CAPWAP Working Group                                S. Govindan (Editor)
Internet-Draft                                                 Panasonic
Expires: May 2005                                                ZH. Yao
                                                                  Huawei
                                                                WH. Zhou
                                                            China Mobile
                                                                 L. Yang
                                                                   Intel
                                                                H. Cheng
                                                               Panasonic
                                                           November 2004

   Objectives for Control and Provisioning of Wireless Access Points
                                (CAPWAP)
                  draft-ietf-capwap-objectives-00.txt

Status of this Memo

   This document is an Internet-Draft and is subject to all provisions
   of section 3 of RFC 3667.  By submitting this Internet-Draft, each
   author represents that any applicable patent or other IPR claims of
   which he or she is aware have been or will be disclosed, and any of
   which he or she become aware will be disclosed, in accordance with
   RFC 3668.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as
   Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on May 2005.

Copyright Notice

   Copyright (C) The Internet Society (2004).

Abstract


Govindan (Editor), et al.    Expires May 2005                   [Page 1]


Internet-Draft             CAPWAP Objectives               November 2004

   This document presents a set of objectives for an interoperable
   protocol for the Control and Provisioning of Wireless Access Points
   (CAPWAP).  It presents objectives in three categories: architecture,
   operations and security.  The primary purpose of the document is to
   present focused requirements which when realized, will ensure
   interoperability among wireless local area network (WLAN) devices of
   alternative designs.  These objectives will form the basis for the
   development and evaluation of a CAPWAP protocol.

Table of Contents

   1.  Requirements notation  . . . . . . . . . . . . . . . . . . . .  4
   2.  Terminology  . . . . . . . . . . . . . . . . . . . . . . . . .  5
   3.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  6
   4.  Categories of Objectives . . . . . . . . . . . . . . . . . . .  7
   5.  Architecture Objectives  . . . . . . . . . . . . . . . . . . .  8
     5.1   Interoperability Objective . . . . . . . . . . . . . . . .  8
       5.1.1   Objective Details  . . . . . . . . . . . . . . . . . .  8
       5.1.2   Motivation and Protocol Benefits . . . . . . . . . . .  9
       5.1.3   Relation to Problem Statement  . . . . . . . . . . . .  9
       5.1.4   Customer Requirements  . . . . . . . . . . . . . . . .  9
       5.1.5   Classification (Mandatory, Desirable, Rejected)  . . .  9
     5.2   Interconnection Objective  . . . . . . . . . . . . . . . .  9
       5.2.1   Objective Details  . . . . . . . . . . . . . . . . . . 10
       5.2.2   Motivation and Protocol Benefits . . . . . . . . . . . 10
       5.2.3   Relation to Problem Statement  . . . . . . . . . . . . 10
       5.2.4   Customer Requirements  . . . . . . . . . . . . . . . . 10
       5.2.5   Classification (Mandatory, Desirable, Rejected)  . . . 10
     5.3   Support for Logical Networks . . . . . . . . . . . . . . . 10
       5.3.1   Objective Details  . . . . . . . . . . . . . . . . . . 11
       5.3.2   Motivation and Protocol Benefits . . . . . . . . . . . 11
       5.3.3   Relation to Problem Statement  . . . . . . . . . . . . 12
       5.3.4   Customer Requirement . . . . . . . . . . . . . . . . . 12
       5.3.5   Classification (Mandatory, Desirable, Rejected)  . . . 12
     5.4   Extensibility Objective  . . . . . . . . . . . . . . . . . 12
       5.4.1   Objective Details  . . . . . . . . . . . . . . . . . . 12
       5.4.2   Motivation and Protocol Benefits . . . . . . . . . . . 13
       5.4.3   Relation to Problem Statement  . . . . . . . . . . . . 13
       5.4.4   Customer Requirements  . . . . . . . . . . . . . . . . 13
       5.4.5   Classification (Mandatory, Desirable, Rejected)  . . . 13
   6.  Operations Objective . . . . . . . . . . . . . . . . . . . . . 14
     6.1   WLAN Monitoring Objective  . . . . . . . . . . . . . . . . 14
       6.1.1   Objective Details  . . . . . . . . . . . . . . . . . . 14
       6.1.2   Motivation and Protocol Benefits . . . . . . . . . . . 15
       6.1.3   Relation to Problem Statement  . . . . . . . . . . . . 15
       6.1.4   Customer Requirement . . . . . . . . . . . . . . . . . 15
       6.1.5   Classification (Mandatory, Desirable, Rejected)  . . . 15
     6.2   Resource Control Objective . . . . . . . . . . . . . . . . 15


Govindan (Editor), et al.    Expires May 2005                   [Page 2]


Internet-Draft             CAPWAP Objectives               November 2004

       6.2.1   Objective Details  . . . . . . . . . . . . . . . . . . 15
       6.2.2   Motivation and Protocol Benefits . . . . . . . . . . . 16
       6.2.3   Relation to Problem Statement  . . . . . . . . . . . . 16
       6.2.4   Customer Requirements  . . . . . . . . . . . . . . . . 16
       6.2.5   Classification (Mandatory, Desirable, Rejected)  . . . 16
     6.3   Support for Traffic Separation . . . . . . . . . . . . . . 17
       6.3.1   Objective Details  . . . . . . . . . . . . . . . . . . 17
       6.3.2   Motivation and Protocol Benefits . . . . . . . . . . . 17
       6.3.3   Relation to Problem Statement  . . . . . . . . . . . . 17
       6.3.4   Customer Requirements  . . . . . . . . . . . . . . . . 17
       6.3.5   Classification (Mandatory, Desirable, Rejected)  . . . 17
     6.4   STA Admission Control Objective  . . . . . . . . . . . . . 17
       6.4.1   Objective Details  . . . . . . . . . . . . . . . . . . 18
       6.4.2   Motivation and Protocol Benefits . . . . . . . . . . . 18
       6.4.3   Relation to Problem Statement  . . . . . . . . . . . . 18
       6.4.4   Customer Requirements  . . . . . . . . . . . . . . . . 18
       6.4.5   Classification (Mandatory, Desirable, Rejected)  . . . 18
     6.5   Centralized WTP Management . . . . . . . . . . . . . . . . 18
   7.  Security Objectives  . . . . . . . . . . . . . . . . . . . . . 19
     7.1   CAPWAP Protocol Security . . . . . . . . . . . . . . . . . 19
       7.1.1   Objective Details  . . . . . . . . . . . . . . . . . . 19
     7.2   System-wide Security . . . . . . . . . . . . . . . . . . . 19
   8.  Objectives for Further Discussion  . . . . . . . . . . . . . . 20
     8.1   Centralized WTP Management . . . . . . . . . . . . . . . . 20
     8.2   Security borderline Control  . . . . . . . . . . . . . . . 20
     8.3   Trust model Definition . . . . . . . . . . . . . . . . . . 20
     8.4   IEEE 802.11i Considerations  . . . . . . . . . . . . . . . 20
   9.  Summary and Conclusion . . . . . . . . . . . . . . . . . . . . 21
   10.   Security Considerations  . . . . . . . . . . . . . . . . . . 22
   11.   Contributors . . . . . . . . . . . . . . . . . . . . . . . . 23
   12.   Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 24
   13.   References . . . . . . . . . . . . . . . . . . . . . . . . . 24
       Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 24
       Intellectual Property and Copyright Statements . . . . . . . . 26









Govindan (Editor), et al.    Expires May 2005                   [Page 3]


Internet-Draft             CAPWAP Objectives               November 2004

1.  Requirements notation

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].























Govindan (Editor), et al.    Expires May 2005                   [Page 4]


Internet-Draft             CAPWAP Objectives               November 2004

2.  Terminology

   This document follows the terminologies of [I-D.ietf-capwap-arch].
   Additionally, the following terms are defined;

   Switching segment: Those aspects of a centralized WLAN that primarily
   deal with switching or routing control and data information between
   Wireless Termination Points (WTPs) and the WLAN controller.

   Wireless medium segment: Those aspects of a centralized WLAN that
   primarily deal with the end-user interface which is wireless.
   Initially, CAPWAP focuses on IEEE 802.11 technologies but this
   segment may also refer to other technologies such as IEEE 802.16.

   CAPWAP framework: A term that includes the local MAC and split MAC
   designs of the Centralized WLAN Architecture.  Standardization
   efforts are focussed on these designs.

   CAPWAP protocol: The protocol between WLAN controller and WTPs in the
   CAPWAP framework.  It facilitates control, management and
   provisioning of WTPs in an interoperable manner.















Govindan (Editor), et al.    Expires May 2005                   [Page 5]


Internet-Draft             CAPWAP Objectives               November 2004

3.  Introduction

   The growth in large scale wireless local area network (WLAN)
   deployments has brought to focus a number of technical challenges.
   This includes the complexity of managing large numbers of wireless
   termination points (WTPs), which is further exacerbated by
   differences in their design.  Another challenge is the maintenance of
   consistent configurations among the numerous WTPs.  The dynamic
   nature of the wireless medium is also a concern together with WLAN
   security.  These challenges have been highlighted in
   [I-D.ietf-capwap-problem-statement].

   Many vendors have addressed these challenges for large scale WLAN
   deployments by developing new architectures and solutions.  A survey
   of the various architectures and solutions was conducted to better
   understand the context of the challenges so as to develop
   interoperability among them.  The Architecture Taxonomy
   [I-D.ietf-capwap-arch] is a result of this survey in which major
   architecture families are classified.  Broadly, these are the
   autonomous, centralized WLAN and distributed mesh architectures.  The
   survey showed that the current majority of large scale deployments
   follow the centralized WLAN architecture in which portions of the
   wireless medium access control (MAC) operations are centralized in a
   WLAN controller.  This architecture family is further classified into
   remote MAC, split MAC and local MAC.  Each differs in the degree of
   separation of MAC layer capabilities among WTPs and WLAN controller.

