Hello Roman, 

Thanks for the comments on the draft! 
I replied inline starting with '> ' 

=============================================================== 
Roman Danyliw has entered the following ballot position for 
draft-ietf-6tisch-msf-12: Discuss 

When responding, please keep the subject line intact and reply to all 
email addresses included in the To and CC lines. (Feel free to cut this 
introductory paragraph, however.) 


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html 
for more information about IESG DISCUSS and COMMENT positions. 


The document, along with other ballot positions, can be found here: 
https://datatracker.ietf.org/doc/draft-ietf-6tisch-msf/ 


---------------------------------------------------------------------- 
DISCUSS: 
---------------------------------------------------------------------- 

Section 3. Can the normative reference for the SAX algorithm be clarified. 
The text cites [SAX-DASFAA], but this is an informative reference (and an 
academic paper with no URL). Appendix B, appears to also describe an algorithm 
but the introduction describes the text as “an example implementation SAX hash 
function”. 

> Considering the interoperability, the SAX algorithm MUST be implemented which 
> indicates SAX is a normative reference. 
> So to your question, yes. 
> The Appendix B describes how the SAX algorithm works also it defines the 
> value of parameters used 
> In SAX, for interoperability consideration as well. 
> The DOI of this SAX paper is at https://doi.org/10.1142/9789812819536_0023 
> For action, we will move the SAX citation to normative reference along with 
> the DOI address. 

---------------------------------------------------------------------- 
COMMENT: 
---------------------------------------------------------------------- 

** Section 4.2. of RFC8480 outlines requirements for a specification of an SF. 
One of those it that the SF “SHOULD clearly state the application domain the SF 
is created for.” Is there one for this draft? 

> Yes, in Section 1, the application domain is declared as wide range of domain 
> but optimized for applications with upstream traffic (from the nodes to the 
> DODAG root). 

MSF is designed to operate in a wide range of application domains.
   It is optimized for applications with regular upstream traffic (from
   the nodes to the DODAG root). 


** Section 5.1. Per “In case that a node booted or disappeared from the 
network, the cell reserved at the selected parent may be kept in the schedule 
forever. A clean-up mechanism MUST be provided to resolve this issue.”, is 
there an implicit DDoS being described here where rogue nodes could boot up and 
hold cells before the clean-up mechanism activates? 

> For this paragraph, we are actually trying to describe more generic situation 
> such as: 
> The maintainer of the network manually switched off the node and on later or 
> just because out of battery. 
> The clean-up mechanism happens on the parent of the node who is booted or 
> disappeared. 

> May I understand it wrong, but when a node boots up, its schedule should be 
> reset as well, hence it won't be 
> hold the previous cells to the parent. 

** Appendix B. Per step #8, what does this do? h should already have the 
final value of Step 4 assigned to h. 

> Yes, that's a redundant step. It will be removed from next re-version of MSF. 
> Thanks for pointing out! 

** Editorial Nits: 
-- Section 4.4. Typo. s/Neighbor Dicovery/Discovery/ 

> Will be fixed in next re-version, 

-- Section 16. Typos. s/MSF adapts to traffics containing packets from IP 
layer/MSF adapts to traffic containing packet from the IP layer/ 

> Will be fixed in next re-version , 

_______________________________________________
6tisch mailing list
6tisch@ietf.org
https://www.ietf.org/mailman/listinfo/6tisch

Reply via email to