1. In section 1.2.3, The Storage component is responsible for processing data
   storage and retrieval messages from other peers. 
   
   it is not accurate, the Storage component may processing data storage and 
   retrieval messages from itself. It depends on the relationship between the 
   Node ID and the resource id to be put. 
   
2. In section 1.2.3 However, the exact mapping between these is
   determined by the overlay algorithm used by the overlay, therefore
   the Storage component always the queries the topology plugin to
   determine where a particular resource should be stored.

   Maybe the Storage componet SHOULD periodically detect whether mismatch 
exists 
   because of churn. If mismatch exists, then migrate the resource to its new 
   responsible peer. 
   
3. It seems that RELOAD-4 could not support unstructured P2P algorithms well. 
For example, unstructured P2P algorithms has no concept of Node ID. So how to 
use messages, such as "Connect" in these kind of algorithms? Could you please 
give more insight into this? thanks!

4. For the architecture figure, I have a suggestion. In my mind, routing table 
and <key, value> pair table are the two important database for overlay's 
functioning well. What about add them into the figure and locate them into 
appropriate layer or component? althgouth it could got from the text. 

5. In RELOAD-4, a small number of bootstrap nodes with unrestrictive 
connections, i,e, having public address and no firewall. How could the nodes 
get 
the set of the bootstrap nodes? just through enrollment procedure which only 
happen when a user wants to participate in the overlay. Another problem is that 
accuracy of the information of the boostrap nodes are very important. Will the 
bootstrap nodes be provided by the overlay operators just like what Skype does?


6. In section 4.1.1,    The digital signature over the data serves two 
purposes.  First, it
   allows the peer responsible for storing the data to verify that this
   Store is authorized. 
   
   I don't think digital signature provide authorization function, it only 
check 
   whether the data is really from the request originator. It is used to prove 
   the sender's identity with the help of the certificate. 
   
   
7. RELOAD-4 currently support TLS/DTLS. Why is other protocol such as SCTP out 
of considerations? Although I am not familiar with the SCTP, but it seems it 
has 
some interesting feartures which help the P2PSIP overlay: 
    .multihome
    .stream concept which make no intervention between messages. Essentially, 
messages in 
     P2P overlay have nothing to do with each other. 
    
  I also know there is some trouble in traversing NAT/firewall while SCTP is 
  taken. I'd like to hear more comments from the authors?

8. In section 6.4.1.2, RELOAD introduces reliablity for unreliable transports. 
In my mind, the reliability also helps in the case where reliable transports 
are 
used. For example, if the sending peer does not receive ACK within reasonable 
period, it could conclude the receiving peer may be offline. Then it could 
reschedule the routing decision to choose another neighbor to improve the 
success rate of the request. what do you think of it?


9. As for generation in STORE request, there may be some error. When the 
responsible peer receives a STORE reqeust, it MUST make sure the generation in 
the request is larger than one stored. Is my understaning right? If it is 
right, 
I have a question here. 

For example, peer A sends a STORE request in which generation counter is 10. 
Finally, peer B is the destination of the STORE request and the stored 
generation is 10. Then peer B process the STORE request, and increase the 
stored 
generation to 11 and sends a respons to peer A. Unfortunatelly, the response 
did 
not go back to peer A successful for various reasons.  So Peer A retransmit the 
request again and the generation is still 10. In the end, peer B will think it 
is a replay request, and give a error response to peer A. Peer A later get the 
error response, but the STORE actually succeeded. 

One solution to the problem is to store the transaction ID to identify the 
retransmission request. 

10.In section 13 Enrollment and Bootstrap. I think the description in the 
section is useful. But I don't think the procedure should be standardized. 


11. In section 15.5.1.  Authorization, RELOAD tries to use certificate to let 
only node in the certification to put the resource which is got by hashing the 
username. What if the user want to put resource which is not stored under the 
username, for example, TURN service,etc. Could you please share more thoughts 
with me in this regard?


******************************************************************************************
 This email and its attachments contain confidential information from HUAWEI, 
which is intended only for the person or entity whose address is listed above. 
Any use of the information contained herein in any way (including, but not 
limited to, total or partial disclosure, reproduction, or dissemination) by 
persons other than the intended recipient(s) is prohibited. If you receive this 
e-mail in error, please notify the sender by phone or em
ail immediately and delete it!
 
*****************************************************************************************
_______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip

Reply via email to