Advertisement

RSM-WISP: Roaming and Service Management in Hotspot Networks Through a Policy Based Management Architecture

  • Idir Fodil
  • Vincent Jardin
  • Guy Pujolle
Conference paper
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 162)

Abstract

This paper describes RSM-WISP, a new management architecture designed for WISPs to facilitate the implementation and management of the services they offer at the access side of the WLAN, and to manage roaming contracts between WISPs. Our architecture is based upon the policy based management principles as introduced by the IETF, combined with more intelligence at the network edge. RSM-WISP adopts an architecture that is composed of two elements: a WISP management center (MC) that deploy policies and monitors all the WLANs, and programmable access router (CPE) located in each WLAN. The CPE ensure service enforcement, service differentiation (access to different service levels) and guarantee, user access management, and dynamic WLAN adaptation according to user’s SLA (service level agreement). Concerning roaming management, it is achieved on the CPE through multiple service provider support capabilities.

Key words

WLAN Hotspot IEEE802.11 WISPs Policies PBM Management Services SLA Roaming 

5. References

  1. [1]
    IEEE. 802.11b/d3.0 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, August 1999.Google Scholar
  2. [2]
    Upkar Varshney and Ron Vetter, “Emerging Mobile and Wireless Networks”, Communications of the ACM, Vol. 43, No. 6, June 2000.Google Scholar
  3. [3]
    Rajeswari Malladi and Dharma P. Agrawal, “Current and Future Applications of Mobile and Wireless Networks”, Communications of the ACM, Vol. 45, No. 10, October 2002.Google Scholar
  4. [4]
    A. Mahler and C. Steinfield The Evolving Hot Spot Market for Broadband Access “ITU Telecom World 2003 Forum panel on Technologies for Broadband, Geneva, October 2003”Google Scholar
  5. [5]
    Donald M. Fye, “Evolution of WLAN Roaming Services”, CDG WLAN Technical Forum, Dallas, Texas, October 2, 2003Google Scholar
  6. [6]
    Michael Kende, “WLAN challenges and opportunities”, National Summit on Broadband Deployment, April 28, 2003Google Scholar
  7. [7]
    Idir Fodil and Vladimir Ksinant “User Service Management in Hotspot network using Policies”, European Wireless 2004, the fifth European wireless Conference, February 24–27 2004, Barcelona, SpainGoogle Scholar
  8. [8]
    A. Westrinen and al, “RFC 3198: Terminology for Policy Based Management”, IETF, November 2001.Google Scholar
  9. [9]
    David Kosiur,“Understanding Policy-Based Networking”. Wiley Computer Publishing, 2001.Google Scholar
  10. [10]
    Raouf Boutaba and Jin Xiao, “Network Management State of the Art”, WCC, IFIP World Computer Congress, August 2002.Google Scholar
  11. [11]
    O. Corre, I. Fodil, V. Ksinant and G. Pujolle, “An Architecture for Access Network Management with Policies”, MMNS 2003, 6th IFIP/IEEE Conference on Network Management, September 2003.Google Scholar
  12. [12]
    Junbiao Zhang and al, “Virtual Operator based AAA in Wireless LAN Hot Spots with Ad-hoc Networking Support”, Mobile Computing and Communications Review, Volume 6, Number3.Google Scholar
  13. [13]
    Joseph W. Graham II, “Authenticating Public Access networking”, SIGUCCS’02, November 20–23, 2002, Providence, Rhode Island, USA.Google Scholar
  14. [14]
    IEEE Daft P802.1X/D11: Standard for Port based Network Access Control, LAN MAN Standards Committee of the IEEE Computer Society, March 27, 2001.Google Scholar
  15. [15]
    Pekka Nikander, “Authorization and charging in public WLANs using FreeBSD and 802.1x”, USENIX annual technical conference, June 10–15 2002.Google Scholar
  16. [16]
    P. Kalhoun and al., “Light Weight Access Point Protocol”, Internet Draft, June 2003.Google Scholar
  17. [17]
    IETF CapWap Working Group, http://www.ietf.org/html.charters/capwap-charter.html Google Scholar
  18. [18]
    Alper E. Yegin, Yoshihiro Ohba, Reinaldo Penno, George Tsirtsis, and Cliff Wang, “Protocol for Carrying Authentication for Network Access (PANA) Requirements”, Internet Draft, June 2003.Google Scholar
  19. [19]
    INFRADIO Project: http://rp.lip6.fr/infradio/ Google Scholar

Copyright information

© International Federation for Information Processing 2005

Authors and Affiliations

  • Idir Fodil
    • 1
    • 2
  • Vincent Jardin
    • 1
  • Guy Pujolle
    • 2
  1. 1.Research and Development6WINDFrance
  2. 2.LIP6University of Paris6Paris

Personalised recommendations