You are on page 1of 2

1. https://securitygladiators.

com/protect-wifi-network-wireless-router-advanced-way/
2. http://telekomunikacije.etf.bg.ac.rs/predmeti/ot4ai/rutiranje-osnove.pdf
3. https://www.techadvisor.co.uk/how-to/internet/how-secure-your-wi-fi-3665453/
4. https://securitygladiators.com/protect-wifi-network-wireless-router-advanced-way/
5. https://securitygladiators.com/protect-wifi-network-wireless-router-2/
6. http://www.bitprojekt.co.rs/ipo/admin.html
7. Za uvod:http://www.idc-
online.com/technical_references/pdfs/data_communications/Router_Introduction.pdf
8. Zakljucak: Modern routers can perform routing lookups very quickly, and many (but not all) can
perform a few packet filtering operations at line speed. Clients, however, may be many in
number, or the set of clients may change dynamically. Client verification may involve database
lookups or other heavyweight mechanisms. Access lists in core routers are updated via router
configuration changes, so network operators are not likely to favor a solution that requires
frequent updates. Creating an access list of authorized clients is probably not practical due to
client mobility and the sheer size of such a list; we need filter keys that change less often. We
term these filter keys the lightweight authenticators.
http://static.usenix.org/publications/library/proceedings/usits03/tech/full_papers/andersen/an
dersen_html/
9.
LITERATURA

[1] Nader F. Mir, 2007, ‘’Computer and Communication Networks (paperback)’’

Claudia Archetti, Marielle Christiansen, M. Grazia Speranza,

Inventory routing with pickups and deliveries,

European Journal of Operational Research,

Volume 268, Issue 1,

2018,

Pages 314-324,

ISSN 0377-2217,

You might also like