This part of the tutorial tells what things should be covered in the section. Some of it is based on RFC 3552, some may be based on the -00 draft that tried to revise 3552; and some may be new.
(5 slides to introduce terminology. Not sure the below subjects are the best)
🐑
(each of the following sub-sections may be 1-3 slides)
- Usually this is the Internet Threat Model
- Doesn't need to be stated if that's it
- Usually includes deployment across the global Internet
- If your protocol is special, call out the threat environment
Example:
- PTPv2 requires that jitter be kept at sub-micro- or sub-nano-second levels.
- It cannot have a router between the endpoints because routers do queueing.
- Its threat environment is very different to that of anything that runs over the Internet.
(Especially user information)
🐑