Re: [Isis-wg] draft-eastlake-isis-trill-00.txt
mike shand <mshand@cisco.com> Fri, 25 June 2010 09:36 UTC
Return-Path: <mshand@cisco.com>
X-Original-To: isis-wg@core3.amsl.com
Delivered-To: isis-wg@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 118EB3A67B4 for <isis-wg@core3.amsl.com>; Fri, 25 Jun 2010 02:36:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.854
X-Spam-Level:
X-Spam-Status: No, score=-9.854 tagged_above=-999 required=5 tests=[AWL=-0.745, BAYES_05=-1.11, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1j71fkfJHcir for <isis-wg@core3.amsl.com>; Fri, 25 Jun 2010 02:36:23 -0700 (PDT)
Received: from rtp-iport-2.cisco.com (rtp-iport-2.cisco.com [64.102.122.149]) by core3.amsl.com (Postfix) with ESMTP id D30D43A680B for <isis-wg@ietf.org>; Fri, 25 Jun 2010 02:36:22 -0700 (PDT)
Authentication-Results: rtp-iport-2.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEAF4VJExAZnwN/2dsb2JhbACfQXGmWZpXgneCKgQ
X-IronPort-AV: E=Sophos;i="4.53,480,1272844800"; d="scan'208";a="125471267"
Received: from rtp-core-2.cisco.com ([64.102.124.13]) by rtp-iport-2.cisco.com with ESMTP; 25 Jun 2010 09:36:28 +0000
Received: from [10.61.106.123] (dhcp-10-61-106-123.cisco.com [10.61.106.123]) by rtp-core-2.cisco.com (8.13.8/8.14.3) with ESMTP id o5P9aRwH029755 for <isis-wg@ietf.org>; Fri, 25 Jun 2010 09:36:28 GMT
Message-ID: <4C24789B.8000308@cisco.com>
Date: Fri, 25 Jun 2010 10:36:27 +0100
From: mike shand <mshand@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.9.1.10) Gecko/20100512 Lightning/1.0b1 Thunderbird/3.0.5
MIME-Version: 1.0
To: isis-wg@ietf.org
References: <AANLkTikhOPPBmFjQo7geYIo4Rv9FqICCCBE9X-fRjBUs@mail.gmail.com>
In-Reply-To: <AANLkTikhOPPBmFjQo7geYIo4Rv9FqICCCBE9X-fRjBUs@mail.gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Subject: Re: [Isis-wg] draft-eastlake-isis-trill-00.txt
X-BeenThere: isis-wg@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF IS-IS working group <isis-wg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/isis-wg>
List-Post: <mailto:isis-wg@ietf.org>
List-Help: <mailto:isis-wg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Jun 2010 09:36:28 -0000
Donald, A few comments, mostly relatively minor, but with some more substantial ones about PDU types towards the end. General... The terms TRILL IS, IS, Intermediate System and RBridge seem to be used interchangeably. Is there in fact any distinction being made by the different terms, or should they all be replaced by a common term? Some TLV descriptions specify explicitly that multiple instances and or zero instances are permitted, but others don't. It would be helpful either to explicitly state each case, or announce a convention such as that only a single instance is allowed unless explicitly permitted. Aha! I now see that the tables at the end specify the number of instances permitted. Perhaps it would actually be better to say nothing about the number of times TLVs and sub-TLVs may occur in their textual descriptions and leave it to the tables at the end? -------------------------------------------------------------- 2.2 Multi-Topology aware Port Capability TLV The Multi Topology aware Port Capability (MT-PORT-CAP) TLV is IS-IS TLV type 143 [TBD] and has the format show below. The sub-TLVs that it carries are a new series of sub-TLVs. TYPO s/show/shown/ Topology Identifier I'm a little puzzled why this appears to be different from the corresponding field in the GMAC-ADDR sub-TLV. One is called a topology ID and the other a topology identifier, and in one case the top 4 bits are reserved, and in the other they are not. --------------------------------------------------------------- 2.3 Sub-TLVs for the Router Capability TLV The Router Capability TLV is specified in [RFC4971] and may be generated by the originating IS. All of the sub-sections below of Stating that this may be generated by the originating IS is somewhat superfluous (and perhaps implies that other TLVs may be generated by systems other than the originating IS, which, with the notable exception of the newly proposed purge ID TLV, is not the case) ---------------------------------------------------------------- 2.3.4 The Tree Identifiers Sub-TLV In the event a tree identifier can be computed from two such sub-TLVs and are different, TYPO presumably this should read "and they are different". 