Page 832 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 832

topologies provide redundant connections to systems, allowing

               multiple segment failures without seriously affecting connectivity.

































































               FIGURE 11.12 A mesh topology


               Wireless Communications and Security

               Wireless communication is a quickly expanding field of technologies
   827   828   829   830   831   832   833   834   835   836   837