Saturday, May 28, 2016

Pin It


What Are Different Types Of WLAN Authentication — Basics Of Networking

When a wireless network is deployed, authentication is the first thing that needs to be done before connecting it to devices. So, It is important to know the different aspects of the authentication methods. However, authentication should not be mistaken with the authorization. 

Authentication is a process by which the identity of a user is verified by using some sort of credentials. On the other hand, authorization is more like authorizing a person to use the resources. Thus, in the most of the cases, authentication precedes authorization.
As far as authentication is concerned,  there are mainly three types of WLAN authentication methods that are used today:

  • Open authentication
  • shared authentication
  • EAP (Extensible Authentication Protocol) authentication

Open Authentication:

When a wireless network is deployed, a user knows about the particular network using its Service-Set Identifier (SSID). SSID, in simple terms, can be thought of as a wireless network identifier which is continuously broadcasted by the wireless network.

If you are really interested in knowing the different SSIDs your machine can see, then type the command below:

“netsh wlan show networks

And it would look something like this:

Here, you can see a list of SSIDs as well as authentication types of those SSIDs. So, in the open authentication, if the device knows the SSID, it can directly join the network.

Shared Authentication:

The shared authentication method is more secure than the open authentication. However, the shared authentication is basically employed on the individual and small business levels. A shared key, also known as Pre-Shared Key (PSK), is shared between the two parties. When the device tries to connect to that network, it puts in the key and if that matches, then the device is allowed onto the network.

Extensible Authentication Protocol (EAP):

EAP is the last types of WLAN authentication method, but the most secure authentication process of all. That’s why EAP is also deployed at the enterprise level along with an authentication server. A user logs into the wireless network using a variety of credential options.

ඔයාලත් මේ පොස්ට් එකට කැමති නම් අපිට මෙතනින් ගිහින් පොඩි Support එකක් දෙන්න ඈ...


  1. Thanks that's helpfull
    There are many of other features coming kitchen design ideas up with the feature which will make it so much important as well as beneficial. The time is changing and with that there are enough of options available in the market which can help you to decorate as well as give your interiors the much home design software needed look.

  2. Nepal Base Camp Treks is fully Organized Trekking in nepal & Peak Climbing in Nepal, The local Trekking Company in Nepal. It is located at Lazimpat, Kathmandu, Nepal. Since 1997 to till Highly recommend top list as Everest Trekking Route on Everest Base camp trek, Everest Chola Pass trek, Gokyo lake trek, and Langtang Region langtang valley trek, langtang gosaikunda trek, helambu circuit trek, Shivapuri Nagarkot trek, & Annapurna Region Annapurna base camp trek, Annapurna Circuit trek, Ghorepani poon hill trek, Upper Mustang trek, Manaslu Circuit trek, Manaslu Tsum valley trek, And Popular Peak Climbing in Nepal as Island Peak Climbing, pisang Peak Climbing, Mera Peak Climbing, Chulu West Peak Climbing and Phakchhermo Peak Climbing in Nepal.
    Rest of the Activities after your trip if you have any balance days then we design your custom Itinerary and trip Program in Nepal.


හ්ම්ම්ම්ම් ඔන්න එහෙනම් යාලුවනේ යන්න කලින් පොඩි අදහසක් දීලා අපිව පොඩ්ඩක් උස්සලා තිබ්බොත් හොඳයි නේද? ඒක එහෙමයි කියලා මගේ බ්ලොගයේ තියන් වැරදි අඩුපාඩු කියන්නේ නැතුව යන්න එපා. හැබැයි නිකන්ම ඇවිත් යන්නේ නැතුව පොඩි අදහසක් දීලා යන්න හොඳේ...

Twitter Delicious Facebook Digg Stumbleupon Favorites More

Design by Free WordPress Themes | Re Designed by Dilhan Padeniya - Premium Blogger Themes | Dil Computers Review