際際滷

際際滷Share a Scribd company logo
ACKNOWLEDGEMENT
This report is spanned over a period of one week and the number of people who had helped us is
outstanding. To begin with, we would like to thank our project guide Professor MOHAMMAD
ASIF who has helped us throughout the period and has helped us through the times of need. Inspire
of their busy schedules, it was very kind of them to spare some of their precious time and give us
valuable suggestions which ultimately formed heart of this report. Professor MOHAMMAD
ASIF (Professor of Computer Engineering) was a great source of inspiration and allowed us to
work in the lab for extended hours.
We also extend our thanks to all the professors of our department for their valuable
guidance. We would also like to thank our fellow students for their support and good wishes.
Finally we thank entire computer engineering department for excellent facilities and
encouragement given during the course of report.
ABSTRACT
Gi-Fi stands for Gigabit fidelity. Gi-Fi is a wireless transmission system which is ten times faster
than other technology and its chip delivers short-range multi gigabit data transfer in a local
environment. Gi-Fi is a wireless technology which promises high speed short range data transfers
with speeds of up to 5 Gbps within a range of 10 meters. The Gi-Fi operates on the 60GHz
frequency band. This frequency band is currently mostly unused. This wireless technology named
as Gi-Fi. The benefits and features of this new technology can be helpful for use in development
of the next generation of devices and places. In this paper, the comparison is perform between Gi-
Fi and some of existing technologies with very high speed large files transfers within seconds it is
expected that Gi-Fi to be the preferred wireless technology used in home and office of future. Gi-
Fi is developed on an integrated wireless transceiver chip. It has both transmitter & receiver,
integrated on a single chip which is fabricated using the CMOS (complementary metaloxide
semiconductor) process and it also consists of a small antenna. Gi-Fi allows transferring large
videos, audio files, data files, etc. within few seconds.

More Related Content

Similar to 3.acknowledgement (gi fi technology) (20)

Gifi
GifiGifi
Gifi
Aishwarya Saseendran
A Seminar Report On Gi-Fi Technology
A Seminar Report On Gi-Fi TechnologyA Seminar Report On Gi-Fi Technology
A Seminar Report On Gi-Fi Technology
Kate Campbell
wifi versus gifi
wifi versus gifiwifi versus gifi
wifi versus gifi
JYOTI KHICHI
Cse gi-fi-technology-report
Cse gi-fi-technology-reportCse gi-fi-technology-report
Cse gi-fi-technology-report
aswath babu
Gi fi technology
Gi fi technologyGi fi technology
Gi fi technology
valentino jesse
Gifi
GifiGifi
Gifi
Sara Tazeen Mahjoor
Gi - Fi
Gi - FiGi - Fi
Gi - Fi
Raji Perumalla
GI-FI
GI-FIGI-FI
GI-FI
Shubhrika Sehgal
Gi fi technology ppt
Gi fi technology pptGi fi technology ppt
Gi fi technology ppt
deepakisguru
gi-fi (2)
gi-fi (2)gi-fi (2)
gi-fi (2)
Amarendra Kumar
Gi Fi.pptx
Gi Fi.pptxGi Fi.pptx
Gi Fi.pptx
GouthamReddii
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptx
CHARANBASAVARAJ1
Gi-fi Technology
Gi-fi TechnologyGi-fi Technology
Gi-fi Technology
OECLIB Odisha Electronics Control Library
1307.0616 gi fiiiiiiiii
1307.0616    gi fiiiiiiiii1307.0616    gi fiiiiiiiii
1307.0616 gi fiiiiiiiii
Harilal Punalur
Gi fi
Gi fiGi fi
Gi fi
NITA PAUL
IJETTCS-2015-03-15-29
IJETTCS-2015-03-15-29IJETTCS-2015-03-15-29
IJETTCS-2015-03-15-29
abhishek pratap singh
GIFI TECHNOLOGY
GIFI TECHNOLOGYGIFI TECHNOLOGY
GIFI TECHNOLOGY
Vuha Kothagorla
Gi fi Technology (next generation wireless technology)
Gi fi Technology (next generation wireless technology)Gi fi Technology (next generation wireless technology)
Gi fi Technology (next generation wireless technology)
Uday Wankhade
Gifi wireless Technology
Gifi wireless TechnologyGifi wireless Technology
Gifi wireless Technology
Tofik Kaida
Gi fi
Gi fiGi fi
Gi fi
Srihari

