Re: [paws] WG Review: Protocol to Access White Space database (paws)

"t.petch" <daedulus@btconnect.com> Wed, 20 April 2011 18:20 UTC

Return-Path: <daedulus@btconnect.com>
X-Original-To: ietf@ietfc.amsl.com
Delivered-To: ietf@ietfc.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfc.amsl.com (Postfix) with ESMTP id DB1BCE06A6; Wed, 20 Apr 2011 11:20:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([208.66.40.236]) by localhost (ietfc.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rD6e8AkuZS-f; Wed, 20 Apr 2011 11:20:36 -0700 (PDT)
Received: from mail.btconnect.com (c2bthomr09.btconnect.com [213.123.20.127]) by ietfc.amsl.com (Postfix) with ESMTP id C39D5E067D; Wed, 20 Apr 2011 11:20:35 -0700 (PDT)
Received: from host86-134-204-18.range86-134.btcentralplus.com (HELO pc6) ([86.134.204.18]) by c2bthomr09.btconnect.com with SMTP id CQA03480; Wed, 20 Apr 2011 19:20:28 +0100 (BST)
Message-ID: <01d701cbff7f$1c913940$4001a8c0@gateway.2wire.net>
From: "t.petch" <daedulus@btconnect.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
References: <20110419165634.CD24CE07CF@ietfc.amsl.com> <4DADCB52.1020309@joelhalpern.com> <7BAC95F5A7E67643AAFB2C31BEE662D01406AC564E@SC-VEXCH2.marvell.com><1303248099.2209.105.camel@localhost.localdomain> <4DAE4246.7080200@joelhalpern.com>
Subject: Re: [paws] WG Review: Protocol to Access White Space database (paws)
Date: Wed, 20 Apr 2011 19:19:26 +0200
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1106
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
X-Mirapoint-IP-Reputation: reputation=Fair-1, source=Queried, refid=tid=0001.0A0B0301.4DAF23EB.008B, actions=tag
X-Junkmail-Premium-Raw: score=26/50, refid=2.7.2:2011.4.20.173315:17:26.894, ip=86.134.204.18, rules=__HAS_MSGID, __OUTLOOK_MSGID_1, __SANE_MSGID, __TO_MALFORMED_2, __BOUNCE_CHALLENGE_SUBJ, __BOUNCE_NDR_SUBJ_EXEMPT, __MIME_VERSION, __CT, __CT_TEXT_PLAIN, __CTE, __HAS_X_PRIORITY, __HAS_MSMAIL_PRI, __HAS_X_MAILER, USER_AGENT_OE, __OUTLOOK_MUA_1, __USER_AGENT_MS_GENERIC, __FRAUD_CONTACT_ADDY_B, __CP_URI_IN_BODY, __INT_PROD_TV, BODY_SIZE_10000_PLUS, __MIME_TEXT_ONLY, RDNS_GENERIC_POOLED, __URI_NS, SXL_IP_DYNAMIC[18.204.134.86.fur], RDNS_SUSP_GENERIC, __OUTLOOK_MUA, RDNS_SUSP
X-Junkmail-Status: score=38/50, host=c2bthomr09.btconnect.com
X-Junkmail-Signature-Raw: score=suspect(3), refid=str=0001.0A0B0206.4DAF23EE.0092, ss=2, fgs=0, ip=0.0.0.0, so=2010-07-22 22:03:31, dmn=2009-09-10 00:05:08, mode=multiengine
X-Junkmail-IWF: false
Cc: Paul Lambert <paul@marvell.com>, paws@ietf.org, iesg@ietf.org, IETF discussion list <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2011 18:20:38 -0000

----- Original Message -----
From: "Joel M. Halpern" <jmh@joelhalpern.com>
To: "Rex Buddenberg" <budden@nps.navy.mil>
Cc: "Paul Lambert" <paul@marvell.com>; <paws@ietf.org>; <iesg@ietf.org>; "IETF
discussion list" <ietf@ietf.org>
Sent: Wednesday, April 20, 2011 4:17 AM
Subject: Re: [paws] WG Review: Protocol to Access White Space database (paws)


> Actually, as far as I can tell, there is very little parallel between
> the PAWS problem and SNMP.
> SNMP tends to be initiated by the manager, and used to extract
> information from the device in the network, or set information in teh
> device.

Joel

I see one small parallel with SNMP. All the recent work on SNMP has
been on security, and while setting up a secure channel is easy, TLS or SSH,
knowing that it goes where you want it to as opposed to via a MITM is
more difficult, both when the device calls home to send an alert, or
when home calls the device to solicit information.

And the credentials used by the transport need binding securely to
the identity at a higher layer.  This was troublesome and I will
be interested to see how this is solved.  By comparison  I expect
that the application will fall out in the wash.

Channel binding anyone?  One for the security area?

Tom Petch





> This protocol is used by the client.  It extracts basically stable
> information about what frequencies can be used in this geographic region
> at this time.
> There is no "network management" going on.  the interaction does not
> look like SNMP.  And the effect does not look like SNMP.  While Radius
> or Diameter are closer, this protocol is not even a policy decision
> protocol.  There is no "policy".
>
> So no, I do not think this looks anything like network management.
> The protocols, the transaction drivers and behavior, the problem space,
> and the underlying data behavior are all very different from any of our
> NM work.
>
> Yours,
> Joel
>
> On 4/19/2011 5:21 PM, Rex Buddenberg wrote:
> > On Tue, 2011-04-19 at 12:47 -0700, Paul Lambert wrote:
> >>
> >> How does the area that the group is assigned impact the choices of
> >> technology?
> >>
> >> I'm an advocate for an efficient solution set for PAWS ... it will be
> >> much like DNS for spectrum in the future and should be viewed as a
> >> core infrastructural component that needs careful design.  There are
> >> good reasons that routing protocols don't use XML.
> >
> > While the DNS analogy works, I was thinking more a parallel -- or
> > extension -- of SNMP.
> >
> > Still remain within 'applications', Joel?
> >
> >>
> >> Applications now days tend to go for the simple, quick to make a web
> >> application solutions using XML or the like ...  My concern is that
> >> "Applications" imply that efficiency does not matter.
> >>
> >> Paul
> >>
> >>
> >>
> >>> -----Original Message-----
> >>> From: paws-bounces@ietf.org [mailto:paws-bounces@ietf.org] On Behalf Of
> >>> Joel M. Halpern
> >>> Sent: Tuesday, April 19, 2011 10:50 AM
> >>> To: iesg@ietf.org
> >>> Cc: paws@ietf.org; IETF discussion list
> >>> Subject: Re: [paws] WG Review: Protocol to Access White Space database
> >>> (paws)
> >>>
> >>> I think this working group is a good idea.
> >>> My inclination would be to place it in the Applications area.  It looks
> >>> like a nice application protocol to me.
> >>> There is a reasonable argument for placing it in RAI, as that is where
> >>> the relevant GEOLOC work has been done up till now.
> >>>
> >>> Yours,
> >>> Joel M. Halpern
> >>>
> >>> On 4/19/2011 12:56 PM, IESG Secretary wrote:
> >>>> A new IETF working group has been proposed.  The IESG has not made
> >>> any
> >>>> determination as yet. The following draft charter was submitted, and
> >>> is
> >>>> provided for informational purposes only. Please send your comments
> >>> to the
> >>>> IESG mailing list (iesg@ietf.org) by Tuesday, April 26, 2011.
> >>>>
> >>>>
> >>>> Protocol to Access White Space database (paws)
> >>>> ------------------------------------------------
> >>>> Current Status: Proposed Working Group
> >>>> Last updated: 2011-04-14
> >>>>
> >>>> Chairs:
> >>>> TBD
> >>>>
> >>>> Area Directors:
> >>>> TBD
> >>>>
> >>>> Area Advisor:
> >>>> TBD
> >>>>
> >>>> Mailing lists:
> >>>> Address: paws@ietf.org
> >>>> To Subscribe: https://www.ietf.org/mailman/listinfo/paws
> >>>> Archive: http://www.ietf.org/mail-archive/web/paws/
> >>>>
> >>>> Description of Working Group:
> >>>>
> >>>> Governments around the world continue to search for new pieces of
> >>> radio
> >>>> spectrum which can be used by the expanding wireless communications
> >>>> industry to provide more services in the usable spectrum. The concept
> >>>> of allowing secondary transmissions (licensed or unlicensed) in
> >>>> frequencies allocated to a primary user is a technique to "unlock"
> >>>> existing spectrum for new use. An obvious requirement is that these
> >>>> secondary transmissions do not interfere with the primary use of the
> >>>> spectrum. Often, in a given physical location, the primary user(s)
> >>> may
> >>>> not be using the entire band allocated to them. The available
> >>> spectrum
> >>>> for a secondary use would then depend on the location of the
> >>> secondary
> >>>> user. The primary user may have a schedule when it uses the spectrum,
