Home

RFC4118

  1. RFC 4118
Network Working Group                                            L. Yang
Request for Comments: 4118                                   Intel Corp.
Category: Informational                                        P. Zerfos
                                                                    UCLA
                                                                E. Sadot
                                                                   Avaya
                                                               June 2005


                       Architecture Taxonomy for
      Control and Provisioning of Wireless Access Points (CAPWAP)

Status of This Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2005).

Abstract

   This document provides a taxonomy of the architectures employed in
   the existing IEEE 802.11 products in the market, by analyzing
   Wireless LAN (WLAN) functions and services and describing the
   different variants in distributing these functions and services among
   the architectural entities.

Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . .   2
       1.1.  IEEE 802.11 WLAN Functions . . . . . . . . . . . . . .   3
       1.2.  CAPWAP Functions . . . . . . . . . . . . . . . . . . .   5
       1.3.  WLAN Architecture Proliferation  . . . . . . . . . . .   6
       1.4.  Taxonomy Methodology and Document Organization . . . .   8
   2.  Conventions  . . . . . . . . . . . . . . . . . . . . . . . .   9
   3.  Definitions  . . . . . . . . . . . . . . . . . . . . . . . .   9
       3.1.  IEEE 802.11 Definitions  . . . . . . . . . . . . . . .   9
       3.2.  Terminology Used in This Document  . . . . . . . . . .  11
       3.3.  Terminology Used Historically but Not Recommended  . .  13
   4.  Autonomous Architecture  . . . . . . . . . . . . . . . . . .  13
       4.1.  Overview  . . . . . . . . . . . . . . . . . . . . .  .  13
       4.2.  Security . . . . . . . . . . . . . . . . . . . . . . .  14
   5.  Centralized WLAN Architecture  . . . . . . . . . . . . . . .  15
       5.1.  Interconnection between WTPs and ACs . . . . . . . . .  16




Yang, et al.                 Informational                      [Page 1]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


       5.2.  Overview of Three Centralized WLAN Architecture
             Variants . . . . . . . . . . . . . . . . . . . . . . .  17
       5.3.  Local MAC  . . . . . . . . . . . . . . . . . . . . . .  19
       5.4.  Split MAC  . . . . . . . . . . . . . . . . . . . . . .  22
       5.5.  Remote MAC . . . . . . . . . . . . . . . . . . . . . .  27
       5.6.  Comparisons of Local MAC, Split MAC, and Remote MAC. .  27
       5.7.  Communication Interface between WTPs and ACs . . . . .  29
       5.8.  Security . . . . . . . . . . . . . . . . . . . . . . .  29
             5.8.1.  Client Data Security . . . . . . . . . . . . .  30
             5.8.2.  Security of Control Channel between
                     the WTP and AC . . . . . . . . . . . . . . . .  30
             5.8.3.  Physical Security of WTPs and ACs  . . . . . .  31
   6.  Distributed Mesh Architecture  . . . . . . . . . . . . . . .  32
       6.1.  Common Characteristics . . . . . . . . . . . . . . . .  32
       6.2.  Security . . . . . . . . . . . . . . . . . . . . . . .  33
   7.  Summary and Conclusions  . . . . . . . . . . . . . . . . . .  33
   8.  Security Considerations  . . . . . . . . . . . . . . . . . .  36
   9.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . .  37
   10. Normative References . . . . . . . . . . . . . . . . . . . .  39

1.  Introduction

   As IEEE 802.11 Wireless LAN (WLAN) technology matures, large scale
   deployment of WLAN networks is highlighting certain technical
   challenges.  As outlined in [2], management, monitoring, and control
   of large number of Access Points (APs) in the network may prove to be
   a significant burden for network administration.  Distributing and
   maintaining a consistent configuration throughout the entire set of
   APs in the WLAN is a difficult task.  The shared and dynamic nature
   of the wireless medium also demands effective coordination among the
   APs to minimize radio interference and maximize network performance.
   Network security issues, which have always been a concern in WLANs,
   present even more challenges in large deployments and new
   architectures.

   Recently many vendors have begun offering partially proprietary
   solutions to address some or all of the above mentioned problems.
   Since interoperable systems allow for a broader choice of solutions,
   a standardized interoperable solution addressing the aforementioned
   problems is desirable.  As the first step toward establishing
   interoperability in the market place, this document provides a
   taxonomy of the architectures employed in existing WLAN products.  We
   hope to provide a cohesive understanding of the market practices for
   the standard bodies involved (including the IETF and IEEE 802.11).
   This document may be reviewed and utilized by the IEEE 802.11 Working
   Group as input in defining the functional architecture of an AP.





Yang, et al.                 Informational                      [Page 2]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


1.1.  IEEE 802.11 WLAN Functions

   The IEEE 802.11 specifications are wireless standards that specify an
   "over-the-air" interface between a wireless client Station (STA) and
   an Access Point (AP), and also among wireless clients.  802.11 also
   describes how mobile devices can associate into a basic service set
   (BSS).  A BSS is identified by a basic service set identifier (BSSID)
   or name.  The WLAN architecture can be considered as a type of 'cell'
   architecture, in which each cell is the Basic Service Set (BSS), and
   each BSS is controlled by the AP.  When two or more APs are connected
   via a broadcast layer 2 network and all are using the same SSID, an
   extended service set (ESS) is created.

   The architectural component used to interconnect BSSs is the
   distribution system (DS).  An AP is an STA that provides access to
   the DS by providing DS services, as well as acting as an STA.
   Another logical architectural component, portal, is introduced to
   integrate the IEEE 802.11 architecture with a traditional wired LAN.
   It is possible for one device to offer both the functions of an AP
   and a portal.

   IEEE 802.11 does not specify the details of DS implementations
   explicitly.  Instead, the 802.11 standard defines services that
   provide functions that the LLC layer requires for sending MAC Service
   Data Units (MSDUs) between two entities on the network.  These
   services can be classified into two categories: the station service
   (SS) and the distribution system service (DSS).  Both categories of
   service are used by the IEEE 802.11 MAC sublayer.  Station services
   consist of the following four services:

   o  Authentication: Establishes the identity of one station as a
      member of the set of stations that are authorized to associate
      with one another.

   o  De-authentication: Voids an existing authentication relationship.

   o  Confidentiality: Prevents the content of messages from being read
      by others than the intended recipients.

   o  MSDU Delivery: Delivers the MAC service data unit (MSDU) for the
      stations.

      Distribution system services consist of the following five
      services:

   o  Association: Establishes Access Point/Station (AP/STA) mapping and
      enables STA invocation of the distribution system services.




Yang, et al.                 Informational                      [Page 3]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   o  Disassociation: Removes an existing association.

   o  Reassociation: Enables an established association (between AP and
      STA) to be transferred from one AP to another or the same AP.

   o  Distribution: Provides MSDU forwarding by APs for the STAs
      associated with them.  MSDUs can be either forwarded to the
      wireless destination or to the wired (Ethernet) destination (or
      both) using the "Distribution System" concept of 802.11.

   o  Integration: Translates the MSDU received from the Distribution
      System to a non-802.11 format and vice versa.  Any MSDU that is
      received from the DS invokes the 'Integration' services of the DSS
      before the 'Distribution' services are invoked.  The point of
      connection of the DS to the wired LAN is termed as 'portal'.

   Apart from these services, the IEEE 802.11 also defines additional
   MAC services that must be implemented by the APs in the WLAN.  For
   example:

   o  Beacon Generation

   o  Probe Response/Transmission

   o  Processing of Control Frames: RTS/CTS/ACK/PS-Poll/CF-End/CF-ACK

   o  Synchronization

   o  Retransmissions

   o  Transmission Rate Adaptation

   o  Privacy: 802.11 Encryption/Decryption

   In addition to the services offered by the 802.11, the IEEE 802.11 WG
   is also developing technologies to support Quality of Service
   (802.11e), Security Algorithms (802.11i), Inter-AP Protocol (IAPP, or
   802.11F -- recommended practice) to update APs when a STA roams from
   one BSS to another, Radio Resource Measurement Enhancements
   (802.11k), etc.

   IEEE 802.11 does not specify exactly how these functions are
   implemented, nor does it specify that they be implemented in one
   physical device.  It only requires that the APs and the rest of the
   DS together implement all these services.  Typically, vendors
   implement not only the services defined in the IEEE 802.11 standard,
   but also a variety of value-added services or functions, such as load
   balancing support, QoS, station mobility support, and rogue AP



Yang, et al.                 Informational                      [Page 4]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   detection.  What becomes clear from this document is that vendors
   take advantage of the flexibility in the 802.11 architecture, and
   have come up with many different flavors of architectures and
   implementations of the WLAN services.

   Because many vendors choose to implement these WLAN services across
   multiple network elements, we want to make a clear distinction
   between the logical WLAN access network functions and the individual
   physical devices by adopting different terminology.  We use "AP" to
   refer to the logical entity that provides access to the distribution
   services, and "WTP" (Wireless Termination Point) to the physical
   device that allows the RF antenna and 802.11 PHY to transmit and
   receive station traffic in the BSS network.  In the Centralized
   Architecture (see section 5), the combination of WTPs with Access
   Controller (AC) implements all the logical functions.  Each of these
   physical devices (WTP or AC) may implement only part of the logical
   functions.  But the DS, including all the physical devices as a
   whole, implements all or most of the functions.

1.2.  CAPWAP Functions

   To address the four problems identified in [2] (management,
   consistent configuration, RF control, security) additional functions,
   especially in the control and management plane, are typically offered
   by vendors to assist in better coordination and control across the
   entire ESS network.  Such functions are especially important when the
   IEEE 802.11 WLAN functions are implemented over multiple entities in
   a large scale network, instead of within a single entity.  Such
   functions include:

   o  RF monitoring, such as Radar detection, noise and interference
      detection, and measurement.

   o  RF configuration, e.g., for retransmission, channel selection,
      transmission power adjustment.

   o  WTP configuration, e.g., for SSID.

   o  WTP firmware loading, e.g., automatic loading and upgrading of WTP
      firmware for network wide consistency.

   o  Network-wide STA state information database, including the
      information needed to support value-added services, such as
      mobility and load balancing.

   o  Mutual authentication between network entities, e.g., for AC and
      WTP authentication in a Centralized WLAN Architecture.




Yang, et al.                 Informational                      [Page 5]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   The services listed are concerned with the configuration and control
   of the radio resource ('RF Monitoring' and 'RF Configuration'),
   management and configuration of the WTP device ('WTP Configuration',
   'WTP Firmware upgrade'), and also security regarding the registration
   of the WTP to an AC ('AC/WTP mutual authentication').  Moreover, the
   device from which other services, such as mobility management across
   subnets and load balancing, can obtain state information regarding
   the STA(s) associated with the wireless network, is also reported as
   a service ('STA state info database').

   The above list of CAPWAP functions is not an exhaustive enumeration
   of all additional services offered by vendors.  We included only
   those functions that are commonly represented in the survey data, and
   are pertinent to understanding the central problem of
   interoperability.

   Most of these functions are not explicitly specified by IEEE 802.11,
   but some of the functions are.  For example, the control and
   management of the radio-related functions of an AP are described
   implicitly in the MIB, such as:

   o  Channel Assignment

   o  Transmit Power Control

   o  Radio Resource Measurement (work is currently under way in IEEE
      802.11k)

   The 802.11h [5] amendment to the base 802.11 standard specifies the
   operation of a MAC management protocol to accomplish the requirements
   of some regulatory bodies (principally in Europe, but expanding to
   others) in the following areas:

   o  RADAR detection

   o  Transmit Power Control

   o  Dynamic Channel Selection

1.3.  WLAN Architecture Proliferation

   This document provides a taxonomy of the WLAN network architectures
   developed by the vendor community in an attempt to address some or
   all of the problems outlined in [2].  As the IEEE 802.11 standard
   purposely avoids specifying the details of DS implementations,
   different architectures have proliferated in the market.  While all
   these different architectures conform to the IEEE 802.11 standard as
   a whole, their individual functional components are not standardized.



Yang, et al.                 Informational                      [Page 6]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   Interfaces between the network architecture components are mostly
   proprietary, and there is no guarantee of cross-vendor
   interoperability of products, even within the same family of
   architectures.

   To achieve interoperability in the market place, the IETF CAPWAP
   working group is first documenting both the functions and the network
   architectures currently offered by the existing WLAN vendors.  The
   end result is this taxonomy document.

   After analyzing more than a dozen different vendors' architectures,
   we believe that the existing 802.11 WLAN access network architectures
   can be broadly categorized into three distinct families, based on the
   characteristics of the Distribution Systems that are employed to
   provide the 802.11 functions.

   o  Autonomous WLAN Architecture: The first architecture family is the
      traditional autonomous WLAN architecture, in which each WTP is a
      single physical device that implements all the 802.11 services,
      including both the distribution and integration services, and the
      portal function.  Such an AP architecture is called Autonomous
      WLAN Architecture because each WTP is autonomous in its
      functionality, and no explicit 802.11 support is needed from
      devices other than the WTP.  In such architecture, the WTP is
      typically configured and controlled individually, and can be
      monitored and managed via typical network management protocols
      like SNMP.  The WTPs are the traditional APs with which most
      people are familiar.  Such WTPs are sometimes referred to as "Fat
      APs" or "Standalone APs".

   o  Centralized WLAN Architecture: The second WLAN architecture family
      is an emerging hierarchical architecture utilizing one or more
      centralized controllers for managing a large number of WTP
      devices.  The centralized controller is commonly referred to as an
      Access Controller (AC), whose main function is to manage, control,
      and configure the WTP devices that are present in the network.  In
      addition to being a centralized entity for the control and
      management plane, it may also become a natural aggregation point
      for the data plane since it is typically situated in a centralized
      location in the wireless access network.  The AC is often co-
      located with an L2 bridge, a switch, or an L3 router, and may be
      referred to as Access Bridge or Access Router in those particular
      cases.  Therefore, an Access Controller could be either an L3 or
      L2 device, and is the generic term we use throughout this
      document.  It is also possible that multiple ACs are present in a
      network for purposes of redundancy, load balancing, etc.  This
      architecture family has several distinct characteristics that are
      worth noting.  First, the hierarchical architecture and the



Yang, et al.                 Informational                      [Page 7]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


      centralized AC affords much better manageability for large scale
      networks.  Second, since the IEEE 802.11 functions and the CAPWAP
      control functions are provided by the WTP devices and the AC
      together, the WTP devices themselves may no longer fully implement
      the 802.11 functions as defined in the standards.  Therefore, it
      can be said that the full 802.11 functions are implemented across
      multiple physical network devices, namely, the WTPs and ACs.
      Since the WTP devices only implement a portion of the functions
      that standalone APs implement, WTP devices in this architecture
      are sometimes referred to as light weight or thin APs.

   o  Distributed WLAN Architecture: The third emerging WLAN
      architecture family is the distributed architecture in which the
      participating wireless nodes are capable of forming a distributed
      network among themselves, via wired or wireless media.  A wireless
      mesh network is one example within the distributed architecture
      family, where the nodes themselves form a mesh network and connect
      with neighboring mesh nodes via 802.11 wireless links.  Some of
      these nodes also have wired Ethernet connections acting as
      gateways to the external network.

1.4.  Taxonomy Methodology and Document Organization

   Before the IETF CAPWAP working group started documenting the various
   WLAN architectures, we conducted an open survey soliciting WLAN
   architecture descriptions via the IETF CAPWAP mailing list.  We
   provided the interested parties with a common template that included
   a number of questions about their WLAN architectures.  We received 16
   contributions in the form of short text descriptions answering those
   questions.  15 of them are from WLAN vendors (AireSpace, Aruba,
   Avaya, Chantry Networks, Cisco, Cranite Systems, Extreme Networks,
   Intoto, Janusys Networks, Nortel, Panasonic, Trapeze, Instant802,
   Strix Systems, Symbol) and one from the academic research community
   (UCLA).  Out of the 16 contributions, one describes an Autonomous
   WLAN Architecture, three are Distributed Mesh Architectures, and the
   remaining twelve entries represent architectures in the family of the
   Centralized WLAN Architecture.

   The main objective of this survey was to identify the general
   categories and trends in WLAN architecture evolution, discover their
   common characteristics, and determine what is performed differently
   among them and why.  In order to represent the survey data in a
   compact format, a "Functional Distribution Matrix" is used in this
   document, (mostly in the Centralized WLAN architecture section), to
   tabulate the various services and functions in the vendors'
   offerings.  These services and functions are classified into three
   main categories:




Yang, et al.                 Informational                      [Page 8]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   o  Architecture Considerations: The choice of the connectivity
      between the AC and the WTP.  The design choices regarding the
      physical device on which processing of management, control, and
      data frames of the 802.11 takes place.

   o  802.11 Functions: As described in Section 1.1.

   o  CAPWAP Functions: As described in Section 1.2.

   For each one of these categories, the mapping of each individual
   function to network entities implemented by each vendor is shown in
   tabular form.  The rows in the Functional Distribution Matrix
   represent individual functions that are organized into the above
   mentioned three categories.  Each column of the Matrix represents one
   vendor's architecture offering in the survey data.  See Figure 7 as
   an example of the Matrix.

   This Functional Distribution Matrix is intended for the sole purpose
   of organizing the architecture taxonomy data, and represents the
   contributors' views of their architectures from an engineering
   perspective.  It does not necessarily imply that a product exists or
   will be shipped, nor an intent by the vendor to build such a product.

   The next section provides a list of definitions used in this
   document.  The rest of this document is organized around the three
   broad WLAN architecture families that were introduced in Section 1.3.
   Each architecture family is discussed in a separate section.  The
   section on Centralized Architecture contains more in-depth details
   than the other two families, largely due to the large number of the
   survey data (twelve out of sixteen) collected that fall into the
   Centralized Architecture category.  Summary and conclusions are
   provided at the end to highlight the basic findings from this
   taxonomy exercise.

2.  Conventions

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [3].

3.  Definitions

3.1.  IEEE 802.11 Definitions

   Station (STA): A device that contains an IEEE 802.11 conformant
   medium access control (MAC) and physical layer (PHY) interface to the
   wireless medium (WM).




Yang, et al.                 Informational                      [Page 9]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   Access Point (AP): An entity that has station functionality and
   provides access to distribution services via the wireless medium (WM)
   for associated stations.

   Basic Service Set (BSS): A set of stations controlled by a single
   coordination function.

   Station Service (SS): The set of services that support transport of
   medium access control (MAC) service data units (MSDUs) between
   stations within a basic service set (BSS).

   Distribution System (DS): A system used to interconnect a set of
   basic service sets (BSSs) and integrated local area networks (LANs)
   to create an extended service set (ESS).

   Extended Service Set (ESS): A set of one or more interconnected basic
   service sets (BSSs) with the same SSID and integrated local area
   networks (LANs), which appears as a single BSS to the logical link
   control layer at any station associated with one of those BSSs.

   Portal: The logical point at which medium access control (MAC)
   service data units (MSDUs) from a non-IEEE 802.11 local area network
   (LAN) enter the distribution system (DS) of an extended service set
   (ESS).

   Distribution System Service (DSS): The set of services provided by
   the distribution system (DS) that enable the medium access control
   (MAC) layer to transport MAC service data units (MSDUs) between
   stations that are not in direct communication with each other over a
   single instance of the wireless medium (WM).  These services include
   the transport of MSDUs between the access points (APs) of basic
   service sets (BSSs) within an extended service set (ESS), transport
   of MSDUs between portals and BSSs within an ESS, and transport of
   MSDUs between stations in the same BSS in cases where the MSDU has a
   multicast or broadcast destination address, or where the destination
   is an individual address, but the station sending the MSDU chooses to
   involve DSS.  DSSs are provided between pairs of IEEE 802.11 MACs.

   Integration: The service that enables delivery of medium access
   control (MAC) service data units (MSDUs) between the distribution
   system (DS) and an existing, non-IEEE 802.11 local area network (via
   a portal).

   Distribution: The service that, by using association information,
   delivers medium access control (MAC) service data units (MSDUs)
   within the distribution system (DS).





Yang, et al.                 Informational                     [Page 10]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


3.2.  Terminology Used in This Document

   One of the motivations in defining new terminology is to clarify
   ambiguity and confusion surrounding some conventional terms.  One
   such term is "Access Point (AP)".  Typically, when people talk about
   "AP", they refer to the physical entity (box) that has an antenna,
   implements 802.11 PHY, and receives/transmits the station (STA)
   traffic over the air.  However, the 802.11 Standard [1] describes the
   AP mostly as a logical entity that implements a set of logical
   services so that station traffic can be received and transmitted
   effectively over the air.  When people refer to "AP functions", they
   usually mean the logical functions the whole WLAN access network
   supports, and not just the subset of functions supported by the
   physical entity (box) that the STAs communicate with directly.  Such
   confusion can be especially acute when logical functions are
   implemented across a network instead of within a single physical
   entity.  To avoid further confusion, we define the following
   terminology:

   CAPWAP: Control and Provisioning of Wireless Access Points

   IEEE 802.11 WLAN Functions: A set of logical functions defined by the
   IEEE 802.11 Working Group, including all the MAC services, Station
   Services, and Distribution Services.  These logical functions are
   required to be implemented in the IEEE 802.11 Wireless LAN (WLAN)
   access networks by the IEEE 802.11 Standard [1].

   CAPWAP Functions: A set of WLAN control functions that are not
   directly defined by IEEE 802.11 Standards, but deemed essential for
   effective control, configuration, and management of 802.11 WLAN
   access networks.

   Wireless Termination Point (WTP): The physical or network entity that
   contains an RF antenna and 802.11 PHY to transmit and receive station
   traffic for the IEEE 802.11 WLAN access networks.  Such physical
   entities were often called "Access Points" (AP), but "AP" can also
   refer to the logical entity that implements 802.11 services.  We
   recommend "WTP" as the generic term that explicitly refers to the
   physical entity with the above property (e.g., featuring an RF
   antenna and 802.11 PHY), applicable to network entities of both
   Autonomous and Centralized WLAN Architecture (see below).

   Autonomous WLAN Architecture: The WLAN access network architecture
   family in which all the logical functions, including both IEEE 802.11
   and CAPWAP functions (wherever applicable), are implemented within
   each Wireless Termination Point (WTP) in the network.  The WTPs in





Yang, et al.                 Informational                     [Page 11]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   such networks are also called standalone APs, or fat APs, because
   these devices implement the full set of functions that enable the
   devices to operate without any other support from the network.

   Centralized WLAN Architecture: The WLAN access network architecture
   family in which the logical functions, including both IEEE 802.11 and
   CAPWAP functions (wherever applicable), are implemented across a
   hierarchy of network entities.  At the lower level are the WTPs,
   while at the higher level are the Access Controllers (ACs), which are
   responsible for controlling, configuring, and managing the entire
   WLAN access network.

   Distributed WLAN Architecture: The WLAN access network architecture
   family in which some of the control functions (e.g., CAPWAP
   functions) are implemented across a distributed network consisting of
   peer entities.  A wireless mesh network can be considered an example
   of such an architecture.

   Access Controller (AC): The network entity in the Centralized WLAN
   Architecture that provides WTPs access to the centralized
   hierarchical network infrastructure in the data plane, control plane,
   management plane, or a combination therein.

   Standalone WTP: Refers to the WTP in Autonomous WLAN Architecture.

   Controlled WTP: Refers to the WTP in Centralized WLAN Architecture.

   Split MAC Architecture: A subgroup of the Centralized WLAN
   Architecture whereby WTPs in such WLAN access networks only implement
   the delay sensitive MAC services (including all control frames and
   some management frames) for IEEE 802.11, while all the remaining
   management and data frames are tunnelled to the AC for centralized
   processing.  The IEEE 802.11 MAC, as defined by IEEE 802.11 Standards
   in [1], is effectively split between the WTP and AC.

   Remote MAC Architecture: A subgroup of the Centralized WLAN
   Architecture, where the entire set of 802.11 MAC functions (including
   delay-sensitive functions) is implemented at the AC.  The WTP
   terminates the 802.11 PHY functions.

   Local MAC Architecture: A subgroup of the Centralized WLAN
   Architecture, where the majority or entire set of 802.11 MAC
   functions (including most of the 802.11 management frame processing)
   are implemented at the WTP.  Therefore, the 802.11 MAC stays intact
   and local in the WTP, along with PHY.






Yang, et al.                 Informational                     [Page 12]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


3.3.  Terminology Used Historically but Not Recommended

   While some terminology has been used by vendors historically to
   describe "Access Points", we recommend deferring its use, in order to
   avoid further confusion.  A list of such terms and the recommended
   new terminology is provided below:

   Split WLAN Architecture: Use Centralized WLAN Architecture.

   Hierarchical WLAN Architecture: Use Centralized WLAN Architecture.

   Standalone Access Point: Use Standalone WTP.

   Fat Access Point: Use Standalone WTP.

   Thin Access Point: Use Controlled WTP.

   Light weight Access Point: Use Controlled WTP.

   Split AP Architecture: Use Local MAC Architecture.

   Antenna AP Architecture: Use Remote MAC Architecture.

4.  Autonomous Architecture

4.1.  Overview

   Figure 1 shows an example network of the Autonomous WLAN
   Architecture.  This architecture implements all the 802.11
   functionality in a single physical device, the Wireless Termination
   Point (WTP).  An embodiment of this architecture is a WTP that
   translates between 802.11 frames to/from its radio interface and
   802.3 frames to/from an Ethernet interface.  An 802.3 infrastructure
   that interconnects the Ethernet interfaces of different WTPs provides
   the distribution system.  It can also provide portals for integrated
   802.3 LAN segments.















Yang, et al.                 Informational                     [Page 13]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


       +---------------+     +---------------+     +---------------+
       |  802.11 BSS 1 |     |  802.11 BSS 2 |     |  802.11 BSS 3 |
       |  ...          |     |  ...          |     |  ...          |
       |    +-----+    |     |    +-----+    |     |    +-----+    |
       +----| WTP |----+     +----| WTP |----+     +----| WTP |----+
            +--+--+               +--+--+               +--+--+
               |Ethernet             |                     |
               +------------------+  |  +------------------+
                                  |  |  |
                              +---+--+--+---+
                              | Ethernet    |
     802.3 LAN  --------------+ Switch      +-------------- 802.3 LAN
     segment 1                |             |               segment 2
                              +------+------+

           Figure 1: Example of Autonomous WLAN Architecture

   A single physical WTP can optionally be provisioned as multiple
   virtual WTPs by supporting multiple SSIDs to which 802.11 clients may
   associate.  In some cases, this will involve putting a corresponding
   802.1Q VLAN tag on each packet forwarded to the Ethernet
   infrastructure and removing 802.1Q tags prior to forwarding the
   packets to the wireless medium.

   The scope of the ESS(s) created by interconnecting the WTPs will be
   confined by the constraints imposed by the Ethernet infrastructure.

   Authentication of 802.11 clients may be performed locally by the WTP
   or by using a centralized authentication server.

4.2.  Security

   Since both the 802.11 and CAPWAP functions are tightly integrated
   into a single physical device, security issues with this architecture
   are confined to the WTP.  There are no extra implications from the
   client authentication and encryption/decryption perspective, as the
   AAA interface and the key generation mechanisms required for 802.11i
   encryption/decryption are integrated into the WTP.

   One of the security needs in this architecture is for mutual
   authentication between the WTP and the Ethernet infrastructure.  This
   can be ensured by existing mechanisms such as 802.1X between the WTP
   and the Ethernet switch to which it connects.  Another critical
   security issue is the fact that the WTP is most likely not under lock
   and key, but contains secret information to communicate with back-end
   systems, such as AAA and SNMP.  Because IT personnel uses the common
   management method of pushing a "template" to all devices, theft of
   such a device would potentially compromise the wired network.



Yang, et al.                 Informational                     [Page 14]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


5.  Centralized WLAN Architecture

   Centralized WLAN Architecture is an emerging architecture family in
   the WLAN market.  Contrary to the Autonomous WLAN Architecture, where
   the 802.11 functions and network control functions are all
   implemented within each Wireless Termination Point (WTP), the
   Centralized WLAN Architecture employs one or more centralized
   controllers, called Access Controller(s), to enable network-wide
   monitoring, improve management scalability, and facilitate dynamic
   configurability.

   The following figure schematically shows the Centralized WLAN
   Architecture network diagram, where the Access Controller (AC)
   connects to multiple Wireless Termination Points (WTPs) via an
   interconnection medium.  This can be a direct connection, an L2-
   switched, or an L3-routed network as described in Section 5.1.  The
   AC exchanges configuration and control information with the WTP
   devices, allowing the management of the network from a centralized
   point.  Designs of the Centralized WLAN Architecture family do not
   presume (as the diagram might suggest) that the AC necessarily
   intercedes in the data plane to/from the WTP(s).  More details are
   provided later in this section.

    +---------------+     +---------------+     +---------------+
    |  802.11 BSS 1 |     |  802.11 BSS 2 |     |  802.11 BSS 3 |
    |  ...          |     |  ...          |     |  ...          |
    |    +-------+  |     |    +-------+  |     |    +-------+  |
    +----|  WTP  |--+     +----|  WTP  |--+     +----|  WTP  |--+
         +---+---+             +---+---+             +---+---+
             |                     |                     |
             +------------------+  |   +-----------------+
                                |  |...|
                           +----+--+---+--------+
                           |  Interconnection   |
                           +-------+------------+
                                   |
                                   |
                             +-----+----+
                             |    AC    |
                             +----------+

            Figure 2: Centralized WLAN Architecture Diagram









Yang, et al.                 Informational                     [Page 15]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   In the diagram above, the AC is shown as a single physical entity
   that provides all of the CAPWAP functions listed in Section 1.2.
   However, this may not always be the case.  Closer examination of the
   functions reveals that their different resource requirements (e.g.,
   CPU, memory, storage) may be distributed across different devices.
   For instance, complex radio control algorithms can be CPU intensive.
   Storing and downloading images and configurations can be storage
   intensive.  Therefore, different CAPWAP functions might be
   implemented on different physical devices due to the different nature
   of their resource requirements.  The network entity marked 'AC' in
   the diagram above should be thought of as a multiplicity of logical
   functions, and not necessarily as a single physical device.  The ACs
   may also choose to implement some control functions locally, and
   provide interfaces to access other global network management
   functions, which are typically implemented on separate boxes, such as
   a SNMP Network Management Station and an AAA back-end server (e.g.,
   Radius Authentication Server).

5.1.  Interconnection between WTPs and ACs

   There are several connectivity options to consider between the AC(s)
   and the WTPs, including direct connection, L2 switched connection,
   and L3 routed connection, as shown in Figures 3, 4, and 5.

                             -------+------ LAN
                                    |
                            +-------+-------+
                            |      AC       |
                            +----+-----+----+
                                 |     |
                             +---+     +---+
                             |             |
                          +--+--+       +--+--+
                          | WTP |       | WTP |
                          +--+--+       +--+--+

                      Figure 3: Directly Connected














Yang, et al.                 Informational                     [Page 16]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


                             -------+------ LAN
                                    |
                            +-------+-------+
                            |      AC       |
                            +----+-----+----+
                                 |     |
                             +---+     +---+
                             |             |
                          +--+--+    +-----+-----+
                          | WTP |    |   Switch  |
                          +--+--+    +---+-----+-+
                                         |     |
                                      +-----+  +-----+
                                      | WTP |  | WTP |
                                      +-----+  +-----+

                       Figure 4: Switched Connections


                            +-------+-------+
                            |      AC       |
                            +-------+-------+
                                    |
                            --------+------ LAN
                                    |
                            +-------+-------+
                            |     Router    |
                            +-------+-------+
                                    |
                            -----+--+--+--- LAN
                                 |     |
                             +---+     +---+
                             |             |
                          +--+--+       +--+--+
                          | WTP |       |  WTP|
                          +--+--+       +--+--+

                       Figure 5: Routed Connections

5.2.  Overview of Three Centralized WLAN Architecture Variants

   Dynamic and consistent network management is one of the primary
   motivations for the Centralized Architecture.  The survey data from
   vendors also shows that different varieties of this architecture
   family have emerged to meet a complex set of different requirements
   for various possible deployment scenarios.  This is also a direct
   result of the inherent flexibility in the 802.11 standard [1]
   regarding the implementation of the logical functions that are



Yang, et al.                 Informational                     [Page 17]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   broadly described under the term "Access Point (AP)".  Because there
   is no standard mapping of these AP functions to physical network
   entities, several design choices have been made by vendors that offer
   related products.  Moreover, the increased demand for monitoring and
   consistent configuration of large wireless networks has resulted in a
   set of 'value-added' services provided by the various vendors, most
   of which share common design properties and service goals.

   In the following, we describe the three main variants observed from
   the survey data within the family of Centralized WLAN Architecture,
   namely the Local MAC, Split MAC, and Remote MAC approaches.  For each
   approach, we provide the mapping characteristics of the various
   functions into the network entities from each vendor.  The naming of
   Local MAC, Split MAC, and Remote MAC reflects how the functions, and
   especially the 802.11 MAC functions, are mapped onto the network
   entities.  Local MAC indicates that the MAC functions stay intact and
   local to WTPs, while Remote MAC denotes that the MAC has moved away
   from the WTP to a remote AC in the network.  Split MAC shows the MAC
   being split between the WTPs and ACs, largely along the line of
   realtime sensitivity.  Typically, Split MAC vendors choose to put
   realtime functions on the WTPs while leaving non-realtime functions
   to the ACs.  802.11 does not clearly specify what constitutes
   realtime functions versus non-realtime functions, and so a clear and
   definitive line does not exist.  As shown in Section 5.4, each vendor
   has its own interpretation on this, and there are some discrepancies
   about where to draw the line between realtime and non-realtime
   functions.  However, vendors agree on the characterization of the
   majority of MAC functions.  For example, every vendor classifies the
   DCF as a realtime function.

   The differences among Local MAC, Split MAC and Remote MAC
   architectures are shown graphically in the following figure:

      +--------------+---    +---------------+---    +--------------+---
      |  CAPWAP      |       |  CAPWAP       |       |  CAPWAP      |
      |  functions   |AC     |  functions    |AC     |  functions   |
      |==============|===    |---------------|       |--------------|
      |              |       |  non RT MAC   |       |              |AC
      |  802.11 MAC  |       |===============|===    |  802.11 MAC  |
      |              |WTP    | Realtime MAC  |       |              |
      |--------------|       |---------------|WTP    |==============|===
      |  802.11 PHY  |       |  802.11 PHY   |       |  802.11 PHY  |WTP
      +--------------+---    +---------------+---    +--------------+---

       (a) "Local MAC"         (b) "Split MAC"        (c) "Remote MAC"

       Figure 6: Three Architectural Variants within the Centralized
                         WLAN Architecture Family



Yang, et al.                 Informational                     [Page 18]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


5.3.  Local MAC

   The main motivation of the Local MAC architecture model, as shown in
   Figure 6 (a), is to offload network access policies and management
   functions (CAPWAP functions described in Section 1.2) to the AC
   without splitting the 802.11 MAC functionality between WTPs and AC.
   The whole 802.11 MAC resides on the WTPs locally, including all the
   802.11 management and control frame processing for the STAs.  On the
   other hand, information related to management and configuration of
   the WTP devices is communicated with a centralized AC to facilitate
   management of the network and maintain a consistent network-wide
   configuration for the WTP devices.

   Figure 7 shows a tabular representation of the design choices made by
   the six vendors in the survey that follow the Local MAC approach,
   with respect to the above mentioned architecture considerations.
   "WTP-AC connectivity" shows the type connectivity between the WTPs
   and AC that every vendor's architecture can support.  Clearly, all
   the vendors can support L3 routed network connectivity between WTPs
   and the AC, which implies that direct connections and L2 switched
   networks are also supported by all vendors.  By '802.11 mgmt
   termination', and '802.11 control termination', we denote the
   physical network device on which processing of the 802.11 management
   and control frames is done respectively.  All the vendors here choose
   to terminate 802.11 management and control frames at the WTPs.  The
   last row of the table, '802.11 data aggregation', refers to the
   device on which aggregation and delivery of 802.11 data frames from
   one STA to another (possibly through a DS) is performed.  As shown by
   the table, vendors make different choices as to whether all the
   802.11 data traffic is aggregated and routed through the AC.  The
   survey data shows that some vendors choose to tunnel or encapsulate
   all the station traffic to or from the ACs, implying that the AC also
   acts as the access router for this WLAN access network.  Other
   vendors choose to separate the control and data plane by letting the
   station traffic be bridged or routed locally, while keeping the
   centralized control at the AC.















Yang, et al.                 Informational                     [Page 19]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


                        Arch7   Arch8   Arch9   Arch10   Arch11
                        -----   -----   -----   ------   ------
      WTP-AC
      connectivity       L3      L3       L3      L3      L3

      802.11 mgmt
      termination        WTP     WTP      WTP     WTP     WTP

      802.11 control
      termination        WTP     WTP      WTP     WTP     WTP

      802.11 data
      aggregation        AC      AC       WTP     AC      WTP


       Figure 7: Architecture Considerations for Local MAC Architecture

   Figure 8 reveals that most of the CAPWAP functions, as described in
   Section 1.2, are implemented at the AC with help from WTPs to monitor
   RF channels, and collect statistics and state information from the
   STAs, as the AC offers the advantages of network-wide visibility,
   which is essential for many of the control, configuration, and
   value-added services.

                    Arch7   Arch8   Arch9   Arch10   Arch11
                    -----   -----   -----   ------   ------
       RF
       Monitoring    WTP     WTP    AC/WTP    WTP     WTP

       RF
       Config.       AC       AC      AC      AC      AC

       WTP config.   AC       AC      AC      AC      AC

       WTP
       Firmware      AC       AC      AC      AC      AC

       STA state
       info
       database      AC     AC/WTP  AC/WTP  AC/WTP    AC

       AC/WTP
       mutual
       authent.     AC/WTP  AC/WTP  AC/WTP  AC/WTP  AC/WTP

     Figure 8: Mapping of CAPWAP Functions for Local MAC Architecture





Yang, et al.                 Informational                     [Page 20]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   The matrix in Figure 9 shows that most of the 802.11 functions are
   implemented at the WTPs for Local MAC Architecture, with some minor
   differences among the vendors regarding distribution service, 802.11e
   scheduling, and 802.1X/EAP authentication.  The difference in
   distribution service is consistent with that described earlier
   regarding "802.11 data aggregation" in Figure 7.

                    Arch7   Arch8   Arch9   Arch10   Arch11
                    -----   -----   -----   ------   ------
       Distribution
       Service       AC      AC      WTP     AC       WTP

       Integration
       Service       WTP    WTP      WTP      WTP     WTP

       Beacon
       Generation    WTP    WTP      WTP      WTP     WTP

       Probe
       Response      WTP    WTP      WTP      WTP     WTP

       Power mgmt
       Packet
       Buffering     WTP    WTP      WTP      WTP     WTP

       Fragmentation/
       Defragment.   WTP    WTP      WTP      WTP     WTP

       Association
       Disassoc.
       Reassociation AC     WTP      WTP      WTP     WTP

       WME/11e
       --------------
       classifying   AC                               WTP

       scheduling    WTP   AC/WTP    WTP      WTP     WTP

       queuing       WTP             WTP      WTP     WTP












Yang, et al.                 Informational                     [Page 21]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


       Authentication
       and Privacy
       --------------
       802.1X/EAP    AC      AC     AC/WTP    AC     AC/WTP

       Keys
       Management    AC      AC      WTP      AC       AC

       802.11
       Encryption/
       Decryption    WTP     WTP     WTP      WTP      WTP

     Figure 9: Mapping of 802.11 Functions for Local MAC Architecture

   From Figures 7, 8, and 9, it is clear that differences among vendors
   in the Local MAC Architecture are relatively minor, and most of the
   functional mapping appears to be common across vendors.

5.4.  Split MAC

   As depicted in Figure 6 (b), the main idea behind the Split MAC
   architecture is to implement part of the 802.11 MAC functionality on
   a centralized AC instead of the WTPs, in addition to providing the
   required services for managing and monitoring the WTP devices.
   Usually, the decision of which functions of the 802.11 MAC need to be
   provided by the AC is based on the time-criticality of the services
   considered.

   In the Split MAC architecture, the WTP terminates the infrastructure
   side of the wireless physical link, provides radio-related
   management, and also implements time-critical functionality of the
   802.11 MAC.  In addition, the non-realtime management functions are
   handled by a centralized AC, along with higher level services, such
   as configuration, QoS, policies for load balancing, and access
   control lists.  The key distinction between Local MAC and Split MAC
   relates to non-realtime functions: in Split MAC architecture, the AC
   terminates 802.11 non realtime functions, whereas in Local MAC
   architecture, the WTP terminates the 802.11 non-realtime functions
   and consequently sends appropriate messages to the AC.

   There are several motivations for taking the Split MAC approach.  The
   first is to offload functionality that is specific and relevant only
   to the locality of each BSS to the WTP, in order to allow the AC to
   scale to a large number of 'light weight' WTP devices.  Moreover,
   realtime functionality is subject to latency constraints and cannot
   tolerate delays due to transmission of 802.11 control frames (or
   other realtime information) over multiple-hops.  The latter would
   limit the available choices for connectivity between the AC and the



Yang, et al.                 Informational                     [Page 22]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   WTP.  Therefore, the realtime criterion is usually employed to
   separate MAC services between the devices.  Another consideration is
   cost reduction of the WTP to make it as cheap and simple as possible.
   Finally, moving functions like encryption and decryption to the AC
   reduces vulnerabilities from a compromised WTP, since user encryption
   keys no longer reside on the WTP.  As a result, any advancements in
   security protocol and algorithm designs do not necessarily obsolete
   the WTPs; the ACs implement the new security schemes instead, which
   simplifies the management and update task.  Additionally, the network
   is protected against LAN-side eavesdropping.

   Since there is no clear definition in the 802.11 specification as to
   which 802.11 MAC functions are considered "realtime", each vendor
   interprets this in their own way.  Most vendors agree that the
   following services of 802.11 MAC are examples of realtime services,
   and are chosen to be implemented on the WTPs.

   o  Beacon Generation

   o  Probe Response/Transmission

   o  Processing of Control Frames: RTS/CTS/ACK/PS-Poll/CF-End/CF-ACK

   o  Synchronization

   o  Retransmissions

   o  Transmission Rate Adaptation

   The following list includes examples of non-realtime MAC functions as
   interpreted by most vendors:

   o  Authentication/De-authentication

   o  Association/Disassociation/Reassociation/Distribution

   o  Integration Services: Bridging between 802.11 and 802.3

   o  Privacy: 802.11 Encryption/Decryption

   o  Fragmentation/Defragmentation

   However, some vendors may choose to classify some of the above "non-
   realtime" functions as realtime functions in order to support
   specific applications with strict QoS requirements.  For example,
   Reassociation is sometimes implemented as a "realtime" function to
   support VoIP applications.




Yang, et al.                 Informational                     [Page 23]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   The non-realtime aspects of the 802.11 MAC are handled by the AC
   through the processing of raw 802.11 management frames (Split MAC).
   The following matrix in Figure 10 offers a tabular representation of
   the design choices made by the six vendors that follow the Split MAC
   design regarding the architecture considerations.  While most vendors
   support L3 connectivity between WTPs and ACs, some can only support
   L2 switched connections due to the tighter delay constraint resulting
   from splitting MAC between two physical entities across a network.
   In Figure 7, it is clear that the WTP processes the 802.11 control
   frames in both the Split MAC and Local MAC.  The difference between
   the two lies in the termination point for 802.11 management frames.
   Local MAC terminates 802.11 management frames at WTP, while at least
   some of the 802.11 management frames are terminated at the AC for the
   Split MAC Architecture.  Since in most cases WTP devices are IP-
   addressable, any of the direct connection, L2-switched, or L3-routed
   connections of Section 1.2 can be used.  If only Ethernet-
   encapsulation is performed (e.g., as in Architecture 4), then only
   direct connection and L2-switched connections are supported.

                   Arch1   Arch2   Arch3   Arch4   Arch5   Arch6
                   -----   -----   -----   -----   -----   -----
      WTP-AC
      connectivity   L3     L3      L3      L2      L3      L3

      802.11 mgmt
      termination    AC     AC      AC      AC    AC/WTP    AC

      802.11 control
      termination    WTP    WTP    WTP     WTP      WTP     WTP

      802.11 data
      aggregation    AC     AC       AC      AC     AC      AC


      Figure 10: Architecture Considerations for Split MAC Architecture
















Yang, et al.                 Informational                     [Page 24]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   Similar to the Local MAC Architecture, the matrix in Figure 11 shows
   that most of the CAPWAP control functions are implemented at the AC.
   The exception is RF monitoring, and in some cases RF configuration,
   which are performed locally at the WTPs.

