[CCAMP] AD review of draft-ietf-ccamp-gmpls-ethernet-pbb-te-04
Adrian Farrel <Adrian.Farrel@huawei.com> Sat, 12 June 2010 11:18 UTC
Return-Path: <Adrian.Farrel@huawei.com>
X-Original-To: ccamp@core3.amsl.com
Delivered-To: ccamp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 57B8D3A68C2 for <ccamp@core3.amsl.com>; Sat, 12 Jun 2010 04:18:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.843
X-Spam-Level:
X-Spam-Status: No, score=-0.843 tagged_above=-999 required=5 tests=[AWL=-0.888, BAYES_50=0.001, DATE_IN_PAST_03_06=0.044]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id znXE5CqHw6fQ for <ccamp@core3.amsl.com>; Sat, 12 Jun 2010 04:18:44 -0700 (PDT)
Received: from usaga03-in.huawei.com (usaga03-in.huawei.com [206.16.17.220]) by core3.amsl.com (Postfix) with ESMTP id 0EE683A6861 for <ccamp@ietf.org>; Sat, 12 Jun 2010 04:18:44 -0700 (PDT)
Received: from huawei.com (usaga03-in [172.18.4.17]) by usaga03-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0L3W009VGFFAME@usaga03-in.huawei.com> for ccamp@ietf.org; Sat, 12 Jun 2010 06:18:46 -0500 (CDT)
Received: from your029b8cecfe (host225.n061-193-185-224.pri.iprevolution.ne.jp [61.193.185.225]) by usaga03-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTPA id <0L3W005NTFF7XV@usaga03-in.huawei.com> for ccamp@ietf.org; Sat, 12 Jun 2010 06:18:46 -0500 (CDT)
Date: Sat, 12 Jun 2010 08:21:36 +0100
From: Adrian Farrel <Adrian.Farrel@huawei.com>
To: draft-ietf-ccamp-gmpls-ethernet-pbb-te@tools.ietf.org
Message-id: <C77D3E176D024240B1AD5BDDD6FC36AB@your029b8cecfe>
MIME-version: 1.0
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.5931
X-Mailer: Microsoft Outlook Express 6.00.2900.5931
Content-type: text/plain; format="flowed"; charset="iso-8859-1"; reply-type="response"
Content-transfer-encoding: 7bit
X-Priority: 3
X-MSMail-priority: Normal
Cc: ccamp@ietf.org, ccamp-chairs@tools.ietf.org
Subject: [CCAMP] AD review of draft-ietf-ccamp-gmpls-ethernet-pbb-te-04
X-BeenThere: ccamp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: Adrian Farrel <Adrian.Farrel@huawei.com>
List-Id: Discussion list for the CCAMP working group <ccamp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ccamp>, <mailto:ccamp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ccamp>
List-Post: <mailto:ccamp@ietf.org>
List-Help: <mailto:ccamp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ccamp>, <mailto:ccamp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Jun 2010 11:18:45 -0000
Hi, Don't panic! I have done my AD review of your document. I have quite a large number of fairly minor editorial gripes, and a couple of technical questions that I think you should address before we move the document forward. This will result in a better document and a smoother course through IETF and IESG review. All my issues are open for discussion - nothing is mandatory. I will move the document into "Revised I-D needed" state in the data tracker. Thanks, Adrian --- Please remove citations from the Abstract. It is OK to mention the documents by name (e.g. "RFC 5828") but not to give references. (The Abstract is standalone information.) --- Section 3 GMPLS is being defined here to establish ESPs and TESIs. As it can be seen from the above this requires configuration of both the I and B components of the IB-BEBs connected by the ESPs. Perhaps an overstatement? :-) I think either: This document defines the applicability of GMPLS to establish... or This document defines extensions to GMPLS to establish... --- Figure 2 The word "ports" seems to be aligned wrong --- Section 3.1 s/Path Computation Server/Path Computation Element/ --- Section 3.2 Please capitalise the seciton heading --- Section 3.2 The ESP-VID/ESP-MAC DA can be considered to be a shared forwarding identifier or label consisting of some number of P2P connections distinctly identified by the MAC ESP-VID/ESP-MAC DA/ESP- MAC SA tuple. This is analogous to an LDP label merge but in the shared forwarding case the original ESP header still identifies the complete path. Resources can continue to be allocated per LSP with Shared forwarding. Isn't this a bad choice of the word "path" since this (expecially in association with "complete" tends to imply a route. And "original" in what context? I think you might use... ...case the ESP header contians sufficient information to identify the flow to which a packet belongs. --- Section 3.2 It is a local decision of how this is performed but the best choice is a path that maximizes the shared forwarding. Does "local decision" mean "implementation decision" or is it supposed to be a configurable thing or policy driven? What is meant by "maximize shared forwarding". Actually, isn't the objective to reduce forwarding table entries. So any shared entry is good enough. You seem to be introducing a new requirement to get as much traffic as possible through the same forwarding entry. Can you add some text or modify what you have to clarify these points --- Section 3.2 The concept of bandwidth management still applies equally well with shared forwarding. As an example consider a PBB-TE edge switch that terminates an Ethernet LSP with the following attributes: bandwidth B1, ESP-MAC DA D, ESP-MAC SA S1, ESP-VID V. A request to establish an additional Ethernet LSP with attributes (bandwidth B2, ESP-MAC DA D, ESP-MAC SA S2, ESP-VID V) can be accepted provided there is sufficient link capacity remaining. I find this example quite hard to follow. My suggestion is to either remove the example, or to fill it out with a figure. Why do you use an edge switch in your example? That seems to add to my confusion. --- Section 4.1.1 Where individual paths in a protection group are modified, signaling procedures MAY be combined with Protection Switching (PS) coordination to administratively force PS switching operations such that modification is only ever performed on the protection path. I think you need a reference for PS. --- Section 4.5 I think you are missing a chunk of text. I think I can see how the CALL_ATTRIBUTES are used in accordance with RFC4974, but there really is nothing more than a reference to RFC4974 in step 6) or Seciotn 4.1. I can't find any explanation of the use of LSP_ATTRIBUTES. No reference to RFC5420, and no mention of how the object might be used. How do the authors propose for these objects to be used, and how did the WG assess the protocol extensions? Can one LSP be associated with multiple I-SIDs? What does it mean for a Call to be associated with multiple I-SIDs? The inclusion of a field for flags with none defined might be excusable, if you had some spare bits, but you don't. Why don't you strike this and include an options sub-TLV is necessary in the future? Presumably if Action == range then excatly two I-SIDs must be present in the sub-TLV. This section worries me a fair bit. It feels like the absence of an implementation is a bit telling. I find myself wondering whether the I-D should actually be published as Informational or Experimental "as a basis for future standards track work" I would feel a lot more comfortable if this section was more robust. --- Figures 4 and 5 There seem to be some minor alignment problems with vertical pipes. Someone been using tab stops? --- Section 5.1.1 is a bit woolly! Starting with Seciton 5.1 The network operator administratively selects a set of VLAN Identifiers that can be used to setup ESPs. Consequently, any VID outside the allocated range is invalid and an error MUST be generated where the mismatch is discovered. It is unclear is this is a data plane, management plane, or control plane error. In 5.1.1: which message might give rise to the error? which message is used to carry the error? --- Section 5.1.2 What was wrong with using an existing sub-code such as 9? BTW, 35 is already allocated. --- Section 6 This section is not going to get past the Security Directorate! - It will help to refer to draft-ietf-mpls-mpls-and-gmpls-security-framework - "The commonly known techniques..." will need references - The statement that all devices in the domain are trusted will raise eyebrows especially give the pug and play nature of Ehternet and the relative ease of packet insertion via the data plane. - "Care is required to ensure untrusted access to the trusted domain does not occur" needs at least some guidance on what care might be taken - It seems to me that you are allowing the control plane to set up a different forwarding paradigm from the one we are used to. Since the forwarding plane is more easily (differently) subverted than the management plane, surely you are introducing risks that have never even been thought about. --- Section 8.1 Please include file name (draft-ietf-ccamp-gmpls-mln-extensions) for [MLN-EXT] to remove downref warning. --- Section 8.2 Please fix up the references to [IEEE 802.1ay] should be [IEEE 802.1Qay] [IEEE 802.1ah] should be [IEEE 802.1Qah] Please remove unreferenced items. [IEEE 802.1ag] [Y.1731] ---
- [CCAMP] AD review of draft-ietf-ccamp-gmpls-ether… Adrian Farrel