Even complicated and confusing topics will be easily developed and covered if you request our help writing an essay. Place an order today!

Before connecting to a wireless network there are a number of concerns that must be addressed. They are as follows:

  • Denial of Serviceis one of the simplest network attacks to perpetrate as it requires limiting access to services (Wilkins, 2011). This can be done by sending a large amount of traffic to the target but in case of wireless networks, something as simple as a microwave or a competing access point on the same channel can cause an interruption.
  • Passive Capturingis performed by getting in range of a target wireless LAN and then eavesdropping and capturing data. This can be used to break the existing security settings and analyzing non-encrypted data.
  • Configuration Problemscan be simple enough for attackers to penetrate into. If the security configuration is weak, it opens doors for attackers to gain access to the device and for external use.

Wireless Application Protocol (WAP) is one of the modes of transmission of data over wireless networks. It is one of the specifications for a set of communication protocols that standardize the way wireless devices can be used to access the internet and for instant messaging (Rouse, 2010). There are various layers of WAP:

  • Wireless Application Environment
  • Wireless Session Layer
  • Wireless Transport Layer Security
  • Wireless Transport Layer

 Also, there are certain pros and cons associated with the protocol which are as follows:


  • Sending and receiving data in real-time.
  • No apprehension of hardware obsolescence.
  • Most modern mobile devices support WAP.
  • Its implementation aligns with the internet model.


  • It has low speed, security concerns, and a very small user interface.
  • Most of the people are unfamiliar to WAP.
  • It has an expensive business model.
  • The forms associated with WAP are hard to design.


Wilkins, S. (2011, November 2). Wireless Security Considerations: Common Security Threats to Wireless Networks. Retrieved from https://www.pluralsight.com/blog/it-ops/wireless-lan-security-threats

Rouse, M. (2010, November). WAP (Wireless Application Protocol). https://searchmobilecomputing.techtarget.com/definition/WAP

testimonials icon
Kindly follow instructions carefully no plagiarism no grammar issues. Top notch work needed please. Please read instructions before you bi...
testimonials icon
Prof KingENGL2516WBA or WBBPART II I-FINAL EXAMFINAL Exam –Email or MemorandumThe following is a Recommendation that...
testimonials icon
Here is the question. During 2008, Hauke Co. purchased two thousand $1,000, 9% bonds. The carrying value of the bonds at December 31, 2010...
testimonials icon
Write a 700- to 1050-word paper that does the following:Summarizes your background and what makes you unique in a 1-p...
testimonials icon
Please NO PLAGIARISM GWFA Research Paper Instructions  ...
testimonials icon
Read this poem by Lia Purpura many times. Then, annotate it: explain what is happening; describe the form (line lengths,...
testimonials icon
Trappers first traveled to the American West....
testimonials icon
LP8.2 Assignment: Reflection: ContainmentDirections: VIEW "...
testimonials icon
Overview: You are a strategic analyst for the company you have selected to use in this course. The company has recently s...
testimonials icon
Hi, I need help with essay on HISTORICAL THEORISTS LETTERRole of the Teacher. Paper must be at least 750 words. Please, no plagiarized work!...

Other samples, services and questions:

Calculate Price

When you use PaperHelp, you save one valuable — TIME

You can spend it for more important things than paper writing.

Approx. price
Order a paper. Study better. Sleep tight. Calculate Price!
Created with Sketch.
Calculate Price
Approx. price