SlideShare a Scribd company logo
PRESENTATION ON WI-
    FI TECHNOLOGY




By
MD MONIRUZZAMAN
   DEPT:-ECE 3RD YEAR
 WBUT ROLL NO: 09148003059
                             1
-:ACKNOWLEDGEMENT
        :-
    My respected
       teacher:
  Prof. Tarun Kumar
         Das

                      2
   # Introduction
   # Wi-Fi Technologies
   # Wi-Fi Architecture
   # Wi-Fi Network Elements
   # How a Wi-Fi Network Works
   # Wi-Fi Network Topologies
   # Wi-Fi Configurations
   # Applications of Wi-Fi
   # Wi-Fi Security
   # Conclusions
   # Reference
   # Bibliography
                                  3
Introduction
#   Wireless Technology is an
 alternative         to           Wired
 Technology, which is commonly
 used, for connecting devices in
 wireless mode.
# Wi-Fi (Wireless Fidelity) is a generic
 term that refers to the IEEE 802.11
 communications       standard       for
 Wireless Local Area Networks         4
The Wi-Fi Technology
Wi-Fi Networks use Radio
Technologies to transmit &
receive data at high speed:

# IEEE 802.11b(1999)
# IEEE 802.11a(2001)
# IEEE 802.11g(2003)          5
802.11 Physical Layer
# There are three sub layers in
 physical layer:      1. Direct
 Sequence      Spread     Spectrum
 (DSSS)
  2.Frequency Hoping Spread
 Spectrum (FHSS)
  3.Diffused Infrared (DFIR) - Wide
 angle                           6
DSSS
# Direct sequence signaling technique
 divides the 2.4 GHz band into 11 22-
 MHz channels. Adjacent channels
 overlap one another partially, with
 three of the 11 being completely non-
 overlapping. Data is sent across one
 of these 22 MHz channels without
 hopping to other channels.
                                     7
IEEE 802.11 Data Link
Layer
The data link layer consists of two
sub-layers :
  * Logical Link Control (LLC)
    *       Media Access Control
 (MAC).
  802.11 uses the same 802.2 LLC
 and 48-bit addressing as other 802
 LANs, allowing for very simple
                                  8

 bridging from wireless to IEEE
802.11 Media Access Control
# Carrier Sense Medium Access with collision avoidance
  protocol (CSMA/CA)
   ** Listen before talking
   ** Avoid collision by explicit Acknowledgement (ACK)
   ** Problem: additional overhead of ACK packets, so slow
     performance
# Request to Send/Clear to Send (RTS/CTS)
 protocol
  • Solution for “hidden node” problem
  • Problem:     Adds additional overhead by
    temporarily reserving the medium, so used for
    large size packets only retransmission would be
    expensive
# Power Management
                                                       9
Elements of a WI-FI Network
# Access Point (AP) -            The AP is a
 wireless LAN transceiver or “base station” that
 can connect one or many wireless devices
 simultaneously to the Internet.


# Wi-Fi cards -      They accept the wireless
 signal and relay information.They can be
 internal and external.(e.g PCMCIA Card for
 Laptop and PCI Card for Desktop PC)

                                               10


# Safeguards -         Firewalls and anti-virus
How a Wi-Fi Network Works
# Basic concept is same as Walkie talkies.
# A Wi-Fi hotspot is created by installing an
 access point to an internet connection.
# An access point acts as a base station.
# When Wi-Fi enabled device encounters a
 hotspot the device can then connect to that
 network wirelessly.
# A single access point can support up to 30
 users and can function within a range of 100 –
 150 feet indoors and up to 300 feet outdoors.
# Many access points can be connected to each
                                              11
Wi-Fi Network Topologies
# AP-based topology (Infrastructure
 Mode)

# Peer-to-peer    topology   (Ad-hoc
 Mode)

# Point-to-multipoint bridge topology
                                    12
AP-based topology
# The client communicate through Access
 Point.
# BSA-RF coverage provided by an AP.
# ESA-It consists of 2 or more BSA.
# ESA cell includes 10-15% overlap to
 allow roaming.




                                      13
Peer-to-peer topology
# AP is not required.
# Client devices within a
  cell can communicate
  directly with each
  other.
# It is useful for setting
  up of a wireless
  network quickly and
  easily.
                             14
Point-to-multipoint bridge topology
This is used to connect a LAN in one building to
a LANs in other buildings even if the buildings
are miles apart . These conditions receive a
clear line of sight between buildings. The line-of-
sight range varies based on the type of wireless
bridge and antenna used as well as the
environmental conditions.




                                                  15
Wi-Fi Configurations



                       16
Wi-Fi Applications
# Home
# Small Businesses or SOHO
# Large Corporations & Campuses
# Health Care
# Wireless ISP (WISP)
#Travellers
                                  17
Wi-Fi Security Techniques
Service   Set Identifier
 (SSID)
Wired Equivalent Privacy
 (WEP)
802.1X Access Control
Wireless Protected Access
 (WPA)
IEEE 802.11i               18
Service Set Identifier (SSID)
•   SSID is used to identify an
    802.11 network
•   It can be pre-configured or
    advertised in beacon
    broadcast
•   It is transmitted in clear text
    •   Provide very little security   19
Wired Equivalent Privacy
 Or i g i n a l
                  (WEP) t y s o l u t i
                 s e c u r i                            o n
    o f   f  e r e d     b y     t h e     I EEE      802.11
    s t   a  n d a r d
   Us    e  s     RC4       e n c r y p t i o n     wi t h
    p r   e  -s h a r e d k e y s         a n d 24 b i t
    i n   i  t i a l i z a t i o n v e c t o r s (I V )
   k e   y     s c h e d u l e     i s    g e n e r a t e d
    b y     c o n c a t e n a t i n g t h e s h a r e d
    s e   c r e t      k e y     wi t h     a    r a n d o m
    g e   n e r a t e d 24-b i t I V
   32     b i t     I C V (I n t e g r i t y      c h e c k
    v a   l u e )
   No    . o f b i t s i n k e y s c h e d u l e i s
    e q   u a l     t o    s u m o f      l e n g t h    o 20
                                                           f
    t h   e p l a i n t e x t a n d I CV
802.1x Access
•   Designed as aControl network access
                  general purpose
    control mechanism
•   Authenticate each client connected to AP (for
    WLAN) or switch port (for Ethernet)
•   Authentication is done with the RADIUS
    server, which ”tells” the access point whether
    access to controlled ports should be allowed
    or not
    •   AP forces the user into an unauthorized state
    •   user send an EAP start message
    •   AP return an EAP message requesting the user’s
        identity
    •   Identity send by user is then forwared to the
        authentication server by AP                   21
Wireless Protected Access
                       (WPA)
# WPA is a specification of standard based, interoperable
security enhancements that strongly increase the level of data
protection and access control for existing and future wireless
LAN system.
•   User Authentication
    •   802.1x
    •   EAP
# TKIP (Temporal Key Integrity Protocol) encryption
    •   RC4, dynamic encryption keys (session based)
         •   48 bit IV
         •   per packet key mixing function
    •   Fixes all issues found from WEP
•   Uses Message Integrity Code (MIC) Michael
    •   Ensures data integrity
• Old hardware should be upgradeable to WPA
# WPA comes in two flavors
        WPA-PSK
                                                                 22
    •
   Wi-Fi technology is the non-
    cable connection between the
                                     # Limitation:
    access point or router and       •   Degradation in
    the PC. The PC remotely
    connects to the internet             performance
    without any wires or cables.     •   High power
    In some cases, Wi-Fi tech.
    requires you to have the WEP     •   consumption
    or WPA key to access.
    WEP/WPA is like the              •   Interference
    password to secure your          •   Limited range
    wireless router/ access
    point.
# Advantages:
•   Mobility, Ease of Installation
•   Flexibility, Cost
•   Reliability,Security                                  23
#
http://in.search.yahoo.com/search;_ylt=A8pWB_u3zVFPxVYAqUv
uPXRG?ei=UTF-8&rd=r1&fr=yfp-t-704-s&p=wi-
fi+technologies&SpellState=&fr2=sp-qrw-corr-top

    http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf
   "Wi-Fi (wireless networking technology)". Encyclopedia
   Britannica.
www.wikipedia.com
www.yahoo.com
www.Google.com
   www.bing.com/image




                                                                  24
BIBLIOGRA
  PHY
“Wi-Fi: What's next", Paul
 S.Henry
Wireless       Networking
 Handbook, Jim Geier.
Wi-Fi             (wireless
 networking technology)".
 Encyclopedia Britannica
Seoul Moves to Provide
 Free    City-Wide     Wi-Fi
 Service". Retrieved 1 April   25
26

More Related Content

What's hot

Bluetooth [in]security
Bluetooth [in]securityBluetooth [in]security
Bluetooth [in]security
securityxploded
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
BLUETOOTH SECURITY
BLUETOOTH SECURITYBLUETOOTH SECURITY
BLUETOOTH SECURITY
Jay Nagar
 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Securityh_marvin
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and securityakki_hearts
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs Bluetooth
Arun ACE
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
Arpit Bhatia
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?
Stephen Kho
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
Mostafa Ali
 
Wireless standards
Wireless standards Wireless standards
Wireless standards
Ajay Suresh
 
Zigbee
ZigbeeZigbee
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
Anand Dhana
 
Wireless security
Wireless securityWireless security
Wireless securityparipec
 
LoRa Alliance
LoRa AllianceLoRa Alliance
LoRa Alliance
Sohan Bappy
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
Ramasubbu .P
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Mohammad Fareed
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
Aniruddha Gupta
 
Teknologi Bluetooth
Teknologi BluetoothTeknologi Bluetooth
Teknologi Bluetooth
'Ariq M Thabrani
 
Wi-Fi For Beginners - Module 1- What is WiFi?
Wi-Fi For Beginners - Module 1- What is WiFi?Wi-Fi For Beginners - Module 1- What is WiFi?
Wi-Fi For Beginners - Module 1- What is WiFi?
Nigel Bowden
 

What's hot (20)

Bluetooth [in]security
Bluetooth [in]securityBluetooth [in]security
Bluetooth [in]security
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
BLUETOOTH SECURITY
BLUETOOTH SECURITYBLUETOOTH SECURITY
BLUETOOTH SECURITY
 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs Bluetooth
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
 
Wi fi
Wi fiWi fi
Wi fi
 
Wireless standards
Wireless standards Wireless standards
Wireless standards
 
Zigbee
ZigbeeZigbee
Zigbee
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Wireless security
Wireless securityWireless security
Wireless security
 
LoRa Alliance
LoRa AllianceLoRa Alliance
LoRa Alliance
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
Teknologi Bluetooth
Teknologi BluetoothTeknologi Bluetooth
Teknologi Bluetooth
 
Wi-Fi For Beginners - Module 1- What is WiFi?
Wi-Fi For Beginners - Module 1- What is WiFi?Wi-Fi For Beginners - Module 1- What is WiFi?
Wi-Fi For Beginners - Module 1- What is WiFi?
 

Viewers also liked

wifi
wifiwifi
Wi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification ProcessWi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification ProcessGopiNath Rko
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
Hem Pokhrel
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology WriteupShital Kat
 
WIFI Technology
WIFI TechnologyWIFI Technology
WIFI Technology
Mohamed Hafez
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
HasanMaster
 
wifi-technology
 wifi-technology wifi-technology
wifi-technologytardeep
 
SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016
SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016
SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016Chanho Lee
 
WIFI TECHNOLOGY
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
Ajnish Rana
 
LI-FI
LI-FILI-FI
Wifi technology
Wifi technologyWifi technology
Wifi technology
Biju Patnaik University
 
WiFi; It's Not Just Connectivity
WiFi; It's Not Just ConnectivityWiFi; It's Not Just Connectivity
WiFi; It's Not Just Connectivity
Westbase.io
 

Viewers also liked (16)

wifi technology
wifi technologywifi technology
wifi technology
 
wifi
wifiwifi
wifi
 
Wi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification ProcessWi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification Process
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology Writeup
 
Wifi technology ppt
Wifi technology pptWifi technology ppt
Wifi technology ppt
 
WIFI Technology
WIFI TechnologyWIFI Technology
WIFI Technology
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016
SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016
SOMPA_Wireless_and_WiFi_solutions(E)_rev.1.3_082016
 
WIFI TECHNOLOGY
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
 
WiFi Technology & IEEE
WiFi Technology & IEEEWiFi Technology & IEEE
WiFi Technology & IEEE
 
LI-FI
LI-FILI-FI
LI-FI
 
Wifi technology
Wifi technologyWifi technology
Wifi technology
 
WiFi; It's Not Just Connectivity
WiFi; It's Not Just ConnectivityWiFi; It's Not Just Connectivity
WiFi; It's Not Just Connectivity
 

Similar to Wifi- technology_moni

Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
JigsAshley
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
PREMKUMAR
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
Bill Drew
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
Sreekanth GS
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
guestd7b627
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
SABIR ALI MOLLAH
 
Wi fi technology & wap
Wi fi technology & wap Wi fi technology & wap
Wi fi technology & wap
Divakar Triple H
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
Ravi Rajput
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
Virendra Thakur
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
Wail Hassan
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
eceb9198
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
Gurpreet Singh
 
Wi fi
Wi fiWi fi
Wi fi
kendre1234
 

Similar to Wifi- technology_moni (20)

Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Wi fi technology & wap
Wi fi technology & wap Wi fi technology & wap
Wi fi technology & wap
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
 
Wifi
WifiWifi
Wifi
 
wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wireless Fidelity ppt
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 
Wi fi
Wi fiWi fi
Wi fi
 

Recently uploaded

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 

Wifi- technology_moni

  • 1. PRESENTATION ON WI- FI TECHNOLOGY By MD MONIRUZZAMAN DEPT:-ECE 3RD YEAR WBUT ROLL NO: 09148003059 1
  • 2. -:ACKNOWLEDGEMENT :- My respected teacher: Prof. Tarun Kumar Das 2
  • 3. # Introduction  # Wi-Fi Technologies  # Wi-Fi Architecture  # Wi-Fi Network Elements  # How a Wi-Fi Network Works  # Wi-Fi Network Topologies  # Wi-Fi Configurations  # Applications of Wi-Fi  # Wi-Fi Security  # Conclusions  # Reference  # Bibliography 3
  • 4. Introduction # Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless mode. # Wi-Fi (Wireless Fidelity) is a generic term that refers to the IEEE 802.11 communications standard for Wireless Local Area Networks 4
  • 5. The Wi-Fi Technology Wi-Fi Networks use Radio Technologies to transmit & receive data at high speed: # IEEE 802.11b(1999) # IEEE 802.11a(2001) # IEEE 802.11g(2003) 5
  • 6. 802.11 Physical Layer # There are three sub layers in physical layer: 1. Direct Sequence Spread Spectrum (DSSS) 2.Frequency Hoping Spread Spectrum (FHSS) 3.Diffused Infrared (DFIR) - Wide angle 6
  • 7. DSSS # Direct sequence signaling technique divides the 2.4 GHz band into 11 22- MHz channels. Adjacent channels overlap one another partially, with three of the 11 being completely non- overlapping. Data is sent across one of these 22 MHz channels without hopping to other channels. 7
  • 8. IEEE 802.11 Data Link Layer The data link layer consists of two sub-layers : * Logical Link Control (LLC) * Media Access Control (MAC). 802.11 uses the same 802.2 LLC and 48-bit addressing as other 802 LANs, allowing for very simple 8 bridging from wireless to IEEE
  • 9. 802.11 Media Access Control # Carrier Sense Medium Access with collision avoidance protocol (CSMA/CA) ** Listen before talking ** Avoid collision by explicit Acknowledgement (ACK) ** Problem: additional overhead of ACK packets, so slow performance # Request to Send/Clear to Send (RTS/CTS) protocol • Solution for “hidden node” problem • Problem: Adds additional overhead by temporarily reserving the medium, so used for large size packets only retransmission would be expensive # Power Management 9
  • 10. Elements of a WI-FI Network # Access Point (AP) - The AP is a wireless LAN transceiver or “base station” that can connect one or many wireless devices simultaneously to the Internet. # Wi-Fi cards - They accept the wireless signal and relay information.They can be internal and external.(e.g PCMCIA Card for Laptop and PCI Card for Desktop PC) 10 # Safeguards - Firewalls and anti-virus
  • 11. How a Wi-Fi Network Works # Basic concept is same as Walkie talkies. # A Wi-Fi hotspot is created by installing an access point to an internet connection. # An access point acts as a base station. # When Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly. # A single access point can support up to 30 users and can function within a range of 100 – 150 feet indoors and up to 300 feet outdoors. # Many access points can be connected to each 11
  • 12. Wi-Fi Network Topologies # AP-based topology (Infrastructure Mode) # Peer-to-peer topology (Ad-hoc Mode) # Point-to-multipoint bridge topology 12
  • 13. AP-based topology # The client communicate through Access Point. # BSA-RF coverage provided by an AP. # ESA-It consists of 2 or more BSA. # ESA cell includes 10-15% overlap to allow roaming. 13
  • 14. Peer-to-peer topology # AP is not required. # Client devices within a cell can communicate directly with each other. # It is useful for setting up of a wireless network quickly and easily. 14
  • 15. Point-to-multipoint bridge topology This is used to connect a LAN in one building to a LANs in other buildings even if the buildings are miles apart . These conditions receive a clear line of sight between buildings. The line-of- sight range varies based on the type of wireless bridge and antenna used as well as the environmental conditions. 15
  • 17. Wi-Fi Applications # Home # Small Businesses or SOHO # Large Corporations & Campuses # Health Care # Wireless ISP (WISP) #Travellers 17
  • 18. Wi-Fi Security Techniques Service Set Identifier (SSID) Wired Equivalent Privacy (WEP) 802.1X Access Control Wireless Protected Access (WPA) IEEE 802.11i 18
  • 19. Service Set Identifier (SSID) • SSID is used to identify an 802.11 network • It can be pre-configured or advertised in beacon broadcast • It is transmitted in clear text • Provide very little security 19
  • 20. Wired Equivalent Privacy  Or i g i n a l (WEP) t y s o l u t i s e c u r i o n o f f e r e d b y t h e I EEE 802.11 s t a n d a r d  Us e s RC4 e n c r y p t i o n wi t h p r e -s h a r e d k e y s a n d 24 b i t i n i t i a l i z a t i o n v e c t o r s (I V )  k e y s c h e d u l e i s g e n e r a t e d b y c o n c a t e n a t i n g t h e s h a r e d s e c r e t k e y wi t h a r a n d o m g e n e r a t e d 24-b i t I V  32 b i t I C V (I n t e g r i t y c h e c k v a l u e )  No . o f b i t s i n k e y s c h e d u l e i s e q u a l t o s u m o f l e n g t h o 20 f t h e p l a i n t e x t a n d I CV
  • 21. 802.1x Access • Designed as aControl network access general purpose control mechanism • Authenticate each client connected to AP (for WLAN) or switch port (for Ethernet) • Authentication is done with the RADIUS server, which ”tells” the access point whether access to controlled ports should be allowed or not • AP forces the user into an unauthorized state • user send an EAP start message • AP return an EAP message requesting the user’s identity • Identity send by user is then forwared to the authentication server by AP 21
  • 22. Wireless Protected Access (WPA) # WPA is a specification of standard based, interoperable security enhancements that strongly increase the level of data protection and access control for existing and future wireless LAN system. • User Authentication • 802.1x • EAP # TKIP (Temporal Key Integrity Protocol) encryption • RC4, dynamic encryption keys (session based) • 48 bit IV • per packet key mixing function • Fixes all issues found from WEP • Uses Message Integrity Code (MIC) Michael • Ensures data integrity • Old hardware should be upgradeable to WPA # WPA comes in two flavors WPA-PSK 22 •
  • 23. Wi-Fi technology is the non- cable connection between the # Limitation: access point or router and • Degradation in the PC. The PC remotely connects to the internet performance without any wires or cables. • High power In some cases, Wi-Fi tech. requires you to have the WEP • consumption or WPA key to access. WEP/WPA is like the • Interference password to secure your • Limited range wireless router/ access point. # Advantages: • Mobility, Ease of Installation • Flexibility, Cost • Reliability,Security 23
  • 24. # http://in.search.yahoo.com/search;_ylt=A8pWB_u3zVFPxVYAqUv uPXRG?ei=UTF-8&rd=r1&fr=yfp-t-704-s&p=wi- fi+technologies&SpellState=&fr2=sp-qrw-corr-top http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf "Wi-Fi (wireless networking technology)". Encyclopedia Britannica. www.wikipedia.com www.yahoo.com www.Google.com www.bing.com/image 24
  • 25. BIBLIOGRA PHY “Wi-Fi: What's next", Paul S.Henry Wireless Networking Handbook, Jim Geier. Wi-Fi (wireless networking technology)". Encyclopedia Britannica Seoul Moves to Provide Free City-Wide Wi-Fi Service". Retrieved 1 April 25
  • 26. 26