tsvwg-2----Page:3
1  2  3  4  5  6  7 

Objectives
Document Key Types as well as Key Provisioning Methods that may be used for RSVP Security
Discuss applicability of those to various deployment environments
In doing so, explicitly cover the more “interesting” cases:
Single-domain & Multi-domain
Non-RSVP hops
Notify messages (non hop-by-hop)
Subverted node
RSVP Authentication & RSVP Encryption
RSVP Aggregation (over Aggregate RSVP, over RSVP-TE, over PCN clouds,..)
Intended Status: Informational
PPT Version