Dear All, Besides load balancing, we have added an additional use of case for DDoS attack mitigation in the latest draft. Looking forward to your comments.
Thanks, Ramki on behalf of the co-authors -----Original Message----- From: [email protected] [mailto:[email protected]] Sent: Monday, January 20, 2014 5:31 PM To: ramki Krishnan; Dave Mcdysan; Sriganesh Kini; Diego R. Lopez; Sriganesh Kini; Diego Lopez; Anoop Ghanwani; ramki Krishnan; Anoop Ghanwani; Dave McDysan Subject: New Version Notification for draft-krishnan-i2rs-large-flow-use-case-01.txt A new version of I-D, draft-krishnan-i2rs-large-flow-use-case-01.txt has been successfully submitted by ram (ramki) krishnan and posted to the IETF repository. Name: draft-krishnan-i2rs-large-flow-use-case Revision: 01 Title: Large Flow Use Cases for I2RS PBR and QoS Document date: 2014-01-20 Group: Individual Submission Pages: 12 URL: http://www.ietf.org/internet-drafts/draft-krishnan-i2rs-large-flow-use-case-01.txt Status: https://datatracker.ietf.org/doc/draft-krishnan-i2rs-large-flow-use-case/ Htmlized: http://tools.ietf.org/html/draft-krishnan-i2rs-large-flow-use-case-01 Diff: http://www.ietf.org/rfcdiff?url2=draft-krishnan-i2rs-large-flow-use-case-01 Abstract: This draft discusses two use cases to help identify the requirements for policy-based routing in I2RS. Both of the use cases involve identification of certain flows and then using I2RS to program special handling for those flows. The first use case deals with improving bandwidth efficiency. Demands on networking bandwidth are growing exponentially due to applications such as large file transfers and those with rich media. Link Aggregation Group (LAG) and Equal Cost Multipath (ECMP) are extensively deployed in networks to scale the bandwidth. However, the flow-based load balancing techniques used today make inefficient use of the bandwidth in the presence of long-lived large flows. We discuss how I2RS can be used for achieving better load balancing. The second use case is for recognizing and mitigating Layer 3-4 based DDoS attacks. Behavioral security threats such as Distributed Denial of Service (DDoS) attacks are an ongoing problem in today's networks. DDoS attacks can be Layer 3-4 based or Layer 7 based. We discuss how such attacks can be recognized and how I2RS can be used for mitigating their effects. Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. The IETF Secretariat _______________________________________________ i2rs mailing list [email protected] https://www.ietf.org/mailman/listinfo/i2rs
