0% found this document useful (0 votes)
8 views

Networking 2 Prelim Lesson Iii

Networking 2

Uploaded by

BŁąŃk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Networking 2 Prelim Lesson Iii

Networking 2

Uploaded by

BŁąŃk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 7

NETWORKING 2

IT 219: LESSON III


WIRELESS NETWORKS TECHNOLOGY
What is 802.1X Authentication

IEEE 802.1X is an IEEE Standard for port-based Network


Access Control (PNAC). It is part of the IEEE 802.1 group of
networking protocols. It provides
an authentication mechanism to devices wishing to attach to
a LAN or WLAN.
WIRELESS NETWORKS TECHNOLOGY

How does 802.1x work


802.1x is a network authentication protocol
that opens ports for network access when an
organization authenticates a user’s identity
and authorizes them for access to the
network. The user’s identity is determined
based on their credentials or certificate.
WIRELESS NETWORKS TECHNOLOGY

802.1X Encryption
The standard authentication protocol used on
encrypted networks is Extensible
Authentication Protocol (EAP), which provides
a secure method to send identifying
information over-the-air for network
authentication. 802.1x is the standard that is
used for passing EAP over wired and wireless
Local Area Networks (LAN). It provides an
encrypted EAP tunnel that prevents outside
users from intercepting information.
WIRELESS NETWORKS TECHNOLOGY

Wi-fi Protected Access


Secure Wi-Fi network refers to the use of passwords
and secure encryption methods to send wireless
data between a mobile device and the Internet
connection point. There is more than one way to
encrypt data. Wi-Fi Protected Access (WPA), Wi-Fi
Protected Access II (WPA2), and Wi-Fi Protected
Access 3 (WPA3) are three security certification
programs developed by the Wi-Fi Alliance to secure
wireless computer networks. The Alliance defined
these in response to serious weaknesses researchers
had found in the previous system
WIRELESS NETWORKS TECHNOLOGY

Wi-fi Protected Access

WPA (sometimes referred to as the draft IEEE


802.11i standard) became available in 2003. The Wi-
Fi Alliance intended it as an intermediate measure in
anticipation of the availability of the more secure
and complex WPA2, which became available in 2004
and is a common shorthand for the full IEEE 802.11i
(or IEEE 802.11i-2004) standard.
END OF LESSON III

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy