Wifi
edited
Wireless Fidelity (Wi-Fi)
Is for having inalambric communication, and is commonly used for connec…
Wireless Fidelity (Wi-Fi)
Is for having inalambric communication, and is commonly used for connecting to internet without using any cables.
Wifi can create a connection between different aparatos* and its combatible with all of them.
For using wifi you have to have an acces modem which would be the main connector, you may use internet everywhere where the signal of this wifi modem arrives.
there exist different types of wifi
• The first is the IEEE 802.11b standard operating in the 2.4 GHz at speeds up to 11 Mbps
• The second is the IEEE 802.11g also operates in the 2.4 GHz, but at a higher speed, reaching up to 54 Mbps
• The third, which is in use is the IEEE 802.11 meetings is known as WiFi 5, since it operates in the 5 GHz band at a speed of 54 Mbps One The main advantages of this connection is that it has less interference than those operating in the 2.4 GHz band because the band does not share operations with other technologies such as Bluetooth.
• The room, which is still under consideration is the IEEE 802.11n operate in the 2.4 GHz at a speed of 108 Mbps
types of networks
edited
TYPES OF NETWORKS*
STAR: each network host is connected to a central hub, the 'star ring' to…
TYPES OF NETWORKS*
STAR: each network host is connected to a central hub, the 'star ring' topology, is in common use today.
BUS: Each computer or server is connected to the single bus cable through some kind of connector
RING: Each computer is connected to the network in a closed loop or ring. Each machine or computer has a unique address that is used for identification purposes. The signal passes through each machine or computer connected to the ring in one direction.
Encryption
edited
What What is encryption?Encryption
Encryption/decryption is especially important in wireless…
What What is encryption?Encryption
Encryption/decryption is especially important in wireless communications. This is because wireless circuits are easier to tap than their hard-wired counterparts. Is a good idea when carrying out any kind of sensitive transaction, such as a credit-card purchase online, or the discussion of a company secret between different departments in the organization.
{http://www.softwaregeek.com/images/icons/encryption_shield_utilities_security___encryption-87340.jpeg}
Encryption
edited
What is encryption?Encryption is the act of turning a block of plain text or other raw data(such…
What is encryption?Encryption is the act of turning a block of plain text or other raw data(such as binary computer files) into encoded blocks of text. Modern computer encryption systems use complicated techniques developed over a number of years, and are able to provide an advanced level of security.
Encryption/decryption is especially important in wireless communications. This is because wireless circuits are easier to tap than their hard-wired counterparts. Is a good idea when carrying out any kind of sensitive transaction, such as a credit-card purchase online, or the discussion of a company secret between different departments in the organization.
{http://www.softwaregeek.com/images/icons/encryption_shield_utilities_security___encryption-87340.jpeg}
home
edited
Welcome to Your New Wiki!
Getting Started
Click on the edit button above to put your own conte…
Welcome to Your New Wiki!
Getting Started
Click on the edit button above to put your own content on this page.
To invite new members, click on Manage Wiki and Invite People.
To change your wiki's colors or theme, click on Manage Wiki and Look and Feel.
To set who can view and edit your wiki, click on Manage Wiki and Permissions.
Need Help?
Click on the help link above to learn more about how to use your wiki.
Biometrics
edited
Biometrics
Biometric is the way of authenticating a person base do on individual, unique physiolo…
Biometrics
Biometric is the way of authenticating a person base do on individual, unique physiological and behavioral characteristics.
Biometrical identifiers: retina iris face, voice, arteries, veins, size full hand, odor, heartbeat, movement of walking, DNA, etc.
2 basic steps:
· Register the identifier with an identity
· Compare it
Or
· Enrolment and matching.
Enrolment:
The process in which a user biometric identifier is captured and saved on to a computer in a digital way.
Matching:
The process of comparing a new biometric identifier lecture and compare it with the captured data to see if it
corresponds to somebody enrolled. That way authenticating a person.
Physiological traits:
Fingerprint, iris, voice
Behavioral traits
The way you walk the way you type facial expressions when talking.
{http://www.techsvg.com/pic/about-biometrics.jpg} {http://advanced-biometrics.com/content/images/stories/ABI/biometrics.jpg} {http://afisandbiometrics.com/yahoo_site_admin/assets/images/BiometricsBlockDiagram2.42234903_std.jpg} [[image:http://misbiometrics.wdfiles.com/local--files/start/Biometrics_traits_classification[1].png width="800" height="574"]]
NEWS RELATED TO BIOMETRICS:
Biometrics to boom by 2012
The global biometrics industry is set to triple in size by 2012, according to an article published today.
The growth will be supported by government identity management schemes, criminal and surveillance systems and private sector initiatives.
The worldwide market value could surpass $7 billion.
Fingerprint biometrics will spearhead growth, followed by facial and iris recognition technologies, with Asia and the Middle East marked down as the key growth areas.
Biometric technologies that will be displayed at Intersec trade fair and conference include areas such as fingerprint scan, face recognition, automated fingerprint identification systems (AFIS), live-scan, iris recognition, middleware/biometric identity management software, vein recognition, multiple-biometric, hand geometry and voice recognition.
This entry was posted on Wednesday, December 10th, 2008 at 9:11 pm and is filed under Biometrics industry. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.