Re: [Dyncast] CAN BoF issues #7 #17 #32

Joel Halpern <jmh@joelhalpern.com> Fri, 17 June 2022 13:35 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: dyncast@ietfa.amsl.com
Delivered-To: dyncast@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D5322C14CF05; Fri, 17 Jun 2022 06:35:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.873
X-Spam-Level:
X-Spam-Status: No, score=-3.873 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_FACE_BAD=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, NICE_REPLY_A=-1.876, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NvdYbsSD6k48; Fri, 17 Jun 2022 06:35:49 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 39601C14CF00; Fri, 17 Jun 2022 06:35:49 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 4LPg6F09f0z6G84P; Fri, 17 Jun 2022 06:35:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1655472949; bh=pnvM5XCx0vKaQXr5Ts5lrVeavmxbr3xcTHXikl69lkY=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=Uk4xLefmVf+rufdzXxoEJ/YmJSKqcc0IZbYb4HOxJURK8XxsqpG0G/3IwSXn8Mtki 0CJq7v6SF/8CBjqxl2E3k66DnnKQeM47fdFLSSFtnmz+ewvL/53eYNld94Nh8eKWh+ tkZCo+1eiW4OGndqvwhiyNuf2jeIlfgwNQIj2Czc=
X-Quarantine-ID: <wm6IaOFtRXL2>
X-Virus-Scanned: Debian amavisd-new at a2.tigertech.net
Received: from [192.168.23.181] (50-233-136-230-static.hfc.comcastbusiness.net [50.233.136.230]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 4LPg6D1B2pz6G7Jv; Fri, 17 Jun 2022 06:35:47 -0700 (PDT)
Content-Type: multipart/alternative; boundary="------------1a4BK6zrfyjV7WRLPPy9wpF2"
Message-ID: <6c3d1fef-c15f-dc82-be16-ac840b4ad2b7@joelhalpern.com>
Date: Fri, 17 Jun 2022 09:35:45 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.10.0
Content-Language: en-US
To: "liupengyjy@chinamobile.com" <liupengyjy@chinamobile.com>, dyncast <dyncast@ietf.org>
Cc: rtgwg <rtgwg@ietf.org>
References: <CO1PR13MB49207A5646A942342E81B67585C99@CO1PR13MB4920.namprd13.prod.outlook.com> <20220531000035646550674@chinamobile.com> <20220614105949303643156@chinamobile.com> <CO1PR13MB49203A3FBA4BE9FA27695AE885AD9@CO1PR13MB4920.namprd13.prod.outlook.com> <aa719c0bc9b14e45b38f12e39bf24235@huawei.com> <2022061716131186875775@chinamobile.com>
From: Joel Halpern <jmh@joelhalpern.com>
In-Reply-To: <2022061716131186875775@chinamobile.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dyncast/DxHcLAfdTYaRoDkWWf017DDPK5Y>
Subject: Re: [Dyncast] CAN BoF issues #7 #17 #32
X-BeenThere: dyncast@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Dynamic Anycast <dyncast.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dyncast>, <mailto:dyncast-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dyncast/>
List-Post: <mailto:dyncast@ietf.org>
List-Help: <mailto:dyncast-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dyncast>, <mailto:dyncast-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Jun 2022 13:35:53 -0000

If CAN does isntance selection and DSCP marking, then it can influence 
routing and select appropraite instances.  It is an understandable, 
deployable, and probably scalable solution with the selection and 
marking deployed at an appropriate place.  If that place is the PE, and 
we want to use a different IP address, then it probably uses a tunnel to 
deliver the packets.  If that place is the end host, then it can do what 
it wants.


However, if you expect the routing system to be including and respecting 
information about compute end point capabilities, and want the routing 
system to manage suitable server stickiness and all the other needed 
properties, then I think the version of CAN you are describing is a bad 
idea that will harm the infrastructure by mixing funcitonality in 
inappropriate places.


Yours,

Joel


PS: I retain rtgwg on the copy for now, but as far as I can tell this 
discussion belongs exclusively on the dyncast list.


On 6/17/2022 4:13 AM, liupengyjy@chinamobile.com wrote:
> Hi Dirk,
>
> For mode 1, CAN is only aware of computing information, because the 
> basic routing could select the 'best' path naturely.
>
> For mode 2, CAN could also know more about the network path when the 
> computing node selection is done, for instance, SR policy, network 
> slicing, detnet, etc. and then utilize them. I don't think it will 
> influence the underlay routing, some apps could require for the 
> specific routing policy/strategy even there is no CAN service.
>
> CAN aims to provide the joint optimization service to specific 
> applications. The difference is that whether to select the 'best' 
> resource all the time, or just select the 'appropriate' one based on 
> more awareness and decision making.
>
> Regards,
> Peng
> ------------------------------------------------------------------------
> liupengyjy@chinamobile.com
>
>     *From:* Dirk Trossen <mailto:dirk.trossen@huawei.com>
>     *Date:* 2022-06-17 15:01
>     *To:* Linda Dunbar <mailto:linda.dunbar@futurewei.com>;
>     liupengyjy@chinamobile.com; dyncast <mailto:dyncast@ietf.org>
>     *CC:* rtgwg <mailto:rtgwg@ietf.org>; David R. Oran
>     <mailto:daveoran@orandom.net>; jefftant.ietf
>     <mailto:jefftant.ietf@gmail.com>
>     *Subject:* RE: [Dyncast] CAN BoF issues #7 #17 #32
>
>     Hi Linda, Peng, all,
>
>     Let us tease apart what “include the path selection” may mean
>     since the nature of this inclusion may be significant in difference.
>
>     For this, let us assume a service instance S_1 as one of possibly
>     several ones for service S. S_1 may be reachable over a number of
>     network paths, the selection of some of which would significantly
>     impact any compute-aware selection of S_1 over the other available
>     service instances for S. I can see two modes of ‘including path
>     selection”:
>
>     1.S_1 exposes two (or more) IP addresses, where each IP address
>     reflects a path from the client to the exposed address. IP
>     addresses may be exposed across more than one network operator,
>     multi-homing the service instance. Now here, ‘path selection’ is
>     indirectly done by picking one IP address over all others,
>     including the IP addresses of other service instances, and indeed,
>     such indirect path selection may well be done through a metric
>     that measures against (at least one) crucial path-related metric.
>     But ultimately, the CAN provider selects one of possibly many IP
>     address still, right? More importantly, it remains the task of the
>     underlay routing infrastructure (again, which could include more
>     than one network operator) to determine what it deems as the
>     ‘best’ path to each of the IP addresses (including the multi-homed
>     S_1 addresses).
>
>     2.Let’s stick with one IP address to S_1 now though but there are
>     still at least two possible paths to it, where the selection of
>     one over any of the other possible ones could well impact the
>     compute-aware suitability of S_1 over any of the other service
>     instances. Problem here is that ‘including the path selection’
>     would mean to impact the routing to the single S_1 IP address in a
>     manner that that routing decision takes the compute-awareness into
>     account. The path selection here is not indirect but direct,
>     together with the IP address (i.e., service instance endpoint)
>     selection. What is required here is that CAN provider and underlay
>     somehow work together in selecting one path over another (to the
>     same IP address), which in turn would mean to impact the overall
>     routing decision for S_1’s IP address, which in turn would mean to
>     impact the underlay routing infrastructure since the resulting
>     (compute-aware) path configuration, in the form of suitable
>     forwarding entries, needs distribution in the underlay
>     infrastructure.
>
>     I think we have to be clear which of the two options we see in the
>     CAN scope but also if I may have missed options here. As we can
>     see already from those two options, they  have a significant
>     impact on the architecture we may envision for CAN but also for
>     its solution adoption. From my side, I have seen CAN mainly as an
>     endpoint selection problem, so understood ‘path selection’ as an
>     indirect one in the manner described in item 1. I just want to
>     throw the options out here to solicit feedback from the community
>     on this so that we get a good understanding moving forward.
