some level of generic network characteristics benefit for the user.
one example could be that routing metric may need to be updated
to align with various kind of access technologies.

-Hui

2009/4/17 Giyeong Son <g...@rim.com>:
> Again as I mentioned, in order to prepare or build an efficient routing
> policy and to select an efficient connection/interface, it would be
> necessary to identify, classify and/or prioritize underlying network
> characteristics or information of the attached networks.
>
> In addition, as many network characteristics which are essential to be
> used for simultaneous use of multiple interfaces are not generic forms
> (e.g. SSID only for 802.11), these network characteristics may require a
> mechanism to make them be associated with generic (formed) elements used
> for routing policy preparation and routing decision. Therefore, if MIF
> can provide an efficient guideline or mechanism for associating, it
> would be really amazing.
>
> I believe, the current IP network related protocols and standardized
> technologies may not be enough to support that on multiple interface
> network environment.
>
> I think each vendor, carrier, service provider and/or technology, which
> utilizes or supports simultaneous use of multiple
> connections/interfaces, may have their own proprietary mechanism in
> terms of gathering of network characteristics of each interface/access
> network technology (e.g. WiFi, GPRS, CDMA, Bluetooth, etc.), their
> mapping mechanism with generic formed elements, routing policy and
> decision mechanisms with different IP based service networks owned by
> different service providers or different IP network enabling core
> networks owned by different carriers.
>
> So, the problem Ted and Ralph are addressing seems to be just one of
> issues (but only for WiFi network environments) in terms of network
> characteristic that may be necessary to be considered during selection
> of an efficient connection/interface from multiple candidates.
>
> Giyeong
>
> -----Original Message-----
> From: Ralph Droms [mailto:rdr...@cisco.com]
> Sent: April 16, 2009 1:32 PM
> To: Ted Lemon
> Cc: Giyeong Son; Hui Deng; dhc WG; gen-...@ietf.org; mif; ietf@ietf.org;
> black_da...@emc.com
> Subject: Re: [dhcwg] [mif] Gen-ART review of draft-ietf-dhc-container-00
>
> Yup ... there is currently no way to provide authenticated, meaningful
> identification of the network(s) to which a host is attached.  Without
> that identification, it's pretty hard to write any reasonable policies.
>
> - Ralph
>
> On Apr 16, 2009, at 1:26 PM 4/16/09, Ted Lemon wrote:
>
>> On 2009/4/13 Ralph Droms <rdr...@cisco.com> wrote:
>>> For example, would a host process
>>> information received from a Starbucks network over its 802.11
>>> interface differently from information received a home network over
>>> the 802.11 interface?
>>
>> It's even more fun than that.   How do we reliably know that we are
>> at Starbucks, and not at home?   The SSID?   That's not an
>> authenticated token.   Currently Windows makes security decisions
>> based on the SSID.   You could call this the best answer they could
>> come up with for a problem with no good answers.   Or you could say
>> that it instills the user with a false sense of security.   Either
>> way, it's not something I'd be comfortable seeing in a protocol spec,
>> so if the client is in fact to make decisions as you've
>> suggested, we'd need a secure way of doing this.   I don't know
>> enough about WPA Enterprise to know if there's a bidirectional
>> authentication going on there - from the UI perspective it looks like
>> it's one-way.
>>
>
>
> ---------------------------------------------------------------------
> This transmission (including any attachments) may contain confidential 
> information, privileged material (including material protected by the 
> solicitor-client or other applicable privileges), or constitute non-public 
> information. Any use of this information by anyone other than the intended 
> recipient is prohibited. If you have received this transmission in error, 
> please immediately reply to the sender and delete this information from your 
> system. Use, dissemination, distribution, or reproduction of this 
> transmission by unintended recipients is not authorized and may be unlawful.
>
_______________________________________________
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf

Reply via email to