Re: audio streaming archive...

2011-04-19 Thread Alexa Morris
VeriLAN is going to check this computer on Wednesday (it's currently  
located at a warehouse) to verify that all recordings were uploaded.  
We'll know more shortly.


Alexa

On Apr 18, 2011, at 12:03 AM, Joel Jaeggli wrote:


On 4/14/11 8:22 PM, Scott Schmit wrote:

On Wed, Apr 13, 2011 at 09:58:24PM -0700, Joel Jaeggli wrote:

there was a naming convention issue on the channel5 recorder which I
thought that we caught all of those by I could be wrong...

The contractor has the channel8 recorder and should be able  
toretrive

the file.


Is there an ETA for the fix to that?


you might want to talk to the secretariate or the contractor (whom I
cced on the previous message) I don't have access to the equipment.

I listened to both the .mp3 and .mp3.1 file for wed-am ch8, and  
neither

sounds like the DANE session to me.



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf



---
Alexa Morris / Executive Director / IETF
48377 Fremont Blvd., Suite 117, Fremont, CA  94538
Phone: +1.510.492.4089 / Fax: +1.510.492.4001
Email: amor...@amsl.com

Managed by Association Management Solutions (AMS)
Forum Management, Meeting and Event Planning
www.amsl.com http://www.amsl.com/

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IAOC: delegating ex-officio responsibility

2011-04-19 Thread John C Klensin


--On Saturday, April 16, 2011 07:51 -0700 Lucy Lynch
lly...@civil-tongue.net wrote:

 The implication is that the people sitting in the positions
 of IAB Chair and  IETF Chair are essential to the good
 operation of the IAOC/Trust.  Someone  else from their groups
 or even someone else that they appoint from outside  cannot
 perform the task of IAOC/Trust member adequately.
 
 I think this is the wrong question. I don't think this is
 about the
 people who sit on the IAOC or the Trust, it is about the
 roles. Their
 participation is part of the chain of accountability to the
 community.
 The IAOC was crafted to include both the IAB and IETF Chairs
 as well
 as the ISOC CEO in their respective roles and not as Fred,
 Harold, and
 Lynn (as members of the IETF community).
 
 Why?
 
 What are the specific contributions (insights and skills)
 that these roles  regularly perform, in the conduct of the
 IAOC/Trust that cannot be performed  adequately by others?
 
 see above.
 
 One more point here: as a former Chair of the IAOC (IAB
 appointed
 member from the community) I'm sympathetic the the overload
 arguments
 but I'll note that absent the IAB/IETF chairs the work of the
 IAOC
 chair and the weight put on that role may increase in
 unexpected ways.
 
 I agree with many of the points that Bob, Brian, Leslie, and
 Jari
 have made in earlier posts and think that we need to take a
 broader
 view of the problems we're trying to solve here. Role overload
 is
 an on-going problem but I'm not sure we solve this by moving
 the
 administrative accountability we gained through BCP 101 to
 additional volunteers.

At the risk of agreeing violently with Dave, I think the series
of comments above, and referenced above, are missing something.
None of this familiy of delegation or someone else proposals
requires that the IAB or IESG Chairs not serve on the IAOC.  If
they think that is sensible and they have the time, they are
free to do that.  We might even strongly encourage it.  However,
if those people conclude that limited available time is better
spent in other ways or that, if they take the IAOC position,
they would not be able to devote adequate attention to it,
aren't we better off giving them the flexibility and discretion
to make that decision?  Similarly, if someone tells the
appointing body I have the time and resources to take on the
IAB Chair or IETF Chair position but only if that position does
not include the responsibility of sitting on the IAOC isn't it
better to give those bodies the option of considering that
person rather than limiting the choices to those who can sign up
for all of the job?

At least from my perspective, broadening the flexibility
available to already-appointed IAB and IETF Chairs and to the
bodies that appoint them is the real issue here.  _Requiring_
that they serve on the IAOC does not create more time or
resources, it just limits the range of people who can take those
positions or, more likely, raises the odds of getting someone
onto the IAOC who won't be able to pay full (or even adequate)
attention.

So. in addition to the questions Dave posed, the question I
would address to you and Bob is whether, given a hypothetical
choice of someone sitting on the IAOC ex-officio but not being
able to really pay attention because he or she concludes that
there are more pressing priorities and having someone
representing the IAB or IESG who really can pay attention, which
one you would pick.  In the worst case, if you prefer to have
the Chairs nominally present but not paying complete attention,
then keep insisting that they are the only ones who can possibly
occupy the IAOC slot.  

As part of that, figure out how you are going to convince the
Nomcom and the IAB that selecting people for the Chair roles
should have will give IAOC first priority regardless of their
judgment about the importance of other aspects of their roles
as an absolute criterion and/or how you are going to convince
the community to recall anyone in the Chair roles who does not
give the IAOC that priority.

best,
  john

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [Speechsc] Last Call: draft-ietf-speechsc-mrcpv2-24.txt (Media Resource Control Protocol Version 2 (MRCPv2)) to Proposed Standard

2011-04-19 Thread Slawomir Testowy
Hello,

my small comment:

The BARGE-IN-OCCURRED method is in few places wrote as BARGE-IN-OCCURED
(note missing R). I wonder how this could go through all 24 MRCPv2
revisions

Regards,
Slawek Testowy

2011/3/16 The IESG iesg-secret...@ietf.org:

 The IESG has received a request from the Speech Services Control WG
 (speechsc) to consider the following document:
 - 'Media Resource Control Protocol Version 2 (MRCPv2)'
  draft-ietf-speechsc-mrcpv2-24.txt as a Proposed Standard

 The IESG plans to make a decision in the next few weeks, and solicits
 final comments on this action. Please send substantive comments to the
 ietf@ietf.org mailing lists by 2011-04-13. (This allows an additional two
 weeks for review since the document is large and the review period overlaps
 the Prague IETF meeting). Exceptionally, comments may be
 sent to i...@ietf.org instead. In either case, please retain the
 beginning of the Subject line to allow automated sorting.

 The file can be obtained via
 http://datatracker.ietf.org/doc/draft-ietf-speechsc-mrcpv2/

 IESG discussion can be tracked via
 http://datatracker.ietf.org/doc/draft-ietf-speechsc-mrcpv2/



 No IPR declarations have been submitted directly on this I-D.
 ___
 Speechsc mailing list
 speec...@ietf.org
 https://www.ietf.org/mailman/listinfo/speechsc
 Supplemental web site:
 lt;http://www.standardstrack.com/ietf/speechscgt;

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [Speechsc] Last Call: draft-ietf-speechsc-mrcpv2-24.txt (Media Resource Control Protocol Version 2 (MRCPv2)) to Proposed Standard

2011-04-19 Thread Slawomir Testowy
Hi!

Some other comments:

 4.2. Managing Resource Control Channels

 When the client wants to add a media processing resource to the
 session, it issues a SIP re-INVITE transaction.

Is it possible to allocate more than one resource of the same type
during one SIP dialog? Example in 4.2 shows how to allocate
synthesizer and recognizer, but does not specify if there may be e.g.
more than one synthesizer.



6.2.9. Content-Encoding


   The content-encoding entity-header is used as a modifier to the
   media-type.  When present, its value indicates what additional
   content encoding has been applied to the entity-body, and thus what
   decoding mechanisms must be applied in order to obtain the media-type
   referenced by the content-type header field.  Content-encoding is
   primarily used to allow a document to be compressed without losing
   the identity of its underlying media type.  Note that the SDP session
   can be used to determine accepted encodings (see Section 7).  This
   header field MAY occur on all messages.

Section 7 describes usage of OPTIONS method of SIP and Accept-Encoding
header is returned by SIP response, not SDP answer, so I guess Note that
the SDP session can be used should be changed to Note that the SIP
session can be used.

   When a CONTROL request to jump backward is issued to a currently
  speaking synthesizer resource, and the target jump point is before
   the start of the current SPEAK request, the current SPEAK request
   MUST restart from the beginning of its speech data and the response
   to the CONTROL request MUST contain this header field with a value of
   true indicating a restart.

Why sometimes requests are surrounded by quotation marks (like SPEAK)
and sometimes not (like CONTROL request)? This happens through all the
specification. This may be a minor nit, but makes the whole paper look like a
draft :)

 8.4.7. Prosody-Parameters

  The prosody parameter headers in the SET-PARAMS or SPEAK request
  only apply if the speech data is of type text/plain and does not use
  a speech markup format.

Why is it so? Why it is not true for Voice-Parameters?
Is it true for CONTROL (i.e. current SPEAK must be text/plain)?

Specification does not say anything about it.

 8.4.16. Load-Lexicon


   This header field is used to indicate whether a lexicon has to be
   loaded or unloaded.  The default value for this header field is
   true.  This header field MAY be specified in a DEFINE-LEXICON
   method.

I propose rewording this paragraph to explicilty state that true means
load lexicon and false means unload lexicon.



Thanks.
Slawek Testowy




2011/3/16 The IESG iesg-secret...@ietf.org:

 The IESG has received a request from the Speech Services Control WG
 (speechsc) to consider the following document:
 - 'Media Resource Control Protocol Version 2 (MRCPv2)'
  draft-ietf-speechsc-mrcpv2-24.txt as a Proposed Standard

 The IESG plans to make a decision in the next few weeks, and solicits
 final comments on this action. Please send substantive comments to the
 ietf@ietf.org mailing lists by 2011-04-13. (This allows an additional two
 weeks for review since the document is large and the review period overlaps
 the Prague IETF meeting). Exceptionally, comments may be
 sent to i...@ietf.org instead. In either case, please retain the
 beginning of the Subject line to allow automated sorting.

 The file can be obtained via
 http://datatracker.ietf.org/doc/draft-ietf-speechsc-mrcpv2/

 IESG discussion can be tracked via
 http://datatracker.ietf.org/doc/draft-ietf-speechsc-mrcpv2/



 No IPR declarations have been submitted directly on this I-D.
 ___
 Speechsc mailing list
 speec...@ietf.org
 https://www.ietf.org/mailman/listinfo/speechsc
 Supplemental web site:
 lt;http://www.standardstrack.com/ietf/speechscgt;

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-housley-two-maturity-levels-05

2011-04-19 Thread Mykyta Yevstifeyev

19.04.2011 1:21, Russ Housley wrote:

Mykyta:


4. Downward References Permitted

This section says nothing about references to documents with no status 
(pre-IETF RFCs).  Maybe informative references to such RFCs should be 
allowed.  And what about normative ones?  Whether the RFC 3967 procedure will be used in 
such cases, or such references are disallowed in Standards Track docs?  I think this 
should also be mentioned in your draft.

What does this have to do with moving from two maturity levels?
Mostly nothing, but if you consider that the whole Section 4 is 
appropriate for your document, what I propose is appropriate also.


Mykyta

Russ


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-housley-two-maturity-levels-05

2011-04-19 Thread Russ Housley
Mykyta:

 4. Downward References Permitted
 This section says nothing about references to documents with no status 
 (pre-IETF RFCs).  Maybe informative references to such RFCs should be 
 allowed.  And what about normative ones?  Whether the RFC 3967 procedure 
 will be used in such cases, or such references are disallowed in Standards 
 Track docs?  I think this should also be mentioned in your draft.
 What does this have to do with moving from two maturity levels?
 Mostly nothing, but if you consider that the whole Section 4 is appropriate 
 for your document, what I propose is appropriate also.

I just reviewed RFC 3967.  It does not seem to claim that references to those 
older documents requires special handling.  I'd like to leave this topic to an 
update to RFC 3967 if such an update is needed at all.

Russ
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-housley-two-maturity-levels-05

2011-04-19 Thread Peter Saint-Andre
On 4/19/11 9:57 AM, Russ Housley wrote:
 Mykyta:
 
 4. Downward References Permitted
 This section says nothing about references to documents with no status 
 (pre-IETF RFCs).  Maybe informative references to such RFCs should be 
 allowed.  And what about normative ones?  Whether the RFC 3967 procedure 
 will be used in such cases, or such references are disallowed in Standards 
 Track docs?  I think this should also be mentioned in your draft.
 What does this have to do with moving from two maturity levels?
 Mostly nothing, but if you consider that the whole Section 4 is appropriate 
 for your document, what I propose is appropriate also.
 
 I just reviewed RFC 3967.  It does not seem to claim that references to those 
 older documents requires special handling.  I'd like to leave this topic to 
 an update to RFC 3967 if such an update is needed at all.

+1. Let's keep this I-D short and focused.

Peter

-- 
Peter Saint-Andre
https://stpeter.im/





smime.p7s
Description: S/MIME Cryptographic Signature
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


IETF 84 Venue

2011-04-19 Thread IETF Administrative Director
The IAOC is pleased to announce Vancouver,BC, Canada as the site for IETF
84 from July 29 to August 3, 2012.  This will be the IETF's fourth meeting
in Vancouver, the others being 18, 64 and 70.  

Google will be the the Host for this meeting.  Google most recently was
the host for IETF 73 in Minneapolis.  www.google.com  Thanks again
Google!

We want to thank our benefactors.  The IETF cannot support its technical
standards efforts, including the Secretariat and RFC Editor, without the
generous support of its hosts and sponsors.

Contact Drew Dvorshak at dvors...@isoc.org if you are interested in being
a Sponsor for IETF 84, or a Host for a different meeting. 

Hope to see you in Quebec City at IETF 81in 95 days!

Ray Pelletier
IETF Administrative Director
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IAOC: delegating ex-officio responsibility

2011-04-19 Thread Dave CROCKER

Bob, et al,

On 4/18/2011 2:25 PM, Bob Hinden wrote:

I didn't say no one else could do the job adequately.  I said would have a
negative impact on the operations of the IETF.


Right. And my second sentence did go farther than I meant.

However rejecting an effort to change the current arrangement -- especially when 
it is initiated by a principal -- means that alternatives are not acceptable, 
which translates roughly to saying the alternatives will not produce adequate 
performance.  Otherwise it looks like a difference between 'adequate' and 
perhaps perfect?


There is a core reality, here, that the I* Chairs are overburdened. This is 
obvious from looking at the list of their duties and underscored by the source 
of the current initiative.  We can choose to defer doing anything, under the 
guise of taking a 'holistic' view or we can try to help with the specific burden 
that is the focus of the overburdened folk.  On the average, we do better with 
incremental change and this is the one before us now.




If I generalize this, I would say that the I* chairs have been actively
involved in the most significant decisions the IAOC makes, they tend to be
less active in many of the day to day operational issues.

...

I think the I* chairs, in my view bring a broad view of the community and
operational needs based on what's involved in doing their jobs than another
person would not have.


My own simplistic summary:  For some topics it is extremely helpful to have the 
broader knowledge and insight that can be provided by an I* chair. For many 
topics, this is not needed, but for some it makes a significant difference.


To that end, here's a very simple proposal that resolves the issue cleanly:

 1. ISOC, IAB and IESG each appoint one person currently.  Change this to 
be two each, the same as Nomcom.  Each year, they would appoint one person.


 2. Move the I* Chairs to be non-voting ex-officio participants, the same 
as the IETF Administrative Director.  They are welcome to participate or be 
explicitly invited to all IAOC/Trust activities.


This produces the continuity that is needed for the admin work, but also retains 
access to the expertise of the I* chairs.


d/
--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [paws] WG Review: Protocol to Access White Space database (paws)

2011-04-19 Thread Joel M. Halpern

I think this working group is a good idea.
My inclination would be to place it in the Applications area.  It looks 
like a nice application protocol to me.
There is a reasonable argument for placing it in RAI, as that is where 
the relevant GEOLOC work has been done up till now.


Yours,
Joel M. Halpern

On 4/19/2011 12:56 PM, IESG Secretary wrote:

A new IETF working group has been proposed.  The IESG has not made any
determination as yet. The following draft charter was submitted, and is
provided for informational purposes only. Please send your comments to the
IESG mailing list (i...@ietf.org) by Tuesday, April 26, 2011.


Protocol to Access White Space database (paws)

Current Status: Proposed Working Group
Last updated: 2011-04-14

Chairs:
TBD

Area Directors:
TBD

Area Advisor:
TBD

Mailing lists:
Address: p...@ietf.org
To Subscribe: https://www.ietf.org/mailman/listinfo/paws
Archive: http://www.ietf.org/mail-archive/web/paws/

Description of Working Group:

Governments around the world continue to search for new pieces of radio
spectrum which can be used by the expanding wireless communications
industry to provide more services in the usable spectrum. The concept
of allowing secondary transmissions (licensed or unlicensed) in
frequencies allocated to a primary user is a technique to unlock
existing spectrum for new use. An obvious requirement is that these
secondary transmissions do not interfere with the primary use of the
spectrum. Often, in a given physical location, the primary user(s) may
not be using the entire band allocated to them. The available spectrum
for a secondary use would then depend on the location of the secondary
user. The primary user may have a schedule when it uses the spectrum,
which may be available for secondary use outside that schedule. The
fundamental issue is how to determine for a specific location and
specific time, if any of the primary spectrum is available for secondary
use. One simple mechanism is to use a geospatial database that records
protected contours for primary users, and require the secondary users to
check the database prior to selecting what part of the spectrum they
use. Such databases could be available on the Internet for query by
users.

In a typical implementation of geolocation and database to access TV
white space, a radio is configured with, or has the capability to
determine its location in latitude and longitude. At power-on, before
the device can transmit or use any of the spectrum set aside for
secondary use, the device must identify the relevant database to query,
contact the database, provide its geolocation and receive in return a
list of unoccupied or white space spectrum (for example, in a TV
White space implementation, the list of available channels at that
location). The device can then select one of the channels from the list
and begin to transmit and receive on the selected channel. The device
must query the database subsequently on a periodic basis for a list of
unoccupied channels based on certain conditions, e.g. a fixed amount of
time has passed or the device has changed location beyond a specified
threshold.

The databases are expected to be reachable via the Internet and the
devices querying these databases are expected to have some form of
Internet connectivity, directly or indirectly. The databases may be
country specific since the available spectrum and regulations may vary,
but the fundamental operation of the protocol should be country
independent, thus extensibility of data structures will be required. The
solution will not be tied to any specific spectrum, country, or
phy/mac/air interface but may incorporate relevant aspects of these as
needed for proper operation.

The proposed working group will :
- standardize a protocol for querying the database, which includes a
location sensitive database discovery mechanism and security for the
protocol, and application services.
- Standardize the data structure to be carried by the query
protocol.

The protocol must protect both the channel enablement process and the
privacy of users. Robust security mechanisms are required to prevent:
device identity spoofing, modification of device requests, modification
of channel enablement information, impersonation of registered database
services and unauthorized disclosure of a users location.

Existing IETF location data structures and privacy mechanisms may be
considered for use. The WG will also investigate the need for other
mechanisms and related protocols to the White Space DB.

The Working Group will set up and maintain appropriate contact and
liaison with other relevant standards bodies and groups, including IEEE
802.11af and IEEE 802.22 to begin with. The working group may also
consider input from regulatory entities that are involved in the
specification of the rules for secondary use of spectrum in specific
bands.

Goals and Milestones

Sep 2011  Submit 'Requirements and 

Re: IAOC: delegating ex-officio responsibility

2011-04-19 Thread SM

Hi Bob,
At 14:25 18-04-2011, Bob Hinden wrote:
I didn't say no one else could do the job adequately.  I said would 
have a negative impact on the operations of the IETF.


Some examples where an I* chair had a significant influence on a 
decision that IAOC made include:


 - The hiring of the Transitional RSE
 - Many of the Beijing meeting issues (prior and post signing the MOU)
 - Specific venue selections (in one case avoiding a less than ideal venue)
 - The need for transparency in certain IAOC actions (day passes, 
venue rotation)
 - Discussion of what policy decisions that the IAOC can make vs. 
the IESG vs. community

 - Discussion about when to get community feedback
 - Secretariat contract (RFP, bidders review, selection, etc.)
 - RFC Publisher and Publisher contracts  (RFP, bidders review, 
selection, etc.)


Some of these decision might have been different without one or more 
I* chairs being directly involved in the decision.  Please review 
the minutes for more detail.


From RFC 4071:

  The IAOC shall be accountable to the IETF community for the
   effectiveness, efficiency, and transparency of the IASA.

In a personal note that Olaf posted ( 
http://www.ietf.org/mail-archive/web/ietf/current/msg66161.html ), it 
is mentioned that it takes 0.7 FTE.  I do not believe that the 
decisions mentioned above are unimportant.  However, you have to 
consider which decisions require your attention when you have a 
limited amount of time available.


The current members of the IAOC, excluding ex officio, are:

 Eric Burger
 Dave Crocker
 Marshall Eubanks
 Bob Hinden
 Ray Pelletier (non-voting)

None of them are new to the IETF.  If it requires I* Chairs for the 
IAOC to be transparent, something is not right.


I think the I* chairs, in my view bring a broad view of the 
community and operational needs based on what's involved in doing 
their jobs than another person would not have.


If I understand your arguments, it is also about avoiding a 
disconnect between the administrative side of the IETF and the IAB/IESG.


draft-kolkman-iasa-ex-officio-membership-00 argues for a change to 
reduce the workload and make the I* Chair positions more 
attractive.  Would it help if the IAOC Chair has a liaison position 
on the IAB and IESG?  The IAB and IESG Chairs can use their 
discretion to determine which IAOC meetings they should attend.  The 
IAOC Chair gets a broader view.


The above pushes the workload around instead of addressing the 
problem.  If this trend continues, the best fit people will turn down 
I* positions.


Regards,
-sm  


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IAOC: delegating ex-officio responsibility

2011-04-19 Thread Bob Hinden
Dave,

On Apr 19, 2011, at 10:33 AM, Dave CROCKER wrote:

 Bob, et al,
 
 On 4/18/2011 2:25 PM, Bob Hinden wrote:
 I didn't say no one else could do the job adequately.  I said would have a
 negative impact on the operations of the IETF.
 
 Right. And my second sentence did go farther than I meant.
 
 However rejecting an effort to change the current arrangement -- especially 
 when it is initiated by a principal -- means that alternatives are not 
 acceptable, which translates roughly to saying the alternatives will not 
 produce adequate performance.  Otherwise it looks like a difference between 
 'adequate' and perhaps perfect?

We don't get perfect :-)

 
 There is a core reality, here, that the I* Chairs are overburdened. This is 
 obvious from looking at the list of their duties and underscored by the 
 source of the current initiative.  We can choose to defer doing anything, 
 under the guise of taking a 'holistic' view or we can try to help with the 
 specific burden that is the focus of the overburdened folk.  On the average, 
 we do better with incremental change and this is the one before us now.


Then let's talk about the overall problem and not a point solution.

 If I generalize this, I would say that the I* chairs have been actively
 involved in the most significant decisions the IAOC makes, they tend to be
 less active in many of the day to day operational issues.
 ...
 I think the I* chairs, in my view bring a broad view of the community and
 operational needs based on what's involved in doing their jobs than another
 person would not have.
 
 My own simplistic summary:  For some topics it is extremely helpful to have 
 the broader knowledge and insight that can be provided by an I* chair. For 
 many topics, this is not needed, but for some it makes a significant 
 difference.


I agree, and it is representative of the level of current participation of I* 
chairs.


 
 To that end, here's a very simple proposal that resolves the issue cleanly:
 
 1. ISOC, IAB and IESG each appoint one person currently.  Change this to 
 be two each, the same as Nomcom.  Each year, they would appoint one person.
 
 2. Move the I* Chairs to be non-voting ex-officio participants, the same 
 as the IETF Administrative Director.  They are welcome to participate or be 
 explicitly invited to all IAOC/Trust activities.
 
 This produces the continuity that is needed for the admin work, but also 
 retains access to the expertise of the I* chairs.


I don't agree.  Appointing two people (or more?) doesn't solve the problem I am 
concerned about, it still doesn't bring the chairs perspective.  It also 
significantly changes the governance model by changing the balance between 
between nomcom, iab, iesg, and ISOC appointed members.  Also, adding six people 
(still counting the chairs) will make the IAOC much larger and unwieldy.  

Bob



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [paws] WG Review: Protocol to Access White Space database (paws)

2011-04-19 Thread Peter Saint-Andre
On 4/19/11 1:47 PM, Paul Lambert wrote:
 
 
 How does the area that the group is assigned impact the choices of
 technology?
 
 I'm an advocate for an efficient solution set for PAWS ... it will be
 much like DNS for spectrum in the future and should be viewed as a
 core infrastructural component that needs careful design.  There are
 good reasons that routing protocols don't use XML.
 
 Applications now days tend to go for the simple, quick to make a web
 application solutions using XML or the like ...  My concern is that
 Applications imply that efficiency does not matter.

A quick look at the specifications for the CORE WG in the Applications
Area will show you that we're able to produce protocols that are quite
slim on the wire.

Peter

-- 
Peter Saint-Andre
https://stpeter.im/





smime.p7s
Description: S/MIME Cryptographic Signature
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IAOC: delegating ex-officio responsibility

2011-04-19 Thread Bob Hinden
SM,

 Eric Burger
 Dave Crocker
 Marshall Eubanks
 Bob Hinden
 Ray Pelletier (non-voting)
 
 None of them are new to the IETF.  If it requires I* Chairs for the IAOC to 
 be transparent, something is not right.

But that may not always be the case that all IAOC members have a lot of IETF 
experience.  We need to have a governance model that works into the future.  

 
 I think the I* chairs, in my view bring a broad view of the community and 
 operational needs based on what's involved in doing their jobs than another 
 person would not have.
 
 If I understand your arguments, it is also about avoiding a disconnect 
 between the administrative side of the IETF and the IAB/IESG.

Yes

 
 draft-kolkman-iasa-ex-officio-membership-00 argues for a change to reduce the 
 workload and make the I* Chair positions more attractive.  Would it help if 
 the IAOC Chair has a liaison position on the IAB and IESG?  The IAB and IESG 
 Chairs can use their discretion to determine which IAOC meetings they should 
 attend.  The IAOC Chair gets a broader view.
 
 The above pushes the workload around instead of addressing the problem.  If 
 this trend continues, the best fit people will turn down I* positions.

It would certainly give the IAOC chair a broader view, but still not the views 
of the I* chair.  Also, if the I* chairs (3 of 9 voting members) regularly 
didn't attend, it would be much harder to get a quorum for a meeting and pass 
motions.  

Bob

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: WG Review: Protocol to Access White Space database (paws)

2011-04-19 Thread Stephen Farrell

I think this is a good and timely thing for the IETF to do.

One part of this where I think it might be useful to get
some broader input (which may have happened already, I'm not
sure) is the following:

On 19/04/11 17:56, IESG Secretary wrote:
 The protocol must protect both the channel enablement process and the
 privacy of users. 

That part is fine but it goes on to say:

 Robust security mechanisms are required to prevent:
 device identity spoofing, modification of device requests, modification
 of channel enablement information, ...

I'm told (and believe) this in response to (at least) US
FCC requirements that call for a device ID and sometimes
serial number to be (securely, for some value of securely)
sent with the query.

Those appear to be real regulatory requirements in the
US, presumably so the regulator can stomp on someone who
messes about in the wrong spectrum at the wrong time.
(The link below [1] may be to the right or wrong bit of
those US regulations, I'm not at all sure, not being
from there;-)

So my questions:

Are there may be similar (or conflicting!) requirements
elsewhere?

Does this bit of the charter text need changes to work
well for other regions?

Separately, I'm not sure how to square those kinds of
regulatory requirements with protecting privacy where the
device is carried by a person and has some FCC device ID
(which lots do I guess) and the person might not want
the database operator to know who's asking. But I think
that's ok as something for the WG to figure out since
the charter already calls for respecting privacy.

I'm more concerned in case e.g. some other regional regulation
called for this protocol to be completely anonymous or
something, in which case the current charter text might
be problematic.

Cheers,
Stephen.

[1]
http://ecfr.gpoaccess.gov/cgi/t/text/text-idx?c=ecfrsid=3e9c322addf1f7e897d8c84a6c7aca78rgn=div8view=textnode=47:1.0.1.1.14.8.243.9idno=47
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [paws] WG Review: Protocol to Access White Space database (paws)

2011-04-19 Thread Joel M. Halpern
Clearly, the discussion about whether the application protocol should be 
XML, plain ASCII/UTF8, binary, or some other encoding needs to take 
place.  But that can take place wherever we place the working group.


There is an argument, which you allude to, which would place this WG in 
the Internet Area as part of infrastructure.  While that does not 
resonate with me, I do see that there is some merit in that perspective.


I tend to think we need to focus on transactional application experience 
(the apps area) or where we have experience with protocols that need to 
communicate geolocation (RAI).


I would hope, and expect, that the ADs for any area would be receptive 
to a proper evaluation of any candidate protocol and encoding.  (The 
arguments get complex, and it takes care to avoid religious assertions.)


Yours,
Joel

On 4/19/2011 3:47 PM, Paul Lambert wrote:



How does the area that the group is assigned impact the choices of technology?

I'm an advocate for an efficient solution set for PAWS ... it will be much like 
DNS for spectrum in the future and should be viewed as a core infrastructural 
component that needs careful design.  There are good reasons that routing 
protocols don't use XML.

Applications now days tend to go for the simple, quick to make a web application 
solutions using XML or the like ...  My concern is that Applications imply 
that efficiency does not matter.

Paul




-Original Message-
From: paws-boun...@ietf.org [mailto:paws-boun...@ietf.org] On Behalf Of
Joel M. Halpern
Sent: Tuesday, April 19, 2011 10:50 AM
To: i...@ietf.org
Cc: p...@ietf.org; IETF discussion list
Subject: Re: [paws] WG Review: Protocol to Access White Space database
(paws)

I think this working group is a good idea.
My inclination would be to place it in the Applications area.  It looks
like a nice application protocol to me.
There is a reasonable argument for placing it in RAI, as that is where
the relevant GEOLOC work has been done up till now.

Yours,
Joel M. Halpern

On 4/19/2011 12:56 PM, IESG Secretary wrote:

A new IETF working group has been proposed.  The IESG has not made

any

determination as yet. The following draft charter was submitted, and

is

provided for informational purposes only. Please send your comments

to the

IESG mailing list (i...@ietf.org) by Tuesday, April 26, 2011.


Protocol to Access White Space database (paws)

Current Status: Proposed Working Group
Last updated: 2011-04-14

Chairs:
TBD

Area Directors:
TBD

Area Advisor:
TBD

Mailing lists:
Address: p...@ietf.org
To Subscribe: https://www.ietf.org/mailman/listinfo/paws
Archive: http://www.ietf.org/mail-archive/web/paws/

Description of Working Group:

Governments around the world continue to search for new pieces of

radio

spectrum which can be used by the expanding wireless communications
industry to provide more services in the usable spectrum. The concept
of allowing secondary transmissions (licensed or unlicensed) in
frequencies allocated to a primary user is a technique to unlock
existing spectrum for new use. An obvious requirement is that these
secondary transmissions do not interfere with the primary use of the
spectrum. Often, in a given physical location, the primary user(s)

may

not be using the entire band allocated to them. The available

spectrum

for a secondary use would then depend on the location of the

secondary

user. The primary user may have a schedule when it uses the spectrum,
which may be available for secondary use outside that schedule. The
fundamental issue is how to determine for a specific location and
specific time, if any of the primary spectrum is available for

secondary

use. One simple mechanism is to use a geospatial database that

records

protected contours for primary users, and require the secondary users

to

check the database prior to selecting what part of the spectrum they
use. Such databases could be available on the Internet for query by
users.

In a typical implementation of geolocation and database to access TV
white space, a radio is configured with, or has the capability to
determine its location in latitude and longitude. At power-on, before
the device can transmit or use any of the spectrum set aside for
secondary use, the device must identify the relevant database to

query,

contact the database, provide its geolocation and receive in return a
list of unoccupied or white space spectrum (for example, in a TV
White space implementation, the list of available channels at that
location). The device can then select one of the channels from the

list

and begin to transmit and receive on the selected channel. The device
must query the database subsequently on a periodic basis for a list

of

unoccupied channels based on certain conditions, e.g. a fixed amount

of

time has passed or the device has changed location beyond a specified
threshold.

The databases are expected to be reachable via the Internet and 

Re: [paws] WG Review: Protocol to Access White Space database (paws)

2011-04-19 Thread Joel M. Halpern
Actually, as far as I can tell, there is very little parallel between 
the PAWS problem and SNMP.
SNMP tends to be initiated by the manager, and used to extract 
information from the device in the network, or set information in teh 
device.
This protocol is used by the client.  It extracts basically stable 
information about what frequencies can be used in this geographic region 
at this time.
There is no network management going on.  the interaction does not 
look like SNMP.  And the effect does not look like SNMP.  While Radius 
or Diameter are closer, this protocol is not even a policy decision 
protocol.  There is no policy.


So no, I do not think this looks anything like network management.
The protocols, the transaction drivers and behavior, the problem space, 
and the underlying data behavior are all very different from any of our 
NM work.


Yours,
Joel

On 4/19/2011 5:21 PM, Rex Buddenberg wrote:

On Tue, 2011-04-19 at 12:47 -0700, Paul Lambert wrote:


How does the area that the group is assigned impact the choices of
technology?

I'm an advocate for an efficient solution set for PAWS ... it will be
much like DNS for spectrum in the future and should be viewed as a
core infrastructural component that needs careful design.  There are
good reasons that routing protocols don't use XML.


While the DNS analogy works, I was thinking more a parallel -- or
extension -- of SNMP.

Still remain within 'applications', Joel?



Applications now days tend to go for the simple, quick to make a web
application solutions using XML or the like ...  My concern is that
Applications imply that efficiency does not matter.

Paul




-Original Message-
From: paws-boun...@ietf.org [mailto:paws-boun...@ietf.org] On Behalf Of
Joel M. Halpern
Sent: Tuesday, April 19, 2011 10:50 AM
To: i...@ietf.org
Cc: p...@ietf.org; IETF discussion list
Subject: Re: [paws] WG Review: Protocol to Access White Space database
(paws)

I think this working group is a good idea.
My inclination would be to place it in the Applications area.  It looks
like a nice application protocol to me.
There is a reasonable argument for placing it in RAI, as that is where
the relevant GEOLOC work has been done up till now.

Yours,
Joel M. Halpern

On 4/19/2011 12:56 PM, IESG Secretary wrote:

A new IETF working group has been proposed.  The IESG has not made

any

determination as yet. The following draft charter was submitted, and

is

provided for informational purposes only. Please send your comments

to the

IESG mailing list (i...@ietf.org) by Tuesday, April 26, 2011.


Protocol to Access White Space database (paws)

Current Status: Proposed Working Group
Last updated: 2011-04-14

Chairs:
TBD

Area Directors:
TBD

Area Advisor:
TBD

Mailing lists:
Address: p...@ietf.org
To Subscribe: https://www.ietf.org/mailman/listinfo/paws
Archive: http://www.ietf.org/mail-archive/web/paws/

Description of Working Group:

Governments around the world continue to search for new pieces of

radio

spectrum which can be used by the expanding wireless communications
industry to provide more services in the usable spectrum. The concept
of allowing secondary transmissions (licensed or unlicensed) in
frequencies allocated to a primary user is a technique to unlock
existing spectrum for new use. An obvious requirement is that these
secondary transmissions do not interfere with the primary use of the
spectrum. Often, in a given physical location, the primary user(s)

may

not be using the entire band allocated to them. The available

spectrum

for a secondary use would then depend on the location of the

secondary

user. The primary user may have a schedule when it uses the spectrum,
which may be available for secondary use outside that schedule. The
fundamental issue is how to determine for a specific location and
specific time, if any of the primary spectrum is available for

secondary

use. One simple mechanism is to use a geospatial database that

records

protected contours for primary users, and require the secondary users

to

check the database prior to selecting what part of the spectrum they
use. Such databases could be available on the Internet for query by
users.

