Layer-2 isolation realized in operator WLANS
Recently, the IEEE 802.11 WLAN technology is developed rapidly and high-speed wireless access is stepping into our lives. In hot spot areas, the Operator WLAN architecture is proposed to solve the emerging management problems such as authentication, billing and authorization, etc. This paper specifi...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1665 Vol.2 |
---|---|
container_issue | |
container_start_page | 1662 |
container_title | |
container_volume | 2 |
creator | Chen Liquan Hu Aiqun Li Weizheng Ji Wenke |
description | Recently, the IEEE 802.11 WLAN technology is developed rapidly and high-speed wireless access is stepping into our lives. In hot spot areas, the Operator WLAN architecture is proposed to solve the emerging management problems such as authentication, billing and authorization, etc. This paper specifies how to use Layer-2 isolation to enhance the Operator WLAN effective management and security management. For IEEE 802.11 compliance, we propose a scheme to implement the MAC isolation by re-design the state machine of Distribution/spl I.bar/Service component in WLAN Access Point to realize Layer-2 isolation function. Finally, a WLAN AP design solution based on MPC860 hardware and Embedded Linux software is specified and simulation of Layer-2 isolation in Operator WLAN is presented. The result shows that the scheme by re-design the state machine of Distribution/spl I.bar/Service component in WLAN AP to realize Layer-2 isolation function is effective and realizable. |
doi_str_mv | 10.1109/ICNNSP.2003.1281202 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1281202</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1281202</ieee_id><sourcerecordid>1281202</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-2097648dd89f6ec7e4011a65adf99183af005242f88ba188b1238bf1100500913</originalsourceid><addsrcrecordid>eNotj81qwzAQhAWl0JL6CXLRA9Tu7kqypGMw_QkYt5CWHoNSr0DFjYPsS_r0NTTDMN9t4BNijVAhgn_YNl23e6sIQFVIDgnoShTeOliqrAVyN6KYpm9Yog2Chltx34Yz55JkmsYhzGk8ysxhSL_cy3SU44lzmMcsP9tNt7sT1zEMExcXrsTH0-N781K2r8_bZtOWCa2ZSwJva-363vlY85dlDYihNqGP3qNTIQIY0hSdOwRcBkm5Q1wkwAB4VCux_v9NzLw_5fQT8nl_cVJ_7oM_XA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Layer-2 isolation realized in operator WLANS</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Chen Liquan ; Hu Aiqun ; Li Weizheng ; Ji Wenke</creator><creatorcontrib>Chen Liquan ; Hu Aiqun ; Li Weizheng ; Ji Wenke</creatorcontrib><description>Recently, the IEEE 802.11 WLAN technology is developed rapidly and high-speed wireless access is stepping into our lives. In hot spot areas, the Operator WLAN architecture is proposed to solve the emerging management problems such as authentication, billing and authorization, etc. This paper specifies how to use Layer-2 isolation to enhance the Operator WLAN effective management and security management. For IEEE 802.11 compliance, we propose a scheme to implement the MAC isolation by re-design the state machine of Distribution/spl I.bar/Service component in WLAN Access Point to realize Layer-2 isolation function. Finally, a WLAN AP design solution based on MPC860 hardware and Embedded Linux software is specified and simulation of Layer-2 isolation in Operator WLAN is presented. The result shows that the scheme by re-design the state machine of Distribution/spl I.bar/Service component in WLAN AP to realize Layer-2 isolation function is effective and realizable.</description><identifier>ISBN: 9780780377028</identifier><identifier>ISBN: 0780377028</identifier><identifier>DOI: 10.1109/ICNNSP.2003.1281202</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Authorization ; Communication system control ; Communication system security ; Data security ; Isolation technology ; Large-scale systems ; Roaming ; Wide area networks ; Wireless LAN</subject><ispartof>International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003, 2003, Vol.2, p.1662-1665 Vol.2</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1281202$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1281202$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chen Liquan</creatorcontrib><creatorcontrib>Hu Aiqun</creatorcontrib><creatorcontrib>Li Weizheng</creatorcontrib><creatorcontrib>Ji Wenke</creatorcontrib><title>Layer-2 isolation realized in operator WLANS</title><title>International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003</title><addtitle>ICNNSP</addtitle><description>Recently, the IEEE 802.11 WLAN technology is developed rapidly and high-speed wireless access is stepping into our lives. In hot spot areas, the Operator WLAN architecture is proposed to solve the emerging management problems such as authentication, billing and authorization, etc. This paper specifies how to use Layer-2 isolation to enhance the Operator WLAN effective management and security management. For IEEE 802.11 compliance, we propose a scheme to implement the MAC isolation by re-design the state machine of Distribution/spl I.bar/Service component in WLAN Access Point to realize Layer-2 isolation function. Finally, a WLAN AP design solution based on MPC860 hardware and Embedded Linux software is specified and simulation of Layer-2 isolation in Operator WLAN is presented. The result shows that the scheme by re-design the state machine of Distribution/spl I.bar/Service component in WLAN AP to realize Layer-2 isolation function is effective and realizable.</description><subject>Authentication</subject><subject>Authorization</subject><subject>Communication system control</subject><subject>Communication system security</subject><subject>Data security</subject><subject>Isolation technology</subject><subject>Large-scale systems</subject><subject>Roaming</subject><subject>Wide area networks</subject><subject>Wireless LAN</subject><isbn>9780780377028</isbn><isbn>0780377028</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2003</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj81qwzAQhAWl0JL6CXLRA9Tu7kqypGMw_QkYt5CWHoNSr0DFjYPsS_r0NTTDMN9t4BNijVAhgn_YNl23e6sIQFVIDgnoShTeOliqrAVyN6KYpm9Yog2Chltx34Yz55JkmsYhzGk8ysxhSL_cy3SU44lzmMcsP9tNt7sT1zEMExcXrsTH0-N781K2r8_bZtOWCa2ZSwJva-363vlY85dlDYihNqGP3qNTIQIY0hSdOwRcBkm5Q1wkwAB4VCux_v9NzLw_5fQT8nl_cVJ_7oM_XA</recordid><startdate>2003</startdate><enddate>2003</enddate><creator>Chen Liquan</creator><creator>Hu Aiqun</creator><creator>Li Weizheng</creator><creator>Ji Wenke</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2003</creationdate><title>Layer-2 isolation realized in operator WLANS</title><author>Chen Liquan ; Hu Aiqun ; Li Weizheng ; Ji Wenke</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-2097648dd89f6ec7e4011a65adf99183af005242f88ba188b1238bf1100500913</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2003</creationdate><topic>Authentication</topic><topic>Authorization</topic><topic>Communication system control</topic><topic>Communication system security</topic><topic>Data security</topic><topic>Isolation technology</topic><topic>Large-scale systems</topic><topic>Roaming</topic><topic>Wide area networks</topic><topic>Wireless LAN</topic><toplevel>online_resources</toplevel><creatorcontrib>Chen Liquan</creatorcontrib><creatorcontrib>Hu Aiqun</creatorcontrib><creatorcontrib>Li Weizheng</creatorcontrib><creatorcontrib>Ji Wenke</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chen Liquan</au><au>Hu Aiqun</au><au>Li Weizheng</au><au>Ji Wenke</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Layer-2 isolation realized in operator WLANS</atitle><btitle>International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003</btitle><stitle>ICNNSP</stitle><date>2003</date><risdate>2003</risdate><volume>2</volume><spage>1662</spage><epage>1665 Vol.2</epage><pages>1662-1665 Vol.2</pages><isbn>9780780377028</isbn><isbn>0780377028</isbn><abstract>Recently, the IEEE 802.11 WLAN technology is developed rapidly and high-speed wireless access is stepping into our lives. In hot spot areas, the Operator WLAN architecture is proposed to solve the emerging management problems such as authentication, billing and authorization, etc. This paper specifies how to use Layer-2 isolation to enhance the Operator WLAN effective management and security management. For IEEE 802.11 compliance, we propose a scheme to implement the MAC isolation by re-design the state machine of Distribution/spl I.bar/Service component in WLAN Access Point to realize Layer-2 isolation function. Finally, a WLAN AP design solution based on MPC860 hardware and Embedded Linux software is specified and simulation of Layer-2 isolation in Operator WLAN is presented. The result shows that the scheme by re-design the state machine of Distribution/spl I.bar/Service component in WLAN AP to realize Layer-2 isolation function is effective and realizable.</abstract><pub>IEEE</pub><doi>10.1109/ICNNSP.2003.1281202</doi></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9780780377028 |
ispartof | International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003, 2003, Vol.2, p.1662-1665 Vol.2 |
issn | |
language | eng |
recordid | cdi_ieee_primary_1281202 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Authentication Authorization Communication system control Communication system security Data security Isolation technology Large-scale systems Roaming Wide area networks Wireless LAN |
title | Layer-2 isolation realized in operator WLANS |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T17%3A34%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Layer-2%20isolation%20realized%20in%20operator%20WLANS&rft.btitle=International%20Conference%20on%20Neural%20Networks%20and%20Signal%20Processing,%202003.%20Proceedings%20of%20the%202003&rft.au=Chen%20Liquan&rft.date=2003&rft.volume=2&rft.spage=1662&rft.epage=1665%20Vol.2&rft.pages=1662-1665%20Vol.2&rft.isbn=9780780377028&rft.isbn_list=0780377028&rft_id=info:doi/10.1109/ICNNSP.2003.1281202&rft_dat=%3Cieee_6IE%3E1281202%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1281202&rfr_iscdi=true |