Re: [ogpx] verbiage : domain, agent domain, region domain, trust domain, service, etc.

Morgaine <morgaine.dinova@googlemail.com> Tue, 30 March 2010 08:18 UTC

Return-Path: <morgaine.dinova@googlemail.com>
X-Original-To: ogpx@core3.amsl.com
Delivered-To: ogpx@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3B4773A68C4; Tue, 30 Mar 2010 01:18:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.754
X-Spam-Level: *
X-Spam-Status: No, score=1.754 tagged_above=-999 required=5 tests=[BAYES_50=0.001, DNS_FROM_OPENWHOIS=1.13, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lIwO5bxJQBlX; Tue, 30 Mar 2010 01:18:44 -0700 (PDT)
Received: from mail-ew0-f224.google.com (mail-ew0-f224.google.com [209.85.219.224]) by core3.amsl.com (Postfix) with ESMTP id C7B273A67EF; Tue, 30 Mar 2010 01:18:36 -0700 (PDT)
Received: by ewy24 with SMTP id 24so1142788ewy.13 for <multiple recipients>; Tue, 30 Mar 2010 01:19:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:received:message-id:subject:from:to:cc:content-type; bh=MzyxkZEOOzOV46JYFpNEhdA3x2a4qI4rMz8GutnZRNg=; b=REXgT/XWWozBo1j5+pBtJMFfUOGgoVnxOhiMPgboSSg00A6l4CT4GoWTqudIBjSkQV R16lfldrYXfqR/HpMmG7fMyQYZTqZ4NdAiLUGAoRPL5yIYTEyTHiVoP8mAGvrii8HnZk 2K98VSxo3yWoqN/Ujmv8v+vpDaoJBncx5CSnU=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=googlemail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=W9fO7Qmzym2khSgFY2eYcl+m8hIXrxHzeZAdQMAoDrEUvs6KwXxaWoEN8dlvrvGknE NEl+MnS4qVHSvDKWdyDBxHlYakUGS4rhT7YWUHSn53/T4TNaR3TEoQlnCfcgfI0HaSyk +4Q+Wpmq4i88yguAX/nH8Owh8BHSnbFejvrTY=
MIME-Version: 1.0
Received: by 10.216.38.130 with HTTP; Tue, 30 Mar 2010 01:19:02 -0700 (PDT)
In-Reply-To: <OF474B6274.251179C2-ON852576F6.00052D03-852576F6.00063238@us.ibm.com>
References: <b325928b1003291016i5c07e6d9na0feda9faf930aeb@mail.gmail.com> <OFBFBED893.69AA3E2B-ON852576F5.006184FA-852576F5.0071ECAF@us.ibm.com> <b325928b1003291354r37aa88daq1bebc63c5d65e6af@mail.gmail.com> <OF6751600F.91798AA3-ON852576F5.00734CF3-852576F5.0074B3AA@us.ibm.com> <b325928b1003291441v32ea8504t2431ecb681fd87ba@mail.gmail.com> <OF474B6274.251179C2-ON852576F6.00052D03-852576F6.00063238@us.ibm.com>
Date: Tue, 30 Mar 2010 09:19:02 +0100
Received: by 10.216.164.132 with SMTP id c4mr476884wel.15.1269937142317; Tue, 30 Mar 2010 01:19:02 -0700 (PDT)
Message-ID: <e0b04bba1003300119v42b38806j49e173eea7c6b6e2@mail.gmail.com>
From: Morgaine <morgaine.dinova@googlemail.com>
To: David W Levine <dwl@us.ibm.com>
Content-Type: multipart/alternative; boundary="0016367b5f2041473a04830048e7"
Cc: Meadhbh Hamrick <ohmeadhbh@gmail.com>, ogpx-bounces@ietf.org, ogpx <ogpx@ietf.org>
Subject: Re: [ogpx] verbiage : domain, agent domain, region domain, trust domain, service, etc.
X-BeenThere: ogpx@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Virtual World Region Agent Protocol - IETF working group <ogpx.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ogpx>, <mailto:ogpx-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ogpx>
List-Post: <mailto:ogpx@ietf.org>
List-Help: <mailto:ogpx-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ogpx>, <mailto:ogpx-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Mar 2010 08:18:46 -0000

Again, +1 David.

I see no place for "*privileged groupings of services which must be
clustered and cannot be facaded or separately deployed from other services*".
The only thing that such a privileged grouping achieves is to deny
alternative patterns of deployment.

To give an example, cross-world tourism creates a complex graph of accesses
to asset services which illustrates very well how complex deployments don't
fit into the original "AD+RD" grouping at all.

A popular tourist world may attract visitors from N worlds, none of which
may know about each other.  Each visitor brings into the tourist world items
that are stored in an asset service native to the tourist's home world,
and/or stored in 3rd party asset services, and/or stored in the visitor's
own client-side asset service.

A native of the tourist world will have to be able to access not only her
own world's asset service(s), but also all of the asset services introduced
by tourists, otherwise the world will appear "broken" to her.  Even the
current region itself may introduce a new asset service particular to that
region.

The obvious way to handle such diversity is to avoid predefining any
particular clustering for asset services, but to start from the objects in
the tourist region as the source of references to asset services, and follow
the relevant URIs.

When a visitor first arrives in a region of the tourist world, the visitor's
worn items become known to the region as item references to one or more
asset services.  Whether the region chooses to (i) retrieve and cache the
corresponding data, or (ii) merely hold the references, it is a local
deployment choice.  In the first case all local participating clients will
receive local URIs to the region's own data cache, while in the second case
the clients will receive from the region the external URIs to the remote
assets services.  The latter deployment choice distributes the access load
between clients and asset services very widely across the Internet.

Making prior privileged service groupings in the manner of OGP's "domains"
makes it very difficult to handle this kind of access graph diversity, yet
this tourism deployment pattern is likely to become by far the most popular
in the metaverse, being driven by casual clicking on web pages to find
worlds of interest and visiting them.  By not predefining your service sets,
and instead just "following the data", you obtain the greatest flexibility.

Of course, there are many scenarios in which the freedom of travel needs to
be curtailed, particularly for business and security, and that is perfectly
fine and must be supported as a service option.  It should not be hardwired
into the deployment architecture though, because it is merely a  deployment
choice.  The right way to restrict access options is by configuring which
worlds and which asset services are accessible --- in other words,
service-level configuration, which has an extremely long and respected
pedigree for Internet applications.

Narrowing service deployments into predefined clusters really doesn't help
because ultimately it is the services themselves that have to be configured
and access accepted or denied.  Domains merely hardwire in a habitual
pattern and so restrict our deployment choices unnecessarily, preventing us
from deploying services in other useful patterns by simple service
configuration.


Morgaine.




=============================

On Tue, Mar 30, 2010 at 2:07 AM, David W Levine <dwl@us.ibm.com> wrote:

>
> At the point where you are describing an "Authentication and Login Domain"
> "Asset Domain" "Inventory Domain" "IM Domain" you are effectively binding
> domain to type of service offered.
>
> The whole reason I an pushing back so hard on "Agent Domain" is because it
> conflates a specific deployment pattern with something special, and uses an
> already overloaded term. I think a perfectly rational and sane use of the
> term would be to follow common IT and Distributed computing practices, such
> as "Trust Domain" and "Administrative Domain" as well is "IP domain"  This
> would allow us to write statements like:
>
> "In this grid, the Login, IM, Presence, Inventory, Group, Search and
> Teleport Services live within a single trust domain. The Regions supported
> by this grid fall into separate administrative and trust domains. This grid
> access a variety of asset and micro-payment services all of which are
> outside both our trust and administrative domain."
>
> One of the pain points introduced by binding ANY grouping of services into
> the term "domain" at the architectural level is that is implies that this
> specific deployment pattern is privileged within the specifications. The
> closest that I come to thinking that really exists in VWRAP is the cluster
> of services required to support a region. Even here, tho, the pattern, as a
> web pattern, is mostly that of a facade, and the underlying deployment of
> services which actually comprise any specific region may well be separated
> across trust and administrative domains. A rather obvious example being the
> voice services in the second life grid which are delegated to Vivox,
> crossing several "domain" boundaries.
>
> If we believe there are privileged groupings of services which must be
> clustered and cannot be facaded or separately deployed from other services
> lets enumerate them and understand why they are clustered.
>
> - David
> ~ Zha
>
> _______________________________________________
> ogpx mailing list (VWRAP working group)
> ogpx@ietf.org
> https://www.ietf.org/mailman/listinfo/ogpx
>
>