Hi authors, Speaking as an individual contributor, I have some questions about the draft. Line numbers are from idnits.
First, why is the draft experimental? The second paragraph of section 2 explains how the mechanism works in "the first time period", my understanding is that if the direct neighbor is a transit node, the mechanism doesn't work for the first period. If so, it should be clarified in this section as well, not only in section 4. 127 packets around the failed endpoint node. It changes the IPv6 128 destination address with the IPv6 address of the next endpoint node 129 (or the last or other reasonable endpoint node) which could avoid 130 going through the failed endpoint. Some explanation is needed for "(or the last or other reasonable endpoint node)". Using the example in Figure 1, if N3 fails, to reach the next endpoint in N4 from N2, N3 is the next hop. In this case, how to decide when to use the repair path (mentioned in section 3) or move to the next endpoint. 171 failed endpoint node), it performs the proxy forwarding as follows: Please explain "proxy forwarding". 219 ELSE IF there is no FIB entry for forwarding the packet THEN 220 IF NH = SRH && SL != 0 THEN 221 SL decreases; update the IPv6 DA with SRH[SL]; 222 FIB lookup on the updated DA; 223 forward the packet according to the matched entry; For line #222, what happens if the lookup fails? The security considerations in section 6 need editorial work. Thanks, Yingzhen
_______________________________________________ rtgwg mailing list [email protected] https://www.ietf.org/mailman/listinfo/rtgwg
