Re: Multicast with VPN
At 03:58 04/04/01, dark dark wrote: >hi, >Does any one have any idea if we can use IPSec with >multicast address. Where "IPsec" means "AH" and/or "ESP", the answer is quite clearly yes and always has been. >In RFC-2401 I have read >"In principle, the Destination Address may be a >unicast address, an IP broadcast address, or a >multicast group address." More strongly phrased, the reason that the combination of "Destination Address" (rather than, for example, "Source Address) and SPI uniquely identifies an IPsec Security Association is so that ESP/AH can fully support IP multicasting. Far from being an accident, this was a quite deliberate design decision dating back more than 5 years now. One has been able to use ESP/AH to protect IP multicast sessions for some time. For example, I was using it in a limited way circa Fall 1995. The challenge is that manual configuration of any IPsec Security Association is operationally challenging and scales remarkably poorly. The primary gain in dynamic SA management is improved scaling and reduced operational burden. >"However, IPsec SA management mechanisms currently are >defined only for unicast SAs." >they have explained how to use multicast address in >IPSec SA, in principle, but this RFC was published in 1998. Where "IPsec SA management mechanisms" means "key management mechanisms for ESP/AH", the cited text is merely noting that in 1998 the IETF had not (at that time) standardised any key management mechanism for multicast Security Associations. The Secure Multicast Research Group (SMUG) of the IRTF has been examining multicast key management for some time now. Some work originating within SMUG is now appearing in the Multicast Security (MSEC) Working Group of the IETF. Folks interested in this topic ought to look into (and perhaps participate in) the MSEC WG. IMHO Ran [EMAIL PROTECTED]
Re: IESG Response to Copyright appeal
[EMAIL PROTECTED] wrote: > The problem is that when you take *that* stuff into account, I've spent > (or have committed to spending) *more* time trying to comply with the > GPL than I have actually making useful things available. OK, I am convinced that GPL creates problems, especially for the maintainers. Now, back to the original issue that I have raised, i.e. IESG's assertions on: Doing so, according to our counsel '...is as close to a "contribution to the public" that we can get'. Is that really true that the BCP-9 text was developed by the IETF (not ISOC!) lawyers specifically to deal with IETF documents? Furthermore, (AFAIK) haven't these counsels also recommended that "Foo of Conduct" modification? I just put the GDL as a comparison. regards, -- Rahmat M. Samik-Ibrahim - VLSM-TJT - http://rms46.vlsm.org --- The Kappa likes getting cucumber --- Budum... Budum...
BGP and MBGP
Hello, 1- Is the 2 attributs in MBGP are additional attributes in the update message of a BGP update message or it is just another type of update messages. If it is not a new message, and those are just two additionnal attributes then what should be the meaning of the unfeasible routes field and also the NLRI field in the update message? There is nothing in the standards and specifications clarifying this point. 2- in the case where MBGP used for Multicast, is it the role of this protocol that just providing a new multicast topology or there is anything else?? because if a new topology isnt created with the MBGP then there is no meaning of this protocol. 3- in the multicast topology , how can the paths can be aggregated??? in the same manner of unicast ??? suppressing the unfeasible routes or how? thanx
Re: Self-Similar Traffic
Bellcore (Tellecordia) owns the source traffic pattern that they collected. It also has source codes based on the hurst parameters that they identified. But I don't think it is free though. Cheers, Lily Cheng Davide Careglio wrote: > > Hi, > > sorry, perhaps my question was not clear. > I'm searching a source code for simulating network arrival counts with > Self-Similar network traffic. So, my question is: could someone tell me > where do I find a code already made? > > Regards, > Davide > > - Original Message - > From: "Deepak Shah" <[EMAIL PROTECTED]> > To: "'Davide Careglio'" <[EMAIL PROTECTED]> > Sent: Thursday, April 05, 2001 12:38 PM > Subject: RE: Self-Similar Traffic > > > What is meant by..'Self-Similar Traffic Source code'. > > > > Thanks.. > > Deepak Shah > > > > -Original Message- > > From: Davide Careglio [mailto:[EMAIL PROTECTED]] > > Sent: Thursday, April 05, 2001 3:13 PM > > To: [EMAIL PROTECTED] > > Subject: Self-Similar Traffic > > > > > > Dear All, > > > > Could someone please tell me where can I find a Self-Similar Traffic > source > > code (possibly in C/C++ and/or Java)? > > > > Thanks a lot. > > > > Best Regards, > > Davide > > ___ > > Davide Careglio > > > > UPC Universitat Politècnica de Catalunya > > Departament d'Arquitectura de Computadores > > Jordi Girona, 1-3, D6 008 (Campus Nord) > > 08034 Barcelona (Spain) > > > > Phone: +34 93 4017182 Fax: +34 93 4017055 > > E-Mail: [EMAIL PROTECTED] > >
Re: Self-Similar Traffic
Hi, sorry, perhaps my question was not clear. I'm searching a source code for simulating network arrival counts with Self-Similar network traffic. So, my question is: could someone tell me where do I find a code already made? Regards, Davide - Original Message - From: "Deepak Shah" <[EMAIL PROTECTED]> To: "'Davide Careglio'" <[EMAIL PROTECTED]> Sent: Thursday, April 05, 2001 12:38 PM Subject: RE: Self-Similar Traffic > What is meant by..'Self-Similar Traffic Source code'. > > Thanks.. > Deepak Shah > > -Original Message- > From: Davide Careglio [mailto:[EMAIL PROTECTED]] > Sent: Thursday, April 05, 2001 3:13 PM > To: [EMAIL PROTECTED] > Subject: Self-Similar Traffic > > > Dear All, > > Could someone please tell me where can I find a Self-Similar Traffic source > code (possibly in C/C++ and/or Java)? > > Thanks a lot. > > Best Regards, > Davide > ___ > Davide Careglio > > UPC Universitat Politècnica de Catalunya > Departament d'Arquitectura de Computadores > Jordi Girona, 1-3, D6 008 (Campus Nord) > 08034 Barcelona (Spain) > > Phone: +34 93 4017182 Fax: +34 93 4017055 > E-Mail: [EMAIL PROTECTED] >
huidziekte
Vijf jaar voordat deze foto's werden genomen werd bij mij diagnose reumatische artritis gesteld en als zodanig ook behandeld. Niets hielp. Toen de ziekte zich zo manifesteerde zoals u hieronder kunt zien.. http://www.naardedokter.com/testimonials/sys_lup_eryth.htm
Re: The architechture of the future network and its protocol
Wang Hui wrote: > Hi folks here, > > I am about to start a new research project which will be done in my Ph.D student >period. And I am interested in the future Internet and related issues. But since I >am a newbie to this field, I have some puzzles. I need your help. > Well I used to have interest on these two protocols below: You can have a glance on X500 (its an old protocol) and its son LDAP (light Weight Directory Access Protocol). They are doing some good stuff about the LDAP at UMICH (University of Michigan). These two protocols a related with directory services and administration. > > With the unbelievable expansion of Internet, the current Internet encounters many >limitations, such as the speed and performance. How about setup a new architecture >for the whole network, which is scalable, manageable, and of a high performance? Well it is difficult to anwser because stuff like this (technology) are going fast. I heard about these architecture: Man, Lan, Wan and SAN. I hope the last one is the right name. It talks about network and databases and configuration. > As to protocol, will IPv6 domain the world? Or other protocols? You know there already an architecture and this change will go slowly. You can look at IPV6 but there is good stuff too about voice over IP. > And is there any research projects connected with the future network architecture >and its related things? Could anyone give me some hints? or point out some web links? A web site that purhaps can help you to start your research: http://www.protocols.com/ it provide a good openview of all the protocols that are on the vogue nowadays. Usually I do my search with either www.svn.net/search or www.zworks.com purhaps this can help you to improve in your PhD studies. > > Thanks in advance. > > -Wang Hui Sebastien -- What's important is not simplicity or complexity, but how you bridge the two. Larry Wall, Aug. 25, 1998 Bsn :(+33) (0)1.55.66.70.93 url :http://www.epita.fr/~dorey_sPager:(+33) (0)6.57.56.60.42
Self-Similar Traffic
Dear All, Could someone please tell me where can I find a Self-Similar Traffic source code (possibly in C/C++ and/or Java)? Thanks a lot. Best Regards, Davide ___ Davide Careglio UPC Universitat Politècnica de Catalunya Departament d'Arquitectura de Computadores Jordi Girona, 1-3, D6 008 (Campus Nord) 08034 Barcelona (Spain) Phone: +34 93 4017182 Fax: +34 93 4017055 E-Mail: [EMAIL PROTECTED]
The architechture of the future network and its protocol
Hi folks here, I am about to start a new research project which will be done in my Ph.D student period. And I am interested in the future Internet and related issues. But since I am a newbie to this field, I have some puzzles. I need your help. With the unbelievable expansion of Internet, the current Internet encounters many limitations, such as the speed and performance. How about setup a new architecture for the whole network, which is scalable, manageable, and of a high performance? As to protocol, will IPv6 domain the world? Or other protocols? And is there any research projects connected with the future network architecture and its related things? Could anyone give me some hints? or point out some web links? Thanks in advance. -Wang Hui
Re: IESG Response to Copyright appeal
Valdis, There is an easy way around your problem. >... even though I made *no* source changes, I asked (and was told) > that just pointing at ftp.gnu.org for the source wasn't acceptable) Here is what the GPL says: | ... Accompany it with a written offer, valid for at least three | years, to give any third party, for a charge no more than your | cost of physically performing source distribution, a complete | machine-readable copy of the corresponding source code, to be | distributed under the terms of Sections 1 and 2 above on a medium | customarily used for software interchange You might not, according to the FSF, be able to "give" someone a file by pointing them to it, but you can offer them to a web page that will program their browser to get the file for them: obtaining offered GPL source code for Make v. 3.77 ftp://ftp.digex.net/pub/gnu/make/make-3.77.tar.gz"> Please stand by... Thank you for your request for the GNU Make version 3.77 source code provided at this web site as described in the written offer that you received with your GNU Public Licenced software. A gziped archive of the source code distribution will be delivered to you in five seconds. I promise that the FSF will not sue you for that. I am positive that the only reason the FSF people do not allow pointers is because their canonical ftp.gnu.org server is constantly saturated, even at a quarter to four in the morning. Just pick one of the heftier mirrors and everyone will be happy. Cheers, James