SlideShare a Scribd company logo
1 of 8
By EHTISHAM ALI Wi-Fi Technology
Wi-Fi ? The term Wi-Fi suggests Wireless Fidelity, resembling the long-established audio-equipment classification term high fidelity (in use since the 1930s) or Hi-Fi (used since 1950) The term Wi-Fi, first used commercially in August 1999,was coined by a brand-consulting firm called Interbrand Corporation that the Alliance had hired to determine a name that was "a little catchier than Direct Sequence'".
Access Point  A roof-mounted Wi-Fi antenna A Wi-Fi enabled device such as a personal computer, video game console, smart phone or digital audio player can connect to the Internet when within range of a wireless network connected to the Internet.  An outdoor Wi-Fi access point In the early 2000s, many cities around the world announced plans for city-wide Wi-Fi networks. This proved to be much more difficult than their promoters initially envisioned with the result that most of these projects were either canceled or placed on indefinite hold
Advantages Wi-Fi allows the deployment of local area networks (LANs) without wires for client devices, typically reducing the costs of network deployment and expansion.  A keychain-size Wi-Fi detector Wi-Fi operates in more than 220,000 public hotspots and in tens of millions of homes and corporate and university campuses worldwide. The current version of Wi-Fi Protected Access encryption (WPA2) as of 2010 is consideredsecure, provided users employ a strong passphrase.
A computer on the wireless adapter translates data into a radio signal and transmits through an antenna. A wireless router receives the signal and decodes. The router sends information to the Internet using a physical, wired Ethernet connection
Limitations Wi-Fi networks have limited range. A typical wireless router using 802.11b or 802.11g with a stock antenna might have a range of 32 m (120 ft) indoors and 95 m (300 ft) outdoors. The most common wireless encryption-standard, Wired Equivalent Privacy (WEP), has been shown to be easily breakable even when correctly configured. Wi-Fi Protected Access (WPA and WPA2) encryption, which became available in devices in 2003, aimed to solve this problem.
Hardware An embedded Router Board 112 with U.FL-RSMA pigtail and R52 mini PCI Wi-Fi card widely used by wireless Internet service providers USB wireless adapter OSBRiDGE 3GN - 802.11n Access Point and UMTS/GSM Gateway in one device
Home Networking If you have multiple computers networked in your home, you can create a wireless network with a wireless access point. If you have multiple computers that are not networked, or if you want to replace your Ethernet network, you need a wireless router. It is a single unit that contains: 1. A port to connect to your cable modem2. A router3. An Ethernet hub4. A firewall5. A wireless access point

More Related Content

What's hot (20)

Wifi
WifiWifi
Wifi
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
 
Bse 3106 wifi
Bse 3106 wifiBse 3106 wifi
Bse 3106 wifi
 
Wireless Fidelity
Wireless FidelityWireless Fidelity
Wireless Fidelity
 
Wi fi and it’s applications
Wi fi and it’s applicationsWi fi and it’s applications
Wi fi and it’s applications
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wireless Fidelity ppt
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wi fi / Wireless Fidelity
Wi fi / Wireless FidelityWi fi / Wireless Fidelity
Wi fi / Wireless Fidelity
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Concept
 
Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558
 
WIFI[autosaved]
WIFI[autosaved]WIFI[autosaved]
WIFI[autosaved]
 
WIFI Technology
WIFI TechnologyWIFI Technology
WIFI Technology
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
wifi ppt
wifi pptwifi ppt
wifi ppt
 
Wifi technology
Wifi technologyWifi technology
Wifi technology
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 

Viewers also liked

Comparing Shared vs Dedicated Internet Connections
Comparing Shared vs Dedicated Internet ConnectionsComparing Shared vs Dedicated Internet Connections
Comparing Shared vs Dedicated Internet ConnectionsMari Hansen
 
Ethernet Dedicated Internet Service
Ethernet Dedicated Internet ServiceEthernet Dedicated Internet Service
Ethernet Dedicated Internet ServiceMallory Zemelis
 
4g wireless communication
4g wireless communication4g wireless communication
4g wireless communicationEkta Singh
 
4g wireless final ppt
4g wireless  final ppt4g wireless  final ppt
4g wireless final pptShelly
 
Wi fi technology ppt mine
Wi fi technology ppt mineWi fi technology ppt mine
Wi fi technology ppt mineRoshni Ayappan
 

Viewers also liked (6)

Comparing Shared vs Dedicated Internet Connections
Comparing Shared vs Dedicated Internet ConnectionsComparing Shared vs Dedicated Internet Connections
Comparing Shared vs Dedicated Internet Connections
 
Dedicated Internet Access
Dedicated Internet AccessDedicated Internet Access
Dedicated Internet Access
 
Ethernet Dedicated Internet Service
Ethernet Dedicated Internet ServiceEthernet Dedicated Internet Service
Ethernet Dedicated Internet Service
 
4g wireless communication
4g wireless communication4g wireless communication
4g wireless communication
 
4g wireless final ppt
4g wireless  final ppt4g wireless  final ppt
4g wireless final ppt
 
Wi fi technology ppt mine
Wi fi technology ppt mineWi fi technology ppt mine
Wi fi technology ppt mine
 

Similar to Wi fi Technology

Similar to Wi fi Technology (20)

Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology Writeup
 
Wi fi network
Wi fi networkWi fi network
Wi fi network
 
wi-fi
wi-fiwi-fi
wi-fi
 
-Communication Engineering.pptx
-Communication Engineering.pptx-Communication Engineering.pptx
-Communication Engineering.pptx
 
Wifi
WifiWifi
Wifi
 
wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi Architecture
 
wifi tech-1.pptx
wifi tech-1.pptxwifi tech-1.pptx
wifi tech-1.pptx
 
WIFI TECHNOLOGY
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wi-Fi
Wi-Fi Wi-Fi
Wi-Fi
 
wireless networks.pptx
wireless networks.pptxwireless networks.pptx
wireless networks.pptx
 
3
33
3
 
Wi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification ProcessWi fi-wiki, City wide wifi with Certification Process
Wi fi-wiki, City wide wifi with Certification Process
 
972003
972003972003
972003
 
W I R E L E S S F I D E L I T Y
W I R E L E S S  F I D E L I T YW I R E L E S S  F I D E L I T Y
W I R E L E S S F I D E L I T Y
 
WiFi part II
WiFi part IIWiFi part II
WiFi part II
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 

More from Ehtisham Ali

More from Ehtisham Ali (20)

Vintage indian advertisement's
Vintage indian advertisement'sVintage indian advertisement's
Vintage indian advertisement's
 
Extreme Interview Questions
Extreme Interview QuestionsExtreme Interview Questions
Extreme Interview Questions
 
Windows Avtars
Windows AvtarsWindows Avtars
Windows Avtars
 
Intruders detection
Intruders detectionIntruders detection
Intruders detection
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Asymptotic notations
Asymptotic notationsAsymptotic notations
Asymptotic notations
 
Huffman Coding
Huffman CodingHuffman Coding
Huffman Coding
 
Windows basic quiz
Windows basic quizWindows basic quiz
Windows basic quiz
 
Wallpapers show
Wallpapers showWallpapers show
Wallpapers show
 
Virtual vista
Virtual vistaVirtual vista
Virtual vista
 
Marketing segmentations
Marketing segmentationsMarketing segmentations
Marketing segmentations
 
Lcd technology
Lcd technologyLcd technology
Lcd technology
 
Gd topics list
Gd topics listGd topics list
Gd topics list
 
Dvd
DvdDvd
Dvd
 
My room
My roomMy room
My room
 
Filmi kids
Filmi kidsFilmi kids
Filmi kids
 
Excel tutorial on students record
Excel tutorial on students record Excel tutorial on students record
Excel tutorial on students record
 
Television broadcasting and promotion
Television broadcasting and promotionTelevision broadcasting and promotion
Television broadcasting and promotion
 
TechQuiz
TechQuizTechQuiz
TechQuiz
 
Ms dos tutorial
Ms dos tutorialMs dos tutorial
Ms dos tutorial
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Wi fi Technology

  • 1. By EHTISHAM ALI Wi-Fi Technology
  • 2. Wi-Fi ? The term Wi-Fi suggests Wireless Fidelity, resembling the long-established audio-equipment classification term high fidelity (in use since the 1930s) or Hi-Fi (used since 1950) The term Wi-Fi, first used commercially in August 1999,was coined by a brand-consulting firm called Interbrand Corporation that the Alliance had hired to determine a name that was "a little catchier than Direct Sequence'".
  • 3. Access Point A roof-mounted Wi-Fi antenna A Wi-Fi enabled device such as a personal computer, video game console, smart phone or digital audio player can connect to the Internet when within range of a wireless network connected to the Internet. An outdoor Wi-Fi access point In the early 2000s, many cities around the world announced plans for city-wide Wi-Fi networks. This proved to be much more difficult than their promoters initially envisioned with the result that most of these projects were either canceled or placed on indefinite hold
  • 4. Advantages Wi-Fi allows the deployment of local area networks (LANs) without wires for client devices, typically reducing the costs of network deployment and expansion. A keychain-size Wi-Fi detector Wi-Fi operates in more than 220,000 public hotspots and in tens of millions of homes and corporate and university campuses worldwide. The current version of Wi-Fi Protected Access encryption (WPA2) as of 2010 is consideredsecure, provided users employ a strong passphrase.
  • 5. A computer on the wireless adapter translates data into a radio signal and transmits through an antenna. A wireless router receives the signal and decodes. The router sends information to the Internet using a physical, wired Ethernet connection
  • 6. Limitations Wi-Fi networks have limited range. A typical wireless router using 802.11b or 802.11g with a stock antenna might have a range of 32 m (120 ft) indoors and 95 m (300 ft) outdoors. The most common wireless encryption-standard, Wired Equivalent Privacy (WEP), has been shown to be easily breakable even when correctly configured. Wi-Fi Protected Access (WPA and WPA2) encryption, which became available in devices in 2003, aimed to solve this problem.
  • 7. Hardware An embedded Router Board 112 with U.FL-RSMA pigtail and R52 mini PCI Wi-Fi card widely used by wireless Internet service providers USB wireless adapter OSBRiDGE 3GN - 802.11n Access Point and UMTS/GSM Gateway in one device
  • 8. Home Networking If you have multiple computers networked in your home, you can create a wireless network with a wireless access point. If you have multiple computers that are not networked, or if you want to replace your Ethernet network, you need a wireless router. It is a single unit that contains: 1. A port to connect to your cable modem2. A router3. An Ethernet hub4. A firewall5. A wireless access point