Download presentation
Presentation is loading. Please wait.
Published byElyssa McPherson Modified over 10 years ago
1
Lemonade and Mobile e- mail Stéphane H. Maes – stephane.maes@oracle.com stephane.maes@oracle.com Lemonade Intermediate meeting Vancouver, BC October 2004
2
Motivation Mobile e-mail / high level use cases Main Challenges Deployment patterns Architecture and mappings Scope / objectives for Lemonade
3
Mobile e-mail Mobile e-mail: Access to e-mail while mobile Main Expectations: To receive quasi-instantaneous notification of new e- mails when within coverage (if setup this way) To reflect quasi-instantaneously new e-mail or e-mail server events in the mobile client when within coverage To send quasi-instantaneously e-mail composed on mobile client from appropriate e-mail server when within coverage or as soon that coverage is established otherwise To efficiently manipulate e-mails / drafts / attachment as needed or as preferred End-to-end secure when needed Low or at least bearable cost of usage
4
Mobile e-mail Additional considerations: Format adaptation (attachments) DRM rules Provisioning / setup Charging Synchronization with other clients: Peer to peer vs. with server Relationship to PIM (agenda / Address Book)
5
Mobile e-mail Main actors: User Operator E-mail service provider: Service provider (e.g. Operator, other e-mail server provider) Enterprise Other players in ecosystem: Device Manufacturers Client software providers E-mail server manufacturers: E-mail server Mobile e-mail enablement
6
Challenges (incomplete) Devices: Constrained memory / processing power (always improving): Wide range to support Limited battery life (will remain a problem for a long time): Constrains processing capability Constrains connectivity patterns (not always fully connected but may be awaken via outband notifications…) Constraints acceptable bandwidth More exotic platforms: Sometimes proprietary or closed Challenging or controlled software distribution channels: Installing, provisioning, supporting, upgrading, … E.g. DRM trusted clients Wide range of control models by: device manufacturer, operator, enterprise, user
7
Challenges (incomplete) Networks: (and operators) Different underlying network technologies / bearers with different behavior / capabilities Intermittent connectivity: Loss of coverage Nature of mobility (e.g. radio turned off in planes) Temporary IP addresses Unreliable delivery (Connection) Out band notification schemes Unreliable But can be used as wake up / notification scheme Limited bandwidth: Limited capabilities shared across all users Roaming within and across domain / operators / technologies
8
Challenges (incomplete) Cost: Multiple cost models (free, unlimited, per packet, per service / type of service, …) In general, … Costly Controlled: Wall guarded: Inbound and outbound traffic Internal traffic With its own authentication mechanisms etc… Regulated: QoS Privacy Exchanged data Reachability Logging Accountability …
9
Challenges (incomplete) Enterprises (and other SPs): Wall guarded intranets: Firewalls, VPN, … IT Corporate security guidelines: Wide range – in general VERY conservative e.g. Require end-to-end security Allowed applications / usages / content Firewalls / ports / protocols No storage of company data outside intranet (in clear or not) Regulated: E.g. Journaling / Storage of all corporate e-mails Control usage costs Need to integrate with existing IT infrastructure
10
Deployment patterns 1.Mobile e-mail by operators: operator hosted e-mail service Device in network Mobile enabled email server in Operators Domain Roaming across compatible networks / operators 2.Mobile e-mail by E-mail service provider (enterprise, ISP): Device in operator network (including roaming) Mobile enabled email E-mail server in service provider 3.Outsourced mobile enablement of E-mail service provider: 1.By Operator (operator hosted) 2.By other third party service provider Device in operator network (including roaming) E-mail server in other domain
11
Generic Logical Architecture and Protocols to deal with Mobile e-mail Client Mobile e-mail Enabling Server e-mail Server (Firewalls) Mobile enablers IMAP Mobile Email Protocol Outband Notifications, Provisioning, … Connector (Firewalls)
12
Mapped on deployment models: 1 Mobile e-mail Client Mobile e-mail Enabling Server e-mail Server (Firewalls) Mobile enablers IMAP Mobile Email Protocol Outband Notifications, Provisioning, … Connector (Firewalls) Operator
13
Mapped on deployment models: 2 Mobile e-mail Client Mobile e-mail Enabling Server e-mail Server (Firewalls) Mobile enablers IMAP Mobile Email Protocol Outband Notifications, Provisioning, … Connector (Firewalls) Operator E-mail Service Provider
14
Mapped on deployment models: 3.1 Mobile e-mail Client Mobile e-mail Enabling Server e-mail Server (Firewalls) Mobile enablers IMAP Mobile Email Protocol Outband Notifications, Provisioning, … Connector (Firewalls) Operator E-mail Service Provider
15
Mapped on deployment models: 3.2 Mobile e-mail Client Mobile e-mail Enabling Server e-mail Server (Firewalls) Mobile enablers IMAP Mobile Email Protocol Outband Notifications, Provisioning, … Connector (Firewalls) Operator E-mail Service ProviderThird Party Service Provider
16
Scope / Objectives for Lemonade Will lemonade specify the mobile e-mail protocol or specify a set of IMAP optimizations inspired from mobile e-mail but not necessarily addressing all these issues.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.