diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc3568.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc3568.txt')
-rw-r--r-- | doc/rfc/rfc3568.txt | 1067 |
1 files changed, 1067 insertions, 0 deletions
diff --git a/doc/rfc/rfc3568.txt b/doc/rfc/rfc3568.txt new file mode 100644 index 0000000..5274106 --- /dev/null +++ b/doc/rfc/rfc3568.txt @@ -0,0 +1,1067 @@ + + + + + + +Network Working Group A. Barbir +Request for Comments: 3568 Nortel Networks +Category: Informational B. Cain + Storigen Systems + R. Nair + Consultant + O. Spatscheck + AT&T + July 2003 + + + Known Content Network (CN) Request-Routing Mechanisms + +Status of this Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2003). All Rights Reserved. + +Abstract + + This document presents a summary of Request-Routing techniques that + are used to direct client requests to surrogates based on various + policies and a possible set of metrics. The document covers + techniques that were commonly used in the industry on or before + December 2000. In this memo, the term Request-Routing represents + techniques that is commonly called content routing or content + redirection. In principle, Request-Routing techniques can be + classified under: DNS Request-Routing, Transport-layer + Request-Routing, and Application-layer Request-Routing. + +Table of Contents + + 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 + 2. DNS based Request-Routing Mechanisms . . . . . . . . . . . . 3 + 2.1. Single Reply . . . . . . . . . . . . . . . . . . . . . 3 + 2.2. Multiple Replies . . . . . . . . . . . . . . . . . . . 3 + 2.3. Multi-Level Resolution . . . . . . . . . . . . . . . . 4 + 2.3.1. NS Redirection . . . . . . . . . . . . . . . . 4 + 2.3.2. CNAME Redirection. . . . . . . . . . . . . . . 5 + 2.4. Anycast. . . . . . . . . . . . . . . . . . . . . . . . 5 + 2.5. Object Encoding. . . . . . . . . . . . . . . . . . . . 6 + 2.6. DNS Request-Routing Limitations. . . . . . . . . . . . 6 + 3. Transport-Layer Request-Routing . . . . . . . . . . . . . . 7 + + + +Barbir, et al. Informational [Page 1] + +RFC 3568 Known CN Request-Routing Mechanisms July 2003 + + + 4. Application-Layer Request-Routing . . . . . . . . . . . . . 8 + 4.1. Header Inspection. . . . . . . . . . . . . . . . . . . 8 + 4.1.1. URL-Based Request-Routing. . . . . . . . . . . 8 + 4.1.2. Header-Based Request-Routing . . . . . . . . . 9 + 4.1.3. Site-Specific Identifiers. . . . . . . . . . .10 + 4.2. Content Modification . . . . . . . . . . . . . . . . .10 + 4.2.1. A-priori URL Rewriting . . . . . . . . . . . .11 + 4.2.2. On-Demand URL Rewriting. . . . . . . . . . . .11 + 4.2.3. Content Modification Limitations . . . . . . .11 + 5. Combination of Multiple Mechanisms . . . . . . . . . . . . .11 + 6. Security Considerations . . . . . . . . . . . . . . . . . .12 + 7. Additional Authors and Acknowledgements . . . . . . . . . .12 + A. Measurements . . . . . . . . . . . . . . . . . . . . . . . .13 + A.1. Proximity Measurements . . . . . . . . . . . . . . . .13 + A.1.1. Active Probing . . . . . . . . . . . . . . . .13 + A.1.2. Metric Types . . . . . . . . . . . . . . . . .14 + A.1.3. Surrogate Feedback . . . . . . . . . . . . . .14 + 8. Normative References . . . . . . . . . . . . . . . . . . . .15 + 9. Informative References . . . . . . . . . . . . . . . . . . .15 + 10. Intellectual Property and Copyright Statements . . . . . . .17 + 11. Authors' Addresses . . . . . . . . . . . . . . . . . . . . .18 + 12. Full Copyright Statement . . . . . . . . . . . . . . . . . .19 + +1. Introduction + + This document provides a summary of known request routing techniques + that are used by the industry before December 2000. Request routing + techniques are generally used to direct client requests to surrogates + based on various policies and a possible set of metrics. The task of + directing clients' requests to surrogates is also called + Request-Routing, Content Routing or Content Redirection. + + Request-Routing techniques are commonly used in Content Networks + (also known as Content Delivery Networks) [8]. Content Networks + include network infrastructure that exists in layers 4 through 7. + Content Networks deal with the routing and forwarding of requests and + responses for content. Content Networks rely on layer 7 protocols + such as HTTP [4] for transport. + + Request-Routing techniques are generally used to direct client + requests for objects to a surrogate or a set of surrogates that could + best serve that content. Request-Routing mechanisms could be used to + direct client requests to surrogates that are within a Content + Network (CN) [8]. + + + + + + + +Barbir, et al. Informational [Page 2] + +RFC 3568 Known CN Request-Routing Mechanisms July 2003 + + + Request-Routing techniques are used as a vehicle to extend the reach + and scale of Content Delivery Networks. There exist multiple + Request-Routing mechanisms. At a high-level, these may be classified + under: DNS Request-Routing, transport-layer Request-Routing, and + application-layer Request-Routing. + + A request routing system uses a set of metrics in an attempt to + direct users to surrogate that can best serve the request. For + example, the choice of the surrogate could be based on network + proximity, bandwidth availability, surrogate load and availability of + content. Appendix A provides a summary of metrics and measurement + techniques that could be used in the selection of the best surrogate. + + The memo is organized as follows: Section 2 provides a summary of + known DNS based Request-Routing techniques. Section 3 discusses + transport-layer Request-Routing methods. In section 4 application + layer Request-Routing mechanisms are explored. Section 5 provides + insight on combining the various methods that were discussed in the + earlier sections in order to optimize the performance of the + Request-Routing System. Appendix A provides a summary of possible + metrics and measurements techniques that could be used by the + Request-Routing system to choose a given surrogate. + +2. DNS based Request-Routing Mechanisms + + DNS based Request-Routing techniques are common due to the ubiquity + of the DNS system [10][12][13]. In DNS based Request-Routing + techniques, a specialized DNS server is inserted in the DNS + resolution process. The server is capable of returning a different + set of A, NS or CNAME records based on user defined policies, + metrics, or a combination of both. In [11] RFC 2782 (DNS SRV) + provides guidance on the use of DNS for load balancing. The RFC + describes some of the limitations and suggests appropriate useage of + DNS based techniques. The next sections provides a summary of some + of the used techniques. + +2.1. Single Reply + + In this approach, the DNS server is authoritative for the entire DNS + domain or a sub domain. The DNS server returns the IP address of the + best surrogate in an A record to the requesting DNS server. The IP + address of the surrogate could also be a virtual IP(VIP) address of + the best set of surrogates for requesting DNS server. + + + + + + + + +Barbir, et al. Informational [Page 3] + +RFC 3568 Known CN Request-Routing Mechanisms July 2003 + + +2.2. Multiple Replies + + In this approach, the Request-Routing DNS server returns multiple + replies such as several A records for various surrogates. Common + implementations of client site DNS server's cycles through the + multiple replies in a Round-Robin fashion. The order in which the + records are returned can be used to direct multiple clients using a + single client site DNS server. + +2.3. Multi-Level Resolution + + In this approach multiple Request-Routing DNS servers can be involved + in a single DNS resolution. The rationale of utilizing multiple + Request-Routing DNS servers in a single DNS resolution is to allow + one to distribute more complex decisions from a single server to + multiple, more specialized, Request-Routing DNS servers. The most + common mechanisms used to insert multiple Request-Routing DNS servers + in a single DNS resolution is the use of NS and CNAME records. An + example would be the case where a higher level DNS server operates + within a territory, directing the DNS lookup to a more specific DNS + server within that territory to provide a more accurate resolution. + +2.3.1. NS Redirection + + A DNS server can use NS records to redirect the authority of the next + level domain to another Request-Routing DNS server. The, technique + allows multiple DNS server to be involved in the name resolution + process. For example, a client site DNS server resolving + a.b.example.com [10] would eventually request a resolution of + a.b.example.com from the name server authoritative for example.com. + The name server authoritative for this domain might be a + Request-Routing NS server. In this case the Request-Routing DNS + server can either return a set of A records or can redirect the + resolution of the request a.b.example.com to the DNS server that is + authoritative for example.com using NS records. + + One drawback of using NS records is that the number of + Request-Routing DNS servers are limited by the number of parts in the + DNS name. This problem results from DNS policy that causes a client + site DNS server to abandon a request if no additional parts of the + DNS name are resolved in an exchange with an authoritative DNS + server. + + A second drawback is that the last DNS server can determine the TTL + of the entire resolution process. Basically, the last DNS server can + return in the authoritative section of its response its own NS + record. The client will use this cached NS record for further + request resolutions until it expires. + + + +Barbir, et al. Informational [Page 4] + +RFC 3568 Known CN Request-Routing Mechanisms July 2003 + + + Another drawback is that some implementations of bind voluntarily + cause timeouts to simplify their implementation in cases in which a + NS level redirect points to a name server for which no valid A record + is returned or cached. This is especially a problem if the domain of + the name server does not match the domain currently resolved, since + in this case the A records, which might be passed in the DNS + response, are discarded for security reasons. Another drawback is + the added delay in resolving the request due to the use of multiple + DNS servers. + +2.3.2. CNAME Redirection + + In this scenario, the Request-Routing DNS server returns a CNAME + record to direct resolution to an entirely new domain. In principle, + the new domain might employ a new set of Request-Routing DNS servers. + + One disadvantage of this approach is the additional overhead of + resolving the new domain name. The main advantage of this approach + is that the number of Request-Routing DNS servers is independent of + the format of the domain name. + +2.4. Anycast + + Anycast [5] is an inter-network service that is applicable to + networking situations where a host, application, or user wishes to + locate a host which supports a particular service but, if several + servers utilizes the service, it does not particularly care which + server is used. In an anycast service, a host transmits a datagram + to an anycast address and the inter-network is responsible for + providing best effort delivery of the datagram to at least one, and + preferably only one, of the servers that accept datagrams for the + anycast address. + + The motivation for anycast is that it considerably simplifies the + task of finding an appropriate server. For example, users, instead + of consulting a list of servers and choosing the closest one, could + simply type the name of the server and be connected to the nearest + one. By using anycast, DNS resolvers would no longer have to be + configured with the IP addresses of their servers, but rather could + send a query to a well-known DNS anycast address. + + Furthermore, to combine measurement and redirection, the + Request-Routing DNS server can advertise an anycast address as its IP + address. The same address is used by multiple physical DNS servers. + In this scenario, the Request-Routing DNS server that is the closest + to the client site DNS server in terms of OSPF and BGP routing will + receive the packet containing the DNS resolution request. The server + can use this information to make a Request-Routing decision. + + + +Barbir, et al. Informational [Page 5] + +RFC 3568 Known CN Request-Routing Mechanisms July 2003 + + + Drawbacks of this approach are listed below: + + o The DNS server may not be the closest server in terms of routing + to the client. + + o Typically, routing protocols are not load sensitive. Hence, the + closest server may not be the one with the least network latency. + + o The server load is not considered during the Request-Routing + process. + +2.5. Object Encoding + + Since only DNS names are visible during the DNS Request-Routing, some + solutions encode the object type, object hash, or similar information + into the DNS name. This might vary from a simple division of objects + based on object type (such as images.a.b.example.com and + streaming.a.b.example.com) to a sophisticated schema in which the + domain name contains a unique identifier (such as a hash) of the + object. The obvious advantage is that object information is + available at resolution time. The disadvantage is that the client + site DNS server has to perform multiple resolutions to retrieve a + single Web page, which might increase rather than decrease the + overall latency. + +2.6. DNS Request-Routing Limitations + + This section lists some of the limitations of DNS based + Request-Routing techniques. + + o DNS only allows resolution at the domain level. However, an ideal + request resolution system should service requests per object + level. + + o In DNS based Request-Routing systems servers may be required to + return DNS entries with a short time-to-live (TTL) values. This + may be needed in order to be able to react quickly in the face of + outages. This in return may increase the volume of requests to + DNS servers. + + o Some DNS implementations do not always adhere to DNS standards. + For example, many DNS implementations do not honor the DNS TTL + field. + + o DNS Request-Routing is based only on knowledge of the client DNS + server, as client addresses are not relayed within DNS requests. + This limits the ability of the Request-Routing system to determine + a client's proximity to the surrogate. + + + +Barbir, et al. Informational [Page 6] + +RFC 3568 Known CN Request-Routing Mechanisms July 2003 + + + o DNS servers can request and allow recursive resolution of DNS + names. For recursive resolution of requests, the Request-Routing + DNS server will not be exposed to the IP address of the client's + site DNS server. In this case, the Request-Routing DNS server + will be exposed to the address of the DNS server that is + recursively requesting the information on behalf of the client's + site DNS server. For example, imgs.example.com might be resolved + by a CN, but the request for the resolution might come from + dns1.example.com as a result of the recursion. + + o Users that share a single client site DNS server will be + redirected to the same set of IP addresses during the TTL + interval. This might lead to overloading of the surrogate during + a flash crowd. + + o Some implementations of bind can cause DNS timeouts to occur while + handling exceptional situations. For example, timeouts can occur + for NS redirections to unknown domains. + + DNS based request routing techniques can suffer from serious + limitations. For example, the use of such techniques can overburden + third party DNS servers, which should not be allowed [19]. In [11] + RFC 2782 provides warnings on the use of DNS for load balancing. + Readers are encouraged to read the RFC for better understanding of + the limitations. + +3. Transport-Layer Request-Routing + + At the transport-layer finer levels of granularity can be achieved by + the close inspection of client's requests. In this approach, the + Request-Routing system inspects the information available in the + first packet of the client's request to make surrogate selection + decisions. The inspection of the client's requests provides data + about the client's IP address, port information, and layer 4 + protocol. The acquired data could be used in combination with + user-defined policies and other metrics to determine the selection of + a surrogate that is better suited to serve the request. The + techniques [20][18][15] are used to hand off the session to a more + appropriate surrogate are beyond the scope of this document. + + In general, the forward-flow traffic (client to newly selected + surrogate) will flow through the surrogate originally chosen by DNS. + The reverse-flow (surrogate to client) traffic, which normally + transfers much more data than the forward flow, would typically take + the direct path. + + + + + + +Barbir, et al. Informational [Page 7] + +RFC 3568 Known CN Request-Routing Mechanisms July 2003 + + + The overhead associated with transport-layer Request-Routing [21][19] + is better suited for long-lived sessions such as FTP [1] and RTSP + [3]. However, it also could be used to direct clients away from + overloaded surrogates. + + In general, transport-layer Request-Routing can be combined with DNS + based techniques. As stated earlier, DNS based methods resolve + clients requests based on domains or sub domains with exposure to the + client's DNS server IP address. Hence, the DNS based methods could + be used as a first step in deciding on an appropriate surrogate with + more accurate refinement made by the transport-layer Request-Routing + system. + +4. Application-Layer Request-Routing + + Application-layer Request-Routing systems perform deeper examination + of client's packets beyond the transport layer header. Deeper + examination of client's packets provides fine-grained Request-Routing + control down to the level of individual objects. The process could + be performed in real time at the time of the object request. The + exposure to the client's IP address combined with the fine-grained + knowledge of the requested objects enable application-layer + Request-Routing systems to provide better control over the selection + of the best surrogate. + +4.1. Header Inspection + + Some application level protocols such as HTTP [4], RTSP [3], and SSL + [2] provide hints in the initial portion of the session about how the + client request must be directed. These hints may come from the URL + of the content or other parts of the MIME request header such as + Cookies. + +4.1.1. URL-Based Request-Routing + + Application level protocols such as HTTP and RTSP describe the + requested content by its URL [6]. In many cases, this information + is sufficient to disambiguate the content and suitably direct the + request. In most cases, it may be sufficient to make Request-Routing + decision just by examining the prefix or suffix of the URL. + +4.1.1.1. 302 Redirection + + In this approach, the client's request is first resolved to a virtual + surrogate. Consequently, the surrogate returns an + application-specific code such as the 302 (in the case of HTTP [4] or + RTSP [3]) to redirect the client to the actual delivery node. + + + + +Barbir, et al. Informational [Page 8] + +RFC 3568 Known CN Request-Routing Mechanisms July 2003 + + + This technique is relatively simple to implement. However, the main + drawback of this method is the additional latency involved in sending + the redirect message back to the client. + +4.1.1.2. In-Path Element + + In this technique, an In-Path element is present in the network in + the forwarding path of the client's request. The In-Path element + provides transparent interception of the transport connection. The + In-Path element examines the client's content requests and performs + Request-Routing decisions. + + The In-Path element then splices the client connection to a + connection with the appropriate delivery node and passes along the + content request. In general, the return path would go through the + In-Path element. However, it is possible to arrange for a direct + return by passing the address translation information to the + surrogate or delivery node through some proprietary means. + + The primary disadvantage with this method is the performance + implications of URL-parsing in the path of the network traffic. + However, it is generally the case that the return traffic is much + larger than the forward traffic. + + The technique allows for the possibility of partitioning the traffic + among a set of delivery nodes by content objects identified by URLs. + This allows object-specific control of server loading. For example, + requests for non-cacheable object types may be directed away from a + cache. + +4.1.2. Header-Based Request-Routing + + This technique involves the task of using HTTP [4] such as Cookie, + Language, and User-Agent, in order to select a surrogate. In [20] + some examples of using this technique are provided. + + Cookies can be used to identify a customer or session by a web site. + Cookie based Request-Routing provides content service differentiation + based on the client. This approach works provided that the cookies + belong to the client. In addition, it is possible to direct a + connection from a multi-session transaction to the same server to + achieve session-level persistence. + + The language header can be used to direct traffic to a + language-specific delivery node. The user-agent header helps + identify the type of client device. For example, a voice-browser, + PDA, or cell phone can indicate the type of delivery node that has + content specialized to handle the content request. + + + +Barbir, et al. Informational [Page 9] + +RFC 3568 Known CN Request-Routing Mechanisms July 2003 + + +4.1.3. Site-Specific Identifiers + + Site-specific identifiers help authenticate and identify a session + from a specific user. This information may be used to direct a + content request. + + An example of a site-specific identifier is the SSL Session + Identifier. This identifier is generated by a web server and used by + the web client in succeeding sessions to identify itself and avoid an + entire security authentication exchange. In order to inspect the + session identifier, an In-Path element would observe the responses of + the web server and determine the session identifier which is then + used to associate the session to a specific server. The remaining + sessions are directed based on the stored session identifier. + +4.2. Content Modification + + This technique enables a content provider to take direct control over + Request-Routing decisions without the need for specific witching + devices or directory services in the path between the client and the + origin server. Basically, a content provider can directly + communicate to the client the best surrogate that can serve the + request. Decisions about the best surrogate can be made on a per- + object basis or it can depend on a set of metrics. The overall goal + is to improve scalability and the performance for delivering the + modified content, including all embedded objects. + + In general, the method takes advantage of content objects that + consist of basic structure that includes references to additional, + embedded objects. For example, most web pages, consist of an HTML + document that contains plain text together with some embedded + objects, such as GIF or JPEG images. The embedded objects are + referenced using embedded HTML directives. In general, embedded HTML + directives direct the client to retrieve the embedded objects from + the origin server. A content provider can now modify references to + embedded objects such that they could be fetched from the best + surrogate. This technique is also known as URL rewriting. + + Content modification techniques must not violate the architectural + concepts of the Internet [9]. Special considerations must be made to + ensure that the task of modifying the content is performed in a + manner that is consistent with RFC 3238 [9] that specifies the + architectural considerations for intermediaries that perform + operations or modifications on content. + + The basic types of URL rewriting are discussed in the following + subsections. + + + + +Barbir, et al. Informational [Page 10] + +RFC 3568 Known CN Request-Routing Mechanisms July 2003 + + +4.2.1. A-priori URL Rewriting + + In this scheme, a content provider rewrites the embedded URLs before + the content is positioned on the origin server. In this case, URL + rewriting can be done either manually or by using software tools that + parse the content and replace embedded URLs. + + A-priori URL rewriting alone does not allow consideration of client + specifics for Request-Routing. However, it can be used in + combination with DNS Request-Routing to direct related DNS queries + into the domain name space of the service provider. Dynamic + Request-Routing based on client specifics are then done using the DNS + approach. + +4.2.2. On-Demand URL Rewriting + + On-Demand or dynamic URL rewriting, modifies the content when the + client request reaches the origin server. At this time, the identity + of the client is known and can be considered when rewriting the + embedded URLs. In particular, an automated process can determine, + on-demand, which surrogate would serve the requesting client best. + The embedded URLs can then be rewritten to direct the client to + retrieve the objects from the best surrogate rather than from the + origin server. + +4.2.3. Content Modification Limitations + + Content modification as a Request-Routing mechanism suffers from many + limitation [23]. For example: + + o The first request from a client to a specific site must be served + from the origin server. + + o Content that has been modified to include references to nearby + surrogates rather than to the origin server should be marked as + non-cacheable. Alternatively, such pages can be marked to be + cacheable only for a relatively short period of time. Rewritten + URLs on cached pages can cause problems, because they can get + outdated and point to surrogates that are no longer available or + no longer good choices. + +5. Combination of Multiple Mechanisms + + There are environments in which a combination of different mechanisms + can be beneficial and advantageous over using one of the proposed + mechanisms alone. The following example illustrates how the + mechanisms can be used in combination. + + + + +Barbir, et al. Informational [Page 11] + +RFC 3568 Known CN Request-Routing Mechanisms July 2003 + + + A basic problem of DNS Request-Routing is the resolution granularity + that allows resolution on a per-domain level only. A per-object + redirection cannot easily be achieved. However, content modification + can be used together with DNS Request-Routing to overcome this + problem. With content modification, references to different objects + on the same origin server can be rewritten to point into different + domain name spaces. Using DNS Request-Routing, requests for those + objects can now dynamically be directed to different surrogates. + +6. Security Considerations + + The main objective of this document is to provide a summary of + current Request-Routing techniques. Such techniques are currently + implemented in the Internet. However, security must be addressed by + any entity that implements any technique that redirects client's + requests. In [9] RFC 3238 addresses the main requirements for + entities that intend to modify requests for content in the Internet. + + Some active probing techniques will set off intrusion detection + systems and firewalls. Therefore, it is recommended that + implementers be aware of routing protocol security [25]. + + It is important to note the impact of TLS [2] on request routing in + CNs. Specifically, when TLS is used the full URL is not visible to + the content network unless it terminates the TLS session. The + current document focuses on HTTP techniques. TLS based techniques + that require the termination of TLS sessions on Content Peering + Gateways [8] are beyond the of scope of this document. + + The details of security techniques are also beyond the scope of this + document. + +7. Additional Authors and Acknowledgements + + The following people have contributed to the task of authoring this + document: Fred Douglis (IBM Research), Mark Green, Markus Hofmann + (Lucent), Doug Potter. + + The authors acknowledge the contributions and comments of Ian Cooper, + Nalin Mistry (Nortel), Wayne Ding (Nortel) and Eric Dean + (CrystalBall). + + + + + + + + + + +Barbir, et al. Informational [Page 12] + +RFC 3568 Known CN Request-Routing Mechanisms July 2003 + + +Appendix A. Measurements + + Request-Routing systems can use a variety of metrics in order to + determine the best surrogate that can serve a client's request. In + general, these metrics are based on network measurements and feedback + from surrogates. It is possible to combine multiple metrics using + both proximity and surrogate feedback for best surrogate selection. + The following sections describe several well known metrics as well as + the major techniques for obtaining them. + +A.1. Proximity Measurements + + Proximity measurements can be used by the Request-Routing system to + direct users to the "closest" surrogate. In this document proximity + means round-trip time. In a DNS Request-Routing system, the + measurements are made to the client's local DNS server. However, + when the IP address of the client is accessible more accurate + proximity measurements can be obtained [24]. + + Proximity measurements can be exchanged between surrogates and the + requesting entity. In many cases, proximity measurements are + "one-way" in that they measure either the forward or reverse path of + packets from the surrogate to the requesting entity. This is + important as many paths in the Internet are asymmetric [24]. + + In order to obtain a set of proximity measurements, a network may + employ active probing techniques. + +A.1.1. Active Probing + + Active probing is when past or possible requesting entities are + probed using one or more techniques to determine one or more metrics + from each surrogate or set of surrogates. An example of a probing + technique is an ICMP ECHO Request that is periodically sent from each + surrogate or set of surrogates to a potential requesting entity. + + In any active probing approach, a list of potential requesting + entities need to be obtained. This list can be generated + dynamically. Here, as requests arrive, the requesting entity + addresses can be cached for later probing. Another potential + solution is to use an algorithm to divide address space into blocks + and to probe random addresses within those blocks. Limitations of + active probing techniques include: + + o Measurements can only be taken periodically. + + o Firewalls and NATs disallow probes. + + + + +Barbir, et al. Informational [Page 13] + +RFC 3568 Known CN Request-Routing Mechanisms July 2003 + + + o Probes often cause security alarms to be triggered on intrusion + detection systems. + +A.1.2. Metric Types + + The following sections list some of the metrics, which can be used + for proximity calculations. + + o Latency: Network latency measurements metrics are used to + determine the surrogate (or set of surrogates) that has the least + delay to the requesting entity. These measurements can be + obtained using active probing techniques. + + o Hop Counts: Router hops from the surrogate to the requesting + entity can be used as a proximity measurement. + + o BGP Information: BGP AS PATH and MED attributes can be used to + determine the "BGP distance" to a given prefix/length pair. In + order to use BGP information for proximity measurements, it must + be obtained at each surrogate site/location. + + It is important to note that the value of BGP AS PATH information can + be meaningless as a good selection metric [24]. + +A.1.3. Surrogate Feedback + + In order to select a "least-loaded" delivery node. Feedback can be + delivered from each surrogate or can be aggregated by site or by + location. + +A.1.3.1. Probing + + Feedback information may be obtained by periodically probing a + surrogate by issuing an HTTP request and observing the behavior. The + problems with probing for surrogate information are: + + o It is difficult to obtain "real-time" information. + + o Non-real-time information may be inaccurate. + + Consequently, feedback information can be obtained by agents that + reside on surrogates that can communicate a variety of metrics about + their nodes. + + + + + + + + +Barbir, et al. Informational [Page 14] + +RFC 3568 Known CN Request-Routing Mechanisms July 2003 + + +8. Normative References + + [1] Postel, J. and J. Reynolds, "File Transfer Protocol", STD 9, RFC + 959, October 1985. + + [2] Dierks, T. and C. Allen, "The TLS Protocol Version 1", RFC 2246, + January 1999. + + [3] Schulzrinne, H., Rao, A. and R. Lanphier, "Real Time Streaming + Protocol", RFC 2326, April 1998. + + [4] Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., + Leach, P. and T. Berners-Lee, "Hypertext Transfer + Protocol -- HTTP/1.1", RFC 2616, June 1999. + + [5] Partridge, C., Mendez, T. and W. Milliken, "Host Anycasting + Service", RFC 1546, November 1993. + + [6] Berners-Lee, T., Masinter, L. and M. McCahill, "Uniform Resource + Locators (URL)", RFC 1738, December 1994. + + [7] Schulzrinne, H., Casner, S., Federick, R. and V. Jacobson, "RTP: + A Transport Protocol for Real-Time Applications", RFC 1889, + January 1996. + + [8] Day, M., Cain, B., Tomlinson, G. and P. Rzewski, "A Model for + Content Internetworking (CDI)", RFC 3466, February 2003. + + [9] Floyd, S. and L. Daigle, "IAB Architectural and Policy + Considerations for Open Pluggable Edge Services", RFC 3238, + January 2002. + +9. Informative References + + [10] Eastlake, D. and A, Panitz, "Reserved Top Level DNS Names", BCP + 32, RFC 2606, June 1999. + + [11] Gulbrandsen, A., Vixie, P. and L. Esibov, "A DNS RR for + specifying the location of services (DNS SRV)", RFC 2782, + February 2002. + + [12] Mockapetris, P., "Domain names - concepts and facilities", STD + 13, RFC 1034, November 1987. + + [13] Mockapetris, P., "Domain names - concepts and facilities", STD + 13, RFC 1035, November 1987. + + + + + +Barbir, et al. Informational [Page 15] + +RFC 3568 Known CN Request-Routing Mechanisms July 2003 + + + [14] Elz, R. and R. Bush, "Clarifications to the DNS Specification", + RFC 2181, July 1997. + + [15] Awduche, D., Chiu, A., Elwalid, A., Widjaja, I. and X. Xiao, + "Overview and Principles of Internet Traffic Engineering", RFC + 3272, May 2002. + + [16] Crawley, E., Nair, R., Rajagopalan, B. and H. Sandick, "A + Framework for QoS-based Routing in the Internet", RFC 2386, + August 1998. + + [17] Huston, G., "Commentary on Inter-Domain Routing in the + Internet", RFC 3221, December 2001. + + [18] M. Welsh et al., "SEDA: An Architecture for Well-Conditioned, + Scalable Internet Services", Proceedings of the Eighteenth + Symposium on Operating Systems Principles (SOSP-18) 2001, + October 2001. + + [19] A. Shaikh, "On the effectiveness of DNS-based Server Selection", + INFOCOM 2001, August 2001. + + [20] C. Yang et al., "An effective mechanism for supporting content- + based routing in scalable Web server clusters", Proc. + International Workshops on Parallel Processing 1999, September + 1999. + + [21] R. Liston et al., "Using a Proxy to Measure Client-Side Web + Performance", Proceedings of the Sixth International Web Content + Caching and Distribution Workshop (WCW'01) 2001, August 2001. + + [22] W. Jiang et al., "Modeling of packet loss and delay and their + effect on real-time multimedia service quality", Proceedings of + NOSSDAV 2000, June 2000. + + [23] K. Johnson et al., "The measured performance of content + distribution networks", Proceedings of the Fifth International + Web Caching Workshop and Content Delivery Workshop 2000, May + 2000. + + [24] V. Paxson, "End-to-end Internet packet dynamics", IEEE/ACM + Transactions 1999, June 1999. + + [25] F. Wang et al., "Secure routing protocols: Theory and Practice", + Technical report, North Carolina State University 1997, May + 1997. + + + + + +Barbir, et al. Informational [Page 16] + +RFC 3568 Known CN Request-Routing Mechanisms July 2003 + + +10. Intellectual Property Statement + + The IETF takes no position regarding the validity or scope of any + intellectual property or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; neither does it represent that it + has made any effort to identify any such rights. Information on the + IETF's procedures with respect to rights in standards-track and + standards-related documentation can be found in BCP-11. Copies of + claims of rights made available for publication and any assurances of + licenses to be made available, or the result of an attempt made to + obtain a general license or permission for the use of such + proprietary rights by implementors or users of this specification can + be obtained from the IETF Secretariat. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights which may cover technology that may be required to practice + this standard. Please address the information to the IETF Executive + Director. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Barbir, et al. Informational [Page 17] + +RFC 3568 Known CN Request-Routing Mechanisms July 2003 + + +11. Authors' Addresses + + Abbie Barbir + Nortel Networks + 3500 Carling Avenue + Nepean, Ontario K2H 8E9 + Canada + + Phone: +1 613 763 5229 + EMail: abbieb@nortelnetworks.com + + + Brad Cain + Storigen Systems + 650 Suffolk Street + Lowell, MA 01854 + USA + + Phone: +1 978-323-4454 + EMail: bcain@storigen.com + + + Raj Nair + 6 Burroughs Rd + Lexington, MA 02420 + USA + + EMail: nair_raj@yahoo.com + + + Oliver Spatscheck + AT&T + 180 Park Ave, Bldg 103 + Florham Park, NJ 07932 + USA + + EMail: spatsch@research.att.com + + + + + + + + + + + + + + +Barbir, et al. Informational [Page 18] + +RFC 3568 Known CN Request-Routing Mechanisms July 2003 + + +12. Full Copyright Statement + + Copyright (C) The Internet Society (2003). All Rights Reserved. + + This document and translations of it may be copied and furnished to + others, and derivative works that comment on or otherwise explain it + or assist in its implementation may be prepared, copied, published + and distributed, in whole or in part, without restriction of any + kind, provided that the above copyright notice and this paragraph are + included on all such copies and derivative works. However, this + document itself may not be modified in any way, such as by removing + the copyright notice or references to the Internet Society or other + Internet organizations, except as needed for the purpose of + developing Internet standards in which case the procedures for + copyrights defined in the Internet Standards process must be + followed, or as required to translate it into languages other than + English. + + The limited permissions granted above are perpetual and will not be + revoked by the Internet Society or its successors or assignees. + + This document and the information contained herein is provided on an + "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING + TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING + BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION + HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF + MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + + + + + + + + + + + +Barbir, et al. Informational [Page 19] + |