Microsoft Word wlan security Assessment Countermeasures Final Draft Modified[1]


Figure 5 WLAN Infrastructure Mode



Download 470.11 Kb.
View original pdf
Page26/71
Date10.09.2021
Size470.11 Kb.
#57304
1   ...   22   23   24   25   26   27   28   29   ...   71
FULLTEXT01
ijsrp-p4303
Figure 5 WLAN Infrastructure Mode
Source: EUSSO
64
2.5 WLAN APPLICATIONS
The following tables summarize some of the many applications made possible through the power and flexibility of wireless LANs.
Table 3 Showing WLAN Topologies and Application Areas.
8

WLAN Topology

Application
Infrastructure
(Point-to-point link)
Cross-building interconnect Infrastructure Cell configuration) LAN extension Infrastructure Cell configuration) Nomadic access Ad hoc
(Peer-to-peer) Ad hoc networking

Wireless Local Area Network (WLAN): Security Risk Assessment and Countermeasures
Nwabude Arinze Sunday
- 12 -
Table 4 Organizations/Scenarios, WLAN Applications and Advantages
8

Download 470.11 Kb.

Share with your friends:
1   ...   22   23   24   25   26   27   28   29   ...   71




The database is protected by copyright ©ininet.org 2024
send message

    Main page