[prev in list] [next in list] [prev in thread] [next in thread]
List: ntp-hackers
Subject: Re: [ntp:hackers] Failing over DNS Server Addresses
From: "David L. Mills" <mills () udel ! edu>
Date: 2007-08-08 12:56:42
Message-ID: 46B9BD8A.3050707 () udel ! edu
[Download RAW message or body]
Danny,
I've redirected this to hackers@ntp.org as I don't know if all the
latter are on the ISC list.
I'm the blamee for the mutlicast/manycast stuff. Sachin was working the
pool issues and, I thought, had it working. Maybe he can speak up.
Dave
Danny Mayer wrote:
> Dave,
>
> I'm going to dub this poolcasting to distinguish it from the manycasting
> you implementing using multicasting.
>
> If Sachim has implemented any of this we'd be glad to integrated or if
> he wants and has time to do so we'd give him whatever help he needs.
>
> I will add this to our todo list.
>
> Danny
>
> David L. Mills wrote:
>
>> Danny,
>>
>> Sachim's original intent was to add a pool command that would tinkle a
>> willing DNS server, parse what came back and prune the population for
>> the three survivors. Code to prune the survivors and manage refresh is
>> already done for manycast and would be easy to use with pool as well.
>> I'm not sure he finished the code or what shape it is in now.
>>
>> THe manycast code wasn't easy. The trick is to age the population after
>> acquisition at a rate coresponding to whether a candidate is the system
>> peer, among the survivors or not. Also considered is whether the straum
>> is below the floor or above the ceiling, which is useful to modulate the
>> scheme, like protect the primary servers, etc.
>>
>> Dave
>
_______________________________________________
hackers mailing list
hackers@lists.ntp.org
https://lists.ntp.org/mailman/listinfo/hackers
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic