Wireless Fidelity (WiFi), Wireless Application Protocol (WAP) Features 2011

“For every action there is an opposite and equal reaction,” as stated in Sir Isaac Newton’s third law of motion is an applicable connotation for the state of wireless local area networks(WLANs). These inventions of communications produce many good and bad reports surrounding security. We can read every day a new article, news reports, research results, and conference proceedings that seem to confuse, distort, and belittle the areas of WEP, WAP, andWi-Fi. With information on the usage of WLAN technology termed as risky, insecure, breakable,and a design failure, we survey the current work being done to explain the shortcomings and strengths of wired equivalent protocol (WEP), wireless application protocol (WAP), and wireless fidelity (Wi-Fi). The easy administration of WEP makes it the most popular security protocol used. It involves using an 802.11 network interface card (NIC) that is configured with password or a key derived from a password.

Recommended Posts



Privacy Policy

All the Colleges, Schools, Universities, Top lists, Interview question paper, Programming, Tips, Tutorials and all other's just information purpose only. We are not responsible for any damages caused to you.