[P2PSIP] Design decisions

"Henry Sinnreich" <hsinnrei@adobe.com> Wed, 07 March 2007 16:56 UTC

Return-path: <p2psip-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HOzR6-0003gS-PZ; Wed, 07 Mar 2007 11:56:20 -0500
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HOzR6-0003gG-68 for p2psip@ietf.org; Wed, 07 Mar 2007 11:56:20 -0500
Received: from exprod6og51.obsmtp.com ([64.18.1.183]) by ietf-mx.ietf.org with smtp (Exim 4.43) id 1HOzR3-00007n-On for p2psip@ietf.org; Wed, 07 Mar 2007 11:56:20 -0500
Received: from source ([192.150.20.142]) by exprod6ob51.postini.com ([64.18.5.12]) with SMTP; Wed, 07 Mar 2007 08:56:12 PST
Received: from inner-relay-3.eur.adobe.com (inner-relay-3b [10.128.4.236]) by outbound-smtp-2.corp.adobe.com (8.12.10/8.12.10) with ESMTP id l27Gu6Sd008314 for <p2psip@ietf.org>; Wed, 7 Mar 2007 08:56:10 -0800 (PST)
Received: from fe2.corp.adobe.com (fe2.corp.adobe.com [10.8.192.72]) by inner-relay-3.eur.adobe.com (8.12.10/8.12.9) with ESMTP id l27GtwmI002978 for <p2psip@ietf.org>; Wed, 7 Mar 2007 08:56:06 -0800 (PST)
Received: from namail5.corp.adobe.com ([10.8.192.88]) by fe2.corp.adobe.com with Microsoft SMTPSVC(6.0.3790.1830); Wed, 7 Mar 2007 08:55:56 -0800
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Wed, 07 Mar 2007 08:55:10 -0800
Message-ID: <24CCCC428EFEA2469BF046DB3C7A8D2252751E@namail5.corp.adobe.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: Design decisions
Thread-Index: Acdg2V5EQrbCqk5MQxSC44i+YtIqTQ==
From: Henry Sinnreich <hsinnrei@adobe.com>
To: p2psip@ietf.org
X-OriginalArrivalTime: 07 Mar 2007 16:55:56.0505 (UTC) FILETIME=[79724490:01C760D9]
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 92df29fa99cf13e554b84c8374345c17
Subject: [P2PSIP] Design decisions
X-BeenThere: p2psip@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Peer-to-Peer SIP working group discussion list <p2psip.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/p2psip>, <mailto:p2psip-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/p2psip>
List-Post: <mailto:p2psip@ietf.org>
List-Help: <mailto:p2psip-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/p2psip>, <mailto:p2psip-request@ietf.org?subject=subscribe>
Errors-To: p2psip-bounces@ietf.org

The good news is we have now four excellent contributions to the design
of the peer protocol for P2P SIP. They are in no particular order (add
http://www.ietf.org/internet-drafts/ in front of the file name):

"The Peer Protocol for P2PSIP Networks"
<draft-hautakorpi-p2psip-peer-protocol-00.txt>

"Peer-to-Peer Protocol (P2PP)"
<draft-baset-p2psip-p2pcommon-01>

"dSIP: A P2P Approach to SIP Registration and Resource Location"
<draft-bryan-p2psip-dsip-00>

"Data format and interface to an external peer-to-peer network for SIP
location service" 
<draft-singh-p2p-sip-01> 

It is apparent that while these drafts contain valuable design items,
the opinions also differ widely on such points as:

- Using any of the 'native' p2p protocols,
- Is SIP a good peer protocol?
- The meaning of REGISTER and its replacement with LOCSER,
- Mechanisms for choosing any DHT peer protocol, examples,
- Other applications: Search, app layer multicast for conferences, etc.,
- The data mode, the service mode, control of DHT routing for other
apps,
- Flexibility of the design,
- For implementers: Is open source code available? What is the
footprint?

Besides reconciling the peer protocol design decisions, there are also
serious performance considerations, such as (there are more):

- What is the _measured_ success ration for NAT traversal using ICE?
- What is the distribution of call setup time on the Internet?
- What is the failure rate for peers that cannot see each other?
  (non-transitivity)
- Sensitivity to various churn rates such as wired vs. mobile
- Security and trust models,...

Since we don't have the luxury of an R&D budget, the most sensible
approach is to use results from years of work on p2p. Hint: openDHT.org 
Show me the numbers for performance! 
Or just trusting the assertions of authors of I-Ds? Think of the cost.
Just in case someone is tempted to try anyhow, please see:

http://www.ietf.org/internet-drafts/draft-irtf-p2prg-survey-search-01.tx
t 

Proposal: 

1. Use the above four contributions and the other P2P SIP I-Ds as well
to edit a design document with options, recommendations, examples, etc.
for the peer protocol for P2P SIP. This is the first key WG deliverable.

2. Last but not least: Open source code is the most dependable approach
for a successful standard. The P2P SIP peer protocol MUST be backed up
by open source code, free of patent claims.

3. Define the P2P SIP peer protocol based on both items 1. and 2.
No less.

What do you think?

Thanks, 
Henry Sinnreich





_______________________________________________
P2PSIP mailing list
P2PSIP@ietf.org
https://www1.ietf.org/mailman/listinfo/p2psip