Re: NHRP question
Eric Gray <gray@ctron.com> Thu, 19 October 1995 19:35 UTC
Received: from ietf.nri.reston.va.us by IETF.CNRI.Reston.VA.US id aa17022;
19 Oct 95 15:35 EDT
Received: from guelah.nexen.com by IETF.CNRI.Reston.VA.US id aa17018;
19 Oct 95 15:35 EDT
Received: from maelstrom.nexen.com ([204.249.99.5]) by guelah.nexen.com
(8.6.12/8.6.12) with ESMTP id PAA17002; Thu, 19 Oct 1995 15:06:19 -0400
Received: (from root@localhost) by maelstrom.nexen.com (8.6.12/8.6.12) id
PAA26409 for rolc-out; Thu, 19 Oct 1995 15:09:40 -0400
Received: from guelah.nexen.com (guelah.nexen.com [204.249.96.19]) by
maelstrom.nexen.com (8.6.12/8.6.12) with ESMTP id PAA26400 for
<rolc@nexen.com>; Thu, 19 Oct 1995 15:09:37 -0400
Received: from gatekeeper.ctron.com (ctron.com [134.141.197.25]) by
guelah.nexen.com (8.6.12/8.6.12) with ESMTP id OAA16946 for <rolc@nexen.com>;
Thu, 19 Oct 1995 14:59:27 -0400
Received: (from news@localhost) by gatekeeper.ctron.com (8.6.12/8.6.9) id
KAA05703; Thu, 19 Oct 1995 10:00:08 -0400
Received: from stealth.ctron.com(134.141.5.107) by gatekeeper via smap
(V1.3mjr) id sma005675; Thu Oct 19 09:59:40 1995
Received: from express.ctron.com by stealth.ctron.com (4.1/SMI-4.1)
id AA07054; Thu, 19 Oct 95 10:02:26 EDT
Received: from blarney (blarney.ctron.com [134.141.66.40]) by
express.ctron.com (8.6.9/8.6.9) with SMTP id JAA18982;
Thu, 19 Oct 1995 09:59:28 -0400
Message-Id: <30865ADE.11F0@ctron.com>
Date: Thu, 19 Oct 1995 10:04:14 -0400
Sender: ietf-archive-request@IETF.CNRI.Reston.VA.US
From: Eric Gray <gray@ctron.com>
X-Mailer: Mozilla 2.0b1J (X11; I; IRIX 5.2 IP12)
Mime-Version: 1.0
To: Yakov Rekhter <yakov@cisco.com>
Cc: Joel Halpern <jhalpern@newbridge.com>, rolc@nexen.com
Subject: Re: NHRP question
References: <199510191211.FAA25156@hubbub.cisco.com>
Content-Type: multipart/mixed;
boundary="---------------------------160241897232547"
X-Orig-Sender: owner-rolc@nexen.com
Precedence: bulk
X-Info: Submissions to rolc@nexen.com
X-Info: [Un]Subscribe requests to rolc-request@nexen.com
X-Info: Archives for rolc via
ftp://ietf.cnri.reston.va.us/ietf-mail-archive/rolc/
Yakov, The redundancy between these bits is largely an issue of usage. The fact that a query source is a host (or a router) is significant in determination of whether or not the information contained in a request is "stable" (at least to some implementations) but is none-the-less a fact that might be worth knowing. The same thing applies to whether or not _each_ destination in a response is a host or router. The issue of stability verses source/destination type should be treated as orthogonal and the bits retained - after all, the minute someone comes up with an example of why the information MUST be treated as orthogonal, the bits will neeed to re-inserted and this would be likely to be an issue with future backward compatibility. Eric Gray
Subject: Re: NHRP question Date: Thu, 19 Oct 95 05:11:25 PDT From: Yakov Rekhter <yakov@cisco.com> To: jhalpern@newbridge.com (Joel Halpern) CC: rolc@nexen.com Joel, > Last time I spoke to Yakov about the router to router case, his goal was to > eliminate all unsafe router-router cases. There are safe cases. > The intend of the combination of Q, S, and B bits was to identify the > applicable cases. As I mentioned in my other note, use of the current NHRP format (and specifically its fixed header) may be a problem for the router-router NHRP. So, I'd like to decouple the discussion on whether the combination of Q, S, and B bits would be useful for the router-router NHRP from the question I asked -- whether Q and S bits are useful for the current (non router-router) NHRP. Let's focus (at least for now) on the current NHRP. > The general goal was to be able to tell if the requestor was a host > or router, and whether the responder was someone it was safe for the > requestor to talk to. > > 1) It seemed useful to distinguish between the "stable" case identified > by the "B" bit, and the more specific case when the responder is a > directly attached host. Clearly it is not critical. Do we have a practical example of when such distinction would be useful ? > > 2) One could say that a source equivalent of the "B" bit would be better > than the "Q" bit. It would be more general. However, > Most of us are probably assuming that information learned on behalf > of one source can be used for/with other sources. > If that is true, then the fact that a specific request is on behalf of > an on-subnet host is not particularly important. Therefore, what is > needed to detect safety is the Q bit. But the "B" bit (stable) carries sufficient semantics. So, why do we need the "Q" bit ? > In particular, an interdomain request is safe if the Q bit is on in the > request, or the B bit is on in the response. We could get rid of the S > bit, although I think it is a useful subset of "B" to identify. As you just indicated, there is redundancy among Q, B and S bits. I've yet to see a practical example where this redundancy is needed. I think that a single bit (indicating "stable" information) would be sufficient. On the Request this bit would indicate that the information provided by the originator of the Request is stable. On the Reply this bit would indicate that the information provided by the originator of the Reply is stable. And if one bit is sufficient, then we should clean up the spec and eliminate the other two. Yakov.
- NHRP question Yakov Rekhter
- NHRP question Yakov Rekhter
- NHRP question Tony Li
- NHRP question gardo
- Re: NHRP question Eric Gray
- Re: NHRP question James Luciani
- Re: NHRP question James Luciani
- Re: NHRP question Yakov Rekhter
- Re: NHRP question Joel Halpern
- Re: NHRP question Yakov Rekhter
- Re: NHRP question Joel Halpern
- Re: NHRP question Yakov Rekhter
- Re: NHRP question Yakov Rekhter
- Re: NHRP question Eric Gray
- Re: NHRP question Eric Gray