Understand HTTP request logs

How a device connects to a Wi-Fi network

Step 5: Device connects to a service

Due to a policy, shill specifies that the device automatically connects to service 0. If the user chooses to connect to a different Wi-Fi network, a different service number might be selected.

Step 6: Device performs authentication

wpa_supplicant starts the authentication phase on the device. Shill continues monitoring the state.

Step 7: Device performs association

wpa_supplicant moves to the association phase. After successful association, the device can send 802.11 data frames.

Step 8: Device and AP perform 4-way handshake

To create a data encryption key using the shared key (pairwise master key or PMK), wpa_supplicant performs the 4-way handshake between the device and the AP.  If the device connects to an 802.1X Extensible Authentication Protocol (EAP) network, it needs to perform the EAP authentication process first.

Step 9: Device and AP perform group key handshake

To allow the device to receive encrypted multicast and broadcast messages from the AP,  wpa_supplicant performs the group key handshake between the device and the AP.  The AP sends a groupwise transient key (GTK) to the device and the device acknowledges it.

Step 10: Device configures DHCP

Next, DHCP configuration takes place. When the device first connects to a network, it broadcasts a DHCP DISCOVER message to its subnet. The DHCP server offers an IP address to the device. The device formally requests the IP address with the DHCP REQUEST message. This is acknowledged by the DHCP server with the DHCP ACKNOWLEDGE message. The device then updates its settings to use this IP information.

DHCP configuration

Was this helpful?

How can we improve it?
17815355831581560086
true
Search
Clear search
Close search
Main menu
Search Help Center
true
true
true
true
true
410864
false
false
false
false