SlideShare a Scribd company logo
1 of 30
www.oeclib.in
Submitted By:
Odisha Electronics Control Library
Seminar
On
Wireless Fidelity
 Introduction
 Purpose
 Wi-Fi Alliance
 The Wi-Fi Technology
 Elements of a WI-FI Network
 How a Wi-Fi Network Works
 Wi-Fi Network Topologies
 Wi-Fi Configurations
 Wi-Fi Applications
 Wi-Fi Security
 Authentication
 Advantages & Disadvantages
 Conclusion
 References
• Wireless Technology is an alternative to Wired
Technology, which is commonly used, for
connecting devices in wireless mode.
• Wi-Fi (Wireless Fidelity) is a generic term that refers
to the IEEE 802.11 communications standard for
Wireless Local Area Networks (WLANs).
• Wi-Fi Network connect computers to each other, to
the internet and to the wired network.
• Wi-Fi works on physical and data link layer.
The purpose of Wi-Fi is to hide complexity by
enabling wireless access to applications and data,
media and streams.
The main aims of Wi-Fi are the following:
 make access to information easier
 ensure compatibility and co-existence of devices
 eliminate cabling and wiring
 eliminate switches, adapters, plugs, pins and
connectors
 The Alliance promotes standards with the aim of
improving the interoperability of wireless local area
network products based on the IEEE 802.11
standards. The Wi-Fi Alliance, a consortium of
separate and independent companies, agrees on a
set of common interoperable products based on
the family of IEEE 802.11 standards.The Wi-Fi
Alliance certifies products via a set of defined test-
procedures to establish interoperability.
Wi-Fi Networks use Radio Technologies to
transmit & receive data at high speed:
•IEEE 802.11b
• IEEE 802.11a
• IEEE 802.11g
• IEEE 802.11n
• Appear in late 1999
• Operates at 2.4GHz radio spectrum
• 11 Mbps (theoretical speed) - within 30 m
Range
• 4-6 Mbps (actual speed)
• 100 -150 feet range
• Most popular, Least Expensive
• Interference from mobile phones and
Bluetooth devices which can reduce the
transmission speed.
• Introduced in 2001
• Operates at 5 GHz (less popular)
• 54 Mbps (theoretical speed)
• 15-20 Mbps (Actual speed)
• 50-75 feet range
• More expensive
• Not compatible with 802.11b
• Introduced in 2003
• Combine the feature of both standards (a,b)
• 100-150 feet range
• 54 Mbps Speed
• 2.4 GHz radio frequencies
• Compatible with ‘b’
• Access Point (AP) - The AP is a wireless LAN
transceiver or “base station” that can connect one or many
wireless devices simultaneously to the Internet.
• Wi-Fi cards - They accept the wireless signal and
relay information.They can be internal and external.(e.g
PCMCIA Card for Laptop and PCI Card for Desktop PC)
• Safeguards - Firewalls and anti-virus software protect
networks from uninvited users and keep information secure.
• Basic concept is same as Walkie talkies.
• A Wi-Fi hotspot is created by installing an access
point to an internet connection.
• An access point acts as a base station.
• When Wi-Fi enabled device encounters a hotspot
the device can then connect to that network
wirelessly.
• A single access point can support up to 30 users
and can function within a range of 100 up to 300
feet.
• Many access points can be connected to each other
via Ethernet cables to create a single large network.
• AP-based topology (Infrastructure Mode)
• Peer-to-peer topology (Ad-hoc Mode)
• Point-to-multipoint bridge topology
• The client communicate through Access Point.
• BSA-RF coverage provided by an AP.
• ESA-It consists of 2 or more BSA.
• ESA cell includes 10-15% overlap to allow roaming.
 AP is not required.
 Client devices within a
cell can communicate
directly with each other.
 It is useful for setting up
of a wireless network
quickly and easily.
This is used to connect a LAN in one building to a LANs in
other buildings even if the buildings are miles apart. These
conditions receive a clear line of sight between buildings. The
line-of-sight range varies based on the type of wireless
bridge and antenna used as well as the environmental
conditions.
Wi-Fi is composed of three main sectors:
 Home (individual residences and apartment
buildings)
 Public (Round about 70,000 “hotspots”
through out the world.)
 Enterprise (corporations, universities, office
parks)
• Home
• Small Businesses or SOHO
• Large Corporations & Campuses
• Health Care
• Wireless ISP (WISP)
• Travellers
The requirements for Wi-Fi network security
can be broken down into two primary
components:
• Authentication
• Privacy
• Service Set Identifier (SSID)
• Wired Equivalent Privacy (WEP)
•802.1X Access Control
• Wireless Protected Access (WPA)
•IEEE 802.11i
• Authentication Server is used
• Username and password
• Risk:
•Data (username & password) send before secure
channel established
• Solution
•Establishing a encrypted channel before
sending username and password
• Mobility
• Ease of Installation
• Flexibility
• Cost
• Reliability
• Security
• Use unlicensed part of the radio spectrum
• Roaming
• Speed
• Interference
• Degradation in performance
• High power consumption
• Limited range
 Wi-Fi provides freedom: freedom to physically
move around your home or business and still stay
connected to the internet or local network; freedom
to grow and move an office or business without
having to install new cables and wires, freedom to
be connected while travelling and on the road .
 www.google.com
 www.wikipedia.com
 www.oeclib.in
Wireless Fidelity ppt