> >>>> which may be available for secondary use outside that schedule. The
> >>>> fundamental issue is how to determine for a specific location and
> >>>> specific time, if any of the primary spectrum is available for
> >>> secondary
> >>>> use. One simple mechanism is to use a geospatial database that
> >>> records
> >>>> protected contours for primary users, and require the secondary users
> >>> to
> >>>> check the database prior to selecting what part of the spectrum they
> >>>> use. Such databases could be available on the Internet for query by
> >>>> users.
> >>>>
> >>>> In a typical implementation of geolocation and database to access TV
> >>>> white space, a radio is configured with, or has the capability to
> >>>> determine its location in latitude and longitude. At power-on, before
> >>>> the device can transmit or use any of the spectrum set aside for
> >>>> secondary use, the device must identify the relevant database to
> >>> query,
> >>>> contact the database, provide its geolocation and receive in return a
> >>>> list of unoccupied or "white space" spectrum (for example, in a TV
> >>>> White space implementation, the list of available channels at that
> >>>> location). The device can then select one of the channels from the
> >>> list
> >>>> and begin to transmit and receive on the selected channel. The device
> >>>> must query the database subsequently on a periodic basis for a list
> >>> of
> >>>> unoccupied channels based on certain conditions, e.g. a fixed amount
> >>> of
> >>>> time has passed or the device has changed location beyond a specified
> >>>> threshold.
> >>>>
> >>>> The databases are expected to be reachable via the Internet and the
> >>>> devices querying these databases are expected to have some form of
> >>>> Internet connectivity, directly or indirectly. The databases may be
> >>>> country specific since the available spectrum and regulations may
> >>> vary,
> >>>> but the fundamental operation of the protocol should be country
> >>>> independent, thus extensibility of data structures will be required.
> >>> The
> >>>> solution will not be tied to any specific spectrum, country, or
> >>>> phy/mac/air interface but may incorporate relevant aspects of these
> >>> as
> >>>> needed for proper operation.
> >>>>
> >>>> The proposed working group will :
> >>>> - standardize a protocol for querying the database, which includes a
> >>>> location sensitive database discovery mechanism and security for the
> >>>> protocol, and application services.
> >>>> - Standardize the data structure to be carried by the query
> >>>> protocol.
> >>>>
> >>>> The protocol must protect both the channel enablement process and the
> >>>> privacy of users. Robust security mechanisms are required to prevent:
> >>>> device identity spoofing, modification of device requests,
> >>> modification
> >>>> of channel enablement information, impersonation of registered
> >>> database
> >>>> services and unauthorized disclosure of a users location.
> >>>>
> >>>> Existing IETF location data structures and privacy mechanisms may be
> >>>> considered for use. The WG will also investigate the need for other
> >>>> mechanisms and related protocols to the White Space DB.
> >>>>
> >>>> The Working Group will set up and maintain appropriate contact and
> >>>> liaison with other relevant standards bodies and groups, including
> >>> IEEE
> >>>> 802.11af and IEEE 802.22 to begin with. The working group may also
> >>>> consider input from regulatory entities that are involved in the
> >>>> specification of the rules for secondary use of spectrum in specific
> >>>> bands.
> >>>>
> >>>> Goals and Milestones
> >>>>
> >>>> Sep 2011  Submit 'Requirements and Framework' to the IESG for
> >>>>             publication as Informational
> >>>>
> >>>> Apr 2012  Submit 'Protocol for Querying a Whitespace Database' to
> >>>>             the IESG for publication as Proposed Standard
> >>>>
> >>>> Apr 2012  Submit 'Data Model for Whitespace query protocol' to the
> >>>>             IESG for publication as Proposed Standard
> >>>> _______________________________________________
> >>>> paws mailing list
> >>>> paws@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/paws
> >>>>
> >>> _______________________________________________
> >>> paws mailing list
> >>> paws@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/paws
> >> _______________________________________________
> >> paws mailing list
> >> paws@ietf.org
> >> https://www.ietf.org/mailman/listinfo/paws
> >
> >
> >
> _______________________________________________
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf