SlideShare uma empresa Scribd logo
1 de 17
(NEW GENERATION WIRELESS TECHNOLOGY)
PRESENTED BY:
M.NAGASRINIVAS V.SANTHOSH
III/IV B.TECH,CSE III/IV B.TECH,CSE
JNTU KAKINADA JNTU KAKINADA
INTRODUCTION
The name itself specifies its gigabit
transfer rate
Wi-Fi and Wi-Max dominate the
wired solutions
But the mans continuous quest lead to
birth of Gi-Fi
Gi-Fi is more advantageous than Wi-Fi
and Wi-Max
BASIC TERMS OF Gi-Fi
What it is………….?
Why it is……………?
How it is…………….?
WHAT IT IS………?
Wireless Technology
5 gigabits per second
Range of 10 mts
2 watt power consumption
WHY IT IS………………….?
SPECIFICATION BLUETOOTH WI-FI GI-FI
Frequency 2.4Ghz 2.4Ghz NA
Primary Application 10 metres 91 mts 10 mts
Data transfer rate 800kbps 11Mbps 5Gbps
Power consumption Low Medium Low
Primary Devices Mobiles phones,
PDA’s,consumer
Electronics etc.,
Notebook computers,
Desktop Computers,
Servers
Both areas
Primary Application WPAN cable replacement WLAN Ethernet Both
Development Start Date 1998 1990 Under development
Comparision between Bluetooth,Wi-Fi and Gi-Fi
HOW IT IS………….?
ARCHITECTURE:
Core component at the centre
access points surrounded
antenna at roof of each access point
Uses IEEE 802.15.3c
COMMON FEATURES
Highly portable
High mobility
Deployes line of sight operation
More flexible
Less complexity
ATTRACTIVE FEATURES
High bit rate:
5 gigabits persecond,
easily swapping video,audio,data files
Power consumption:
2 watt power compared to 10 watt power
Security:
uses IEEE 802.15.3c standards
Small size:
5mm perside
1mm antenna at bottom
uses 60Ghz millimetre wave spectrum
Easily Installed
Less cost:
10$ per chip
Gi-Fi ACCESS DEVICES
Network Transmission units
Internal Radio Modules
Network Interface Cards
House Hold Appliances
APPLICATIONS
House Hold Appliances:
download videos from kiosk
real time wireless streaming
Office appliances:
high speed and high quality data transfer
wireless lan
MAC and imaging etc.,:
Video information transfer:
same rate for pc to pc and pc to cell
enables wireless monitors,
wireless printing of digital pictures
Future Applications:
wireless Broadband
TECHNOLOGY CONSIDERATION
NICTA lauch it in next year
Cost is 10$ per chip
Later other companies like
LG,SAMSUNG,PANASONIC,INTEL,
TOSHIBA
Wireless HD
CONCLUSION
By Considering the success of Wi-Fi and
imminent usage of Wi-Max as an indication
We can definetly said that Gi-Fi will be the
prominent technology with in next five
years
REFERENCES:
1.www.wikipedi.org
2.www.ieee.org
3.www.logictech.com
4.www.computer.org
5.www.sensable.org
6.www.technologyreview.com
IEEE magazines
Zeitgeist.2007
Zeitgeist.2007

Mais conteúdo relacionado

Mais procurados (20)

Gi Fi - Fastest Wireless Transfer Technology
Gi Fi - Fastest Wireless Transfer TechnologyGi Fi - Fastest Wireless Transfer Technology
Gi Fi - Fastest Wireless Transfer Technology
 
Gi fi technology
Gi fi technologyGi fi technology
Gi fi technology
 
GI-FI TECHNOLOGY PPT NEW
GI-FI TECHNOLOGY PPT NEWGI-FI TECHNOLOGY PPT NEW
GI-FI TECHNOLOGY PPT NEW
 
GI-FI TECHNOLOGY
GI-FI TECHNOLOGYGI-FI TECHNOLOGY
GI-FI TECHNOLOGY
 
Gi fi
Gi fiGi fi
Gi fi
 
Gi fi Technology (next generation wireless technology)
Gi fi Technology (next generation wireless technology)Gi fi Technology (next generation wireless technology)
Gi fi Technology (next generation wireless technology)
 
Gi-Fi
Gi-FiGi-Fi
Gi-Fi
 
Gifi
GifiGifi
Gifi
 
Gi - Fi Technology
Gi - Fi TechnologyGi - Fi Technology
Gi - Fi Technology
 
GIFI
GIFI GIFI
GIFI
 
5G The Vast Technology
5G The Vast Technology 5G The Vast Technology
5G The Vast Technology
 
Gifi technology full seminar report
Gifi technology full seminar reportGifi technology full seminar report
Gifi technology full seminar report
 
