SlideShare a Scribd company logo
Wireless Networking
Presented By:
Saikat Rahman
Md. Islam Khan
Biprojit Saha
Fahad Sarkar Siam
What is Wireless Networking?
With the help of wireless
technology we can transfer data
from one device to another
without using wire or cables.
Using this technology we can
establish network which is more
flexible, intangible and ease to
access.
Wireless Networking Data
Transmission
Generally implemented and administered
using:
Radio Transmission (Mostly)
Light Transmission
Infrared and Millimeter waves
Microwave Transmission
Components Requirements
The important components required for
setting up a wireless network are:
Medium
Access point and Extension point
Wireless bridges and Power line
bridges
Antennas
Wireless adapters
Wireless Station and Server
Software
Md Islam Khan
Types of Wireless Networks
Based on the size Wireless Networks are
divided into four categories .
 Wireless LAN
 Wireless MAN
 Wireless WAN
 Wireless PAN
Wireless LAN
This is a network where two or more
computers are connected that covers only a
limited area.
The NIC ( Network Interface Card)is used in
this connection where has a small range to
cover.
 We often called this peer to peer Network.
Wireless MAN
Collected unit of many WLAN located at
various.
 It uses WIMAX(World wide Interoperability
for Microwave Access) which is controlled by
WiMAX Forum.
 Maximum speed 1Bits/sec.
Wireless WAN
WWAN is a very large network which is spread
over a very large area. It connects many cites
together.
The technology in WWAN are subdivided in
many generations: 2G, 3G, 4G.
 This technology used in most of the Analog
devices.
Wireless PAN
The Wireless Networks that are used in
smaller distance are know as WPAN.
 The communication between a mobile phone
and its Bluetooth headset.
Two kinds of Wireless technologies are used
for WPAN.
 Bluetooth and Infrared Data Association.
Biprojith Saha
Security Options in Wireless
Network
Data can be easily hacked in Wireless network without
using proper security.
Three commonly used security system:
1. Wired Equivalent Privacy(WEP)
2. Wi—Fi Protected Access(WPA)
3. Wi—Fi Protected Access(WPA2)
WEP:
1. Security standard released in 1997.
2. The Encryption Algorithm used in WEP was easily
Breakable by Hackers.
WPA
1. Released in 2003, Invented by Wi—Fi Alliance
2. Required Firmware up gradation instead of changing any
hardware component.
WPA2
1. Released in 2004
2. Advanced security features are available
3. Advanced Encryption Standard
Why we use wireless
Networking?
It is helpful for portable devices such as
Laptops, mobiles, tablets etc.
Establish a network connection is easy.
Introducing a new device in the
Network is easy.
Security system is more featured in
wireless Networks.
Fahad Sarkar Siam
Advantages of wireless
Networking
Access and accessibility improved.
Backwards compatible as standards
improve.
Cost Savings.
Speed of installation.
Disadvantages of wireless
Networking
Conflict of standards.
Security.
Transmission speeds can fluctuate.
Slower then wired.
wireless networking

More Related Content

What's hot

Wi fi
Wi fiWi fi
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib Zeeshan
Zaibi Gondal
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
Vignesh Suresh
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and securityakki_hearts
 
Wi fi
Wi fiWi fi
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologyAkhil Kumar
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
Sandeep Powar
 
Wi-Fi Tecnology
Wi-Fi TecnologyWi-Fi Tecnology
Wi-Fi Tecnology
kataria Arvind
 
Wifi slide by G.K.Sourav
Wifi slide by G.K.SouravWifi slide by G.K.Sourav
Wifi slide by G.K.Sourav
Gourav Kr. Sourav
 
Wireless intelligent network
Wireless intelligent networkWireless intelligent network
Wireless intelligent network
suryakant singh
 
Wi-Fi (MIS)
Wi-Fi   (MIS)Wi-Fi   (MIS)
Wi-Fi (MIS)
Diljit Singh Khalsa
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
Aurobindo Nayak
 
Wi-fi tecnology
Wi-fi tecnologyWi-fi tecnology
Wi-fi tecnology
manisha9kathuria
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
Zul Fikri
 
Wlan security
Wlan securityWlan security
Wlan security
Sajan Sahu
 
Wlan security
Wlan securityWlan security
Wlan security
Upasona Roy
 
Wi-Fi technology
Wi-Fi technologyWi-Fi technology
Wi-Fi technology
Nazrin Parveen
 
pp mobile computing
pp mobile computingpp mobile computing
pp mobile computing
teachictform4
 

What's hot (20)

Wi fi
Wi fiWi fi
Wi fi
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib Zeeshan
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
 
Wi fi
Wi fiWi fi
Wi fi
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wi-Fi Tecnology
Wi-Fi TecnologyWi-Fi Tecnology
Wi-Fi Tecnology
 
Wifi slide by G.K.Sourav
Wifi slide by G.K.SouravWifi slide by G.K.Sourav
Wifi slide by G.K.Sourav
 
Wireless intelligent network
Wireless intelligent networkWireless intelligent network
Wireless intelligent network
 
Wi-Fi (MIS)
Wi-Fi   (MIS)Wi-Fi   (MIS)
Wi-Fi (MIS)
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Wi-fi tecnology
Wi-fi tecnologyWi-fi tecnology
Wi-fi tecnology
 
WIFI[autosaved]
WIFI[autosaved]WIFI[autosaved]
WIFI[autosaved]
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wi-Fi technology
Wi-Fi technologyWi-Fi technology
Wi-Fi technology
 
pp mobile computing
pp mobile computingpp mobile computing
pp mobile computing
 

Similar to wireless networking

wireless networking and Library
 wireless networking and Library wireless networking and Library
wireless networking and Library
sanjay thakur
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
Rzvinay
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
Aiman Hud
 
Wireless Netwok.pptx
Wireless Netwok.pptxWireless Netwok.pptx
Wireless Netwok.pptx
SajibMandal2
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesYogesh Kumar
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
Sweta Kumari Barnwal
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
Naveena D
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
abenimelos
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Saravana Kumar
 
Network Trends
Network TrendsNetwork Trends
Network Trends
Arun ACE
 
Wireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptxWireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptx
JosephCristian8
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
Bhushan Jadhav
 
Wireless Multimedia
Wireless Multimedia Wireless Multimedia
Wireless Multimedia
Radhwan Al-Jaki
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
IJNSA Journal
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
SABIR ALI MOLLAH
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
Michael Boman
 
ROUTING ASSOCIATE PRESENTATION-very good.pptx
ROUTING ASSOCIATE PRESENTATION-very good.pptxROUTING ASSOCIATE PRESENTATION-very good.pptx
ROUTING ASSOCIATE PRESENTATION-very good.pptx
AbhradipChatterjee2
 
8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).ppt
SAMBIT34
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
Gurpreet Singh
 

Similar to wireless networking (20)

wireless networking and Library
 wireless networking and Library wireless networking and Library
wireless networking and Library
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Wireless Netwok.pptx
Wireless Netwok.pptxWireless Netwok.pptx
Wireless Netwok.pptx
 
WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Network Trends
Network TrendsNetwork Trends
Network Trends
 
Wireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptxWireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptx
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
 
Wireless Multimedia
Wireless Multimedia Wireless Multimedia
Wireless Multimedia
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
ROUTING ASSOCIATE PRESENTATION-very good.pptx
ROUTING ASSOCIATE PRESENTATION-very good.pptxROUTING ASSOCIATE PRESENTATION-very good.pptx
ROUTING ASSOCIATE PRESENTATION-very good.pptx
 
8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).ppt
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 

More from Estiak Khan

Decision tree
Decision treeDecision tree
Decision tree
Estiak Khan
 
Steps in simulation study
Steps in simulation studySteps in simulation study
Steps in simulation study
Estiak Khan
 
Smart bajarlist wireless
Smart bajarlist wirelessSmart bajarlist wireless
Smart bajarlist wireless
Estiak Khan
 
Spiral model
Spiral modelSpiral model
Spiral model
Estiak Khan
 
Scrum agile-process
Scrum agile-processScrum agile-process
Scrum agile-process
Estiak Khan
 
Waterfall model
Waterfall modelWaterfall model
Waterfall model
Estiak Khan
 
V model
V modelV model
V model
Estiak Khan
 
Use case-slide
Use case-slideUse case-slide
Use case-slide
Estiak Khan
 
Graphical user-interface
Graphical user-interfaceGraphical user-interface
Graphical user-interface
Estiak Khan
 
Graphical User Interface (GUI)
Graphical User Interface (GUI)Graphical User Interface (GUI)
Graphical User Interface (GUI)
Estiak Khan
 
Graphical user-interface (GUI)
Graphical user-interface (GUI)Graphical user-interface (GUI)
Graphical user-interface (GUI)
Estiak Khan
 
Future operating system
Future operating systemFuture operating system
Future operating system
Estiak Khan
 
Android operating system
Android operating systemAndroid operating system
Android operating system
Estiak Khan
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Estiak Khan
 
Disadvantages of cloud computing
Disadvantages of cloud computingDisadvantages of cloud computing
Disadvantages of cloud computing
Estiak Khan
 
Determinants of supply
Determinants of supplyDeterminants of supply
Determinants of supply
Estiak Khan
 
Law of supply
Law of supplyLaw of supply
Law of supply
Estiak Khan
 
Distributed systems-analysis-and-design
Distributed systems-analysis-and-designDistributed systems-analysis-and-design
Distributed systems-analysis-and-design
Estiak Khan
 
Online Banking System
Online Banking SystemOnline Banking System
Online Banking System
Estiak Khan
 
Happy life
Happy lifeHappy life
Happy life
Estiak Khan
 

More from Estiak Khan (20)

Decision tree
Decision treeDecision tree
Decision tree
 
Steps in simulation study
Steps in simulation studySteps in simulation study
Steps in simulation study
 
Smart bajarlist wireless
Smart bajarlist wirelessSmart bajarlist wireless
Smart bajarlist wireless
 
Spiral model
Spiral modelSpiral model
Spiral model
 
Scrum agile-process
Scrum agile-processScrum agile-process
Scrum agile-process
 
Waterfall model
Waterfall modelWaterfall model
Waterfall model
 
V model
V modelV model
V model
 
Use case-slide
Use case-slideUse case-slide
Use case-slide
 
Graphical user-interface
Graphical user-interfaceGraphical user-interface
Graphical user-interface
 
Graphical User Interface (GUI)
Graphical User Interface (GUI)Graphical User Interface (GUI)
Graphical User Interface (GUI)
 
Graphical user-interface (GUI)
Graphical user-interface (GUI)Graphical user-interface (GUI)
Graphical user-interface (GUI)
 
Future operating system
Future operating systemFuture operating system
Future operating system
 
Android operating system
Android operating systemAndroid operating system
Android operating system
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Disadvantages of cloud computing
Disadvantages of cloud computingDisadvantages of cloud computing
Disadvantages of cloud computing
 
Determinants of supply
Determinants of supplyDeterminants of supply
Determinants of supply
 
Law of supply
Law of supplyLaw of supply
Law of supply
 
Distributed systems-analysis-and-design
Distributed systems-analysis-and-designDistributed systems-analysis-and-design
Distributed systems-analysis-and-design
 
Online Banking System
Online Banking SystemOnline Banking System
Online Banking System
 
Happy life
Happy lifeHappy life
Happy life
 

Recently uploaded

How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 

Recently uploaded (20)

How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 

wireless networking

  • 1. Wireless Networking Presented By: Saikat Rahman Md. Islam Khan Biprojit Saha Fahad Sarkar Siam
  • 2. What is Wireless Networking? With the help of wireless technology we can transfer data from one device to another without using wire or cables. Using this technology we can establish network which is more flexible, intangible and ease to access.
  • 3. Wireless Networking Data Transmission Generally implemented and administered using: Radio Transmission (Mostly) Light Transmission Infrared and Millimeter waves Microwave Transmission
  • 4. Components Requirements The important components required for setting up a wireless network are: Medium Access point and Extension point Wireless bridges and Power line bridges Antennas Wireless adapters Wireless Station and Server Software
  • 6. Types of Wireless Networks Based on the size Wireless Networks are divided into four categories .  Wireless LAN  Wireless MAN  Wireless WAN  Wireless PAN
  • 7. Wireless LAN This is a network where two or more computers are connected that covers only a limited area. The NIC ( Network Interface Card)is used in this connection where has a small range to cover.  We often called this peer to peer Network.
  • 8. Wireless MAN Collected unit of many WLAN located at various.  It uses WIMAX(World wide Interoperability for Microwave Access) which is controlled by WiMAX Forum.  Maximum speed 1Bits/sec.
  • 9. Wireless WAN WWAN is a very large network which is spread over a very large area. It connects many cites together. The technology in WWAN are subdivided in many generations: 2G, 3G, 4G.  This technology used in most of the Analog devices.
  • 10. Wireless PAN The Wireless Networks that are used in smaller distance are know as WPAN.  The communication between a mobile phone and its Bluetooth headset. Two kinds of Wireless technologies are used for WPAN.  Bluetooth and Infrared Data Association.
  • 12. Security Options in Wireless Network Data can be easily hacked in Wireless network without using proper security. Three commonly used security system: 1. Wired Equivalent Privacy(WEP) 2. Wi—Fi Protected Access(WPA) 3. Wi—Fi Protected Access(WPA2)
  • 13. WEP: 1. Security standard released in 1997. 2. The Encryption Algorithm used in WEP was easily Breakable by Hackers. WPA 1. Released in 2003, Invented by Wi—Fi Alliance 2. Required Firmware up gradation instead of changing any hardware component. WPA2 1. Released in 2004 2. Advanced security features are available 3. Advanced Encryption Standard
  • 14. Why we use wireless Networking? It is helpful for portable devices such as Laptops, mobiles, tablets etc. Establish a network connection is easy. Introducing a new device in the Network is easy. Security system is more featured in wireless Networks.
  • 16. Advantages of wireless Networking Access and accessibility improved. Backwards compatible as standards improve. Cost Savings. Speed of installation.
  • 17. Disadvantages of wireless Networking Conflict of standards. Security. Transmission speeds can fluctuate. Slower then wired.