An analysis of IPv6 anycast
draft-ietf-ipngwg-ipv6-anycast-analysis-02
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-10-14
|
02 | (System) | Notify list changed from hinden@iprg.nokia.com, brian@innovationslab.net, margaret@thingmagic.com to margaret@thingmagic.com |
2005-05-26
|
02 | (System) | Last call text was added |
2005-05-26
|
02 | (System) | Ballot approval text was added |
2005-05-26
|
02 | (System) | State Changes to Dead from AD is watching by IESG Secretary |
2004-11-12
|
02 | (System) | Document has expired |
2004-11-11
|
02 | Thomas Narten | State Changes to AD is watching from IESG Evaluation::AD Followup by Thomas Narten |
2004-11-11
|
02 | Thomas Narten | Shepherding AD has been changed to Margaret Wasserman from Thomas Narten |
2004-11-11
|
02 | Thomas Narten | [Note]: '2004-11-11: WG has taken this one back; will get some new reviews, proceed accordingly.' added by Thomas Narten |
2004-11-11
|
02 | Thomas Narten | State Change Notice email list have been change to hinden@iprg.nokia.com, brian@innovationslab.net, margaret@thingmagic.com from , |
2003-08-11
|
02 | Michael Lee | Removed from agenda for telechat - 2003-08-07 by Michael Lee |
2003-08-08
|
02 | Thomas Narten | Shepherding AD has been changed to Thomas Narten from Harald Alvestrand |
2003-08-07
|
02 | Amy Vezza | State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza |
2003-08-07
|
02 | Ted Hardie | First, the spelling is entertainingly variable. In addition to be treated to questions of existance, we got authorization, authorisation, and their relatives in a single … First, the spelling is entertainingly variable. In addition to be treated to questions of existance, we got authorization, authorisation, and their relatives in a single paragraph. More striking, though, is this: 2) Admission Control The requirements of section 3 discuss labels and security. In going beyond this, the ability to distinguish emergency flows implies the need for admission control if resources become scarce. Solutions must recognize this when trying to satisfy the above requirements such that the simple presence of a label does not imply admission control always exists along the end-to-end path. It is not clear to me whether this means "the requirements here imply that admission control must be added to the Internet architecture"or "there is a requirement to find solutions which do not rely on admission control, since it is not part of the Internet architecture." Clearing that up seems like a good idea. I suggest: The requirements of section 3 discuss labels and security. Those developing solutions should understand that the ability labels provide to distinguish emergency flows does not create an ability to selectively admit flows. Admission control as it is commonly understood in circuit-switched networks is not present in IP-based networks, and schemes which presume the ability to selectively admit flows when resources are scarce will fail outside of very controlled environments. Given the nature of emergencies to occur outside controlled environments, the development of technologies based on admission control is not recommended as the foundation of emergency services. |
2003-08-07
|
02 | Ted Hardie | Shepherding AD has been changed to Harald Alvestrand from Erik Nordmark |
2003-08-07
|
02 | Alex Zinin | IESG comments from Alex: Meta issues: In section 4.1, the draft talks about the possibility of assigning anycast addresses to hosts, and links this tightly … IESG comments from Alex: Meta issues: In section 4.1, the draft talks about the possibility of assigning anycast addresses to hosts, and links this tightly to how such addresses would be injected into the routing infrastructure. First of all, I don't believe the two issues should be considered as tightly coupled. I.e., assigning anycast addresses to hosts does NOT prescribe the actual method of route injection. Second, the two proposed solutions (hosts participating in the RP, and a separate protocol used to inject routes from hosts) have considerable problems. 1. Running routing protocols on hosts This method affects two critical aspects of routing protocols: their scaling and security. From the scaling perspective, running RPs on hosts has the potential of substantially increasing the number of nodes in the domain in case a killer-app is developed that encourages hosts to participate in anycast. From the security perspective, adding hosts to the routing domain changes the whole security model of the routing protocols--assumption of implied authorization of authenticated announcements will not hold true anymore, i.e., participation in the routing domain will not be limited to routers administered by a few people. 2. Injecting routes from hosts through a new protocol This approach does not stretch the scalability assumptions in routing, but still has the same drawbacks as far as security is concerned. Again, I don't think the doc should consider assignment and advertisement together. Static route configuration and subsequent redistribution in a RP on a router seems like the right approach given the scale of deployment Minor: 3. Section 4.3. Anycast address in source address > Under RFC2373 rule, anycast address cannot be put into source address. > Here is a possible workaround, however, it did not win a consensus in > the past ipngwg meetings: Why is this section here? If it does not represent a consensus within ipv6, then the only reason I would see in documenting this option is to say "and, BTW, we do NOT want to do this", which I don't think is the case. 4. Section "2.3. Route scaling issues" > The use of anycast addresses has route scalaing issues. If anycast > addresses are drawn from the unicast address space (as is the case in > RFC2373 anycast and the shared-unicast address used for anycast DNS > servers) the routing scaling impact can potentially be limited by > aggregating the anycast addresses as part of the regular unicast routing > prefixes. But this aggregation can only be applied when all members in > the anycast group remaing within the piece of toplogy whose routes get > aggregated. For instance having an anycast address where all the > members belong to one ISP means it the anycast address can be drawn from > the ISPs address space and be aggregated at the ISP boundary with no > effect on route scaling outside that domain. But having e.g. anycast > groups with members across the whole Internet will have effect on the > size of the routing tables globally. It may be worth adding that if topological localization of anycast members is not 100% guaranteed, aggregation will break anycast, as unaggregated prefixes will be preferred over the aggregates because of the longest match forwarding behavior. |
2003-08-07
|
02 | Alex Zinin | Shepherding AD has been changed to Harald Alvestrand from Erik Nordmark |
2003-07-09
|
02 | Erik Nordmark | State Changes to IESG Evaluation from AD Evaluation :: External Party by Nordmark, Erik |
2003-07-03
|
02 | Erik Nordmark | Version 02 has satisfied the AD review comments. |
2003-07-03
|
02 | Erik Nordmark | State Changes to AD Evaluation :: External Party from AD Evaluation :: Revised ID Needed by Nordmark, Erik |
2003-06-30
|
02 | (System) | New version available: draft-ietf-ipngwg-ipv6-anycast-analysis-02.txt |
2003-02-12
|
02 | Erik Nordmark | Sent AD comments on 01 to WG |
2003-02-12
|
02 | Erik Nordmark | State Changes to AD Evaluation :: Revised ID Needed from AD Evaluation :: AD Followup by Nordmark, Erik |
2002-09-25
|
02 | Erik Nordmark | Need to evaluate if 01 takes care of the AD review comments. |
2002-09-25
|
02 | Erik Nordmark | responsible has been changed to Responsible AD from Author |
2002-09-25
|
02 | Erik Nordmark | State Changes to AD Evaluation -- Evaluation of Result from AD Evaluation -- External Party by nordmark |
2002-07-03
|
01 | (System) | New version available: draft-ietf-ipngwg-ipv6-anycast-analysis-01.txt |
2002-06-27
|
02 | Erik Nordmark | State Changes to New Version Needed (WG/Author) from Request Rejected … State Changes to New Version Needed (WG/Author) from Request Rejected by nordmark |
2002-06-26
|
02 | Stephen Coya | Removed per Thomas. |
2002-06-26
|
02 | Stephen Coya | A new comment added by scoya |
2002-06-26
|
02 | Stephen Coya | State Changes to Request Rejected from AD Evaluation … State Changes to Request Rejected from AD Evaluation by scoya |
2002-06-05
|
02 | Erik Nordmark | Intended Status has been changed to Informational from None |
2002-06-05
|
02 | Erik Nordmark | Finally added to drafttracker. Sent AD review comments to authors and WG. |
2002-06-05
|
02 | Erik Nordmark | Draft Added by nordmark |
2001-07-16
|
00 | (System) | New version available: draft-ietf-ipngwg-ipv6-anycast-analysis-00.txt |