SlideShare a Scribd company logo
1 of 25
@ IETF 68
Note Well ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Administrative ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object]
BLISS Problem Statement and Motivation Jonathan Rosenberg Cisco
What is the Problem? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The “Too Many Choices” Variations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example: Call Park  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Park Server UA 1 Caller UA 2 1 2 3
Approach 1: REFER to Caller ,[object Object],[object Object],[object Object],Park Server UA 1 Caller UA 2 1 2
Approach 2: REFER to Park Server ,[object Object],[object Object],[object Object],Park Server UA 1 Caller UA 2 1 2
Approach 3: KPML App ,[object Object],[object Object],[object Object],[object Object],[object Object],Park Server UA 1 Caller UA 2 1 2 3 4
The Mix-N-Match Problem ,[object Object],[object Object],[object Object],[object Object]
Mix 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Park Server UA 1 Caller UA 2 1
Mix 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Park Server UA 1 Caller 1 2 3 4
How do we fix this? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Example: Park ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Challenge 1: Vendor Variation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Challenge 2: Feature Variation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example: DND Treatment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How do we do this? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is a ‘component’? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Design Constraints ,[object Object],[object Object],[object Object]
Proposed Deliverables ,[object Object],[object Object],[object Object],[object Object]
Questions?

More Related Content

What's hot

Roadmap Integral Enterprise
Roadmap Integral EnterpriseRoadmap Integral Enterprise
Roadmap Integral Enterprise
Telepage BV
 
Jason Fischl The Softphone And The Pbx
Jason Fischl The Softphone And The PbxJason Fischl The Softphone And The Pbx
Jason Fischl The Softphone And The Pbx
Carl Ford
 
Conexant Enterprise Ip Telephony
Conexant  Enterprise Ip TelephonyConexant  Enterprise Ip Telephony
Conexant Enterprise Ip Telephony
graham_haney
 
Globalinx Commercial0908
Globalinx Commercial0908Globalinx Commercial0908
Globalinx Commercial0908
biafran
 
Netwave Telecom
Netwave TelecomNetwave Telecom
Netwave Telecom
kvanheyst
 

What's hot (20)

PABX Concept & Avaya IP Office
PABX Concept & Avaya IP OfficePABX Concept & Avaya IP Office
PABX Concept & Avaya IP Office
 
Avaya VoIP Presentation
Avaya VoIP PresentationAvaya VoIP Presentation
Avaya VoIP Presentation
 
Roadmap Integral Enterprise
Roadmap Integral EnterpriseRoadmap Integral Enterprise
Roadmap Integral Enterprise
 
VOIP Design & Implementation
VOIP Design & ImplementationVOIP Design & Implementation
VOIP Design & Implementation
 
Simplesignalbusinessvoip(Power Point)
Simplesignalbusinessvoip(Power Point)Simplesignalbusinessvoip(Power Point)
Simplesignalbusinessvoip(Power Point)
 
Jason Fischl The Softphone And The Pbx
Jason Fischl The Softphone And The PbxJason Fischl The Softphone And The Pbx
Jason Fischl The Softphone And The Pbx
 
Avaya IP Office Demo V4 2
Avaya IP Office Demo V4 2Avaya IP Office Demo V4 2
Avaya IP Office Demo V4 2
 
Avaya IP Office Overview
Avaya IP Office OverviewAvaya IP Office Overview
Avaya IP Office Overview
 
Conexant Enterprise Ip Telephony
Conexant  Enterprise Ip TelephonyConexant  Enterprise Ip Telephony
Conexant Enterprise Ip Telephony
 
Aspect Unified IP Overview and Physical Architecture
Aspect Unified IP Overview and Physical ArchitectureAspect Unified IP Overview and Physical Architecture
Aspect Unified IP Overview and Physical Architecture
 
Hosted Ip
Hosted IpHosted Ip
Hosted Ip
 
Complete VoIP Software Solution to fulfill Your VoIP Business needs
Complete VoIP Software Solution to fulfill Your VoIP Business needsComplete VoIP Software Solution to fulfill Your VoIP Business needs
Complete VoIP Software Solution to fulfill Your VoIP Business needs
 
XO Communications Hosted PBX
XO Communications Hosted PBXXO Communications Hosted PBX
XO Communications Hosted PBX
 
Ip Office R5 Ip10
Ip Office R5 Ip10Ip Office R5 Ip10
Ip Office R5 Ip10
 
Sip trunking-requirements
Sip trunking-requirementsSip trunking-requirements
Sip trunking-requirements
 
Globalinx Commercial0908
Globalinx Commercial0908Globalinx Commercial0908
Globalinx Commercial0908
 
Hosted PBX Suite
Hosted PBX SuiteHosted PBX Suite
Hosted PBX Suite
 
Avaya IP Office Customer Call Reporter
Avaya IP Office Customer Call ReporterAvaya IP Office Customer Call Reporter
Avaya IP Office Customer Call Reporter
 
Netwave Telecom
Netwave TelecomNetwave Telecom
Netwave Telecom
 
A glimpse of voice technology
A glimpse of voice technologyA glimpse of voice technology
A glimpse of voice technology
 

Similar to BLISS Problem Statement and Motivation

Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacks
Editor IJCATR
 

Similar to BLISS Problem Statement and Motivation (20)

X-Device Service Discovery
X-Device Service DiscoveryX-Device Service Discovery
X-Device Service Discovery
 
Building a microservice architecture for a 100mio# revenue company
Building a microservice architecture for a 100mio# revenue companyBuilding a microservice architecture for a 100mio# revenue company
Building a microservice architecture for a 100mio# revenue company
 
Sip
SipSip
Sip
 
Introduction To SIP
Introduction  To  SIPIntroduction  To  SIP
Introduction To SIP
 
Rfp template
Rfp templateRfp template
Rfp template
 
Jenniffer
JennifferJenniffer
Jenniffer
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacks
 
ALOE Transit SBC rev.1 Presentation
ALOE Transit SBC rev.1 PresentationALOE Transit SBC rev.1 Presentation
ALOE Transit SBC rev.1 Presentation
 
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
 
VoLTE KPI Performance Explained
VoLTE KPI Performance ExplainedVoLTE KPI Performance Explained
VoLTE KPI Performance Explained
 
Video Traffic Management
Video Traffic ManagementVideo Traffic Management
Video Traffic Management
 
Sip server technicaloverviewwhitepaper
Sip server technicaloverviewwhitepaperSip server technicaloverviewwhitepaper
Sip server technicaloverviewwhitepaper
 
OFC2016 SDN Framework and APIs
OFC2016 SDN Framework and APIsOFC2016 SDN Framework and APIs
OFC2016 SDN Framework and APIs
 
O2 Presentation Sdp Event
O2 Presentation Sdp EventO2 Presentation Sdp Event
O2 Presentation Sdp Event
 
Mobile Devices and Wi-Fi
Mobile Devices and Wi-FiMobile Devices and Wi-Fi
Mobile Devices and Wi-Fi
 
Middleware
MiddlewareMiddleware
Middleware
 
Middleware1
Middleware1Middleware1
Middleware1
 
Telepresence Interoperability Testing
Telepresence Interoperability TestingTelepresence Interoperability Testing
Telepresence Interoperability Testing
 
Sip Protocol
Sip ProtocolSip Protocol
Sip Protocol
 
Telepresence Testing Approach by Shenick
Telepresence Testing Approach by ShenickTelepresence Testing Approach by Shenick
Telepresence Testing Approach by Shenick
 

More from Dan York

Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Dan York
 

More from Dan York (17)

Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible) Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
 
SIPNOC 2014 - Is It Time For TLS for SIP?
SIPNOC 2014 - Is It Time For TLS for SIP?SIPNOC 2014 - Is It Time For TLS for SIP?
SIPNOC 2014 - Is It Time For TLS for SIP?
 
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
 
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
 
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 HackathonDNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
 
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
 
The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...
The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...
The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...
 
How IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About ItHow IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About It
 
SIP, Unified Communications (UC) and Security
SIP, Unified Communications (UC) and SecuritySIP, Unified Communications (UC) and Security
SIP, Unified Communications (UC) and Security
 
ClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin SteveClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin Steve
 
SIP Trunking & Security in an Enterprise Network
SIP Trunking & Security  in an Enterprise NetworkSIP Trunking & Security  in an Enterprise Network
SIP Trunking & Security in an Enterprise Network
 
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XMLOSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
 
IP Telephony Security 101
IP Telephony Security 101IP Telephony Security 101
IP Telephony Security 101
 
Recording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/SkypeRecording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/Skype
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To Know
 
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best PracticesE Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
 
ETel2007: The Black Bag Security Review (VoIP Security)
ETel2007: The Black Bag Security Review (VoIP Security)ETel2007: The Black Bag Security Review (VoIP Security)
ETel2007: The Black Bag Security Review (VoIP Security)
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

BLISS Problem Statement and Motivation