Roaming and service management in public wireless networks using an innovative policy management architecture

Nowadays, public wireless local area networks (WLANs), commonly called hotspots, are being largely deployed by WISPs (Wireless Internet Service Providers) as a means of offering ubiquitous Internet access to their customers. Although a substantial number of solutions have been proposed to improve security, mobility and quality of service on the wireless area, access network management which is mandatory remains a very significant concern.This paper describes RSM-WISP, a new management architecture designed for WISPs to facilitate the implementation and management of the services they offer at the access side of the WLAN, and to manage roaming contracts between WISPs. Our architecture is based upon the policy-based management principles as introduced by the IETF, combined with more intelligence at the network edge. RSM-WISP adopts an architecture that is composed of two elements: a WISP management center (MC) that deploys policies and monitors all the WLANs, and a programmable access router (CPE) located in each WLAN. The CPE ensures service enforcement, service differentiation (access to different service levels) and guarantee, user access management, and dynamic WLAN adaptation according to the user's SLA (service level agreement). It also permits automatic service updates according to the user's requirements. Concerning roaming management, this is achieved on the CPE through multiple service provider support capabilities. This approach provides WISPs with a simple, flexible and scalable solution that allows easy service deployment and management at the access. This management architecture has been implemented, tested and validated on the 6WINDGate routers.

[1]  Andrea Westerinen,et al.  Terminology for Policy-Based Management , 2001, RFC.

[2]  Upkar Varshney,et al.  Mobile and Wireless Networks , 2000 .

[3]  Reinaldo Penno,et al.  Protocol for Carrying Authentication for Network Access (PANA) Requirements , 2005, RFC.

[4]  Raouf Boutaba,et al.  Network Management: State of the Art , 2002, Communication Systems: The State of the Art.

[5]  David Schwab,et al.  Characterising the use of a campus wireless network , 2004, IEEE INFOCOM 2004.

[6]  Mohan Parthasarathy,et al.  Protocol for Carrying Authentication and Network Access (PANA) Threat Analysis and Security Requirements , 2005, RFC.

[7]  D. Kosiur,et al.  Understanding Policy-Based Networking , 2001 .

[8]  Jun Li,et al.  Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support , 2002, MOCO.

[9]  Nazim Agoulmine,et al.  Management of Multimedia Networks and Services: 6th IFIP/IEEE International Conference, MMNS 2003, Belfast, Northern Ireland, UK, September 7-10, 2003, Proceedings , 2003 .

[10]  Joseph W. Graham Authenticating public access networking , 2002, SIGUCCS '02.

[11]  Pekka Nikander,et al.  Authorization and Charging in Public WLANs Using FreeBSD and 802.1x , 2002, USENIX Annual Technical Conference, FREENIX Track.

[12]  Tuan Dang,et al.  Wireless Networks in industrial environments: State of the art and Issues , 2006 .

[13]  Dharma P. Agrawal,et al.  Current and future applications of mobile and wireless networks , 2002, CACM.