In a typical implementation of geolocation and database to access TV
white space, a radio is configured with, or has the capability to
determine its location in latitude and longitude. At power-on, before
the device can transmit or use any of the spectrum set aside for
secondary use, the device must identify the relevant database to

query,

contact the database, provide its geolocation and receive in return a
list of unoccupied or white space spectrum (for example, in a TV
White space implementation, the list of available channels at that
location). The device can then select one of the channels from the

list

and begin to transmit and receive on the selected channel. The device
must query the database subsequently on a periodic basis for a list


WG Action: RECHARTER: Secure Inter-Domain Routing (sidr)

2011-04-19 Thread IESG Secretary
The Secure Inter-Domain Routing (sidr) working group in the Routing Area
of the IETF has been rechartered.  For additional information, please
contact the Area Directors or the working group Chairs.

Secure Inter-Domain Routing (sidr)
---
Current Status: Active Working Group

Chairs:
  Sandra Murphy sandra.mur...@sparta.com
  Chris Morrow morr...@ops-netman.net

Routing Area Directors:
  Stewart Bryant stbry...@cisco.com
  Adrian Farrel adrian.far...@huawei.com

Routing Area Advisor:
  Stewart Bryant stbry...@cisco.com

Mailing lists:
  Address:  s...@ietf.org
  To Subscribe: https://www.ietf.org/mailman/listinfo/sidr
  Archive:  http://www.ietf.org/mail-archive/web/sidr

Description of Working Group:
The purpose of the SIDR working group is to reduce vulnerabilities in
the inter-domain routing system. The two vulnerabilities that will be
addressed are:

 * Is an Autonomous System (AS) authorized to originate an IP prefix
 * Is the AS-Path represented in the route the same as the path through
which the NLRI traveled

The SIDR working group will take practical deployability into
consideration.

Building upon the already completed and implemented framework:

 * Resource Public Key Infrastructure (RPKI)
 * Distribution of RPKI data to routing devices and its use in
  operational networks
 * Document the use of certification objects within the secure
  routing architecture

This working group will specify security enhancements for inter-domain
routing protocols.

The SIDR working group is charged with the following goals and
milestones:

Goals and Milestones:

ID Date   Pub Date
Mar 2011  Jan 2012   An overview of the RPKI and BGP Protocol changes
 required for origin and path validation
Mar 2011  Jun 2012   A document describing threats to the routing system
Mar 2011  Jun 2012   A requirements document that  addresses these 
 threats
Mar 2011  Jan 2012   Document the BGP protocol enhancements that meet
 the security requirements
Nov 2010  Jul 2011   draft-ietf-sidr-origin-ops
Mar 2011  Jul 2012   Operational deployment guidance for network 
 operators
Jun 2011  Dec 2011   System and architecture design choices made in
 the protocol and RPKI
Mar 2010  Mar 2012   draft-ietf-sidr-cps-irs
Mar 2010  Mar 2012   draft-ietf-sidr-cps-isp
Nov 2010  Jan 2012   draft-ietf-sidr-pfx-validate
Jan 2010  Jun 2011   draft-ietf-sidr-publication
Nov 2010  Jun 2011   draft-ietf-sidr-repos-struct
Nov 2010  Jun 2011   draft-ietf-sidr-roa-format
Feb 2011  Jun 2011   draft-ietf-sidr-rpki-rtr
Nov 2010  Nov 2011   draft-ietf-sidr-ltamgmt
Dec 2010  Oct 2011   draft-rgaglian-sidr-algorithm-agility
May 2011  Dec 2011   draft-ietf-sidr-usecases
Jan 2011  Oct 2011   draft-ietf-sidr-ghostbusters
Jan 2010  Dec 2011   draft-ietf-sidr-keyroll
Jan 2010  May 2011   draft-ietf-sidr-arch
Jan 2010  May 2011   draft-ietf-sidr-cp
Jan 2010  May 2011   draft-ietf-sidr-res-certs
Jan 2010  Jun 2011   draft-ietf-sidr-roa-validation
Jan 2010  Jun 2011   draft-ietf-sidr-signed-object
Jan 2010  Jun 2011   draft-ietf-sidr-rpki-manifests
Jan 2010  Jul 2011   draft-ietf-sidr-rpki-algs
Jan 2010  Jul 2011   draft-ietf-sidr-rescerts-provisioning
Jan 2010  Aug 2011   draft-ietf-sidr-ta

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


IETF 84 Venue

2011-04-19 Thread IETF Administrative Director
The IAOC is pleased to announce Vancouver,BC, Canada as the site for IETF
84 from July 29 to August 3, 2012.  This will be the IETF's fourth meeting
in Vancouver, the others being 18, 64 and 70.  

Google will be the the Host for this meeting.  Google most recently was
the host for IETF 73 in Minneapolis.  www.google.com  Thanks again
Google!

We want to thank our benefactors.  The IETF cannot support its technical
standards efforts, including the Secretariat and RFC Editor, without the
generous support of its hosts and sponsors.

Contact Drew Dvorshak at dvors...@isoc.org if you are interested in being
a Sponsor for IETF 84, or a Host for a different meeting. 

Hope to see you in Quebec City at IETF 81in 95 days!

Ray Pelletier
IETF Administrative Director
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


WG Review: Recharter of Softwires (softwire)

2011-04-19 Thread IESG Secretary
A modified charter has been submitted for the Softwires (softwire) working
group in the Internet Area of the IETF.  The IESG has not made any
determination as yet.  The modified charter is provided below for
informational purposes only.  Please send your comments to the IESG
mailing list (i...@ietf.org) by Tuesday, April 26, 2011.


Softwires (softwire)
**DRAFT 2011-04-14** (v03)

Current Status: Active

 Chairs:
 Alain Durand adur...@juniper.net
 Yong Cui cuiy...@tsinghua.edu.cn

 Internet Area Directors:
 Ralph Droms rdroms.i...@gmail.com
 Jari Arkko jari.ar...@piuha.net

 Internet Area Advisor:
 Ralph Droms rdroms.i...@gmail.com

 Mailing Lists:
 General Discussion: softwi...@ietf.org
 To Subscribe:   softwires-requ...@ietf.org
 Archive:   
http://www.ietf.org/mail-archive/web/softwires/current/maillist.html

Description of Working Group:

  The Softwires Working Group is specifying the standardization of
  discovery, control and encapsulation methods for connecting IPv4
  networks across IPv6 networks and IPv6 networks across IPv4 networks
  in a way that will encourage multiple, inter-operable
  implementations.

  For various reasons, native IPv4 and/or IPv6 transport may not be
  available in all cases, and there is a need to tunnel IPv4 in IPv6
  or IPv6 in IPv4 to cross a part of the network which is not IPv4 or
  IPv6 capable. The Softwire Problem Statement, RFC 4925, identifies
  two distinct topological scenarios that the WG will provide
  solutions for: Hubs and Spokes and Mesh. In the former case,
  hosts or stub networks are attached via individual,
  point-to-point, IPv4 over IPv6 or IPv6 over IPv4 softwires to a
  centralized Softwire Concentrator. In the latter case (Mesh),
  network islands of one Address Family (IPv4 or IPv6) are connected
  over a network of another Address Family via point to multi-point
  softwires among Address family Border Routers (AFBRs).

