Slide 1: It's a Presentation from THIAGARAJAR POLYTECHNIC COLLEGE (Autonomous Institution) Salem - 5 THIAGARAJAR POLYTECHNIC COLLEGE (Autonomous Institution) Salem - 5 THIAGARAJAR POLYTECHNIC COLLEGE (Autonomous Institution) Slide 2: Wi-Fi Presented & performed by : Presented & performed by ORIGINAL AUTHOR
COMPUTER ENGINEERING Slide 4: Wi-Fi
Building a WiFi Network
Scope of WiFi
Concluding remarks Agenda Wireless Fidelity (Wi-Fi)Welcome to the World of Wireless : Wireless Fidelity (Wi-Fi)Welcome to the World of Wireless A radio technology that networks the devices.
Refers to wireless LAN products based on the IEEE 802.11b specification
Provides easy connections to the internet and business networks while traveling
The main attractive feature of this technology is that it can provide wireless broadband connection within a specific geographic boundary. Operating modes : Operating modes InfraStructure Mode AD HOC Mode Building a WiFi : Building a WiFi A Wi-Fi hotspot is created by installing an access point to an internet connection.
An access point acts as a base station.
When Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly.
A single access point can support up to 30 users and can function within a range of 100 – 150 feet indoors and up to 300 feet outdoors.
Many access points can be connected to each other via Ethernet cables to create a single large network. A Way to Amplify WiFi Signals : A Way to Amplify WiFi Signals A WiFi repeater
is installed to
coverage. Wireless Local Area Networking : Wireless Local Area Networking The Beat Goes on.. : The Beat Goes on.. Locating Hotspots There are many WiFi hotspots now available in public places like restaurants, hotels, libraries and airports.
For example, Spenzer PLAZA
The number of hotspots in the world is growing daily. WiFi Topologies : WiFi Topologies The client communicates through Access Point.
It connects the PC’S by an AP.
It consists of 2 or Base Stations.
It includes 10-15% overlap to allow roaming. AP-based topology Peer-to-peer topology : Peer-to-peer topology Access Point is not required.
Client devices within a cell can communicate directly with each other.
It is useful for setting up of a wireless network quickly and easily. Point-to-multipoint bridge topology : Point-to-multipoint bridge topology Used to connect a LAN in one building to a LANs in other buildings even if the buildings are miles apart.
Range varies based on the type of wireless bridge and antenna used as well as the environmental conditions. Wireless Fidelity : Wireless Fidelity Advantages Mobile.
Widely available in public venues.
Easy to set up a network.
Global set of standards. Wi-Fi Security : WEP stands for Wired Equivalency Privacy
As its name implies, this standard was intended to make wireless networks as secure as wired networks.
The common key lengths are currently 128- and 256-bit.
WPA Wi-Fi Protected Access is an early version of the 802.11i security standard that was developed by the Wi-Fi Alliance to replace WEP. Wi-Fi Security Slide 17: 19 July 2009 17 A SPECIAL SECURITY SOFTWARE Slide 18: Wi-Fi Cameras used in BANKS Slide 19: In few more years all electronic devices are going to have a built in Wi-Fi..
So once again we welcome to World of wireless.
Many colleges and businesses have suitable building layouts that can be wireless to build a unwired network.
Wi-Fi is a very cost effective alternative in these environments. SCOPE OF Wi-Fi Slide 20: Conclusion Slide 21: “Things that think… don’t make sense unless they link.” Its time for small Demo… This Paper has been submitted under the guidance of : This Paper has been submitted under the guidance of Over headed by Mr.M. Saravanan (M.E) – Senior Lecturer (Computer Engg). K. Megala B.E – Lecturer (Computer Engg). MR.D.ARUL SELVAN M.E.,
Head Of the Department / Computer Engineering Mr.M. Ramesh Kumar, MCA.,Mphil – HOD i/c (Computer Engg). Bibliography : Bibliography www.wikipedia.com
www.sss-mag.com/ss01.html#other ACKNOWLEDGEMENT : ACKNOWLEDGEMENT THANK YOU