-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 4:15 PM -0400 9/27/06, Shumon Huque wrote:
>A large number of users seem to be repeatedly authenticating,
>some of them as frequently as every 30 seconds or every few
>minutes. Some debugging revealed that these users are frequently
>oscillating their associations between a number of different
>access points. A smaller number of users keep reassociating with
>the same access point.

This is exactly the problem that I referred to in my recent post of 9/18
("More fun with RADIUS").  We are working on adjusting the power levels and
channel assignments of the various APs in the problem areas to cut down the
frequency of these roaming events.  Our reauth times don't appear to take
that long at all, probably because all of our APs tunnel back up to a WLSM,
so all the authentications appear to come from there as far as the RADIUS
server is concerned.

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.6 (Build 6060)
Comment: <http://bt.ittns.northwestern.edu/julian/pgppubkey.html>

iQA/AwUBRRrh8w5UB5zJHgFjEQKbIQCeIJLUMi00zMxVDGE23leDPgcFWLYAoKqF
ln9S0+I5mcziwfqKMDKaukK1
=h/Qd
-----END PGP SIGNATURE-----

-- 
Julian Y. Koh                         <mailto:[EMAIL PROTECTED]>
Network Engineer                                   <phone:847-467-5780>
Telecommunications and Network Services         Northwestern University
PGP Public Key:<http://bt.ittns.northwestern.edu/julian/pgppubkey.html>

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to