Professional Documents
Culture Documents
Linkovi Za TZRM
Linkovi Za TZRM
com/protect-wifi-network-wireless-router-advanced-way/
2. http://telekomunikacije.etf.bg.ac.rs/predmeti/ot4ai/rutiranje-osnove.pdf
3. https://www.techadvisor.co.uk/how-to/internet/how-secure-your-wi-fi-3665453/
4. https://securitygladiators.com/protect-wifi-network-wireless-router-advanced-way/
5. https://securitygladiators.com/protect-wifi-network-wireless-router-2/
6. http://www.bitprojekt.co.rs/ipo/admin.html
7. Za uvod:http://www.idc-
online.com/technical_references/pdfs/data_communications/Router_Introduction.pdf
8. Zakljucak: Modern routers can perform routing lookups very quickly, and many (but not all) can
perform a few packet filtering operations at line speed. Clients, however, may be many in
number, or the set of clients may change dynamically. Client verification may involve database
lookups or other heavyweight mechanisms. Access lists in core routers are updated via router
configuration changes, so network operators are not likely to favor a solution that requires
frequent updates. Creating an access list of authorized clients is probably not practical due to
client mobility and the sheer size of such a list; we need filter keys that change less often. We
term these filter keys the lightweight authenticators.
http://static.usenix.org/publications/library/proceedings/usits03/tech/full_papers/andersen/an
dersen_html/
9.
LITERATURA
2018,
Pages 314-324,
ISSN 0377-2217,