WiFi is an abbreviation for Wireless Fidelity, a wireless transmission high-precision, speed, and is used to identify any of the wireless technologies in the standard IEEE 802.11 a technology upon which most wireless networks, WLAN today, it uses radio waves to exchange information rather of wires and the cables .. They are also able to penetrate walls and barriers, with high-speed transmit and receive data up to 54 Mb ps There are several standards for wireless networks identified by the Institute of Electrical and electronic engineers, IEEE, most notably 802.11a, was approved before the standard 802.11b. The latest standards today are 802.11n, and these standards are compatible with each other often, but the extent and varying velocities. They are expected to wifi technology to evolve and change as it changed most of the other technological application
Uses Was invented and developed for telecommunications service within the network of local LAN, but without the use of cables, at the beginning it was a goal which is to service computers, mobile PC, but the rapid development of this technology now serves surfers World Wide Web, particularly in cafes and restaurants, hotels, airports and banks. It has played an important role in the technology of VoIP network VoIP, and lead a great service now in sensitive areas Cardhat hospitals and security sites so that the doctor or the security guard from entering on specific applications to serve the patients or the identification of undesirable persons from entering sensitive areas and other . It also added a lot to the mobile phone technology and the possibility of contact with the World Wide Web in the event's presence in the network of Wi-Fi. Of the modern uses and its task is to transfer images from digital cameras to the computer.
Disadvantages
1Overlap and confusion2. Underperformance
3. A large consumption of energy
4. The limited area of coverage
5. The possibility of penetration of personal data
Click on the link across the
3. A large consumption of energy
4. The limited area of coverage
5. The possibility of penetration of personal data
Click on the link across the
0 التعليقات:
Enregistrer un commentaire