[e2e] end of interest
bran@metacomm.com
bran at metacomm.com
Thu May 15 10:30:18 PDT 2008
> an architecture that was purely
> constraint based (i.e. just said what
> you DONT do) would be very
> interesting:)
I did that in the eighties/nineties. See
"Integration Through Meta-Communication" of INFOCOM 90
and "Archetype A Unified Method for the Design and Implementation of
Protocol Architectures". IEEE Trans. Software Eng. 14(6): 822-837 (1988).
Branislav
>
>
> In missive <a06240808c44cf2bbbebf@[10.0.1.5]>,
> John Day typed:
>
> >>At 10:52 -0400 2008/05/11, David P. Reed wrote:
> >>>Snooping honors the Layeristi - granting them rhetorical power they
> >>>never deserved. It sounds like "cheating" or "illegal" operation.
> >>>The Internet was born without layers - it used architectural
> >>
> >>See previous note. No matter how you cut it. Whether you call them
> >>layers or framing. If you have to look at stuff that doesn't belong
> >>to you, you haven't done something right or there is something you
> >>don't understand.
> >>
> >>>framing differently (e.g., one arch principle illustrative:
> >>>encapsulation is not layering, and even survives as IP gets
> >>>encapsulated in TCP port 8 VPNs, much to the chagrin of the
> >>>Layeristi purists who explain it as a "bug", rather than looking at
> >>>its roots in passing IP datagrams over SNA and NCP virtual circuits).
> >>
> >>Gosh. How is this a bug? Sounds right to me!
> >>
> >>>I'd suggest that first-principles thinking is harder than Jon thinks.
> >>
> >>Well, it is hard. I can testify to that! Not sure it is harder than
> >>Jon thinks. Jon seems to think pretty hard much of the time.
> >>Although he doesn't want it to show. ;-)
> >>
> >>>It's not just a matter of choosing sides in a war, or acting as an
> >>>arms merchant to both sides. It's about thinking more squarely
> >>>about the real underlying issues that comprise communications . In
> >>>fact, as some of us have suggested, perhaps the idea that
> >>>communications can be considered as a "pure"
> >>>architectural/linguistic frame independent of storage and
> >>>computation and sensing is the real issue we ought to be addressing
> >>>today, with pervasive comms/storage/computational elements capable
> >>>of all three.
> >>
> >>No, it is a question of learning to listen carefully to what the
> >>problem is telling you and not imposing your own ideas on it. (I
> >>will admit that I have found that we do the later it is often wrong.
> >>Embarrassing when it happens. But if you are careful when you write
> >>it up no one notices!) ;-)
> >>
> >>>
> >>>
> >>>John Day wrote:
> >>>>At 9:08 +0100 2008/05/11, Jon Crowcroft wrote:
> >>>>>nice example of 0nership by warring protocol layer factions
> >>>>>
> >>>>>mesh wifi people need to learn to do layer 3 snooping
> >>>>>same way telecom people did...
> >>>>
> >>>>The need to do snooping is an indication of the current model's
> >>>>inability or refusal to innovate. A failure to dig more deeply
> >>>>into the model. (Or a fear to challenge their religion.)
> >>>>
> >>>>(It turns out once there is a complete architecture, not one of
> >>>>these DOS look-a-likes, snooping isn't necessary.)
> >>>>
> >>>>>
> >>>>>there's a great e2e topic -
> >>>>>we have sort of gotten out of the
> >>>>>denial phase on middle boxes and
> >>>>>we're probably ok with multicast's niches now ...
> >>>>
> >>>>Middleboxes are alos an artifact of an incomplete architecture. In
> >>>>a full (shall we say, a wff) architecture, they aren't necessary.
> >>>>
> >>>>>
> >>>>>but should we raise the
> >>>>>art of _snooping_ to being a
> >>>>>first class component of any decent
> >>>>>postmodern internet architecture?
> >>>>
> >>>>No, snooping is an admission of failure. Calling it a component of
> >>>>a "decent" internet architecture is merely making excuses for our
> >>>>failures.
> >>>>
> >>>>>
> >>>>>knowing
> >>>>>multicast group members locations from lookin at IGMP traffic from
> "below"
> >>>>>is one exxaple (think dslams too) but another would be
> >>>>>P2P aware Traffic Engineering, for example
> >>>>
> >>>>Recognizing that a multicast address is the name of a set deals
> >>>>with most of this. (Of course, this means that strictly speaking
> >>>>multicast addresses aren't really addresses but names.) A multicast
> >>>>or anycast address must always resolve at some point to a normal
> >>>>address. The idea of a multicast address as an ambiguous address
> >>>>is fundamentally broken.
> >>>>
> >>>>>
> >>>>>"layer violations" as taught in protocls #101 has traditionally
> >>>>>been restricted to upper layer tweaking layer-2 operating parameters
> >>>>>(think Application/TCP causing Dial up), rather than
> >>>>>vice versa - but the other way round stretches
> >>>>>programming API paradigms more athletically
> >>>>>so may be condusive to progress...
> >>>>
> >>>>If I understand what you are alluding to, this is addressed by not
> >>>>ignoring the existence of the enrollment phase in communication.
> >>>>
> >>>>What I have found is that in a wff architecture there are no need
> >>>>for layer violations. In other words, if you have layer
> >>>>violations, you are doing something wrong some place. Either in
> >>>>how you are trying to do what you want to do, or in what you think
> >>>>a layer is. In this case it seems to be a bit of both.
> >>>>
> >>>>Take care,
> >>>>John
> >>>>
> >>>>>
> >>>>>In missive <1210445625.6167.138.camel at jg-laptop>, Jim Gettys typed:
> >>>>>
> >>>>> >>On Sat, 2008-05-10 at 12:18 -0400, David P. Reed wrote:
> >>>>> >>
> >>>>> >>> There are huge aspects of that future that depend on getting
> the
> >>>>> >>> low-level abstractions right (in the sense that they match
> >>>>>real physical
> >>>>> >>> reality). And at the same time, constructing a stack of
> abstractions
> >>>>> >>> that work to maximize the utility of radio.
> >>>>> >>>
> >>>>> >>
> >>>>> >>First hand reality in the OLPC project: use of
> multicast/broadcast based
> >>>>> >>protocols when crossed with nascent wireless protocols
> (802.11s), can
> >>>>> >>cause spectacularly "interesting" (as in Chinese curse)
> interactions.
> >>>>> >>
> >>>>> >>First hand experience is showing that one had better understand
> what
> >>>>> >>happens at the lowest wireless layers while building application
> >>>>> >>middleware protocols and applications.... Some existing
> protocols that
> >>>>> >>have worked well on wired networks, and sort of worked OK on
> 802.11abc
> >>>>> >>networks, just doesn't work well (or scale well) on a mesh
> designed to
> >>>>> >>try to hide what's going on under the covers.
> >>>>> >>
> >>>>> >>While overlays are going to play an important role in getting us
> out of
> >>>>> >>the current morass (without transition strategies, we're toast;
> that was
> >>>>> >>what got the Internet out of telecom circuit switching as the
> only
> >>>>> >>mechanism), I have to emphatically agree with Dave that we'd
> better get
> >>>>> >>moving on more fundamental redesign and rethinking of
> networking....
> >>>>> >> - Jim
> >>>>> >>
> >>>>> >>--
> >>>>> >>Jim Gettys <jg at laptop.org>
> >>>>> >>One Laptop Per Child
> >>>>> >>
> >>>>>
> >>>>> cheers
> >>>>>
> >>>>> jon
> >>
>
> cheers
>
> jon
>
>
More information about the end2end-interest
mailing list