Re: [ESDS] Interaction models for Discovery Services
"David Potter" <David.Potter@PROMISE-Innovation.com> Tue, 15 July 2008 16:57 UTC
Return-Path: <esds-bounces@ietf.org>
X-Original-To: esds-archive@optimus.ietf.org
Delivered-To: ietfarch-esds-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7CD983A6A2F; Tue, 15 Jul 2008 09:57:36 -0700 (PDT)
X-Original-To: esds@core3.amsl.com
Delivered-To: esds@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A40FF3A65A6 for <esds@core3.amsl.com>; Tue, 15 Jul 2008 09:57:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 3.869
X-Spam-Level: ***
X-Spam-Status: No, score=3.869 tagged_above=-999 required=5 tests=[BAYES_20=-0.74, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, HOST_EQ_STATIC=1.172, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334, MSGID_MULTIPLE_AT=1.449]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mBmHOShDJfhD for <esds@core3.amsl.com>; Tue, 15 Jul 2008 09:57:26 -0700 (PDT)
Received: from a2s32.a2hosting.com (69.39.67.140.static.a2webhosting.com [69.39.67.140]) by core3.amsl.com (Postfix) with ESMTP id 59D9F3A67CF for <esds@ietf.org>; Tue, 15 Jul 2008 09:57:26 -0700 (PDT)
Received: from host86-134-218-200.range86-134.btcentralplus.com ([86.134.218.200] helo=HCSACER4230) by a2s32.a2hosting.com with esmtpa (Exim 4.69) (envelope-from <David.Potter@PROMISE-Innovation.com>) id 1KInqZ-0006tC-NY; Tue, 15 Jul 2008 12:57:53 -0400
From: David Potter <David.Potter@PROMISE-Innovation.com>
To: esds@ietf.org
References: <8438190C-CAE5-4D1F-8FD6-758D7C909DAF@cantab.net>
In-Reply-To: <8438190C-CAE5-4D1F-8FD6-758D7C909DAF@cantab.net>
Date: Tue, 15 Jul 2008 17:59:03 +0100
Organization: PROMISE Innovation
Message-ID: <004701c8e69c$180eaa00$482bfe00$@Potter>
MIME-Version: 1.0
X-Mailer: Microsoft Office Outlook 12.0
thread-index: Acjg4udt8QsdHAaeRuajJ46JvyEdSgFrQMSA
Content-Language: en-gb
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - a2s32.a2hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - PROMISE-Innovation.com
Subject: Re: [ESDS] Interaction models for Discovery Services
X-BeenThere: esds@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: David.Potter@PROMISE-Innovation.com
List-Id: "Discussion of the ESDS \(Extensible Supplychain Discovery Service\)" <esds.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/esds>, <mailto:esds-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/esds>
List-Post: <mailto:esds@ietf.org>
List-Help: <mailto:esds-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/esds>, <mailto:esds-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0817086215=="
Sender: esds-bounces@ietf.org
Errors-To: esds-bounces@ietf.org
Dear ESDS Colleagues, I have now had time to study and digest Mark's submissions from one week ago, which I found most interesting, and I would like to make some high-level observations as follows: 1. The Trade-offs.xls spreadsheet is very illuminating. For me it speaks volumes about the potential complexity if the proposed Discovery Services component is actually responsible for much more than being a directory of information sources. Is it realistic to expect a "Discovery Service", among other functions, to handle "end-user" clients, handle standing subscriptions, and to handle the collection of data from multiple providers while according appropriate access rights and responding with that data. 2. I think that there appears to be too much focus on the specifics of supply chain management and EPCIS. What is the scope of the ESDS initiative? a. To create a generic information directory service? b. Or to create a discovery service specifically for EPCIS and its data scope? 3. I am uncomfortable with the portrayal of the role of the Discovery Service as an intermediary, between the Query Clients and the Information Resources. I think that this intermediary role compromises the real role of DS by expecting DS to perform many, potentially conflicting, roles as already mentioned in 1. above. This significantly increases the complexity of what the DS is supposed to be and also creates much more complex trust and access relationships. 4. I would like to return for a moment to the concept of the "Consolidated Information Broker", or CIB, that I raised a few weeks back (posting 21st April 2008). If you replace the Query Client in Mark's models with a "broker" type function, even one of the "Value-added track & trace applications & supply-chain management applications" shown on slide 5 of Mark's Terminology and Scope.ppt, then the relationship between the broker, the DS and the Information Resources is much more logical. The tasks of managing the real client requests, standing subscriptions, access and permissions etc. can then be handled by the "broker"/value-added application which uses the DS to locate data on behalf of the query clients. 5. This creates a simpler trust/authentication/access model because query clients would no longer have direct access to the DS, only well-trusted and certificated "broker"/value-added applications would be granted such access. Similarly query clients would have no direct access to the Information Resources, only the "broker"/value-added applications would have such access. The risk of information harvesting by "honeypot" resources is more or less eliminated in this way. 6. This approach, in my opinion, leaves the DS with a much clearer role. It has on the one hand only to deal with properly registered and authenticated Information Resources who are authorised to publish the whereabouts of information, probably with some strict scope controls to prevent false information from being published by otherwise legitimate publishers. On the other hand it responds to queries from properly registered and authenticated "brokers"/value-added applications. As Mark hoped, I also hope that these remarks will stimulate still further lively discussion which will move us towards our eventual goal. Best regards, David. -----Original Message----- From: esds-bounces@ietf.org [mailto:esds-bounces@ietf.org] On Behalf Of Mark Harrison Sent: 08 July 2008 11:10 To: esds@ietf.org Subject: [ESDS] Interaction models for Discovery Services Dear ESDS colleagues, Following on from the previous discussions on this mailing list about the interaction between Discovery Services and 'Consolidated Information Brokers', I have attached a couple of Powerpoint presentations, which I presented 3 weeks ago at a face-to-face meeting of the EPCglobal Data Discovery Joint Requirements Group. The presentation on the interaction models considers the possible sequences of message flows between a query client, an information resource and a Discovery Service, considering suitability of each model for one-off queries as well as standing queries, together with an analysis of their relative merits in terms of protecting the confidentiality of information resources, confidentiality of clients' queries, as well as considering the kinds of data to be stored in a DS, performance and latency issues and impact on the network traffic and possible security threats. The slides are intended to provide an easy-to-read animated summary of the analysis contained in section B of the document D2.4 from the BRIDGE project (High-level design document). http://www.bridge-project.eu/data/File/BRIDGE%20WP02%20High%20level%20design %20Discovery%20Services.pdf I would also like to acknowledge that the original BRIDGE document D2.4 section B was jointly authored by Trevor Burbridge (BT), Oliver Kasten (SAP), Cosmin Condea (SAP) and Mark Harrison (University of Cambridge, Auto-ID Lab), with additional inputs from Nicholas Pauvre (GS1 France) and members of AT4 wireless (who led BRIDGE WP2). I have also attached an Excel spreadsheet which indicates some of the advantages and disadvantages from the perspectives of the client, resource, DS and network traffic, together with some possible countermeasures. Feel free to modify the spreadsheet - though I suggest that you highlight any changed cells (e.g. set background colour of cell to yellow) so it is clear to everyone which changes you have made. I really hope that these presentations and the spreadsheet will stimulate some lively discussion on this mailing list and I look forward to reading your comments about the different interaction models for Discovery Services. Best regards, - Mark Harrison
_______________________________________________ ESDS mailing list ESDS@ietf.org https://www.ietf.org/mailman/listinfo/esds
- [ESDS] Interaction models for Discovery Services Mark Harrison
- Re: [ESDS] Interaction models for Discovery Servi… Kary Främling
- Re: [ESDS] Interaction models for Discovery Servi… Kenneth R. Traub
- Re: [ESDS] Interaction models for Discovery Servi… Mark Harrison
- Re: [ESDS] Interaction models for Discovery Servi… Kenneth R. Traub
- Re: [ESDS] Interaction models for Discovery Servi… trevor.burbridge
- Re: [ESDS] Interaction models for Discovery Servi… Kary Främling
- Re: [ESDS] Interaction models for Discovery Servi… Mark Harrison
- Re: [ESDS] Interaction models for Discovery Servi… Kenneth R. Traub
- Re: [ESDS] Interaction models for Discovery Servi… David Potter
- Re: [ESDS] Interaction models for Discovery Servi… Mark Harrison