Re: [Isis-wg] WG Adoption Call for draft-xu-isis-encapsulation-cap

Uma Chunduri <uma.chunduri@ericsson.com> Mon, 29 February 2016 07:18 UTC

Return-Path: <uma.chunduri@ericsson.com>
X-Original-To: isis-wg@ietfa.amsl.com
Delivered-To: isis-wg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C9191B2D18 for <isis-wg@ietfa.amsl.com>; Sun, 28 Feb 2016 23:18:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level:
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7GKwAlMGwtXZ for <isis-wg@ietfa.amsl.com>; Sun, 28 Feb 2016 23:18:23 -0800 (PST)
Received: from usplmg20.ericsson.net (usplmg20.ericsson.net [198.24.6.45]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CF8701B2D1A for <isis-wg@ietf.org>; Sun, 28 Feb 2016 23:18:22 -0800 (PST)
X-AuditID: c618062d-f79dd6d000003091-b3-56d3ec58783c
Received: from EUSAAHC002.ericsson.se (Unknown_Domain [147.117.188.78]) by usplmg20.ericsson.net (Symantec Mail Security) with SMTP id 78.AB.12433.85CE3D65; Mon, 29 Feb 2016 07:59:36 +0100 (CET)
Received: from EUSAAMB105.ericsson.se ([147.117.188.122]) by EUSAAHC002.ericsson.se ([147.117.188.78]) with mapi id 14.03.0248.002; Mon, 29 Feb 2016 02:18:21 -0500
From: Uma Chunduri <uma.chunduri@ericsson.com>
To: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>, Hannes Gredler <hannes@gredler.at>
Thread-Topic: [Isis-wg] WG Adoption Call for draft-xu-isis-encapsulation-cap
Thread-Index: AQHRKSDrA8JFzobLS0+ZndjUGF5XpZ62GfEAgEMqEQCAArqBAIBDUWSggAG3dICAAAkzAIAACjoAgAIS7fA=
Date: Mon, 29 Feb 2016 07:18:20 +0000
Message-ID: <1B502206DFA0C544B7A60469152008635154176B@eusaamb105.ericsson.se>
References: <4C33F1DA-351A-4E4C-AB2D-EB9C530EBA36@chopps.org> <05BB1848-0F89-4A06-B1C6-7E955C41C9E9@chopps.org> <2d9f516b68fd4443853f512a533bd9d6@XCH-ALN-001.cisco.com> <1B502206DFA0C544B7A6046915200863514605D3@eusaamb105.ericsson.se> <1B502206DFA0C544B7A60469152008635152D9E1@eusaamb105.ericsson.se> <3741852a2e494e6ca54fd6ffe847ba14@XCH-ALN-001.cisco.com> <20160227175134.GA16059@gredler.at> <623aa7aca98449d68305bb75bf9744dd@XCH-ALN-001.cisco.com>
In-Reply-To: <623aa7aca98449d68305bb75bf9744dd@XCH-ALN-001.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [147.117.188.11]
Content-Type: multipart/alternative; boundary="_000_1B502206DFA0C544B7A60469152008635154176Beusaamb105erics_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrGIsWRmVeSWpSXmKPExsUyuXSPn27Em8thBm1XdS2mbT7IbLHhz0Z2 i4MnGpgtjh56z+rA4nHv7mImjym/N7J6PNoe77FkyU+mAJYoLpuU1JzMstQifbsErow1t9+y F6wwrZj7cjl7A+Ne3S5GTg4JAROJxd9vsUPYYhIX7q1n62Lk4hASOMIosX7WNUYIZzmjRM+r /6wgVWwCehIfp/4E6uDgEBGIkNi/jAkkzCwQKnHlYAsLiC0s4C2x+fIMNogSH4lHa2VBwiIC SRJzL14F28UioCqx5sAZNhCbV8BX4tGRTnaIVReYJWav2AyW4BRwlbjwcA+YzQh03PdTa6B2 iUvcejKfCeJoAYkle84zQ9iiEi8f/2OFsJUkPv6ezw5Rny9xruMhK8QyQYmTM5+wTGAUnYVk 1CwkZbOQlEHEdSQW7P7EBmFrSyxb+JoZxj5z4DETsvgCRvZVjBylxQU5uelGBpsYgbF3TIJN dwfj/emehxgFOBiVeHg3OF8OE2JNLCuuzD3EKMHBrCTCu+wqUIg3JbGyKrUoP76oNCe1+BCj NAeLkjjvUof1YUIC6YklqdmpqQWpRTBZJg5OqQbGieor0yZErm+Z8eDp/saZP80fPlrI3Vr8 I7zmViqX1S4Pr1W659msw5wL5vWwP+Wx01I59kb//ky9R5daLITOSfCt4njI3GeTIvKlqrjN w0b2wJHSg909B/fmL3Fnt+i/NX1trM/X2x/+63z8LTnv/lPGpPUXHm/3WT9BpG1aaVHKxA/f FNV8lFiKMxINtZiLihMBk/JS6bkCAAA=
Archived-At: <http://mailarchive.ietf.org/arch/msg/isis-wg/PNee_Z1axhi7Bm6DkeOEyZovd1g>
Cc: Christian Hopps <chopps@chopps.org>, "isis-wg@ietf.org list" <isis-wg@ietf.org>
Subject: Re: [Isis-wg] WG Adoption Call for draft-xu-isis-encapsulation-cap
X-BeenThere: isis-wg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF IS-IS working group <isis-wg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/isis-wg/>
List-Post: <mailto:isis-wg@ietf.org>
List-Help: <mailto:isis-wg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Feb 2016 07:18:25 -0000

Les,

        >Hannes -
        >Discovery of tunnel endpoints is not what this draft is about.

[Uma]: Discovering tunnel-endpoint is beyond the scope of this document.
              Let me give you 2 examples.

1.      In-line loop free alternate application like RLFA:  Each IS-IS node capable of RLFA with provisioned  protection requirements (Link/node/SRLG) would compute
        Tunnel-endpoints (PQ-node/Repair node) so that packets can be encapsulated to that end point  to reach the eventual destination. So, here discovering  the loop free  tunnel end point is described in  RFC 7490 - https://tools.ietf.org/html/rfc7490 .
               2. For segment routing:  If an immediate neighbor doesn't support SR (no SRGB), the advertising node's node SID can't  be used to compute the outgoing label. In this        case your tunnel endpoint is the node which advertises the node SID (nothing to discover). Here, knowing the egress node decapsulating capabilities through this
           draft help encapsulating packets to the end point (node  which advertised the node-SID). This is clearly explained in
                     https://tools.ietf.org/html/draft-xu-spring-islands-connection-over-ip-04   (this has been referred in section-1 of the draft)

        > I am saying that I do not see that announcing tunnel capabilities is useful.
               > Discovering tunnel endpoints obviously is useful - as is identifying endpoint addresses - but this draft will help us do neither.

[Uma]: I can't begin to comprehend  on how to respond here...

        A. This is draft just advertises the decapsulation capabilities and associated parameters for particular tunnel types.
                B.  "discovering tunnel-endpoints" is done differently for each application differently as referred in section-1 and it's out of the
                       scope for this document as explained above.

--
Uma C.