Slide 1
Slide 2
Slide 3
Slide 4
Slide 5
Slide 6
Slide 7
Slide 8
Slide 9
Slide 10
Slide 11
Slide 12
Slide 13
Slide 14
Slide 15
Slide 16
Slide 17
Slide 18
Slide 19
Slide 20
Slide 21
Slide 22
Slide 23
Slide 24
Product List
There are 2 ways to implement WPA. One requires an Access point router, and devices can be deployed with pre-defined keywords. This is similar to the way WEP was deployed, and basically provides a higher level of protection. It still requires static passwords/authentication keys to be defined in advance and distributed manually, which may be difficult in M2M applications. The password and device ID are verified by the Access point or Router which provides access to the network.
PTM Published on: 2013-08-06