SlideShare a Scribd company logo
1 of 28
Wireless Fidelity
AGENDA
   Introduction
   What is IEEE 802.11
   Setup required for WiFi
   Working of WiFi
   WiFi Network Topologies
   WiFi Security Threats
   WiFi Security
   Advantages
   Disadvantages
   Comparison B/w Wired & Wireless Network
   Application of WiFi
INTRODUCTION
 Wireless Technology is an alternative to Wired
Technology, which is commonly used, for connecting devices
in wireless mode.
 WiFi is a wireless technology that uses radio frequency to
transmit data through the air.
 WiFi is a generic term that refers to the IEEE 802.11
communications standard for Wireless Local Area Networks
(WLANs).
 WiFi Network connect computers to each other, to the
internet and to the wired network.
 It offers peak data speeds of up to 11 Mbps.
What is IEEE 802.11
IEEE 802.11 is a set of standards carrying out Wireless Local
Area Network (WLAN) computer communication in the 2.4 to
5 GHz frequency bands. They are created and maintained by
the IEEE (Institute of Electrical & Electronics Engineers)
Standards Committee.

    IEEE 802.11b

                        IEEE 802.11a

                                            IEEE 802.11g
IEEE 802.11b

   Appeared in late 1999
   Operates at 2.4GHz radio spectrum
   4-6 Mbps (actual speed) can go up to 11 Mbps within
    the range of 30 m
   100 -150 feet range
   Most popular, Least Expensive
   Interference from mobile phones and Bluetooth
    devices which can reduce the transmission speed.
IEEE 802.11a

   Introduced in 2001
   Operates at 5 GHz radio spectrum (less popular)
   15-20 Mbps (Actual speed) can go up to 54 Mbps as
    the range reduces
   50-75 feet range
   More expensive
   Not compatible with 802.11b
IEEE 802.11g

   Introduced in 2003
   Operates at 2.4 GHz radio spectrum
   54 Mbps (Actual speed)
   100-150 feet range
   Combines the features of both Standards i.e.
    IEEE 802.11b & IEEE 802.11a
   Compatible with 802.11b
Setup Required for WiFi

      ACCESS POINT

      Consists of a Radio Transmitter and receiver
as well as an interface to a wired network or directly to
the internet
      Serves as a base station and a bridge between
the wireless network and a larger Ethernet network or
the internet.
 WIRELESS CARDS
     Network card which connects to a radio-based
computer network, unlike a regular network interface
controller (NIC) which connects to a wire-based network
such as Ethernet.
     They accept the wireless signal and relay
information. They can be internal and external
Working of WiFi
    Basic concept is same as Walkie talkies
 A WiFi hotspot is created by installing an access point to an internet
connection
    An access point acts as a base station .
 When WiFi enabled device encounters a hotspot the device can then
connect to that network wirelessly.
    A Wireless Network uses Radio Waves, just like Cell phone, Radio do.
 A computer’s Wireless Adapter translates data into Radio signals and
transmit it using Antenna.
 A wireless router receives the signals and Decodes it. The Router sends
the Information to the Internet.
 A single access point can support up to 30 users and can function
within a range of 100 – 150 feet indoors and up to 300 feet outdoors.
 Many access points can be connected to each other via Ethernet cables
to create a single large network.
WiFi Network Topologies

 AP-based topology (Infrastructure Mode)

 Peer-to-peer topology (Ad-hoc Mode)

 Point-to-multipoint bridge topology
AP-based topology

   The client communicates through Access Point.
   Basic Service Area-Radio Frequency coverage
    provided by an AP.
   Extended Service Area - It consists of 2 or more BSA.
   ESA cell includes 10-15% overlap to allow roaming.
Peer-to-peer topology

   Access Point is not Required.

   Client Devices within a cell can communicate directly
    with each other.

   It is useful for setting up of wireless network quickly
    and easily.
Point-to-Multipoint Bridge
topology

   Used to connect LAN’s b/w two or more buildings
    even miles apart.
   These conditions receive a clear line of sight b/w
    buildings.
 The line of Sight range varies based on the type of
wireless bridge and antenna used as well as the
environment conditions.
WiFi SECURITY Threats

 Wireless technology doesn’t remove any
old security issues, but introduces new ones

                     Eavesdropping


 Man-in-the-middle attacks

                             Denial of Service
Eavesdropping

    Easy to perform, almost impossible to detect
    By default, everything is transmitted in clear text
           Usernames, passwords, content ...
           No security offered by the transmission medium
    Different tools available on the internet
           Network sniffers, protocol analysers . . .
           Password collectors
    With the right equipment, it’s possible to eavesdrop
     traffic from few kilometers away
Man In The Middle Attack

 Attacker spoofes a disassociate
  message from the victim
 The victim starts to look for a
  new access point, and the
  attacker advertises his own AP
  on a different channel, using
  the real AP’s MAC address
 The attacker connects to the
  real AP using victim’s MAC
  address
Denial of Service

 Attack on transmission frequecy used
   Frequency jamming
   Not very technical, but works
 Attack on MAC layer
   Spoofed deauthentication / disassociation messages
   can target one specific user
 Attacks on higher layer protocol (TCP/IP protocol)
   SYN Flooding
WiFi SECURITY

The requirements for WiFi network security consists of an
primary component i.e. :

   Authentication

            User Authentication
            Server Authentication
Authentication

Keeping unauthorized users off the network
 User Authentication
                 Authentication Server is used
                 Done using Username and password of the User
      Risk:
                 Data (username & password) send before secure
                          channel established
                 Prone to passive eavesdropping by attacker
      Solution:
                 Establishing a encrypted channel before sending
                          username and password
 Server Authentication
           Digital Certificate is used
           Validation of digital certificate occurs
            automatically within client software
Advantages

     Flexible Working:
      Access the Internet, do File Transfers, even Print from anywhere within 100
meters of the WiFi Access Point.
     Reduce Cable Clutter:
      Reduce the clutter of wires and cables behind your Desktop/ Notebook

     Reduce Setup Cost:
      Save the cost of cabling and the cost on Network sockets

     Avoid Deterioration with Time:
      Network Cables and Sockets tend to deteriorate over time, while WiFi does
not have this disadvantage
     Eliminate Re-configuring Computers:
      Can Access WiFi at two different locations under the same company’s
network without having to re-configure their Internet settings each time.
Disadvantages
     Password and Security:
      It is important to secure your WiFi connection at home or the office. Otherwise,
anyone with a WiFi enabled computer can access your data and Internet connection!
Password-protecting your WiFi connection is an easy process and once you set up all
your Computers and devices to access your WiFi network, you do not need to type in
passwords each time thereafter.
     Signal Strength Sensitivity:
     WiFi Networks are sensitive to signal strength. To ensure good connectivity,
you must ensure that all computers and gadgets receive adequate signal strength
     Effect of Climatic Conditions:
      WiFi signals are likely to be adversely affected by climatic conditions such as
thunderstorms.
     Increased number of Network Devices:
      You are increasing the number of devices on your Network, by incorporating a
WiFi Access point. Also, you will need a power socket to plug in and power the WiFi
Access Point.
Comparison B/w Wired &
Wireless Network
Features          Wired Home Network             Wireless Home
                                                 networks
                  The networking of the wired    The networking of the
Networking        home networks are more         wireless networking is good
                  faster as compared to other    and better for the future
                  types of wireless networking   resources but it is not faster
                  devices because they are       as the wired home
                  able to provide the speed of   networking devices. Wifi is
                  more then 1000 Mbps            the common types of
                                                 wireless home network that
                                                 can provide the reliable
                                                 working
Cost Comparison   We need many expenses to       As compared to other wired
                  configure or setup the wired   devices it is easy to setup the
                  home network. Because we       wireless networking devices
                  need large money to spread     at the very low and at the
                  the network of coaxial         reliable cost
                  cables.
Comparison B/w Wired &
Wireless Network . . . Contd…
 Features     Wired Home Network           Wireless Home networks
 Advantages   More reliable                You can Access internet
              Faster internet              from any place through hot
              Transfer of data at a very   pots
              faster speed                 No hassles of cables
                                           No need any kind of wiring
                                           for installation
 Cons         It can not provide mobile    Not very much reliable
              network                      Only best for mobile
              Difficult to lay down the    devices such as Laptops
              cables and it looks very     Not faster as compared to
              messy when install outside   wired devices
Application of WiFi