                    Arch1   Arch2   Arch3   Arch4   Arch5   Arch6
                    -----   -----   -----   -----   -----   -----
      RF
      Monitoring    WTP     WTP      WTP    WTP     WTP     WTP

      RF
      Config.       AC/WTP          AC/WTP  AC      AC      AC

      WTP config.   AC               AC     AC      AC      AC

      WTP
      Firmware      AC               AC     AC      AC      AC

      STA state
      info
      database      AC               AC     AC      AC       AC

      AC/WTP
      mutual
      authent.     AC/WTP  AC/WTP  AC/WTP   AC/WTP


      Figure 11: Mapping of CAPWAP Functions for Split MAC Architecture























Yang, et al.                 Informational                     [Page 25]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   The most interesting matrix for Split MAC Architecture is the
   Functional Distribution Matrix for 802.11 functions, as shown below
   in Figure 12.  Vendors map the functions onto the WTPs and AC with a
   certain regularity.  For example, all vendors choose to implement
   Distribution, Integration Service at the AC, along with 802.1X/EAP
   authentication and keys management.  All vendors also choose to
   implement beacon generation at WTPs.  On the other hand, vendors
   sometimes choose to map many of the other functions differently.
   Therefore, Split MAC Architectures are not consistent regarding the
   exact way the MAC is split.

                    Arch1   Arch2   Arch3   Arch4    Arch5   Arch6
                    -----   -----   -----   ------   -----   -----
      Distribution
      Service       AC      AC      AC      AC       AC      AC

      Integration
      Service       AC      AC      AC      AC       AC      AC

      Beacon
      Generation    WTP     WTP     WTP     WTP      WTP     WTP

      Probe
      Response      WTP     AC/WTP  WTP     WTP      WTP     WTP

      Power mgmt
      Packet
      Buffering     WTP     WTP     WTP     AC       AC/WTP  WTP

      Fragmentation
      Defragment.   WTP             WTP     AC       AC      AC

      Association
      Disassoc.
      Reassociation AC      AC      AC      AC       WTP     AC

      WME/11e
      --------------
      classifying                   AC      AC       AC      AC

      scheduling    WTP/AC  AC      WTP     AC       AC      WTP/AC

      queuing       WTP/AC  WTP     WTP     AC       WTP     WTP








Yang, et al.                 Informational                     [Page 26]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


     Authentication
      and Privacy
      --------------

      802.1X/EAP    AC      AC      AC      AC       AC      AC

      Keys
      Management    AC      AC      AC      AC       AC      AC

      802.11
      Encryption/
      Decryption    WTP     AC      WTP     AC       AC      AC

      Figure 12: Mapping of 802.11 Functions for Split MAC Architecture

5.5.  Remote MAC

   One of the main motivations for the Remote MAC Architecture is to
   keep the WTPs as light weight as possible, by having only the radio
   interfaces on the WTPs and offloading the entire set of 802.11 MAC
   functions (including delay-sensitive ones) to the Access Controller.
   This leaves all the complexities of the MAC and other CAPWAP control
   functions to the centralized controller.

   The WTP acts only as a pass-through between the Wireless LAN clients
   (STA) and the AC, though they may have an additional feature to
   convert the frames from one format (802.11) to the other (i.e.,
   Ethernet, TR, Fiber).  The centralized controller provides network
   monitoring, management and control, an entire set of 802.11 AP
   services, security features, resource management, channel selection
   features, and guarantees Quality of Service to the users.  Because
   the MAC is separated from the PHY, we call this the "Remote MAC
   Architecture".  Typically, such architecture is deployed with special
   attention to the connectivity between the WTPs and AC so that the
   delay is minimized.  The Radio over Fiber (RoF) from Architecture 5
   is an example of Remote MAC Architecture.

5.6.  Comparisons of Local MAC, Split MAC, and Remote MAC

   Two commonalities across all three Centralized Architectures (Local
   MAC, Split MAC, and Remote MAC) are:

   o  Most of the CAPWAP functions related to network control and
      configuration reside on the AC.

   o  IEEE 802.11 PHY resides on the WTP.





Yang, et al.                 Informational                     [Page 27]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   There is a clear difference between Remote MAC and the other two
   Centralized Architectures (namely, Local MAC and Split MAC), as the
   802.11 MAC is completely separated from the PHY in the former, while
   the other two keep some portion of the MAC functions together with
   PHY at the WTPs.  The implication of PHY and MAC separation is that
   it severely limits the kind of interconnection between WTPs and ACs,
   so that the 802.11 timing constraints are satisfied.  As pointed out
   earlier, this usually results in tighter constraint over the
   interconnection between WTP and AC for the Remote MAC Architecture.
   The advantage of Remote MAC Architecture is that it offers the
   lightest possible WTPs for certain deployment scenarios.

   The commonalities and differences between Local MAC and Split MAC are
   most clearly seen by comparing Figure 7 to Figure 10.  The
   commonality is that 802.11 control frames are terminated at WTPs in
   both cases.  The main difference between Local MAC and Split MAC is
   that the WTP terminates only the 802.11 control frames in the Split
   MAC, while the WTP may terminate all 802.11 frames in the Local MAC.
   An interesting consequence of this difference is that the Integration
   Service, which essentially refers to bridging between 802.11 and
   802.3 frames, is implemented by the AC in the Split MAC and by the
   WTP in the Local MAC, as shown in Figures 9 and 12, respectively.

   As a second note, the Distribution Service, although usually provided
   by the AC, can also be implemented at the WTP in some Local MAC
   architectures.  This approach is meant to increase performance in
   delivering STAs data traffic by avoiding tunneling it to the AC, and
   relaxing the dependency of the WTP from the AC.  Therefore, it is
   possible for the data and control planes to be separated in the Local
   MAC Architecture.

   Even though all the 802.11 traffic is aggregated at ACs in the case
   of Split MAC Architecture, the data and control planes can still be
   separated by employing multiple ACs.  For example, one AC can
   implement most of the CAPWAP functions (control plane), while other
   ACs can be used for 802.11 frames bridging (data plane).

   Each of the three architectural variants may be advantageous for
   certain deployment scenarios.  While the Local MAC retains most of
   the STA's state information at the local WTPs, Remote MAC centralizes
   most of the state into the back-end AC.  Split MAC sits somewhat in
   the middle of this spectrum, keeping some state information locally
   at the WTPs, and the rest centrally at the AC.  Many factors should
   be taken into account to determine the exact balance desired between
   the centralized and decentralized state.  The impact of such balance
   on network manageability is currently a matter of dispute within the
   technical community.




Yang, et al.                 Informational                     [Page 28]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


5.7.  Communication Interface between WTPs and ACs

   Before any messages can be exchanged between an AC and WTP, the WTP
   needs to discover, authenticate, and register with the AC first, then
   download the firmware and establish a control channel with the AC.
   Message exchanges between the WTP and AC for control and
   configuration can happen after that.  The following list outlines the
   basic operations that are typically performed between the WTP and the
   AC in their typical order:

   1.  Discovery: The WTPs discover the AC with which they will be bound
       to and controlled by.  The discovery procedure can employ either
       static or dynamic configuration.  In the latter case, a protocol
       is used in order for the WTP to discover candidate AC(s).

   2.  Authentication: After discovery, the WTP device authenticates
       itself with the AC.  However, mutual authentication, in which the
       WTP also authenticates the AC, is not always supported since some
       vendors strive for zero-configuration on the WTP side.  This is
       not necessarily secure as it leaves the possible vulnerability of
       the WTP being attached to a rogue AC.

   3.  WTP Association: After successful authentication, a WTP registers
       with the AC in order to start receiving management and
       configuration messages.

   4.  Firmware Download: After successful association, the WTP may
       pull, or the AC may push, the WTPs firmware, which may be
       protected in some manner, such as digital signatures.

   5.  Control Channel Establishment: The WTP establishes either an IP-
       tunnel or performs Ethernet encapsulation with the AC in order to
       transfer data traffic and management frames.

   6.  Configuration Download: Following the control channel
       establishment process, the AC may push configuration parameters
       to the WTPs.

5.8.  Security

   Given the varied distribution of functionalities for the Centralized
   Architecture, as surveyed in Section 4.3, it is obvious that an extra
   network binding is created between the WTP and the AC.  This brings
   new and unique security issues and subsequent requirements.







Yang, et al.                 Informational                     [Page 29]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


5.8.1.  Client Data Security

   The survey shows clearly that the termination point for "over the
   air" 802.11 encryption [4] can be implemented either in the WTP or in
   the AC.  Furthermore, the 802.1X/EAP [6] functionality is distributed
   between the WTP and the AC where, in most cases, the AC performs the
   necessary functions as the authenticator in the 802.1X exchange.

   If the STA and AC are the parties in the 4-way handshake (defined in
   [4]), and 802.11i traffic encryption terminates at the WTP, then the
   Pairwise Transient Key (PTK) has to be transferred from the AC to the
   WTP.  Since the keying material is part of the control and
   provisioning of the WTPs, a secure encrypted tunnel for control
   frames is employed to transport the keying material.

   The centralized model encourages AC implementations to use one PMK
   for many different WTPs.  This practice facilitates speedy transition
   by an STA from one WTP to another that is connected to the same AC
   without establishing a separate PMK.  However, this leaves the STA in
   a difficult position, as the STA cannot distinguish between a
   compromised PMK and one that is intentionally being shared.  This
   issue must be resolved, but the resolution is beyond the scope of the
   CAPWAP working group.  The venue for this resolution is to be
   determined by the IEEE 802 and IETF liaisons.

   When the 802.11i encryption/decryption is performed in the AC, the
   key exchange and state transitions occur between the AC and the STA.
   Therefore, there is no need to transfer any crypto material between
   the AC and the WTP.

   Regardless of where the 802.11i termination point occurs, the
   Centralized WLAN Architecture records two practices for "over the
   wire" client data security.  In some cases there is an encrypted
   tunnel (IPsec or SSL) between the WTP and AC, which assumes that the
   security boundary is in the AC.  In other cases, an end-to-end
   mutually authenticated secure VPN tunnel is assumed between the
   client and AC, other security gateway, or end host entity.

5.8.2.  Security of Control Channel between the WTP and AC

   In order for the CAPWAP functions to be implemented in the
   Centralized WLAN Architecture, a control channel is necessary between
   the WTP and AC.








Yang, et al.                 Informational                     [Page 30]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   To address potential security threats against the control channel,
   existing implementations feature one or more of the following
   security mechanisms:

   1.  Secure discovery of WTP and AC.

   2.  Authentication of the WTPs to the ACs (and possibly mutual
       authentication).

   3.  Confidentiality, integrity, and replay protection of control
       channel frames.

   4.  Secure management of WTPs and ACs, including mechanisms for
       securely setting and resetting secrets and state.

   Discovery and authentication of WTPs are addressed in the submissions
   by implementing authentication mechanisms that range from X.509
   certificates, AAA authentication to pre-shared credential
   authentication.  In all cases, confidentiality, integrity, and
   protection against man-in-the-middle attacks of the control frames
   are addressed by a secure encrypted tunnel between the WTP and AC(s),
   utilizing keys derived from the authentication methods mentioned
   previously.  Finally, one of the motivations for the Centralized WLAN
   Architecture is to minimize the storage of cryptographic and security
   sensitive information, in addition to operational configuration
   parameters within the WTPs.  It is for that reason that the majority
   of the submissions under the Centralized Architecture category have
   employed a post WTP authenticated discovery phase of configuration
   provisioning, which in turn protects against the theft of WTPs.

5.8.3.  Physical Security of WTPs and ACs

   To provide comprehensive radio coverage, WTPs are often installed in
   locations that are difficult to secure physically; it is relatively
   easier to secure the AC physically.  If high-value secrets, such as a
   RADIUS shared secret, are stored in the AC instead of WTPs, then the
   physical loss of an WTP does not compromise these secrets.  Hence,
   the Centralized Architecture may reduce the security consequences of
   a stolen WTP.  On the other hand, concentrating all the high-value
   secrets in one place makes the AC an attractive target that requires
   strict physical, procedural, and technical controls to protect the
   secrets.









Yang, et al.                 Informational                     [Page 31]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


6.  Distributed Mesh Architecture

   Out of the sixteen architecture survey submissions, three belong to
   the Distributed Mesh Architecture family.  An example of the
   Distributed Mesh Architecture is shown in Figure 13, and reflects
   some of the common characteristics found in these three submissions.

       +-----------------+         +-----------------+
       |  802.11 BSS 1   |         |  802.11 BSS 2   |
       |  ...            |         |  ...            |
       |    +---------+  |         |    +---------+  |
       +----|mesh node|--+         +----|mesh node|--+
            +-+---+---+                 +-+-+-----+
              |   |                       | |
              |   |                       | |           +----------+
              |   +-----------------------+ |  Ethernet | Ethernet |
              |    802.11 wireless links    |  +--------+ Switch   |
              |   +-----------------------+ |  |        |          |
              |   |                       | |  |        +----------+
            +-+---+---+                   +-+--+----+
       +----|mesh node|--+           +----|mesh node|--+
       |    +---------+  |           |    +---------+  |
       |  ...            |           |  ...            |
       |  802.11 BSS 4   |           |  802.11 BSS 3   |
       +-----------------+           +-----------------+

             Figure 13: Example of Distributed Mesh Architecture

6.1.  Common Characteristics

   To provide wider wireless coverage, mesh nodes in the network may act
   as APs to client stations in their respective BSS, as well as traffic
   relays to neighboring mesh nodes via 802.11 wireless links.  It is
   also possible that some mesh nodes in the network may serve only as
   wireless traffic relays for other mesh nodes, but not as APs for any
   client stations.  Instead of pulling Ethernet cable connections to
   every AP, wireless mesh networks provide an attractive alternative to
   relaying backhaul traffic.

   Mesh nodes can also keep track of the state of their neighboring
   nodes, or even nodes beyond their immediate neighborhood by
   exchanging information periodically amongst them; this way, mesh
   nodes can be fully aware of the dynamic network topology and RF
   conditions around them.  Such peer-to-peer communication model allows
   mesh nodes to actively coordinate among themselves to achieve self-
   configuration and self-healing.  This is the major distinction
   between this Distributed Architecture family and the Centralized
   Architecture -- much of the CAPWAP functions can be implemented



Yang, et al.                 Informational                     [Page 32]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   across the mesh nodes in a distributed fashion, without a centralized
   entity making all the control decisions.

   It is worthwhile to point out that mesh networks do not necessarily
   preclude the use of centralized control.  It is possible that a
   combination of centralized and distributed control co-exists in mesh
   networks.  Some global configuration or policy change may be better
   served in a coordinated fashion if some form of Access Controller
   (AC) exists in the mesh network (even if not the full blown version
   of the AC, as defined in the Centralized WLAN Architecture).  For
   example, a centralized management entity can be used to update every
   mesh node's default configuration.  It may also be more desirable to
   leave certain functions, such as user authentication to a single
   centralized end point (such as a RADIUS server), but mesh networks
   allow each mesh AP to directly talk to the RADIUS server.  This
   eliminates the single point of failure and takes advantage of the
   client distribution in the network.

   The backhaul transport network of the mesh network can be either an
   L2 or L3 networking technology.  Currently, vendors are using
   proprietary mesh technologies on top of standard 802.11 wireless
   links to enable peer-to-peer communication between the mesh nodes.
   Hence, there is no interoperability among mesh nodes from different
   vendors.  The IEEE 802.11 WG has recently started a new Task Group
   (TGs) to define the mesh standard for 802.11.

6.2.  Security

   Similar security concerns for client data security, as described in
   Section 5.8.1, also apply to the Distributed Mesh Architecture.
   Additionally, one important security consideration for the mesh
   networks is that the mesh nodes must authenticate each other within
   the same administrative domain.  To protect user and management data
   that may not be secured at layer 3, data transmission among
   neighboring nodes should be secured by a layer 2 mechanism of
   confidentiality, integrity, and replay protection.

7.  Summary and Conclusions

   We requested existing WLAN vendors and other interested parties to
   submit a short description of existing or desired WLAN access network
   architectures to define a taxonomy of possible WLAN access network
   architectures.  The information from the 16 submissions was condensed
   and summarized in this document.

   New terminology has been defined wherever existing terminology was
   found to be either insufficient or ambiguous in describing the WLAN
   architectures and supporting functions listed in the document.  For



Yang, et al.                 Informational                     [Page 33]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   example, the broad set of Access Point functions has been divided
   into two categories: 802.11 functions, which include those that are
   required by the IEEE 802.11 standards, and CAPWAP functions, which
   include those that are not required by the IEEE 802.11, but are
   deemed essential for control, configuration, and management of 802.11
   WLAN access networks.  Another term that has caused considerable
   ambiguity is "Access Point", which usually reflected a physical box
   that has the antennas, but did not have a uniform set of externally
   consistent behavior across submissions.  To remove this ambiguity, we
   have redefined the AP as the set of 802.11 and CAPWAP functions,
   while the physical box that terminates the 802.11 PHY is called the
   Wireless Termination Point.

   Based on the submissions during the architecture survey phase, we
   have classified the existing WLAN architectures into three broad
   classes:

   1. Autonomous WLAN Architecture: Indicates a family of architectures
      in which all the 802.11 functions and, where applicable, CAPWAP
      functions are implemented in the WTPs.

   2. Centralized WLAN Architecture: Indicates a family of architectures
      in which the AP functions are split between the WTPs and the AC,
      with the AC acting as a centralized control point for multiple
      WTPs.

   3. Distributed WLAN Architecture: Indicates a family of architectures
      in which part of the control functions is implemented across a
      distributed network of peer entities.

   Within the Centralized WLAN Architecture, there are a few visible
   sub-categories that depend on how one maps the MAC functions (at a
   high-level), between the WTP and the AC.  Three prominent sub-
   categories emerged from the information in the submissions:

   1. Split MAC Architecture: The 802.11 MAC functions are split between
      the WTP and the AC.  This subgroup includes all architectures that
      split the 802.11 MAC functions even though individual submissions
      differed on the specifics of the split.

   2. Local MAC Architecture: The entire set of 802.11 MAC functions is
      implemented on the WTP.

   3. Remote MAC Architecture: The entire set of 802.11 MAC functions is
      implemented on the AC.






Yang, et al.                 Informational                     [Page 34]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   The following tree diagram summarizes the architectures documented in
   this taxonomy.

                    +----------------+
                    |Autonomous      |
        +---------->|Architecture    |
        |           |Family          |
        |           +----------------+
        |                                     +--------------+
        |                                     |Local         |
        |                               +---->|MAC           |
        |                               |     |Architecture  |
        |                               |     +--------------+
        |                               |
        |           +----------------+  |     +--------------+
        |           |Centralized     |  |     |Split         |
        +---------->|Architecture    |--+---->|MAC           |
        |           |Family          |  |     |Architecture  |
        |           +----------------+  |     +--------------+
        |                               |
        |                               |     +--------------+
        |                               |     |Remote        |
        |                               +---->|MAC           |
        |                                     |Architecture  |
        |                                     +--------------+
        |           +----------------+
        |           |Distributed Mesh|
        +---------->|Architecture    |
                    |Family          |
                    +----------------+

   A majority of the submitted WLAN access network architectures (twelve
   out of sixteen) followed the Centralized WLAN Architecture.  All but
   one of the Centralized WLAN Architecture submissions were grouped
   into either a Split MAC Architecture or a Local MAC Architecture.
   One submission followed the Autonomous WLAN Architecture, and three
   followed the Distributed WLAN Architecture.

   The WLAN access network architectures in the submissions indicated
   that the connectivity assumptions were:

   o  Direct connection between the WTP and the AC.

   o  L2 switched connection between the WTP and the AC.

   o  L3 routed connection between the WTP and the AC.





Yang, et al.                 Informational                     [Page 35]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   o  Wireless connection between the mesh nodes in the distributed mesh
      architecture.

   Interoperability between equipment from different vendors is one of
   the fundamental problems in the WLAN market today.  To achieve
   interoperability via open standard development, the following steps
   are suggested for IETF and IEEE 802.11.

   Using this taxonomy, a functional model of an Access Point should be
   defined by the new study group recently formed within the IEEE
   802.11.  The functional model will consist of defining functional
   elements of an 802.11 Access Point that are considered atomic, i.e.,
   not subject to further splitting across multiple network elements.
   Such a functional model should serve as a common foundation to
   support the existing WLAN architectures as outlined in this taxonomy,
   and any further architecture development within or outside the IEEE
   802.11 group.  It is possible, and even recommended, that work on the
   functional model definition may also include impact analysis of
   implementing each functional element on either the WTP or the AC.

   As part of the functional model definition, interfaces must be
   defined as primitives between these functional elements.  If a pair
   of functional elements that have an interface defined between them is
   being implemented on two different network entities, then a protocol
   specification definition between such a pair of network elements is
   required, and should be developed by the IETF.

8.  Security Considerations

   This document does not intend to provide a comprehensive threat
   analysis of all of the security issues with the different WLAN
   architectures.  Nevertheless, in addition to documenting the
   architectures employed in the existing IEEE 802.11 products in the
   market, this taxonomy document also catalogues the security issues
   that arise and the manner in which vendors address these security
   threats.  The WLAN architectures are broadly categorized into three
   families: Autonomous Architecture, Centralized Architecture, and
   Distributed Architecture.  While Sections 4, 5, and 6 are devoted to
   each of these three architecture families, respectively, each section
   also contains a subsection to address the security issues within each
   architecture family.

   In summary, the main security concern in the Autonomous Architecture
   is the mutual authentication between the WTP and the wired (Ethernet)
   infrastructure equipment.  Physical security of the WTPs is also a
   network security concern because the WTPs contain secret information
   and theft of these devices could potentially compromise even the
   wired network.



Yang, et al.                 Informational                     [Page 36]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   In the Centralized Architecture there are a few new security concerns
   due to the new network binding between the WTP and AC.  The following
   security concerns are raised for this architecture family: keying
   material for mobile client traffic may need to be securely
   transported from the AC to WTP; secure discovery of the WTP and AC is
   required, as well as mutual authentication between the WTPs and AC;
   man-in-the-middle attacks to the control channel between WTP and AC,
   confidentiality, integrity and replay protection of control channel
   frames, and theft of WTPs for extraction of embedded secrets within.
   Each of the survey results for this broad architecture category has
   presented mechanisms to address these security issues.

   The new security issue in the Distributed Mesh Architecture is the
   need for mesh nodes to authenticate each other before forming a
   secure mesh network.  Encrypted communication between mesh nodes is
   recommended to protect both control and user data.

9.  Acknowledgements

   This taxonomy is truly a collaborative effort with contributions from
   a large group of people.  First, we want to thank all the CAPWAP
   Architecture Design Team members who have spent many hours in the
   teleconference calls, over e-mails, and in writing and reviewing the
   document.  The full Design Team is listed here:

   o  Peyush Agarwal
      STMicroelectronics
      Plot# 18, Sector 16A
      Noida, U.P  201301
      India
      Phone: +91-120-2512021
      EMail: peyush.agarwal@st.com

   o  Dave Hetherington
      Roving Planet
      4750 Walnut St., Suite 106
      Boulder, CO  80027
      United States
      Phone: +1-303-996-7560
      EMail: Dave.Hetherington@RovingPlanet.com

   o  Matt Holdrege
      Strix Systems
      26610 Agoura Road
      Calabasas, CA  91302
      Phone: +1 818-251-1058
      EMail: matt@strixsystems.com




Yang, et al.                 Informational                     [Page 37]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   o  Victor Lin
      Extreme Networks
      3585 Monroe Street
      Santa Clara, CA  95051
      Phone: +1 408-579-3383
      EMail: vlin@extremenetworks.com

   o  James M. Murphy
      Trapeze Networks
      5753 W.  Las Positas Blvd.
      Pleasanton, CA  94588
      Phone: +1 925-474-2233
      EMail: jmurphy@trapezenetworks.com

   o  Partha Narasimhan
      Aruba Wireless Networks
      180 Great Oaks Blvd
      San Jose, CA  95119
      Phone: +1 408-754-3018
      EMail: partha@arubanetworks.com

   o  Bob O'Hara
      Airespace
      110 Nortech Parkway
      San Jose, CA  95134
      Phone: +1 408-635-2025
      EMail: bob@airespace.com

   o  Emek Sadot (see Authors' Addresses)

   o  Ajit Sanzgiri
      Cisco Systems
      170 W Tasman Drive
      San Jose, CA  95134
      Phone: +1 408-527-4252
      EMail: sanzgiri@cisco.com

   o  Singh
      Chantry Networks
      1900 Minnesota Court
      Mississauga, Ontario  L5N 3C9
      Canada
      Phone: +1 905-567-6900
      EMail: isingh@chantrynetworks.com

   o  L. Lily Yang (Editor, see Authors' Addresses)

   o  Petros Zerfos (see Authors' Addresses)



Yang, et al.                 Informational                     [Page 38]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


   In addition, we would also like to acknowledge contributions from the
   following individuals who participated in the architecture survey and
   provided detailed input data in preparation of the taxonomy: Parviz
   Yegani, Cheng Hong, Saravanan Govindan, Bob Beach, Dennis Volpano,
   Shankar Narayanaswamy, Simon Barber, Srinivasa Rao Addepalli,
   Subhashini A. Venkataramanan, Kue Wong, Kevin Dick, Ted Kuo, and
   Tyan-shu Jou.  It is simply impossible to write this taxonomy without
   the large set of representative data points that they provided to us.
   We would also like to thank our CAPWAP WG co-chairs, Mahalingam Mani
   and Dorothy Gellert, and our Area Director, Bert Wijnen, for their
   unfailing support.

10.  Normative References

   [1]  "IEEE WLAN MAC and PHY Layer Specifications", August 1999, <IEEE
        802.11-99>.

   [2]  O'Hara, B., Calhoun, P., and J. Kempf, "Configuration and
        Provisioning for Wireless Access Points (CAPWAP) Problem
        Statement", RFC 3990, February 2005.

   [3]  Bradner, S., "Key words for use in RFCs to Indicate Requirement
        Levels", BCP 14, RFC 2119, March 1997.

   [4]  "IEEE Std 802.11i: Medium Access Control (MAC) Security
        Enhancements", April 2004.

   [5]  "IEEE Std 802.11h: Spectrum and Transmit Power Management
        Extensions in the 5 GHz Band in Europe", October 2003.

   [6]  "IEEE Std 802.1X: Port-based Network Access Control", June 2001.




















Yang, et al.                 Informational                     [Page 39]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


Authors' Addresses

   L. Lily Yang
   Intel Corp.
   MS JF3 206, 2111 NE 25th Avenue
   Hillsboro, OR  97124

   Phone: +1 503-264-8813
   EMail: lily.l.yang@intel.com


   Petros Zerfos
   UCLA - Computer Science Department
   4403 Boelter Hall
   Los Angeles, CA  90095

   Phone: +1 310-206-3091
   EMail: pzerfos@cs.ucla.edu


   Emek Sadot
   Avaya
   Atidim Technology Park, Building #3
   Tel-Aviv  61131
   Israel

   Phone: +972-3-645-7591
   EMail: esadot@avaya.com























Yang, et al.                 Informational                     [Page 40]
RFC 4118              CAPWAP Architecture Taxonomy             June 2005


Full Copyright Statement

   Copyright (C) The Internet Society (2005).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at ietf-
   ipr@ietf.org.

Acknowledgement

   Funding for the RFC Editor function is currently provided by the
   Internet Society.







Yang, et al.                 Informational                     [Page 41]
  1. RFC 4118