[CCAMP] AD review of draft-ietf-ccamp-gmpls-ethernet-pbb-te-04

Adrian Farrel <Adrian.Farrel@huawei.com> Sat, 12 June 2010 11:18 UTC

Return-Path: <Adrian.Farrel@huawei.com>
X-Original-To: ccamp@core3.amsl.com
Delivered-To: ccamp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 57B8D3A68C2 for <ccamp@core3.amsl.com>; Sat, 12 Jun 2010 04:18:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.843
X-Spam-Level:
X-Spam-Status: No, score=-0.843 tagged_above=-999 required=5 tests=[AWL=-0.888, BAYES_50=0.001, DATE_IN_PAST_03_06=0.044]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id znXE5CqHw6fQ for <ccamp@core3.amsl.com>; Sat, 12 Jun 2010 04:18:44 -0700 (PDT)
Received: from usaga03-in.huawei.com (usaga03-in.huawei.com [206.16.17.220]) by core3.amsl.com (Postfix) with ESMTP id 0EE683A6861 for <ccamp@ietf.org>; Sat, 12 Jun 2010 04:18:44 -0700 (PDT)
Received: from huawei.com (usaga03-in [172.18.4.17]) by usaga03-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0L3W009VGFFAME@usaga03-in.huawei.com> for ccamp@ietf.org; Sat, 12 Jun 2010 06:18:46 -0500 (CDT)
Received: from your029b8cecfe (host225.n061-193-185-224.pri.iprevolution.ne.jp [61.193.185.225]) by usaga03-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTPA id <0L3W005NTFF7XV@usaga03-in.huawei.com> for ccamp@ietf.org; Sat, 12 Jun 2010 06:18:46 -0500 (CDT)
Date: Sat, 12 Jun 2010 08:21:36 +0100
From: Adrian Farrel <Adrian.Farrel@huawei.com>
To: draft-ietf-ccamp-gmpls-ethernet-pbb-te@tools.ietf.org
Message-id: <C77D3E176D024240B1AD5BDDD6FC36AB@your029b8cecfe>
MIME-version: 1.0
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.5931
X-Mailer: Microsoft Outlook Express 6.00.2900.5931
Content-type: text/plain; format="flowed"; charset="iso-8859-1"; reply-type="response"
Content-transfer-encoding: 7bit
X-Priority: 3
X-MSMail-priority: Normal
Cc: ccamp@ietf.org, ccamp-chairs@tools.ietf.org
Subject: [CCAMP] AD review of draft-ietf-ccamp-gmpls-ethernet-pbb-te-04
X-BeenThere: ccamp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: Adrian Farrel <Adrian.Farrel@huawei.com>
List-Id: Discussion list for the CCAMP working group <ccamp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ccamp>, <mailto:ccamp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ccamp>
List-Post: <mailto:ccamp@ietf.org>
List-Help: <mailto:ccamp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ccamp>, <mailto:ccamp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Jun 2010 11:18:45 -0000

Hi,

Don't panic!

I have done my AD review of your document. I have quite a large number of 
fairly minor editorial gripes, and a couple of technical questions that I 
think you should address before we move the document forward. This will 
result in a better document and a smoother course through IETF and IESG 
review.

All my issues are open for discussion - nothing is mandatory.

I will move the document into "Revised I-D needed" state in the data 
tracker.

Thanks,
Adrian

---

Please remove citations from the Abstract.
It is OK to mention the documents by name (e.g. "RFC 5828") but not to give 
references. (The Abstract is standalone information.)

---

Section 3

   GMPLS is being defined here to establish ESPs and TESIs. As it can be
   seen from the above this requires configuration of both the I and B
   components of the IB-BEBs connected by the ESPs.

 Perhaps an overstatement? :-)
I think either:
  This document defines the applicability of GMPLS to establish...
or
  This document defines extensions to GMPLS to establish...

 ---

 Figure 2

 The word "ports" seems to be aligned wrong

 ---

 Section 3.1

 s/Path Computation Server/Path Computation Element/

 ---

 Section 3.2

 Please capitalise the seciton heading

 ---

 Section 3.2

   The ESP-VID/ESP-MAC DA can be considered to be a shared forwarding
   identifier or label consisting of some number of P2P connections
   distinctly identified by the MAC ESP-VID/ESP-MAC DA/ESP- MAC SA
   tuple. This is analogous to an LDP label merge but in the shared
   forwarding case the original ESP header still identifies the complete
   path.  Resources can continue to be allocated per LSP with Shared
   forwarding.

 Isn't this a bad choice of the word "path" since this (expecially in 
association with "complete" tends to imply a route. And "original" in what 
context?

 I think you might use...
 ...case the ESP header contians sufficient information to identify the flow 
to which a packet belongs.

---

 Section 3.2

   It is a local decision of how
   this is performed but the best choice is a path that maximizes the
   shared forwarding.

 Does "local decision" mean "implementation decision" or is it supposed to 
be a configurable thing or policy driven?

What is meant by "maximize shared forwarding". Actually, isn't the objective 
to reduce forwarding table entries. So any shared entry is good enough.

You seem to be introducing a new requirement to get as much traffic as 
possible through the same forwarding entry.

Can you add some text or modify what you have to clarify these points

---

 Section 3.2

   The concept of bandwidth management still applies equally well with
   shared forwarding. As an example consider a PBB-TE edge switch that
   terminates an Ethernet LSP with the following attributes: bandwidth
   B1, ESP-MAC DA D, ESP-MAC SA S1, ESP-VID V. A request to establish an
   additional Ethernet LSP with attributes (bandwidth B2, ESP-MAC DA D,
   ESP-MAC SA S2, ESP-VID V) can be accepted provided there is
   sufficient link capacity remaining.

 I find this example quite hard to follow.

 My suggestion is to either remove the example, or to fill it out with a 
figure.

Why do you use an edge switch in your example? That seems to add to my 
confusion.

---

 Section 4.1.1

   Where individual paths in a protection group are modified, signaling
   procedures MAY be combined with Protection Switching (PS)
   coordination to administratively force PS switching operations such
   that modification is only ever performed on the protection path.

 I think you need a reference for PS.

 ---

 Section 4.5

 I think you are missing a chunk of text. I think I can see how the 
CALL_ATTRIBUTES are used in accordance with RFC4974, but there really is 
nothing more than a reference to RFC4974 in step 6) or Seciotn 4.1.

I can't find any explanation of the use of LSP_ATTRIBUTES. No reference to 
RFC5420, and no mention of how the object might be used.

How do the authors propose for these objects to be used, and how did the WG 
assess the protocol extensions?

Can one LSP be associated with multiple I-SIDs?
What does it mean for a Call to be associated with multiple I-SIDs?

 The inclusion of a field for flags with none defined might be excusable, if 
you had some spare bits, but you don't. Why don't you strike this and 
include an options sub-TLV is necessary in the future?

Presumably if Action == range then excatly two I-SIDs must be present in the 
sub-TLV.

This section worries me a fair bit. It feels like the absence of an 
implementation is a bit telling. I find myself wondering whether the I-D 
should actually be published as Informational or Experimental "as a basis 
for future standards track work" I would feel a lot more comfortable if this 
section was more robust.

---

 Figures 4 and 5

 There seem to be some minor alignment problems with vertical pipes. Someone 
been using tab stops?

---

 Section 5.1.1 is a bit woolly!

 Starting with Seciton 5.1

   The network operator administratively selects a
    set of VLAN Identifiers that can be used to setup ESPs.
   Consequently, any VID outside the allocated range is invalid and an
   error MUST be generated where the mismatch is discovered.

 It is unclear is this is a data plane, management plane, or control plane 
error.

In 5.1.1: which message might give rise to the error? which message is used 
to carry the error?

---

 Section 5.1.2

 What was wrong with using an existing sub-code such as 9?
BTW, 35 is already allocated.

 ---

 Section 6

 This section is not going to get past the Security Directorate!

 - It will help to refer to 
draft-ietf-mpls-mpls-and-gmpls-security-framework

- "The commonly known techniques..." will need references

- The statement that all devices in the domain are trusted will raise 
eyebrows especially give the pug and play nature of Ehternet and the 
relative ease of packet insertion via the data plane.

 - "Care is required to ensure untrusted access to the trusted domain does 
not occur" needs at least some guidance on what care might be  taken

 - It seems to me that you are allowing the control plane to set up a 
different forwarding paradigm from the one we are used to. Since  the 
forwarding plane is more easily (differently) subverted than the management 
plane, surely you are introducing risks that have never even been thought 
about.

---

 Section 8.1

 Please include file name (draft-ietf-ccamp-gmpls-mln-extensions) for 
[MLN-EXT] to remove downref warning.

---

 Section 8.2

 Please fix up the references to
 [IEEE 802.1ay] should be [IEEE 802.1Qay]
 [IEEE 802.1ah] should be [IEEE 802.1Qah]

 Please remove unreferenced items.
 [IEEE 802.1ag]
 [Y.1731]

---