Doc.: IEEE 802.11-yy/xxxxr0 Submission May 2005 John Klein, Symbol TechnologiesSlide 1 Firmware Updates Notice: This document has been prepared to assist.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0256r0 Submission February 2007 A. Centonza, D. StephensonSlide 1 Limitations on the Use of EBR Notice: This document has been prepared.
Advertisements

Doc.: IEEE /0866r1 Submission September 2005 Michael Montemurro, Chantry NetworksSlide 1 Mobility Domain Definition and Description Notice: This.
Doc.: IEEE /90r0 Submission Nov., 2012 NICTSlide b NICT Proposal IEEE P Wireless RANs Date: Authors: Notice: This document.
Doc.: IEEE /0930r0 Submission July 2006 Nancy Cam-Winget, Cisco Slide 1 Editor Updates since Jacksonville Notice: This document has been prepared.
Doc.: IEEE /0024r0 Submission May 2006 Steve Shellhammer, QualcommSlide 1 Discussion of Coexistence Scenarios Notice: This document has been prepared.
Doc.: IEEE /1867r1 Submission November r Security TeamSlide 1 TGr Security Requirements Notice: This document has been prepared to.
Doc.: IEEE /0094r0 Submission November 2009 Steve Shellhammer, QualcommSlide 1 Comments on PAR Notice: This document has been prepared.
Doc.: IEEE /753r1 Submission May 2006 Tim GodfreySlide 1 Connecting to the IEEE 802.1x Network Notice: This document has been prepared to assist.
Doc.: IEEE /2237r0 Submission July 2007 Emily Qi, Intel CorporationSlide 1 TGv Redline D1.0 Insert and Deletion Notice: This document has been.
Doc.: IEEE /0072r0 Submission January 2009 Slide 1 Proxy ARP Issue for Direct Link Setup Notice: This document has been prepared to assist IEEE.
Doc.: IEEE /1628r1 Submission January 2005 Lee Armstrong, Armstrong Consulting, Inc.Slide 1 WAVE Random MAC Address Notice: This document has.
Doc.: IEEE /1212r0 Submission TGT and MEF Liaison Notice: This document has been prepared to assist IEEE It is offered as a basis for.
Doc.: IEEE /86r2 Submission March, 2010 Gabor BajkoSlide 1 Location Proxy Notice: This document has been prepared to assist IEEE It is.
Doc.: IEEE /0028r0 Submission January 2005 Eleanor Hepworth, Siemens Roke ManorSlide 1 Definitions and Terminology Notice: This document has been.
Doc.: IEEE /0732r0 Submission July 2005 Tim Olson, Cisco SystemsSlide 1 Client Management Protocol Notice: This document has been prepared to.
Doc.: IEEE /0197r0 Submission March 2005 Nancy Cam-Winget et alSlide 1 TAP & JIT Merge Process Notice: This document has been prepared to assist.
Doc.: IEEE /0460r1 Submission March 2006 Fujio Watanabe, DoCoMo USA LabsSlide 1 Japanese Emergency Call Regulation Notice: This document has been.
Doc.: IEEE /1006r0 Submission September 2005 Andrew McDonald, Siemens Roke ManorSlide 1 Initial Network Selection Concept Notice: This document.
Doc.: IEEE /0652r1 Submission May 2007 Emily Qi, Intel CorporationSlide 1 TGv Redline D0.12 Insert and Deletion Notice: This document has been.
June 2005 doc.: IEEE /0593r0 July 2005 Summary Presentation Proposal L:19 Siemens Proposal for WLAN Mesh Networking Date: Authors:
[ Interim Meetings 2006] Date: Authors: July 2005
Resource Request/Response Discussion
TGu/TGv Joint Session Date: Authors: July 2005 July 2005
LB73 Noise and Location Categories
LB73 Noise and Location Categories
Waveform Generator Source Code
TGu Closing Report Date: Authors: November 2005
March 2014 Election Results
TGp Closing Report Date: Authors: July 2007 Month Year
Attendance and Documentation for the March 2007 Plenary
3GPP Extended Date: Authors: July 2005 July 2005
3GPP liaison report May 2006 May 2006 Date: Authors:
Motion to accept Draft p 2.0
3GPP liaison report July 2006
[place presentation subject title text here]
Descriptive Language Usage in TGv
(Presentation name) For (Name of group) (Presenter’s name,title)
TGp Motions Date: Authors: November 2005 Month Year
Emergency Call Motion Date: Authors: January 2006
On Coexistence Mechanisms
TGu-changes-from-d0-02-to-d0-03
TGp Closing Report Date: Authors: May 2007 Month Year
On Coexistence Mechanisms
Reflector Tutorial Date: Authors: July 2006 Month Year
TGv Redline D0.07 Insert and Deletion
TGv Redline D0.06 Insert and Deletion
Experimental DTV Sensor
Solution for comment 32 Date: Authors: July, 2008
IEEE WG Opening Report – July 2008
ADS Study Group Mid-week Report
IEEE P Wireless RANs Date:
Spectrum Sensing Tiger Team
TGu-changes-from-d0-01-to-d0-02
LB73 Noise and Location Categories
QoS in WLAN Interworking
TGy draft 2.0 with changebars from draft 1.0
TGv Redline D0.10 Insert and Deletion
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Redline of draft P802.11w D2.2 Date: Authors:
TGu-changes-from-d0-02-to-d0-03
Proposed changes to the v Draft
Draft P802.11s D1.03 WordConversion
Questions to the Contention-based Protocol (CBP) Study Group
EC Motions – July 2005 Plenary
TGu-changes-from-d0-04-to-d0-05
Transition Nowhere Date: Authors: Sept 2005 Sept 2005
TGu-changes-from-d0-03-to-d0-04
TGu Motions Date: Authors: May 2006 May 2006
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
TGp Motions Date: Authors: January 2006 Month Year
Presentation transcript:

doc.: IEEE yy/xxxxr0 Submission May 2005 John Klein, Symbol TechnologiesSlide 1 Firmware Updates Notice: This document has been prepared to assist IEEE It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE Working Group. If you have questions, contact the IEEE Patent Committee Administrator at. Date: 2005-May-17 Authors:

doc.: IEEE yy/xxxxr0 Submission May 2005 John Klein, Symbol TechnologiesSlide 2 Abstract Ideas for the Firmware upgrade requirements in TGv.

doc.: IEEE yy/xxxxr0 Submission May 2005 John Klein, Symbol TechnologiesSlide 3 Contents Purpose / Motivation General Requirements Overview Client STA scenarios Infrastructure scenarios Possible Implementation

doc.: IEEE yy/xxxxr0 Submission May 2005 John Klein, Symbol TechnologiesSlide 4 Purpose / Motivation As continues to mature, new services and features continue to be deployed in the MAC. Frequent upgrades require that devices be upgraded with new firmware from the OEM vendor to enable new services or fix bugs. Ensuring the latest FW deployments in the enterprise WLAN devices helps the IT Administrator keep tight control of the network. Few vendors are provide firmware updates over the air today and automatically upgrade devices easily and securely. Proliferation of devices from many OEM vendors makes manually upgrading firmware to devices difficult and time consuming. The logistics quickly become unmanageable for large enterprise networks. Automating firmware upgrades over a secure wireless interface eliminates the manual hassle factor and saves time and money for the enterprise IT department.

doc.: IEEE yy/xxxxr0 Submission May 2005 John Klein, Symbol TechnologiesSlide 5 Client Scenario IT Department has 10K clients on campus representing 12 different hardware vendors and 36 different platforms. They have new firmware for 6 of their HW platforms representing 2300 client devices they need to upgrade. They want to distribute the new FW to the client devices with a minimum of disruption to the overall network and to the users that are affected. The IT department publishes the FW images on an internal server and issues policies for the wireless network that informs client devices that the FW is available and allows the client devices to download the FW at non-peak periods and locations around campus for the first 3 days. After the first 3 days or after 75% of all devices have been updated, the FW can be downloaded at anytime and from any location. Per the policy, devices are directed to upgrade the firmware in the actual device after the next system boot to avoid service disruption. Devices that refuse to accept the FW directive are logged for notification and manual upgrade.

doc.: IEEE yy/xxxxr0 Submission May 2005 John Klein, Symbol TechnologiesSlide 6 Infrastructure Scenario IT Department has 2000 APs spread around campus representing 3 different HW vendors. Some are stand alone (FAT) APs from one vendor, and some systems are connected to Wireless Switching (WS) Infrastructures from two different vendors. All APs or WSs are (as well as the clients) managed using a TGv compatible NMS system over the campus wired infrastructure. They have new FW to upgrade one of the WS systems as well as the APs connected to those WSs. In addition, they have FW for the Stand Alone APs. The IT department publishes the FW images on an internal server and issues policies for the wireless network that informs AP and WS devices that the FW is available and allows the infrastructure devices to download the FW immediately. Per the policy, devices are directed to upgrade the firmware in the actual devices at a pre-determined late-night schedule to minimize service disruption. Devices that refuse to accept the FW directive are logged for manual inspection.

doc.: IEEE yy/xxxxr0 Submission May 2005 John Klein, Symbol TechnologiesSlide 7 General Requirements Overview Must operate over the air or over the wire Must be secure –Any TGv frames used must be secure to ensure the management entity sending the TGv frame is authentic. Must be deniable by the recipient –Since devices visit many different networks, the recipient must be able to refuse FW from say… Starbucks while accepting FW from the employer’s IT department. Must be reliable. Can’t render device unusable. –Must preserve current network settings (profiles) such that the device can return to normal operation the network once the FW has been upgraded. Must be compatible with CAPWAP with regard to WS and APs connected to WS infrastructures.

doc.: IEEE yy/xxxxr0 Submission May 2005 John Klein, Symbol TechnologiesSlide 8 One Possible Suggestion TGv Firmware Upgrade Management Message –An L2 message from a TGv management station that alerts upper layer software that a firmware upgrade for the device is available. –Provides information and policies so the device or upper layer application can locate and download the firmware image for the device. –Might include server IP/Name, protocol(s) to use, required security credentials, for higher level app to obtain and download the firmware. –Could be a location or time based service. (I.e. only upgrade devices that are associated to the APs in the control room, only after 6PM) –Does not specify the how the firmware image is programmed into the OEM device itself. Beyond scope of TGv.

doc.: IEEE yy/xxxxr0 Submission May 2005 John Klein, Symbol TechnologiesSlide 9 Another Possible Suggestion TGv Firmware Upgrade image download –An L2 protocol built into the MAC for downloading the actual firmware image to the targeted device. –Low level packet TLV w/ packet ids and ack. –Does not require that the target device have any upper layer network services over (i.e. UDP/IP services) –Does not require an “Agent” utility on any device. –Does not specify the how the firmware image is programmed into the OEM device itself. Beyond scope of TGv.

doc.: IEEE yy/xxxxr0 Submission May 2005 John Klein, Symbol TechnologiesSlide 10 Questions?