An Architecture for Extensible Wireless LANs
نویسندگان
چکیده
This paper presents Trantor, an architecture for extensible wireless LANs. Trantor enables rapid innovation by removing standardization from the path of introducing new technologies. This is achieved largely by moving the intelligence away from wireless clients and into the infrastructure. In addition to providing extensibility, this approach can also help improve overall network performance through the use of global and historical information. Trantor enables network administrators to impose local policies thereby easing the task of wireless LAN management. In this paper we outline the motivation, vision, and architecture of Trantor.
منابع مشابه
A new SDN-based framework for wireless local area networks
Nowadays wireless networks are becoming important in personal and public communication andgrowing very rapidly. Similarly, Software Dened Network (SDN) is an emerging approach to over-come challenges of traditional networks. In this paper, a new SDN-based framework is proposedto ne-grained control of 802.11 Wireless LANs. This work describes the benets of programmableAcc...
متن کاملExtensible Authentication Protocol (EAP) Method Requirements for Wireless LANs
Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract The IEEE 802.11i MAC Security Enhancements Amendment makes use of IEEE 802.1X, which in turn relies on the Extensible Authentication Pro...
متن کاملRFC 4017 EAP Method Requirements for Wireless LANs
Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract The IEEE 802.11i MAC Security Enhancements Amendment makes use of IEEE 802.1X, which in turn relies on the Extensible Authentication Pro...
متن کاملEAP methods for wireless networks
This paper presents an overview and analysis of Extensible Authentication Protocol (EAP) and its place in securing wireless LANs. A number of specific widely used EAP methods are examined and evaluated for their advantages and susceptibility to types of attack. Next we propose suitable EAP methods for wireless technologies beyond LANs, including RFID and WiMAX. After analyzing requirements for ...
متن کاملA Mobile Agent Based Architecture for Securing WLANs
Wireless LANs are open and are vulnerable to various attacks. Techniques available to prevent Wireless LANs from these attacks are not comprehensive. In this paper we discuss the drawbacks of the existing security mechanisms and we provide a security architecture which uses Mobile agents as a security facilitator. Using this architecture, users have freedom to choose from a variety of encryptio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008