Dear All,

Besides load balancing, we have added an additional use of case for DDoS attack 
mitigation in the latest draft. Looking forward to your comments.

Thanks,
Ramki on behalf of the co-authors

-----Original Message-----
From: [email protected] [mailto:[email protected]] 
Sent: Monday, January 20, 2014 5:31 PM
To: ramki Krishnan; Dave Mcdysan; Sriganesh Kini; Diego R. Lopez; Sriganesh 
Kini; Diego Lopez; Anoop Ghanwani; ramki Krishnan; Anoop Ghanwani; Dave McDysan
Subject: New Version Notification for 
draft-krishnan-i2rs-large-flow-use-case-01.txt


A new version of I-D, draft-krishnan-i2rs-large-flow-use-case-01.txt
has been successfully submitted by ram (ramki) krishnan and posted to the IETF 
repository.

Name:           draft-krishnan-i2rs-large-flow-use-case
Revision:       01
Title:          Large Flow Use Cases for I2RS PBR and QoS
Document date:  2014-01-20
Group:          Individual Submission
Pages:          12
URL:            
http://www.ietf.org/internet-drafts/draft-krishnan-i2rs-large-flow-use-case-01.txt
Status:         
https://datatracker.ietf.org/doc/draft-krishnan-i2rs-large-flow-use-case/
Htmlized:       
http://tools.ietf.org/html/draft-krishnan-i2rs-large-flow-use-case-01
Diff:           
http://www.ietf.org/rfcdiff?url2=draft-krishnan-i2rs-large-flow-use-case-01

Abstract:
   This draft discusses two use cases to help identify the requirements
   for policy-based routing in I2RS.  Both of the use cases involve
   identification of certain flows and then using I2RS to program
   special handling for those flows.

   The first use case deals with improving bandwidth efficiency.
   Demands on networking bandwidth are growing exponentially due to
   applications such as large file transfers and those with rich media.
   Link Aggregation Group (LAG) and Equal Cost Multipath (ECMP) are
   extensively deployed in networks to scale the bandwidth. However,
   the flow-based load balancing techniques used today make inefficient
   use of the bandwidth in the presence of long-lived large flows. We
   discuss how I2RS can be used for achieving better load balancing.

   The second use case is for recognizing and mitigating Layer 3-4
   based DDoS attacks. Behavioral security threats such as Distributed
   Denial of Service (DDoS) attacks are an ongoing problem in today's
   networks. DDoS attacks can be Layer 3-4 based or Layer 7 based. We
   discuss how such attacks can be recognized and how I2RS can be used
   for mitigating their effects.



                                                                                
  


Please note that it may take a couple of minutes from the time of submission 
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat

_______________________________________________
i2rs mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2rs

Reply via email to