RE: Size of CR in CRH

"Ketan Talaulikar (ketant)" <ketant@cisco.com> Sun, 24 May 2020 05:57 UTC

Return-Path: <ketant@cisco.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A18823A07F6 for <ipv6@ietfa.amsl.com>; Sat, 23 May 2020 22:57:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.597
X-Spam-Level:
X-Spam-Status: No, score=-9.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=fz55LzRl; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=LTn4pYxQ
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EFskXLJEjR5g for <ipv6@ietfa.amsl.com>; Sat, 23 May 2020 22:57:31 -0700 (PDT)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E3CE13A00B0 for <6man@ietf.org>; Sat, 23 May 2020 22:57:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=40746; q=dns/txt; s=iport; t=1590299850; x=1591509450; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=W+0AMwIB1ucFVWqqdupQiQULBMDAnIUOm6oIFqbJY9s=; b=fz55LzRlLkcXe5/J2Y3GU9sJDPVLQt7+gjvw4z59hPsllCJn55OdB92V u3VY8J+AG04fP+sgEkZnLxmdbzqXpDJB1O3wjHACDiO+0rYoGYFSx/YoC O19kjMnj9iNPnSqI7plNooz+b9UctPT9ck/A/UDFvr3dyx6yLXgyy3SUU I=;
IronPort-PHdr: 9a23:+NTD1RTOl5v6GGYOnTZfASWRNNpsv++ubAcI9poqja5Pea2//pPkeVbS/uhpkESQBNmJ5PdNiu6QuKflCiQM4peE5XYFdpEEFxoIkt4fkAFoBsmZQVb6I/jnY21ffoxCWVZp8mv9PR1TH8DzNFLXq3y2qzUVH0a3OQ98PO+gHInUgoy+3Pyz/JuGZQJOiXK9bLp+IQ/wox/Ws5wdgJBpLeA6zR6arw==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DbCQBCDMpe/5BdJa1lg3UvIwYoB29YLywKhBqDRgONQIl6jkKBQoEQA1UDCAEBAQwBARgBCgoCBAEBhEQCF4IGJDgTAgMBAQsBAQUBAQECAQUEbYVWDIVyAQEBAQIBAQEQEQQGEwEBLAQHAQQHBAIBBgIOAwEDAQEhBwMCAgIfBgsUAwYIAgQBDQUIEweDBYF+TQMOHwEBDo93kGcCgTmIYXZ/M4MBAQEFgUZBgywNC4IOAwaBOIJkiWAagUE/gRABQ4JNPoIeSQEBAgEBgSwBEgEDIAUHGAcJgl4zgi2OWgYKIIJchiSKf48kM0oKglSIKYVQeYUOhHmCY4kCkh2ONoE9W4lugkyRKAIEAgQFAg4BAQWBaSJmcHAVO4JpUBgNkEwFEoEDAQGCSoUUhUJ0AjUCAwMBBwEBAwl8i0sBgQ8BAQ
X-IronPort-AV: E=Sophos;i="5.73,428,1583193600"; d="scan'208,217";a="511983116"
Received: from rcdn-core-8.cisco.com ([173.37.93.144]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 24 May 2020 05:57:28 +0000
Received: from XCH-ALN-001.cisco.com (xch-aln-001.cisco.com [173.36.7.11]) by rcdn-core-8.cisco.com (8.15.2/8.15.2) with ESMTPS id 04O5vS0o013503 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Sun, 24 May 2020 05:57:28 GMT
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by XCH-ALN-001.cisco.com (173.36.7.11) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Sun, 24 May 2020 00:57:28 -0500
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Sun, 24 May 2020 00:57:27 -0500
Received: from NAM10-MW2-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Sun, 24 May 2020 00:57:27 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=WSrLX81vnnMWsVJ09V+DPhhuGdL9MKtHD9Wqw8iWuH7W74OombV1U2R8lT2zTUpXwy0cnbBv7wVAPHnztVh9q1amFVWWbr3SX7op+teAJ17dg8OdoGLP55PiTLEjxPume5jmC+i+in54eEJnV2NaSHt7Yfg9YCUnjxpA+b/WGb9rWDGgUI0JsbWlG2lxWZkfl40nC55T+hCLB23X3wAtwCWkiDOqoj48ZR/hNHzasTxFJFKbJQBjXYhX7oMGV3mY+LvsZXg2CJuKkPGIK3MJdUhMOf5Pp8mEsJyEsxpU50Ypbpk6eeOhSfMj1O07sQVxgPvjrjGmKwvr96RRkpN7Tg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=W+0AMwIB1ucFVWqqdupQiQULBMDAnIUOm6oIFqbJY9s=; b=WSeAn/+GcyKyXN/ruWGIG4JfvB0kNCS1KM9vXnpjslBEtAE7niQzfIQ3UzJUZmMcInsuvoLYtje84h3Xs9Wg87BPDzTX+osJFRrVHqSoOfGfSsec5H6WTZ1yRh9h0ylp7E/Yjsudzm7GtYn6qB/gn7bvC6D06h0BtRxIVgZMZfqni99DVaMLwWL18SOOY74z4Q/VL35lzAyO+gUtRPcF3/V1tq99+pRSO/51EDcYOfOmYBX0zoAT6KjijDxo+WAAjO+PsaA2Pfk1871RPgSymKKwmsxcXO1RbY2PbdDQ+i6SIrp6k8BN2+iiIJynbCL0HF/fmVGmkdjBsGICLaH9Gw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=W+0AMwIB1ucFVWqqdupQiQULBMDAnIUOm6oIFqbJY9s=; b=LTn4pYxQGIrW4NFJCJSs+anZz785yozXh8iARW4XMWCUM8/7trMKvUEL16XV3tjhK9v2kUf18ZKSXaHFY6VL17O+U455n/cvaMWW0xLaDQ3ocZwHkXfbcdd5CYuAnS8q0MRahVjow74mxP07oLnTLGbpvc6erv4DNyfwK08SPoY=
Received: from MW3PR11MB4570.namprd11.prod.outlook.com (2603:10b6:303:5f::22) by MW3PR11MB4619.namprd11.prod.outlook.com (2603:10b6:303:5b::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3021.27; Sun, 24 May 2020 05:57:26 +0000
Received: from MW3PR11MB4570.namprd11.prod.outlook.com ([fe80::9552:d301:4b19:601c]) by MW3PR11MB4570.namprd11.prod.outlook.com ([fe80::9552:d301:4b19:601c%5]) with mapi id 15.20.3021.026; Sun, 24 May 2020 05:57:26 +0000
From: "Ketan Talaulikar (ketant)" <ketant@cisco.com>
To: Gyan Mishra <hayabusagsm@gmail.com>, "Pascal Thubert (pthubert)" <pthubert@cisco.com>, "Templin (US), Fred L" <Fred.L.Templin@boeing.com>
CC: 6man <6man@ietf.org>, Ron Bonica <rbonica@juniper.net>, "otroan@employees.org" <otroan@employees.org>
Subject: RE: Size of CR in CRH
Thread-Topic: Size of CR in CRH
Thread-Index: AQHWMVtTdNGtrvS9I0O3ikrJIS876Ki2uyYg
Date: Sun, 24 May 2020 05:57:26 +0000
Message-ID: <MW3PR11MB457079DB48A14981F1350240C1B20@MW3PR11MB4570.namprd11.prod.outlook.com>
References: <6EE14ED3-2AF7-416F-BDAE-54B7554452FD@gmail.com>
In-Reply-To: <6EE14ED3-2AF7-416F-BDAE-54B7554452FD@gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [49.36.52.93]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6d52f6a7-a7c8-42bd-5f51-08d7ffa75613
