Location Discovery in Enterprise-based Wireless Networks: Case Studies and Applications

Size: px
Start display at page:

Download "Location Discovery in Enterprise-based Wireless Networks: Case Studies and Applications"

Transcription

1 1783-Her/Telecom 58/3-4 19/03/03 15:34 Page 1 pp Location Discovery in Enterprise-based Wireless Networks: Case Studies and Applications Simon G. M. KOO, Catherine ROSENBERG, Hoi-Ho CHAN, Yat Chung LEE Abstract We have designed and implemented a Web service for location discovery (LODS) and a location-based printing service that uses LODS on a network with wireless LAN connectivity based on IEEE that is typical to campuses and enterprises. The need for location management and location-based services is linked to the mobility of the users. While location discovery is already implemented in cellular telecommunication networks since the system needs to know where are the users to connect them to incoming calls, the need for such a service was not so crucial in data network where in general the mobile user is the client and initiates the connections. We propose several solutions to implement our location discovery service depending on the underlying networking architecture and compare these solutions in terms of several criteria. LODS allows mobile users to find their approximate location within the campus or the enterprise and allows location-based applications to find out the location of a user to suggest the nearest points of interest, e.g., printers, elevators, and vending machines. We also present the case of our location-based remote printing service that was deployed in Purdue wireless network. Key words: SERVICES DE LOCALISATION DANS LES RÉSEAUX D ENTREPRISE SANS FILS: ETUDE DE CAS ET APPLICATIONS Résumé Nous avons conçu et implante un service Web de découverte de localisation (LODS) et un service d imprimante à distance qui utilise LODS dans un réseau d entreprise utilisant la technologie IEEE La mobilité des usagers crée des besoins nouveaux, en particulier le besoin de découvrir les ressources de proximité disponibles et pour cela le système a besoin de connaître la position de l usager. La découverte de la position de l usager n est pas un problème nouveau dans les réseaux cellulaires puisque le réseau a besoin de savoir en tout temps où est l usager pour pouvoir le connecter à des appels entrants. Dans les School of Electrical and Computer Engineering, Purdue University, West Lafayette, IN , USA. {koo,cath,hchan,lee85}@ecn.purdue.edu 1/22 ANN. TÉLÉCOMMUN., 58, n 3-4, 2003

2 1783-Her/Telecom 58/3-4 19/03/03 15:34 Page 2 2 P. BERTIN WLAN STANDARDS AND EVOLUTIONS réseaux locaux sans fils, fondamentalement des réseaux de données, le problème est plus nouveau car en règle générale dans ces réseaux les clients initient les applications et le réseau n a pas à connecter le client à des appels entrants. Nous proposons et comparons plusieurs solutions pour implanter un service de découverte de la position de l usager dépendamment de l architecture du réseau. LODS permet aux usagers mobiles de trouver leur position (de façon approximative) dans leur entreprise ou dans leur campus et il peut être utilisé par des applications de découverte de ressources qui peuvent suggérer à l usager les points d intérêt les plus proches (comme par exemple, des imprimantes, des ascenseurs, ou des distributeurs de boissons) en fonction de sa position. Nous présentons aussi une étude de cas correspondant au service d imprimante à distance que nous avons déployé à l Université de Purdue aux Etats-Unis. Mots clés : Contents I. Introduction II. Related works III. Location Discovery Service and a Network-independent Solution IV. Network-based Solutions V. Application of Lods - Remote printing service VI. Conclusion and Future Work References (17 ref.) I. INTRODUCTION Location management has been an important topic in cellular telecommunications for a long time since the cellular telecommunication network needs to know where the users are to connect them to incoming calls. This is called passive connectivity, which is a requirement in cellular systems to contact or page an idle host. The need for location discovery adds to the complexity of the cellular system, impacts the overall architecture, and increases signaling. However, in a client-server paradigm, like the one used in a wireless LAN, there is no compulsory need for of paging or passive connectivity. A host usually initiates a connection as a client, and, unless the host also wants to be a server, it will not be passively connected. This limits the need for a location discovery mechanism. However such a mechanism would be needed to create value-added applications based on location discovery such as, for example, those mapping the current location of a mobile device to the nearest points of interest such as the nearest printer or vending machine. We have designed a new Web service for Location Discovery (LODS). LODS allows mobile users, using Personal Digital Assistants (PDAs) or laptops, on an IEEE wireless LAN to find their approximate location within the campus or the enterprise and allows location-based applications to find out the location of a user to suggest the nearest points of interest, e.g., printers, elevators, and vending machines. LODS highly enhances the mobility of the hosts within a campus or an enterprise, and, more importantly, this service is easy to deploy and does not require large infrastructure investment. This is especially useful in a campus or an enterprise environment when a mobile user needs to find the closest printer, computing lab, ANN. TÉLÉCOMMUN., 58, n 3-4, /22

3 1783-Her/Telecom 58/3-4 19/03/03 15:34 Page 3 P. BERTIN WLAN STANDARDS AND EVOLUTIONS 3 elevator, cafeteria, etc. Moreover, LODS is accessible directly by common Web browsers so virtually all mobile hosts can use it without purchasing additional hardware (i.e., a GPS receiver) or software. As a Web service, LODS can automatically be accessed by other Web-based applications through a simple API call. With proper database support, LODS can also be used in metropolitan setting with wireless network connectivity, like the wireless coffeehouse. We will discuss in the following sections the reasons why we have not proceeded with a mobile device-based solution in which most of the processing to find out the current position of the device is done in the device itself. Instead we decided to create network-based solutions that take full advantage of the underlying network infrastructure and require no modifications in the mobile device. We designed such solutions for two different wireless network architectures, one using RADIUS (see later) and one using VPN (Virtual Private Networks). We deployed the first solution on the Engineering Computer Network (ECN) at Purdue University. ECN covers three buildings and comprises sixty-plus Access Points (APs). We are in the process of deploying the second solution on the Purdue Air Link (PAL) an based wireless infrastructure that covers the whole campus (it spans over more than eighty buildings and hosts more than 38,000 students) and comprises hundreds of APs. These two based wireless networks have different configurations and characteristics and their case studies illustrate fully the extent of our solutions. FIG. 1. Remote printing scenario. Le scénario d imprimante à distance. LODS provides a service for location-based applications, which facilitates the building of an e-campus or other e-communities. An example will be our current project supported by Hewlett Packard. We have developed a Web-based remote printing service, which allows any 3/22 ANN. TÉLÉCOMMUN., 58, n 3-4, 2003

4 1783-Her/Telecom 58/3-4 19/03/03 15:34 Page 4 4 P. BERTIN WLAN STANDARDS AND EVOLUTIONS laptop or PDA with IEEE wireless access and a Web browser to print HTML, postscript, or PDF documents and all types of images to any network-connected printer without having to download the files and drivers. In the case where the mobile user is away from his office, e.g., in a different building, as shown in Figure 1, the remote-printing service can also call LODS to find the location of the mobile device to suggest the nearest printer(s) to the user. This paper is organized as follows. We will review some of the related works on location services in Section 2. We will describe the idea of LODS and present our general network settings in Section 3. A simple device-based solution, which does not depend on the underlying wireless architecture, will also be presented in that section and we will discuss its pros and cons. We believe that solutions, which are designed to take advantage of the underlying wireless configuration, will utilize the network better, and impose fewer problems on the client end. We will study two common based wireless configurations and present solutions for both settings in Section 4. Applications of LODS will be presented in Section 5, using remote printing as an example. We will conclude the paper and suggest future works in Section 6. II. RELATED WORKS Previous works on mobility ([2], [4], [5], [11], [12], and [13]) mainly considered telecommunication networks settings, which have infrastructure in place to support passive connectivity, paging, and location-based services. These works have focused on passive connectivity for which mobile devices, when idle, still have to listen to some control information, either periodically or using certain policy in case an incoming call arrives. Since in telecommunication network, the architecture and client connectivity are fundamentally different from those in wireless LAN, those schemes do not necessarily work for a wireless LAN setting. Another reason why our designs are different in that we assume that the users in our wireless network actively trigger LODS when they need it, i.e., we deal with active connectivity. Hence we are not trying here to solve the passive connectivity problem in an IEEE based network but to design LODS assuming the mobile device is initiating the request. Similar location-based online service includes go2online.com, which is providing information about nearby restaurants, shopping place, theatre, etc. to their customers via cellular phone or Palm. The key difference is go2online.com requires their customers to input their current location to query their Local Business Registry. Our service does not have such requirement. Users simply logon to the service, and LODS will locate them and suggest the nearest point of interest. Hightower and Borriello [14] surveyed some radio-frequency (RF) and GPS based location systems, which provide active connectivity. These solutions require additional RF components such as proprietary tag hardware and base stations or a GPS module, together with driver software installed on the mobile and, in some cases, the network infrastructure. ActiveCampus project [15] and RADAR [17] on the other hand use signal strength experienced by the mobile to determine a user s position through the process of triangulation. A software module developed specifically for each particular operating system and a wireless modem interface must be installed on the mobile before a user can obtain such information. These ANN. TÉLÉCOMMUN., 58, n 3-4, /22