Gi fi Technology
Gi fi TechnologyGi fi Technology
Gi fi Technology
 
Ppt presentation
Ppt presentationPpt presentation
Ppt presentation
 
Gi fippt
Gi fipptGi fippt
Gi fippt
 
5 g –wireless technology
5 g –wireless technology5 g –wireless technology
5 g –wireless technology
 
Gifi
GifiGifi
Gifi
 
Gi_Fi - The Wireless Tehcnology
Gi_Fi - The Wireless TehcnologyGi_Fi - The Wireless Tehcnology
Gi_Fi - The Wireless Tehcnology
 
GiFi
GiFi GiFi
GiFi
 
Gi fi
Gi fiGi fi
Gi fi
 

Semelhante a Zeitgeist.2007

Semelhante a Zeitgeist.2007 (20)

Gifi
GifiGifi
Gifi
 
Gifi technology
Gifi technologyGifi technology
Gifi technology
 
gi-fippt-170302054028.pdf
gi-fippt-170302054028.pdfgi-fippt-170302054028.pdf
gi-fippt-170302054028.pdf
 
Gi-Fi ppt presentation
Gi-Fi ppt presentationGi-Fi ppt presentation
Gi-Fi ppt presentation
 
5 G ANTENNASEMINAR PPT final.ppt
5 G ANTENNASEMINAR PPT final.ppt5 G ANTENNASEMINAR PPT final.ppt
5 G ANTENNASEMINAR PPT final.ppt
 
3G and 4G
3G and 4G3G and 4G
3G and 4G
 
5 g wireless technology
5 g wireless technology5 g wireless technology
5 g wireless technology
 
Gi fi
Gi fiGi fi
Gi fi
 
vdocument.in_5g-ppt-55844ea2e8c82.ppt
vdocument.in_5g-ppt-55844ea2e8c82.pptvdocument.in_5g-ppt-55844ea2e8c82.ppt
vdocument.in_5g-ppt-55844ea2e8c82.ppt
 
5 g technology
5 g technology5 g technology
5 g technology
 
5G MOBILE TECHNOLOGY PPT2
5G MOBILE TECHNOLOGY PPT25G MOBILE TECHNOLOGY PPT2
5G MOBILE TECHNOLOGY PPT2
 
5 g (fifth gen.)
5 g (fifth gen.)5 g (fifth gen.)
5 g (fifth gen.)
 
Udit
UditUdit
Udit
 
Word format gi fi documentation
Word format gi fi documentationWord format gi fi documentation
Word format gi fi documentation
 
Harjeevan singh latest
Harjeevan singh latestHarjeevan singh latest
Harjeevan singh latest
 
5G WIRELESS TECHNOLOGY [Recovered]
5G WIRELESS TECHNOLOGY [Recovered]5G WIRELESS TECHNOLOGY [Recovered]
5G WIRELESS TECHNOLOGY [Recovered]
 
Ppt on 5G
Ppt on 5GPpt on 5G
Ppt on 5G
 
Gifi
GifiGifi
Gifi
 
Gi fi technology-Aditya sehgal
Gi fi technology-Aditya sehgalGi fi technology-Aditya sehgal
Gi fi technology-Aditya sehgal
 
5 gppt
5 gppt5 gppt
5 gppt
 

Mais de Shiva Krishna Chandra Shekar (20)

Airtel final
Airtel finalAirtel final
Airtel final
 
Airtel COMPNAY
Airtel COMPNAYAirtel COMPNAY
Airtel COMPNAY
 
Microsoft data access components
Microsoft data access componentsMicrosoft data access components
Microsoft data access components
 
Ad hoc
Ad hocAd hoc
Ad hoc
 
Mobile adhoc
Mobile adhocMobile adhoc
Mobile adhoc
 
Ldap
LdapLdap
Ldap
 
L2tp1
L2tp1L2tp1
L2tp1
 
Ivrs
IvrsIvrs
Ivrs
 
Ip sec
Ip secIp sec
Ip sec
 
I pod
I podI pod
I pod
 
Internet
InternetInternet
Internet
 
Image compression
Image compressionImage compression
Image compression
 
Hyper thread technology
Hyper thread technologyHyper thread technology
Hyper thread technology
 
Raju html
Raju htmlRaju html
Raju html
 
Raju
RajuRaju
Raju
 
Dba
DbaDba
Dba
 
Di splay systems
Di splay systemsDi splay systems
Di splay systems
 
Ananth3
Ananth3Ananth3
Ananth3
 
Ppt
PptPpt
Ppt
 
Honeypots
HoneypotsHoneypots
Honeypots
 

Último

TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 

Último (20)

TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 

Zeitgeist.2007