Re: [Lsr] WG Last Call for "IS-IS Flood Reflection" -draft-ietf-lsr-isis-flood-reflection-06
Tony Przygienda <tonysietf@gmail.com> Thu, 09 December 2021 11:43 UTC
Return-Path: <tonysietf@gmail.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 079083A0A39 for <lsr@ietfa.amsl.com>; Thu, 9 Dec 2021 03:43:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OcgygaGjX5Dg for <lsr@ietfa.amsl.com>; Thu, 9 Dec 2021 03:43:37 -0800 (PST)
Received: from mail-io1-xd2f.google.com (mail-io1-xd2f.google.com [IPv6:2607:f8b0:4864:20::d2f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C7DD93A0948 for <lsr@ietf.org>; Thu, 9 Dec 2021 03:43:37 -0800 (PST)
Received: by mail-io1-xd2f.google.com with SMTP id b187so6197333iof.11 for <lsr@ietf.org>; Thu, 09 Dec 2021 03:43:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=8m/Yp8rb7nWDYA7B+/UCUcM0U3TR0yYfTrqdUAzJ2Wo=; b=XxAvyhD1s7DaAsvst3Jso05MJAd+5pJ5W7HJRoLMl0dckFj0Y6WE6zpX0ii7yPx8mf vPPUUuIehcps9uFrP669fVPMfnKxhuuQXqVimabcCZxoBbBYyZZHnPDUrCbvDXfflP1U I8MRxcryTEWazv0KZz3mQeM4vNgou8jHcPDiKaETzwhTBVsuhws1zlAufKFXNuaUYkC8 LPjuxuE2UDS40KTZcjsCrYhUJ1o9nbK54+fb+T40Jzzs+tC6vEtMIuyX7SFKvDiCVWl2 2l0zREC1wBpesxcKT/vnwQjcP/J4HKPbUiO6j6mhmdAeNSWISWQb943kGoAYbAFczbf1 ncaw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=8m/Yp8rb7nWDYA7B+/UCUcM0U3TR0yYfTrqdUAzJ2Wo=; b=JQlhAFDFbc52B3yan0DeU1qaY513hglwBv8kMr6C7ZkVtBCLk5Ax0/CRnTv1ifRepZ CRWn+H2p/CqRHdCMCjX2GnThP+ATQ6aLYm/WZFbzFLudAjNlouiFVN91/tioif3gPMWI SgFcX0YaBdzwS3fhfSY2CzHbmHBa58v3sXapSuTUlbr8KN0pFO459I7QJdeFheFGhzPS PP04o3FbcebgU0UEdncPPX+UGKduuhxk0/S0784RZyPCOtI+Cw30uV4H175efBDO1zx4 43vLTU8ond4YxDb8/YvH3TasLlTuYObAI1PvesBmCzrI9QWHyxzBYVHCasZb0VVcgMqd fIuw==
X-Gm-Message-State: AOAM5305dVdVec/SYWlu0BmZED4Re6G1zbmFZYSJWCKoQkJ7nBZAJXmf p+dpNvWriL//talmHDtmuKRMdsIbdDo3O3c/3oU=
X-Google-Smtp-Source: ABdhPJz1Kv5JAUkq+mfG9JWwReakg7bfPZD08mDftGSkQgvFr84ZJYnfrsoBeZDmTuWvlhR71YH08y/8DfNcrzFgRkE=
X-Received: by 2002:a02:a489:: with SMTP id d9mr7671832jam.47.1639050216788; Thu, 09 Dec 2021 03:43:36 -0800 (PST)
MIME-Version: 1.0
References: <1649F25F-7CC3-4054-960E-CA5ED1B8273F@cisco.com> <CO1PR05MB83148D3C5804107698E35F97D56E9@CO1PR05MB8314.namprd05.prod.outlook.com>
In-Reply-To: <CO1PR05MB83148D3C5804107698E35F97D56E9@CO1PR05MB8314.namprd05.prod.outlook.com>
From: Tony Przygienda <tonysietf@gmail.com>
Date: Thu, 09 Dec 2021 12:43:01 +0100
Message-ID: <CA+wi2hMreaEXYncaGSosKidcnF8ACpBJ15aSMb2CWwmP=97GfQ@mail.gmail.com>
To: Shraddha Hegde <shraddha=40juniper.net@dmarc.ietf.org>
Cc: "Acee Lindem (acee)" <acee=40cisco.com@dmarc.ietf.org>, Antoni Przygienda <prz@juniper.net>, "lsr@ietf.org" <lsr@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000f0d68105d2b51d3f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/gVfHoT5w1-ei7hdYnfImWwDqJE4>
Subject: Re: [Lsr] WG Last Call for "IS-IS Flood Reflection" -draft-ietf-lsr-isis-flood-reflection-06
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Dec 2021 11:43:42 -0000
comments addressed and new version posted -- tony On Tue, Dec 7, 2021 at 7:24 AM Shraddha Hegde <shraddha= 40juniper.net@dmarc.ietf.org> wrote: > This is a very useful feature for large L2 networks and I support the > publication of this > > document. > > > > > > I have below nits/suggestions on the document. > > > > > > 1. Figure 1: Example Topology of L1 with L2 Borders > > The diagram is not legible. The connections between L1 routers > > can be removed from the diagram and a description can be added that > > R1 layer routers are all connected to R2 layer and so on. > > From the diagram it appears that there is connectivity between R10 and R11 > > and R11 and R12. If so that link can flood L2 domains and L2 is not > > fully disjoint. I would suggest to remove the R10->R11 link to show a pure > clos topology > > in L1. > > > > 2. > > 4.1 Flood reflection TLV > > "On a given router, the same value > > of the Flood Reflection Cluster ID MUST be advertised across all > > interfaces advertising the Flood Reflection TLV in IIHs. " > > > > Do we really need this restriction of one single cluster-id on a router? > > I am imagining, this cluster-id mechanism can be used to segregate a > single fabric > > into two or more clusters if the fabric size becomes too huge. > > The usecase itself is described out of scope for this document elsewhere > > which is fine but too restrictive statements like above would discourage > further > > enhancements so may be worth considering these restrictions to be removed. > > > > 3. > > 4.2. Flood Reflection Discovery Sub-TLV > > " A router receiving multiple Flood Reflection > > Discovery sub-TLVs in TLV 242 MUST use the values in the first sub- > > TLV" > > > > first sub-TLV is not deterministic as multiple TLV 242 can come is > different fragments. > > Suggest to change as below. > > " A router receiving multiple Flood Reflection > > Discovery sub-TLVs in TLV 242 MUST use the values in the first sub- > > TLV of the lowest numbered fragment" > > > > 4. > > "flood reflection tunnel endpoint" and "L1 shortcut" > > terminology should be added to the glossary. These terms are used in > sec 4.3 > > and reader may not get the context of these terms. > > > > > > > > 5. section 4.3 > > > > do we need the F bit? Looks like this info can be derived from the > > C bit in Flood Reflection Discovery Sub-TLV. The ones with C bit set > are possible shortcut endpoints. > > The ones with C bit cleared are the flood reflector tunnel endpoints. > > > > > > 6. The tunnel encapsulation attribute has use outside of flood reflector > > (such as RFC 8663). I am more in favor of getting rid of the F bit from > this sub-TLV > > as to avoid the confusions that may arise when it is used in the > absence of flood reflectors. > > > > 7. > > " A flood reflector receiving multiple Flood Reflection Discovery > > Tunnel Type sub-sub-TLVs in Flood Reflection Discovery sub-TLV with F > > flag set SHOULD use one or more of the specified tunnel endpoints to > > automatically establish one or more tunnels that will serve as flood > > reflection adjacency(-ies)." > > > > A flood reflector should establish tunnels with clients only and not > with > > other flood reflectors. also the cluster id needs to match. > > This text as well as next para needs revision. > > > > 8. sec 4.4 > > > > "The Flood Reflection Adjacency sub-TLV SHOULD NOT appear more than > > once in a given TLV. A router receiving multiple Flood Reflection > > Adjacency sub-TLVs in a TLV MUST use the values in the first sub-TLV > > and it SHOULD adequately log such violations subject to rate > > limiting." > > > > IMO should talk abt possibility of same TLV 22 in multiple fragments > and > > MUST use first sub-TLV from lowest numbered fragment. > > > > 9. > > > > "If the clients have a > > direct L2 adjacency they SHOULD use it instead of instantiating a new > > tunnel." > > > > above statement seems to contradict statement below in sec 4.5 > > " A router acting as a flood reflector MUST NOT have any traditional L2 > > adjacencies. " > > > > > > > > > > Juniper Business Use Only > > *From:* Lsr <lsr-bounces@ietf.org> *On Behalf Of *Acee Lindem (acee) > *Sent:* Friday, December 3, 2021 9:22 PM > *To:* Antoni Przygienda <prz@juniper.net> > *Cc:* lsr@ietf.org > *Subject:* [Lsr] WG Last Call for "IS-IS Flood Reflection" > -draft-ietf-lsr-isis-flood-reflection-06 > > > > *[External Email. Be cautious of content]* > > > > Speaking as WG member: > > > > I have already supported publication. I have a couple comments: > > > > 1. Can you add “leave” to the glossary in section 2? > 2. Section 5.2 is a bit hard to read. I have some suggested changes in > my > > editorial comments but it would be good to expand the cases into smaller > > chunks and make state the overall goals ahead rather than after the > details. > > Your call though. > > 1. In section 7, would an IS-IS router really set the overload-bit in > L1 but not L2? > > > > > > I’ve also attached some suggested editorial changes. Some of these are > very subjective > > and I won’t feel bad if you don’t include them all. > > > > Thanks, > > Acee > _______________________________________________ > Lsr mailing list > Lsr@ietf.org > https://www.ietf.org/mailman/listinfo/lsr >
- [Lsr] WG Last Call for "IS-IS Flood Reflection" -… Acee Lindem (acee)
- Re: [Lsr] WG Last Call for "IS-IS Flood Reflectio… Antoni Przygienda
- Re: [Lsr] WG Last Call for "IS-IS Flood Reflectio… Shraddha Hegde
- Re: [Lsr] WG Last Call for "IS-IS Flood Reflectio… Aijun Wang
- Re: [Lsr] WG Last Call for "IS-IS Flood Reflectio… Tony Przygienda
- Re: [Lsr] WG Last Call for "IS-IS Flood Reflectio… Tony Przygienda