SlideShare une entreprise Scribd logo
1  sur  11
Elumalai Polytechnic College

        Villupuram




                   Submitted by,
                     R. Venkatesh
                      V. Nachiappan
ABSTRACT



       This paper presents about the major role of Wi-Fi (wireless- Fidelity). Wi-Fi
(Wireless-Fidelity) is the trade name for a popular wireless technology used in home
networks, mobile phones, video games and more. Wi-Fi is supported by nearly every
modern, personal computer operating system and most advanced game consoles, printers
and other peripherals. The purpose of Wi-Fi is to hide complexity by enabling wireless
access to applications and data, media and streams. The coverage of one or more
interconnected access points called a hotspot can comprise an area as small as a single room
with wireless-opaque walls or as large as many square miles covered by overlapping access
points. Wi-Fi allows LANs to be deployed without cabling for client devices, typically
reducing the costs of network deployment and expansion. Wireless Mesh Networks
(WMNs) provide a wireless net work infrastructure that most application scenarios assume
to be fixed. Different from highly mobile networks, as sumptions can be made on this
infrastructure to increase performance. Now, features in the WiFi protocol stack become
unnecessary for doing mesh networking, but still have an impact on the bandwidth
performance. The con tribution of this work is to show that WiFi produces a con siderable
bandwidth overhead within the WMN backbone infrastructure that could be avoided.
Introduction:
    Wi-Fi (Wireless-Fidelity) is the trade name for a popular wireless technology used in
home networks, mobile phones, video games and more. Wi-Fi is supported by nearly every
modern personal computer operating system and most advanced game consoles, printers
and other peripherals.

    Wi-Fi describes the embedded technology of wireless local area networks (WLAN)
       based on the IEEE 802.11 specification.
    It uses radio instead of wires to transmit data back and forth between computers.
    Wi-Fi networks use radio technologies called IEEE 802.11a, 802.11b or 802.11g to

       provide                                                        secure, reliable fast

       wireless                                                       connectivity.




                                   Wi-Fi Enabled Projector

Purpose:
       The purpose of Wi-Fi is to hide complexity by enabling wireless access to
applications and data, media and streams. The main aims of Wi-Fi are the following:
 Make access to information easier

         Ensure compatibility and co-existence of devices

         Eliminate cabling and wiring

         Eliminate switches, adapters, plugs, pins and connectors.




               Structure of Various Phones connected on Internet




Uses:
A Wi-Fi enabled device such as a PC, game console, mobile phone, MP3 player or
PDA can connect to the Internet when within range of a wireless network connected to the
Internet. The coverage of one or more interconnected access points called a hotspot can
comprise an area as small as a single room with wireless-opaque walls or as large as many
square miles covered by overlapping access points. Wi-Fi technology has served to set up
mesh networks. Example: In London, Both architectures can operate in community
networks.
       In addition to restricted use in homes and offices, Wi-Fi can make access publicly
available at Wi-Fi hotspots provided either free of charge or to subscribers to various
providers. Organizations and businesses such as airports, hotels and restaurants often
provide free hotspots to attract or assist clients. Wi-Fi also allows connectivity in peer-to-
peer mode, which enables devices to connect directly with each other. This connectivity
mode can prove useful in consumer electronics and gaming applications.
       When wireless networking technology first entered the market many problems
ensued for consumers who could not rely on products from different vendors working
together. The Wi-Fi Alliance began as a community to solve this issue aiming to address
the needs of the end-user and to allow the technology to mature. Many consumer devices
use Wi-Fi. Amongst others, personal computers can network to each other and connect to
the Internet, mobile computers can connect to the Internet from any Wi-Fi hotspot, and
digital cameras can transfer images wirelessly.
       Routers which incorporate a DSL-modem or a cable-modem and a Wi-Fi access
point, often set up in homes and other premises, provide Internet-access and
internetworking to all devices connected (wirelessly or by cable) to them. One can also
connect Wi-Fi devices in ad-hoc mode for client-to-client connections without a router.
Wi-Fi Shirt




Operational advantages

       Wi-Fi allows LANs (Local Area Networks) to be deployed without cabling for
client devices, typically reducing the costs of network deployment and expansion. Spaces
where cables cannot be run, such as outdoor areas and historical buildings, can host
wireless LANs. In 2008, wireless network adapters are built into most modern laptops. The
price of chipsets for Wi-Fi continues to drop, making it an economical networking option
included in ever more devices. Wi-Fi has become widespread in corporate infrastructures.
       Different competitive brands of access points and client network interfaces are inter-
operable at a basic level of service. Products designated as "Wi-Fi Certified" by the Wi-Fi
Alliance are backwards compatible. Wi-Fi is a global set of standards. Unlike mobile
telephones, any standard Wi-Fi device will work anywhere in the world.
       Wi-Fi is widely available in more than 220,000 public hotspots and tens of millions
of homes, corporate and university campuses worldwide.WPA is not easily cracked if
strong passwords are used and WPA2 encryption has no known weaknesses. New protocols
for Quality of Service (WMM) make Wi-Fi more suitable for latency-sensitive applications
(such as voice and video), and power saving mechanisms (WMM Power Save) improve
battery operation.
Distance records

        Distance records (using non-standard devices) include 382 km (237 mi) in June
2007, held by Ermanno Pietrosemoli and EsLaRed of Venezuela, transferring about 3 MB
of data between mountain tops of El Aguila and Platillon. The Swedish Space Agency
transferred data 310 km (193 mi), using 6 watt amplifiers to reach an overhead stratospheric
balloon.


Reach
        Due to reach requirements for wireless LAN applications, power consumption is
fairly high compared to some other low-bandwidth standards. Especially Zigbee and
Bluetooth supporting wireless PAN applications refer to much lesser propagation range of
<10m. Wi-Fi networks have limited range. A typical Wi-Fi home router using 802.11b or
802.11g with a stock antenna might have a range of 32 m (120 ft) indoors and 95 m (300 ft)
outdoors. Range also varies with frequency band. Wi-Fi in the 2.4 GHz frequency block has
slightly better range than Wi-Fi in the 5 GHz frequency block. Outdoor range with
improved antennas can be several kilometers or more with line-of-sight.Wi-Fi performance
decreases roughly quadratically as the range increases at constant radiation levels.


Mobility
        Because of the very limited practical range of Wi-Fi, mobile use is essentially
confined to such applications as inventory taking machines in warehouses or retail spaces,
barcode reading devices at check-out stands or receiving / shipping stations. Mobile use of
Wi-Fi over wider ranges is limited to move, use, move, as for instance in an automobile
moving from one hotspot to another. Other wireless technologies are more suitable as
illustrated in the graphic.
Speed vs. Mobility of wireless systems: Wi-Fi, HSPA, UMTS and GSM



Threats to security
               The most common wireless encryption standard, Wired Equivalent Privacy
or WEP, has been shown to be easily breakable even when correctly configured. Wi-Fi
Protected Access (WPA and WPA2), which began shipping in 2003, aims to solve this
problem and is now available on most products. Wi-Fi Access Points typically default to an
"open" (encryption-free) mode. To turn security on requires the user to configure the
device, usually via a software graphical user interface (GUI). Wi-Fi networks that are open
(unencrypted) can be monitored and used to read and copy data (including personal
information) transmitted over the network, unless another security method is used to secure
the data, such as a VPN or a secure web page.

Embedded systems
       Wi-Fi availability in the home is on the increase. This extension of the Internet into
the home space will increasingly be used for remote monitoring. Examples of remote
monitoring include security systems and tele-medicine. In all these kinds of
implementation, if the Wi-Fi provision is provided using a system running one of operating
systems mentioned above, then it becomes unfeasible due to weight, power consumption
and cost issues. Increasingly in the last few years (particularly as of early 2007), embedded
Wi-Fi modules have become available which come with a real-time operating system and
provide a simple means of wireless enabling any device which has and communicates via a
serial port. This allows simple monitoring devices – for example, a portable ECG monitor
hooked up to a patient in their home – to be created. This Wi-Fi enabled device effectively
becomes part of the internet cloud and can communicate with any other node on the
internet. The data collected can hop via the home's Wi-Fi access point to anywhere on the
internet.




                             Embedded serial-to-Wi-Fi module




Network security
        During the early popular adoption of 802.11, providing open access points for
anyone within range to use was encouraged to cultivate wireless community networks;
particularly since people on average use only a fraction of their upstream bandwidth at any
given time. Later, equipment manufacturers and mass-media advocated isolating users to a
predetermined whitelist of authorized users referred to as "securing" the access point.
        Measures to deter unauthorized users include suppressing the AP's SSID broadcast,
allowing only computers with known MAC addresses to join the network, and various
encryption standards. Suppressed SSID and MAC filtering are ineffective security methods
as the SSID is broadcast in the open in response to a client SSID query and a MAC address
can easily be spoofed. If the eavesdropper has the ability to change his MAC address, then
he can potentially join the network by spoofing an authorized address.
        WEP encryption can protect against casual snooping, but may also produce a
misguided sense of security since freely available tools such as AirSnort or aircrack can
quickly recover WEP encryption keys. Once it has seen 5-10 million encrypted packets,
AirSnort can determine the encryption password in under a second; newer tools such as
aircrack-ptw can use Klein's attack to crack a WEP key with a 50% success rate using only
40,000 packets. The newer Wi-Fi Protected Access (WPA) and IEEE 802.11i (WPA2)
encryption standards do not have any of the serious weaknesses of WEP encryption.
       One serious issue with wireless network security is not just encryption, but access to
the network. With wired networking it is necessary to get past either a firewall or the
security guard & locked doors. With wireless it is only necessary to get reception and spend
as long as you want, comfortably out of reach of the network owner. Most business
networks protect sensitive data and systems by attempting to disallow external access.




Conclusion
            Wireless technology will certainly have a great impact on the future. As an
advertising medium, it has the potential to be the single most personal method of reaching
consumers. In an increasingly ad cluttered world however, there is also great potential for
backlash. Consumer concerns with regards to unsolicited interference such as spamming,
threats to security and privacy loom large. That being said, it is my opinion that wireless
advertising will overcome these obstacles and ultimately be successful. Wireless computer
networks have great potential to act as a tool for democratization. In places like
Parkersburg, Iowa and throughout rural America they are helping to close the digital divide.
It is true that security of wireless networks will continue to be a concern in the future, but
one must admit that there is something almost Robin Hood like about groups like War
Drivers, ever on a quest for free Internet access, always questioning the authority of large
corporations and other entities who attempt to maintain control and domination over the
Internet.




                                   Thank You

Contenu connexe

Tendances

IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Securitynoornabi16
 
Attacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network SecurityAttacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network Securityijtsrd
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportROHIT SAGAR
 
Public wifi architecture_12072017
Public wifi architecture_12072017Public wifi architecture_12072017
Public wifi architecture_12072017Saurabh Verma
 
Security threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devicesSecurity threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devicesIJNSA Journal
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentationankit680
 
Wireless Communication & Networking
Wireless Communication & NetworkingWireless Communication & Networking
Wireless Communication & NetworkingMohit Somani
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseAirTight Networks
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceIcomm Technologies
 
Computer engineering and it seminar topics
Computer engineering and  it seminar topicsComputer engineering and  it seminar topics
Computer engineering and it seminar topicsAce Beau
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs BluetoothArun ACE
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
Tao doc_acid
Tao doc_acidTao doc_acid
Tao doc_aciddocacid
 

Tendances (19)

IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
Attacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network SecurityAttacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network Security
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Public wifi architecture_12072017
Public wifi architecture_12072017Public wifi architecture_12072017
Public wifi architecture_12072017
 
Bluetooth 27 01-12 PPT
Bluetooth 27 01-12 PPTBluetooth 27 01-12 PPT
Bluetooth 27 01-12 PPT
 
Wns rogues wp_1011_v3
Wns rogues wp_1011_v3Wns rogues wp_1011_v3
Wns rogues wp_1011_v3
 
Security threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devicesSecurity threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devices
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Wireless Communication & Networking
Wireless Communication & NetworkingWireless Communication & Networking
Wireless Communication & Networking
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
 
Computer engineering and it seminar topics
Computer engineering and  it seminar topicsComputer engineering and  it seminar topics
Computer engineering and it seminar topics
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs Bluetooth
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Tao doc_acid
Tao doc_acidTao doc_acid
Tao doc_acid
 

En vedette

Funeral Tribute For Ating Show
Funeral Tribute For Ating ShowFuneral Tribute For Ating Show
Funeral Tribute For Ating Showelleguzman
 
сексуальная внимательность
сексуальная внимательностьсексуальная внимательность
сексуальная внимательностьАртём Демо
 
Google analytics training
Google analytics trainingGoogle analytics training
Google analytics trainingWebdialogue
 
The Presentation Come-Back Kid
The Presentation Come-Back KidThe Presentation Come-Back Kid
The Presentation Come-Back KidEthos3
 

En vedette (8)

Le progressiste n° 2089
Le progressiste n° 2089Le progressiste n° 2089
Le progressiste n° 2089
 
Soc Med ETSA
Soc Med ETSASoc Med ETSA
Soc Med ETSA
 
Funeral Tribute For Ating Show
Funeral Tribute For Ating ShowFuneral Tribute For Ating Show
Funeral Tribute For Ating Show
 
сексуальная внимательность
сексуальная внимательностьсексуальная внимательность
сексуальная внимательность
 
Google analytics training
Google analytics trainingGoogle analytics training
Google analytics training
 
Le progressiste n° 2179
Le progressiste n° 2179Le progressiste n° 2179
Le progressiste n° 2179
 
Sa fet n 18
Sa fet n 18Sa fet n 18
Sa fet n 18
 
The Presentation Come-Back Kid
The Presentation Come-Back KidThe Presentation Come-Back Kid
The Presentation Come-Back Kid
 

Similaire à Wi Fi

Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentationdayansaji
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technologysai kumar R
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology WriteupShital Kat
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Hem Pokhrel
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi ArchitectureArnab Ghosal
 
PPT ON WI-FI FROM JKC COLLEGE,GUNTUR
PPT ON WI-FI FROM JKC COLLEGE,GUNTURPPT ON WI-FI FROM JKC COLLEGE,GUNTUR
PPT ON WI-FI FROM JKC COLLEGE,GUNTUREzra Sastry
 
Wi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification ProcessWi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification ProcessGopiNath Rko
 
Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Conceptkodela3
 
Report on Future of Telecommunication Technologies
Report on Future of Telecommunication TechnologiesReport on Future of Telecommunication Technologies
Report on Future of Telecommunication TechnologiesYashraj Nigam
 
Wi fi and it’s applications
Wi fi and it’s applicationsWi fi and it’s applications
Wi fi and it’s applicationsSaad Mazhar
 

Similaire à Wi Fi (20)

Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wi fi network
Wi fi networkWi fi network
Wi fi network
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology Writeup
 
wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
Wireless Fidelity
Wireless FidelityWireless Fidelity
Wireless Fidelity
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi Architecture
 
3
33
3
 
PPT ON WI-FI FROM JKC COLLEGE,GUNTUR
PPT ON WI-FI FROM JKC COLLEGE,GUNTURPPT ON WI-FI FROM JKC COLLEGE,GUNTUR
PPT ON WI-FI FROM JKC COLLEGE,GUNTUR
 
Wifi
WifiWifi
Wifi
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
wireless networks.pptx
wireless networks.pptxwireless networks.pptx
wireless networks.pptx
 
Wi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification ProcessWi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification Process
 
Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Concept
 
Report on Future of Telecommunication Technologies
Report on Future of Telecommunication TechnologiesReport on Future of Telecommunication Technologies
Report on Future of Telecommunication Technologies
 
Wi fi and it’s applications
Wi fi and it’s applicationsWi fi and it’s applications
Wi fi and it’s applications
 

Dernier

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Dernier (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Wi Fi

  • 1. Elumalai Polytechnic College Villupuram Submitted by, R. Venkatesh V. Nachiappan
  • 2. ABSTRACT This paper presents about the major role of Wi-Fi (wireless- Fidelity). Wi-Fi (Wireless-Fidelity) is the trade name for a popular wireless technology used in home networks, mobile phones, video games and more. Wi-Fi is supported by nearly every modern, personal computer operating system and most advanced game consoles, printers and other peripherals. The purpose of Wi-Fi is to hide complexity by enabling wireless access to applications and data, media and streams. The coverage of one or more interconnected access points called a hotspot can comprise an area as small as a single room with wireless-opaque walls or as large as many square miles covered by overlapping access points. Wi-Fi allows LANs to be deployed without cabling for client devices, typically reducing the costs of network deployment and expansion. Wireless Mesh Networks (WMNs) provide a wireless net work infrastructure that most application scenarios assume to be fixed. Different from highly mobile networks, as sumptions can be made on this infrastructure to increase performance. Now, features in the WiFi protocol stack become unnecessary for doing mesh networking, but still have an impact on the bandwidth performance. The con tribution of this work is to show that WiFi produces a con siderable bandwidth overhead within the WMN backbone infrastructure that could be avoided.
  • 3. Introduction: Wi-Fi (Wireless-Fidelity) is the trade name for a popular wireless technology used in home networks, mobile phones, video games and more. Wi-Fi is supported by nearly every modern personal computer operating system and most advanced game consoles, printers and other peripherals.  Wi-Fi describes the embedded technology of wireless local area networks (WLAN) based on the IEEE 802.11 specification.  It uses radio instead of wires to transmit data back and forth between computers.  Wi-Fi networks use radio technologies called IEEE 802.11a, 802.11b or 802.11g to provide secure, reliable fast wireless connectivity. Wi-Fi Enabled Projector Purpose: The purpose of Wi-Fi is to hide complexity by enabling wireless access to applications and data, media and streams. The main aims of Wi-Fi are the following:
  • 4.  Make access to information easier  Ensure compatibility and co-existence of devices  Eliminate cabling and wiring  Eliminate switches, adapters, plugs, pins and connectors. Structure of Various Phones connected on Internet Uses:
  • 5. A Wi-Fi enabled device such as a PC, game console, mobile phone, MP3 player or PDA can connect to the Internet when within range of a wireless network connected to the Internet. The coverage of one or more interconnected access points called a hotspot can comprise an area as small as a single room with wireless-opaque walls or as large as many square miles covered by overlapping access points. Wi-Fi technology has served to set up mesh networks. Example: In London, Both architectures can operate in community networks. In addition to restricted use in homes and offices, Wi-Fi can make access publicly available at Wi-Fi hotspots provided either free of charge or to subscribers to various providers. Organizations and businesses such as airports, hotels and restaurants often provide free hotspots to attract or assist clients. Wi-Fi also allows connectivity in peer-to- peer mode, which enables devices to connect directly with each other. This connectivity mode can prove useful in consumer electronics and gaming applications. When wireless networking technology first entered the market many problems ensued for consumers who could not rely on products from different vendors working together. The Wi-Fi Alliance began as a community to solve this issue aiming to address the needs of the end-user and to allow the technology to mature. Many consumer devices use Wi-Fi. Amongst others, personal computers can network to each other and connect to the Internet, mobile computers can connect to the Internet from any Wi-Fi hotspot, and digital cameras can transfer images wirelessly. Routers which incorporate a DSL-modem or a cable-modem and a Wi-Fi access point, often set up in homes and other premises, provide Internet-access and internetworking to all devices connected (wirelessly or by cable) to them. One can also connect Wi-Fi devices in ad-hoc mode for client-to-client connections without a router.
  • 6. Wi-Fi Shirt Operational advantages Wi-Fi allows LANs (Local Area Networks) to be deployed without cabling for client devices, typically reducing the costs of network deployment and expansion. Spaces where cables cannot be run, such as outdoor areas and historical buildings, can host wireless LANs. In 2008, wireless network adapters are built into most modern laptops. The price of chipsets for Wi-Fi continues to drop, making it an economical networking option included in ever more devices. Wi-Fi has become widespread in corporate infrastructures. Different competitive brands of access points and client network interfaces are inter- operable at a basic level of service. Products designated as "Wi-Fi Certified" by the Wi-Fi Alliance are backwards compatible. Wi-Fi is a global set of standards. Unlike mobile telephones, any standard Wi-Fi device will work anywhere in the world. Wi-Fi is widely available in more than 220,000 public hotspots and tens of millions of homes, corporate and university campuses worldwide.WPA is not easily cracked if strong passwords are used and WPA2 encryption has no known weaknesses. New protocols for Quality of Service (WMM) make Wi-Fi more suitable for latency-sensitive applications (such as voice and video), and power saving mechanisms (WMM Power Save) improve battery operation.
