802 Architecture Group Website: http://www.ieee802.org/1/files/public/802_architecture_group/ Joining the Email exploder: http://www.ieee802.org/1/email-pages/joining.html Intent • Improve alignment between WG projects and existing 802 architecture by: – Identifying current problems, omissions, conflicts, ramifications, and their potential resolution – Identifying potential refinements or changes to the architecture – Providing a regular forum in which such discussion can take place, in a lower pressure environment than is possible during the core Plenary cycle. Mechanism • A meeting per Plenary cycle – Chaired by 802.1 Chair – Time slot: 2-5 PM Sunday prior to Plenary – Participants: Initially, WG Chairs plus one (or more) “architects” or “technical leads”; long term, whoever the Chair determines is appropriate/willing – Meeting Topic: Architectural issues known to each WG & how they might be resolved • First meeting: July 2004 Purpose • To actually have a recurring discussion on architectural issues • To improve cross-WG discussion/understanding • To promote a common view Outputs • • • • Not detail document oriented Consensus, frame of mind, consciousness raising Maybe slideware if appropriate Topics/thoughts for the focus of the next discussion • Encouragement to WGs to fix identified problems in appropriate ways • Simple architecture • Preservation of layering Actions • SEC to formally establish the activity as a SEC standing committee. • WG Chairs to appoint max 2 nominated participants per WG – Qualifications for participants: Capable of generating a durable architecture. Capable of knowing the difference between an architecture, a product, and a standard. Respected within their WG as subject matter experts. • Report to SEC on status at each meeting. Known issues – 802.1 • MAC Service definition (currently a revision PAR in place) • QoS – could be better expressed • Security expressed as a set of procedures after network entry • Management – scope and interface – Commonality of MAC/PHY management interfaces (managed object definitions) • • • • • MIB definition for service discovery Where work gets done – 802.1 vs 802.X Process – ensuring due diligence Max frame size Position/location awareness Known issues – 802.3 • QoS/class of service – – – • Ethernet/TCP-IP interdependence – – – • – This should be generalized to above MAC layer 2 protocols over link agg. With 2 port bridge/media converter, can you run link agg on two parallel links with this in each? Do we need a new link agg in the future. Dual homing/resilience/robustness – – – • Do we care about anything non-TCP? Yes, we care. Telecomunications, backplane, a lot of entertainment is UDP, SCTP Definitately need strong non-TCP support, Harder to say something other than IP is needed. Security/link agg – – • Timing, synchronous, guaranteed bandwidth, low jitter/latency, congestion management… Need a consistent architecture for QOS across 802 so we can switch between port types. Many questions coming from many new projects across the MAC groups. Low priority - no advocates currently pushing specifics layer 3 solutions exist backplane might want it at some point. If so, it seems most appropriate for 802.1 so it could work across MAC types. MAC Service definition – – – No indication MAC to MAC client of readiness for another request. Thus commit to a request is ambiguous. When can you replace a low priority request with a low priority request? Would help QOS. Should we have a MA data request acknowledge? 802.11 was “allocated” issues by the other•TheWGs “allocated” issues are • Other group allocated 802.11 some issues – – – – – – – – “Bridging compatibility” “Security” “QoS/class of service” “Protocol definition vs scope” “LLC” “Mesh” “What is the future .11 architecture” “Power/channel management” – Added: Additional issues or comments unclear to some 802.11 members – Additional slides are attached that reflect the ongoing discussion that has occurred over the last four months via email and at the previous interim meeting held in May 2005 as compiled from 802.1105/0407r2. The slides are an attempt to represent comments without specific author endorsement. As such the authors of this document to do necessarily share these views. This forum and this document was designed to facilitate discussion. Do we need a standard bridge table mechanism • What is theupdating situation? • What should we do about – STA roaming to a new AP is a normal part of 802.11 operation – Ideally, it should be achieved without disruption to QoS on the STA – This requires frames destined to the STA to be redirected to the new AP • What is the problem? – A network using 802.1D bridges, will not update the forwarding tables until a frame is sent in the opposite direction it? – We need a standard method for updating the bridge forwarding tables when a STA roams that will take effect within the sort of timescales needed to maintain QoS (5 to 30ms) – Mike Moreton believes, “properly designed network should be capable of updating its own forwarding tables without help from external devices.” Mike Moreton asks whether we need a standard bridge table updating mechanism – This issue was – A more general documented in a recent liaison to 802.1 (05/0185r2) • It is under consideration already? – 802.11F represents an effort to solve this problem • There is contention about whether 802.11F will survive architectural concept of updating location may be needed • 802.1D is not the only way to construct a DS We need to explore the “Bridging compatibility” architecture issue – ? Is this issue related to forward and backward compatibility between 48 b address versus 64 b address? • ---------– The “Bridging compatibility – handling of multicasts” issue was allocated to 802.11 – It is not clear what the issue is? – ? Is this issue related to multicasts with security enabled? • Questions – What is the issue? – Is this an architecture issue? – Is it relevant to 802.11? – What should be done? Mike Moreton asks whether 802.1X needs to be modified to reflect realities of broadcast • What is the situation? media– However, there are still some aspects of 802.1X that – 802.1X was designed for situations where there was one end station per port • What is the problem? – 802.11i can have multiple end-stations per port because its a broadcast medium – 802.11i overcomes the problem using virtual ports by having each STA's data encrypted with a different pair-wise key • … and you thought that was to stop eavesdropping are limited to the physical port • eg authenticating through one port (we're talking an AP working on different channels here) shouldn't allow you to send data via a different port, because the keys may well not have been programmed in on that port. • What should we do about it? – 802.1 need to have some reflection in 802.1X of how Mike Moreton asks whether 802.1X needs to be modified to reflect realities of broadcast was noted that – This issue was media– It802.1X does not documented in a recent liaison to 802.1 (05/0185r2) • Is it under consideration already? recognise or take advantage of the fact that STAs often move from port to port • Does the port a mobile STA moves to need to be blocked or can it be pre-unblocked? • Can an STA have multiple virtual ports open at once We need to explore the “security” architecture issue • Background – The “security” issue was allocated to 802.11 – It is not clear what the issue is relative to 802.11? • Questions – What is the issue? – Is this an architecture issue? – Is it relevant to 802.11? – What should be done? Some have said “Time is an important dimension in wireless networks but• Wireless not wired networks are • 802 is traditionally based very dynamic on static concepts networks” – “nasty thin network” – “big fat ugly pipe” – Wired networks were originally based on completely static nodes – Over time slow portability of network connections was taken into account, eg STP – Connections are mostly binary • ie simply up or down – Network performance is more predictable – STAs move often and by choice – Network conditions change rapidly and massively • Interference • Contention – Connections in wireless are “analog” • ie 0-100% – Network performance tends to vary significantly over time • eg delay, jitter, loss etc Dynamic Wireless networks have particular needs that need to be recognised by the 802 – Wireless networks need – Network management architecture more than just link up/down needs to recognise that to enable sensible operation • We need an in-between status that changes often – Wireless networks may increasingly use soft handover and need an appropriate infrastructure to support it • This leads to the possibility of two connections to a STA are active at one time applications are sometimes in a better position to optimally use the network • eg Skype does not need a management application providing constant QoS • In some applications, it does not matter that 90% of packets are lost We need to explore the “QoS/class of service” architecture issue – One option was that we – Maybe the best carefully map QoS from 802.11 to 802.x – However, it was noted that the QoS capability changes rapidly and massively in wireless networks – This might lead to the conclusion that any effort to define a formal QoS mapping is a waste of time approach is to allow people to independently do what they think is best at the time – a one size fits all approach may not make sense or be possible We need to explore the “QoS/class of service” architecture issue • Background – The “QoS/class of service” issue was allocated to 802.11 – It has been interpreted to