Scott Brim wrote:
On 7/15/08 7:09 AM, Joe Touch allegedly wrote:


John.zhao wrote:
Hi, Joe

Thanks. So it is can be learnt that GRE,Mini Encapsulation seem also
can be discussed here, right?

We intend to include broader discussion of other encapsulations in future versions; this was intended to be an initial attempt, and omissions were not intentional.

We've already received suggestions to include GRE. Can you please provide info on Mini Encapsulation, though?

Note that we've also had a suggestion to include MPLS. MPLS is more like a conventional L2 layer, which not only encapsulates and decapsulates, but also adds new hop-by-hop forwarding. I think it's important to distinguish tunneling from L2 or other conventional protocol layering, and I believe this is easy as follows:

   tunnels:
    - encaps/decaps of new headers at the endpoints
    - NO new mechanism between the endpoints

   other protocol layering
    - encaps/decaps of new headers at the endpoints
    - new mechanism between the endpoints that may or may
    not rewrite thes headers

These sound okay but I would like to see "tunnels" split into two: one type where there is a setup phase and sharing state between the endpoints, and another where there is no shared state: an endpoint can encapsulate a packet, toss it to another endpoint, and the receiving endpoint will decapsulate it and do the right thing. There are three qualitatively different levels in the setup mechanism and where shared state resides.
I don't think a case where an operational tunnel has absolutely no shared state exists. I say this because I will argue that the simple fact that one endpoint knows (i.e., is configured) that a packet encapsulated in a certain way will be properly decapsulated at the tunnel destination the packet is sent to is, alone, a kind of shared state. In practice, most tunneling setups, even ones with the simplest of CLI to set them up, end up with coordinated options configured on both sides of the tunnels, filters to allow packets only from specific destinations, etc.

So, I'm afraid this would be like trying to characterize something as black and white, where in reality there are shades of gray.

What perhaps you are getting at though is whether you typically see a control protocol between endpoints in order to operate the tunnel, or whether the tunnel itself is "dynamic" in nature. Even here though the lines can blur - e.g., there are often modes for a given tunnel type that is typically setup with a control plane to be setup with static config and vice versa (e.g., statically configured MPLS LSPs, control protocols for GRE). At best, I think we could explore the different "qualitatively different levels" you refer to, and discuss the cases where a given tunneling protocol operates in one mode vs. the other. Can you provide more information on what you were referring to here?

- Mark


Scott



_______________________________________________
Int-area mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/int-area


_______________________________________________
Int-area mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to