1 / 5

Location Configuration Protocols: How many more do we need?

Location Configuration Protocols: How many more do we need?. “This protocol aims to allow an end host to obtain location information, by value or by reference, from a Location Information Server (LIS) that is located in the access network.”

laasya
Download Presentation

Location Configuration Protocols: How many more do we need?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Location Configuration Protocols: How many more do we need? “This protocol aims to allow an end host to obtain location information, by value or by reference, from a Location Information Server (LIS) that is located in the access network.” http://www.ietf.org/internet-drafts/draft-ietf-geopriv-l7-lcp-ps-00.txt Marc Linsner

  2. Location Configuration • Network based vs. host determined • Location is a layer 2 problem • Layer 1 & 2 attributes dictate that location is derived here • Location is *local* network pertinent information • Network hosts are advised of local information via configuration protocols • DHCP, LLDP, and CDP are protocols used to advise hosts of local network parameters

  3. Layer 2 is involved • Regardless of whether there is a static wiremap database or exotic rf measurement technology, layer 2 is involved in discovering the physical location of a host. • Layer 2 media access control protocols are being modified to pass location information to a host within it’s control plane (LLDP-MED, 802.11tgv??)

  4. Is a layer 7 mechanism required? • A layer 7 LCP is a business issue, not a technical issue. • A layer 7 LCP can mask poor network design • A layer 7 LCP provides many new attack vectors • Internet experience shows that complex mechanisms fail and easy/simple ones are utilized.

  5. Internet Architecture • Internet applications separate the access layers from the application layers. This is at the heart of the Internet’s success Common point - The end device! VoIP, Inc. (Application Service Provider) Layer 7 ISP, Inc. (Internet Service Provider) Layer 3 Last Mile, Inc. (Access Provider) Layer 2

More Related