Table of Contents
Pros and Cons of Upper Layer Network Access
Agenda
How Do We Measure Success?
Gilder’s Law vs. Moore’s Law: The Next 20 Years
What Do We Do Today?
Who Standardizes What?
What We’ve Learned
Static vs. Extensible Authentication
Why Do Auth at the Link Layer?
Implications of Link Layer Auth
Trends
When Might Layer 3+ Auth Make Sense?
Pitfalls of Upper Layer Auth
Five Questions…
Five Questions (cont’d)
Five Questions (cont’d)
Five Questions (cont’d)
Five Questions (cont’d)
Summary
|