TG1 Draft Topics Date: Authors: September 2012 Month Year

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0165r1 SubmissionPäivi Ruuska, NokiaSlide 1 Implementation aspects of a coexistence system Notice: This document has been.
Advertisements

Doc.: IEEE /141r0 Submission July 2012 Tuncer Baykas, NICTSlide TG 1 July Session Closing Report Notice: This document has been prepared.
Doc.: IEEE /0129r1 Submission July 2012 Mika Kasslin, NokiaSlide 1 How to accommodate different CE-CM interaction approaches in IEEE ?
Doc.: IEEE /0129r0 Submission July 2012 Mika Kasslin, NokiaSlide 1 How to accommodate different CE-CM interaction approaches in IEEE ?
Doc.: IEEE /0129r2 Submission July 2012 Mika Kasslin, NokiaSlide 1 How to accommodate different CE-CM interaction approaches in IEEE ?
Submission doc.: IEEE /XXXXr0 Month Year John Doe, Some CompanySlide 1 Insert Presentation Title Here Date: YYYY-MM-DD Authors: Notice: This document.
Submission doc.: IEEE /0032r0 April 2015 Sho Furuichi, SonySlide 1 The new coexistence use cases for IEEE Date: Authors: Notice:
Doc.: IEEE /0021r0 Submission May 2012 Mika Kasslin, NokiaSlide 1 Coexistence system in a cognitive radio testbed Notice: This document has been.
Doc.: IEEE /0003r0 Submission January 2013 S. Filin H. Harada, NICTSlide 1 Introduction to Contributions Notice: This document has been prepared.
Doc.: IEEE /0115r1 Submission July 2012 Mika Kasslin, NokiaSlide 1 Design Principles for Entity Responsibilities Notice: This document has been.
Doc.: IEEE /0040r1 Submission May 2011 Miika Laaksonen, NokiaSlide 1 Coexistence Discovery Procedures Notice: This document has been prepared.
Doc.: IEEE /0118r0 Submission July 2012 Mika Kasslin, NokiaSlide 1 How to run WSO decision making with coexistence report announcements? Notice:
Doc.: IEEE /0061r0 Submission June 2011 Mika Kasslin, NokiaSlide 1 Discovery system overview Notice: This document has been prepared to assist.
Doc.: IEEE /0054r0 Submission March 2013 Mika Kasslin, NokiaSlide 1 TG1 Closing Report for March 2013 Notice: This document has been prepared.
Submission doc.: IEEE /0011r2 January 2016 Sho Furuichi, SonySlide 1 System architecture for information exchange between independent IEEE
Doc.: IEEE /0013r0 Submission January 2012 Mika Kasslin, NokiaSlide 1 Motivation for Monitor WSO Notice: This document has been prepared to assist.
Submission doc.: IEEE /0015r0 January 2016 Sho Furuichi, SonySlide 1 Proposal for CM discovery/selection/ association as CE operation Date:
Submission doc.: IEEE /0017r0 January 2016 Sho Furuichi, SonySlide 1 Proposal on proxy coexistence service for moving WSO Date: Authors:
Doc.: IEEE /0019r0 Submission February 2010 Mika Kasslin, NokiaSlide 1 High Level Architecture View Notice: This document has been prepared to.
Doc.: IEEE /0013r0 Submission January 2010 Mika Kasslin, NokiaSlide 1 Coexistence architecture of Notice: This document has been prepared.
Doc.: IEEE /0085r1 Submission June 2010 Tuncer Baykas, NICTSlide TG1 and System Design Document Notice: This document has been prepared.
TG 1 March Session Closing Report
Submission Title: [Proposal for MAC Peering Procedure]
TG1 Introduction and Status
Proposal on system description, reference model and draft outline
TGn PSMP Ad-hoc July 2007 Date: Authors: July 2007
<month year> <doc.: IEEE doc> May 2015
Reference Model Proposal
July Meeting Report Date: Author: July 2010 July 2010
<month year> doc.: IEEE < e> <March 2018>
P System Architecture Date: Authors: March 2010
Resource allocation principles for coexistence system
Submission Title: [Proposal for MAC Peering Procedure]
July Tutorial – Possible Solutions
doc.: IEEE <doc#>
Design Principles for Entity Responsibilities
TG1 Introduction and Status
FCC rules and design Date: Authors: October 2010
Submission Title: [Proposal for MAC Peering Procedure]
Coexistence of CMs with different decision making algorithms
P System Architecture Date: Authors: March 2010
Neighbors and Neighbor Discovery
Discussion Topics Date: Authors: March 2011 Month Year
doc.: IEEE <doc#>
Transport service discussion
Submission Title: [Proposal for MAC Peering Procedure]
Concept of Operation Date: Authors: July 2010
TG1 and System Design Document
Examples of deployment scenarios
July Tutorial – Possible Solutions
<month year> doc.: IEEE < e> <March 2018>
November 2018 Opening Report
TG1 Draft Topics Date: Authors: September 2012 Month Year
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
10 May 2000 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Open Issues with the TG3 Criteria Document]
Possible Action Items Date: Author:
Possible Action Items Date: Author:
Coexistence Decision Making Topologies
P System Architecture Date: Authors: March 2010
doc.: IEEE <doc# >
doc.: IEEE <doc# >
TG 1 November Session Opening Report
List of Remaining Proposals for Downselection
September 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suggested TG3c PAR Changes] Date Submitted:
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [TG agreed text for frequency channel.
Comments to IEEE /68 Date: Authors: September 2009
July 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Merger Proposal #2 Affirmation of Commitment.
November 2016 TG1a Closing Report
Month Year doc.: IEEE yy/xxxxr0 January 2016
Presentation transcript:

TG1 Draft Topics Date: 2012-09-19 Authors: September 2012 Month Year doc.: IEEE 802.11-yy/xxxxr0 September 2012 TG1 Draft Topics Date: 2012-09-19 Authors: Notice: This document has been prepared to assist IEEE 802.19. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Mika Kasslin, Nokia John Doe, Some Company

Month Year doc.: IEEE 802.11-yy/xxxxr0 September 2012 Abstract This presentation contains discussion material on TG1 draft topics which are proposed to be the basis of the TG1 agenda during the September 2012 interim meeting in Indian Wells, CA. The proposal is to have the topics discussed in the meeting with the objective to have an agreement in the TG on solutions which are intended to end up to the draft. Mika Kasslin, Nokia John Doe, Some Company

September 2012 Introduction Each topic contains originally just a set of remarks and questions which the contributor believes are open and need to be resolved for the draft. The intention is to have the TG to discuss the topics openly and extensively during the September 2012 meeting and agree on answers to the questions. The answers are expected to end up becoming solution descriptions on which draft normative text can be prepared for new updated TG1 draft. Motions are planned on the results of topic discussions Mika Kasslin, Nokia

Topic list Connection setup and security September 2012 Topic list Connection setup and security Configuration of pull and push methods Protocol description for section 5 Mandatory and optional features What is mandatory in a CE and in a CM? What is mandatory in a CDIS? Inside CDIS Update to sections 6, 7 and 8 Mika Kasslin, Nokia

Topic 1: Connection setup and security September 2012 Topic 1: Connection setup and security IEEE 802.19.1 system builds upon use of IP and protocols on top of the IP All the 802.19.1 messages are carried over IP Before one can run the coexistence protocol, one needs to have IP configured We have description as the resolution of comment #11 on how entities determine IP addresses (port numbers etc.) to be used There has been questions on whether the authentication mechanism currently in the draft is enough Mika Kasslin, Nokia

Topic 1: Connection setup and security (cont.) September 2012 Topic 1: Connection setup and security (cont.) A proposal is to have the following text added to the draft to describe how entities interconnect in order to start exchanging coexistence system protocol messages IEEE 802.19.1 entities may be co-located or they may be located anywhere on the internet. In order to communicate efficiently and in a secure fashion, the communications are made through ssh tunnels. When an entity wishes to communicate with another entity (CE to CM, CM to CM or CM to CDIS) it first seeks for an existing connection to this entity. If the connection does not exist, it creates a connection using a username@IPaddress with password combination or a username@IPaddress alone when a pre-shared private/public key set exists. When entities are co-located, they may use IPaddress 127.0.0.1. Alternatively, if the interface between the two co-located entities is not exposed, any other internal mechanism may be used to communicate between the entities. Entities may also use alternative pre-arranged ports to communicate (default is port 22). If an entity wishes to maintain a connection open, is should create activity in the connection at least once per minute. If an entity senses a connection has stayed inactive for more than 2 minutes, it may presume the connection is no longer needed and may close it. Mika Kasslin, Nokia

Topic 1: Connection setup and security (cont.) September 2012 Topic 1: Connection setup and security (cont.) The IEEE 802.19.1 system shall communicate using TCP/IP Moved by: Ivan Reede Seconder: Jinho Kim Vote: Unanimous Mika Kasslin, Nokia

Topic 1: Connection setup and security (cont.) Month Year doc.: IEEE 802.11-yy/xxxxr0 September 2012 Topic 1: Connection setup and security (cont.) TLS vs SSH TLS SSH Pros Aligned with PAWS Smaller implementation Cons Server authentication is optional Requires PKI, X.509, certificates Inherintely vulnerable to man in the middle attacks Less scalable than PKI Notes More recent than the SSH Mika Kasslin, Nokia John Doe, Some Company

Topic 1: Connection setup and security (cont.) Month Year doc.: IEEE 802.11-yy/xxxxr0 September 2012 Topic 1: Connection setup and security (cont.) The IEEE 802.19.1 system shall communicate using SSH and TLS Moved by: Ivan Reede Seconder: Jinho Kim Vote: Unanimous Mika Kasslin, Nokia John Doe, Some Company

Topic 2: Configuration of pull and push methods September 2012 Topic 2: Configuration of pull and push methods During the July 2012 plenary the TG agreed that both methods are needed The TG also agreed that we need to have ways to control transmissions of unsolicited announcements and requests The TG didn’t agree on solution Mika Kasslin, Nokia

Topic 2: Configuration of pull and push methods (cont.) September 2012 Topic 2: Configuration of pull and push methods (cont.) The solution is to have the TCP/IP to manage the issue of too frequent announcements and requests Mika Kasslin, Nokia

Topic 3: Protocol description for section 5 September 2012 Topic 3: Protocol description for section 5 The section 5 is called ”Procedures and protocols” with the sub-section 5.2 describing procedures and the sub-section 5.3 describing messages Is the message definitions enough on the protocol or should we have something added? Entity identifiers should be specified somewhere, the question is whether section 5 is the right place Mika Kasslin, Nokia

Topic 4: Mandatory and optional features September 2012 Topic 4: Mandatory and optional features Does an entity need to support parameters labeled as optional in the message description? Does an entity need to support all the procedures of the spec? Does the spec mandate specific implementation of interface A? Mika Kasslin, Nokia

Topic 4: Mandatory and optional features (cont.) September 2012 Topic 4: Mandatory and optional features (cont.) A CDIS shall be able to provide coexistence discovery service to any type of CM A CM shall be able to exchange information with any other type of CM Approach 1 A CM shall support all CE profiles Approach 2 A CM doesn’t have to be able to serve all CE profiles, a CM shall be able to support at least one CE profile Mika Kasslin, Nokia

Topic 4: Mandatory and optional features (cont.) Month Year doc.: IEEE 802.11-yy/xxxxr0 September 2012 Topic 4: Mandatory and optional features (cont.) Approach 1 vs. Approach 2 Approach 1 Approach 2 Pros Usage simplicity since a CE can work with any CM Enable fast and simple implementation of CM and CE, feature/cost competition, allow market to select Cons Design complexity, IP traps Need to match CE and CM Notes Mika Kasslin, Nokia John Doe, Some Company

Topic 5: What is mandatory in a CE and in a CM? September 2012 Topic 5: What is mandatory in a CE and in a CM? The following shall be supported by each CE Basic procedures (authentication, subscription, registration) A CE shall support at least one profile A profile determines which procedures are mandatory and which are optional. A profile covers also the basic procedures. A profile determines which messages, parameters and functions are mandatory and which are optional. A CE shall support at least management service or information service or may support both. Its support may be dependent on the WSO it interfaces A CE shall interface a WSO to a CM Mika Kasslin, Nokia

Topic 5: What is mandatory in a CE and in a CM? (cont.) September 2012 Topic 5: What is mandatory in a CE and in a CM? (cont.) The following shall be supported by each CM Basic procedures (authentication, subscription, registration) A CM shall be able to exchange information with any other type of CM A CM shall support at least one profile A profile determines which procedures are mandatory and which are optional. A profile covers also the basic procedures. A profile determines which messages, parameters and functions are mandatory and which are optional. A CM shall support both management service and information service Mika Kasslin, Nokia

Topic 6: What is mandatory in a CDIS? September 2012 Topic 6: What is mandatory in a CDIS? The following shall be supported by each CDIS Basic procedures (authentication, subscription, registration) A CDIS shall be able to provide coexistence discovery service to any type of CM Mika Kasslin, Nokia

Topic 7: Inside CDIS We can assume that there will be multiple CDISs September 2012 Topic 7: Inside CDIS We can assume that there will be multiple CDISs CDISs need to exchange information with each other in order to provide unified coexistence set information regardless of the CDIS a CM uses Mika Kasslin, Nokia

Topic 8: Update to sections 6, 7 and 8 September 2012 Topic 8: Update to sections 6, 7 and 8 TBD Mika Kasslin, Nokia

Topics for Thu Topic 4 Topic 5 Topic 6 Approach 1 or Approach 2 September 2012 Topics for Thu Topic 4 Approach 1 or Approach 2 Topic 5 Mandatory for CE Mandatory for CM Topic 6 Mandatory for CDIS Mika Kasslin, Nokia