More Related Content

What's hot (20)

Wifi technology ppt
Wifi technology pptWifi technology ppt
Wifi technology ppt
 
Wireless network
Wireless networkWireless network
Wireless network
 
Lifi technology ppt
Lifi technology pptLifi technology ppt
Lifi technology ppt
 
wi-fi ppt
wi-fi pptwi-fi ppt
wi-fi ppt
 
ppt on WIFI
ppt on WIFIppt on WIFI
ppt on WIFI
 
Presentation of-wimax
Presentation of-wimaxPresentation of-wimax
Presentation of-wimax
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
home networking
home networkinghome networking
home networking
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentation
 
Lifi ppt
Lifi pptLifi ppt
Lifi ppt
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 
Three types of wireless technology
Three types of wireless technologyThree types of wireless technology
Three types of wireless technology
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 
Wireless Fidelity
Wireless FidelityWireless Fidelity
Wireless Fidelity
 
5G wireless technology
5G wireless technology5G wireless technology
5G wireless technology
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
 
Wireless communaction
Wireless communactionWireless communaction
Wireless communaction
 

Similar to Wireless Fidelity ppt

Similar to Wireless Fidelity ppt (20)

41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
41 wifi technology
41 wifi technology41 wifi technology
41 wifi technology
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
 
WIFI2new.pptx
WIFI2new.pptxWIFI2new.pptx
WIFI2new.pptx
 
Wi fi
Wi fiWi fi
Wi fi
 
wifi ppt
wifi pptwifi ppt
wifi ppt
 
Wifi technology
Wifi technologyWifi technology
Wifi technology
 
wifi-technology-601-cG83h8O.pptx
wifi-technology-601-cG83h8O.pptxwifi-technology-601-cG83h8O.pptx
wifi-technology-601-cG83h8O.pptx
 
Wifi Bsnl.
Wifi Bsnl.Wifi Bsnl.
Wifi Bsnl.
 
Wifitechnology 120920000242-phpapp02
Wifitechnology 120920000242-phpapp02Wifitechnology 120920000242-phpapp02
Wifitechnology 120920000242-phpapp02
 
Wi-Fi Tecnology
Wi-Fi TecnologyWi-Fi Tecnology
Wi-Fi Tecnology
 
Wi-Fi
Wi-Fi Wi-Fi
Wi-Fi
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
 
WIFI
WIFIWIFI
WIFI
 
Wifi (1)
Wifi (1)Wifi (1)
Wifi (1)
 
WIFI TECHNOLOGY
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
 
Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Concept
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
 
Wi-Fi technology
Wi-Fi technologyWi-Fi technology
Wi-Fi technology
 

More from OECLIB Odisha Electronics Control Library

More from OECLIB Odisha Electronics Control Library (20)

5G technology-ppt
5G technology-ppt5G technology-ppt
5G technology-ppt
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Autonomic Computing PPT
 
Asynchronous Chips ppt
Asynchronous Chips pptAsynchronous Chips ppt
Asynchronous Chips ppt
 
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Artificial Eye PPT
 
Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
4G Wireless Systems ppt
4G Wireless Systems ppt4G Wireless Systems ppt
4G Wireless Systems ppt
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
 
Soa ppt
Soa pptSoa ppt
Soa ppt
 
Software developement life cycle ppt
Software developement life cycle pptSoftware developement life cycle ppt
Software developement life cycle ppt
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Wibree ppt
Wibree pptWibree ppt
Wibree ppt
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 

