BRIEF DESCRIPTION OF THE FIGURES
The accompanying figures, where like reference numerals refer to identical or functionally similar elements throughout the separate views and which together with the detailed description below are incorporated in and from part of the specification, serve to further illustrate various embodiments and to explain various principles and advantages all in accordance with the present invention.
FIG. 1 is a block diagram showing a wireless communication network in accordance with some embodiments of the invention.
FIG. 2 is a flow diagram showing a method for providing a supplicant access to at least one requested service provided by an authenticator in a wireless communications network in accordance with some embodiments of the invention.
FIG. 3 is a flow diagram depicting a method of creating a relationship between a supplicant and a requested service based on an association request in accordance with some embodiments of the invention.
FIG. 4 is a flow diagram showing a method for providing a supplicant access to at least one requested service provided by an authenticator in a wireless communications network in accordance with some embodiments of the invention.
FIG. 5 is a flow diagram showing a method for providing a supplicant access to at least one requested service provided by an authenticator in a wireless communications network in accordance with some embodiments of the invention.
FIG. 6 is a block diagram showing a multi system authenticator in a wireless communication network in accordance with some embodiments of the invention.
FIG. 7 is a diagram showing communication exchanged between a supplicant and an authenticator for a requested service provided by an authenticator in a wireless communication network in one embodiment of the present invention.
FIG. 8 is a diagram showing communication exchanged between a supplicant and an authenticator for a requested service provided by an authenticator in a wireless communication network in a second embodiment of the present invention.
FIG. 9 is a diagram showing communication exchanged between a supplicant and an authenticator for a requested service provided by an authenticator in a wireless communication network in a third embodiment of the present invention.