     Sharing of Files:
     Sharing and Exchanging of Data can take place with nearby Computers in the
Network.
     Accessing the Internet:
      Using the WiFi, Internet can be made available to the Computers connected to
the Network.
     Stream Audio to Wireless Speakers:
      One of the useful application of WiFi is that using it one can Stream audio to
audio devices present in the Network Area that are compatible to it.
     Device Sharing:
      Similar to Wired Network WiFi provides the feature to access the Devices being
shared within the Network. Like one can command the Printer attached to any
System in the network and get their documents print.
Wi-Fi Wireless Fidelity

More Related Content

What's hot (20)

Wi fi technology ppt mine
Wi fi technology ppt mineWi fi technology ppt mine
Wi fi technology ppt mine
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Wimax / ieee 802.16
Wimax / ieee 802.16Wimax / ieee 802.16
Wimax / ieee 802.16
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
WLAN
WLANWLAN
WLAN
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
Wi fi
Wi fiWi fi
Wi fi
 
Wimax
WimaxWimax
Wimax
 
Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentation
 
Presentation On "Wi-Max Technology"
Presentation On "Wi-Max Technology"Presentation On "Wi-Max Technology"
Presentation On "Wi-Max Technology"
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
WiMAX
WiMAXWiMAX
WiMAX
 
What Is WiMax
What Is WiMaxWhat Is WiMax
What Is WiMax
 
Presentation of-wimax
Presentation of-wimaxPresentation of-wimax
Presentation of-wimax
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

Viewers also liked

Introducción a symfony (winter hack vlc)
Introducción a symfony (winter hack vlc)Introducción a symfony (winter hack vlc)
Introducción a symfony (winter hack vlc)Joseluis Laso
 
Free wifi(outernet)
Free wifi(outernet)Free wifi(outernet)
Free wifi(outernet)Sarmad Abid
 
Wireless Communication Technologies (WIFI ,Bluetooth , NFC )
Wireless Communication Technologies (WIFI ,Bluetooth , NFC )Wireless Communication Technologies (WIFI ,Bluetooth , NFC )
Wireless Communication Technologies (WIFI ,Bluetooth , NFC )layth jasim
 
Head-Fi Summer Headphone Buying Guide - 2012
Head-Fi Summer Headphone Buying Guide - 2012 Head-Fi Summer Headphone Buying Guide - 2012
Head-Fi Summer Headphone Buying Guide - 2012 Nduduzo Smalz Ngobese
 
How to amplify wifi signal
How to amplify wifi signalHow to amplify wifi signal
How to amplify wifi signalSwati Sharma
 
Bluetooth/WiFi Signal Blocker,Wireless Jammer
Bluetooth/WiFi Signal Blocker,Wireless JammerBluetooth/WiFi Signal Blocker,Wireless Jammer
Bluetooth/WiFi Signal Blocker,Wireless JammerFord King
 
Material Can Block Wifi Signal
Material Can Block Wifi SignalMaterial Can Block Wifi Signal
Material Can Block Wifi SignalSopagna Chan
 
Wi fi and its application
Wi fi and its applicationWi fi and its application
Wi fi and its applicationwongtanping
 
What's the Difference Between a Incandescent and LED Light Bulb (and others)?
What's the Difference Between a Incandescent and LED Light Bulb (and others)?What's the Difference Between a Incandescent and LED Light Bulb (and others)?
What's the Difference Between a Incandescent and LED Light Bulb (and others)?Servc
 

Viewers also liked (13)

Introducción a symfony (winter hack vlc)
Introducción a symfony (winter hack vlc)Introducción a symfony (winter hack vlc)
Introducción a symfony (winter hack vlc)
 
Free wifi(outernet)
Free wifi(outernet)Free wifi(outernet)
Free wifi(outernet)
 
LED LIGHT ADVANTAGES VS DISADVANTAGES
LED LIGHT ADVANTAGES VS DISADVANTAGESLED LIGHT ADVANTAGES VS DISADVANTAGES
LED LIGHT ADVANTAGES VS DISADVANTAGES
 
Wireless Communication Technologies (WIFI ,Bluetooth , NFC )
Wireless Communication Technologies (WIFI ,Bluetooth , NFC )Wireless Communication Technologies (WIFI ,Bluetooth , NFC )
Wireless Communication Technologies (WIFI ,Bluetooth , NFC )
 
Head-Fi Summer Headphone Buying Guide - 2012
Head-Fi Summer Headphone Buying Guide - 2012 Head-Fi Summer Headphone Buying Guide - 2012
Head-Fi Summer Headphone Buying Guide - 2012
 
How to amplify wifi signal
How to amplify wifi signalHow to amplify wifi signal
How to amplify wifi signal
 
Bluetooth/WiFi Signal Blocker,Wireless Jammer
Bluetooth/WiFi Signal Blocker,Wireless JammerBluetooth/WiFi Signal Blocker,Wireless Jammer
Bluetooth/WiFi Signal Blocker,Wireless Jammer
 
Material Can Block Wifi Signal
Material Can Block Wifi SignalMaterial Can Block Wifi Signal
Material Can Block Wifi Signal
 
Wi fi and its application
Wi fi and its applicationWi fi and its application
Wi fi and its application
 
What's the Difference Between a Incandescent and LED Light Bulb (and others)?
What's the Difference Between a Incandescent and LED Light Bulb (and others)?What's the Difference Between a Incandescent and LED Light Bulb (and others)?
What's the Difference Between a Incandescent and LED Light Bulb (and others)?
 
Wifi and its importance
Wifi and its importanceWifi and its importance
Wifi and its importance
 
wireless communication
wireless communicationwireless communication
wireless communication
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 

Similar to Wi-Fi Wireless Fidelity

wirelessnetworks-ppt-140909071911-phpapp02.pdf
wirelessnetworks-ppt-140909071911-phpapp02.pdfwirelessnetworks-ppt-140909071911-phpapp02.pdf
wirelessnetworks-ppt-140909071911-phpapp02.pdfkouyepwanko
 
Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Conceptkodela3
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentationdayansaji
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxalanfhall8953
 
WIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my lifeWIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my lifeRahul Barick
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technologyRavi Rajput
 
Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Praveen Reddy
 
Wireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptxWireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptxJosephCristian8
 
Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Zameer Abdul Azeez Mulla
 

Similar to Wi-Fi Wireless Fidelity (20)

wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
wireless networks.pptx
wireless networks.pptxwireless networks.pptx
wireless networks.pptx
 
wirelessnetworks-ppt-140909071911-phpapp02.pdf
wirelessnetworks-ppt-140909071911-phpapp02.pdfwirelessnetworks-ppt-140909071911-phpapp02.pdf
wirelessnetworks-ppt-140909071911-phpapp02.pdf
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wi-Fi Tecnology
Wi-Fi TecnologyWi-Fi Tecnology
Wi-Fi Tecnology
 
Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Concept
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Wireless
WirelessWireless
Wireless
 
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docxWireless TechnologiesPresented bySean Shields AndGabriel.docx
Wireless TechnologiesPresented bySean Shields AndGabriel.docx
 
WIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my lifeWIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my life
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
 
Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Wireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptxWireless-Network-Technologies.pptx
Wireless-Network-Technologies.pptx
 
Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02
 
wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Wi-Fi Wireless Fidelity

  • 2. AGENDA  Introduction  What is IEEE 802.11  Setup required for WiFi  Working of WiFi  WiFi Network Topologies  WiFi Security Threats  WiFi Security  Advantages  Disadvantages  Comparison B/w Wired & Wireless Network  Application of WiFi
  • 3. INTRODUCTION  Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless mode.  WiFi is a wireless technology that uses radio frequency to transmit data through the air.  WiFi is a generic term that refers to the IEEE 802.11 communications standard for Wireless Local Area Networks (WLANs).  WiFi Network connect computers to each other, to the internet and to the wired network.  It offers peak data speeds of up to 11 Mbps.
  • 4. What is IEEE 802.11 IEEE 802.11 is a set of standards carrying out Wireless Local Area Network (WLAN) computer communication in the 2.4 to 5 GHz frequency bands. They are created and maintained by the IEEE (Institute of Electrical & Electronics Engineers) Standards Committee. IEEE 802.11b IEEE 802.11a IEEE 802.11g
  • 5. IEEE 802.11b  Appeared in late 1999  Operates at 2.4GHz radio spectrum  4-6 Mbps (actual speed) can go up to 11 Mbps within the range of 30 m  100 -150 feet range  Most popular, Least Expensive  Interference from mobile phones and Bluetooth devices which can reduce the transmission speed.
  • 6. IEEE 802.11a  Introduced in 2001  Operates at 5 GHz radio spectrum (less popular)  15-20 Mbps (Actual speed) can go up to 54 Mbps as the range reduces  50-75 feet range  More expensive  Not compatible with 802.11b
  • 7. IEEE 802.11g  Introduced in 2003  Operates at 2.4 GHz radio spectrum  54 Mbps (Actual speed)  100-150 feet range  Combines the features of both Standards i.e. IEEE 802.11b & IEEE 802.11a  Compatible with 802.11b
  • 8. Setup Required for WiFi  ACCESS POINT  Consists of a Radio Transmitter and receiver as well as an interface to a wired network or directly to the internet  Serves as a base station and a bridge between the wireless network and a larger Ethernet network or the internet.
  • 9.  WIRELESS CARDS  Network card which connects to a radio-based computer network, unlike a regular network interface controller (NIC) which connects to a wire-based network such as Ethernet.  They accept the wireless signal and relay information. They can be internal and external
  • 10. Working of WiFi  Basic concept is same as Walkie talkies  A WiFi hotspot is created by installing an access point to an internet connection  An access point acts as a base station .  When WiFi enabled device encounters a hotspot the device can then connect to that network wirelessly.  A Wireless Network uses Radio Waves, just like Cell phone, Radio do.
  • 11.  A computer’s Wireless Adapter translates data into Radio signals and transmit it using Antenna.  A wireless router receives the signals and Decodes it. The Router sends the Information to the Internet.  A single access point can support up to 30 users and can function within a range of 100 – 150 feet indoors and up to 300 feet outdoors.  Many access points can be connected to each other via Ethernet cables to create a single large network.
  • 12. WiFi Network Topologies  AP-based topology (Infrastructure Mode)  Peer-to-peer topology (Ad-hoc Mode)  Point-to-multipoint bridge topology
  • 13. AP-based topology  The client communicates through Access Point.  Basic Service Area-Radio Frequency coverage provided by an AP.  Extended Service Area - It consists of 2 or more BSA.  ESA cell includes 10-15% overlap to allow roaming.
  • 14. Peer-to-peer topology  Access Point is not Required.  Client Devices within a cell can communicate directly with each other.  It is useful for setting up of wireless network quickly and easily.
  • 15. Point-to-Multipoint Bridge topology  Used to connect LAN’s b/w two or more buildings even miles apart.  These conditions receive a clear line of sight b/w buildings.  The line of Sight range varies based on the type of wireless bridge and antenna used as well as the environment conditions.
  • 16. WiFi SECURITY Threats  Wireless technology doesn’t remove any old security issues, but introduces new ones Eavesdropping Man-in-the-middle attacks Denial of Service
  • 17. Eavesdropping  Easy to perform, almost impossible to detect  By default, everything is transmitted in clear text  Usernames, passwords, content ...  No security offered by the transmission medium  Different tools available on the internet  Network sniffers, protocol analysers . . .  Password collectors  With the right equipment, it’s possible to eavesdrop traffic from few kilometers away