>
>     Best,
>
>     Dirk
>
>     *From:* Dyncast [mailto:dyncast-bounces@ietf.org] *On Behalf Of
>     *Linda Dunbar
>     *Sent:* 15 June 2022 23:07
>     *To:* liupengyjy@chinamobile.com; dyncast <dyncast@ietf.org>
>     *Cc:* rtgwg <rtgwg@ietf.org>; David R. Oran
>     <daveoran@orandom.net>; jefftant.ietf <jefftant.ietf@gmail.com>
>     *Subject:* Re: [Dyncast] CAN BoF issues #7 #17 #32
>
>     Peng,
>
>     For Issue #32, you said: “CAN does not compute path, it selects
>     endpoints.”
>
>     If CAN means Computing Aware Networking, it should include the
>     path selection. Maybe CAN is about  Selecting (or computing) the
>     optimal paths based on the combination of network conditions and
>     the end point computing available resources?
>
>     My two cents,
>
>     Linda
>
>     *From:* Dyncast <dyncast-bounces@ietf.org> *On Behalf Of
>     *liupengyjy@chinamobile.com
>     *Sent:* Monday, June 13, 2022 10:00 PM
>     *To:* dyncast <dyncast@ietf.org>
>     *Cc:* rtgwg <rtgwg@ietf.org>; David R. Oran
>     <daveoran@orandom.net>; jefftant.ietf <jefftant.ietf@gmail.com>
>     *Subject:* [Dyncast] CAN BoF issues #7 #17 #32
>
>     Dear All,
>
>     Here are the responses to issues #7 #17 #32, any comments are
>     welcome!  The issues and responses are also copied to the
>     questioner (
>     <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fminutes-113-can%2F&data=05%7C01%7Clinda.dunbar%40futurewei.com%7C4067359765a3464eebd408da4db152f5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637907721259352014%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=HA8ebRR0zU586fKOEn%2BX245pVB5wQ51BBnJjXYWD4dw%3D&reserved=0>https://datatracker.ietf.org/doc/minutes-113-can/
>     <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fminutes-113-can%2F&data=05%7C01%7Clinda.dunbar%40futurewei.com%7C4067359765a3464eebd408da4db152f5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637907721259352014%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=HA8ebRR0zU586fKOEn%2BX245pVB5wQ51BBnJjXYWD4dw%3D&reserved=0>)
>     <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fminutes-113-can%2F&data=05%7C01%7Clinda.dunbar%40futurewei.com%7C4067359765a3464eebd408da4db152f5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637907721259352014%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=HA8ebRR0zU586fKOEn%2BX245pVB5wQ51BBnJjXYWD4dw%3D&reserved=0>,
>     hope for further suggestions and confirmation. Thanks!
>
>     #7 This seems to assume conventional non-distributed applications
>     just running at the edge. What about modern frameworks like
>     Sapphire? and Ray?
>     <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FCAN-IETF%2FCAN-BoF-ietf113%2Fissues%2F7&data=05%7C01%7Clinda.dunbar%40futurewei.com%7C4067359765a3464eebd408da4db152f5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637907721259352014%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=DpLlwOTLZ8V7gF%2B2JvSBIbXUnEqpEdpVWfYzv9IgRzA%3D&reserved=0>
>
>     It would be good to understand the multi-site requirements of such
>     frameworks, which seems to mainly run in single DCs.
>
>     _#17 Whether the interests of the organization deploying the
>     application and the organization providing the network
>     connectivity are aligned. Google doesn't worry about this because
>     they are both.
>     <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FCAN-IETF%2FCAN-BoF-ietf113%2Fissues%2F17&data=05%7C01%7Clinda.dunbar%40futurewei.com%7C4067359765a3464eebd408da4db152f5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637907721259352014%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=4%2B%2FmX48%2FoHZRp8m7xVV9kOitmL6pmfb56M%2F8bGPNNDM%3D&reserved=0>_
>
>     The question is more what the scope and semantic of information is
>     that will need to cross organizational boundaries. This needs
>     further study, in particular when assuming stakeholder division
>     between service and network provider.
>
>     _ #32 How to effectively compute paths? Shall we put CPUs into
>     account?
>     <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FCAN-IETF%2FCAN-BoF-ietf113%2Fissues%2F32&data=05%7C01%7Clinda.dunbar%40futurewei.com%7C4067359765a3464eebd408da4db152f5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637907721259352014%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=pEZtXQ54gaT4Bx4gwrKyJWyBLM6YImEwnSpg%2B5m%2FiO4%3D&reserved=0>_
>
>     CAN does not compute path, it selects endpoints. Path selection
>     (to a given endpoint) is subject to the routing at the IP
>     underlay. For selecting endpoints, CPU information may be taken
>     into account to achieve the 'compute-awareness' that CAN strives for.
>
>     You can also add your comments to any of
>     them(https://github.com/CAN-IETF/CAN-BoF-ietf113/issues
>     <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FCAN-IETF%2FCAN-BoF-ietf113%2Fissues&data=05%7C01%7Clinda.dunbar%40futurewei.com%7C4067359765a3464eebd408da4db152f5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637907721259352014%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=C2YRche0EjTbxhZWVwHSvYhN8OA7SCcfXhLSFA%2Bqnbk%3D&reserved=0>).
>
>
>     Regards,
>
>     Peng
>
>     ------------------------------------------------------------------------
>
>     liupengyjy@chinamobile.com
>
>             *From:*Linda Dunbar <mailto:linda.dunbar@futurewei.com>
>
>             *Date:* 2022-05-11 06:11
>
>             *To:*dyncast@ietf.org <mailto:dyncast@ietf.org>
>
>             *Subject:* [Dyncast] Categories of the CAN BoF issues
>
>             CAN BoF proponents:
>
>             Many thanks for creating the CAN BoF issues tracking  in
>             the Github:
>             https://github.com/CAN-IETF/CAN-BoF-ietf113/issues/created_by/CAN-IETF?page=1&q=is%3Aopen+is%3Aissue+author%3ACAN-IETF
>             <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FCAN-IETF%2FCAN-BoF-ietf113%2Fissues%2Fcreated_by%2FCAN-IETF%3Fpage%3D1%26q%3Dis%253Aopen%2Bis%253Aissue%2Bauthor%253ACAN-IETF&data=05%7C01%7Clinda.dunbar%40futurewei.com%7C4067359765a3464eebd408da4db152f5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637907721259352014%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=ZqH4%2FI1csqsOVjpnw1TmFJJzMX86fCfPzgjbjfAnJHY%3D&reserved=0>
>
>             I went through the issues captured in the Github and
>             characterized them into groups. Some issues can be lumped
>             together for the discussion. There are quite a few issues
>             related to the requirements, which need to be clarified.
>
>             Best Regards, Linda
>
>             *Issues associated with Applications vs. Underlay networks:*
>
>             ·Consider not to load underlay network with application
>             details. #35
>
>             ·We have multiple upper layer application. Do we have
>             additional needs for routing(e.g. WG?) or we are using
>             those applications and won't need such new WG? #30
>
>             ·It needs application information too, so it can't just
>             make a decision at the network layer. #23
>
>             ·This is not striked as a routing problem; it's all
>             service discovery that can be done in higher layers. #21
>
>             ·*3GPP and URSP solve this based on UPF selection. It uses
>             both endpoint + application. #20*
>
>             ·One overlay plane per application. Resources/metric
>             specific to the plane. #19
>
>             ·How does the application layer or the transport layer
>             learn the network status to steering traffic? #16
>
>             *Need more clear requirements for CAN (*to be addressed by
>             draft-liu-dyncast-ps-usecases*):*
>
>             ·Need to understand if three are requirement to avoid
>             extra messages or 1ms of latency #36
>
>             ·Regarding the flow affinity, is it from network
>             perspective or from application/computation perspective? #33
>
>             ·How to effectively compute paths? Shall we put CPUs into
>             account? #32
>
>             ·*What happens when the user moves? If so we also need to
>             move application context. #25*
>
>             ·It can only move the services around as fast as it can
>             update the routing plane. which comes back to the point
>             about service discovery (waiting for
>             convergence/distribution as opposed to just updating the
>             SD server) #24
>
>             ·Whether the interests of the organization deploying the
>             application and the organization providing the network
>             connectivity are aligned. Google doesn't worry about this
>             because they are both. #17
>
>             oThe question is more what the scope and semantic of
>             information is that will need to cross organizational
>             boundaries. This needs further study, in particular when
>             assuming stakeholder division between service and network
>             provider.
>
>             ·It seems impossible to satisfy that requirement
>             simultaneously with the latency requirement. #15
>
>             ·It wasn't clear that how hard of a requirement session
>             persistence is. #13
>
>             oA session usually creates ephemeral state. If execution
>             changes from one (e.g., virtualized) service instance to
>             another, state/context needs transfer to another. Such
>             required transfer of state/context makes it desirable to
>             have session persistence (or instance affinity) as the
>             default, removing the need for explicit context transfer,
>             while also supporting an explicit state/context transfer
>             (e.g., when metrics change significantly).
>
>             ·*Should it select UPF based on the application? Steering
>             is done per user? or per application? #9*
>
>             ·This seems to assume conventional non-distributed
>             applications just running at the edge. what about modern
>             frameworks like Sapphire? and Ray? #7
>
>             oIt would be good to understand the multi-site
>             requirements of such framework, which I have understood to
>             mainly run in single DCs.
>
>             ·*Relation to 3GPP UPF #6*
>
>             ·*Relation to ALTO #5*
>
>             ·Do the mobility issues and associated protocols are also
>             in scope? There are scenarios where routing alone would
>             not be sufficient. #4
>
>             ·What is the position in the edge location regarding to
>             UPF? #3
>
>             ·Is there some sort of authorization model so that an edge
>             can indicate whether or not it will provide compute
>             services? #2
>
>             ·*What is CNC and the relationship with CAN #1*
>
>             *Measurement of the Computing Resources*(to be addressed
>             by draft-du-computing-resource-representation):
>
>             ·It is hard to use existing work to measure the
>             computation, but we can optimize the latency through the
>             performance monitoring. We have performance/measurement
>             matrix over there. #34
>
>             ·Clarifications on the computing resource, its
>             requirements and characteristics would be helpful. #27
>
>             ·Each application may have a different definition of
>             "resources" these then have to be boiled down into a
>             single topology Network Aware Computing (NAC! :) does
>             scale #14
>
>             ·Is computing resource measurable? #10
>
>             oIt is, and how to use the measurement would be solution
>             related. See IFIP Networking 2022 paper on how to simply
>             expose “computing capability” and achieve better steering
>             with such simple measure.
>
>             ·Why compute resource is different with other resources? #8
>
>             ·
>
>             *Load Balance based solutions:*
>
>             ·The point is that we need a standardized LB protocol #18
>
>             ·The LB as part of the application itself is superior
>             (part of the distributed application itself is to obtain
>             and keep updating the "best" unicast location to use). #22
>
>             ·If there is anything missing from current lbs that would
>             prevent their use as-is? other than there is for market
>             reasons no interop standard between different lbs? #12
>
>             ·For the load balance, should it learn the network’s
>             status? #11
>
>             ·
>
>             *Dyncast based Solution issues:*
>
>             ·For Dyncast, when the time is short, is it possible for
>             the router to decide the routing? It is too fast. #31
>
>             ·Is dyncast proposed to encapsulate? #29
>
>             ·Will CAN dyncast impact each and every router? How to
>             avoid loops? #28
>
>             ·What's the assumed scale of a D-router? 10 ^ 6 sessions?
>             100^ 8? What's the assumed update rate? !Gb? 1Tb? #26
>
>
> _______________________________________________
> rtgwg mailing list
> rtgwg@ietf.org
> https://www.ietf.org/mailman/listinfo/rtgwg