[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
questions on the ID sent to author before the email reflector site opened with comments!
- To: more@ops.ietf.org
- Subject: questions on the ID sent to author before the email reflector site opened with comments!
- From: paul.reynolds@orange.co.uk
- Date: Fri, 29 Jun 2001 15:28:37 +0100
- Delivery-date: Fri, 29 Jun 2001 07:21:15 -0700
- Envelope-to: more-data@psg.com
The following questions on the ID sent to author before the email reflector site
opened I have repeated the questions together with comments!
*****************************************************************************
Q1) Internet Draft Said: "development of intelligent terminals enabled their
handling of the session control functions. This implied a new framework. It
became possible to have a softswitch architecture supported by an open IP access
infrastructure. This means that the provider of the softswitch doesn't need to
be the same as that of the access network."
A1) The use of Softswtiches can infer 'toll bypass' solutions. What will really
open up the market is the use of IP Multi-media core networks - the work on SIP
in particular allows this.
*****************************************************************************
Q2) Internet Draft Said: MISPs will require basic units of data to support
flexibility in the generation of accounting information for example to account:
A2) add that the MISP should be informed at the end of a session (sic), or at a
tariff change, the actual volume of data that has been sent.
*****************************************************************************
Q3) Internet Draft Said: Although a called party may be identifiable via
different means, the wireless Internet framework should allow the user to be
reachable through a given name, independent of their location.
A3) It is important to allow a user to have a mixture of public and private
identities. A user may have many public identities, but perhaps only one (or a
few) private identity;
paul@orange.co.uk
paul@farminginwells.co.uk
paul@universityofplymouth
*****************************************************************************
Q4) Internet Draft Said In the wireless Internet framework, all service logic
(e.g., providing value-added voice and data services and classical telephony
supplementary services) needs to be separated from the session management
function.
A4) the MISP should be able to choose, but that are some really useful solutions
for providing service using network protocols, or implementations of them - e.g.
JAIN SIP object model, or SIP itself, using back to back user agents.
*****************************************************************************
Q5) Internet Draft on security did not mentioned denial of service. cross check
list against the requirements of RFC 2401.
A5) Bearer and session control correlation is a security issue. If we separate
out the bearer from the session control, then how can the applications be sure
that the bearer is closed, and only running at a rate that the applications have
agreed to - this can be done with Firewall, and Firewall control proxies, but I
think this is a requirement.
*****************************************************************************
Q6) Internet Draft Section on Privacy
A6) should also be able to provide security of the network as well - this
provides a valuable protection against hackers. Here are some examples of
network privacy Carrying out network hiding using SIP hiding methods Encryption
of any tokens that are used to correlate legs in a multi-media session Network
address translation.
*****************************************************************************
Q7) Internet Draft section on fault management:
A7) add in both the historical analyses of problems to determine underlying
problems. Add in pattern matching (something that humans can do) to spot the
underlying problem- perhaps this is what you mean by correlation.
*****************************************************************************
Q8 In the section on Configuration management
A8) Add in the ability for the network management systems to indicate the
software versions, patches, and images that are deployed, as well as auditing
the configuration data deployed.
*****************************************************************************
Q9) Internet Draft the section on services
A9) Add Services based on the registered Id - the fact that you are registered
as paul@universityofplymouth. If we are going to add on CLI, then we should add
the connected line presentation and restriction services.
*****************************************************************************
Q 10) Internet Draft said that the service interface should be agnostic of the
underlying technology
A10) The basic method should allow for it to be agnostic, but if there is
underlying information that can be used - e.g. the fact that someone has a GSM
terminal, and that we can track them to a cell site, this may be of use to an
application.
*****************************************************************************
Q 11) Internet Draft Said. * Inform the home environment of the chargeable
events (e.g. send SDRs).
A11) the home environment will be advised of the event, and then may send an SDR
as a result. Perhaps a better example may be that the QoS has changed as an
event.
*****************************************************************************
Paul Reynolds
*******************************************************************************
Important. This E-mail is intended for the above named person and may be
confidential and/or legally privileged. If this has come to you in error you
must take no action based on it, nor must you copy or show it to anyone; please
inform the sender immediately.
*******************************************************************************