Holding the Internet Accountable
David Andersen (CMU), Hari Balakrishnan (MIT), Nick
Feamster (Georgia Tech), Teemu Koponen (ICSI/HIIT), and Daekyeong Moon
and Scott Shenker (UC Berkeley)
Q: Is it possible to apply proposed scheme
recursively?
A: Yes, more hierarchy is possible.
Q: Does your approach help mobility?
A: Yes end system identifiers can be used as in
UIA or HIP.
Comment: This system helps to solve spam problems
because you can identify the sender.
Q: Is it necessary that ALL architecture migrates?
A: We need to change.
Q: VP: How will we use RIP and OSPF inside an AS?
A: HB: Host Routes; usable on small enough
networks.
Q: How would name resolution and multicast work?
A: For resolution we can use the same or even
safer name service. For multi-cast can certainly use a sub-address
space.
Q: About Shutoff packets, it strikes me as a
dangerous recipe, what if one accidentally shutoff someone?
A: The time period is small. Also, for such an
accident to happen the NIC has to be broken.