📄 rfc3002.txt
字号:
Title: Overview of WAP Presenter: Alastair Angwin Reference: http://www.iab.org/IAB-wireless-workshop/talks/iab-wap-1.pdf Overview: Title: Mobile Wireless Internet Forum (MWIF) Presenter: Alastair Angwin Reference: http://www.iab.org/IAB-wireless-workshop/talks/MWIF_TC _Presentation.PDF, http://www.iab.org/IAB-wireless-workshop/talks/MWIF_TC _Presentation.ppt Overview: Title: Some WAP History Presenter: Jerry Lahti Reference: http://www.iab.org/IAB-wireless-workshop/talks/waphist.PDF, http://www.iab.org/IAB-wireless-workshop/talks/waphist.ppt Overview: Title: Near-space Wireless Applications Presenter: Mark Allman Reference: http://www.iab.org/IAB-wireless-workshop/talks/allman-iab- wireless.pdf, http://www.iab.org/IAB-wireless-workshop/talks/allman-iab- wireless.ps Overview:Mitzel Informational [Page 6]RFC 3002 IAB Wireless Workshop December 2000 Title: Air Traffic / Aviation Wireless Presenter: Chris Wargo Reference: http://www.iab.org/IAB-wireless-workshop/talks/wargo-talk.PDF, http://www.iab.org/IAB-wireless-workshop/talks/wargo-talk.ppt Overview: Title: VoIP over Wireless Presenter: Christian Huitema Reference: http://www.iab.org/IAB-wireless-workshop/talks/iab-wless- voip.PDF, http://www.iab.org/IAB-wireless-workshop/talks/iab-wless- voip.ppt Overview: Title: Security Issues in Wireless Networks and Mobile Computing Presenter: N. Asokan Reference: http://www.iab.org/IAB-wireless-workshop/talks/mobile-secu- rity.PDF, http://www.iab.org/IAB-wireless-workshop/talks/mobile-secu- rity.ppt Overview: Title: Security for Mobile IP in 3G Networks Presenter: Pat Calhoun Reference: http://www.iab.org/IAB-wireless-workshop/talks/mip-sec-3g.PDF, http://www.iab.org/IAB-wireless-workshop/talks/mip-sec-3g.ppt Overview: Title: On Inter-layer Assumptions (A View from the Transport Area) Presenter: Mark HandleyMitzel Informational [Page 7]RFC 3002 IAB Wireless Workshop December 2000 Reference: http://www.iab.org/IAB-wireless-workshop/talks/handley- wireless.pdf, http://www.iab.org/IAB-wireless-workshop/talks/handley-wire- less.ps Overview: Title: Does current Internet Transport work over Wireless? Presenter: Sally Floyd Reference: http://www.iab.org/IAB-wireless-workshop/talks/IAB-wireless- Mar00.pdf, http://www.iab.org/IAB-wireless-workshop/talks/IAB-wireless- Mar00.ps Overview: Title: QOS for Wireless (DiffServ, IntServ, other?) Presenter: Lixia Zhang Reference: http://www.iab.org/IAB-wireless-workshop/talks/zhang-feb- IAB.PDF, http://www.iab.org/IAB-wireless-workshop/talks/zhang-feb- IAB.ppt Overview: Title: Do current WWW Protocols work over Wireless and Small Screen Devices? Presenter: Gabriel Montenegro Reference: http://www.iab.org/IAB-wireless-workshop/talks/wireless- www.PDF, http://www.iab.org/IAB-wireless-workshop/talks/wireless- www.ppt Overview: Title: Compression & Bit Error Requirements for Wireless Presenter: Mikael DegermarkMitzel Informational [Page 8]RFC 3002 IAB Wireless Workshop December 2000 Reference: http://www.iab.org/IAB-wireless-workshop/talks/iab-hc.PDF, http://www.iab.org/IAB-wireless-workshop/talks/iab-hc.ppt Overview: Title: Addressing Requirements for Wireless Devices & IPv6 Presenter: Bob Hinden Reference: http://www.iab.org/IAB-wireless-workshop/talks/Addressing- IPv6.PDF, http://www.iab.org/IAB-wireless-workshop/talks/Addressing- IPv6.ppt Overview:3 Discussion and Observations During the workshop presentations a number of issues were discussed and observations made. The following sections 3.1 -- 3.12 summarize these discussion and observations. Rather than organizing the material linearly by presentation, it is grouped according to common "themes" and issues.3.1 Discussion on "Walled Garden" Service Model Presentations from members involved in the cellular wireless (3GPP, 3G.IP, MWIF) and WAP environments quickly illustrated a significant difference in protocol specification and service models from that typically assumed by the Internet community. These communities focus on defining a profile (set of protocols and operational parameters) that combine to provide a well defined user service. In addition, the carriers typically prefer to have complete (or as much as possible) control over the entire service, including user access device, transmission facilities, and service "content". This style of service model appears to have been inherited from the classic telephony provider model. The term "walled garden" was coined to describe the resulting captive customer economic and service model. That is, the user is constrained within the limits of the service provided by the carrier with limited ability to extend features or access services outside the provider. The "walled garden" service model is in stark contrast to the "open" service assumed in the Internet. The application, access device, and service content may each be controlled by a different entity, and the service provider is typically viewed as little more than a "bit pipe".Mitzel Informational [Page 9]RFC 3002 IAB Wireless Workshop December 2000 Additionally, specification typically define a standalone protocol or application rather than the set of features and interoperation with other components required to deploy a commercial service. Some discussion focused on whether cellular carriers could be persuaded to transition toward the Internet "open" service model. Responses indicated that there was little hope of this as carriers will always fight being reduced to a "bit pipe", fearing they cannot sustain sufficient revenues without the value added services. An additional point raised was that the closed model of the "walled garden" simplifies a number of issues, such as security, authorization, and billing when the entire network is considered secured and controlled under a single administration. These simplification can eliminate roadblocks to service deployment before scalable, interdomain solutions are available. Even though there seems little hope of evolving carriers away from the "walled garden" service in the short term, there was significant value in recognizing its presence. This led to observations that "walled garden" Internet-based services will operate somewhat like current intranet services. Also, mechanisms should be investigated to simplify interoperation and controlled access to the Internet. Finally, the difference between Internet protocol specification contrasted to service profiles highlights some of the confusion those in the telephony environment encounter when attempting to incorporate Internet capabilities. Much of the current work in extending Internet-based services to cellular customers has focused on data services such as email or web access. One observation on the reluctance of carriers to release any control over services was that this may be an impediment to adoption of Internet-based voice services. Current work on voice over IP (VoIP) and call signaling (SIP [30]) loosens control over these services, much of the functionality is moved into the SIP agent with the carrier being reduced to an access provider (i.e., "bit pipe").3.2 Discussion on Mobility and Roaming An inherent characteristic of wireless systems is their potential for accommodating device roaming and mobility. Some discussion focused on the model of mobility presented to the user. There was also considerable interest and discussion on protocols employed, using cellular telephony and/or IP-based solutions. Finally, there was some interest in exploring new services enabled by mobility.Mitzel Informational [Page 10]RFC 3002 IAB Wireless Workshop December 20003.2.1 Discussion on Mobility and Roaming Model There was considerable discussion and concern over what style of mobility and roaming needs to be supported. Current usage in the Internet is dominated by the mode where a user performs some actions at one location, then shuts down and moves, followed by restart at a new location. 3G.IP uses the term "macro mobility" to describe this mode. The discussion attempted to discern whether the current mode of usage is a perceived limitation introduced by current protocols. A clear consensus could not be achieved. There was agreement that introduction of this "macro mobility" roaming is a worthwhile first step. However, that was immediately followed by questions on whether it is a sufficient first step, and warning not to stop at this level.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -