Re: [Iot-directorate] [6lo] Iotdir last call review of draft-ietf-6lo-backbone-router-13

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Fri, 31 January 2020 17:35 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: iot-directorate@ietfa.amsl.com
Delivered-To: iot-directorate@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 76DE4120A96; Fri, 31 Jan 2020 09:35:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Ceuc7VY+; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=vMrPyo9a
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xg4udPZOYWCs; Fri, 31 Jan 2020 09:35:52 -0800 (PST)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1064F120118; Fri, 31 Jan 2020 09:35:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=26188; q=dns/txt; s=iport; t=1580492152; x=1581701752; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=mPL2MEx9b70vALS2IqGyhqcYMRqpnVwPfQh+LOHNAfI=; b=Ceuc7VY+vx9FBC+pxhlPVmTyEYjlq6/IVpFlgR9mKHPSEzBaKgYcvkc5 TBH0IltDG2TQRhqGVzY/Q/jkU8/hp0rysGMMvesoZIBOKKqP1coD/17+w +WktZtJEcQ73e4hX8OItyFzq8RZZ2MMuOMuT2Ge0BOXl85vXZUU0tT9CC 8=;
IronPort-PHdr: 9a23:cfqELhH1KfeK1D3AG50ZYJ1GYnJ96bzpIg4Y7IYmgLtSc6Oluo7vJ1Hb+e4z1Q3SRYuO7fVChqKWqK3mVWEaqbe5+HEZON0pNVcejNkO2QkpAcqLE0r+eeb2bzEwEd5efFRk5Hq8d0NSHZW2ag==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0ClBQAUZTRe/4UNJK1lHAEBAQEBBwEBEQEEBAEBgXuBVFAFbFggBAsqhBSDRgOKdoJfmA+BQoEQA1QJAQEBDAEBGAsKAgEBhEACF4IaJDgTAgMNAQEEAQEBAgEFBG2FNwyFZgEBAQEDAQEQEQQNDAEBLAIJAQsEAgEGAhEBAwEBAwImAgICJQsVAgYIAgQBDQUIGoMFgkoDLgECDJIXkGYCgTmIYnV/M4J/AQEFgS8Bg2YYggwDBoEOKoUehDmCSRqBQT+BEUeBTn4+gmQBAYEwARIBIRUVgmQygiyNPQgYAQOCdZ4YdgqCO40MiU6CSIgNi2uCX4FmjmCbGAIEAgQFAg4BAQWBaSJEI3FwFTuCbFAYDY4dg3OFFIU/dIEpim6CMgEB
X-IronPort-AV: E=Sophos;i="5.70,386,1574121600"; d="scan'208";a="419287198"
Received: from alln-core-11.cisco.com ([173.36.13.133]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 31 Jan 2020 17:35:50 +0000
Received: from XCH-ALN-004.cisco.com (xch-aln-004.cisco.com [173.36.7.14]) by alln-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id 00VHZoZB001852 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 31 Jan 2020 17:35:50 GMT
Received: from xhs-aln-002.cisco.com (173.37.135.119) by XCH-ALN-004.cisco.com (173.36.7.14) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 31 Jan 2020 11:35:50 -0600
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 31 Jan 2020 11:35:49 -0600
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Fri, 31 Jan 2020 12:35:49 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=bWCurWIllOp0ItaBa/l7C0jGwJIu4fppmzBLn8HjJWyH31I+XvbELK9oLbXHzF5fKvKeGmNqeEs4Nt/U3Xgav+BH+95rEZ0Ib9n8/WC1f7OmCuv82yHmmON+E2kXgI2aiATZ06aIKAnlQbMEqrG0q7TjscfMAzvjJc53Gj8MCmZcgoJqtDUG9bfN4j81G/W/VC2WwG0x9HgXy/wfCajrT1YK31Oy6Kgn3m04qct1Qyn6DwbOQQ5eIuW4XGvUYTlu6E0RmPt/t6uq+/Mg+klRBx8HZKj0hvTy0dxA8CB6b5G9KCAiuvoO9teNKUQ/In/jXDBgUj7iEADbGfGWJdnydw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mPL2MEx9b70vALS2IqGyhqcYMRqpnVwPfQh+LOHNAfI=; b=jLepSMSAUU0MGAocStAT1KD/HsJvKjNtiHKb9A0jjUAeMRaoYJJVCBC1GrgCZygCYHfTKrUTatvS97MhwS3uQqyEtD40rC53inj1MhgCm4lGLmIbAEiBz0IXj0bXOe909CXzz+8lCE+A/WRUVpLKWfbpo2OzxfTyxlSi97iFV5yXxoKbbkcAqZKBh7ZAE4wMHIEceR/oxyg+twHrfIgcjUgXrKnMC/x4a+6YipqpsHGudpVqIcgQtw7e6nRPo6+709A1BXD3gxfMAA3+46w89wyuXVaNl8mZL+bGd7XnTZ2A6y0XRKSGQZSdXLbzzFPvOlzb0D/+n/WL2JmZRlvANQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mPL2MEx9b70vALS2IqGyhqcYMRqpnVwPfQh+LOHNAfI=; b=vMrPyo9a7lEOhwHLjnDY+5uDi8FCbLOFqzWxLF8VJDHfRxUWZXRvnV1QNYpRC8cmdus1thWc9N3aQFvReLX7HaMamdcgP1+Xewqd4EWktuabT304vxYTpgK7lUjgTwK3PC9LdtBHAmA0ny8vt0TDUdd3AeIfqFSroajZO5cRy8E=
Received: from MN2PR11MB3565.namprd11.prod.outlook.com (20.178.250.159) by MN2PR11MB4333.namprd11.prod.outlook.com (10.255.90.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2686.28; Fri, 31 Jan 2020 17:35:47 +0000
Received: from MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::fd76:1534:4f9a:452a]) by MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::fd76:1534:4f9a:452a%3]) with mapi id 15.20.2665.027; Fri, 31 Jan 2020 17:35:47 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: "dominique.barthel@orange.com" <dominique.barthel@orange.com>, "iot-directorate@ietf.org" <iot-directorate@ietf.org>
CC: "draft-ietf-6lo-backbone-router.all@ietf.org" <draft-ietf-6lo-backbone-router.all@ietf.org>
Thread-Topic: [6lo] Iotdir last call review of draft-ietf-6lo-backbone-router-13
Thread-Index: AQHV15Xp0DqdMH5N3U2Lk4byUboXAqgE4HWQgAAlagCAAAQaAA==
Date: Fri, 31 Jan 2020 17:35:40 +0000
Deferred-Delivery: Fri, 31 Jan 2020 17:35:15 +0000
Message-ID: <MN2PR11MB35650F6A3F77F96F1AFEED33D8070@MN2PR11MB3565.namprd11.prod.outlook.com>
References: <158040668306.10190.15300577530854340486@ietfa.amsl.com> <MN2PR11MB3565CC1EFF3F90284256549CD8070@MN2PR11MB3565.namprd11.prod.outlook.com> <11258_1580491139_5E346183_11258_497_26_DA5A1F79.6FAA9%dominique.barthel@orange.com>
In-Reply-To: <11258_1580491139_5E346183_11258_497_26_DA5A1F79.6FAA9%dominique.barthel@orange.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pthubert@cisco.com;
x-originating-ip: [2a01:cb1d:4ec:2200:783a:65cb:72dd:4095]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 3c9d04fa-380f-42d1-2597-08d7a67401fe
x-ms-traffictypediagnostic: MN2PR11MB4333:
x-microsoft-antispam-prvs: <MN2PR11MB433336C357BE5D1747A3AFA0D8070@MN2PR11MB4333.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:5236;
x-forefront-prvs: 029976C540
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(346002)(366004)(396003)(376002)(136003)(39860400002)(189003)(199004)(7696005)(4326008)(30864003)(8936002)(186003)(81166006)(53546011)(8676002)(316002)(86362001)(6506007)(5660300002)(9686003)(110136005)(66574012)(33656002)(81156014)(478600001)(6666004)(66446008)(64756008)(66556008)(71200400001)(66476007)(66946007)(76116006)(2906002)(52536014)(55016002)(966005); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB4333; H:MN2PR11MB3565.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: jpOD1e7KeWpskgjnGEegIpR76HvEYEG6O/n/IePwzkyuZvL0E3JLLJ9ioVDUHL3pKHdJ01UL/VsI7GaIc/as4izZnR1ItAC2EnK8yBhlEMmcxuC6nW+WL2roN9Ioedu8feNKK3YbAIVi8VT513XtN/VBHyMZ4nMmZkqxod1iVo6LshoqB8YrDUaKfYlyMST+bxt+VI1KYj6xuTocNvE5xA==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 3c9d04fa-380f-42d1-2597-08d7a67401fe
X-MS-Exchange-CrossTenant-originalarrivaltime: 31 Jan 2020 17:35:47.5325 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: FgVTgG3cokMxcYotClOG5MGUwrP/43oAKYB8kzMCHVqvWB6L4sSznmnFYqmsiLJ3xp1MWMzjHMOInZGnOABIRQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4333
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.14, xch-aln-004.cisco.com
X-Outbound-Node: alln-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/iot-directorate/lCKQM6eg1OMIGszRCcsda--M218>
Subject: Re: [Iot-directorate] [6lo] Iotdir last call review of draft-ietf-6lo-backbone-router-13
X-BeenThere: iot-directorate@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Mailing list for the IoT Directorate Members <iot-directorate.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iot-directorate>, <mailto:iot-directorate-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iot-directorate/>
List-Post: <mailto:iot-directorate@ietf.org>
List-Help: <mailto:iot-directorate-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iot-directorate>, <mailto:iot-directorate-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 31 Jan 2020 17:35:56 -0000

Perfect that way!!!!

Many thanks Dominique I'll go through that next.

Have a great week end 😊

Pascal

> -----Original Message-----
> From: dominique.barthel@orange.com <dominique.barthel@orange.com>
> Sent: vendredi 31 janvier 2020 18:19
> To: Pascal Thubert (pthubert) <pthubert@cisco.com>; iot-directorate@ietf.org
> Cc: draft-ietf-6lo-backbone-router.all@ietf.org
> Subject: Re: [6lo] Iotdir last call review of draft-ietf-6lo-backbone-router-13
> 
> Hello Pascal,
> 
> Attached is a text file with my nits.
> I hope you can sort out the line ending issue.
> It displays cleanly on my side.
> Best regards
> 
> Dominique
> 
> Le 31/01/20 17:55, « Pascal Thubert (pthubert) » <pthubert@cisco.com> a
> écrit :
> 
> >Hello Dominique:
> >
> >Many thanks for your great review! Let's see below:
> >
> >> # Comments/Questions:
> >> Picture 1., which gives a global view of the architecture we are
> >>talking about,  should be referenced as soon as end of Intro
> >>(specifically, together with “This  specification defines the 6BBR as
> >>a Routing Registrar …”.
> >
> >Good point! the intro text now looks like:
> >
> >"
> >   This specification defines the 6BBR as a Routing Registrar [RFC8505]
> >   that provide proxy services for IPv6 Neighbor Discovery.  As
> >   represented in Figure 1, Backbone Routers federate multiple LLNs over
> >   a Backbone Link to form a MultiLink Subnet (MLSN).  Backbone Routers
> >   placed along the LLN edge of the Backbone handle IPv6 Neighbor
> >   Discovery, and forward packets on behalf of registered nodes.
> >"
> >
> >> 3. Overview:
> >> Picture 1 shows one 6BBR per LLN. Can an LLN operate with multiple
> >>6BBRs,  to avoid single point of failure?
> >
> >Sure; I reused an image that illustrates RPL DODAGs but that was a bad
> >idea.
> >What about this (sorry if your font is not fixed size): ?
