Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.

Similar presentations


Presentation on theme: "Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004."— Presentation transcript:

1 Lemonade and Mobile e- mail Stéphane H. Maes – stephane.maes@oracle.com stephane.maes@oracle.com Lemonade Intermediate meeting Vancouver, BC October 2004

2 Motivation Mobile e-mail / high level use cases Main Challenges Deployment patterns Architecture and mappings Scope / objectives for Lemonade

3 Mobile e-mail Mobile e-mail: Access to e-mail while mobile Main Expectations: To receive quasi-instantaneous notification of new e- mails when within coverage (if setup this way) To reflect quasi-instantaneously new e-mail or e-mail server events in the mobile client when within coverage To send quasi-instantaneously e-mail composed on mobile client from appropriate e-mail server when within coverage or as soon that coverage is established otherwise To efficiently manipulate e-mails / drafts / attachment as needed or as preferred End-to-end secure when needed Low or at least bearable cost of usage

4 Mobile e-mail Additional considerations: Format adaptation (attachments) DRM rules Provisioning / setup Charging Synchronization with other clients: Peer to peer vs. with server Relationship to PIM (agenda / Address Book)

5 Mobile e-mail Main actors: User Operator E-mail service provider: Service provider (e.g. Operator, other e-mail server provider) Enterprise Other players in ecosystem: Device Manufacturers Client software providers E-mail server manufacturers: E-mail server Mobile e-mail enablement

6 Challenges (incomplete) Devices: Constrained memory / processing power (always improving): Wide range to support Limited battery life (will remain a problem for a long time): Constrains processing capability Constrains connectivity patterns (not always fully connected but may be awaken via outband notifications…) Constraints acceptable bandwidth More exotic platforms: Sometimes proprietary or closed Challenging or controlled software distribution channels: Installing, provisioning, supporting, upgrading, … E.g. DRM trusted clients Wide range of control models by: device manufacturer, operator, enterprise, user

7 Challenges (incomplete) Networks: (and operators) Different underlying network technologies / bearers with different behavior / capabilities Intermittent connectivity: Loss of coverage Nature of mobility (e.g. radio turned off in planes) Temporary IP addresses Unreliable delivery (Connection) Out band notification schemes Unreliable But can be used as wake up / notification scheme Limited bandwidth: Limited capabilities shared across all users Roaming within and across domain / operators / technologies

8 Challenges (incomplete) Cost: Multiple cost models (free, unlimited, per packet, per service / type of service, …) In general, … Costly Controlled: Wall guarded: Inbound and outbound traffic Internal traffic With its own authentication mechanisms etc… Regulated: QoS Privacy Exchanged data Reachability Logging Accountability …

9 Challenges (incomplete) Enterprises (and other SPs): Wall guarded intranets: Firewalls, VPN, … IT Corporate security guidelines: Wide range – in general VERY conservative e.g. Require end-to-end security Allowed applications / usages / content Firewalls / ports / protocols No storage of company data outside intranet (in clear or not) Regulated: E.g. Journaling / Storage of all corporate e-mails Control usage costs Need to integrate with existing IT infrastructure

10 Deployment patterns 1.Mobile e-mail by operators: operator hosted e-mail service Device in network Mobile enabled email server in Operators Domain Roaming across compatible networks / operators 2.Mobile e-mail by E-mail service provider (enterprise, ISP): Device in operator network (including roaming) Mobile enabled email E-mail server in service provider 3.Outsourced mobile enablement of E-mail service provider: 1.By Operator (operator hosted) 2.By other third party service provider Device in operator network (including roaming) E-mail server in other domain

11 Generic Logical Architecture and Protocols to deal with Mobile e-mail Client Mobile e-mail Enabling Server e-mail Server (Firewalls) Mobile enablers IMAP Mobile Email Protocol Outband Notifications, Provisioning, … Connector (Firewalls)

12 Mapped on deployment models: 1 Mobile e-mail Client Mobile e-mail Enabling Server e-mail Server (Firewalls) Mobile enablers IMAP Mobile Email Protocol Outband Notifications, Provisioning, … Connector (Firewalls) Operator

13 Mapped on deployment models: 2 Mobile e-mail Client Mobile e-mail Enabling Server e-mail Server (Firewalls) Mobile enablers IMAP Mobile Email Protocol Outband Notifications, Provisioning, … Connector (Firewalls) Operator E-mail Service Provider

14 Mapped on deployment models: 3.1 Mobile e-mail Client Mobile e-mail Enabling Server e-mail Server (Firewalls) Mobile enablers IMAP Mobile Email Protocol Outband Notifications, Provisioning, … Connector (Firewalls) Operator E-mail Service Provider

15 Mapped on deployment models: 3.2 Mobile e-mail Client Mobile e-mail Enabling Server e-mail Server (Firewalls) Mobile enablers IMAP Mobile Email Protocol Outband Notifications, Provisioning, … Connector (Firewalls) Operator E-mail Service ProviderThird Party Service Provider

16 Scope / Objectives for Lemonade Will lemonade specify the mobile e-mail protocol or specify a set of IMAP optimizations inspired from mobile e-mail but not necessarily addressing all these issues.


Download ppt "Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004."

Similar presentations


Ads by Google