123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Wireless Networking - Wpa Vs Wep

Profile Picture
By Author: sarah justin
Total Articles: 12
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Theoretically, the concept of wireless networking is extremely simple. It is all about installing the adapter of a wireless network in your computer! You need not worry about running cables and drilling holes anymore. But, majority of people often get confused between WPA and WEP connectivity. To choose the best option, it is very necessary for you to first understand the pros and cons of WEP and WPA. WEP, which stands for "Wired Equivalent Privacy" was introduced in the year 1999. WPA or "Wi-Fi Protected Access", on the other hand, was launched by Wi-Fi Alliance in the latter half of 2003. WPA is considered to be the next generation of WLAN security and a much better option than WEP in terms of security.

Designed to replace WEP, WAP networking is an answer to all the following weaknesses of WEP. To activate the Wi-Fi Protected Access, you need not make any hardware upgrades in the 802.11 equipment. You just have to upgrade the firmware and software. So, before discussing the benefits of WPA and the reasons why it is better than WEP, here is a list of the major WEP weaknesses -

1) With an initialization vector ...
... (IV) of 24 bits, you can have a maximum of just 16.7 million combinations.
2) The fact that the same initialization vector (IV) can be put into use several times makes WEP extremely vulnerable to any collision-based attack.
3) In case of WEP, the temporary keys are not used. You are required to make use of the master keys directly.
4) Majority of users do not care to change the keys, making the encryption susceptible to hacker attacks.

How is WPA better than WEP?

Following are the various features that make WPA more advantageous than WEP networking -

1) WPA has an amazing feature for checking message integrity.
2) In case of WPA, you need not use the master keys directly. This makes the connectivity more secure.
3) IV keys are not reused. This encryption method provides much better security.
4) Unlike WEP, WPA has a 48-bit IV, which enables nearly 500 trillion key combinations.

Taking all the aforementioned features into account, WPA is clearly a better solution than WEP networking, especially in terms of security. There are a lot of other things that you must be aware of with regard to wireless networking. Besides getting answers to how WPA works, what are its weaknesses, and what are the possible alternatives, you can also keep an eye on the latest updates on networking. To get answers to all your doubts, you may go to online forums and discuss your concerns and issues with other people.

One such online forum for you is Techyv.com - A free to use site with lots of technical Articles, Tips, Blogs, Questions, and Solutions related to IT software and hardware.

Browse through Wireless Networking Details to understand all the nuts and bolts of networking.

Article Source: http://EzineArticles.com/?expert=Sharath_Reddy

Article Source: http://EzineArticles.com/6397126

Total Views: 679Word Count: 476See All articles From Author

Add Comment

System/Network Administration Articles

1. Fiber Optic Polishing Machines: Types, Applications, And When They Are Needed
Author: Ryan

2. Fiber Optic Pigtails: Types, Specifications, And Applications Explained
Author: Ryan

3. Fiber Curing Oven: Working Principles, Features, And Applications
Author: Ryan

4. From Struggling Pipelines To Sustainable Growth: The Real Benefits Of Outsourcing Lead Generation
Author: Sophia

5. Smart Print Automation: Transforming The Way Print Shops Work
Author: Printstore

6. Reasons To Try Aura Scanning For Inner Healing
Author: vidhi vidhanya

7. Fiber Polishing Machines: Precision Technology For High-performance Optical Networks
Author: Ryan

8. Mtp Cables Are Meant For High-performance Fibre Optic Communication
Author: Ryan

9. The Rising Importance Of Email Security In A Digital-first World
Author: Impaakt Magazine

10. Arbeitszeit Berechnen Mit Arbeitszeitrechner-24.de
Author: Steffen Stahl

11. Can Your Cloud Voip Provider Troubleshoot The Common Problems Associated With This Service?
Author: Julian Serle

12. An Optical Cable Production Line For Powering Global Connectivity
Author: Ryan

13. Why Does Your Business Need Optical Booster Amplifier?
Author: Ryan

14. The Latest In Cloud Technology And What It Means For Your Business
Author: TechFacto Global Services

15. Achieve Nis2 Compliance With Confidence
Author: Tushar Pansare

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: