Re: [manet] MANET Protocol Applicability

Abdussalam Baryun <abdussalambaryun@gmail.com> Fri, 08 June 2012 11:50 UTC

Return-Path: <abdussalambaryun@gmail.com>
X-Original-To: manet@ietfa.amsl.com
Delivered-To: manet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6529921F88A3 for <manet@ietfa.amsl.com>; Fri, 8 Jun 2012 04:50:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.514
X-Spam-Level:
X-Spam-Status: No, score=-3.514 tagged_above=-999 required=5 tests=[AWL=0.085, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZvlApYw822yb for <manet@ietfa.amsl.com>; Fri, 8 Jun 2012 04:50:41 -0700 (PDT)
Received: from mail-vc0-f172.google.com (mail-vc0-f172.google.com [209.85.220.172]) by ietfa.amsl.com (Postfix) with ESMTP id 2F60921F88B2 for <manet@ietf.org>; Fri, 8 Jun 2012 04:50:41 -0700 (PDT)
Received: by vcqp1 with SMTP id p1so1010028vcq.31 for <manet@ietf.org>; Fri, 08 Jun 2012 04:50:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=/JYunS6b3WbPxy8se3oDfhg2/Uvx4WSmS/M8MNC9o+8=; b=hs+O895E0uCSvdeED8bKim/GhctApFRgR9DKZPV80EqdIUrkC0m+lOUCVd2G0wgXZS AHpEvYGgZ4nZJVe/Hh/l1LjnsclljwTXN9z0gUe8pgjhAL3a/oI0IM/uJ/cdW50GFbjb e5fiWjGevNYWrvzrgPfVhLzqYlCK6GBIVVI44hJ2iFLYtbkkCCfBA/XdSTlVHcs6X04/ dWknJDhUiQckDeebzdsFDNvAHz34GdRV3e2A3tFpJUYctF/awYHRdH7TacLBdQH1uFLc cwIsGbxVgaz7ZAOlzDH7a3qLntZMGfg+mJhr7rIU8EWpt7Z7d7JAvGAfLLbp7dfTneQf 3Ddw==
MIME-Version: 1.0
Received: by 10.52.33.37 with SMTP id o5mr4992859vdi.86.1339156240360; Fri, 08 Jun 2012 04:50:40 -0700 (PDT)
Received: by 10.220.98.77 with HTTP; Fri, 8 Jun 2012 04:50:40 -0700 (PDT)
In-Reply-To: <CADnDZ89DkRC3OGpcuGHObrsTV-pHppyv5DPtuyP6YfeNXTSt-g@mail.gmail.com>
References: <CADnDZ89+0oWbJU_khgmn8pDKcWCm6dTJZiEw8hjFqggAoPkkrg@mail.gmail.com> <B31EEDDDB8ED7E4A93FDF12A4EECD30D12E917@GLKXM0002V.GREENLNK.net> <CADnDZ89DkRC3OGpcuGHObrsTV-pHppyv5DPtuyP6YfeNXTSt-g@mail.gmail.com>
Date: Fri, 08 Jun 2012 13:50:40 +0200
Message-ID: <CADnDZ8_xSqYmkAe=KycWGTDyi7hnqWPyeKgMatL=nP8-mdN9tA@mail.gmail.com>
From: Abdussalam Baryun <abdussalambaryun@gmail.com>
To: teco@inf-net.nl
Content-Type: text/plain; charset="ISO-8859-1"
Cc: manet <manet@ietf.org>
Subject: Re: [manet] MANET Protocol Applicability
X-BeenThere: manet@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Mobile Ad-hoc Networks <manet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/manet>, <mailto:manet-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/manet>
List-Post: <mailto:manet@ietf.org>
List-Help: <mailto:manet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/manet>, <mailto:manet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Jun 2012 11:50:42 -0000

Hi Teco,

I will need your input and assistance in the draft I am writing for
submission to the WG, and hope to get Mr. Cole as well,

Your input and Mr.Cole were very important from my point of view, and
hope we can go in progress for this issue, thanking you,

Best Regards

Abdussalam Baryun
University of Glamorgan, UK
===========================================================
On 6/8/12, Abdussalam Baryun <abdussalambaryun@gmail.com> wrote:
> Hi Chris,
>
> I thank you for your comments. I agree with Teco. However, your
> comments look in one direction, but I want to see All directions if
> possible. Your comments see the protocol progress in ignoring L2
> because abstract layer, which I admit I like and we still SHOULD do
> that now and in future because it gives better performance (the
> Designer-point-of-protocol).
>
>  In the other direction is that the customer wants to know our
> assumption/conditions or L2 technologies that we use as
> possible-use-case or defined in the section of
> Protocol-Applicability-Statement, so s/he can know how to use it OR
> s/he can understand that the DESIGNER tested the condition or
> scenarios of using PROTOCOL over such technology (the
> customers-point-of-using-protocol). We have different users around the
> world with different network technologies in use.
>
> We have to admit that RFC3561 and RFC3626 were not general purpose
> enough to cover LLN issues which that is why we have a WG named ROLL
> (i.e. 4 years old) and that is why we have AODVv2 and OLSRv2.
>
> We SHOULD be more practical as Mr.Clausen mentioned in WG-77-meeting
> (i.e. his input regarding one protocol that only was tested by
> simulation scenarios), theories don't give right results. This was
> also spoted by Corson (1998), it seems that is why he written the
> draft, and that is why I think the importance of their both inputs.
> Please note that NOT mentioning some technology definitions in the
> applicability of protocol, doesn't mean that the protocol is really
> tested as a GENERAL purpuse protocol (e.g. OLSRv2, AODVv2). Our
> protocols are tested in some industry technology and are not in
> others.
>
> Please note that MANET WG is doing OLSRv2 without updating RFC3626
> which make people think why?, I want to define technologies at L2
> because DLEP is important for my draft, and that for DSRv2 to be
> reasonable to users around the world, and to get feedback from time to
> time of their concerns so I can update some RFC in future (if I was
> successful : ), each 8 years or any reasonable requirement.
>
> Best Regards
>
> Abdussalam Baryun
> University of Glamorgan, UK
> =======================================================
> < One may be wrong, or may be right, but it does not matter if we work
> together
> as a group to discuss and resolve all issues. IETF WGs are always right >
> ****************************************************************************************
> This email and any attachments are confidential to the intended recipient
> and may also be privileged. If you are not the intended recipient please
> delete it from your system and notify the sender. The contents are comply
> to the IETF regulations, and WG procedures. You should not copy the
> email nor use it for any purpose other than IETF procedures purposes.
> ****************************************************************************************
>
>
> On 6/8/12, Dearlove, Christopher (UK) <Chris.Dearlove@baesystems.com>
> wrote:
>> Being explicit about L2 technologies is exactly what MANET should not do.
>> At
>> least not in any limiting way. Of course if someone were to write an
>> informative draft about (say) using OLSRv2 over IEEE 802.11 that would be
>> fine. Though it would run the risk of suggesting to some that that is the
>> only L2 suggested,, so I'd want the draft to make it clear that wasn't
>> so.
>> And anything that said OLSRv2 was intended for use over the following L2
>> protocols would be completely wrong. The point of routing at L3 is to be
>> as
>> L2 independent as possible.
>>
>> If I've read the draft you mention it was a long time ago. Digging up
>> 1998
>> drafts to reissue doesn't strike me as the most productive possible
>> exercise.
>>
>> --
>> Christopher Dearlove
>> Senior Principal Engineer, Communications Group
>> Communications, Networks and Image Analysis Capability
>> BAE Systems Advanced Technology Centre
>> West Hanningfield Road, Great Baddow, Chelmsford, CM2 8HN, UK
>> Tel: +44 1245 242194 |  Fax: +44 1245 242124
>> chris.dearlove@baesystems.com | http://www.baesystems.com
>>
>> BAE Systems (Operations) Limited
>> Registered Office: Warwick House, PO Box 87, Farnborough Aerospace
>> Centre,
>> Farnborough, Hants, GU14 6YU, UK
>> Registered in England & Wales No: 1996687
>>
>>
>> -----Original Message-----
>> From: manet-bounces@ietf.org [mailto:manet-bounces@ietf.org] On Behalf Of
>> Abdussalam Baryun
>> Sent: 08 June 2012 04:42
>> To: manet
>> Subject: [manet] MANET Protocol Applicability
>>
>> ----------------------! WARNING ! ----------------------
>> This message originates from outside our organisation,
>> either from an external partner or from the internet.
>> Keep this in mind if you answer this message.
>> Follow the 'Report Suspicious Emails' link on IT matters
>> for instructions on reporting suspicious email messages.
>> --------------------------------------------------------
>>
>> Hi Folks
>>
>> I have read two important inputs and want to share my opinion,
>>
>> ============  point 1  ============
>>
>> In one work in progress ietf-draft (expired):
>> draft-ietf-manet-appl-00.txt,
>> Corson, (1998)mentioned in Abstract and Introduction:
>>
>> Abstract> The intent of this 'Applicability Section' is to
>> aid readers unfamiliar with the details of each protocol's design in
>> understanding the protocol's basic characteristics, functioning and
>> mechanisms, as well as to provide a general description of the
>> networking context for which the protocol was designed, and in which
>> it is expected to perform well.
>>
>> Introduction> The set of applications for which the use of MANET
>> technology envisioned is diverse, ranging from small,
>> energy-constrained nearly
>> static networks to large-scale, mobile, highly-dynamic networks. The
>> combinations of network size, topology composition and dynamics,
>> bandwidth and energy availability, physical and link-layer
>> technologies, intended application usages, etc. are many, and it seems
>>  unlikely that a single protocol will function superiorly over this
>> wide range of networking contexts. Thus a given protocol is likely to
>> be well-suited for operation in those networks whose characteristics
>> match well with the combination of mechanisms employed by the
>> protocol.
>> ============  point 2  ==============
>> In the MANET WG 77 meeting minutes, Mr.Clausen mentioned that it is
>> important to be explicit about assumptions/conditions before talking
>> about protocol.
>> ============  opinion  ==============
>> I agree with both points and approach to solve routing protocols, and
>> would RECOMMEND either of the following:
>> 1- MANET WG defines (in one informative-draft) intended application
>> usage, and be explicit about applicable L2 network technologies. So
>> that each future protocols mentions in their applicability statement
>> section the usual use-case for such protocol, OR
>> 2- MANET WG renews the I-D expired of Corson (1998) and adds more
>> issues so it can become an RFC in future,
>>
>> Thanking you,
>> Abdussalam Baryun
>> =========================
>> _______________________________________________
>> manet mailing list
>> manet@ietf.org
>> https://www.ietf.org/mailman/listinfo/manet
>>
>>
>> ********************************************************************
>> This email and any attachments are confidential to the intended
>> recipient and may also be privileged. If you are not the intended
>> recipient please delete it from your system and notify the sender.
>> You should not copy it or use it for any purpose nor disclose or
>> distribute its contents to any other person.
>> ********************************************************************
>>
>>
>