User's Guide
Table Of Contents
The management category of features provides the tools and facilities to monitor,
diagnose, configure, meter usage, and extend Access/One Network services so that
administration of the wireless network is minimal (occurs automatically), intuitive,
flexible and secure. These tools include configuration management, usage metering and
SNMP monitoring.
The security category of features protects the customer’s internal network resources
from unauthorized access through the Access/One Network, providing privacy for
wireless communications and mitigating the risk of denial-of-service and other similar
attacks.
Q- Describe the “Active Discovery” process and how it works.
A- When a Network Node is turned on in an Access/One Network the individual modules
within the Node automatically discover each other and determine their physical position
and role within the Node, including whether the interface to the network is wired or
wireless.
The Network Node then automatically discovers the rest of the Nodes in the
Access/One Network via the wired or wireless Network Connect. The Node
automatically associates with one Network Server using an algorithm based on several
decision factors. The selected Network Server then provides a list of known network
elements across all subnets to the Node, as well as information such as connected
devices, wireless channels in use, etc.
In addition to this process, as Network Servers become aware of each other they
communicate and synchronize known element tables to provide failure redundancy,
while tracking users in order to provide mobility as they move around the network.
Q- How does the Access/One Network prevent bridge loops?
A- The Network Connect function of the Access/One Network contains a proprietary
algorithm which prevents the association to Network Nodes which are also known on
the Ethernet network. For instance, if a Network Connect was accidentally plugged
directly into the host LAN, it would detect that the Network Nodes were also reachable
via the same Ethernet LAN and automatically shutdown the wireless uplink connection.
This will not prevent traffic from a co-located Network Node from being bridged;
rather it would go directly to the Ethernet LAN. Removing the loop will allow the
Network Connect to re-establish a wireless connection to the Network Nodes.
58