> 5.2.4 Performance Considerations > > > The construction and verification of this option is computationally > expensive. In the NDP context, however, the hosts typically have the > need to perform only a few signature operations as they enter a link, > and a few operations as they find a new on-link peer with which to > communicate. What about NUD? these operations can potentially be reinvoked once per minute... ----------- James Kempf: The overhead of RSA signature verification is not large. On a 1.6 MHz Pentium 4 Vaio running Linux, verification of an RSA signature generated on a Mobile IPv6 Binding Update in a different experiment for a key with 512 bit Modulus required 140 microseconds, for a key with 1024 bit Modulus required 430 microseconds. The signatures on ND messages should have about the same performance. ----------- Thomas Narten: Actually, my comment was directed at the wording: hosts typically have the need to perform only a few signature operations as they enter a link As part of NUD, they also have to do periodic operations. Seems like the text didn't include them. I agree that they don't add a lot of additional overhead, so I'm not questioning the conclusion... ----------- Jari Arkko: Yes. How about "In the NDP context, however, the hosts typically have the need to perform only a few signature operations as they enter a link, and a few operations as they find a new on-link peer with which to communicate or perform Neighbor Unreachability Detection with existing ones." ----------- Arkko: NUD, fix text so don't forget to do NUD, not just when you are on link. Action Item: Editorial, fix text. -----------