Layer-2 isolation realized in operator WLANS

Recently, the IEEE 802.11 WLAN technology is developed rapidly and high-speed wireless access is stepping into our lives. In hot spot areas, the Operator WLAN architecture is proposed to solve the emerging management problems such as authentication, billing and authorization, etc. This paper specifi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Chen Liquan, Hu Aiqun, Li Weizheng, Ji Wenke
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1665 Vol.2
container_issue
container_start_page 1662
container_title
container_volume 2
creator Chen Liquan
Hu Aiqun
Li Weizheng
Ji Wenke
description Recently, the IEEE 802.11 WLAN technology is developed rapidly and high-speed wireless access is stepping into our lives. In hot spot areas, the Operator WLAN architecture is proposed to solve the emerging management problems such as authentication, billing and authorization, etc. This paper specifies how to use Layer-2 isolation to enhance the Operator WLAN effective management and security management. For IEEE 802.11 compliance, we propose a scheme to implement the MAC isolation by re-design the state machine of Distribution/spl I.bar/Service component in WLAN Access Point to realize Layer-2 isolation function. Finally, a WLAN AP design solution based on MPC860 hardware and Embedded Linux software is specified and simulation of Layer-2 isolation in Operator WLAN is presented. The result shows that the scheme by re-design the state machine of Distribution/spl I.bar/Service component in WLAN AP to realize Layer-2 isolation function is effective and realizable.
doi_str_mv 10.1109/ICNNSP.2003.1281202
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1281202</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1281202</ieee_id><sourcerecordid>1281202</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-2097648dd89f6ec7e4011a65adf99183af005242f88ba188b1238bf1100500913</originalsourceid><addsrcrecordid>eNotj81qwzAQhAWl0JL6CXLRA9Tu7kqypGMw_QkYt5CWHoNSr0DFjYPsS_r0NTTDMN9t4BNijVAhgn_YNl23e6sIQFVIDgnoShTeOliqrAVyN6KYpm9Yog2Chltx34Yz55JkmsYhzGk8ysxhSL_cy3SU44lzmMcsP9tNt7sT1zEMExcXrsTH0-N781K2r8_bZtOWCa2ZSwJva-363vlY85dlDYihNqGP3qNTIQIY0hSdOwRcBkm5Q1wkwAB4VCux_v9NzLw_5fQT8nl_cVJ_7oM_XA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Layer-2 isolation realized in operator WLANS</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Chen Liquan ; Hu Aiqun ; Li Weizheng ; Ji Wenke</creator><creatorcontrib>Chen Liquan ; Hu Aiqun ; Li Weizheng ; Ji Wenke</creatorcontrib><description>Recently, the IEEE 802.11 WLAN technology is developed rapidly and high-speed wireless access is stepping into our lives. In hot spot areas, the Operator WLAN architecture is proposed to solve the emerging management problems such as authentication, billing and authorization, etc. This paper specifies how to use Layer-2 isolation to enhance the Operator WLAN effective management and security management. For IEEE 802.11 compliance, we propose a scheme to implement the MAC isolation by re-design the state machine of Distribution/spl I.bar/Service component in WLAN Access Point to realize Layer-2 isolation function. Finally, a WLAN AP design solution based on MPC860 hardware and Embedded Linux software is specified and simulation of Layer-2 isolation in Operator WLAN is presented. The result shows that the scheme by re-design the state machine of Distribution/spl I.bar/Service component in WLAN AP to realize Layer-2 isolation function is effective and realizable.</description><identifier>ISBN: 9780780377028</identifier><identifier>ISBN: 0780377028</identifier><identifier>DOI: 10.1109/ICNNSP.2003.1281202</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Authorization ; Communication system control ; Communication system security ; Data security ; Isolation technology ; Large-scale systems ; Roaming ; Wide area networks ; Wireless LAN</subject><ispartof>International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003, 2003, Vol.2, p.1662-1665 Vol.2</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1281202$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1281202$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chen Liquan</creatorcontrib><creatorcontrib>Hu Aiqun</creatorcontrib><creatorcontrib>Li Weizheng</creatorcontrib><creatorcontrib>Ji Wenke</creatorcontrib><title>Layer-2 isolation realized in operator WLANS</title><title>International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003</title><addtitle>ICNNSP</addtitle><description>Recently, the IEEE 802.11 WLAN technology is developed rapidly and high-speed wireless access is stepping into our lives. In hot spot areas, the Operator WLAN architecture is proposed to solve the emerging management problems such as authentication, billing and authorization, etc. This paper specifies how to use Layer-2 isolation to enhance the Operator WLAN effective management and security management. For IEEE 802.11 compliance, we propose a scheme to implement the MAC isolation by re-design the state machine of Distribution/spl I.bar/Service component in WLAN Access Point to realize Layer-2 isolation function. Finally, a WLAN AP design solution based on MPC860 hardware and Embedded Linux software is specified and simulation of Layer-2 isolation in Operator WLAN is presented. The result shows that the scheme by re-design the state machine of Distribution/spl I.bar/Service component in WLAN AP to realize Layer-2 isolation function is effective and realizable.