   This document puts forth critical objectives for achieving
   interoperability in a CAPWAP framework.  It presents objectives that
   address the challenges of large scale WLAN deployments.  The
   realization of these objectives will ensure that WLAN equipment of
   major design types may be integrally deployed and managed.










Govindan (Editor), et al.    Expires May 2005                   [Page 6]


Internet-Draft             CAPWAP Objectives               November 2004

4.  Categories of Objectives

   The objectives for the CAPWAP protocol are organized into three major
   categories; architecture, operations and security.

   Architecture objectives deal with system level aspects of the CAPWAP
   protocol.  They address issues of protocol extensibility, diverse
   network deployments and architecture designs and differences in
   transport technologies.

   Operational objectives address the control and management features of
   the CAPWAP protocol.  They deal with operations relating to
   system-wide resource management, WTP management, QoS and STA access
   control.

   Security objectives address potential threats to WLANs and their
   containment.  Specifically, they deal with securing the CAPWAP
   protocol and the WLAN system as a whole.  The objectives also address
   security requirements from end-users and service providers.
















Govindan (Editor), et al.    Expires May 2005                   [Page 7]


Internet-Draft             CAPWAP Objectives               November 2004

5.  Architecture Objectives

   The architectural considerations of centralized WLAN networks are
   fundamental to the development and evaluation of a CAPWAP protocol.
   The objectives in this category deal with system level aspects
   relating to protocol extensibility, diversity of network deployments
   and differences among vendor equipment.

5.1  Interoperability Objective

   Two major designs of the centralized WLAN architecture are local MAC
   and split MAC.  With the focusing of standardization efforts on these
   two designs, it is crucial to ensure mutual interoperation among
   them.

5.1.1  Objective Details

   This objective for the CAPWAP protocol is to ensure that WTPs of both
   local MAC and split MAC architecture designs are capable of
   interoperation within a single WLAN.  Consequently, a single WLAN
   controller will be capable of controlling both types of WTPs using a
   single CAPWAP protocol.  Integral support for these designs comprises
   a number of protocol aspects.

   i.  Functionality negotiations between WLAN controller and WTPs

   Local MAC and split MAC designs differ in the degree of IEEE 802.11
   MAC functionalities that each type of WTP realizes.  The CAPWAP
   protocol should allow WLAN controllers to determine the
   functionalities of different WTPs as a first step in controlling
   them.

   ii.  Establishment of alternative interfaces

   The functionality differences among different WTPs essentially
   equates to alternative interfaces with a WLAN controller.  So the
   CAPWAP protocol should be capable of adapting its operations to the
   different interfaces.  The definition of these interfaces is
   dependent on the functionality differences among local MAC and split
   MAC WTPs.  It is therefore out of scope of the objectives
   specifications.

   [Functionality Classifications] presents additional details on these
   two aspects.  It shows how flexibility in the CAPWAP protocol may be
   achieved so as to realize this architecture objective.

   This objective also addresses the need for flexibly configuring WTPs
   based on their design types and other setup aspects.


Govindan (Editor), et al.    Expires May 2005                   [Page 8]


Internet-Draft             CAPWAP Objectives               November 2004

5.1.2  Motivation and Protocol Benefits

   The benefits of realizing this architecture objective are both
   technical and practical.  First, there are substantial overlaps in
   the control operations of local MAC and split MAC architecture
   designs.  As a result, it is technically practical to devise a single
   protocol that manages both types of devices.

   Next, the ability to operate a CAPWAP protocol for both types of
   architectural designs enhances its practical prospects as it will
   have wider appeal.

   Furthermore, the additional complexity resulting from such
   alternative interfaces is marginal.  Consequently, the benefits of
   this objective will far outweigh any cost of realizing it.

5.1.3  Relation to Problem Statement

   The objective for supporting both local MAC and split MAC WTPs is
   fundamental to addressing [I-D.ietf-capwap-problem-statement].  It
   forms the basis for those problems to be uniformly addressed across
   the major WLAN architectures.  This is the ultimate aim of
   standardization efforts.  The realization of this objective will
   ensure the development of a comprehensive set of solutions to the
   challenges of large scale WLAN deployments.

5.1.4  Customer Requirements

   A number of service providers and equipment vendors see benefits with
   the combined usage of both local MAC and split MAC designs.  WTPs of
   different designs are placed in different locations so as to
   selectively take advantage of their respective characteristics.  The
   integral support of different architectures therefore addresses
   critical needs for the market.

   Furthermore, since there are products of each design type already in
   the market and widely deployed, it is necessary for CAPWAP protocol
   to support both of them.

5.1.5  Classification (Mandatory, Desirable, Rejected)

   [TBD] [This section to contain reasons for the particular
   classification of the objective.]

5.2  Interconnection Objective

   Large scale WLAN deployments are likely to use a variety of
   interconnection technologies between different devices of the


Govindan (Editor), et al.    Expires May 2005                   [Page 9]


Internet-Draft             CAPWAP Objectives               November 2004

   network.  It should therefore be possible for the CAPWAP protocol to
   operate over the different interconnection technologies.  So the
   protocol needs to be independent of underlying transport
   technologies.

5.2.1  Objective Details

   WLAN controllers and WTPs must be able to connect by a variety of
   interconnection technologies.  The fundamental intent is for CAPWAP
   protocol exchanges to be transparent to underlying transport
   technologies.  As a result of realizing this objective, the protocol
   will be capable of operation over different interconnect technologies
   including Ethernet, bus backplanes, ATM (cell) fabrics and also
   wireless technologies such as IEEE 802.11.  Ethernet architecture is
   most widely used and should be recommended.

   The CAPWAP protocol should have the ability to support this diversity
   of interconnection technologies for data and control exchanges.  For
   example, VLAN tunnels are an example of an interconnection technology
   over which CAPWAP may operate.

   Related to this objective, is the QoS aspect of interconnection
   technologies.  Given that QoS will be enabled differently in each of
   these technologies, the CAPWAP protocol must ensure that network
   performance is consistent across different transport means.
   Additionally, QoS consistency has to cover the switching segment and
   the wireless medium segment.

5.2.2  Motivation and Protocol Benefits

   [TBD]

5.2.3  Relation to Problem Statement

   [TBD]

5.2.4  Customer Requirements

   [TBD]

5.2.5  Classification (Mandatory, Desirable, Rejected)

   [TBD] [This section to contain reasons for the particular
   classification of the objective.]

5.3  Support for Logical Networks

   Large WLAN deployments are complex and expensive.  Furthermore,


Govindan (Editor), et al.    Expires May 2005                  [Page 10]


Internet-Draft             CAPWAP Objectives               November 2004

   enterprises are under pressure to improve the efficiency of their
   expenditures.  These issues are increasingly being addressed by means
   of shared deployments.  As a result, a number of logical networks
   cover a single physical WLAN infrastructure.  This way the cost of
   deployment and management can be shared among network service
   providers.  A scenario together with additional details for such
   shared WLANs is presented in [Functionality Classifications].

5.3.1  Objective Details

   The objective for supporting logical networks involves a number of
   aspects.  These are discussed below;

   i.  WLAN management in terms of logical groups

   Traditionally, each WTP has represented one complete subset of a
   larger WLAN system.  However, with shared deployments, each WTP
   represents a number of subsets of possibly a number of larger WLAN
   systems.  So with such deployments, WLANs need to be managed in terms
   of logical groups instead of physical devices.

   ii.  Mutual separation of control and communications

   Since different logical networks are likely to be associated to
   different enterprises, it is crucial that control and data
   communications among them be mutually separated.  In addition to
   being a security concern, this aspect of the objective also
   highlights a complexity concern.  Specifically, mixing of traffic for
   different logical networks can complicate control.  So the CAPWAP
   protocol must be capable of separating traffic among logical
   networks.  VLANs and other types of tunnels may be used for this
   purpose.

   iii.  Multiple authentication mechanisms

   The presence of multiple logical networks within an infrastructure
   also means there are different subscriber groups in a WLAN system.
   Since the subscriber groups are likely to belong to different service
   providers or WLAN domains, their authentication needs will also be
   different.  As a result, the CAPWAP protocol must be capable of
   transferring different authentication information.  For example, one
   subscriber group may be authenticated with IEEE 802.11i with the WLAN
   controller being the authenticator, while another group could use web
   authentication at an alternative server.

5.3.2  Motivation and Protocol Benefits

   Given the realities of cost and complexity of WLANs, a CAPWAP


Govindan (Editor), et al.    Expires May 2005                  [Page 11]


Internet-Draft             CAPWAP Objectives               November 2004

   protocol that incorporates the objective of supporting logical
   networks ensures simpler and cost effective WLAN management and
   deployment.  A protocol that realizes this is therefore consistent
   with the goal of reducing complexity in large scale WLANs.

5.3.3  Relation to Problem Statement

   This objective for supporting logical networks addresses problem of
   management complexity in terms of cost.  Such cost complexity is
   reduced by sharing infrastructure among a number of service
   providers.  Consequently, deployment and managements
   cost-efficiencies are realized.

5.3.4  Customer Requirement

   Businesses require the benefits of management ease by the most cost
   effective means.  This can be achieved with the objective of
   supporting logical networks within a single set of physical WLAN
   equipment.  There are a number of ways of realizing this objective
   some being virtual APs, VLAN tunnels and other tunnels.

   This objective also allows for separation between providers of
   infrastructure from services.  Logical networks allows for the
   separation of physical deployment and maintenance from actual
   management of WLANs.  This helps lower costs and responsibilities for
   service providers.

5.3.5  Classification (Mandatory, Desirable, Rejected)

   [TBD] [This section to contain reasons for the particular
   classification of the objective.]

5.4  Extensibility Objective

   Wireless technology is developing at rapid pace in a number of
   industry and scientific groups.  With such pace, it is important to
   design CAPWAP in a way as to allow future extensibility.  In
   particular, the IEEE is in the process of specifying standards for
   broadband wireless access, namely IEEE 802.16.  There also other
   activities within the IEEE that needs to be considered in the CAPWAP
   context.

