Browse Definitions :
Definition

LiFi

Contributor(s): Matthew Haughn

LiFi is a wireless optical networking technology that uses light-emitting diodes (LEDs) for data transmission.

LiFi is designed to use LED light bulbs similar to those currently in use in many energy-conscious homes and offices. However, LiFi bulbs are outfitted with a chip that modulates the light imperceptibly for optical data transmission. LiFi data is transmitted by the LED bulbs and received by photoreceptors.

LiFi's early developmental models were capable of 150 megabits-per-second (Mbps). Some commercial kits enabling that speed have been released. In the lab, with stronger LEDs and different technology, researchers have enabled 10 gigabits-per-second (Gbps), which is faster than 802.11ad

Benefits of LiFi:

  • Higher speeds than Wi-Fi.
  • 10000 times the frequency spectrum of radio.
  • More secure because data cannot be intercepted without a clear line of sight.
  • Prevents piggybacking.
  • Eliminates neighboring network interference.
  • Unimpeded by radio interference.
  • Does not create interference in sensitive electronics, making it better for use in environments like hospitals and aircraft.

By using LiFi in all the lights in and around a building, the technology could enable greater area of coverage than a single WiFi router. Drawbacks to the technology include the need for a clear line of sight, difficulties with mobility and the requirement that lights stay on for operation.

This was last updated in November 2013

Continue Reading About LiFi

Join the conversation

2 comments

Send me notifications when other members comment.

Please create a username to comment.

Where should the ground and left+right speaker wire be connected to in order to complete the circuit?
Cancel
You can purchase LiFi units at lifilighting.com …. A lot of these articles are from research back a few years ago … The units are now at Gigabit speeds and ready for install … 
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close