</description><subject>Authentication</subject><subject>Authorization</subject><subject>Communication system control</subject><subject>Communication system security</subject><subject>Data security</subject><subject>Isolation technology</subject><subject>Large-scale systems</subject><subject>Roaming</subject><subject>Wide area networks</subject><subject>Wireless LAN</subject><isbn>9780780377028</isbn><isbn>0780377028</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2003</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj81qwzAQhAWl0JL6CXLRA9Tu7kqypGMw_QkYt5CWHoNSr0DFjYPsS_r0NTTDMN9t4BNijVAhgn_YNl23e6sIQFVIDgnoShTeOliqrAVyN6KYpm9Yog2Chltx34Yz55JkmsYhzGk8ysxhSL_cy3SU44lzmMcsP9tNt7sT1zEMExcXrsTH0-N781K2r8_bZtOWCa2ZSwJva-363vlY85dlDYihNqGP3qNTIQIY0hSdOwRcBkm5Q1wkwAB4VCux_v9NzLw_5fQT8nl_cVJ_7oM_XA</recordid><startdate>2003</startdate><enddate>2003</enddate><creator>Chen Liquan</creator><creator>Hu Aiqun</creator><creator>Li Weizheng</creator><creator>Ji Wenke</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2003</creationdate><title>Layer-2 isolation realized in operator WLANS</title><author>Chen Liquan ; Hu Aiqun ; Li Weizheng ; Ji Wenke</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-2097648dd89f6ec7e4011a65adf99183af005242f88ba188b1238bf1100500913</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2003</creationdate><topic>Authentication</topic><topic>Authorization</topic><topic>Communication system control</topic><topic>Communication system security</topic><topic>Data security</topic><topic>Isolation technology</topic><topic>Large-scale systems</topic><topic>Roaming</topic><topic>Wide area networks</topic><topic>Wireless LAN</topic><toplevel>online_resources</toplevel><creatorcontrib>Chen Liquan</creatorcontrib><creatorcontrib>Hu Aiqun</creatorcontrib><creatorcontrib>Li Weizheng</creatorcontrib><creatorcontrib>Ji Wenke</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chen Liquan</au><au>Hu Aiqun</au><au>Li Weizheng</au><au>Ji Wenke</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Layer-2 isolation realized in operator WLANS</atitle><btitle>International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003</btitle><stitle>ICNNSP</stitle><date>2003</date><risdate>2003</risdate><volume>2</volume><spage>1662</spage><epage>1665 Vol.2</epage><pages>1662-1665 Vol.2</pages><isbn>9780780377028</isbn><isbn>0780377028</isbn><abstract>Recently, the IEEE 802.11 WLAN technology is developed rapidly and high-speed wireless access is stepping into our lives. In hot spot areas, the Operator WLAN architecture is proposed to solve the emerging management problems such as authentication, billing and authorization, etc. This paper specifies how to use Layer-2 isolation to enhance the Operator WLAN effective management and security management. For IEEE 802.11 compliance, we propose a scheme to implement the MAC isolation by re-design the state machine of Distribution/spl I.bar/Service component in WLAN Access Point to realize Layer-2 isolation function. Finally, a WLAN AP design solution based on MPC860 hardware and Embedded Linux software is specified and simulation of Layer-2 isolation in Operator WLAN is presented. The result shows that the scheme by re-design the state machine of Distribution/spl I.bar/Service component in WLAN AP to realize Layer-2 isolation function is effective and realizable.</abstract><pub>IEEE</pub><doi>10.1109/ICNNSP.2003.1281202</doi></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9780780377028
ispartof International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003, 2003, Vol.2, p.1662-1665 Vol.2
issn
language eng
recordid cdi_ieee_primary_1281202
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Authentication
Authorization
Communication system control
Communication system security
Data security
Isolation technology
Large-scale systems
Roaming
Wide area networks
Wireless LAN
title Layer-2 isolation realized in operator WLANS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T17%3A34%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Layer-2%20isolation%20realized%20in%20operator%20WLANS&rft.btitle=International%20Conference%20on%20Neural%20Networks%20and%20Signal%20Processing,%202003.%20Proceedings%20of%20the%202003&rft.au=Chen%20Liquan&rft.date=2003&rft.volume=2&rft.spage=1662&rft.epage=1665%20Vol.2&rft.pages=1662-1665%20Vol.2&rft.isbn=9780780377028&rft.isbn_list=0780377028&rft_id=info:doi/10.1109/ICNNSP.2003.1281202&rft_dat=%3Cieee_6IE%3E1281202%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1281202&rfr_iscdi=true