SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Wireless Technology
Bhushan Jadhav – BSD India
Prepared By :
Outlines
• Introduction
• Types of Wireless Technology
• What is Wi-Fi?
• Wi-Fi Standards
• Hotspots
• Wi-Fi Network Elements
• How a Wi-Fi Network Works
• Advantages and Limitations of Wi-Fi
• Wi-Fi Security
• Conclusion
What is Wireless Technology ?
The term "wireless" refers, in the most basic and obvious sense, to
communications sent without wires or cables. It is a broad term
that encompasses all sorts of wireless technologies and devices,
including cellular communications, networking between
computers with wireless adapters, and wireless computer
accessories. Wireless communications travel over the air via
electromagnetic waves (radio frequencies, infrared, satellite, etc).
Types of Wireless Technology
 Wi-Fi
 Cellular
 WiMAX
 Bluetooth
GSM,3GSM,GPRS,CDMA,C
DMA2000,CDPD (Cellular
Digital Packet Data),TDMA
(Time Division Multiple Access)
802.11a/b/g/n
802.15802.16
2004, e & f
What is Wi-Fi?
Imagine working on your laptop or checking e-mail
from anywhere in your home.
Imagine being able to connect to your office network
from an airport or coffee shop.
Now, imagine doing all these things easily and
quickly, without worrying about finding a wired
network connection.
That is Wi-Fi !
 Wi-Fi (Wireless Fidelity) is a generic term that refers to the
IEEE (Institute of Electrical and Electronics Engineers) 802.11
communications standard for Wireless Local Area Network
(WLAN).
 Wireless technology is an alternative to Wired
Technology, which is commonly used, for connecting devices
in wireless using radio waves.
 Allows you to access the Internet while on the move; you can
remain online while moving from one area to
another, without a disconnection or loss in coverage.
IEEE 802.11 Standards
 In 1997, the IEEE drafted the 802.11 standard
for wireless local area networking.
 In 1999, networking hardware companies
accepted the standard and began
manufacturing product using the 802.11b
protocol which operated in the 2.4 GHz range
and was capable of transmitting at speeds of 1
Mbps.
 The 802.11a protocol was also released in
1999, operating at 5 GHz with transmissions
speeds of 54 Mbps, but its cost was high.
IEEE 802.11 Standards (Cont.)
Network
Standard
Maximum
Speed
(Mbps)
Range
(feet)
Frequency
(GHz)
Power
Drain
Cost
802.11b 11 100-150 2.4 Moderate Low
802.11a 54 60-100 5 High High
802.11g 54 150-250 2.4 Moderate Moderate
802.11n 200 Up to 300
Feet
2.4 & 5 Moderate Moderate
Hotspot
• What is a Hotspot ?
A Hotspot is any location where Wi-Fi network
access is made publicly available.
Hotspots are equipped with a Broadband Internet
connection, and one or more Access points that
allow users to access the Internet wirelessly.
Hotspots can be setup in any public location that
can support an Internet connection. All the
locations discussed below are examples of
Hotspots.
Wi-Fi Hotspot Locations
Airports
Hotels & Resorts
Restaurants
Coffee Shops
Bookstores
Shopping Malls
Elements of a Wi-Fi Network
Access Point (AP) – The AP is a wireless LAN
transceiver or “base station” that can connect
one or many wireless devices in the same time to
the Internet.
Safeguards – Firewalls and anti-virus software
protect networks from uninvited users and keep
information secure.
Wi-Fi cards (Adapters) – They accept the wireless
signal and relay information. They can be internal
and external.
How a Wi-Fi Network Works ?
• A Wi-Fi network makes use of radio waves to transmit
information across a network. The computer should
include a wireless adapter that will translate data sent
into a radio signal. This same signal will be transmitted,
via an antenna, to a decoder known as the router. Once
decoded, the data will be sent to the Internet through
a wired Ethernet connection. As the wireless network
will work as a two-way traffic, the data received from
the Internet will also pass through the router to be
coded into a radio signal that will be receipted by the
computer‘s wireless adapter.
Wi-Fi Network Diagram
Advantages of Wi-Fi
No Wires – A truly wireless networking
Solution
No Waiting – Fast, easy deployments.
No Worries – A wireless networking system
that secure, easy to manage, and built to grow
with you
Ease of Installation – Quick, easy setup.
Fast data transfer rates
Limitations of Wi-Fi
• Limited range.
• Data security risks : a huge challenge for Wi-Fi
networks.
• Interference from other devices : Such as
telephones, microwave ovens.
• High power consumption : making battery life
and heat a concern.
Basic Wi-Fi Security Techniques
WEP (Wired Equivalent Privacy) : The original
encryption technique specified by the IEEE
802.11 standard.
WPA (Wi-Fi Protected Access) : A new
standard that provides improved encryption
security over WEP.
WPA2 : is an improved version of WPA that
uses Advanced Encryption Standard (AES)
technology.
Basic Wi-Fi Security Techniques(Cont.)
Securing Method Security Level Notes
WEP Low No longer used; it is can be
hacked easily
WPA High Provides improves
encryption security over
WEP
WPA2 Very High An improved version of
WPA that uses Advanced
Encryption Standard
Conclusion
• Wi-Fi is a simple, cost-effective way to connect to the
Internet, without the need to physically connecting
wires.
• In 1997 IEEE drafted the 802.11 standard for wireless
local area networking.
• Hotspot is a geographic area setup in any public
location, and has a readily accessible wireless network.
• Security is a huge challenge for Wi-Fi Networks, many
Security Techniques are used to improve it.
• Wi-Fi Network have a several limitations that should be
concerned.
Wireless technology - Wi-Fi
Wireless technology - Wi-Fi

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Wifi technology
Wifi technologyWifi technology
Wifi technology
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Basic Concepts in Wireless LAN
Basic Concepts in Wireless LANBasic Concepts in Wireless LAN
Basic Concepts in Wireless LAN
 
WiMAX Basics
WiMAX Basics WiMAX Basics
WiMAX Basics
 
Wireless Communication
 Wireless Communication Wireless Communication
Wireless Communication
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
 
Three types of wireless technology
Three types of wireless technologyThree types of wireless technology
Three types of wireless technology
 
Presentation on wireless technology
Presentation on wireless technologyPresentation on wireless technology
Presentation on wireless technology
 
Wi-Fi 6.pptx
Wi-Fi 6.pptxWi-Fi 6.pptx
Wi-Fi 6.pptx
 
ppt on WIFI
ppt on WIFIppt on WIFI
ppt on WIFI
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentation
 
wi-fi ppt
wi-fi pptwi-fi ppt
wi-fi ppt
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
Presentation on wireless communication
Presentation on wireless communicationPresentation on wireless communication
Presentation on wireless communication
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
 

Andere mochten auch

Andere mochten auch (9)

4 g wireless technology
4 g wireless technology4 g wireless technology
4 g wireless technology
 
Gifi wireless Technology
Gifi wireless TechnologyGifi wireless Technology
Gifi wireless Technology
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
 
4g wireless technology
4g wireless technology 4g wireless technology
4g wireless technology
 
5 g –wireless technology
5 g –wireless technology5 g –wireless technology
5 g –wireless technology
 
5G Presentation
5G Presentation5G Presentation
5G Presentation
 
5G tecnology
5G tecnology5G tecnology
5G tecnology
 
5g ppt new
5g ppt new5g ppt new
5g ppt new
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 

Ähnlich wie Wireless technology - Wi-Fi

Ähnlich wie Wireless technology - Wi-Fi (20)

Wi fi
Wi fiWi fi
Wi fi
 
wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02
 
Wifi (1)
Wifi (1)Wifi (1)
Wifi (1)
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
Wireless
WirelessWireless
Wireless
 
WIFI2new.pptx
WIFI2new.pptxWIFI2new.pptx
WIFI2new.pptx
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentation
 
wireless networks.pptx
wireless networks.pptxwireless networks.pptx
wireless networks.pptx
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi-Fi Tecnology
Wi-Fi TecnologyWi-Fi Tecnology
Wi-Fi Tecnology
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi te-pp
Wi te-ppWi te-pp
Wi te-pp
 
WiFi Technology & IEEE
WiFi Technology & IEEEWiFi Technology & IEEE
WiFi Technology & IEEE
 
Wifi
WifiWifi
Wifi
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
wirelessnetworks-ppt-140909071911-phpapp02.pdf
wirelessnetworks-ppt-140909071911-phpapp02.pdfwirelessnetworks-ppt-140909071911-phpapp02.pdf
wirelessnetworks-ppt-140909071911-phpapp02.pdf
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 

Kürzlich hochgeladen (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Wireless technology - Wi-Fi

  • 1. Wireless Technology Bhushan Jadhav – BSD India Prepared By :
  • 2. Outlines • Introduction • Types of Wireless Technology • What is Wi-Fi? • Wi-Fi Standards • Hotspots • Wi-Fi Network Elements • How a Wi-Fi Network Works • Advantages and Limitations of Wi-Fi • Wi-Fi Security • Conclusion
  • 3. What is Wireless Technology ? The term "wireless" refers, in the most basic and obvious sense, to communications sent without wires or cables. It is a broad term that encompasses all sorts of wireless technologies and devices, including cellular communications, networking between computers with wireless adapters, and wireless computer accessories. Wireless communications travel over the air via electromagnetic waves (radio frequencies, infrared, satellite, etc).
  • 4. Types of Wireless Technology  Wi-Fi  Cellular  WiMAX  Bluetooth GSM,3GSM,GPRS,CDMA,C DMA2000,CDPD (Cellular Digital Packet Data),TDMA (Time Division Multiple Access) 802.11a/b/g/n 802.15802.16 2004, e & f
  • 5. What is Wi-Fi? Imagine working on your laptop or checking e-mail from anywhere in your home. Imagine being able to connect to your office network from an airport or coffee shop. Now, imagine doing all these things easily and quickly, without worrying about finding a wired network connection. That is Wi-Fi !
  • 6.  Wi-Fi (Wireless Fidelity) is a generic term that refers to the IEEE (Institute of Electrical and Electronics Engineers) 802.11 communications standard for Wireless Local Area Network (WLAN).  Wireless technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless using radio waves.  Allows you to access the Internet while on the move; you can remain online while moving from one area to another, without a disconnection or loss in coverage.
  • 7. IEEE 802.11 Standards  In 1997, the IEEE drafted the 802.11 standard for wireless local area networking.  In 1999, networking hardware companies accepted the standard and began manufacturing product using the 802.11b protocol which operated in the 2.4 GHz range and was capable of transmitting at speeds of 1 Mbps.  The 802.11a protocol was also released in 1999, operating at 5 GHz with transmissions speeds of 54 Mbps, but its cost was high.
  • 8. IEEE 802.11 Standards (Cont.) Network Standard Maximum Speed (Mbps) Range (feet) Frequency (GHz) Power Drain Cost 802.11b 11 100-150 2.4 Moderate Low 802.11a 54 60-100 5 High High 802.11g 54 150-250 2.4 Moderate Moderate 802.11n 200 Up to 300 Feet 2.4 & 5 Moderate Moderate
  • 9. Hotspot • What is a Hotspot ? A Hotspot is any location where Wi-Fi network access is made publicly available. Hotspots are equipped with a Broadband Internet connection, and one or more Access points that allow users to access the Internet wirelessly. Hotspots can be setup in any public location that can support an Internet connection. All the locations discussed below are examples of Hotspots.
  • 10. Wi-Fi Hotspot Locations Airports Hotels & Resorts Restaurants Coffee Shops Bookstores Shopping Malls
  • 11. Elements of a Wi-Fi Network Access Point (AP) – The AP is a wireless LAN transceiver or “base station” that can connect one or many wireless devices in the same time to the Internet. Safeguards – Firewalls and anti-virus software protect networks from uninvited users and keep information secure. Wi-Fi cards (Adapters) – They accept the wireless signal and relay information. They can be internal and external.
  • 12. How a Wi-Fi Network Works ? • A Wi-Fi network makes use of radio waves to transmit information across a network. The computer should include a wireless adapter that will translate data sent into a radio signal. This same signal will be transmitted, via an antenna, to a decoder known as the router. Once decoded, the data will be sent to the Internet through a wired Ethernet connection. As the wireless network will work as a two-way traffic, the data received from the Internet will also pass through the router to be coded into a radio signal that will be receipted by the computer‘s wireless adapter.
  • 14. Advantages of Wi-Fi No Wires – A truly wireless networking Solution No Waiting – Fast, easy deployments. No Worries – A wireless networking system that secure, easy to manage, and built to grow with you Ease of Installation – Quick, easy setup. Fast data transfer rates
  • 15. Limitations of Wi-Fi • Limited range. • Data security risks : a huge challenge for Wi-Fi networks. • Interference from other devices : Such as telephones, microwave ovens. • High power consumption : making battery life and heat a concern.
  • 16. Basic Wi-Fi Security Techniques WEP (Wired Equivalent Privacy) : The original encryption technique specified by the IEEE 802.11 standard. WPA (Wi-Fi Protected Access) : A new standard that provides improved encryption security over WEP. WPA2 : is an improved version of WPA that uses Advanced Encryption Standard (AES) technology.
  • 17. Basic Wi-Fi Security Techniques(Cont.) Securing Method Security Level Notes WEP Low No longer used; it is can be hacked easily WPA High Provides improves encryption security over WEP WPA2 Very High An improved version of WPA that uses Advanced Encryption Standard
  • 18. Conclusion • Wi-Fi is a simple, cost-effective way to connect to the Internet, without the need to physically connecting wires. • In 1997 IEEE drafted the 802.11 standard for wireless local area networking. • Hotspot is a geographic area setup in any public location, and has a readily accessible wireless network. • Security is a huge challenge for Wi-Fi Networks, many Security Techniques are used to improve it. • Wi-Fi Network have a several limitations that should be concerned.