mean, “How do you map QoS between different networks?” • Questions – Is the issue interpretation correct and complete? – Is this an architecture issue? – Is it relevant to 802.11? – What should be done? We need to explore the “Protocol definition vs scope” architecture issue – It was not clear what – When is it appropriate the issue was – Some hypothesised that this issue resulted from some thinking that 802.11 has defined features above L2 too often in the past for 802.11 to define L2+ features? • When the features are unique to 802.11? • When 802.1 will not undertake the definition task? • When non-802.11 (eg IETF) technologies are involved? We need to explore the “LLC” architecture issue • Background – The “LLC” issue was allocated to 802.11 – The issue has been interpreted as meaning: • The LLC provides no mechanism for passing additional parameters • This means that it is difficult to up set up a QoS connection across multiple radio links • Questions – What is the issue? – Is this an architecture issue? – Is it relevant to 802.11? – What should be done? We need to explore the “MESH” architecture issue • Background – The “MESH” issue was allocated to 802.11 – The issue has been interpreted as meaning: • The ongoing 802.11s task groups discussion regarding modifying: discovery, spanning tree and routing/bridging should be happening elsewhere. • Questions – What is the issue? – Is this an architecture issue? – Is it relevant to 802.11? – What should be done? • We need to explore the Signal Power/ Channel Management architecture issue Background – 802.11k is addressing common measurement some misunderstood or confused management with measurement – 802.11v is considering this effort to be within its scope • What is the problem – Multiple working groups are presently or have already defined this issue using different definitions, semantics and formulas only for themselves • Questions – What is the issue for 802.11? – Is this an architecture issue for 802? – What should 802.11 do? Are there any additional issues or comments? – Some people would like a – “common language” and “dictionary” to talk about wireless networks – but other’s want something “not too detailed” – Should 802.11 undertake network discovery (eg TGu, TGs) or should there be a more common approach across 802? – – Maybe we “need to create a focused wireless architecture group because wired is so different?” – Maybe “this effort belongs Mayunder 2005 co-existence?” Andrew Myles, Cisco Maybe we “need to change the 802 architecture moving this work away from 802.1 and to a wireless TAG” that would allow each participant to maintain their membership in their respective primary working group? “Maybe we need a wireless task group inside 802.1?” • A group inside 802.1 may divide wireless expertise drawing it away from the wireless groups 24 NOTE: Changes made as a result of 13-Mar-05 802 Architecture Group meeting are in BLUE Dot15 802 Architecture Group Update Tom Siep Cambridge Silicon Radio 802.15 Liaison to 802 Architecture Committee Management Issues Prioritized issues – 802.15 • Issues { 1. 2. 3. 4. 5. 6. • LLC – acts as a block to passing additional (e.g., QoS) parameters QoS Not architectural issues (Signal) Power/channel management 64bit to 48 bit address mapping for bridging (new topic) Smaller than 100 octets allowed for minimum packet size Bridging compatibility – handling of multicasts, no clause 6 section for .1D Not addressed at Sunday meeting } Non-Issues – – – – Are PANs different from WLANs? Security Mesh (work TBD) Architectural consistency across three MACs Other Groups Affected • • • • • • LLC – acts as a block 802.1 and 802.2 QoS 802.1 and 802.2 (Signal) Power/channel management 802.1 and 802.2 64bit to 48 bit address mapping for bridging 802.1 and 802.2 Smaller than 100 octet packets 802.1 and 802.2 Bridging compatibility – internal problem being worked Work to be done by 802.15 • Form plans to solve issues • Determine feasibility of plans • Study proposal to use IETF model for QoS – will it work for .15 TGs? • Characterize management function needs • Can’t do bridging 64 to 48 bit addresses – are we OK with this? LLC – acts as a block to passing additional (e.g., QoS) parameters • All 3 MAC need LLC support to requests to create/modify/terminate streams based on QoS parameters • Data needs to be able to be associated with a stream at the MAC SAP • QoS changes need to be communicated to the higher layers • Need to be able to inquire QoS characteristics of remote nodes Backup Slides • Known issues – 802.15 (as presented at Sunday meeting in San Antonio) Are PANs different from WLANs? – We hope the answer is “No” (wrt the MAC service) • Security – What functionality is needed – Who does what aspect • Bridging compatibility – handling of multicasts, no clause 6 section for .1D • LLC – acts as a block to passing additional (e.g., QoS) parameters • Mesh (not the same as the .11 issue though) • QoS • Architectural consistency across three MACs • (Signal) Power/channel management QoS • Block asynchronous data – Need block size to plan and allocate resources (Signal) Power/channel management • Need a way to pass (up and down) information that is important to wireless, for example – – – – – Transmit power Regulatory domain Signal quality Coexistence information Other • Must be extensible Bridging compatibility – handling of multicasts, no clause 6 section for .1D • Compatibility with .1D – 15.1a – Bridging is handled in BNEP, which maps to Ethernet. – 15.3 – Annex A (normative) specifies compatibility – 15.4 – Annex A (normative) specifies compatibility • Multicasts – 15.1a – does not do multicast – 15.3 – Had multicast, being revised in current work – 15.4 – Had broadcast, being revised to include multicast in current work Known issues – 802.16 • Security – – – – – has to roll its own EAP transport as .1X/AF is above the LLC No PKI model in .1X/AF MBS – breaks security model Should schedule a joint meeting with 802.1 • QoS – See .21 • Bridging compatibility – handling of multicasts, no clause 6 section for .1D • . MTU discovery – Look at 802.1AD LLDP? Known issues – 802.17 • Frame size – Not dissimilar problem to dot-3 – will take their lead • CoS/QoS – Look at intsrv/diffsrv • Security – We have layering issues. Known issues – 802.20 • Needs to support handoff – not clear how to deal with L2 handoff in current architecture • QoS – No standard way to pass upper layer QoS requirements through to MAC level QoS parameters – LLC acts as a block – Relation to IntSrv/DifSrv mechanisms • Security – has to roll its own EAP transport as .1X/AF – is above the LLC – No PKI model in .1X/AF • Compatibility between 802.20 frame and LLC frame .21 : Action items from 3/2005 – Groups that have QOS on list to look at IETF intsrv/difsrv documents & identify specific things that would allow their MAC to better support these services – Groups that have listed security issues to detail specific questions/issues regarding security – Tutorial on service interface vs API (was this Tony’s action?) .21 : QoS Intserv && Diffserv – .21 not specifying a MAC directly – Working with Intserv model • Seems to be main model IETF & industry is following • New work in NSIS though – Several abstractions / categories in 802 • Grouping of traffic into a link • Identifying SDUs by – – – – Connections Priorities VLAN Traffic class .21 : Security Issues Currently most security issues out of scope for .21 • Having multiple associations at once (MBB) – Otherwise need fast (re) establishment of SA • Authentication mechanisms – different mechanisms across 802 • Enabling handover policy to consider security attributes of potential network attachment points 802.21 issues in priority • QoS mapping across heterogeneous interfaces • Authentication mechanisms – different mechanisms in different technologies • Security – how do you re-establish the security context during/after transition • Service discovery • Neighborhood service differs per technology • Power/channel management Known issues – 802.22 • Goal to avoid all of the above Known issues – Broadband over Power lines (external project) • Will this be Bridgeable or will it only be routable (to 802 technologies)? • In order for the technology to be Bridgeable, then they should participate in this architecture group • Make liaison with 802 a requirement of the PAR • They should address coexistence (with other technologies) • Entity balloting would tend to disenfranchise a significant body of technical expertise from the balloting process. LMSC join as an entity? Action items – Groups that have QOS on list to look at IETF intsrv/difsrv documents & identify specific things that would allow their MAC to better support these services • Need some work done on this. WG representatives to identify people interested in studying this area of work & feeding back to the group. • If there is no movement on this by next meeting we will drop the item from the action list. – Groups that have listed security issues to detail specific questions/issues regarding security – Tutorial on service interface vs API • Tony, Mick do something for next meeting Agenda for next meeting, Sunday Nov 13 2005, 2-5pm • Continue (.3 through .1) refinement and prioritisation of current issues list based on WG input (homework items from previous slide) • Report back from “Wireless Architecture Sub-Group” • Tutorial on service interface vs API • Report back on issues that are currently being addressed • Proposals for resolution of high priority issues that are not currently being addressed • Spend more time on QoS, especially support of intsrv/diffsrv by 802 MACs