Re: NHRP question

Eric Gray <gray@ctron.com> Thu, 19 October 1995 19:35 UTC

Received: from ietf.nri.reston.va.us by IETF.CNRI.Reston.VA.US id aa17022; 19 Oct 95 15:35 EDT
Received: from guelah.nexen.com by IETF.CNRI.Reston.VA.US id aa17018; 19 Oct 95 15:35 EDT
Received: from maelstrom.nexen.com ([204.249.99.5]) by guelah.nexen.com (8.6.12/8.6.12) with ESMTP id PAA17002; Thu, 19 Oct 1995 15:06:19 -0400
Received: (from root@localhost) by maelstrom.nexen.com (8.6.12/8.6.12) id PAA26409 for rolc-out; Thu, 19 Oct 1995 15:09:40 -0400
Received: from guelah.nexen.com (guelah.nexen.com [204.249.96.19]) by maelstrom.nexen.com (8.6.12/8.6.12) with ESMTP id PAA26400 for <rolc@nexen.com>; Thu, 19 Oct 1995 15:09:37 -0400
Received: from gatekeeper.ctron.com (ctron.com [134.141.197.25]) by guelah.nexen.com (8.6.12/8.6.12) with ESMTP id OAA16946 for <rolc@nexen.com>; Thu, 19 Oct 1995 14:59:27 -0400
Received: (from news@localhost) by gatekeeper.ctron.com (8.6.12/8.6.9) id KAA05703; Thu, 19 Oct 1995 10:00:08 -0400
Received: from stealth.ctron.com(134.141.5.107) by gatekeeper via smap (V1.3mjr) id sma005675; Thu Oct 19 09:59:40 1995
Received: from express.ctron.com by stealth.ctron.com (4.1/SMI-4.1) id AA07054; Thu, 19 Oct 95 10:02:26 EDT
Received: from blarney (blarney.ctron.com [134.141.66.40]) by express.ctron.com (8.6.9/8.6.9) with SMTP id JAA18982; Thu, 19 Oct 1995 09:59:28 -0400
Message-Id: <30865ADE.11F0@ctron.com>
Date: Thu, 19 Oct 1995 10:04:14 -0400
Sender: ietf-archive-request@IETF.CNRI.Reston.VA.US
From: Eric Gray <gray@ctron.com>
X-Mailer: Mozilla 2.0b1J (X11; I; IRIX 5.2 IP12)
Mime-Version: 1.0
To: Yakov Rekhter <yakov@cisco.com>
Cc: Joel Halpern <jhalpern@newbridge.com>, rolc@nexen.com
Subject: Re: NHRP question
References: <199510191211.FAA25156@hubbub.cisco.com>
Content-Type: multipart/mixed; boundary="---------------------------160241897232547"
X-Orig-Sender: owner-rolc@nexen.com
Precedence: bulk
X-Info: Submissions to rolc@nexen.com
X-Info: [Un]Subscribe requests to rolc-request@nexen.com
X-Info: Archives for rolc via ftp://ietf.cnri.reston.va.us/ietf-mail-archive/rolc/

Yakov,

	The redundancy between these bits is largely an issue of usage.  The
fact that a query source is a host (or a router) is significant in
determination of whether or not the information contained in a request
is "stable" (at least to some implementations) but is none-the-less a
fact that might be worth knowing.  The same thing applies to whether or
not _each_ destination in a response is a host or router.  The issue of
stability verses source/destination type should be treated as orthogonal
and the bits retained - after all, the minute someone comes up with an
example of why the information MUST be treated as orthogonal, the bits
will neeed to re-inserted and this would be likely to be an issue with
future backward compatibility.



						Eric Gray
Subject: Re: NHRP question
Date: Thu, 19 Oct 95 05:11:25 PDT
From: Yakov Rekhter <yakov@cisco.com>
To: jhalpern@newbridge.com (Joel Halpern)
CC: rolc@nexen.com

Joel,

> Last time I spoke to Yakov about the router to router case, his goal was to
> eliminate all unsafe router-router cases.  There are safe cases.
> The intend of the combination of Q, S, and B bits was to identify the
> applicable cases.

As I mentioned in my other note, use of the current NHRP format (and
specifically its fixed header) may be a problem for the router-router
NHRP. So, I'd like to decouple the discussion on whether the
combination of Q, S, and B bits would be useful for the router-router
NHRP from the question I asked -- whether Q and S bits are useful for
the current (non router-router) NHRP. Let's focus (at least for now)
on the current NHRP.

> The general goal was to be able to tell if the requestor was a host
> or router, and whether the responder was someone it was safe for the
> requestor to talk to.
>
> 1) It seemed useful to distinguish between the "stable" case identified
> by the "B" bit, and the more specific case when the responder is a
> directly attached host.  Clearly it is not critical.

Do we have a practical example of when such distinction would be useful ?

>
> 2) One could say that a source equivalent of the "B" bit would be better
> than the "Q" bit.  It would be more general.  However,
>     Most of us are probably assuming that information learned on behalf
>     of one source can be used for/with other sources.
> If that is true, then the fact that a specific request is on behalf of
> an on-subnet host is not particularly important.  Therefore, what is
> needed to detect safety is the Q bit.

But the "B" bit (stable) carries sufficient semantics. So, why do
we need the "Q" bit ?

> In particular, an interdomain request is safe if the Q bit is on in the
> request, or the B bit is on in the response.  We could get rid of the S
> bit, although I think it is a useful subset of "B" to identify.

As you just indicated, there is redundancy among Q, B and S bits. I've
yet to see a practical example where this redundancy is needed.

I think that a single bit (indicating "stable" information) would be
sufficient. On the Request this bit would indicate that the information
provided by the originator of the Request is stable. On the Reply this
bit would indicate that the information provided by the originator of
the Reply is stable.

And if one bit is sufficient, then we should clean up the spec and
eliminate the other two.

Yakov.