< draft-irtf-panrg-questions.txt   draft-irtf-panrg-questions.txt >
Path Aware Networking RG B. Trammell Path Aware Networking RG B. Trammell
Internet-Draft Google Switzerland GmbH Internet-Draft Google Switzerland GmbH
Intended status: Informational 25 January 2022 Intended status: Informational 25 January 2022
Expires: 29 July 2022 Expires: 29 July 2022
Current Open Questions in Path Aware Networking Current Open Questions in Path Aware Networking
draft-irtf-panrg-questions-12 draft-irtf-panrg-questions-latest
Abstract Abstract
In contrast to the present Internet architecture, a path-aware In contrast to the present Internet architecture, a path-aware
internetworking architecture has two important properties: it exposes internetworking architecture has two important properties: it exposes
the properties of available Internet paths to endpoints, and provides the properties of available Internet paths to endpoints, and provides
for endpoints and applications to use these properties to select for endpoints and applications to use these properties to select
paths through the Internet for their traffic. While this property of paths through the Internet for their traffic. While this property of
"path awareness" already exists in many Internet-connected networks "path awareness" already exists in many Internet-connected networks
within single domains and via administrative interfaces to the within single domains and via administrative interfaces to the
skipping to change at page 2, line 28 skipping to change at line 69
Provisions Relating to IETF Documents (https://trustee.ietf.org/ Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document. license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License. provided without warranty as described in the Revised BSD License.
Table of Contents Table of Contents
1. Introduction to Path-Aware Networking . . . . . . . . . . . . 2 1. Introduction to Path-Aware Networking
1.1. Definitions . . . . . . . . . . . . . . . . . . . . . . . 4 1.1. Definitions
2. Questions . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2. Questions
2.1. A Vocabulary of Path Properties . . . . . . . . . . . . . 5 2.1. A Vocabulary of Path Properties
2.2. Discovery, Distribution, and Trustworthiness of Path 2.2. Discovery, Distribution, and Trustworthiness of Path
Properties . . . . . . . . . . . . . . . . . . . . . . . 5 Properties
2.3. Supporting Path Selection . . . . . . . . . . . . . . . . 6 2.3. Supporting Path Selection
2.4. Interfaces for Path Awareness . . . . . . . . . . . . . . 6 2.4. Interfaces for Path Awareness
2.5. Implications of Path Awareness for the Transport and 2.5. Implications of Path Awareness for the Transport and
Application Layers . . . . . . . . . . . . . . . . . . . 7 Application Layers
2.6. What is an Endpoint? . . . . . . . . . . . . . . . . . . 7 2.6. What is an Endpoint?
2.7. Operating a Path Aware Network . . . . . . . . . . . . . 8 2.7. Operating a Path Aware Network
2.8. Deploying a Path Aware Network . . . . . . . . . . . . . 8 2.8. Deploying a Path Aware Network
3. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 9 3. Acknowledgments
4. Informative References . . . . . . . . . . . . . . . . . . . 10 4. Informative References
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 10 Author's Address
1. Introduction to Path-Aware Networking 1. Introduction to Path-Aware Networking
In the current Internet architecture, the network layer provides a In the current Internet architecture, the network layer provides a
best-effort service to the endpoints using it, without verifiability best-effort service to the endpoints using it, without verifiability
of the properties of the path between tne endpoints. While there are of the properties of the path between tne endpoints. While there are
network layer technologies that attempt better-than-best-effort network layer technologies that attempt better-than-best-effort
delivery, the interfaces to these are generally administrative as delivery, the interfaces to these are generally administrative as
opposed to endpoint-exposed (e.g. Path Computation Element (PCE) opposed to endpoint-exposed (e.g. Path Computation Element (PCE)
[RFC4655] and Software-Defined Wide Area Network (SD-WAN) [RFC4655] and Software-Defined Wide Area Network (SD-WAN)
approaches), and they are often restricted to single administrative approaches), and they are often restricted to single administrative
domains. In this architecture, an application can assume that a domains. In this architecture, an application can assume that a
packet with a given destination address will eventually be forwarded packet with a given destination address will eventually be forwarded
toward that destination, but little else. toward that destination, but little else.
A transport layer protocol such as TCP can provide reliability over A transport layer protocol such as TCP can provide reliability over
this best-effort service, and a protocol above the network layer, this best-effort service, and a protocol above the network layer,
such as Transport Layer Security (TLS) [RFC8446] can authenticate the such as Transport Layer Security (TLS) [RFC8446] can authenticate the
remote endpoint. However, little, if any, explicit information about remote endpoint. However, little, if any, explicit information about
 End of changes. 5 change blocks. 
16 lines changed or deleted 15 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/