Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Common Endpoint Locator Pools (CELP) draft-crocker-celp draft-crocker-celp There There are are multiple multiple multiaddressing multiaddressing schemes schemes Dave Dave Crocker Crocker Avri Avri Doria Doria Different Different approaches approaches have have different different benefits benefits Proposal: Proposal: Share Share pools pools of of locators, locators, across across associations associations Will Will reduce reduce multiaddressing multiaddressing control control transaction transaction costs costs Will Will improve improve availability availability of of locator locator performance performance information information D. Crocker 1 3/3/04 Synergy Across Associations Transport-based Transport-based schemes schemes Multiplex Multiplex the the control control exchange exchange in in the the data data stream, stream, so so control control data data does does not not increase increase packet packet overhead overhead Permits Permits obtaining obtaining path path quality quality information information naturally naturally Wedge-based Wedge-based schemes schemes D. Crocker Provides Provides multiaddressing multiaddressing for for legacy legacy transports transports Naturally Naturally independent independent of of individual individual transport transport associations associations Can Can operate operate asynchronously asynchronously of of associations, associations, deferring deferring control control exchanges, exchanges, often often needing needing no no exchange exchange Can Can maintain maintain pools pools with with different different referential referential granularity granularity 2 3/3/04 Framework Tport MA TCP Wedge MA {local, {local, remote} remote} {local, {local, remote, remote, flow} flow} {local, {local, remote, remote, protocol, protocol, port} port} {local, {local, remote, remote, type type of of service} service} Add Delete Modify Locator Pools H1all EP2sip EP2file H = host EP = endpoint MA = multiaddressing D. Crocker Variable Variable granularity granularity Status Status Reachability Reachability Performance Performance IP 3 3/3/04 Issues Path Path selection selection Local/Remote Local/Remote combinatorials combinatorials Suggestion: Suggestion: start start with with just just {remote} {remote} or or {local, {local, remote} remote} Security Security Which Which paths paths are are available available or or better? better? Suggest: Suggest: Start Start with with simply simply primary/fallback primary/fallback choices choices Different Different schemes schemes have have different different degrees degrees of of security security concern concern about about weakest weakest participant participant affects affects entire entire service service Maintaining Maintaining synchrony synchrony among among different different modifiers modifiers of of pool pool Referential Referential commonality commonality D. Crocker Different Different schemes schemes use use different different identifiers identifiers How How to to know know that that different different locators locators refer refer to to same same endpoint? endpoint? Suggestion: Suggestion: That’s That’s what what domain domain names names or or URIs URIs are are for… for… 4 3/3/04 Next Steps Resolve Resolve different different consumer consumer mechanisms, mechanisms, policies policies and and results results security, security, identification, identification, congestion congestion measurement, measurement, locator locator inclusion, inclusion, etc. etc. Determine Determine common common scheme scheme for for referencing referencing pools pools and and entries entries Implementation Implementation challenges, challenges, such such as as adding adding identifiers identifiers to to kernel kernel networking networking software software (eg, (eg, domain domain names) names) D. Crocker Admin Admin and and operations operations for for identifier identifier mechanism mechanism 5 Distinguish Distinguish identifier identifier assignment assignment versus identifier lookup versus identifier lookup Formulate Formulate CELP CELP service service model model details details Data Data structures structures Operations Operations Near-term Near-term vs. vs. long-term long-term issues issues 3/3/04