus collision (two
or more MSs sending signals simultaneously) is avoided.
Security
 Wired Equivalency Protocol (WEP)
 Wi-Fi Protected Access (WPA)
 Wi-Fi Protected Access 2 (WPA2)
 Extensible Authentication Protocol (EAP)
 Firewall
Advantages
 Freedom – You can work from any location that you can
get a signal.
 Setup Cost – No cabling required.
 Flexibility – Quick and easy to setup in temp or permanent
space.
 Scalable – Can be expanded with growth.
 Mobile Access – Can access the network on the move.
Disadvantages
 Speed – Slower than cable.
 Range – Affected by various medium.
 Travels best through open space.
 Reduced by walls, glass, water, etc
 Security – Greater exposure to risks.
 Unauthorized access.
 Compromising data.
 Denial of service.
Thank You

More Related Content

What's hot (20)

Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
802 15-4 tutorial
802 15-4 tutorial802 15-4 tutorial
802 15-4 tutorial
 
Ethernet
EthernetEthernet
Ethernet
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
networking device router,switches & bridges
networking device router,switches & bridgesnetworking device router,switches & bridges
networking device router,switches & bridges
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Ip address
Ip addressIp address
Ip address
 
Vlan
Vlan Vlan
Vlan
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocol
 

Similar to 802.11 Standard Explained: A Guide to Wi-Fi Technology

Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptdxmuthu
 
8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).pptSAMBIT34
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networkingM Sabir Saeed
 
Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Darpan Patel
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEric Vanderburg
 
wifi-technology
 wifi-technology wifi-technology
wifi-technologytardeep
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxalanfhall8953
 

Similar to 802.11 Standard Explained: A Guide to Wi-Fi Technology (20)

Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
Darsh
DarshDarsh
Darsh
 
8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).ppt
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 
Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)Wireless%20networking%20technology(1)
Wireless%20networking%20technology(1)
 
J010216776
J010216776J010216776
J010216776
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
Wi fi[1]
Wi fi[1]Wi fi[1]
Wi fi[1]
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
What is a Wifi?
What is a Wifi?What is a Wifi?
What is a Wifi?
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

802.11 Standard Explained: A Guide to Wi-Fi Technology

  • 1. Wi-Fi the 802.11 Standard VIPUL KUMAR MAURYA CSE Department, 3rd Year
  • 2. Introduction Wi-Fi Stands for Wireless Fidelity Wireless Fidelity is generic term refers to (The Institute of Electrical and Electronics Engineers ) IEEE 802.11 standards for Wireless Local Area Network. Wi-Fi is a wireless technology that uses radio frequency to transmit data through the air. Wi-Fi Network Connects Computer to each other, to the internet and to the wired network.
  • 3. Wi-Fi Works On IEEE 802.11 Standards  802.11 is primarily concerned with the lower layers of the OSI model.  Data Link Layer  Logical Link Control (LLC).  Medium Access Control (MAC).  Physical Layer  Physical Layer Convergence Procedure (PLCP).  Physical Medium Dependent (PMD).
  • 4. 802.11 Standards IEEE 802 .11 b IEEE 802 .11a IEEE 802 .11g IEEE 802 .11n IEEE 802 .11ac IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5, and 60 GHz frequency bands
  • 5. 802.11b Standard  Appears in late 1999  Operates at 2.44Ghz radio spectrum  11Mbps (theoretical speed)- within 30 meter Range  4-6 Mbps Actual Speed  100-150 feet range  Limits the number of access points in range of each other to three  Most Popular , Least Expensive  Interference from Mobile Phones and Bluetooth device which can reduce transmission speed  Uses direct-sequence spread-spectrum technology
  • 6. 802.11a Standard  Introduce in 2001  Operates at 5GHz  Less popular and Less interfered  54 Mbps (theoretical Speed)  15-20 Mbps (Actual Speed)  50-75 feet range  More Expensive  Highly Obstructed  Not Compatible with 802.11b  Uses frequency division multiplexing
  • 7. 802.11g Standard  Introduce in 2003  Combine features of both a and b  100-150 feet range  54 Mbps (theoretical speed)  20-25 Mbps (actual Speed)  2.4 GHz radio frequency  Compatible with b  Uses frequency division multiplexing
  • 8. 802.11n Standard  802.11n also known as Wireless N  802.11n Ratified in 2009  802.11n builds upon previous 802.11 standards by adding multiple-input multiple-output (MIMO).  Operates on Both 2.4Ghz and 5Ghz  Provide Bandwidth up to 300Mbps  Backward-compatible with 802.11b/g gear  Increased Speed and range
  • 9. 802.11ac Standard  Builds on 802.11n ,Published in 2013  The addition of Multi-user MIMO (MU-MIMO)  Utilizes dual band wireless technology  Support Connection both 2.4 GHz and 5GHz  Backward compatibility to 802.11b/g/n  Bandwidth rated up to 1300 Mbps on the 5 GHz  bandwidth rated up to 450 Mbps on the 2.4 GHz
  • 10. Elements Of Wi-Fi  Access Point- The AP is wireless LAN radio transceiver or “base station” that can connect to one or many wireless devices simultaneously to internet.  Wi –Fi Card- They accept wireless signal and relay information. They can be external or internal.  Safeguards – Firewalls and anti-virus protects from uninvited users and keep information secure.
  • 11. Wi-Fi Network Topologies  Peer to Peer Topology (Ad-hoc mode)  AP – Based Topology (Infrastructure mode)
  • 12. Peer to Peer Topology  AP is not required  Client devices can communicate with each other directly  Useful to create wireless network easily and quickly
  • 13. Infrastructure Network  The client communicate through Access point  Any Communication has to go through AP  If a Mobile station like PDA, Computer has to communicate with other Mobile station, it need to sends information to AP first , then AP sends Info to destination mobile station
  • 14. How Wi-Fi Works?  A Wi-Fi hotspot is created by installing an access point to an internet connection.  An Access Point acts as base station  When a Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly.  A computer’s adapter translate data into radio signals and transmits it using antenna  A Wireless router receives the signals and decode it. Router sends the information  Many access points can connected to each other via Ethernet cables to create a single large network.
  • 15. CSMA/CA  Carrier Sense Multiple Access with Collision Avoidance  CSMA/CA is used by Data Link Layer.  MS (mobile station) sends its packets, it checks to see if someone else is sending information. Only when the medium is free can an MS sends packets.  If some station is sending or receiving signal, the MS that intends to send will generate a random waiting time and wait for its turn. If several MSs are all waiting for their turns, since their waiting times are randomly generated and thus not equal, they will not start sending simultaneously. Thus collision (two or more MSs sending signals simultaneously) is avoided.
  • 16. Security  Wired Equivalency Protocol (WEP)  Wi-Fi Protected Access (WPA)  Wi-Fi Protected Access 2 (WPA2)  Extensible Authentication Protocol (EAP)  Firewall
  • 17. Advantages  Freedom – You can work from any location that you can get a signal.  Setup Cost – No cabling required.  Flexibility – Quick and easy to setup in temp or permanent space.  Scalable – Can be expanded with growth.  Mobile Access – Can access the network on the move.
  • 18. Disadvantages  Speed – Slower than cable.  Range – Affected by various medium.  Travels best through open space.  Reduced by walls, glass, water, etc  Security – Greater exposure to risks.  Unauthorized access.  Compromising data.  Denial of service.