More from JIEMS Akkalkuwa (20)

4.report (gi fi technology)
4.report (gi fi technology)4.report (gi fi technology)
4.report (gi fi technology)
JIEMS Akkalkuwa
2.index (gi fi technology)
2.index (gi fi technology)2.index (gi fi technology)
2.index (gi fi technology)
JIEMS Akkalkuwa
1.frontpage (gi fi technology)
1.frontpage (gi fi technology)1.frontpage (gi fi technology)
1.frontpage (gi fi technology)
JIEMS Akkalkuwa
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)
JIEMS Akkalkuwa
3 (data security in local network using)
3 (data security in local network using)3 (data security in local network using)
3 (data security in local network using)
JIEMS Akkalkuwa
2 (data security in local network using)
2 (data security in local network using)2 (data security in local network using)
2 (data security in local network using)
JIEMS Akkalkuwa
1 (data security in local network using)
1 (data security in local network using)1 (data security in local network using)
1 (data security in local network using)
JIEMS Akkalkuwa
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
JIEMS Akkalkuwa
3.abstact (biometric security system)
3.abstact (biometric security system)3.abstact (biometric security system)
3.abstact (biometric security system)
JIEMS Akkalkuwa
2.index (biometric security system)
2.index (biometric security system)2.index (biometric security system)
2.index (biometric security system)
JIEMS Akkalkuwa
1.front page (biometric security system)
1.front page (biometric security system)1.front page (biometric security system)
1.front page (biometric security system)
JIEMS Akkalkuwa
4 (mobile computing)
4 (mobile computing)4 (mobile computing)
4 (mobile computing)
JIEMS Akkalkuwa
3 (mobile computing)
3 (mobile computing)3 (mobile computing)
3 (mobile computing)
JIEMS Akkalkuwa
2 (mobile computing)
2 (mobile computing)2 (mobile computing)
2 (mobile computing)
JIEMS Akkalkuwa
1 (mobile computing)
1 (mobile computing)1 (mobile computing)
1 (mobile computing)
JIEMS Akkalkuwa
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
JIEMS Akkalkuwa
3.abstract (stenography)
3.abstract (stenography)3.abstract (stenography)
3.abstract (stenography)
JIEMS Akkalkuwa
2.index (stenography)
2.index (stenography)2.index (stenography)
2.index (stenography)
JIEMS Akkalkuwa
1.front (stenography)
1.front (stenography)1.front (stenography)
1.front (stenography)
JIEMS Akkalkuwa
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
JIEMS Akkalkuwa
4.report (gi fi technology)
4.report (gi fi technology)4.report (gi fi technology)
4.report (gi fi technology)
JIEMS Akkalkuwa
2.index (gi fi technology)
2.index (gi fi technology)2.index (gi fi technology)
2.index (gi fi technology)
JIEMS Akkalkuwa
1.frontpage (gi fi technology)
1.frontpage (gi fi technology)1.frontpage (gi fi technology)
1.frontpage (gi fi technology)
JIEMS Akkalkuwa
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)
JIEMS Akkalkuwa
3 (data security in local network using)
3 (data security in local network using)3 (data security in local network using)
3 (data security in local network using)
JIEMS Akkalkuwa
2 (data security in local network using)
2 (data security in local network using)2 (data security in local network using)
2 (data security in local network using)
JIEMS Akkalkuwa
1 (data security in local network using)
1 (data security in local network using)1 (data security in local network using)
1 (data security in local network using)
JIEMS Akkalkuwa
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
JIEMS Akkalkuwa
3.abstact (biometric security system)
3.abstact (biometric security system)3.abstact (biometric security system)
3.abstact (biometric security system)
JIEMS Akkalkuwa
2.index (biometric security system)
2.index (biometric security system)2.index (biometric security system)
2.index (biometric security system)
JIEMS Akkalkuwa
1.front page (biometric security system)
1.front page (biometric security system)1.front page (biometric security system)
1.front page (biometric security system)
JIEMS Akkalkuwa
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
JIEMS Akkalkuwa
3.abstract (stenography)
3.abstract (stenography)3.abstract (stenography)
3.abstract (stenography)
JIEMS Akkalkuwa
2.index (stenography)
2.index (stenography)2.index (stenography)
2.index (stenography)
JIEMS Akkalkuwa
1.front (stenography)
1.front (stenography)1.front (stenography)
1.front (stenography)
JIEMS Akkalkuwa
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
JIEMS Akkalkuwa

Recently uploaded (20)

TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
samueljackson3773
AI-Powered Power Converter Design Workflow.pdf
AI-Powered Power Converter Design Workflow.pdfAI-Powered Power Converter Design Workflow.pdf
AI-Powered Power Converter Design Workflow.pdf
Aleksandr Terlo
Turbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdfTurbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdf
Totok Sulistiyanto
Defining the Future of Biophilic Design in Crete.pdf
Defining the Future of Biophilic Design in Crete.pdfDefining the Future of Biophilic Design in Crete.pdf
Defining the Future of Biophilic Design in Crete.pdf
ARENCOS
Instruction execution cycle _
Instruction execution cycle                  _Instruction execution cycle                  _
Instruction execution cycle _
SwatiHans10
Design and Analysis of Algorithms Unit 5
Design and Analysis of Algorithms Unit 5Design and Analysis of Algorithms Unit 5
Design and Analysis of Algorithms Unit 5
sureshkumara29
AIR FILTER system in internal combustion engine system.ppt
AIR FILTER system in internal combustion engine system.pptAIR FILTER system in internal combustion engine system.ppt
AIR FILTER system in internal combustion engine system.ppt
thisisparthipan1
Taykon-Kalite belgeleri
Taykon-Kalite belgeleriTaykon-Kalite belgeleri
Taykon-Kalite belgeleri
TAYKON
ESIT135 Problem Solving Using Python Notes of Unit-2 and Unit-3
ESIT135 Problem Solving Using Python Notes of Unit-2 and Unit-3ESIT135 Problem Solving Using Python Notes of Unit-2 and Unit-3
ESIT135 Problem Solving Using Python Notes of Unit-2 and Unit-3
prasadmutkule1
Helium Boosting & Decanting With Hydro Test Machine
Helium Boosting & Decanting With Hydro Test MachineHelium Boosting & Decanting With Hydro Test Machine
Helium Boosting & Decanting With Hydro Test Machine
Paskals Fluid Systems Pvt. Ltd.
Unit 1- Review of Basic Concepts-part 1.pptx
Unit 1- Review of Basic Concepts-part 1.pptxUnit 1- Review of Basic Concepts-part 1.pptx
Unit 1- Review of Basic Concepts-part 1.pptx
SujataSonawane11
GREEN BULIDING PPT FOR THE REFRENACE.PPT
GREEN BULIDING PPT FOR THE REFRENACE.PPTGREEN BULIDING PPT FOR THE REFRENACE.PPT
GREEN BULIDING PPT FOR THE REFRENACE.PPT
kamalkeerthan61
AO Star Algorithm in Artificial Intellligence
AO Star Algorithm in Artificial IntellligenceAO Star Algorithm in Artificial Intellligence
AO Star Algorithm in Artificial Intellligence
vipulkondekar
IoT-based-Electrical-Motor-Fault-Detection-System.pptx
IoT-based-Electrical-Motor-Fault-Detection-System.pptxIoT-based-Electrical-Motor-Fault-Detection-System.pptx
IoT-based-Electrical-Motor-Fault-Detection-System.pptx
atharvapardeshi03
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
csijjournal
惠悋惡 悋惠悋惶 悋悋愆悋悧 愆悛惠 悋悽惘愕悋悸
惠悋惡 悋惠悋惶 悋悋愆悋悧 愆悛惠 悋悽惘愕悋悸惠悋惡 悋惠悋惶 悋悋愆悋悧 愆悛惠 悋悽惘愕悋悸
惠悋惡 悋惠悋惶 悋悋愆悋悧 愆悛惠 悋悽惘愕悋悸
o774656624
Designing Flex and Rigid-Flex PCBs to Prevent Failure
Designing Flex and Rigid-Flex PCBs to Prevent FailureDesigning Flex and Rigid-Flex PCBs to Prevent Failure
Designing Flex and Rigid-Flex PCBs to Prevent Failure
Epec Engineered Technologies
ESIT135 Problem Solving Using Python Notes of Unit-3
ESIT135 Problem Solving Using Python Notes of Unit-3ESIT135 Problem Solving Using Python Notes of Unit-3
ESIT135 Problem Solving Using Python Notes of Unit-3
prasadmutkule1
Zero-Trust-Architecture-Reimagining-Network-Security.pptx
Zero-Trust-Architecture-Reimagining-Network-Security.pptxZero-Trust-Architecture-Reimagining-Network-Security.pptx
Zero-Trust-Architecture-Reimagining-Network-Security.pptx
yash98012
The Golden Gate Bridge a structural marvel inspired by mother nature.pptx
The Golden Gate Bridge a structural marvel inspired by mother nature.pptxThe Golden Gate Bridge a structural marvel inspired by mother nature.pptx
