Figure 2: Architecture of the proposed network access control.