logging in or signing up WiFi vbranjith Download Post to : URL : Related Presentations : Let's Connect Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 30835 Category: Entertainment License: All Rights Reserved Like it (61) Dislike it (1) Added: December 20, 2008 This Presentation is Public Favorites: 21 Presentation Description This a technical paper presented by me and my partner.... Please post ur feedback @ email@example.com Comments Posting comment... By: sweetkayal (21 month(s) ago) i want to download this ppt please send it to my mail Saving..... Post Reply Close Saving..... Edit Comment Close By: royal123 (28 month(s) ago) I Want To Download It... It Is Awsome..! Send It To My Mail ID Saving..... Post Reply Close By: sundas123 (27 month(s) ago) plz email it to my is firstname.lastname@example.org By: sundas123 (27 month(s) ago) how can i download it? Saving..... Edit Comment Close By: prapti.soe (29 month(s) ago) can you help me to share this file to : email@example.com? Saving..... Post Reply Close Saving..... Edit Comment Close By: dipthi (29 month(s) ago) plz do send dz ppt to my id (firstname.lastname@example.org)... Saving..... Post Reply Close Saving..... Edit Comment Close By: ponnusubramanian (30 month(s) ago) gud ppt Saving..... Post Reply Close Saving..... Edit Comment Close loading.... See all Premium member Presentation Transcript Slide 1: It's a Presentation from THIAGARAJAR POLYTECHNIC COLLEGE (Autonomous Institution) Salem - 5 THIAGARAJAR POLYTECHNIC COLLEGE (Autonomous Institution) Salem - 5 THIAGARAJAR POLYTECHNIC COLLEGE (Autonomous Institution) Slide 2: Wi-Fi Presented & performed by : Presented & performed by Ranjith. B COMPUTER ENGINEERING Slide 4: Wi-Fi Introduction Working principle Products Building a WiFi Network Wi-Fi Security Scope of WiFi Bibliography Concluding remarks Agenda Wireless Fidelity (Wi-Fi)Welcome to the World of Wireless : Wireless Fidelity (Wi-Fi)Welcome to the World of Wireless A radio technology that networks the devices. Refers to wireless LAN products based on the IEEE 802.11b specification Provides easy connections to the internet and business networks while traveling The main attractive feature of this technology is that it can provide wireless broadband connection within a specific geographic boundary. Operating modes : Operating modes InfraStructure Mode AD HOC Mode Building a WiFi : Building a WiFi A Wi-Fi hotspot is created by installing an access point to an internet connection. An access point acts as a base station. When Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly. A single access point can support up to 30 users and can function within a range of 100 – 150 feet indoors and up to 300 feet outdoors. Many access points can be connected to each other via Ethernet cables to create a single large network. A Way to Amplify WiFi Signals : A Way to Amplify WiFi Signals A WiFi repeater is installed to extend coverage. Wireless Local Area Networking : Wireless Local Area Networking The Beat Goes on.. : The Beat Goes on.. Locating Hotspots There are many WiFi hotspots now available in public places like restaurants, hotels, libraries and airports. For example, Spenzer PLAZA The number of hotspots in the world is growing daily. WiFi Topologies : WiFi Topologies The client communicates through Access Point. It connects the PC’S by an AP. It consists of 2 or Base Stations. It includes 10-15% overlap to allow roaming. AP-based topology Peer-to-peer topology : Peer-to-peer topology Access Point is not required. Client devices within a cell can communicate directly with each other. It is useful for setting up of a wireless network quickly and easily. Point-to-multipoint bridge topology : Point-to-multipoint bridge topology Used to connect a LAN in one building to a LANs in other buildings even if the buildings are miles apart. Range varies based on the type of wireless bridge and antenna used as well as the environmental conditions. Wireless Fidelity : Wireless Fidelity Advantages Mobile. Widely available in public venues. Relatively inexpensive. Easy to set up a network. User-friendly software. Security features. Global set of standards. Wi-Fi Security : WEP stands for Wired Equivalency Privacy As its name implies, this standard was intended to make wireless networks as secure as wired networks. The common key lengths are currently 128- and 256-bit. WPA Wi-Fi Protected Access is an early version of the 802.11i security standard that was developed by the Wi-Fi Alliance to replace WEP. Wi-Fi Security Slide 17: 20 December 2008 17 A SPECIAL SECURITY SOFTWARE Slide 18: Wi-Fi Cameras used in BANKS Slide 19: In few more years all electronic devices are going to have a built in Wi-Fi.. So once again we welcome to World of wireless. Many colleges and businesses have suitable building layouts that can be wireless to build a unwired network. Wi-Fi is a very cost effective alternative in these environments. SCOPE OF Wi-Fi Slide 20: Conclusion Slide 21: “Things that think… don’t make sense unless they link.” This Paper has been submitted under the guidance of : This Paper has been submitted under the guidance of Over headed by Mr.M. Saravanan (M.E) – Senior Lecturer (Computer Engg). K. Megala B.E – Lecturer (Computer Engg). MR.D.ARUL SELVAN M.E., Head Of the Department / Computer Engineering Mr.M. Ramesh Kumar, MCA.,Mphil – HOD i/c (Computer Engg). Bibliography : Bibliography www.wikipedia.com www.howstuffworks.com www.palowireless.com www.technologyreview.com http://www.wirelessethernet.org/index.html http://grouper.ieee.org/groups/802/index.html http://standards.ieee.org/getieee802/ http://www.cisco.com http://grouper.ieee.org/groups/802/11/index.html http://grouper.ieee.org/groups/802/15/index.html www.sss-mag.com/ss01.html#other Slide 24: THANK YOU You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.