[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

comments on draft-ietf-multi6-v4-multihoming-00.txt



substantial
-----------

3. Motivations for Multihoming

==> this section should be removed completely, as it is duplicated
in the multihoming goals document now.

4. Features of IPv4 Multihoming

==> this document assumes a prior knowledge of what "*THE* IPv4
multihoming solution" is.  This has not been described anywhere.
So, I'd propose to add a new section to replace sect 3 to describe
a few common ways of doing it.  There should be enough meat here, as
I had 16 pages of analysis of current methods in my thesis about
site multihoming.

basically, I think you can divide the IPv4 multihoming techniques
to about five different types:

 1) multihoming using your own AS number and your own prefix,
    advertising them through multiple providers.

 2) multihoming using your own AS number, but advertising 
    a more specific prefix from one of your ISPs.  Some of these
    are multihomers (the backup is through the ISP which announces
    the aggregate), some have just bought the prefix when they
    changed ISP.

 3) multihoming with your own prefix, but without your own (public)
    AS number.  As the cost of the AS is low, this is rather rare.
    The customer uses private AS numbers or the ISP proxy-advertises
    the prefixes.  Nondistinguishable from "origin theft" as multiple
    AS's seem to be originating the same prefix.

 4) multi-attaching multiple times to an ISP, even though not
    strictly multihoming, is also popular.  This is a very simple
    operation, and often the tradeoffs (unless you want independence
    as a multihoming motivation) are acceptable if you pick the right
    provider.

 5) employing NAT-based or RFC2260 -like solutions (you could also
    separate these two) to achieve at least some multihoming
    benefits.  Typically you cannot get everything, but for some,
    this has been enough.

In section 4, you've analyzed only 1).  This may be OK, as the
characteristics are similar with the other major method, 2).  But
this needs to be spelled out.  Another way would be analyzing each
of these in turn, or the like.

==> you should also include the analysis of the "additional features"
of the multihoming goals document wrt IPv4 multihoming, I guess?

==> the lists are also not up-to-date, as you don't list e.g. DNS or 
packet filtering.

6. Security Considerations

   Security considerations are not discussed in this draft.

==> this must be a flame-bait :), so replace it with something like:

   This memo analyzes the IPv4 multihoming practices.  This analysis
   only includes the description of the mechanisms and partially how
   they affect the availability of the site deploying the IPv4
   multihoming mechanism.  Other security properties of the IPv4
   multihoming mechanisms are not analyzed.

5. Limitations of IPv4 Multihoming

5.1 Scalability

==> I'd also add here something like:

   These mechanisms also add to the consumption of public AS number
   resources, when small sites wishing to multihome obtain an AS
   number specifically for only that purpose.  Using a different
   mechanism would help to conserve the 16-bit AS number space, and
   avoid the move to 32-bit AS numbers.

editorial
---------

==> throughout the document, one uses "enterprises" rather than "sites"
-- is this intentional?

Abstract

   Multihoming is an essential component of service for enterprises [3]
   which are part of the Internet.  This draft describes some of the
   motivations, practices and limitations of multihoming as it is
   achieved in the IPv4 world today.

   The context for this discussion is the requirements analysis for site
   multihoming in IPv6, which is described in a companion draft [1]. 

==> the abstract must not include references

2. Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [4].

==> these terms can be removed, they shouldn't be used in a document
like this anyway.

References

==> references need to split to informative and normative.

-- 
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings