Internet Engineering Task Force (IETF) L. Peterson Request for Comments: 7336 Akamai Technologies, Inc. Obsoletes: 3466 B. Davie Category: Informational VMware, Inc. ISSN: 2070-1721 R. van Brandenburg, Ed.

                                                                   TNO
                                                           August 2014
 Framework for Content Distribution Network Interconnection (CDNI)

Abstract

 This document presents a framework for Content Distribution Network
 Interconnection (CDNI).  The purpose of the framework is to provide
 an overall picture of the problem space of CDNI and to describe the
 relationships among the various components necessary to interconnect
 CDNs.  CDNI requires the specification of interfaces and mechanisms
 to address issues such as request routing, distribution metadata
 exchange, and logging information exchange across CDNs.  The intent
 of this document is to outline what each interface needs to
 accomplish and to describe how these interfaces and mechanisms fit
 together, while leaving their detailed specification to other
 documents.  This document, in combination with RFC 6707, obsoletes
 RFC 3466.

Status of This Memo

 This document is not an Internet Standards Track specification; it is
 published for informational purposes.
 This document is a product of the Internet Engineering Task Force
 (IETF).  It represents the consensus of the IETF community.  It has
 received public review and has been approved for publication by the
 Internet Engineering Steering Group (IESG).  Not all documents
 approved by the IESG are a candidate for any level of Internet
 Standard; see Section 2 of RFC 5741.
 Information about the current status of this document, any errata,
 and how to provide feedback on it may be obtained at
 http://www.rfc-editor.org/info/rfc7336.

Peterson, et al. Informational [Page 1] RFC 7336 CDNI Framework August 2014

Copyright Notice

 Copyright (c) 2014 IETF Trust and the persons identified as the
 document authors.  All rights reserved.
 This document is subject to BCP 78 and the IETF Trust's Legal
 Provisions Relating to IETF Documents
 (http://trustee.ietf.org/license-info) in effect on the date of
 publication of this document.  Please review these documents
 carefully, as they describe your rights and restrictions with respect
 to this document.  Code Components extracted from this document must
 include Simplified BSD License text as described in Section 4.e of
 the Trust Legal Provisions and are provided without warranty as
 described in the Simplified BSD License.

Peterson, et al. Informational [Page 2] RFC 7336 CDNI Framework August 2014

Table of Contents

 1. Introduction ....................................................4
    1.1. Terminology ................................................4
    1.2. Reference Model ............................................6
    1.3. Structure of This Document ................................10
 2. Building Blocks ................................................10
    2.1. Request Redirection .......................................10
         2.1.1. DNS Redirection ....................................10
         2.1.2. HTTP Redirection ...................................12
 3. Overview of CDNI Operation .....................................12
    3.1. Preliminaries .............................................14
    3.2. Iterative HTTP Redirect Example ...........................15
    3.3. Recursive HTTP Redirection Example ........................21
    3.4. Iterative DNS-Based Redirection Example ...................25
         3.4.1. Notes on Using DNSSEC ..............................28
    3.5. Dynamic Footprint Discovery Example .......................29
    3.6. Content Removal Example ...................................31
    3.7. Pre-positioned Content Acquisition Example ................32
    3.8. Asynchronous CDNI Metadata Example ........................33
    3.9. Synchronous CDNI Metadata Acquisition Example .............35
    3.10. Content and Metadata Acquisition with Multiple
          Upstream CDNs ............................................37
 4. Main Interfaces ................................................38
    4.1. In-Band versus Out-of-Band Interfaces .....................39
    4.2. Cross-Interface Concerns ..................................40
    4.3. Request Routing Interfaces ................................40
    4.4. CDNI Logging Interface ....................................41
    4.5. CDNI Control Interface ....................................43
    4.6. CDNI Metadata Interface ...................................43
    4.7. HTTP Adaptive Streaming Concerns ..........................44
    4.8. URI Rewriting .............................................46
 5. Deployment Models ..............................................47
    5.1. Meshed CDNs ...............................................47
    5.2. CSP Combined with CDN .....................................48
    5.3. CSP Using CDNI Request Routing Interface ..................49
    5.4. CDN Federations and CDN Exchanges .........................50
 6. Trust Model ....................................................53
 7. Privacy Considerations .........................................54
 8. Security Considerations ........................................55
    8.1. Security of CDNI Interfaces ...............................56
    8.2. Digital Rights Management .................................56
 9. Contributors ...................................................56
 10. Acknowledgements ..............................................57
 11. Informative References ........................................57

Peterson, et al. Informational [Page 3] RFC 7336 CDNI Framework August 2014

1. Introduction

 This document provides an overview of the various components
 necessary to interconnect CDNs, expanding on the problem statement
 and use cases introduced in [RFC6770] and [RFC6707].  It describes
 the necessary interfaces and mechanisms in general terms and outlines
 how they fit together to form a complete system for CDN
 Interconnection.  Detailed specifications are left to other
 documents.  This document makes extensive use of message flow
 examples to illustrate the operation of interconnected CDNs, but
 these examples should be considered illustrative rather than
 prescriptive.
 [RFC3466] uses different terminology and models for "Content
 (distribution) Internetworking (CDI)".  It is also less prescriptive
 in terms of interfaces.  To avoid confusion, this document obsoletes
 [RFC3466].

1.1. Terminology

 This document uses the core terminology defined in [RFC6707].  It
 also introduces the following terms:
 CDN-Domain:  a hostname (Fully Qualified Domain Name -- FQDN) at the
    beginning of a URL (excluding port and scheme), representing a set
    of content that is served by a given CDN.  For example, in the URL
    http://cdn.csp.example/...rest of URL..., the CDN-Domain is
    cdn.csp.example.  A major role of CDN-Domain is to identify a
    region (subset) of the URI space relative to which various CDNI
    rules and policies apply.  For example, a record of CDNI Metadata
    might be defined for the set of resources corresponding to some
    CDN-Domain.
 Distinguished CDN-Domain:  a CDN-Domain that is allocated by a CDN
    for the purposes of communication with a peer CDN but that is not
    found in client requests.  Such CDN-Domains may be used for inter-
    CDN acquisition, or as redirection targets, and enable a CDN to
    distinguish a request from a peer CDN from an end-user request.
 Delivering CDN:  the CDN that ultimately delivers a piece of content
    to the end user.  The last in a potential sequence of Downstream
    CDNs.

Peterson, et al. Informational [Page 4] RFC 7336 CDNI Framework August 2014

 Iterative CDNI Request Redirection:  When an Upstream CDN elects to
    redirect a request towards a Downstream CDN, the Upstream CDN can
    base its redirection purely on a local decision (and without
    attempting to take into account how the Downstream CDN may in turn
    redirect the user agent).  In that case, the Upstream CDN
    redirects the request to the Request Routing system in the
    Downstream CDN, which in turn will decide how to redirect that
    request: this approach is referred to as "Iterative" CDNI Request
    Redirection.
 Recursive CDNI Request Redirection:  When an Upstream CDN elects to
    redirect a request towards a Downstream CDN, the Upstream CDN can
    query the Downstream CDN Request Routing system via the CDNI
    Request Routing Redirection interface (or use information cached
    from earlier similar queries) to find out how the Downstream CDN
    wants the request to be redirected.  This allows the Upstream CDN
    to factor in the Downstream CDN response when redirecting the user
    agent.  This approach is referred to as "Recursive" CDNI Request
    Redirection.  Note that the Downstream CDN may elect to have the
    request redirected directly to a Surrogate inside the Downstream
    CDN, or to any other element in the Downstream CDN (or in another
    CDN), to handle the redirected request appropriately.
 Synchronous CDNI operations:  operations between CDNs that happen
    during the process of servicing a user request, i.e., between the
    time that the user agent begins its attempt to obtain content and
    the time at which that request is served.
 Asynchronous CDNI operations:  operations between CDNs that happen
    independently of any given user request, such as advertisement of
    footprint information or pre-positioning of content for later
    delivery.
 Trigger Interface:  a subset of the CDNI Control interface that
    includes operations to pre-position, revalidate, and purge both
    metadata and content.  These operations are typically called in
    response to some action (Trigger) by the Content Service Provider
    (CSP) on the Upstream CDN.
 We also sometimes use uCDN and dCDN as shorthand for Upstream CDN and
 Downstream CDN (see [RFC6707]), respectively.
 At various points in this document, the concept of a CDN footprint is
 used.  For a discussion on what constitutes a CDN footprint, the
 reader is referred to [FOOTPRINT-CAPABILITY].

Peterson, et al. Informational [Page 5] RFC 7336 CDNI Framework August 2014

1.2. Reference Model

 This document uses the reference model in Figure 1, which expands the
 reference model originally defined in [RFC6707].  (The difference is
 that the expanded model splits the Request Routing interface into its
 two distinct parts: the Request Routing Redirection interface and the
 Footprint & Capabilities Advertisement interface, as described
 below.)

Peterson, et al. Informational [Page 6] RFC 7336 CDNI Framework August 2014

  1. ——-

/ \

   |   CSP  |
   \        /
    --------
        *
        *
        *                         /\
        *                        /  \
    ----------------------      |CDNI|       ----------------------
   /     Upstream CDN     \     |    |      /    Downstream CDN    \
   |      +-------------+ |     | CI |      | +-------------+      |
   |*******   Control   |<======|====|=======>|   Control   *******|
   |*     +------*----*-+ |     |    |      | +-*----*------+     *|
   |*            *    *   |     |    |      |   *    *            *|
   |*     +------*------+ |     | LI |      | +------*------+     *|
   |* *****   Logging   |<======|====|=======>|   Logging   ***** *|
   |* *   +-*-----------+ |     |    |      | +-----------*-+   * *|
   |* *     *         *   |     |    |      |   *         *     * *|
 .....*...+-*---------*-+ |     | RI |      | +-*---------*-+...*.*...
 . |* *   |             |<======|====|=======>|             |   * *| .
 . |* *   | Req-Routing | |     |FCI |      | | Req-Routing |   * *| .
 . |* * ***             |<======|====|=======>|             |** * *| .
 . |* * * +-------------+.|     |    |      | +-------------+ * * *| .
 . |* * *                 .     |    |      |                 * * *| .
 . |* * * +-------------+ |.    | MI |      | +-------------+ * * *| .
 . |* * * | Distribution|<==.===|====|=======>| Distribution| * * *| .
 . |* * * |             | |  .   \  /       | |             | * * *| .
 . |* * * |+---------+  | |   .   \/        | |  +---------+| * * *| .
 . |* * ***| +---------+| |    ...Request......+---------+ |*** * *| .
 . |* *****+-|Surrogate|***********************|Surrogate|-+***** *| .
 . |*******  +---------+| |   Acquisition   | |+----------+ *******| .
 . |      +-------------+ |                 | +-------*-----+      | .
 . \                      /                 \         *            / .
 .  ----------------------                   ---------*------------  .
 .                                                    *              .
 .                                                    * Delivery     .
 .                                                    *              .
 .                                                 +--*---+          .
 ...............Request............................| User |..Request..
                                                   | Agent|
                                                   +------+
          <==> interfaces inside the scope of CDNI

# | | # # | +—-+ | #

  #    |        |                     #       # |  | L  |   |  #
  #    |        |                     #       # |  +----+   |  #
  #    |        |                     #       # |  +----+   |  #
  #    |        |                     #       # |  | D  |   |  #
  #    |        |                     #       # |  +----+   |  #
  #    \        /                     #       # \           /  #
  #     --------                      #       #  -----------   #
  #                                   #       #                #
  #####################################       ##################
  ===>  CDNI Request Routing Interface
  ****  interfaces outside the scope of CDNI
       Figure 13: CDNI Deployment Model: Organization Combining
                          CSP and Partial CDN

5.4. CDN Federations and CDN Exchanges

 There are two additional concepts related to, but distinct from,
 CDNI.  The first is CDN Federation.  Our view is that CDNI is the
 more general concept, involving two or more CDNs serving content to
 each other's users, while federation implies a multi-lateral
 interconnection arrangement, but other CDNI agreements are also
 possible (e.g., symmetric bilateral, asymmetric bilateral).  An
 important conclusion is that CDNI technology should not presume (or
 bake in) a particular interconnection agreement, but should instead
 be general enough to permit alternative interconnection arrangements
 to evolve.
 The second concept often used in the context of CDN Federation is CDN
 Exchange -- a third-party broker or exchange that is used to
 facilitate a CDN federation.  Our view is that a CDN exchange offers
 valuable machinery to scale the number of CDN operators involved in a

Peterson, et al. Informational [Page 50] RFC 7336 CDNI Framework August 2014

 multi-lateral (federated) agreement, but that this machinery is built
 on top of the core CDNI mechanisms.  For example, as illustrated in
 Figure 14, the exchange might aggregate and redistribute information
 about each CDN footprint and capacity, as well as collect, filter,
 and redistribute traffic logs that each participant needs for
 interconnection settlement, but inter-CDN Request Routing, inter-CDN
 content distribution (including inter-CDN acquisition), and inter-CDN
 control, which fundamentally involve a direct interaction between an
 Upstream CDN and a Downstream CDN -- operate exactly as in a pair-
 wise peering arrangement.  Turning to Figure 14, we observe that in
 this example:
 o  each CDN supports a direct CDNI Control interface to every other
    CDN
 o  each CDN supports a direct CDNI Metadata interface to every other
    CDN
 o  each CDN supports a CDNI Logging interface with the CDN Exchange
 o  each CDN supports both a CDNI Request Routing interface with the
    CDN Exchange (for aggregation and redistribution of dynamic CDN
    footprint discovery information) and a direct RI to every other
    CDN (for actual request redirection).

Peterson, et al. Informational [Page 51] RFC 7336 CDNI Framework August 2014

  1. ——— ———

/ CDN A \ / CDN B \

          | +----+   |                         |  +----+   |
 //========>| C  |<==============CDNI============>| C  |<==========\\
 ||       | +----+   |            C            |  +----+   |       ||
 ||       | +----+   |                         |  +----+   |       ||
 || //=====>| D  |<==============CDNI============>| D  |<=======\\ ||
 || ||    | +----+   |            M            |  +----+   |    || ||
 || ||    |          |     /------------\      |           |    || ||
 || ||    | +----+   |     | +--+ CDN Ex|      |  +----+   |    || ||
 || || //==>| RR |<===CDNI==>|RR|<=======CDNI====>| RR |<====\\ || ||
 || || || | +----+   | RR  | +--+       | RR   |  +----+   | || || ||
 || || || |          |     |  /\        |      |           | || || ||
 || || || | +----+   |     |  ||  +---+ |      |  +----+   | || || ||
 || || || | | L  |<===CDNI=======>| L |<=CDNI====>| L  |   | || || ||
 || || || | +----+   |  L  |  ||  +---+ |  L   |  +----+   | || || ||
 || || || \          /     \  ||    /\  /      \           / || || ||
 || || || -----------       --||----||--        -----------  || || ||
 || || ||                     ||    ||                       || || ||
 || || ||                  CDNI RR  ||                       || || ||
 || || ||                     ||   CDNI L                    || || ||
 || || ||                     ||    ||                       || || ||
 || || ||                  ---||----||----                   || || ||
 || || ||                 /   \/    ||    \                  || || ||
 || || ||                 |  +----+ ||    |                  || || ||
 || || \\=====CDNI==========>| RR |<=============CDNI========// || ||
 || ||         RR         |  +----+ \/    |       RR            || ||
 || ||                    |        +----+ |                     || ||
 || ||                    |        | L  | |                     || ||
 || ||                    |        +----+ |                     || ||
 || ||                    |  +----+       |                     || ||
 || \\=======CDNI===========>| D  |<=============CDNI===========// ||
 ||           M           |  +----+       |       M                ||
 ||                       |  +----+       |                        ||
 \\==========CDNI===========>| C  |<=============CDNI==============//
              C           |  +----+       |       C
                          \        CDN C  /
                           --------------
 <=CDNI RR=>     CDNI Request Routing Interface
 <=CDNI M==>     CDNI Metadata Interface
 <=CDNI C==>     CDNI Control Interface
 <=CDNI L==>     CDNI Logging Interface
            Figure 14: CDNI Deployment Model: CDN Exchange

Peterson, et al. Informational [Page 52] RFC 7336 CDNI Framework August 2014

 Note that a CDN exchange may alternatively support a different set of
 functionality (e.g., Logging only, or Logging and full request
 routing, or all the functionality of a CDN including content
 distribution).  All these options are expected to be allowed by the
 IETF CDNI specifications.

6. Trust Model

 There are a number of trust issues that need to be addressed by a
 CDNI solution.  Many of them are in fact similar or identical to
 those in a simple CDN without interconnection.  In a standard CDN
 environment (without CDNI), the CSP places a degree of trust in a
 single CDN operator to perform many functions.  The CDN is trusted to
 deliver content with appropriate quality of experience for the end
 user.  The CSP trusts the CDN operator not to corrupt or modify the
 content.  The CSP often relies on the CDN operator to provide
 reliable accounting information regarding the volume of delivered
 content.  The CSP may also trust the CDN operator to perform actions
 such as timely invalidation of content and restriction of access to
 content based on certain criteria such as location of the user and
 time of day, and to enforce per-request authorization performed by
 the CSP using techniques such as URI signing.
 A CSP also places trust in the CDN not to distribute any information
 that is confidential to the CSP (e.g., how popular a given piece of
 content is) or confidential to the end user (e.g., which content has
 been watched by which user).
 A CSP does not necessarily have to place complete trust in a CDN.  A
 CSP will in some cases take steps to protect its content from
 improper distribution by a CDN, e.g., by encrypting it and
 distributing keys in some out of band way.  A CSP also depends on
 monitoring (possibly by third parties) and reporting to verify that
 the CDN has performed adequately.  A CSP may use techniques such as
 client-based metering to verify that accounting information provided
 by the CDN is reliable.  HTTP conditional requests may be used to
 provide the CSP with some checks on CDN operation.  In other words,
 while a CSP may trust a CDN to perform some functions in the short
 term, the CSP is able, in most cases, to verify whether these actions
 have been performed correctly and to take action (such as moving the
 content to a different CDN) if the CDN does not live up to
 expectations.
 One of the trust issues raised by CDNI is transitive trust.  A CDN
 that has a direct relationship with a CSP can now "outsource" the
 delivery of content to another (Downstream) CDN.  That CDN may in
 term outsource delivery to yet another Downstream CDN, and so on.

Peterson, et al. Informational [Page 53] RFC 7336 CDNI Framework August 2014

 The top-level CDN in such a chain of delegation is responsible for
 ensuring that the requirements of the CSP are met.  Failure to do so
 is presumably just as serious as in the traditional single CDN case.
 Hence, an Upstream CDN is essentially trusting a Downstream CDN to
 perform functions on its behalf in just the same way as a CSP trusts
 a single CDN.  Monitoring and reporting can similarly be used to
 verify that the Downstream CDN has performed appropriately.  However,
 the introduction of multiple CDNs in the path between CSP and end
 user complicates the picture.  For example, third-party monitoring of
 CDN performance (or other aspects of operation, such as timely
 invalidation) might be able to identify the fact that a problem
 occurred somewhere in the chain but not point to the particular CDN
 at fault.
 In summary, we assume that an Upstream CDN will invest a certain
 amount of trust in a Downstream CDN, but that it will verify that the
 Downstream CDN is performing correctly, and take corrective action
 (including potentially breaking off its relationship with that CDN)
 if behavior is not correct.  We do not expect that the trust
 relationship between a CSP and its "top level" CDN will differ
 significantly from that found today in single CDN situations.
 However, it does appear that more sophisticated tools and techniques
 for monitoring CDN performance and behavior will be required to
 enable the identification of the CDN at fault in a particular
 delivery chain.
 We expect that the detailed designs for the specific interfaces for
 CDNI will need to take the transitive trust issues into account.  For
 example, explicit confirmation that some action (such as content
 removal) has taken place in a Downstream CDN may help to mitigate
 some issues of transitive trust.

7. Privacy Considerations

 In general, a CDN has the opportunity to collect detailed information
 about the behavior of end users, e.g., by logging which files are
 being downloaded.  While the concept of interconnected CDNs as
 described in this document doesn't necessarily allow any given CDN to
 gather more information on any specific user, it potentially
 facilitates sharing of this data by a CDN with more parties.  As an
 example, the purpose of the CDNI Logging interface is to allow a dCDN
 to share some of its log records with a uCDN, both for billing
 purposes as well as for sharing traffic statistics with the Content
 Provider on whose behalf the content was delivered.  The fact that
 the CDNI interfaces provide mechanisms for sharing such potentially
 sensitive user data, shows that it is necessary to include in these

Peterson, et al. Informational [Page 54] RFC 7336 CDNI Framework August 2014

 interface appropriate privacy and confidentiality mechanisms.  The
 definition of such mechanisms is dealt with in the respective CDN
 interface documents.

8. Security Considerations

 While there are a variety of security issues introduced by a single
 CDN, we are concerned here specifically with the additional issues
 that arise when CDNs are interconnected.  For example, when a single
 CDN has the ability to distribute content on behalf of a CSP, there
 may be concerns that such content could be distributed to parties who
 are not authorized to receive it, and there are mechanisms to deal
 with such concerns.  Our focus in this section is on how CDNI
 introduces new security issues not found in the single CDN case.  For
 a more detailed analysis of the security requirements of CDNI, see
 Section 9 of [RFC7337].
 Many of the security issues that arise in CDNI are related to the
 transitivity of trust (or lack thereof) described in Section 6.  As
 noted above, the design of the various interfaces for CDNI must take
 account of the additional risks posed by the fact that a CDN with
 whom a CSP has no direct relationship is now potentially distributing
 content for that CSP.  The mechanisms used to mitigate these risks
 may be similar to those used in the single CDN case, but their
 suitability in this more complex environment must be validated.
 CDNs today offer a variety of means to control access to content,
 such as time-of-day restrictions, geo-blocking, and URI signing.
 These mechanisms must continue to function in CDNI environments, and
 this consideration is likely to affect the design of certain CDNI
 interfaces (e.g., metadata, request routing).  For more information
 on URI signing in CDNI, see [URI-SIGNING].
 Just as with a single CDN, each peer CDN must ensure that it is not
 used as an "open proxy" to deliver content on behalf of a malicious
 CSP.  Whereas a single CDN typically addresses this problem by having
 CSPs explicitly register content (or origin servers) that are to be
 served, simply propagating this information to peer Downstream CDNs
 may be problematic because it reveals more information than the
 Upstream CDN is willing to specify.  (To this end, the content
 acquisition step in the earlier examples force the dCDN to retrieve
 content from the uCDN rather than go directly to the origin server.)
 There are several approaches to this problem.  One is for the uCDN to
 encode a signed token generated from a shared secret in each URL
 routed to a dCDN, and for the dCDN to validate the request based on
 this token.  Another one is to have each Upstream CDN advertise the
 set of CDN-Domains they serve, where the Downstream CDN checks each

Peterson, et al. Informational [Page 55] RFC 7336 CDNI Framework August 2014

 request against this set before caching and delivering the associated
 object.  Although straightforward, this approach requires operators
 to reveal additional information, which may or may not be an issue.

8.1. Security of CDNI Interfaces

 It is noted in [RFC7337] that all CDNI interfaces must be able to
 operate securely over insecure IP networks.  Since it is expected
 that the CDNI interfaces will be implemented using existing
 application protocols such as HTTP or Extensible Messaging and
 Presence Protocol (XMPP), we also expect that the security mechanisms
 available to those protocols may be used by the CDNI interfaces.
 Details of how these interfaces are secured will be specified in the
 relevant interface documents.

8.2. Digital Rights Management

 Digital Rights Management (DRM), also sometimes called digital
 restrictions management, is often employed for content distributed
 via CDNs.  In general, DRM relies on the CDN to distribute encrypted
 content, with decryption keys distributed to users by some other
 means (e.g., directly from the CSP to the end user).  For this
 reason, DRM is considered out of scope [RFC6707] and does not
 introduce additional security issues for CDNI.

9. Contributors

 The following individuals contributed to this document:
 o  Matt Caulfield
 o  Francois Le Faucheur
 o  Aaron Falk
 o  David Ferguson
 o  John Hartman
 o  Ben Niven-Jenkins
 o  Kent Leung

Peterson, et al. Informational [Page 56] RFC 7336 CDNI Framework August 2014

10. Acknowledgements

 The authors would like to thank Huw Jones and Jinmei Tatuya for their
 helpful input to this document.  In addition, the authors would like
 to thank Stephen Farrell, Ted Lemon, and Alissa Cooper for their
 reviews, which have helped to improve this document.

11. Informative References

 [CONTROL-TRIGGERS]
            Murray, R. and B. Niven-Jenkins, "CDNI Control Interface /
            Triggers", Work in Progress, July 2014.
 [FOOTPRINT-CAPABILITY]
            Seedorf, J., Peterson, J., Previdi, S., Brandenburg, R.,
            and K. Ma, "CDNI Request Routing: Footprint and
            Capabilities Semantics", Work in Progress, July 2014.
 [LOGGING]  Faucheur, F., Ed., Bertrand, G., Ed., Oprescu, I., Ed.,
            and R. Peterkofsky, "CDNI Logging Interface", Work in
            Progress, July 2014.
 [METADATA]
            Niven-Jenkins, B., Murray, R., Caulfield, M., Leung, K.,
            and K. Ma, "CDN Interconnection Metadata", Work in
            Progress, July 2014.
 [REDIRECTION]
            Niven-Jenkins, B., Ed. and R. Brandenburg, Ed., "Request
            Routing Redirection Interface for CDN Interconnection",
            Work in Progress, April 2014.
 [RFC3466]  Day, M., Cain, B., Tomlinson, G., and P. Rzewski, "A Model
            for Content Internetworking (CDI)", RFC 3466, February
            2003.
 [RFC6707]  Niven-Jenkins, B., Le Faucheur, F., and N. Bitar, "Content
            Distribution Network Interconnection (CDNI) Problem
            Statement", RFC 6707, September 2012.
 [RFC6770]  Bertrand, G., Stephan, E., Burbridge, T., Eardley, P., Ma,
            K., and G. Watson, "Use Cases for Content Delivery Network
            Interconnection", RFC 6770, November 2012.
 [RFC6983]  van Brandenburg, R., van Deventer, O., Le Faucheur, F.,
            and K. Leung, "Models for HTTP-Adaptive-Streaming-Aware
            Content Distribution Network Interconnection (CDNI)", RFC
            6983, July 2013.

Peterson, et al. Informational [Page 57] RFC 7336 CDNI Framework August 2014

 [RFC7337]  Leung, K., Ed. and Y. Lee, Ed., "Content Distribution
            Network Interconnection (CDNI) Requirements", RFC 7337,
            August 2014.
 [URI-SIGNING]
            Leung, K., Faucheur, F., Downey, B., Brandenburg, R., and
            S. Leibrand, "URI Signing for CDN Interconnection (CDNI)",
            Work in Progress, March 2014.

Authors' Addresses

 Larry Peterson
 Akamai Technologies, Inc.
 8 Cambridge Center
 Cambridge, MA  02142
 USA
 EMail: lapeters@akamai.com
 Bruce Davie
 VMware, Inc.
 3401 Hillview Ave.
 Palo Alto, CA  94304
 USA
 EMail: bdavie@vmware.com
 Ray van Brandenburg (editor)
 TNO
 Brassersplein 2
 Delft  2612CT
 the Netherlands
 Phone: +31-88-866-7000
 EMail: ray.vanbrandenburg@tno.nl

Peterson, et al. Informational [Page 58]