Doc.: IEEE 802.11-00/137r2 Submission June 2000 Tim Godfrey, IntersilSlide 1 TGe Requirements Version r2 8 June 2000.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

Doc.: IEEE xxxxx Submission doc. : IEEE wng0 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE /275 Submission September 2000 David Halasz, Cisco Systems, Inc.Slide 1 IEEE 802.1X for IEEE David Halasz, Stuart Norman, Glen.
Presented by Scott Kristjanson CMPT-820 Multimedia Systems Instructor: Dr. Mohamed Hefeeda 1 Cross-Layer Wireless Multimedia.
Wireless Design for Voice Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Ncue-csie1 A QoS Guaranteed Multipolling Scheme for Voice Traffic in IEEE Wireless LANs Der-Jiunn Deng 、 Chong-Shuo Fan 、 Chao-Yang Lin Speaker:
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Doc.: IEEE /1126r0 Submission September 2012 Krishna Sayana, SamsungSlide 1 Wi-Fi for Hotspot Deployments and Cellular Offload Date:
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Doc.: IEEE /229r0 Submission Tan Pek-Yew, Panasonic Slide 1 March 2003 Interworking – QoS and Authorization Tan Pek Yew & Cheng Hong Panasonic.
Doc.: IEEE /0569 Submission May 2012 Slide 1Lin Cai et al,Huawei. Differentiated Initial Link Setup Date: 05/02/2012 Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /176 Submission July 2000 Slide 1Several Authors Perspective on the QoS Problem Keith Amann, Spectralink Peter Ecclesine, Cisco David.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Doc.: IEEE /828r2 Submission November 2003 Stephen McCann, Siemens Roke ManorSlide 1 Hotspot Evolution Stephen McCann, Siemens Roke Manor
Distributed QoS model for IEEE doc.: IEEE /267 September 2000 Jan Kruys, Harold Teunissen, Lucent TechnologiesSlide 1 Distributed QoS model.
Copyright © 2002 Intel Corporation. The MAC Protocol & Quality of Service Duncan Kitchin Wireless Networking Group Intel Corporation 4/4/2003.
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Doc.: IEEE /0568r1 Submission May 2004 Kevin Dick - Nortel Networks Slide 1 Usage Models for ESS Mesh Kevin Dick Kue.
Doc.: IEEE /2778r1 Submission November 2007 Sandra Qin et al., SamsungSlide 1 Content Protection Support in Date: Authors:
Lecture 24 Wireless Network Security
Doc.: IEEE /310r0 Submission C. Ware, et.al, Motorola Slide 1 May 2002 Requirements for Home Networking Chris Ware, Eryk Dutkiewicz, Alistair.
Doc.: IEEE /xxxx Submission July 2007 Lei Du, DoCoMo Beijing Labs Slide 1 End-to-End QoS awareness for admission control Date: Authors:
1 Merges of Wireless Communications and Computer Networks George Lee.
62 nd IETF – CAPWAP Working Group1 CAPWAP Objectives Saravanan Govindan March 2005.
Doc.: IEEE /843r0 Submission Cheng Hong, Tan Pek-Yew, Panasonic Slide 1 November 2003 Interworking – WLAN Control Cheng Hong & Tan Pek Yew Panasonic.
Doc.: IEEE /1378r0 Submission November 2008 Darwin Engwer, Nortel NetworksSlide 1 Improving Multicast Reliability Date: Authors:
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
4/26/2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Response to WG request regarding TC ERM requested.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Doc.: IEEE /0371r0 Submission May 2005 S. McCann & E. Hepworth, Siemens Roke ManorSlide 1 IEEE 802 Architecture Issues Notice: This document has.
Doc.: IEEE /243r0 Submission May 2001 Slide 1Steve Shellhammer, Symbol Technologies IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
Doc.: IEEE /0448r0 Submission March, 2007 Srinivas SreemanthulaSlide 1 Joiint TGU : Emergency Identifiers Notice: This document has been.
May 2011doc.: IEEE 15-XX-XXXX-XX-Xpsc SubmissionSamsung Electronics, ETRI Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE /0051r2 Submission January 2004 Dr. John R. Barr, MotorolaSlide 1 Project: IEEE Working Group for Wireless Personal Area Networks.
Doc.: IEEE Submission September 2009 Tim Godfrey, EPRISlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE /117 Submission 11/99 Nada Golmie, NISTSlide 1 IEEE P Working Group for Wireless Personal Area Networks MAC Performance Evaluation.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
Doc.: IEEE /250r0 Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: IEEE :
Doc.: IEEE /182r0 Submission March 2002 Brüninghaus / Euscher / Kockmann, Siemens.Slide 1 Home Networking Requirements & Aspects for Next Generation.
Submission May 2016 H. H. LEESlide 1 IEEE Framework and Its Applicability to IMT-2020 Date: Authors:
IEEE Wireless LAN Standard
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Doc.: IEEE /0450r0 Submission March 2006 Eleanor Hepworth, Siemens Roke ManorSlide 1 Proposal for Emergency Service Support Notice: This document.
November, 1999 doc.:IEEE P /259 Submission Slide 1 Dr. Rajugopal Gubbi,ShareWave Streaming Support for b MAC Dr. Rajugopal Gubbi Nov, 1999.
Networked Multimedia Basics. Network Characteristics.
Content Protection Support in
13-May-2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Some MAC Requirements for Neighborhood Area.
October, 2001 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [QoS Policy Proposal] Date Submitted: [9.
Differentiated Initial Link Setup (Follow Up)
November 18 July 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Task Group 4e definitions Date.
doc.: IEEE <doc#>
8 July 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [MAC Access Priorities] Date Submitted: [8.
doc.: IEEE <doc#>
doc.: IEEE /454r0 Bob Beach Symbol Technologies
TGe Metrics & Criteria Ad Hoc Group Summary Report
MAC applicability for WirelessHUMAN
End-to-End QoS awareness for admission control
Computer Networks Protocols
Differentiated Initial Link Setup (Follow Up)
OBSS Requirements Date: Authors: July 2008 July 2008
Requirement Motions Date: Authors: July 2005 July 2005
OBSS Requirements Date: Authors: July 2008 July 2008
Submission Title: Required MAC protocol features for non-medical BAN
Presentation transcript:

doc.: IEEE /137r2 Submission June 2000 Tim Godfrey, IntersilSlide 1 TGe Requirements Version r2 8 June 2000

doc.: IEEE /137r2 Submission June 2000 Tim Godfrey, IntersilSlide 2 General MAC Requirements Must be compatible with the current MAC including DCF and PCF. Support for peer to peer communication. Support for an error correction mechanism. Support for overlapping BSS operation. Dynamic Frequency Selection (DFS) per CEPT. Transmit Power Control (TPC) per CEPT. Support for dynamic power use minimization. Provides redundancy of Point Coordinators. Minimal increase in complexity, while meeting other requirements.

doc.: IEEE /137r2 Submission June 2000 Tim Godfrey, IntersilSlide 3 External Requirements Applications –Support for interactive services. –Should be able to support H.323, MPEG2, MPEG4, etc Higher Layers –The QoS definition should be higher layer agnostic. –Accept the indicates and requests of 802.3ac (VLANs), and add to it as appropriate for mobility and security and regulatory compliance. –Support the Inter Access Point Protocol recommended practices being developed by Task Group F. Support for terminal assisted handoff decisions (to insure media stream can be handled by new AP before disconnect). Support for load balancing within the ESS. –Should adhere to existing or upcoming IETF standards. IETF and QoS support.

doc.: IEEE /137r2 Submission June 2000 Tim Godfrey, IntersilSlide 4 QoS Requirements Support for multiple priorities and classes of service. –Support for Class of Service three years in the future –Support for QoS Streams and bursty data concurrently. Support for “toll quality” voice, audio, and video streaming. Support for multiple simultaneous streams with differing priority and class requirements. Support for interactive data streams. Support for dynamic bandwidth allocation and/or reservation. Support for classes of service where acknowledgement is not mandatory.

doc.: IEEE /137r2 Submission June 2000 Tim Godfrey, IntersilSlide 5 QoS Taxonomy Traffic Types Best Effort Constant Rate (CD, CBR voice) Variable Rate – (MPEG4, VBR voice) Service Parameters Controlled Jitter Guaranteed Rate Dynamic Allocation Priority Bursty / Async (web, file, ipc)

doc.: IEEE /137r2 Submission June 2000 Tim Godfrey, IntersilSlide 6 Authentication –Security framework must prevent unauthorized authentication or re- authentication with an AP as those terms are defined within the specification. –Security framework must be able to prevent unauthorized access by unauthenticated peers over the link. –Security framework must allow for mutual authentication of STA and AP. –Security framework authentication mechanisms must fit within the designated multi-media authentication and re-authentication time budget. –Security framework should make no assumption whether peer authentication is machine or user authentication, as different organizations will establish different policies regarding who or what is authenticated. Security Requirements 1

doc.: IEEE /137r2 Submission June 2000 Tim Godfrey, IntersilSlide 7 Security Requirements 2 Privacy –Security framework must protect network traffic from eavesdropping to a reasonable level compatible with the state of the art. –Security framework must allow for authentication of the source of each packet, to prevent link hijacking or undetected insertion of rogue packets into the link. –Support for security to protect copyrighted media streams. Security framework must preserve the security characteristics of content streams. Security framework must prevent content stream theft.

doc.: IEEE /137r2 Submission June 2000 Tim Godfrey, IntersilSlide 8 Security Requirements 3 Keys –Security framework must allow key distribution or derivation of per- link or per-session keys –Security framework must strongly protect keys and passwords from recovery by eavesdropper Extensibility, Compatibility, and Interoperability –Security framework should provide a mechanism for extensibility to allow new algorithms to be supported without changing the standard. (reference document 00/065a) –Any proposal that allows for more than one algorithm must support negotiation to a common algorithm. –Security framework must not compromise (i.e., break the security of) existing industry standard network user authentication methods and techniques used within the framework. –Security framework must coexist with existing industry standard network user authentication methods and techniques (e.g., RADIUS- based authentication).

doc.: IEEE /137r2 Submission June 2000 Tim Godfrey, IntersilSlide 9 Security Requirements 4 Security framework must scale to: –Simple, “self-managing” or “unmanaged” environments (etc., home, SOHO) –Ad hoc wireless LANs –Enterprise environments (e.g., office campuses, factories) –Public environments (e.g., hotels, public services) Implementation and Complexity –Security framework should cause minimal computational expense consistent with meeting other requirements. –Security framework should use public and/or standard algorithms to the greatest extent possible. –Security framework should minimize the number of mandatory cryptographic algorithms.