![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/3/a5/3a5025ae-64cb-4e0e-b250-bc523bcc8183/3a5025ae-64cb-4e0e-b250-bc523bcc8183-bg36.png)
User Manual for the NETGEAR RangeMax™ Wireless USB 2.0 Adapter WPN111
B-8 W ireless N etworking Basics
202-10076-01
Figure B-2: 802.11 open system authentication
The following steps occur when two devices use Open System Authentication:
1. The station sends an authentication request to the access point.
2. The access point authenticates the station.
3. The station associates with the access point and joins the network.
The WEP Shared Key authentication process is illustrated in below.
Figure B-3: 802.11 shared key authentication
The following steps occur when two devices use Shared Key Authentication:
1. The station sends an authentication request to the access point.
INTERNET LOCAL
ACT
12345678
LNK
LNK/ACT
100
Cable/DSL
ProSafeWirelessVPNSecurityFirewall
MODEL
FVM318
PWR TEST
WLAN
Enable
Access Point (AP)
1) Authentication request sent to AP
2) AP authenticates
3) Client connects to network
802.11 Authentication
Open System Steps
Cableor
DLS modem
Client
attempting
to connect
INTERNET LOCAL
ACT
12345678
LNK
LNK/ACT
100
Cable/DSL
ProSafeWirelessVPNSecurityFirewall
MODEL
FVM318
PWR TEST
WLAN
Enable
Access Point (AP)1) Authentication
request sent to AP
2) AP sends challenge text
3) Client encrypts
challenge text and
sends it back to AP
4) AP decrypts, and if correct,
authenticates client
5) Client connects to network
802.11 Authentication
Shared Key Steps
Cableor
DLS modem
Client
attempting
to connect