IEEE 802.23 “Green Book” This set of slides is a collection of presentations, motions and other material that has come before the 802.23 Working Group.

Slides:



Advertisements
Similar presentations
IEEE Emergency Services DCN: x Title: Solution Proposals Review Date Submitted: Jan. 18, 2011 Presented at IEEE interim.
Advertisements

Doc.: IEEE /0598r0 Submission May 2012 Steve Grau, Juniper NetworksSlide 1 Layer 3 Setup with Dynamic VLAN Assignment Date: Authors:
Omniran GPP Trusted WLAN Access to EPC Use Case Analysis Date: Authors: NameAffiliationPhone Max RiegelNSN
Oct 12, 2004CS573: Network Protocols and Standards1 Virtual LANs Network Protocols and Standards Autumn
March 2015 Doc.: IEEE NNN Submission Karen Randall, Randall Consulting Slide 1 IEEE 802 Response to comments on IEEE 802.1Q-2014 and IEEE 802.1Xbx-2014.
Ethernet and switches selected topics 1. Agenda Scaling ethernet infrastructure VLANs 2.
3GPP Presence Requirements Requirements for Presence Service based on 3GPP specifications and wireless environment characteristics draft-kiss-simple-presence-wireless-
WiMAX Network Architecture and Emergency - Status Update – 7th Emergency Services Workshop College Park, MD, USA May 2010 Contact:
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
An Architectural Framework for Providing WLAN Roaming D.Vassis G.Kormentzas Dept. of Information and Communication Systems Engineering University of the.
Jan 10, 2008CS573: Network Protocols and Standards1 Virtual LANs Network Protocols and Standards Winter
Networking Components
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Networking Components Chad Benedict – LTEC
IEEE Emergency Services DCN: Title: call flow for Layer 2 support for unauthenticated requests Date.
LLDP-MED Location Identification for Emergency Services Emergency Services Workshop, NY Oct 5-6, 2006 Manfred Arndt
Omniran PtP Links across IEEE 802 Bridged Infrastructure Date: Authors: NameAffiliationPhone Max
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
LLDP-MED Location Identification for Emergency Services Emergency Services Workshop, NY Oct 5-6, 2006 Manfred Arndt
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching.
Common Devices Used In Computer Networks
Mechanism to support establishment of charging policies Group Name: WG2-ARC Source: InterDigital Meeting Date: TP8 Agenda Item:
IEEE R lmap 23 Feb 2015.
Doc.: IEEE /462r0 IEEE / San Francisco / July 2003 July 2003 Jean-Michel Lauriol, AlcatelSlide 1 TIA TR-41 VoIP over WLAN projects.
Internet and Intranet RMUTT, Course Outline 1 st half –Internet overview –TCP/IP protocol –Applications in TCP/IP network 2 nd half –JSP programming.
© 1998 R. Gemmell IETF WG Presentation1 Robert Gemmell ROAMOPS Working Group.
Submission doc.: IEEE 11-12/0589r1 May 2012 Donald Eastlake 3rd, Huawei R&D USASlide 1 General Links Date: Authors:
1 IEEE TGu Interworking with External Network Stefano M. Faccin Nokia IEEE Liaison to 3GPP2.
Mm/dd/yyyy802 Emergency Services Tutorial 2/4/2010 Con Call output This version is Geoff's edits as taken in the conference call. It includes implementation.
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Doc.: IEEE /2491r00 Submission September 2007 D. Eastlake (Motorola), G. Hiertz (Philips)Slide 1 WLAN Segregated Data Services Date:
Doc.: IEEE /0435r1 Submission March 2011 Marc Emmelmann, Fraunhofer FOKUSSlide 1 Definitions and Terminology from Date: Authors:
Doc.: IEEE /843r0 Submission Cheng Hong, Tan Pek-Yew, Panasonic Slide 1 November 2003 Interworking – WLAN Control Cheng Hong & Tan Pek Yew Panasonic.
Doc.: IEEE /1378r0 Submission November 2008 Darwin Engwer, Nortel NetworksSlide 1 Improving Multicast Reliability Date: Authors:
Doc.: IEEE /2161r1 Submission July 2007 Slide 1 July 2007 Donald Eastlake 3rd, MotorolaSlide 1 Segregated Data Services in Date:
IEEE Emergency Services DCN: Title: 802 Location Report Date Submitted: May 06, 2011 Presented at IEEE
Networking Components WILLIAM NELSON LTEC HUB  Device that operated on Layer 1 of the OSI stack.  All I/O flows out all other ports besides the.
Doc.: IEEE /0027r0 Submission January 2006 Slide 1 WiNOT Consortium: Proposal for online enrollment cluster Notice: This document has been prepared.
Omniran CF00 1 VLANs in relation to P802.1CF NRM Date: Authors: NameAffiliationPhone Max RiegelNokia Networks
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
IEEE MEDIA INDEPENDENT HANDOVER DCN: draft_invariants Title: Invariants in Proposed Drafts Date Submitted:
Submission doc.: IEEE 11-13/0526r1 May 2013 Donald Eastlake, HuaweiSlide 1 Sub-Setting Date: Authors:
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Routing Information Protocol
Doc.: IEEE /0778r1 Submission July 2009 Bruce Kraemer (Marvell), Jon Rosdahl (CSR)Slide 1 Feedback on New WG PARs from WG11 for July Plenary Date:
IEEE 802Emergency Services Exec. Committee Study Group Report to IETF ECRIT Geoff Thompson/GraCaSI (supported by Interdigital) Study Group/WG Chair IETF.
Omniran CF00 1 P802.1CF NRM Backhaul Considerations Date: Authors: NameAffiliationPhone Max RiegelNokia Networks
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: EAP Pre-authentication Problem Statement in IETF HOKEY WG Date Submitted: September,
TUTORIAL (1) Why 802 needs an Emergency Services Project and what we think it should look like. Geoff Thompson/InterDigital Scott Henderson/RIM Others.
Contents of this presentation ● PAR material (Title, Scope, Purpose) ● Material as developed at previous meetings ● Provision for new/revised material.
Presentation Material ● PAR ● 5 Criteria ● ✔ Problem tutorial ● ✔ Why VoIP doesn't work today ● ✔ What is needed to fix it ● ✔ Working with ECRIT should.
Presentation Material ● PAR ● 5 Criteria ● ✔ Problem tutorial ● ✔ Problem statement (2-6) ● ✔ Why VoIP doesn't work today (7-8) ● ✔ What ECRIT has done.
9/29/2010 Con Call output This version is Geoff's rough edits as taken in the conference call. It includes Real time edits Further editing instructions.
User-group-based Security Policy for Service Layer
White Space Map Notification
Multicast Scope Date: Authors: September 2006 Month Year
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Chapter 8: Monitoring the Network
Proposal for a Generic Emergency Call Support
IEEE MEDIA INDEPENDENT HANDOVER
Feedback on New WG PARs from WG11 for July Plenary
Proposal for User Plane Cluster
Privacy Recommendation PAR Proposal
Comments on PAR and 5C Date: Authors: March 2010
TG1 Draft Topics Date: Authors: September 2012 Month Year
IEEE Emergency Services
Segregated Data Services in
OmniRAN SDN Use Case ToC
Wireless Architectural Thoughts
Presentation transcript:

IEEE “Green Book” This set of slides is a collection of presentations, motions and other material that has come before the Working Group or is about to be proposed to the Working Group (marked as “Proposed”). Adopted material is to be shown with adoption date and vote, e.g. “Adopted 9/15/10 6/0/1”

Contents Definitions Normative references Discussion of rationale and scope Technical areas to be addressed by standard Security considerations

Definitions ES: Emergency Services EUT: “End User Terminal”, the host to the IP application (e.g. VoIP) which places the ES call.

Normative references RFC 3693, GeoPriv Requirements draft-ietf-ecrit-phonebcp-13 ECRIT Req'ts (US) FCC (Korea) TBD IEEE u draft 12.0 IEEE Std n – 200n draft-rosen-ecrit-additional-data draft-schulzrinne-ecrit-psap-callback draft-schulzrinne-ecrit-unauthenticated-access

Discussion of rationale and scope E911 calls (and their other country equivalents) need to provide location information when initiating ES calls. While other sources of location information may be available to the EUT, it is desirable to provide location from the infrastructure (especially fixed infrastructure). This information will be supplied up through the management plane of the EUT. The EUT will, in turn transmit this data within an IP transaction across the 802 network to the first L2/L3 encountered away from the EUT. At that point the data transaction exits the 802 scope and domain.

Technical areas to be addressed by standard (1/3) LocationStatus: Certain We expect this to be our main task. We intend to supply formatted (infrastucture based) location information to the call originating EUT for it to include in the IP ES call initiation procedure. CallbackStatus: Uncertain for 802 We don't believe that the L1/L2 network has any task to perform to support Callback within the bounds of the EUT remaining within the same bridged 802 network.

Technical areas to be addressed by standard (2/3) Unauthorized Access (1/2) This is a contentious feature within the IETF and ECRIT as it would (according to them) require a “business relationship” between the “Access Provider” (i.e. the provider of simple connectivity to the Internet) and the “Service Provider” (i.e. the application provider, e.g. the provider of VoIP “service”) Unclear whether IETF will support this service. Unclear which markets (if any) will require this by regulation for the space where APP prov & SERV prov are truly separate

Technical areas to be addressed by standard (3/3) Unauthorized Access (2/2) “Authorization” in this context can take place in the 802 L1/L2 Level (e.g X Port Authentication) - OR - In the IETF Level above the 802 Layer (e.g. denial of granting IP address, no subscription to a VoIP service). Providing unauthorized access would add significant complexity at the L1/L2 Level (dedicated EtherType & VLAN?) and at the IETF Level (access providers would have to provide a default VoIP service?) STATUS: Uncertain to unlikely.

Security Considerations Authorized Access We assume that the ordinary security associated with the subscribed VoIP service is adequate security for the over the air portion of an 802 wireless connection (or other 802 connection). We assume that the actual location of Wireless APs & equivalents is not something that needs to be held as secure data. Unauthorized Access In the unauthorized case, we need to be able to access a secured LAN in the event (only) of an Emergency Call (How?). In the above case the call should be restricted to PSAP service only as a destination. Such a call should be provided with security as good or better than a normal VoIP call.