[OSPF] FW: New Version Notification for draft-ietf-ospf-link-overload-03.txt

Shraddha Hegde <shraddha@juniper.net> Tue, 14 February 2017 03:34 UTC

Return-Path: <shraddha@juniper.net>
X-Original-To: ospf@ietfa.amsl.com
Delivered-To: ospf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB7B2129463 for <ospf@ietfa.amsl.com>; Mon, 13 Feb 2017 19:34:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.922
X-Spam-Level:
X-Spam-Status: No, score=-1.922 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=junipernetworks.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o5I1V9kiTX2f for <ospf@ietfa.amsl.com>; Mon, 13 Feb 2017 19:34:28 -0800 (PST)
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (mail-sn1nam02on0104.outbound.protection.outlook.com [104.47.36.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D65BF129456 for <ospf@ietf.org>; Mon, 13 Feb 2017 19:34:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=junipernetworks.onmicrosoft.com; s=selector1-juniper-net; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=tgmy9SL2VVx251Mb97PIDXj1A29/mrqnpG1gX1DSfLM=; b=SqDohyQcn0L4lgwlKbIG/c94WjSiv2pQW+m2HvaagNsdSr0mtovCQz3GKYcjXs8SWpysjz8qo3m9mcKrf8WfC7YubRbrIRuFymRA6D4i+5VPFOlJ9Nf80n87Q3Hc8sG8LXGiUwXFgxMz/vGvitF428tz+VWQdXLkRoQE5/YRJWw=
Received: from BN3PR05MB2706.namprd05.prod.outlook.com (10.167.2.135) by BN3PR05MB2707.namprd05.prod.outlook.com (10.167.2.136) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.919.10; Tue, 14 Feb 2017 03:34:25 +0000
Received: from BN3PR05MB2706.namprd05.prod.outlook.com ([10.167.2.135]) by BN3PR05MB2706.namprd05.prod.outlook.com ([10.167.2.135]) with mapi id 15.01.0919.011; Tue, 14 Feb 2017 03:34:25 +0000
From: Shraddha Hegde <shraddha@juniper.net>
To: OSPF WG List <ospf@ietf.org>
Thread-Topic: New Version Notification for draft-ietf-ospf-link-overload-03.txt
Thread-Index: AQHShb+nXSwL56jZWE6+wrEZS+itXqFnE0kg
Date: Tue, 14 Feb 2017 03:34:25 +0000
Message-ID: <BN3PR05MB2706EA303194E3C9D6FB6BCBD5580@BN3PR05MB2706.namprd05.prod.outlook.com>
References: <148696612940.6290.973095830249984185.idtracker@ietfa.amsl.com>
In-Reply-To: <148696612940.6290.973095830249984185.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=shraddha@juniper.net;
x-originating-ip: [116.197.184.14]
x-ms-office365-filtering-correlation-id: ae4c1923-99cb-4747-203b-08d4548a5fae
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(48565401081); SRVR:BN3PR05MB2707;
x-microsoft-exchange-diagnostics: 1; BN3PR05MB2707; 7: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
x-microsoft-antispam-prvs: <BN3PR05MB270716D7E4097A8897F5F3F9D5580@BN3PR05MB2707.namprd05.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(120809045254105)(138986009662008)(154440410675630);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040375)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(6055026)(6041248)(20161123558025)(20161123564025)(20161123562025)(20161123555025)(20161123560025)(6072148); SRVR:BN3PR05MB2707; BCL:0; PCL:0; RULEID:; SRVR:BN3PR05MB2707;
x-forefront-prvs: 0218A015FA
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(7916002)(39450400003)(39860400002)(39850400002)(39410400002)(39840400002)(377454003)(199003)(53754006)(13464003)(189002)(377424004)(2900100001)(230783001)(3280700002)(66066001)(15650500001)(6916009)(2950100002)(122556002)(229853002)(77096006)(101416001)(3846002)(6116002)(102836003)(2906002)(105586002)(106356001)(106116001)(99286003)(55016002)(9686003)(2473003)(6306002)(7696004)(6436002)(450100001)(6506006)(92566002)(25786008)(76176999)(54356999)(50986999)(5660300001)(97736004)(86362001)(53936002)(74316002)(8936002)(8676002)(305945005)(7736002)(81166006)(81156014)(3660700001)(33656002)(68736007)(38730400002)(110136004)(81003)(189998001); DIR:OUT; SFP:1102; SCL:1; SRVR:BN3PR05MB2707; H:BN3PR05MB2706.namprd05.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Feb 2017 03:34:25.2468 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN3PR05MB2707
Archived-At: <https://mailarchive.ietf.org/arch/msg/ospf/hFoWB8uBMvRAv1vU6kf2Zq_kJT8>
Subject: [OSPF] FW: New Version Notification for draft-ietf-ospf-link-overload-03.txt
X-BeenThere: ospf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: The Official IETF OSPG WG Mailing List <ospf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ospf>, <mailto:ospf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ospf/>
List-Post: <mailto:ospf@ietf.org>
List-Help: <mailto:ospf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ospf>, <mailto:ospf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Feb 2017 03:34:30 -0000

Hi All,

New version of the ospf-link-overload draft is submitted and has below changes

> Area level link-overload sub-TLV reverted back to extended link opaque LSA.
> minor editorial corrections.

Let me know if you have any comments.

Rgds
Shraddha

-----Original Message-----
From: internet-drafts@ietf.org [mailto:internet-drafts@ietf.org] 
Sent: Monday, February 13, 2017 11:39 AM
To: Shraddha Hegde <shraddha@juniper.net>; Pushpasis Sarkar <pushpasis.ietf@gmail.com>; Mohan Nanduri <mnanduri@microsoft.com>; Hannes Gredler <hannes@gredler.at>; Luay Jalil <luay.jalil@verizon.com>
Subject: New Version Notification for draft-ietf-ospf-link-overload-03.txt


A new version of I-D, draft-ietf-ospf-link-overload-03.txt
has been successfully submitted by Shraddha Hegde and posted to the IETF repository.

Name:		draft-ietf-ospf-link-overload
Revision:	03
Title:		OSPF Link Overload
Document date:	2017-02-12
Group:		ospf
Pages:		11
URL:            https://www.ietf.org/internet-drafts/draft-ietf-ospf-link-overload-03.txt
Status:         https://datatracker.ietf.org/doc/draft-ietf-ospf-link-overload/
Htmlized:       https://tools.ietf.org/html/draft-ietf-ospf-link-overload-03
Diff:           https://www.ietf.org/rfcdiff?url2=draft-ietf-ospf-link-overload-03

Abstract:
   When a link is being prepared to be taken out of service, the traffic
   needs to be diverted from both ends of the link.  Increasing the
   metric to the highest metric on one side of the link is not
   sufficient to divert the traffic flowing in the other direction.

   It is useful for routers in an OSPFv2 or OSPFv3 routing domain to be
   able to advertise a link being in an overload state to indicate
   impending maintenance activity on the link.  This information can be
   used by the network devices to re-route the traffic effectively.

   This document describes the protocol extensions to disseminate link
   overload information in OSPFv2 and OSPFv3.


                                                                                  


Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat