SlideShare a Scribd company logo
Wi-Fi TECHNOLOGY
BY
TEJASRI
A New Paradigm of Wireless Technology
This Paper Tells About
• Introduction
• Wi-Fi Technologies
• Wi-Fi Network Elements
• How a Wi-Fi Network Works
• Wi-Fi Network Topologies
• Wi-Fi Applications
• Wi-Fi Configurations
• Wi-Fi Security
• Advantages/ Disadvantages of Wi-Fi
Introduction
• Wireless Technology is an alternative to Wired
Technology, which is commonly used, for
connecting devices in wireless mode.
• Wi-Fi (Wireless Fidelity) is a generic term that
refers to the IEEE 802.11 communications
standard for Wireless Local Area Networks
(WLANs).
• Wi-Fi Network connect computers to each other,
to the internet and to the wired network.
The Wi-Fi Technology
Wi-Fi Networks use Radio Technologies to
transmit & receive data at high speed:
• IEEE 802.11b
• IEEE 802.11a
• IEEE 802.11g
Comparisons Of Wi-Fi Flavours
802.11b 802.11a 802.11g
In 1999
2.4GHz
In 2001
5GHz
In 2003
2.4GHz
11Mbps 54Mbps 54Mbps
30-100m 100-300m 100-300m
Elements of a WI-FI Network
• Access Point (AP) - The AP is a wireless LAN
transceiver or “base station” that can connect one or many
wireless devices simultaneously to the Internet.
• Wi-Fi cards - They accept the wireless signal and relay
information.They can be internal and external.(e.g PCMCIA
Card for Laptop and PCI Card for Desktop PC)
• Safeguards - Firewalls and anti-virus software protect
networks from uninvited users and keep information secure.
How a Wi-Fi Network Works
• Basic concept is same as Walkie talkies.
• A Wi-Fi hotspot is created by installing an access point to
an internet connection.
• An access point acts as a base station.
• When Wi-Fi enabled device encounters a hotspot the
device can then connect to that network wirelessly.
• A single access point can support up to 30 users and
can function within a range of 100 – 150 feet indoors and
up to 300 feet outdoors.
• Many access points can be connected to each other via
Ethernet cables to create a single large network.
How a Wi-Fi Network Works
» A computer's wireless
adapter translates data into
a radio signal and transmits
it using an antenna.
» A wireless router receives
the signal and decodes it.
» The router sends the
information to the Internet
using a physical, wired
Ethernet connection.
Wi-Fi Network Topologies
• AP-based topology (Infrastructure Mode)
• Peer-to-peer topology
• Point-to-multipoint bridge topology
AP-based topology
• The client communicate through Access Point.
• BSA-RF coverage provided by an AP.
• ESA-It consists of 2 or more BSA.
• ESA cell includes 10-15% overlap to allow
roaming.
Peer-to-peer topology
• AP is not required.
• Client devices within a
cell can communicate
directly with each
other.
• It is useful for setting
up of a wireless
network quickly and
easily.
Point-to-multipoint bridge topology
This is used to connect a LAN in one building to a LANs
in other buildings even if the buildings are miles
apart.These conditions receive a clear line of sight
between buildings. The line-of-sight range varies based
on the type of wireless bridge and antenna used as well
as the environmental conditions.
Wi-Fi Applications
• Home
• Small Businesses or SOHO
• Large Corporations & Campuses
• Health Care
• Wireless ISP (WISP)
• Travellers
Wi-Fi Security
The requirements for Wi-Fi network security
can be broken down into two primary
components:
• Authentication
 User Authentication
 Server Authentication
• Privacy
Wi-Fi Security Techniques
• Service Set Identifier (SSID)
• Wired Equivalent Privacy (WEP)
• 802.1X Access Control
• Wireless Protected Access (WPA)
• IEEE 802.11i
Service Set Identifier (SSID)
• SSID is used to identify an 802.11 network
• It can be pre-configured or advertised in the
name of provider
• It is transmitted in clear text
• Provide very little security
Wired Equivalent Privacy (WEP)
• Uses RC4 encryption with pre-shared keys and 24 bit
initialization vectors (IV)
• Key schedule is generated by concatenating the
shared secret key with a random generated 24-bit IV
• 32 bit ICV (Integrity check value)
• No. of bits in keyschedule is equal to sum of length of
the plaintext and ICV
• Security Issue with WEP
• Short IV
• Static key
802.1x Access Control
Wireless Protected Access (WPA)
• WPA is a specification of standard based, interoperable
security enhancements that strongly increase the level of data
protection and access control for existing and future wireless
LAN system.
• User Authentication
• 802.1x
• TKIP (Temporal Key Integrity Protocol) encryption
• RC4, dynamic encryption keys (session based)
• 48 bit IV
• Fixes all issues found from WEP
• Uses Message Integrity Code (MIC)
– Ensures data integrity
• Old hardware should be upgradeable to WPA
802.11i
• Provides standard for WLAN security
• Authentication
• 802.1x
• Data encryption
• AES protocol is used
• Secure fast handoff-This allow roaming between
APs without requiring client to fully reauthenticate to
every AP.
• Will require new hardware
Advantages
• Mobility
• Ease of Installation
• Flexibility
• Cost
• Reliability
• Security
• Roaming
• Speed
Limitations
• Interference
• Degradation in performance
• High power consumption
• Limited range
Conclusion
• In the past, internet is luxury but now a days it
is need.
• So that for our requirements it’s necessity to
develop further technologies with low cost &
high speed of data transmission.
“Things that thinks …
don’t make sense unless they link.”
QUERIES ?
?
?
? ?
? ?
?
?
?? ?
?
Wifi vignan final

More Related Content

What's hot

wireless net workes
wireless net workeswireless net workes
wireless net workes
Sasank Rock
 
Access point or wireless router general questions tell you
Access point or wireless router general questions tell youAccess point or wireless router general questions tell you
Access point or wireless router general questions tell you
IT Tech
 
Wirelessnetworks mohit mehra
Wirelessnetworks mohit mehraWirelessnetworks mohit mehra
Wirelessnetworks mohit mehraMohit Mehra
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
Virendra Thakur
 
Configuring linksys wireless router
Configuring linksys wireless routerConfiguring linksys wireless router
Configuring linksys wireless router
anku3
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
Marcus Dempsey
 
Wi-Fi Tecnology
Wi-Fi TecnologyWi-Fi Tecnology
Wi-Fi Tecnology
kataria Arvind
 
Zigbee technolgy
Zigbee technolgy Zigbee technolgy
Zigbee technolgy
Haricharan Palakurthi
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
rajakhurram
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
City Vision University
 
Zigbee
 Zigbee    Zigbee
Zigbee
Ammad Marwat
 
Wifi slide by G.K.Sourav
Wifi slide by G.K.SouravWifi slide by G.K.Sourav
Wifi slide by G.K.Sourav
Gourav Kr. Sourav
 
LoRa application for detecting the harmful gases
LoRa application for detecting the harmful gasesLoRa application for detecting the harmful gases
LoRa application for detecting the harmful gases
PARNIKA GUPTA
 
Wifi
WifiWifi
Wi Fi presentation
Wi Fi presentationWi Fi presentation
Wi Fi presentation
GOPAL BASAK
 
Wi-Fi (MIS)
Wi-Fi   (MIS)Wi-Fi   (MIS)
Wi-Fi (MIS)
Diljit Singh Khalsa
 

What's hot (20)

wireless net workes
wireless net workeswireless net workes
wireless net workes
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Access point or wireless router general questions tell you
Access point or wireless router general questions tell youAccess point or wireless router general questions tell you
Access point or wireless router general questions tell you
 
Wirelessnetworks mohit mehra
Wirelessnetworks mohit mehraWirelessnetworks mohit mehra
Wirelessnetworks mohit mehra
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Configuring linksys wireless router
Configuring linksys wireless routerConfiguring linksys wireless router
Configuring linksys wireless router
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
Wi-Fi Tecnology
Wi-Fi TecnologyWi-Fi Tecnology
Wi-Fi Tecnology
 
Wireless
WirelessWireless
Wireless
 
Zigbee technolgy
Zigbee technolgy Zigbee technolgy
Zigbee technolgy
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Zigbee
 Zigbee    Zigbee
Zigbee
 
Wifi slide by G.K.Sourav
Wifi slide by G.K.SouravWifi slide by G.K.Sourav
Wifi slide by G.K.Sourav
 
LoRa application for detecting the harmful gases
LoRa application for detecting the harmful gasesLoRa application for detecting the harmful gases
LoRa application for detecting the harmful gases
 
Wifi
WifiWifi
Wifi
 
Wi Fi presentation
Wi Fi presentationWi Fi presentation
Wi Fi presentation
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
Wi-Fi (MIS)
Wi-Fi   (MIS)Wi-Fi   (MIS)
Wi-Fi (MIS)
 

Viewers also liked

Wi-Fi
Wi-FiWi-Fi
Wi-Fi
PREMKUMAR
 
SAP
SAPSAP
Pathways academy powerpoint 2017
Pathways academy powerpoint 2017Pathways academy powerpoint 2017
Pathways academy powerpoint 2017
John Sprague
 
Network security
Network securityNetwork security
Network security
PREMKUMAR
 
World widetelescopetecfest
World widetelescopetecfestWorld widetelescopetecfest
World widetelescopetecfest
PREMKUMAR
 
Albert einstein
Albert einsteinAlbert einstein
Albert einstein
PREMKUMAR
 
Einstein chrismason
Einstein chrismasonEinstein chrismason
Einstein chrismason
PREMKUMAR
 
Nano technology
Nano technologyNano technology
Nano technology
PREMKUMAR
 
Media Star 2015
Media Star 2015Media Star 2015
Media Star 2015
Petr Petrovich
 
Alcohol Awareness Month
Alcohol Awareness MonthAlcohol Awareness Month
Alcohol Awareness Month
Caron Treatment Centers
 
Thermal Power Plant
Thermal Power PlantThermal Power Plant
Thermal Power Plant
PREMKUMAR
 
Q1) In what ways does your media product use, develop or challenge forms and ...
Q1) In what ways does your media product use, develop or challenge forms and ...Q1) In what ways does your media product use, develop or challenge forms and ...
Q1) In what ways does your media product use, develop or challenge forms and ...
khaledjim
 
Securing Mobile
Securing Mobile Securing Mobile
Securing Mobile
PREMKUMAR
 
4 g communications
4 g communications4 g communications
4 g communications
PREMKUMAR
 
Test proj
Test projTest proj
Test proj
Petr Petrovich
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jamming
PREMKUMAR
 
network security
network securitynetwork security
network security
PREMKUMAR
 

Viewers also liked (19)

Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
SAP
SAPSAP
SAP
 
Pathways academy powerpoint 2017
Pathways academy powerpoint 2017Pathways academy powerpoint 2017
Pathways academy powerpoint 2017
 
Chord waktu yang salah
Chord waktu yang salahChord waktu yang salah
Chord waktu yang salah
 
Network security
Network securityNetwork security
Network security
 
World widetelescopetecfest
World widetelescopetecfestWorld widetelescopetecfest
World widetelescopetecfest
 
Albert einstein
Albert einsteinAlbert einstein
Albert einstein
 
Einstein chrismason
Einstein chrismasonEinstein chrismason
Einstein chrismason
 
Nano technology
Nano technologyNano technology
Nano technology
 
Media Star 2015
Media Star 2015Media Star 2015
Media Star 2015
 
Alcohol Awareness Month
Alcohol Awareness MonthAlcohol Awareness Month
Alcohol Awareness Month
 
Thermal Power Plant
Thermal Power PlantThermal Power Plant
Thermal Power Plant
 
Peace, Love, and Respect
Peace, Love, and RespectPeace, Love, and Respect
Peace, Love, and Respect
 
Q1) In what ways does your media product use, develop or challenge forms and ...
Q1) In what ways does your media product use, develop or challenge forms and ...Q1) In what ways does your media product use, develop or challenge forms and ...
Q1) In what ways does your media product use, develop or challenge forms and ...
 
Securing Mobile
Securing Mobile Securing Mobile
Securing Mobile
 
4 g communications
4 g communications4 g communications
4 g communications
 
Test proj
Test projTest proj
Test proj
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jamming
 
network security
network securitynetwork security
network security
 

Similar to Wifi vignan final

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
JigsAshley
 
Wireless networks
Wireless networksWireless networks
Wireless networks
SYEDJAMAESHA
 
Wireless networks
Wireless networksWireless networks
Wireless networks
Derick Ochia
 
Wireless networks
Wireless networksWireless networks
Wireless networks
Joland Reambillo
 
Wireless Networks.ppt
Wireless Networks.pptWireless Networks.ppt
Wireless Networks.ppt
xdarlord
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
Inocentshuja Ahmad
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
eceb9198
 
Wireless Networks 120719.ppt
Wireless Networks 120719.pptWireless Networks 120719.ppt
Wireless Networks 120719.ppt
AbyThomas54
 
WIFI2new.pptx
WIFI2new.pptxWIFI2new.pptx
WIFI2new.pptx
ssusere14610
 
Wifitechnology 120920000242-phpapp02
Wifitechnology 120920000242-phpapp02Wifitechnology 120920000242-phpapp02
Wifitechnology 120920000242-phpapp02
uma22
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wi fi technology & wap
Wi fi technology & wap Wi fi technology & wap
Wi fi technology & wap
Divakar Triple H
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
Purushottam Naidu
 
Wifi (1)
Wifi (1)Wifi (1)
Wifi (1)
Akhil Prem
 
Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
Hîmãńshu Mêęńä
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
Atika Zaimi
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
SABIR ALI MOLLAH
 

Similar to Wifi vignan final (20)

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wifi
WifiWifi
Wifi
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Wireless Networks.ppt
Wireless Networks.pptWireless Networks.ppt
Wireless Networks.ppt
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
 
Wireless Networks 120719.ppt
Wireless Networks 120719.pptWireless Networks 120719.ppt
Wireless Networks 120719.ppt
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
WIFI2new.pptx
WIFI2new.pptxWIFI2new.pptx
WIFI2new.pptx
 
Wifitechnology 120920000242-phpapp02
Wifitechnology 120920000242-phpapp02Wifitechnology 120920000242-phpapp02
Wifitechnology 120920000242-phpapp02
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wireless Fidelity ppt
 
Wi fi technology & wap
Wi fi technology & wap Wi fi technology & wap
Wi fi technology & wap
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
 
Wifi (1)
Wifi (1)Wifi (1)
Wifi (1)
 
Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 

More from PREMKUMAR

Redtacton
RedtactonRedtacton
Redtacton
PREMKUMAR
 
Global wireless e-voting
Global wireless e-votingGlobal wireless e-voting
Global wireless e-voting
PREMKUMAR
 
Steganography
SteganographySteganography
Steganography
PREMKUMAR
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
PREMKUMAR
 
Android
AndroidAndroid
Android
PREMKUMAR
 
3G technology
3G technology3G technology
3G technology
PREMKUMAR
 
Robotics
RoboticsRobotics
Robotics
PREMKUMAR
 
Face Morphing
Face MorphingFace Morphing
Face Morphing
PREMKUMAR
 
NANO ROBOTICS
NANO ROBOTICSNANO ROBOTICS
NANO ROBOTICS
PREMKUMAR
 
nuclear BATTERY
nuclear BATTERYnuclear BATTERY
nuclear BATTERY
PREMKUMAR
 
Memristor techonolgy
Memristor techonolgyMemristor techonolgy
Memristor techonolgy
PREMKUMAR
 
11 brain finger printing
11 brain finger printing11 brain finger printing
11 brain finger printing
PREMKUMAR
 
Non conventional energy sources
Non conventional energy sourcesNon conventional energy sources
Non conventional energy sources
PREMKUMAR
 
Widescreen PowerPoint
 Widescreen PowerPoint Widescreen PowerPoint
Widescreen PowerPoint
PREMKUMAR
 
4G
4G4G
Power aware cloud metering
Power aware cloud meteringPower aware cloud metering
Power aware cloud metering
PREMKUMAR
 
Agriculture field monitoring
Agriculture field monitoringAgriculture field monitoring
Agriculture field monitoring
PREMKUMAR
 
Canal of design
Canal of designCanal of design
Canal of design
PREMKUMAR
 

More from PREMKUMAR (18)

Redtacton
RedtactonRedtacton
Redtacton
 
Global wireless e-voting
Global wireless e-votingGlobal wireless e-voting
Global wireless e-voting
 
Steganography
SteganographySteganography
Steganography
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Android
AndroidAndroid
Android
 
3G technology
3G technology3G technology
3G technology
 
Robotics
RoboticsRobotics
Robotics
 
Face Morphing
Face MorphingFace Morphing
Face Morphing
 
NANO ROBOTICS
NANO ROBOTICSNANO ROBOTICS
NANO ROBOTICS
 
nuclear BATTERY
nuclear BATTERYnuclear BATTERY
nuclear BATTERY
 
Memristor techonolgy
Memristor techonolgyMemristor techonolgy
Memristor techonolgy
 
11 brain finger printing
11 brain finger printing11 brain finger printing
11 brain finger printing
 
Non conventional energy sources
Non conventional energy sourcesNon conventional energy sources
Non conventional energy sources
 
Widescreen PowerPoint
 Widescreen PowerPoint Widescreen PowerPoint
Widescreen PowerPoint
 
4G
4G4G
4G
 
Power aware cloud metering
Power aware cloud meteringPower aware cloud metering
Power aware cloud metering
 
Agriculture field monitoring
Agriculture field monitoringAgriculture field monitoring
Agriculture field monitoring
 
Canal of design
Canal of designCanal of design
Canal of design
 

Recently uploaded

Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 

Recently uploaded (16)

Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 

Wifi vignan final

  • 2. A New Paradigm of Wireless Technology
  • 3. This Paper Tells About • Introduction • Wi-Fi Technologies • Wi-Fi Network Elements • How a Wi-Fi Network Works • Wi-Fi Network Topologies • Wi-Fi Applications • Wi-Fi Configurations • Wi-Fi Security • Advantages/ Disadvantages of Wi-Fi
  • 4. Introduction • Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless mode. • Wi-Fi (Wireless Fidelity) is a generic term that refers to the IEEE 802.11 communications standard for Wireless Local Area Networks (WLANs). • Wi-Fi Network connect computers to each other, to the internet and to the wired network.
  • 5. The Wi-Fi Technology Wi-Fi Networks use Radio Technologies to transmit & receive data at high speed: • IEEE 802.11b • IEEE 802.11a • IEEE 802.11g
  • 6. Comparisons Of Wi-Fi Flavours 802.11b 802.11a 802.11g In 1999 2.4GHz In 2001 5GHz In 2003 2.4GHz 11Mbps 54Mbps 54Mbps 30-100m 100-300m 100-300m
  • 7. Elements of a WI-FI Network • Access Point (AP) - The AP is a wireless LAN transceiver or “base station” that can connect one or many wireless devices simultaneously to the Internet. • Wi-Fi cards - They accept the wireless signal and relay information.They can be internal and external.(e.g PCMCIA Card for Laptop and PCI Card for Desktop PC) • Safeguards - Firewalls and anti-virus software protect networks from uninvited users and keep information secure.
  • 8. How a Wi-Fi Network Works • Basic concept is same as Walkie talkies. • A Wi-Fi hotspot is created by installing an access point to an internet connection. • An access point acts as a base station. • When Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly. • A single access point can support up to 30 users and can function within a range of 100 – 150 feet indoors and up to 300 feet outdoors. • Many access points can be connected to each other via Ethernet cables to create a single large network.
  • 9. How a Wi-Fi Network Works » A computer's wireless adapter translates data into a radio signal and transmits it using an antenna. » A wireless router receives the signal and decodes it. » The router sends the information to the Internet using a physical, wired Ethernet connection.
  • 10. Wi-Fi Network Topologies • AP-based topology (Infrastructure Mode) • Peer-to-peer topology • Point-to-multipoint bridge topology
  • 11. AP-based topology • The client communicate through Access Point. • BSA-RF coverage provided by an AP. • ESA-It consists of 2 or more BSA. • ESA cell includes 10-15% overlap to allow roaming.
  • 12. Peer-to-peer topology • AP is not required. • Client devices within a cell can communicate directly with each other. • It is useful for setting up of a wireless network quickly and easily.
  • 13. Point-to-multipoint bridge topology This is used to connect a LAN in one building to a LANs in other buildings even if the buildings are miles apart.These conditions receive a clear line of sight between buildings. The line-of-sight range varies based on the type of wireless bridge and antenna used as well as the environmental conditions.
  • 14. Wi-Fi Applications • Home • Small Businesses or SOHO • Large Corporations & Campuses • Health Care • Wireless ISP (WISP) • Travellers
  • 15. Wi-Fi Security The requirements for Wi-Fi network security can be broken down into two primary components: • Authentication  User Authentication  Server Authentication • Privacy
  • 16. Wi-Fi Security Techniques • Service Set Identifier (SSID) • Wired Equivalent Privacy (WEP) • 802.1X Access Control • Wireless Protected Access (WPA) • IEEE 802.11i
  • 17. Service Set Identifier (SSID) • SSID is used to identify an 802.11 network • It can be pre-configured or advertised in the name of provider • It is transmitted in clear text • Provide very little security
  • 18. Wired Equivalent Privacy (WEP) • Uses RC4 encryption with pre-shared keys and 24 bit initialization vectors (IV) • Key schedule is generated by concatenating the shared secret key with a random generated 24-bit IV • 32 bit ICV (Integrity check value) • No. of bits in keyschedule is equal to sum of length of the plaintext and ICV • Security Issue with WEP • Short IV • Static key
  • 20. Wireless Protected Access (WPA) • WPA is a specification of standard based, interoperable security enhancements that strongly increase the level of data protection and access control for existing and future wireless LAN system. • User Authentication • 802.1x • TKIP (Temporal Key Integrity Protocol) encryption • RC4, dynamic encryption keys (session based) • 48 bit IV • Fixes all issues found from WEP • Uses Message Integrity Code (MIC) – Ensures data integrity • Old hardware should be upgradeable to WPA
  • 21. 802.11i • Provides standard for WLAN security • Authentication • 802.1x • Data encryption • AES protocol is used • Secure fast handoff-This allow roaming between APs without requiring client to fully reauthenticate to every AP. • Will require new hardware
  • 22. Advantages • Mobility • Ease of Installation • Flexibility • Cost • Reliability • Security • Roaming • Speed
  • 23. Limitations • Interference • Degradation in performance • High power consumption • Limited range
  • 24. Conclusion • In the past, internet is luxury but now a days it is need. • So that for our requirements it’s necessity to develop further technologies with low cost & high speed of data transmission.
  • 25. “Things that thinks … don’t make sense unless they link.”
  • 26. QUERIES ? ? ? ? ? ? ? ? ? ?? ? ?