<trimming a bit the spam list :)>

Hi Carlos,

Perhaps I was not very clear in the question. I understand that you are adding the ability for ingress where for L2TPv3 over IP - Session ID & for GRE - GRE key are distributed per egress as per RFC5512.

This is great !

But what I was mainly asking about was the case where egress does not signal GRE key. Per 5512 is seems very well allowed as key is optional:

   "Note that the key is optional.  Unless a key value is being
    advertised, the GRE encapsulation sub-TLV MUST NOT be present."

Then if one would read carefully your draft is says there:

   "Needless to say, if an egress router does not support load balancing
   block sub-TLV, the Softwire continues to operate with a single load
   balancing field that all ingress routers encapsulate with."

But since the whole purpose is to provide some additional field in the IP encapsulation header other then play with src address for core routers doing ECMP shouldn't we mention some text allowing for local ingress PE injection of random keys when such a keys are not required by application using 5512 for it's mesh tunnel setup ?

As to my second question I agree. In fact your proposal allows for sort of overloading the GRE key semantics to serve both for given application as well as for core load-balancing.

Many thx,
R.


Hi Robert,

Thank you for your comments, please see inline.

On 4/24/2009 4:31 AM, Robert Raszuk wrote:
Hi David,

Perhaps I may have missed the discussion on this in the other WGs but I have two comments/questions ...

* Why the decision on enhancing the load balancing capability of IP encapsulated packet has to be signaled as opposed to be a local matter of the ingress router performing encapsulation ?

This is because the load-balancing field is signaled (see RFC5512), so
using for lb it needs signaling of a block to avoid collisions. Note
also the context from the title, lb for Mesh Softwires. For the L2TPv3
case, and from <http://tools.ietf.org/html/rfc5512#section-4.1>, the
only encapsulating header field that is always there is the Session ID
(Cookie is optional), which is signaled; the case for GRE is equivalent,
but also please see below. If it's only a local matter, the
encapsulating header's fields could not be used and you would be limited
to playing with e.g., the source IP address.

* Reg use of GRE key for the purpose of load balancing I must say that GRE key has already been proposed in number of solutions today. Therefor overloading more on it may be impractical. Did authors analyzed use of Sequence Numbers in GRE header instead for the purpose of increasing effectiveness of load-balancing by the transit nodes ?

Yes, it was considered, but we need a field that can be used for flow
identification. From RFC2890, the seq # MUST be used by the receiver to
establish packet transmission order, so it's incompatible with a
per-flow use. The GRE Key's semantics from RFC2890 match this use,
<http://tools.ietf.org/html/rfc2890#section-2.1>:

   The Key field contains a four octet number which was inserted by the
   encapsulator. The actual method by which this Key is obtained is
   beyond the scope of the document. The Key field is intended to be
   used for identifying an individual traffic flow within a tunnel.

Thanks,

-- Carlos.



Cheers,
R.


All -
Following the last IETF meeting all comments have been addressed in:

http://tools.ietf.org/html/draft-ietf-softwire-lb-02

The authors have requested a WG LC and I have added L3VPN and PWE3 that may be interested and have comments on the technology. Please send back all comments by May 7, 2009.

Thanks

DWard, Alain
_______________________________________________
Softwires mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/softwires




_______________________________________________
Softwires mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/softwires

Reply via email to