Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.

Slides:



Advertisements
Similar presentations
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Advertisements

Module 13: Implementing ISA Server 2004 Enterprise Edition: Site-to-Site VPN Scenario.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Enabling IPv6 in Corporate Intranet Networks
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Standards Certification Education & Training Publishing Conferences & Exhibits Using Outbound IP Connections for Remote Access EXPO 2005 Chicago, IL.
Module 5: Configuring Access for Remote Clients and Networks.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
1 Enabling Secure Internet Access with ISA Server.
Discussion on LI for Mobile Clouds
TechEd /20/2017 2:02 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Clinic Security and Policy Enforcement in Windows Server 2008.
Information Systems Today: Managing in the Digital World TB4-1 4 Technology Briefing Networking.
Design Windows Media Services Infrastructure. Module 7: Design Windows Media Services Infrastructure Design Windows Media Services for live streaming.
Chapter 7: Using Windows Servers to Share Information.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
September, 2005What IHE Delivers 1 G. Claeys, Agfa Healthcare Audit Trail and Node Authentication.
Virtual Connectivity Network Virtual Connectivity Networks – Improving Usability and Enhancing Security for Remote Access Jim Kokal Wavetrix President/CEO.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
P-IMAP Draft Overview (
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Crossing firewalls Liane Tarouco Leandro Bertholdo RNP POP/RS.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Lemonade Requirements for Server to Client Notifications
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Operational Security Capabilities for IP Network Infrastructure
China Mobile Mobile Service Jan 24th,2006. Outline ▪Market in China ▪Service Requirements ▪Business Model ▪Expectation.
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
Lemonade Requirements for Server to Client Notifications draft-ietf-lemonade-server-to-client-notifications-00.txt S. H. Maes C. Wilson Lemonade Intermediate.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
P-IMAP Draft Overview (
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
© 2005 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Architecting the Network Part 2 Geoff Huston Chief Scientist, Internet Telstra ISOC Workshop.
Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.
© 2007 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Class 7 Agenda Computer Center Tour Computer Center Tour Text: Strategy & Technology (cont) Text: Strategy & Technology (cont) Collaboration Tools Basics.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Chapter 7: Using Windows Servers
Fundamentals of Information Systems, Sixth Edition
E-business Infrastructure
Virtual Private Networks
Integration of and Third-Generation Wireless Data Networks
CONNECTING TO THE INTERNET
IEEE 802 OmniRAN Study Group: SDN Use Case
Network Address Translation
EA C451 Vishal Gupta.
IETF-59 P-IMAP Draft Overview ( Stéphane H. Maes – Jean.
* Essential Network Security Book Slides.
Goals Introduce the Windows Server 2003 family of operating systems
Virtual Private Network
Firewalls Routers, Switches, Hubs VPNs
Lemonade Requirements for Server to Client Notifications
Presentation transcript:

Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004

Motivation Mobile / high level use cases Main Challenges Deployment patterns Architecture and mappings Scope / objectives for Lemonade

Mobile Mobile Access to while mobile Main Expectations: To receive quasi-instantaneous notification of new e- mails when within coverage (if setup this way) To reflect quasi-instantaneously new or server events in the mobile client when within coverage To send quasi-instantaneously composed on mobile client from appropriate server when within coverage or as soon that coverage is established otherwise To efficiently manipulate s / drafts / attachment as needed or as preferred End-to-end secure when needed Low or at least bearable cost of usage

Mobile Additional considerations: Format adaptation (attachments) DRM rules Provisioning / setup Charging Synchronization with other clients: Peer to peer vs. with server Relationship to PIM (agenda / Address Book)

Mobile Main actors: User Operator service provider: Service provider (e.g. Operator, other server provider) Enterprise Other players in ecosystem: Device Manufacturers Client software providers server manufacturers: server Mobile enablement

Challenges (incomplete) Devices: Constrained memory / processing power (always improving): Wide range to support Limited battery life (will remain a problem for a long time): Constrains processing capability Constrains connectivity patterns (not always fully connected but may be awaken via outband notifications…) Constraints acceptable bandwidth More exotic platforms: Sometimes proprietary or closed Challenging or controlled software distribution channels: Installing, provisioning, supporting, upgrading, … E.g. DRM trusted clients Wide range of control models by: device manufacturer, operator, enterprise, user

Challenges (incomplete) Networks: (and operators) Different underlying network technologies / bearers with different behavior / capabilities Intermittent connectivity: Loss of coverage Nature of mobility (e.g. radio turned off in planes) Temporary IP addresses Unreliable delivery (Connection) Out band notification schemes Unreliable But can be used as wake up / notification scheme Limited bandwidth: Limited capabilities shared across all users Roaming within and across domain / operators / technologies

Challenges (incomplete) Cost: Multiple cost models (free, unlimited, per packet, per service / type of service, …) In general, … Costly Controlled: Wall guarded: Inbound and outbound traffic Internal traffic With its own authentication mechanisms etc… Regulated: QoS Privacy Exchanged data Reachability Logging Accountability …

Challenges (incomplete) Enterprises (and other SPs): Wall guarded intranets: Firewalls, VPN, … IT Corporate security guidelines: Wide range – in general VERY conservative e.g. Require end-to-end security Allowed applications / usages / content Firewalls / ports / protocols No storage of company data outside intranet (in clear or not) Regulated: E.g. Journaling / Storage of all corporate s Control usage costs Need to integrate with existing IT infrastructure

Deployment patterns 1.Mobile by operators: operator hosted service Device in network Mobile enabled server in Operators Domain Roaming across compatible networks / operators 2.Mobile by service provider (enterprise, ISP): Device in operator network (including roaming) Mobile enabled server in service provider 3.Outsourced mobile enablement of service provider: 1.By Operator (operator hosted) 2.By other third party service provider Device in operator network (including roaming) server in other domain

Generic Logical Architecture and Protocols to deal with Mobile Client Mobile Enabling Server Server (Firewalls) Mobile enablers IMAP Mobile Protocol Outband Notifications, Provisioning, … Connector (Firewalls)

Mapped on deployment models: 1 Mobile Client Mobile Enabling Server Server (Firewalls) Mobile enablers IMAP Mobile Protocol Outband Notifications, Provisioning, … Connector (Firewalls) Operator

Mapped on deployment models: 2 Mobile Client Mobile Enabling Server Server (Firewalls) Mobile enablers IMAP Mobile Protocol Outband Notifications, Provisioning, … Connector (Firewalls) Operator Service Provider

Mapped on deployment models: 3.1 Mobile Client Mobile Enabling Server Server (Firewalls) Mobile enablers IMAP Mobile Protocol Outband Notifications, Provisioning, … Connector (Firewalls) Operator Service Provider

Mapped on deployment models: 3.2 Mobile Client Mobile Enabling Server Server (Firewalls) Mobile enablers IMAP Mobile Protocol Outband Notifications, Provisioning, … Connector (Firewalls) Operator Service ProviderThird Party Service Provider

Scope / Objectives for Lemonade Will lemonade specify the mobile protocol or specify a set of IMAP optimizations inspired from mobile but not necessarily addressing all these issues.