Diameter Parameter Query draft-winterbottom-dime-param-query-01.txt J. Winterbottom, H. Tschofenig, R. Bellis.

Slides:



Advertisements
Similar presentations
Extensions for Unauthenticated and Unauthorized Devices draft-ietf-ecrit-unauthenticated-access-01 H. Schulzrinne, S. McCann, G. Bajko, H. Tschofenig,
Advertisements

ECRIT Direct Calling draft-winterbottom-ecrit-direct-01 James Winterbottom, Martin Thomson, Hannes Tschofenig, Henning Schulzrinne 1draft-winterbottom-ecrit-direct-01.
VoIP i2 Architecture Part II
Mobile Communication MMS.
5/30/2012. Provides a method for finding services/data on the Exchange Network – discover data. Supports User Friendly Tools Can automatically collect.
BRIAN ROSEN HANNES TSCHOFENIG draft-ietf-ecrit-data-only-ea-02.
What Makes It Work? A Panel Discussion on Next Generation 9-1-1
NENA Development Conference | October 2014 | Orlando, Florida NG9-1-1 PSAP Requirements and Standards Michael Smith, DSS Mike Vislocky, Network Orange.
1Key – Report Creation with DB2. DB2 Databases Create Domain for DB2 Test Demo.
Out of Jurisdiction Emergency Routing draft-winterbottom-ecrit-priv-loc-01.txt James Winterbottom, Hannes Tschofenig, Laura Liess.
NENA’s 11 th Annual Technical Development Conference A proposal to support E911 calls on Voice over IP Networks Martin Dawson – Nortel Networks.
OOdesignProcess1 The Object-Oriented Design Process Part 1: objects & classes.
Draft-ietf-ecrit-location-hiding-req Location Hiding: Problem Statement and Requirements Henning Schulzrinne, Laura Liess, Hannes Tschofenig, Barbara Stark,
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Public Key Encryption that Allows PIR Queries Dan Boneh 、 Eyal Kushilevitz 、 Rafail Ostrovsky and William E. Skeith Crypto 2007.
An SAIC Company Telcordia View of NENA Progress on VoIP Migration Plan Telcordia Contacts: Nadine Abbott (732) An SAIC Company.
Signal Processor User Interaction Module Voice or touch i/pVoice or touch signal Decoded command Command interpretation and executionCommand result Result.
Location Hiding: Problem Statement, Requirements, (and Solutions?) Richard Barnes IETF 71, Philadelphia, PA, USA.
ECRIT interim meeting - May Security Threats and Requirements for Emergency Calling draft-tschofenig-ecrit-security-threats Hannes Tschofenig Henning.
DNS.
SERVER Betül ŞAHİN What is this? Betül ŞAHİN
DATABASE MANAGEMENT SYSTEMS BASIC CONCEPTS 1. What is a database? A database is a collection of data which can be used: alone, or alone, or combined /
DATABASE MANAGEMENT SYSTEMS BASIC CONCEPTS 1. What is a database? A database is a collection of data which can be used: alone, or alone, or combined /
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
NENA Next Generation Architecture
DATABASE. A database is collection of information that is organized so that it can easily be accessed, managed and updated. It is also the collection.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
NENA Development Conference | October 2014 | Orlando, Florida Emergency Incident Data Document (EIDD) Transfer Protocols Jerry Schlesinger, PMP – City.
Computer Science 101 Database Concepts. Database Collection of related data Models real world “universe” Reflects changes Specific purposes and audience.
Entity Framework Overview. Entity Framework A set of technologies in ADO.NET that support the development of data-oriented software applications A component.
Building Information Exchange with First Responders (BIEFR) David Holmberg, NIST June 11, 2009 Slides credit to Alan Vinh.
Draft-rosen-ecrit-emergency- framework-00 Brian Rosen NeuStar CPa
Communication, Networks, The internet and the Worldwide Web.
1 Location Hiding Henning Schulzrinne Laura Liess Hannes Tschofenig.
Introduction to Databases Trisha Cummings. What is a database? A database is a tool for collecting and organizing information. Databases can store information.
HandsFree Profile (HFP) 통신연구소 S/W Team 이상제.
Draft-polk-ecrit-mapping-events-00 James Polk March 21 st, 2006.
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
