{"draft":"draft-irtf-hip-experiment-15","doc_id":"RFC6538","title":"The Host Identity Protocol (HIP) Experiment Report","authors":["T. Henderson","A. Gurtov"],"format":["ASCII","HTML"],"page_count":"35","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"IRTF","abstract":"This document is a report from the IRTF Host Identity Protocol (HIP)\r\nresearch group documenting the collective experiences and lessons\r\nlearned from studies, related experimentation, and designs completed\r\nby the research group. The document summarizes implications of\r\nadding HIP to host protocol stacks, Internet infrastructure, and\r\napplications. The perspective of a network operator, as well as a\r\nlist of HIP experiments, are presented as well. Portions of this\r\nreport may be relevant also to other network overlay-based\r\narchitectures or to attempts to deploy alternative networking\r\narchitectures. This document is not an Internet Standards Track \r\nspecification; it is published for informational purposes.","pub_date":"March 2012","keywords":["Security","ID\/locator split","IPsec","Research"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC6538","errata_url":null}