Emergency Contacts (ECON) draft-hardie-ecrit-iris-02 Andrew Newton, VeriSign Ted Hardie, Qualcomm Hannes Tschofenig, Siemens Andrew Newton IETF ECRIT Working.

Slides:



Advertisements
Similar presentations
All-Access: one account managers experience with selling the toolbox Rowen Sandel.
Advertisements

The Domain Name System Continuity of Operations Apricot 2008 Taipei TAIWAN 28feb2008.
The Internet Registry Information Service (IRIS) Protocol January 12, 2005 Marcos Sanz, DeNIC Andrew Newton, VeriSign Leslie Daigle, VeriSign.
IPv6 Prefix Discovery Murray S. Kucherawy. Today IPv4-based abuse prevention relies heavily on a database of IP addresses with bad reputations A.
© 2011 TIBCO Software Inc. All Rights Reserved. Confidential and Proprietary. Towards a Model-Based Characterization of Data and Services Integration Paul.
Access 2007 ® Use Databases How can Microsoft Access 2007 help you structure your database?
Additional Data related to an Emergency Call draft-ietf-ecrit-additional-data-00.txt Hannes Tschofenig Brian Rosen.
LoST draft-ietf-ecrit-lost-02 ECRIT Working Group IETF 67 7 November 2006 Andrew Newton Henning Schulzrinne Hannes Tschofenig Ted Hardie.
CISCO NETWORKING ACADEMY Chabot College ELEC Address Resolution Protocol.
1 Dynamic DNS. 2 Module - Dynamic DNS ♦ Overview The domain names and IP addresses of hosts and the devices may change for many reasons. This module focuses.
Slide 1 Many slides from Vitaly Shmatikov, UT Austin Public-Key Infrastructure CNS F2006.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
Consistency in NFS and AFS. Network File System (NFS) Uses client caching to reduce network load Built on top of RPC Server cache: X Client A cache: XClient.
Ownership and auditing. Overview Configure DNS to prepare for Domain Controller installation Checking configuration Running DCPROMO.EXE.
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
Concurrency Control & Caching Consistency Issues and Survey Dingshan He November 18, 2002.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Chapter 10 Configuring DNS
Domain Name Services Oakton Community College CIS 238.
Understanding Active Directory
Network File System (NFS) in AIX System COSC513 Operation Systems Instructor: Prof. Anvari Yuan Ma SID:
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Ernst Langmantel Technical Director, Austrian Regulatory Authority for Broadcasting and Telecommunication (RTR GmbH) The opinions expressed in this presentation.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Emergency calls related work done in IETF Gabor Bajko May 22, 2006.
SDO Emergency Services Coordination Workshop (ESW06) 1 A Location-to-Service Translation Protocol (LoST) & Mapping Protocol Architecture Ted Hardie Andrew.
1 Domain Name System (DNS). 2 DNS: Domain Name System Internet hosts: – IP address (32 bit) - used for addressing datagrams – “name”, e.g.,
Domain Name System (DNS)
SPARQL All slides are adapted from the W3C Recommendation SPARQL Query Language for RDF Web link:
Name Resolution Domain Name System.
Chapter 16 – DNS. DNS Domain Name Service This service allows client machines to resolve computer names (domain names) to IP addresses DNS works at the.
DHCP: Dual-Stack Issues draft-ietf-dhc-dual-stack-01 Tim Chown dhc WG, IETF 60, San Diego, August 2, 2004.
1IETF 63, Remote UI BoF WiDeX Problem Statement Dean Willis Vlad Stirbu RUI BoF, IETF 63, Paris August 2 nd, 2005.
DNS: Domain Name System
1 Application Layer Lecture 6 Imran Ahmed University of Management & Technology.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
5.1 Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
By: Andrew Martin. Description My project is more application based than anything. Going through this class I learned a lot about using T-SQL I wanted.
DNS Zones. DNS records kept in zones DNS server is authoritative for a domain if it hosts the zone for that domain Sub-domains can be kept in same zone.
DEV325 Deploying Visual Studio.NET Applications Billy Hollis Author / Consultant.
Emergency Contacts (ECON) draft-hardie-ecrit-iris-03 Andrew Newton, VeriSign Ted Hardie, Qualcomm Hannes Tschofenig, Siemens Andrew Newton IETF ECRIT Working.
CS 5204 (FALL 2005)1 Leases: An Efficient Fault Tolerant Mechanism for Distributed File Cache Consistency Gray and Cheriton By Farid Merchant Date: 9/21/05.
Draft-rosen-ecrit-emergency- framework-00 Brian Rosen NeuStar CPa
Yang Shi (Richard), Yong Zhang IETF 74 th 26 March 2009, San Francisco CAPWAP WG MIB Drafts Report.
June 6, CRISP Overview and Update Andrew Newton VeriSign Labs
CPSC 441: DNS 1. DNS: Domain Name System Internet hosts: m IP address (32 bit) - used for addressing datagrams m “name”, e.g., - used by.
July 2006IETF66 - ECRIT1 LoST: A Location-to-Service Translation Protocol draft-ietf-ecrit-lost-00 Ted Hardie Andrew Newton Henning Schulzrinne Hannes.
© 2004 VeriSign, Inc. Domain Registry Version 2 (DREG2) Andrew Newton 8 November 2005 IETF 64 CRISP Working Group Vancouver, BC, Canada.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.
Scaling RADIUS to Support a Nationwide Network Access Infrastructure Kostas Kalevras NTUA Network Operations Centre.
Emergency Context Resolution with Internet Technologies BOF (ecrit) Jon Peterson, Hannes Tschofenig BOF Chairs.
IRIS and Application Transports Andrew Newton CRISP Working Group 58 th IETF, Minneapolis, MN, USA November 12, 2003.
Security Threats and Requirements for Emergency Calling draft-tschofenig-ecrit-security-threats-01.txt Hannes Tschofenig, Henning Schulzrinne, Murugaraj.
Class Diagrams. Terms and Concepts A class diagram is a diagram that shows a set of classes, interfaces, and collaborations and their relationships.
THE EVOLUTION OF CODA M. Satyanarayanan Carnegie-Mellon University.
7/11/2005ECRIT Security Considerations1 ECRIT Security Considerations draft-taylor-ecrit-security-threats-00.txt Henning Schulzrinne, Raj Shanmugam, Hannes.
ECRIT interim meeting - Washington, DC - Feb LUMP: Location-to-URL mapping draft-schulzrinne-ecrit-lump Henning Schulzrinne Columbia University.
Downloaded from Lesson 3.
1 Copyright © 2008, Oracle. All rights reserved. Repository Basics.
SASL GSS-API Bridge: GS2
Security Issues with Domain Name Systems
12th April 2007, SDO Emergency Services Workshop 2007
IMPLEMENTING NAME RESOLUTION USING DNS
Active Directory and Group Policy
Net 323 D: Networks Protocols
The Top 10 Reasons Why Federated Can’t Succeed
Personal Narrative.
Ted Hardie Andrew Newton Henning Schulzrinne Hannes Tschofenig
Dept. of Computer Science
Personal Narrative Downloaded from
LUMP: Location-to-URL mapping draft-schulzrinne-ecrit-lump
Presentation transcript:

Emergency Contacts (ECON) draft-hardie-ecrit-iris-02 Andrew Newton, VeriSign Ted Hardie, Qualcomm Hannes Tschofenig, Siemens Andrew Newton IETF ECRIT Working Group 2 August 2005 Paris, France

Service Type + Current approaches to service type are hierarchical lists. ▪ Certain functions are duplicated in the list. ▪ Hierarchy implies preference order. – Do forest rangers have a policing function or just a fire prevention function? + We have broken it down into: ▪ Function ▪ Area ▪ Target + We are not wed to this solution. + Many of the approaches are questionable as to their true applicability to users and user interfaces. + query added to support locally-scoped queries.

Caching + We added caching of answers by end clients. + In the case of civic addresses… ▪ If your civic address does not change within X number of minutes, do not requery. + In the case of geo… ▪ If your coordinates stay within polygon Y for X number of minutes, do not requery.

Database Replication in ECON + We take no single position on database replication with ECON. ▪ It most likely will differ greatly throughout the world. ▪ Isn’t it out of scope? + But we have identified 3 methods of conducting database replication with ECON. ▪ Serialized database entries to a file as specified in IRIS. – And the file transfer protocol of your choice. Many people like SFTP. ▪ ECONREP (ECON Replication) – Interactive IRIS profile. – Replication of entries before they become active. – Incremental replication. ▪ Anything you find that works better for your situation. – RDBMS replication – Shared Network Memory – Osmosis, crystal balls, and strong hope

Caching / Database Replication + Problematic ▪ Are the requirements for a cache or for database replication? ▪ What are the aggregation properties? – What about aggregation of data from different schemas? ▪ How are relationships managed? ▪ Do we really know all the requirements for specifying this? ▪ Intermixing server-to-server semantics with server-to-client semantics is bad. – If a client detects a one millimeter change in location, does it requery? + Charter Issue ▪ Isn’t this out of scope for the working group?

Object Signing Considered Harmful + My house is on fire. Who do I call? ▪ Please update your client with the proper trust anchors. – My house is still on fire. ▪ Please cryptographically verify these URIs. – It’s getting hotter. ▪ Please check this CRL. – Did I mention that my house is on fire? + Object signing is useful for diagnosing problems. ▪ But that happens after the incident, not during. ▪ All the mechanisms to get object signing to work seem to be a pretty heavy price to pay for a diagnostic tool.

Don’t Believe the FUD + IRIS was created in the CRISP working group by TLD operators. ▪ We know a thing or two about high resolution loads, operations of highly available services, and moving data around the globe. + If simple framing of XML is a concern, then we have bigger problems to worry about in ECRIT.