Diameter Routing Message Priority (DRMP) draft-donovan-dime-drmp-00.txt IET92 Dallas, Texas.
A Routing Extension for HELD draft-winterbottom-ecrit-priv-loc-04 James Winterbottom Hannes Tschofenig Laura Liess.
PSAP Callback draft-ietf-ecrit-psap-callback Phone BCP Status Usage Scenarios.
XP New Perspectives on The Internet, Fifth Edition— Comprehensive, 2005 Update Tutorial 7 1 Mass Communication on the Internet Using Newsgroups Tutorial.
Draft-elwell-sipping- redirection-reason-00 Author: John Elwell
IETF67 DIME WG Towards the specification of a Diameter Resource Control Application Dong Sun IETF 67, San Diego, Nov 2006 draft-sun-dime-diameter-resource-control-requirements-00.txt.
1 Ubiquitous Computing in Home Networks Henning Schulzrinne, Columbia University Stefan Berger, IBM Research IEEE Communication Magazine 2003.
Core VoIP and 911 issues and alternatives Henning Schulzrinne Columbia University August 2003.
SAML for SIP Hannes Tschofenig, Jon Peterson, James Polk, Douglas Sicker, Marcus Tegnander.
ECRIT Basic Reqs draft-stastny-ecrit-requirements Richard Stastny Brian Rosen IETF62 Minneapolis.
ECRIT - Getting Certain URIs, and Alternatives to Getting Emergency Dialstring(s) draft-polk-ecrit-lost-server-uri-00 draft-polk-dhc-ecrit-uri-psap-esrp-00.
Public Safety Answering Point (PSAP) Callbacks draft-ietf-ecrit-psap-callback-02.txt H. Schulzrinne, H. Tschofenig, M. Patel.
17 February 2016 SIPPING - IEPREP Joint Meeting Fred Baker - IEPREP co-chair Rohan Mahy - SIPPING co-chair.
Quality of Service Authorization Diameter QoS Application F. Alfano, P. McCann, H. Tschofenig, T. Tsenov RADIUS QoS Support H. Tschofenig, A. Mankin,T.
1 Database Environment. 2 Objectives of Three-Level Architecture u All users should be able to access same data. u A user’s view is immune to changes.
Display Page (HTML/CSS)
VoIP Emergency Calling Support Telcordia Contacts: Nadine Abbott (732) An SAIC Company Provided to support discussions in.
Extensions to the Emergency Services Architecture for dealing with Unauthenticated and Unauthorized Devices draft-ietf-ecrit-unauthenticated-access-03.txt.
So DNS is A client-server application that maps domain names into their corresponding IP addresses with the help of name servers. Mapping domain names.
© 2015 Airbus DS Communications, Inc. All rights reserved. Lights, Camera, NG9-1-1 Diana Gijselaers/ Solutions Engineer – NG9-1-1 GIS and Core Services.
VOCAB REVIEW. A field that can be computed from other fields Calculated field Click for the answer Next Question.
Database (Microsoft Access). Database A database is an organized collection of related data about a specific topic or purpose. Examples of databases include:
Domain Name System: DNS To identify an entity, TCP/IP protocols use the IP address, which uniquely identifies the Connection of a host to the Internet.
سمینار تخصصی What is PSTN ? (public switched telephone network) تیرماه 1395.
REV 00 Chapter 2 Database Environment DDC DATABASE SYSTEM.
REV 00 Chapter 2 Database Environment DDC DATABASE SYSTEM.
draft-ietf-dime-erp-02
Authentication Authorization Accounting(AAA) Protocol
 DATAABSTRACTION  INSTANCES& SCHEMAS  DATA MODELS.
Hannes Tschofenig Henning Schulzrinne M. Shanmugam
IP Multimedia Subsystem & W-CSCF
3GPP and SIP-AAA requirements
Presentation transcript:

Diameter Parameter Query draft-winterbottom-dime-param-query-01.txt J. Winterbottom, H. Tschofenig, R. Bellis

2 SIP Signaling Protocol Interaction Entities in need for location information - Emergency Services Routing Proxy - Public Safety Answering Point ESRP PSAP Location Server stores information about a particular subscriber or knows where to retrieve it from. Location Server Diameter server collects information about the current attachment point of the device. Diameter Server HELD Diameter Parameter Query Single Admin. Domain

3 Properties Main use case of authors is location information. Then generalized. Corresponds to a “SELECT ‘foo’ FROM database WHERE username=‘bar’; Query contains the AVP codes that are desired for a given user. Response provides the AVPs corresponding to that query.

4 Useful?