I have just submitted draft-ietf-pcn-cl-edge-behaviour-12.txt, incorporating responses to the Genart reviews by Joel Halpern and Brian Carpenter. Thanks to both of them for their suggestions. The set of changes to the CL edge behaviour draft is as follows:

1. Introduction
===============

Added the following paragraph in response to a concern expressed by Brian. Further related text is described later.

   Note that the terms "block" or "terminate" actually translate to
   one or more of several possible courses of action, as discussed
   in Section 3.6 of RFC5559. The choice of which action to take
   for blocked or terminated flows is a matter of local policy.

Deleted the following text from the RFC Editor's note, on Brian's recommendation:

   You may choose to delete the following paragraph and the
   "[CL-specific]" tags throughout this document when publishing
   it, since they are present primarily to aid reviewers.

3. Node Behaviours
==================

Added the following paragraph at the end of the introductory text to this section:

   Section 5.1.2 describes how to derive the filters by means of
   which PCN-ingress-nodes and PCN-egress-nodes are able to classify
   incoming packets into ingress-egress-aggregates.

3.3.3. Decision Point Action For Missing PCN-Boundary-Node Reports
==================================================================

Changed the paragraph dealing with egress node reporting timeouts:

OLD

   If timer t-recvFail expires for a given PCN-egress-node, the
   Decision Point SHOULD notify management. A Decision Point
   collocated with a PCN-ingress-node SHOULD cease to admit
   PCN-flows to the ingress-egress-aggregate associated with the
   given PCN-egress-node, until it again receives a report from
   that node. A centralized Decision Point MAY cease to admit
   PCN-flows to all ingress-egress-aggregates destined to the
   PCN-egress-node concerned, until it again receives a report
   from that node.

NEW

   If timer t-recvFail expires for a given PCN-egress-node, the
   Decision Point SHOULD notify management. A log format is
   defined for that purpose in Section 5.2.1.1. Other actions
   depend on local policy, but MAY include blocking of new flows
   destined for the PCN-egress-node concerned until another report
   is received from it. Termination of already-admitted flows is
   also possible, but could be triggered by the receipt of
   "Destination unreachable" messages at the PCN-ingress-node.

5.1.2. Specification of Node- and Link-Specific Parameters
==========================================================

Replaced the first three paragraphs of this section:

OLD

   Each PCN-ingress-node needs filters to classify incoming PCN packets
   according to ingress-egress-aggregate, both to satisfy Decision Point
   requests for sent traffic rates and, if applicable, to support
   encapsulation.  If PCN packets are being tunneled to the PCN-egress-
   nodes (encapsulation), the PCN-ingress-node also needs the address of
   the PCN-egress-node for each ingress-egress-aggregate.

   Each PCN-egress-node needs filters to classify incoming PCN packets
   by ingress-egress-aggregate, in order to gather measurements on a
   per-aggregate basis.  The PCN-egress-node also needs to know the
   address of the Decision Point to which it sends reports for each
   ingress-egress-aggregate.

   If [I-D.tsvwg-rsvp-pcn] is deployed and the Decision Points are
   collocated with the PCN-ingress-nodes, this information can be built
   up dynamically from the contents of the end-to-end RSVP signalling
   and does not have to be pre-configured.  Otherwise the filters have
   to be derived from the routing tables in use in the domain, and the
   address of the peer at the other end of each ingress-egress-aggregate
   has to be tabulated for each PCN-edge-node.

NEW

   Filters are required at both the PCN-ingress-node and the PCN-egress-
   node to classify incoming PCN packets by ingress-egress-aggregate.
   Because of the potential use of multi-path routing in domains
   upstream of the PCN-domain, it is impossible to do such
   classification reliably at the PCN-egress-node based on the packet
   header contents as originally received at the PCN-ingress-node.
   (Packets with the same header contents could enter the PCN-domain at
   multiple PCN-ingress-nodes.)  As a result, the only way to construct
   such filters reliably is to tunnel the packets from the PCN-ingress-
   node to the PCN-egress-node.

   The PCN-ingress-node needs filters in order to place PCN packets into
   the right tunnel in the first instance, and also to satisfy requests
   from the Decision Point for admission rates into specific ingress-
   egress-aggregates.  These filters select the PCN-egress-node, but not
   necessarily a specific path through the network to that node.  As a
   result, they are likely to be stable even in the face of failures in
   the network, except when the PCN-egress-node itself becomes
   unreachable.  The primary basis for their derivation will be routing
   policy given the packet's original origin and destination.  Since all
   PCN packets will be tunneled, the PCN-ingress-node also needs to know
   the address of the peer PCN-egress-node associated with each filter.

   Operators may wish to give some thought to the provisioning of
   alternate egress points for some or all ingress-egress aggregates in
   case of failure of the PCN-egress-node.  This could require the
   setting up of standby tunnels to these alternate egress points.

   Each PCN-egress-node needs filters to classify incoming PCN packets
   by ingress-egress-aggregate, in order to gather measurements on a
   per-aggregate basis.  These filters are constructed on the basis of
   the identifier of the tunnel from which the incoming packet has
   emerged (e.g. the source address in the outer header if IP
   encapsulation is used).  The PCN-egress-node also needs to know the
   address of the Decision Point to which it sends reports for each
   ingress-egress-aggregate.

5.2.1.  Event Logging In the PCN Domain
=======================================

Added the following paragraph:

   The field names (e.g., HOSTNAME, STRUCTURED-DATA) used in the
   following subsections are defined in [RFC5424].      
                        
_______________________________________________
Gen-art mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to