marți, 22 octombrie 2013

Wireless network access usage models - Business - Small Business

There are two different for wireless networks:For laptops and some other devices, the user moves to a location such as a coffee shop or conference room, sets up the device, and then works for a while before shutting down the device and moving to a different location. This model is called the nomadic usage model. In this usage model, the user has no need for maintaining sessioncontinuity between locations. Note that this usage model is the sameas a wired usage model for public access dialup or DSL networks, where the user connects to a dialup or DSL line in a hotel room, works for a while, then moves to another dial up or DSL connection at another physical location.For mobile phones and other handheld devices, the device is in use and a session is active while the user is moving around. Telephone callsand their attendant voicesessions are the canonical example of such a service, but data sessions in whichthe user is accessing location-based services are another possibility. In this model,application sessions stay active while the user is moving from one geographical location to another, a property called session continuity. Unlike the nomadic model, the mobility usage model has no wired equivalent, since it is not possible to use a wired connection while moving.

In theory, these two usages models are quite different, but, in practice, most wireless network designs attempt to accommodate both, since network operators are interested in maximizing the number of customers. While the threats to network access are largelythe same for both , the primary difference is the additional complexity that mobility injects into wireless access control design even for countering the same threats as in the nomadic model. When mobility must be supported, the terminal will bebreaking and re-establishing link layer and IP layer connectivity as it moves in and out of range of wireless access points, while maintaining its session.

The security state established at the initial access point when network access is granted forms a security association between the access point and the terminal. The security association contains keys providing and data origin authentication on link layer frames exchanged between the access point and the terminal. If the terminal moves its link connection to a new access point, the security association must be re-established on the new access point. In the nomadic usage model, no session continuity is required.

There are two different for wireless networks:For laptops and some other devices, the user moves to a location such as a coffee shop or conference room, sets up the device, and then works for a while before shutting down the device and moving to a different location. This model is called the nomadic usage model. In this usage model, the user has no need for maintaining sessioncontinuity between locations. Note that this usage model is the sameas a wired usage model for public access dialup or DSL networks, where the user connects to a dialup or DSL line in a hotel room, works for a while, then moves to another dial up or DSL connection at another physical location.For mobile phones and other handheld devices, the device is in use and a session is active while the user is moving around. Telephone callsand their attendant voicesessions are the canonical example of such a service, but data sessions in whichthe user is accessing location-based services are another possibility. In this model,application sessions stay active while the user is moving from one geographical location to another, a property called session continuity. Unlike the nomadic model, the mobility usage model has no wired equivalent, since it is not possible to use a wired connection while moving.

In theory, these two usages models are quite different, but, in practice, most wireless network designs attempt to accommodate both, since network operators are interested in maximizing the number of customers. While the threats to network access are largelythe same for both , the primary difference is the additional complexity that mobility injects into wireless access control design even for countering the same threats as in the nomadic model. When mobility must be supported, the terminal will bebreaking and re-establishing link layer and IP layer connectivity as it moves in and out of range of wireless access points, while maintaining its session.

The security state established at the initial access point when network access is granted forms a security association between the access point and the terminal. The security association contains keys providing and data origin authentication on link layer frames exchanged between the access point and the terminal. If the terminal moves its link connection to a new access point, the security association must be re-established on the new access point. In the nomadic usage model, no session continuity is required.



access point vs router

Niciun comentariu:

Trimiteți un comentariu