Draft-peterson-modern- problems-04 Jon Peterson MODERN WG IETF 95 (Buenos Aires)

Slides:



Advertisements
Similar presentations
SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Advertisements

VON Europe /19/00 SIP and the Future of VON Protocols SIP and the Future of VON Protocols: Presence and IM Jonathan Rosenberg.
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Mr. Thilak de Silva. BSc. Eng., MSc, CEng, FIE(SL), FIET(UK), CITP(UK), MBCS(UK), MIEEE (USA) M.Sc. in IT - Year 1 Semester II
Linked In 101 Using Social Networking as Part of Your Job Search.
We use a comprehensive approach to reduce costs and increase efficiencies. TMR approaches every project with integrity, dedication, and creativity. We.
Rfc4474bis-01 IETF 89 (London) STIR WG Jon & Cullen.
Health Ingenuity Exchange (HingX) Best Practices for User Groups and Resource Registration.
© 2010 Bennett, McRobb and Farmer1 Use Case Description Supplementary material to support Bennett, McRobb and Farmer: Object Oriented Systems Analysis.
STIR Credentials IETF 88 (Vancouver) Wednesday Session Jon & Hadriel.
Securing the Broker Pattern Patrick Morrison 12/08/2005.
Multicasting Applications Across Inter-Domain Peering Points Percy S. Tarapore, AT&T Robert Sayko, AT&T Greg Shepherd, Cisco Toerless Eckert, Cisco Ram.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Internet Sellouts Final Presentation Enterprise Architecture Group.
Identity Federation: Some Challenges and Thoughts OGF 19 Jan 30, 2007 Von Welch
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
1 CONCENTRXSept 2000 Our Perspective “Integration without an architecture is like doing a jigsaw puzzle on your lap “ – R Tessier We look at the big picture.
SIP Authorization Framework Use Cases Rifaat Shekh-Yusef, Jon Peterson IETF 91, SIPCore WG Honolulu, Hawaii, USA November 13,
Document IPW-41 IP and Telecoms Interworking Workshop N umbering, Naming Addressing and Routing IETF EMUM WG Proposal International Telecommunication Union.
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
EE616 Technical Project Video Hosting Architecture By Phillip Sutton.
Database Design - Lecture 1
P2PSIP Charter Proposal Many people helped write this charter…
Proposal for App Id and Service Provider Id registration Group Name: Shelby Kiewel Source: Shelby Kiewel, iconectiv / Ericsson,
Shib in the present and the future Ken Klingenstein Director, Internet2 Middleware and Security.
1 Open Pluggable Edge Services OPES Abbie Barbir, Ph.D.
1 J2EE Components. 2 Application Servers relieve the programming burden for business distributed components. They provide support for system level services.
RIPE64 Enum Working Group DE-CIX NGN Services.
1 INTRODUCTION TO DATABASE MANAGEMENT SYSTEM L E C T U R E
Roles and Responsibilities
ENUM Update for voipeer BOF Richard Shockey ENUM co-chair IETF 63 Paris.
A DESCRIPTION OF CONCEPTS AND PLANS MAY 14, 2014 A. HUGHES FOR TFTM The Identity Ecosystem DISCUSSION DRAFT 1.
Instructor: Tasneem Darwish1 University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department Object Oriented.
Windows 2000 Operating System -- Active Directory Service COSC 516 Yuan YAO 08/29/2000.
Industry Canada 1 Bob Leafloor Colman Ho Peter Chau Industry Canada January 2003 (ENUM) T E lephone NU mber M apping.
Practical Considerations for supporting Emergency Calls Brian Rosen Emergicom.
Requirements Analysis Visual Modeling] Lab 02 Visual Modeling (from Visual Modeling with Rational Rose and UML) A way of thinking about problems using.
Draft-rosen-ecrit-emergency- framework-00 Brian Rosen NeuStar CPa
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Credentials Roadmap STIR WG IETF 90 (Toronto) Sean Turner
Certificate Credentials STIR WG IETF 91 (Honolulu) Sean Jon.
1 Use Cases & Requirements IETF#77, Anaheim, CA..
The State of VoIP Peering Charles Studt Director of Product Management, VoEX.
STIR Problem Statement IETF 88 (Vancouver) Tuesday Session Jon Peterson.
Internet telephony
“The FIDO Alliance Today”
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Rfc4474bis-01 IETF 90 (Toronto) STIR WG Jon. First principles (yet again) Separating the work into two buckets: 1) Signaling – What fields are signed,
Patrik Fältström. ITU Tutorial Workshop on ENUM. Feb 8, 2002, Geneva Explanation of ENUM (RFC 2916) Patrik Fältström Area Director, Applications Area,
Lesson 9. * Testing Your browser * Using different browser tools * Using conditional comments with * Dealing with future compatibility problems.
Implications of Trust Relationships for NSIS Signaling (draft-tschofenig-nsis-casp-midcom.txt) Authors: Hannes Tschofenig Henning Schulzrinne.
- 1 -P. Kyzivatdraft-sipping-gruu-reg-event-00 Reg Event Package Extensions draft-sipping-gruu-reg-event-00 IETF64 Nov-2005.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
and LMAP liaison Document Number: IEEE R0 Date Submitted: Source: Antonio BovoVoice:
MODERN BoF Managing, Ordering, Distributing, Exposing, and Registering telephone Numbers IETF 92.
EGEE is a project funded by the European Union under contract IST New VO Integration Fabio Hernandez ROC Managers Workshop,
EJB. Introduction Enterprise Java Beans is a specification for creating server- side scalable, transactional, multi-user secure enterprise-level applications.
1. Begin Quick Start 2. Administration 3. Good to Know 4. Slightly Technical 5. User Experience 6. You are ready to go !
1 FRED – open source registry system CZ.NIC, z.s.p.o. Jaromír Talíř
draft-rescorla-fallback-01
Using NPAC as the ENUM Registry
TeRI and the MODERN Framework
draft-ietf-geopriv-lbyr-requirements-02 status update
MODERN Managing, Ordering, Distributing, Exposing, & Registering telephone Numbers IETF 101.
Software requirements
IPNNI SHAKEN Enterprise Models: LEMON TWIST
Routing Considerations
STIR Certificate delegation
ENUM successes – failures - alternatives
Presentation transcript:

draft-peterson-modern- problems-04 Jon Peterson MODERN WG IETF 95 (Buenos Aires)

What is this document? Problem statement Framework – Actor roles – Data types Use Cases – Acquisition – Management – Retrieval

Changes in -04 We had an interim to review the -03 Added a Registrar as an actor – Now has a more traditional registry/registrar split Changed a lot of end-user specific text – “Acquisition” of numbers controversial on the list – Now focuses much more on freephone RespOrg This is a practical use case today Moved out text on distributed registries – Now mostly point to DRIP, beyond defining terms Fixed many of the use cases to conform with this

Roles of Actors Numbering Authorities – Regulators, etc. – Roots of authorities (never acquire blocks) No “golden” root, all is relative Registries – Manages core number allocation functions, handles requests for numbers from registrars Registrars – Has relationships with CSPs/Users to provide numbers – often is also a CSP Communication Service Provider (CSP) – Provides services to users – May include traditional carriers, enterprises, OTT providers, etc. Users – Individuals reachable through a communications service – Operate clients, black phones, etc. Government entities – Privileged access to data

A Picture Roles are logical A numbering authority could act as a registry – Or delegate that to some entity A CSP could act as a registrar – One that keeps inventory An Enterprise could acquire numbers from a CSP/registrar – Then delegates down Users get numbers through delegation – In other pictures, users might contract with registrars themselves, as with freephone RespOrgs User 10,000s Authority (Registry) Authority (Registry) CSP (Registrar) CSP (Registrar) Enterprise (Delegator) Enterprise (Delegator) 100s 1

Difference between CSP and Registrar CSP – Manages service data – Knows about communications endpoints – Queried in real time during call setup or text message routing – Might be a carrier, might be an OTT provider Registrar – Manages administrative data – Contact information – Billing data – Service CSP – Probably fields requests from Government Entities Both are logical roles, often played by the same administrative entity

Use Cases Acquisition (activating numbers) – User Acquires TN from a Registrar/CSP – Registrar/CSP Acquires TNs from either Registry or another Registrar Management (provisioning for numbers) – User to CSP, or User to Registrar – CSP to CSP, or CSP to Registrar Broken down into Service Data and Administrative Data cases Retrieval (querying about numbers) – Retrieving public data – Retrieving semi-restricted data (Service or Administrative) – Retrieving Restricted Data Changes with the new registrar/registry model

CSP gets a block Block number case – Credentials would indicate number ranges CSP inventory runs low, it requests a new 1000 block from pooling admin Infrequent enough that Excel-ware still might suffice for now User 10,000s Registry CSP (Registrar) CSP (Registrar) Enterprise (Delegator) Enterprise (Delegator) 100s 1 Acquisition Protocol

Acquiring a number The acquisition tool could let a new phone get a number from its enterprise – Phone gives some information, gets a number and any credential Similar use case for Google, or Skype, or whatever User 10,000s Registry CSP (Registry) CSP (Registry) Enterprise (Delegator) Enterprise (Delegator) 100s 1 Acquisition Protocol

Customer to Registrar (CSP) The acquisition tool could let a new phone get a number from a CSP – Get a new number and any credential – Not necessarily a new number, just provisioning the number to a new device You just bought a new phone at the Apple store, and want to replace an existing account User 10,000s Registry Registrar (CSP) Registrar (CSP) 1 Acquisition Protocol

Customer to Registry? Nah Client Registry 1 Acquisition Protocol

Eyes on the Prize Not presenting the TeRI work today – I would be happy to have agreement on this alone Helpful for things like STIR – Be great to tie this in to methods of credential distribution and access – Probably that is bound to acquisition interfaces And we ultimately do want to get this work to richer queries

Thin Registry (Retrieval) Registry contains largely allocation data – Is this TN in use? Perhaps Registry also points to the CSP Some questions about how to architect this – thoughts welcome… User 10,000s Registry CSP Target Retrieval Protocol Call

Telephone-Related Information Queries Service Info Service Info Acquisition Management TeRI Records Admin Info Admin Info Just a logical picture

Adopt || Die We do need a direction here if the working group is going to move forward I’m not aware anyone has proposed an alternative – Apart from “do nothing” I’m not going to keep presenting this – Yeah, it’s not ready for WGLC, but it’s a good enough start If we’re not adopting this version, I suggest we go do something else with our time than this WG