On Thu, Oct 4, 2012 at 4:17 PM, Cutler James R <[email protected]> wrote: > On Oct 4, 2012, at 4:00 PM, William Herrin <[email protected]> wrote: >> On Wed, Oct 3, 2012 at 7:12 PM, Cutler James R >> <[email protected]> wrote: >> Or did you mean use DNS as it fits in the current system, which >> doesn't actually satisfy (1) at all since the layer 4 protocols >> continue to build the connection identity from the layer 3 network >> identity instead of the external host/service identity. >> > Why does the connection identity have to include the host identifier. Is > that not a problem under the control of applications?
Nope. It's under the control of the layer 4 protocol, generally TCP or UDP, and implemented at the OS level. For example, in TCP the connection identity is composed of the source and destination IP addresses and port numbers. Together, these 96 bits of information comprise the unique identity of that TCP connection which the OS matches to the socket number the application interacts with. Regards, Bill Herrin -- William D. Herrin ................ [email protected] [email protected] 3005 Crane Dr. ...................... Web: <http://bill.herrin.us/> Falls Church, VA 22042-3004