5.4.1  Objective Details

   This objective has a number of aspects that are described below;

   i.  Enable support for future wireless technologies


Govindan (Editor), et al.    Expires May 2005                  [Page 12]


Internet-Draft             CAPWAP Objectives               November 2004

   This aspect of the objective essentially purposes that the CAPWAP
   protocol does not rely on specifics of IEEE 802.11 technology for its
   operations.  This will simplify extensibility to support IEEE 802.16.

   ii.  Enable support for new IEEE extensions

   The IEEE is currently reviewing IEEE 802.11 functionality.  It is
   expected that the review will result in new functional blocks,
   interfaces or information flows.  The CAPWAP protocol must be able to
   handle these revisions with minimal changes.

   iii.  User(Client) Access Requirement

   There should not be any impact on the end-user of CAPWAP WLAN in
   terms of both hardware and software aspects.  End-users should not be
   required to be aware of the existence of CAPWAP protocol.

5.4.2  Motivation and Protocol Benefits

   [TBD]

5.4.3  Relation to Problem Statement

   [TBD]

5.4.4  Customer Requirements

   Service providers are not enthusiastic about deploying technologies
   with limited potential for extension.  They require WLAN
   infrastructure to be able to meet current and future market
   requirements.  So the objective for extensibility is critical to
   service providers and other customers of WLAN equipment.

5.4.5  Classification (Mandatory, Desirable, Rejected)

   [TBD] [This section to contain reasons for the particular
   classification of the objective.]







Govindan (Editor), et al.    Expires May 2005                  [Page 13]


Internet-Draft             CAPWAP Objectives               November 2004

6.  Operations Objective

   CAPWAP aims to provide an interoperable solution to the control and
   provisioning of large scale WLAN deployments.  In this context, the
   operational objectives address functional aspects of the protocol.
   These functions cover system monitoring, resource management and QoS.

6.1  WLAN Monitoring Objective

   The scale of WLANs in the CAPWAP context results in numerous
   information sources.  For example, the configuration of each WTP can
   be considered as an information source.  Additionally, the switching
   segment and wireless medium segment can also be considered as
   information sources.  So for effective performance, the CAPWAP
   protocol needs to regularly monitor the various information sources.

6.1.1  Objective Details

   Large WLANs need a variety of information sources to be monitored.
   So this objective includes a number of aspects.

   i.  Configuration consistency

   CAPWAP based WLANs include a large number of WTPs, each of which need
   to be configured and managed.  The protocol should therefore allow
   WTPs to regularly send information on the state of their
   configuration to their WLAN controller.  Furthermore, it should also
   be capable of consistently distributing firmware to all the WTPs.

   ii.  System-wide resource state

   The centralized WLAN architecture is made up of a switching segment
   and wireless medium segment.  In the switching segment, network
   congestion and WTP status, including firmware information, have to be
   monitored.  In the wireless medium segment, the dynamic nature of the
   medium itself has to be monitored.  Overall, there are also various
   statistics that are required for operation.

   The CAPWAP protocol should therefore be capable of monitoring various
   information sources.  Moreover, given relationships among information
   sources, CAPWAP should combine information from such sources.  For
   example, statistics information may be merged with status signals.
   So this aspect of the objective proposes collective information
   arising from different information sources.  Within this aspect of
   the monitoring objective, the protocol may also allow WTPs to send
   regular send feedback using CAPWAP.



Govindan (Editor), et al.    Expires May 2005                  [Page 14]


Internet-Draft             CAPWAP Objectives               November 2004

6.1.2  Motivation and Protocol Benefits

   The effectiveness of a protocol is based on the relevance of
   information on which it operates.  The objective for WLAN monitoring
   can provide this information to the CAPWAP protocol.  So there will
   tangible benefits with this objective.

6.1.3  Relation to Problem Statement

   This objective addresses the problems of management complexity.  This
   challenge is better solved with the appropriate information resulting
   from this WLAN monitoring.  With collective information from various
   information sources, realizing this objective will help control and
   manage complexity.

   The objective also helps address the challenge of maintaining
   consistent configurations among WTPs.

6.1.4  Customer Requirement

   WLAN equipment customers require effective management solutions for
   their networks.  This objective will ensure such a solution by
   providing collective information from a variety of information
   sources.

6.1.5  Classification (Mandatory, Desirable, Rejected)

   [TBD] [This section to contain reasons for the particular
   classification of the objective.]

6.2  Resource Control Objective

   Integral to the success of any wireless network system is the
   performance and quality it can offer its subscribers.  Since CAPWAP
   based WLANs combine a switching segment and a wireless medium
   segment, performance and quality need to be coordinated across both
   of these segments.  So QoS performance must be enforced system-wide.

