Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

WLAN Wireless Network 07-Overview of Wireless LAN Communications

2025-04-04 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Overview of wireless local area network communication.

Some people like to compare the communication of a wireless local area network to a wired local area network to plug a network cable connected to a computer into a 802.3 network port. I think there are similarities and great differences here.

First of all, let's take a look at the basic communication process of wireless local area network. The 802.11 network, no matter how it is configured, requires the following processes: scanning, authentication, association and communication data exchange.

Scanning: there are two cases here, active scanning and passive scanning

Passive scanning: the client listens to the beacon frame sent by the access point and learns the surrounding network environment through the information it carries.

Active scanning: the client initiatively sends out the probe frame (probe request). After receiving the probe frame, the access point gives the corresponding response (probe response). The client learns the surrounding network environment through the relevant information it carries.

Authentication: it is equivalent to identification, not that any wireless network device can access the network.

802.11 defines two authentication methods: Open System Authentication and Shared Key Authentication.

802.11i defines two other authentication methods: 802.1X/EAP authentication (enterprise level) and Preshared Key (PSK) or Personal (individual level).

These two methods defined by 802.11i are called RSN (robust security network) networks, and you will often see two versions of WPA and WPA2. These four methods will be described in detail later, which will not be discussed too much here.

The client will first issue the association request, and the access point will reply to the success or failure of the client request after receiving the association request.

Association: the client passes the authentication step, and the next step is the association.

Similar to authentication, the association is also divided into two steps. The client sends out the association request, and the access point will reply to agree to the client association or reject the client association according to the appropriate situation.

Data communication: after completing the above three steps, the client can communicate with the access point, such as obtaining the IP address and communicating with other clients.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report