1 / 14

Public Easements in 802.11

Public Easements in 802.11. Authors:. Date: 2009-7-15. What are We Solving?. Wi-Fi is everywhere but often you can’t get guest access to the network even for very minor traffic access. What is an Easement?.

mauli
Download Presentation

Public Easements in 802.11

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Public Easements in 802.11 Authors: Date: 2009-7-15 Richard Paine, Self

  2. What are We Solving? Wi-Fi is everywhere but often you can’t get guest access to the network even for very minor traffic access. Richard Paine, Self

  3. What is an Easement? An easement is the concept of grant of use to one party over the property owned by another. An open ended variety of narrowband applications available – mostly on low bandwidth, for example, texting. Richard Paine, Self

  4. General Solution Sets • Wi-Fi Access: Collaborative Wi-Fi Public Easements • Omnipresence of WiFi connectivity • Ubiquity of WiFi • Wi-Fi Access: Intelligent Access Point Selection • Too many access points and what is the right one? • Chooses SSID for you Richard Paine, Self

  5. Providing Public Easements • Advertise the easement. Wi-Fi provider decides which Public Easements he wishes to enable (e.g., texting or multimedia). • Texting or multimedia is advertized with SSID (eg, “PublicEasement”) • Bandwidth/size/location is shaped at the discretion of the access point • Provides Public Easement through NATed last leg Wi-Fi connectivity • The provider protects itself from abuse of the easement Richard Paine, Self

  6. Using/Selecting Wireless Easements Search and select an easement When user presents Easement Name (eg: texting or multimedia) as passcode, the traffic is passed through the public easement. User needs to recognize that the easement is insecure – establish security Richard Paine, Self

  7. Example Applications Using Public Easements • Texting: Libre Texting: http://www.neda.com/PLPC/110015 • Location-based Push • Other commercial applications Richard Paine, Self

  8. Easement Comparison to Existing Services • Texting and low bandwidth are integral applications and services for ISPs. Existing examples: • iTunes easements at Starbucks • Amazon easements at all WISP locations • Libre Texting: http://www.neda.com/PLPC/110015 • Business Considerations • Texting is low bandwidth, but high cost in cellular • Secure texting and content-based easements needed in WLANs to have comparable services to cellular • Location and content considerations for 802.11 growth and profitability • 802.11 Considerations • Need security and location protocol elements • Integrate MAC easement elements like security, location, etc Richard Paine, Self

  9. Public Easement Information • Texting and short multimedia applications are very small and needing 802.11 ubiquity • Inconsequential bandwidth • Secure easements availability in all WLANs • Location-based and needing texting content protection • Multimedia (A/V) applications are becoming ubiquitous in WLAN • Music Purchasing • Multicasting/Broadcasting • Video conferencing • Real-time Streaming • 3D gaming • Content protection requirement is ubiquitous • Content provider’s content • User generated content • Easement and content protection support is required from MAC and PHY in WLAN • Proximity control • Packet-level link protection Richard Paine, Self

  10. Business Case for Providing Public Easement Enticement to buy more access and bandwidth Access point manufacturers would want to move toward ubiquity – vehicle to expand market Move from personal to ubiquity – more access points Easement providers gain location and usage information Location-based applications can be created Public easement increases foot traffic - desireable place to be Richard Paine, Self

  11. Security Control Requirements (Layer 2?) Limitations imposed for speed, bandwidth, and location Protection from rogue usage in the public easement Separation from the AP STA functions Richard Paine, Self

  12. Proximity Control Requirement • Content may need to be constrained to a certain range or location (location provided by 11k and 11v). • For example, within the black circle vs coverage (red circle). Richard Paine, Self

  13. Summary • Public easements are a request for limited free access to WLANs • Content protection is becoming a crucial issue for Texting/Audio/Visual applications for WLAN. • Content protection requires support from MAC and PHY layers in WLAN. • Security controls • Proximity control • Packet level rights control • Lack of such support in current WLAN solutions. • Call for discussion. Richard Paine, Self

  14. Straw Poll • Should 802.11 WNG receive further presentations on the topic of public easements? Richard Paine, Self

More Related