80 likes | 86 Views
This workgroup aims to identify important capabilities for the R&E community in video conferencing and categorize them into problem sets. It will help with middleware issues and provide typical cases of video conferencing use. The goal is to analyze the four most important scenarios.
E N D
Vidmid VC working group:Scenarios & workplan Egon Verharen, SURFnet
Scenarios • Purpose: • cast a wide net for important capabilities for the R&E community • categorize those needs into problem sets and prioritize • help with identifying middleware issues • Identification, authentication, authorization, directory services, security, resource discovery, … • describe typical cases of videoconferencing use • Format: title, example, generic format, needed components • Cases: point-to-point, multipoint, interrealm • based on input from vidmid participants • accessible through vidmid website • http://middleware.internet2.edu/video/ • Goal: pick 4 most ‘important’ ones and analyze them
Scenario Process • Work out scenarios • Requirements from prioritized scenarios • Designs from requirements • Implementations, white papers, standards • Testbeds for implementations • Dissemination from implementations and testbeds
Basic scenario • Person A, working on a conferencing capable device, that is registered at organisation X’s ‘gatekeeper’ and directory server, looks up contact information in an authoritative directory to set up a (video)conference connection with person B, registered elsewhere. With a simple click on the presented information and after checking user A’s credentials a call request is send to person B. Person B can check the incoming request on validity and answers if satisfied, after which a conference is initiated, securely if desired. The systems negotiate the best quality available to them.
Architectural issues • Discussed in BoF • For instance • Authentication of users happens to their own security domains, I.e. the client authenticates to their home service. • Authorization decisions are usually made at the target. The target requests attributes from the source to make the authorization decision. • How to authenticate • through web interface • direct access from client • use of existing credentials (cookies, K tickets, certs) • What identifier to authenticate against?What identifier to pass to target for authorization decision? • Interrealm resource discovery
Workplan - goals • Workplan, due 11/15 • Short term goals • Final set of scenarios, including priorities, due 10/15 • Extracted requirements, due 12/1 • Other goals • To develop a set of simple, authenticated desktop videoconference clients, along with the associated directory and authentication components • To identify network-based infrastructure to support community video • To foster interoperability at the identifier, security and video stream levels
Workplan - deliverables • Deliverables • required directory objectclasses and attributes • recommended relationship of video directory to enterprise directory • a SIP video client that can initiate video by target user identifier and present an authenticated initiator identifier to target for access control • (specs for) a H.323 client that can … • a H.323 to SIP gateway • make VRVS directory-enabled • develop protocols for interrealm SIP • Set up testbed • Timelines • Total: 1.5 yr. • Resource requirements • People, equipment
Discussion • What do YOU think ? • Goals • Deliverables • Tyler’s suggestion: to develop models for H.323, as it is the more mature technology, but do so in such a way that they can largely be duplicated in SIP • Michael: do not develop new authentication scheme. Need to accommodate a variety of means of authentication • Timeline • Resources • Come forward • UAB