Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.

Similar presentations


Presentation on theme: "Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004."— Presentation transcript:

1 Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004

2 Motivation Mobile / high level use cases Main Challenges Deployment patterns Architecture and mappings Scope / objectives for Lemonade

3 Mobile Mobile Access to while mobile Main Expectations: To receive quasi-instantaneous notification of new e- mails when within coverage (if setup this way) To reflect quasi-instantaneously new or server events in the mobile client when within coverage To send quasi-instantaneously composed on mobile client from appropriate server when within coverage or as soon that coverage is established otherwise To efficiently manipulate s / drafts / attachment as needed or as preferred End-to-end secure when needed Low or at least bearable cost of usage

4 Mobile Additional considerations: Format adaptation (attachments) DRM rules Provisioning / setup Charging Synchronization with other clients: Peer to peer vs. with server Relationship to PIM (agenda / Address Book)

5 Mobile Main actors: User Operator service provider: Service provider (e.g. Operator, other server provider) Enterprise Other players in ecosystem: Device Manufacturers Client software providers server manufacturers: server Mobile enablement

6 Challenges (incomplete) Devices: Constrained memory / processing power (always improving): Wide range to support Limited battery life (will remain a problem for a long time): Constrains processing capability Constrains connectivity patterns (not always fully connected but may be awaken via outband notifications…) Constraints acceptable bandwidth More exotic platforms: Sometimes proprietary or closed Challenging or controlled software distribution channels: Installing, provisioning, supporting, upgrading, … E.g. DRM trusted clients Wide range of control models by: device manufacturer, operator, enterprise, user

7 Challenges (incomplete) Networks: (and operators) Different underlying network technologies / bearers with different behavior / capabilities Intermittent connectivity: Loss of coverage Nature of mobility (e.g. radio turned off in planes) Temporary IP addresses Unreliable delivery (Connection) Out band notification schemes Unreliable But can be used as wake up / notification scheme Limited bandwidth: Limited capabilities shared across all users Roaming within and across domain / operators / technologies

8 Challenges (incomplete) Cost: Multiple cost models (free, unlimited, per packet, per service / type of service, …) In general, … Costly Controlled: Wall guarded: Inbound and outbound traffic Internal traffic With its own authentication mechanisms etc… Regulated: QoS Privacy Exchanged data Reachability Logging Accountability …

9 Challenges (incomplete) Enterprises (and other SPs): Wall guarded intranets: Firewalls, VPN, … IT Corporate security guidelines: Wide range – in general VERY conservative e.g. Require end-to-end security Allowed applications / usages / content Firewalls / ports / protocols No storage of company data outside intranet (in clear or not) Regulated: E.g. Journaling / Storage of all corporate s Control usage costs Need to integrate with existing IT infrastructure

10 Deployment patterns 1.Mobile by operators: operator hosted service Device in network Mobile enabled server in Operators Domain Roaming across compatible networks / operators 2.Mobile by service provider (enterprise, ISP): Device in operator network (including roaming) Mobile enabled server in service provider 3.Outsourced mobile enablement of service provider: 1.By Operator (operator hosted) 2.By other third party service provider Device in operator network (including roaming) server in other domain

11 Generic Logical Architecture and Protocols to deal with Mobile Client Mobile Enabling Server Server (Firewalls) Mobile enablers IMAP Mobile Protocol Outband Notifications, Provisioning, … Connector (Firewalls)

12 Mapped on deployment models: 1 Mobile Client Mobile Enabling Server Server (Firewalls) Mobile enablers IMAP Mobile Protocol Outband Notifications, Provisioning, … Connector (Firewalls) Operator

13 Mapped on deployment models: 2 Mobile Client Mobile Enabling Server Server (Firewalls) Mobile enablers IMAP Mobile Protocol Outband Notifications, Provisioning, … Connector (Firewalls) Operator Service Provider

14 Mapped on deployment models: 3.1 Mobile Client Mobile Enabling Server Server (Firewalls) Mobile enablers IMAP Mobile Protocol Outband Notifications, Provisioning, … Connector (Firewalls) Operator Service Provider

15 Mapped on deployment models: 3.2 Mobile Client Mobile Enabling Server Server (Firewalls) Mobile enablers IMAP Mobile Protocol Outband Notifications, Provisioning, … Connector (Firewalls) Operator Service ProviderThird Party Service Provider

16 Scope / Objectives for Lemonade Will lemonade specify the mobile protocol or specify a set of IMAP optimizations inspired from mobile but not necessarily addressing all these issues.


Download ppt "Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004."

Similar presentations


Ads by Google