Results 1 -
3 of
3
EAP Extensions for EAP Re-authentication Protocol (ERP) Status of This Memo
, 2008
"... This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this pro ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
(Show Context)
This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. The Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. This document specifies extensions to EAP and the EAP keying hierarchy to support an EAP method-independent protocol for efficient re-authentication between the peer and an EAP re-authentication server through any authenticator. The re-authentication server may be in the home
Control And Provisioning for Wireless Access Points (CAPWAP) Threat Analysis for
- IEEE 802.11 Deployments", RFC 5418
, 2009
"... This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (c) 2009 IETF Trust and the persons identified as the ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
(Show Context)
This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (c) 2009 IETF Trust and the persons identified as the
Systems Optimization for Mobility Management
, 2010
"... Wireless network mobility frees the user from location dependence but requires additional mechanism to preserve network connectivity. Mobility events occur when user movement causes one network connection to be replaced by another. A network connection has associated with it properties, for example, ..."
Abstract
- Add to MetaCart
(Show Context)
Wireless network mobility frees the user from location dependence but requires additional mechanism to preserve network connectivity. Mobility events occur when user movement causes one network connection to be replaced by another. A network connection has associated with it properties, for example, network attachment points, network identifiers, and security associations. The mechanisms supporting mobility events rebind these properties, often requiring operations at multiple layers of the protocol stack. The rebinding is a sequential process and each process takes a finite amount of time. This overall process generates a period of time in which network service is degraded by transient data loss and increased end-to-end delay. Application specific and protocol specific ad hoc solutions are available for mitigating the service disruption. However, formal techniques to characterize this problem and to develop optimization methodologies for these processes have not been studied. This dissertation develops a systematic and formalized systems model that analyzes the basic operations associated with a mobility event, studies the behavioral properties of the system and characterizes several systems optimization techniques for these processes.