SlideShare a Scribd company logo
1 of 4
5
5.1
o
o digital
o
o 2
o
o
5.2
o
o
o
o
5.3 WIRELESS LAN)
o
o Wireless LAN WLAN)
5.4
o
o Mobility)
o
o
o
5.5
o PC Notebook Pocket PC
PCMCIA
o 802.11 Cisco,
Orinoco, Toshiba, 3Com, Linksys
o Access Point) :
LAN
4)
5.6
2
1. Ad-Hoc)
2
Access point)
2. Infrastructure)
Access point)
5.7
1. WPAN (Wireless Personal Area Network)
2 IR
(Infra-Red) Bluetooth
3
10
2. WLAN (Wireless Local Area Network)
3. WMAN (Wireless Metropolitan Area Network)
4. WWAN (Wireless Wide Area Network)
5.8
o FireWall)
o
o User Name and
Password)
o WEP (wired equivalency privacy key)
o Wi-Fi Protected Access (WPA)
WEP
Network Adapter

More Related Content

What's hot

เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศKaii Eiei
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศKaii Eiei
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศKaii Eiei
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.igede tirtanata
 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Securityh_marvin
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and securityakki_hearts
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi securityrajakhurram
 
Wireless Spreading of WiFi APs Infections Using WPS Flaws
Wireless Spreading of WiFi APs Infections Using WPS FlawsWireless Spreading of WiFi APs Infections Using WPS Flaws
Wireless Spreading of WiFi APs Infections Using WPS FlawsAmirali Sanatinia
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngOpen Knowledge Nepal
 

What's hot (18)

เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
 
Bluetooth [in]security
Bluetooth [in]securityBluetooth [in]security
Bluetooth [in]security
 
Nanu
NanuNanu
Nanu
 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
Wireless Spreading of WiFi APs Infections Using WPS Flaws
Wireless Spreading of WiFi APs Infections Using WPS FlawsWireless Spreading of WiFi APs Infections Using WPS Flaws
Wireless Spreading of WiFi APs Infections Using WPS Flaws
 
Ccna 1 9
Ccna 1  9Ccna 1  9
Ccna 1 9
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
Blue1
Blue1Blue1
Blue1
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

Viewers also liked

20150312 javier gallardo sage jornada cx
20150312 javier gallardo sage jornada cx20150312 javier gallardo sage jornada cx
20150312 javier gallardo sage jornada cxwoodygris
 
Best healing promises 2
Best healing promises 2Best healing promises 2
Best healing promises 2Nickolas Lind
 
Diploma, Michael Legesse
Diploma, Michael LegesseDiploma, Michael Legesse
Diploma, Michael LegesseMichael Legesse
 
овощи с огорода
овощи с огородаовощи с огорода
овощи с огородаvirtualtaganrog
 
нод по апликации с элементами рисования для детей второй младшей группы
нод по апликации с элементами рисования для детей второй младшей группынод по апликации с элементами рисования для детей второй младшей группы
нод по апликации с элементами рисования для детей второй младшей группыvirtualtaganrog
 
Everything computer IT related solutions-6 page profile
Everything computer IT related solutions-6 page profileEverything computer IT related solutions-6 page profile
Everything computer IT related solutions-6 page profileCloud Solutions SA
 
Viwa Invest-GmbH-pressemeldung-2015-2
Viwa Invest-GmbH-pressemeldung-2015-2Viwa Invest-GmbH-pressemeldung-2015-2
Viwa Invest-GmbH-pressemeldung-2015-2ViWa Invest GmbH
 
How to-write-academic-acknowledgements
How to-write-academic-acknowledgementsHow to-write-academic-acknowledgements
How to-write-academic-acknowledgementsNaveed Ahmed Unar
 
Applicazioni Windows Store con Kinect 2
Applicazioni Windows Store con Kinect 2 Applicazioni Windows Store con Kinect 2
Applicazioni Windows Store con Kinect 2 Massimo Bonanni
 
Route of entry efffects by diffrent chemicals & PPE
Route of entry efffects by diffrent chemicals & PPERoute of entry efffects by diffrent chemicals & PPE
Route of entry efffects by diffrent chemicals & PPESalim Solanki
 

Viewers also liked (13)

20150312 javier gallardo sage jornada cx
20150312 javier gallardo sage jornada cx20150312 javier gallardo sage jornada cx
20150312 javier gallardo sage jornada cx
 
Setingan mikrotik
Setingan mikrotikSetingan mikrotik
Setingan mikrotik
 
Affaires Sunglass
Affaires SunglassAffaires Sunglass
Affaires Sunglass
 
Best healing promises 2
Best healing promises 2Best healing promises 2
Best healing promises 2
 
Diploma, Michael Legesse
Diploma, Michael LegesseDiploma, Michael Legesse
Diploma, Michael Legesse
 
овощи с огорода
овощи с огородаовощи с огорода
овощи с огорода
 
Лето
ЛетоЛето
Лето
 
нод по апликации с элементами рисования для детей второй младшей группы
нод по апликации с элементами рисования для детей второй младшей группынод по апликации с элементами рисования для детей второй младшей группы
нод по апликации с элементами рисования для детей второй младшей группы
 
Everything computer IT related solutions-6 page profile
Everything computer IT related solutions-6 page profileEverything computer IT related solutions-6 page profile
Everything computer IT related solutions-6 page profile
 
Viwa Invest-GmbH-pressemeldung-2015-2
Viwa Invest-GmbH-pressemeldung-2015-2Viwa Invest-GmbH-pressemeldung-2015-2
Viwa Invest-GmbH-pressemeldung-2015-2
 
How to-write-academic-acknowledgements
How to-write-academic-acknowledgementsHow to-write-academic-acknowledgements
How to-write-academic-acknowledgements
 
Applicazioni Windows Store con Kinect 2
Applicazioni Windows Store con Kinect 2 Applicazioni Windows Store con Kinect 2
Applicazioni Windows Store con Kinect 2
 
Route of entry efffects by diffrent chemicals & PPE
Route of entry efffects by diffrent chemicals & PPERoute of entry efffects by diffrent chemicals & PPE
Route of entry efffects by diffrent chemicals & PPE
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Wireless Networking Standards and Technologies Explained

  • 2. 5.3 WIRELESS LAN) o o Wireless LAN WLAN) 5.4 o o Mobility) o o o 5.5 o PC Notebook Pocket PC PCMCIA o 802.11 Cisco, Orinoco, Toshiba, 3Com, Linksys o Access Point) : LAN 4) 5.6 2
  • 3. 1. Ad-Hoc) 2 Access point) 2. Infrastructure) Access point) 5.7 1. WPAN (Wireless Personal Area Network) 2 IR (Infra-Red) Bluetooth 3 10 2. WLAN (Wireless Local Area Network) 3. WMAN (Wireless Metropolitan Area Network) 4. WWAN (Wireless Wide Area Network) 5.8
  • 4. o FireWall) o o User Name and Password) o WEP (wired equivalency privacy key) o Wi-Fi Protected Access (WPA) WEP Network Adapter