1 / 45

A PROJECT

A PROJECT. REPORT ON . SUBMITTED BY: Rahul Pratap Singh B.Tech (2 nd Year) CS-B T1 Batch. SUBMITTED TO: Mr. Neeraj Kr. Pandey. ACKNOWLEDGEMENT. Whenever a piece of work is completed satisfactory by a student, a source of inspiration and help by the teacher is always there.

shen
Télécharger la présentation

A PROJECT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A PROJECT REPORTON SUBMITTED BY:RahulPratap SinghB.Tech(2nd Year)CS-B T1 Batch SUBMITTED TO:Mr. Neeraj Kr. Pandey

  2. ACKNOWLEDGEMENT Whenever a piece of work is completed satisfactory by a student, a source of inspiration and help by the teacher is always there. Primarily, I Would Like To Thank to our esteemed professor Mr. Neeraj Kr. Pandey For Giving Me The Opportunity To Fulfill My Aspiration. I will be failing in our mission if I do not thank other people who directly or indirectly helped me in the successful completion of this project. So, my heartfull thanks to all friends & my teachers , who supported and encouraged me in preparing this project report as best as possible.

  3. INTRODUCTION • This project focuses on the wifi technology. Through this project we have tried to provide maximum information about wireless technology wifi most frequently used in today’s world. This project will cover following details: • Wifi and its History. • IEEE standards. • It’s Uses, advantages & challenges. • Hardware and security. • Wifi Alliance. • Thus through this I have tried my best to give the maximum possible information about wifi.

  4. Wireless LAN • A wireless LAN (WLAN or WiFi) is a data transmission system designed to provide location-independent network access between computing devices by using radio waves rather than a cable infrastructure. In the corporate enterprise, wireless LANs are usually implemented as the final link between the existing wired network and a group of client computers, giving these users wireless access to the full resources and services of the corporate network across a building or campus setting.

  5. IEEE 802.11 • The 802.11 specification as a standard for wireless LANS was ratified by the Institute of Electrical and Electronics Engineers (IEEE) in the year 1997. This version of 802.11 provides for 1 Mbps and 2 Mbps data rates and a set of fundamental signaling methods and other services. Like all IEEE 802 standards, the 802.11 standards focus on the bottom two levels the ISO model, the physical layer and data link layer. Any LAN application, network operating system, protocol, including TCP/IP and Novell NetWare, will run on an 802.11-compliant WLAN as easily as they run over Ethernet.

  6. “IEEE 802.11 And The ISO Model”

  7. IEEE 802.11 ARCHITECTURE • Each computer, mobile, portable or fixed, is referred to as a station in 802.11. • The difference between a portable and mobile station is that a portable station moves from point to point but is only used at a fixed point. Mobile stations access the LAN during movement. • When two or more stations come together to communicate with each other, they form a Basic Service Set (BSS). The minimum BSS consists of two stations. 802.11 LANs use the BSS as the standard building block.

  8. A BSS that stands alone and is not connected to a base is called an Independent Basic Service Set (IBSS) or is referred to as an Ad-Hoc Network. An ad-hoc network is a network where stations communicate only peer to peer. There is no base and no one gives permission to talk. Mostly these networks are spontaneous and can be set up rapidly “Adhoc Mode”

  9. Infrastructure Mode

  10. The implementation of the DS is not specified by 802.11. Therefore, a distribution system may be created from existing or new technologies. A point-to-point bridge connecting LANs in two separate buildings could become a DS. While the implementation for the DS is not specified, 802.11 does specify the services, which the DS must support. Services are divided into two sections 1. Station Services (SS) 2. Distribution System Services (DSS). There are five services provided by the DSS 1. Association 2. Reassociation 3. Disassociation 4. Distribution 5. Integration

  11. HISTORY • Wi-Fi uses both single carrier direct-sequence spread spectrum radio technology (part of the larger family of spread spectrum systems) and multi-carrier OFDM (Orthogonal Frequency Division Multiplexing) radio technology. The regulations for unlicensed spread spectrum enabled the development of Wi-Fi, its onetime competitor HomeRF, Bluetooth, and many other products such as some types of cordless telephones. • Unlicensed spread spectrum was first made available in the US by the Federal Communications Commission in 1985 and these FCC regulations were later copied with some changes in many other countries enabling use of this technology in all major countries. The FCC action was proposed by Michael Marcus of the FCC staff in 1980 and the subsequent regulatory action took 5 more years. It was part of a broader proposal to allow civil use of spread spectrum technology and was opposed at the time by main stream equipment manufacturers and many radio system operators.

