[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

2nd part Re: revision of architecture draft is now published



The first mail was unintentionally sent, so i include the remaining comments here.

- about section 4.5

I am not sure about the following comment:

  "Packet header rewriting by remote network elements has a large number
   of associated considerations, and documentation relating to the
   considerations of the use of Network Address Translators [4] contains
   much of this material."

I mean, if the multi6 layer within the host replaces the received locator by the ULP identifier, then it doesn't really matter the locator than was actually carried in the packet, right? I mean, in any case, the locator is transparent to the ULP which only deals with the identifier.

Moreover, perhaps replacing locators by identifiers introduce some of the nat problems, but in any case, i don't see how this related to the fact that the locator is replaced by the host or by the edge router. So perhaps some comment like this one is required but imho is not restricted to this section but to all mechanisms that replace locators by identifiers.
Perhaps you were considering other issues here?


- about section 5.1

i fail to understand the case you are describing with:


It is also possible to allow the endpoint identity and locator space to overlap, and distinguish between the two identity realms by the context of usage rather than by a prefix comparison. However, this reuse of the locator token space as identity tokens has the potential to create the anomalous situation where a particular locator value is used as an identity value by a different endpoint. It is not clear that the identity and locator contexts can be clearly disambiguated in every case, which is a major drawback to this particular approach.

In particular which is the difference between this case and the "home" locator case?

Later in this section (the last paragraph, actually) it is stated that:

   Instead of structured tokens that double as lookup keys to obtain
   mappings from endpoint identities to locator sets, the alternative is
   to use an unstructured token space, where individual token values are
   drawn opportunistically for use within a multi-homed session context.
   Here the semantics of the endpoint identity are subtly changed.  The
   endpoint identity is not a persistent alias or reference to the
   identity of the endpoint, but a means to allow the identity protocol
   element to confirm that two locators are part of the same mapped
   locator set for a remote endpoint.  In this context the unstructured
   opportunistic endpoint identifier values are used in determining
   locator equivalence rather than in some form of lookup function.

i think that it is also possible to use an unstructured identifier name space in a non opportunistic mode, like HIP, that supports both modes. I mean, the identifier in this case is persistent, but as the address space is not structured, lookups are at least difficult if not impossible in the short term.
So perhaps it would be interesting to split this paragraph in two, one about unstructured namespaces, and another one about using them in a opportunistic manner?


- in section 5.3.2

where it states that:

   One of the potential drawbacks of placing this functionality within
   the transport protocol layer is that it is possible that each
   transport protocol will require a distinct implementation of identity
   functionality.

i would add that another drawback is that some transport layers (such as UDP) don't have the notion of session neither, so in this case i guess only the app knows about sessions

- in section 5.3.3

when considering opportunistic identifiers to initiate the communication.
note that non of the proposals AFAIK, use opportunistic identifiers for the server side. imho this is very difficult, because, the client side needs to know the identifier in order to initiate the communication. It would be possible that the client side would select the servers identity beforehand, but this may imply collisions if the server is already using it. imho opportunistic ids are only suitable for clients (if any), but not for servers.


- section 6.1

when it states that

      Does the transport need to translate the upper level interface
      token into an identity token that identifies the session?

i guess that is not the transport who does the translation but it can also be the wedge layer

then when it states that

      How does the session initiator establish that the remote end of
      the session can support the multi-homing version of the transport
      protocol?

what do you mean by "the multihoming version of the transport protocol"? i mean in the wedge layer approach, for instance, the trasnport protocol is not multihoming capable, but the wedge layer is. I think that perhaps this section should reffer more to a multi6 capable endpoint rather than a multi6 capable transport protocol

Additionally, i guess that i would also include in this section something about how does the endpoints discover the locator set available for the other endpoint and how do they select the source and destiantion locator. In other words, i think that a couple of functions within the fucntional decomposition should be:
* locator discovery
* locator selection (both source and destination) for initial contact


Regards, marcelo

PS: sorry for the fragmentation of the comments :-(


El 30/06/2004, a las 4:22, Geoff Huston escribió:


draft-huston-multi6-architectures-01.txt has been published by the drafts editor. This version integrates comments made by working group members on the -00 version and also includes material proposed in the interim multi6 working group meeting earlier this month.

I would like to propose to the chairs that the working group consider:

- that this document be adopted as a working group document, and

- that the appendix of this document be split off from the main text of the document and separately developed as a working group document.


thanks.