Excerpts from Joel M. Halpern on Mon, Dec 07, 2009 03:11:45PM -0500:
> I like the picture painted below of synergistic, incremental,
> flexbile deployment of improved behavior.
> 
> However, this two-ended incentive relates to one of the things that
> concerns me about the current paths of this work.
> 
> On the one hand, we are looking at a variety of tunneling mechanisms

nit: encapsulation mechanisms, not necessarily "tunneling"

> designed to relive the PI pressure on the core.  One of the other
> important goals of most of these proposals is that they remove the
> difficulty of multihoming and changing providers (thus providing an
> incentive for enterprise cooperation / deployment.)
> 
> Meanwhile, other sides of our house are looking at interesting ideas
> such as TCP Multipath support.  These techniques work most simply
> when the tcp sender and receiver have visibility to the attachment
> addresses of the site to the Internet, and the ability to select
> which one is used.  All of the network based tunneling techniques I
> can see seem to have the property that in providing for multihoming
> and the ability to change providers, they remove exactly the
> visibility that our other hand is trying to utilize.

Can future routing and addressing scaling can be easily engineered in a
way that also allows endpoints easy control over what they want?

I think the situation is not as bad as it seems from your portrayal.
What endpoints want is essentially: control over cost, robustness of
connectivity, and good throughput, and IMHO the most urgent scenario for
multipath is when there are significant differences in access network
behavior -- when the endpoint itself is connected to multiple networks.
 The situation you're describing, where the access network itself is
multiply connected, is important to be able to multipath in, but not
urgent, and ideas are being tossed around about choosing exit points
through collaboration between the endpoint and the network, etc.  In an
encapsulated world an endpoint would be able to choose the exit path
from its provider but not the entry point into its correspondent's
provider.  That may be tolerable.  So if there is a problem, it may not
be serious.

Scott
_______________________________________________
rrg mailing list
[email protected]
http://www.irtf.org/mailman/listinfo/rrg

Reply via email to