09.11.2012 Views

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

List <strong>of</strong> Figures<br />

Figure 2.1 WLAN architecture a)Ad-hoc (IBSS) and b)Infrastructure (ESS) 5<br />

Figure 2.2 802.11 Open system authentication (Netgear Inc, 2005a) 10<br />

Figure 2.3 802.11 Shared key authentication (Netgear Inc, 2005b) 11<br />

Figure 3.1 The location and path <strong>of</strong> field trials in Auckland CBD 23<br />

Figure 3.2 Tools used in the Wireless security experiment 25<br />

Figure A 1 WLANs (Day Scan) 55<br />

Figure A 2 WLANs (Day Scan) with encryption <strong>of</strong>f 55<br />

Figure A 3 WLANs (Day Scan) with encryption on 56<br />

Figure A 4 WLANs (Day Scan) that are ESS/AP 56<br />

Figure A 5 WLAN (Day Scan) that are IBSS/Peer 57<br />

Figure A 6 WLAN (Day Scan) with default SSID 57<br />

Figure A 7 WLAN (Night Scan) 58<br />

Figure A 8 WLAN (Night Scan) with encryption <strong>of</strong>f 58<br />

Figure A 9 Wireless (Night Scan) with encryption on 59<br />

Figure A 10 WLAN (Night Scan) that are ESS/AP 59<br />

Figure A 11 WLAN (Night Scan) that are IBSS/Peer 60<br />

Figure A 12 WLAN (Night Scan) with default SSID 60<br />

viii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!