Presentation is loading. Please wait.

Presentation is loading. Please wait.

Principles & Constraints Philip Eardley. Application-agnostic The CONEX protocol should be open about (independent of) the responses it allows to the.

Similar presentations


Presentation on theme: "Principles & Constraints Philip Eardley. Application-agnostic The CONEX protocol should be open about (independent of) the responses it allows to the."— Presentation transcript:

1 Principles & Constraints Philip Eardley

2 Application-agnostic The CONEX protocol should be open about (independent of) the responses it allows to the CONEX information, supporting a diversity of traffic management practices by networks and end-hosts. –The proposed WG will encourage experiments on traffic management, but not standardise them (in order to reduce its scope).

3 CONEX information is in IP header Visibility of CONEX information – it should be easily visible to all network elements (even if the data traffic is encrypted) –in order to ensure the widest possible applicability – –it is visible to both end-systems (to help them control their sending rate) and to network managers (to help them manage a bottleneck, whether traffic originates from their own users or from other networks). Granularity of CONEX information – it should be sufficiently granular to allow near real-time, per packet traffic management. –So that any node can see the impact of the packets it is asked to forward. –The CONEX information is inevitably a minimum of 1 RTT out-of-date The above 2 bullets suggest that the CONEX information is carried in the IP header. –Signalling of whole path congestion information is thus explicit, rather than implicitly through packet loss, delay or jitter, which allows a faster and more accurate reaction. –The proposed WG will specify how to encapsulate CONEX information (header bits, interpretation) (v4 & v6)

4 Feedback path congestion info The receiver needs to inform the sender what the total path congestion is –Simplest case, this is what the sender sets as the initial CONEX information –(TBD: do this using TCP mod; RTP/UDP;) –(TBD: whether the capability of an ECN receiver is sufficient).

5 Threats analysis The proposed WG will study the threats, especially from falsifying or suppressing the CONEX information

6 Deployability analysis The proposed WG will study technology to support incremental deployment steps: –ECN routers vs non-ECN routers vs CONEX routers; –Receivers with CONEX-capability, ECN- capability, or neither; –Opportunistic deployment.


Download ppt "Principles & Constraints Philip Eardley. Application-agnostic The CONEX protocol should be open about (independent of) the responses it allows to the."

Similar presentations


Ads by Google