Anda di halaman 1dari 25

Wi-Fi Technology

SUBMITTED BY:
Tanmay Karan
Ashish Aggarwal
Dishant Masih
Index:-

 Introduction
 Internet Access
 Service set Identifier (SSID)
 Throughput
 Hardware
 Standard Devices
 Range
 Network Security
 Securing Methods
 Data Security Risks
 Piggybacking
 Health Concerns
 Architectural Prospects
WHAT IS WIFI ?
Computers, laptops, cell phones and palm
pilots are examples of mechanisms that
can grant the user internet access.
Although computers and laptops are
capable of having normal internet
connection (i.e. Ethernet connection),
they are also able to have internet access
through wireless technology. Cell phones
and palm pilots can only be connected to
the internet by wireless connection.
Wireless networking is possible through the
technology of wireless-fidelity. Wireless-
fidelity or WiFi as most people call it
allows a internet connection to be
broadcasted through radio waves. Its
purpose serves directly to the users looking
for internet access devoid of any cords or
wires.
Here is a simple and easy to understand diagram
of the basics of WiFi networking.
The main source of the network is shown on the
diagram as an antenna.
The purpose of the antenna is to send radio
signals to the people who want access to the
internet by using laptops and palm pilots.
In order for the person to gain access to the
internet, they must have WiFi equipped products
shown on the diagram.
The diagram also features how WiFi cards can
receive these radio signals into their WiFi
receivers and have wireless connection to the
internet.
The diagram represents the person with the most
important information of what features you need
to understand of how WiFi spreads the net in a
specific location.
It also gives the person insight of how wireless
technology work through radio waves and how it
functions.
Internet Access:-
Access points are often combined with other
network functions. It is very likely that you will
discover a separate access point that just plugs
into a wired Local Area Network (LAN). If you
already have more than one computer hooked
together on the same network and want to have a
good hotspot, you can buy a wireless access point
and plug it in to the network. As mentioned
earlier, radio signals can be received and
transmitted by an antenna and a router. The
router is an example of an access point of how
multiple computers can be connected together in
the same network both including the use of wires
and wireless technology. So once you turn on your
access point on, you will have a hotspot in your
home and will have radio signal within a 100 feet
radius. As for antennas, they have a higher signal
transmission at a 300-500 feet radius. That is why
hotels, campuses, libraries, etc, anything that is
larger than your home is required to use antennas
rather than routers.

Below are two different kinds of routers used to connect multiple


computers on the same connection.
Service set Identifier (SSID)
A service set identifier (SSID) is a sequence
of characters that uniquely names a wireless
local area network (WLAN). An SSID is
sometimes referred to as a "network name."
This name allows stations to connect to the
desired network when multiple independent
networks operate in the same physical area.
Throughput:-
Throughput is the maximum rate of
production or the maximum rate at which
something can be processed. When used in
the context of communication networks,
such as Ethernet or packet
radio, throughput or network throughput is
the rate of successful message delivery over
a communication channel.
Throughput with Wi-Fi is not the same thing
as your Internet connection speed.
Throughput measures how quickly you can
transfer data between two devices on the
local wireless network. The maximum
theoretical throughput on your network
depends on the standards supported by your
equipment. For several technical reasons,
the actual speeds you achieve will be lower
than the theoretical maximum.
Network throughput is measured in bits per
second (bps).
Hardware:-
The key hardware components of
a wireless computer network include
adapters, routers and access points,
antennas and repeaters.
 Wireless Network Adapters
Wireless network adapters (also known as
wireless NICs or wireless network cards)
are required for each device on a
wireless network. All newer laptop
computers, tablets, and smartphones
incorporate wireless capability as a built-
in feature of their systems.

ASUS PCE-N15 N300 PCI 150MBPS 5DBI HIGH


GAIN
Wireless Routers and
Access Points
WIRELESS ROUTERS are the heart of the
wireless network. They function
comparably to traditional routers for
wired Ethernet networks. You need a
wireless router when building an all-
wireless network at home or office. The
current standard for wireless routers is
802.11ac, which deliver smooth video
streaming and responsive online gaming.
Older routers are slower, but still, work,
so the router choice can be made by the
requirements you plan to put on it.
The wireless router usually connects
directly to the modem supplied by your
high-speed internet service provider by
wire, and everything else in the home
connects wirelessly to the router.
ACCESS POINTS allow wireless networks to
join an existing wired network. This situation
occurs in an office or home that already has
wired routers and equipment installed. In
home networking, a single access point or
router possesses sufficient range to span
most residential buildings. Businesses in
office buildings often must deploy multiple
access points and/or routers.
Antennas:-
Wi-Fi wireless networking works by
sending radio transmissions on specific
frequencies where listening devices can
receive them. The necessary radio
transmitters and receivers are built into
Wi-Fi enabled equipment like routers,
laptops, and phones. Antennas are also
key components of these radio
communication systems, picking up
incoming signals or radiating outgoing Wi-
Fi signals. Some Wi-Fi antennas,
particularly on routers, may be mounted
externally while others are embedded
inside the device's hardware enclosure.
Repeaters:-
A WiFi repeater or extender is used to
extend the coverage area of your WiFi
network. It works by receiving your
existing WiFi signal, amplifying it and
then transmitting the boosted signal.
With a WiFi repeater you can effectively
double the coverage area of your WiFi
network - reaching far corners of your
home or office, different floors, or even
extend coverage to your yard.
Standard Devices:-
Range:-
The range of a WiFi computer network
depends primarily on the number and
type of wireless access points (including
wireless routers) used to build it.
A traditional home network having one
wireless router can cover a single-family
dwelling but often not much more.
Business networks with grids of access
points can cover large office buildings.
And wireless hotspots spanning several
square miles (kilometers) have been built
in some cities.
The cost to build and maintain these
networks increases significantly as the
range increases, of course.
The WiFi signal range of any given access
point also varies significantly from device
to devices. Factors that determine the
range of one access point include:
1. the specific 802.11 protocol it runs
2. the strength of its device transmitter
3. the nature of physical obstructions
and/or radio interference in the
surrounding area.
Network Security:-
Wireless security is the prevention of
unauthorized access or damage to computers
using wireless networks. The most common
types of wireless security are Wired
Equivalent Privacy (WEP) and Wi-Fi Protected
Access (WPA). WEP is a notoriously weak
security standard. The password it uses can
often be cracked in a few minutes with a
basic laptop computer and widely available
software tools. WEP is an old IEEE 802.11
standard from 1999, which was outdated in
2003 by WPA, or Wi-Fi Protected Access. WPA
was a quick alternative to improve security
over WEP. The current standard is WPA2;
some hardware cannot support WPA2 without
firmware upgrade or replacement. WPA2 uses
an encryption device that encrypts the
network with a 256-bit key; the longer key
length improves security over WEP.
Enterprises often enforce security using
a certificate-based system to authenticate
the connecting device, following the
standard 802.1X.
Securing Methods:-
1. Change Your Router Admin Username
and Password:
Every router comes with a generic username
and password—if they come with a password
at all. You need it the first time you access
the router. After that, change them both.
Immediately. The generic usernames are a
matter of public record for just about every
router in existence; not changing them
makes it incredibly easy for someone who
gets physical access to your router to mess
with the settings.
If you forget the new username/password,
you should probably stick to pencil and
paper, but you can reset a router to its
factory settings to get in with the original
admin generic info.
2. Double Up on Firewalls:
The router has a firewall built in that
should protect your internal network
against outside attacks. Activate it if it's
not automatic. It might say SPI (stateful
packet inspection) or NAT (network
address translation), but either way, turn
it on as an extra layer of protection.
3. Change the Network Name
The service set identifier (SSID) is the
name that's broadcast from your Wi-Fi to
the outside world so people can find the
network. While you probably want to
make the SSID public, using the generic
network name/SSID generally gives it
away. For example, routers from Linksys
usually say "Linksys" in the name; some
list the maker and model number
("NetgearR6700"). That makes it easier
for others to ID your router type. Give
your network a more personalized
moniker.
4. Turn Off Guest Networks
It's nice and convenient to provide guests
with a network that doesn't have an
encryption password, but what if you
can't trust them? Or the neighbors? Or
the people parked out front? If they're
close enough to be on your Wi-Fi, they
should be close enough to you that you'd
give them the password. (Remember—
you can always change your Wi-Fi
encryption password later.)
Data Security Risks:-
A World of Data Security Risks. The
integrity and privacy of data are
at risk from unauthorized users, external
sources listening in on the network, and
internal users giving away the store. This
section explains the risky situations and
potential attacks that could compromise
your data.
Data Security Risks:-
Piggybacking:-
Piggybacking, in a wireless
communications context, is the
unauthorized access of a wireless
LAN. Piggybacking is sometimes referred
to as "Wi-Fi squatting."
The usual purpose of piggybacking is
simply to gain free network access rather
than any malicious intent, but it can slow
down data transfer for legitimate users
of the network. Furthermore, a network
that is vulnerable to piggybacking for
network access is equally vulnerable
when the purpose is data theft,
dissemination of viruses, or some other
illicit activity.
Health Concerns:-
Wi-Fi is convenient but many have raised
doubts concerning the safety of unseen
forces that permeate everything around
us. Since the introduction of Wi-Fi in
1997, researchers have performed dozens
of studies to explore the subject.

The Potential Dangers of Wi-Fi :-


• Contributes to the Development of
Insomnia
• Damaging to Childhood Development
• Affects Cell Growth
• Derails Brain Function
• Reduces Brain Activity in Females
• May Impact Fertility
Architectural Prospects:-
Integrated, complete Wi-Fi coverage for
the home
Wi-Fi in the home has evolved from an amenity to
an expected utility. An enabling platform for
growing number of smart home products and
systems, Wi-Fi brings connectivity that is an
important part of life at home.
Wi-Fi CERTIFIED Home Design™ is a certification
program from Wi-Fi Alliance that enables new
home builders to offer built-in Wi-Fi networks
with comprehensive coverage throughout the
home, as well as outdoor living spaces.
Moving into a new home, buyers trust that the
electricity and lighting work once service is
established. Now, new home buyers can benefit
from the same turnkey approach to Wi-Fi home
networks. Wi-Fi Home Design plans integrate
professionally designed Wi-Fi networks directly
into builder floorplans.
Each floorplan is specially created to provide
whole home coverage based on the new home’s
size, number of levels, and wall composition.
Utilizing high quality, dual-band Wi-Fi CERTIFIED
ac equipment and professional installation, Wi-Fi
Home Design plans bring comprehensive, high
performance Wi-Fi networks into newly
constructed homes.
Wi-Fi Home Design not only enables
home builders to extend their product
offering, it gives home buyers
convenience, peace of mind, and
exceptional user experience. There is no
need to purchase and install Wi-Fi access
points after the home is built. Wi-Fi
Home Design networks are move-in ready
and are optimized to allow for a growing
array of future smart home devices and
systems.

Anda mungkin juga menyukai