RE: SigComp Requirements (was Re: [rohc] RE: Default decompressio n algorithms)
"Price, Richard" <richard.price@roke.co.uk> Wed, 27 February 2002 18:00 UTC
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA06719
for <rohc-archive@odin.ietf.org>; Wed, 27 Feb 2002 13:00:47 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA06693;
Wed, 27 Feb 2002 12:58:39 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA06665
for <rohc@optimus.ietf.org>; Wed, 27 Feb 2002 12:58:38 -0500 (EST)
Received: from rsys000a.roke.co.uk (rsys000a.roke.co.uk [193.118.201.102])
by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA06579
for <rohc@ietf.org>; Wed, 27 Feb 2002 12:58:34 -0500 (EST)
Received: by rsys002a.roke.co.uk with Internet Mail Service (5.5.2653.19)
id <1S9WN446>; Wed, 27 Feb 2002 17:55:23 -0000
Message-ID: <76C92FBBFB58D411AE760090271ED4186F9FDB@rsys002a.roke.co.uk>
From: "Price, Richard" <richard.price@roke.co.uk>
To: "'zhigang.c.liu@nokia.com'" <zhigang.c.liu@nokia.com>,
Miguel.A.Garcia@ericsson.com, cabo@tzi.org
Cc: Lars-Erik.Jonsson@epl.ericsson.se, rohc@ietf.org
Subject: RE: SigComp Requirements (was Re: [rohc] RE: Default decompressio
n algorithms)
Date: Wed, 27 Feb 2002 17:55:23 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/mixed;
boundary="------------InterScan_NT_MIME_Boundary"
Sender: rohc-admin@ietf.org
Errors-To: rohc-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id: Robust Header Compression <rohc.ietf.org>
X-BeenThere: rohc@ietf.org
Hi, Just a few comments on your summary of the "algorithm announcement" debate. Regards, Richard > Just try to make things simple: > > 1) The major (if not only one) requirement of SigComp > is to reduce latency. I agree with Carsten. > > 2) Here we are talking about a simple optimization to > reduce the latency. Does anyone has comment on it? > http://www1.ietf.org/mail-archive/working-groups/rohc/current/msg00065.html My only comment is that since the mechanisms needed for "algorithm announcement" are already built into SigComp, I can't see any reason *not* to make this functionality available to implementers. Should the above text be placed in the SigComp draft itself, or should a separate "Implementer's Guide" draft be considered? The latter approach might be very useful for getting SigComp standardised more quickly. The draft already contains a lot of text that explains how the technical mechanisms might be used; this is valuable for implementers but doesn't need to be standardised per se. I think that it would be OK to have an implementer's guide in Internet Draft form for now, and then publish it later when there's less time pressure (perhaps as an Informational RFC, or perhaps by folding it into the SigComp RFC when it reaches Draft Standard). > 3) Now, the question is cost/gain evaluation. I've made some attempt in > http://www1.ietf.org/mail-archive/working-groups/rohc/current/msg00064.html. > Comment? The hash size might be increased to 9 bytes (?). The minimum hash size of 9 bytes only applies to algorithms (and other kinds of state information) that are downloaded to the UDVM and stored on the fly. In the case of well-known algorithms that have been documented somewhere the state identifier for the algorithm can be any length and any value - after all there's no point keeping an algorithm secret if it's in an Internet Draft! For example, the following list of 1-byte state identifiers might be reserved: ID Corresponding algorithm 0 UNCOMPRESSED 1 DEFLATE 2 LZO 3 LZJH 4 EPIC : : The IETF doesn't need to define the above list - the task can be left to 3GPP, if they believe the effort to be worthwhile. > 4) Also, what about security? I don't see it is a problem > as long as the use of feedback (capability announcement) > does not create new risk. But do I missed something? Since the needed mechanisms are already provided by SigComp, the use of "algorithm announcement" doesn't create any new security risks that we don't already have.
- RE: SigComp Requirements (was Re: [rohc] RE: Defa… Kevan Hobbis
- RE: SigComp Requirements (was Re: [rohc] RE: Defa… Lars-Erik Jonsson (EPL)
- RE: SigComp Requirements (was Re: [rohc] RE: Defa… Price, Richard
- RE: SigComp Requirements (was Re: [rohc] RE: Defa… Lars-Erik Jonsson (EPL)
- RE: SigComp Requirements (was Re: [rohc] RE: Defa… Price, Richard
- RE: SigComp Requirements (was Re: [rohc] RE: Defa… Dr. Carsten Bormann
- Re: SigComp Requirements (was Re: [rohc] RE: Defa… Miguel A. Garcia
- Re: SigComp Requirements (was Re: [rohc] RE: Defa… Miguel A. Garcia
- Re: SigComp Requirements (was Re: [rohc] RE: Defa… Miguel A. Garcia
- RE: SigComp Requirements (was Re: [rohc] RE: Defa… Lars-Erik Jonsson (EPL)
- RE: SigComp Requirements (was Re: [rohc] RE: Defa… Price, Richard
- Re: SigComp Requirements (was Re: [rohc] RE: Defa… Miguel A. Garcia
- RE: SigComp Requirements (was Re: [rohc] RE: Defa… Dr. Carsten Bormann
- RE: SigComp Requirements (was Re: [rohc] RE: Defa… Price, Richard
- RE: SigComp Requirements (was Re: [rohc] RE: Defa… Dr. Carsten Bormann