Re: [hybi] Framing Take VI (a compromise proposal)

John Tamplin <jat@google.com> Wed, 18 August 2010 00:53 UTC

Return-Path: <jat@google.com>
X-Original-To: hybi@core3.amsl.com
Delivered-To: hybi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DE1843A6834 for <hybi@core3.amsl.com>; Tue, 17 Aug 2010 17:53:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.8
X-Spam-Level:
X-Spam-Status: No, score=-105.8 tagged_above=-999 required=5 tests=[AWL=0.176, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yjoD8RuCIWGd for <hybi@core3.amsl.com>; Tue, 17 Aug 2010 17:53:20 -0700 (PDT)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.44.51]) by core3.amsl.com (Postfix) with ESMTP id AD83D3A635F for <hybi@ietf.org>; Tue, 17 Aug 2010 17:53:19 -0700 (PDT)
Received: from wpaz5.hot.corp.google.com (wpaz5.hot.corp.google.com [172.24.198.69]) by smtp-out.google.com with ESMTP id o7I0rsRZ023186 for <hybi@ietf.org>; Tue, 17 Aug 2010 17:53:54 -0700
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1282092834; bh=Ib+z1HjgXDTU+1GZ3M2ihoH5/8I=; h=MIME-Version:In-Reply-To:References:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=dn06C3s9EpE3fVWzcfYqMtrxJFunFbMyP4ZXsUyASrH97bdhlLhGto9yePfxA0d9n 16/x1/AoJtxB3rO1sYLag==
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns; h=mime-version:in-reply-to:references:from:date:message-id: subject:to:cc:content-type:x-system-of-record; b=fdjql3TwVei06M+vUP3DVubK7CQWS0nexCqlZ6Xbg5dfsryv3r6T1YjRXwmsehEJW fUCJFEQbtgS3LqEevRbQA==
Received: from gyb11 (gyb11.prod.google.com [10.243.49.75]) by wpaz5.hot.corp.google.com with ESMTP id o7I0rrau013205 for <hybi@ietf.org>; Tue, 17 Aug 2010 17:53:53 -0700
Received: by gyb11 with SMTP id 11so3488695gyb.14 for <hybi@ietf.org>; Tue, 17 Aug 2010 17:53:53 -0700 (PDT)
Received: by 10.151.82.14 with SMTP id j14mr2857688ybl.307.1282092833275; Tue, 17 Aug 2010 17:53:53 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.151.60.3 with HTTP; Tue, 17 Aug 2010 17:53:32 -0700 (PDT)
In-Reply-To: <8B0A9FCBB9832F43971E38010638454F03ED35AB65@SISPE7MB1.commscope.com>
References: <AANLkTi=TBXO_Cbb+P+e2BVfx69shkf8E1-9ywDh_Y+Kz@mail.gmail.com> <AANLkTimJOGWgV6rx5JJYSJMC26OzQzskzVtkYz0L_EAg@mail.gmail.com> <op.vhe7qtmu64w2qv@anne-van-kesterens-macbook-pro.local> <8B0A9FCBB9832F43971E38010638454F03ED35AB3F@SISPE7MB1.commscope.com> <AANLkTimQoy1Z_oTWc4Z3cYnQz0MOb6q_u1mtz0PxMXz0@mail.gmail.com> <AANLkTimAo9bD3dwVhmDn9FuypdS5j4zG4yrHs3x2NxpP@mail.gmail.com> <8B0A9FCBB9832F43971E38010638454F03ED35AB54@SISPE7MB1.commscope.com> <AANLkTin3oti7f4F8kP0t4iWciCmTTkT2OrC31_MV_244@mail.gmail.com> <8B0A9FCBB9832F43971E38010638454F03ED35AB65@SISPE7MB1.commscope.com>
From: John Tamplin <jat@google.com>
Date: Tue, 17 Aug 2010 20:53:32 -0400
Message-ID: <AANLkTimxxBhcS4AS4qnp7ZnTtk3+wDtgsKePidD+rTTo@mail.gmail.com>
To: "Thomson, Martin" <Martin.Thomson@andrew.com>
Content-Type: multipart/alternative; boundary="000e0cd4d376e57fc3048e0e7fe6"
X-System-Of-Record: true
Cc: "hybi@ietf.org" <hybi@ietf.org>
Subject: Re: [hybi] Framing Take VI (a compromise proposal)
X-BeenThere: hybi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Server-Initiated HTTP <hybi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hybi>
List-Post: <mailto:hybi@ietf.org>
List-Help: <mailto:hybi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hybi>, <mailto:hybi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Aug 2010 00:53:21 -0000

On Tue, Aug 17, 2010 at 8:24 PM, Thomson, Martin
<Martin.Thomson@andrew.com>wrote:

>  I think that you’ve misunderstood my suggestion as well.  I’m not
> suggesting that we avoid fragmentation (even if there is consensus, and I’ll
> defer to the chairs on this point).  What I’m suggesting is that
> fragmentation can be accommodated as an extension.
>
>
>
> I am absolutely NOT suggesting that we avoid the topic of extensibility in
> the base - to do so would be foolish.
>
>
>
> Repeating Jamie’s suggestion:
>
>
>
>   <length> <opcode>
>
>
>
> Define opcodes for fragmented messages (start, middle, end), then you have
> five opcodes:
>
>
>
>   0 - this is a complete message, and it contains binary data
>
>   1 - this is a complete message, and it contains UTF-8 text data
>
>   2 - this is the start of a fragmented message
>
>   3 - this is the middle of a fragmented message
>
>   4 - this is the end of a fragmented message
>
>
>
> For 2, 3 and 4, you follow that with another opcode - 0 or 1.
>
>
>
> <length> <fragmentation opcode> <opcode>
>
>
>
> You might practice a little judicious optimization, but fundamentally,
> opcodes 2-4 are simply extensions.  An intermediary that doesn’t understand
> just passes these on unmodified (that’s the extensibility bit you have to
> include).
>

Right, and before long we wind up with a long linear chain of extensions
that all have to be evaluated sequentially, and if an intermediary doesn't
know any one of them it can no longer do anything at all with the message,
which I think is a problem.  An intermediary that is just interested in one
extension's data (say a tag that indicates an ingres point to the corporate
network) has to decode all outer extensions before it can get the data it
wants.  Imagine how well routers would perform if IP fields were encoded
that way.

-- 
John A. Tamplin
Software Engineer (GWT), Google