Without an extra layer of security, hosts can access resources on the wired network without any form of authentication. Basically there is no way to know who is accessing the wired network infrastructure. To manage this type of connections, IEEE 802.1x port based authentication can be implemented...