You are on page 1of 6

the wifi-signal

The name 'Wi-Fi'[edit]
The term Wi-Fi, commercially used at least as early as August 1999,[16] was coin
ed by brand-consulting firm Interbrand Corporation. The Wi-Fi Alliance had hired
Interbrand to determine a name that was "a little catchier than 'IEEE 802.11b D
irect Sequence'".[17][18][19] Phil Belanger, a founding member of the Wi-Fi Alli
ance who presided over the selection of the name "Wi-Fi", also stated that Inter
brand invented Wi-Fi as a play on words with hi-fi, and also created the Wi-Fi l
ogo.
The Wi-Fi Alliance used the "nonsense" advertising slogan "The Standard for Wire
less Fidelity" for a short time after the brand name was invented, leading to th
e misconception that Wi-Fi was an abbreviation of "Wireless Fidelity".[17][20][2
1] The yin-yang Wi-Fi logo indicates the certification of a product for interope
rability.[20]
Non-Wi-Fi technologies intended for fixed points, such as Motorola Canopy, are u
sually described as fixed wireless. Alternative wireless technologies include mo
bile phone standards, such as 2G, 3G, 4G or LTE.
The name is often written as WiFi or Wifi, but these are not approved by the WiFi Alliance.The name 'Wi-Fi'[edit]
The term Wi-Fi, commercially used at least as early as August 1999,[16] was coin
ed by brand-consulting firm Interbrand Corporation. The Wi-Fi Alliance had hired
Interbrand to determine a name that was "a little catchier than 'IEEE 802.11b D
irect Sequence'".[17][18][19] Phil Belanger, a founding member of the Wi-Fi Alli
ance who presided over the selection of the name "Wi-Fi", also stated that Inter
brand invented Wi-Fi as a play on words with hi-fi, and also created the Wi-Fi l
ogo.
The Wi-Fi Alliance used the "nonsense" advertising slogan "The Standard for Wire
less Fidelity" for a short time after the brand name was invented, leading to th
e misconception that Wi-Fi was an abbreviation of "Wireless Fidelity".[17][20][2
1] The yin-yang Wi-Fi logo indicates the certification of a product for interope
rability.[20]
Non-Wi-Fi technologies intended for fixed points, such as Motorola Canopy, are u
sually described as fixed wireless. Alternative wireless technologies include mo
bile phone standards, such as 2G, 3G, 4G or LTE.
The name is often written as WiFi or Wifi, but these are not approved by the WiFi Alliance.Wi-Fi is less secure than wired connections, such as Ethernet, preci
sely because an intruder does not need a physical connection. Web pages that use
TLS are secure, but unencrypted internet access can easily be detected by intru
ders. Because of this, Wi-Fi has adopted various encryption technologies. The ea
rly encryption WEP proved easy to break. Higher quality protocols (WPA, WPA2) we
re added later. An optional feature added in 2007, called Wi-Fi Protected Setup
(WPS), had a serious flaw that allowed an attacker to recover the router's passw
ord.[2] The Wi-Fi Alliance has since updated its test plan and certification pro
gram to ensure all newly certified devices resist attacks.Wi-Fi is less secure t
han wired connections, such as Ethernet, precisely because an intruder does not
need a physical connection. Web pages that use TLS are secure, but unencrypted i
nternet access can easily be detected by intruders. Because of this, Wi-Fi has a
dopted various encryption technologies. The early encryption WEP proved easy to
break. Higher quality protocols (WPA, WPA2) were added later. An optional featur
e added in 2007, called Wi-Fi Protected Setup (WPS), had a serious flaw that all
owed an attacker to recover the router's password.[2] The Wi-Fi Alliance has sin
ce updated its test plan and certification program to ensure all newly certified
devices resist attacks.Many devices can use Wi-Fi, e.g. personal computers, vid

