1 1 D. Crocker9/23/2015 Common Endpoint Locator Pools (CELP)  draft-crocker-celp  Dave Crocker  Avri Doria  Multiple multiaddressing schemes  Different.

Slides:



Advertisements
Similar presentations
Approaches to Multi-Homing for IPv6 An Architectural View of IPv6 MultiHoming proposals Geoff Huston 2004.
Advertisements

Architectural Approaches to Multi-Homing for IPv6 A Walk-Through of draft-huston-multi6-architectures-00 Geoff Huston June 2004.
1 An Update on Multihoming in IPv6 Report on IETF Activity IPv6 Technical SIG 1 Sept 2004 APNIC18, Nadi, Fiji Geoff Huston.
Chapter 7: Transport Layer
OSI Model OSI MODEL.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Multiaddressing with MAST SAINT 2004, Tokyo D. Crocker Brandenburg InternetWorking SAINT 2004, Tokyo D. Crocker Brandenburg.
1 MAST and Multi6 MAST and Multi6  MAST  Multiple Address Service for Transport  draft-crocker-mast-proposal  A service to maintain locator pools Simultaneous.
Protocols and the TCP/IP Suite
Reliable Networking Systems The goals: Implement a reliable network application of a file sharing network. Implement a reliable network application of.
1 Version 3.0 Module 10 Routing Fundamentals and Subnetting.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Gursharan Singh Tatla Transport Layer 16-May
Chapter 2 TCP/ IP PROTOCOL STACK. TCP/IP Protocol Suite Describes a set of general design guidelines and implementations of specific networking protocols.
Ensuring the Reliability of Data Delivery © 2004 Cisco Systems, Inc. All rights reserved. Understanding How UDP and TCP Work INTRO v2.0—6-1.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
The OSI Reference Model Key concepts: Layers Communications between two adjacent layers Encapsulation Multiplexing and demultiplexing Tunneling.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
Session 10 Windows Platform Eng. Dina Alkhoudari.
Presentation on Osi & TCP/IP MODEL
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
6.1. Transport Control Protocol (TCP) It is the most widely used transport protocol in the world. Provides reliable end to end connection between two hosts.
Quintum Confidential and Proprietary 1 Quintum Technologies, Inc. Session Border Controller and VoIP Devices Behind Firewalls Tim Thornton, CTO.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
The OSI Model.
Transport Layer: UDP, TCP
Sockets process sends/receives messages to/from its socket
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
UNDERSTANDING THE HOST-TO-HOST COMMUNICATIONS MODEL - OSI LAYER & TCP/IP MODEL 1.
Presented By Team Netgeeks SIP Session Initiation Protocol.
MODULE I NETWORKING CONCEPTS.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
William Stallings Data and Computer Communications
Draft-johnston-sipping-rtcp-summary-01.txt RTCP Summary Report Delivery to SIP Third Parties draft-johnston-sipping-rtcp-summary-01.txt Alan Johnston –
4.1.4 multi-homing.
Network File System Protocol
Approaches to Multi6 An Architectural View of Multi6 proposals Geoff Huston March 2004.
Socket Programming Introduction. Socket Definition A network socket is one endpoint in a two-way communication flow between two programs running over.
Shim6 Architecture Geoff Huston IETF-63 August 2005.
8/28/ Network Models - Lin 1 CPET/ECET Network Models Data Communications and Networking Fall 2004 Professor Paul I-Hai Lin Electrical and.
J. Liebeher (modified by M. Veeraraghavan) 1 Introduction Complexity of networking: An example Layered communications The TCP/IP protocol suite.
Network Layer Security Network Systems Security Mort Anvari.
Process-to-Process Delivery:
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Chapter 7: Transport Layer
LESSON Networking Fundamentals Understand TCP/IP.
OSI model vs. TCP/IP MODEL
Lecturer, Department of Computer Application
Understand the OSI Model Part 2
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
CPE 401 / 601 Computer Network Systems
Protocols and the TCP/IP Suite
Working at a Small-to-Medium Business or ISP – Chapter 7
Process-to-Process Delivery:
ID / LOC Split - Basic Approach
Lottery Meets Wireless
An Update on Multihoming in IPv6 Report on IETF Activity
OSI Model OSI MODEL.
Protocols and the TCP/IP Suite
The TCP/IP Model.
TDR authentication requirements
Presentation transcript:

1 1 D. Crocker9/23/2015 Common Endpoint Locator Pools (CELP)  draft-crocker-celp  Dave Crocker  Avri Doria  Multiple multiaddressing schemes  Different approaches have different benefits  Proposal:  Share locator pools across independent associations  Reduce multiaddressing control transaction costs  Improve availability of locator performance information  draft-crocker-celp  Dave Crocker  Avri Doria  Multiple multiaddressing schemes  Different approaches have different benefits  Proposal:  Share locator pools across independent associations  Reduce multiaddressing control transaction costs  Improve availability of locator performance information

2 2 D. Crocker9/23/2015 Synergy Across Associations  Transport-based schemes  Multiplex control exchange in data stream, so control data does not increase packet overhead  Can naturally obtain path quality information  Wedge-based schemes  Multiaddressing for legacy transports  Naturally independent of individual transport associations  Can operate asynchronously of associations, deferring control exchanges, often needing no exchange  Can maintain pools with different referential granularity  Transport-based schemes  Multiplex control exchange in data stream, so control data does not increase packet overhead  Can naturally obtain path quality information  Wedge-based schemes  Multiaddressing for legacy transports  Naturally independent of individual transport associations  Can operate asynchronously of associations, deferring control exchanges, often needing no exchange  Can maintain pools with different referential granularity

3 3 D. Crocker9/23/2015 FrameworkFramework  Variable granularity  {local, remote}  {local, remote, flow}  {local, remote, protocol, port}  {local, remote, type of service}  Status  Reachability  Performance Wedge MA Tport MA TCP IP H1 all EP2 file EP2 sip H = host EP = endpoint MA = multiaddressing Locator Pools Add Delete Modify

4 4 D. Crocker9/23/2015 IssuesIssues  Path selection  Which paths are available or better?  Suggestion: Defer generality; start with primary and fallback choices  Local/Remote combinatorials  Suggestion: Defer generality; start with just {remote} or {local, remote}  Security  Different schemes have different degrees of security  concern about weakest participant affects entire service  Maintaining synchrony among different modifiers of pool  Referential commonality  Different schemes use different identifiers  How to know that different locators refer to same endpoint?  Suggestion: That’s what domain names are for…  Path selection  Which paths are available or better?  Suggestion: Defer generality; start with primary and fallback choices  Local/Remote combinatorials  Suggestion: Defer generality; start with just {remote} or {local, remote}  Security  Different schemes have different degrees of security  concern about weakest participant affects entire service  Maintaining synchrony among different modifiers of pool  Referential commonality  Different schemes use different identifiers  How to know that different locators refer to same endpoint?  Suggestion: That’s what domain names are for…

5 5 D. Crocker9/23/2015 Next Steps  Resolve  Differential security issues  Near-term vs. long-term issues  Determining common endpoint referencing  Formulate CELP service model details  Data structures  Operations  Resolve  Differential security issues  Near-term vs. long-term issues  Determining common endpoint referencing  Formulate CELP service model details  Data structures  Operations