SlideShare une entreprise Scribd logo
1  sur  20
Wi-Fi
                        Technology
                   Eyad R. Manaa
Prepared by :      Mohammed A. Hassona
                   Raed M. Jibreel

Supervised by :

            Prof. Mohammed Alhanjouri

                   The Islamic University of Gaza
                  Computer engineering Department
                                                    1
                            May 19,2010
Outlines
   Introduction
   What is Wi-Fi ?
   Wi-Fi Standards
   Hotspots
   Wi-Fi Network Elements
   How a Wi-Fi Network Works
   Advantages and Limitations of Wi-Fi
   Wi-Fi Security
   Conclusion
   The Future of Wi-Fi
                                          2
Introduction

 Imagine working on your laptop or checking e-mail
from anywhere in your home.

 Imagine being able to connect to your office
network from an airport or coffee shop.

 Now , imagine doing all these
things easily and quickly, without
worrying about finding a wired
network connection.
That is Wi-Fi !
                                                      3
What is Wi-Fi?

   Wi-Fi (Wireless Fidelity) is a generic term that refers to
    the IEEE 802.11 communications standard for
    Wireless Local Area Networks (WLANs).

   Wireless Technology is an alternative to Wired
    Technology, which is commonly used, for connecting
    devices in wireless using radio waves.

   Allows you to access the Internet while on the move ;
    you can remain online while moving from one area to
    another, without a disconnection or loss in coverage.
                                                                 4
IEEE 802.11 standard

   In 1997, the Institute of Electrical and Electronic
    Engineers (IEEE) drafted the 802.11 standard for
    wireless local area networking.

   In 1999, networking hardware companies accepted the
    standard and began manufacturing products using the
    802.11b protocol which operated in the 2.4 GHz range
    and was capable of transmitting at speeds of 11 Mbps.

   The 802.11a protocol was also released in 1999,
    operating at 5 GHz with transmissions speeds of 54
    Mbps, but its cost was high.
                                                        5
IEEE 802.11 standard
(cont.)

           Maximum
Network               Range      Frequency    Power
            Speed                                         Cost
standard              (feet)       (GHz)      drain
            (Mbps)
 802.11b     11      100-150        2.4      Moderate     Low

 802.11a     54       60-100        5          High       High

 802.11g     54      150-250        2.4      Moderate   Moderate

                     Up to 300
 802.11n     200                  2.4 & 5    Moderate   Moderate
                       feet

                                                                   6
Hotspot

    What is a Hotspot ?

   A Hotspot is any location where Wi-Fi
    network access is made publicly available.

   Hotspots are equipped with a Broadband Internet
    connection, and one or more Access Points that
    allow users to access the Internet wirelessly.
   Hotspots can be setup in any public location that
    can support an Internet connection. All the locations
    discussed below are examples of Hotspots.               7
Wi-Fi Hotspot Locations


  Airports
  Hotels & Resorts
  Restaurants
  Coffee Shops
  Bookstores
  Shopping Malls

 There are several online services
  allow you find hotspot locations.   8
Hotspot Revolution




                     9
Elements of a Wi-Fi Network

   Access Point (AP) - The AP is a wireless LAN
    transceiver or “base station” that can connect one or
    many wireless devices in the same time to the Internet.

   Safeguards - Firewalls and anti-virus software protect
    networks from uninvited users and keep information
    secure.

   Wi-Fi cards (Adapters) - They accept the wireless
    signal and relay information. They can be internal and
    external.                                              10
PCI and USB adapters

          For Desktop               For Laptop
PCI adapter      USB adapter     PCMCIA adapter
  (Internal)        (External)




                                                 11
How a Wi-Fi Network Works ?
 A Wi-Fi connection works through a transmitting
  antenna, which is usually connected to a DSL or cable
  Internet connection. The antenna on the router will then
  beam radio signals through a specific range. Another
  antenna, which is on the laptop or personal computer,
  receives the signal.