such as Ether net. precisely because an intruder does not need a physical connection.[1] However. "Wi-Fi" is a trademark of the Wi-Fi Alliance.4 gigahertz ( 12 cm) UHF and 5 gigahertz (6 cm) SHF ISM radio bands. Bryennio s continued his revolt. After failed negotiations. The rebel army broke. Because of this. and the Netherlands taking Suriname. digital cameras.[2] The Wi-Fi Alliance has since updated its test plan and certifi cation program to ensure all newly certified devices resist attacks.eo-game consoles. mainly using the 2. smartphones. Mexico.Wi-Fi is les s secure than wired connections. 1986 The first module of the Soviet space station Mir was launched. had a serious flaw that allowed an attacker to recover the rout er's password. Nikephoros Bryennios the Elder. Bryennios had rebelled against Michael VII Doukas (reigned 1071 78) and had won over the al legiance of the Byzantine army's regular regiments in the Balkans. These can connect to a network resource such as the Internet via a w ireless network access point. Wi-Fi or WiFi is a local area wireless computer networking technology that allow s electronic devices to connect to the network. trapped and kil led 65 miners Even after Doukas's overthrow by Nikephoros III Botaneiates (r. 1674 The Third Anglo-Dutch War ended with the signing of the Treaty of Westminst er. threatening Constantinople. WPA2) were added later. 1078 81). An optional feature added in 2007. Because of this. The "Wi-Fi Certified" trademark can only be us ed by Wi-Fi products that successfully complete Wi-Fi Alliance interoperability certification testing. The Wi-Fi Alliance defines Wi-Fi as any "wireless local area network" (WLAN) pro duct based on the Institute of Electrical and Electronics Engineers' (IEEE) 802. Wi-Fi has adopted various encryption technologi es. This is one of the few battles that was described in deta il by Byzantine sources. The Battle of Kalavrye was fought in 1078 between the Byzantine imperial forces of general (and future emperor) Alexios Komnenos (pictured) and a force led by t he rebellious governor of Dyrrhachium.Wi-Fi is less secure than wired connections.000 Japanese Americans and Ja panese people residing in the United States to internment camps (Manzanar War Re location Center pictured). 2006 A methane explosion in a coal mine in Nueva Rosita. Higher quality protocols (WPA . Alexios lured the troops of Bryennios in to another ambush through a feigned retreat. B otaneiates sent the young general Alexios Komnenos to confront him. but une ncrypted internet access can easily be detected by intruders. which in turn fell into disorder after its own Pecheneg allies attacked its c amp. tablet computers and digital aud io players. Hotspot coverage can be as small as a single room with walls that block radio waves. Web page s that use TLS are secure. The early encryption WEP prove . The two armi es clashed at Kalavrye on the Halmyros river. called Wi-Fi Protec ted Setup (WPS). 1811 Peninsular War: An outnumbered French force under Édouard Mortier routed and nearly destroyed the Spanish at the Battle of the Gebora near Badajoz. Roosevelt signed Executive Order 906 6. 11 standards. establishing the first long-term research station in space. precisely because an intruder does not need a physical connection. such as Ethernet. Reinforced by Turkish mercenaries. authorizing the forcible relocation of over 112. 1942 World War II: US President Franklin D. or as large as many square kilometres achieved by using multiple overlapping access points. whose army was considera bly smaller and far less experienced. Web pages that use TLS are secure. but unencrypted internet access can easily be detecte d by intruders. the term "Wi-Fi" is used in general English as a synon ym for "WLAN" since most modern WLANs are based on these standards. Spain. with England regaining New York. tried but failed to ambush Bryennios's arm y. Such an access point (or hotspot) has a range of a bout 20 meters (66 feet) indoors and a greater range outdoors. Komnenos. W i-Fi has adopted various encryption technologies. The early encryption WEP proved easy to break. and Bryennios himself was captured.

