Summary: One can initially deploy multiple layers of indirection initially by "architecturally cheating" or "hiding" some of the indirection layers so that they are not visible to the resolution system nor in data plane packets.

What HIP gives you is an identifier that may be used for many things.

Assuming I deem the DNS trustworthy, it seems much more natural to treat the DNS as the source of an HI, and then for the locator to be looked up as a function of the HI. I'm not saying your model doesn't work, but surely the HI is fundamental and has universal validity, and the locator (any of the locators) is transient and has non-universal scope? So starting with a locator lookup seems funny.

I prefer Brain's opinion since there is no need for each host owns a FQDN name. Once you tell me your host ID, I can resolve your locator from a seperate ID/locator mapping system and then communicate with you.

From an architectural orthodoxy point of view, i.e. from the layering point of view, what you and Brian describe may well be the "right" way. Indeed, what you describe is more-or-less what happens with HIP as standardised today. You get the HIT and a set of initial locators from the DNS. The initial locators are typically those of rendezvous servers, which in turn know the current locator(s) of a mobile host. For details, see RFC5204 and RFC5205.

However, if you consider the various early deployment scenarios, the situation is different. The question is no longer what is "right", from the architectural point of view, but what is the best deployment strategy. From that point of view, a good strategy may be to initially get only the locators from the DNS, as that requires no changes to the DNS. The HIT (or the HITs) can then be learned form the peer, along the opportunistic HIP model. See Section 4.1.6 of RFC 5201. But I can also imagine other deployment models.

IMHO, if we want to consider the deployability a HIP-based solution, or any solution, what Noel wrote before Christmas is well worth reading again:

http://www.ietf.org/mail-archive/web/rrg/current/msg04037.html

(Remember, that is the message to which I reacted, causing the current thread of messages about HIP, where I have mainly tried to explain that HIP-proxy could have a quite different deployment model than the plain HIP has.)

In general, the question is very much about deployment cost. With proxy HIP, by initially "hiding" the HITs and using the opportunistic HIP model and ephemeral or even imaginary HITs, we can "fold" the HIP model into what is essentially the map-and-encaps model.

[[Generalising more, once again: one can deploy architecturally host- based solutions initially as network-based ones, and vice versa. Conversely, one can design architecturally host-bast solutions that are *hard* to deploy as network-based ones, and one can design architecturally network-based solutions that are *hard* to utilise in single hosts. And vice versa. Hence, paying attention to the details, both in selecting the architectural approach and thinking about the deployment flexibility, should pay off to the community in the large.

I've been trying to say that now for over two years, and nobody still seems to pay any attention. Am I completely bogged and off the road in my thinking?]]

--Pekka

_______________________________________________
rrg mailing list
[email protected]
http://www.irtf.org/mailman/listinfo/rrg

Reply via email to