2.3.5 The Trees Used Identifiers Sub-TLV and the trees listed are those that the originating intermediate systems wishes TYPO? Presumably "that the originating system wishes". But see also the general comment about consistency of nomenclature ----------------------------------------------------------- 2.3.6 Interested VLANs and Spanning Tree Roots sub-TLV In the LSPs originated by an IS, Perhaps better, "In the set of LSPs....." The largest appoint forwarder TYPO? s/appoint/appointed/ R, RESV: These reserved bits MUST be set as zero TYPO: s/set/sent/ Appointed Forwarder Status Lost Counter: I assume this is a 4 byte counter to avoid the possibility that it might wrap. I also assume that it is initialised to zero when the RBridge is started. I can't see see any specific information about when and how it is initialised in the TRILL spec reference quoted. ---------------------------------------------------------------- 2.4 MTU sub-TLV of the Extended Reachability TLV It occurs nested as within Strange turn of phrase (copied from the original common layer 2 spec I think). Just "It occurs within.." would suffice. ----------------------------------------------------------------- 2.5 TRILL Neighbor TLV The TRILL Neighbor TLV is used in TRILL-Hellos (see Section 4.1 below) in place of the IS Neighbor TLV, as specified in Section 4.4.2.1 of [RFCtrill]. This is somewhat confusing. I assume it is saying that the TRILL neighbor TLV is used in a TRILL Hello in place of the IS Neighbor TLV in an IIH?? While the requirements for there to be no gaps, and the possibility of overlaps is called out in the referenced section of the TRILL spec, the necessity for an ID to appear in multiple "fragments" to ensure that condition is not obvious, and I wonder if some clarification is required, either here, or in the TRILL spec itself. F: failed. This bit is a one if MTU testing to their neighbor should that be "to this neighbor"? ------------------------------------------------------------- 3. The MTU PDUs Are two seperate PDUs really required. Would not a single PDU type with a flag to indicate probe or ACK suffice? The MTU PDUs have the standard IS-IS PDU common header It's not very clear what is meant by "the standard IS-IS PDU common header". I assume this is up to and including the "Maximum Area Addresses" field, but this needs to be explicitly stated. The Ack Source ID is set to zero in MTU-probe PDUs. An Intermediate System issuing an MTU-ack set this field TYPO: s/set this field/sets this field/ and MUST be padded to the size being tested with the Padding TLV. HOW must it be padded? Does it use the pad TLV (8) defined for IIHs, and if so does the padding have to be exact? (See clause 8.2.3 of ISO/IEC 10589). Or is the length simply extended with no "filling" with TLVs? ---------------------------------------------------------------- 4.1 TRILL-Hello PDUs Instead, TRILL-Hellos uses the TRILL TYPO: s/uses/use/ 4.2 Area Address The TRILL uses TYPO: s/TRILL/TRILL-Hello. --------------------------------------------------------- 6.1 Allocations From Existing Registries The final "NUMBER" column indicates the permitted number of occurrences of the sub-TLV in their TLV as follows: Since a router Capability TLV is permitted to occur multiple times within the set of LSPs generated by a particular system, there seems to be the potential for a sub-TLV with NUMBER 0-1 to occur exactly once within multiple router capability TLVs, which would appear to be in conformance with these restrictions, but in fact should still have unspecified results. I think this wording needs tightening up. ------------------------------------------------------------- 6.2 New Sub-Registries Created and Their Initial Contents