6.2.1  Objective Details

   This objective is for QoS over the entire WLAN system which includes
   the switching segment and the wireless medium segment.  Given the
   fundamental differences between the two, it is likely that there are
   alternate QoS mechanisms between WTPs and wireless service
   subscribers and between WTPs and WLAN controllers.  For instance, the
   former will be based on IEEE 802.11e while the latter will be an
   alternative.  So resources need to be adjusted in a coordinated
   fashion over both segments.  The CAPWAP protocol should ensure that


Govindan (Editor), et al.    Expires May 2005                  [Page 15]


Internet-Draft             CAPWAP Objectives               November 2004

   these adjustments are appropriately exchanged between WLAN
   controllers and WTPs.

6.2.2  Motivation and Protocol Benefits

   A protocol that addresses QoS aspects of WLAN systems will deliver
   high performance thereby being beneficial for subscribers and
   resource utilization.  Since CAPWAP deals with WTPs directly and with
   the wireless medium indirectly, both of these must be considered for
   performance.

   For the wireless medium segment, QoS aspects in the protocol enable
   high quality communications within the domain of a WLAN controller.
   Since each domain generally covers an enterprise or a group of
   service providers, such protocol performance has wide-ranging
   effects.

   Within the switching segment of CAPWAP, a QoS-enabled protocol
   minimizes the adverse effects of dynamic traffic characteristics so
   as to ensure system-wide performance.

6.2.3  Relation to Problem Statement

   QoS control is critical to large WLANs and relates to a number of
   aspects.  In particular, this objective can help address the problem
   of managing dynamic conditions of the wireless medium.

   Furthermore, traffic characteristics in large scale WLANs are
   constantly varying.  So network utilization becomes inefficient and
   user experience is unpredictable.

   The interaction and coordination between the two aspects of
   system-wide QoS is therefore critical for performance.

6.2.4  Customer Requirements

   VoIP is a major application over WLANs.  The basic requirement for
   such applications is QoS.  Furthermore, end-users demand quality
   means of communications, so service providers in turn emphasize on
   the QoS capabilities of WLAN systems.  Adopting this objective will
   ensure all demands are met.

6.2.5  Classification (Mandatory, Desirable, Rejected)

   [TBD] [This section to contain reasons for the particular
   classification of the objective.]



Govindan (Editor), et al.    Expires May 2005                  [Page 16]


Internet-Draft             CAPWAP Objectives               November 2004

6.3  Support for Traffic Separation

   The centralized WLAN architecture simplifies complexity associated
   with large scale deployments.  This is achieved by consolidating some
   functionality at a central WLAN controller and distributing the
   remaining across WTPs.  As a result, WTPs and WLAN controller
   exchange control and data among them.  This objective suggests
   separating control and data aspects of the exchanges for further
   simplicity.

6.3.1  Objective Details

   It is the aim of CAPWAP to simplify the control and management of
   large scale WLANs.  One way of achieving this is to separate control
   and data aspects within the protocol.  This will allow solutions for
   control and data exchanges to be independently optimized.

6.3.2  Motivation and Protocol Benefits

   The aim of separating data and control aspects of the protocol is to
   simplify the protocol.  It also allows for flexibility since each
   part can be separately addressed in the most appropriate manner.

   Furthermore, such separation can also allow separation of data and
   control paths.  This will enable remotely located WTPs to handle data
   in alternative ways instead of forwarding them across a wide network
   to the WLAN controller.

6.3.3  Relation to Problem Statement

   Broadly, this objective relates to the challenge of managing
   complexity in large scale WLANs.

6.3.4  Customer Requirements

   This objective offers simplicity and flexibility in operation.  These
   are important issues for service providers and other enterprises
   deploying large scale WLANs.

6.3.5  Classification (Mandatory, Desirable, Rejected)

   [TBD] [This section to contain reasons for the particular
   classification of the objective.]

6.4  STA Admission Control Objective

   STA Admission control deals with client authentication, handoff
   between WTPs, load balance, QoS etc.  Access control in the CAPWAP


Govindan (Editor), et al.    Expires May 2005                  [Page 17]


Internet-Draft             CAPWAP Objectives               November 2004

   context must be based on a variety of information.  This is because
   CAPWAP combines both switching and wireless medium segments.

6.4.1  Objective Details

   This objective focuses on access control based on collective
   information from the switching and wireless medium segments.  As
   such, access to the WLAN is based on both the radio resources, i.e.
   wireless medium segment and network resources, i.e.  switching
   segment.

6.4.2  Motivation and Protocol Benefits

   Due to the scale of deployments in which CAPWAP will be employed,
   comprehensive access control is crucial.  The effectiveness of access
   control in turn is affected by the information on which such control
   is based.  As a result, this objective has critical relevance to a
   CAPWAP protocol.

6.4.3  Relation to Problem Statement

   This objective addresses the issue of access control in large WLANs.
   Broadly, it relates the problem of managing the complexity scale of
   such networks.  With collective information of both switching and
   wireless medium segments, realizing this objective will help control
   and manage complexity.