The Golden Gate Bridge a structural marvel inspired by mother nature.pptx
AkankshaRawat75
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
samueljackson3773
AI-Powered Power Converter Design Workflow.pdf
AI-Powered Power Converter Design Workflow.pdfAI-Powered Power Converter Design Workflow.pdf
AI-Powered Power Converter Design Workflow.pdf
Aleksandr Terlo
Turbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdfTurbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdf
Totok Sulistiyanto
Defining the Future of Biophilic Design in Crete.pdf
Defining the Future of Biophilic Design in Crete.pdfDefining the Future of Biophilic Design in Crete.pdf
Defining the Future of Biophilic Design in Crete.pdf
ARENCOS
Instruction execution cycle _
Instruction execution cycle                  _Instruction execution cycle                  _
Instruction execution cycle _
SwatiHans10
Design and Analysis of Algorithms Unit 5
Design and Analysis of Algorithms Unit 5Design and Analysis of Algorithms Unit 5
Design and Analysis of Algorithms Unit 5
sureshkumara29
AIR FILTER system in internal combustion engine system.ppt
AIR FILTER system in internal combustion engine system.pptAIR FILTER system in internal combustion engine system.ppt
AIR FILTER system in internal combustion engine system.ppt
thisisparthipan1
Taykon-Kalite belgeleri
Taykon-Kalite belgeleriTaykon-Kalite belgeleri
Taykon-Kalite belgeleri
TAYKON
ESIT135 Problem Solving Using Python Notes of Unit-2 and Unit-3
ESIT135 Problem Solving Using Python Notes of Unit-2 and Unit-3ESIT135 Problem Solving Using Python Notes of Unit-2 and Unit-3
ESIT135 Problem Solving Using Python Notes of Unit-2 and Unit-3
prasadmutkule1
Unit 1- Review of Basic Concepts-part 1.pptx
Unit 1- Review of Basic Concepts-part 1.pptxUnit 1- Review of Basic Concepts-part 1.pptx
Unit 1- Review of Basic Concepts-part 1.pptx
SujataSonawane11
GREEN BULIDING PPT FOR THE REFRENACE.PPT
GREEN BULIDING PPT FOR THE REFRENACE.PPTGREEN BULIDING PPT FOR THE REFRENACE.PPT
GREEN BULIDING PPT FOR THE REFRENACE.PPT
kamalkeerthan61
AO Star Algorithm in Artificial Intellligence
AO Star Algorithm in Artificial IntellligenceAO Star Algorithm in Artificial Intellligence
AO Star Algorithm in Artificial Intellligence
vipulkondekar
IoT-based-Electrical-Motor-Fault-Detection-System.pptx
IoT-based-Electrical-Motor-Fault-Detection-System.pptxIoT-based-Electrical-Motor-Fault-Detection-System.pptx
IoT-based-Electrical-Motor-Fault-Detection-System.pptx
atharvapardeshi03
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
INVESTIGATION OF PUEA IN COGNITIVE RADIO NETWORKS USING ENERGY DETECTION IN D...
csijjournal
惠悋惡 悋惠悋惶 悋悋愆悋悧 愆悛惠 悋悽惘愕悋悸
惠悋惡 悋惠悋惶 悋悋愆悋悧 愆悛惠 悋悽惘愕悋悸惠悋惡 悋惠悋惶 悋悋愆悋悧 愆悛惠 悋悽惘愕悋悸
惠悋惡 悋惠悋惶 悋悋愆悋悧 愆悛惠 悋悽惘愕悋悸
o774656624
Designing Flex and Rigid-Flex PCBs to Prevent Failure
Designing Flex and Rigid-Flex PCBs to Prevent FailureDesigning Flex and Rigid-Flex PCBs to Prevent Failure
Designing Flex and Rigid-Flex PCBs to Prevent Failure
Epec Engineered Technologies
ESIT135 Problem Solving Using Python Notes of Unit-3
ESIT135 Problem Solving Using Python Notes of Unit-3ESIT135 Problem Solving Using Python Notes of Unit-3
ESIT135 Problem Solving Using Python Notes of Unit-3
prasadmutkule1
Zero-Trust-Architecture-Reimagining-Network-Security.pptx
Zero-Trust-Architecture-Reimagining-Network-Security.pptxZero-Trust-Architecture-Reimagining-Network-Security.pptx
Zero-Trust-Architecture-Reimagining-Network-Security.pptx
yash98012
The Golden Gate Bridge a structural marvel inspired by mother nature.pptx
The Golden Gate Bridge a structural marvel inspired by mother nature.pptxThe Golden Gate Bridge a structural marvel inspired by mother nature.pptx
The Golden Gate Bridge a structural marvel inspired by mother nature.pptx
AkankshaRawat75