Recently uploaded

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Wireless Fidelity ppt

  • 1. www.oeclib.in Submitted By: Odisha Electronics Control Library Seminar On Wireless Fidelity
  • 2.  Introduction  Purpose  Wi-Fi Alliance  The Wi-Fi Technology  Elements of a WI-FI Network  How a Wi-Fi Network Works  Wi-Fi Network Topologies  Wi-Fi Configurations  Wi-Fi Applications  Wi-Fi Security  Authentication  Advantages & Disadvantages  Conclusion  References
  • 3. • Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless mode. • Wi-Fi (Wireless Fidelity) is a generic term that refers to the IEEE 802.11 communications standard for Wireless Local Area Networks (WLANs). • Wi-Fi Network connect computers to each other, to the internet and to the wired network. • Wi-Fi works on physical and data link layer.
  • 4. The purpose of Wi-Fi is to hide complexity by enabling wireless access to applications and data, media and streams. The main aims of Wi-Fi are the following:  make access to information easier  ensure compatibility and co-existence of devices  eliminate cabling and wiring  eliminate switches, adapters, plugs, pins and connectors
  • 5.  The Alliance promotes standards with the aim of improving the interoperability of wireless local area network products based on the IEEE 802.11 standards. The Wi-Fi Alliance, a consortium of separate and independent companies, agrees on a set of common interoperable products based on the family of IEEE 802.11 standards.The Wi-Fi Alliance certifies products via a set of defined test- procedures to establish interoperability.
  • 6. Wi-Fi Networks use Radio Technologies to transmit & receive data at high speed: •IEEE 802.11b • IEEE 802.11a • IEEE 802.11g • IEEE 802.11n
  • 7. • Appear in late 1999 • Operates at 2.4GHz radio spectrum • 11 Mbps (theoretical speed) - within 30 m Range • 4-6 Mbps (actual speed) • 100 -150 feet range • Most popular, Least Expensive • Interference from mobile phones and Bluetooth devices which can reduce the transmission speed.
  • 8. • Introduced in 2001 • Operates at 5 GHz (less popular) • 54 Mbps (theoretical speed) • 15-20 Mbps (Actual speed) • 50-75 feet range • More expensive • Not compatible with 802.11b
  • 9. • Introduced in 2003 • Combine the feature of both standards (a,b) • 100-150 feet range • 54 Mbps Speed • 2.4 GHz radio frequencies • Compatible with ‘b’
  • 10. • Access Point (AP) - The AP is a wireless LAN transceiver or “base station” that can connect one or many wireless devices simultaneously to the Internet. • Wi-Fi cards - They accept the wireless signal and relay information.They can be internal and external.(e.g PCMCIA Card for Laptop and PCI Card for Desktop PC) • Safeguards - Firewalls and anti-virus software protect networks from uninvited users and keep information secure.
  • 11. • Basic concept is same as Walkie talkies. • A Wi-Fi hotspot is created by installing an access point to an internet connection. • An access point acts as a base station. • When Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly. • A single access point can support up to 30 users and can function within a range of 100 up to 300 feet. • Many access points can be connected to each other via Ethernet cables to create a single large network.
  • 12. • AP-based topology (Infrastructure Mode) • Peer-to-peer topology (Ad-hoc Mode) • Point-to-multipoint bridge topology
  • 13. • The client communicate through Access Point. • BSA-RF coverage provided by an AP. • ESA-It consists of 2 or more BSA. • ESA cell includes 10-15% overlap to allow roaming.
  • 14.  AP is not required.  Client devices within a cell can communicate directly with each other.  It is useful for setting up of a wireless network quickly and easily.
  • 15. This is used to connect a LAN in one building to a LANs in other buildings even if the buildings are miles apart. These conditions receive a clear line of sight between buildings. The line-of-sight range varies based on the type of wireless bridge and antenna used as well as the environmental conditions.
  • 16. Wi-Fi is composed of three main sectors:  Home (individual residences and apartment buildings)  Public (Round about 70,000 “hotspots” through out the world.)  Enterprise (corporations, universities, office parks)
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. • Home • Small Businesses or SOHO • Large Corporations & Campuses • Health Care • Wireless ISP (WISP) • Travellers
  • 23. The requirements for Wi-Fi network security can be broken down into two primary components: • Authentication • Privacy
  • 24. • Service Set Identifier (SSID) • Wired Equivalent Privacy (WEP) •802.1X Access Control • Wireless Protected Access (WPA) •IEEE 802.11i
  • 25. • Authentication Server is used • Username and password • Risk: •Data (username & password) send before secure channel established • Solution •Establishing a encrypted channel before sending username and password
  • 26. • Mobility • Ease of Installation • Flexibility • Cost • Reliability • Security • Use unlicensed part of the radio spectrum • Roaming • Speed
  • 27. • Interference • Degradation in performance • High power consumption • Limited range
  • 28.  Wi-Fi provides freedom: freedom to physically move around your home or business and still stay connected to the internet or local network; freedom to grow and move an office or business without having to install new cables and wires, freedom to be connected while travelling and on the road .

Editor's Notes

  1. 1