6.4.4  Customer Requirements

   [TBD]

6.4.5  Classification (Mandatory, Desirable, Rejected)

   [TBD]

6.5  Centralized WTP Management

   Large scale WLAN deployments necessitate in centralized control.  The
   CAPWAP protocol interfaces the central control to the numerous WTPs.
   One aspect of centralized control includes firmware distribution.
   This objective relates to configuration aspects of the WLAN.





Govindan (Editor), et al.    Expires May 2005                  [Page 18]


Internet-Draft             CAPWAP Objectives               November 2004

7.  Security Objectives

   Security is a major issue for any communications network and is
   especially important for large scale WLANs.  In this context,
   security must encompass both the protocol between WLAN controller and
   WTPs and also the WLAN system as a whole.  So the following
   objectives deal with securing exchanges between WLAN elements and
   devising contingencies in case of physical security breaches.

7.1  CAPWAP Protocol Security

   This objective addresses the security of the protocol.

7.1.1  Objective Details

   [Note: This objective generally deals with the security between WTP
   and WLAN controller.  It deals with threats that arise from within
   the network infrastructure.]

   The CAPWAP protocol between WLAN controller and WTPs must be secured
   such that information exchange between them is not threatened.  As
   such, it must provide confidentiality, integrity and authenticity for
   those exchanges.

   Furthermore, CAPWAP protocol security must ensure that rogue WTPs do
   not breach legitimate WLAN systems.  The CAPWAP protocol should
   therefore include authentication mechanisms for WTPs.  For example,
   WTPs may be required to regularly renew their authentication states.

   As a result of realizing this objective it should not be possible for
   individual WTP breaches to affect the security of the WLAN as a
   whole.  So WTP mis-use will be protected against.

7.2  System-wide Security

   [Note: This objective is to prevent against security threats from
   outside the CAPWAP framework.  Specifically, it addresses threats
   posed by rogue wireless users.  For example, recent discussions of
   PMK sharing in the CAPWAP context illustrates a situation while may
   be taken advantage of by a rogue wireless user.  This objective
   differs from that of the previous section in that it deals with
   external threats that may affect the WLAN system.

   The emphasis here is that there should be no ambiguities arising from
   the CAPWAP framework that causes threats from external entities.]



Govindan (Editor), et al.    Expires May 2005                  [Page 19]


Internet-Draft             CAPWAP Objectives               November 2004

8.  Objectives for Further Discussion

   [Note: The following are some of objectives for further discussion in
   the WG.]

8.1  Centralized WTP Management

   The CAPWAP protocol should provide an engine-mechanism to spring WTP
   auto-configuration and/or software version updates and should support
   integration with existing network management system.  WLAN controller
   as a management agent is optional.

   If entities other than WLAN controllers manage some aspects of WTPs,
   such as software downloads, the CAPWAP protocol may be used for WTPs
   to notify WLAN controllers of any changes made by the other entities.

   One example of transport mechanism for the CAPWAP protocol is TCP/IP.
   This will bring more flexibility to the way in which WLAN systems are
   deployed.

8.2  Security borderline Control

   [Note: This objective addresses the issue of a large WLAN
   infrastructure featuring the co-existence of different security
   policies for different user groups.  It deals with traffic flow
   isolation on borderline of any two user groups or two users.]

8.3  Trust model Definition

   [Note: When 802.1x authenticator role in 802.11i is relocated from
   WTP to WLAN controller, the following needs to be clarified for
   CAPWAP protocol development; whether there are any potential changes
   in the trust relationship between WTP and infrastructure.  If there
   are changes, the new trust model needs to be defined.]

8.4  IEEE 802.11i Considerations

   In the centralized WLAN architecture, authentication based on IEEE
   802.11i presents options based on the location of the authenticator.
   Particularly, if the authenticator is located within the WLAN
   controller, means for key distribution need to be considered, whereas
   if the authenticator is within a WTP, communications between the AAA
   server and the WTP need to be considered.  The CAPWAP protocol should
   therefore be able to address these options.




Govindan (Editor), et al.    Expires May 2005                  [Page 20]


Internet-Draft             CAPWAP Objectives               November 2004

9.  Summary and Conclusion

   The objectives presented in this document address architectural,
   operational and security aspects for CAPWAP.  They present a
   framework which will be used to develop and evaluate candidate
   protocols for managing large scale WLAN deployments.























Govindan (Editor), et al.    Expires May 2005                  [Page 21]


Internet-Draft             CAPWAP Objectives               November 2004

10.  Security Considerations

   [Note: This section will detail the security implications of the
   various objectives.  One way to look at it would be to analyze the
   security considerations of the Architecture Taxonomy and borrow/infer
   from it.]

   The objective dealing with alternative interfaces covers the
   interoperability of WTPs from both local MAC and split MAC designs.
   As such, a WLAN controller must be capable of securing both of these
   design types.  This may include handling different degrees of
   security or authentication processing for the two types of WTPs.

   In shared deployments with a number of logical networks, it is
   crucial to ensure mutual separation of traffic among them.  Access
   control should therefore be distinct for each of the logical
   networks.  Furthermore, subscribers to different service providers
   need to be managed based on their respective requirements,
   subscriptions, etc.  Cross exchanges need to be secured against.

