1 Use Cases & Requirements IETF#77, Anaheim, CA..

Slides:



Advertisements
Similar presentations
1 Use Cases & Requirements IETF#78, Maastricht, NL.
Advertisements

© 2006 NEC Corporation - Confidential age 1 November SPEERMINT Security Threats and Suggested Countermeasures draft-ietf-speermint-voipthreats-01.
QIPP Digital Technology and ITK Care Co-Ordination: Interoperability WebEx4. 14 th November 2012.
SPPP Protocol Session Peering Provisioning Protocol draft-ietf-drinks-spprov-01.
Nokia Internal Use Only PAWS Database Discovery Some considerations since the last Berlin meeting IETF 88, Vancouver, Canada.
1 Improved DNS Server Selection for Multi-Homed Nodes draft-savolainen-mif-dns-server-selection-04 Teemu Savolainen (Nokia) Jun-ya Kato (NTT) MIF WG meeting.
An Engineering Approach to Computer Networking
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
WHY CENTRALIZED DATA BANKS WON’T WORK FOR HEALTH INFORMATION EXCHANGE (A Lightweight Approach to Implementing a Federated Model for HIE) Rex E. Gantenbein.
ABFAB Multihop Federations draft-mrw-abfab-multihop-fed-01.txt Margaret Wasserman
Unicenter Desktop & Server Management Network Challenges -Latest Revision 11/28/2005.
Locating objects identified by DDI3 Uniform Resource Names Part of Session: Concurrent B2: Reports and Updates on DDI activities 2nd Annual European DDI.
Introduction to networking Dynamic routes. Objectives  Define dynamic routing and its properties  Describe the classes of routing protocols  Describe.
Proposal for App Id and Service Provider Id registration Group Name: Shelby Kiewel Source: Shelby Kiewel, iconectiv / Ericsson,
RIPE64 Enum Working Group DE-CIX NGN Services.
NSIS Authentication, Authorization and Accounting Issues (draft-tschofenig-nsis-aaa-issues-00.txt) Authors: Hannes Tschofenig Henning Schulzrinne Maarten.
Digital Object Architecture
Paper Presentation – CAP Page 2 Outline Review - DNS Proposed Solution Simulation Results / Evaluation Discussion.
© Copyright 2007 Arbinet-thexchange, Inc. All Rights Reserved. Voice Peering Steve Heap Chief Technology Officer.
CRISP Requirements Discussion draft-ietf-crisp-requirements-02.txt Andrew Newton 55 th IETF, November 19, 2002 Atlanta, GA.
© Copyright 2007 Arbinet-thexchange, Inc. All Rights Reserved. VoIP Peering Pilot Using the Internet2 Backbone.
DNS based IP NetLocation Service China Telecom Guangzhou Institute
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
AUKEGGS Architecturally Significant Issues (that we need to solve)
Multihop Federations draft-mrw-abfab-multihop-fed-01.txt Margaret Wasserman
IETF #82 DRINKS WG Meeting Taipei, Taiwan Fri, Nov 18 th
11 December, th IETF, AAA WG1 AAA Proxies draft-ietf-aaa-proxies-01.txt David Mitton.
ALTO BOF Charter Discussion. Charter Iterated (twice) on the list  Several comments on the first version Terminology, caching  No complains on current.
AAA and Mobile IPv6 Franck Le AAA WG - IETF55. Why Diameter support for Mobile IPv6? Mobile IPv6 is a routing protocol and does not deal with issues related.
IETF #81 DRINKS WG Meeting Québec City, QC, Canada Tue, July 26 th, 2011.
1 DRINKS Requirements Design Team Debrief IETF#73, Minneapolis, MN. (Sumanth Channabasappa, on behalf of the design team.)
ARP The Process and the Protocol. Note to reader The information explained in this section is a simplification and extrapolation of the actual ARP determination.
A Brave NEtWork World Rob Willis, Ross & Associates Node Mentoring Workshop New Orleans, LA February 28, 2005.
Path Computation Element (PCE) Discovery using Domain Name System(DNS) draft-wu-pce-dns-pce-discovery-04 Qin Wu ) Dhruv Dhody
Draft-tarapore-mbone- multicast-cdni-06 Percy S. Tarapore, AT&T Robert Sayko, AT&T Greg Shepherd, Cisco Toerless Eckert, Cisco Ram Krishnan, Brocade.
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
Doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 1 Refining the Security Architecture Date: Authors:
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
SPPP Protocol Session Peering Provisioning Protocol draft-ietf-drinks-spprov-01.
Page 1 IETF Speermint Working Group Speermint Requirements/Guidelines for SIP session peering draft-ietf-speermint-requirements-02 IETF 69 - Monday July.
PCE 64 th IETF PCE Policy Architecture draft-berger-pce-policy-architecture-00.txt Lou Berger Igor Bryskin Dimitri Papadimitriou.
A Framework for Session Initiation Protocol User Agent Profile Delivery (draft-ietf-sipping-config-framework-11) SIPPING – IETF 68 Mar 19, 2007 Sumanth.
1 Options Clearing Corporation Encore Data Distribution Services April 22, 2004.
Page 1 IETF Speermint Working Group Speermint draft-ietf-speermint-requirements-04 IETF 71 - Wednesday March 12, 2008 Jean-François Mulé -
S. Ali, K. Cartwright, D. Guyton, A. Mayrhofer, J-F. Mulé Data for Reachability of Inter/tra-NetworK SIP (drinks) DRINKS WG draft-mule-drinks-proto-02.
Page 1 IETF DRINKS Working Group Data Model and Protocol Requirements for DRINKS IETF 72 - Thursday July Tom Creighton -
SPEERMINT Architecture - Reinaldo Penno Juniper Networks SPEERMINT, IETF 70 Vancouver, Canada 2 December 2007.
Draft-peterson-modern- problems-04 Jon Peterson MODERN WG IETF 95 (Buenos Aires)
TIBCO Business Events Online Training. Introduction to TIBCO BE Tibco Business Events is complex event processing software with a powerful engine enables.
Akbar Rahman Juan Carlos Zúñiga Guang Lu IETF 79, November P2P Streaming Requirements for Mobile.
Host Identifier Revocation in HIP draft-irtf-hiprg-revocation-01 Dacheng Zhang IETF 79.
TeRI and the MODERN Framework
Discussions on Heterogeneous Identification Service
Federation Karen Witting.
ATIS/SIP Forum NNI Task Force – Routing Team
Network Services Interface
System Directory for Document Sharing (SDDS)
OmniRAN Introduction and Way Forward
CARD Designteam A. Singh, D. Funato, H. Chaskar, M. Liebsch
nd Vice Chair’s Report - Jan 2011
draft-ipdvb-sec-01.txt ULE Security Requirements
Proposed Specification Framework for TGac – Introductory Comments
Authors: Hannes Tschofenig Henning Schulzrinne Maarten Buechli
Proposed Specification Framework for TGac – Introductory Comments
Change Proposals for SHAKEN Documents
An Analysis of BGP Multiple Origin AS (MOAS) Conflicts
Proposed Specification Framework for TGac – Introductory Comments
OmniRAN Introduction and Way Forward
Proposed Specification Framework for TGac – Introductory Comments
An Engineering Approach to Computer Networking
Presentation transcript:

1 Use Cases & Requirements IETF#77, Anaheim, CA.

2 Introduction The latest I-D revision can be found at: – The design team has since discussed additional use cases, and changes to existing use cases (in -01) – This slide deck presents the existing set of use cases, some of the proposed changes, and a couple of new use cases – Additional use cases will be presented by other participants

3 Recap Registry is the authoritative source for provisioned session establishment data (SED) and related information Local Data Repository is the data store component of an addressing server that provides resolution responses Registry is responsible for distributing SED and related information to the Local Data Repositories Registry Local Data Repository 1. Provision SED 2. Distribute SED Local Data Repository

4 Use Cases in -01 (1 of 2) Process – Near-real-time provisioning – Deferred provisioning – Offline (batch) provisioning Routing – Intra-network SED – Inter-network SED (direct and selective peering) – Support for aggregations (i.e., destination groups) – Indirect (transit) peering – Provisioning an authoritative name server – LUF-only provisioning – LUF + LRF provisioning

5 Use Cases in -01 (2 of 2) Identity – Public Identity operations – TN range operations Administration – Peering Offer/Acceptance – Moving SSP from one destination group to another Number Portability – Need clarity around use cases

6 Comments & Questions (1 of 2) A couple of use cases have been questioned since they introduce protocol complexity without illustrated benefits #1: Aggregation of Data Recipients into a Data Recipient Group, for selective peering – This is only required when you want to modify a set of record routes that are shared by a large number of SSPs; do we expect this? #2: Provisioning using effective date and time – This introduces complexities when a real-time operation changes the state that was prevalent when the deferred operation was requested

7 Comments & Questions (2 of 2) A few new use cases have been proposed; only a couple are presented here #1: Source based LUF response – SSP may wish to present a different target domain, based on the querying entity; for instance, different target domains for international and domestic querying entities #2: Multiple target domains within a LUF-only response – e.g., Authoritative and non-authoritative target domains

(Proposed) Data Model 8

9 Next Steps Discuss and accept/reject the proposed use cases ? Re-check the requirements list? Create a cross-reference of requirements against the protocol documents?