Suresh,

On 8/19/10 9:43 AM, Suresh Krishnan wrote:
> Hi Woj,
> 
> On 10-08-19 09:22 AM, Wojciech Dec wrote:
>> There seems to be reason to explain the context/workings more clearly,
>> both in terms of multicasting an RA and the overall expected BBF usage.
> 
> The draft describes how the sender of the RA deals with a tunneled RS
> with a LIO. No RS received, nothing in the draft is applicable.
> Multicasting an unsolicited RA is performed as per RFC4861/RFC4862. This
> is not something covered in the draft. I am not sure what you want me to
> explain here. As the editor of the BBF spec in question, I would have
> thought that you would be more qualified than me to explain the BBF usage.

I think there is some misunderstanding going on here and I believe it
may have to do with the lack of detail (and maybe some typos) in the
draft.  It appears that sections 5 & 6 could be made more clear with a
few additions.

First, it would be useful to expand all the acronyms in Figure 1 so that
there is a clear understanding what the roles are of all the nodes in
the diagram.  A *short* description of each node's role would be quite
useful.

Second, it would be useful if the text in sections 5 & 6 referenced the
figure so that we know what nodes are originating which messages.  For
example, section 5.1 talks about receiving an RS from a subscriber, but
there is no node in the diagram labeled as the subscriber.  Which node
sends that RS?

Finally, I found the section heading of 6.1 confusing.  It references a
subscriber, but the text only talks about the access node.  One can
infer how this works, but it would be better if it was clarified so that
we don't have differing views of what is going on.

Regards,
Brian
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to