SlideShare une entreprise Scribd logo
1  sur  4
5.1
o
o digital
o
o 2
o
o
5.2
o
o
o
o
5.3 WIRELESS LAN)
o
o Wireless LAN WLAN)
5.4
o
o Mobility)
o
o
o
5.5
o PC Notebook Pocket PC
PCMCIA
o 802.11 Cisco,
Orinoco, Toshiba, 3Com, Linksys
o Access Point) :
LAN
4)
5.6
2
1. Ad-Hoc)
2
Access point)
2. Infrastructure)
Access point)
5.7
1. WPAN (Wireless Personal Area Network)
2 IR
(Infra-Red) Bluetooth
3
10
2. WLAN (Wireless Local Area Network)
3. WMAN (Wireless Metropolitan Area Network)
4. WWAN (Wireless Wide Area Network)
5.8
o FireWall)
o
o User Name and
Password)
o WEP (wired equivalency privacy key)
o Wi-Fi Protected Access (WPA)
WEP
Network Adapter
-

Contenu connexe

Tendances

เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศKaii Eiei
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศKaii Eiei
 
หน่วยที่ 1ความหมายและความสำคัญของเครือข่ายคอมพิวเตอร์
หน่วยที่ 1ความหมายและความสำคัญของเครือข่ายคอมพิวเตอร์หน่วยที่ 1ความหมายและความสำคัญของเครือข่ายคอมพิวเตอร์
หน่วยที่ 1ความหมายและความสำคัญของเครือข่ายคอมพิวเตอร์natnathapong
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศKaii Eiei
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.igede tirtanata
 
Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyahSeptafiansyah P
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi securityrajakhurram
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and securityakki_hearts
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngOpen Knowledge Nepal
 

Tendances (19)

เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
 
หน่วยที่ 1ความหมายและความสำคัญของเครือข่ายคอมพิวเตอร์
หน่วยที่ 1ความหมายและความสำคัญของเครือข่ายคอมพิวเตอร์หน่วยที่ 1ความหมายและความสำคัญของเครือข่ายคอมพิวเตอร์
หน่วยที่ 1ความหมายและความสำคัญของเครือข่ายคอมพิวเตอร์
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
 
Bluetooth [in]security
Bluetooth [in]securityBluetooth [in]security
Bluetooth [in]security
 
Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyah
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Cracking WPA/WPA2 with Non-Dictionary Attacks
Cracking WPA/WPA2 with Non-Dictionary AttacksCracking WPA/WPA2 with Non-Dictionary Attacks
Cracking WPA/WPA2 with Non-Dictionary Attacks
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
 
WIFI Hacking
WIFI HackingWIFI Hacking
WIFI Hacking
 
Wifi hacking
Wifi hackingWifi hacking
Wifi hacking
 
Nanu
NanuNanu
Nanu
 
Wireless security
Wireless securityWireless security
Wireless security
 
Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
 

En vedette

Project Management Professional(PMP) Broucher | KnowledgeHut.com
Project Management Professional(PMP) Broucher | KnowledgeHut.comProject Management Professional(PMP) Broucher | KnowledgeHut.com
Project Management Professional(PMP) Broucher | KnowledgeHut.comKnowledgeHut_Global
 
หน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้น
หน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้นหน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้น
หน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้นaun-twn
 
Mumbai kiosk Outdoor Advertising Advertising Media - Shrii Ganness Advt - Uni...
Mumbai kiosk Outdoor Advertising Advertising Media - Shrii Ganness Advt - Uni...Mumbai kiosk Outdoor Advertising Advertising Media - Shrii Ganness Advt - Uni...
Mumbai kiosk Outdoor Advertising Advertising Media - Shrii Ganness Advt - Uni...Suraj Partaap Singh
 
อุปกรณ์เครือข่าย
อุปกรณ์เครือข่ายอุปกรณ์เครือข่าย
อุปกรณ์เครือข่ายaun-twn
 
หน่วยที่ 3 รูปร่างเครือข่าย (topology)
หน่วยที่ 3  รูปร่างเครือข่าย (topology)หน่วยที่ 3  รูปร่างเครือข่าย (topology)
หน่วยที่ 3 รูปร่างเครือข่าย (topology)aun-twn
 
Project Management Professional(PMP) Exam Preparation Course | KnowledgeHut.com
Project Management Professional(PMP) Exam Preparation  Course | KnowledgeHut.comProject Management Professional(PMP) Exam Preparation  Course | KnowledgeHut.com
Project Management Professional(PMP) Exam Preparation Course | KnowledgeHut.comKnowledgeHut_Global
 
Friozabad Outdoor Advertising Advertisement Branding Outdoor Advertising Adve...
Friozabad Outdoor Advertising Advertisement Branding Outdoor Advertising Adve...Friozabad Outdoor Advertising Advertisement Branding Outdoor Advertising Adve...
Friozabad Outdoor Advertising Advertisement Branding Outdoor Advertising Adve...Suraj Partaap Singh
 
Delhi , New Delhi Transit Bus Branding Advertising Transit - shrii ganness advt
Delhi , New Delhi Transit  Bus Branding Advertising Transit - shrii ganness advtDelhi , New Delhi Transit  Bus Branding Advertising Transit - shrii ganness advt
Delhi , New Delhi Transit Bus Branding Advertising Transit - shrii ganness advtSuraj Partaap Singh
 
Andhra pradesh Transit Bus Buses Advertising Advertisement Branding - Shrii g...
Andhra pradesh Transit Bus Buses Advertising Advertisement Branding - Shrii g...Andhra pradesh Transit Bus Buses Advertising Advertisement Branding - Shrii g...
Andhra pradesh Transit Bus Buses Advertising Advertisement Branding - Shrii g...Suraj Partaap Singh
 
La combustione della candela 2011
La combustione della candela 2011La combustione della candela 2011
La combustione della candela 2011maupao
 
THE ROLES OF EDUCATIONAL TECHNOLOGY IN LEARNING
THE ROLES OF EDUCATIONAL TECHNOLOGY IN LEARNINGTHE ROLES OF EDUCATIONAL TECHNOLOGY IN LEARNING
THE ROLES OF EDUCATIONAL TECHNOLOGY IN LEARNINGerica bedeo
 
Agra Outdoor Advertising Advertisement Branding Outdoor Advertising Advertisi...
Agra Outdoor Advertising Advertisement Branding Outdoor Advertising Advertisi...Agra Outdoor Advertising Advertisement Branding Outdoor Advertising Advertisi...
Agra Outdoor Advertising Advertisement Branding Outdoor Advertising Advertisi...Suraj Partaap Singh
 
Seo web hosting guide
Seo web hosting guideSeo web hosting guide
Seo web hosting guidealvinaruby
 

En vedette (15)

How to rip dvd to h264
How to rip dvd to h264How to rip dvd to h264
How to rip dvd to h264
 
Project Management Professional(PMP) Broucher | KnowledgeHut.com
Project Management Professional(PMP) Broucher | KnowledgeHut.comProject Management Professional(PMP) Broucher | KnowledgeHut.com
Project Management Professional(PMP) Broucher | KnowledgeHut.com
 
หน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้น
หน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้นหน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้น
หน่วยที่ 6 คำสั่งตรวจสอบเครือข่ายคอมพิวเตอร์เบื้องต้น
 
sara sherif CV
sara sherif CVsara sherif CV
sara sherif CV
 
Mumbai kiosk Outdoor Advertising Advertising Media - Shrii Ganness Advt - Uni...
Mumbai kiosk Outdoor Advertising Advertising Media - Shrii Ganness Advt - Uni...Mumbai kiosk Outdoor Advertising Advertising Media - Shrii Ganness Advt - Uni...
Mumbai kiosk Outdoor Advertising Advertising Media - Shrii Ganness Advt - Uni...
 
อุปกรณ์เครือข่าย
อุปกรณ์เครือข่ายอุปกรณ์เครือข่าย
อุปกรณ์เครือข่าย
 
หน่วยที่ 3 รูปร่างเครือข่าย (topology)
หน่วยที่ 3  รูปร่างเครือข่าย (topology)หน่วยที่ 3  รูปร่างเครือข่าย (topology)
หน่วยที่ 3 รูปร่างเครือข่าย (topology)
 
Project Management Professional(PMP) Exam Preparation Course | KnowledgeHut.com
Project Management Professional(PMP) Exam Preparation  Course | KnowledgeHut.comProject Management Professional(PMP) Exam Preparation  Course | KnowledgeHut.com
Project Management Professional(PMP) Exam Preparation Course | KnowledgeHut.com
 
Friozabad Outdoor Advertising Advertisement Branding Outdoor Advertising Adve...
Friozabad Outdoor Advertising Advertisement Branding Outdoor Advertising Adve...Friozabad Outdoor Advertising Advertisement Branding Outdoor Advertising Adve...
Friozabad Outdoor Advertising Advertisement Branding Outdoor Advertising Adve...
 
Delhi , New Delhi Transit Bus Branding Advertising Transit - shrii ganness advt
Delhi , New Delhi Transit  Bus Branding Advertising Transit - shrii ganness advtDelhi , New Delhi Transit  Bus Branding Advertising Transit - shrii ganness advt
Delhi , New Delhi Transit Bus Branding Advertising Transit - shrii ganness advt
 
Andhra pradesh Transit Bus Buses Advertising Advertisement Branding - Shrii g...
Andhra pradesh Transit Bus Buses Advertising Advertisement Branding - Shrii g...Andhra pradesh Transit Bus Buses Advertising Advertisement Branding - Shrii g...
Andhra pradesh Transit Bus Buses Advertising Advertisement Branding - Shrii g...
 
La combustione della candela 2011
La combustione della candela 2011La combustione della candela 2011
La combustione della candela 2011
 
THE ROLES OF EDUCATIONAL TECHNOLOGY IN LEARNING
THE ROLES OF EDUCATIONAL TECHNOLOGY IN LEARNINGTHE ROLES OF EDUCATIONAL TECHNOLOGY IN LEARNING
THE ROLES OF EDUCATIONAL TECHNOLOGY IN LEARNING
 
Agra Outdoor Advertising Advertisement Branding Outdoor Advertising Advertisi...
Agra Outdoor Advertising Advertisement Branding Outdoor Advertising Advertisi...Agra Outdoor Advertising Advertisement Branding Outdoor Advertising Advertisi...
Agra Outdoor Advertising Advertisement Branding Outdoor Advertising Advertisi...
 
Seo web hosting guide
Seo web hosting guideSeo web hosting guide
Seo web hosting guide
 

Dernier

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Dernier (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

หน่วยที่ 5 ระบบเครือข่ายคอมพิวเตอร์ไร้สาย

  • 2. o Wireless LAN WLAN) 5.4 o o Mobility) o o o 5.5 o PC Notebook Pocket PC PCMCIA o 802.11 Cisco, Orinoco, Toshiba, 3Com, Linksys o Access Point) : LAN 4) 5.6 2 1. Ad-Hoc) 2 Access point) 2. Infrastructure) Access point)
  • 3. 5.7 1. WPAN (Wireless Personal Area Network) 2 IR (Infra-Red) Bluetooth 3 10 2. WLAN (Wireless Local Area Network) 3. WMAN (Wireless Metropolitan Area Network) 4. WWAN (Wireless Wide Area Network) 5.8 o FireWall) o
  • 4. o User Name and Password) o WEP (wired equivalency privacy key) o Wi-Fi Protected Access (WPA) WEP Network Adapter -