Solved

How WEP/WPA work

Posted on 2011-09-06
3
536 Views
Last Modified: 2012-05-12
Please confirm my below understanding :-

1) WPA or WEP is a security protocol install inside Access Point ( WAP ) and not on the    
    wireless laptops

2) Either wireless laptop send data to AP or AP send data to wireless laptop , the data is  
    encrypted by WEP/WPA that reside in AP.

    In the other words , the data is encrypted bi-directionally by WEP/WPA which is  in AP .

Please point out whether (1) and (2) are correct .

   
0
Comment
Question by:kcn
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 3

Expert Comment

by:nbhu
ID: 36489622
Hi kcn,
Neither is exectly true, they are security protocols that are used on all hardware accessing the network over wireless connection.
WEP is an older, more vulnerable one, WPA or WPA2 is always a better,safer choice.
on simple networks WPA-PSK can be used, you have to set a passphrase on the router/access point, and set it on the connecting clients too.
A security key is generated from the passphrase, and it is used to code/decode data packets sent over the network.
Regards, nbhu
0
 

Author Comment

by:kcn
ID: 36489758
I am not asking comparison between WEP and WPA2 , I know their differences .

I am asking whether WEP/WPA is only reside in AP or also reside in laptop ??

Since ( assuming ) WEP or WPA only reside in AP , when AP send data to client (laptop) , AP will use WEP/WPA2 to encrpyt the data , however when client ( laptop) send data to AP whether the data from laptop is encrypted by WEP/WPA that reside in AP too ??

I am not interested in WEP or WPA /WPA2 comparison.
0
 
LVL 3

Accepted Solution

by:
nbhu earned 500 total points
ID: 36489832
Hi,
both directions are encrypted of course. The source(sender: AP or laptop) is encrypting data packets, sends it over the radio link, the receiver(the other device) is decrypting the packet and processing it.
It is symmetrical, every communicating device has the encrypt/decrypt algorithms.
Regards, nbhu
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question