Hello Tom,
To make the overhead discussion quantitative and realistic, I’ve made a
spreadsheet of user-plane total overhead comparison by deployment scenarios.
https://docs.google.com/spreadsheets/d/1Fx8ilE_bQPkhFBoSd-qRS5ok2IO1i0VZbmwzZJNVh0g/edit?usp=sharing
This includes not only fo
Charlie,
Thanks for the example. A couple of notes.
I appears that in your proposed terminology for Descriptors and Actions it is
not clear where Attribute Values appear. Are they the Settings we’ve been
using?
To your proposal “For simplicity, I suggest that the Policy Keys enable access
Hello folks,
Policy seems always to be complicated. I wrote up a scenario that, I
think, captures many of the complications and relevant areas of
application. I also think the explanations about policy management as
used in the scenario mostly represent the intention of the text
currently
Hi Tom,
Thank you, first of all, for your interest!
Yes, SID list can be reduced in some cases. I agree it should be restricted
to the minimum necessary.
I think ILA and SRv6 share a common view, while SRv6 allows more flexible
functions.
Regarding RFC8200, attacks can be and should be prevente