SlideShare a Scribd company logo
1 of 8
By EHTISHAM ALI Wi-Fi Technology
Wi-Fi ? The term Wi-Fi suggests Wireless Fidelity, resembling the long-established audio-equipment classification term high fidelity (in use since the 1930s) or Hi-Fi (used since 1950) The term Wi-Fi, first used commercially in August 1999,was coined by a brand-consulting firm called Interbrand Corporation that the Alliance had hired to determine a name that was "a little catchier than Direct Sequence'".
Access Point  A roof-mounted Wi-Fi antenna A Wi-Fi enabled device such as a personal computer, video game console, smart phone or digital audio player can connect to the Internet when within range of a wireless network connected to the Internet.  An outdoor Wi-Fi access point In the early 2000s, many cities around the world announced plans for city-wide Wi-Fi networks. This proved to be much more difficult than their promoters initially envisioned with the result that most of these projects were either canceled or placed on indefinite hold
Advantages Wi-Fi allows the deployment of local area networks (LANs) without wires for client devices, typically reducing the costs of network deployment and expansion.  A keychain-size Wi-Fi detector Wi-Fi operates in more than 220,000 public hotspots and in tens of millions of homes and corporate and university campuses worldwide. The current version of Wi-Fi Protected Access encryption (WPA2) as of 2010 is consideredsecure, provided users employ a strong passphrase.
A computer on the wireless adapter translates data into a radio signal and transmits through an antenna. A wireless router receives the signal and decodes. The router sends information to the Internet using a physical, wired Ethernet connection
Limitations Wi-Fi networks have limited range. A typical wireless router using 802.11b or 802.11g with a stock antenna might have a range of 32 m (120 ft) indoors and 95 m (300 ft) outdoors. The most common wireless encryption-standard, Wired Equivalent Privacy (WEP), has been shown to be easily breakable even when correctly configured. Wi-Fi Protected Access (WPA and WPA2) encryption, which became available in devices in 2003, aimed to solve this problem.
Hardware An embedded Router Board 112 with U.FL-RSMA pigtail and R52 mini PCI Wi-Fi card widely used by wireless Internet service providers USB wireless adapter OSBRiDGE 3GN - 802.11n Access Point and UMTS/GSM Gateway in one device
Home Networking If you have multiple computers networked in your home, you can create a wireless network with a wireless access point. If you have multiple computers that are not networked, or if you want to replace your Ethernet network, you need a wireless router. It is a single unit that contains: 1. A port to connect to your cable modem2. A router3. An Ethernet hub4. A firewall5. A wireless access point

More Related Content

What's hot

Wi fi and it’s applications
Wi fi and it’s applicationsWi fi and it’s applications
Wi fi and it’s applications
Saad Mazhar
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
Akhil Kumar
 

What's hot (20)

Wifi
WifiWifi
Wifi
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
 
Bse 3106 wifi
Bse 3106 wifiBse 3106 wifi
Bse 3106 wifi
 
Wireless Fidelity
Wireless FidelityWireless Fidelity
Wireless Fidelity
 
Wi fi and it’s applications
Wi fi and it’s applicationsWi fi and it’s applications
Wi fi and it’s applications
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wireless Fidelity ppt
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wi fi / Wireless Fidelity
Wi fi / Wireless FidelityWi fi / Wireless Fidelity
Wi fi / Wireless Fidelity
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Concept
 
Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558
 
WIFI[autosaved]
WIFI[autosaved]WIFI[autosaved]
WIFI[autosaved]
 
WIFI Technology
WIFI TechnologyWIFI Technology
WIFI Technology
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
wifi ppt
wifi pptwifi ppt
wifi ppt
 
Wifi technology
Wifi technologyWifi technology
Wifi technology
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 

Viewers also liked (6)

Comparing Shared vs Dedicated Internet Connections
Comparing Shared vs Dedicated Internet ConnectionsComparing Shared vs Dedicated Internet Connections
Comparing Shared vs Dedicated Internet Connections
 
Dedicated Internet Access
Dedicated Internet AccessDedicated Internet Access
Dedicated Internet Access
 
Ethernet Dedicated Internet Service
Ethernet Dedicated Internet ServiceEthernet Dedicated Internet Service
Ethernet Dedicated Internet Service
 
4g wireless communication
4g wireless communication4g wireless communication
4g wireless communication
 
4g wireless final ppt
4g wireless  final ppt4g wireless  final ppt
4g wireless final ppt
 
Wi fi technology ppt mine
Wi fi technology ppt mineWi fi technology ppt mine
Wi fi technology ppt mine
 

Similar to Wi fi Technology

WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology Writeup
Shital Kat
 
Wi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification ProcessWi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification Process
GopiNath Rko
 
W I R E L E S S F I D E L I T Y
W I R E L E S S  F I D E L I T YW I R E L E S S  F I D E L I T Y
W I R E L E S S F I D E L I T Y
gou145
 

Similar to Wi fi Technology (20)

Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology Writeup
 
Wi fi network
Wi fi networkWi fi network
Wi fi network
 
wi-fi
wi-fiwi-fi
wi-fi
 
-Communication Engineering.pptx
-Communication Engineering.pptx-Communication Engineering.pptx
-Communication Engineering.pptx
 
