On Thu, Oct 4, 2012 at 4:17 PM, Cutler James R
<james.cut...@consultant.com> wrote:
> On Oct 4, 2012, at 4:00 PM, William Herrin <b...@herrin.us> wrote:
>> On Wed, Oct 3, 2012 at 7:12 PM, Cutler James R
>> <james.cut...@consultant.com> wrote:
>> Or did you mean use DNS as it fits in the current system, which
>> doesn't actually satisfy (1) at all since the layer 4 protocols
>> continue to build the connection identity from the layer 3 network
>> identity instead of the external host/service identity.
>>
> Why does the connection identity have to include the host identifier.  Is 
> that not a problem under the control of applications?

Nope. It's under the control of the layer 4 protocol, generally TCP or
UDP, and implemented at the OS level. For example, in TCP the
connection identity is composed of the source and destination IP
addresses and port numbers. Together, these 96 bits of information
comprise the unique identity of that TCP connection which the OS
matches to the socket number the application interacts with.

Regards,
Bill Herrin



-- 
William D. Herrin ................ her...@dirtside.com  b...@herrin.us
3005 Crane Dr. ...................... Web: <http://bill.herrin.us/>
Falls Church, VA 22042-3004

Reply via email to