Skip to main content

IEEE 802.1X

What is IEEE 802.1X?

IEEE 802.1X is an IEEE standard for post based network access control (PNAC). It is a part of IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN. IEEE 802.1X defines the encapsulation of the extensible authentication protocol (EAP), which is known as “EAP over LAN” or EAPOL. EAPOL was originally designed for IEEE 802.3 Ethernet in 802.1X-2001, but it was clarified to suit other IEEE 802 LAN technologies such as IEEE 802.11 wireless and fiber distribution data interface (ISO 9314-2) in 802.1X-2004. 802.1X authentication involves three parties such that a supplicant, an authenticator, and an authentication server.

The supplicant is a client device such as laptop that can be able to attach to the LAN or WLAN. The term “supplicant” is also used interchangeably to refer to the software running on the client that provides credentials to the authenticator. The authenticator is a network device which provides a data link layer between the client and the network and can allow or block network traffic between the two, such as an Ethernet switch or wireless access point.

The authentication server is typical trusted server that can receive and respond to the requests for network access, and can tell the authenticator if the connection is to be allowed, and various settings that should apply to that client’s connection or setting. Therefore the authentication server typically run software supporting the RADIUS and EAP protocols. In some cases, the authentication server software may be running on the authenticator hardware.

Typical Authentication Procedure

The typical authentication procedure consists of

  • Initialization
  • Initiation
  • Negotiation
  • Authentication


Learn about IEEE 802.11b

   

Comments

Popular posts from this blog

Virtual Private Network (VPN)

  What is Virtual Private Network (VPN)? A virtual private network (VPN) is a secure connection between two private networks over a public network (in other words, over the Internet). All the data that flows over the VPN is encrypted. So anyone who steals packets from the VPN will find them unintelligible; only the parties on either end of the VPN are able to decrypt the packets. VPN connections are often called tunnels. Because they provide an isolated pathway from one point to another through the Internet. The only way to gain meaningful access to a VPN tunnel is at either end. Example for VPN Connections VPNs are used for There are two common uses for VPNs: To provide remote workers with secure access to your company network: To do that, you set up a VPN on the router, and then provide your remote workers with the credentials necessary to access the VPN. The remote workers can run a software VPN client on their home computers or laptops to connect to

VERSION CONTROL TOOL (SVN)

VERSION CONTROL TOOL In Project development several team members will be available Each developers will be developing some components in project All the developers may not be available in same office/location Q-1) How to integrate all the developers code ? Q-2) How to track changes happening to source code ? For the above two problems, Version Control Tool is the solution Version Control Tool provides Storage Capacity to store our project source code Version Control Tool provides Monitored Access (Who/When/Why/What) There are several version control tools are available in the market ·         SVN (Subversion) ·         GIT HUB ·         Bit Bucket etc…   SVN SVN stands for Subversion SVN is an Opensource software SVN is a version control software SVN follows Centralized Architecture SVN Architecture ·         SVN Server ·         SVN Client SVN Server will be installed in one remote computer SVN Server setup will be taken care by Adminis

Motherboard

What is Motherboard? Motherboard If the processor is the brain of the computer, the motherboard is the heart of the computer. The motherboard is the main circuit board inside the computer and however, all the components and peripherals are attached to it. Therefore the most of the compute features like scalability and upgradeability depend on the motherboard. Computer Motherboard Components Components of Motherboard Key Assessable Parameters of Motherboard Form factor Chipset CPU Memory Audio Ports and Slots Headers and Connectors BIOS Form factor The root mean square value ratio to the average value ratio of the alternating current is called Form Factor and it is the ratio of the root mean square value to the average value is also known as the absolute value of the waveform. Measurements of Form Factor, Form Factor Formula Where RMS is Root Mean Square Value, AV is Average Value Ir.m.s is the root main square value of current, therefore Iav are