                                                             12
Advantages of Wi-Fi

   No Wires     - A truly wireless networking solution.

   No Waiting   - Fast, easy deployments.

   No Worries - A wireless networking system that is
    secure, easy to manage, and built to grow with you.

   Ease of Installation - Quick, easy setup.

   Fast data transfer rates                               13
Limitations of Wi-Fi
   Limited range

   Data security risks :a huge challenge for Wi-Fi
    networks.

   Interference from other devices : such as
    telephones, microwave ovens.

   High power consumption :making battery life and
    heat a concern .
                                                      14
Basic Wi-Fi Security Techniques

   WEP(Wired Equivalent Privacy) : The original encryption
    technique specified by the IEEE 802.11 standard.

   WPA(Wi-Fi Protected Access ): A new standard that
    provides improved encryption security over WEP.

   WPA2 : is an improved version of WPA that uses
    Advanced Encryption Standard (AES) technology.


                                                          15
Basic Wi-Fi Security Techniques(cont.)

 Securing   Encryption Type
                              Security Level             Notes
  Method         Used


                                               No longer used; it is can be
  WEP        RC4 encryption        Low
                                                      hacked easily
               algorithm

                                                   provides improved
   WPA       TKIP Protocol        High          encryption security over
                                                          WEP

                                                 An improved version of
  WPA2       CCMP Protocol      Very High       WPA that uses Advanced
                                                  Encryption Standard
                                                                              16
Conclusion
   Wi-Fi is a simple, cost-effective way to connect to the
    Internet, without the need to physically connecting wires.
   In 1997 IEEE drafted the 802.11 standard for wireless
    local area networking.
   Hotspot is a geographic area setup in any public
    location, and has a readily accessible wireless network.
   Security is a huge challenge for Wi-Fi Networks, many
    Security Techniques are used to improve it.
   Wi-Fi Networks have a several limitations that should be
    concerned.

                                                            17
The Future of Wi-Fi
   The future of Wi-Fi is very bright. Its growing in
    popularity because of decreasing costs and the freedom
    it gives to users.
       Hotels offering Wi-Fi




                               35,000

                               30,000

                               25,000

                               20,000

                               15,000

                               10,000

                                5,000

                                   0
                                        2007   2008   2009   2010


                                                                    18
Wi-Fi technology presentation
Wi-Fi technology presentation

Contenu connexe

Tendances

Tendances (20)

Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
seminar report on Li-Fi Technology
seminar report on Li-Fi Technologyseminar report on Li-Fi Technology
seminar report on Li-Fi Technology
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
hotspot(wi-fi)
hotspot(wi-fi)hotspot(wi-fi)
hotspot(wi-fi)
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesPresentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
5g technology ppt
5g technology ppt5g technology ppt
5g technology ppt
 
5G MOBILE TECHNOLOGY PPT
5G MOBILE TECHNOLOGY PPT5G MOBILE TECHNOLOGY PPT
5G MOBILE TECHNOLOGY PPT
 
Wi fi
Wi fiWi fi
Wi fi
 
Wireless network
Wireless networkWireless network
Wireless network
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi Architecture
 
LI-FI Presentation
LI-FI  Presentation LI-FI  Presentation
LI-FI Presentation
 
Presentation on wireless technology
Presentation on wireless technologyPresentation on wireless technology
Presentation on wireless technology
 
WiFi 6 - Usher in the Era of Next-Generation Connectivity
WiFi 6 - Usher in the Era of Next-Generation ConnectivityWiFi 6 - Usher in the Era of Next-Generation Connectivity
WiFi 6 - Usher in the Era of Next-Generation Connectivity
 

En vedette

Choosing the Right Access Point Antenna
Choosing the Right Access Point AntennaChoosing the Right Access Point Antenna
Choosing the Right Access Point AntennaMimosa Networks
 
