Re: [Pals] Shepherds review of draft-ietf-pals-endpoint-fast-protection-02
Yimin Shen <yshen@juniper.net> Fri, 24 June 2016 15:28 UTC
Return-Path: <yshen@juniper.net>
X-Original-To: pals@ietfa.amsl.com
Delivered-To: pals@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BAE3D12DB7A for <pals@ietfa.amsl.com>; Fri, 24 Jun 2016 08:28:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.903
X-Spam-Level:
X-Spam-Status: No, score=-1.903 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=junipernetworks.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UFp-7HzchSbR for <pals@ietfa.amsl.com>; Fri, 24 Jun 2016 08:28:25 -0700 (PDT)
Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2on0122.outbound.protection.outlook.com [207.46.100.122]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4841C12B01D for <pals@ietf.org>; Fri, 24 Jun 2016 08:28:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=junipernetworks.onmicrosoft.com; s=selector1-juniper-net; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=K2KLbiLaRuJx00RLHec/HVxccta4WrJwcwmEPSRb9kc=; b=BBNgI8RhK1HrCSdT7CgNCshL/k67o5zF4kTjdYfpQIeuzr9MgHLkGY/AVbnO9vfZ1coROYTgZDyO/a9L2LP8dc9LDZHdFJsvzCwPDMM+AyPhQxGs0Kgr/TQid8xomegc4FNO63nsKOjtpXjkUcZEm+yX3qzF6G1ZaiqwMX9D5U0=
Received: from BN3PR0501MB1554.namprd05.prod.outlook.com (10.161.217.144) by BN3PR0501MB1554.namprd05.prod.outlook.com (10.161.217.144) with Microsoft SMTP Server (TLS) id 15.1.523.12; Fri, 24 Jun 2016 15:28:23 +0000
Received: from BN3PR0501MB1554.namprd05.prod.outlook.com ([10.161.217.144]) by BN3PR0501MB1554.namprd05.prod.outlook.com ([10.161.217.144]) with mapi id 15.01.0523.019; Fri, 24 Jun 2016 15:28:23 +0000
From: Yimin Shen <yshen@juniper.net>
To: Stewart Bryant <stewart.bryant@gmail.com>, "draft-ietf-pals-endpoint-fast-protection@tools.ietf.org" <draft-ietf-pals-endpoint-fast-protection@tools.ietf.org>
Thread-Topic: Shepherds review of draft-ietf-pals-endpoint-fast-protection-02
Thread-Index: AQHRwkZtPlTc+PAPvkqPtiKixB3HpZ/4knmA
Date: Fri, 24 Jun 2016 15:28:22 +0000
Message-ID: <5ABB9C61-5C77-4B6E-B717-A30F5FF9BF3D@juniper.net>
References: <0b99da76-f9b5-7855-fabc-6a91c449bc8d@gmail.com>
In-Reply-To: <0b99da76-f9b5-7855-fabc-6a91c449bc8d@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/0.0.0.160212
authentication-results: spf=none (sender IP is ) smtp.mailfrom=yshen@juniper.net;
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [66.129.241.11]
x-ms-office365-filtering-correlation-id: f8a85220-17f9-491e-2122-08d39c442dd9
x-microsoft-exchange-diagnostics: 1; BN3PR0501MB1554; 6:V3OxuJOs13MgzAFrvGMdfC4yfHJzRcL15RmzTTsekFiLPAOg3Vszu3UbXY1QABkem3KGaqwATSO38LDi++Z7u1h5HiPnPKkIjJ5K8lWLj8p9OUNcwKQiTM+0evcg2e8i8LqBC7JwTXrBneoxuobhkm5tM7+jHeQ/JfkSoodu9YURguoN5kkl+W2VJkuuJVxkL/X+R1Ip/IY/DViRn/C4vZ1XsVxAgN7/8X5VsVwD+9O1NfiF2egNwQ7+nkBCY4TY2sEewVZAz8IQa6wyS5FmuDoVr282eQyRQMCvFUvwdNaNQ8MrKnCglkCI/BSKTIo3RI71/wGjWwvA4Zb4X7Uh/Uqqk/nCIqsXntaQrXiKEXY=; 5:QGI94otkZdTkJi2m+WsKjVjQ4vZ5cfw7dbGwpQLtoG9vjVf8lKgAWx4y7sR635/kUYyPd8aG1V1SeHFTIXMKHnUds4ICT24lfLSdxcrWgU8VkCVDwF7591xpNHPQYty2A8ZQEd7wkSDU7qptw5cc4A==; 24:o45o/FDeCNNtw5o4oJ0ieosGeIdA9DvFXjjpyZMXNCjisA1BBtzeLWtP1DAr7M/eXRhfSPFwDfS4U/YRYFi4bCpoYZ2bjEOHElqtvGIunHI=; 7:icLglg6oNP65tJhCew35i+9ku7jr9q12APrKLMQGTOK/nyG0CkYwIlRdhgvC64yqQsoSPFEXKqWFGvz7EG9SXH9rVk+hz6E3TSZAM50Uwnnnyx5JrehWyyd+bahLw/da+aTuzqWmNjYzr8OFmX2+XbM/tviweJMejaGkXzL0vqpsz9vkntLo+JuqJS+4nss8WGEVFjdZGirJEAeRsLFIV4+4dVTa65gBHXc/HF7XV6gnBsPHdC4TX4inl1amp0N7sSxe53dH1iK4b5B/2KaPvQ==
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BN3PR0501MB1554;
x-microsoft-antispam-prvs: <BN3PR0501MB1554E97FC761BFCA04515D22BD2E0@BN3PR0501MB1554.namprd05.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(8121501046)(5005006)(10201501046)(3002001)(6055026); SRVR:BN3PR0501MB1554; BCL:0; PCL:0; RULEID:; SRVR:BN3PR0501MB1554;
x-forefront-prvs: 0983EAD6B2
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(7916002)(37854004)(57704003)(53754006)(199003)(51444003)(189002)(24454002)(377454003)(586003)(68736007)(106356001)(105586002)(106116001)(7846002)(7736002)(2906002)(6116002)(3846002)(8676002)(102836003)(81156014)(81166006)(50986999)(97736004)(8936002)(5001770100001)(101416001)(4001350100001)(4326007)(305945005)(2501003)(66066001)(189998001)(230783001)(5002640100001)(2900100001)(10400500002)(33656002)(19580405001)(19580395003)(99286002)(36756003)(86362001)(5890100001)(2950100001)(83506001)(11100500001)(82746002)(77096005)(83716003)(54356999)(76176999)(3660700001)(122556002)(3280700002)(92566002)(87936001)(104396002); DIR:OUT; SFP:1102; SCL:1; SRVR:BN3PR0501MB1554; H:BN3PR0501MB1554.namprd05.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <2C77CE991EE554489D1C56FF1E93EED0@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Jun 2016 15:28:22.8934 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN3PR0501MB1554
Archived-At: <https://mailarchive.ietf.org/arch/msg/pals/fyngT7YbyYB4x5p80LZi-zngXPU>
Cc: "pals-chairs@tools.ietf.org" <pals-chairs@tools.ietf.org>, "pals@ietf.org" <pals@ietf.org>
Subject: Re: [Pals] Shepherds review of draft-ietf-pals-endpoint-fast-protection-02
X-BeenThere: pals@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Pseudowire And LDP-enabled Services dicussion list." <pals.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pals>, <mailto:pals-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pals/>
List-Post: <mailto:pals@ietf.org>
List-Help: <mailto:pals-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pals>, <mailto:pals-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Jun 2016 15:28:29 -0000
Hi Stewart, Thanks very much for another detailed review for this draft! We will address these comments with a new version. Thanks, -- Yimin On 6/9/16, 7:59 AM, "Stewart Bryant" <stewart.bryant@gmail.com> wrote: >Hi All, > >Sorry this has taken a long time, but I took over as shepherd a few >weeks ago and have done the customary review of this draft. > >There are no fundamental issues with the text, but there are a lot of >must-fix issues that we need to address before we can take this forward. > >Please see below for details. > >Regards > >- Stewart > >Firstly I ran id-nits and got a lot of output.I am not sure what is >going on with the references because I-D nits >is flagging a lot of them up. I think that it is because it cannot >findthem in square brackets in the text. Annoying as it is we need to >fix them rather than having lots of people work through the nits list. > > > == Unused Reference: 'RFC3985' is defined on line 1280, but no explicit > reference was found in the text > > == Unused Reference: 'RFC5659' is defined on line 1285, but no explicit > reference was found in the text > > == Unused Reference: 'RFC5036' is defined on line 1301, but no explicit > reference was found in the text > > == Unused Reference: 'RFC2205' is defined on line 1310, but no explicit > reference was found in the text > > == Unused Reference: 'RFC3209' is defined on line 1315, but no explicit > reference was found in the text > > == Unused Reference: 'RFC3031' is defined on line 1345, but no explicit > reference was found in the text > > == Unused Reference: 'RFC2328' is defined on line 1350, but no explicit > reference was found in the text > > == Unused Reference: 'RFC5920' is defined on line 1375, but no explicit > reference was found in the text > >These definately need to be fixed if we can. > > ** Downref: Normative reference to an Informational RFC: RFC 3985 > >RFC3985 can be safely moved to info. > > ** Downref: Normative reference to an Informational RFC: RFC 5659 >RFC5659 can be safely moved to info. > > ** Downref: Normative reference to an Informational RFC: RFC 5714 >RFC5714 can be safely moved to info. > > > Summary: 3 errors (**), 0 flaws (~~), 8 warnings (==), 1 comment (--). > > Run idnits with the --verbose option for more detailed information >about > the items above >----------------- > > >1. Introduction > > > > In order to protect the layer-2 service against network failures, it >SB> PWs can carry other than L2, so it think this should be "the PW service" > >--------------- > > The bypass path has the property that it can > guide traffic around the failure, while remaining unaffected by the > topology changes resulting from the failure. When the failure > occurs, the router can invoke the bypass path to achieve fast >SB> which router is "the router" > restoration for the service. > > Today, fast protection against ingress AC failure and ingress (T-)PE > failure can be achievable by using a multi-homed CE and redundant > SB> nit s/achievable/achieved/ > > ACs, such as multi-chassis link aggregation group (MC-LAG). Fast > protection against failure of intermediate router of transport tunnel >SB> nit should be "against the failure of an intermediate" > > can be achievable through RSVP fast-reroute [RFC4090] or IP/LDP fast- >SB> s/achievable/achieved/ > > reroute [RFC5714, RFC5286]. However, there is a lack of equivalent >SB> "of an equivalent" > > mechanism against egress AC failure, egress (T-)PE failure, and S-PE >SB> Maybe you should say: >"However, there is no equivalent mechanism that can be used against >an egress AC failure, an egress (T-)PE failure, or an S-PE failure." > > failure. For these failures, service restoration has to rely on > global repair or control plane repair. Global repair normally > involves ingress CE or ingress (T-)PE switching traffic to another >SB> "involves the ingress CE or the ingress" > >SB> You cannot say "another fully function path" since the first one >SB< failed and thus was not functioning. >SB> I would say "to an alternative path" > fully functional path, based on remote failure detection via PW > status notification, end-to-end OAM, etc. > > The mechanism is applicable to LDP signaled PWs. It is relevant to > networks with redundant PWs and multi-homed CEs. It is designed on > the basis of MPLS upstream label assignment and context-specific > label switching [RFC5331]. Fast protection refers to its ability to > restore traffic in the order of tens of milliseconds. Compared with > global repair and control plane repair, this mechanism can provide > faster service restoration. However, it is intended to complement > those mechanisms, rather than replacing them in any fashion. > >SB> d/in any fashion/ > > >============ > > >3.1. Single-Segment PW > > |<-------------- PW1 --------------->| > > - PE1 -------------- P1 ---------------- PE2 - > / \ >/ \ >CE1 CE2 >\ / > \ / > - PE3 -------------- P2 ---------------- PE4 - > > |<-------------- PW2 --------------->| > > Figure 1 > > > In Figure 1, the IP/MPLS network consists of PE and P routers. It > provides an emulation of a layer-2 service between CE1 and CE2. Each >SB> It may or may not be L2. Why not say "it provides a PW service between >CE1 and CE2? > >============== > > > Note that an egress endpoint failure of the traffic of a given > direction may be detected by the egress CE as an ingress endpoint > failure for the traffic of the reverse direction, except when the > failure is on a link of the primary egress PE within the PSN, or when > the traffic of the reverse direction takes a different active path. > >SB> The text above needs clarification - it is not immediately obvious >SB> what you mean. > > If the CE can detect the failure, it may protect the traffic of the > reverse direction by switching it to the backup path. However, this > is categorized as ingress endpoint failure protection, and hence is > not handled by this mechanism. > >SB> This is presumably "the mechanism described in this document" > > Figure 2 shows another possible scenario, where CE1 is single-homed > to PE1, while CE2 remains multi-homed to PE2 and PE4. From the > perspective of egress endpoint protection for the traffic going from > CE1 to CE2 over PW1, this scenario is not much different than > Figure 1. > >SB> Do you mean "not much different", in which case you need to explain >SB> the difference, or (as I suspect is the case) do you mean is the same? > >================ > > > >4.1. Applicability > > The mechanism is applicable to LDP signaled PWs in an environment > where an egress CE is multi-homed to a primary PE and a backup PE and > there exists a backup PW, as described in Section 3. The procedure > for S-PE node protection is applicable when there exists a backup > S-PE on the backup PW. > > The mechanism assumes IP/MPLS transport tunnels. In a network where > transport tunnels may provide ECMP to primary PEs, care should be > taken to prevent misordered packet delivery during local repair. > Imagine a scenario where the transport tunnel of a PW traverses a > router with ECMP to a primary PE, and the ECMP include a direct link > to the primary PE. Normally the router will attempt to forward PW > packets in a load balance fashion over the ECMP, including this link. > In this document, when the link fails, the router will treat the > event as an egress PE failure, and reroute the portion of traffic on > the link towards a backup PE. Meanwhile, the rest of the traffic > will remain on the other ECMP branches to the primary PE. This will > create a situation where the egress CE receives traffic from both the > primary PE and the backup PE, which is undesirable if the PW or flows > within the PW are sensitive to packet misordering. Therefore, the > mechanism assumes that Control Word (CW) SHOULD be used for PWs and > flow labels [RFC6391] SHOULD be used for flows within a PW, whenever > applicable. > >SB> Unless you are saying use the sequence number in the PW (which >SB> is hardly deployed at all) some form of misordering is inevitable, >SB> since the path/queue lengths in the old and the new path (in both >SB> repair and restore) will be different. The mechanisms that you >SB> cite prevent misorder during normal operation, but not during >SB> a transient. > >============== > > >4.2. Local Repair and Protector > > The fast protection ability of the mechanism comes from local repair > performed by routers upstream adjacent to failures. Each of these > routers is referred to as a "point of local repair" (PLR). A PLR > MUST be able to detect a failure by using a rapid mechanism, such as > physical layer failure detection, Bidirectional Failure Detection > (BFD) [RFC5880], etc. In anticipation of the failure, the PLR MUST > also pre-establish a bypass tunnel to a "protector", and pre-install > a bypass route in the data plane. The bypass tunnel MUST have the >SB> I know what you mean, but unfortunately unanticipated SRLGs >SB> are a problem. I think you mean "to be sure protection will work >SB> ...." However a word about unexpected SRLG is probably warranted. > > > > > > > > >4.3. Context Identifier > > A protector may protect multiple primary PEs. The protector MUST > maintain a separate label space for each primary PE. Likewise, the > PWs terminated on a primary PE may be protected by multiple > protectors, each for a subset of the PWs. In any case, a given PW > MUST be associated with one and only one pair of {primary PE, > protector}. > > This document introduces the notion of "context identifier" to > facilitate protection establishment. A context identifier is an > IPv4/v6 address assigned to an ordered pair of {primary PE, > protector}. The address MUST be globally unique, or unique in the > address space of the network where the primary PE and the protector > reside. > > >SB> Maybe we will get to it, but there can of course be many protectors >SB> depending on the available ECMP paths between the x-PEs, and >SB> all of them need to be included in this mechanism and assigned >SB> one of these context addresses. >SB> > > >SB> Can you get a PLR to PLR loop? > > >SB> A section that you will need to include, or at least provide text on >SB> is manageability. > > >================ > > o A context identifier indicates the primary PE's label space on the > protector. The protector may protect PWs for multiple primary > PEs. For each primary PE, it MUST maintain a separate label space > to store the PW labels assigned by that primary PE. It associates > a PW label with a label space via the context identifier of the > {primary PE, protector}, as below. > > In addition to the normal LDP PW signaling, the primary PE MUST > have a targeted LDP session with the protector, and advertise PW > labels to the protector via LDP Label Mapping messages > (Section 6). The primary PE MUST attach the context identifier to > each message. Upon receiving the message, the protector MUST > install the advertised PW label in the label space identified by > the context identifier. > > When a PLR sets up or resolves a bypass tunnel to the protector, > it MUST use the context identifier rather than a private IP > address of the protector as destination. The protector MUST use > the bypass tunnel, either the MPLS tunnel label or IP tunnel > destination address, as the pointer to the corresponding label > space. The protector MUST forwards PW packets received on the > bypass tunnel based on label lookup in that label space. > >SB> Some label diagrams could be really helpful, and it would be useful >SB> to go carefully through the text in this section and edit it for >SB> readability. I found it quite difficult. > >=================== > > > >4.4.1. Co-located Protector > > In this model, the protector is a backup PE that is directly > connected to the target CE via a backup AC, or it is a backup S-PE on > a backup PW. That is, the protector is co-located with the backup > (S-)PE. Examples of this model have been shown in Figure 4, Figure 5 > and Figure 6 in Section 4.2. > > In egress AC protection and egress PE node protection, when a > protector receives traffic from the PLR, it forwards the traffic to > the CE via the backup AC. This is shown in Figure 7, where PE2 is > the PLR for egress AC failure, P3 is the PLR for PE2 failure, and PE4 > (the backup PE) is the protector. > > |<-------------- PW1 --------------->| > > - PE1 -------------- P1 ------- P3 ----- PE2 ---- > / PLR \ PLR \ > / \ | \ > CE1 bypass\ |bypass CE2 > \ \ | / > \ \ | / > - PE3 -------------- P2 ---------------- PE4 ---- >protector > > |<-------------- PW2 --------------->| > > Figure 7 > > In S-PE node protection, when a protector receives traffic from the > PLR, it forwards the traffic over the next segment of the backup PW. > The T-PE of the backup PW in turn forwards the traffic to the CE via > a backup AC. This is shown in Figure 8, where P4 is the PLR for SPE1 > failure, and SPE2 (the backup S-PE) is the protector for SPE1. > > > >SB> I really would like to know what the label stacks look like. > > >============== > > > > >4.4.2. Centralized Protector > > In this model, the protector is a dedicated P router or PE router > that serves the role. In egress AC protection and egress PE node > protection, the protector may or may not be a backup PE with a direct > connection to the target CE. In S-PE node protection, the protector > may or may not be a backup S-PE on the backup PW. > > In egress AC protection and egress PE node protection, when the > protector receives traffic from the PLR, if the protector has a > direct connection (i.e. backup AC) to the CE, it forwards the traffic > to the CE via the backup AC, which is similar to Figure 7. > Otherwise, it forwards the traffic