Doc.: IEEE 802.11-09/0830r1 Submission July 2009 Richard Paine, SelfSlide 1 Public Easements in...
-
Upload
claud-franklin -
Category
Documents
-
view
212 -
download
0
Transcript of Doc.: IEEE 802.11-09/0830r1 Submission July 2009 Richard Paine, SelfSlide 1 Public Easements in...
doc.: IEEE 802.11-09/0830r1
Submission
July 2009
Richard Paine, SelfSlide 1
Public Easements in 802.11Date: 2009-7-15
Name Affiliations Address Phone email Richard Paine Self 6115 72nd Dr NE
Marysville, Wa 98270 206-854-8199 Richard.h.paine@gmail.
com
Authors:
doc.: IEEE 802.11-09/0830r1
Submission
• Wi-Fi is everywhere but often you can’t get guest access to the network even for very minor traffic access.
What are We Solving?
July 2009
Slide 2 Richard Paine, Self
doc.: IEEE 802.11-09/0830r1
Submission
• An easement is the concept of grant of use to one party over the property owned by another.
• An open ended variety of narrowband applications available – mostly on low bandwidth, for example, texting.
What is an Easement?
July 2009
Slide 3 Richard Paine, Self
doc.: IEEE 802.11-09/0830r1
Submission
July 2009
Richard Paine, SelfSlide 4
• Wi-Fi Access: Collaborative Wi-Fi Public Easements• Omnipresence of WiFi connectivity• Ubiquity of WiFi
• Wi-Fi Access: Intelligent Access Point Selection• Too many access points and what is the right one?• Chooses SSID for you
General Solution Sets
doc.: IEEE 802.11-09/0830r1
Submission
• Advertise the easement. Wi-Fi provider decides which Public Easements he wishes to enable (e.g., texting or multimedia).
• Texting or multimedia is advertized with SSID (eg, “PublicEasement”)
• Bandwidth/size/location is shaped at the discretion of the access point
• Provides Public Easement through NATed last leg Wi-Fi connectivity
• The provider protects itself from abuse of the easement
Providing Public Easements
July 2009
Slide 5 Richard Paine, Self
doc.: IEEE 802.11-09/0830r1
Submission
• Search and select an easement
• When user presents Easement Name (eg: texting or multimedia) as passcode, the traffic is passed through the public easement.
• User needs to recognize that the easement is insecure – establish security
Using/Selecting Wireless Easements
July 2009
Slide 6 Richard Paine, Self
doc.: IEEE 802.11-09/0830r1
Submission
• Texting: Libre Texting: http://www.neda.com/PLPC/110015
• Location-based Push
• Other commercial applications
Example Applications Using Public Easements
July 2009
Slide 7 Richard Paine, Self
doc.: IEEE 802.11-09/0830r1
Submission
July 2009
Slide 8 Richard Paine, Self
Easement Comparison to Existing Services
• Texting and low bandwidth are integral applications and services for ISPs. Existing examples:• iTunes easements at Starbucks• Amazon easements at all WISP locations• Libre Texting: http://www.neda.com/PLPC/110015
• Business Considerations• Texting is low bandwidth, but high cost in cellular• Secure texting and content-based easements needed in WLANs
to have comparable services to cellular• Location and content considerations for 802.11 growth and
profitability
• 802.11 Considerations• Need security and location protocol elements• Integrate MAC easement elements like security, location, etc
doc.: IEEE 802.11-09/0830r1
Submission
July 2009
Richard Paine, SelfSlide 9
Public Easement Information• Texting and short multimedia applications are very small and needing
802.11 ubiquity– Inconsequential bandwidth– Secure easements availability in all WLANs– Location-based and needing texting content protection
• Multimedia (A/V) applications are becoming ubiquitous in WLAN– Music Purchasing– Multicasting/Broadcasting– Video conferencing– Real-time Streaming– 3D gaming
• Content protection requirement is ubiquitous– Content provider’s content – User generated content
• Easement and content protection support is required from MAC and PHY in WLAN
– Proximity control– Packet-level link protection
doc.: IEEE 802.11-09/0830r1
Submission
• Enticement to buy more access and bandwidth
• Access point manufacturers would want to move toward ubiquity – vehicle to expand market
• Move from personal to ubiquity – more access points
• Easement providers gain location and usage information
• Location-based applications can be created
• Public easement increases foot traffic - desireable place to be
Business Case for Providing Public Easement
July 2009
Slide 10 Richard Paine, Self
doc.: IEEE 802.11-09/0830r1
Submission
• Limitations imposed for speed, bandwidth, and location
• Protection from rogue usage in the public easement
• Separation from the AP STA functions
Security Control Requirements (Layer 2?)
July 2009
Slide 11 Richard Paine, Self
doc.: IEEE 802.11-09/0830r1
Submission
July 2009
Richard Paine, SelfSlide 12
Proximity Control Requirement
• Content may need to be constrained to a certain range or location (location provided by 11k and 11v).
• For example, within the black circle vs coverage (red circle).
doc.: IEEE 802.11-09/0830r1
Submission
July 2009
Richard Paine, SelfSlide 13
Summary
• Public easements are a request for limited free access to WLANs
• Content protection is becoming a crucial issue for Texting/Audio/Visual applications for WLAN.
• Content protection requires support from MAC and PHY layers in WLAN.
– Security controls– Proximity control– Packet level rights control
• Lack of such support in current WLAN solutions.• Call for discussion.