common endpoint locator pools common endpoint locator
play

Common Endpoint Locator Pools Common Endpoint Locator Pools Common - PowerPoint PPT Presentation

Common Endpoint Locator Pools Common Endpoint Locator Pools Common Endpoint Locator Pools (CELP) (CELP) (CELP) draft-crocker-celp draft-crocker-celp Dave Crocker Dave Crocker Avri Doria Avri Doria Multiple


  1. Common Endpoint Locator Pools Common Endpoint Locator Pools Common Endpoint Locator Pools (CELP) (CELP) (CELP) � draft-crocker-celp � draft-crocker-celp � Dave Crocker � Dave Crocker � Avri Doria � Avri Doria � Multiple multiaddressing schemes � Multiple multiaddressing schemes � Different approaches have different benefits � Different approaches have different benefits � Proposal: � Proposal: � Share locator pools across independent associations Share locator pools across independent associations � Share locator pools across independent associations � Reduce multiaddressing control transaction costs � Reduce multiaddressing control transaction costs � Improve availability of locator performance information � Improve availability of locator performance information D. Crocker 1 3/1/2004 1

  2. Synergy Across Associations Synergy Across Associations Synergy Across Associations � Transport-based schemes � Transport-based schemes Multiplex control exchange in data stream, so control Multiplex control exchange in data stream, so control � � data does not increase packet overhead data does not increase packet overhead Can naturally obtain path quality information Can naturally obtain path quality information � � � Wedge-based schemes � Wedge-based schemes Multiaddressing for legacy transports Multiaddressing for legacy transports � � Naturally independent of individual transport associations Naturally independent of individual transport associations � � Can operate asynchronously of associations, deferring Can operate asynchronously of associations, deferring � � control exchanges, often needing no exchange control exchanges, often needing no exchange Can maintain pools with different referential granularity Can maintain pools with different referential granularity � � D. Crocker 2 3/1/2004 2

  3. Framework Framework Framework Tport � Variable granularity TCP � Variable granularity MA � {local, remote} � {local, remote} Add � {local, remote, flow} � {local, remote, flow} Wedge Delete � {local, remote, protocol, port} � {local, remote, protocol, port} Modify MA � {local, remote, type of service} � {local, remote, type of service} Locator Locator Pools Pools � Status � Status H1 all H1 all EP2 EP2 sip sip � Reachability � Reachability EP2 file EP2 file � Performance � Performance H = host EP = endpoint IP MA = multiaddressing D. Crocker 3 3/1/2004 3

  4. Issues Issues Issues Path selection Path selection � � Which paths are available or better? � Which paths are available or better? � Suggestion: Defer generality; start with primary and fallback choices � Suggestion: Defer generality; start with primary and fallback choices � Local/Remote combinatorials Local/Remote combinatorials � � Suggestion: Defer generality; start with just {remote} or {local, remote} Suggestion: Defer generality; start with just {remote} or {local, remote} � � Security Security � � Different schemes have different degrees of security � concern about Different schemes have different degrees of security � concern about � � weakest participant affects entire service weakest participant affects entire service Maintaining synchrony among different modifiers of pool Maintaining synchrony among different modifiers of pool � � Referential commonality Referential commonality � � Different schemes use different identifiers � Different schemes use different identifiers � How to know that different locators refer to same endpoint? � How to know that different locators refer to same endpoint? � Suggestion: T hat’s what domain names are for… Suggestion: T hat’s what domain names are for… � � D. Crocker 4 3/1/2004 4

  5. Next Steps Next Steps Next Steps � Resolve � Resolve � Differential security issues � Differential security issues � Near-term vs. long-term issues � Near-term vs. long-term issues � Determining common endpoint referencing � Determining common endpoint referencing � Formulate CELP service model details � Formulate CELP service model details � Data structures � Data structures � Operations � Operations D. Crocker 5 3/1/2004 5

Recommend


More recommend