Download Common Endpoint Locator Pools (CELP)

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Cyber-security regulation wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Information security wikipedia , lookup

Trusted Computing wikipedia , lookup

Information privacy law wikipedia , lookup

Computer security wikipedia , lookup

Security-focused operating system wikipedia , lookup

Transcript
Common Endpoint Locator Pools
(CELP)


draft-crocker-celp
draft-crocker-celp




There
There are
are multiple
multiple multiaddressing
multiaddressing schemes
schemes



Dave
Dave Crocker
Crocker
Avri
Avri Doria
Doria
Different
Different approaches
approaches have
have different
different benefits
benefits
Proposal:
Proposal:



Share
Share pools
pools of
of locators,
locators, across
across associations
associations
Will
Will reduce
reduce multiaddressing
multiaddressing control
control transaction
transaction costs
costs
Will
Will improve
improve availability
availability of
of locator
locator performance
performance information
information
D. Crocker
1
3/3/04
Synergy Across Associations


Transport-based
Transport-based schemes
schemes




Multiplex
Multiplex the
the control
control exchange
exchange in
in the
the data
data stream,
stream, so
so control
control data
data
does
does not
not increase
increase packet
packet overhead
overhead
Permits
Permits obtaining
obtaining path
path quality
quality information
information naturally
naturally
Wedge-based
Wedge-based schemes
schemes




D. Crocker
Provides
Provides multiaddressing
multiaddressing for
for legacy
legacy transports
transports
Naturally
Naturally independent
independent of
of individual
individual transport
transport associations
associations
Can
Can operate
operate asynchronously
asynchronously of
of associations,
associations, deferring
deferring control
control
exchanges,
exchanges, often
often needing
needing no
no exchange
exchange
Can
Can maintain
maintain pools
pools with
with different
different referential
referential granularity
granularity
2
3/3/04
Framework
Tport
MA
TCP
Wedge
MA


{local,
{local, remote}
remote}
 {local,
{local, remote,
remote, flow}
flow}
 {local,
{local, remote,
remote, protocol,
protocol, port}
port}
 {local,
{local, remote,
remote, type
type of
of
service}
service}

Add
Delete
Modify
Locator
Pools
H1all
EP2sip


EP2file
H = host
EP = endpoint
MA = multiaddressing
D. Crocker
Variable
Variable granularity
granularity
Status
Status
Reachability
Reachability
 Performance
Performance

IP
3
3/3/04
Issues

Path
Path selection
selection



Local/Remote
Local/Remote combinatorials
combinatorials


Suggestion:
Suggestion: start
start with
with just
just {remote}
{remote} or
or {local,
{local, remote}
remote}
Security
Security



Which
Which paths
paths are
are available
available or
or better?
better?
Suggest:
Suggest: Start
Start with
with simply
simply primary/fallback
primary/fallback choices
choices
Different
Different schemes
schemes have
have different
different degrees
degrees of
of security
security 
 concern
concern
about
about weakest
weakest participant
participant affects
affects entire
entire service
service
Maintaining
Maintaining synchrony
synchrony among
among different
different modifiers
modifiers of
of pool
pool
Referential
Referential commonality
commonality



D. Crocker
Different
Different schemes
schemes use
use different
different identifiers
identifiers
How
How to
to know
know that
that different
different locators
locators refer
refer to
to same
same endpoint?
endpoint?
Suggestion:
Suggestion: That’s
That’s what
what domain
domain names
names or
or URIs
URIs are
are for…
for…
4
3/3/04
Next Steps




Resolve
Resolve different
different consumer
consumer
mechanisms,
mechanisms, policies
policies and
and results
results
 security,
security,
 identification,
identification,
 congestion
congestion measurement,
measurement,
 locator
locator inclusion,
inclusion, etc.
etc.





Determine
Determine common
common scheme
scheme for
for
referencing
referencing pools
pools and
and entries
entries
 Implementation
Implementation challenges,
challenges, such
such
as
as adding
adding identifiers
identifiers to
to kernel
kernel
networking
networking software
software (eg,
(eg, domain
domain
names)
names)
D. Crocker
Admin
Admin and
and operations
operations for
for
identifier
identifier mechanism
mechanism


5
Distinguish
Distinguish identifier
identifier assignment
assignment
versus
identifier
lookup
versus identifier lookup
Formulate
Formulate CELP
CELP service
service model
model details
details

Data
Data structures
structures

Operations
Operations
Near-term
Near-term vs.
vs. long-term
long-term issues
issues
3/3/04