x-ms-traffictypediagnostic: MW3PR11MB4619:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <MW3PR11MB46198B7319E49FF139049116C1B20@MW3PR11MB4619.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:3968;
x-forefront-prvs: 0413C9F1ED
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: V+NNN+H2m2IYLIUvI169vin5eKiGSzAFUC8vedpphHeJApsbPnbsAe/0vQa6S9ZrfjK8tqwJ9rHu5mNT+lQCz4+CNlq9bsQT3OG/MQtOANavNZlZDMzbn7pJPgxC4DH5SjjIJWsxlV3UHFRh/C3sEo7DOS24M+eOGepVPWsPT8lFHxcTqd6aHXLMxrusQ9eRw6S4GN4124tSQdWCgrQxiQcZQvAKpHzUblmqc00k1RraFPJOBjYv9lzzlEmzE8SCzQFqZMFcHBwtAv2BdtE8bY/oTvrjj7bILZINxp8Bl6BmsGono9k9/92AZEy/0vbf/WOfqlRJKobktJv5+0oDdMrWR2ncw1FQE/QBQUs6pfDclfmeG1bvwzfRrIs+7pK3+ukp8Ar50cHR9wSBREii/Q==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MW3PR11MB4570.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(346002)(376002)(39860400002)(136003)(366004)(396003)(86362001)(66476007)(8936002)(9326002)(7696005)(8676002)(316002)(66446008)(64756008)(4326008)(33656002)(66946007)(54906003)(110136005)(966005)(76116006)(52536014)(478600001)(186003)(2906002)(53546011)(6506007)(26005)(9686003)(66556008)(71200400001)(166002)(66574014)(5660300002)(55016002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: uM6v5+MRPhFsVMRKLIr4hwOnbjipit3xpHeLGdAc6LKgAvlNTETdp2yDcIXPQu0zUGIPFMe3BNKB/uG0KbOvFhiW7YKdi/67MfBn6CmOYPuKhqXcZMBlAEzBFw9duB1zaeoTPGflqIvXZX31NiH7DxnMethPPd/zAzCG+ERECC33uua+mJJnBhf0L/AXfFY72fWNN0IXqtt+Z32odJSL90Dg1JalcNWwCw6ATmEFJ/JUqQHJ1yqylL5vLaWE6GcowJ6v+S2LjwGRoc8FZRz/yE9JzFJqmuNnKoUceZUzdvgqbpFx32dRtoV8t61kystgRSA63a4it/8ZRzHMU4Lr2u9qIiXGrLsJP+Zkfxnt8/nw/11YfPlJPj1kthtYWbDz3Vtc4FJNrCscxQJfZ3QZu9WxRHa1G///ftS7igHF2ZK/uP3921mdEUWawGx065Q9XjwpVThYbQZ5+z+LM8OYiw4D/zid3FdkfUNDMn7XKyA=
Content-Type: multipart/alternative; boundary="_000_MW3PR11MB457079DB48A14981F1350240C1B20MW3PR11MB4570namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 6d52f6a7-a7c8-42bd-5f51-08d7ffa75613
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 May 2020 05:57:26.3681 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 5tmLEL2cxMO9oN8b7+GpT9W01g/XY4IStYeMP9lEbjya15BgX8aTlnTPCKd3sLmvFNlbxcJf3869CjddycQn2A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW3PR11MB4619
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.11, xch-aln-001.cisco.com
X-Outbound-Node: rcdn-core-8.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/B3DN1MCy2we9FVH-PdAldIGYi0Q>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 24 May 2020 05:57:41 -0000

Hi Gyan,

Thanks for sharing your perspective. SRm6 has been documented and presented previously. I do not believe that the scope of the WG adoption is SRm6 but it is the CRH alone on the basis of it’s application and use-cases that are outside the Spring framework/solution.

If you are aware of the same, please do share.

We can debate SRm6 separately.

Also, thanks for the pointer to RFC8138. Having a WG like roll or 6lo that worked on this is exactly what I was looking for CRH as well. You can lookup the history of how that document, or the other RHs (not just SRH) were introduced. Something similar for CRH seems like a good way to go about this work to me.

Thanks,
Ketan


From: Gyan Mishra <hayabusagsm@gmail.com>
Sent: 24 May 2020 05:09
To: Ketan Talaulikar (ketant) <ketant@cisco.com>; Pascal Thubert (pthubert) <pthubert@cisco.com>; Templin (US), Fred L <Fred.L.Templin@boeing.com>
Cc: 6man <6man@ietf.org>; Ron Bonica <rbonica@juniper.net>; otroan@employees.org
Subject: Re: Size of CR in CRH



Ketan

Here is a easier way to understand CRH and it’s relationship to Spring WG SRM6 architecture and how  CRH can maintain its own individuality in the 6MAN WG context.

You can think of of words “overloading” “over engineering” as a way of describing SRM6 and SRV6 in the context of Spring WG,  and use of the KISS “keep it simple and stupid” acronym as a way of describing CRH in the context of 6MAN WG.

SRM6 is the Spring “overloaded” version that contains all the architecture drafts below.

The following are links to the SRm6 drafts:

Overview: https://datatracker.ietf.org/doc/draft-bonica-spring-sr-mapped-six/<https://datatracker.ietf..org/doc/draft-bonica-spring-sr-mapped-six/>
CRH: https://datatracker.ietf.org/doc/draft-bonica-6man-comp-rtg-hdr/
VPN Service Labels: https://datatracker.ietf.org/doc/draft-bonica-6man-vpn-dest-opt/
SFC: https://datatracker.ietf.org/doc/draft-bonica-6man-seg-end-opt/

IGP Extesnsions: https://datatracker.ietf.org/doc/draft-bonica-lsr-crh-isis-extensions/

The 6MAN draft for CRH introduces 2 new EH routing headers and stands on its own as the “KISS” I-D.

The CRH I-D stands on its own as is a completely independent entity separate from the SRM6 architecture documents.  The CRH draft is just a single component of the overall SRM6 architecture, but since CRH is the main component even with its simplicity it has the power to stand independently on its own with a manual or controller based CRH-FIB creation.

CRH can stands independently of Spring SRM6 documents even though CRH is a component SRM6, and how that is accomplished is that CRH as Ron mentioned would not use the SRM6 IGP extension draft.

As far as provisioning with 64k nodes intra domain, this can still be achieved with a centralized PCE controller as manual CLI option would not be feasible.

As far as scalability of 16 versus 24, 32 64 size I agree 16 is more then sufficient for intra domain used in a Data Center or Tier 1 Service provider Network like Verizon or any of the other Tier 1 or 2 providers.

As far as massive massive massive scalability for both CRH and SRM6 -> both can scale well beyond SRv6 or SRv6 even with the six plus compression techniques and as far as extremely long traffic steering strict paths due to the basic concept of the routing segment in the RH being a “tag or pointer or index” If you will and not a compressed IPv6 prefix as done with the other SRv6 compression techniques.

As far as the extremely long paths note that the the KISS rule with CRH is where it shines with much less architectural baggage and can be viable solution as compares to SRv6 or any of the compression variants.

I don’t think we really need to allocate RH for larger then 16 bit use case now unless we really have an immediate use case for the short term.

6lo mentioned by Pascal as a RPL new RH did that does not have a separation architecture or use case drafts and is an RFC and is outside of Spring WG.

https://tools.ietf.org/html/rfc8138#section-5.1

Fred as well mentioned a draft for variable sized RH to be used over the internet part of this thread also outside of Spring WG.

Kind regards

Gyan

On Thu, May 21, 2020 at 1:33 PM Ketan Talaulikar (ketant) <ketant=40cisco.com@dmarc.ietf.org<mailto:40cisco.com@dmarc.ietf.org>> wrote:
Hi Ron,

Looks like the CRH solution is spread over multiple napkins and you are now taking them out of your pocket one by one 😉

I would wish that everything was documented and put before the WG adoption for a proper evaluation of what it is - i.e. the architecture, applicability, use-cases and requirements.

Thanks,
Ketan

-----Original Message-----
From: ipv6 <ipv6-bounces@ietf.org<mailto:ipv6-bounces@ietf.org>> On Behalf Of Ron Bonica
Sent: 21 May 2020 01:04
To: otroan@employees.org<mailto:otroan@employees.org>
Cc: 6man <6man@ietf.org<mailto:6man@ietf.org>>
Subject: RE: Size of CR in CRH

Ole,

Tags have node local scope. And an node may be associated with multiple tags.. Assume the following:

- Router R resides in a domain with many other routers
- Router R has 100 neighbors, N1 through N100

So, every router in the network maintains a CRH-FIB entry that contains:

- One of Router R's IP addresses
- A forwarding method indicating that the packet is loosely routed

R's neighbors, N1 through N100, each maintain a second CRH-FIB entry. Each of these contains:

- One of Router R's IP addresses
- A forwarding method indicating that the packet is strictly routed
- An interface identifier

Again, tags have node local scope. However, for the purposes of operational simplicity, an operator might allocate tags that represent loose source routing as if they had domain wide significance. For example, we said that every router in the network maintains a CRH-FIB entry that contains:

- One of Router R's IP addresses
- A forwarding method indicating that the packet is loosely routed

All of these could be identified by the tag R. But this is not strictly required.

                                                                                                                            Ron


Juniper Business Use Only

-----Original Message-----
From: otroan@employees.org<mailto:otroan@employees.org> <otroan@employees.org<mailto:otroan@employees.org>>
Sent: Wednesday, May 20, 2020 5:10 AM
To: Ron Bonica <rbonica@juniper.net<mailto:rbonica@juniper.net>>
Cc: 6man <6man@ietf.org<mailto:6man@ietf.org>>
Subject: Re: Size of CR in CRH

[External Email. Be cautious of content]


> The following factors figured into the decision to specify 2 Routing types, one with a 16-bit identifier and the other with a 32-bit identifier:
>
>       - Today, very few networks contain more than 65,000 routers. So, most networks could obtain best compression with a 16-bit identifier.
>       - When 5G is deployed, we may see networks that contain more than 65,000 Cell Site Routers. These networks will need an identifier that is wider than 16 bits.
>       - It is unlikely that we will ever see a network that contains more than 4,000,000 routers. So, we will never need an identifier that is wider than 32 bits.
>
> If Routing header types were in short supply, and only one were available to us, we would have to do one of the following:
>
>       - Select a single length (16, 24 or 32 bits)
>       - Use the fifth byte of the Routing header to indicate the identifier length.
>
> The first option isn't very appealing. A 16-bit identifier is too short for some networks. A 24-bit identifier may be difficult for some ASICs to process. A 32-bit identifier gives suboptimal compression for all existing networks.
>
> The second option isn't very appealing either. If we use the fifth byte to indicate the identifier length, and we want the first identifier to begin on a 32-bit boundary, the next 24 bits would be wasted.
>
> Fortunately, Routing header types are not in short supply. The Routing Type registry has room for 255 entries. Since it was established 25 years ago, only 6 types have been allocated. Of those, two have been deprecated (RH0 and Nimrod) and two are for special use (Experiment 1 and Experiment 2).
>
> So, allocating two Routing types may be the best solution.

I don't think we necessarily need to settle this as part of the adoption call.
Although it might influence someone's opionion if this adds 1 (additional) solution to the table or 2.

For clarification:
 - Are these tags meant to be unique within the controlled domain or do they only need to be unique per node?
 - A tag identifies a forwarding method. One node could then use many tags,
   e.g have one tag map to each of it's outgoing interfaces? Or a tag significy a VNI?
 - Method specific parameters. Are they meant to be embedded in the tag or somewhere else, if so where?

Best regards,
Ole

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org<mailto:ipv6@ietf.org>
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org<mailto:ipv6@ietf.org>
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------