common endpoint locator pools common endpoint locator
play

Common Endpoint Locator Pools Common Endpoint Locator Pools Common - PowerPoint PPT Presentation

Common Endpoint Locator Pools Common Endpoint Locator Pools Common Endpoint Locator Pools (CELP) (CELP) (CELP) draft-crocker-celp draft-crocker-celp Dave Crocker Dave Crocker Avri Doria Avri Doria Multiple


  1. Common Endpoint Locator Pools Common Endpoint Locator Pools Common Endpoint Locator Pools (CELP) (CELP) (CELP) � draft-crocker-celp � draft-crocker-celp � Dave Crocker � Dave Crocker � Avri Doria � Avri Doria � Multiple multiaddressing schemes � Multiple multiaddressing schemes � Different approaches have different benefits � Different approaches have different benefits � Proposal: � Proposal: � Share locator pools across independent associations Share locator pools across independent associations � Share locator pools across independent associations � Reduce multiaddressing control transaction costs � Reduce multiaddressing control transaction costs � Improve availability of locator performance information � Improve availability of locator performance information D. Crocker 1 3/1/2004 1

  2. Synergy Across Associations Synergy Across Associations Synergy Across Associations � Transport-based schemes � Transport-based schemes Multiplex control exchange in data stream, so control Multiplex control exchange in data stream, so control � � data does not increase packet overhead data does not increase packet overhead Can naturally obtain path quality information Can naturally obtain path quality information � � � Wedge-based schemes � Wedge-based schemes Multiaddressing for legacy transports Multiaddressing for legacy transports � � Naturally independent of individual transport associations Naturally independent of individual transport associations � � Can operate asynchronously of associations, deferring Can operate asynchronously of associations, deferring � � control exchanges, often needing no exchange control exchanges, often needing no exchange Can maintain pools with different referential granularity Can maintain pools with different referential granularity � � D. Crocker 2 3/1/2004 2

  3. Framework Framework Framework Tport � Variable granularity TCP � Variable granularity MA � {local, remote} � {local, remote} Add � {local, remote, flow} � {local, remote, flow} Wedge Delete � {local, remote, protocol, port} � {local, remote, protocol, port} Modify MA � {local, remote, type of service} � {local, remote, type of service} Locator Locator Pools Pools � Status � Status H1 all H1 all EP2 EP2 sip sip � Reachability � Reachability EP2 file EP2 file � Performance � Performance H = host EP = endpoint IP MA = multiaddressing D. Crocker 3 3/1/2004 3

  4. Issues Issues Issues Path selection Path selection � � Which paths are available or better? � Which paths are available or better? � Suggestion: Defer generality; start with primary and fallback choices � Suggestion: Defer generality; start with primary and fallback choices � Local/Remote combinatorials Local/Remote combinatorials � � Suggestion: Defer generality; start with just {remote} or {local, remote} Suggestion: Defer generality; start with just {remote} or {local, remote} � � Security Security � � Different schemes have different degrees of security � concern about Different schemes have different degrees of security � concern about � � weakest participant affects entire service weakest participant affects entire service Maintaining synchrony among different modifiers of pool Maintaining synchrony among different modifiers of pool � � Referential commonality Referential commonality � � Different schemes use different identifiers � Different schemes use different identifiers � How to know that different locators refer to same endpoint? � How to know that different locators refer to same endpoint? � Suggestion: T hat’s what domain names are for… Suggestion: T hat’s what domain names are for… � � D. Crocker 4 3/1/2004 4

  5. Next Steps Next Steps Next Steps � Resolve � Resolve � Differential security issues � Differential security issues � Near-term vs. long-term issues � Near-term vs. long-term issues � Determining common endpoint referencing � Determining common endpoint referencing � Formulate CELP service model details � Formulate CELP service model details � Data structures � Data structures � Operations � Operations D. Crocker 5 3/1/2004 5

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend