Re: Advancing the Protocol and Morin Drafts

Thomas Morin <thomas.morin@orange-ftgroup.com> Thu, 23 October 2008 08:29 UTC

Return-Path: <l3vpn-bounces@ietf.org>
X-Original-To: l3vpn-archive@megatron.ietf.org
Delivered-To: ietfarch-l3vpn-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5CEC33A6C1F; Thu, 23 Oct 2008 01:29:48 -0700 (PDT)
X-Original-To: l3vpn@core3.amsl.com
Delivered-To: l3vpn@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3BED83A6C1A for <l3vpn@core3.amsl.com>; Thu, 23 Oct 2008 01:29:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.249
X-Spam-Level:
X-Spam-Status: No, score=-3.249 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_FR=0.35, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wPLfYXt-vpoI for <l3vpn@core3.amsl.com>; Thu, 23 Oct 2008 01:29:46 -0700 (PDT)
Received: from p-mail1.rd.francetelecom.com (p-mail1.rd.francetelecom.com [195.101.245.15]) by core3.amsl.com (Postfix) with ESMTP id 1558D3A6935 for <l3vpn@ietf.org>; Thu, 23 Oct 2008 01:29:45 -0700 (PDT)
Received: from ftrdmel10.rd.francetelecom.fr ([10.193.117.156]) by ftrdsmtp2.rd.francetelecom.fr with Microsoft SMTPSVC(6.0.3790.1830); Thu, 23 Oct 2008 10:30:01 +0200
Received: from [10.193.15.26] ([10.193.15.26]) by ftrdmel10.rd.francetelecom.fr with Microsoft SMTPSVC(6.0.3790.1830); Thu, 23 Oct 2008 10:30:02 +0200
Subject: Re: Advancing the Protocol and Morin Drafts
From: Thomas Morin <thomas.morin@orange-ftgroup.com>
To: IJsbrand Wijnands <ice@cisco.com>
In-Reply-To: <A83F0692-7169-4BBE-B57D-9AA23AA88B52@cisco.com>
References: <0E3033029745FB4C8BE6F1A3752FAE59E791DF@misout7msgusr7b.ugd.att. com> <1224680522.20832.74.camel@l-at11168.FTRD> <2B7BA8FF-2819-451D-B018-5EB9DFFE764B@cisco.com> <1224687111.20832.82.camel@l-at11168.FTRD> <A83F0692-7169-4BBE-B57D-9AA23AA88B52@cisco.com>
Content-Type: text/plain
Organization: France Telecom R&D - Orange Labs
Date: Thu, 23 Oct 2008 10:30:01 +0200
Message-Id: <1224750601.5371.54.camel@l-at11168.FTRD>
Mime-Version: 1.0
X-Mailer: Evolution 2.22.3.1
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 23 Oct 2008 08:30:02.0057 (UTC) FILETIME=[8AFC1390:01C934E9]
Cc: Ross Callon <rcallon@juniper.net>, L3VPN <l3vpn@ietf.org>
X-BeenThere: l3vpn@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <l3vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/l3vpn>, <mailto:l3vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/l3vpn>
List-Post: <mailto:l3vpn@ietf.org>
List-Help: <mailto:l3vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l3vpn>, <mailto:l3vpn-request@ietf.org?subject=subscribe>
Sender: l3vpn-bounces@ietf.org
Errors-To: l3vpn-bounces@ietf.org

Hi Ice,

IJsbrand Wijnands :
>
> > For many operators its not "the vendor" but multiple vendors, and  
> > that's
> > why many operators (and apparently other IETF contributors too) see an
> > interest in standardizing one solution, with options where needed, and
> > not multiple profiles.
> 
> In your last email you say "..Misunderstanding: the draft says "MUST"  
> for both PIM-based and BGP-based C-multicast routing."
> 
> How is that going to help you standardizing one solution?

Well, if an operator deploys equipments with compliant implementations
(implementing both BGP-based and PIM-based C-multicast routing), then he
knows that he will be able to activate the alternative it prefers, and
that it will interoperate.

> I also pointed out earlier that the Morin draft does not say which 
> core tree building protocol needs to be used. This also does not help 
> in getting an interoperable solution.

You possibly haven't read last revision.
Based on Eric comments about P-tunnels, the draft know says: "[the
recommandation is that] implementations implement the P2MP variants of
the P2P protocols that they already implement [..]".
Hence, if you have interoperable unicast tunneling techniques, the
recommandation orient implementations to also provide a set of
interoperable unicast tunneling techniques.

You can argue that this doesn't give *guarantees*, but I think we can
agree that it helps getting interoperability and that we can't
realistically do more. Moreover, RFC2547/4364 doesn't do thing much
differently and doesn't mandate either any specific tunneling
technology.

-Thomas