SlideShare a Scribd company logo
Technology
Wi-Fi Tech. Agenda 
 Introduction 
 Purpose 
 Wi-Fi Alliance 
 Founder 
 The Wi-Fi Technology 
 Versions 
 Elements of a WI-FI Network 
 How a Wi-Fi Network Works 
 Wi-Fi Network Topologies 
 Wi-Fi Configurations 
 Wi-Fi Applications 
 Wi-Fi Security 
 Advantages & Disadvantages
Introduction 
• Wireless Technology is an alternative to Wired Technology, 
which is commonly used, for connecting devices in wireless 
mode. 
• Wi-Fi (Wireless Fidelity) is a generic term that refers to the 
IEEE 802.11 communications standard for Wireless Local 
Area Networks (WLANs). 
• Wi-Fi Network connect computers to each other, to the 
internet and to the wired network. 
• Wi-Fi works on physical and data link layer.
Need of Wi-Fi Technology 
Home! 
!!
Purpose 
 The purpose of Wi-Fi is to hide complexity by enabling 
wireless access to applications and data, media and streams. 
 The main aims of Wi-Fi are the following: 
make access to information easier 
ensure compatibility and co-existence of devices 
eliminate complex cabling 
eliminate switches, adapters, plugs, pins and connectors
Wi-Fi Alliance 
The term Wi-Fi was created the Wi-Fi Alliance as a play 
on "Hi-Fi," an abbreviation for "high fidelity," which 
referred to high-quality audio reproduction. 
 According to the Wi-Fi Alliance, "Wi-Fi" is not an 
abbreviation. 
The confusion may stem from the fact that the Alliance 
briefly used "The standard for wireless fidelity" as a 
slogan for Wi-Fi.
Founder 
• Phil Belanger who is the founding member of the Wi-Fi 
Alliance states that term Wi-Fi was never supposed to 
mean anything at all. 
• The yin-yang logo indicates the certification of a product 
for interoperability.
The Wi-Fi Technology 
 The technology used in Wi-Fi is easiest to understand 
in terms of radio. 
 It is quite similar to walkie-talkies, the only 
difference being in the strength of signals. 
 An ordinary walkie-talkie can handle only limited 
data in the range of 1000 bits per second, and operate 
at 49 MHz. 
 In the case of Wi-Fi radios, the signal strength is 
much more, so they can handle much higher data 
rates. Wi-Fi radios typically operate at a frequency of 
2.4GHz.
versions 
♣ There are three versions of Wi-Fi radios currently 
available- the ones that work with, 
♣ 802.11b 
♣ 802.11g 
♣ 802.11a 
♣ While the first two- 802.11b and 802.11g- transmit 
2.4 GHz, the radios operating at 802.11a standard can 
transmit at 5GHz.
IEEE 802.11b 
► Appeared in late 1999 
► Operates at 2.4GHz radio spectrum 
► 11 Mbps (theoretical speed) - within 30 m Range 
► 4-6 Mbps (actual speed) 
► 100 -150 feet range 
► Most popular, Least Expensive 
► Interference from mobile phones and Bluetooth devices 
which can reduce the transmission speed.
IEEE 802.11a 
♣ Introduced in 2001 
♣ Operates at 5 GHz (less popular) 
♣ 54 Mbps (theoretical speed) 
♣ 15-20 Mbps (Actual speed) 
♣ 50-75 feet range 
♣ More expensive 
♣ Not compatible with 802.11b
IEEE 802.11g 
 Introduced in 2003 
 Combine the feature of both standards (a,b) 
 100-150 feet range 
 54 Mbps Speed 
 2.4 GHz radio frequencies 
 Compatible with ‘b’
Elements of a WI-FI Network 
 Access Point (AP) - The AP is a wireless LAN 
transceiver or “base station” that can connect one or many 
wireless devices simultaneously to the Internet. 
 Wi-Fi cards - They accept the wireless signal and relay 
information. They can be internal and external.(e.g 
PCMCIA Card for Laptop and PCI Card for Desktop PC) 
 Safeguards - Firewalls and anti-virus software protect 
networks from uninvited users and keep information 
secure.
How a Wi-Fi Network Works 
 Basic concept is same asWalkie talkies. 
 A Wi-Fi hotspot is created by installing an access point to 
an internet connection. 
 An access point acts as a base station. 
 When Wi-Fi enabled device encounters a hotspot the 
device can then connect to that network wirelessly. 
 A single access point can support up to 30 users and can 
function within a range of 100 up to 300 feet. 
 Many access points can be connected to each other via 
Ethernet cables to create a single large network.
Wi-Fi Network Topologies 
 IEEE 802.11 operates in following 3 modes, 
 AP-based topology (Infrastructure Mode) 
 Peer-to-Peer topology (Ad-hoc Mode) 
 Point-to-Multipoint bridge topology
AP-based topology 
 The client communicate through Access Point. 
Here10-15% overlap will occur to allow roaming.
Peer-to-Peer topology 
• AP is not required. 
• Client devices within a cell can communicate directly with 
each other. 
• It is useful for setting up of a wireless network quickly 
and easily.
Point-to-Multipoint bridge 
topology 
• This is used to connect a LAN in one building to a LANs 
in other buildings even if the buildings are miles apart. 
These conditions receive a clear line of sight between 
buildings. 
• The line-of-sight range varies based on the type of wireless 
bridge and antenna used as well as the environmental 
conditions.
Wi-Fi Configurations 
 Wi-Fi is composed of three main sectors: 
 Home (individual residences and apartment buildings) 
 Public (Round about 70,000 “hotspots” through out the 
world) 
 Enterprise (corporations, universities, office parks)
802.11 Vs 802.16
Wi-Fi Applications 
 Home 
 Small Businesses 
 Large Corporations & Campuses 
 Health Care 
 Travellers
Wi-Fi Security 
Service Set Identifier (SSID) 
Wired Equivalent Privacy (WEP) 
Wireless Protected Access (WPA) 
IEEE 802.11i 
 WEP and WPA are encryption protocols that you can choose 
from in your router's firmware. 
 Wi-Fi Protected Access (WPA), a subset of the upcoming 
802.11i security standard, will replace the flawed Wired 
Equivalent Privacy (WEP). 
 Without your SSID, people will not be able to join your Wi- 
Fi hotspot.
Advantages 
 Ease of Installation 
 Flexibility 
 Cost 
 Security 
 Speed
Limitations 
 Degradation in performance 
 High power consumption 
 Limited range
Thank You

