SlideShare a Scribd company logo
1 of 1
Download to read offline
The three safety measures that are critical to WLANS are as below.
1.Virtual private networks: It giuves escurity by generating an translated tunnel with the popular
internet that sheilds data from unauthorised acess.it translates relationship at both at sending and
receiving end.Iit enables a high level of belief with the help of a quality security apparatus.
2.control broadcast area :Acess point is having a facility that permits to regulate the strength of
singal and direction of signal.
.For this reason abroad from windows as much as feasible steering the signal direction is very
much secured in wireless LAN .
3.Encrypt network traffic: wireless encrypted protocol(WEP) security gives many kinds of
translated communication between client and Aces point
It preserves with communucation away with tempering,evesdropping .the invisible key is
preloved to translate the packets ahead which conveys to establish the packets are not altered in
transit.
Solution
The three safety measures that are critical to WLANS are as below.
1.Virtual private networks: It giuves escurity by generating an translated tunnel with the popular
internet that sheilds data from unauthorised acess.it translates relationship at both at sending and
receiving end.Iit enables a high level of belief with the help of a quality security apparatus.
2.control broadcast area :Acess point is having a facility that permits to regulate the strength of
singal and direction of signal.
.For this reason abroad from windows as much as feasible steering the signal direction is very
much secured in wireless LAN .
3.Encrypt network traffic: wireless encrypted protocol(WEP) security gives many kinds of
translated communication between client and Aces point
It preserves with communucation away with tempering,evesdropping .the invisible key is
preloved to translate the packets ahead which conveys to establish the packets are not altered in
transit.

More Related Content

Similar to The three safety measures that are critical to WLANS are as below..pdf

4g security presentation
4g security presentation4g security presentation
4g security presentation
Kyle Ly
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
al-sari7
 

Similar to The three safety measures that are critical to WLANS are as below..pdf (20)

Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Networking Brief Overview
Networking Brief OverviewNetworking Brief Overview
Networking Brief Overview
 
Mobile slide
Mobile slideMobile slide
Mobile slide
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
Wireless network Project Class 12
Wireless network Project Class 12Wireless network Project Class 12
Wireless network Project Class 12
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
wireless networking
wireless networkingwireless networking
wireless networking
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
Vpn
VpnVpn
Vpn
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
Secured Data Transmission
Secured Data Transmission Secured Data Transmission
Secured Data Transmission
 

More from annamalaiagencies

massMass is the property which reflects the quan.pdf
                     massMass is the property which reflects the quan.pdf                     massMass is the property which reflects the quan.pdf
massMass is the property which reflects the quan.pdf
annamalaiagencies
 
The lyric solvers in MATLAB® solve these styles of first-order ODEs.pdf
The lyric solvers in MATLAB® solve these styles of first-order ODEs.pdfThe lyric solvers in MATLAB® solve these styles of first-order ODEs.pdf
The lyric solvers in MATLAB® solve these styles of first-order ODEs.pdf
annamalaiagencies
 
The most important criteria when a company is considering a supplier.pdf
The most important criteria when a company is considering a supplier.pdfThe most important criteria when a company is considering a supplier.pdf
The most important criteria when a company is considering a supplier.pdf
annamalaiagencies
 
Live LoadsLive Load vs Dead LoadLive loads are consists of occup.pdf
Live LoadsLive Load vs Dead LoadLive loads are consists of occup.pdfLive LoadsLive Load vs Dead LoadLive loads are consists of occup.pdf
Live LoadsLive Load vs Dead LoadLive loads are consists of occup.pdf
annamalaiagencies
 
In our fingers, tendons are present. Tendons are bone-muscle attachm.pdf
In our fingers, tendons are present. Tendons are bone-muscle attachm.pdfIn our fingers, tendons are present. Tendons are bone-muscle attachm.pdf
In our fingers, tendons are present. Tendons are bone-muscle attachm.pdf
annamalaiagencies
 
i) Experiment is carried out to test whether B. cereus or soil bacte.pdf
i) Experiment is carried out to test whether B. cereus or soil bacte.pdfi) Experiment is carried out to test whether B. cereus or soil bacte.pdf
i) Experiment is carried out to test whether B. cereus or soil bacte.pdf
annamalaiagencies
 
Big Data in Healthcare Made Simple Where It Stands Today and Where .pdf
Big Data in Healthcare Made Simple Where It Stands Today and Where .pdfBig Data in Healthcare Made Simple Where It Stands Today and Where .pdf
Big Data in Healthcare Made Simple Where It Stands Today and Where .pdf
annamalaiagencies
 

More from annamalaiagencies (20)

volume of NaOh = Volume of HCl ( if both concent.pdf
                     volume of NaOh = Volume of HCl  ( if both concent.pdf                     volume of NaOh = Volume of HCl  ( if both concent.pdf
volume of NaOh = Volume of HCl ( if both concent.pdf
 
there is no picture figure of the compound provi.pdf
                     there is no picture figure of the compound provi.pdf                     there is no picture figure of the compound provi.pdf
there is no picture figure of the compound provi.pdf
 
nvm i got it. Nickel nitrate will split when goin.pdf
                     nvm i got it. Nickel nitrate will split when goin.pdf                     nvm i got it. Nickel nitrate will split when goin.pdf
nvm i got it. Nickel nitrate will split when goin.pdf
 
