Documente Academic
Documente Profesional
Documente Cultură
SEMINAR CO-ORDINATOR
Mr. Vijay Agarwal
Mr. Deepak Balana
SUBMITTED BY
ISHANT GUPTA
(EC/06/136)IV YR. ECE
http://powerpointpresentationon.blogspot.co
Introduction
Need of WLAN
Advantages and Applications of WLAN
WLAN security
Over the past few years, wired LANs have lost their
need and interest to wireless LAN s
In Wiring LANs, the roving users can be in direct
two-way contact with the full resources of the
enterprises information systems.
Similarly, situation in which people have to move
around to various locations to perform their work
are candidates for wireless LANs.
Wireless LANs can also move to higher power
plateaus, which will extend their distances from
hundreds of feet to several tens of thousands of
feet.
2. INFRARED TECHNOLOGY
Infrared (IR) systems use very high frequencies, just below
visible light in the electromagnetic spectrum, to carry data.
Like light , IR cannot penetrate opaque objects .
3.MICROWAVE TECHNOLOGY
Roaming
Speed
Cost
Flexibility
Fast setup
Efficient
Reliable
Healthcare
The WLAN technology can help healthcare professionals such as:
1. Keep patient records current and accessible.
2. Maintain network connectivity for mobile, roaming staff.
3.Link departmental wired LANs in separate buildings to central
facilities.
Education
Offices
With WLAN, people can done their work done and make the
office infrastructure more efficient such as:
1.Reliable connectivity for individual workers and whole
workgroups to networked applications and data from any office
location.
2.Sales and services persons spend almost all their time out of
the office. It is possible to connect them with officers.
2- Structured threats:
It happened by hackers who are more technical
- They can know the network vulnerabilities then they can
provide a script or a code or a program to use it in accessing
to the network.
3- External threats:
- It may be happened by a person or organized group from
the outside of the network , they arent authorized to access
to the network.
4- Internal threats :
- It happened by a person who has the permission and
authorized to access to the network from the internal employees
, he can damage the network.
Spy
To gather information isnt allowed to be known
Access
- Unauthorized person access to the network ( doesnt have
any account ), he can access by guessing the password or
he know that the password is weak.