5 1783-Her/Telecom 58/3-4 19/03/03 15:34 Page 5 P. BERTIN WLAN STANDARDS AND EVOLUTIONS 5 systems provide solutions, which have the advantage of being network independent in that they work on different wireless settings. However, both these systems require the installation of extra modules to the mobile host which imposes extra costs to the users and face the problem of system and hardware dependency. We will present another network-independent solution for active connectivity in based networks and discuss its pros and cons in section 3. From the users point of view, it is more desirable to have a no extra cost, low complexity solution that does not require installation of extra modules. This requirement can only be fulfilled if the solution makes full use of the underlying network architecture. We will present our innovative, configuration-aware solutions to provide a transparent and user-friendly location service for two different wireless settings in section 4 l. III. LOCATION DISCOVERY (LODS) SERVICE AND A NETWORK-INDEPENDENT SOLUTION Before we start the discussion on LODS, we need to describe what we call a typical enterprise-wide or campus-wide wireless-based network. Such network provides full wireless coverage in an enterprise and it allows staff to access the Internet, their account, and their from anywhere within the enterprise through the use of an IEEE b-enabled laptop or PDA. Such networks consist of IEEE access points (AP) that are positioned to provide full coverage and are interconnected through a high-speed intranet. The precise topology of such networks is chosen by the administrator so as to meet his requirements in terms of cost, scalability, security, and openness. We will describe two configurations in the next section. III.1. Location Discovery Service The Location Discovery Service we designed and implemented is a Web service [1] consisting of a location discovery engine and an API for accessing the service. Upon either a direct request from the user or indirectly through the call to a location-based service, the location discovery engine will determine which access point (AP) the user s mobile device is currently connected to, and return the ID of the AP as an estimation of the mobile s position. The entity that requested LODS service can then make use of the returned ID to provide the location-based service through a database mapping the positions of the APs to say, the position of the printers. The number and the positioning of the APs determine the preciseness of the locating process and in our networks, each AP is responsible for a thirty- to fifty-foot radius area, so LODS provides a good estimation of the location of the mobile device considering that our primary objective is to use LODS to suggest closest resources like printers, elevators, etc. to the mobile user. Most APs are designed and configured to be transparent bridges and operate at the link level. In that case, an AP only knows the MAC addresses (and not the IP addresses) of the 5/22 ANN. TÉLÉCOMMUN., 58, n 3-4, 2003

6 1783-Her/Telecom 58/3-4 19/03/03 15:34 Page 6 6 P. BERTIN WLAN STANDARDS AND EVOLUTIONS clients that it is associated with. However, as a Web service, LODS services communicate with clients or other location-based services at the application level using IP addresses and MAC addresses are generally not available. Thus, while we are trying to create an IP-to-AP mapping (i.e., the web service provides the IP address of the device to locate and LODS returns the ID of the associated AP), this mapping cannot be obtained directly. In fact the LODS engine must be able to convert an IP address to the corresponding MAC address, and then find the AP that is associated with this MAC address (see Figure 2). The readers should notice that the IPto-MAC mapping and the MAC-to-IP mapping could require different methods to e obtained. FIG. 2. Relationship between IP address, MAC address and Access Point ID in LODS. Relations entre l adresse IP, l adresse MAC et l identité du Point d Accès dans LODS. III.2. A Network-independent Solution In b, a mobile device needs to establish a relationship with an AP before using the network. This process is called association. In usual settings, a mobile could be under the coverage of multiple APs, and it will perform a scan to the frequency bands and select the AP with the best transmission quality. There are two types of scanning: active scan, where the mobile broadcasts a probe request and all candidate APs (those able to receive the probe) reply with a probe response (Scenario #1 in Figure 3); or passive scan, where the mobile determines the transmission quality with each potential AP from the beacon it received from this APs (Scenario #2 in Figure 3). Since the b modem will know at all time to which AP it is associated with, and since we are only interested in active connectivity where the action is initiated by the mobile device, it seems natural to obtain the information about the current associated AP from the mobile device itself and send the AP s ID to the LODS server. This would require writing a piece of software to place in the device to retrieve this information from the modem. The ANN. TÉLÉCOMMUN., 58, n 3-4, /22

7 1783-Her/Telecom 58/3-4 19/03/03 15:34 Page 7 P. BERTIN WLAN STANDARDS AND EVOLUTIONS 7 FIG. 3. How a mobile device receives AP information. Comment un équipement mobile s associe à un Point d Accès. locating process can be more precise if, instead of just using the AP s ID, the signal strength of all APs the mobile can reach is passed to the LODS server and triangulation is performed ([15] and [17]). This solution has the advantage of making the device responsible to locate itself regardless of the underlying network architecture. However, each user must first install a piece of software which is used to communicate with the modem in order to get the informa- 7/22 ANN. TÉLÉCOMMUN., 58, n 3-4, 2003

8 1783-Her/Telecom 58/3-4 19/03/03 15:34 Page 8 8 P. BERTIN WLAN STANDARDS AND EVOLUTIONS tion about the APs and such software will be operating-system dependent. Also, b modems from different vendors have different ways to store and manipulate the AP information, which means that a different version of the software will be needed for different modems (this could change in the future). This approach could work well in a homogenous environment in which all users use the same model of mobile device, which, for example, are provided by the enterprise [15]. In that case, only one version of the software will be required. This approach also has a good response time and does not create additional signaling overhead for the system. However, for a heterogeneous environment, which is a more realistic case, users have different PDA models and wireless modems. In that case it is not easy to make a version of the software for every user. Because of the heterogeneity of users, a system and software independent solution is worth investigating. In order to provide such solution, we need to make better use of the underlying wireless architecture. IV. NETWORK-BASED SOLUTIONS As we have seen in the previous section, a solution that is not aware of the underlying network configuration faces the problem of not being hardware and system independent. In this section, we will describe solutions we have designed, which rely on the underlying wireless configuration. We will investigate two of the most popular settings for based networks. We will also present and compare different solutions on these settings. In networks, clients are connected to the network via APs. However, the underlying configuration of the wireless network can vary significantly in order to meet different requirements. The two different based wireless configurations considered in this paper are a simple LAN configuration and a scalable virtual LAN (VLAN)/VPN based configuration. IV.1. Network Configurations The simple LAN configuration: this configuration is best used to provide coverage in an enterprise comprising from few floors of a building to few medium-size buildings and consists of tens of APs that are on the same subnet. An example of such a network configuration will be the Engineering Computer Network (ECN) of Purdue University shown in Figure 4, which spans over three buildings and has sixty-plus APs. Users either have a fixed, assigned IP address for their device, or they can obtain one from a DHCP server. In ECN, all users must register the MAC address of their wireless modems before being able to use the wireless infrastructure (this registration has to be done only once). Each AP in ECN will only grant access to a mobile device if the MAC address is on the registration list maintained in a RADIUS server. In order to perform such authentication, the AP will make a request to a RADIUS server to see if the MAC address is allowed to use the service. We will present the RADIUS protocol in section 4.2. Once the access is granted, the mobile device will be assigned a real IP address. When a user moves from the coverage of one AP to another, the ANN. TÉLÉCOMMUN., 58, n 3-4, /22

9 1783-Her/Telecom 58/3-4 19/03/03 15:34 Page 9 P. BERTIN WLAN STANDARDS AND EVOLUTIONS 9 authentication process repeats. In the ECN network, the IP address assigned to a mobile device remains unchanged throughout the whole session, and the assignment is done from a DHCP server located on the Purdue Intranet. The expected number of users in this kind of systems is not very large, ranging from a few hundreds to a couple thousands. This configuration is simple, easy-to-manage, but does not necessarily scale well because of the limited availability of real IP addresses and the fact that the shared medium could become a bottleneck if the traffic load is too large. FIG. 4. Logical configuration of Purdue ECN wireless network. Configuration logique du réseau sans fils ECN de Purdue. The VLAN configuration: the second architecture consists of multiple virtual LAN (VLANs) or virtual private networks (VPNs) under the same administrative domain. It usually comprises thousands of APs, and spans over a much larger geographical area. Purdue Air Link (PAL) network is an example of such a configuration. PAL is a campus-wide wireless network access service provided by ITaP (Information Technology at Purdue) at Purdue University. Upon the completion of the project in May 2003, over eighty buildings in the West Lafayette campus will have wireless connectivity. Currently the system has about 150 APs over twenty-plus buildings. The configuration of PAL is shown in Figure 5. In PAL network, users are assigned private IP addresses through a DHCP server logically located inside the VPN, and 9/22 ANN. TÉLÉCOMMUN., 58, n 3-4, 2003

10 1783-Her/Telecom 58/3-4 19/03/03 15:34 Page P. BERTIN WLAN STANDARDS AND EVOLUTIONS these private IP addresses are valid only in one VLAN area. Once a device leaves a VLAN coverage (say coverage A) to move to another VLAN coverage (say B), it needs to get another private IP address reflecting that it is in VLAN B and the old IP address of the mobile while it was in VLAN A is released to be used by other mobile devices under VLAN A coverage. PAL does not use IP masquerading or other similar techniques to provide Internet access to users. Instead, a VPN box (figure 5) is put at the edge of the VPN to provide a private-to-real IP mapping. All the traffic that run across the VPN and is destined to the Purdue Intranet or the Internet will pass through the VPN box, and all the IP packet headers will be modified by the VPN box to provide real-to-private IP mapping (the reverse for the traffic sent to mobile devices). This configuration scales better than the simple LAN one because there is a much larger range of private IP addresses available (PAL uses class A private IP address). It is also more scalable since adding new VLANs will not increase the local traffic on the existing VLANs. This configuration also allows different entities to manage different VLANs on a department-by-department basis. In general, each VLAN could have its own administrative rules that depend on the department s regulations. Note that users must provide a Purdue account username and password to the system before the VPN box will perform any mapping services for them. The system will check this username/password pair with the user authentication server located in the Purdue Intranet, and once the user is authenticated, the VPN box will perform the privateto-real IP mapping and the reverse mapping throughout the session, even if the user moves from one VLAN to another. These two configurations are significantly different yielding significantly different configuration-aware solutions. One major tradeoff to take into account when designing such solutions is between scalability and complexity. In the simple LAN configuration, since the number of APs and the number of users cannot be too large, scalability is not a big concern, thus we need to focus on a low-complexity solution, which provides fast response times. In the scalable VLAN configuration, even though efficiency is still a major concern, the ability to scale and keep the signaling traffic under control is even more important. We will address the above concerns when we present the respective designs. IV.2. Basic Approaches As the main goal of LODS is to locate a mobile user based on the AP it is associated with, we have developed two approaches to obtain the mobile device to AP mapping: the RADIUS approach and the SNMP approach. We will first discuss these two approaches, which will be the building blocks of our design, and then present our solutions for the two wireless settings described in section 4.1. The RADIUS Approach Remote Authentication Dial-In User Service (RADIUS) is used to provide centralized authentication, authorization, and accounting for dial-up, virtual private network, and, more recently, wireless network access [6]. Authentication is the process of identifying and verifying the credentials of a user. Several methods can be used to authenticate a user, but the most common involves using a combination of user name and password. Once a user is ANN. TÉLÉCOMMUN., 58, n 3-4, /22

11 1783-Her/Telecom 58/3-4 19/03/03 15:34 Page 11 P. BERTIN WLAN STANDARDS AND EVOLUTIONS 11 FIG. 5. PAL Wireless VLAN configuration. Configuration VLAN du réseau sans fils PAL de Purdue. authenticated, authorization to use various network resources and services can be granted. Authorization determines what a user can do, and accounting is the action of recording what a user is doing or has done. RADIUS is a protocol described in IETF RFC A RADIUS client (in our case a wireless access point) sends (using UDP) a RADIUS message containing the user credentials and the connection parameter information to a RADIUS server each time a new device tries to associate with the AP. The RADIUS server authenticates and authorizes the RADIUS client request, and sends back a RADIUS message response to the AP. Each AP will act as a RADIUS client to provide authentication to a user coming under its coverage by sending a message to the RADIUS server that responds by issuing an ACCEPT or DENY response to the AP. The RADIUS client (i.e., the AP) would then act according to the res- 11/22 ANN. TÉLÉCOMMUN., 58, n 3-4, 2003

12 1783-Her/Telecom 58/3-4 19/03/03 15:34 Page P. BERTIN WLAN STANDARDS AND EVOLUTIONS ponse it received. RADIUS is a protocol used between the APs and the RADIUS server. There is a need for an associated protocol between the mobile devices and the APs. One such protocol is the Extensible Authentication Protocol (EAP) [7]. EAP runs directly over the link layer between an AP and a mobile device and therefore it does not require the use of IP addresses. The Authenticator, which is the AP in our case, would request the mobile device, called the Supplicant, to provide identification. Once the supplicant provides the identification credentials, the authenticator ends the authentication phase with either a SUCCESS or a FAILURE response depending on the reply message from the RADIUS server. In general, the authentication mechanism that determines a SUCCESS or a FAI- LURE response does not require the use of RADIUS, and is up to the network administrator s policy to decide the authentication policies. In the ECN current wireless LAN setting, 802.1X [8], which is one of the authentication methods for b is used. Basically it is EAP over IEEE b. After a device has been associated with an AP, the AP would act as the EAP Authenticator and place the device in a blocked state. All non authentication-related traffic coming or going to the device is blocked by the AP. The device acts as the EAP supplicant and supplies identification, here its MAC address to the authenticator. The authenticator would then contact the authentication server, which is the RADIUS server in this case, and check if that MAC address is registered. Currently all users must register the MAC address of their devices in ECN before the devices are allowed to use the wireless service. The authenticator will then issue a SUCCESS or FAILURE response depending on the response from the authentication server. If a SUCCESS response is issued, the AP will drop its filter and allow all traffic between the device and the outside world. Each time a device tries to associate with a new AP, an authentication process starts in which the MAC address of the device is sent through EAP to the AP that sends it to the RADIUS server for authentication. In case the authentication process is successful, the following information is kept in a log file in the RADIUS server: the time at which the authentication request has been made, the ID of the AP that has made the request, and the MAC address of the device that was authenticated. By inspecting the log file of the authentication (RADIUS) server, it is possible to determine to which AP a given device is currently associated with. Using this information, we can determine the approximate location of the device. Figure 6 shows the use of the RADIUS server as a mean to locate a mobile device. Currently most APs are RADIUS-able. The SNMP approach SNMP (Simple Network Management Protocol) is the standard operations and maintenance protocol for the Internet [9]. It can be used to obtain system parameters from a device, and to configure various parameters on a device. Each parameter is called an attribute, and attributes are organized in groups called communities. Currently most APs are SNMP-able. In general APs are configured as transparent bridges and hence they all maintain their bridgelearning table. The bridge s learning table of a given AP contains the mappings of the MAC addresses of the devices, which have recently used that AP, to the corresponding interfaces of that AP. Therefore, if an entry indicates that a particular MAC address is mapped to the wireless interface of a given AP, we can conclude that the device with this MAC address has either been recently connected or is currently connected to that AP. This table is available to the network administrator via SNMP query as long as the APs are SNMP-enabled (a network administrator can decide to disable SNMP on his APs since SNMP has some security flaws). ANN. TÉLÉCOMMUN., 58, n 3-4, /22

13 1783-Her/Telecom 58/3-4 19/03/03 15:34 Page 13 P. BERTIN WLAN STANDARDS AND EVOLUTIONS 13 FIG. 6. The RADIUS approach. L approche basée sur RADIUS. In this approach, a server periodically queries all the APs using SNMP to obtain their bridge learning tables and creates its own log file. One of the shortcomings of this approach is that a bridge table does not refresh until a device has been inactive (possibly because it has moved) from the AP standpoint for about 15 to 20 minutes. By maintaining a log file, which contains information obtained from the periodic queries, we can find the latest AP to which a particular mobile device connected through a query to that log file. The idea is shown in Figure 7. 13/22 ANN. TÉLÉCOMMUN., 58, n 3-4, 2003

14 1783-Her/Telecom 58/3-4 19/03/03 15:34 Page P. BERTIN WLAN STANDARDS AND EVOLUTIONS FIG. 7. The SNMP approach. L approche basée sur SNMP. Comparing the basic approaches For those wireless LANs that use RADIUS for authentication, using the RADIUS approach is overhead free as long as the network administrator allows the RADIUS log file to be used for location discovery. This approach is also device independent. Regardless of what operating system the mobile device is using or what model it is, as long as the device has an IEEE modem card that is registered in the network, this solution will be able to locate it. The response time of the RADIUS approach in our system, i.e., the time it takes for the system to realize that a mobile device is in a new location is about 3 to 5 seconds in our implementation. The delay is mainly due to file updates over NFS (Network File System). For prototype testing, we did not want to interfere with existing services, so we had the RADIUS server running on one machine and the LODS server running on another machine. The LODS server detected changes in the log file on the RADIUS server and updated its copy of the log file accordingly. If both the RADIUS server and the LODS server are put on the same machine, the response time will be much improved. The shortcomings of the RADIUS approach include ANN. TÉLÉCOMMUN., 58, n 3-4, /22

15 1783-Her/Telecom 58/3-4 19/03/03 15:34 Page 15 P. BERTIN WLAN STANDARDS AND EVOLUTIONS 15 the need of a RADIUS server (or other authentication service with output log), the fact that it may not scale that well with the size of the enterprise network, and the fact that all APs must be able to perform authentication (i.e., to be EAP and RADIUS enabled). The SNMP approach does not require the setup of a RADIUS server and it is a generic approach, thus it is more suitable for open access AP systems like Internet café. It would also work in the case of a configuration with a RADIUS server if the network administrator does not want to give access to the RADIUS log file to LODS. In order for this approach to work, the APs have to be SNMP enabled which is not without security risk at the present time. The SNMP approach also is operating system and model independent. The downside of this approach is the heavy signaling generated by the periodic probing of APs. The response time of this approach can vary. In our network setting, the response time varies from 10 to 30 seconds for a probing period set to 10 seconds. The duration between two probes also determines how precise the locating scheme is. Obviously the right trade-off has to be found since the probing period impacts the signaling load as well as the response time (i.e., the speed at which a change of AP can be detected by the system). This approach like the previous one will not scale that well with the size of the enterprise network. IV.3. Network-aware LODS for Simple LAN Wireless Configuration To get a complete solution for LODS, we need to provide a solution to obtain the IP address to MAC address mapping as discussed in section 3.1. When a user or a web application requests service from LODS, the IP address of the mobile device will be extracted from the message header of the query. The Location Server will need to map this IP address to the corresponding MAC address to find out the AP associated with that mobile device. This can be done in several ways. However, in this relatively simple network setting, it is easy to obtain the IP address to MAC address mapping by interrogating the default gateway (i.e., the router represented in Figure 4), which has this information in its ARP table. This is done by having LODS make a SNMP query to the gateway asking for the MAC address corresponding to the IP address given in the query (figure 8). Regarding the MAC address to AP mapping, we have implemented both the RADIUS and the SNMP approaches in the ECN simple LAN wireless configuration. We compared the performance of the two approaches to get the MAC address to AP mapping, together with the devicebased approach mentioned in Section 3. Since each of the above approaches has its pros and cons, and different applicability, it is up to the network administrators to decide which is best suited for their network. Table 1 shows the comparison between the three schemes. Based on our implementation and testing (we have not implemented the device-driven approach due to system dependency), the RADIUS approach provides excellent performance. It requires no signaling in addition to the original RADIUS service. The response time is good, and the implementation is easy. The SNMP approach, on the other hand, generated a high amount of background signaling traffic, and the responsiveness is not always very satisfactory. For the device-driven approach, complexity in implementation is the main issue. Wireless modems from different vendors may need different low-level system calls to obtain the AP information, which makes the implementation of this scheme difficult. The retrieval of AP information can be done relatively easily in Linux. 15/22 ANN. TÉLÉCOMMUN., 58, n 3-4, 2003

16 1783-Her/Telecom 58/3-4 19/03/03 15:34 Page P. BERTIN WLAN STANDARDS AND EVOLUTIONS TABLE I. Comparison between different locating schemes. Comparaison des différentes solutions de localisation. RADIUS SNMP Device-based Network Service(s) RADIUS or other SNMP-enabled AP, required other than authentication server and a log file to maintain NO the location database with log the queries Signaling in addition NO if RADIUS Periodic to LODS requests or service is already SNMP requests NO responses required? in place and updates Software Installation in Mobile Required? Operating System Independent? NO NO YES YES YES NO Scalability AVERAGE POOR GOOD Hardware Model Independent? YES YES NO Ease of implementation Easy Intermediate Difficult (esp. for PDAs) Response Time 3 to 5 seconds 10 to 30 seconds (depending on probing period and AP response time) Immediately after associated with AP FIG. 8. Schematic of LODS for simple LAN Configuration. Schéma de base de LODS pour une configuration simple de réseau local. ANN. TÉLÉCOMMUN., 58, n 3-4, /22

17 1783-Her/Telecom 58/3-4 19/03/03 15:34 Page 17 P. BERTIN WLAN STANDARDS AND EVOLUTIONS 17 IV.4. Network-aware LODS for Scalable VLAN/VPN Configuration Purdue Air Link network runs on a scalable VLAN setting, which is shown in Figure 5, and assigns private IP addresses to users via DHCP. Since the network spans geographically over a large area, and the variety of types of mobile devices and operating systems that users can have is very large, not all the three basic approaches described earlier to obtain a mobile device-to-ap mapping (see Table 1) may work well. The RADIUS and SNMP approaches have a scalability problem while the device-based approach faces the system dependency problem. In order to provide LODS to the Purdue community, we need to develop a scalable and system-independent solution. The RADIUS approach seems to be a good starting point for the solution, since this solution tracks the movement of the users very well and incurs signaling only when the users move. If there is a centralized RADIUS server, LODS can check the log file of the server and easily determine the latest association between the mobile and APs. However, ITaP, the unit who administers PAL, decided not to have a centralized RADIUS and EAP service to check for authenticated MAC addresses. Instead, mobiles with any MAC addresses are allowed to talk to all the APs without blocking, but the user must have a Purdue account and needs to supply login information before getting a real-to-private (and a private-to-real) IP mapping from the VPN box. The authentication process was mentioned in section 4.1. The SNMP approach, though generic, generates too much background signaling traffic for a reasonable probing period. The device-based approach is good in terms of system scalability, but has too many shortcomings (that were discussed earlier) to be considered. Since we need to collect information about the association between the mobile devices and the APs in a scalable way, we decided to introduce extra components to the network. As the RADIUS approach introduces the least overhead in terms of background signaling and application development as shown in the previous section, we developed our solution for the VLAN configuration based on the service RADIUS provides. For the purpose of enhancing scalability, we dedicated a reduced RADIUS server to one or more VLANs, depending on the expected LODS load from the VLANs. A reduced RADIUS server, which we re-named Location Collector, consists of a RADIUS server program, which can be run on a low-end Linux box. It does not need to perform authentication as it is supposed to be. Its only function is to log the access requests to APs made by the mobile users in its coverage and maintain the mappings of MAC addresses to the most current associated APs. This is equivalent to voiding the RADIUS authentication processes by always returning ACCEPT to the AP. It is important that the reliability of the Location Collectors should not affect that of the PAL network, so EAP should be configured to never block a modem even if it fails to get a RADIUS ACCEPT message. With these Location Collectors, RADIUS traffic is limited to each VLAN or group of VLANs and each Location Collector will be responsible for the MAC-to-AP mapping in its region. Now we have the components required to build a scalable LODS system. This scalable LODS works in the following way (Figure 9): When a user or a web application requests service from LODS, the IP address of the mobile initiating the LODS request will be extracted from the message header of the query. The Location Server will, based on the private IP address of the mobile, determine which VLAN the mobile is in, thus which Location Collector to contact (there is a straightforward mapping between a mobile device private IP address and the VLAN it is in). As each Location Collector contains only the MAC-to-AP mappings, LODS needs to figure out the MAC address of the device. This can be done in two ways: First, the default gateway of each VLAN will have the IP-to-MAC mapping of the mobile 17/22 ANN. TÉLÉCOMMUN., 58, n 3-4, 2003

18 1783-Her/Telecom 58/3-4 19/03/03 15:35 Page P. BERTIN WLAN STANDARDS AND EVOLUTIONS since the APs are configured to be transparent bridges, so LODS can make a SNMP query to get the MAC address corresponding to an IP address to the correct gateway. This is the most straightforward way to obtain IP-to-MAC mapping in the sense that there is no overhead except a SNMP query and a SNMP reply messages, which are generated on-demand. Alternatively, it is also possible to make use of the log of the DHCP server. The log file of the DHCP server contains the assignment of IP addresses to MAC addresses, so by studying the log file, the IP-to-MAC mapping can be obtained. For more efficient response to queries, it is recommended that a database should be built which also parses the log file in the background. The database can be implemented in the same machine as the Location Server, so that the query time and traffic will be minimal, and the only signaling traffic introduced will be the one generated when the log file is being updated. One advantage of this scheme over querying the gateway is that with this database, not only the IP-to-MAC mappings are available, but also the MAC-to-IP mappings, which cannot be easily obtained by querying the gateways since we do not know which gateway(s) to query. The advantage of having the MAC-to-IP mappings is that the network is now able to provide based paging services and user tracking services. We will discuss this possibility in section 6 when we suggest future works. FIG. 9. Schematic of LODS for Scalable VLAN Configuration. Schéma de base de LODS pour une configuration VLAN à plus grande échelle. ANN. TÉLÉCOMMUN., 58, n 3-4, /22

19 1783-Her/Telecom 58/3-4 19/03/03 15:35 Page 19 P. BERTIN WLAN STANDARDS AND EVOLUTIONS 19 Once the Location Collector obtained the MAC address of the mobile either from the gateway or the DHCP log, it will return the ID of the AP to which the mobile device is currently associated back to the requesting entity. This design solves the scalability problem in that it takes full advantage of the modular architecture of the VLAN configuration. The downside of this design is that it requires additional hardware (the Linux boxes) for the Location Collectors (i.e., the RADIUS servers). One such server will need to be installed in every group of VLANs. The Cistron RADIUS server [16] is using a free software which has all the features needed. Since each Location Collector will only be responsible for the RADIUS traffic in its own region, the wireless network could expand by introducing more VLANs, and more Location Collectors thereafter, without posing scalability problem to LODS. With network-aware LODS deployed in the PAL network, it is possible for mobile users in the Purdue community to enjoy location service by using any mobile device with a generic browser. It is also possible to build location-based applications on top of this new Web Service. We will present an innovative application of LODS by showing the Remote Printing service which is being deployed on the PAL network in the next section. V. APPLICATION OF LODS REMOTE PRINTING SERVICE Remote printing service is a project that was supported in part by a Hewlett Packard grant. It is a web-based printing service for PDAs and laptops that enable them to print virtually any document that can be accessed through a Web browser (i.e., HTML, PS, PDF, and virtually all types of images) using any printer connected to the network without downloading the document. The advantages of this service are that there is no need to install any printer driver in the mobile device; that files for which there is no viewer installed in the PDA can still be printed from a PDA; and the mobile devices do not need to download, say, a huge postscript file, before printing it. This last advantage reduces the consumption of power and memory in the mobile device and is bandwidth friendly for the wireless LAN. Each mobile user wanting to use the Remote Printing Service is required to connect to a designated proxy server in order to receive this service. This proxy server will look at the URL the user requests, and if it has a PS, PDF, or any image suffix the system supports, it will redirect the request to the Remote Printing page together with the original URL. In that page the mobile user can choose whether to save/view the file or directly print it. If the user chooses to print the file, he has to select which printer to print to, then the Remote Printing Service will download the file directly from the content providing site, convert the file to a printable format, and print it to the desired printer. The whole process from downloading to printing does not involve any signaling or data transfer between the mobile device and the Remote Printing server. If the requested page is an HTML document, the proxy will add a small piece of code which generates a small box with a printing icon on the upper left hand corner of the webpage. Users can have the box removed by clicking the close button on the box. If the user decided to print that page, he would just need to click the printing icon, and the proxy will redirect the request to the Remote Printing page, again with the URL of the page that the user was browsing. The user can then choose which printer to use, and the Remote Printing Ser- 19/22 ANN. TÉLÉCOMMUN., 58, n 3-4, 2003

20 1783-Her/Telecom 58/3-4 19/03/03 15:35 Page P. BERTIN WLAN STANDARDS AND EVOLUTIONS vice will download, convert and print the HTML file in a similar fashion as the one described for printing PS and PDF files. The Remote Printing service works well if the user knows to which printer to print to. However, if the mobile user wants to use the printer, which is the closest to him right now, assuming that he is away from his own building, he may not know where the closest printer is. This means that without a location-based printing service, the user may have to get his document printed by an unnecessarily distant printer, even when a closer one was available. FIG. 10. Remote Printing Service using LODS. Le service d imprimante à distance qui utilise LODS. With LODS, the remote printing service can know approximately where the user is, and suggest printers that are closer to the user. This is illustrated in Figure 10. When Remote Printing is called by the user (directly or indirectly through a redirecting proxy), the service will know the IP address of the device. The Remote Printing Service will then pass the IP address of the device to the network-based LODS service discussed in the previous sections to determine which AP the device is currently using, and the AP s ID will be used to query a Location Database which contains the AP-to-printer mappings and is located in the same machine as the Remote Printing service. A list of closest printers will be returned to the user and the user can choose a printer from the list. We have chosen to maintain a Location Database, which contains all the mappings from the APs to the shared printers in the neighborhood. However, if the naming scheme for APs and shared resources (printers in this case) is carefully chosen, the resources closest to the ANN. TÉLÉCOMMUN., 58, n 3-4, /22

21 1783-Her/Telecom 58/3-4 19/03/03 15:35 Page 21 P. BERTIN WLAN STANDARDS AND EVOLUTIONS 21 mobile user could be obtained more efficiently. From our experience, we recommend system administrators who plan to implement location-based services to use a self-contented naming scheme for Access Points and shared resources. An example would be <Building Name> <Room Number> <Resource Type>. With this method, it is easier to determine the closest resources from an Access Point by using regular expressions to compare the building and room number without actually maintaining a database. VI. CONCLUSION AND FUTURE WORK In conclusion, this paper described different solutions for a new Web service for location discovery which locates mobile users based on the AP they are currently associated to. The service can be used directly by mobile users to know where they are, or through other applications via API calls to provide other location-based services. With network-based LODS, it is possible to provide wireless location services to users with virtually no cost imposed on them. We presented and compared different approaches to locate a user, and also presented network-based solutions based on two different wireless configurations. We also presented in detail an application to LODS, the Remote Printing service, to demonstrate the potential of LODS applications. We are currently working on another project named mypurdue, which is an e-community project aimed at providing a set of sophisticated location-based services to the Purdue community. Another possible extension to LODS will be the ability to track a user. Right now our system can locate a mobile user on the request of the user himself, and it will be interesting if the system can track a user in real-time like what is done in the cellular telecommunication networks. Challenges will be the heavy signaling generated by continuous tracking of a large number of users. Privacy and security will be another issue of concern. This could be used to create a paging service via wireless LAN and that would open the door to many exciting mobile applications. Manuscrit reçu le 26 septembre 2002 Accepté le 15 novembre 2002 Acknowledgement The authors would like to thank Mr. Bill Simmons of Engineering Computer Network (ECN) at Purdue University for his help in deploying LODS in ECN and Mr. Scott Ballew, Mr. Steve Mayo and Mr. Jim Bottum of ITaP at Purdue for their help with the PAL network. The authors would also like to thank Hewlett-Packard for their support through the mobile laboratory grant. 21/22 ANN. TÉLÉCOMMUN., 58, n 3-4, 2003

