page 1 of 29 net-scale technologies, inc. network based personal information and messaging services...
TRANSCRIPT
Page 1 of 29
Net-Scale Technologies, Inc.
Network Based Personal Information Network Based Personal Information and Messaging Servicesand Messaging Services
Urs Muller ([email protected])Beat Flepp ([email protected])
Net-Scale Technologies, Inc.Keyport, NJ, USAwww.net-scale.com
FDIS San FranciscoAugust 12–13, 2002
Page 2 of 29
Net-Scale Technologies, Inc.
OutlineOutline
1. Complexity of Today’s Messaging Reality
2. Solution: Separation of Messaging and Access Infrastructure
3. Steps for Realizing the Solution
4. Economics of the Solution
5. Concluding Remarks
Page 3 of 29
Net-Scale Technologies, Inc.
1.1. Complexity of Today’s Messaging Complexity of Today’s Messaging RealityReality
Page 4 of 29
Net-Scale Technologies, Inc.
MailboxesMailboxes
• E-Mail– Company– Personal– Dedicated for mailing lists and newsgroups
• Voicemail– Company– Mobile– Home
• Fax– Delivered as e-mail
Page 5 of 29
Net-Scale Technologies, Inc.
Unified Messaging/CommunicationUnified Messaging/Communication
• Does not solve the problem of multiple mailboxes
• Multiple mailboxes are here for a reason– Separated for different purposes (e.g., home
and work)– Separated because of multiple service
providers involved (e.g., office and mobile voicemail)
Page 6 of 29
Net-Scale Technologies, Inc.
““Explosion” of Access DevicesExplosion” of Access Devices
• Multiple PCs– Work, home, notebook
• Web browsers– PC, Internet café, Web kiosk
• Handheld devices– Pocket PC, Palm, BlackBerry
• Mobile Phones– Various generations of WAP Phones
Page 7 of 29
Net-Scale Technologies, Inc.
Reasons for Continuously Using Reasons for Continuously Using Different Access DevicesDifferent Access Devices
• Buying a new PC or laptop
• Travel– Internet cafés and Web kiosks– Using a guest office or a friend’s PC
• Broken, stolen, or shared laptop
Page 8 of 29
Net-Scale Technologies, Inc.
Data Storages InvolvedData Storages Involved
Network message store(often limited space)
Local message store
User profile Mailbox credentials Address book Signatures User settings
Network side Client side
Message serverMessage client
Storagelayer
Page 9 of 29
Net-Scale Technologies, Inc.
Main ProblemMain Problem
The existence of multiple message servers and multiple message clients leads to a fragmentation of message and user profile data that is hard to manage.
Page 10 of 29
Net-Scale Technologies, Inc.
2.2. Solution: Separation of Messaging Solution: Separation of Messaging and Access Infrastructureand Access Infrastructure
Page 11 of 29
Net-Scale Technologies, Inc.
Separation of Messaging and Access Separation of Messaging and Access InfrastructureInfrastructure
E-mailserver(s)
AddressBooks/
Directories
Message Access Server
Message Access Server
Voicemailserver(s)
VoiceXMLServer
UserProfile
Page 12 of 29
Net-Scale Technologies, Inc.
AT&T WorldNet: Message CenterAT&T WorldNet: Message Center
Page 13 of 29
Net-Scale Technologies, Inc.
PropertiesProperties
• Access to all message types and mailboxes from almost any device
• Single ID and password for multiple mailboxes
• No installation nor configuration required
Drawback: User Profile proprietary and not accessible through the network
Page 14 of 29
Net-Scale Technologies, Inc.
User Profile in the NetworkUser Profile in the Network
User Profile Server
UserProfile
1
2
2
e.g.,cache
Message client
1. Client retrieves user’s mailbox information from profile server in the network.
2. Client contacts all message servers.
Message server 1
Message server 2
Page 15 of 29
Net-Scale Technologies, Inc.
Extensibility of the ConceptExtensibility of the Concept
• All types of message clients – PC based and Web based
• Other services and features– Address books and directories– Network file storage– Calendar, to-do lists, notes– Collaboration tools (shared address books, shared
folders, web publishing)
• Agents– Message filtering, prioritizing– Auto filing, aging– Self learning junk mail filters– Deferring of messages to a later date
Page 16 of 29
Net-Scale Technologies, Inc.
Extended Service OpportunitiesExtended Service Opportunities
User profile
Message server(s)
Calendar server(s)
File storage
Web server(s)
WebInterface 1
Web browsersPC Internet café, kiosk
Pocket PCPalmWAP PhoneBlackberry
Client softwarePCPocket PCPalmBlackberry . . .
WebInterface 2
Agents
AddressBooks/
Directories
Page 17 of 29
Net-Scale Technologies, Inc.
Data Stored in a Network User ProfileData Stored in a Network User Profile
• Mailbox access information and login credentials (e-mail, voicemail)
• Address book: either directly or as a pointer to external address book(s)
• E-mail and other settings (e.g., signatures)
• Pointers and credentials for other resources, e.g., click-to-dial
Page 18 of 29
Net-Scale Technologies, Inc.
Example of a Web Client UIExample of a Web Client UI
Page 19 of 29
Net-Scale Technologies, Inc.
3.3. Steps for Realizing the SolutionSteps for Realizing the Solution
Definition of open specifications (standard) for user profile database
Implementation and deployment of a model service
Page 20 of 29
Net-Scale Technologies, Inc.
Open Specifications (Standard)Open Specifications (Standard)
• Access protocol(s)
• Data fields
• Interface for extensions (experimental and proprietary)
Page 21 of 29
Net-Scale Technologies, Inc.
Model ServiceModel Service
• Good implementation (reliable, fast, useful features)
• Large and economical network-based message store (e-mail server that is optimized for large mailbox size)
• Secure access method (encryption and onetime passwords)
• Secure message exchange
• IMAP4 front-end that maps mailboxes to folders (as a way to use old PC clients)
Page 22 of 29
Net-Scale Technologies, Inc.
Overview of Model ServiceOverview of Model Service
E-mailservers
Directories
Large e-mail store
User profile
Web Interface
IMAP4 InterfaceAddress
book
Web browsers
Local clients
LDAP
IMAP4HTTP
LDAP IMAP4
Page 23 of 29
Net-Scale Technologies, Inc.
Possible ObstaclesPossible Obstacles
• Trust for storing user passwords in the network
• End to end security
• Trust for storing user’s private encryption key in the network (for supporting message encryption)
• Trust for secure access to network profile (e.g., onetime passwords)
Page 24 of 29
Net-Scale Technologies, Inc.
4.4. Economics of the SolutionEconomics of the Solution
Page 25 of 29
Net-Scale Technologies, Inc.
Advantages to End UsersAdvantages to End Users
• Single ID and password to access multiple resources
• Dramatically reduced complexity for configuring PC based mail clients
• Consistent user settings available from all clients (vendor independent)
• Easy to block access to all accounts by changing a single password (the network profile password)
Page 26 of 29
Net-Scale Technologies, Inc.
Advantages to Vendors and Service Advantages to Vendors and Service ProvidersProviders
• Easier to make alternative clients popular (Palm, Pocket PC)
• Easier to sell services at Internet Cafés, Web kiosks, WebTV, and Hotel TV Internet access
• Reduced customer care cost for PC based e-mail clients
• Increased usage of messaging services increases network usage, e.g.,– Mobile phones– Hotel services, including sending messages and click-
to-dial
Page 27 of 29
Net-Scale Technologies, Inc.
Low Cost Market Introduction (about Low Cost Market Introduction (about 10,000 users)10,000 users)
• 2–4 Linux servers
• Sufficient disk space
• Commercial software: LDAP server, IMAP4 server, Web server
• Custom software: Web interface, IMAP4 interface
• Small amount of space in a data center (space, power, backup service, Internet access, and service monitoring)
• Limited customer care and billing infrastructure
• Target market: small businesses and home offices
Page 28 of 29
Net-Scale Technologies, Inc.
5.5. Concluding RemarksConcluding Remarks
Page 29 of 29
Net-Scale Technologies, Inc.
Concluding RemarksConcluding Remarks
• Today’s complexity of message access is overwhelming for many users
• A network user profile – dramatically reduces this complexity and– provides opportunities for many new services
(e.g., agents)
• A strategy for a low cost market introduction and acceptance exists