More Related Content

What's hot

WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
HasanMaster
 
Wimax Technology
Wimax TechnologyWimax Technology
Wimax Technology
Shafaque Ghayas Sattar
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wireless Communication
 Wireless Communication Wireless Communication
Wireless Communication
Sourov Shaha Suvo
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
Naveen Kumar
 
Cellular Services over WiFi
Cellular Services over WiFiCellular Services over WiFi
Cellular Services over WiFi
3G4G
 
Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologies
Chandrakant Choure
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
Bhushan Jadhav
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
Shubham Singh
 
The Bluetooth technology
The Bluetooth technologyThe Bluetooth technology
The Bluetooth technology
SaQi95
 
WiMAX Basics
WiMAX Basics WiMAX Basics
WiMAX Basics
Jarin Tasnim Khan
 
WiMAX
WiMAXWiMAX
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
SABIR ALI MOLLAH
 
Wireless Fidelity
Wireless FidelityWireless Fidelity
Wireless Fidelity
JAI MCA-STUDENT
 
Wi fi / Wireless Fidelity
Wi fi / Wireless FidelityWi fi / Wireless Fidelity
Wi fi / Wireless Fidelity
Chiranjit Adhikary
 
Wireless networks and types
Wireless networks and typesWireless networks and types
Wireless networks and types
Sachin Gade
 
Wifi technology
Wifi technologyWifi technology
Wifi technology
Biju Patnaik University
 

What's hot (20)

Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Wimax Technology
Wimax TechnologyWimax Technology
Wimax Technology
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wireless Fidelity ppt
 
Wireless Communication
 Wireless Communication Wireless Communication
Wireless Communication
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
Cellular Services over WiFi
Cellular Services over WiFiCellular Services over WiFi
Cellular Services over WiFi
 
Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologies
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
The Bluetooth technology
The Bluetooth technologyThe Bluetooth technology
The Bluetooth technology
 
Wi fi
Wi fiWi fi
Wi fi
 
WiMAX Basics
WiMAX Basics WiMAX Basics
WiMAX Basics
 
WiMAX
WiMAXWiMAX
WiMAX
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Wireless Fidelity
Wireless FidelityWireless Fidelity
Wireless Fidelity
 
Wi fi / Wireless Fidelity
Wi fi / Wireless FidelityWi fi / Wireless Fidelity
Wi fi / Wireless Fidelity
 
Wireless networks and types
Wireless networks and typesWireless networks and types
Wireless networks and types
 
Wifi technology
Wifi technologyWifi technology
Wifi technology
 

Similar to wi-fi technology

WIFI TECHNOLOGY
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
Ajnish Rana
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
Ravi Rajput
 
wireless networks.pptx
wireless networks.pptxwireless networks.pptx
wireless networks.pptx
RiazAhmad521284
 
wi-fi
wi-fiwi-fi
wifi tech-1.pptx
wifi tech-1.pptxwifi tech-1.pptx
wifi tech-1.pptx
DrMarwaElsherif
 
Computer network wifi
Computer network wifiComputer network wifi
Computer network wifi
Anil Pokhrel
 
Wifi
Wifi Wifi
Wi-Fi technology
Wi-Fi technologyWi-Fi technology
Wi-Fi technology
Nazrin Parveen
 
Wi-Fi
Wi-Fi Wi-Fi
Wi-Fi
sukhdeepK
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology WriteupShital Kat
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
HemanthGowdaN1
 
wirelessnetworks-ppt-140909071911-phpapp02.pdf
wirelessnetworks-ppt-140909071911-phpapp02.pdfwirelessnetworks-ppt-140909071911-phpapp02.pdf
wirelessnetworks-ppt-140909071911-phpapp02.pdf
kouyepwanko
 
W I R E L E S S F I D E L I T Y
W I R E L E S S  F I D E L I T YW I R E L E S S  F I D E L I T Y
W I R E L E S S F I D E L I T Ygou145
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentationdayansaji
 
Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02
Zameer Abdul Azeez Mulla
 

Similar to wi-fi technology (20)

WIFI TECHNOLOGY
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
 
Wifi Bsnl.
Wifi Bsnl.Wifi Bsnl.
Wifi Bsnl.
 
wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
wireless networks.pptx
wireless networks.pptxwireless networks.pptx
wireless networks.pptx
 
wi-fi
wi-fiwi-fi
wi-fi
 
wifi tech-1.pptx
wifi tech-1.pptxwifi tech-1.pptx
wifi tech-1.pptx
 
Computer network wifi
Computer network wifiComputer network wifi
Computer network wifi
 
Wifi
Wifi Wifi
Wifi
 
Wi-Fi technology
Wi-Fi technologyWi-Fi technology
Wi-Fi technology
 
Wi-Fi
Wi-Fi Wi-Fi
Wi-Fi
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology Writeup
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
wirelessnetworks-ppt-140909071911-phpapp02.pdf
wirelessnetworks-ppt-140909071911-phpapp02.pdfwirelessnetworks-ppt-140909071911-phpapp02.pdf
wirelessnetworks-ppt-140909071911-phpapp02.pdf
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
W I R E L E S S F I D E L I T Y
W I R E L E S S  F I D E L I T YW I R E L E S S  F I D E L I T Y
W I R E L E S S F I D E L I T Y
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
 
Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 

wi-fi technology

  • 2. Wi-Fi Tech. Agenda  Introduction  Purpose  Wi-Fi Alliance  Founder  The Wi-Fi Technology  Versions  Elements of a WI-FI Network  How a Wi-Fi Network Works  Wi-Fi Network Topologies  Wi-Fi Configurations  Wi-Fi Applications  Wi-Fi Security  Advantages & Disadvantages
  • 3. Introduction • Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless mode. • Wi-Fi (Wireless Fidelity) is a generic term that refers to the IEEE 802.11 communications standard for Wireless Local Area Networks (WLANs). • Wi-Fi Network connect computers to each other, to the internet and to the wired network. • Wi-Fi works on physical and data link layer.
  • 4. Need of Wi-Fi Technology Home! !!
  • 5. Purpose  The purpose of Wi-Fi is to hide complexity by enabling wireless access to applications and data, media and streams.  The main aims of Wi-Fi are the following: make access to information easier ensure compatibility and co-existence of devices eliminate complex cabling eliminate switches, adapters, plugs, pins and connectors
  • 6. Wi-Fi Alliance The term Wi-Fi was created the Wi-Fi Alliance as a play on "Hi-Fi," an abbreviation for "high fidelity," which referred to high-quality audio reproduction.  According to the Wi-Fi Alliance, "Wi-Fi" is not an abbreviation. The confusion may stem from the fact that the Alliance briefly used "The standard for wireless fidelity" as a slogan for Wi-Fi.
  • 7. Founder • Phil Belanger who is the founding member of the Wi-Fi Alliance states that term Wi-Fi was never supposed to mean anything at all. • The yin-yang logo indicates the certification of a product for interoperability.
  • 8. The Wi-Fi Technology  The technology used in Wi-Fi is easiest to understand in terms of radio.  It is quite similar to walkie-talkies, the only difference being in the strength of signals.  An ordinary walkie-talkie can handle only limited data in the range of 1000 bits per second, and operate at 49 MHz.  In the case of Wi-Fi radios, the signal strength is much more, so they can handle much higher data rates. Wi-Fi radios typically operate at a frequency of 2.4GHz.
  • 9. versions ♣ There are three versions of Wi-Fi radios currently available- the ones that work with, ♣ 802.11b ♣ 802.11g ♣ 802.11a ♣ While the first two- 802.11b and 802.11g- transmit 2.4 GHz, the radios operating at 802.11a standard can transmit at 5GHz.
  • 10. IEEE 802.11b ► Appeared in late 1999 ► Operates at 2.4GHz radio spectrum ► 11 Mbps (theoretical speed) - within 30 m Range ► 4-6 Mbps (actual speed) ► 100 -150 feet range ► Most popular, Least Expensive ► Interference from mobile phones and Bluetooth devices which can reduce the transmission speed.
  • 11. IEEE 802.11a ♣ Introduced in 2001 ♣ Operates at 5 GHz (less popular) ♣ 54 Mbps (theoretical speed) ♣ 15-20 Mbps (Actual speed) ♣ 50-75 feet range ♣ More expensive ♣ Not compatible with 802.11b
  • 12. IEEE 802.11g  Introduced in 2003  Combine the feature of both standards (a,b)  100-150 feet range  54 Mbps Speed  2.4 GHz radio frequencies  Compatible with ‘b’
  • 13. Elements of a WI-FI Network  Access Point (AP) - The AP is a wireless LAN transceiver or “base station” that can connect one or many wireless devices simultaneously to the Internet.  Wi-Fi cards - They accept the wireless signal and relay information. They can be internal and external.(e.g PCMCIA Card for Laptop and PCI Card for Desktop PC)  Safeguards - Firewalls and anti-virus software protect networks from uninvited users and keep information secure.
  • 14.
  • 15. How a Wi-Fi Network Works  Basic concept is same asWalkie talkies.  A Wi-Fi hotspot is created by installing an access point to an internet connection.  An access point acts as a base station.  When Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly.  A single access point can support up to 30 users and can function within a range of 100 up to 300 feet.  Many access points can be connected to each other via Ethernet cables to create a single large network.
  • 16. Wi-Fi Network Topologies  IEEE 802.11 operates in following 3 modes,  AP-based topology (Infrastructure Mode)  Peer-to-Peer topology (Ad-hoc Mode)  Point-to-Multipoint bridge topology
  • 17. AP-based topology  The client communicate through Access Point. Here10-15% overlap will occur to allow roaming.
  • 18. Peer-to-Peer topology • AP is not required. • Client devices within a cell can communicate directly with each other. • It is useful for setting up of a wireless network quickly and easily.
  • 19. Point-to-Multipoint bridge topology • This is used to connect a LAN in one building to a LANs in other buildings even if the buildings are miles apart. These conditions receive a clear line of sight between buildings. • The line-of-sight range varies based on the type of wireless bridge and antenna used as well as the environmental conditions.
  • 20. Wi-Fi Configurations  Wi-Fi is composed of three main sectors:  Home (individual residences and apartment buildings)  Public (Round about 70,000 “hotspots” through out the world)  Enterprise (corporations, universities, office parks)
  • 22. Wi-Fi Applications  Home  Small Businesses  Large Corporations & Campuses  Health Care  Travellers
  • 23. Wi-Fi Security Service Set Identifier (SSID) Wired Equivalent Privacy (WEP) Wireless Protected Access (WPA) IEEE 802.11i  WEP and WPA are encryption protocols that you can choose from in your router's firmware.  Wi-Fi Protected Access (WPA), a subset of the upcoming 802.11i security standard, will replace the flawed Wired Equivalent Privacy (WEP).  Without your SSID, people will not be able to join your Wi- Fi hotspot.
  • 24. Advantages  Ease of Installation  Flexibility  Cost  Security  Speed
  • 25. Limitations  Degradation in performance  High power consumption  Limited range