Re: [Lsr] I-D Action: draft-ietf-lsr-dynamic-flooding-04.txt

Huzhibo <> Sat, 30 November 2019 03:54 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 3F8E51200D6; Fri, 29 Nov 2019 19:54:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id XTfEz1VBxeUn; Fri, 29 Nov 2019 19:54:15 -0800 (PST)
Received: from ( []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id F1F3212009E; Fri, 29 Nov 2019 19:54:14 -0800 (PST)
Received: from (unknown []) by Forcepoint Email with ESMTP id 3826A868FD02648EE5B5; Sat, 30 Nov 2019 03:54:10 +0000 (GMT)
Received: from ( by ( with Microsoft SMTP Server (TLS) id 14.3.408.0; Sat, 30 Nov 2019 03:54:10 +0000
Received: from ([]) by ([]) with mapi id 14.03.0439.000; Sat, 30 Nov 2019 11:54:07 +0800
From: Huzhibo <>
To: "" <>
CC: "" <>, "" <>
Thread-Topic: [Lsr] I-D Action: draft-ietf-lsr-dynamic-flooding-04.txt
Thread-Index: AQHVpG5gFwfvUsjkqU6vwLnm9KH9LKejD3ng
Date: Sat, 30 Nov 2019 03:54:06 +0000
Message-ID: <>
References: <>
In-Reply-To: <>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
x-originating-ip: []
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <>
Subject: Re: [Lsr] I-D Action: draft-ietf-lsr-dynamic-flooding-04.txt
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Sat, 30 Nov 2019 03:54:17 -0000

Hi authors:

    Regarding this Draft, I have always had a question, how does dynamic flooding ensure the reliability of Flooding under multiple points of failure. Flooding depends on the consistent LSDB / Flooding SPF tree across the entire network, and the consistent LSDB on the entire network depends on Flooding. There will be different nodes with different LSDBs. In this case, how to ensure the reliability of Dynamic flooding? IETF 106 meeting says that products have been implemented for Dynamic Flooding. Has the reliability of Dynamic Flooding been tested in multi-point failure scenarios?

Thank you


-----Original Message-----
From: Lsr [] On Behalf Of
Sent: Tuesday, November 26, 2019 11:29 PM
Subject: [Lsr] I-D Action: draft-ietf-lsr-dynamic-flooding-04.txt

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Link State Routing WG of the IETF.

        Title           : Dynamic Flooding on Dense Graphs
        Authors         : Tony Li
                          Peter Psenak
                          Les Ginsberg
                          Huaimo Chen
                          Tony Przygienda
                          Dave Cooper
                          Luay Jalil
                          Srinath Dontula
	Filename        : draft-ietf-lsr-dynamic-flooding-04.txt
	Pages           : 47
	Date            : 2019-11-26

   Routing with link state protocols in dense network topologies can
   result in sub-optimal convergence times due to the overhead
   associated with flooding.  This can be addressed by decreasing the
   flooding topology so that it is less dense.

   This document discusses the problem in some depth and an
   architectural solution.  Specific protocol changes for IS-IS, OSPFv2,
   and OSPFv3 are described in this document.

The IETF datatracker status page for this draft is:

There are also htmlized versions available at:

A diff from the previous version is available at:

Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at

Internet-Drafts are also available by anonymous FTP at:

Lsr mailing list