Internet DRAFT - draft-stiemerling-nsis-mrm-patterns
draft-stiemerling-nsis-mrm-patterns
NSIS Working Group M. Stiemerling
Internet-Draft M. Brunner
Expires: December 21, 2006 NEC
June 19, 2006
Additional Communication Patterns for NSIS
draft-stiemerling-nsis-mrm-patterns-00
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on December 21, 2006.
Copyright Notice
Copyright (C) The Internet Society (2006).
Abstract
The General Internet Signaling Transport (GIST) protocol defines two
message routing methods. These methods are used by the currently
defined NSIS Signaling Layer Protocols to route their messages. This
message routing method mechanism opens the space for supporting
multiple communication patterns. This memo describes the usage of
the additional communication patterns with GIST's message routing
method mechanism.
Stiemerling & Brunner Expires December 21, 2006 [Page 1]
Internet-Draft NSIS Additional MRM June 2006
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Patterns and Use Cases . . . . . . . . . . . . . . . . . . . . 5
2.1. Echo Pattern . . . . . . . . . . . . . . . . . . . . . . . 5
2.2. Path-directed Pattern . . . . . . . . . . . . . . . . . . 5
3. Integration in GIST . . . . . . . . . . . . . . . . . . . . . 6
4. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 7
5. Security Considerations . . . . . . . . . . . . . . . . . . . 8
6. References . . . . . . . . . . . . . . . . . . . . . . . . . . 9
6.1. Normative References . . . . . . . . . . . . . . . . . . . 9
6.2. Informative References . . . . . . . . . . . . . . . . . . 9
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 10
Intellectual Property and Copyright Statements . . . . . . . . . . 11
Stiemerling & Brunner Expires December 21, 2006 [Page 2]
Internet-Draft NSIS Additional MRM June 2006
1. Introduction
Various applications require network support including QoS and NAT
traversal as defined in the NSIS WG. Naturally a number of other
applications require network support as well. Various network
management applications [2] or overlay node detection [3] are
examples, that require network support to locate network nodes with a
particular property. Typically, a centralized database would be used
to match the required property with a node and to learn about how to
reach that node. This type of query can be scoped saying which IP
address or in IP address space the node should be located. However,
this requires to know what the retrieved information about IP
addresses mean in term of their location within the network topology.
Whenever an application needs to find a node with a particular
property close to the application's node or close to the data path
between two nodes of that application, a better lookup service is
needed.
An existing example of a protocol that is locating nodes on the data
path with a particular property is the General Internet Signaling
Transport (GIST) protocol, as defined in [1]. Simplified said, GIST
runs from a sender to the destination and locates GIST nodes running
an NSIS Service Layer Protocol (NSLP) entity, i.e., a particular
service. Those services are currently QoS signaling entities or NAT/
Firewall control entities, the QoS NSLP and NATFW NSLP respectively.
The routing of GIST messages carrying the NSLP messages is defined by
the message routing method (MRM) of GIST. The MRM defines how to
route the message through the network. Currently, a path-coupled
message transport is provided by the path-coupled message routing
method (PCMRM) and the loose-end message routing method (LEMRM).
Both MRMs will find GIST nodes located on the data path but GIST
nodes located close to the path will not be found.
The memo suggests to define other types of MRMs that also support a
message routing that is not necessarily path-coupled as defined by
the PCMRM and the LEMRM. These base patterns are a basic
communication scheme, without specifying the application or
functionality performing on the nodes. Therefore, a pattern would
support base communication taking into account the topology of the
network only. Similar to NSLPs, various other NSLPs or applications
implementing certain functions to be performed on the visited nodes
need to be defined. Different NSLPs or applications require a
different pattern for finding its way through the network topology.
Finally, it should be noted that patterns are inherently distributed
and must be defined for correct and robust behavior, as one that has
been done and experimented with it, the patterns can then be reused.
Stiemerling & Brunner Expires December 21, 2006 [Page 3]
Internet-Draft NSIS Additional MRM June 2006
The next Section 2 gives some use cases for other types of MRM and
Section 3 describes a preliminary integration into the MRM mechanism
of GIST.
Stiemerling & Brunner Expires December 21, 2006 [Page 4]
Internet-Draft NSIS Additional MRM June 2006
2. Patterns and Use Cases
2.1. Echo Pattern
Searching a network node is typically not limited to a path-coupled
search as currently defined by GIST's MRMs. For some applications it
is more interesting to locate nodes that are located close to the
application's node or close to path between two peers. [2] describes
a network search pattern for decentralized network management, where
a nodes is issuing a so called echo pattern. The echo pattern refers
to a network search starting from a single point and then
distributing in rings from the center with a configurable diameter.
A node can locate other nodes with its vicinity with this kind of
echo pattern, i.e., other network management stations of nodes to be
managed. Furthermore, this type of pattern is interesting for the
discovery of nodes belonging to peer-to-peer networks. Typical peer-
to-peer networks require some sort of entry point to connect to the
peer-to-peer network. This entry point can be a file with in
advanced collected IP addresses of other peers, a single server, or a
server that gives the seed for connecting to a distributed lookup
services.
2.2. Path-directed Pattern
The basic idea of this pattern is to limit the scope of the search to
a configurable area along the end-to-end path between the
communicating peers. The search pattern uses a parameter that
defines the "distance" (e.g. in number of hops off the data path)
from the routing path that should be searched. This distance is also
referred to as sideway expansion. Depending on the type of resource
or function that is searched, this parameter can be changed. See
also [3].
The path-directed search pattern starts from the source node and
expands along the end-to-end routing path towards the destination
nodes with a sideway expansion of a given distance. After visiting
the nodes defined by the pattern scope, the pattern contracts towards
the source node gathering the requested information (depending on the
resources/service we are looking for). The sideway expansion
parameter of the pattern controls the scope of the search and thus
limits the number of nodes probed during the detection. Above all,
it allows the discovery of network-side resources along a close
approximation of the routing path. However, note that the pattern
itself does not define the application as described, but the search
would be an example suitable to perform on the NSLP level, and would
naturally need to be further defined.
Stiemerling & Brunner Expires December 21, 2006 [Page 5]
Internet-Draft NSIS Additional MRM June 2006
3. Integration in GIST
The routing of GIST messages is defined by the used message routing
method (MRM) as defined in [1] Section 5.8. Within the MRM mechanism
it is possible to define different algorithms for discovering the
route that signaling messages should take. Therefore, we propose to
extend the MRM space of GIST by the two described patterns
(Section 2.1 and Section 2.2). For each of them, the parameters and
the semantics of the message routing need to defined.
The straightforward way is to start with the path-directed pattern,
because it is a derivation of the already defined path-coupled MRM.
The basic communication pattern would be unchanged, i.e., the
signaling must follow the end-to-end path from source to destination.
The sideway expansion needs to be defined in terms of which elements
are needed for the routing and in terms of when the GIST messaging
associations are instantiated.
The exact definition of the MRM is to be done in future revisions of
this memo.
Stiemerling & Brunner Expires December 21, 2006 [Page 6]
Internet-Draft NSIS Additional MRM June 2006
4. Conclusions
This memo discussed two new communication patterns that are quite
useful for decentralized network management applications and in peer-
to-peer networks. These two new patterns can be seamlessly
integrated into GIST by using the already defined message routing
method mechanism.
Stiemerling & Brunner Expires December 21, 2006 [Page 7]
Internet-Draft NSIS Additional MRM June 2006
5. Security Considerations
Security considerations are to be done.
Stiemerling & Brunner Expires December 21, 2006 [Page 8]
Internet-Draft NSIS Additional MRM June 2006
6. References
6.1. Normative References
[1] Schulzrinne, H. and R. Hancock, "GIST: General Internet
Signaling Transport", draft-ietf-nsis-ntlp-09 (work in
progress), February 2006.
6.2. Informative References
[2] Lim, K., Adam, C., and R. Stadler, "Decentralizing Network
Management", IEEE electronic Transac-tions on Network and
Service Management (eTNSM), Vol 1(2), 2004.
[3] Asmare, E., Schmid, S., and M. Brunner, "Setup and Maintenance
of Overlay Networks for Multimedia Services in Mobile
Environments", 8th International Conference on Management of
Multimedia Networks and Services, Barcelona, Spain.,
October 2005.
Stiemerling & Brunner Expires December 21, 2006 [Page 9]
Internet-Draft NSIS Additional MRM June 2006
Authors' Addresses
Martin Stiemerling
Network Laboratories, NEC Europe Ltd.
Kurfuersten-Anlage 36
Heidelberg 69115
Germany
Phone: +49 (0) 6221 4342 113
Email: stiemerling@netlab.nec.de
Marcus Brunner
Network Laboratories, NEC Europe Ltd.
Kurfuersten-Anlage 36
Heidelberg 69115
Germany
Phone: +49 (0) 6221 4342 129
Email: brunner@netlab.nec.de
Stiemerling & Brunner Expires December 21, 2006 [Page 10]
Internet-Draft NSIS Additional MRM June 2006
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2006). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Stiemerling & Brunner Expires December 21, 2006 [Page 11]