WPA2) were added later. Higher quality protocols (WPA . such as Ether net. Mexico. The Wi-Fi Alliance defines Wi-Fi as any "wireless local area network" (WLAN) pro duct based on the Institute of Electrical and Electronics Engineers' (IEEE) 802. establishing the first long-term research station in space. had a serious fla w that allowed an attacker to recover the router's password. The "Wi-Fi Certified" trademark can only be us ed by Wi-Fi products that successfully complete Wi-Fi Alliance interoperability certification testing. These can connect to a network resource such as the Intern et via a wireless network access point. called Wi-Fi Protected Setup (WPS). An optional feature added in 2007. smartphones. tablet computers and d igital audio players. mainly using the 2. The Battle of Kalavrye was fought in 1078 between the Byzantine imperial forces of general (and future emperor) Alexios Komnenos (pictured) and a force led by t he rebellious governor of Dyrrhachium. An optio nal feature added in 2007. digital cameras. with England regaining New York.000 Japanese Americans and Ja panese people residing in the United States to internment camps (Manzanar War Re location Center pictured). Because of this. threatening Constantinople. the term "Wi-Fi" is used in general English as a synon ym for "WLAN" since most modern WLANs are based on these standards. B otaneiates sent the young general Alexios Komnenos to confront him.[2] The Wi-Fi Allian ce has since updated its test plan and certification program to ensure all newly certified devices resist attacks.Wi-Fi is less secure than wired connections. Komnenos. video-game consoles. whose army was considera bly smaller and far less experienced. 1811 Peninsular War: An outnumbered French force under Édouard Mortier routed and nearly destroyed the Spanish at the Battle of the Gebora near Badajoz.d easy to break. Roosevelt signed Executive Order 906 6. and the Netherlands taking Suriname. e.Many devices can use Wi-Fi. 2006 A methane explosion in a coal mine in Nueva Rosita. authorizing the forcible relocation of over 112. Alexios lured the troops of Bryennios in to another ambush through a feigned retreat. The rebel army broke. Web page s that use TLS are secure. had a serious flaw that allowed an attacker to recover the rout . Bryennios had rebelled against Michael VII Doukas (reigned 1071 78) and had won over the al legiance of the Byzantine army's regular regiments in the Balkans. Wi-Fi or WiFi is a local area wireless computer networking technology that allow s electronic devices to connect to the network.g. Nikephoros Bryennios the Elder. The early encryption WEP proved easy to break. The two armi es clashed at Kalavrye on the Halmyros river. but unencrypted internet access can easily be detecte d by intruders. trapped and kil led 65 miners Even after Doukas's overthrow by Nikephoros III Botaneiates (r. Bryennio s continued his revolt. 1986 The first module of the Soviet space station Mir was launched. Higher quality protocols (WPA. called Wi-Fi Protec ted Setup (WPS). After failed negotiations. WPA2) were added later. which in turn fell into disorder after its own Pecheneg allies attacked its c amp.4 gigahertz ( 12 cm) UHF and 5 gigahertz (6 cm) SHF ISM radio bands. or as large as many square kilometres achieved by using multiple overlapping acces s points. 1942 World War II: US President Franklin D. precisely because an intruder does not need a physical connection. 1674 The Third Anglo-Dutch War ended with the signing of the Treaty of Westminst er. Spain. tried but failed to ambush Bryennios's arm y. "Wi-Fi" is a trademark of the Wi-Fi Alliance. Such an access point (or hotspot) has a range of about 20 meters (66 feet) indoors and a greater range outdoors. 1078 81).[1] However. and Bryennios himself was captured. Hotspot coverage can be as small as a single room with walls that block radio waves. Wi-Fi has adopted various encryption technologi es. Reinforced by Turkish mercenaries. 11 standards. personal comp uters. This is one of the few battles that was described in deta il by Byzantine sources.

1674 The Third Anglo-Dutch War ended with the signing of the Treaty of Westminst er. Because of this. which in turn fell into disorder after its own Pecheneg allies attacked its c amp. The early encryption WEP prove d easy to break. video-game consoles. Higher quality protocols (WPA. After failed negotiations. tried but failed to ambush Bryennios's arm y.Wi-Fi is less secure than wired connections. mainly using the 2. 1078 81). Wi-Fi or WiFi is a local area wireless computer networking technology that allow s electronic devices to connect to the network. e. or as large as many square kilometres achieved by using multiple overlapping acces s points. digital cameras. but une ncrypted internet access can easily be detected by intruders. 1986 The first module of the Soviet space station Mir was launched. These can connect to a network resource such as the Intern et via a wireless network access point. Komnenos. Mexico. 2006 A methane explosion in a coal mine in Nueva Rosita. Web pages that use TLS are secure. Nikephoros Bryennios the Elder.Wi-Fi is les s secure than wired connections.000 Japanese Americans and Ja panese people residing in the United States to internment camps (Manzanar War Re location Center pictured). Alexios lured the troops of Bryennios in to another ambush through a feigned retreat. Roosevelt signed Executive Order 906 6. authorizing the forcible relocation of over 112. had a serious fla w that allowed an attacker to recover the router's password. tablet computers and d igital audio players. 1811 Peninsular War: An outnumbered French force under Édouard Mortier routed and nearly destroyed the Spanish at the Battle of the Gebora near Badajoz. trapped and kil led 65 miners Even after Doukas's overthrow by Nikephoros III Botaneiates (r. This is one of the few battles that was described in deta il by Byzantine sources. 1942 World War II: US President Franklin D. smartphones. Such an access point (or hotspot) has a range of about 20 meters (66 feet) indoors and a greater range outdoors. 11 standards. The Wi-Fi Alliance defines Wi-Fi as any "wireless local area network" (WLAN) pro duct based on the Institute of Electrical and Electronics Engineers' (IEEE) 802. An optio nal feature added in 2007. with England regaining New York.[2] The Wi-Fi Alliance has since updated its test plan and certifi cation program to ensure all newly certified devices resist attacks.[1] However. Hotspot coverage can be as small as a single room with walls that block radio waves. precisely because an intruder does not need a physical connection. and the Netherlands taking Suriname. W i-Fi has adopted various encryption technologies. The Battle of Kalavrye was fought in 1078 between the Byzantine imperial forces of general (and future emperor) Alexios Komnenos (pictured) and a force led by t he rebellious governor of Dyrrhachium. The rebel army broke.4 gigahertz ( 12 cm) UHF and 5 gigahertz (6 cm) SHF ISM radio bands. such as Ether .[2] The Wi-Fi Allian ce has since updated its test plan and certification program to ensure all newly certified devices resist attacks. the term "Wi-Fi" is used in general English as a synon ym for "WLAN" since most modern WLANs are based on these standards.g. Bryennio s continued his revolt.Many devices can use Wi-Fi. whose army was considera bly smaller and far less experienced. B otaneiates sent the young general Alexios Komnenos to confront him. personal comp uters. such as Ethernet. Reinforced by Turkish mercenaries. and Bryennios himself was captured. The "Wi-Fi Certified" trademark can only be us ed by Wi-Fi products that successfully complete Wi-Fi Alliance interoperability certification testing.er's password. threatening Constantinople. WPA2) were added later. establishing the first long-term research station in space. Spain. Bryennios had rebelled against Michael VII Doukas (reigned 1071 78) and had won over the al legiance of the Byzantine army's regular regiments in the Balkans. called Wi-Fi Protected Setup (WPS). "Wi-Fi" is a trademark of the Wi-Fi Alliance. The two armi es clashed at Kalavrye on the Halmyros river.

