Hi Alan and Dave,
Below is a simple ASCII-art enhancement of Use Model 1 diagram,
showing the actual network technologies and connectivity, so that
we can address concrete security threats.
Comments?
Cheers,
- Ira McDonald
High North Inc
--------------------------
Use Model 1
------------- -------------
| | ! |
| Print |<---------------(5)----------------! Content |
| Service | ! Provider |
| (PS) | ! |
------------- -------------
E ^ ^ | ADSL Modem T1 Circuit |
n | | | ISP ( ------ ) ISP |
e | | | ( ) |
t(3) (4) (6) ( INTERNET ) (0)
L | | | ( ) |
A | | | ( ------ ) GSM Cellular |
N v v v Wireless ISP v
------------- -------------
| | ! |
| Target |<---------------(1)----------------! Mobile |
| Device | Bluetooth PAN ! Device |
| (Printer) |<---------------(2)----------------! |
------------- -------------
(PSI Client)
Data Flows:
(0) Browse - Public Internet browse for content URL
(1) Discovery - Bluetooth discovery
(2) Reference - Bluetooth print-by-reference of content URL
(3) C2S - Ethernet LAN PSI print job
(4) T2S - Ethernet LAN PSI print job
(5) Content - Public Internet fetch of content URL
(6) Formatted Data - Ethernet LAN PSI print job
This archive was generated by hypermail 2b29 : Wed Aug 06 2003 - 14:41:25 EDT