An Architecture for Extensible Wireless LANs

نویسندگان

  • Rohan Murty
  • Jitendra Padhye
  • Alec Wolman
  • Matt Welsh
چکیده

This paper presents Trantor, an architecture for extensible wireless LANs. Trantor enables rapid innovation by removing standardization from the path of introducing new technologies. This is achieved largely by moving the intelligence away from wireless clients and into the infrastructure. In addition to providing extensibility, this approach can also help improve overall network performance through the use of global and historical information. Trantor enables network administrators to impose local policies thereby easing the task of wireless LAN management. In this paper we outline the motivation, vision, and architecture of Trantor.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A new SDN-based framework for wireless local area networks

Nowadays wireless networks are becoming important in personal and public communication andgrowing very rapidly. Similarly, Software Dened Network (SDN) is an emerging approach to over-come challenges of traditional networks. In this paper, a new SDN-based framework is proposedto ne-grained control of 802.11 Wireless LANs. This work describes the benets of programmableAcc...

متن کامل

Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs

Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract The IEEE 802.11i MAC Security Enhancements Amendment makes use of IEEE 802.1X, which in turn relies on the Extensible Authentication Pro...

متن کامل

RFC 4017 EAP Method Requirements for Wireless LANs

Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract The IEEE 802.11i MAC Security Enhancements Amendment makes use of IEEE 802.1X, which in turn relies on the Extensible Authentication Pro...

متن کامل

EAP methods for wireless networks

This paper presents an overview and analysis of Extensible Authentication Protocol (EAP) and its place in securing wireless LANs. A number of specific widely used EAP methods are examined and evaluated for their advantages and susceptibility to types of attack. Next we propose suitable EAP methods for wireless technologies beyond LANs, including RFID and WiMAX. After analyzing requirements for ...

متن کامل

A Mobile Agent Based Architecture for Securing WLANs

Wireless LANs are open and are vulnerable to various attacks. Techniques available to prevent Wireless LANs from these attacks are not comprehensive. In this paper we discuss the drawbacks of the existing security mechanisms and we provide a security architecture which uses Mobile agents as a security facilitator. Using this architecture, users have freedom to choose from a variety of encryptio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008