Constructing Service Hashes from Various Sources

january 2015 n.w
1 / 6
Embed
Share

This presentation explores the construction of service hashes from different sources such as service types, parameters, and locations. The discussion covers possible mappings and dependencies on upper-layer service discovery protocols, highlighting the importance of understanding diverse hashing possibilities.

  • Service Hashing
  • Service Discovery
  • Service Parameters
  • Mapping
  • Service Types

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. January 2015 doc.: IEEE 802.11-15/182r0 Service Hash Mapping Date: 2015-1-15 Authors: Name Company Address Phone email 161 Gajeong-dong, Yuseong-gu, Daejeon, Korea RYU Cheol ETRI +82 42 860 6604 ryuch@etri.re.kr Submission Slide 1 RYU Cheol, ETRI

  2. January 2015 doc.: IEEE 802.11-15/182r0 Abstract This presentation is on how to construct Service Hashes from various sources such as service types, service parameters, and service location. I would like to discuss various mapping could be possible and even cannot be possible. It is dependent on upper layer service discovery protocols. Submission Slide 2 RYU Cheol, ETRI

  3. January 2015 doc.: IEEE 802.11-15/182r0 DNS-SD All those below can be sources of hashing. Service Type only _ipp._tcp.local. (IANA assigned name or bonjour service type) _skype._tcp.local (proprietary name) Service Type with domain New\ Employee\ Page._http._tcp.dns-sd-services http._tcp._wikipedia.org Service Type with some parameters _ipp._tcp.local color-supported=yes Service Name is not the only source of hashing. Submission Slide 3 RYU Cheol, ETRI

  4. January 2015 doc.: IEEE 802.11-15/182r0 Proxyings Automatic proxying _ipp._tcp.local _ipp._tcp.local color-supported=yes Manual proxying (or service registration) New\ Employee\ Page._http._tcp.dns-sd-services Flight\ Information._http._tcp.local skype._tcp.local http._tcp._wikipedia.org Submission Slide 4 RYU Cheol, ETRI

  5. January 2015 doc.: IEEE 802.11-15/182r0 Mom service discovery protocol A mom shouted in a multicast packet. Come on! Breakfast is ready. A kid asked and a mommy answered. Mommy breakfast is ready? Yes in 5 minutes. How can you map the service to hash value? It is dependent on ULP. But at the worst case, we can just proxy mom s announcements. Submission Slide 5 RYU Cheol, ETRI

  6. January 2015 doc.: IEEE 802.11-15/182r0 References IETF RFC 2782 (DNS SVR): A DNS RR for specifying the location of services DNS SRV Service Types IANA Service Name and Transport Protocol Port Number Registry Submission Slide 6 RYU Cheol, ETRI

More Related Content