Re: [Teas] AD review of draft-ietf-teas-rfc3272bis-22
Gyan Mishra <hayabusagsm@gmail.com> Wed, 14 June 2023 15:35 UTC
Return-Path: <hayabusagsm@gmail.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D90BEC1522DA for <teas@ietfa.amsl.com>; Wed, 14 Jun 2023 08:35:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.084
X-Spam-Level:
X-Spam-Status: No, score=-2.084 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CVEyXlinJU-g for <teas@ietfa.amsl.com>; Wed, 14 Jun 2023 08:35:42 -0700 (PDT)
Received: from mail-oa1-x36.google.com (mail-oa1-x36.google.com [IPv6:2001:4860:4864:20::36]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C91E2C1522D9 for <teas@ietf.org>; Wed, 14 Jun 2023 08:35:36 -0700 (PDT)
Received: by mail-oa1-x36.google.com with SMTP id 586e51a60fabf-1a6b7060862so2088510fac.2 for <teas@ietf.org>; Wed, 14 Jun 2023 08:35:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1686756935; x=1689348935; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=qxKkBC0KcwOmaTCUXD0Uh7xrL1ZWJWmnPjuIEzbfc5Q=; b=oz1JW0Ch5gPNillbKhv0RgLqhwCELF/cx824QbpsMkOIM8mkye0F/N2qpOBQoE7Itv jk5W2L8JEpULiA18DESg2qMBS1e3PfNYxPJYbNmzawgswlZrCjvzo1vPUk+WnXWCudj1 XdunOdq4EUGZXGUMBuPvz8Joa3iOmDwMkFqHyA7ViRkCkt25pB6A2hl7YxNN+r8dpa6R mz+2qhHYryJBPFOOJId0LsuBOH3C/81H3aCInXY619gjVGCjfNyWAUGn2ED5LEs9ubL6 krq74aoHbOVYZi4Y+orRld1AbjMA4PV1KdS1b4slYspbZDeXnm54Fzdr7zuPYCKfBB2M uV1A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1686756935; x=1689348935; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=qxKkBC0KcwOmaTCUXD0Uh7xrL1ZWJWmnPjuIEzbfc5Q=; b=a31dzUsISaCpSP5Xti1u9QjS0VhynIFvt5E0oJ7rj6g82u+lmIstOwAiuKPdziiRL4 sDmVK2oqrVHHUm5hWVWAub8einB6b44S6CRLqlTEPvLZ87ks0MInI7/H6P7ju+x67vny HtDWrNcpqsv/gysPOLr7n5OSnjfaG7abuu0d0lOQQuPTNr+48ZwZWo/rOdAxFueFi1Sh cClRLS1irn8ES7niokElePQwf7RMQHSAiCy8+aJHW7Gmiwu3IUr/ub3JChpY7/TUurFT C1H9pIoQSPo+ZrY8zKE6EvKosCNWKISaZSTEz167nuAcpx/upGHwQYCM1sX2/H35p00Y n+/w==
X-Gm-Message-State: AC+VfDy6lSugnk38faVBKVBZZBRgnfVkEBCRoZMxeNKfaI6vdCPNnVJX 0ljYARVCetq/uIzzz/t/CNAWopC3EXuMDnlttRftOJEa
X-Google-Smtp-Source: ACHHUZ7WYEfbg8CvIEgJV+71LN72kEdABef/VUP57+U009jXBwQu/5D7zKm0g7jFpwqBsvT2LMYHl9iFEdm5HkSBlVg=
X-Received: by 2002:a05:6808:b32:b0:396:3b9d:7ee0 with SMTP id t18-20020a0568080b3200b003963b9d7ee0mr10772936oij.41.1686756934747; Wed, 14 Jun 2023 08:35:34 -0700 (PDT)
MIME-Version: 1.0
References: <A832DDE4-7E2D-4B30-9E65-69240E5F2004@juniper.net> <022b01d99ed0$e50a3d60$af1eb820$@olddog.co.uk> <DU2PR02MB10160D39605CFBC916085676B885AA@DU2PR02MB10160.eurprd02.prod.outlook.com>
In-Reply-To: <DU2PR02MB10160D39605CFBC916085676B885AA@DU2PR02MB10160.eurprd02.prod.outlook.com>
From: Gyan Mishra <hayabusagsm@gmail.com>
Date: Wed, 14 Jun 2023 11:35:23 -0400
Message-ID: <CABNhwV0wAcUddTLOnnYX1yQcdqsixctaAxumKcmsAXe4amUCjw@mail.gmail.com>
To: mohamed.boucadair@orange.com
Cc: John Scudder <jgs@juniper.net>, Vishnu Pavan Beeram <vishnupavan@gmail.com>, "adrian@olddog.co.uk" <adrian@olddog.co.uk>, "teas@ietf.org" <teas@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000eb0ee905fe18b3e5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/MgESJbtZTe6aD7cT_Kk5kmYA-Yg>
Subject: Re: [Teas] AD review of draft-ietf-teas-rfc3272bis-22
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Jun 2023 15:35:46 -0000
Hi Adrian These two RFCs maybe sited as well RFC 4594 and RFC 3644. Regards Gyan On Wed, Jun 14, 2023 at 11:10 AM <mohamed.boucadair@orange.com> wrote: > Hi Adrian, > > On the first point, we may cite RFC3198 which has a good definition entry > for QoS. > > Cheers, > Med > > > -----Message d'origine----- > > De : Teas <teas-bounces@ietf.org> De la part de Adrian Farrel > > Envoyé : mercredi 14 juin 2023 17:00 > > À : 'John Scudder' <jgs@juniper.net> > > Cc : teas@ietf.org; 'Vishnu Pavan Beeram' <vishnupavan@gmail.com> > > Objet : Re: [Teas] AD review of draft-ietf-teas-rfc3272bis-22 > > > > Thank you for this, John. > > A very through and useful review. > > > > I have posted a new revision (-23) on which we can iterate if > > necessary. > > > > Only a few things caused me to pause... > > > > 1. Your suggestion to include a definition for QoS. I trawled the > > published RFCs and didn't find a definition. It seems that, from as > > early as RFC905, the IETF knew what it meant! > > I thought ISO 8473 (RFC 994) might have given me an answer, but it > > already assumed that it was a term of art. > > So I looked at the definitions on the InterWeb and found that they > > are all somewhat derivative of each other. > > In the end, I fell back on some words from Jerry Ash from way back, > > and condensed them a bit. It gave me: > > > > A measure of way in which traffic for a particular service > > is > > delivered to satisfy the requirements of that service. > > QoS > > also refers to the mechanisms used within a network to > > achieve > > specific goals for the delivery of traffic for a > > particular > > service. > > > > It's not perfect, but Jerry had a 36 page chapter! > > > > 2. The discussion of picoseconds. > > This text is inherited from 3272 and so is at least 21 years old > > (presumably older). It is intriguing that if current hardware isn't > > operating at that granularity, then what was the IETF doing talking > > about it over 20 years ago? > > While I am slightly reluctant to unpick what was already written, I > > think your solution of using "less than" and leaving the lower bound > > unspecified, is the way to go. > > > > 3. I've left out CATS. > > Of course, it is close to my heart, but I don't think it has > > developed any mechanisms yet. > > > > 4. In Section 7 we have: > > When considering inter-domain TE with BGP, note that the > > outbound traffic exit point is controllable, > > whereas the interconnection point where inbound traffic is > > received typically is not. Therefore, it > > is up to each individual network to implement TE strategies that > > deal with the efficient delivery of > > outbound traffic from its customers to its peering points. The > > vast majority of TE policy is based > > on a "closest exit" strategy, which offloads inter-domain > > traffic at the nearest outbound peering point > > towards the destination AS. Most methods of manipulating the > > point at which inbound traffic enters a > > are either ineffective, or not accepted in the peering > > community. > > You raise questions. They are fine questions. But I don't know the > > answers! > > The text here is direct from 3272, so presumably it used to be true. > > Yet the world moves on. > > > > You asked: Was GROW asked for review input? > > Sadly the cross-WG (or possibly cross WG?) review was not complete. > > The matrix defeated me. > > Perhaps IETF last call could also explicitly copy a long list of > > "interested" working groups and that would catch GROW who could then > > fix any issues? > > > > Cheers, > > Adrian > > > > > > -----Original Message----- > > From: John Scudder <jgs@juniper.net> > > Sent: 03 June 2023 18:02 > > To: Adrian Farrel <adrian@olddog.co.uk> > > Cc: teas@ietf.org; Vishnu Pavan Beeram <vishnupavan@gmail.com> > > Subject: AD review of draft-ietf-teas-rfc3272bis-22 > > > > Hi Adrian, WG, > > > > Thanks for this document. > > > > I've supplied my questions and comments in the form of an edited copy > > of the draft. Minor editorial suggestions I've made in place without > > further comment, more substantive questions and comments are done in- > > line and prefixed with "jgs:". You can use your favorite diff tool to > > review them; I've attached the iddiff output for your convenience if > > you'd like to use it. I've also pasted a traditional diff below in > > case you want to use it for in-line reply. > > > > Thanks, > > > > -John > > > > > > --- draft-ietf-teas-rfc3272bis-22.txt 2023-06-02 16:09:48.000000000 > > -0400 > > +++ draft-ietf-teas-rfc3272bis-22-jgs-comments.txt 2023-06-03 > > 12:56:24.000000000 -0400 > > @@ -269,8 +269,12 @@ > > > > * A form of a pre-planned optimized traffic distribution that is > > considered optimal. > > +-- > > +jgs: perhaps re-word to make the sentence less optimally redundantly > > +redundant? ;-) (Likely just remove "optimized".) > > +-- > > > > - In the later case, any deviation from the optimum distribution > > (e.g., > > + In the latter case, any deviation from the optimum distribution > > (e.g., > > caused by a fiber cut) is reverted upon repair without further > > optimization. However, this form of TE relies upon the notion > > that > > the planned state of the network is optimal. Hence, in such a > > mode > > @@ -324,6 +328,10 @@ > > can be found in [RFC4655] and [RFC5394]. Standard TE solutions > > may > > cover the mechanisms to distribute and/or enforce policies, but > > specific policy definition is generally unspecified. > > +-- > > +jgs: Wording again. Maybe something like "... definition of specific > > +policies is left to the network operator"? > > +-- > > > > Path steering is the ability to forward packets using more > > information than just knowledge of the next hop. Examples of > > path > > @@ -366,7 +374,7 @@ > > supported via queuing. It also includes the matching of a > > flow > > (i.e., flow classification) to a particular set of allocated > > resources. The method of flow classification and granularity > > of > > - resource management is technology specific. Examples include > > + resource management is technology-specific. Examples include > > Diffserv with dropping and remarking [RFC4594], MPLS-TE > > [RFC3209], > > and GMPLS based label switched paths [RFC3945], as well as > > controller-based solutions [RFC8453]. This level of resource > > @@ -434,7 +442,7 @@ > > Constraint-based routing is applicable to traffic aggregates > > as > > well as flows. It is a generalization of QoS-based routing. > > > > - Demand side congestion management: A congestion management > > scheme > > + Demand-side congestion management: A congestion management > > scheme > > that addresses congestion problems by regulating or > > conditioning > > offered load. > > > > @@ -450,7 +458,7 @@ > > Internet-Draft Overview and Principles of Internet TE October > > 2022 > > > > > > - Hot-spot: A network element or subsystem which is in a state of > > + Hot spot: A network element or subsystem which is in a state of > > congestion. > > > > Inter-domain traffic: Traffic that originates in one Autonomous > > @@ -465,6 +473,12 @@ > > Network survivability: The capability to provide a prescribed > > level > > of QoS for existing services after a given number of failures > > occur within the network. > > +-- > > +jgs: Funnily enough, "QoS" as a standalone term isn't defined > > anywhere. > > +Admittedly it's starred in > > +https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fww > > w.rfc- > > editor.org%2Fmaterials%2Fabbrev.expansion.txt&data=05%7C01%7Cmohamed. > > boucadair%40orange.com%7C2a8e74237201439394fd08db6ce83f38%7C90c7a20af > > 34b40bfbc48b9253b6f5d20%7C0%7C0%7C638223516975682484%7CUnknown%7CTWFp > > bGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6M > > n0%3D%7C3000%7C%7C%7C&sdata=USMFMlNxoRle1gUWaKOj2tWaOKpznxO8KfLoGjbEf > > 6o%3D&reserved=0 so perhaps > > +debatable, but I think it deserves definition in this document. > > +-- > > > > Offline traffic engineering: A traffic engineering system that > > exists outside of the network. > > @@ -547,7 +561,7 @@ > > must be appropriately determined and configured according to > > prevailing policies and service models to resolve resource > > contention > > issues arising from mutual interference between packets > > traversing > > - through the network. Thus, consideration must be given to > > resolving > > + the network. Thus, consideration must be given to resolving > > competition for network resources between traffic flows belonging > > to > > the same service class (intra-class contention resolution) and > > traffic flows belonging to different classes (inter-class > > contention > > @@ -572,6 +586,12 @@ > > structure, network policies, network characteristics, network > > constraints, network quality attributes, and network > > optimization > > criteria. > > +-- > > +jgs: That's a lotta network. I didn't do the edit, but ISTM you > > could > > +without loss of clarity write "The network domain context includes > > +network structure, policies, characteristics, constraints, quality > > +attributes, and optimization criteria." > > +-- > > > > 2. A problem context defining the general and concrete issues > > that > > TE addresses. The problem context includes identification, > > @@ -662,7 +682,7 @@ > > Packets contend for the use of network resources as they are > > conveyed > > through the network. A network resource is considered to be > > congested if, for an interval of time, the arrival rate of > > packets > > - exceed the output capacity of the resource. Congestion may > > result in > > + exceeds the output capacity of the resource. Congestion may > > result in > > some of the arriving packets being delayed or even dropped. > > > > > > @@ -675,6 +695,10 @@ > > > > > > Congestion increases transit delay, delay variation, may lead to > > +-- > > +jgs: no edit done since I'm not totally sure of your intent, but > > something > > +is needed above. Perhaps s/delay, delay/delay and delay/ > > +-- > > packet loss, and reduces the predictability of network services. > > Clearly, congestion is highly undesirable. Combating congestion > > at a > > reasonable cost is a major objective of Internet TE. > > @@ -812,6 +836,15 @@ > > involve the manipulation of parameters associated with routing, > > control over tactical capacity acquisition, and control over the > > traffic management functions. > > +-- > > +jgs: You mention "workload" or "traffic workload" in a number of > > places > > +in the document. I don't see any definition of what exactly a > > "workload" > > +is, or if you mean anything specific by it at all other than > > "traffic". > > +This term has specific meaning in other fields of computing, but I'm > > not > > +familiar with it being so common in networking that it needs no > > definition. > > +Possibly the same could be said about "offered load", although that > > one, > > +at least, I think I can define for myself (but maybe I shouldn't > > have to). > > +-- > > > > The following list of instruments may be applicable to the > > solution > > context of Internet TE. > > @@ -825,6 +858,11 @@ > > and control over the placement and allocation of network > > resources, as well as control over the mapping or distribution > > of > > traffic onto the infrastructure. > > +-- > > +jgs: Is there an "of" missing between "control" and "traffic", i.e. > > should > > +it be "control of traffic"? If not I think there's some other repair > > needed > > +to that clause. > > +-- > > > > * A set of constraints on the operating environment, the network > > protocols, and the TE system itself. > > @@ -843,7 +881,7 @@ > > > > > > * A set of administrative control parameters which may be > > - manipulated through a configuration management system. Such > > + manipulated through a configuration management system. Such a > > system itself may include a configuration control subsystem, a > > configuration repository, a configuration accounting > > subsystem, > > and a configuration auditing subsystem. > > @@ -881,6 +919,12 @@ > > * information contained in router configuration files > > > > * routing databases > > +-- > > +jgs: Given that routing tables are often referred to as routing > > databases > > +(the "B" in RIB, FIB, etc), I think there's a need to be clearer > > about > > +what you mean by "routing databases" above. I guess maybe you mean > > external > > +policy databases such as the IRR, the RPKI, etc? > > +-- > > > > * routing tables > > > > @@ -939,7 +983,7 @@ > > the medium timescale category. Examples include: > > > > a. Adjusting routing protocol parameters to route traffic > > - away or towards certain segments of the network. > > + away from or towards certain segments of the network. > > > > b. Setting up or adjusting explicitly routed LSPs in MPLS > > networks to route traffic trunks away from possibly > > @@ -978,6 +1022,23 @@ > > administrators must make based on their specific needs. > > > > * Short (picoseconds to minutes): This category includes > > packet > > +-- > > +jgs: picoseconds are indeed short! Did you decide on one-trillionths > > of > > +a second advisedly, or are you just saying "really really short > > +timescale"? I went down a brief rabbithole of trying to think of any > > +kind of TE mechanism we have that might conceivably make changes on > > this > > +timescale, and I can't. Considering that we don't have network > > +interfaces that operate this fast yet, and that the timescale is > > three > > +orders of magnitude faster than the clock speeds of our control > > plane and > > +network processors, it seems rather brash to be making this claim. > > On > > +the other hand, if you really want to go for it, why stop with pico- > > ? Go > > +for the attoseconds, I say! > > + > > +Alternately, you could go with "minutes or less" which can take the > > +reader as low as they're willing to tolerate. > > + > > +("Picoseconds" also appears later, not flagged separately.) > > +-- > > level processing functions and events that are recorded on > > the > > order of several round trip times. It also includes > > router > > mechanisms such as passive and active buffer management. > > All > > @@ -986,6 +1047,12 @@ > > the rate at which traffic is injected into the network. > > One > > of the most popular active queue management schemes, > > especially for TCP traffic, is Random Early Detection > > (RED) > > +-- > > +jgs: Is RED still "one of the most popular" schemes? It might be, I > > +simply don't know -- is this something that can be substantiated by > > a > > +source? If not, would it be worth changing this to something like "A > > +well-known active queue management scheme"? > > +-- > > [FLJA93]. During congestion (but before the queue is > > filled), > > the RED scheme chooses arriving packets to "mark" > > according to > > a probabilistic algorithm which takes into account the > > average > > @@ -1000,7 +1067,7 @@ > > which is not worse than traditional Tail-Drop (TD) queue > > management (drop arriving packets only when the queue is > > full). Importantly, RED reduces the possibility of global > > - synchronization where retransmission burst become > > synchronized > > + synchronization where retransmission bursts become > > synchronized > > across the whole network, and improves fairness among > > > > > > @@ -1013,7 +1080,7 @@ > > different TCP sessions. However, RED by itself cannot > > prevent > > congestion and unfairness caused by sources unresponsive > > to > > RED, e.g., UDP traffic and some misbehaved greedy > > connections. > > - Other schemes have been proposed to improve the > > performance > > + Other schemes have been proposed to improve performance > > and fairness in the presence of unresponsive traffic. > > Some of > > those schemes (such as Longest Queue Drop (LQD) and > > Dynamic > > Soft Partitioning with Random Drop (RND) [SLDC98]) were > > @@ -1044,6 +1111,13 @@ > > used for congestion avoidance because dropping or marking > > packets before queues actually overflow would trigger > > corresponding TCP sources to slow down. > > +-- > > +jgs: The first bullet tells me all the long/medium policies are > > reactive. > > +The second bullet tells me some of the long/medium policies are > > preventive. > > +Does this mean that reactive and preventive are not mutually > > exclusive? In > > +that case maybe a sentence to say so. Otherwise, maybe some other > > edit is > > +called for. > > +-- > > > > 3. Supply-Side Versus Demand-Side Congestion Management Schemes > > > > @@ -1145,7 +1219,7 @@ > > example, measurement can be used to derive packet level > > characteristics, flow level characteristics, user or customer > > level characteristics, traffic aggregate characteristics, > > - component level characteristics, and network wide > > + component level characteristics, and network-wide > > characteristics. > > > > 2. Modeling, analysis, and simulation are important aspects of > > @@ -1153,7 +1227,7 @@ > > physical representation which depicts relevant traffic > > characteristics and network attributes. A network model is > > an > > abstract representation of the network which captures > > relevant > > - network features, attributes, and characteristic. Network > > + network features, attributes, and characteristics. Network > > simulation tools are extremely useful for TE. Because of the > > complexity of realistic quantitative analysis of network > > behavior, certain aspects of network performance studies can > > only > > @@ -1216,7 +1290,7 @@ > > term variations in traffic or changing network conditions. An > > example of a time-dependent algorithm is a global centralized > > optimizer where the input to the system is a traffic matrix and > > - multi-class QoS requirements as described [MR99]. Another > > example of > > + multi-class QoS requirements as described in [MR99]. Another > > example of > > such a methodology is the application of data mining to Internet > > traffic [AJ19] which enables the use of various machine learning > > algorithms to identify patterns within historically collected > > @@ -1254,6 +1328,10 @@ > > predictable traffic variations, state-dependent algorithms may be > > applied to increase network efficiency and resilience to adapt to > > the > > prevailing network state. > > +-- > > +jgs: something's needed between "resilience" and "to adapt" above, > > but > > +I'm not sure what. A comma? The word "and"? > > +-- > > > > Event-dependent TE methods can also be used for TE path > > selection. > > Event-dependent TE methods are distinct from time-dependent and > > @@ -1270,13 +1348,17 @@ > > size. Modeling results suggest that event-dependent TE methods > > could > > lead to a reduction in ALB flooding overhead without loss of > > network > > throughput performance [I-D.ietf-tewg-qos-routing]. > > +-- > > +jgs: At minimum expand "LSA" above. As written it's both undefined, > > and > > +OSPF-specific. > > +-- > > > > 4.2. Offline Versus Online > > > > Traffic engineering requires the computation of routing plans. > > The > > computation may be performed offline or online. The computation > > can > > be done offline for scenarios where routing plans need not be > > - executed in real-time. For example, routing plans computed from > > + executed in real time. For example, routing plans computed from > > forecast information may be computed offline. Typically, offline > > computation is also used to perform extensive searches on multi- > > dimensional solution spaces. > > @@ -1293,7 +1375,7 @@ > > Online computation is required when the routing plans must adapt > > to > > changing network conditions as in state-dependent algorithms. > > Unlike > > offline computation (which can be computationally demanding), > > online > > - computation is geared toward relative simple and fast > > calculations to > > + computation is geared toward relatively simple and fast > > calculations to > > select routes, fine-tune the allocations of resources, and > > perform > > load balancing. > > > > @@ -1377,6 +1459,10 @@ > > network topology may be discovered by running a passive instance > > of > > OSPF or IS-IS, or via BGP-LS [RFC7752], to generate a TED (see > > Section 5.1.3.14). The PCE is used to compute a path (see > > +-- > > +jgs: Thanks for the xref, but maybe also expand TED on first use, or > > +put it in the glossary. > > +-- > > Section 5.1.3.11) based on the TED and available bandwidth, and > > further path optimization may be based on requested objective > > functions [RFC5541]. When a suitable path has been computed the > > @@ -1479,7 +1565,7 @@ > > 4.7. Tactical versus Strategic > > > > Tactical traffic engineering aims to address specific performance > > - problems (such as hot-spots) that occur in the network from a > > + problems (such as hot spots) that occur in the network from a > > tactical perspective, without consideration of overall strategic > > imperatives. Without proper planning and insights, tactical TE > > tends > > to be ad hoc in nature. > > @@ -1524,6 +1610,12 @@ > > > > This subsection reviews a number of IETF activities pertinent to > > Internet traffic engineering. > > +-- > > +jgs: In the time between the WG requesting publication, and now, the > > +IETF has chartered CATS. Arguably it's too soon to say if it should > > +be mentioned here (and thus, it shouldn't be) but I thought I'd draw > > +your attention to it. > > +-- > > > > 5.1.1. IETF TE Mechanisms > > > > @@ -1630,7 +1722,7 @@ > > point>. The head-end is the IP address of the node where the > > policy > > is instantiated. The endpoint is the IP address of the > > destination > > of the policy. The color is an index that associates the SR > > Policy > > - with an intent (e.g., low-latency). > > + with an intent (e.g., low latency). > > > > The head-end node is notified of SR Policies and associated SR > > paths > > via configuration or by extensions to protocols such as PCEP > > @@ -1657,7 +1749,7 @@ > > route which indicates an SR Policy. > > > > * Per-flow Steering: Incoming packets match a forwarding array > > (for > > - example, the classic 5-tuple) which indicates an SR Policies. > > + example, the classic 5-tuple) which indicates an SR Policy. > > > > * Policy-based Steering: Incoming packets match a routing policy > > which directs them to an SR Policy. > > @@ -1690,7 +1782,7 @@ > > flow across multiple access networks simultaneously. > > > > The control plane is used to provide hosts and specific network > > - devices with a set or policies that specify which flows are > > eligible > > + devices with a set of policies that specify which flows are > > eligible > > to use the ATSSS service. The traffic that matches an ATSSS > > policy > > can be distributed among the available access networks following > > one > > of the following four modes. > > @@ -1772,15 +1864,15 @@ > > A DetNet application can express its QoS attributes or traffic > > behavior using any combination of DetNet functions described in > > sub- > > layers. They are then distributed and provisioned using well- > > - established control and provisioning mechanisms adopted for > > traffic- > > + established control and provisioning mechanisms adopted for > > traffic > > engineering. > > > > - In DetNet, a considerable state information is required to > > maintain > > - per flow queuing disciplines and resource reservation for a large > > + In DetNet, a considerable amount of state information is required > > to maintain > > + per-flow queuing disciplines and resource reservation for a large > > number of individual flows. This can be quite challenging for > > network operations during network events such as faults, change > > in > > traffic volume or re-provisioning. Therefore, DetNet recommends > > - support for aggregated flows, however, it still requires large > > amount > > + support for aggregated flows, however, it still requires a large > > amount > > of control signaling to establish and maintain DetNet flows. > > > > > > @@ -1836,7 +1928,7 @@ > > to connect, but also 'when'. This is useful for applications > > that > > need to perform bulk data transfer and would like to schedule > > these > > transfers during an off-peak hour, for example. > > - [I-D.ietf-alto-performance-metrics] introducing network > > performance > > + [I-D.ietf-alto-performance-metrics] introduces network > > performance > > metrics, including network delay, jitter, packet loss rate, hop > > count, and bandwidth. The ALTO server may derive and aggregate > > such > > performance metrics from BGP-LS (see Section 5.1.3.10) or IGP-TE > > (see > > @@ -1850,9 +1942,9 @@ > > Internet-Draft Overview and Principles of Internet TE October > > 2022 > > > > > > - based on network performance criteria. ALTO WG is evaluating the > > use > > + based on network performance criteria. The ALTO WG is evaluating > > the use > > of network TE properties while making application decisions for > > new > > - use-cases such as Edge computing and Datacenter interconnect. > > + use cases such as Edge computing and Datacenter interconnect. > > > > 5.1.2.2. Network Virtualization and Abstraction > > > > @@ -1869,7 +1961,7 @@ > > Abstraction and Control of TE Networks (ACTN) [RFC8453] defines a > > hierarchical SDN architecture which describes the functional > > entities > > and methods for the coordination of resources across multiple > > - domains, to provide end-to-end traffic engineered services. ACTN > > + domains, to provide end-to-end traffic-engineered services. ACTN > > facilitates end-to-end connections and provides them to the user. > > ACTN is focused on: > > > > @@ -1884,13 +1976,13 @@ > > * Presentation to customers of networks as a virtual network via > > open and programmable interfaces. > > > > - The ACTN managed infrastructure is built from traffic engineered > > + The ACTN managed infrastructure is built from traffic-engineered > > network resources, which may include statistical packet > > bandwidth, > > physical forwarding plane sources (such as wavelengths and time > > slots), forwarding and cross-connect capabilities. The type of > > network virtualization seen in ACTN allows customers and > > applications > > (tenants) to utilize and independently control allocated virtual > > - network resources as if resources as if they were physically > > their > > + network resources as if they were physically their > > own resource. The ACTN network is "sliced", with tenants being > > given > > a different partial and abstracted topology view of the physical > > underlying network. > > @@ -1929,6 +2021,11 @@ > > provide the required service levels as specified by the SLOs. > > The > > concept of an IETF network slice is consistent with an enhanced > > VPN > > (VPN+) [I-D.ietf-teas-enhanced-vpn]. > > +-- > > +jgs: I interrupt this document interview to mention that this > > paragraph, or > > +something like it, might be a nice addition to the introductory part > > of > > +draft-ietf-teas-ietf-network-slices. > > +-- > > > > 5.1.3. IETF Techniques Used by TE Mechanisms > > > > @@ -1943,7 +2040,7 @@ > > The constraints and requirements may be imposed by the network > > itself > > or by administrative policies. Constraints may include > > bandwidth, > > hop count, delay, and policy instruments such as resource class > > - attributes. Constraints may also include domain specific > > attributes > > + attributes. Constraints may also include domain-specific > > attributes > > of certain network technologies and contexts which impose > > restrictions on the solution space of the routing function. Path > > oriented technologies such as MPLS have made constraint-based > > routing > > @@ -2019,13 +2116,20 @@ > > > > > > There are two use cases for flex-algo: in IP networks > > - [I-D.ietf-lsr-ip-flexalgo] and in segment routing networks > > + [I-D.ietf-lsr-ip-flexalgo] and in Segment Routing networks > > [I-D.ietf-lsr-flex-algo]. In the first case, flex-algo computes > > paths to an IPv4 or IPv6 address, in the second case, flex-algo > > computes paths to a prefix SID (see Section 5.1.3.12). > > > > There are many use cases where flex-algo can bring big value, > > such > > as: > > +-- > > +jgs: In the two paragraphs above we have "There are two use cases" > > and > > +"there are many use cases". This causes cognitive dissonance. Also, > > +surely it would be possible to reword "bring big value" even more > > +elegantly. Off the top of my head (not claiming elegance here), > > something > > +like "Examples of where flex-algo could be useful include:" > > +-- > > > > * Expansion of functionality of IP Performance metrics [RFC5664] > > when points of interest could instantiate specific constraint- > > @@ -2043,11 +2147,15 @@ > > * Building of network slices [I-D.ietf-teas-ietf-network-slices] > > where particular IETF network slice SLO can be guaranteed by > > flex- > > algo. > > +-- > > +jgs: The four bullets above aren't up to the level of polish of the > > rest > > +of the prose. I haven't proposed a rewrite, but consider one more > > go-over? > > +-- > > > > 5.1.3.2. RSVP > > > > - RSVP is a soft state signaling protocol [RFC2205]. It supports > > - receiver initiated establishment of resource reservations for > > both > > + RSVP is a soft-state signaling protocol [RFC2205]. It supports > > + receiver-initiated establishment of resource reservations for > > both > > multicast and unicast flows. RSVP was originally developed as a > > signaling protocol within the Integrated Services framework (see > > Section 5.1.1.1) for applications to communicate QoS requirements > > to > > @@ -2084,9 +2192,13 @@ > > installed in the router. > > > > One of the issues with the original RSVP specification was > > - Scalability. This is because reservations were required for > > micro- > > + scalability. This is because reservations were required for > > micro- > > flows, so that the amount of state maintained by network elements > > tends to increase linearly with the number of traffic flows. > > These > > +-- > > +jgs: Above, maybe pick either present or past tense and stick with > > it, I > > +don't mind which. > > +-- > > issues are described in [RFC2961] which also modifies and extends > > RSVP to mitigate the scaling problems to make RSVP a versatile > > signaling protocol for the Internet. For example, RSVP has been > > @@ -2102,6 +2214,9 @@ > > to conventional IP control plane protocols. MPLS extends the > > Internet routing model and enhances packet forwarding and path > > control [RFC3031]. > > +-- > > +jgs: Does the word "advanced" add anything to the above? > > +-- > > > > At the ingress to an MPLS domain, Label Switching Routers (LSRs) > > classify IP packets into Forwarding Equivalence Classes (FECs) > > based > > @@ -2130,7 +2245,7 @@ > > Internet-Draft Overview and Principles of Internet TE October > > 2022 > > > > > > - MPLS is a very powerful technology for Internet TE because it > > + MPLS is a powerful technology for Internet TE because it > > supports explicit LSPs which allow constraint-based routing to be > > implemented efficiently in IP networks [AWD2]. The requirements > > for > > TE over MPLS are described in [RFC2702]. Extensions to RSVP to > > @@ -2141,33 +2256,33 @@ > > > > RSVP-TE is a protocol extension of RSVP (Section 5.1.3.2) for > > traffic > > engineering. The base specification is found in [RFC3209]. > > RSVP-TE > > - enables the establishment of traffic engineered MPLS LSPs (TE > > LSPs), > > + enables the establishment of traffic-engineered MPLS LSPs (TE > > LSPs), > > using loose or strict paths, and taking into consideration > > network > > constraints such as available bandwidth. The extension supports > > signaling LSPs on explicit paths that could be administratively > > specified, or computed by a suitable entity (such as a PCE, > > Section 5.1.3.11) based on QoS and policy requirements, taking > > into > > consideration the prevailing network state as advertised by IGP > > - extension for ISIS in [RFC5305], for OSPFV2 in [RFC3630], and for > > + extensions for IS-IS in [RFC5305], for OSPFV2 in [RFC3630], and > > for > > OSPFv3 in [RFC5329]. RSVP-TE enables the reservation of > > resources > > (for example, bandwidth) along the path. > > > > - RSVP-TE includes the ability to preempt LSP based on priorities, > > and > > + RSVP-TE includes the ability to preempt LSPs based on priorities, > > and > > uses link affinities to include or exclude links from the paths > > of > > LSPs. The protocol is further extended to support Fast Reroute > > (FRR) > > [RFC4090], Diffserv [RFC4124], and bidirectional LSPs [RFC7551]. > > - RSVP-TE extensions for support for GMPLS (see Section 5.1.3.5 are > > + RSVP-TE extensions for support for GMPLS (see Section 5.1.3.5) > > are > > specified in [RFC3473]. > > > > Requirements for point-to-multipoint (P2MP) MPLS TE LSPs are > > documented in [RFC4461], and signaling protocol extensions for > > - setting up P2MP MPLS TE LSPs via RSVP-TE is defined in [RFC4875] > > + setting up P2MP MPLS TE LSPs via RSVP-TE are defined in [RFC4875] > > where a P2MP LSP is comprised of multiple source-to-leaf (S2L) > > sub- > > LSPs. To determine the paths for P2MP LSPs, selection of the > > branch > > points (based on capabilities, network state, and policies) is > > key. > > > > RSVP-TE has evolved to provide real time dynamic metrics for path > > - selection for low latency paths using extensions to ISIS > > [RFC8570] > > + selection for low latency paths using extensions to IS-IS > > [RFC8570] > > and OSPF [RFC7471] based on STAMP [RFC8972] and TWAMP [RFC5357] > > performance measurements. > > > > @@ -2195,7 +2310,7 @@ > > (e.g., incoming port or fiber to outgoing port or fiber) as well > > as > > continuing to support packet switching. GMPLS provides a common > > set > > of control protocols for all of these layers (including some > > - technology-specific extensions) each of which has a diverse data > > or > > + technology-specific extensions) each of which has a distinct data > > or > > forwarding plane. GMPLS covers both the signaling and the > > routing > > part of that control plane and is based on the TE extensions to > > MPLS > > (see Section 5.1.3.3). > > @@ -2273,7 +2388,7 @@ > > meter readers. The instructions received by a meter from a > > manager > > include flow specifications, meter control parameters, and > > sampling > > techniques. The instructions received by a meter reader from a > > - manager include the address of the meter whose date is to be > > + manager include the address of the meter whose data are to be > > collected, the frequency of data collection, and the types of > > flows > > to be collected. > > > > @@ -2304,11 +2419,18 @@ > > Intermediate System (IS-IS) protocol to support TE, similarly > > [RFC3630] specifies TE extensions for OSPFv2 ([RFC5329] has the > > same > > description for OSPFv3). > > +-- > > +jgs: Why is OSPFv3 stuck inside parentheses like a second-class > > citizen? > > +-- > > > > The idea of redistribution of TE extensions such as link type and > > ID, > > local and remote IP addresses, TE metric, maximum bandwidth, > > maximum > > reservable bandwidth and unreserved bandwidth, admin group in IGP > > is > > a common for both IS-IS and OSPF. The information distributed by > > the > > +-- > > +jgs: I don't quite know what the sentence above is trying to say so > > I > > +can't propose a rewrite, but I think it needs one. > > +-- > > IGPs in this way can be used to build a view of the state and > > capabilities of a TE network (see Section 5.1.3.14). > > > > @@ -2317,19 +2439,34 @@ > > parameters, OSPFv2 uses Opaque LSA [RFC5250] type 10 (OSPFv3 uses > > Intra-Area-TE-LSA) with two top-level TLV (Router Address and > > Link) > > also with Sub-TLVs for that purpose. > > +-- > > +jgs: The paragraph above is quite hard to parse. > > +-- > > > > IS-IS also uses the Extended IP Reachability TLV (type 135, which > > - have the new 32 bit metric) and the TE Router ID TLV (type 134). > > + has the new 32 bit metric) and the TE Router ID TLV (type 134). > > Those Sub-TLV details are described in [RFC8570] for IS-IS and in > > [RFC7471] for OSPFv2 ([RFC5329] for OSPFv3). > > +-- > > +jgs: I