In: Computer Science
Why is anonymity different in TWN and WLAN?
explain the 802.11 shared-key authentication process
Question 1 ) Before Understand why anonymit is different in TWN and Wlan , Lets understand the term anonymity
1) anonymity is the condition in which identity of individual subject is not called as researchers. or you can say it is structure which dosn't have name and cannot be used as template to create other structure.
2) Each anonymity has designed for specific task
3) The anonymity in TWN provide readability and Communication where as anonymity in WLAN provide more security
4) The feeling of loneliness in anonymity in TWN is closely associated with concept of right to the TWN and the negative effects of spatial segregation are associated with uncontrollled procedure of urban sprawl where as the anonymity in WLAN is different in wired network , which involves the identification anonymity , location anonymity.
Question 2 )
1 Shared Key Authentication (SKA) is a process through which a computer gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
2) It is not considered secure method of granting network access because it uses conventional unsecured channels, like writing or verbal exchange, to share a security key .
3) IN this shared key is setup manually on both mobile device and in Router
4) SKA follow below to setup
a) authentication request and identity assertion send from client to Acess point
b) AP ( access point ) challenge the clinet by sending challenge text
c) client encrypt challenge text with the help of shared key and send back to AP
d) Ap decrypt the client text if it match with the original text then AP authenticate the client
e ) client sucessfully connect to network
5) IN short SKA is a verification method in which terminal used Wired Equivalent Privacy Protocol to acess a wireless network