logo

The Client Device and the Authentication Server

6 Pages986 Words60 Views
   

Added on  2020-03-16

The Client Device and the Authentication Server

   Added on 2020-03-16

ShareRelated Documents
Question 1Compare and contrast the workings of physical layers for 802.11b and 802.11a wireless standards802.11 a802. 11b5 GHz frequency transmission2.4 GHz frequency transmissionover 50 Mbps data transmissionOver 10 Mbpsdata transmissionuses OFDM multiplexing technique uses direct sequence spread spectrummultiplexing technique Question 2a) Client authentication to authentication server using 802.11iAccording to [ CITATION Bae04 \l 1033 ], 802.11i authenticates a client device to a serverby following the following several procedures. Figure 1 shows the summary of theauthentication process. i) Client device initiates a connection to a wireless networkii)The initiation request is received by a proxy server which then establishes a virtuallink between the client device and the authentication server. iii)The authentication server verifies itself to the client and sends a verification requestto the client device iv)802.11i protocol warrants that authentication between the client and server follows a4-way handshake before a connection happens v)If the client machine is approved by the authenticating server, the proxy server thenapproves and establishes an actual port connection between the client device andauthenticating server allowing full access to the network.
The Client Device and the Authentication Server_1
Figure 1: Client authentication using 802.11i. Source: [ CITATION Bae04 \l 1033 ]b) Establishing an encrypted secure point to point communication channel between ona public network using virtual private network (VPN) Basically, Virtual Private Network (VPN) facilities a point to point secure tunnel in a publicnetwork. Thus, VPN enables packet transmission in such a way that a network user can senddata securely to another user as if their devices were directly connected [ CITATION Pin17 \l1033 ]. VPN facilities such communication by using tunneling protocols that include IPsecurity, secure socket layer, point to point protocols and layer2 tunneling protocols. Whenusing VPN, a client machine therefore uses any of the mentioned tunneling protocols toestablish a virtual dedicated point-to-point connection through the Internet to remote serverin another network. The remote server then receives the initiation request, authenticates theVPN client, and allows for secure data transmission for the client machine in a publicnetwork.Question 3Wireless Metropolitan Area Network(WMAN) techniques based on 802.16 wireless standardand can transfer data with speeds of over 10 Mbps [CITATION WiM17 \l 1033 ]. WMANtechniques include Wireless Fidelity( Wi-Fi) and WiMAX. Both Wi-Fi and WiMAX aredifferent in that Wi-Fi covers shorter distances compared to WiMAX which covers longerdistances. In addition, Wi-Fi works better with LANs while WiMAX has capability to work
The Client Device and the Authentication Server_2
with MANs.For ZeeTech, the best WMAN technology to deploy is WiMAX because of thefollowing reasonsi)WiMAX is easy to install and setup since it does not require much infrastructure ii)WIMAX provides internet broadband access for data and voice transmission withhigh speeds iii)WiMAX uses strong encryption techniques such as AES and 3DES and will ensuredata security. iv)WiMAX technologywill support dedicated multipoint and point to point networkconnectionsQuestion 4a)Time Division Multiple Access (TDMA) TDMA facilitates multiple channel users to transmit data using a single bandwidth unit byallotting them distinct time slots as shown in Figure 1 below.Figure 2: Time Disvision Multiple Access. Source: [ CITATION ITU11 \l 1033 ]Strengthsi)TDMA separates users in different time slots hence no signal electromagneticinterference ii)TDMA can be used for voice and data communicationiii)Enables less costly signal modulation
The Client Device and the Authentication Server_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
The Operational Range of Frequency
|8
|1886
|54

Riordan Network Security Recommendations Assignment
|5
|923
|161

Wireless Connectivity- Assignment
|9
|2154
|31

Security Aspect of Wi-fi Technology: A Survey Paper Research Paper 2022
|5
|1183
|15

Presentation on VPN Networks
|14
|743
|173

Networking Assignment | Wireless Sensor Network
|13
|2886
|64