1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saw5 [17]
3 years ago
5

What are the modes of operation of WLANs?

Computers and Technology
1 answer:
Nimfa-mama [501]3 years ago
6 0

Answer:

WLAN's or Wireless LAN Units have 2 main modes of operation

Explanation:

The Two Main modes of Operation are the following

<u>Infrastructure Mode:</u> in this mode the main WLAN unit becomes the main connection point in which all devices are connected to and the main unit provides an internet connection to all the devices connected to it.

<u>Ad Hoc Mode:</u> in this mode devices transfer data from one another back and forth without permission from a base unit.

Some WLAN units will also include 2 extra modes of operation called Bridge and Wireless Distribution System (WDS).

<u>Bridge Mode:</u> this mode allows the base unit to act as an intermediary and bridge two different connection points. Such as bridging a wired connection with a wireless one.

<u>WDS Mode:</u> this mode uses various access points to wirelessly interconnect devices to the internet using repeaters to transmit connections. It can provide internet to both wired and wireless clients.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

You might be interested in
I need help please !!!!
V125BC [204]

Answer:

Second one

Explanation:

evaluation of ur problems

8 0
3 years ago
opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and use
Alekssandra [29.7K]

Answer:

The operating system must by the use of policies define access to and the use of all computer resources.

Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.

Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:

  1. General Policies
  2. Server Policies
  3. VPN Policies
  4. Back-Up Policies
  5. Firewall Access and Configuration Policies

Cheers!

5 0
3 years ago
______ is/are the replacement of human operation and control of machinery with some form of programmed control.
Thepotemich [5.8K]
Automation is/are the replacement of human operation and control of machinery with some form of programmed control. Thank you for posting your question here at brainly. I hope the answer will help you. Feel free to ask more questions here.
7 0
3 years ago
This image shows a web designer's grids for different pages on a website. The uppermost box on each page is the website's identi
allsm [11]

Answer: d

Explanation: hope this helps

6 0
3 years ago
Read 2 more answers
What is the basic purpose of the International Space Station that will be completed in 2010?
frosja888 [35]
The best and most correct answer among the choices provided by the question is the third choice "It will be a space laboratory for scientists"<span>

The main purpose of the International Space Station<span> is to provide an </span>international<span> laboratory for experiments within the </span>space<span> environment. Which, despite all our technological advances, is nearly impossible to replicate here on Earth.
</span>
I hope my answer has come to your help. God bless and have a nice day ahead!</span>
6 0
3 years ago
Other questions:
  • If you have a list of words that you wish me to make into a bulleted list, you must first highlig or ______ The words with the c
    13·1 answer
  • The quality of a language that allows a programmer to express a computation clearly, correctly, concisely, and quickly is called
    7·1 answer
  • Select the strategies below that are likely to increase audience attention.
    14·2 answers
  • What allows a person to interact with web browser software?
    13·2 answers
  • Which command compiles the Java source code file Welcome.java?
    11·1 answer
  • What specific authentication method has no encryption for user credentials or data, and is not recommended for most applications
    14·1 answer
  • Question # 2
    7·1 answer
  • QUESTION 4
    13·1 answer
  • A(n) ___ is a set of CPUs which work in parallel in an attempt to simulate the way the human brain works, although in greatly si
    5·1 answer
  • Which version of HTML provides the lowest common denominator of HTML tags
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!