0% found this document useful (0 votes)
44 views4 pages

Paru

The document discusses wireless local area networks (WLANs), which allow computers to connect to a network via radio waves instead of cables for greater flexibility and portability. WLANs use radio frequency technology to transmit and receive information over the air between devices that have antennas and radio modems. However, wireless networking also poses security risks since the radio waves used can penetrate outside of buildings and allow unauthorized access to the network from nearby locations if not properly secured.

Uploaded by

jacksondas
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views4 pages

Paru

The document discusses wireless local area networks (WLANs), which allow computers to connect to a network via radio waves instead of cables for greater flexibility and portability. WLANs use radio frequency technology to transmit and receive information over the air between devices that have antennas and radio modems. However, wireless networking also poses security risks since the radio waves used can penetrate outside of buildings and allow unauthorized access to the network from nearby locations if not properly secured.

Uploaded by

jacksondas
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Invisibility cloak

Invisibility refers to the state of an object which cannot be seen. An object in this state is
said to be invisible (literally, "not visible"). The term is usually used as a fantasy/science
fiction term, where objects are literally made useable by magical or technological means.
However, its effects can also be seen in the real world, particularly in physics.

Since objects can be seen by light in the visible spectrum from a source
reflecting off their surfaces and hitting the viewer's eye, the most natural form
of invisibility (whether real or fictional) is an object which does not reflect light
(that is - allows light to pass through it). In nature, this is known as
transparency, and is seen in many naturally-occurring materials (although no
naturally-occurring material is 100% transparent).

The concept of a cloaking device, or the invisibility cloak, is to steer light


waves around an object to make it appear as if nothing were there

Visibility also depends on the eyes of the observer and/or the instruments
used. Thus an object can be classified as "invisible to" a person, animal,
instrument, etc.
Seminar
On
Invisibility cloak

Submitted to, Submitted By,

Mr. Melvin N.V. Jince Francis

(dept. of Computer science) S6 BCA

No:30

WLAN-Wireless LAN
The term “Computer Network” to mean a collection of autonomous
computers interconnected by a single technology .By this interconnection they
are able to exchange information. Local Area Networks are privately owned
networks within a single building or campus of few kilometers in size. In a
traditional LAN we are connecting computers to the network through cables.
But the wireless local area network (WLAN) is a flexible data communications
system that can use either infrared or radio frequency technology to transmit
and receive information over the air. Here each computer has a radio Modem
and Antenna with which it can communicate with other systems. One
important advantage of WLAN is the simplicity of its installation. Installing a
wireless LAN system is easy and can eliminate the needs to pull cable through
walls and ceilings. WLANs allow greater flexibility and portability than do
traditional wired local area networks (LAN). 802.11 was implemented as the
first WLAN standard. It is based on radio technology operating in the 2.4 GHz
frequency and has a maximum throughput of 1 to 2 Mbps.

Unfortunately, wireless networking is a double-edged sword. WLANs use


electromagnetic waves to transmit information, the radio waves can easily
penetrate outside the building, it’s a risk that the network can be hacked from
the parking lot or the street. So it’s very important to put enough attention on
the WLANs security aspects. With wireless networking, there is no physical
security. The radio waves that make wireless networking possible are also
what make wireless networking so dangerous. An attacker can be anywhere
nearby listening to all the traffic from the network. By properly engineering
and using your wireless network, we can keep attackers at bay.
Seminar
On
WLAN-Wireless LAN

Submitted to, Submitted By,

Mr. Melvin N.V. Bennet John

(dept. of Computer science) S6 BCA

No:15

You might also like