Download presentation
Presentation is loading. Please wait.
Published byPaul Møller Modified over 6 years ago
1
RSVP Proxy Approaches draft-ietf-tsvwg-rsvp-proxy-approaches-01.txt Francois Le Faucheur - Francois Le Faucheur Dan Wing Cisco Systems Jukka Manner University of Helsinki Allan Guillou Neuf
2
Changes from previous version (1/3)
Reflected outcome of list discussion with Lou Berger on “Application_Entity-Controlled Proxy”: restructured a few sub-sections added text on candidate protocols for Proxy Control interface Reflected outcome of list discussion with Ken Carlberg: Added text on soft-state/hard-state on Proxy Control interface Incorporated list input from Chris Christou on IPsec scenario New “Appendix A.5: RSVP Proxies for Reservations in the presence of IPsec Gateways”
3
Changes from previous version (2/3)
New section 4.6 on “Policy_Server-Controlled Proxy” Based on input from Tullio Loffredo and Massimo Sassi | | /////////////| App |\\\\\\\\\\\\\\ / | Entity | \ / | | \ / I \ / I \ / | | \ / | Policy | \ / | Server | \ / | | \ / // \\ \ / // \\ \ / // \\ \ |----| | | *** | | |----| | S | | |------*r*-----| | | R | |----| | RSVP | *** | RSVP | |----| | Sender | | Receiver| | Proxy | | Proxy | | | | | =====RSVP========> **********************************************************>
4
Changes from previous version (3/3)
Rewritten Security Considerations Renamed “Other Proxy Approaches” section into “Endsystem-Controlled Proxy” Various clean-ups in text & pictures
5
Next Steps Fix Minor nits: Request to go for WGLC
fix references to STUN/ICE add Ken’s comment (destination unrechable downstream of Receiver Proxy) Request to go for WGLC
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.