How will you do QoS guarantees if the BUM traffic is not accommodated in this scheme ?
From: Ali Sajassi <[email protected]> Date: Sunday 8 November 2015 at 10:06 To: Wim Henderickx <[email protected]>, "[email protected]" <[email protected]> Subject: Re: [bess] draft-sajassi-bess-pbb-evpn-anycast-ip- tunnels-00.txt It is not a hard requirement. I will add it as a soft requirement (e.g., either SHOULD or MAY) and it would only be for known unicast traffic - i.e., upstream and downstream traffic per VNI can be guaranteed to go through the same PE for known unicast if the operator chooses so. Cheers, Ali From: Wim Henderickx <[email protected]> Date: Saturday, November 7, 2015 at 7:10 PM To: Cisco Employee <[email protected]>, "[email protected]" <[email protected]> Subject: Re: [bess] draft-sajassi-bess-pbb-evpn-anycast-ip- tunnels-00.txt First if this is a requirement it should be listed in section 2. For known unicast traffic the document describes a upstream hash function in section 4.2.1. For BUM traffic It describes the SHG/DF procedures but there is no guarantee described that the downstream DF is similar to the upstream hash or IGP distance in case of unequal cost. As such I don’t see how for BUM traffic the consistency between upstream and downstream is guaranteed? (section 4.2.2.) From: Ali Sajassi <[email protected]> Date: Friday 6 November 2015 at 15:14 To: Wim Henderickx <[email protected]>, "[email protected]" <[email protected]> Subject: Re: [bess] draft-sajassi-bess-pbb-evpn-anycast-ip- tunnels-00.txt Hi Wim, If you can tell me what part of the draft is not clear, I will explain it here and if any further clarification in the draft needed, I will take care of it. Cheers, Ali From: BESS <[email protected]> on behalf of Wim Henderickx <[email protected]> Date: Wednesday, November 4, 2015 at 10:58 PM To: "[email protected]" <[email protected]> Subject: [bess] draft-sajassi-bess-pbb-evpn-anycast-ip- tunnels-00.txt After clarification in the meeting I learned it is a requirement to select the same PE for upstream/downstream traffic. My question is how is this done? Or better which mechanisms are used to achieve this?
_______________________________________________ BESS mailing list [email protected] https://www.ietf.org/mailman/listinfo/bess
