Re: [AVTCORE] Comments on draft-ietf-avtcore-rfc5764-mux-fixes-03.txt

Paul Kyzivat <pkyzivat@alum.mit.edu> Tue, 20 October 2015 16:11 UTC

Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 308381B2A41 for <avt@ietfa.amsl.com>; Tue, 20 Oct 2015 09:11:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.235
X-Spam-Level:
X-Spam-Status: No, score=-1.235 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_SOFTFAIL=0.665] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MhvqwmrO-jGy for <avt@ietfa.amsl.com>; Tue, 20 Oct 2015 09:11:02 -0700 (PDT)
Received: from resqmta-ch2-06v.sys.comcast.net (resqmta-ch2-06v.sys.comcast.net [IPv6:2001:558:fe21:29:69:252:207:38]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BB9C11B3569 for <avt@ietf.org>; Tue, 20 Oct 2015 09:09:53 -0700 (PDT)
Received: from resomta-ch2-07v.sys.comcast.net ([69.252.207.103]) by resqmta-ch2-06v.sys.comcast.net with comcast id XU6V1r0082EPM3101U9sPW; Tue, 20 Oct 2015 16:09:52 +0000
Received: from Paul-Kyzivats-MacBook-Pro.local ([50.138.229.151]) by resomta-ch2-07v.sys.comcast.net with comcast id XU9s1r0093Ge9ey01U9sjL; Tue, 20 Oct 2015 16:09:52 +0000
To: avt@ietf.org
References: <20151019221040.17412.81332.idtracker@ietfa.amsl.com> <56261C39.8060208@ericsson.com>
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
Message-ID: <5626674F.80101@alum.mit.edu>
Date: Tue, 20 Oct 2015 12:09:51 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <56261C39.8060208@ericsson.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcast.net; s=q20140121; t=1445357392; bh=xM+AzLu7oQwtBf3S6vwE+VwEK1/6+2m0F+WZ0oAy4pk=; h=Received:Received:Subject:To:From:Message-ID:Date:MIME-Version: Content-Type; b=nqUj5MhV8ispISOqwgUzUFByBI51/8bdSF8gPGAj3eJgrAJpxn0dcQm7fCwpQTpiU idjZzEu/x+LJsp0BthYdA6UiUG184TeKFPPtCpPJH+vWvA6rJBzXVBbIAI4/abnnQZ bTed5ef03QycetwxvNcfXouFFmvjJYyhGId3vdW1jXch2QW/HEAUHWurm9yya3noUb eReIf084wLcgzjXaEEUy27w5nUec06g9DvjgvL9jAaZigfwk18Wk8l6zY7QHf1kIzq HvDPSCGa2FXWIRHHeRzvhXMytCt4D7Zhr+cNSaGFixc75hWsRcxtwRpkpTWxSNh+uI 5O2+P2oaTHBaA==
Archived-At: <http://mailarchive.ietf.org/arch/msg/avt/_GL8tSbpu0H3RupLtIkQNpeV-ec>
Subject: Re: [AVTCORE] Comments on draft-ietf-avtcore-rfc5764-mux-fixes-03.txt
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/avt/>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Oct 2015 16:11:03 -0000

On 10/20/15 6:49 AM, Magnus Westerlund wrote:

> 3.  Section 1.4:
>
> I still don't see how what is written in this section results in any
> improvement. You authors have assumptions of how this needs to be
> implemented that isn't written down. Looking on this problem of
> demultiplexing I would build a table driven solution based on the
> ranges, where the packet is sent to the relevant protocol based on the
> table-lookup. If that protocol don't use that value, that will be the
> end of the road for that packet as invalid, rather than giving it to any
> other protocol. I get the impression that you want one to send the
> packet for testing by the protocols one after each other according to
> the order the protocols are listed. I still don't see that
> implementations will do that.

This has been my concern as well.

Look at it this way:

A natural implementation of this is via a switch statement. Each 
disjoint range of values is one case. (Detailed syntax varies by 
language.) A simple implementation of this may be implemented as a 
sequence of comparisons - a series of if/then/else such as you describe. 
a more time-optimal implementation uses a table lookup.

You shouldn't be mandating how this be implemented - only what the 
result is.

	Thanks,
	Paul