Interference Management with Limited Channel State Information in Wireless Ne...
Interference Management with Limited Channel State Information in Wireless Ne...Interference Management with Limited Channel State Information in Wireless Ne...
Interference Management with Limited Channel State Information in Wireless Ne...Mohamed Seif
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentationmrtheodisthorne2
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingOnline
 
Access cavity preparation
Access cavity preparationAccess cavity preparation
Access cavity preparationAnkita Varshney
 

En vedette (6)

Choosing the Right Access Point Antenna
Choosing the Right Access Point AntennaChoosing the Right Access Point Antenna
Choosing the Right Access Point Antenna
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Interference Management with Limited Channel State Information in Wireless Ne...
Interference Management with Limited Channel State Information in Wireless Ne...Interference Management with Limited Channel State Information in Wireless Ne...
Interference Management with Limited Channel State Information in Wireless Ne...
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentation
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Access cavity preparation
Access cavity preparationAccess cavity preparation
Access cavity preparation
 

Similaire à Wi-Fi technology presentation

Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Zameer Abdul Azeez Mulla
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technologysai kumar R
 
Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Conceptkodela3
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technologyRavi Rajput
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentationdayansaji
 
Report on Future of Telecommunication Technologies
Report on Future of Telecommunication TechnologiesReport on Future of Telecommunication Technologies
Report on Future of Telecommunication TechnologiesYashraj Nigam
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology WriteupShital Kat
 
Computer network wifi
Computer network wifiComputer network wifi
Computer network wifiAnil Pokhrel
 

Similaire à Wi-Fi technology presentation (20)

Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02
 
wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
wireless networks.pptx
wireless networks.pptxwireless networks.pptx
wireless networks.pptx
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
 
Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Concept
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
Wifi (1)
Wifi (1)Wifi (1)
Wifi (1)
 
WIFI TECHNOLOGY
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
 
Wifi tecnology
Wifi tecnology Wifi tecnology
Wifi tecnology
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
 
Wireless Fidelity
Wireless FidelityWireless Fidelity
Wireless Fidelity
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
Wifi Bsnl.
Wifi Bsnl.Wifi Bsnl.
Wifi Bsnl.
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi-Fi technology
Wi-Fi technologyWi-Fi technology
Wi-Fi technology
 
Report on Future of Telecommunication Technologies
Report on Future of Telecommunication TechnologiesReport on Future of Telecommunication Technologies
Report on Future of Telecommunication Technologies
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology Writeup
 
Computer network wifi
Computer network wifiComputer network wifi
Computer network wifi
 
Wi fi
Wi fiWi fi
Wi fi
 

Dernier

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Dernier (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Wi-Fi technology presentation

  • 1. Wi-Fi Technology Eyad R. Manaa Prepared by : Mohammed A. Hassona Raed M. Jibreel Supervised by : Prof. Mohammed Alhanjouri The Islamic University of Gaza Computer engineering Department 1 May 19,2010
  • 2. Outlines  Introduction  What is Wi-Fi ?  Wi-Fi Standards  Hotspots  Wi-Fi Network Elements  How a Wi-Fi Network Works  Advantages and Limitations of Wi-Fi  Wi-Fi Security  Conclusion  The Future of Wi-Fi 2
  • 3. Introduction  Imagine working on your laptop or checking e-mail from anywhere in your home.  Imagine being able to connect to your office network from an airport or coffee shop.  Now , imagine doing all these things easily and quickly, without worrying about finding a wired network connection. That is Wi-Fi ! 3
  • 4. What is Wi-Fi?  Wi-Fi (Wireless Fidelity) is a generic term that refers to the IEEE 802.11 communications standard for Wireless Local Area Networks (WLANs).  Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless using radio waves.  Allows you to access the Internet while on the move ; you can remain online while moving from one area to another, without a disconnection or loss in coverage. 4
  • 5. IEEE 802.11 standard  In 1997, the Institute of Electrical and Electronic Engineers (IEEE) drafted the 802.11 standard for wireless local area networking.  In 1999, networking hardware companies accepted the standard and began manufacturing products using the 802.11b protocol which operated in the 2.4 GHz range and was capable of transmitting at speeds of 11 Mbps.  The 802.11a protocol was also released in 1999, operating at 5 GHz with transmissions speeds of 54 Mbps, but its cost was high. 5
  • 6. IEEE 802.11 standard (cont.) Maximum Network Range Frequency Power Speed Cost standard (feet) (GHz) drain (Mbps) 802.11b 11 100-150 2.4 Moderate Low 802.11a 54 60-100 5 High High 802.11g 54 150-250 2.4 Moderate Moderate Up to 300 802.11n 200 2.4 & 5 Moderate Moderate feet 6
  • 7. Hotspot What is a Hotspot ?  A Hotspot is any location where Wi-Fi network access is made publicly available.  Hotspots are equipped with a Broadband Internet connection, and one or more Access Points that allow users to access the Internet wirelessly.  Hotspots can be setup in any public location that can support an Internet connection. All the locations discussed below are examples of Hotspots. 7
  • 8. Wi-Fi Hotspot Locations Airports Hotels & Resorts Restaurants Coffee Shops Bookstores Shopping Malls  There are several online services allow you find hotspot locations. 8
  • 10. Elements of a Wi-Fi Network  Access Point (AP) - The AP is a wireless LAN transceiver or “base station” that can connect one or many wireless devices in the same time to the Internet.  Safeguards - Firewalls and anti-virus software protect networks from uninvited users and keep information secure.  Wi-Fi cards (Adapters) - They accept the wireless signal and relay information. They can be internal and external. 10
  • 11. PCI and USB adapters For Desktop For Laptop PCI adapter USB adapter PCMCIA adapter (Internal) (External) 11
  • 12. How a Wi-Fi Network Works ?  A Wi-Fi connection works through a transmitting antenna, which is usually connected to a DSL or cable Internet connection. The antenna on the router will then beam radio signals through a specific range. Another antenna, which is on the laptop or personal computer, receives the signal. 12
  • 13. Advantages of Wi-Fi  No Wires - A truly wireless networking solution.  No Waiting - Fast, easy deployments.  No Worries - A wireless networking system that is secure, easy to manage, and built to grow with you.  Ease of Installation - Quick, easy setup.  Fast data transfer rates 13
  • 14. Limitations of Wi-Fi  Limited range  Data security risks :a huge challenge for Wi-Fi networks.  Interference from other devices : such as telephones, microwave ovens.  High power consumption :making battery life and heat a concern . 14
  • 15. Basic Wi-Fi Security Techniques  WEP(Wired Equivalent Privacy) : The original encryption technique specified by the IEEE 802.11 standard.  WPA(Wi-Fi Protected Access ): A new standard that provides improved encryption security over WEP.  WPA2 : is an improved version of WPA that uses Advanced Encryption Standard (AES) technology. 15
  • 16. Basic Wi-Fi Security Techniques(cont.) Securing Encryption Type Security Level Notes Method Used No longer used; it is can be WEP RC4 encryption Low hacked easily algorithm provides improved WPA TKIP Protocol High encryption security over WEP An improved version of WPA2 CCMP Protocol Very High WPA that uses Advanced Encryption Standard 16
  • 17. Conclusion  Wi-Fi is a simple, cost-effective way to connect to the Internet, without the need to physically connecting wires.  In 1997 IEEE drafted the 802.11 standard for wireless local area networking.  Hotspot is a geographic area setup in any public location, and has a readily accessible wireless network.  Security is a huge challenge for Wi-Fi Networks, many Security Techniques are used to improve it.  Wi-Fi Networks have a several limitations that should be concerned. 17
  • 18. The Future of Wi-Fi  The future of Wi-Fi is very bright. Its growing in popularity because of decreasing costs and the freedom it gives to users. Hotels offering Wi-Fi 35,000 30,000 25,000 20,000 15,000 10,000 5,000 0 2007 2008 2009 2010 18