ALTO Problem Statement draft-marocco-alto-problem-statement-03 Enrico Marocco Vijay Gurbani 73 rd IETF Meeting.

Slides:



Advertisements
Similar presentations
Happy Eyeballs Extension for Multiple Interfaces Gang Chen Carl
Advertisements

Applications Test Results in MIF environment draft-zheng-mif-apps-test-02.txt IETF 81 Quebec City.
Northwestern University Business Intelligence Solutions Cognos 8 Best Practices Volume 3 Advanced Developer Techniques.
EDNS0 Client-Subnet for DNS based CDNs
DHCP Security Analysis Dallas Holmes / Matt MacClary ECE 478 Project Spring 2003.
H. 323 and firewalls: Problem Statement and Solution Framework Author: Melinda Shore, Nokia Presenter: Shannon McCracken.
Distributed components
Can ISPs and P2P Users Cooperate for Improved Performance? Vinay Aggarwal, Anja Feldmann (German Telecom Laboratories) Christian Scheideler (TU, Munchen)
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Distributed Systems: Client/Server Computing
© 2010 Cisco Systems, Inc. All rights reserved.Cisco Network Positioning System 1 Application Layer Traffic Optimization (ALTO) Network Positioning System.
Infrastructure to Application Exposure - USE CASE: CDN – Jan Seedorf IETF 83, Paris i2aex BoF Monday, March
PMIPv6 multicasting support using native infrastructure draft-sijeon-multimob-direct-routing-pmip6-01.txt Seil Jeon and Younghan Kim 81 st IETF, July 2011,
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
IETF 68 – SIMPLE WG SIMPLE Problem Statement draft-ietf-simple-interdomain-scaling-analysis-00 Avshalom Houri – IBM Tim Rang - Microsoft Edwin Aoki – AOL.
DEMIGUISE STORAGE An Anonymous File Storage System VIJAY KUMAR RAVI PRAGATHI SEGIREDDY COMP 512.
NECP: the Network Element Control Protocol IETF WREC Working Group November 11, 1999.
| NOME AUTORE TELECOM ITALIA GROUP Vacation Planning RIMINI PORTOFINO SORRENTO TAORMINA Randomly picking from a list of nice locations does not sound like.
ALTO Problem Statement draft-marocco-alto-problem-statement-02 Enrico Marocco Vijay Gurbani 72 nd IETF Meeting.
Draft-campbell-dime-load- considerations-01 IETF 92 DIME Working Group Meeting Dallas, Texas.
1 Insertion of ISP-owned Peer & Locality Awareness in BitTorrent Ioanna Papafili, George D. Stamoulis, Sergios Soursos AUEB EuroNF workshop, Athens October.
EICP—extended Internet Cache Protocol (draft-zhang-ppsp-eicp-00.txt ) Presenter: Christian Schmidt IETF-81, Quebec, July 2011.
Draft-engelstad-manet- name-resolution-00.txt IETF 57, Vienna MANET WG meeting Paal Engelstad, Telenor R&D / UniK.
P2P Traffic Localization by Alias Tracker for Tracker-based P2P applications (ATTP) draft-zhang-alto-attp-02 Yunfei Zhang China Mobile.
DNS based IP NetLocation Service China Telecom Guangzhou Institute
TELECOM ITALIA GROUP P2P-TV Workshop Torino, Jan 2011 Application-Layer Traffic Optimization How did we get here? Where are we going? Enrico Marocco
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
The PROXIDOR Service draft-akonjang-alto-proxidor-00.txt S. Previdi O. Akonjang A. Feldmann
ALTO BOF Charter Discussion. Charter Iterated (twice) on the list  Several comments on the first version Terminology, caching  No complains on current.
Oracle's Distributed Database Bora Yasa. Definition A Distributed Database is a set of databases stored on multiple computers at different locations and.
CSC 312 Lecture 10 JDBC - Basics. Network Client Machine Server Machine (raptor.cs.mercer.edu) Client Application Server Prog. (Oracle) Database (csc312std)
Privacy Considerations for Internet Protocols Alissa Cooper 1.
Reliable File Transfer: Lessons Learned Bill Allcock, ANL Ravi Madduri, ANL.
Third-party ALTO server discovery draft-kiesel-alto-3pdisc-02 Sebastian Kiesel Marco Tomsu Nico Schwan Michael Scharf IETF 77, March 2010.
Guidance for Running Multiple IPv6 Prefixes (draft-liu-v6ops-running-multiple-prefixes-02) Bing Liu, Sheng Jiang (Speaker), Yang Bo IETF91
Interdomain Traffic Engineering in a Loc/Id Separation Context INM'08 October 19, D. Saucez, B. Donnet, L. Iannone, O. Bonaventure.
IETF 67 – SIMPLE WG SIMPLE Problem Statement Draft-rang-simple-problem-statement-01 Tim Rang - Microsoft Avshalom Houri – IBM Edwin Aoki – AOL.
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
Information-Centric Networks Section # 3.2: DNS Issues Instructor: George Xylomenos Department: Informatics.
Content caching and scheduling in wireless networks with elastic and inelastic traffic Group-VI 09CS CS CS30020 Performance Modelling in Computer.
Cryptography and Network Security Chapter 16 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
COS 420 Day 15. Agenda Finish Individualized Project Presentations on Thrusday Have Grading sheets to me by Friday Group Project Discussion Goals & Timelines.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
PCE 64 th IETF PCE Policy Architecture draft-berger-pce-policy-architecture-00.txt Lou Berger Igor Bryskin Dimitri Papadimitriou.
Paris, August 2005 IETF 63 rd – mip6 WG Mobile IPv6 bootstrapping in split scenario (draft-ietf-mip6-bootstrapping-split-00) mip6-boot-sol DT Gerardo Giaretta,
ALTO: A Multi Dimensional Peer Selection Problem IETF 73 Saumitra Das
IETF 66 – SIMPLE WG SIMPLE Problem Statement Draft-rang-simple-problem-statement-00 Tim Rang - Microsoft Avshalom Houri – IBM Edwin Aoki – AOL.
John S. Otto Mario A. Sánchez John P. Rula Fabián E. Bustamante Northwestern, EECS.
Presented by Deepak Varghese Reg No: Introduction Application S/W for server load balancing Many client requests make server congestion Distribute.
DOTS Requirements Andrew Mortensen November 2015 IETF 94 1.
IPv6: Deployment Plan SPRING Rogers User Cases Prepared by: Ida Leung Network Strategy and Technology Development Version: v1.
P4P: Proactive Provider Assistance for P2P Haiyong Xie Yale University.
EDNS Client Subnet (ECS) in CDN solution
ALTO Requirements draft-ietf-alto-reqs-04
Virtual Private Networks
Greg Bernstein Young Lee
Network Cost Services for Network-Aware FI Applications
Thierry Ernst (INRIA and WIDE) Hesham Soliman (Ericsson)
Peer-to-Peer Networking
Teemu Savolainen (Nokia) MIF WG IETF#75 28-July-2009
ALTO VPN Service draft-scharf-alto-vpn-service-00
with distributed anchor routers
Outline Introduction Background Distributed DBMS Architecture
#01 Client/Server Computing
Routing Proximity Services IETF 73 Minneapolis, November 2008
PPPoE Internet Point to Point Protocol over Ethernet
Problem Statement of PPSP
Outline Introduction Background Distributed DBMS Architecture
#01 Client/Server Computing
Presentation transcript:

ALTO Problem Statement draft-marocco-alto-problem-statement-03 Enrico Marocco Vijay Gurbani 73 rd IETF Meeting

The Problem Provide applications with information to perform better-than-random peer selection  To improve performance  To reduce inter-domain traffic  Applies to all applications which can access resources available in multiple instances

Changes from -02 Clarifications  Achieve “better-than-random initial peer selection” Was: find the “best” peer(s)‏  Optimization of network resources may require a balancing of traffic localization and delocalization No assumption that “local” means “optimal”  Replaced the term “oracle” To avoid confusion with one possible solution approach Restructured  Terminology, The Problem, Use Cases, Solution Considerations

Terminology Application Peer Resource Resource Identifier Local traffic Transit traffic Peering traffic... ALTO Service ALTO Client ALTO Query ALTO Reply ALTO Transaction... ALTO Server  Who serves a query  Should not imply a client/server implementation  Suggestions?

Solution Considerations ALTO Service Providers  Network operators, third-parties, communities User privacy  Must not require disclosure of information sensible for the users (e.g. lists of IPs involved in a swarm)‏ Topology hiding  Must not require disclosure of information sensible for ISPs (i.e. stay away from business matters)‏ Coexistence with caching solutions Protocol extensibility