This Book provides basics of Wireless LAN, 802.1x system and 802.11i Security Model. In this book, the flow of messages of the protocols EAP,EAP-MD5, EAP-TLS and EAP-TTLS are covered in detail. The Design, implementation issues and validation of the protocols are discussed. The snapshots of the messages received and sent from wireless client are recorded to help the reader to understand the EAP based protocols message sequences. The intended audience of this book are students,software professionals working in the development of authentication and security protocols for Wireless LAN.