don't know that the tidbit about "the new 32-bit metric" is > > +the right level of detail for this document; it's also not so very > > +new any more. For that matter I don't know that the code point > > values > > +are needed here, the names should be sufficient, shouldn't they? > > + > > +Also the same comment about the odd parenthesization of OSPFv3 > > applies. > > +-- > > > > 5.1.3.10. Link-State BGP > > +-- > > +jgs: Is there some reason this subsection isn't called "BGP Link- > > State"? > > +I mean, the name is a bit unlovely, but still it is the name. > > +-- > > > > In a number of environments, a component external to a network is > > called upon to perform computations based on the network topology > > and > > current state of the connections within the network, including TE > > information. This is information typically distributed by IGP > > - routing protocols within the network (see Section 5.1.3.9. > > + routing protocols within the network (see Section 5.1.3.9). > > > > The Border Gateway Protocol (BGP) (see also Section 7) is one of > > the > > essential routing protocols that glue the Internet together. BGP > > @@ -2344,6 +2481,10 @@ > > Computation Element (PCE, see Section 5.1.3.11), or may be used > > by > > Application-Layer Traffic Optimization (ALTO) servers (see > > Section 5.1.2.1). > > +-- > > +jgs: Perhaps throw a "for example" or "e.g." in to make it clear the > > list > > +above isn't limiting, as in "... can be used to construct, for > > example, ..." > > +-- > > > > > > > > @@ -2391,12 +2532,30 @@ > > packet through a controlled set of instructions, called segments, > > by > > prepending the packet with an SR header: a label stack in MPLS > > case; > > a series of 128-bit segment identifiers in the IPv6 case. > > +-- > > +jgs: I'm not sure what's being said by "steer a packet through a > > controlled > > +set of instructions". The instructions aren't controlled, per se. > > They are > > +just instructions. And the packet doesn't traverse them (it's not > > steered > > +through them). And they aren't a set (which is unordered), they're a > > list. > > +Maybe the sentence is trying to say something like "A node steers a > > packet > > +using a list of instructions (called "segments"). These are placed > > in an > > +SR header, ..." > > + > > +For that matter it's probably desirable to mention somewhere that SR > > is > > +both an architecture and two instantiations of that architecture, > > SR-MPLS > > +and SRv6. > > +-- > > > > Segments are identified by Segment Identifiers (SIDs). There are > > four types of SID that are relevant for TE. > > > > Prefix SID: Unique within the routing domain used to identify a > > prefix. > > +-- > > +jgs: The sentence above needs repair. I was tempted to just delete > > +"unique within the routing domain" but perhaps you're trying to get > > at > > +something with it. > > +-- > > > > Node SID: A Prefix SID with the 'N' bit set to identify a node. > > > > @@ -2412,17 +2571,22 @@ > > > > Binding SID: A Binding SID has two purposes: > > > > - 1. Used to advertise the mappings of prefixes to SIDs/Labels. > > + 1. To advertise the mappings of prefixes to SIDs/Labels. > > > > - 2. Used to advertise a path available for a Forwarding > > + 2. To advertise a path available for a Forwarding > > Equivalence Class. > > > > A segment can represent any instruction, topological or service- > > based, thanks to the MPLS architecture [RFC3031]. Labels can be > > looked up in a global context (platform wide) as well as in some > > other context (see "context labels" in Section 3 of [RFC5331]). > > +-- > > +jgs: The "thanks to the MPLS architecture" clause seems out of > > place, > > +especially considering that SR has an SRv6 instantiation as well as > > an > > +SR-MPLS instantiation. Perhaps just delete it? > > +-- > > > > - The application of "policy" to segment routing can make SR into a > > TE > > + The application of "policy" to Segment Routing can make SR into a > > TE > > mechanism as described in Section 5.1.1.3. > > > > 5.1.3.13. Bit Index Explicit Replication Tree Engineering > > @@ -2431,8 +2595,8 @@ > > encapsulation for multicast forwarding that can be used on MPLS > > or > > Ethernet transports. A mechanism known as Tree Engineering for > > Bit > > Index Explicit Replication (BIER-TE) [I-D.ietf-bier-te-arch] > > provides > > - a component that could be used to build a traffic engineering > > - multicast system. Note well: BIER-TE does not of itself offer > > + a component that could be used to build a traffic-engineered > > + multicast system. BIER-TE does not of itself offer > > traffic engineering, and the abbreviation "TE" does not, in this > > case, refer to traffic engineering. > > > > @@ -2452,6 +2616,10 @@ > > buffers to guarantee the worst case requirements of admitted > > traffic > > and potentially policing and/or rate-shaping mechanisms, > > typically > > done via various forms of queuing. This level of resource > > control, > > +-- > > +jgs: The "this includes" sentence seems like it could use another > > pass, > > +starting with but not limited to agreement in number with > > "implications". > > +-- > > while optional, is important in networks that wish to support > > congestion management policies to control or regulate the offered > > traffic to deliver different levels of service and alleviate > > @@ -2468,13 +2636,13 @@ > > > > 5.1.3.14. Network TE State Definition and Presentation > > > > - The network states that are relevant to the TE need to be stored > > in > > + The network states that are relevant to TE need to be stored in > > the system and presented to the user. The Traffic Engineering > > Database (TED) is a collection of all TE information about all TE > > - nodes and TE links in the network, which is an essential > > component of > > - a TE system, such as MPLS-TE [RFC2702] and GMPLS [RFC3945]. In > > order > > + nodes and TE links in the network. It is an essential component > > of > > + a TE system, such as MPLS-TE [RFC2702] or GMPLS [RFC3945]. In > > order > > to formally define the data in the TED and to present the data to > > the > > - user with high usability, the data modeling language YANG > > [RFC7950] > > + user, the data modeling language YANG [RFC7950] > > can be used as described in [RFC8795]. > > > > 5.1.3.15. System Management and Control Interfaces > > @@ -2488,6 +2656,9 @@ > > consumption needs to be optimized for the control interface, > > other > > protocols, such as Group Communication for the Constrained > > Application Protocol (CoAP) [RFC7390] or gRPC, are available, > > +-- > > +jgs: It would be desirable to provide a citation for gRPC. > > +-- > > especially when the protocol messages are encoded in a binary > > format. > > Along with any of these protocols, the data modeling language > > YANG > > [RFC7950] can be used to formally and precisely define the > > interface > > @@ -2502,12 +2673,19 @@ > > > > The Internet is dominated by client-server interactions, > > principally > > Web traffic although in the future, more sophisticated media > > servers > > +-- > > +jgs: "Principally Web traffic". I guess? This seems a little like a > > +[citation needed] claim. My impression -- which I haven't attempted > > to > > +check -- was that in terms of traffic volume, multimedia in general > > and > > +video in particular dominated. If one construes "Web traffic" > > broadly > > +enough, maybe these two things would be consistent. > > +-- > > may become dominant. The location and performance of major > > information servers has a significant impact on the traffic > > patterns > > within the Internet as well as on the perception of service > > quality > > by end users. > > > > - A number of dynamic load balancing techniques have been devised > > to > > + A number of dynamic load-balancing techniques have been devised > > to > > improve the performance of replicated information servers. These > > techniques can cause spatial traffic characteristics to become > > more > > dynamic in the Internet because information servers can be > > @@ -2591,6 +2769,11 @@ > > high risk of network problems caused by human errors. > > Automation > > may entail the incorporation of automatic feedback and > > intelligence into some components of the TE system. > > +-- > > +jgs: The sentence above feels a little like a tautology; in addition > > +I'm not sure what information "intelligence" adds, it would be > > desirable > > +to be even more specific. > > +-- > > > > Scalability: Public networks continue to grow rapidly with > > respect > > to network size and traffic volume. Therefore, to remain > > @@ -2617,7 +2800,7 @@ > > the system to a particular environment. It may also be > > desirable > > to have both online and offline TE subsystems which can be > > independently enabled and disabled. TE systems that are used > > in > > - multi-class networks should also have options to support class > > + multi-class networks should also have options to support > > class- > > based performance evaluation and optimization. > > > > Visibility: Mechanisms should exist as part of the TE system to > > @@ -2677,7 +2860,7 @@ > > 1. Pure SPF protocols do not take network constraints and > > traffic > > characteristics into account during route selection. For > > example, IGPs always select the shortest paths based on link > > - metrics assigned by administrators) so load sharing cannot be > > + metrics assigned by administrators, so load sharing cannot be > > performed across paths of different costs. Using shortest > > paths > > to forward traffic may cause the following problems: > > > > @@ -2693,7 +2876,7 @@ > > * If traffic from a source to a destination exceeds the > > capacity > > of a link along the shortest path, the link (and hence the > > shortest path) becomes congested while a longer path > > between > > - these two nodes may be under-utilized > > + these two nodes may be under-utilized. > > > > * The shortest paths from different sources can overlap at > > some > > links. If the total traffic from the sources exceeds the > > @@ -2706,9 +2889,13 @@ > > may result in persistent congestion problems. > > > > 2. The Equal-Cost Multi-Path (ECMP) capability of SPF IGPs > > supports > > - sharing of traffic among equal cost paths between two nodes. > > + sharing of traffic among equal-cost paths between two nodes. > > +-- > > +jgs: I think "between two nodes" could be dropped, it seems oddly > > +limiting otherwise and doesn't seem to add anything. > > +-- > > However, ECMP attempts to divide the traffic as equally as > > - possible among the equal cost shortest paths. Generally, > > ECMP > > + possible among the equal-cost shortest paths. Generally, > > ECMP > > does not support configurable load sharing ratios among equal > > cost paths. The result is that one of the paths may carry > > significantly more traffic than other paths because it may > > also > > @@ -2723,7 +2910,7 @@ > > described in Section 8 may be capable of better control > > [FT00], > > [FT01]. > > > > - Because of these limitations, new capabilities are needed to > > enhance > > + Because of these limitations, capabilities are needed to enhance > > the routing function in IP networks. Some of these capabilities > > are > > summarized below. > > > > @@ -2753,7 +2940,7 @@ > > reservable bandwidth attributes of the network links and by > > specifying the bandwidth requirements for path selection. > > > > - * A number of enhancements to the link state IGPs are needed to > > + * A number of enhancements to the link state IGPs > > allow them to distribute additional state information required > > for > > constraint-based routing. The extensions to OSPF are > > described in > > [RFC3630], and to IS-IS in [RFC5305]. Some of the additional > > @@ -2820,10 +3007,18 @@ > > An important aspect of the traffic mapping function is the > > ability to > > establish multiple paths between an originating node and a > > destination node, and the capability to distribute the traffic > > - between the two nodes across the paths according to some > > policies. A > > - pre-condition for this scheme is the existence of flexible > > mechanisms > > + between the two nodes across the paths according to configured > > policies. A > > + precondition for this scheme is the existence of flexible > > mechanisms > > to partition traffic and then assign the traffic partitions onto > > the > > parallel paths as noted in [RFC2702]. When traffic is assigned > > to > > +-- > > +jgs: RFC 2702 talks about "parallel traffic trunks" and "parallel > > +label-switched paths". Maybe it would be better to stick with one of > > +those phrasings if the same thing is meant here, as it seems to be. > > +"Parallel paths" (without adjective for "path") is somewhat > > ambiguous. > > + > > +(Also 2x more in this paragraph.) > > +-- > > multiple parallel paths, it is recommended that special care > > should > > be taken to ensure proper ordering of packets belonging to the > > same > > application (or traffic flow) at the destination node of the > > parallel > > @@ -2843,7 +3038,7 @@ > > Section 2). > > > > When traffic mapping techniques that depend on dynamic state > > feedback > > - (e.g., MATE [MATE] and such like) are used, special care must be > > + (e.g., MATE [MATE] and suchlike) are used, special care must be > > taken to guarantee network stability. > > > > > > @@ -2871,14 +3066,14 @@ > > > > Traffic statistics may be classified according to long-term or > > short- > > term timescales. Long-term traffic statistics are very useful > > for > > - traffic engineering. Long-term traffic statistics may > > periodicity > > + traffic engineering. Long-term traffic statistics may > > periodically > > record network workload (such as hourly, daily, and weekly > > variations > > in traffic profiles) as well as traffic trends. Aspects of the > > traffic statistics may also describe class of service > > characteristics > > for a network supporting multiple classes of service. Analysis > > of > > the long-term traffic statistics may yield other information such > > as > > - busy hour characteristics, traffic growth patterns, persistent > > - congestion problems, hot-spot, and imbalances in link utilization > > + busy-hour characteristics, traffic growth patterns, persistent > > + congestion problems, hot spot, and imbalances in link utilization > > caused by routing anomalies. > > > > A mechanism for constructing traffic matrices for both long-term > > and > > @@ -2920,11 +3115,15 @@ > > must be aware of the planned traffic volumes and available > > resources. However, this approach is only of value if the > > traffic > > is presented conformant to the planned traffic volumes. > > +-- > > +jgs: For the last sentence, perhaps something like "... is only of > > value > > +if the traffic that is presented conforms to the planned traffic > > volumes"? > > +-- > > > > * Traffic flows may be policed at the edges of a network. This > > is a > > simple way to check that the actual traffic volumes are > > consistent > > with the planned volumes. Some form of measurement (see > > - Section 6.4) is used to determine the rate of arrival of > > traffic > > + Section 6.4) is used to determine the rate of arrival of > > traffic, > > and excess traffic could be discarded. Alternatively, excess > > traffic could be forwarded as best-effort within the network. > > However, this approach is only completely effective if the > > @@ -2951,14 +3150,14 @@ > > accomplished by promptly recovering from network impairments and > > maintaining the required QoS for existing services after > > recovery. > > Survivability is an issue of great concern within the Internet > > - community due to the demand to carry mission critical traffic, > > real- > > + community due to the demand to carry mission-critical traffic, > > real- > > time traffic, and other high priority traffic over the Internet. > > Survivability can be addressed at the device level by developing > > network elements that are more reliable; and at the network level > > by > > incorporating redundancy into the architecture, design, and > > operation > > of networks. It is recommended that a philosophy of robustness > > and > > survivability should be adopted in the architecture, design, and > > - operation of TE that control IP networks (especially public IP > > + operation of TE used to control IP networks (especially public IP > > networks). Because different contexts may demand different > > levels of > > survivability, the mechanisms developed to support network > > survivability should be flexible so that they can be tailored to > > @@ -2980,11 +3179,18 @@ > > The impact of service outages varies significantly for different > > service classes depending on the duration of the outage which can > > vary from milliseconds (with minor service impact) to seconds > > (with > > - possible call drops for IP telephony and session time-outs for > > - connection oriented transactions) to minutes and hours (with > > - potentially considerable social and business impact). Different > > - duration outages have different impacts depending on the > > throughput > > + possible call drops for IP telephony and session timeouts for > > + connection-oriented transactions) to minutes and hours (with > > + potentially considerable social and business impact). Outages of > > different > > + duration have different impacts depending on the throughput > > of the traffic flows that are interrupted. > > +-- > > +jgs: The final sentence (after my edit, still) seems odd to me. It's > > in > > +one sense quite specific (you talk about "throughput" and not > > various other > > +qualities such as volume, for instance) and on the other hand rather > > vague. > > +I would think that "nature" would fit better than "throughput" with > > the > > +sentence's level of abstraction. > > +-- > > > > Failure protection and restoration capabilities are available in > > multiple layers as network technologies have continued to evolve. > > @@ -2999,14 +3205,14 @@ > > and node outages. Rerouting at the IP layer occurs after a > > period of > > routing convergence which may require seconds to minutes to > > complete. > > Path-oriented technologies such as MPLS ([RFC3469]) can be used > > to > > - enhance the survivability of IP networks in a potentially cost > > + enhance the survivability of IP networks in a potentially cost- > > effective manner. > > > > An important aspect of multi-layer survivability is that > > technologies > > at different layers may provide protection and restoration > > capabilities at different granularities in terms of time scales > > and > > - at different bandwidth granularity (from packet-level to > > wavelength > > - level). Protection and restoration capabilities can also be > > + at different bandwidth granularity (from the level of packets to > > that of > > + wavelengths). Protection and restoration capabilities can also > > be > > sensitive to different service classes and different network > > utility > > models. Coordinating different protection and restoration > > capabilities across multiple layers in a cohesive manner to > > ensure > > @@ -3028,7 +3234,7 @@ > > > > * Protection and restoration capabilities from different layers > > should be coordinated to provide network survivability in a > > - flexible and cost effective manner. Avoiding duplication of > > + flexible and cost-effective manner. Avoiding duplication of > > functions in different layers is one way to achieve the > > coordination. Escalation of alarms and other fault indicators > > from lower to higher layers may also be performed in a > > coordinated > > @@ -3042,7 +3248,7 @@ > > protection/restoration functions in many layers may increase > > redundancy and robustness, but it can result in significant > > inefficiencies in network resource utilization. Careful > > planning > > - is needed to balance the trade-off between the desire for > > + is needed to balance the tradeoff between the desire for > > survivability and the optimal use of resources. > > > > * It is generally desirable to have protection and restoration > > @@ -3060,7 +3266,7 @@ > > > > Because MPLS is path-oriented, it has the potential to provide > > faster > > and more predictable protection and restoration capabilities than > > - conventional hop by hop routed IP systems. Protection types for > > MPLS > > + conventional hop-by-hop routed IP systems. Protection types for > > MPLS > > networks can be divided into four categories. > > > > * Link Protection: The objective of link protection is to > > protect an > > @@ -3197,7 +3403,7 @@ > > 6.8. Traffic Engineering in Diffserv Environments > > > > Increasing requirements to support multiple classes of traffic in > > the > > - Internet, such as best effort and mission critical data, calls > > for IP > > + Internet, such as best effort and mission critical data, call for > > IP > > networks to differentiate traffic according to some criteria and > > to > > give preferential treatment to certain types of traffic. Large > > numbers of flows can be aggregated into a few behavior aggregates > > @@ -3231,7 +3437,7 @@ > > service class. Such relationships between demand and resource > > allocation can be enforced using a combination of, for example: > > > > - * TE mechanisms on a per service class basis that enforce the > > + * TE mechanisms on a per-service class basis that enforce the > > relationship between the amount of traffic contributed by a > > given > > service class and the resources allocated to that class. > > > > @@ -3239,9 +3445,9 @@ > > given service class to relate to the amount of traffic > > contributed > > by that service class. > > > > - It may also be desirable to limit the performance impact of high > > - priority traffic on relatively low priority traffic. This can be > > - achieved, for example, by controlling the percentage of high > > priority > > + It may also be desirable to limit the performance impact of high- > > + priority traffic on relatively low-priority traffic. This can be > > + achieved, for example, by controlling the percentage of high- > > priority > > > > > > > > @@ -3252,21 +3458,21 @@ > > > > traffic that is routed through a given link. Another way to > > accomplish this is to increase link capacities appropriately so > > that > > - lower priority traffic can still enjoy adequate service quality. > > + lower-priority traffic can still enjoy adequate service quality. > > When the ratio of traffic workload contributed by different > > service > > classes varies significantly from router to router, it may not be > > enough to rely on conventional IGP routing protocols or on TE > > mechanisms that are not sensitive to different service classes. > > Instead, it may be desirable to perform TE, especially routing > > - control and mapping functions, on a per service class basis. One > > way > > + control and mapping functions, on a per-service class basis. One > > way > > to accomplish this in a domain that supports both MPLS and > > Diffserv > > - is to define class specific LSPs and to map traffic from each > > class > > + is to define class-specific LSPs and to map traffic from each > > class > > onto one or more LSPs that correspond to that service class. An > > LSP > > corresponding to a given service class can then be routed and > > - protected/restored in a class dependent manner, according to > > specific > > + protected/restored in a class-dependent manner, according to > > specific > > policies. > > > > - Performing TE on a per class basis may require per-class > > parameters > > + Performing TE on a per-class basis may require per-class > > parameters > > to be distributed. It is common to have some classes share some > > aggregate constraints (e.g., maximum bandwidth requirement) > > without > > enforcing the constraint on each individual class. These classes > > can > > @@ -3310,17 +3516,29 @@ > > with routing protocols provide finer-grained control, but this > > approach is difficult to use and imprecise because of the way the > > routing protocols interact occur across the network. > > +-- > > +jgs: some repair is needed to "routing protocols interact occur > > across > > +the network" > > +-- > > > > Control mechanisms can be manual (e.g., static configuration), > > - partially-automated (e.g., scripts), or fully-automated (e.g., > > policy > > + partially-automated (e.g., scripts), or fully-automated (e.g., > > policy- > > based management systems). Automated mechanisms are particularly > > - useful in large scale networks. Multi-vendor interoperability > > can be > > + useful in large-scale networks. Multi-vendor interoperability > > can be > > facilitated by standardized management systems (e.g., YANG > > models) to > > support the control functions required to address TE objectives. > > +-- > > +jgs: surely a YANG model is a data model, and a data model is not > > the same > > +thing as a management system? > > +-- > > > > Network control functions should be secure, reliable, and stable > > as > > these are often needed to operate correctly in times of network > > impairments (e.g., during network congestion or security > > attacks). > > +-- > > +jgs: surely all attacks are "security attacks", to the extent that a > > +security attack is a thing at all? Probably delete "security". > > +-- > > > > 7. Inter-Domain Considerations > > > > @@ -3331,22 +3549,44 @@ > > BGP [RFC4271] is the standard exterior gateway protocol used to > > exchange routing information between autonomous systems (ASes) in > > the > > Internet. BGP includes a sequential decision process that > > calculates > > +-- > > +jgs: I'm not sure what work "sequential" is doing there. I suggest > > +deleting it. > > +-- > > the preference for routes to a given destination network. There > > are > > two fundamental aspects to inter-domain TE using BGP: > > > > * Route Redistribution: Controlling the import and export of > > routes > > between ASes, and controlling the redistribution of routes > > between > > BGP and other protocols within an AS. > > +-- > > +jgs: In my experience "route redistribution" generally refers to the > > +second thing you name, moving a route from one protocol to another. > > I > > +haven't heard route advertisement policy referred to as > > "redistribution". > > +I guess both can be broadly lumped together under the general rubric > > of > > +route propagation. > > +-- > > > > - * Best path selection: Selecting the best path when there are > > + * Best-path selection: Selecting the best path when there are > > multiple candidate paths to a given destination network. This > > is > > performed by the BGP decision process, selecting preferred > > exit > > points out of an AS towards specific destination networks > > taking a > > number of different considerations into account. The BGP path > > selection process can be influenced by manipulating the > > attributes > > - associated with the process, including NEXT-HOP, WEIGHT, > > LOCAL- > > - PREFERENCE, AS-PATH, ROUTE-ORIGIN, MULTI-EXIT-DESCRIMINATOR > > (MED), > > - IGP METRIC, etc. > > + associated with the process, including NEXT_HOP, LOCAL_PREF, > > + AS_PATH, ORIGIN, MULTI_EXIT_DISC (MED), > > + IGP metric, etc. > > +-- > > +jgs: this isn't quite the right summary of what the decision process > > does, > > +it doesn't only select preferred exit points from an AS, it also > > selects > > +routes even if they don't exit the AS, for instance. Perhaps I'm > > obsessing > > +over precision here because of my personal history, though -- given > > that > > +this is a section on *Inter-Domain* considerations, perhaps this is > > an > > +acceptable oversimplification. > > + > > +I deleted WEIGHT since it's not part of the standard, and corrected > > the > > +other capitalized terms to match their names in the standard. > > +-- > > > > Route-maps provide the flexibility to implement complex BGP > > policies > > based on pre-configured logical conditions. They can be used to > > @@ -3365,6 +3605,22 @@ > > logical expressions that implement various types of policies can > > be > > implemented using a combination of Route-maps, BGP-attributes, > > Access-lists, and Community attributes. > > +-- > > +jgs: Both route maps and access lists are peculiar to one vendor's > > +implementation, they aren't standardized. I don't think there's a > > simple > > +term swap-out that fixes this. Perhaps a full paragraph rewrite > > could look > > +like, > > + > > +NEW: > > + Most BGP implementations provide constructs that facilitate the > > + implementation of complex BGP policies based on pre-configured > > + logical conditions. These can be used to control import and > > + export of incoming and outgoing routes, control redistribution of > > + routes between BGP and other protocols, and influence the > > selection > > + of best paths by manipulating the attributes (either > > standardized, > > + or local to the implementation) associated with the BGP decision > > + process. > > +-- > > > > When considering inter-domain TE with BGP, note that the outbound > > traffic exit point is controllable, whereas the interconnection > > point > > @@ -3376,6 +3632,16 @@ > > nearest outbound peering point towards the destination AS. Most > > methods of manipulating the point at which inbound traffic enters > > a > > are either ineffective, or not accepted in the peering community. > > +-- > > +jgs: the last two sentences above seem to be [citation needed]. In > > +particular, I had thought AS_PATH prepending was a pretty common > > +practice. A very brief web search turned up a 2020 CAIDA paper that > > +seems to confirm this > > +(https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fw > > ww.caida.org%2Fcatalog%2Fpapers%2F2020_aspath_prepending%2Faspath_pre > > pending.pdf&data=05%7C01%7Cmohamed.boucadair%40orange.com%7C2a8e74237 > > 201439394fd08db6ce83f38%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C > > 638223516975682484%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIj > > oiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2B%2F > > 6G34T0gWKhNW4yLetJ1xqOHJdxt9eeyycfFldkkvE%3D&reserved=0) > > + > > +At this point it occurs to me to ask whether the GROW WG was > > prompted > > +to review this section? > > +-- > > > > Inter-domain TE with BGP is generally effective, but it is > > usually > > applied in a trial-and-error fashion because a TE system usually > > only > > @@ -3430,6 +3696,9 @@ > > aspects into account: location of and new links or nodes, > > existing > > and predicted traffic patterns, costs, link capacity, topology, > > routing design, and survivability. > > +-- > > +jgs: Is "location of and new links" supposed to say "any" instead of > > "and"? > > +-- > > > > Performance optimization of operational networks is usually an > > ongoing process in which traffic statistics, performance > > parameters, > > @@ -3458,9 +3727,13 @@ > > the network administrator specifies the destination node and the > > attributes of the LSP which indicate the requirements that are to > > be > > satisfied during the path selection process. The attributes may > > - include and explicit path for the LSP to follow, or originating > > + include an explicit path for the LSP to follow, or originating > > router uses a local constraint-based routing process to compute > > the > > path of the LSP. RSVP-TE is used as a signaling protocol to > > +-- > > +jgs: the "or originating router uses" clause seems to need some > > +adjustment. > > +-- > > instantiate the LSPs. By assigning proper bandwidth values to > > links > > and LSPs, congestion caused by uneven traffic distribution can be > > avoided or mitigated. > > @@ -3474,12 +3747,12 @@ > > Internet-Draft Overview and Principles of Internet TE October > > 2022 > > > > > > - The bandwidth attributes of an LSP relates to the bandwidth > > + The bandwidth attributes of an LSP relate to the bandwidth > > requirements of traffic that flows through the LSP. The traffic > > attribute of an LSP can be modified to accommodate persistent > > shifts > > in demand (traffic growth or reduction). If network congestion > > - occurs due to some unexpected events, existing LSPs can be > > rerouted > > - to alleviate the situation or network administrator can configure > > new > > + occurs due to unexpected events, existing LSPs can be rerouted > > + to alleviate the situation, or the network administrator can > > configure new > > LSPs to divert some traffic to alternative paths. The reservable > > bandwidth of the congested links can also be reduced to force > > some > > LSPs to be rerouted to other paths. A traffic matrix in an MPLS > > @@ -3495,17 +3768,17 @@ > > computation on behalf of network routers have given way to an > > approach that follows the SDN architecture. A stateful PCE is > > able > > to track all of the LSPs in the network and can redistribute them > > to > > - make better use of the available resources. Such a PCE can forms > > + make better use of the available resources. Such a PCE can form > > part of a network orchestrator that uses PCEP or some other > > southbound interface to instruct the signaling protocol or > > directly > > program the routers. > > > > - Segment routing leverages a centralized TE controller and either > > an > > + Segment Routing leverages a centralized TE controller and either > > an > > MPLS or IPv6 forwarding plane, but does not need to use a > > signaling > > protocol or management plane protocol to reserve resources in the > > routers. All resource reservation is logical within the > > controller, > > and not distributed to the routers. Packets are steered through > > the > > - network using segment routing, and this may have configuration > > and > > + network using Segment Routing, and this may have configuration > > and > > operational scaling benefits. > > > > As mentioned in Section 7, there is usually no direct control > > over > > @@ -3515,10 +3788,14 @@ > > network, maintaining the ability to operate the network in a > > regional > > fashion where desired, while continuing to take advantage of the > > benefits of a global network, also becomes an important > > objective. > > +-- > > +jgs: I can't figure out what the "When operating a global > > network..." > > +sentence is trying to tell me. > > +-- > > > > Inter-domain TE with BGP begins with the placement of multiple > > peering interconnection points that are in close proximity to > > traffic > > - sources/destination, and offer lowest cost paths across the > > network > > + sources/destination, and offer lowest-cost paths across the > > network > > between the peering points and the sources/destinations. Some > > location-decision problems that arise in association with inter- > > domain routing are discussed in [AWD5]. > > @@ -3549,7 +3826,7 @@ > > When there are multiple exit points toward a given peer, and only > > one > > of them is congested, it is not necessary to shift traffic away > > from > > the peer entirely, but only from the one congested connections. > > This > > - can be achieved by using passive IGP-metrics, AS-path filtering, > > or > > + can be achieved by using passive IGP metrics, AS_PATH filtering, > > or > > prefix filtering. > > > > 9. Security Considerations > > @@ -3557,7 +3834,7 @@ > > This document does not introduce new security issues. > > > > Network security is, of course, an important issue. In general, > > TE > > - mechanisms are security neutral: they may use tunnels which can > > + mechanisms are security-neutral: they may use tunnels which can > > slightly help protect traffic from inspection and which, in some > > cases, can be secured using encryption; they put traffic onto > > predictable paths within the network that may make it easier to > > find > > @@ -3576,7 +3853,7 @@ > > > > Certain aspects of a network may be deduced from the details of > > the > > TE paths that are used. For example, the link connectivity of > > the > > - network, and the quality and load on individual links may be > > assumed > > + network, and the quality and load on individual links may be > > inferred > > from knowing the paths of traffic and the requirements they place > > on > > > > > > @@ -3603,6 +3880,11 @@ > > Much of the text in this document is derived from RFC 3272. The > > authors of this document would like to express their gratitude to > > all > > involved in that work. Although the source text has been edited > > in > > +-- > > +jgs: Given there's just one front-page author, is the plural > > accurate? > > +Granted Adrian is the *editor* and perhaps he is speaking on behalf > > of > > +everyone who contributed, so do as you will. > > +-- > > the production of this document, the original authors should be > > considered as Contributors to this work. They were: > > > > > > > > > > _______________________________________________ > > Teas mailing list > > Teas@ietf.org > > https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww > > .ietf.org%2Fmailman%2Flistinfo%2Fteas&data=05%7C01%7Cmohamed.boucadai > > r%40orange.com%7C2a8e74237201439394fd08db6ce83f38%7C90c7a20af34b40bfb > > c48b9253b6f5d20%7C0%7C0%7C638223516975682484%7CUnknown%7CTWFpbGZsb3d8 > > eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C > > 3000%7C%7C%7C&sdata=mbvhb%2B%2FXZrun32eTeOLBvulbf%2FiePsgjtECvj%2BHf6 > > WQ%3D&reserved=0 > > ____________________________________________________________________________________________________________ > Ce message et ses pieces jointes peuvent contenir des informations > confidentielles ou privilegiees et ne doivent donc > pas etre diffuses, exploites ou copies sans autorisation. Si vous avez > recu ce message par erreur, veuillez le signaler > a l'expediteur et le detruire ainsi que les pieces jointes. Les messages > electroniques etant susceptibles d'alteration, > Orange decline toute responsabilite si ce message a ete altere, deforme ou > falsifie. Merci. > > This message and its attachments may contain confidential or privileged > information that may be protected by law; > they should not be distributed, used or copied without authorisation. > If you have received this email in error, please notify the sender and > delete this message and its attachments. > As emails may be altered, Orange is not liable for messages that have been > modified, changed or falsified. > Thank you. > > > _______________________________________________ > Teas mailing list > Teas@ietf.org > https://www.ietf.org/mailman/listinfo/teas > -- <http://www.verizon.com/> *Gyan Mishra* *Network Solutions A**rchitect * *Email gyan.s.mishra@verizon.com <gyan.s.mishra@verizon.com>* *M 301 502-1347*
- [Teas] AD review of draft-ietf-teas-rfc3272bis-22 John Scudder
- Re: [Teas] AD review of draft-ietf-teas-rfc3272bi… Adrian Farrel
- Re: [Teas] AD review of draft-ietf-teas-rfc3272bi… mohamed.boucadair
- Re: [Teas] AD review of draft-ietf-teas-rfc3272bi… Gyan Mishra
- Re: [Teas] AD review of draft-ietf-teas-rfc3272bi… Adrian Farrel
- Re: [Teas] AD review of draft-ietf-teas-rfc3272bi… Adrian Farrel
- Re: [Teas] AD review of draft-ietf-teas-rfc3272bi… Kiran Makhijani
- Re: [Teas] AD review of draft-ietf-teas-rfc3272bi… Adrian Farrel
- Re: [Teas] AD review of draft-ietf-teas-rfc3272bi… Kiran Makhijani
- Re: [Teas] AD review of draft-ietf-teas-rfc3272bi… John Scudder
- Re: [Teas] AD review of draft-ietf-teas-rfc3272bi… Adrian Farrel