Which of the following are true when comparing TCPIP to the OSI Ref.pdf
Which of the following are true when comparing TCPIP to the OSI Ref.pdfWhich of the following are true when comparing TCPIP to the OSI Ref.pdf
Which of the following are true when comparing TCPIP to the OSI Ref.pdf
 
z = (x - mean)SDz = (50 - 42)10 = 0.8Solutionz = (.pdf
z = (x - mean)SDz = (50 - 42)10 = 0.8Solutionz = (.pdfz = (x - mean)SDz = (50 - 42)10 = 0.8Solutionz = (.pdf
z = (x - mean)SDz = (50 - 42)10 = 0.8Solutionz = (.pdf
 
massMass is the property which reflects the quan.pdf
                     massMass is the property which reflects the quan.pdf                     massMass is the property which reflects the quan.pdf
massMass is the property which reflects the quan.pdf
 
The lyric solvers in MATLAB® solve these styles of first-order ODEs.pdf
The lyric solvers in MATLAB® solve these styles of first-order ODEs.pdfThe lyric solvers in MATLAB® solve these styles of first-order ODEs.pdf
The lyric solvers in MATLAB® solve these styles of first-order ODEs.pdf
 
The most important criteria when a company is considering a supplier.pdf
The most important criteria when a company is considering a supplier.pdfThe most important criteria when a company is considering a supplier.pdf
The most important criteria when a company is considering a supplier.pdf
 
The data structures that are associated with system call areThe op.pdf
The data structures that are associated with system call areThe op.pdfThe data structures that are associated with system call areThe op.pdf
The data structures that are associated with system call areThe op.pdf
 
it is non linear order is 2 please repost the que.pdf
                     it is non linear order is 2 please repost the que.pdf                     it is non linear order is 2 please repost the que.pdf
it is non linear order is 2 please repost the que.pdf
 
Question seems incomplete. Please provide the table.Thanks!!So.pdf
Question seems incomplete. Please provide the table.Thanks!!So.pdfQuestion seems incomplete. Please provide the table.Thanks!!So.pdf
Question seems incomplete. Please provide the table.Thanks!!So.pdf
 
Program for prime numbers using Sieveof Eratosthenese Algorithm#i.pdf
Program for prime numbers using Sieveof Eratosthenese Algorithm#i.pdfProgram for prime numbers using Sieveof Eratosthenese Algorithm#i.pdf
Program for prime numbers using Sieveof Eratosthenese Algorithm#i.pdf
 
Note according to our guidelines we have to answer for one question.pdf
Note according to our guidelines we have to answer for one question.pdfNote according to our guidelines we have to answer for one question.pdf
Note according to our guidelines we have to answer for one question.pdf
 
Live LoadsLive Load vs Dead LoadLive loads are consists of occup.pdf
Live LoadsLive Load vs Dead LoadLive loads are consists of occup.pdfLive LoadsLive Load vs Dead LoadLive loads are consists of occup.pdf
Live LoadsLive Load vs Dead LoadLive loads are consists of occup.pdf
 
elemination reaction .pdf
                     elemination reaction                             .pdf                     elemination reaction                             .pdf
elemination reaction .pdf
 
In our fingers, tendons are present. Tendons are bone-muscle attachm.pdf
In our fingers, tendons are present. Tendons are bone-muscle attachm.pdfIn our fingers, tendons are present. Tendons are bone-muscle attachm.pdf
In our fingers, tendons are present. Tendons are bone-muscle attachm.pdf
 
D. orientation note ml decides the orientation .pdf
                     D. orientation  note ml decides the orientation .pdf                     D. orientation  note ml decides the orientation .pdf
D. orientation note ml decides the orientation .pdf
 
i) Experiment is carried out to test whether B. cereus or soil bacte.pdf
i) Experiment is carried out to test whether B. cereus or soil bacte.pdfi) Experiment is carried out to test whether B. cereus or soil bacte.pdf
i) Experiment is carried out to test whether B. cereus or soil bacte.pdf
 
Big Data in Healthcare Made Simple Where It Stands Today and Where .pdf
Big Data in Healthcare Made Simple Where It Stands Today and Where .pdfBig Data in Healthcare Made Simple Where It Stands Today and Where .pdf
Big Data in Healthcare Made Simple Where It Stands Today and Where .pdf
 
B. molar mass .pdf
                     B. molar mass                                    .pdf                     B. molar mass                                    .pdf
B. molar mass .pdf
 

Recently uploaded

MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
cupulin
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 

Recently uploaded (20)

Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 

The three safety measures that are critical to WLANS are as below..pdf

  • 1. The three safety measures that are critical to WLANS are as below. 1.Virtual private networks: It giuves escurity by generating an translated tunnel with the popular internet that sheilds data from unauthorised acess.it translates relationship at both at sending and receiving end.Iit enables a high level of belief with the help of a quality security apparatus. 2.control broadcast area :Acess point is having a facility that permits to regulate the strength of singal and direction of signal. .For this reason abroad from windows as much as feasible steering the signal direction is very much secured in wireless LAN . 3.Encrypt network traffic: wireless encrypted protocol(WEP) security gives many kinds of translated communication between client and Aces point It preserves with communucation away with tempering,evesdropping .the invisible key is preloved to translate the packets ahead which conveys to establish the packets are not altered in transit. Solution The three safety measures that are critical to WLANS are as below. 1.Virtual private networks: It giuves escurity by generating an translated tunnel with the popular internet that sheilds data from unauthorised acess.it translates relationship at both at sending and receiving end.Iit enables a high level of belief with the help of a quality security apparatus. 2.control broadcast area :Acess point is having a facility that permits to regulate the strength of singal and direction of signal. .For this reason abroad from windows as much as feasible steering the signal direction is very much secured in wireless LAN . 3.Encrypt network traffic: wireless encrypted protocol(WEP) security gives many kinds of translated communication between client and Aces point It preserves with communucation away with tempering,evesdropping .the invisible key is preloved to translate the packets ahead which conveys to establish the packets are not altered in transit.