Skip to main content

IEEE 802.1X

What is IEEE 802.1X?

IEEE 802.1X is an IEEE standard for post based network access control (PNAC). It is a part of IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN. IEEE 802.1X defines the encapsulation of the extensible authentication protocol (EAP), which is known as “EAP over LAN” or EAPOL. EAPOL was originally designed for IEEE 802.3 Ethernet in 802.1X-2001, but it was clarified to suit other IEEE 802 LAN technologies such as IEEE 802.11 wireless and fiber distribution data interface (ISO 9314-2) in 802.1X-2004. 802.1X authentication involves three parties such that a supplicant, an authenticator, and an authentication server.

The supplicant is a client device such as laptop that can be able to attach to the LAN or WLAN. The term “supplicant” is also used interchangeably to refer to the software running on the client that provides credentials to the authenticator. The authenticator is a network device which provides a data link layer between the client and the network and can allow or block network traffic between the two, such as an Ethernet switch or wireless access point.

The authentication server is typical trusted server that can receive and respond to the requests for network access, and can tell the authenticator if the connection is to be allowed, and various settings that should apply to that client’s connection or setting. Therefore the authentication server typically run software supporting the RADIUS and EAP protocols. In some cases, the authentication server software may be running on the authenticator hardware.

Typical Authentication Procedure

The typical authentication procedure consists of

  • Initialization
  • Initiation
  • Negotiation
  • Authentication


Learn about IEEE 802.11b

   

Comments

Popular posts from this blog

Virtual Private Network (VPN)

  What is Virtual Private Network (VPN)? A virtual private network (VPN) is a secure connection between two private networks over a public network (in other words, over the Internet). All the data that flows over the VPN is encrypted. So anyone who steals packets from the VPN will find them unintelligible; only the parties on either end of the VPN are able to decrypt the packets. VPN connections are often called tunnels. Because they provide an isolated pathway from one point to another through the Internet. The only way to gain meaningful access to a VPN tunnel is at either end. Example for VPN Connections VPNs are used for There are two common uses for VPNs: To provide remote workers with secure access to your company network: To do that, you set up a VPN on the router, and then provide your remote workers with the credentials necessary to access the VPN. The remote workers can run a software VPN client on their home computers or laptops to connec...

Printer

What is Printer? Another widely used output device is a printer and it is a computer peripheral device. A printer produces a hard copy of a processed text or a result. A hard copy refers to a permanent human-readable text or graphics taken on physical print media such as paper or transparency. A printer will use toner to provide a quality print on paper, a toner is a replaceable material. Once the toner gets empty we can refill it and reuse it.  Most of the printers are used for commercial purposes such as private offices, industries, government offices, photo studios, etc,. Most of the printers are used to print emails, documents, files, images, color photos, color documents, color posts, banners, advertisement posters, etc,. There are the following 5 types of printers such as dot matrix printer, inkjet printer, laser printer, dye-sublimation printer, and plotter printer this are all the printer which uses nowadays for a printing purpose. A printer is characterized by the followin...

Motherboard

What is Motherboard? Motherboard If the processor is the brain of the computer, the motherboard is the heart of the computer. The motherboard is the main circuit board inside the computer and however, all the components and peripherals are attached to it. Therefore the most of the compute features like scalability and upgradeability depend on the motherboard. Computer Motherboard Components Components of Motherboard Key Assessable Parameters of Motherboard Form factor Chipset CPU Memory Audio Ports and Slots Headers and Connectors BIOS Form factor The root mean square value ratio to the average value ratio of the alternating current is called Form Factor and it is the ratio of the root mean square value to the average value is also known as the absolute value of the waveform. Measurements of Form Factor, Form Factor Formula Where RMS is Root Mean Square Value, AV is Average Value Ir.m.s is the root main square value of current, therefore Iav are ...