The document contains logs from a wireless network monitoring system. It lists access points seen over time along with signal strength readings and identifies when connections are good or poor. It also shows the system taking actions in its decision process and updating its knowledge of access points.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
56 views
Iwc Dump Old
The document contains logs from a wireless network monitoring system. It lists access points seen over time along with signal strength readings and identifies when connections are good or poor. It also shows the system taking actions in its decision process and updating its knowledge of access points.