Preview

Gi-Fi

Best Essays
Open Document
Open Document
3711 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Gi-Fi
UACEE International Journal of Advances in Computer Networks and its Security - Volume 2: Issue 3 [ISSN 2250 - 3757]

Evaluation of Gi-Fi Technology for Short-Range,
High-Rate Wireless Communication
Marzieh yazdanipour

Mina Yazdanipour

School of Information Technology
Jawaharlal Nehru Technological University
Hyderabad, India
E-mail:m_yazdanypoor@yahoo.com

College of Commerce and Business Management
Osmania University
Hyderabad, India.
E-mail: ammfr_66@yahoo.com

Afsaneh Yazdanipour

Amin Mehdipour

Department of Engineering
Iran Zamin University
Isfahan, Iran
E-mail: mehr_parand@yahoo.com

Department of Engineering
Jawaharlal Nehru Technological University
Hyderabad, India
E-mail: am_mehdipour@yahoo.com

CMOS (complementary metal–oxide–semiconductor) process
[5, 6].It will allow wireless transfer of audio and video data up to 5 gigabits per second, ten times the current maximum wireless transfer rate, at one-tenth of the cost, usually within a range of 10 meters [5]. In fact, GiFi is a wireless transmission system which is ten times faster than Wi-Fi and it is expected a revolution networking in offices and homes by implementing high-speed wireless environments. It utilizes a 5mm square chip and a 1mm wide antenna burning less than 2milli watts of power to transmit data wirelessly over short distances, much like Bluetooth [6].

Abstract—GiFi is a wireless transmission system which is ten times faster than Wi-Fi and it’s chip delivers short-range multigigabit data transfer in an indoor environment. In this paper this technology is defined in detail. Also a comparison is perform between Gi-Fi and some of existing technologies and it shows that this gigabit wireless technology has an edge over current technologies due to its high speed data transfer rate that is 5
Gbps, low power consumption and low frequency interference.
The benefits and features of this new technology are explained and the applications for that are prescribed that can be helpful for use in



References: Second Edition, Sebastopol, CA: O’Reilly & Associates, Inc., 2005. Press, 2008. N. Golmie, ―Bluetooth Dynamic Scheduling and Interference Mitigation‖, 2004. Application of Traffic Engineering Over Ad Hoc Networks‖, Unpublished, 2003. ―Imagination‖, Research report, NICTA, 2008. Gowtham S Shetty, ―GiFi: Next Generation Wireless Technology‖, Seminar report, Visvesvaraya Technological university Belgaum, 2011. ―Gigabit Wi-Fi looms large‖, Copyright © Wireless Watch, 2004. ―Bluetooth‖, [Online], Available at: http://www.bluetooth.com, 2009. S.Dheeraj, S.Gopichand, ―Gi-Fi: New Era of Wireless Technology‖, [Online], Available at: http://www.yuvaengineers.com/?p=570, 2010.

You May Also Find These Documents Helpful

  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 2 RFP Bidder’s Conference © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    Lan Consulting Plan

    • 2879 Words
    • 12 Pages

    Axia College. (2006). Network security. Retrieved August 28, 2009, from Axia College, Week Seven, IT 240 Intro to LAN Technologies.…

    • 2879 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    When it comes to making improvements to your technology within your company Party Plates, there are some wirelesses technologies that we recommend will be great for your company to build and expand further than you ever thought that it could. Making sure that you are able to reach beyond your regular clients and branch out to all of those that uses all forms of wireless technology. We will show you how you will be able to meet individuals ' needs, as well as big retail corporations, too. You will see that the wireless technology is a system that is easy to learn and train to other employees and will be in the right price range for your company 's needs.…

    • 1360 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Hussein, Handbook of Information Security ( I, 38-64). Hoboken, New Jersey: John Wiley & Sons,…

    • 483 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nist 800-125

    • 15467 Words
    • 62 Pages

    Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 January 2011…

    • 15467 Words
    • 62 Pages
    Powerful Essays
  • Powerful Essays

    SAMPLE Security Policy

    • 3395 Words
    • 13 Pages

    References: Hausman, K., Weiss, M., & Barrett, D. (2011). Comptia security sy0-301. (3rd ed.). Pearson Education, Inc.…

    • 3395 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Toshendra Sharma, 113050013 Saptarshi Sarkar, 113050044 Pankaj Vanwari, 114058001 Under guidance of: Prof. Bernard Menezes Outline  Bluetooth history  Bluetooth Protocol  Layers in Bluetooth  Security in Bluetooth  Vulnerabilities  Attacks/Exploits  Demonstration Bluetooth Technology  proprietary open wireless technology standard for exchanging data over short distances  was originally conceived as a wireless alternative to RS232 data cables  It uses short wave length radio transmission in ISM band from 2400-2480 MHz Benefits of Bluetooth Technology  Cable replacement  Ease of file sharing  Wireless synchronization  Internet connectivity Implementation  frequency hopping spread spectrum  chops up the data being sent and transmits chunks of it up to 79 bands  Packet Based Protocol with a Master-Slave Structure  Piconet  A piconet is an ad-hoc computer network which used to link group of devices, where protocols allow one master device to interconnect with up to seven active slaves…

    • 935 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    So-called Next Generation radios are designed—not surprisingly—to support Next Generation broadband networks and have evolved a set of features that take advantage of the packetized nature of Ethernet/IP traffic to make maximum use of the available licensed spectrum. Next Generation microwave features generally include all or a combination of the following: • • • • • • • Software scalable high capacity, with throughputs of 1 Gbit/s or…

    • 1384 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    review of wimax

    • 528 Words
    • 3 Pages

    This requirement can be achieved if system design engineers overcome the problem of bandwidth efficiency by increasing the data transmission rate and capacity to use multi-level modulation and demodulation, instead of increasing the radio frequency bandwidth. Higher data rate can be achieved from 100Mbps to 1Gbps. Low transfer delay time to 50ms or even lower then 500ms ensure the throughput for communication between the terminals.…

    • 528 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Li-Fi Technology

    • 2515 Words
    • 11 Pages

    Li-Fi or Light Fidelity is a technology that uses light emitting diodes to transmit data wirelessly. It was first demonstrated at a TED talk in 2011 by German physicist Harald Haas. This is a free band that does not need any license. Hence it is cheaper than Wi-FI. Wi-Fi, is a popular technology that allows an electronic device to exchange data or connect to the internet wirelessly using radio waves the visible light spectrum is larger than the radio spectrum which provides better flexibility in its use. Communications over a very high speed with a theoretical limit of 10 GB per second.…

    • 2515 Words
    • 11 Pages
    Powerful Essays

Related Topics