SlideShare a Scribd company logo
1. 5
5.1 1.
2.
digital 3.
4.
2
4.1 4.2
5.2
1.
2.
3.
4.
2. 5.3
WIRELESS LAN) 1.
2. Wireless
LAN WLAN)
5.4
1.
2.
Mobility) 3.
4. 5.
5.5
1.
PC Notebook
Pocket PC PCMCIA 2.
802.11
Cisco, Orinoco, Toshiba, 3Com,
Linksys 3. Access
Point) :
LAN
4)
5.6
3. 2 1.
Ad-Hoc)
2
Access point) 2.
Infrastructure)
Access
point)
5.7
1. WPAN
(Wireless Personal Area Network)
2 IR (Infra-Red) Bluetooth
3
10
2. WLAN (Wireless Local Area Network)
3. WMAN
(Wireless Metropolitan Area Network)
4. WWAN (Wireless Wide Area Network)
5.8 1.
FireWall)
2.
3.
User
Name and Password)
4.
WEP (wired equivalency
privacy key)
5. Wi-Fi Protected Access (WPA)
WEP
Network Adapter
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สาย

More Related Content

What's hot

เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
Kaii Eiei
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
Kaii Eiei
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
Kaii Eiei
 
Nanu
NanuNanu
Nanu
piyushu90
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
Kaii Eiei
 
STSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and servicesSTSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and services
Sylvie Boube-Politano
 
Why Go Beyond Encryption
Why Go Beyond EncryptionWhy Go Beyond Encryption
Why Go Beyond Encryption
guest990c6c
 
Wireless security
Wireless securityWireless security
Wireless security
Aurobindo Nayak
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
Open Knowledge Nepal
 

What's hot (9)

เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
 
Nanu
NanuNanu
Nanu
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
 
STSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and servicesSTSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and services
 
Why Go Beyond Encryption
Why Go Beyond EncryptionWhy Go Beyond Encryption
Why Go Beyond Encryption
 
Wireless security
Wireless securityWireless security
Wireless security
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
 

Viewers also liked

Brand You!
Brand You!Brand You!
Brand You!
Samuel Ballinger
 
It project manager
It project managerIt project manager
It project manager
kellylockett
 
вебинар фототерапия центр м арт 2013
вебинар фототерапия центр м арт 2013вебинар фототерапия центр м арт 2013
вебинар фототерапия центр м арт 2013Maria Fabricheva
 
Effective Tutoring
Effective TutoringEffective Tutoring
Effective Tutoring
heyitssara
 
Ortiz nelson production_libraries
Ortiz nelson production_librariesOrtiz nelson production_libraries
Ortiz nelson production_libraries
nelsonortiz2k13
 
Quimica presentacion
Quimica presentacionQuimica presentacion
Quimica presentacion
Diana Carolina Gutierrez Diaz
 
Ccp 154 noida..
Ccp 154 noida..Ccp 154 noida..
Ccp 154 noida..
hemu18792
 
you...
you...you...
you...
hemu18792
 
Atoms intro (2)
Atoms intro (2)Atoms intro (2)
Atoms intro (2)
Trnka
 
Figurative language
Figurative languageFigurative language
Figurative language
Trnka
 
Renaissance of sculpture
Renaissance of sculptureRenaissance of sculpture
Renaissance of sculpture
Camella Tagum
 
Kineticparticletheory (002)
Kineticparticletheory (002)Kineticparticletheory (002)
Kineticparticletheory (002)
Trnka
 
04 sumber internal(mc leod) revisi per 26092012
04 sumber internal(mc leod) revisi per 2609201204 sumber internal(mc leod) revisi per 26092012
04 sumber internal(mc leod) revisi per 26092012
Ikhsan Bz
 
หน่วยที่ 6 เครือข่ายคอมพิวเตอร์
หน่วยที่ 6 เครือข่ายคอมพิวเตอร์หน่วยที่ 6 เครือข่ายคอมพิวเตอร์
หน่วยที่ 6 เครือข่ายคอมพิวเตอร์
soifha
 
หน่วยที่ 4 อุปกรณ์เครือข่าย
หน่วยที่ 4 อุปกรณ์เครือข่ายหน่วยที่ 4 อุปกรณ์เครือข่าย
หน่วยที่ 4 อุปกรณ์เครือข่าย
soifha
 
Cosmic business center_gurgaon
Cosmic business center_gurgaonCosmic business center_gurgaon
Cosmic business center_gurgaon
hemu18792
 
Dss 15 12-2012
Dss 15 12-2012Dss 15 12-2012
Dss 15 12-2012
Ikhsan Bz
 

Viewers also liked (20)

Brand You!
Brand You!Brand You!
Brand You!
 
It project manager
It project managerIt project manager
It project manager
 
09 sip dss
09 sip dss09 sip dss
09 sip dss
 
вебинар фототерапия центр м арт 2013
вебинар фототерапия центр м арт 2013вебинар фототерапия центр м арт 2013
вебинар фототерапия центр м арт 2013
 
Effective Tutoring
Effective TutoringEffective Tutoring
Effective Tutoring
 
Ortiz nelson production_libraries
Ortiz nelson production_librariesOrtiz nelson production_libraries
Ortiz nelson production_libraries
 
Quimica presentacion
Quimica presentacionQuimica presentacion
Quimica presentacion
 
Ccp 154 noida..
Ccp 154 noida..Ccp 154 noida..
Ccp 154 noida..
 
you...
you...you...
you...
 
12 sip scm
12 sip scm12 sip scm
12 sip scm
 
Atoms intro (2)
Atoms intro (2)Atoms intro (2)
Atoms intro (2)
 
Figurative language
Figurative languageFigurative language
Figurative language
 
Cell Best Described
Cell Best DescribedCell Best Described
Cell Best Described
 
Renaissance of sculpture
Renaissance of sculptureRenaissance of sculpture
Renaissance of sculpture
 
Kineticparticletheory (002)
Kineticparticletheory (002)Kineticparticletheory (002)
Kineticparticletheory (002)
 
04 sumber internal(mc leod) revisi per 26092012
04 sumber internal(mc leod) revisi per 2609201204 sumber internal(mc leod) revisi per 26092012
04 sumber internal(mc leod) revisi per 26092012
 
หน่วยที่ 6 เครือข่ายคอมพิวเตอร์
หน่วยที่ 6 เครือข่ายคอมพิวเตอร์หน่วยที่ 6 เครือข่ายคอมพิวเตอร์
หน่วยที่ 6 เครือข่ายคอมพิวเตอร์
 
หน่วยที่ 4 อุปกรณ์เครือข่าย
หน่วยที่ 4 อุปกรณ์เครือข่ายหน่วยที่ 4 อุปกรณ์เครือข่าย
หน่วยที่ 4 อุปกรณ์เครือข่าย
 
Cosmic business center_gurgaon
Cosmic business center_gurgaonCosmic business center_gurgaon
Cosmic business center_gurgaon
 
Dss 15 12-2012
Dss 15 12-2012Dss 15 12-2012
Dss 15 12-2012
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สาย

  • 1. 1. 5 5.1 1. 2. digital 3. 4. 2 4.1 4.2 5.2 1. 2. 3. 4.
  • 2. 2. 5.3 WIRELESS LAN) 1. 2. Wireless LAN WLAN) 5.4 1. 2. Mobility) 3. 4. 5. 5.5 1. PC Notebook Pocket PC PCMCIA 2. 802.11 Cisco, Orinoco, Toshiba, 3Com, Linksys 3. Access Point) : LAN
  • 3. 4) 5.6 3. 2 1. Ad-Hoc) 2 Access point) 2. Infrastructure) Access point) 5.7 1. WPAN (Wireless Personal Area Network) 2 IR (Infra-Red) Bluetooth 3 10 2. WLAN (Wireless Local Area Network) 3. WMAN (Wireless Metropolitan Area Network)
  • 4. 4. WWAN (Wireless Wide Area Network) 5.8 1. FireWall) 2. 3. User Name and Password) 4. WEP (wired equivalency privacy key) 5. Wi-Fi Protected Access (WPA) WEP Network Adapter