Topics Ahead …. What would the WG produce?

Slides:



Advertisements
Similar presentations
IPP Notification and Notification Services White Paper Hugo Parra; Novell, Inc. October 6, 1999 The intent of this paper is to supplement the discussions.
Advertisements

Reinventing using REST. Anything addressable by a URI is called a resource GET, PUT, POST, DELETE WebDAV (MOVE, LOCK)
Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.
The working group working environment: Why doesn’t it work as intended? Paul Hoffman VPN Consortium.
Managing Incoming Chapter 3 Bit Literacy. Terminology client – program which retrieves s from a mail server, lets you read the mails,
Electronic Mail. Functionality First software allowed a user to send some text to another user connected to Internet; Current systems allow.
POP3 Post Office Protocol v.3. Intro The Post Office Protocol (POP) is currently the most popular TCP/IP access and retrieval protocol. It implements.
Final Design and Implementation
1 Web Server Administration Chapter 8 Providing Services.
IETF 68 – SIMPLE WG SIMPLE Problem Statement draft-ietf-simple-interdomain-scaling-analysis-00 Avshalom Houri – IBM Tim Rang - Microsoft Edwin Aoki – AOL.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
P2PSIP Charter Proposal Many people helped write this charter…
ACE BOF, IETF-89 London Authentication and Authorization for Constrained Environments (ACE) BOF Wed 09:00-11:30, Balmoral BOF Chairs: Kepeng Li, Hannes.
CPT 499 Internet Skills for Educators Electronic Mail Session Five.
VBE easy VBE Release – New Features Available From 2 October 2006.
1 Using Messages sent from machine to machine and stored for later reading. You will use a client to read –Type mail or pine in UNIX to read.
COMPREHENSIVE Windows Tutorial 4 Working with the Internet and .
Abierman-nanog-30may03 1 XML Router Configs BOF Operator Involvement Andy Bierman
Lemonade Requirements for Server to Client Notifications
05/19/2003 Christiane Schmidt 1 IMAP internet message access protocol.
June 10, 2004IETF 59,5 - Richardson, TX, USA1 lemonade Interim 59,5 Eric Burger Glenn Parsons
System Initialization 1)User starts application. 2)Client loads settings. 3)Client loads contact address book. 4)Client displays contact list. 5)Client.
Lemonade Requirements for Server to Client Notifications draft-ietf-lemonade-server-to-client-notifications-00.txt S. H. Maes C. Wilson Lemonade Intermediate.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
Grouper Training Developers and Architects Advanced Topics Chris Hyzer Internet2 University of Pennsylvania This work licensed under a Creative Commons.
What's new in the World IMAP/LEMONADE/SIEVE (no DKIM or EAI) Alexey Melnikov.
P-IMAP Draft Overview (
Managing Incoming Chapter 3 Bit Literacy. Terminology client – program which retrieves s from a mail server, lets you read the mails,
Concepts  messages are passed through the internet by using a protocol called simple mail transfer protocol.  The incoming messages are.
© 2005 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Data Manipulation Jonathan Rosenberg dynamicsoft.
Unified Distributed (UDub Mail) Life Cycle Objectives Sachin Pradhan Gabriel Maganis.
Slide 1 IETF LEMONADE Greg Vaudreuil (630)
21 November 2002IETF 55 - Atlanta, GA, USA1 lemonade Eric Burger Glenn Parsons
1 © 2003, Cisco Systems, Inc. All rights reserved. Proprietary and Confidential Unity Connection 7.0(1) Messaging Redundancy TOI July 2008 Jane Rygg
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
IETF 69 SIPPING WG Meeting Mohammad Vakil Microsoft An Extension to Session Initiation Protocol (SIP) Events for Pausing and Resuming.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
The mandate of this working group is to facilitate effective service interoperability utilizing SIP in heterogeneous network environments as noted below.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
IETF 67 – SIMPLE WG SIMPLE Problem Statement Draft-rang-simple-problem-statement-01 Tim Rang - Microsoft Avshalom Houri – IBM Edwin Aoki – AOL.
March 25, 2009SIPPING WG IETF-741 A Batch Notification Extension for the Session Initiation Protocol (SIP) draft-johnston-sipping-batch-notify-00 Alan.
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
SHAREPOINTEXCHANGELYNCOFFICE WEB APPS Server to Server Authentication Site Mailboxes High Resolution Photos Task Synchronization Unified Contact.
Topics Ahead …. What would the WG produce? Charter description of what we do Things we don’t do.
CHECKPOINT/CLEARIDLE Overarching Goal Mobile clients need to provide a smooth responsive user experience Draft Goals … Reduce the cost of providing quasi-real-time.
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
SIP file directory draft-garcia-sipping-file-sharing-framework-00.txt draft-garcia-sipping-file-event-package-00.txt draft-garcia-sipping-file-desc-pidf-00.txt.
1 A mechanism for file directory with SIP draft-garcia-sipping-resource-sharing-framework-01.txt draft-garcia-sipping-resource-event-package-01.txt draft-garcia-sipping-resource-desc-pidf-00.txt.
SIP Events: Changes and Open Issues IETF 50 / SIP Working Group Adam Roach
Copyright © 2004, Keith D Swenson, All Rights Reserved. OASIS Asynchronous Service Access Protocol (ASAP) Tutorial Overview, OASIS ASAP TC May 4, 2004.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential XCAP Usage for Publishing Presence Information draft-isomaki-simple-xcap-publish-usage-00.
54 th IETFMMUSIC WG1 54 th IETF – Yokohama 18 July 2002.
NETCONF WG 67 th IETF San Diego, CA, USA November 6, 2006.
Towards Lemonade Profile Version 2 August 3, 2005 IETF 63 - Lemonade 1 Lemonade New Drafts Towards Version 2 of Lemonade Profile Stéphane H. Maes,
9 November 2006IETF 671 SEARCH-WITHIN No major changes Fix nits, references, formatting, non- ASCII characters, boilerplate WGLC Underway.
Mail Server Mail is just a message in any form sends from sender to receiver. Mail Server is a computerized system that is equivalent to virtual post office.
Architecture Review 10/11/2004
Jonathan Rosenberg dynamicsoft
Kue Wong, Nortel Networks
Digium | Switchvox Product Announcement
Markus Isomäki Eva Leppänen
IETF-59 P-IMAP Draft Overview ( Stéphane H. Maes – Jean.
Data collection methodology and NM paradigms
Server To Server Notification protocol requirements draft-decktor-s2s-notif-00 IETF-58 Update Gev Decktor November, 2003.
RR RR Problems Along With Solutions For iPhone And iPad Toll Free ( )
Lemonade Requirements for Server to Client Notifications
Objective 4.01: Compose effective correspondence
Unit – 4 Chap - 2 Mail Delivery System
INTERNET APPLICATIONS
Presentation transcript:

Topics Ahead …. What would the WG produce? Charter description of what we do Things we don’t do

Deliverables same administrative domain CPP System Clients IMAP? mail Store BLAST Protocol Notification Service Event: UnseenMsgs=567 XMPP Server SIP same administrative domain CPP System Clients IMAP? Possible documents Architecture BLAST Protocol Schema describing state & state changes in XML How a client addresses the mailbox in the CPP system TODO Replace Picture

Charter (Big picture before scoping) This WG goal is to allow mail stores to use existing presence systems to announce state changes in the mail store. The group will define a protocol to deliver information from the mail store to a notification server that is a part of one or more presence systems. Additionally the group will define the information that is required for common client operations and provide a naming scheme for each presence protocol so that it is clear how a given mailbox in the mail store is addressed as a resource in the presence systems.

Charter (Security Issues) The presence system will authorize the clients to retrieve the data. The notification server is constrained to be in the same administrative domain as the mail store, trusted with the information the mail store sends to it, and that there are no bandwidth limitations between the two.

Charter (Consumers) The state is meant for consumption by clients that are automata not humans

Charter (Type of state) The information to be delivered in base spec: Number of messages that are: seen, unseen, and deleted Possible Extensions: Information about most recent message including: UID, From, To, date, abbreviated subject and possibly abbreviated body Counts by message type (fax, voicemail, mail) Information about list of personal mailbox names available Current quota limit both in number of messages and octets and if current usage is above or below specific thresholds

Charter (Filtering) Initially the WG will support filtering on only mailbox name and type of state

Charter (named mailbox) Support selectable mailbox names but no support for names that embed a query to create a new virtual mailbox.

Charter (Limitations) Did we mention this was NOT IMAP OVER SIP Does not deliver the full state of the mail store

Charter (BLAST Protocol) The protocol from the mail store to the notification server is a simple protocol that simply pushes state from the mail store to notification server. It is assumed that they are in the same trust domain and once the mail store has determined it has connected to the correct notification server, it can send all information with no other authorization and the notification server will deal with authorizations for access to the data. The notification server will assume that all state has been delivered to it and is refreshed within a defined period to keep the mail store and notification server in sync.

Questions Do we have any common clue on what we want to do? Do we have people interested in building such a system? Do we have people who will write drafts? Do we have people that will review drafts and participate in meetings? Step 0: Come DOWN on use cases Check if people will do that set Check this arch works for that set Think about the authorization / delegation of blast in the use case