3.acknowledgement (gi fi technology)

  • 1. ACKNOWLEDGEMENT This report is spanned over a period of one week and the number of people who had helped us is outstanding. To begin with, we would like to thank our project guide Professor MOHAMMAD ASIF who has helped us throughout the period and has helped us through the times of need. Inspire of their busy schedules, it was very kind of them to spare some of their precious time and give us valuable suggestions which ultimately formed heart of this report. Professor MOHAMMAD ASIF (Professor of Computer Engineering) was a great source of inspiration and allowed us to work in the lab for extended hours. We also extend our thanks to all the professors of our department for their valuable guidance. We would also like to thank our fellow students for their support and good wishes. Finally we thank entire computer engineering department for excellent facilities and encouragement given during the course of report.
  • 2. ABSTRACT Gi-Fi stands for Gigabit fidelity. Gi-Fi is a wireless transmission system which is ten times faster than other technology and its chip delivers short-range multi gigabit data transfer in a local environment. Gi-Fi is a wireless technology which promises high speed short range data transfers with speeds of up to 5 Gbps within a range of 10 meters. The Gi-Fi operates on the 60GHz frequency band. This frequency band is currently mostly unused. This wireless technology named as Gi-Fi. The benefits and features of this new technology can be helpful for use in development of the next generation of devices and places. In this paper, the comparison is perform between Gi- Fi and some of existing technologies with very high speed large files transfers within seconds it is expected that Gi-Fi to be the preferred wireless technology used in home and office of future. Gi- Fi is developed on an integrated wireless transceiver chip. It has both transmitter & receiver, integrated on a single chip which is fabricated using the CMOS (complementary metaloxide semiconductor) process and it also consists of a small antenna. Gi-Fi allows transferring large videos, audio files, data files, etc. within few seconds.