2014
DOI: 10.17487/rfc7286
|View full text |Cite
|
Sign up to set email alerts
|

Application-Layer Traffic Optimization (ALTO) Server Discovery

Abstract: The goal of Application-Layer Traffic Optimization (ALTO) is to provide guidance to applications that have to select one or several hosts from a set of candidates capable of providing a desired resource. ALTO is realized by a client-server protocol. Before an ALTO client can ask for guidance, it needs to discover one or more ALTO servers.This document specifies a procedure for resource-consumer-initiated ALTO server discovery, which can be used if the ALTO client is embedded in the resource consumer.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(21 citation statements)
references
References 5 publications
0
19
0
Order By: Relevance
“…ISPs may also provide services that allow using of other, more accurate metrics. For example, an ISP may deploy the Application-Layer Traffic Optimization (ALTO) service [31] which provides nodes with information that helps them perform better peer selection. Such information may include link capacity, node load, cost of a link, and so on.…”
Section: E Deploymentmentioning
confidence: 99%
“…ISPs may also provide services that allow using of other, more accurate metrics. For example, an ISP may deploy the Application-Layer Traffic Optimization (ALTO) service [31] which provides nodes with information that helps them perform better peer selection. Such information may include link capacity, node load, cost of a link, and so on.…”
Section: E Deploymentmentioning
confidence: 99%
“…In order to support those environments interoperably, the ALTO requirements document [RFC6708] outlines minimum-to-implement authentication and other security requirements. This document considers the following threats and protection strategies.…”
Section: Security Considerationsmentioning
confidence: 99%
“…For example, if many ALTO clients follow the cost map or the Endpoint Cost Service guidance without doing additional sanity checks or adaptation, more preferable hosts and/or links could get overloaded while less preferable ones remain idle; see AR-14 of [RFC6708] for related application considerations.…”
Section: Risk Scenariosmentioning
confidence: 99%
See 1 more Smart Citation
“…Similar to a CDN [9], a CDNI system applies request-routing techniques to select optimal servers to provide users with guaranteed high-quality service [10,11]. Thus, the performance of CDNI request-routing strategies affects CDNI service quality significantly.…”
Section: Introductionmentioning
confidence: 99%