  • 18. Man In The Middle Attack  Attacker spoofes a disassociate message from the victim  The victim starts to look for a new access point, and the attacker advertises his own AP on a different channel, using the real AP’s MAC address  The attacker connects to the real AP using victim’s MAC address
  • 19. Denial of Service  Attack on transmission frequecy used  Frequency jamming  Not very technical, but works  Attack on MAC layer  Spoofed deauthentication / disassociation messages  can target one specific user  Attacks on higher layer protocol (TCP/IP protocol)  SYN Flooding
  • 20. WiFi SECURITY The requirements for WiFi network security consists of an primary component i.e. :  Authentication  User Authentication  Server Authentication
  • 21. Authentication Keeping unauthorized users off the network  User Authentication  Authentication Server is used  Done using Username and password of the User Risk:  Data (username & password) send before secure channel established  Prone to passive eavesdropping by attacker Solution:  Establishing a encrypted channel before sending username and password
  • 22.  Server Authentication  Digital Certificate is used  Validation of digital certificate occurs automatically within client software
  • 23. Advantages  Flexible Working: Access the Internet, do File Transfers, even Print from anywhere within 100 meters of the WiFi Access Point.  Reduce Cable Clutter: Reduce the clutter of wires and cables behind your Desktop/ Notebook  Reduce Setup Cost: Save the cost of cabling and the cost on Network sockets  Avoid Deterioration with Time: Network Cables and Sockets tend to deteriorate over time, while WiFi does not have this disadvantage  Eliminate Re-configuring Computers: Can Access WiFi at two different locations under the same company’s network without having to re-configure their Internet settings each time.
  • 24. Disadvantages  Password and Security: It is important to secure your WiFi connection at home or the office. Otherwise, anyone with a WiFi enabled computer can access your data and Internet connection! Password-protecting your WiFi connection is an easy process and once you set up all your Computers and devices to access your WiFi network, you do not need to type in passwords each time thereafter.  Signal Strength Sensitivity: WiFi Networks are sensitive to signal strength. To ensure good connectivity, you must ensure that all computers and gadgets receive adequate signal strength  Effect of Climatic Conditions: WiFi signals are likely to be adversely affected by climatic conditions such as thunderstorms.  Increased number of Network Devices: You are increasing the number of devices on your Network, by incorporating a WiFi Access point. Also, you will need a power socket to plug in and power the WiFi Access Point.
  • 25. Comparison B/w Wired & Wireless Network Features Wired Home Network Wireless Home networks The networking of the wired The networking of the Networking home networks are more wireless networking is good faster as compared to other and better for the future types of wireless networking resources but it is not faster devices because they are as the wired home able to provide the speed of networking devices. Wifi is more then 1000 Mbps the common types of wireless home network that can provide the reliable working Cost Comparison We need many expenses to As compared to other wired configure or setup the wired devices it is easy to setup the home network. Because we wireless networking devices need large money to spread at the very low and at the the network of coaxial reliable cost cables.
  • 26. Comparison B/w Wired & Wireless Network . . . Contd… Features Wired Home Network Wireless Home networks Advantages More reliable You can Access internet Faster internet from any place through hot Transfer of data at a very pots faster speed No hassles of cables No need any kind of wiring for installation Cons It can not provide mobile Not very much reliable network Only best for mobile Difficult to lay down the devices such as Laptops cables and it looks very Not faster as compared to messy when install outside wired devices
  • 27. Application of WiFi  Sharing of Files: Sharing and Exchanging of Data can take place with nearby Computers in the Network.  Accessing the Internet: Using the WiFi, Internet can be made available to the Computers connected to the Network.  Stream Audio to Wireless Speakers: One of the useful application of WiFi is that using it one can Stream audio to audio devices present in the Network Area that are compatible to it.  Device Sharing: Similar to Wired Network WiFi provides the feature to access the Devices being shared within the Network. Like one can command the Printer attached to any System in the network and get their documents print.