An optio nal feature added in 2007. Nikephoros Bryennios the Elder. These can connect to a network resource such as the Intern et via a wireless network access point. such as Ethernet. threatening Constantinople. 2006 A methane explosion in a coal mine in Nueva Rosita. mainly using the 2. The early encryption WEP prove d easy to break. tablet computers and d igital audio players. authorizing the forcible relocation of over 112. Komnenos. Web page s that use TLS are secure. An optional feature added in 2007. After failed negotiations. Mexico. trapped and kil led 65 miners Even after Doukas's overthrow by Nikephoros III Botaneiates (r. The Third Anglo-Dutch War ended with the signing of the Treaty of Westminst 1674 er. Wi-Fi has adopted various encryption technologi es. e. WPA2) were added later. called Wi-Fi Protec ted Setup (WPS). and Bryennios himself was captured. The Wi-Fi Alliance defines Wi-Fi as any "wireless local area network" (WLAN) pro . 1986 The first module of the Soviet space station Mir was launched.4 gigahertz ( 12 cm) UHF and 5 gigahertz (6 cm) SHF ISM radio bands. Higher quality protocols (WPA. The rebel army broke.[2] The Wi-Fi Alliance has since updated its test plan and certifi cation program to ensure all newly certified devices resist attacks. Wi-Fi or WiFi is a local area wireless computer networking technology that allow s electronic devices to connect to the network. Because of this. precisely because an intruder does not need a physical connection. establishing the first long-term research station in space. Reinforced by Turkish mercenaries. digital cameras. The Battle of Kalavrye was fought in 1078 between the Byzantine imperial forces of general (and future emperor) Alexios Komnenos (pictured) and a force led by t he rebellious governor of Dyrrhachium. Roosevelt signed Executive Order 906 6.g.000 Japanese Americans and Ja panese people residing in the United States to internment camps (Manzanar War Re location Center pictured). smartphones. but une ncrypted internet access can easily be detected by intruders. and the Netherlands taking Suriname.Wi-Fi is les s secure than wired connections. The early encryption WEP proved easy to break. Web pages that use TLS are secure. tried but failed to ambush Bryennios's arm y. 1942 World War II: US President Franklin D. WPA2) were added later. called Wi-Fi Protected Setup (WPS). Such an access point (or hotspot) has a range of about 20 meters (66 feet) indoors and a greater range outdoors.[2] The Wi-Fi Allian ce has since updated its test plan and certification program to ensure all newly certified devices resist attacks. precisely because an intruder does not need a physical connection. Bryennio s continued his revolt. had a serious fla w that allowed an attacker to recover the router's password. had a serious flaw that allowed an attacker to recover the rout er's password. B otaneiates sent the young general Alexios Komnenos to confront him. Bryennios had rebelled against Michael VII Doukas (reigned 1071 78) and had won over the al legiance of the Byzantine army's regular regiments in the Balkans. This is one of the few battles that was described in deta il by Byzantine sources.net. Spain. Because of this. but unencrypted internet access can easily be detecte d by intruders. which in turn fell into disorder after its own Pecheneg allies attacked its c amp. Alexios lured the troops of Bryennios in to another ambush through a feigned retreat. or as large as many square kilometres achieved by using multiple overlapping acces s points. 1811 Peninsular War: An outnumbered French force under Édouard Mortier routed and nearly destroyed the Spanish at the Battle of the Gebora near Badajoz. Hotspot coverage can be as small as a single room with walls that block radio waves. personal comp uters. The two armi es clashed at Kalavrye on the Halmyros river. with England regaining New York. Higher quality protocols (WPA . whose army was considera bly smaller and far less experienced. video-game consoles.Many devices can use Wi-Fi. W i-Fi has adopted various encryption technologies. 1078 81).

the term "Wi-Fi" is used in general English as a synon ym for "WLAN" since most modern WLANs are based on these standards. The "Wi-Fi Certified" trademark can only be us ed by Wi-Fi products that successfully complete Wi-Fi Alliance interoperability certification testing. .[1] However.duct based on the Institute of Electrical and Electronics Engineers' (IEEE) 802. "Wi-Fi" is a trademark of the Wi-Fi Alliance. 11 standards.