There are different 802.1x authentication types, each provides a different approach to authentication but all employ the same 802.1x protocol and framework for communication between a client and an access point. In most protocols, upon the completion of the 802.1x authentication process, the supplicant receives a key that it uses for data encryption. Refer to How 802.1x authentication works for more information. With 802.1x authentication, an

authentication method is used between the client and a Remote Authentication Dial-In User Service (RADIUS) server connected to the access point. The authentication process uses credentials, such as a user's password that are not transmitted over the wireless network. Most 802.1x types support dynamic per-user, per-session keys to strengthen the static key security. 802.1x benefits from the use of an existing authentication protocol known as the Extensible Authentication Protocol (EAP).

802.1x authentication for wireless LANs has three main components:

The authenticator (the access point)

The supplicant (the client software)

The authentication server (a Remote Authentication Dial-In User Service server [RADIUS])

802.1x authentication security initiates an authorization request from the wireless client to the access point, which authenticates the client to an Extensible Authentication Protocol (EAP) compliant RADIUS server. This RADIUS server may authenticate either the user (via passwords or certificates) or the system (by MAC address). In theory, the wireless client is not allowed to join the networks until the transaction is complete.

There are several authentication algorithms used for 802.1x. Some examples are: EAP-TLS, EAP-TTLS, and Protected EAP (PEAP). These are all methods for the wireless client to identify itself to the RADIUS server. With RADIUS authentication, user identities are checked against databases. RADIUS constitutes a set of standards addressing Authentication, Authorization and Accounting (AAA). Radius includes a proxy process to validate clients in a multi-server environment. The IEEE 802.1x standard is for controlling and authenticating access to port-based 802.11 wireless and wired Ethernet networks. Port-based network access control is similar to a switched local area network (LAN) infrastructure that authenticates devices that are attached to a LAN port and prevent access to that port if the authentication process fails.

What is RADIUS?

RADIUS is the Remote Access Dial-In User Service, an Authorization, Authentication, and Accounting (AAA) client-server protocol, which is used when a AAA dial-up client logs in or out of a Network Access Server. Typically, a RADIUS server is used by Internet Service Providers (ISP) to perform AAA tasks. AAA phases are described as follows:

Authentication phase: Verifies a user name and password against a local database. After the credentials are verified, the authorization process begins.

Authorization phase: Determines whether a request is allowed access to a resource.

Page 134
Image 134
Intel 3945ABG specifications What is RADIUS?

3945ABG specifications

The Intel 3945ABG is a wireless networking adapter that played a significant role in advancing wireless connectivity in laptops and portable devices. Introduced in the mid-2000s, this adapter is notable for its dual-band capabilities and compliance with the IEEE 802.11 a/b/g standards. It supports both 2.4 GHz and 5 GHz frequency bands, enabling users to connect to a variety of wireless networks while offering improved performance and flexibility.

One of the standout features of the Intel 3945ABG is its support for MIMO technology, which stands for Multiple Input Multiple Output. This innovative technology enhances data transmission rates and increases the range of wireless connections by utilizing multiple antennas for sending and receiving data. MIMO allows the adapter to operate more efficiently in environments with obstacles, such as walls or furniture, making it an ideal choice for users who need reliable connectivity in varied settings.

The Intel 3945ABG adapter also includes Wi-Fi Protected Access (WPA) and WPA2 security protocols, ensuring that data transmitted over the wireless network remains secure. This is especially important in a time when wireless networks became progressively more vulnerable to unauthorized access and data breaches. The adapter's compatibility with these security standards aids users in establishing secure communications, whether for casual web browsing or sensitive tasks.

In terms of performance, the Intel 3945ABG offers maximum theoretical speeds of up to 54 Mbps in the 802.11a and 802.11g modes, while maintaining lower speeds in the 802.11b mode (up to 11 Mbps). In practical use, this means that users can achieve high data transfer rates in optimal conditions, making it suitable for video streaming, online gaming, and large file downloads.

The Intel 3945ABG also integrates seamlessly with Intel's Centrino mobile technology, which enhances power efficiency and optimizes the overall performance of a laptop. This synergy not only extends battery life but also provides a smooth user experience, as it allows the adapter to effectively manage network resources and maintain a stable connection.

In summary, the Intel 3945ABG wireless adapter is characterized by its dual-band support, MIMO technology, robust security features, and integration with Intel's Centrino technology. While it may now be considered outdated by modern standards, it served as an important stepping stone in the evolution of wireless networking technology and continues to be remembered for its contributions to mobile connectivity.