User's Manual

Chapter 5 Wireless
B222s User’s Guide
64
The following figure shows a WPS- enabled wireless client ( installed in a not ebook com puter)
connecting to t he WPS-enabled AP via t he PI N m ethod.
Figure 31 Exam ple WPS Pr ocess: PI N Method
5.7.6.3 How WPS Works
When two WPS- enabled devices connect , each device m ust assum e a specific role. One device acts
as t he registrar ( the device t hat supplies net w ork and securit y settings) and t he ot her device acts
as t he enrollee ( the device t hat receives net w ork and securit y set tings. The registrar creat es a
secure EAP ( Ext ensible Aut hent icat ion Prot ocol) t unnel and sends t he net work nam e ( SSI D) and t he
WPA- PSK or WPA2- PSK pre- shared key to t he enrollee. Whet her WPA-PSK or WPA2- PSK is used
depends on t he standards support ed by t he devices. I f the registrar is already part of a net w ork, it
sends t he existing inform ation. I f not , it generat es the SSI D and WPA( 2) -PSK random ly.
ENROLLEE
SECURE EAP TUNNEL
SSID
WPA(2)-PSK
WITHIN 2 MINUTES
COMMUNICATION
This device’s
WPS
Enter WPS PIN
WPS
from other device:
WPS PIN: 123456
WPS
START
WPS
START
REGISTRAR