Wifi
WifiWifi
Wifi
 
wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi Architecture
 
wifi tech-1.pptx
wifi tech-1.pptxwifi tech-1.pptx
wifi tech-1.pptx
 
WIFI TECHNOLOGY
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wi-Fi
Wi-Fi Wi-Fi
Wi-Fi
 
wireless networks.pptx
wireless networks.pptxwireless networks.pptx
wireless networks.pptx
 
3
33
3
 
Wi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification ProcessWi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification Process
 
972003
972003972003
972003
 
W I R E L E S S F I D E L I T Y
W I R E L E S S  F I D E L I T YW I R E L E S S  F I D E L I T Y
W I R E L E S S F I D E L I T Y
 
WiFi part II
WiFi part IIWiFi part II
WiFi part II
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 

More from Ehtisham Ali

Vintage indian advertisement's
Vintage indian advertisement'sVintage indian advertisement's
Vintage indian advertisement's
Ehtisham Ali
 
Extreme Interview Questions
Extreme Interview QuestionsExtreme Interview Questions
Extreme Interview Questions
Ehtisham Ali
 
Intruders detection
Intruders detectionIntruders detection
Intruders detection
Ehtisham Ali
 
Asymptotic notations
Asymptotic notationsAsymptotic notations
Asymptotic notations
Ehtisham Ali
 

More from Ehtisham Ali (20)

Vintage indian advertisement's
Vintage indian advertisement'sVintage indian advertisement's
Vintage indian advertisement's
 
Extreme Interview Questions
Extreme Interview QuestionsExtreme Interview Questions
Extreme Interview Questions
 
Windows Avtars
Windows AvtarsWindows Avtars
Windows Avtars
 
Intruders detection
Intruders detectionIntruders detection
Intruders detection
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Asymptotic notations
Asymptotic notationsAsymptotic notations
Asymptotic notations
 
Huffman Coding
Huffman CodingHuffman Coding
Huffman Coding
 
Windows basic quiz
Windows basic quizWindows basic quiz
Windows basic quiz
 
Wallpapers show
Wallpapers showWallpapers show
Wallpapers show
 
Virtual vista
Virtual vistaVirtual vista
Virtual vista
 
Marketing segmentations
Marketing segmentationsMarketing segmentations
Marketing segmentations
 
Lcd technology
Lcd technologyLcd technology
Lcd technology
 
Gd topics list
Gd topics listGd topics list
Gd topics list
 
Dvd
DvdDvd
Dvd
 
My room
My roomMy room
My room
 
Filmi kids
Filmi kidsFilmi kids
Filmi kids
 
Excel tutorial on students record
Excel tutorial on students record Excel tutorial on students record
Excel tutorial on students record
 
Television broadcasting and promotion
Television broadcasting and promotionTelevision broadcasting and promotion
Television broadcasting and promotion
 
TechQuiz
TechQuizTechQuiz
TechQuiz
 
Ms dos tutorial
Ms dos tutorialMs dos tutorial
Ms dos tutorial
 

Recently uploaded

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Wi fi Technology

  • 1. By EHTISHAM ALI Wi-Fi Technology
  • 2. Wi-Fi ? The term Wi-Fi suggests Wireless Fidelity, resembling the long-established audio-equipment classification term high fidelity (in use since the 1930s) or Hi-Fi (used since 1950) The term Wi-Fi, first used commercially in August 1999,was coined by a brand-consulting firm called Interbrand Corporation that the Alliance had hired to determine a name that was "a little catchier than Direct Sequence'".
  • 3. Access Point A roof-mounted Wi-Fi antenna A Wi-Fi enabled device such as a personal computer, video game console, smart phone or digital audio player can connect to the Internet when within range of a wireless network connected to the Internet. An outdoor Wi-Fi access point In the early 2000s, many cities around the world announced plans for city-wide Wi-Fi networks. This proved to be much more difficult than their promoters initially envisioned with the result that most of these projects were either canceled or placed on indefinite hold
  • 4. Advantages Wi-Fi allows the deployment of local area networks (LANs) without wires for client devices, typically reducing the costs of network deployment and expansion. A keychain-size Wi-Fi detector Wi-Fi operates in more than 220,000 public hotspots and in tens of millions of homes and corporate and university campuses worldwide. The current version of Wi-Fi Protected Access encryption (WPA2) as of 2010 is consideredsecure, provided users employ a strong passphrase.
  • 5. A computer on the wireless adapter translates data into a radio signal and transmits through an antenna. A wireless router receives the signal and decodes. The router sends information to the Internet using a physical, wired Ethernet connection
  • 6. Limitations Wi-Fi networks have limited range. A typical wireless router using 802.11b or 802.11g with a stock antenna might have a range of 32 m (120 ft) indoors and 95 m (300 ft) outdoors. The most common wireless encryption-standard, Wired Equivalent Privacy (WEP), has been shown to be easily breakable even when correctly configured. Wi-Fi Protected Access (WPA and WPA2) encryption, which became available in devices in 2003, aimed to solve this problem.
  • 7. Hardware An embedded Router Board 112 with U.FL-RSMA pigtail and R52 mini PCI Wi-Fi card widely used by wireless Internet service providers USB wireless adapter OSBRiDGE 3GN - 802.11n Access Point and UMTS/GSM Gateway in one device
  • 8. Home Networking If you have multiple computers networked in your home, you can create a wireless network with a wireless access point. If you have multiple computers that are not networked, or if you want to replace your Ethernet network, you need a wireless router. It is a single unit that contains: 1. A port to connect to your cable modem2. A router3. An Ethernet hub4. A firewall5. A wireless access point