Re: Advancing the Protocol and Morin Drafts

IJsbrand Wijnands <ice@cisco.com> Thu, 23 October 2008 12:05 UTC

Return-Path: <l3vpn-bounces@ietf.org>
X-Original-To: l3vpn-archive@megatron.ietf.org
Delivered-To: ietfarch-l3vpn-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C57583A6A6B; Thu, 23 Oct 2008 05:05:09 -0700 (PDT)
X-Original-To: l3vpn@core3.amsl.com
Delivered-To: l3vpn@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CBA583A6894 for <l3vpn@core3.amsl.com>; Thu, 23 Oct 2008 05:05:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CDUYhIi9RPfR for <l3vpn@core3.amsl.com>; Thu, 23 Oct 2008 05:05:01 -0700 (PDT)
Received: from av-tac-bru.cisco.com (odd-brew.cisco.com [144.254.15.119]) by core3.amsl.com (Postfix) with ESMTP id E86213A680B for <l3vpn@ietf.org>; Thu, 23 Oct 2008 05:05:00 -0700 (PDT)
X-TACSUNS: Virus Scanned
Received: from strange-brew.cisco.com (localhost [127.0.0.1]) by av-tac-bru.cisco.com (8.11.7p3+Sun/8.11.7) with ESMTP id m9NC61126324; Thu, 23 Oct 2008 14:06:01 +0200 (CEST)
Received: from [10.55.191.152] (ams-iwijnand-8717.cisco.com [10.55.191.152]) by strange-brew.cisco.com (8.11.7p3+Sun/8.11.7) with ESMTP id m9NC5mG26028; Thu, 23 Oct 2008 14:05:58 +0200 (CEST)
In-Reply-To: <1224750601.5371.54.camel@l-at11168.FTRD>
References: <0E3033029745FB4C8BE6F1A3752FAE59E791DF@misout7msgusr7b.ugd.att. com> <1224680522.20832.74.camel@l-at11168.FTRD> <2B7BA8FF-2819-451D-B018-5EB9DFFE764B@cisco.com> <1224687111.20832.82.camel@l-at11168.FTRD> <A83F0692-7169-4BBE-B57D-9AA23AA88B52@cisco.com> <1224750601.5371.54.camel@l-at11168.FTRD>
Mime-Version: 1.0 (Apple Message framework v753.1)
Content-Type: text/plain; charset="US-ASCII"; delsp="yes"; format="flowed"
Message-Id: <4406AA83-934C-4628-8DA7-16C9AB88F14A@cisco.com>
Content-Transfer-Encoding: 7bit
From: IJsbrand Wijnands <ice@cisco.com>
Subject: Re: Advancing the Protocol and Morin Drafts
Date: Thu, 23 Oct 2008 14:05:47 +0200
To: Thomas Morin <thomas.morin@orange-ftgroup.com>
X-Mailer: Apple Mail (2.753.1)
Cc: Ross Callon <rcallon@juniper.net>, L3VPN <l3vpn@ietf.org>
X-BeenThere: l3vpn@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <l3vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/l3vpn>, <mailto:l3vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/l3vpn>
List-Post: <mailto:l3vpn@ietf.org>
List-Help: <mailto:l3vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l3vpn>, <mailto:l3vpn-request@ietf.org?subject=subscribe>
Sender: l3vpn-bounces@ietf.org
Errors-To: l3vpn-bounces@ietf.org

>> In your last email you say "..Misunderstanding: the draft says "MUST"
>> for both PIM-based and BGP-based C-multicast routing."
>>
>> How is that going to help you standardizing one solution?
>
> Well, if an operator deploys equipments with compliant implementations
> (implementing both BGP-based and PIM-based C-multicast routing),  
> then he
> knows that he will be able to activate the alternative it prefers, and
> that it will interoperate.

What you are saying is not very different from what we document in  
our profiles. You just call it alternatives with the same MVPN  
solution set, we spell out the alternatives and call it profiles.


>
>> I also pointed out earlier that the Morin draft does not say which
>> core tree building protocol needs to be used. This also does not help
>> in getting an interoperable solution.
>
> You possibly haven't read last revision.
> Based on Eric comments about P-tunnels, the draft know says: "[the
> recommandation is that] implementations implement the P2MP variants of
> the P2P protocols that they already implement [..]".
> Hence, if you have interoperable unicast tunneling techniques, the
> recommandation orient implementations to also provide a set of
> interoperable unicast tunneling techniques.
>
> You can argue that this doesn't give *guarantees*, but I think we can
> agree that it helps getting interoperability and that we can't
> realistically do more. Moreover, RFC2547/4364 doesn't do thing much
> differently and doesn't mandate either any specific tunneling
> technology.

I disagree, because I prefer an approach that guarantees  
interoperability, that is the first priority of the IETF. The second  
priority is to converge on a single solution. You are limiting the  
building blocks and hope the end result will be interoperable.

Thx,

Ice.