Thursday, November 18, 2010

Wi-Fi (Wireless Fidelity)


·         Wi-Fi or wireless fidelity is meant for to be used when referring any type of 802.11 network, whether 802.11, 802.11a and dual band.
·         Wi-Fi devices tested by the “Wi-Fi alliance” are used around the world and allow users to have Wi-Fi capable device like a PDA or Laptop to connect anywhere there is availability of Wi-Fi access point.
·         There are currently three standards that are used to signify the speed of the connection.
o   802.11a and 802.11b are the capable of 54 Mbps
o   802.11b/second because it can transmit the data at 11 Mbps.
·         Wireless Fidelity is a fastest growing wireless technology that will probably be as common as phone lines and electric devices.
·         Wireless fidelity is planned to be used with the wireless devices but it is most commonly used for internet access.
·         Wi-Fi you can connect computers in your home, office or anywhere without the need of wires.
·         The computers can just connect to the network that uses radio waves.
How does WI-FI work?
·         Wi-Fi is the wireless technology to handle the networking/communication.
·         Wi-Fi allocates internet connection globally and to be transmitted by the radio waves.
·         Radio waves are transmitted from antenna and Wi-Fi receivers pick them up.
·         When a user receives the Wi-Fi signals, a wireless internet connection is produced and a user is prompted to provide the user name and password if required to establish a wireless connection.
What is Wi-Fi Security?
·         Wi-Fi maintains certain security issues.
·         WEP or Wired Equivalent Privacy is used in the physical and data link layers.
·         WEP was planned to provide the wireless security by protecting the data, while it transmits from one point to another.
·         Wi-Fi networking usually maintained inside a building premises.
·         The data transmission in the Wi-Fi is protected by Wireless LANs but due to the fact that data travels over the radio waves so there are chance that data can be exposed and capture.

No comments:

Post a Comment