Hi authors,

Speaking as an individual contributor, I have some questions about the
draft. Line numbers are from idnits.

First, why is the draft experimental?

The second paragraph of section 2 explains how the mechanism works in "the
first time period", my understanding is that if the direct neighbor is a
transit node, the mechanism doesn't work for the first period. If so, it
should be clarified in this section as well, not only in section 4.

127        packets around the failed endpoint node.  It changes the IPv6
128        destination address with the IPv6 address of the next endpoint node
129        (or the last or other reasonable endpoint node) which could avoid
130        going through the failed endpoint.

Some explanation is needed for "(or the last or other reasonable endpoint
node)". Using the example in Figure 1, if N3 fails, to reach the next
endpoint in N4 from N2, N3 is the next hop. In this case, how to decide
when to use the repair path (mentioned in section 3) or move to the next
endpoint.

171        failed endpoint node), it performs the proxy forwarding as follows:

Please explain "proxy forwarding".


219          ELSE IF there is no FIB entry for forwarding the packet THEN
220            IF NH = SRH && SL != 0 THEN
221              SL decreases; update the IPv6 DA with SRH[SL];
222              FIB lookup on the updated DA;
223              forward the packet according to the matched entry;

For line #222, what happens if the lookup fails?

The security considerations in section 6 need editorial work.

Thanks,
Yingzhen
_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg

Reply via email to