Re: [p2pi] Thoughts on how IETF standards can help P2P/ISPs

Ted Hardie <hardie@qualcomm.com> Mon, 02 June 2008 23:09 UTC

Return-Path: <p2pi-bounces@ietf.org>
X-Original-To: p2pi-archive@ietf.org
Delivered-To: ietfarch-p2pi-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 863A328C202; Mon, 2 Jun 2008 16:09:03 -0700 (PDT)
X-Original-To: p2pi@core3.amsl.com
Delivered-To: p2pi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AA26828C1FC for <p2pi@core3.amsl.com>; Mon, 2 Jun 2008 16:09:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.249
X-Spam-Level:
X-Spam-Status: No, score=-102.249 tagged_above=-999 required=5 tests=[AWL=-0.250, BAYES_00=-2.599, J_CHICKENPOX_25=0.6, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dNfvT6fhTPKU for <p2pi@core3.amsl.com>; Mon, 2 Jun 2008 16:09:01 -0700 (PDT)
Received: from wolverine02.qualcomm.com (wolverine02.qualcomm.com [199.106.114.251]) by core3.amsl.com (Postfix) with ESMTP id C5E8228C210 for <p2pi@ietf.org>; Mon, 2 Jun 2008 16:06:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=qualcomm.com; i=hardie@qualcomm.com; q=dns/txt; s=qcdkim; t=1212447968; x=1243983968; h=mime-version:message-id:in-reply-to:references:date:to: from:subject:cc:content-type:x-ironport-av; z=MIME-Version:=201.0|Message-ID:=20<p06240606c46a2c26d09d @[129.46.226.27]>|In-Reply-To:=20<484470F1.7000105@teleco mitalia.it>|References:=20<1865369468.307061212422766942. JavaMail.root@dkny.pando.com>=0D=0A=20<484470F1.7000105@t elecomitalia.it>|Date:=20Mon,=202=20Jun=202008=2016:06:03 =20-0700|To:=20Enrico=20Marocco=20<enrico.marocco@telecom italia.it>,=0D=0A=20=20=20=20=20=20=20=20Laird=20Popkin =0D=0A=09<laird@pando.com>|From:=20Ted=20Hardie=20<hardie @qualcomm.com>|Subject:=20Re:=20[p2pi]=20Thoughts=20on=20 how=20IETF=20standards=20can=20help=20P2P/ISPs|CC:=20"ram it@pando.com"=20<ramit@pando.com>,=20"p2pi@ietf.org"=20<p 2pi@ietf.org>,=0D=0A=20=20=20=20=20=20=20=20"p4pwg@yahoog roups.com"=20<p4pwg@yahoogroups.com>|Content-Type:=20text /plain=3B=20charset=3D"us-ascii"|X-IronPort-AV:=20E=3DMcA fee=3Bi=3D"5200,2160,5308"=3B=20a=3D"3449316"; bh=d/q84JicNtRvNsHtVouyymM8UHnb7l1iJGwRuF2xiJA=; b=OrhFTvouiCzy5lVzUMaupmYqb8eDuoGNIBRaENasAcBO61yH2eZnuOyv h/BWlVJaxvKcjsAXexH+wThv+59nqHlag0HmmuGJXxvBCDIv72HPBAC+R qCxM89Ar0zM5/EAKAJ0Mbrc+pLA56Jf3TQn/roCSVg01O/DGVl+viP8l4 A=;
X-IronPort-AV: E=McAfee;i="5200,2160,5308"; a="3449316"
Received: from pdmz-ns-mip.qualcomm.com (HELO numenor.qualcomm.com) ([199.106.114.10]) by wolverine02.qualcomm.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 02 Jun 2008 16:06:07 -0700
Received: from totoro.qualcomm.com (totoro.qualcomm.com [129.46.61.158]) by numenor.qualcomm.com (8.14.2/8.14.2/1.0) with ESMTP id m52N67jI024286 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Mon, 2 Jun 2008 16:06:07 -0700
Received: from nasanexhc03.na.qualcomm.com (nasanexhc03.na.qualcomm.com [172.30.33.34]) by totoro.qualcomm.com (8.14.2/8.14.2/1.0) with ESMTP id m52N660t025472 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Mon, 2 Jun 2008 16:06:06 -0700 (PDT)
Received: from [129.46.226.27] (129.46.226.27) by qcmail1.qualcomm.com (172.30.33.34) with Microsoft SMTP Server (TLS) id 8.1.278.0; Mon, 2 Jun 2008 16:06:05 -0700
MIME-Version: 1.0
Message-ID: <p06240606c46a2c26d09d@[129.46.226.27]>
In-Reply-To: <484470F1.7000105@telecomitalia.it>
References: <1865369468.307061212422766942.JavaMail.root@dkny.pando.com> <484470F1.7000105@telecomitalia.it>
Date: Mon, 02 Jun 2008 16:06:03 -0700
To: Enrico Marocco <enrico.marocco@telecomitalia.it>, Laird Popkin <laird@pando.com>
From: Ted Hardie <hardie@qualcomm.com>
Cc: "ramit@pando.com" <ramit@pando.com>, "p2pi@ietf.org" <p2pi@ietf.org>, "p4pwg@yahoogroups.com" <p4pwg@yahoogroups.com>
Subject: Re: [p2pi] Thoughts on how IETF standards can help P2P/ISPs
X-BeenThere: p2pi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: P2P Infrastructure Discussion <p2pi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/p2pi>
List-Post: <mailto:p2pi@ietf.org>
List-Help: <mailto:p2pi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: p2pi-bounces@ietf.org
Errors-To: p2pi-bounces@ietf.org

At 3:15 PM -0700 6/2/08, Enrico Marocco wrote:
>It seems to me that this turned out to be a two-sided problem.  On the
>one hand, it is clear that applications on the endpoints are in the
>worst position to make optimal network decisions; a first part of the
>solution should thus consist of a mechanism to defer such decisions to
>external entities

Of course you can recast this  as "So we should make sure that
there are mechanisms that allow them to make more optimal decisions.
The facilities which provide this information need not be controlled
by the ISPs, but might be third party services which indicate
cost/topology/congestion or some profile mix of the three."

To my way of thinking, that makes it easier to consider the API
design, as it is not so much an API that says "What's the best
choice right now?"  but "What's the best X (flow pattern, topology,
price)".  The second set of questions is sufficiently more modular
that it is both easier to get right and, at least in my opinion,
more interesting.

Just  my two cents,
				Ted


>(not necessarily controlled by ISPs, as e.g. in the
>case of Ono, where the redirection service is provided by Akamai
>servers). The need for such a mechanism was claimed by several papers
>[4,26,28,29] and, AFAIR, received little objection (the one that I
>recall was the "hot potato" thing, where the external entity providing
>the peer selection service would be able to place sort of DDOS attacks
>against specific targets/networks).
>
>On the other hand, how to compute best paths is a separate part of the
>problem; topology/cost/congestion notification, cache identification,
>usage metrics, and the like all fall in this category and, at this time,
>are probably more research topics than engineering issues.
>
>Right now, I think the IETF should focus on the first part of the
>problem, the front-end of a generic third-party peer selection service
>p2p applications can query in order to make better choices; innovation
>and competition will then happen on the back-end of such a service
>without requiring standardization in the first place.
>
>[*] References at
>http://www.ietf.org/mail-archive/web/p2pi/current/msg00005.html
>
>--
>Ciao,
>Enrico
>
>Content-Type: application/x-pkcs7-signature; name="smime.p7s"
>Content-Description: S/MIME Cryptographic Signature.p7s
>Content-Disposition: attachment; filename="smime.p7s"; size=3504;
>	creation-date="Mon, 02 Jun 2008 15:26:25 GMT";
>	modification-date="Mon, 02 Jun 2008 15:26:25 GMT"
>
>Attachment converted: Macintosh HD:smime 1480.p7s (    /    ) (007B339F)
>Content-Type: text/plain; name="ATT00001.txt"
>Content-Description: ATT00001.txt
>Content-Disposition: attachment; filename="ATT00001.txt"; size=191;
>	creation-date="Mon, 02 Jun 2008 15:26:25 GMT";
>	modification-date="Mon, 02 Jun 2008 15:26:25 GMT"
>
>Attachment converted: Macintosh HD:ATT00001 1846.txt (TEXT/ttxt) (007B33A0)

_______________________________________________
p2pi mailing list
p2pi@ietf.org
https://www.ietf.org/mailman/listinfo/p2pi