<p dir="ltr">Alex,</p>
<p dir="ltr">If you look closely at the referenced paper, you will see that it *indeed* shows how to do secure cut-through fragmentation and re fragmentation. "Secure" means that both hash and signature verification in routers is supported. <br>
Gene</p>
<p dir="ltr"> </p>
<div class="gmail_quote">On Mar 29, 2015 6:24 PM, "Alex Afanasyev" <<a href="mailto:alexander.afanasyev@ucla.edu">alexander.afanasyev@ucla.edu</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style="word-wrap:break-word"><div>In my opinion, cut-through forwarding of segments is a possible optimization of hop-by-hop fragmentation which can be applied only for some of the data packets: only those that are not requested with security constraints (e.g., when neither interest name doesn’t contain implicit digest nor interest doesn’t include data packet signature constraint). Also, cut-through optimization is meaningful when router connect networks with similar (same) MTU characteristics.</div><div><br></div><div>---</div><div>Alex</div><div><br></div><div><blockquote type="cite"><div>On Mar 29, 2015, at 4:28 PM, GTS <<a href="mailto:gts@ics.uci.edu" target="_blank">gts@ics.uci.edu</a>> wrote:</div><br><div>
<div bgcolor="#FFFFFF" text="#000000">
I disagree with the categorical statement below. Hop-by-hop<br>
fragmentation is indeed an option for NDN, but it's *not* the only
one.<br>
One way to do secure cut-through (end-based and intermediate) <br>
(re-)fragmentation is described here:<br>
<a href="http://arxiv.org/abs/1405.2861" target="_blank">http://arxiv.org/abs/1405.2861</a><br>
<br>
Gene<br>
<br>
<br>
<br>
<div>On 3/29/15 5:23 PM, Alex Afanasyev
wrote:<br>
</div>
<blockquote type="cite">
<div>
<blockquote type="cite"><font>....</font>
<div>
<div style="word-wrap:break-word">
<div>
<div>maybe a typo?</div>
<div>that ought to be/really means “hop-by-hop
fragmentation and reassembly”</div>
</div>
</div>
</div>
</blockquote>
<div><br>
</div>
<div>yes. this is a typo that we didn’t catch before. The
conclusion meant to highlight that *hop-by-hop* fragmentation
is the only viable option for NDN.</div>
<div><br>
</div>
—</div>
<div>A<br>
</div>
</blockquote>
<br>
</div>
</div></blockquote></div><br></div></blockquote></div>