First Call to Action Each vendor/participant to submit WLAN functions supported How the functions map to AP and AC? What are the topological assumptions between AP and AC? Security analysis on threats Pros and Cons of the architecture variant By March 17 ! |