SlideShare a Scribd company logo
1 of 21
Presented by WUSL
(2010-2011 batch)
Agenda

    Wi-Fi
      Introduction
      Scope of Wi-Fi
      Working principle
      Products
      Building a Wi-Fi Network
      Wi-Fi Security
Wireless Fidelity (Wi-Fi)
Welcome to the World of Wireless
    A radio technology that networks the devices.

     Refers to wireless LAN products based on the IEEE
802.11g specification

    Provides easy connections to the internet and
business networks while traveling

      The main attractive feature of this technology
is that it can   provide     wireless     broadband
connection within a specific geographic boundary.
SCOPE OF Wi-Fi
      In few more years all electronic devices are   going   to
      have a built in Wi-Fi..




      So once again we welcome to World of wireless.
      Many colleges and businesses have        suitable
      building layouts that can be wireless to build a
      unwired network.
      Wi-Fi is a very cost effective alternative in    these
      environments.
Operating modes

      Infrastructure Mode

      AD HOC Mode
Building a WiFi

      A Wi-Fi hotspot is created by installing an access   point
 to   an internet connection.

      An access point acts as a base station.

      When Wi-Fi enabled device encounters a hotspot the
      device can then connect to that network wirelessly.

      A single access point can support up to 30 users and can
 function within a range of 100 – 150 feet   indoors       and
 up to 300 feet outdoors.

     Many access points can be connected to each other     via
 Ethernet cables to create a single large network.
Locating Hotspots


There are many Wi-Fi hotspots now
available in   public      places   like
restaurants,    hotels,   libraries and
airports.
For example, Katunayake Airport,
The number of hotspots in the world is
growing daily.
Wi-Fi Topologies
AP Based Topology
Peer to peer Topology
Point to multi-point bridge
 Topology
AP-based topology




   The client communicates through Access Point.
   It connects the PC’S by an AP.
   It consists of 2 or Base Stations.
   It includes 10-15% overlap to allow roaming.
   Access Point is not required.
   Client devices within a cell can
    communicate directly with each
    other.
   It is useful for setting up of a
    wireless network quickly and
    easily.
   Used to connect a LAN in one building to a
    LANs in other buildings even if the buildings
    are miles apart.

   Range varies based on the type of wireless
    bridge and antenna used as well as the
    environmental conditions.
Advantages
      Can be used in Mobile.
      Widely available in public venues.
      Relatively inexpensive.
      Easy to set up a network.
      User-friendly software.
      Security features.
      Global set of standards.
Disadvantages
 Spectrum assignments & operational
  limitations
 Power consumption is fairly high
 Degradation in performance
 Networks have limited range
 Used to steal personal and confidential
  information
Wi-Fi Security
 WEP stands for Wired Equivalency Privacy

As its name implies, this standard was intended
to make wireless networks as secure as  wired
networks.

The common key lengths are currently 128- and
256-bit.

WPA Wi-Fi Protected Access is an early version
of the 802.11b security standard that was
developed by  the Wi-Fi Alliance to replace
WEP.
A SPECIAL SECURITY SOFTWARE
Wi-Fi Cameras used in BANKS
“Things that think…
              don’t make sense unless they link.”
Building a WiFi Network and Understanding WiFi Security

More Related Content

What's hot (20)

Wi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank SaxenaWi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank Saxena
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
Wi fi
Wi fiWi fi
Wi fi
 
Wireless network
Wireless networkWireless network
Wireless network
 
Wifi technology
Wifi technologyWifi technology
Wifi technology
 
Wi fi technology ppt mine
Wi fi technology ppt mineWi fi technology ppt mine
Wi fi technology ppt mine
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentation
 
WIFI TECHNOLOGY
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Wi fi and it’s applications
Wi fi and it’s applicationsWi fi and it’s applications
Wi fi and it’s applications
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wifi
WifiWifi
Wifi
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 
5 G MOBILE TECHNOLOGY PPT1
5 G MOBILE TECHNOLOGY PPT15 G MOBILE TECHNOLOGY PPT1
5 G MOBILE TECHNOLOGY PPT1
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Presentation of-wimax
Presentation of-wimaxPresentation of-wimax
Presentation of-wimax
 
ppt on WIFI
ppt on WIFIppt on WIFI
ppt on WIFI
 
Wimax
WimaxWimax
Wimax
 
Wifi and its importance
Wifi and its importanceWifi and its importance
Wifi and its importance
 

Viewers also liked

School Life vs University life
School Life vs University lifeSchool Life vs University life
School Life vs University lifeMuhammad Saad Mir
 
Bermuda Triangle
Bermuda TriangleBermuda Triangle
Bermuda TriangleUsman Zafar
 
Laughter is the best medicine
Laughter is the best medicineLaughter is the best medicine
Laughter is the best medicineCathy Woods
 
Save mother earth
Save mother earthSave mother earth
Save mother earthvinayvasi
 
Bermuda triangle
Bermuda triangleBermuda triangle
Bermuda trianglerajmpatel97
 
Internet of NO things
Internet of NO things Internet of NO things
Internet of NO things Demos Helsinki
 
Real Talk About College
Real Talk About CollegeReal Talk About College
Real Talk About Collegeswc_news
 
Chapter 1, What Is Art
Chapter 1, What Is ArtChapter 1, What Is Art
Chapter 1, What Is ArtLaura Smith
 
What is art?
What is art?What is art?
What is art?rosabrito
 
Role of social media in knowledge management
Role of social media in knowledge managementRole of social media in knowledge management
Role of social media in knowledge managementRohit Jangra
 
Comparison between school life and college life
Comparison between school life and college lifeComparison between school life and college life
Comparison between school life and college lifeDheepikakumar
 
Education and 2nd Generation Social Media
Education and 2nd Generation Social MediaEducation and 2nd Generation Social Media
Education and 2nd Generation Social Mediaalex bal
 
save girl child in india !!
 save girl child in india !! save girl child in india !!
save girl child in india !!Somit Samanto
 
Don't Judge a Book By It's Cover: My Life as a Librarian
Don't Judge a Book By It's Cover: My Life as a LibrarianDon't Judge a Book By It's Cover: My Life as a Librarian
Don't Judge a Book By It's Cover: My Life as a LibrarianJay Turner
 

Viewers also liked (20)

School Life vs University life
School Life vs University lifeSchool Life vs University life
School Life vs University life
 
Bermuda Triangle
Bermuda TriangleBermuda Triangle
Bermuda Triangle
 
Laughter is the best medicine
Laughter is the best medicineLaughter is the best medicine
Laughter is the best medicine
 
Save mother earth
Save mother earthSave mother earth
Save mother earth
 
Bermuda triangle
Bermuda triangleBermuda triangle
Bermuda triangle
 
Internet of NO things
Internet of NO things Internet of NO things
Internet of NO things
 
Laughter is the best medicine;)
Laughter is the best medicine;)Laughter is the best medicine;)
Laughter is the best medicine;)
 
Real Talk About College
Real Talk About CollegeReal Talk About College
Real Talk About College
 
Chapter 1, What Is Art
Chapter 1, What Is ArtChapter 1, What Is Art
Chapter 1, What Is Art
 
Bermuda triangle
Bermuda triangleBermuda triangle
Bermuda triangle
 
Life without Internet ! -USAMV
Life without Internet !  -USAMVLife without Internet !  -USAMV
Life without Internet ! -USAMV
 
Wifi Ppt
Wifi PptWifi Ppt
Wifi Ppt
 
What is art?
What is art?What is art?
What is art?
 
Relationships From A Different Angle
Relationships From A Different AngleRelationships From A Different Angle
Relationships From A Different Angle
 
Role of social media in knowledge management
Role of social media in knowledge managementRole of social media in knowledge management
Role of social media in knowledge management
 
Comparison between school life and college life
Comparison between school life and college lifeComparison between school life and college life
Comparison between school life and college life
 
Education and 2nd Generation Social Media
Education and 2nd Generation Social MediaEducation and 2nd Generation Social Media
Education and 2nd Generation Social Media
 
save girl child in india !!
 save girl child in india !! save girl child in india !!
save girl child in india !!
 
Explorations From My Social Media Generation
Explorations From My Social Media GenerationExplorations From My Social Media Generation
Explorations From My Social Media Generation
 
Don't Judge a Book By It's Cover: My Life as a Librarian
Don't Judge a Book By It's Cover: My Life as a LibrarianDon't Judge a Book By It's Cover: My Life as a Librarian
Don't Judge a Book By It's Cover: My Life as a Librarian
 

Similar to Building a WiFi Network and Understanding WiFi Security

Similar to Building a WiFi Network and Understanding WiFi Security (20)

Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Concept
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
PPT ON WI-FI FROM JKC COLLEGE,GUNTUR
PPT ON WI-FI FROM JKC COLLEGE,GUNTURPPT ON WI-FI FROM JKC COLLEGE,GUNTUR
PPT ON WI-FI FROM JKC COLLEGE,GUNTUR
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558
 
Wireless Fidelity
Wireless FidelityWireless Fidelity
Wireless Fidelity
 
wifi technology
wifi technologywifi technology
wifi technology
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
 
Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02
 
Wifi
Wifi Wifi
Wifi
 
wireless networks.pptx
wireless networks.pptxwireless networks.pptx
wireless networks.pptx
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi fi
Wi fiWi fi
Wi fi
 
Wifi
WifiWifi
Wifi
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
WIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my lifeWIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my life
 

Recently uploaded

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Recently uploaded (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

Building a WiFi Network and Understanding WiFi Security

  • 2. Agenda  Wi-Fi  Introduction  Scope of Wi-Fi  Working principle  Products  Building a Wi-Fi Network  Wi-Fi Security
  • 3. Wireless Fidelity (Wi-Fi) Welcome to the World of Wireless A radio technology that networks the devices. Refers to wireless LAN products based on the IEEE 802.11g specification Provides easy connections to the internet and business networks while traveling The main attractive feature of this technology is that it can provide wireless broadband connection within a specific geographic boundary.
  • 4. SCOPE OF Wi-Fi In few more years all electronic devices are going to have a built in Wi-Fi.. So once again we welcome to World of wireless. Many colleges and businesses have suitable building layouts that can be wireless to build a unwired network. Wi-Fi is a very cost effective alternative in these environments.
  • 5. Operating modes Infrastructure Mode AD HOC Mode
  • 6. Building a WiFi A Wi-Fi hotspot is created by installing an access point to an internet connection. An access point acts as a base station. When Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly. A single access point can support up to 30 users and can function within a range of 100 – 150 feet indoors and up to 300 feet outdoors. Many access points can be connected to each other via Ethernet cables to create a single large network.
  • 7.
  • 8. Locating Hotspots There are many Wi-Fi hotspots now available in public places like restaurants, hotels, libraries and airports. For example, Katunayake Airport, The number of hotspots in the world is growing daily.
  • 9. Wi-Fi Topologies AP Based Topology Peer to peer Topology Point to multi-point bridge Topology
  • 10. AP-based topology  The client communicates through Access Point.  It connects the PC’S by an AP.  It consists of 2 or Base Stations.  It includes 10-15% overlap to allow roaming.
  • 11. Access Point is not required.  Client devices within a cell can communicate directly with each other.  It is useful for setting up of a wireless network quickly and easily.
  • 12. Used to connect a LAN in one building to a LANs in other buildings even if the buildings are miles apart.  Range varies based on the type of wireless bridge and antenna used as well as the environmental conditions.
  • 13. Advantages Can be used in Mobile. Widely available in public venues. Relatively inexpensive. Easy to set up a network. User-friendly software. Security features. Global set of standards.
  • 14. Disadvantages  Spectrum assignments & operational limitations  Power consumption is fairly high  Degradation in performance  Networks have limited range  Used to steal personal and confidential information
  • 15. Wi-Fi Security WEP stands for Wired Equivalency Privacy As its name implies, this standard was intended to make wireless networks as secure as wired networks. The common key lengths are currently 128- and 256-bit. WPA Wi-Fi Protected Access is an early version of the 802.11b security standard that was developed by the Wi-Fi Alliance to replace WEP.
  • 16.
  • 17. A SPECIAL SECURITY SOFTWARE
  • 18. Wi-Fi Cameras used in BANKS
  • 19.
  • 20. “Things that think… don’t make sense unless they link.”