VP - IMPP Virtual Presence CoBrow Instant Message Persistent Presence Klaus H. Wolf Cyland AG / Ulm University
VP-IMPP Virtual Presence The Web seems to be lifeless But there are people VP makes people visible Meeting people on the Web
VP-IMPP Function Users move through the web VP server computes virtual neighbors VP client displays neighbors
VP-IMPP VP Display VP client displays peers Welcome to There are 13 users on these pages, take your time to check things out.
VP-IMPP VP Infrastructure Client based VP clients supply information Server based Document servers supply information Installation of VP components Network based ISP supplies VP data
VP-IMPP Federated Servers VP to cover a large part of the Web Multiple VP servers Virtual Presence across server borders
VP-IMPP Persistent Presence Users want to know if you can be reached o (active homepage example) know how to reach you tell how they want to be reached dynamically, automatically
VP-IMPP Presence System User Proxy persistant access point hide details Presence System ROW User
VP-IMPP Presence Information Caller GET online-state for kermit is online for IM and telephone im://aol.com/kermit SEND IM to kermit GET IM-address IM AOL IM
VP-IMPP Presence Servers frog.com kermit.frog.com aol.com im://aol.com/frog/kermit im://frog.com/kermit im://kermit.frog.com/ client-server peer-peer
VP-IMPP VP & PP VP client shows information on virtual neighbors PP client shows information on buddies Information bits: Name, icon Online status, contact address Location PP is a subset of VP
VP-IMPP Notes on IMPP Technical discussion PIDF (XML or not) PITP (TCP vs. UDP, WAP) Addressing (URL vs. ) Substrate (SMTP, HTTP, SIP) Client-server vs. server backbone Authentication, spamming Missing working de-facto standard
VP-IMPP IMPP status At least 2 months behind schedule IMPP drafts out Private proposals out IETF put IMPP to sleep (dormant) Slow progress Waiting for new ideas, new people Stepping back and re-thinking AD expect proposals by June 15 Danger: IMPP Forum
VP-IMPP Security Every message must be authenticated Public key authentication PKIX (IETF) signature verification