ICEBERG Design

This page has the notes from brainstorm sessions on the design of the ICEBERG architecture. Comments and suggestions are welcome. Please send them to me.

Tuesday, Feb 9 1999

ICEBERG Architecture

The ICEBERG Architecture for Computer-Telephony Inetgration is shown in Figure 1 (copied from Anthony's BMRC talk). Iceberg Access Points (IAPs) are placed between an existing network and the IP-Core. IAPs are not only protocol level gateways but also service level transformation agents.

Figure 1: ICEBERG Architecture

Figure 1: ICEBERG Architecture

Communication through the ICEBERG network is device and end-point independent. Services are accessible to users across all access networks and end-devices. The IAPs do the transformations to provide this transparency.

The Issue of Naming

Definition:

Our requirement is that a user should be able to access services through multiple devices that she may possess. For example, she should be able to receive phone calls on her cell-phone or laptop or POTS phone. And this redirection should be transparent to the caller. This requires that the network specific ids of the different devices should map to a unique-id that identifies the user. Also, the redirection should depend on a set of user-specified preference rules.

Proposed Solution:

Another level of refinement:

User Preference Registry

Seen as a black box, the user preference registry is the component of the system that decides the preferred end-point on a per-call basis. The current list of variables that can decide the preferred end-point fall into 2 categories:

  1. Per-call information
  2. Mid-call state

The IN-Architecture also has call handling based on some of these parameters. But I think the differences are:

We should look at how this is handled in the recent efforts on personal mobility standardization in the telecomm world (UMTS/FPLMTS).

Current Design

Coming up


Bhaskaran Raman, bhaskar@cs.berkeley.edu
Last modified: Wed Feb 10 20:15:33 PST 1999