Re: [Aeon] New Version Notification for draft-conet-aeon-problem-statement-00.txt

Linda Dunbar <linda.dunbar@huawei.com> Tue, 27 May 2014 22:22 UTC

Return-Path: <linda.dunbar@huawei.com>
X-Original-To: aeon@ietfa.amsl.com
Delivered-To: aeon@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 322BC1A07A4 for <aeon@ietfa.amsl.com>; Tue, 27 May 2014 15:22:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.852
X-Spam-Level:
X-Spam-Status: No, score=-4.852 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jIO14y0SER9j for <aeon@ietfa.amsl.com>; Tue, 27 May 2014 15:22:20 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 80DA91A07A2 for <aeon@ietf.org>; Tue, 27 May 2014 15:22:20 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml204-edg.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BEP47469; Tue, 27 May 2014 22:22:16 +0000 (GMT)
Received: from LHREML402-HUB.china.huawei.com (10.201.5.241) by lhreml204-edg.china.huawei.com (172.18.7.223) with Microsoft SMTP Server (TLS) id 14.3.158.1; Tue, 27 May 2014 23:21:48 +0100
Received: from DFWEML703-CHM.china.huawei.com (10.193.5.130) by lhreml402-hub.china.huawei.com (10.201.5.241) with Microsoft SMTP Server (TLS) id 14.3.158.1; Tue, 27 May 2014 23:22:15 +0100
Received: from DFWEML701-CHM.china.huawei.com ([169.254.1.64]) by dfweml703-chm.china.huawei.com ([169.254.5.144]) with mapi id 14.03.0158.001; Tue, 27 May 2014 15:22:02 -0700
From: Linda Dunbar <linda.dunbar@huawei.com>
To: "Charles Eckel (eckelcu)" <eckelcu@cisco.com>, "aeon@ietf.org" <aeon@ietf.org>
Thread-Topic: New Version Notification for draft-conet-aeon-problem-statement-00.txt
Thread-Index: AQHPdtuQqD2ZBTVI7EKTZI/ZuDsHO5tOqYOAgAZaNRA=
Date: Tue, 27 May 2014 22:22:01 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F645D265BF@dfweml701-chm.china.huawei.com>
References: <20140523230557.13150.38727.idtracker@ietfa.amsl.com> <CFA5228A.289CD%eckelcu@cisco.com>
In-Reply-To: <CFA5228A.289CD%eckelcu@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.47.153.227]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: http://mailarchive.ietf.org/arch/msg/aeon/ZASn7h3mytb_MQQqy1EUN703-5w
Subject: Re: [Aeon] New Version Notification for draft-conet-aeon-problem-statement-00.txt
X-BeenThere: aeon@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Application Enabled Open Networking \(AEON\)" <aeon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/aeon>, <mailto:aeon-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/aeon/>
List-Post: <mailto:aeon@ietf.org>
List-Help: <mailto:aeon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/aeon>, <mailto:aeon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 May 2014 22:22:23 -0000

Charles, et al: 

Your Req-1 states "allow applications to explicitly signal their flow characteristics to the networks". 

Can you give a few examples of what those "flow characteristics" are?

The draft also states that DPI can't be performed when the traffic is encrypted. What kind of signals will the applications that encrypt their traffic send to network? 


Almost all End to End traffic are aggregated by network operators edge devices (there could be many layers of operators). All the signals from end devices are lost once entering provider domain. I think a more realistic approach is to establish interface between applications to network controllers.


Linda 
-----Original Message-----
From: Aeon [mailto:aeon-bounces@ietf.org] On Behalf Of Charles Eckel (eckelcu)
Sent: Friday, May 23, 2014 6:12 PM
To: aeon@ietf.org
Subject: [Aeon] FW: New Version Notification for draft-conet-aeon-problem-statement-00.txt

The following draft is the result of merging the CoNET and AEON problem statement drafts discussed previously on this list. It is intended as a replacement for both of them, combining important aspects of both and addressing review comments received to date. Please review and share your comments.

Cheers,
Charles

On 5/23/14, 4:05 PM, "internet-drafts@ietf.org" <internet-drafts@ietf.org>
wrote:

>
>A new version of I-D, draft-conet-aeon-problem-statement-00.txt
>has been successfully submitted by Charles Eckel and posted to the IETF 
>repository.
>
>Name:		draft-conet-aeon-problem-statement
>Revision:	00
>Title:		Application Enabled Collaborative Networking: Problem Statement
>and Requirements
>Document date:	2014-05-21
>Group:		Individual Submission
>Pages:		11
>URL:            
>http://www.ietf.org/internet-drafts/draft-conet-aeon-problem-statement-00.
>txt
>Status:         
>https://datatracker.ietf.org/doc/draft-conet-aeon-problem-statement/
>Htmlized:       
>http://tools.ietf.org/html/draft-conet-aeon-problem-statement-00
>
>
>Abstract:
>   Identification and treatment of application flows are important to
>   many application providers and network operators.  They often rely on
>   these capabilities to deploy and/or support a wide range of
>   applications.  These applications, and the packet flows they generate
>   and consume, may have specific connectivity requirements that can be
>   met if made known to the network.  Historically, this functionality
>   has been implemented to the extent possible using heuristics, which
>   inspect and infer flow characteristics.  Heuristics may be based on
>   port ranges, network separation (e.g. subnets or VLANs, Deep Flow
>   Inspection (DFI), or Deep Packet Inspection (DPI).  But many
>   application flows in current usages are dynamic, adaptive, time-
>   bound, encrypted, peer-to-peer, asymmetric, used on multipurpose
>   devices, and have different priorities depending on direction of
>   flow, user preferences, and other factors.  Any combination of these
>   properties renders heuristic based techniques less effective and may
>   result in compromises to application security or user privacy.
>
>                  
>        
>
>
>Please note that it may take a couple of minutes from the time of 
>submission until the htmlized version and diff are available at 
>tools.ietf.org.
>
>The IETF Secretariat
>

_______________________________________________
Aeon mailing list
Aeon@ietf.org
https://www.ietf.org/mailman/listinfo/aeon