  The WG will reuse existing technologies as much as possible and only
  when necessary, create additional protocol building blocks.

  For generality, all base Softwires encapsulation mechanisms should
  support all combinations of IP versions over one other (IPv4 over
  IPv6, IPv6 over IPv4, IPv4 over IPv4, IPv6 over IPv6). IPv4 to IPv6
  translation mechanisms (NAT-PT), new addressing schemes, and block
  address assignments are out of scope. DHCP options developed in this
  working group will be reviewed jointly with the DHC WG.  RADIUS
  attributes developed in this working group will be reviewed jointly
  with the RADEXT WG.  The MIB Doctors directorate will be asked to
  review any MIB modules developed in the SOFTWIRE working group.  BGP
  and other routing and signaling protocols developed in this group
  will be reviewed jointly with the proper working groups and other
  workings that may take interest (e.g. IDR, L3VPN, PIM, LDP, SAAG,
  etc).

  The specific work areas for this working group are:

  1. Developments for Mesh softwires topology; the Mesh topology work
 will be reviewed in the l3vpn and idr WGs
 - multicast
 - MIB module

  2. Developments for 6rd:
 - multicast
 - operational specification
 - RADIUS option for 6rd server
 - MIB module

  3. Developments for Dual-Stack Lite (DS-Lite):
 - multicast
 - operational specification
 - RADIUS option for AFTR
 - proxy extensions; GI-DS-Lite; DS-Lite with no NAT or NAT on the
   B4 element
 - MIB module

  4. Developments for stateless legacy IPv4 carried over IPv6
 - develop a solution motivation document to be published as an
   RFC
 - develop a protocol specification response to the solution
motivation
   document; this work item will not be taken through WG last call
   until the solution motivation document has been published

  5. Finalize discovery and configuration mechanisms for a gateway to
 use DS-Lite or 6rd; these discovery and configuration mechanisms
 must take into a account other operating environments such as
 dual-stack and tunneling mechanisms not defined by the softwire
 WG.  Development of new mechanisms will involve the dhc and/or
 v6ops WGs as appropriate

Other work items would require WG approval and rechartering.

Goals and Milestones:
Apr 2011 Submit DS-lite RADIUS option for Proposed Standard
Apr 2011 Adopt DS-lite operational document as WG document
Jul 2011 Submit 6rd RADIUS option for Proposed Standard
Jul 2011 Submit GI DS-lite for Proposed Standard
Jul 2011 Adopt B4NAT as WG document
Aug 2011 Adopt 6rd operational document as WG document
Aug 2011 Adopt Multicast extensions document as WG document
Aug 2011 Submit DS-lite operational document for Informational
Sep 2011 Submit B4NAT for Informational
Nov 2011 Submit Multicast extensions document for Informational
Nov 2011 Submit 6rd operational document for Informational
Nov 2011 Adopt 6rd MIB module as WG document
Nov 2011 

WG Review: Real-Time Communication in WEB-browsers (rtcweb)

2011-04-19 Thread IESG Secretary
A new IETF working group has been proposed in the Real-Time Applications
and Infrastructure Area.  The IESG has not made any determination as yet.
The following draft charter was submitted, and is provided for
informational purposes only. Please send your comments to the IESG mailing
list (i...@ietf.org) by Tuesday, April 26, 2011.   
 

Real-Time Communication in WEB-browsers (rtcweb)

Current Status: Proposed Working Group
Last Updated: 2011-04-14

Chairs:
 TBD

RAI Area Directors:
 Gonzalo Camarillo
 Robert Sparks

RAI Area Advisor:
 Gonzalo Camarillo

Mailing Lists:
 Address:   rtc...@ietf.org
 To Subscribe:  https://www.ietf.org/mailman/listinfo/rtcweb
 Archive:   http://www.ietf.org/mail-archive/web/rtcweb/

Description of Working Group:
 
There are a number of proprietary implementations that provide direct
interactive rich communication using audio, video, collaboration,
games, etc. between two peers' web-browsers. These are not
interoperable, as they require non-standard extensions or plugins to
work.  There is a desire to standardize the basis for such
communication so that interoperable communication can be established
between any compatible browsers. The goal is to enable innovation on
top of a set of basic components.  One core component is to enable
real-time media like audio and video, a second is to enable data
transfer directly between clients.
 
This work will be done in collaboration with the W3C.  The IETF WG
will produce architecture and requirements for selection and profiling
of the on the wire protocols. The architecture needs to be coordinated
with W3C.  The IETF WG work will identify state information and events
that need to be exposed in the APIs as input to W3C. The W3C will be
responsible for defining APIs to ensure that application developers
can control the components. We will reach out to the developer
community for consultation and early feedback on implementation.
 
The security and privacy goals and requirements will be developed by
the WG. The security model needs to be coordinated with the W3C.  The
work will also consider where support for extensibility is needed. RTP
functionalities, media formats, security algorithms are example of
things that commonly need extensions, additions or replacement, and
thus some support for negotiation between clients is required.
 
The WG will perform the following work:

1.  Define the communication model in detail, including how session
management is to occur within the model.

2.  Define a security model that describes the security and privacy
goals and specifies the security protocol mechanisms necessary
to achieve those goals.

3.  Define the solution - protocols and API requirements - for
firewall and NAT traversal.

4.  Define which media functions and extensions shall be supported in
the client and their usage for real-time media, including media
adaptation to ensure congestion safe usage.

5.  Define what functionalities in the solution, such as media codecs,
security algorithms, etc., can be extended and how the
extensibility mechanisms works.

6.  Define a set of media formats that must or should be supported by
a client to improve interoperability.

7.  Define how non media data is transported between clients in a
secure and congestion safe way.

8.  Provide W3C input for the APIs that comes from the communication
model and the selected components and protocols that are part of
the solution.

9.  The group will consider options for interworking with legacy VoIP
equipment.
 
This work will be done primarily by using already defined protocols or
functionalities. If there is identification of missing protocols or
functionalities, such work can be requested to be done in another
working group with a suitable charter or by requests for chartering it
in this WG or another WG. The following topics will be out of scope
for the initial phase of the WG: RTSP, RSVP, NSIS, Location services,
Resource Priority, and IM  Presence specific features.
 
The products of the working group will support security and keying as
required by BCP 61 and be defined for IPv4, IPv6, and dual stack
deployments. The Working Group will consider the possibility of
defining a browser component that implements an existing session
negotiation and management protocol. The working group will follow BCP
79, and adhere to the spirit of BCP 79. The working group cannot
explicitly rule out the possibility of adopting encumbered
technologies; however, the working group will try to avoid encumbered
technologies that require royalties or other encumbrances that would
prevent such technologies from being easy to use in web browsers.
 
Milestones:
 
Aug 2011 Architecture, Security, Privacy and Threat Model sent to W3C
 
Aug 2011 Use cases, Scenarios, and Requirements document (I-D) sent to
 W3C
 
Sep 2011 Architecture 

WG Review: Protocol to Access White Space database (paws)

2011-04-19 Thread IESG Secretary
A new IETF working group has been proposed.  The IESG has not made any
determination as yet. The following draft charter was submitted, and is
provided for informational purposes only. Please send your comments to the
IESG mailing list (i...@ietf.org) by Tuesday, April 26, 2011.
  

Protocol to Access White Space database (paws)

Current Status: Proposed Working Group
Last updated: 2011-04-14

Chairs:
TBD

Area Directors:
TBD

Area Advisor:
TBD

Mailing lists:
Address: p...@ietf.org
To Subscribe: https://www.ietf.org/mailman/listinfo/paws
Archive: http://www.ietf.org/mail-archive/web/paws/

Description of Working Group:

Governments around the world continue to search for new pieces of radio
spectrum which can be used by the expanding wireless communications
industry to provide more services in the usable spectrum. The concept
of allowing secondary transmissions (licensed or unlicensed) in
frequencies allocated to a primary user is a technique to unlock
existing spectrum for new use. An obvious requirement is that these
secondary transmissions do not interfere with the primary use of the
spectrum. Often, in a given physical location, the primary user(s) may
not be using the entire band allocated to them. The available spectrum
for a secondary use would then depend on the location of the secondary
user. The primary user may have a schedule when it uses the spectrum,
which may be available for secondary use outside that schedule. The
fundamental issue is how to determine for a specific location and
specific time, if any of the primary spectrum is available for secondary
use. One simple mechanism is to use a geospatial database that records
protected contours for primary users, and require the secondary users to
check the database prior to selecting what part of the spectrum they
use. Such databases could be available on the Internet for query by
users.

In a typical implementation of geolocation and database to access TV
white space, a radio is configured with, or has the capability to
determine its location in latitude and longitude. At power-on, before
the device can transmit or use any of the spectrum set aside for
secondary use, the device must identify the relevant database to query,
contact the database, provide its geolocation and receive in return a
list of unoccupied or white space spectrum (for example, in a TV
White space implementation, the list of available channels at that
location). The device can then select one of the channels from the list
and begin to transmit and receive on the selected channel. The device
must query the database subsequently on a periodic basis for a list of
unoccupied channels based on certain conditions, e.g. a fixed amount of
time has passed or the device has changed location beyond a specified
threshold.

The databases are expected to be reachable via the Internet and the
devices querying these databases are expected to have some form of
Internet connectivity, directly or indirectly. The databases may be
country specific since the available spectrum and regulations may vary,
but the fundamental operation of the protocol should be country
independent, thus extensibility of data structures will be required. The
solution will not be tied to any specific spectrum, country, or
phy/mac/air interface but may incorporate relevant aspects of these as
needed for proper operation.

The proposed working group will :
- standardize a protocol for querying the database, which includes a
location sensitive database discovery mechanism and security for the
protocol, and application services.
- Standardize the data structure to be carried by the query
protocol.

The protocol must protect both the channel enablement process and the
privacy of users. Robust security mechanisms are required to prevent:
device identity spoofing, modification of device requests, modification
of channel enablement information, impersonation of registered database
services and unauthorized disclosure of a users location.

Existing IETF location data structures and privacy mechanisms may be
considered for use. The WG will also investigate the need for other
mechanisms and related protocols to the White Space DB.

The Working Group will set up and maintain appropriate contact and
liaison with other relevant standards bodies and groups, including IEEE
802.11af and IEEE 802.22 to begin with. The working group may also
consider input from regulatory entities that are involved in the
specification of the rules for secondary use of spectrum in specific
bands.

Goals and Milestones

Sep 2011  Submit 'Requirements and Framework' to the IESG for
  publication as Informational

Apr 2012  Submit 'Protocol for Querying a Whitespace Database' to
  the IESG for publication as Proposed Standard

Apr 2012  Submit 'Data Model for Whitespace query protocol' to the
  IESG for publication as Proposed Standard

North American Cable Industry to Host IETF 85

2011-04-19 Thread IETF Administrative Director
The IAOC is pleased to be able to announce sponsors for IETF 85 in Atlanta
in November 4 - 9, 2012. That meeting will be hosted by the North American
cable industry. The sponsoring companies are Comcast, Time Warner Cable,
CableLabs, the National Cable  Telecommunications Association,
Brighthouse, Cablevision, Charter, and Cox.

Comcast hosted IETF 71 in Philadelphia and has sponsored meeting breaks
and ice cream socials at other meetings, such as recently in Prague.

Thanks to the cable industry!  

Interested in hosting an IETF meeting?  Contact Drew Dvorshak at
dvors...@isoc.org.

Ray Pelletier
IETF Administrative Director
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: rfc5953 (Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP)) to Draft Standard

2011-04-19 Thread The IESG
The IESG has received a request from the isms WG (isms) to consider the 
following document:

- 'Transport Layer Security (TLS) Transport Model for the Simple Network 
   Management Protocol (SNMP) '
  RFC 5953 as a Draft Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
i...@ietf.org mailing lists by 2011-05-03. Exceptionally, 
comments may be sent to i...@ietf.org instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.

This specification contains eight normative references to standards
track documents of lower maturity: RFCs 1033, 3490, 3584, 4347, 4366,
5246, 5280, and 5952.

The file can be obtained via
http://datatracker.ietf.org/doc/rfc5953/

Implementation Report can be accessed at
http://www.ietf.org/iesg/implementation.html

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/rfc5953/

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: rfc5590 (Transport Subsystem for the Simple Network Management Protocol (SNMP)) to Draft Standard

2011-04-19 Thread The IESG
The IESG has received a request from the isms WG (isms) to consider the 
following document:

- 'Transport Subsystem for the Simple Network Management Protocol (SNMP) '
  RFC 5590 as a Draft Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
i...@ietf.org mailing lists by 2011-05-03. Exceptionally, 
comments may be sent to i...@ietf.org instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://datatracker.ietf.org/doc/rfc5590/

The interoperability report obtained via
http://www.ietf.org/iesg/implementation/report-rfc5343-5590-5591-5953.txt

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/rfc5590/

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: rfc5591 (Transport Security Model for the Simple Network Management Protocol (SNMP)) to Draft Standard

2011-04-19 Thread The IESG
The IESG has received a request from the isms WG (isms) to consider the 
following document:

- 'Transport Security Model for the Simple Network Management Protocol 
   (SNMP)' RFC 5591 as a Draft Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
i...@ietf.org mailing lists by 2011-05-03. Exceptionally, 
comments may be sent to i...@ietf.org instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.

Note that an IETF Last Call to progress RFC 5590 to Draft Standard is
also underway (which would have been a downref).

The file can be obtained via
http://datatracker.ietf.org/doc/rfc5591/

Implementation Report can be accessed at
http://www.ietf.org/iesg/implementation.html

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/rfc5591/

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: rfc5343 (Simple Network Management Protocol (SNMP) Context EngineID Discovery) to Draft Standard

2011-04-19 Thread The IESG
The IESG has received a request from the opsawg WG (opsawg) to consider 
the following document:

- 'Simple Network Management Protocol (SNMP) Context EngineID Discovery '
  RFC 5343 as a Draft Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
i...@ietf.org mailing lists by 2011-05-03. Exceptionally, 
comments may be sent to i...@ietf.org instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/rfc/rfc5343.txt

Implementation Report can be accessed at
http://www.ietf.org/iesg/implementation.html


IESG discussion can be tracked via
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=5343rfc_flag=1

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce