Re: [hiprg] HIP experiment report comment on opportunistic mode

Tobias Heer <heer@cs.rwth-aachen.de> Tue, 06 December 2011 08:21 UTC

Return-Path: <heer@informatik.rwth-aachen.de>
X-Original-To: hiprg@ietfa.amsl.com
Delivered-To: hiprg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A7B2111E8080 for <hiprg@ietfa.amsl.com>; Tue, 6 Dec 2011 00:21:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35, HELO_MISMATCH_DE=1.448, J_CHICKENPOX_33=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kBrcQgDFrJk5 for <hiprg@ietfa.amsl.com>; Tue, 6 Dec 2011 00:21:20 -0800 (PST)
Received: from mta-1.ms.rz.rwth-aachen.de (mta-1.ms.rz.RWTH-Aachen.DE [134.130.7.72]) by ietfa.amsl.com (Postfix) with ESMTP id 2A43511E8073 for <hiprg@irtf.org>; Tue, 6 Dec 2011 00:21:19 -0800 (PST)
MIME-version: 1.0
Content-transfer-encoding: 7BIT
Content-type: text/plain; charset=us-ascii
Received: from ironport-out-1.rz.rwth-aachen.de ([134.130.5.40]) by mta-1.ms.rz.RWTH-Aachen.de (Sun Java(tm) System Messaging Server 6.3-7.04 (built Sep 26 2008)) with ESMTP id <0LVR00KMPWJH83H0@mta-1.ms.rz.RWTH-Aachen.de> for hiprg@irtf.org; Tue, 06 Dec 2011 09:21:17 +0100 (CET)
X-IronPort-AV: E=Sophos;i="4.71,304,1320620400"; d="scan'208";a="152787252"
Received: from relay-auth-1.ms.rz.rwth-aachen.de (HELO relay-auth-1) ([134.130.7.78]) by ironport-in-1.rz.rwth-aachen.de with ESMTP; Tue, 06 Dec 2011 09:21:18 +0100
Received: from [192.168.11.4] ([unknown] [91.179.29.76]) by relay-auth-1.ms.rz.rwth-aachen.de (Sun Java(tm) System Messaging Server 7.0-3.01 64bit (built Dec 9 2008)) with ESMTPA id <0LVR00GV3WJHQA30@relay-auth-1.ms.rz.rwth-aachen.de> for hiprg@irtf.org; Tue, 06 Dec 2011 09:21:17 +0100 (CET)
From: Tobias Heer <heer@cs.rwth-aachen.de>
In-reply-to: <7CC566635CFE364D87DC5803D4712A6C4CF2319C0B@XCH-NW-10V.nw.nos.boeing.com>
Date: Tue, 06 Dec 2011 09:21:17 +0100
Message-id: <4C5F6BED-99D0-4335-AF51-4FE416D0350E@cs.rwth-aachen.de>
References: <7CC566635CFE364D87DC5803D4712A6C4CF2319C0B@XCH-NW-10V.nw.nos.boeing.com>
To: "Henderson, Thomas R" <thomas.r.henderson@boeing.com>, Miika Komu <mkomu@cs.hut.fi>
X-Mailer: Apple Mail (2.1084)
Cc: "hiprg@irtf.org" <hiprg@irtf.org>
Subject: Re: [hiprg] HIP experiment report comment on opportunistic mode
X-BeenThere: hiprg@irtf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Host Identity Protocol \(HIP\) Research Group" <hiprg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/hiprg>, <mailto:hiprg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/hiprg>
List-Post: <mailto:hiprg@irtf.org>
List-Help: <mailto:hiprg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/hiprg>, <mailto:hiprg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Dec 2011 08:21:21 -0000

Hi,

Am 06.12.2011 um 09:01 schrieb Henderson, Thomas R:

> I would like to respond to one of Stephen Farrell's comment on the HIP experiment report:
> 
> http://datatracker.ietf.org/doc/draft-irtf-hip-experiment/ballot/
> 
> The comment is:
> 
> " - I wondered what were the "controversial experiences" on p10. Seems
> a shame to tease the reader like that."
> 
> The relevant section of text is:
> 
>   In the context of the HIPL project, the opportunistic mode has been
>   successfully applied at the HIP layer for service registration
>   [RFC5203].  However, there are controversial experiences on applying
>   opportunistic mode at the application layer for legacy software.
>   HIP4BSD implemented opportunistic mode successfully with small
>   modifications to the FreeBSD socket layer to support opportunistic
>   mode.
> 
> Could someone elaborate on the controversial experience (and perhaps provide a reference)?  Note that elsewhere in the report (section 2.3.2), the disadvantages and "leap of faith" aspects of opportunistic mode are elaborated on, so I'm wondering whether the reference to controversial experiences goes beyond the disadvantages already listed in section 2.3.2 (or whether we could instead strike those words from the draft and refer back to that section).
> 
As far as I can tell, we in Aachen have not used the opportunistic mode extensively. Miika seemed to have used it/struggled with it quite a bit. Maybe he has some comments on this.

BR, Tobias

> - Tom
> 
> _______________________________________________
> hiprg mailing list
> hiprg@irtf.org
> https://www.irtf.org/mailman/listinfo/hiprg

-- 
Dipl.-Inform. Tobias Heer, Ph.D. Student
Chair of Communication and Distributed Systems - comsys
RWTH Aachen University, Germany
tel: +49 241 80 207 76
web: http://www.comsys.rwth-aachen.de/team/tobias-heer/
blog: http://dtobi.wordpress.com/
card: http://card.ly/dtobi
pgp id: AEECA5BF