Thread Links | Date Links | ||||
---|---|---|---|---|---|
Thread Prev | Thread Next | Thread Index | Date Prev | Date Next | Date Index |
Attached are few slides for tomorrow's call. They
try to summarize the state of the discussions representing all different
perspectives we currently have in the group.
Slide 1 summarizes the scenarios the way this
effort has evolved. We started with an EPON centric view (scenario 1), then we
expanded the scope to cover multiple MACs (scenario 2), and now we are extending
to cover bridged networks (scenario 3). This third scenario has clearly different perspective and it
actually requires to look at the problem differently. And hence it takes a more
time for some of us to visualize and understand the issues.
Slide 2 tries to summarize the scenarios from the
business perspective. We have ample justification of the need of EPON link
security scenario. But it is not clear to a lot of people yet
the target applications of the new scenarios. It would be
useful to summarize those. So I would like
to all in the group, but to service providers in particular, feedback on
the specific deployment scenarios that can be taken as examples for each
scenario. Please send comments or specific examples related to this
issue.
Slides 3 and 4 discusses levels of trust in
scenario 3 and classifies the sub-scenarios based on the trust
level.
Slide 4-5 tries to capture the issues for selecting
the scope of the security associations. This issue is very important to define a
common architecture across all scenarios in slide 1 and to decide/understand
from what existing specifications we should leverage.
All comments, feedback or questions are
appreciated.
Dolors
|