VP - IMPP Virtual Presence CoBrow Instant Message Persistent Presence Klaus H. Wolf Cyland AG / Ulm University

Slides:



Advertisements
Similar presentations
Presence and IM as SIP Services Jonathan Rosenberg Chief Scientist.
Advertisements

SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Fall IM 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
SIMPLE Open Issues Jonathan Rosenberg dynamicsoft IETF 52.
VON Europe /19/00 SIP and the Future of VON Protocols SIP and the Future of VON Protocols: Presence and IM Jonathan Rosenberg.
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Cloud PIV Authentication and Authorization Demo PIV Card User Workstation Central Security Server In order to use Cloud Authentication and Authorization.
Unified communications platform Enterprise-ready.
Fall VON Developers’ Conference – 09/13/00 SIP Update IMPS – Instant Messaging and Presence Using SIP Steve Donovan Architect.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
(4.4) Internet Protocols Layered approach to Internet Software 1.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Internet…issues Managing the Internet
The Internet. What is the Internet? A community with about 100 million users Available in almost every country about 160,000 people are added each month.
1 of 3 Open Outlook On the Tools menu, click Account Settings. 1 Enable Outlook Anywhere 2 Click your Microsoft Exchange account, and then click.
Introduction to the Application Layer Computer Networks Computer Networks Spring 2012 Spring 2012.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Introduction 1 Lecture 5 Application Layer slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering Department.
Fermilab VPN Service What is a VPN ?.
CHAPTER THE INTERNET, THE WEB, AND ELECTRONIC COMMERCE 22.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
1 of 4 Use Microsoft ® Office Communicator 2007 for secure Instant Messaging (IM) your Microsoft ® Exchange Server 2007, MSN, AOL, and Yahoo! contacts.
Chapter 2, slide: 1 CS 372 – introduction to computer networks* Monday June 28 Announcements: r Lab 1 is due today r Lab 2 is posted today and is due next.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
CMPTR Chapter 5.
Throughput: Internet scenario
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
1 Chapter 2 (Continued) Section 2.2 Section 2.2. Internet Service Provider (ISP) ISP - a company that connects you through your communications line to.
1 Computer Communication & Networks Lecture 28 Application Layer: HTTP & WWW p Waleed Ejaz
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Pindaro Demertzoglou Lally School of M&T Internet-Intranets-Extranets.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
World Wide Web Hypertext model Use of hypertext in World Wide Web (WWW) WWW client-server model Use of TCP/IP protocols in WWW.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Sockets process sends/receives messages to/from its socket
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
CoBrow Collaborative Browsing A Virtual Presence Service RE 1003 RE 4003.
The Web and Web Services Jim Graham NR 621 Spring 2009.
An analysis of Skype protocol Presented by: Abdul Haleem.
Data Manipulation Jonathan Rosenberg dynamicsoft.
Integrating and Troubleshooting Citrix Access Gateway.
SIP and MMS Jonathan Rosenberg Chief Scientist. SIP What Is It? European Technology for Enhanced Messaging Specified by 3GPP, WAP Forum Different.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
Project Objectives A multi-function programmable SIP user agent for multimedia communications, such as audio, video, white board, desktop sharing, shared.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
IETF 67 – SPEERMINT WG Presence Use Cases draft-houri-speermint-usecase-presence-00 Avshalom Houri – IBM Edwin Aoki – AOL LLC Sriram Parameswar - Microsoft.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
Presented by Deepak Varghese Reg No: Introduction Application S/W for server load balancing Many client requests make server congestion Distribute.
Skype.
Instructor Materials Chapter 5 Providing Network Services
Building Distributed Educational Applications using P2P
Some Common Terms The Internet is a network of computers spanning the globe. It is also called the World Wide Web. World Wide Web It is a collection of.
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Chapter 2 Introduction Application Requirements VS. Transport Services
Working at a Small-to-Medium Business or ISP – Chapter 7
Configuring Internet-related services
E-commerce Infrastructure
Internet Applications & Programming
Computer Networks Protocols
Presentation transcript:

VP - IMPP Virtual Presence CoBrow Instant Message Persistent Presence Klaus H. Wolf Cyland AG / Ulm University

VP-IMPP Virtual Presence The Web seems to be lifeless But there are people VP makes people visible Meeting people on the Web

VP-IMPP Function Users move through the web VP server computes virtual neighbors VP client displays neighbors

VP-IMPP VP Display VP client displays peers Welcome to There are 13 users on these pages, take your time to check things out.

VP-IMPP VP Infrastructure Client based  VP clients supply information Server based  Document servers supply information  Installation of VP components Network based  ISP supplies VP data

VP-IMPP Federated Servers VP to cover a large part of the Web Multiple VP servers Virtual Presence across server borders

VP-IMPP Persistent Presence Users want to  know if you can be reached o (active homepage example)  know how to reach you  tell how they want to be reached  dynamically, automatically

VP-IMPP Presence System User Proxy  persistant access point  hide details Presence System ROW User

VP-IMPP Presence Information Caller GET online-state for kermit is online for IM and telephone im://aol.com/kermit SEND IM to kermit GET IM-address IM AOL IM

VP-IMPP Presence Servers frog.com kermit.frog.com aol.com im://aol.com/frog/kermit im://frog.com/kermit im://kermit.frog.com/ client-server peer-peer

VP-IMPP VP & PP VP client shows information on virtual neighbors PP client shows information on buddies Information bits:  Name, icon  Online status, contact address  Location PP is a subset of VP

VP-IMPP Notes on IMPP Technical discussion  PIDF (XML or not)  PITP (TCP vs. UDP, WAP)  Addressing (URL vs. )  Substrate (SMTP, HTTP, SIP)  Client-server vs. server backbone  Authentication, spamming Missing working de-facto standard

VP-IMPP IMPP status At least 2 months behind schedule IMPP drafts out Private proposals out IETF put IMPP to sleep (dormant)  Slow progress  Waiting for new ideas, new people  Stepping back and re-thinking  AD expect proposals by June 15 Danger: IMPP Forum

VP-IMPP Security Every message must be authenticated Public key authentication PKIX (IETF) signature verification