Doc.: IEEE 802.11-04/0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 1 Network Selection Bernard Aboba Microsoft

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
Doc.: IEEE xxx Submission May 10-14, 2004 Alan Carlton, Interdigital CommunicationsSlide 1 Defining Layer 2.5 Alan Carlton Interdigital Communications.
IEEE P802 Handoff ECSG Submission July 2003 Bernard Aboba, Microsoft Detection of Network Attachment (DNA) and Handoff ECSG Bernard Aboba Microsoft July.
Extended Service Set (ESS) Mesh Network Daniela Maniezzo.
Doc.: Handoff_WNG_Presentation r3 Submission July David Johnston, IntelSlide Handoff Presentation to WNG David Johnston.
Omniran IEEE 802 Enhanced Network Detection and Selection Date: Authors: NameAffiliationPhone Max RiegelNSN
Doc.: IEEE /173r1 Submission Byoung-Jo Kim, AT&T March 2003 Slide 1 Coexistence of Legacy & RSN STAs in Public WLAN Byoung-Jo “J” Kim AT&T Labs-Research.
Network Initiated Handovers T. Melia, J. Korhonen, R. Aguiar, S. Sreemanthula, V. Gupta Based on draft-melia-mipshop-niho-ps-00.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
LLDP-MED Location Identification for Emergency Services Emergency Services Workshop, NY Oct 5-6, 2006 Manfred Arndt
Doc.: IEEE /124r0 Submission January 2003 Byoung-Jo “J” KimSlide 1 RRM Requirements for Public WLAN Service Provider Byoung-Jo “J” Kim AT&T Labs-Research.
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Internet Goes Mobile Alper Yegin KIOW 2003 at APNIC 16 August 19th, Seoul, Korea.
Doc: Submission September 2003 Dorothy Stanley (Agere Systems) IETF Liaison Report September 2003 Dorothy Stanley – Agere Systems IEEE.
EMU BOF EAP Method Requirements Bernard Aboba Microsoft Thursday, November 10, 2005 IETF 64, Vancouver, CA.
EAP WG EAP Key Management Framework Draft-ietf-eap-keying-03.txt Bernard Aboba Microsoft.
Doc.: IEEE /751r0 Submission July 2004 Max Riegel, SiemensSlide 1 Selling network access Views from a business perspective Max Riegel Siemens.
Chapter 8: Virtual LAN (VLAN)
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
EAP Key Framework Draft-ietf-eap-keying-01.txt IETF 58 Minneapolis, MN Bernard Aboba Microsoft.
Doc.: mes Submission 7 May 2004 Tricci SoSlide 1 Need Clarification on The Definition of ESS Mesh Prepared by Tricci So.
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Doc.: 802_Handoff_Joint_Handoff_16e_Session Submission July David Johnston, IntelSlide Handoff ECSG Overview for Joint 16e/Handoff David Johnston.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Doc.: IEEE r Submission November 2004 Bob Beach, Symbol TechnologiesSlide 1 Fast Roaming Using Multiple Concurrent Associations Bob.
Doc.: IEEE /209r0 Submission 1 March GPP SA2Slide 1 3GPP System – WLAN Interworking Principles and Status From 3GPP SA2 Presented.
Doc.: IEEE /1019r0 Submission September 2004 Soohong Daniel Park & Jaehwan Lee Access Router Identifier (ARID) for supporting L3 mobility Soohong.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
1 Recommendations Now that 40 GbE has been adopted as part of the 802.3ba Task Force, there is a need to consider inter-switch links applications at 40.
Doc.: IEEE 11-04/0319r0 Submission March 2004 W. Steven Conner, Intel Corporation Slide 1 Architectural Considerations and Requirements for ESS.
Submission doc.: IEEE 11-12/0553r4 May 2012 Jarkko Kneckt, NokiaSlide 1 Response Criteria of Probe Request Date: Authors:
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
Submission Page 1 November 2002 doc.: IEEE /677r0 Daryl Kaiser, Cisco Systems Radio Measurement Actions Daryl Kaiser (Cisco Systems) 12 November.
Doc.: IEEE /843r0 Submission Cheng Hong, Tan Pek-Yew, Panasonic Slide 1 November 2003 Interworking – WLAN Control Cheng Hong & Tan Pek Yew Panasonic.
Doc.: IEEE /1378r0 Submission November 2008 Darwin Engwer, Nortel NetworksSlide 1 Improving Multicast Reliability Date: Authors:
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Security Problems related to Transition Date Submitted: January.
1 Network Selection Problem Definition Draft-ietf-eap-netsel-problem-01.txt Jari Arkko Bernard Aboba.
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
IETF #65 Network Discovery and Selection Problem draft-ietf-eap-netsel-problem-04 Farooq Bari Jouni Korhonen.
Doc.: IEEE /0690r0 Submission Andrew Myers, BT Slide 1 July GPP SA3 Interworking Security Issues II Andrew Myers British Telecommunications.
August 2, 2005 IETF 63 – Paris, France Media Independent Handover Services and Interoperability Ajay Rajkumar Chair, IEEE WG.
November 2001 Lars Falk, TeliaSlide 1 doc.: IEEE /617r1 Submission Status of 3G Interworking Lars Falk, Telia.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
Doc.: IEEE /0263r1 SubmissionJae Seung Lee, ETRI Spec Framework Proposal: Selection of the AP for Scanning Date: Slide 1 March 2012.
Doc.: IEEE k Submission July 2004 Bernard Aboba, MicrosoftSlide 1 IEEE k Security: A Conceptual Model Bernard Aboba Microsoft.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: EAP Pre-authentication Problem Statement in IETF HOKEY WG Date Submitted: September,
Doc.: IEEE /827r0 Submission November 2003 Eleanor Hepworth, Siemens Roke ManorSlide 1 Co-existence of Different Authentication Models Eleanor.
Doc.: IEEE /0450r0 Submission March 2006 Eleanor Hepworth, Siemens Roke ManorSlide 1 Proposal for Emergency Service Support Notice: This document.
Instructor Materials Chapter 6 Building a Home Network
Open issues with PANA Protocol
RADEXT WG RADIUS Attributes for WLAN Draft-aboba-radext-wlan-00.txt
Jari Arkko Bernard Aboba
Discussions on FILS Authentication
P802.11aq Waiver request regarding IEEE RAC comments
P802.11aq Waiver request regarding IEEE RAC comments
Wireless Technology.
Network Selection Issues
Proposal for IEEE solution
Network Selection Bernard Aboba Microsoft
Network Selection Bernard Aboba Microsoft
TGaq Mini Tutorial Date: Authors: November 2013
IETF Network Discovery and Selection Overview
P802.11aq Waiver request regarding IEEE RAC comments
Thinking About the Site Report
Site Report Conceptual Model
Presentation transcript:

doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 1 Network Selection Bernard Aboba Microsoft

doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 2 Outline Problem Definition Open Issues Next Steps

doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 3 Challenges for Public Access WLAN Minimizing channel conflicts –In some locations (e.g. airports) multiple networks are becoming the norm. Airlines are installing networks for use in baggage reconciliation and roving ticket counters Multiple wireless ISPs often also want to serve airport customers –Radio interference is an issue In the US and Europe b networks can support only 3 non-overlapping channels In France and Japan only one channel is available Once the channels are utilized by existing APs, additional APs will interfere and reduce performance Minimizing capital expenditures –In this economic environment, raising capital is difficult –Undesirable to build out multiple networks in the same location - why not build one network and share it? Attaining high utilization of deployed Access Points –Profitability enhanced by filling in periods of low usage on the “diurnal curve” –Implies a need to serve many different types of customers: business, consumers, etc. Minimizing support costs –Desirable to support a wide variety of clients without having to preconfigure them

doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 4 Wouldn’t It Be Great If… A single network could be shared by multiple providers? Each provider could retain the flexibility to announce their own network, and select the services they wish to provide (rates, security mechanisms, etc.)? Each provider could manage their own users without interfering with other providers? Customers could discover any of the offered networks without needing to pre-configure their stations? To get there, we need to solve the Network Selection Problem!

doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 5 Aspects of Network Selection 1.Access Network Discovery –Which access point to attach to? 2.Identifier Selection –Which identity and credentials to use in this AP? 3.Selection of roaming intermediaries –How to route the AAA conversation to the home network? 4.Payload Routing –How to route payload traffic in the right way –Filters and mandatory tunnels

doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 6 An alternative decomposition Discovery –Access networks and access points –Home networks available through these –Mediating networks Decision –Manual or automatic –Automatic is preferred Most likely needs some pre-provisioned preference information Indicating the selected network –Attach to the chosen network and access point –Provide the chosen identity and home domain –Possibly provide some hints about mediating networks

doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 7 When is Network Selection an Issue? More than one network is available, each with different characteristics. The user has multiple credentials, and needs to decide which to use to authenticate to a particular network. There is more than one roaming path between the access and home network, and service parameters or pricing differs between them. The roaming relationships between access and home networks are so complicated that current AAA protocols cannot route the requests to the home network based solely on the Network Access Identifier (NAI). Payload packets get routed or tunneled differently, based on the roaming relationship path. This may have an impact on the available services or their pricing. Providers share the same infrastructure, such as wireless access points.

doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 8 Some Thoughts… All four problems are relevant. Potential need for new solutions, at least for the three first problems. The problems are very hard if you consider them with large number of networks, fast handoffs, security, and automatic decisions. The proliferation of multiple network selection technologies within IEEE 802, IETF, and 3GPP would be bad. Solving all problems with current link layers and existing network access devices may not be possible. Phasing?

doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 9 Feedback from 3GPP SA2 WLAN group What parts of the problem does 3GPP want to solve? –Problem 1 (Access Network Discovery) and 3 (AAA routing) are relevant to 3GPP. –Problem 2 (Identifier Selection) is considered at this stage out of scope. –Problem 4 (Payload Routing) is considered a separate problem within SA2 scope and is still under discussion. Observations [J. Arkko] –3GPP uses existing L2 mechanisms for problem 1, expects an IETF solution for problem 3 –Needed for 3GPP Release 6

doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 10 Recommendations from IETF 59 There is current interest in problem 1 (access network selection) –Problem 1 belongs to layer 2 –Long-term, discovery is most efficient at layer 2 There is current interest in problem 3 (roaming intermediary selection) –Problem 3 needs at least partial IETF work, though intermediary discovery could also be done at layer 2 –Any IETF intermediary discovery solution would necessarily be short-term Other problems are lower priority…

doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 11 IETF Work In Network Selection 1.Access Network Discovery –No chartered work yet 2.Identifier Selection –draft-ietf-pkix-wlan-extns-05.txt –Product of the PKIX WG 3.Selection of roaming intermediaries –draft-arkko-roamops-rfc2486bis-00.txt –Included in RADEXT WG Charter 4.Payload Routing –Improvements to AAA filtering and redirection capabilities, proposed in RADEXT WG Charter

doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 12 Thinking About the Access Netowrk Discovery Problem Why are existing solutions not adequate? –WFA: Public Access MRD Why are recently proposed standards not adequate? –IEEE 802.1ab, IEEE 802.1af –Answer: unlikely to be implemented by APs

doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 13 What is a Virtual Access Point? A “Virtual Access Point” is a logical entity that exists within a physical Access Point (AP). Each Virtual AP appears to stations (STAs) to be an independent physical AP. –Virtual APs emulate the operation of physical APs at the MAC layer. –Virtual APs provide partial emulation of the IP and Application Layer behavior of physical APs. –Emulating the operation of a physical AP at the radio frequency layer is typically not possible unless multiple radios are available.

doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 14 Is It “Virtual” Or Is It Real? Only Your Radio Knows For Sure! Channel 6 AP AAP BSTA SSID: Foo BSSID: A Rates: 5.5,11 Security: WPA SSID: Bar BSSID: B Rates: 1,2,5.5,11 Security: Open Physical APs AP A Channel 6 Virtual APs SSID: Foo BSSID: A Rates: 5.5,11 Security: WPA SSID: Bar BSSID: B Rates: 1,2,5.5,11 Security: Open Beacon/Probe Response

doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 15 What Is Required for a Virtual AP? Multiple SSIDs. –Support for multiple SSID advertisement by APs –Support for STA discovery for advertised SSIDs. Multiple capability advertisements. –Each Virtual AP can advertise its own set of capabilities. Pre-authentication routing. –Determination of the target SSID prior to Association (for routing of pre-authentication traffic). Multiple VLANs. –Allow a unique VLAN (and unique default key) to be assigned to each Virtual AP. Multiple RADIUS configurations. –Multiple RADIUS configurations, one for each virtual AP. Multiple virtual SNMP MIBs. –A virtual MIB instance per Virtual AP.

doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 16 The State of “Virtual APs” Today IEEE does not provide guidance on required MAC-layer behavior of “Virtual APs” –Multiple approaches taken by AP vendors –Different assumptions made by NIC vendors –Interoperability, reliability problems abound Solution: WFA addressing the issue in the Public Access Group –MRD near completion; requires separate BSSID for each advertised configuration –Test plan to come

doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 17 How Well do Virtual APs Scale? Velayos & Karlsson “Techniques to Reduce IEEE b Handover Time”, Swedish Royal Institute of Technology – 02%20Handover%20in%20IEEE%20802.pdfhttp:// 02%20Handover%20in%20IEEE%20802.pdf

doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 18 Feedback?