  12. The precursor to Wi-Fi was invented in 1991 by NCR Corporation/AT&T (later Lucent & Agere Systems) in Nieuwegein, the Netherlands. It was initially intended for cashier systems; the first wireless products were brought on the market under the name WaveLAN with speeds of 1 Mbit/s to 2 Mbit/s. Vic Hayes, who held the chair of IEEE 802.11 for 10 years and has been named the 'father of Wi-Fi,' was involved in designing standards such as IEEE 802.11b, and 802.11a. The original patents behind 802.11 Wi-Fi technology, filed in 1996, are held by the CSIRO, an Australian research body. The patents have been the subject of protracted and ongoing legal battles between the CSIRO and major IT corporations over the non-payment of royalties. In 2009 the CSIRO reached a settlement with 14 companies, including Hewlett-Packard, Intel, Dell, Toshiba, ASUS, Microsoft and Nintendo, on the condition that the CSIRO did not broadcast the resolution.

  13. ELEMENTS OF WIFI A NETWORK • Wireless Access Point: A wireless access point (WAP) connects a group of wireless devices to an adjacent wired LAN. An access point is similar to a network hub, relaying data between connected wireless devices in addition to a (usually) single connected wired device, most often an ethernet hub or switch, allowing wireless devices to communicate with other wired devices. • Wireless Adapters: Wireless adapters allow devices to connect to a wireless network. These adapters connect to devices using various external or internal interconnects such as PCI, miniPCI, USB, ExpressCard, Cardbus and PC card. Most newer laptop computers are equipped with internal adapters. Internal cards are generally more difficult to install.

  14. OSBRiDGE 3GN - 802.11n Access Point and UMTS/GSM Gateway in one device. USB wireless adapter

  15. Wireless Routers:Wireless routers integrate a Wireless Access Point, ethernet switch, and internal Router firmware application that provide IP Routing, NAT, and DNS forwarding through an integrated WAN interface. A wireless router allows wired and wireless ethernet LAN devices to connect to a (usually) single WAN device such as cable modem or DSL modem. A wireless router allows all three devices (mainly the access point and router) to be configured through one central utility. This utility is most usually an integrated web server which serves web pages to wired and wireless LAN clients and often optionally to WAN clients. This utility may also be an application that is run on a desktop computer such as Apple's AirPort.

  16. Wireless Network Bridges:Wireless network bridges connect a wired network to a wireless network. This is different from an access point in the sense that an access point connects wireless devices to a wired network at the data-link layer. Two wireless bridges may be used to connect two wired networks over a wireless link, useful in situations where a wired connection may be unavailable, such as between two separate homes.

  17. Wireless Repeaters:Wireless range extenders or wireless repeaters can extend the range of an existing wireless network. Range extenders can be strategically placed to elongate a signal area or allow for the signal area to reach around barriers such as those created in L-shaped corridors. Wireless devices connected through repeaters will suffer from an increased latency for each hop. Additionally, a wireless device connected to any of the repeaters in the chain will have a throughput that is limited by the weakest link between the two nodes in the chain from which the connection originates to where the connection ends. An embedded Router Board 112 with U.FL-RSMA pigtail and R52 mini PCI Wi-Fi card widely used by wireless Internet service providers (WISPs) in the Czech Republic.

  18. Wifi Cards:They accept the wireless signal and relay information. They can be internal and external. Safeguards:Firewalls and anti-virus software protect networks from uninvited users and keep information secure. Embedded System:Wi-Fi availability in the home is on the increase. This extension of the Internet into the home space will increasingly be used for remote monitoring. Examples of remote monitoring include security systems and tele-medicine. In all these kinds of implementation, if the Wi-Fi provision is provided using a system running one of operating systems mentioned above, then it becomes unfeasible due to weight, power consumption and cost issues. Increasingly in the last few years (particularly as of early 2007), embedded Wi-Fi modules have become available which come with a real-time operating system and provide a simple means of wireless enabling any device which has and communicates via a serial port. This allows simple monitoring devices – for example, a portable ECG monitor hooked up to a patient in their home – to be created. This Wi-Fi enabled device effectively becomes part of the internet cloud and can communicate with any other node on the internet. The data collected can hop via the home's Wi-Fi access point to anywhere on the internet. These Wi-Fi modules are designed so that designers need minimal Wi-Fi knowledge to wireless-enable their products. Embedded serial-to-Wi-Fi module

  19. WORKING OF WIFI NETWORK • Wi-Fi networks use radio technologies called IEEE 802.11 to provide secure, reliable, fast wireless connectivity. A typical Wi-Fi set-up includes one or more access points (APs) and one or more clients. An AP broadcasts its SSID (service set identifier, or "network name") via packets that are called beacons, which are usually broadcast every 100 ms. The beacons are transmitted at 1 Mbit/s, and are of relatively short duration and therefore do not have a significant effect on performance. Since 1 Mbit/s is the lowest rate of Wi-Fi it assures that the client that receives the beacon can communicate at least 1 Mbit/s. based on the settings, the client may decide whether to connect to an AP. If two APs of the same SSID are in range of the client, the client firmware might use signal strength to decide with which of the two APs to make a connection.

  20. The Wi-Fi standard leaves connection criteria and roaming totally open to the client. This is a strength of Wi-Fi, but also means that one wireless adapter may perform substantially better than another. Since Wi-Fi transmits in the air, it has the same properties as a non-switched wired Ethernet network, and therefore collisions can occur. Unlike a wired Ethernet, and like most packet radios, Wi-Fi cannot detect collisions, and instead uses an acknowledgment packet for every data packet sent. If a sender receives no acknowledgement within a certain time, the sender retransmits the corresponding packet. Also, a medium reservation protocol can be used when excessive collisions are experienced or expected (request-to-send and clear-to-send used for collision avoidance or CA) in an attempt to avoid collisions. A Wi-Fi network can be used to connect computers to each other, to the Internet, and to wired networks (which use IEEE 802.3 or Ethernet). Wi-Fi networks operate in the unlicensed 2.4 GHz (802.11b/g/n) and 5 GHz (802.11a/n) radio bands, with an 11 Mbit/s (802.11b) or 54 Mbit/s (802.11a or g) data rate. They can provide real-world performance similar to that of the basic 10BASE-T wired Ethernet networks.

  21. WIFI ON VARIOUS OPERATING SYSTEM • There are two sides to Wi-Fi support under an operating system: driver level support, and configuration and management support. • Driver support is usually provided by multiple manufacturers of the chip set hardware or end manufacturers. Also available are Unix clones such as Linux and FreeBSD, sometimes through open source projects. • Configuration and management support consists of software to enumerate, join, and check the status of available Wi-Fi networks. This also includes support for various encryption methods. These systems are often provided by the operating system backed by a standard driver model. In most cases, drivers emulate an ethernet device and use the configuration and management utilities built into the operating system. In cases where built in configuration and management support is non-existent or inadequate; hardware manufacturers may include their own software to handle the respective tasks.

  22. MICROSOFT WINDOWS: • Microsoft Windows has comprehensive driver-level support for Wi-Fi, the quality of which depends on the hardware manufacturer. Hardware manufactures almost always ship Windows drivers with their products. Windows ships with very few Wi-Fi drivers and depends on the original equipment manufacturers (OEMs) and device manufacturers to make sure users get drivers. Configuration and management depend on the version of Windows. .Earlier versions of Windows, such as 98, ME and 2000 do not have built-in configuration and management support and must depend on software provided by the manufacturer.

  23. MAC OS X AND CLASSIC MAC OS: • Apple was an early adopter of Wi-Fi, introducing its AirPort product line, based on the 802.11b standard, in July 1999. Apple later introduced AirPort Extreme, an implementation of 802.11g. All Apple computers, starting with the original iBook in 1999, either included AirPort 802.11 networking or were designed specifically to provide 802.11 networking with only the addition of the internal AirPort Card (or, later, an AirPort Extreme Card), connecting to the computer's built-in antennae. All Intel-based Macs either come with built-in AirPort Extreme or a slot for an AirPort card, and all portable Macs (all MacBooks and the earlier iBooks and PowerBooks) have included Wi-Fi for several years. In late 2006, Apple began shipping Macs with Broadcom Wi-Fi chips that also supported the Draft 802.11n standard, but this capability was disabled and Apple did not claim or advertise the hardware's capability until sometime later when the draft had progressed further. At the January 2007 Macworld Expo, Apple announced that their computers would begin shipping with Draft 802.11n support. Systems shipped with this hidden capability can easily be unlocked through software, but due to the accounting requirements of Sarbanes-Oxley, Apple cannot freely add features to already-sold hardware and so must nominally sell an upgrade. This "upgrade" is included in the price of an AirPort Extreme Base Station for all computers owned by the purchaser, and Apple sells the "upgrade" separately (as the "AirPort Extreme 802.11n Enabler for Mac") for about US$2 in the United States and at similar prices elsewhere.

  24. OPEN SOURCE UNIX LIKE SYSTEMS: Linux, FreeBSD and similar Unix-like clones have much coarser support for Wi-Fi. Due to the open source nature of these operating systems, many different standards have been developed for configuring and managing Wi-Fi devices. The open source nature also fosters open source drivers which have enabled many third party and proprietary devices to work under these operating systems. See Comparison of Open Source Wireless Drivers for more information on those drivers. · Linux has patchy Wi-Fi support. Native drivers for many Wi-Fi chipsets are available either commercially or at no cost, although some manufacturers don't produce a Linux driver, only a Windows one. Consequently, many popular chipsets either don't have a native Linux driver at all, or only have a half-finished one. For these, the freely available NdisWrapper and its commercial competitor Driver Loader allow Windows x86 and 64 bit variants NDIS drivers to be used on x86-based Linux systems but not on other architectures. As well as the lack of native drivers, some Linux distributions do not offer a convenient user interface and configuring Wi-Fi on them can be a clumsy and complicated operation compared to configuring wired Ethernet drivers.This is changing with NetworkManager, a utility that allows users to automatically switch between networks without using the command line.

  25. WIFI ALLIANCE The Alliance promotes standards with the aim of improving the interoperability of wireless local area network products based on the IEEE 802.11 standards. The Wi-Fi Alliance, a consortium of separate and independent companies, agrees on a set of common interoperable products based on the family of IEEE 802.11 standards. The Wi-Fi Alliance certifies products via a set of defined test-procedures to establish interoperability. Those manufacturers with membership of Wi-Fi Alliance and whose products pass these interoperability tests can mark their products and product packaging with the Wi-Fi logo.

  26. SECURITY • The main issue with wireless network security is its simplified access to the network compared to traditional wired networks such as ethernet. With wired networking it is necessary to either gain access to a building, physically connecting into the internal network, or break through an external firewall. Most business networks protect sensitive data and systems by attempting to disallow external access. Thus being able to get wireless reception provides an attack vector, if encryption is not used or can be defeated. • Attackers who have gained access to a Wi-Fi network can use DNS spoofing attacks very effectively against any other user of the network, because they can see the DNS requests made, and often respond with a spoofed answer before the queried DNS server has a chance to reply.

  27. SECURING METHODS: • A common but unproductive measure to deter unauthorized users is to suppress the AP's SSID broadcast, "hiding" it. This is ineffective as a security method because the SSID is broadcast in the clear in response to a client SSID query. Another unproductive method is to only allow computers with known MAC addresses to join the network. MAC address are easily spoofed. If the eavesdropper has the ability to change his MAC address, then he may join the network by spoofing an authorized address. • Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but is now considered completely broken. Tools such as AirSnort or aircrack can quickly recover WEP encryption keys. Once it has seen 5-10 million encrypted packets, AirSnort can determine the encryption password in under a second; newer tools such as aircrack-ptw can use Klein's attack to crack a WEP key with a 50% success rate using only 40,000 packets. • To counteract this in 2002, the Wi-Fi Alliance blessed Wi-Fi Protected Access (WPA) which uses TKIP as a stopgap solution for legacy equipment. Though more secure than WEP, it has outlived its designed lifetime, has known attack vectors and is no longer recommended. • In 2004 the full IEEE 802.11i (WPA2) encryption standards were released. If used with a 802.1X server or in pre-shared key mode with a strong and uncommon passphrase WPA2 is still considered secure, as of 2009http://en.wikipedia.org/w/index.php?title=Wi-Fi&action=edit.

  28. USES • A Wi-Fi enabled device such as a PC, game console, mobile phone, MP3 player or PDA can connect to the Internet when within range of a wireless network connected to the Internet. The coverage of one or more interconnected access points — called a hotspot — can comprise an area as small as a single room with wireless-opaque walls or as large as many square miles covered by overlapping access points. Wi-Fi technology has served to set up mesh networks, for example, in London.] Both architectures can operate in community networks. • In addition to restricted use in homes and offices, Wi-Fi can make access publicly available at Wi-Fi hotspots provided either free of charge or to subscribers to various providers. Organizations and businesses such as airports, hotels and restaurants often provide free hotspots to attract or assist clients. Enthusiasts or authorities who wish to provide services or even to promote business in a given area sometimes provide free Wi-Fi access. There are alreadyhttp://en.wikipedia.org/w/index.php?title=Wi-Fi&action=edit more than 300 metropolitan-wide Wi-Fi (Muni-Fi) projects in progress. There were 879 Wi-Fi based Wireless Internet service providers in the Czech Republic as of May 2008. • Wi-Fi also allows connectivity in peer-to-peer (wireless ad-hoc network) mode, which enables devices to connect directly with each other. This connectivity mode can prove useful in consumer electronics and gaming applications.

  29. When wireless networking technology first entered the market many problems ensued for consumers who could not rely on products from different vendors working together. The Wi-Fi Alliance began as a community to solve this issue — aiming to address the needs of the end-user and to allow the technology to mature. The Alliance created the branding Wi-Fi CERTIFIED to reassure consumers that products will interoperate with other products displaying the same branding. Many consumer devices use Wi-Fi. Amongst others, personal computers can network to each other and connect to the Internet, mobile computers can connect to the Internet from any Wi-Fi hotspot, and digital cameras can transfer images wirelessly. Routers which incorporate a DSL-modem or a cable-modem and a Wi-Fi access point, often set up in homes and other premises, provide Internet-access and internetworking to all devices connected (wirelessly or by cable) to them. One can also connect Wi-Fi devices in ad-hoc mode for client-to-client connections without a router. Wi-Fi also enables places which would traditionally not have network to be connected, for example bathrooms, kitchens and garden sheds. As of 2007 Wi-Fi technology had spread widely within business and industrial sites. In business environments, just like other environments, increasing the number of Wi-Fi access-points provides redundancy, support for fast roaming and increased overall network-capacity by using more channels or by defining smaller cells. Wi-Fi enables wireless voice-applications (VoWLAN or WVOIP). Over the years, Wi-Fi implementations have moved toward "thin" access-points, with more of the network intelligence housed in a centralized network appliance, relegating individual access-points to the role of mere "dumb" radios. Outdoor applications may utilize true mesh topologies. As of 2007 Wi-Fi installations can provide a secure computer networking gateway, firewall, DHCP server, intrusion detection system, and other functions.

  30. A roof mounted Wi-Fi antennaA Wi-Fi antenna

  31. ADVANTAGES AND CHALLENGES • Wi-Fi allows local area networks (LANs) to be deployed without wires for client devices, typically reducing the costs of network deployment and expansion. Spaces where cables cannot be run, such as outdoor areas and historical buildings, can host wireless LANs. • Wireless network adapters are now built into most laptops. The price of chipsets for Wi-Fi continues to drop, making it an economical networking option included in even more devices. Wi-Fi has become widespread in corporate infrastructures. • Different competitive brands of access points and client network interfaces are inter-operable at a basic level of service. Products designated as "Wi-Fi Certified" by the Wi-Fi Alliance are backwards compatible. Wi-Fi is a global set of standards. Unlike mobile telephones, any standard Wi-Fi device will work anywhere in the world. • Wi-Fi is widely available in more than 220,000 public hotspots and tens of millions of homes and corporate and university campuses worldwide. The current version of Wi-Fi Protected Access encryption (WPA2) is not easily defeated, provided strong passwords are used. New protocols for Quality of Service (WMM) make Wi-Fi more suitable for latency-sensitive applications (such as voice and video), and power saving mechanisms (WMM Power Save) improve battery operation. • Air Canada has already announced its plans for providing in-flight Wi-Fi services for its customers.

  32. A key chain size Wi-Fi detector

  33. Limitations: Spectrum assignments and operational limitations are not consistent worldwide. Most of Europe allows for an additional 2 channels beyond those permitted in the U.S. for the 2.4 GHz band. (1–13 vs. 1–11); Japan has one more on top of that (1–14). Europe, as of 2007, was essentially homogeneous in this respect. A very confusing aspect is the fact that a Wi-Fi signal actually occupies five channels in the 2.4 GHz band resulting in only three non-overlapped channels in the U.S.: 1, 6, 11, and three or four in Europe: 1, 5, 9, 13 can be used if all the equipment on a specific area can be guaranteed not to use 802.11b at all, even as fallback or beacon. Equivalent isotropic ally radiated power (EIRP) in the EU is limited to 20 dBm (100 mW).

  34. REACH • Wi-Fi networks have limited range. A typical Wi-Fi home router using 802.11b or 802.11g with a stock antenna might have a range of 32 m (120 ft) indoors and 95 m (300 ft) outdoors. The new IEEE 802.11n however, can exceed that range by more than double. Range also varies with frequency band. Wi-Fi in the 2.4 GHz frequency block has slightly better range than Wi-Fi in the 5 GHz frequency block. Outdoor range with improved (directional) antennas can be several kilometers or more with line-of-sight. In general, the maximum amount of power that a Wi-Fi device can transmit is limited by local regulations, such as FCC Part 15in USA.

  35. Wi-Fi performance decreases roughly quadratic ally as distance increases at constant radiation levels. Due to reach requirements for wireless LAN applications, power consumption is fairly high compared to some other standards. Technologies such as Bluetooth, which are designed to support wireless PAN applications, provide a much shorter propagation range of <10m (ref. e.g. IEEE Std. 802.15.4 section 1.2 scopes) and so in general have lower power consumption. Other low-power technologies such as Zigbee have fairly long range, but much lower data rate. The high power consumption of Wi-Fi makes battery life a concern for mobile devices. A number of "no new wires" technologies have been developed to provide alternatives to Wi-Fi for applications in which Wi-Fi's indoor range is not adequate and where installing new wires (such as CAT-5) is not possible or cost-effective. One example is the ITU-T G.hn standard for high speed Local area networks using existing home wiring (coaxial cables, phone lines and power lines). Although G.hn does not provide some of the advantages of Wi-Fi (such as mobility or outdoor use), it's designed for applications (such as IPTV distribution) where indoor range is more important than mobility. Due to the complex nature of Radio propagation at typical Wi-Fi frequencies, particularly the effects of signal reflection off of trees and buildings, Wi-Fi signal strength can only be predicted generally for any given area in relation to a transmitter. This effect does not apply equally to long-range Wi-Fi, since longer links typically operate from towers that broadcast above the surrounding foliage.

  36. Large satellite dish specially made for long-range Wi-Fi connection in Venezuela

  37. Mobility: • Because of the very limited practical range of Wi-Fi, mobile use is essentially confined to such applications as inventory taking machines in warehouses or retail spaces, barcode reading devices at check-out stands or receiving / shipping stations. Mobile use of Wi-Fi over wider ranges is limited to move, use, as for instance in an automobile moving from one hotspot to another (Wardriving). Other wireless technologies are more suitable as illustrated in the graphic.

  38. Speed vs. Mobility of wireless systems: Wi-Fi, HSPA, UMTS, GSM

  39. THREATS TO SECURITY • The most common wireless encryption standard, Wired Equivalent Privacy or WEP, has been shown to be easily breakable even when correctly configured. Wi-Fi Protected Access (WPA and WPA2), which began shipping in 2003, aims to solve this problem and is now available on most products. Wi-Fi Access Points typically default to an "open" (encryption-free) mode. Novice users benefit from a zero-configuration device that works out of the box, but this default is without any wireless security enabled, providing open wireless access to their LAN. To turn security on requires the user to configure the device, usually via a software graphical user interface (GUI). Wi-Fi networks that are open (unencrypted) can be monitored and used to read and copy data (including personal information) transmitted over the network, unless another security method is used to secure the data, such as a VPN or a secure web page

  40. CONCLUSION • Thus, with this project I have tried to give the best knowledge about Wireless technology WIFI. • This project has covered almost all aspects and facts about Wifi. Today Wifi is getting replaced with the latest upcoming technology WIMAX which is providing much wider range then Wifi. WIMAX is an acronym that stands for “worldwideinteroperability for microwave access” is a telecommunications technology aimed at providing wireless data over long distances in a variety of ways from point to point links to full mobile cellular type access. • WIMAX is second generation protocol after WIFI that allows space for more efficient bandwidth use, interference avoidance and is intended to allow higher data rates over longer distances .India is about to become the frontier for high-speed, mobile internet connections. WIMAX will be a very well recognized term to describe wireless internet access throughout the world. Also, India is becoming the Knowledge Center of the world, and it is taking lead in this field. • Through this project I have covered all the details about Wifi.

  41. REFERENCES • Wikipedia.org • Tanenbaum, Computer Networks. • Frozen, Computer Networks.

  42. THANK YOU

More Related