Criteria for Protocol Selection Barbara Stark, AT&T Tim Carey, Alcatel-Lucent Prepared for IETF LMAP WG discussion during 15 December 2014 meeting. 11.

Slides:



Advertisements
Similar presentations
Oct, 26 th, 2010 OGF 29, FVGA-WG: Firewall Virtualization for Grid Applications Firewall Virtualization for Grid Applications - Status update
Advertisements

Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments draft-alexander-roll-mikey-lln-key-mgmt-01.txt.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Deployment Considerations for Dual-stack Lite draft-lee-softwire-dslite-deployment-00 Yiu Lee, Roberta Magione, Carl Williams, Christian Jacquenet Mohamed.
GridFTP Introduction – Page 1Grid Forum 5 GridFTP Steve Tuecke Argonne National Laboratory.
Understand Web Services
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Philips Research France Delivery Context in MPEG-21 Sylvain Devillers Philips Research France Anthony Vetro Mitsubishi Electric Research Laboratories.
Chapter 8 Web Security.
Client-server interactions in Mobile Applications.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) Web Service Description KEYPROV WG IETF-68 Prague March 2007 Andrea Doherty.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
 Chirita Ionel  Application Security  OWASP Chapter board member.
Rest Style Large MeAsurement Platform Protocol Draft-liu-lmap-rest-02 V.Liu L.Deng S.Liu
Automated XML Content Data Exchange and Management draft-waltermire-content-repository-00
Light Weight Access Point Protocol (LWAPP) IETF 57 Pat Calhoun, Airespace.
PPSP Tracker Protocol draft-gu-ppsp-tracker-protocol PPSP WG IETF 82 Taipei Rui Cruz (presenter) Mário Nunes, Yingjie Gu, Jinwei Xia, David Bryan, João.
March 7, 2005MOBIKE WG, IETF 621 Mobility Protocol Options for IKEv2 (MOPO-IKE) Pasi Eronen.
The NISO Question/Answer Transaction Protocol (QATP) AVIAC January 2004 Donna Dinberg Library and Archives Canada Mark Needleman Sirsi Corporation.
September, 2005What IHE Delivers 1 ITI Security Profiles – ATNA, CT IHE Vendors Webinar 2006 IHE IT Infrastructure Education Robert Horn, Agfa Healthcare.
TCP/IP Protocols Dr. Sharon Hall Perkins Applications World Wide Web(HTTP) Presented by.
Distributed systems – Part 2  Bluetooth 4 Anila Mjeda.
CIS 1310 – HTML & CSS 1 Introduction to the Internet.
Web Services Description Language CS409 Application Services Even Semester 2007.
Information Model for LMAP draft-ietf-lmap-information-model-00 IETF 89, London, March 2014 Trevor Burbridge, BT Philip Eardley, BT Marcelo Bagnulo Braun,
The NISO NETREF Protocol Mark H Needleman Product Manager- Standards Sirsi Corporation LITA National Conference 2004.
Future of TransXML Workshop NCHRP Project Frances Harrison Spy Pond Partners, LLC.
Abierman-nanog-30may03 1 XML Router Configs BOF Operator Involvement Andy Bierman
Student Financial Assistance Presented by:. Session 53 CommonLine Release 5 Setting the Standard Presented by: Tim Cameron – NCHELP Candy Pfeiffer – Great.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Abierman-netconf-mar03 1 NETCONF BOF 56th IETF San Francisco, California March 17, 2003 Discussion: Admin:
Dnssd WG Chairs: Tim Chown Ralph Droms IETF 89, London, 3 rd March 2014.
Draft-kellil-sam-mtocp-01.txt – CEA, LIST - 78th IETF Meeting, 29July Multiparty Transport Overlay Control Protocol (MTOCP) draft-kellil-sam-mtocp-01.txt.
P-IMAP Draft Overview (
Web Services. Abstract  Web Services is a technology applicable for computationally distributed problems, including access to large databases What other.
Access Control and Markup Languages Pages 183 – 187 in the CISSP 1.
PAWS: Security Considerations Yizhuang WU, Yang CUI PAWS WG
 A Web service is a method of communication between two electronic devices over World Wide Web.
GTP (Generic Tunneling Protocol) Alessio Casati/Lucent Technologies Charles E. Perkins/Nokia Research IETF 47 draft-casati-gtp-00.txt.
Architectural Principles for Services Group Name: WG2- ARC Source: Tim Carey, ALU, Meeting Date: Agenda Item:
Hiroyasu Kimura, Yoshifumi Atarashi, and Hidemitsu Higuchi
Developments of AEO in Chinese Taipei
Delivering Services to Residential Appliances by Utilizing Remote Resource Awareness Andreas Häber, PhD Research Fellow University.
Basic Device Definition Version 1.0 Date: For UPnP™ Version 1.0 (Status: Template Design Complete) File from: BasicDevice-1.0.pdf Author: Scott.
Emu wg, IETF 70 Steve Hanna, EAP-TTLS draft-funk-eap-ttls-v0-02.txt draft-hanna-eap-ttls-agility-00.txt emu wg, IETF 70 Steve Hanna,
Widex Framework Draft draft-stirbu-widex-framework-00.txt Vlad Stirbu, Dave Raggett IETF 65, Dallas.
E2EKey Resource Group Name: SEC WG Source: Qualcomm Inc., Wolfgang Granzow & Phil Hawkes Meeting Date: SEC#20.3, Agenda Item: End-to-End Security.
RFC3261 (Almost) Robert Sparks. SIPiT 10 2 Status of the New SIP RFC Passed IETF Last Call In the RFC Editor queue Author’s 48 hours review imminent IMPORTANT:
Moving towards an IRS WG Charter Ross Callon IETF 85, Atlanta.
Netconf Schema Query Mark Scott IETF 70 Vancouver December 2007
Information Model for LMAP draft-ietf-lmap-information-model-02 (and beyond!) IETF Interim, Dublin, September 2014 Trevor Burbridge, BT 1.
Asset Summary Reporting draft-davidson-sacm-asr-00 David Waltermire
LMAP Framework draft-ietf-lmap-framework-01 Philip Eardley Al Morton, Marcelo Bagnulo, Trevor Burbridge, Paul Aitken, Aamer Akhter 6 th November 2013 Vancouver,
DM Collaboration – OMA & BBF: Deployment Scenarios Group Name: WG5 - MAS Source: Tim Carey, ALU, Meeting Date:
Draft-fm-bess-service-chaining-01 Prague, July 2015 Rex Fernando Stuart Mackie Dhananjaya Rao Bruno Rijsman Maria Napierala.
IP Telephony (VoIP).
LMAP BoF 1. ISP use case 2. Framework
OGSA-WG Basic Profile Session #1 Security
Cryptography and Network Security
Unit – 5 JAVA Web Services
IETF-59 P-IMAP Draft Overview ( Stéphane H. Maes – Jean.
Rest Style Large MeAsurement Platform Protocol
Subscribing to YANG datastore push updates draft-ietf-netconf-yang-push-02 NETMOD WG IETF #95 Buenos Aires 4-April-2015 Alexander Clemm Alberto Gonzalez.
الوحدة 20 مهارات التواصل مع الآخرين
PREPARED BY: RUMMY MIRANDA
Cryptography and Network Security
Architecture Competency Group
Windows desktop sharing
Cryptography and Network Security
Presentation transcript:

Criteria for Protocol Selection Barbara Stark, AT&T Tim Carey, Alcatel-Lucent Prepared for IETF LMAP WG discussion during 15 December 2014 meeting. 11 December 20141

Criteria for Controller Protocol Selection MUST have (protocol will not be considered that does not meet these criteria): There must be a mechanism that allows a Controller to cause a session to be established with a MA. There must be a mechanism that allows a MA to cause a session to be established with a Controller. The protocol session must be capable of being secured using certificates. Page 2

Criteria for Controller Protocol Selection Criteria for comparison: How many exchanges are required to send a complete instruction set? (less is better) How many exchanges are required to send a status update? (less is better) Is it possible to provide partial updates? (yes is better) Are there any special mechanisms (other than STUN/TURN/ICE or using port forwarding pinholes, PCP, UPnP IGD, etc.) for NAT/firewall traversal? (asked out of curiosity, but not expecting anything) How many bytes of overhead are required to send a complete instruction set? (less is better) How many bytes of overhead are required to send a status update? (less is better) How widely used is the protocol and/or its protocol elements in mass market devices? (widely is better) What mechanisms exist to ensure interoperability of MA and Controller implementations? (existence of something is better) Are the components of the protocol available as open source? (yes is better) What ecosystem of tools exists for developers implementing the protocol (include tools for data model creation)? (existence of useful tools is better) Is the protocol versionable? (yes is better – or is this mandatory?) – If yes, what is the process for extending the protocol? (for information) What are the encodings supported by the protocol (SOAP, JSON, XML, etc.)? (for information) Page 3

Criteria for Report Protocol Selection MUST have (protocol will not be considered that does not meet these criteria): There must be a mechanism that allows a MA to cause a session to be established with a Collector. The protocol session must be capable of being secured using certificates. Criteria for comparison: How many exchanges are required to send a report? (less is better) Does it allow for sending multiple reports in a session? (yes is better) Is there a capability for long-lived sessions. (yes is better) Is compression supported? (yes is better – or is this mandatory?) How many bytes of overhead are required to send a report? (less is better) How widely used is the protocol and/or its protocol elements in mass market devices? (widely is better) What mechanisms exist to ensure interoperability of MA and Collector implementations? (existence of something is better) Are the components of the protocol available as open source? (yes is better) What ecosystem of tools exists for developers implementing the protocol (include tools for data model creation)? (existence of useful tools is better) Is the protocol versionable? (yes is better – or is this mandatory?) – If yes, what is the process for extending the protocol? (for information) What are the encodings supported by the protocol (SOAP, JSON, XML, etc.)? (for information) Page 4