SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Anish Raj Goyal
WirelEss TreNDs….
Wireless….
• Wireless communication is the transfer of information or power between
two or more points that are not connected by an electrical conductor. The
most common wireless technologies use radio. With radio waves distances
can be short, such as a few meters for television or as far as thousands or
even millions of kilometers for deep-space radio communications. It
encompasses various types of fixed, mobile, and portable applications,
including two-way radios, cellular telephones,personal digital
assistants (PDAs), and wireless networking. Other examples of applications
of radio wireless technologyinclude GPS units, garage door openers,
wireless computer mice, keyboards and headsets, headphones, radio
receivers,satellite television, broadcast television and cordless
telephones.
Mobile Telephones….
• One of the best-known examples of wireless technology is
the mobile phone, also known as a cellular phone, with more than
4.6 billion mobile cellular subscriptions worldwide as of the end of
2010. These wireless phones use radio waves from signal-
transmission towers to enable their users to make phone calls
from many locations worldwide. They can be used within range of
the mobile telephone site used to house the equipment required
to transmit and receive the radio signals from these instruments
Data Communications…
• Wireless data communications are an essential component of mobile
computing. The various available technologies differ in local availability,
coverage range and performance, and in some circumstances, users must
be able to employ multiple connection types and switch between
them. To simplify the experience for the user, connection manager
software can be used, or a mobile VPN deployed to handle the multiple
connections as a secure, single virtual network.Supporting technologies
include:
• Wifi
• Cellular Data Services
• Mobile Satellite Communications
• Wireless Sensor Networks
Wi-Fi
• Wi-Fi is a wireless local area network that enables portable
computing devices to connect easily to the Internet. Standardized
as IEEE 802.11 a,b,g,n, Wi-Fiapproaches speeds of some types of
wired Ethernet. Wi-Fi has become the de facto standard for access
in private homes, within offices, and at public hotspots.Some
businesses charge customers a monthly fee for service, while
others have begun offering it for free in an effort to increase the
sales of their goods
Other Data Communications….
• Cellular data service offers coverage within a range of 10-15 miles from
the nearest cell site.Speeds have increased as technologies have evolved,
from earlier technologies such as GSM, CDMA and GPRS, to 3G networks
such as W-CDMA, EDGE or CDMA2000.
• Mobile Satellite Communications may be used where other wireless
connections are unavailable, such as in largely rural areas or remote
locations.Satellite communications are especially important
or transportation, aviation, maritime and military use.
• Wireless Sensor Networks are responsible for sensing noise, interference,
and activity in data collection networks. This allows us to detect relevant
quantities, monitor and collect data, formulate clear user displays, and to
perform decision-making functions
Wireless Energy Transfer….
• Wireless energy transfer is a process whereby electrical energy is
transmitted from a power source to an electrical load (Computer
Load) that does not have a built-in power source, without the use
of interconnecting wires. There are two different fundamental
methods for wireless energy transfer. They can be transferred
using either far-field methods that involve beaming power/lasers,
radio or microwave transmissions or near-field using induction.
Both methods utilize electromagnetism and magnetic fields
Medical Technology….
• New wireless technologies, such as mobile body area networks
(MBAN), have the capability to monitor blood pressure, heart rate,
oxygen level and body temperature. The MBAN works by sending
low powered wireless signals to receivers that feed into nursing
stations or monitoring sites. This technology helps with the
intentional and unintentional risk of infection or disconnection
that arise from wired connections.
Computer interface devices….
• Answering the call of customers frustrated with cord clutter, many manufacturers of
computer peripherals turned to wireless technology to satisfy their consumer
base.Originally these units used bulky, highly local transceivers to mediate between
a computer and a keyboard and mouse; however, more recent generations have
used small, high-quality devices, some even incorporating Bluetooth. These systems
have become so ubiquitous that some users have begun complaining about a lack of
wired peripherals. Wireless devices tend to have a slightly slower response time
than their wired counterparts; however, the gap is decreasing.
• A battery powers computer interface devices such as a keyboard or mouse and send
signals to a receiver through a USB port by the way of a radio frequency (RF)
receiver. The RF design makes it possible for signals to be transmitted wirelessly
and expands the range of efficient use, usually up to 10 feet. Distance, physical
obstacles, competing signals, and even human bodies can all degrade the signal
quality. Concerns about the security of wireless keyboards arose at the end of 2007,
when it was revealed that Microsoft's implementation of encryption in some of its
27 MHz models was highly insecure
Tablet Computers….
• A tablet computer, commonly shortened to tablet, is a thin, flat mobile
computer with a touchscreen display, which in 2016 is usually color,
processing circuitry, and a rechargeable battery in a single device. Tablets often
come equipped with sensors, including digital cameras, a microphone, and
an accelerometer. The touchscreen display uses the recognition of finger or
stylus gestures to replace the mouse, trackpad and keyboard used in laptops.
They usually feature on-screen, pop-up virtual keyboards for typing and
inputting commands. Tablets may have physical buttons for basic features such
as speaker volume and power, and ports for plugging in network
communications, headphones and battery charging. Tablets are typically larger
than smartphones or personal digital assistants with screens 7 inches (18 cm) or
larger, measured diagonally.Tablets have Wi-Fi capability built in so that users
can connect to the Internet and can have cellular network capabilities
Wireless Security….
• Wireless security is the prevention of unauthorized access or damage to
computers using wireless networks. The most common types of wireless
security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected
Access (WPA). WEP is a notoriously weak security standard. The password
it uses can often be cracked in a few minutes with a basic laptop
computer and widely available software tools. WEP is an old IEEE 802.11
standard from 1999, which was outdated in 2003 by WPA, or Wi-Fi
Protected Access. WPA was a quick alternative to improve security over
WEP. The current standard is WPA2; some hardware cannot support WPA2
without firmware upgrade or replacement. WPA2 uses an encryption
device that encrypts the network with a 256-bit key; the longer key
length improves security over WEP.
Wireless Security Cameras….
• Wireless security cameras are closed-circuit television (CCTV) cameras that
transmit a video and audio signal to a wireless receiver through a radio band.
Many wireless security cameras require at least one cable or wire for power;
"wireless" refers to the transmission of video/audio. However, some wireless
security cameras are battery-powered, making the cameras truly wireless from
top to bottom.
• Wireless cameras are proving very popular among modern security consumers
due to their low installation costs (there is no need to run expensive video
extension cables) and flexible mounting options; wireless cameras can be
mounted/installed in locations previously unavailable to standard wired
cameras. In addition to the ease of use and convenience of access, wireless
security camera allows users to leverage broadband wireless internet to provide
seamless video streaming over-internet.
E-Books….
• An electronic book (or e-book) is a book publication made available in digital
form, consisting of text, images, or both, readable on the flat-panel display of
computers or other electronic devices. Although sometimes defined as "an
electronic version of a printed book“, some e-books exist without a printed
equivalent. Commercially produced and sold e-books are usually intended to be
read on dedicated e-reader devices. However, almost any sophisticated
computer device that features a controllable viewing screen can also be used to
read e-books, including desktop computers, laptops, tablets andsmartphones.
• In the 2000s, there was a trend of print and e-book sales moving to
the Internet, where readers buy traditional paper books and e-books
on websites using e-commerce systems. With print books, readers are
increasingly browsing through images of the covers of books on publisher or
bookstore websites and selecting and ordering titles online; the paper books are
then delivered to the reader by mail or other delivery service (e.g., FedEx).
Wireless USB….
• Wireless USB is a short-range, high-bandwidth wireless radio communication
protocol created by the Wireless USB Promoter Group which intends to further
increase the availability of general USB-based technologies. It is maintained by
theWiMedia Alliance and (as of 2009) the current revision is 1.0, which was
approved in 2005. Wireless USB is sometimes abbreviated as "WUSB", although
the USB Implementers Forum discouraged this practice and instead prefers to
call the technology Certified Wireless USB to distinguish it from the competing
UWB standard.
• Wireless USB was based on the (now defunct) WiMedia Alliance's Ultra-
WideBand (UWB) common radio platform, which is capable of sending
480 Mbit/s at distances up to 3 metres (9.8 ft) and 110 Mbit/s at up to 10
metres (33 ft). It was designed to operate in the 3.1 to 10.6 GHz frequency
range, although local regulatory policies may restrict the legal operating range
in some countries.
Wireless Sensor Network….
• Wireless sensor networks (WSN), sometimes called wireless
sensor and actuator networks (WSAN),are spatially
distributed autonomous sensorsto monitor physical or
environmental conditions, such as temperature, sound,pressure,
etc. and to cooperatively pass their data through the network to a
main location. The more modern networks are bi-directional, also
enablingcontrol of sensor activity. The development of wireless
sensor networks was motivated by military applications such as
battlefield surveillance; today such networks are used in many
industrial and consumer applications, such as industrial process
monitoring and control, machine health monitoring, and so on.

Weitere ähnliche Inhalte

Was ist angesagt?

Mobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and ApplicationsMobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and ApplicationsDigitalThinkerHelp
 
Introduction to Mobile Computing
Introduction to Mobile ComputingIntroduction to Mobile Computing
Introduction to Mobile ComputingNitin Ujgare
 
Mobile computing
Mobile computingMobile computing
Mobile computinglalit arora
 
The future of mobile computing
The future of mobile computingThe future of mobile computing
The future of mobile computingRashid Shahariar
 
Evolution Of Communication Networks
Evolution Of Communication NetworksEvolution Of Communication Networks
Evolution Of Communication NetworksAmogh Gupta
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile ComputingMadhuri Badgujar
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introductionnicole_wang
 
New Media Technology- The concept of communication technology
New Media Technology-  The concept of communication technologyNew Media Technology-  The concept of communication technology
New Media Technology- The concept of communication technologyFaindra Jabbar
 
Past, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingPast, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingDavid Livingston J
 

Was ist angesagt? (20)

Current trends in mobile computing
Current trends in mobile computingCurrent trends in mobile computing
Current trends in mobile computing
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and ApplicationsMobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and Applications
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Introduction to Mobile Computing
Introduction to Mobile ComputingIntroduction to Mobile Computing
Introduction to Mobile Computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
The future of mobile computing
The future of mobile computingThe future of mobile computing
The future of mobile computing
 
Pertemuan 8 mobile computing
Pertemuan 8   mobile computingPertemuan 8   mobile computing
Pertemuan 8 mobile computing
 
Evolution Of Communication Networks
Evolution Of Communication NetworksEvolution Of Communication Networks
Evolution Of Communication Networks
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile Computing
 
MIS
MISMIS
MIS
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introduction
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
New Media Technology- The concept of communication technology
New Media Technology-  The concept of communication technologyNew Media Technology-  The concept of communication technology
New Media Technology- The concept of communication technology
 
Past, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingPast, Present and Future of Mobile Computing
Past, Present and Future of Mobile Computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 

Andere mochten auch (8)

C ric ke t
C ric ke tC ric ke t
C ric ke t
 
Disaster management
Disaster managementDisaster management
Disaster management
 
S tora ge devices
S tora ge devicesS tora ge devices
S tora ge devices
 
Fest ivals
Fest ivalsFest ivals
Fest ivals
 
D isas ter management.
D isas ter management.D isas ter management.
D isas ter management.
 
GLoBal WaRmiNg..
GLoBal WaRmiNg..GLoBal WaRmiNg..
GLoBal WaRmiNg..
 
IRNSS by Anish Raj Goyal
IRNSS by Anish Raj GoyalIRNSS by Anish Raj Goyal
IRNSS by Anish Raj Goyal
 
D ru g addiction
D ru g addictionD ru g addiction
D ru g addiction
 

Ähnlich wie Wir eless tren dz..