  • 7. Distance records Distance records (using non-standard devices) include 382 km (237 mi) in June 2007, held by Ermanno Pietrosemoli and EsLaRed of Venezuela, transferring about 3 MB of data between mountain tops of El Aguila and Platillon. The Swedish Space Agency transferred data 310 km (193 mi), using 6 watt amplifiers to reach an overhead stratospheric balloon. Reach Due to reach requirements for wireless LAN applications, power consumption is fairly high compared to some other low-bandwidth standards. Especially Zigbee and Bluetooth supporting wireless PAN applications refer to much lesser propagation range of <10m. Wi-Fi networks have limited range. A typical Wi-Fi home router using 802.11b or 802.11g with a stock antenna might have a range of 32 m (120 ft) indoors and 95 m (300 ft) outdoors. Range also varies with frequency band. Wi-Fi in the 2.4 GHz frequency block has slightly better range than Wi-Fi in the 5 GHz frequency block. Outdoor range with improved antennas can be several kilometers or more with line-of-sight.Wi-Fi performance decreases roughly quadratically as the range increases at constant radiation levels. Mobility Because of the very limited practical range of Wi-Fi, mobile use is essentially confined to such applications as inventory taking machines in warehouses or retail spaces, barcode reading devices at check-out stands or receiving / shipping stations. Mobile use of Wi-Fi over wider ranges is limited to move, use, move, as for instance in an automobile moving from one hotspot to another. Other wireless technologies are more suitable as illustrated in the graphic.
  • 8. Speed vs. Mobility of wireless systems: Wi-Fi, HSPA, UMTS and GSM Threats to security The most common wireless encryption standard, Wired Equivalent Privacy or WEP, has been shown to be easily breakable even when correctly configured. Wi-Fi Protected Access (WPA and WPA2), which began shipping in 2003, aims to solve this problem and is now available on most products. Wi-Fi Access Points typically default to an "open" (encryption-free) mode. To turn security on requires the user to configure the device, usually via a software graphical user interface (GUI). Wi-Fi networks that are open (unencrypted) can be monitored and used to read and copy data (including personal information) transmitted over the network, unless another security method is used to secure the data, such as a VPN or a secure web page. Embedded systems Wi-Fi availability in the home is on the increase. This extension of the Internet into the home space will increasingly be used for remote monitoring. Examples of remote monitoring include security systems and tele-medicine. In all these kinds of implementation, if the Wi-Fi provision is provided using a system running one of operating systems mentioned above, then it becomes unfeasible due to weight, power consumption and cost issues. Increasingly in the last few years (particularly as of early 2007), embedded Wi-Fi modules have become available which come with a real-time operating system and provide a simple means of wireless enabling any device which has and communicates via a serial port. This allows simple monitoring devices – for example, a portable ECG monitor hooked up to a patient in their home – to be created. This Wi-Fi enabled device effectively becomes part of the internet cloud and can communicate with any other node on the
  • 9. internet. The data collected can hop via the home's Wi-Fi access point to anywhere on the internet. Embedded serial-to-Wi-Fi module Network security During the early popular adoption of 802.11, providing open access points for anyone within range to use was encouraged to cultivate wireless community networks; particularly since people on average use only a fraction of their upstream bandwidth at any given time. Later, equipment manufacturers and mass-media advocated isolating users to a predetermined whitelist of authorized users referred to as "securing" the access point. Measures to deter unauthorized users include suppressing the AP's SSID broadcast, allowing only computers with known MAC addresses to join the network, and various encryption standards. Suppressed SSID and MAC filtering are ineffective security methods as the SSID is broadcast in the open in response to a client SSID query and a MAC address can easily be spoofed. If the eavesdropper has the ability to change his MAC address, then he can potentially join the network by spoofing an authorized address. WEP encryption can protect against casual snooping, but may also produce a
  • 10. misguided sense of security since freely available tools such as AirSnort or aircrack can quickly recover WEP encryption keys. Once it has seen 5-10 million encrypted packets, AirSnort can determine the encryption password in under a second; newer tools such as aircrack-ptw can use Klein's attack to crack a WEP key with a 50% success rate using only 40,000 packets. The newer Wi-Fi Protected Access (WPA) and IEEE 802.11i (WPA2) encryption standards do not have any of the serious weaknesses of WEP encryption. One serious issue with wireless network security is not just encryption, but access to the network. With wired networking it is necessary to get past either a firewall or the security guard & locked doors. With wireless it is only necessary to get reception and spend as long as you want, comfortably out of reach of the network owner. Most business networks protect sensitive data and systems by attempting to disallow external access. Conclusion Wireless technology will certainly have a great impact on the future. As an advertising medium, it has the potential to be the single most personal method of reaching consumers. In an increasingly ad cluttered world however, there is also great potential for backlash. Consumer concerns with regards to unsolicited interference such as spamming, threats to security and privacy loom large. That being said, it is my opinion that wireless advertising will overcome these obstacles and ultimately be successful. Wireless computer networks have great potential to act as a tool for democratization. In places like Parkersburg, Iowa and throughout rural America they are helping to close the digital divide. It is true that security of wireless networks will continue to be a concern in the future, but one must admit that there is something almost Robin Hood like about groups like War Drivers, ever on a quest for free Internet access, always questioning the authority of large
  • 11. corporations and other entities who attempt to maintain control and domination over the Internet. Thank You