Securing and scaling the Wireless LAN

ثبت نشده
چکیده

First generation Wireless LAN (WLAN) systems were all about basic standards, connectivity, and end-user benefits. They did not address a number of key enterprise requirements. Second generation WLAN systems are all about enhanced standards addressing security, Quality of Service (QoS), interoperability, enterprise-wide roaming, and architected solutions with placement of functionality for optimal price, performance, and control. This paper describes Nortel Networks second generation secure WLAN architecture, which is centered on a new networking element: the WLAN Security Switch. Deployment of second generation WLAN solutions will lay the groundwork for third generation WLANs, which will be highly integrated and include support for seamless roaming across public and private networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining

Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...

متن کامل

Securing a Medical Wireless LAN System

This paper identifies security issues that must be addressed, if a recently proposed Medical Wireless LAN System (MedLAN) is to be accepted. Two classes of security issues are distinguished, technical and managerial.

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

A Unified Approach for Securing Wireless, Remote, and Internal LAN Access

Overview In today’s enterprise environment, the proliferation of access methodologies such as Gigabit wired connections, high-speed broadband access, remote access from various locations (kiosk, internet café), and wireless networks, has driven the need for new services. Mobile and remote access to company resources are essential for remote worker productivity and business efficiency. However, ...

متن کامل

Securing Wireless Communication Against Dictionary Attacks Without Using PKI

Geethakumar, Sarath. M.S., Purdue University, May, 2010. Securing Wireless Communication Against Dictionary Attacks Without Using PKI. Major Professors: Samuel S. Wagstaff Jr. and Melissa Dark. Security of 802.11x wireless encryption standards are increasingly coming under scrutiny as compared to other security protocols and standards. The attacks on 802.11x wireless security protocols are exac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003