Computer wireless trends
Computer wireless trendsComputer wireless trends
Computer wireless trendsDevanshTelanga
 
The use and importance of radio waves and
The use and importance of radio waves andThe use and importance of radio waves and
The use and importance of radio waves and180192
 
WIRE LESS TECHNOLOGY .pptx
WIRE LESS TECHNOLOGY .pptxWIRE LESS TECHNOLOGY .pptx
WIRE LESS TECHNOLOGY .pptxMohanVeerabomala
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology WriteupShital Kat
 
Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...FaizanMahmood28
 
Introduction Wireless Technology
Introduction Wireless TechnologyIntroduction Wireless Technology
Introduction Wireless Technologypriyankpatel2811
 
wirelesstecfinalppt-141223031757-conversion-gate02 (2).pdf
wirelesstecfinalppt-141223031757-conversion-gate02 (2).pdfwirelesstecfinalppt-141223031757-conversion-gate02 (2).pdf
wirelesstecfinalppt-141223031757-conversion-gate02 (2).pdfMohanVeerabomala
 
Chap 01 introduction to wirelless
Chap 01 introduction to wirelless Chap 01 introduction to wirelless
Chap 01 introduction to wirelless EngkaderAMuse
 
Wireless Personal Area Networks(Wpan)
Wireless Personal Area Networks(Wpan)Wireless Personal Area Networks(Wpan)
Wireless Personal Area Networks(Wpan)Biplob Orton
 
Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Biplob Orton
 

Ähnlich wie Wir eless tren dz.. (20)

Computer wireless trends
Computer wireless trendsComputer wireless trends
Computer wireless trends
 
The use and importance of radio waves and
The use and importance of radio waves andThe use and importance of radio waves and
The use and importance of radio waves and
 
WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
 
1791.pptx
1791.pptx1791.pptx
1791.pptx
 
WIRE LESS TECHNOLOGY .pptx
WIRE LESS TECHNOLOGY .pptxWIRE LESS TECHNOLOGY .pptx
WIRE LESS TECHNOLOGY .pptx
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology Writeup
 
Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...
 
Introduction Wireless Technology
Introduction Wireless TechnologyIntroduction Wireless Technology
Introduction Wireless Technology
 
wirelesstecfinalppt-141223031757-conversion-gate02 (2).pdf
wirelesstecfinalppt-141223031757-conversion-gate02 (2).pdfwirelesstecfinalppt-141223031757-conversion-gate02 (2).pdf
wirelesstecfinalppt-141223031757-conversion-gate02 (2).pdf
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
Network technologies.pptx
Network technologies.pptxNetwork technologies.pptx
Network technologies.pptx
 
Wireless
Wireless Wireless
Wireless
 
44.pptx
44.pptx44.pptx
44.pptx
 
Unit 1
Unit 1Unit 1
Unit 1
 
Presentation1
Presentation1Presentation1
Presentation1
 
Presentation1
Presentation1Presentation1
Presentation1
 
Chap 01 introduction to wirelless
Chap 01 introduction to wirelless Chap 01 introduction to wirelless
Chap 01 introduction to wirelless
 
Wireless Personal Area Networks(Wpan)
Wireless Personal Area Networks(Wpan)Wireless Personal Area Networks(Wpan)
Wireless Personal Area Networks(Wpan)
 
Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)
 
Wi fi network
Wi fi networkWi fi network
Wi fi network
 

Kürzlich hochgeladen

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Kürzlich hochgeladen (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Wir eless tren dz..

  • 2. Wireless…. • Wireless communication is the transfer of information or power between two or more points that are not connected by an electrical conductor. The most common wireless technologies use radio. With radio waves distances can be short, such as a few meters for television or as far as thousands or even millions of kilometers for deep-space radio communications. It encompasses various types of fixed, mobile, and portable applications, including two-way radios, cellular telephones,personal digital assistants (PDAs), and wireless networking. Other examples of applications of radio wireless technologyinclude GPS units, garage door openers, wireless computer mice, keyboards and headsets, headphones, radio receivers,satellite television, broadcast television and cordless telephones.
  • 3. Mobile Telephones…. • One of the best-known examples of wireless technology is the mobile phone, also known as a cellular phone, with more than 4.6 billion mobile cellular subscriptions worldwide as of the end of 2010. These wireless phones use radio waves from signal- transmission towers to enable their users to make phone calls from many locations worldwide. They can be used within range of the mobile telephone site used to house the equipment required to transmit and receive the radio signals from these instruments
  • 4.
  • 5. Data Communications… • Wireless data communications are an essential component of mobile computing. The various available technologies differ in local availability, coverage range and performance, and in some circumstances, users must be able to employ multiple connection types and switch between them. To simplify the experience for the user, connection manager software can be used, or a mobile VPN deployed to handle the multiple connections as a secure, single virtual network.Supporting technologies include: • Wifi • Cellular Data Services • Mobile Satellite Communications • Wireless Sensor Networks
  • 6. Wi-Fi • Wi-Fi is a wireless local area network that enables portable computing devices to connect easily to the Internet. Standardized as IEEE 802.11 a,b,g,n, Wi-Fiapproaches speeds of some types of wired Ethernet. Wi-Fi has become the de facto standard for access in private homes, within offices, and at public hotspots.Some businesses charge customers a monthly fee for service, while others have begun offering it for free in an effort to increase the sales of their goods
  • 7.
  • 8. Other Data Communications…. • Cellular data service offers coverage within a range of 10-15 miles from the nearest cell site.Speeds have increased as technologies have evolved, from earlier technologies such as GSM, CDMA and GPRS, to 3G networks such as W-CDMA, EDGE or CDMA2000. • Mobile Satellite Communications may be used where other wireless connections are unavailable, such as in largely rural areas or remote locations.Satellite communications are especially important or transportation, aviation, maritime and military use. • Wireless Sensor Networks are responsible for sensing noise, interference, and activity in data collection networks. This allows us to detect relevant quantities, monitor and collect data, formulate clear user displays, and to perform decision-making functions
  • 9. Wireless Energy Transfer…. • Wireless energy transfer is a process whereby electrical energy is transmitted from a power source to an electrical load (Computer Load) that does not have a built-in power source, without the use of interconnecting wires. There are two different fundamental methods for wireless energy transfer. They can be transferred using either far-field methods that involve beaming power/lasers, radio or microwave transmissions or near-field using induction. Both methods utilize electromagnetism and magnetic fields
  • 10.
  • 11. Medical Technology…. • New wireless technologies, such as mobile body area networks (MBAN), have the capability to monitor blood pressure, heart rate, oxygen level and body temperature. The MBAN works by sending low powered wireless signals to receivers that feed into nursing stations or monitoring sites. This technology helps with the intentional and unintentional risk of infection or disconnection that arise from wired connections.
  • 12. Computer interface devices…. • Answering the call of customers frustrated with cord clutter, many manufacturers of computer peripherals turned to wireless technology to satisfy their consumer base.Originally these units used bulky, highly local transceivers to mediate between a computer and a keyboard and mouse; however, more recent generations have used small, high-quality devices, some even incorporating Bluetooth. These systems have become so ubiquitous that some users have begun complaining about a lack of wired peripherals. Wireless devices tend to have a slightly slower response time than their wired counterparts; however, the gap is decreasing. • A battery powers computer interface devices such as a keyboard or mouse and send signals to a receiver through a USB port by the way of a radio frequency (RF) receiver. The RF design makes it possible for signals to be transmitted wirelessly and expands the range of efficient use, usually up to 10 feet. Distance, physical obstacles, competing signals, and even human bodies can all degrade the signal quality. Concerns about the security of wireless keyboards arose at the end of 2007, when it was revealed that Microsoft's implementation of encryption in some of its 27 MHz models was highly insecure
  • 13. Tablet Computers…. • A tablet computer, commonly shortened to tablet, is a thin, flat mobile computer with a touchscreen display, which in 2016 is usually color, processing circuitry, and a rechargeable battery in a single device. Tablets often come equipped with sensors, including digital cameras, a microphone, and an accelerometer. The touchscreen display uses the recognition of finger or stylus gestures to replace the mouse, trackpad and keyboard used in laptops. They usually feature on-screen, pop-up virtual keyboards for typing and inputting commands. Tablets may have physical buttons for basic features such as speaker volume and power, and ports for plugging in network communications, headphones and battery charging. Tablets are typically larger than smartphones or personal digital assistants with screens 7 inches (18 cm) or larger, measured diagonally.Tablets have Wi-Fi capability built in so that users can connect to the Internet and can have cellular network capabilities
  • 14.
  • 15. Wireless Security…. • Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is a notoriously weak security standard. The password it uses can often be cracked in a few minutes with a basic laptop computer and widely available software tools. WEP is an old IEEE 802.11 standard from 1999, which was outdated in 2003 by WPA, or Wi-Fi Protected Access. WPA was a quick alternative to improve security over WEP. The current standard is WPA2; some hardware cannot support WPA2 without firmware upgrade or replacement. WPA2 uses an encryption device that encrypts the network with a 256-bit key; the longer key length improves security over WEP.
  • 16. Wireless Security Cameras…. • Wireless security cameras are closed-circuit television (CCTV) cameras that transmit a video and audio signal to a wireless receiver through a radio band. Many wireless security cameras require at least one cable or wire for power; "wireless" refers to the transmission of video/audio. However, some wireless security cameras are battery-powered, making the cameras truly wireless from top to bottom. • Wireless cameras are proving very popular among modern security consumers due to their low installation costs (there is no need to run expensive video extension cables) and flexible mounting options; wireless cameras can be mounted/installed in locations previously unavailable to standard wired cameras. In addition to the ease of use and convenience of access, wireless security camera allows users to leverage broadband wireless internet to provide seamless video streaming over-internet.
  • 17.
  • 18. E-Books…. • An electronic book (or e-book) is a book publication made available in digital form, consisting of text, images, or both, readable on the flat-panel display of computers or other electronic devices. Although sometimes defined as "an electronic version of a printed book“, some e-books exist without a printed equivalent. Commercially produced and sold e-books are usually intended to be read on dedicated e-reader devices. However, almost any sophisticated computer device that features a controllable viewing screen can also be used to read e-books, including desktop computers, laptops, tablets andsmartphones. • In the 2000s, there was a trend of print and e-book sales moving to the Internet, where readers buy traditional paper books and e-books on websites using e-commerce systems. With print books, readers are increasingly browsing through images of the covers of books on publisher or bookstore websites and selecting and ordering titles online; the paper books are then delivered to the reader by mail or other delivery service (e.g., FedEx).
  • 19. Wireless USB…. • Wireless USB is a short-range, high-bandwidth wireless radio communication protocol created by the Wireless USB Promoter Group which intends to further increase the availability of general USB-based technologies. It is maintained by theWiMedia Alliance and (as of 2009) the current revision is 1.0, which was approved in 2005. Wireless USB is sometimes abbreviated as "WUSB", although the USB Implementers Forum discouraged this practice and instead prefers to call the technology Certified Wireless USB to distinguish it from the competing UWB standard. • Wireless USB was based on the (now defunct) WiMedia Alliance's Ultra- WideBand (UWB) common radio platform, which is capable of sending 480 Mbit/s at distances up to 3 metres (9.8 ft) and 110 Mbit/s at up to 10 metres (33 ft). It was designed to operate in the 3.1 to 10.6 GHz frequency range, although local regulatory policies may restrict the legal operating range in some countries.
  • 20. Wireless Sensor Network…. • Wireless sensor networks (WSN), sometimes called wireless sensor and actuator networks (WSAN),are spatially distributed autonomous sensorsto monitor physical or environmental conditions, such as temperature, sound,pressure, etc. and to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional, also enablingcontrol of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on.