Pros and Cons of Upper Layer Network Access

4/24/01


Click here to start


Table of Contents

Pros and Cons of Upper Layer Network Access

Agenda

How Do We Measure Success?

Gilder’s Law vs. Moore’s Law: The Next 20 Years

What Do We Do Today?

Who Standardizes What?

What We’ve Learned

Static vs. Extensible Authentication

Why Do Auth at the Link Layer?

Implications of Link Layer Auth

Trends

When Might Layer 3+ Auth Make Sense?

Pitfalls of Upper Layer Auth

Five Questions…

Five Questions (cont’d)

Five Questions (cont’d)

Five Questions (cont’d)

Five Questions (cont’d)

Summary

Author: TGe