TELECOMMUNICATIONS SYSTEMS
COMMUNICATION WIRELESS COMPUTING DEVICES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
802.1x
|
|
802.2g
|
|
802.3k
|
|
802.11m
|
Detailed explanation-1: -The 802.1X. 802.1X provides an authentication framework that allows a user to be authenticated by a central authority. authentication server is typically an EAP. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet.
Detailed explanation-2: -One of the key benefits of 802.1X is that the authenticator can be simple and dumb-the brains only have to be in the supplicant and the authentication server. This makes 802.1X ideal for wireless access points, which typically have little by way of memory and processing power.
Detailed explanation-3: -WPA stands for WiFi Protected Access. This authentication method uses different encryption algorithms to encrypt the transport. Therefore, this type of network cannot be forged easily, unlike open networks, and users get privacy. Today, WPA2 is probably the most commonly used method to secure WiFi networks.
Detailed explanation-4: -802.1X support requires an authentication server that is configured for Remote Authentication Dial-In User Service (RADIUS). 802.1X authentication does not work unless the network access switch can route packets to the configured authentication RADIUS server.
Detailed explanation-5: -WPA2-Enterprise with 802.1X Authentication 802.1X is an IEEE standard framework for encrypting and authenticating a user who is trying to associate to a wired or wireless network. WPA-Enterprise uses TKIP with RC4 encryption, while WPA2-Enterprise adds AES encryption. 802.1X can be transparent to wireless users.