to a backup PE, which then > forwards the traffic to the CE via a backup AC. This is shown in > Figure 9, where the protector receives traffic from P3 (the PLR for > egress PE failure) or PE2 (the PLR for egress AC failure) and > forwards the traffic to PE4 (the backup PE). The protector may be > protecting other PWs and other primary PEs as well, which is not > shown in this figure for clarity. > > >SB> The above seems a bit fluffy in terms of who does what to the stack > > >================= > > >4.6. Bypass Tunnel > > A PLR may protect multiple PWs associated with one or multiple pairs > of {primary PE, protector}. The PLR MUST establish a bypass tunnel to > each protector for each context identifier associated with that > protector. The destination of the bypass tunnel MUST be the context > > > >Yimin Shen, et al. Expires July 30, 2016 [Page 18] >? >Internet-Draft PW Endpoint Fast Failure Protection January 2016 > > > identifier (Section 4.3.1). Since the PLR is a transit router of the > transport tunnel, it SHOULD derive the context identifier from the > destination of the transport tunnel. > > For examples, in Figure 7 and Figure 9, a bypass tunnel is > established from PE2 (PLR for egress AC failure) to the protector, > and another bypass tunnel is established from P3 (PLR for egress node > failure) to the protector. In Figure 8 and Figure 10, a bypass > tunnel is established from P4 (PLR for S-PE failure) to the > protector. > > In local repair, a PLR reroutes traffic to the protector through a > bypass tunnel, with PW label intact in the packets. This normally > involves pushing a label to the label stack, if the bypass tunnel is > an MPLS tunnel, or pushing an IP header to the packets, if the bypass > >SB> There are some assumptions about the IP protection path. >SB> Do we need to consider the IP case at all in practice? > > tunnel is an IP tunnel. Upon receipt of the packets, the protector > forwards them based on the PW label. Specifically, the protector > uses the bypass tunnel as a context to determine the primary PE's > label space. If the bypass tunnel is an MPLS tunnel, the protector > should have assigned a non-reserved label to the bypass tunnel, and > hence this label can serve as the context. If the bypass tunnel is > an IP tunnel, the context identifier should be the destination > address of IP header. > > To be useful for local repair, a bypass tunnel MUST have the property > that it is not affected by any topology changes caused by the > failure. It should remain effective during local repair, until the > traffic is moved to another fully functional path, i.e. either the > same PW over a fully functional transport tunnel, or another fully > functional PW. > >SB> To avoid repair loops you need to not repair repairs - this >SB> should be explicitly stated. > >=============== > >4.7.1. Examples of Co-located Protector > > > > e In Figure 8, SPE2 is a co-located protector that protects PW1 >SB> Typo in line above(I think) > against S-PE failure. It maintains a label space for SPE1, which is > identified by the context identifier of {SPE1, SPE2}. It learns > SEG1's label from SPE1, and installs a forwarding entry in the label > space. The nexthop of the forwarding entry indicates a label swap to > SEG4's label. > > >============== > >9. Acknowledgements > > > Thanks to Nischal Sheth and Bhupesh Kothari for their contribution. > Thanks to John E Drake, Andrew G Malis, Alexander Vainshtein, Steward >SB>Please s/Steward/Stewart/ > Bryant, and Mach Chen for valuable comments that helped shape this > document and improve its clarity. > >========================== >==========================
- Re: [Pals] Shepherds review of draft-ietf-pals-en… Yimin Shen
- Re: [Pals] Shepherds review of draft-ietf-pals-en… Yimin Shen
- [Pals] Shepherds review of draft-ietf-pals-endpoi… Stewart Bryant