XXXXXXXXXX
XXXXX, C. (2014). Wi-fi security: XXXXXXX XXXX XXXXXXX XXXXX.XXXXXXX XXXXXXXXXXXXXX XXX Journal,XX(3), XXX.
LAB
Authentication and authorization are two XXXXXXXXX XXXXXXXX but XXXX XXXXXXXXX work together to XXXXXXX XXX XXXXXXXX of the networks. XX simple words, XXXXXXXXXXXXXX reveals XXX XXXXXXXX XX XXX XXXXXXX user or machine and the XXXXXXXXXXXXX sets the limits for XXXX it XXX access XXX XXXXXX XX that XXXXXXX (Gite, 2009). The XXXXXXXXX XXXXXXX XXXX XXXX the readers understand XXX XXX XXXXXXXX even better. John reserved a table XXX two XX a restaurant XX the XXXXX. When he arrived XX XXX restaurant, XXX XXXXXXX asked XXX name XXX XXXXXXXXXXX showed him the table. XX XXXXXX XXX name, XXX greeter was XXXXXX John to XXXXXXXXXXXX. XX XXXXXXXX XXX XXXXXXXXXXX, the XXXXXXX knew XXXX John XXX authorized XX XXXXXX two XXXXX at the restaurant, for XXX and XXX XXXX. XXXXXXXXXXXXXX XXX XXXXXXXXXXXXX XXX both based on identity. The XXXX or the XXXXXXX XXX XX XXXX his/XXX XXXXXXXXXXX XXX XXXXXXXX to XXX XXXXXX or XXXXXXXX XXXXXX XXXXXXXXXX XXXX on behalf of XXX network. XXXX users XXXX a XXXXXXXX and XXXXXXXX XXXXX XXXX machines XXXX a XXXXXX network XXXXXXX (MAC for XXXXXXX). XXXXX credentials XXXX show if the XXXX/XXXXXXX can XXXXXX the network XXX XXX XXXX he/it can XXXXXXXX with. XXXXXXX, these XXXXXXXX XXXXX XX not always work together. X XXXXXX XXXXXXXX network XXX allow XXXXX to XXXXXXX without authentication XXX the XXXX network XXXX XXXX allow several XXXXXXXXXX XXXXX to XXXX changes XX XXX network. XXX example, XXX XXXX and the XXXXXXXXXXXXX will XXX on XXX XXXXXXX XXXXXXX any password but XXX XXXXXXXXXXXXX can enter the XXXXXXX XXXXX of XXX XXXXXXX. Therefore, authentication and XXXXXXXXXXXXX can be separate or co-XXXXXXXXX. Usually, XXXXXXXXXXXXX depends XX XXXXXXXXXXXXXX. XXXXXXX XXXXXXXXX XXX XXXXXXXX XX XXX user or the XXXXXXX, XXX XXXXXXX XXXXXX know XXXX its role XX XXX network or it will XXXXXX a limited XXX. XX XXX other side, authentication XXXX XXX XXXXXX XX the XXXXXXXXXXXXX XXXXXXX. XXXXXXX XXX reject XXX XXXXX XXX allowed XX XXXXXX XXX network. XX practice, the XXXX will perceive XXX XXXXXXXXXXXXXX process as integrated XXXX XXX authorization one XXX on XXX technical XXXX, these processes will take place separately (Mayhew, XXXX). By XXXXXXXXXXXXXX, XXX XXXXXX will XXXXXXX know the role XXXX XXXX XXX XX the network XXX XXXX it XXX XX or XXX.
References