The final "NUMBER" column indicates the permitted number of occurrences of the sub-TLV cumulatively within all the occurrences of their TLV in a particular PDU as follows: While I don't think this is an issue in the spec as currently defined (but see below), there is a potential ambiguity if this text were used to define the number of permissible occurrences within a PDU, and the PDU type was LSP and the restriction was exactly 1. This arises from the confusion between PDUs, LSPs and so called LSP fragments. As written, the text would appear to permit exactly one instance of the TLV in each individual LSP (i.e. PDU, with type LSP) generated by a particular system. This, I think, is not the intent. The actual requirement is that there MUST be exactly one instance within the entire set of LSPs (sometimes, in my opinion, erroneously referred to as LSP fragments) generated by a particular system. Since the required action on violation of this constraint is for the PDU to be ignored, it is critical that implementations perform this check consistently, since it could otherwise result in some systems ignoring an entire erroneous PDU (which may contain other significant routing data), and other systems making use of the PDU, and hence potentially generating routing loops. Clearly, such a situation would only occur when the generating system was non-conformant, but we have plenty of instances of non-conformant IS-IS implementations in the wild, and it would seem wise to be as conservative here as possible. I repeat, that this is not an issue in the current spec, but I am concerned either that at some stage the spec would be extended to include the ambiguous case, or that some other spec would take this text as the definitive way of documenting such restrictions and would fall into this trap. I think it could be fixed simply by saying The final "NUMBER" column indicates the permitted number of occurrences of the sub-TLV cumulatively within all the occurrences of their TLV in a particular PDU, or in the case of LSPs the entire set of LSPs generated by the systrem as follows: However, on reflection, since TRILL HELLOS (aka IIHs) are now permitted to be "fragmented", do we indeed have this problem? Presumably it is permitted for sequential IIHs containing different ranges of neighbor records to all contain an MT port capability TLV containing VLAN and Flags, provided that it doesn't occur multiple times within the same actual PDU? In any case I think some clarification is required. --------------------------------------------------------------------------- 8.1 Normative References [IS-IS] - ISO/IEC 10589, "Intermediate System to Intermediate System Intra-Domain Routing Exchange Protocol for use in Conjunction with the Protocol for Providing the Connectionless-mode Network Service (ISO 8473)", 2002. Just to be absolutely clear that we are referencing the second edition, it is usual to quote this reference as ISO/IEC 10589:2002, Second Edition ---------------------------------------------------------- END of comments Mike On 11/06/2010 18:53, Donald Eastlake wrote: > Hi, > > I've submitted a draft proposing IS-IS support for TRILL: > http://tools.ietf.org/html/draft-eastlake-isis-trill-00 > > Thanks, > Donald > ============================= > Donald E. Eastlake 3rd +1-508-333-2270 (cell) > 155 Beaver Street > Milford, MA 01757 USA > d3e3e3@gmail.com <mailto:d3e3e3@gmail.com> > > > _______________________________________________ > Isis-wg mailing list > Isis-wg@ietf.org > https://www.ietf.org/mailman/listinfo/isis-wg > -- For corporate legal information go to: www.cisco.com/web/about/doing_business/legal/cri
- [Isis-wg] draft-eastlake-isis-trill-00.txt Donald Eastlake
- Re: [Isis-wg] draft-eastlake-isis-trill-00.txt Donald Eastlake
- Re: [Isis-wg] draft-eastlake-isis-trill-00.txt Donald Eastlake
- Re: [Isis-wg] draft-eastlake-isis-trill-00.txt mike shand
- Re: [Isis-wg] draft-eastlake-isis-trill-00.txt mike shand
- Re: [Isis-wg] draft-eastlake-isis-trill-00.txt Donald Eastlake