badge icon

Bu içerik Türkçe olarak yazılmış olup yapay zeka ile otomatik olarak İngilizceye çevrilmiştir.

Madde

Wi-Fi (Wireless Fidelity) is a communication technology used for wireless local area networks (WLAN). Based on the IEEE 802.11 standard, Wi-Fi enables devices to connect to the internet or local networks via radio waves. First defined in 1997, this technology has evolved over time to become an integral part of daily life.

History

The origins of Wi-Fi technology trace back to WaveLAN, a wireless communication system developed by NCR Corporation in 1990. This system later formed the foundation of the IEEE 802.11 standard. In 1997, IEEE published the first version of the 802.11 standard. In 1999, the Wi-Fi Alliance was established and the "Wi-Fi" trademark was registered.

Working Principle

Wi-Fi transmits data using radio waves in the 2.4 GHz and 5 GHz frequency bands. A Wi-Fi network typically consists of an access point and client devices connected to it. The access point transmits the internet connection to devices via wireless signals. Devices receive these signals to gain access to the internet or local network.

Wi-Fi Standards

Wi-Fi technology has evolved through various versions of the IEEE 802.11 standard:

  • 802.11b (Wi-Fi 1): Introduced in 1999, operates in the 2.4 GHz band with a speed of up to 11 Mbps.
  • 802.11a (Wi-Fi 2): Introduced in 1999, operates in the 5 GHz band with a speed of up to 54 Mbps.
  • 802.11g (Wi-Fi 3): Introduced in 2003, operates in the 2.4 GHz band with a speed of up to 54 Mbps.
  • 802.11n (Wi-Fi 4): Introduced in 2009, operates in both 2.4 GHz and 5 GHz bands with speeds up to 600 Mbps.
  • 802.11ac (Wi-Fi 5): Introduced in 2013, operates in the 5 GHz band with speeds of 1 Gbps and higher.
  • 802.11ax (Wi-Fi 6): Introduced in 2019, offers higher speeds, greater device capacity and improved energy efficiency.
  • 802.11be (Wi-Fi 7): The upcoming version aims for even higher speeds and lower latency.

Security Protocols

The security of Wi-Fi networks is ensured through various protocols:

  • WEP (Wired Equivalent Privacy): The first security protocol, but insecure due to weak encryption methods.
  • WPA (Wi-Fi Protected Access): Developed to address the security flaws of WEP; uses TKIP encryption.
  • WPA2: Provides stronger security by using the AES encryption standard.
  • WPA3: The latest protocol, introduced in 2018; offers enhanced encryption and improved authentication.

Applications

Wi-Fi technology is used in many areas of daily life:

  • Home and Office Networks: Provides internet access for computers, smartphones and other devices.
  • Public Spaces: Offers free or paid internet access in cafes, airports and hotels.
  • Educational Institutions: Provides wireless internet access for students and teachers.
  • Industrial Applications: Used for communication between devices in manufacturing facilities.

Kaynakça





Gast, Matthew S. *802.11 Wireless Networks: The Definitive Guide.* 2nd ed. Sebastopol, CA: O’Reilly Media, 2005. https://dl.acm.org/doi/10.5555/1197233.

Gast, Matthew S. *802.11ac: A Survival Guide.* Sebastopol, CA: O’Reilly Media, 2013. https://dl.acm.org/doi/10.5555/2563615.

Geier, Jim. *Designing and Deploying 802.11n Wireless Networks.* Indianapolis: Cisco Press, 2010. https://dl.acm.org/doi/10.5555/1875423.

IEEE. *IEEE Standard for Information Technology—Telecommunications and Information Exchange Between Systems—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (IEEE Std 802.11-2020).* New York: IEEE, 2020. https://doi.org/10.1109/IEEESTD.2021.9363693.

Roshan, Pejman, and Jonathan Leary. *802.11 Wireless LAN Fundamentals*. Indianapolis: Cisco Press, 2004. https://dl.acm.org/doi/10.5555/1841742.

Yazar Bilgileri

Avatar
YazarFerhat Yurdakul9 Aralık 2025 05:59

Etiketler

Tartışmalar

Henüz Tartışma Girilmemiştir

"Wi-Fi" maddesi için tartışma başlatın

Tartışmaları Görüntüle

İçindekiler

  • History

  • Working Principle

  • Wi-Fi Standards

  • Security Protocols

  • Applications

KÜRE'ye Sor