Location-based E-campus Web Services: From Design to Deployment

Location-based E-campus Web Services: From Design to Deployment Location-based E-campus Web Services: From Design to Deployment Simon G. M. Koo, Catherine Rosenberg, Hoi-Ho Chan, and Yat Chung Lee School of Electrical and Computer Engineering and Center for Wireless

More information

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Securing Wireless Networks by By Joe Klemencic Mon. Apr http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

Securing Wireless LANs with Certificate Services

Securing Wireless LANs with Certificate Services 1 Securing Wireless LANs with Certificate Services PHILIP HUYNH University of Colorado at Colorado Springs Abstract Wireless Local Access Network (WLAN) is used popularly in almost everywhere from the

More information

Configuring Port-Based and Client-Based Access Control (802.1X)

Configuring Port-Based and Client-Based Access Control (802.1X) 9 Configuring Port-Based and Client-Based Access Control (802.1X) Contents Overview..................................................... 9-3 Why Use Port-Based or Client-Based Access Control?............

More information

ENHANCING THE IN-CLASSROOM TEACHING/LEARNING EXPERIENCE USING WIRELESS TECHNOLOGY

ENHANCING THE IN-CLASSROOM TEACHING/LEARNING EXPERIENCE USING WIRELESS TECHNOLOGY ENHANCING THE IN-CLASSROOM TEACHING/LEARNING EXPERIENCE USING WIRELESS TECHNOLOGY Adegbile Adewunmi 1, Catherine Rosenberg 2, Adeoluwa Sun-Basorun 3, Simon G. M. Koo 4 Abstract - The widespread use of

More information

Enabling Location-Based Services on Wireless LANs

Enabling Location-Based Services on Wireless LANs Enabling Location-Based Services on Wireless LANs Yen-Cheng Chen, Yao-Jung Chan, and Cheung-Wo She Department of Information Management National Chi Nan University Puli, 545 Nantou, Taiwan ycchen@ncnu.edu.tw

More information

CCNA Discovery 4.0 Designing and Supporting Computer Networks

CCNA Discovery 4.0 Designing and Supporting Computer Networks CCNA Discovery 4.0 Designing and Supporting Computer Networks Characterizing Existing Network Chapter 3 1 Objectives 2 Creating a Network Diagram Typically, the first step in installing a new network is

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002

Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002 Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002 Pace University reserves the right to amend or otherwise revise this document as may be necessary to reflect future changes made

More information

Monitoring the Mobility Express Network

Monitoring the Mobility Express Network About the Cisco Mobility Express Monitoring Service, on page 1 Customizing the Network Summary View, on page 2 Viewing the Details of Configured WLANs, on page 5 Customizing Access Points Table View, on

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-BOaRDING and Securing DEVICES IN YOUR Corporate NetWORk PrepaRING YOUR NetWORk to MEEt DEVICE DEMaND The proliferation of smartphones and tablets brings increased

More information

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design

More information

TECHNICAL NOTE MSM & CLEARPASS HOW TO CONFIGURE HPE MSM CONTROLLERS WITH ARUBA CLEARPASS VERSION 3, JUNE 2016

TECHNICAL NOTE MSM & CLEARPASS HOW TO CONFIGURE HPE MSM CONTROLLERS WITH ARUBA CLEARPASS VERSION 3, JUNE 2016 HOW TO CONFIGURE HPE MSM CONTROLLERS WITH ARUBA CLEARPASS VERSION 3, JUNE 2016 CONTENTS Introduction... 5 MSM and AP Deployment Options... 5 MSM User Interfaces... 6 Assumptions... 7 Network Diagram...

More information

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1 Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

Security SSID Selection: Broadcast SSID:

Security SSID Selection: Broadcast SSID: 69 Security SSID Selection: Broadcast SSID: WMM: Encryption: Select the SSID that the security settings will apply to. If Disabled, then the device will not be broadcasting the SSID. Therefore it will

More information

Wireless LAN Security (RM12/2002)

Wireless LAN Security (RM12/2002) Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For

More information

Fast Handover Techniques for ESS-Subnet Topology Mismatch in IEEE

Fast Handover Techniques for ESS-Subnet Topology Mismatch in IEEE Fast Handover Techniques for ESS-Subnet Topology Mismatch in IEEE 802.11 Chien-Chao Tseng *, Chia-Liang Lin *, Yu-Jen Chang * and Li-Hsing Yen * Department of Computer Science, National Chiao Tung University,

More information

IEEE 802.1x, RADIUS AND DYNAMIC VLAN ASSIGNMENT

IEEE 802.1x, RADIUS AND DYNAMIC VLAN ASSIGNMENT IEEE 802.1x, RADIUS AND DYNAMIC VLAN ASSIGNMENT Hüseyin ÇOTUK Information Technologies hcotuk@etu.edu.tr Ahmet ÖMERCİOĞLU Information Technologies omercioglu@etu.edu.tr Nurettin ERGİNÖZ Master Student

More information

This regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus.

This regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus. UAR NUMBER: 400.01 TITLE: Wireless Network Policy and Procedure INITIAL ADOPTION: 11/6/2003 REVISION DATES: PURPOSE: Set forth the policy for using wireless data technologies and assigns responsibilities

More information

Efficient Handoff using Mobile IP and Simplified Cellular IP

Efficient Handoff using Mobile IP and Simplified Cellular IP Presented at GNSS 2004 The 2004 International Symposium on GNSS/GPS Sydney, Australia 6 8 December 2004 Efficient Handoff using Mobile IP and Simplified Cellular IP S. Omar School of Surveying & Spatial

More information

Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs

Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs Chibiao Liu and James Yu DePaul University School of CTI Chicago, IL {cliu1, jyu}@cs.depaul.edu Abstract This paper

More information

1 Connectionless Routing

1 Connectionless Routing UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing

More information

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs James T. Yu and Chibiao Liu School of Computer Science, Telecommunications, and Information Systems DePaul University,

More information

AAA Authentication: New Use Cases

AAA Authentication: New Use Cases AAA Authentication: New Use Cases An AdvOSS Solution White Paper Authors: Farhan Zaidi and Fawad Pasha Contact: {farhan.zaidi, fawadpasha}@advoss.com Whitepaper URL www.advoss.com/resources/whitepapers/aaa-authentication-new-usecases.pdf

More information

Network fundamentals IB Computer Science. Content developed by Dartford Grammar School Computer Science Department

Network fundamentals IB Computer Science. Content developed by Dartford Grammar School Computer Science Department Network fundamentals IB Computer Science Content developed by Dartford Grammar School Computer Science Department HL Topics 1-7, D1-4 1: System design 2: Computer Organisation 3: Networks 4: Computational

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

Cisco EXAM Designing for Cisco Internetwork Solutions. Buy Full Product.

Cisco EXAM Designing for Cisco Internetwork Solutions. Buy Full Product. Cisco EXAM - 640-864 Designing for Cisco Internetwork Solutions Buy Full Product http://www.examskey.com/640-864.html Examskey Cisco 640-864 exam demo product is here for you to test the quality of the

More information

Location-Based Push Services in Wireless LAN Hotspots

Location-Based Push Services in Wireless LAN Hotspots Location-Based Push Services in Wireless LAN Hotspots Yen-Cheng Chen and Gang-Ming Fan Department of Information Management National Chi Nan University Puli, 545 Nantou, Taiwan ycchen@ncnu.edu.tw, berger@im.ncnu.edu.tw

More information

Wireless LAN Controller Web Authentication Configuration Example

Wireless LAN Controller Web Authentication Configuration Example Wireless LAN Controller Web Authentication Configuration Example Document ID: 69340 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Web Authentication Process

More information

TECHNOLOGY Introduction The Difference Protection at the End Points Security made Simple

TECHNOLOGY Introduction The Difference Protection at the End Points Security made Simple APPGATE TECHNOLOGY UNIFIED TECHNOLOGY Introduction The AppGate solution truly delivers holistic security and access control where other approaches fall short. It is designed to address the security and

More information

Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide

Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide Introduction This is the first of a series of documents on the design and implementation of a wireless

More information

INTRODUCTION TO ICT.

INTRODUCTION TO ICT. INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO

More information

LANCOM Techpaper Advanced Routing and Forwarding (ARF)

LANCOM Techpaper Advanced Routing and Forwarding (ARF) IP network virtualization An ever increasing number of business applications such as telephony, remote maintenance and similar are using the advantages of IP networks. With its Advanced Routing and Forwarding

More information

Agile Controller-Campus V100R002C10. Permission Control Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

Agile Controller-Campus V100R002C10. Permission Control Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD. V100R002C10 Permission Control Technical White Paper Issue 01 Date 2016-04-15 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

Web Authentication Proxy on a Wireless LAN Controller Configuration Example

Web Authentication Proxy on a Wireless LAN Controller Configuration Example Web Authentication Proxy on a Wireless LAN Controller Configuration Example Document ID: 113151 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Proxy on

More information

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks University of Würzburg Institute of Computer Science Research Report Series Performance Comparison of Handover Mechanisms in Wireless LAN Networks Rastin Pries and Klaus Heck Report No. 339 September 2004

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.

More information

User Directories and Campus Network Authentication - A Wireless Case Study

User Directories and Campus Network Authentication - A Wireless Case Study User Directories and Campus Network Authentication - A Wireless Case Study Sean Convery Identity Engines Kevin Jones Metropolitan Community College Agenda Role-based Access Control About MCC Wireless project

More information

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help,

More information

8 VLANs. 8.1 Introduction. 8.2 vlans. Unit 8: VLANs 1

8 VLANs. 8.1 Introduction. 8.2 vlans. Unit 8: VLANs 1 8 VLANs 8.1 Introduction Layer 2 devices, such as network switches and wireless access points can be used to create virtual LANs (vlans), which can enhanced network security as it can be used to isolate

More information

AN APPLICATION OF ENTERPRISE WLAN SYSTEM FOR A UNIVERSITY CAMPUS

AN APPLICATION OF ENTERPRISE WLAN SYSTEM FOR A UNIVERSITY CAMPUS Abdurrahman Celebi Department of Information Technologies Office Beder University, Tirana, Albania acelebi@beder.edu.al AN APPLICATION OF ENTERPRISE WLAN SYSTEM FOR A UNIVERSITY CAMPUS Abstract Installation

More information

Load Balancing Technology White Paper

Load Balancing Technology White Paper Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing

More information

D-Link Central WiFiManager Configuration Guide

D-Link Central WiFiManager Configuration Guide Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install

More information

Service Selection in the Access Network

Service Selection in the Access Network Service Selection in the Access Network Nick Marly, Dominique Chantrain, Stephane Focant, Koen Handekyn, Koen Daenen, Claudine Batsleer Alcatel Research & Innovation, Francis Wellesplein 1, B-2018 Antwerp,

More information

NXC Series. Handbook. NXC Controllers NXC 2500/ Default Login Details. Firmware Version 5.00 Edition 19, 5/

NXC Series. Handbook. NXC Controllers NXC 2500/ Default Login Details. Firmware Version 5.00 Edition 19, 5/ NXC Series NXC 2500/ 5500 NXC Controllers Firmware Version 5.00 Edition 19, 5/2017 Handbook Default Login Details LAN Port IP Address https://192.168.1.1 User Name admin Password 1234 Copyright 2017 ZyXEL

More information

Efficient Mail Submission and Delivery (EMSD) On Windows CE

Efficient Mail Submission and Delivery (EMSD) On Windows CE Efficient Mail Submission and Delivery (EMSD) On Windows CE Neda Document Number: 103-101-01.02 Last Updated: Author unspecified Doc. Revision: source unspecified Neda Communications, Inc. First Published:

More information

IPv6-based Beyond-3G Networking

IPv6-based Beyond-3G Networking IPv6-based Beyond-3G Networking Motorola Labs Abstract This paper highlights the technical issues in IPv6-based Beyond-3G networking as a means to enable a seamless mobile Internet beyond simply wireless

More information

D-Link AirPlus G DWL-G700AP

D-Link AirPlus G DWL-G700AP TM D-Link AirPlus G DWL-G700AP 2.4GHz Wireless Access Point Manual Building Networks for People Contents Package Contents...3 Introduction...4 Wireless Basics...6 Getting Started...8 Using the Configuration

More information

Configuring IEEE 802.1x Port-Based Authentication

Configuring IEEE 802.1x Port-Based Authentication CHAPTER 8 Configuring IEEE 802.1x Port-Based Authentication This chapter describes how to configure IEEE 802.1x port-based authentication on the switch. IEEE 802.1x authentication prevents unauthorized

More information

Configuring Web Cache Services By Using WCCP

Configuring Web Cache Services By Using WCCP CHAPTER 44 Configuring Web Cache Services By Using WCCP This chapter describes how to configure your Catalyst 3560 switch to redirect traffic to wide-area application engines (such as the Cisco Cache Engine

More information

Handover Management for Mobile Nodes in IPv6 Networks

Handover Management for Mobile Nodes in IPv6 Networks TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we

More information

Wireless Domain Services FAQ

Wireless Domain Services FAQ Wireless Domain Services FAQ Document ID: 65346 Contents Introduction What is WDS? How do I configure my AP as a WDS? On what platforms does Cisco Structured Wireless Aware Network (SWAN) WDS run? How

More information

PMS 138 C Moto Black spine width spine width 100% 100%

PMS 138 C Moto Black spine width spine width 100% 100% Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of

More information

S5 Communications. Rev. 1

S5 Communications. Rev. 1 S5 Communications Rev. 1 Page 1 of 15 S5 Communications For a complete understanding of the S5 Battery Validation System (BVS) communication options, it is necessary to understand the measurements performed

More information

VLANs. Commutation LAN et Wireless Chapitre 3

VLANs. Commutation LAN et Wireless Chapitre 3 VLANs Commutation LAN et Wireless Chapitre 3 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectifs Expliquer le rôle des VLANs dans un réseau convergent. Expliquer le rôle

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security Chapter Topics Part 1 Behind the Scenes: Networking and Security CS10001 Computer Literacy Business Networks Network Advantages Client/Server Networks Network Classifications Servers Toplogies Chapter

More information

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018 White Paper TELEGRID Technologies, Inc. WZRDnet A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments February 14, 2018 23 Vreeland Road Suite 290 Florham Park, NJ 07932 www.telegrid.com

More information

Network Encryption 3 4/20/17

Network Encryption 3 4/20/17 The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server

More information

Service Mesh and Microservices Networking

Service Mesh and Microservices Networking Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards

More information

WL5041 Router User Manual

WL5041 Router User Manual TECOM WL5041 Router User Manual TECOM CO., LTD. March 2003 2003 by TECOM CO., LTD. All rights reserved. Printed in Taiwan Table of contents Package Contents--------------------------------------- 2 Installing

More information

Cisco Structured Wireless-Aware Network (SWAN) Implementation Guide

Cisco Structured Wireless-Aware Network (SWAN) Implementation Guide Cisco Structured Wireless-Aware Network (SWAN) Implementation Guide The Cisco Structured Wireless-Aware Network (SWAN) provides the framework to integrate and extend wired and wireless networks to deliver

More information

Chapter 5 Advanced Configuration

Chapter 5 Advanced Configuration Chapter 5 Advanced Configuration This chapter describes how to configure the advanced features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. Configuring Advanced Security The modem router

More information

Automating VPN Management

Automating VPN Management Automating VPN Management By Scott Hilton, Vice President Product Management Assured Digital, Inc. Although many network managers, users and executives agree on the benefits of virtual private networking,

More information

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table

More information

User Guide TL-R470T+/TL-R480T REV9.0.2

User Guide TL-R470T+/TL-R480T REV9.0.2 User Guide TL-R470T+/TL-R480T+ 1910012468 REV9.0.2 September 2018 CONTENTS About This Guide Intended Readers... 1 Conventions... 1 More Information... 1 Accessing the Router Overview... 3 Web Interface

More information

IP Addressing and Subnetting

IP Addressing and Subnetting IP Addressing and Subnetting Internet Layer The purpose of the Internet layer is to send packets from a network node and have them arrive at the destination node independent of the path taken. Internet

More information

Forescout. Configuration Guide. Version 2.2

Forescout. Configuration Guide. Version 2.2 Forescout Version 2.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Copyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills CA USA White Paper

Copyright 2011 Nomadix, Inc. All Rights Reserved Agoura Road Suite 102 Agoura Hills CA USA   White Paper Nomadix Service Engine Access in Large Public Venues Copyright 2011 Nomadix, Inc. All Rights Reserved. 30851 Agoura Road Suite 102 Agoura Hills CA 91301 USA www.nomadix.com 230-1026-001 Sheet 2 of 9 Introduction

More information

ECB Gon Tel: +44 (0) Fax: +44 (0) Wireless Long Range Multi-function 7+1 AP

ECB Gon   Tel: +44 (0) Fax: +44 (0) Wireless Long Range Multi-function 7+1 AP Wireless Long Range Multi-function 7+1 AP (Access Point/Client Bridge/Repeater/WDS AP/ WDS Bridge/ Client Router/AP Router) 2.4 GHz Super G 108Mbps EIRP up to 2000mW PRODUCT DESCRIPTION is a powerful,

More information

Configuring Request Authentication and Authorization

Configuring Request Authentication and Authorization CHAPTER 15 Configuring Request Authentication and Authorization Request authentication and authorization is a means to manage employee use of the Internet and restrict access to online content. This chapter

More information

Unicasts, Multicasts and Broadcasts

Unicasts, Multicasts and Broadcasts Unicasts, Multicasts and Broadcasts Part 1: Frame-Based LAN Operation V1.0: Geoff Bennett Contents LANs as a Shared Medium A "Private" Conversation Multicast Addressing Performance Issues In this tutorial

More information

C H A P T E R Overview Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide OL

C H A P T E R Overview Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide OL CHAPTER 1 Cisco Aironet 1400 Series s (hereafter called bridges) provide building-to-building wireless connectivity. Operating in the 5.8-GHz, UNII-3 band and conforming to the 802.11a standard, the 1400

More information

Networking Basics. Crystal Printer Network Installation Guidelines

Networking Basics. Crystal Printer Network Installation Guidelines Networking Basics & Crystal Printer Network Installation Guidelines 1. Overview This guide is intended to provide the necessary basic knowledge of wireless networking needed to enable the Crystal printer

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL Q&A PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL This document answers questions about Protected Extensible Authentication Protocol. OVERVIEW Q. What is Protected Extensible Authentication Protocol? A.

More information

Wireless LAN Overview

Wireless LAN Overview A wireless LAN (WLAN) is, in some sense, nothing but a radio with different frequencies and characteristics acting as a medium for networks. The Cisco 800, 1800, 2800, and 3800 series integrated services

More information

BEST PRACTICE - NAC AUF ARUBA SWITCHES. Rollenbasierte Konzepte mit Aruba OS Switches in Verbindung mit ClearPass Vorstellung Mobile First Features

BEST PRACTICE - NAC AUF ARUBA SWITCHES. Rollenbasierte Konzepte mit Aruba OS Switches in Verbindung mit ClearPass Vorstellung Mobile First Features BEST PRACTICE - NAC AUF ARUBA SWITCHES Rollenbasierte Konzepte mit Aruba OS Switches in Verbindung mit ClearPass Vorstellung Mobile First Features Agenda 1 Overview 2 802.1X Authentication 3 MAC Authentication

More information

Part I. Wireless Communication

Part I. Wireless Communication 1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable

More information

DASH7 ALLIANCE PROTOCOL - WHERE RFID MEETS WSN. public

DASH7 ALLIANCE PROTOCOL - WHERE RFID MEETS WSN. public DASH7 ALLIANCE PROTOCOL - WHERE RFID MEETS WSN public DASH7 ALLIANCE PROTOCOL OPEN STANDARD OF ULTRA LOW POWER MID-RANGE SENSOR AND ACTUATOR COMMUNICATION Wireless Sensor and Actuator Network Protocol

More information

AIRPLAY AND AIRPRINT ON CAMPUS NETWORKS AN ARUBA AIRGROUP SOLUTION GUIDE

AIRPLAY AND AIRPRINT ON CAMPUS NETWORKS AN ARUBA AIRGROUP SOLUTION GUIDE AIRPLAY AND AIRPRINT ON CAMPUS NETWORKS AN ARUBA AIRGROUP SOLUTION GUIDE Table of Contents Warning and Disclaimer... 3 Introduction... 4 What is Zero Configuration Networking (zeroconf)?... 5 WLANs and

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

CONNECTING TO THE COLLEGE NETWORK. Connecting to the College Network

CONNECTING TO THE COLLEGE NETWORK. Connecting to the College Network CONNECTING TO THE COLLEGE NETWORK Document Id Sponsor Laura Gibbs Author Nigel Rata Date May 2014 Version Control Log Version Date Change 1.0 25/05/10 Initial draft for review 1.1 6/10/10 Updated 1.2 15/05/2014

More information

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac WISNETWORKS User Manual V1.1 2016/3/21 Software version 1.0.0021 Table of contents 1. Setup& WMI... 3 1.1 Hardware Setup... 3 1.2 Web Management Interface... 3 2. Status... 4 2.1 Overview... 4 2.1.1 System...

More information

COPYRIGHTED MATERIAL. Index

COPYRIGHTED MATERIAL. Index Index Symbols and Numbers $ (dollar sign), in folder share names, 117 802.11a standard definition, 22 speed, 26 802.11b standard 802.11g standard 802.11i standard, 23 A access points compatibility, 45

More information

CounterACT DHCP Classifier Plugin

CounterACT DHCP Classifier Plugin CounterACT DHCP Classifier Plugin Version 2.0.7 and Above Table of Contents About the CounterACT DHCP Classifier Plugin... 3 What to Do... 3 Requirements... 4 Install the Plugin... 4 Concepts, Components,

More information

How Insecure is Wireless LAN?

How Insecure is Wireless LAN? Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Routing and security for remote labs for teaching and research (SRS-E-LABO)

Routing and security for remote labs for teaching and research (SRS-E-LABO) Routing and security for remote labs for teaching and research (SRS-E-LABO) Alassane Diop Research Associate, Center for Research LICEF, TELUQ / UQAM, Montréal, Québec, Canada Abstract: In this paper,

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined

More information

Good day. Today we will be talking about Local Internetworking What is Internetworking? Internetworking is the connection of different networks.

Good day. Today we will be talking about Local Internetworking What is Internetworking? Internetworking is the connection of different networks. Computer Networks Prof: Sujoy Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 21 Local Internetworking Good day. Today we will be talking about

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals: Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter

More information

McAfee Product Entitlement Definitions

McAfee Product Entitlement Definitions McAfee Product Entitlement Definitions Corporate Headquarters 2821 Mission College Blvd. Santa Clara, CA 95054 USA Application Server CPU CPU Core Database Database Instance Entity File Submission Daily

More information

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R PUCPR Internet Protocol Address Resolution and Routing Edgard Jamhour 2014 E N G L I S H S E M E S T E R 1. Address Resolution The IP address does not identify, indeed, a computer, but a network interface.

More information