> >
> >                |
> >              +-----+               +-----+       +-----+ IPv6
> >    (default) |     |    (Optional) |     |       |     | Node
> >       Router |     |          6LBR |     |       |     | or
> >              +-----+               +-----+       +-----+ 6LN
> >                 |  Backbone side      |             |
> >     ----+-------+-----------------+---+-------------+----+-----
> >         |                         |                      |
> >      +------+                 +------+                +------+
> >      | 6BBR |                 | 6BBR |                | 6BBR |
> >      |      |                 |      |                |      |
> >      +------+                 +------+                +------+
> >         o     Wireless side   o   o  o      o           o o
> >     o o   o  o  o   o  o  o o   o  o  o   o o  o  o  o o     o   o
> >    o  o o  o o   o o  o   o   o  o  o  o       o     o  o  o o o
> >    o   o  o  o  o  o   o  o  o  LLN  o   o  o  o  o   o   o  o   o
> >      o   o o   o   o   o  o     o  o    o      o     o     o o
> >     o     o                o
> >
> >>
> >> “The combined Binding Tables of all the 6BBRs on a backbone form a
> >>distributed database of 6LNs that reside in the LLNs or on the IPv6
> >>Backbone.”
> >> From the definition of 6LN and from Figure 1., it had not occurred to
> >>me that a  6LN could reside on the Backbone. Can you clear out this
> >>doubt?
> >
> >Actually a 6LN is a L3 construct and as such can be attached to any
> >network including Wi-Fi or Ethernet.
> >e.g., you could have a device that sleeps and needs a 6BBR acting 	as
> >sleeping proxy.
> >There might be a need for additional text when we really work on a 6LN
> >sitting in the backbone, e.g., to insist that the 6LN does not listen
> >to multicast NS so it ignores DAD and Lookup, which are handled by the
> 6BBR.
> >Suggestion is to turn the last block of the intro as:
> >
> >"
> >   A 6LoWPAN node (6LN) registers all its IPv6 Addresses using an
> >   NS(EARO) as specified in [RFC8505] to the 6BBR.  The 6BBR is also a
> >   Border Router that performs IPv6 Neighbor Discovery (IPv6 ND)
> >   operations on its Backbone interface on behalf of the 6LNs that have
> >   registered addresses on its LLN interfaces without the need of a
> >   broadcast over the wireless medium.  A 6LN that resides on the
> >   backbone does not register to the SNMA groups associated to its
> >   Registered Addresses and defers to the 6BBR to answer or preferably
> >   forward to it as unicast the corresponding multicast packets.
> >"
> >
> >
> >
> >
> >> “The proxy-ND operation can co-exist with IPv6 ND over the Backbone.”
> >> I seems to me that IPv6 ND will happen on the Backbone no matter what
> >>the  6BBR does. Do you mean “The proxy-ND operation of the 6BBR can
> >>co-exist  with the 6BBR bridging IPv6 ND between the Backbone and the
> >>LLN.”?
> >
> >I agree ND will be there. I meant that there can be normal nodes doing
> >ND and 6BBR proxying ND on a same backbone.
> >Proposed clarification:
> >"
> >
> >   The operation of IPv6 ND and of proxy-ND are not mutually exclusive
> >   on the Backbone, meaning that nodes attached to the Backbone and
> >   using IPv6 ND can transparently interact with 6LNs that rely on a
> >   6BBR to proxy ND for them, whether the 6LNs are reachable over a LLN
> >   or directly attached to the Backbone.
> >
> >"
> >
> >
> >>
> >> “The 6BBR may co-exist with a proprietary snooping or …“. My
> >>understanding  of the 6BBR is that is is a box containing a set of
> >>functions. Which function of  the 6BBR is specifically being
> >>referenced here?
> >
> >Clarifying to
> >"
> >   The [RFC8505] registration mechanism used to learn addresses to be
> >   proxied for may co-exist in a 6BBR with a proprietary snooping or the
> >   traditional bridging functionality of an Access Point, in order to
> >   support legacy LLN nodes that do not support this specification.
> >
> >"
> >Works ?
> >
> >
> >
> >> 3.2 Access Link
> >> Figure 2 has two arrows pointing to nowhere. What is the information
> >>being  conveyed by this representation? multicast? Another arrow has
> >>the
> >>(multicast)
> >> annotation but does not have the same graphical representation.
> >
> >True and True.
> >
> >The RS(multicast) is intercepted by the AP, so it will never be really
> >multicast over the wireless.
> >The multiple arrows effectively denote a real multicast.
> >
> >Let le add text to explain that prior to the picture "
> >    The RS sent initially by the 6LN(STA) is a transmitted as a
> >multicast but
> >    since it is intercepted by the 6BBR, it is never effectively
> >broadcasted.
> >    The multiple arrows associated to the ND messages on the backbone
> >denote a
> >    real Layer-2 broadcast.
> >
> >"
> >
> >
> >
> >> 3.3 Route-Over Mesh
> >> I suggest to add a picture showing the LLN mesh structure, with 6LNs,
> >>6LRs  and a 6LBR. This would ease the reading of the text. I’m sure
> >>you can rip one  such picture off of another draft. BTW, can there be
> >>multiple 6LBRs for one  LLN, much like multiple DAG roots for RPL. If
> >>yes, this needs to be  mentionned, and maybe doarn in the picture.
> >
> >OK let me add pictures for both cases
> >"
> >   The simplest topology from the Layer-3 perspective occurs when the
> >   wireless network appears as a single hop hub-and-spoke network as
> >   shown in Figure 2.  The Layer-2 operation may effectively be hub-and-
> >   spoke (e.g., Wi-Fi) or Mesh-Under, with a Layer-2 protocol handling
> >   the complex topology.
> >
> >                    |
> >                 +-----+               +-----+       +-----+ IPv6
> >       (default) |     |    (Optional) |     |       |     | Node
> >          Router |     |          6LBR |     |       |     | or
> >                 +-----+               +-----+       +-----+ 6LN
> >                    |  Backbone side      |             |
> >        ----+-------+-----------------+---+-------------+----+-----
> >            |                         |                      |
> >         +------+                 +------+                +------+
> >         | 6BBR |                 | 6BBR |                | 6BBR |
> >         | 6LR  |                 | 6LR  |                | 6LR  |
> >         +------+                 +------+                +------+
> >      (6LN) (6LN) (6LN)       (6LN) (6LN) (6LN)          (6LN) (6LN)
> >
> >
> >
> >                      Figure 2: Access Link Use case "
> >
> >And
> >
> >"
> >
> >
> >3.3.  Route-Over Mesh
> >
> >   A more complex Multi-Link Subnet topology occurs when the wireless
> >   network appears as a Layer-3 Mesh network as shown in Figure 4.  A
> >   so-called Route-Over routing protocol exposes routes between 6LRs
> >   towards both 6LRs and 6LNs, and a 6LBR acts as Root of the Layer-3
> >   Mesh network and proxy-registers the LLN addresses to the 6BBR.
> >
> >                   |
> >                +-----+               +-----+       +-----+ IPv6
> >      (default) |     |    (Optional) |     |       |     | Node
> >         Router |     |          6LBR |     |       |     | or
> >                +-----+               +-----+       +-----+ 6LN
> >                   |  Backbone side      |             |
> >       ----+-------+-----------------+---+-------------+----+-----
> >           |                         |                      |
> >        +------+                 +------+                +------+
> >        | 6BBR |                 | 6BBR |                | 6BBR |
> >        +------+                 +------+                +------+
> >            |                        |                       |
> >        +------+                 +------+                +------+
> >        | 6LBR |                 | 6LBR |                | 6LBR |
> >        +------+                 +------+                +------+
> >       (6LN) (6LR) (6LN)       (6LR) (6LN) (6LR)        (6LR) (6LR)(6LN)
> >    (6LN)(6LR) (6LR) (6LN)   (6LN) (6LR)(6LN) (6LR)  (6LR)  (6LR) (6LN)
> >      (6LR)(6LR) (6LR)         (6LR)  (6LR)(6LN)    (6LR) (6LR)(6LR)
> >    (6LR)  (6LR)    (6LR)   (6LR) (6LN)(6LR) (6LR)    (6LR) (6LR) (6LR)
> >    (6LN) (6LN)(6LN) (6LN) (6LN)       (6LN) (6LN)  (6LN)  (6LN) (6LN)
> >
> >                    Figure 4: Route-Over Mesh Use case"
> >
> >> Figure 3. Same comment about arrows pointing to nowhere (a 3 arrows
> >>bunch,  in this picture, as opposed to 2, in the previous picture).
> >>
> >
> >Added same text
> >
> >Please let me know if we are OK so far; I'll continue next week.
> >
> >In the meantime,  could you please resend the nits in a format that is
> >not concatenated, if you still have that?
> >As below it is unreadable : (
> >
> >Many thanks again!
> >
> >pascal
> >
> >
> >> 3.4
> >> “Addresses in a LLN … must be registered … “. Is the use of lowercase
> >>“must”
> >> intended? “Over the LLN, Binding Table management is as follows:”
> >>Sorry to  sound stupid, but the list of actions does not include the
> >>initial registration.
> >> Likewise, the transitions between the Tentative, Reachable or Stale
> >>states are  not described fully, left to the reader to imagine. The
> >>tone of voice of the  Binding Table management is narrative. Why is
> >>RFC2119 language not used?
> >> After reading section 9, it occurred to me that this description
> >>might just be a  preview of section 9. If true, please state this
> >>explicitely and add a forward  reference.
> >>
> >> 5
> >> “If this registration is”. Not sure what “this” refers to. Was this
> >>piece of text  moved around?
> >>
> >> 7.
> >> “Global including Unique Local addresses”
> >> Why “including”? Aren’t they disjoint ranges?
> >>
> >> 9.
> >> How does Section 9 “Creating and Maintaining a Binding” articulate
> >>with  Section
> >> 3.4 “The Binding Table”? Is 3.4 just a preview (hence the narrative
> >>style)? In  which case, a forward reference from 3.4 to 9 would be
> >>useful.
> >>
> >> 9.2
> >> “An NS(DAD) with no EARO or with an EARO that indicates a duplicate
> >>If the  Registration Lifetime is of a long duration, …” Cut&Paste
> >>error?
> >>
> >> # Nits:
> >> - “In practice, IPv6 addresses very rarely conflict because of the
> >>entropy of the  64-bit Interface IDs, not because address duplications
> >>are detected and  resolved.” -> “In practice, the fact that IPv6
> >>addresses very rarely conflict is  mostly attributable to the entropy
> >>of the 64-bit Interface IDs, not to the  address duplicate detection
> >>and resolution mechanisms”. - inconsistent use of  “broadcasted”
> >>versus “broadcast” - 1. Intro : “that provide proxy services” ->
> >>“provides” - 2.2 Bridging proxy : “6BR” -> “6BBR” - 3 Overview:
> >>“Figure
> >>1
> >> illustrates backbone link” -> “Figure 1 illustrates a backbone link”
> >>- 3
> >> Overview: “In the case, the co-existing function” -> “Any such
> >>co-existing  function” - 3 Overview: “Registering Node” is a term
> >>defined in RFC8505.
> >> However, “registering node” is also found in this document, without
> >>capitalization. Please check if this is intentional. - 3 Overview: “..
> >>MAY also be
> >> used with a 6LBR, if one is present, and the 6BBR.” -> “between a
> >>6LBR, if one  is present, and the 6BBR.” - 3.2 “The 6BBRs applies” ->
> >>“6BBR” - 3.2 “in that  example” -> “in this example” - 3.3 “The 6LBR
> >>(acting as Registering
> >>Node)
> >> proxies the registration to the 6BBR, using [RFC8505] to register the
> >>addresses  the 6LN (Registered Node) on its behalf to the 6BBR”. ->
> >>“the addresses of the  6LN” -> “its” is ambiguous. I believe that,
> >>grammatically, "it" refers to the  subject, which is “the 6LBR” in
> >>this sentence. Better avoid any ambiguity by  rewriting, probably
> >>cutting the sentence into several ones. - 3.3 “As a
> >>non-
> >> normative example of a Route-Over Mesh, the 6TiSCH architecture
> >>suggests …  , and is … ”. Ambiguous sentence. Break it in two. -> “a
> >>6LBR that serves the  LLN. The latter is either …”. - 3.4 “a LLN”->
> >>“an LLN” ? - 3.4 “Conflicting  registrations are solved by the 6BBRs
> >>transparently to the Registering Nodes.”
> >> -> “6BBRs, transparently” - 3.6 “The router can then determine the
> >> -> freshest
> >> EARO in case of a conflicting NA(EARO) messages,” -. “in case of
> >>conflicting
> >> NA(EARO) messages,” - 5. “This specification enables an address to be
> >>registered to more than one 6BBR.” -> “allows for an address to be
> >>registered  at more than on 6BBR”. - 5. “a 6LBR MUST be capable to
> >>maintain a state”->  “capable of maintaining” - 8. “It acts as a
> >>Layer-2 Bridge for all types unicast  packets” -> “all types of
> >>unicast packets” - 8. “the 6BBR MUST either answer  directly to the
> >>NS(Lookup) message or” -> “the 6BBR MUST either answer the
> >> NS(Lookup) message directly or” - 8. “it is eventually be discovered“
> >>-> “it is
> >> eventually discovered“ - 9. “pointing on the registering node” ->
> >>“pointing to  the registering node” - 9. “A Bridging Proxy MAY
> >>register Link Local addresses  to the 6BBR and proxy ND for those
> >>addresses over the backbone.”. ->  “register at the 6BBR“ or “register
> >>by the 6BBR”. -> “for these addresses” - 9.
> >> “the current DAD operation continues as it was” -> “continues
> >>unaltered” ? -
> >> 9.2 “in order to a allow for a parallel registration to arrive to
> >>this node” -> “to  allow” -> “to arrive at” - 9.2 “that is not as
> >>fresh as this“ -> “that is not as fresh  as this Binding“? - 9.3 “the
> >>6BBR MUST attempts a NUD procedure” ->  “attempt” - 10 “routing
> >>registrar” -> “Routing Registrar”
> >> - 11 Security Considerations: “either by means of physical or IP
> >>security for the  Backbone Link or MAC-layer security.” bad
> >>grammatical construct. - 11  Security Considerations: “A possible
> >>attack …  can easily … take over.”
> >>From
> >> the quoted text, it looks that the attack described succeeds. From
> >>the next  sentence in the paragraph, it looks that the attack does not
> >>succeed.
> >>Can you
> >> rephrase or elaborate? For example “One could think that a possible
> >>attack  would be …. But …” - 12 Protocol Constants: “relatively long
> >>value” is used  twice, even though the recommended value is very
> >>different. I guess you  mean “STALE_DURATION
> >>    SHOULD be configured to a value that is long relative to the address
> >>    lifetime. For example, in LLNs with …, a good value is …”.
> >> - Appendix B: “The term LLN is used … , meeting the requirements
> >>listed in …  “.
> >> I guess you mean something slightly different. Using the term “LLN”
> >>cannot by
> >> itself meet the technical requirements of App B.3 of RFC8505. -
> >>Appendix B:
> >> “Each LLN in the subnet is attached at an IPv6 Backbone Router (6BBR).”
> >>->
> >> “attached to an IPv6 Backbone Router (6BBR)”, or “attached to the
> >>Backbone  through a 6BBR”. - Appendix B: “In this way,” -> “This way,
> >>“ - Appendix B:
> >> “The IPv6 ND operation is minimized as the number of 6LNs grows in
> >>the LLN.”
> >> ND where? On the Backbone, the number of ND operations still grows
> >>with  the number of 6LNs in the LLNs, I beleive. What does “minimized”
> >>exactly  means, btw? In absolute numbers? In relative numbers?
> >>
> >>
> >> _______________________________________________
> >> 6lo mailing list
> >> 6lo@ietf.org
> >> https://www.ietf.org/mailman/listinfo/6lo
> 
> 
> ________________________________________________________________
> _________________________________________________________
> 
> Ce message et ses pieces jointes peuvent contenir des informations
> confidentielles ou privilegiees et ne doivent donc pas etre diffuses, exploites
> ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez
> le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les
> messages electroniques etant susceptibles d'alteration, Orange decline toute
> responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
> 
> This message and its attachments may contain confidential or privileged
> information that may be protected by law; they should not be distributed,
> used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete
> this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been
> modified, changed or falsified.
> Thank you.