[trill] Shepherd comments on draft-ietf-trill-arp-optimization - Document ready with a fi
"Susan Hares" <shares@ndzh.com> Fri, 02 October 2015 20:28 UTC
Return-Path: <shares@ndzh.com>
X-Original-To: trill@ietfa.amsl.com
Delivered-To: trill@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3B5F1B2D67 for <trill@ietfa.amsl.com>; Fri, 2 Oct 2015 13:28:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -97.654
X-Spam-Level:
X-Spam-Status: No, score=-97.654 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s9a4hB6FOmCS for <trill@ietfa.amsl.com>; Fri, 2 Oct 2015 13:28:57 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D47211B2D60 for <trill@ietf.org>; Fri, 2 Oct 2015 13:28:55 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=184.157.84.146;
From: Susan Hares <shares@ndzh.com>
To: trill@ietf.org
Date: Fri, 02 Oct 2015 16:28:51 -0400
Message-ID: <006b01d0fd50$f3d8d830$db8a8890$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_006C_01D0FD2F.6CC8BED0"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AdD9UNW7FHwZJGumSA+XAomACowYfg==
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com
Archived-At: <http://mailarchive.ietf.org/arch/msg/trill/SVmP0QNwY3UaVhbjkweULl1ZxLE>
Cc: 'Donald Eastlake' <d3e3e3@gmail.com>, 'Jon Hudson' <jon.hudson@gmail.com>
Subject: [trill] Shepherd comments on draft-ietf-trill-arp-optimization - Document ready with a fi
X-BeenThere: trill@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Developing a hybrid router/bridge." <trill.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/trill>, <mailto:trill-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/trill/>
List-Post: <mailto:trill@ietf.org>
List-Help: <mailto:trill-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/trill>, <mailto:trill-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Oct 2015 20:28:59 -0000
Draft: draft-ietf-trill-arp-optimization http://datatracker.ietf.org/doc/draft-ietf-trill-arp-optimization/ Status: Ready for WG LC, only minor edits needed Minor Nits that must be fixed: 1) Use the right RFC2119 boiler plate and update "should" to "SHOULD" plus "may" to "MAY" Editorial issues: #1 Page 4 section 2 paragraph 2 From: /If the RBridge has extracted the sender's IP/MAC address pair from the received data packet, it may save the information and use the IA APPsub-TLV to distribute it to save the information and distribute it to other RBridges through ESADI/ To: /If the RBridge has extracted the sender's IP/MAC address pair from the received data packet (either ARP or ND), it may save the information and use the IA APPsub-TLV to distribute it to save the information and distribute it to other RBridges through ESADI/ Note: If my understanding of the data packet is wrong, would you please clarify that instead in this paragraph. #2 section 3.1 paragraph 1 and 2 Start the paragraph with: The processing for this is: . If the sender's IP .. (put the first paragraph in the first item of a bulleted list) . Else if the sender's IP has been saved (put the second paragraph in a bulleted list This will make the text easier to read. A few other textual changes in the same paragraph are: From: /The RBridge may use different strategies to do so for example, ask an authoritative entity like directory servers or encapsulate and unicast the ARP/ND message to the location where it believes the address is in use./ To: /The RBridge may use different strategies to do so. For example, the RBridge may ask an authoritative entity such as a directory server or an it may encapsulate and unicast the ARP/ND location to the location where it believes the address is in use.