wi-fi

Views:
 
Category: Entertainment
     
 

Presentation Description

No description available.

Comments

Presentation Transcript

WI-FI :

WI-FI

INDEX:

INDEX INTRODUCTION – SLIDE 3 DEVICES USING WI-FI –SLIDE 4 WANT A WI-FI – SLIDE 7 NEEDS – SLIDE 8 GETTING STARTED –SLIDE 13 MID-TERM PROCESS-SLIDE 14 END-TERM PROCESS-SLIDE 17 TYPES OF WI-FI SECURITY-SLIDE 18 REFERENCES-SLIDE 23 THANK YOU-SLIDE 24

INTRODUCTION:

INTRODUCTION Wi-Fi, also spelled WiFi or WiFi, is a popular technology that allows an electronic device to exchange data or connect to the internet wirelessly using radio waves. The name is a trademark name, and was stated to be a play on the audiophile term Hi-Fi. The Wi-Fi Alliance defines Wi-Fi as any "wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards".

PowerPoint Presentation:

WE HAVE MANY DEVICES USING WI-FI.

PowerPoint Presentation:

HERE IS A DEVICE MOST USED TO ACCESS WI-FI. LAPTOPS OR COMPUTERS ARE VERY COMMON IN HOMES NOWADAYS.

ANOTHER DEVICE:

ANOTHER DEVICE TOUCH SCREEN PHONES HAVE A WI-FI CONNECTION AND ARE GETTING POPULAR

WANT A:

WANT A WATCH ON !

PowerPoint Presentation:

WELL,WHOEVER WANTS WILL NEED A FEW THINGS.

NEEDS:

NEEDS WE NEED 3 MATERIALS FOR THE CONNECTION. BROADBAND INTERNET CONNECTION AND MODEM WIRELESS ROUTER WIRELESS NETWORK ADAPTERS

PowerPoint Presentation:

BROADBAND INTERNET CONNECTION AND MODEM

PowerPoint Presentation:

WIRELESS ROUTER

PowerPoint Presentation:

WIRELESS ADAPTERS

PowerPoint Presentation:

Once you have all of the equipment, you'll need to set up your modem and Internet connection. If your modem wasn't set up for you by your Internet service provider (ISP), follow the instructions that came with your modem to connect it to your computer and the Internet. If you're using Digital Subscriber Line (DSL), connect your modem to a phone jack. If you are using cable, connect your modem to a cable jack.

STEP 1/3:

STEP 1/3 Position your wireless router in a central location. Place the router as close to the center of your home as possible to increase the strength of the wireless signal throughout your home.

STEP 2/3:

STEP 2/3 Position the wireless router off of the floor and away from walls and metal objects, such as metal file cabinets. The fewer physical obstructions between your computer and the router's signal, the more likely that you'll be using the router's full signal strength.

STEP 3/3:

STEP 3/3 Reduce interference. 802.11g networking equipment uses a 2.4 gigahertz (GHz) radio frequency. This is the same frequency as most microwaves and many cordless phones. If you turn on the microwave or get a call on a cordless phone, your wireless signal might be temporarily interrupted. You can avoid most of these issues by using a cordless phone with a higher frequency, such as 5.8 GHz.

PowerPoint Presentation:

YOUR GOOD TO GO !

WI-FI SECURITY:

WI-FI SECURITY SECURITY TYPE YEAR WEP 1999 WPA 2003 WPA2 2004 WPS 2006

WEP:

WEP Wired Equivalent Privacy (WEP) is an easily broken security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in September 1999, its intention was to provide data confidentiality comparable to that of a traditional wired network.[1] WEP, recognizable by the key of 10 or 26 hexadecimal digits, was at one time widely in use and was often the first security choice presented to users by router configuration tools.

WPA & WPA2:

WPA & WPA2 Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system.

WPS:

WPS Wi-Fi Protected Setup (WPS; originally Wi-Fi Simple Config) is a flawed network security standard that attempts to allow users to easily secure a wireless home network, but some networks using this standard could fall to brute-force attacks if one or more of the network's access points do not guard against the attack.

PowerPoint Presentation:

THAT’S ABOUT IT

REFERENCES:

REFERENCES

THANK YOU:

THANK YOU

authorStream Live Help