User Identification Solutions in Converging Networks Mike Pluke Castle Consulting Ltd. ETSI User Group ETSI Human Factors Representing:

Slides:



Advertisements
Similar presentations
Information Document 18-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI) (by Mike Pluke, ETSI)
Advertisements

University of Baltimore Telecommunications Technology
Document IPW-111 TIPHON Perspective on VoIP Numbering John Horrocks (DTI) Tiphon WG4 Chair.
0 0 0 BBWF Madrid October 2005 Access-independent Core Networks: Converging towards all-IP Andy Jones Head of Transmission & Interconnectivity Vodafone.
TIGERLEAD.COM. Leads grow faster than home sales Source: TigerLead’s Analysis Million.
July 20, 2000H.323/SIP1 Interworking Between SIP/SDP and H.323 Agenda Compare SIP/H.323 Problems in interworking Possible solutions Conclusion Q/A Kundan.
Mike Pluke1 Universal Communications Identifier (UCI) and the power of profiles Mike Pluke Castle Consulting Ltd. ETSI TC HF & STF265.
Technical Troubleshooting 1. Disclaimer Vendor technology is being shared to illustrate this field and is not an endorsement of the product or vendor.
4/15/2017 5:36 AM 1 © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Presents H.323 Forum ETSI TIPHON Presented by: Richard Brennan - Telxxis LLC Vice-Chair ETSI-TIPHON.
Extending Instant Messaging to Provide Pervasive Personal Communication Wei Li, Fredrik Kilander and Carl Gustaf Jansson {liwei, fk, Department.
MOBILE PHONES ACROSS EUROPE We all know what mobile phones are, but do we really know how do they work and how do they have improved? We are going to.
COS 420 DAY 22. Agenda Assignment 4 Corrected 2 B’s Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due.
NETWORKING CONCEPTS. THE INTERNET When 2 or more n/w are connected they become an internetwork or an internet Eg. Assume an organization has two offices.
Welcome to Web Ping-Pong. Introduction What –Solution to slow web syndrome Why –Information needs to reach destination –Accuracy Time Connection.
PSTN – User ENUM – „Infrastructure ENUM“ An ETSI View Richard Stastny IETF60 San Diego.
Hosted Communications and Services David Byrd Chief Marketing Officer.
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
U.S. Department of Agriculture eGovernment Program August 14, 2003 eAuthentication Agency Application Pre-Design Meeting eGovernment Program.
Why Introduction to Information Technology? (7301) Technology is the driving force of the future – (Computer Professionals for Social Responsibility)
© Copyright 2007 Arbinet-thexchange, Inc. All Rights Reserved. Voice Peering Steve Heap Chief Technology Officer.
 An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network.
Sharing a single IPv4 address among many broadband customers
Telecommunications for the future - 4 Rob Parker CERN IT Division.
Larry Amiot Northwestern University Internet2 Commons Site Coordinator Training September 27, 2004 Austin, Texas Introduction to.
Mobile Communication The SMS implies of several additional elements in the network architecture There is also another Element called.
OSIsoft User Conference Monterey, March 2002 Tank-to-Boardroom: Inventory Management Comes of Age! A web service strategy featuring OSIsoft Technologies.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
User Identification Solutions in Converging Networks Mike Pluke ETSI Specialist Task Force STF 157 Leader of :
Jun Li DHCP Option for Access Network Information draft-lijun-dhc-clf-nass-option-01.
Introduction to SIP Larry Amiot Northwestern University Internet2 Commons Site Coordinator Training March 22, 2004 Indianapolis,
Module 5b: Measuring Household ICT Ms Sheridan Roberts, Consultant Information Society Statistics Tuesday 10 March 2009.
Masalai Communications Igat Hope SMS Solution. Purpose Link Igat Hope with its networks in the 21 provinces in a user-friendly, cost-efficient and effective.
Chapter 17 Internetworking: Concepts, Architecture, and Protocols
Wireless Network Design Principles Mobility Addressing Capacity Security.
An analysis of Skype protocol Presented by: Abdul Haleem.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Document IPW-10 User Identification Solutions in Converging Networks Mike Pluke Castle Consulting Ltd. ETSI Specialist Task Force STF 157 Leader of :
Data Communications and Networking Overview
International Telecommunication Union ENUM: Convergence of Technology and Interests? ITU Tutorial Workshop on ENUM Geneva, February 8, 2002 Robert Shaw.
Patrik Fältström. ITU Tutorial Workshop on ENUM. Feb 8, 2002, Geneva Explanation of ENUM (RFC 2916) Patrik Fältström Area Director, Applications Area,
Egypt -Saudi Arabia - Kuwait 1 Express Arab Overview
Module 2.1 Communication and networks in modern society Theme 2: Let’s communicate!
Home WTE, changing the landscape for voice processing! Every call, Every message.. Take serious control! About us!I-Talk2000 suiteMarketing StrategyLive.
Saatchi, Seyed Mohsen1 Arab Open University - AOU T171 You, Your Computer and the Net: Learning and living in the information age Session 11.
FROM SMOKE SIGNALS …. to the….. ….INTERNET. Session Outline n Introduction n hands on (chat, bulletin board) n discussion.
WHAT IS INFORMATION COMMUNICATION?: INFORMATION COMMUNICATION consists of all technical means used to handle information and aid communication, including.
EurekaWeb is a system that allows you to manage, via Web, residential intrusion and fire alarm control panel.
Keynote August 23, 2011 Charles McClam, USDA Deputy Chief Information Officer 1.
User Identification Solutions in Converging Networks Mike Pluke ETSI STF “User Identification in Converging Networks”
1 Identifying & Reaching Keith G Knightson Nortel Networks Beyond Naming & Addressing ITU-T SG2 Workshop, January 25-27, 2000.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
1 Network Communications A Brief Introduction. 2 Network Communications.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Information Technology Part 2. Part2-2 Next Three Chapters Copyright © 2016 Pearson Education, Inc. Chapter 4 discusses hardware, software, and mobile.
Siân Shordon Schools Broadband Manager Schools’ Broadband Service.
Microsoft Virtual Academy Talbott Crowell | Chief Architect, ThirdM.com Rob Latino | Program Manager in Office 365 Support, Microsoft.
Vodafone Business Cloud
IT in business. In today’s highly competitive economic environment having the right IT in business is a critical element of success. All businesses deal.
Benefits of Cloud Server Hosting. Index What is Cloud HostingCloud Hosting Benefits of Cloud Server HostingCloud Server How to Choose a Cloud Hosting.
Edge Transport servers and Hybrid: Why, or why not?
Server Concepts Dr. Charles W. Kann.
Global Standards Collaboration (GSC) GSC-15
CHAPTER 2 Application Layer.
Managing Online Services
Practical 2 Unit 26 Design a small or home office network
Siân Shordon Schools Broadband Manager
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, July 2010.
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Presentation transcript:

User Identification Solutions in Converging Networks Mike Pluke Castle Consulting Ltd. ETSI User Group ETSI Human Factors Representing:

The Issue The number of communications systems is increasing Each system has its own identification system Telephone Numbers mean very little Contacting people isn’t necessarily getting easier Identification-system developments are uncoordinated

A Typical Case A fixed telephone on their office desk A mobile telephone A fixed (shared) telephone at home An address used for work purposes A personal address used at home A person can have:

Solution Attempts Supplementary services can match people to locations e.g. Call Diversion Mobility solutions can map people to roles e.g. UPT solutions can locate the called party on one of a group of terminals BUT frequently these systems give the wrong results

Current User Identification

People Not Terminals “People are outsiders in the current communications revolution. Computer hosts, pager terminals and telephones are addressable entities throughout the Internet and telephony systems.” Extract from “The Mobile People Architecture” from Stanford University

Human Communication Needs Modern communications systems can create new communication needs BUT Basic communication needs have changed very little since the dawn of man

Early Societies People needed to contact: An Individual “Grey Cloud” A Role Apache Chief A Place Teepee Number 3

The Middle Ages People needed to contact: An Individual “Edward de’Howard” A Role The Queen of England A Place Avery Castle

Today People need to contact: An Individual “Mary Jones” A Role A local locksmith A Place “23 Dearing Lane”

Tomorrow Individuals, roles, groups and places People will still need to contact:

What Needs to Be Done? Discover real user requirements for user identification Develop an implementation-free expression of these requirements Identify potential solution options Create an implementation “Roadmap” for solutions Solutions must work in a competitive environment

Timetable STF HL Start-up meeting (Dec 1999) Formation of Steering Group (Dec 99) Questionnaires on ETSI server (Dec 99) Presentation of User Group results (Feb/Mar 2000) STF HL work (January - July 2000) Publication of ETSI Report (Oct 2000)