Hi all, here are some comments on draft-zuniga-dmm-gap-analysis-02. I have some doubts on current scope of section 2. In my opinion "how to deploy a mobility solution in a DMM fashion" is the gap analysis. Probably a section on existing mobility solutions (that rapidly covers main features) is needed but I would avoid to anticipate some considerations on the gap analysis itself. Just briefly describe what are the main features of the analyzed protocols. In the gap analysis itself (paragraph 3), for example, I found difficult to understand what is missing in term of functionalities. For example in 3.1.1 you say that REQ1 is not satisfied by MIP6, but you are not saying what is missing. You said that in 2.1.1: "current Mobile IPv6 / NEMO specifications do not allow the use of multiple home agents by a mobile node simultaneously".
I would also have considered, for example, MIPv6 and its extensions as a whole instead of separating each component. What we are trying to understand here is if we can use some existing protocols and its currently defined extensions for DMM. I think it is useful to see which extension adds which feature but at the end of the document you should say something on a complete solution. Perhaps you can add some text in chapter 4 saying that a solution that considers protocol x plus extension y is well suited for DMM or that none of the available solutions meets all requirements. For REQ2 (for both MIPv6 and PMIPv6) you say that the solution is transparent to upper layers but in the table in paragraph 4 there is LIM (limited support). I think this is wrong. Non optimal routing is already considered in REQ1 and should not be part of REQ2. Regards, Elena Questo messaggio e i suoi allegati sono indirizzati esclusivamente alle persone indicate. La diffusione, copia o qualsiasi altra azione derivante dalla conoscenza di queste informazioni sono rigorosamente vietate. Qualora abbiate ricevuto questo documento per errore siete cortesemente pregati di darne immediata comunicazione al mittente e di provvedere alla sua distruzione, Grazie. This e-mail and any attachments is confidential and may contain privileged information intended for the addressee(s) only. Dissemination, copying, printing or use by anybody else is unauthorised. If you are not the intended recipient, please delete this message and any attachments and advise the sender by return e-mail, Thanks. _______________________________________________ dmm mailing list [email protected] https://www.ietf.org/mailman/listinfo/dmm