   It should be ensured that any stray exchanges be prevented with the
   automation of discovery and initialization processes.

   The objective for WLAN monitoring relates to security also.  Wireless
   systems need to be constantly monitored for potential threats in the
   form of rogue WTPs or terminals.  For example, profiles for DoS and
   replay attacks need to be monitored.

   In addition to securing protocol exchanges between devices in large
   scale WLANs, the CAPWAP protocol should also incorporate
   contingencies for physical security breaches.  For instance, it
   should be ensured that the network as a whole is not compromised if a
   single AP is stolen or otherwise compromised.  The protocol should
   therefore contain measures to detect and contain physical security
   threats.








Govindan (Editor), et al.    Expires May 2005                  [Page 22]


Internet-Draft             CAPWAP Objectives               November 2004

11.  Contributors

   This document is the result of a merger of two individual
   Internet-Draft submissions.  The authors of both drafts have
   contributed to shape this document.  The authors are;

   Meimei Dang
   RITT, CATR
   No.11 YueTanNanJie, Xicheng District
   Beijing 100045
   P.  R.  China
   Phone: +86 10 68094457
   Email: dangmeimei@mail.ritt.com.cn

   Satoshi Iino
   Panasonic Mobile Communications
   600, Saedo-cho
   Tsuzuki-ku
   Yokohama  224 8539
   Japan
   Phone: +81 45 938 3789
   EMail: iino.satoshi@jp.panasonic.com

   Mikihito Sugiura
   Panasonic Mobile Communications
   600, Saedo-cho
   Tsuzuki-ku
   Yokohama  224 8539
   Japan
   Phone: +81 45 938 3789
   EMail: sugiura.mikihito@jp.panasonic.com

   Dong Wang
   ZTE
   No.68 Zijinghua Rd, Yuhuatai District
   Tsuzuki-ku
   Nanjing, Jiangsu Prov.  210 012
   P.  R.  China
   Phone: +86 25 5287 1713
   EMail: wang.dong@mail.zte.com.cn






Govindan (Editor), et al.    Expires May 2005                  [Page 23]


Internet-Draft             CAPWAP Objectives               November 2004

12.  Acknowledgements

   The authors would like to thank the Working Group Chairs, Dorothy
   Gellert and Mahalingam Mani, for their support and patience with this
   document.  We would also like to thank participants of the Working
   Group who have helped shape the objectives.  In particular, the
   authors thank Pat Calhoun and Inderpreet Singh for their invaluable
   inputs.

13  References

   [Functionality Classifications]
              Cheng, H. et al, "Functionality Classifications for
              Control and Provisioning of Wireless Access Points",
              draft-cheng-capwap-classifications-01, (work in
              progress), July 2004.

   [I-D.ietf-capwap-arch]
              Yang, L., Zerfos, P. and E. Sadot, "Architecture Taxonomy
              for Control and Provisioning of Wireless Access
              Points(CAPWAP)", draft-ietf-capwap-arch-06 (work in
              progress), November 2004.

   [I-D.ietf-capwap-problem-statement]
              Calhoun, P., "CAPWAP Problem Statement",
              draft-ietf-capwap-problem-statement-02 (work in progress),
              September 2004.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

Authors' Addresses

   Saravanan Govindan
   Panasonic Singapore Laboratories
   Block 1022, Tai Seng Industrial Estate
   #06-3530, Tai Seng Avenue
   Singapore  534 415
   Singapore

   Phone: +65 6550 5441
   EMail: sgovindan@psl.com.sg




Govindan (Editor), et al.    Expires May 2005                  [Page 24]


Internet-Draft             CAPWAP Objectives               November 2004

   Zhonghui Yao
   Huawei Longgang Production Base
   Shenzhen  518 129
   P. R. China

   Phone: +86 755 2878 0808
   EMail: yaoth@huawei.com

   Wenhui Zhou
   China Mobile
   53A, Xibianmen Ave, Xuanwu District
   Beijing  100 053
   P. R. China

   Phone: +86 10 6600 6688 ext.3061
   EMail: zhouwenhui@chinamobile.com

   L. Lily Yang
   Intel Corp.
   JF3-206, 2111 NE 25th Ave.
   Hilsboro, OR  97124
   USA

   Phone: +1 503 264 8813
   EMail: lily.l.yang@intel.com

   Hong Cheng
   Panasonic Singapore Laboratories
   Block 1022, Tai Seng Industrial Estate
   #06-3530, Tai Seng Avenue
   Singapore  534 415
   Singapore

   Phone: +65 6550 5447
   EMail: hcheng@psl.com.sg







Govindan (Editor), et al.    Expires May 2005                  [Page 25]


Internet-Draft             CAPWAP Objectives               November 2004

Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.

Disclaimer of Validity

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Copyright Statement

   Copyright (C) The Internet Society (2004).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.

Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.


Govindan (Editor), et al.    Expires May 2005                  [Page 26]