Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
1. 5
5.1 1.
2.
digital 3.
4.
2
4.1 4.2
5.2
1.
2.
3.
4.
2. 5.3
WIRELESS LAN) 1.
2. Wireless
LAN WLAN)
5.4
1.
2.
Mobility) 3.
4. 5.
5.5
1.
PC Notebook
Pocket PC PCMCIA 2.
802.11
Cisco, Orinoco, Toshiba, 3Com,
Linksys 3. Access
Point) :
LAN
4)
5.6
3. 2 1.
Ad-Hoc)
2
Access point) 2.
Infrastructure)
Access
point)
5.7
1. WPAN
(Wireless Personal Area Network)
2 IR (Infra-Red) Bluetooth
3
10
2. WLAN (Wireless Local Area Network)
3. WMAN
(Wireless Metropolitan Area Network)
4. WWAN (Wireless Wide Area Network)
5.8 1.
FireWall)
2.
3.
User
Name and Password)
4.
WEP (wired equivalency
privacy key)
5. Wi-Fi Protected Access (WPA)
WEP
Network Adapter

Recommended for you

Nanu
NanuNanu
Nanu

This document discusses several tools used for Android hacking, including KingRoot, WPS WPA Tester, WiFi Kill, Network Spoofer, Shark for Root, Tunnel Bear, and Hackode. KingRoot allows users to gain root access on Android devices running 2.x to 5.0 without flashing a recovery image. WPS WPA Tester hacks vulnerable WiFi networks by capturing the WPS PIN. WiFi Kill disables internet access for nearby peers on the same WiFi network using ARP poisoning. Network Spoofer allows changing websites on other devices on a network for demonstration purposes only. Shark for Root is a version of Wireshark for security experts to analyze traffic on WiFi, 3

เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ

1. There are several types of computer networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). LANs connect computers within a limited area like a home or office while WANs connect LANs together over longer distances using technologies like leased lines. 2. Networks also include intranets, extranets, and the Internet. An intranet is a private network within an organization while an extranet extends an intranet to external users. The Internet is a worldwide public network that connects millions of other networks. 3. Computer networks require both hardware and software. Hardware includes physical devices like routers, switches, and cables while

STSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and servicesSTSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and services

STSAFE-A is a secure system on chip that provides strong authentication and security for Internet of Things devices through certified security, privacy protections, and integrity of devices, services, and networks. It offers a turnkey solution for IoT developers with easy to use secure services like authentication, secure storage, firmware upgrades, and communication through a general purpose MCU and secure element.

mobile application developmentsecuritysecure element
หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สาย

More Related Content

What's hot

เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
Kaii Eiei
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
Kaii Eiei
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
Kaii Eiei
 
Nanu
NanuNanu
Nanu
piyushu90
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
Kaii Eiei
 
STSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and servicesSTSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and services
Sylvie Boube-Politano
 
Why Go Beyond Encryption
Why Go Beyond EncryptionWhy Go Beyond Encryption
Why Go Beyond Encryption
guest990c6c
 
Wireless security
Wireless securityWireless security
Wireless security
Aurobindo Nayak
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
Open Knowledge Nepal
 

What's hot (9)

เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
 
Nanu
NanuNanu
Nanu
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
 
STSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and servicesSTSAFE-A: certified security for IoT devices and services
STSAFE-A: certified security for IoT devices and services
 
Why Go Beyond Encryption
Why Go Beyond EncryptionWhy Go Beyond Encryption
Why Go Beyond Encryption
 
Wireless security
Wireless securityWireless security
Wireless security
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
 

Viewers also liked

Brand You!
Brand You!Brand You!
Brand You!
Samuel Ballinger
 
It project manager
It project managerIt project manager
It project manager
kellylockett
 
вебинар фототерапия центр м арт 2013
вебинар фототерапия центр м арт 2013вебинар фототерапия центр м арт 2013
вебинар фототерапия центр м арт 2013
Maria Fabricheva
 
Effective Tutoring
Effective TutoringEffective Tutoring
Effective Tutoring
heyitssara
 
Ortiz nelson production_libraries
Ortiz nelson production_librariesOrtiz nelson production_libraries
Ortiz nelson production_libraries
nelsonortiz2k13
 
Quimica presentacion
Quimica presentacionQuimica presentacion
Quimica presentacion
Diana Carolina Gutierrez Diaz
 
Ccp 154 noida..
Ccp 154 noida..Ccp 154 noida..
Ccp 154 noida..
hemu18792
 
you...
you...you...
you...
hemu18792
 
Atoms intro (2)
Atoms intro (2)Atoms intro (2)
Atoms intro (2)
Trnka
 
Figurative language
Figurative languageFigurative language
Figurative language
Trnka
 
Renaissance of sculpture
Renaissance of sculptureRenaissance of sculpture
Renaissance of sculpture
Camella Tagum
 
Kineticparticletheory (002)
Kineticparticletheory (002)Kineticparticletheory (002)
Kineticparticletheory (002)
Trnka
 
04 sumber internal(mc leod) revisi per 26092012
04 sumber internal(mc leod) revisi per 2609201204 sumber internal(mc leod) revisi per 26092012
04 sumber internal(mc leod) revisi per 26092012
Ikhsan Bz
 
หน่วยที่ 6 เครือข่ายคอมพิวเตอร์
หน่วยที่ 6 เครือข่ายคอมพิวเตอร์หน่วยที่ 6 เครือข่ายคอมพิวเตอร์
หน่วยที่ 6 เครือข่ายคอมพิวเตอร์
soifha
 
หน่วยที่ 4 อุปกรณ์เครือข่าย
หน่วยที่ 4 อุปกรณ์เครือข่ายหน่วยที่ 4 อุปกรณ์เครือข่าย
หน่วยที่ 4 อุปกรณ์เครือข่าย
soifha
 
Cosmic business center_gurgaon
Cosmic business center_gurgaonCosmic business center_gurgaon
Cosmic business center_gurgaon
hemu18792
 
Dss 15 12-2012
Dss 15 12-2012Dss 15 12-2012
Dss 15 12-2012
Ikhsan Bz
 

Viewers also liked (20)

Brand You!
Brand You!Brand You!
Brand You!
 
It project manager
It project managerIt project manager
It project manager
 
09 sip dss
09 sip dss09 sip dss
09 sip dss
 
вебинар фототерапия центр м арт 2013
вебинар фототерапия центр м арт 2013вебинар фототерапия центр м арт 2013
вебинар фототерапия центр м арт 2013
 
Effective Tutoring
Effective TutoringEffective Tutoring
Effective Tutoring
 
Ortiz nelson production_libraries
Ortiz nelson production_librariesOrtiz nelson production_libraries
Ortiz nelson production_libraries
 
Quimica presentacion
Quimica presentacionQuimica presentacion
Quimica presentacion
 
Ccp 154 noida..
Ccp 154 noida..Ccp 154 noida..
Ccp 154 noida..
 
you...
you...you...
you...
 
12 sip scm
12 sip scm12 sip scm
12 sip scm
 
Atoms intro (2)
Atoms intro (2)Atoms intro (2)
Atoms intro (2)
 
Figurative language
Figurative languageFigurative language
Figurative language
 
Cell Best Described
Cell Best DescribedCell Best Described
Cell Best Described
 
Renaissance of sculpture
Renaissance of sculptureRenaissance of sculpture
Renaissance of sculpture
 
Kineticparticletheory (002)
Kineticparticletheory (002)Kineticparticletheory (002)
Kineticparticletheory (002)
 
04 sumber internal(mc leod) revisi per 26092012
04 sumber internal(mc leod) revisi per 2609201204 sumber internal(mc leod) revisi per 26092012
04 sumber internal(mc leod) revisi per 26092012
 
หน่วยที่ 6 เครือข่ายคอมพิวเตอร์
หน่วยที่ 6 เครือข่ายคอมพิวเตอร์หน่วยที่ 6 เครือข่ายคอมพิวเตอร์
หน่วยที่ 6 เครือข่ายคอมพิวเตอร์
 
หน่วยที่ 4 อุปกรณ์เครือข่าย
หน่วยที่ 4 อุปกรณ์เครือข่ายหน่วยที่ 4 อุปกรณ์เครือข่าย
หน่วยที่ 4 อุปกรณ์เครือข่าย
 
Cosmic business center_gurgaon
Cosmic business center_gurgaonCosmic business center_gurgaon
Cosmic business center_gurgaon
 
Dss 15 12-2012
Dss 15 12-2012Dss 15 12-2012
Dss 15 12-2012
 

Recently uploaded

Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
Stephanie Beckett
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
KAMAL CHOUDHARY
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
ScyllaDB
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
ScyllaDB
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
Vijayananda Mohire
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
SynapseIndia
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
Mark Billinghurst
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
UiPathCommunity
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
Sally Laouacheria
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
Matthew Sinclair
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
Liveplex
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
ishalveerrandhawa1
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 

Recently uploaded (20)

Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 

หน่วยที่ 5ระบบเครือข่ายคอมพิวเตอร์ไร้สาย

  • 1. 1. 5 5.1 1. 2. digital 3. 4. 2 4.1 4.2 5.2 1. 2. 3. 4.
  • 2. 2. 5.3 WIRELESS LAN) 1. 2. Wireless LAN WLAN) 5.4 1. 2. Mobility) 3. 4. 5. 5.5 1. PC Notebook Pocket PC PCMCIA 2. 802.11 Cisco, Orinoco, Toshiba, 3Com, Linksys 3. Access Point) : LAN
  • 3. 4) 5.6 3. 2 1. Ad-Hoc) 2 Access point) 2. Infrastructure) Access point) 5.7 1. WPAN (Wireless Personal Area Network) 2 IR (Infra-Red) Bluetooth 3 10 2. WLAN (Wireless Local Area Network) 3. WMAN (Wireless Metropolitan Area Network)
  • 4. 4. WWAN (Wireless Wide Area Network) 5.8 1. FireWall) 2. 3. User Name and Password) 4. WEP (wired equivalency privacy key) 5. Wi-Fi Protected Access (WPA) WEP Network Adapter