Skip to main content

Methodology for Benchmarking MPLS Traffic Engineered (MPLS-TE) Fast Reroute Protection
draft-ietf-bmwg-protection-meth-14

Revision differences

Document history

Date Rev. By Action
2013-03-14
14 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2013-03-04
14 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2013-01-04
14 Amy Vezza State changed to RFC Ed Queue from Approved-announcement sent
2013-01-03
14 (System) IANA Action state changed to No IC
2013-01-03
14 Cindy Morgan State changed to Approved-announcement sent from Approved-announcement to be sent
2013-01-03
14 Cindy Morgan IESG has approved the document
2013-01-03
14 Cindy Morgan Closed "Approve" ballot
2013-01-03
14 Cindy Morgan Ballot approval text was generated
2013-01-03
14 Cindy Morgan Ballot writeup was changed
2013-01-03
14 Ron Bonica State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2012-12-14
14 Stewart Bryant
[Ballot comment]
I am updating my comment to clarify it. It is a point that was somewhat obliquely a Discuss last time round, but I …
[Ballot comment]
I am updating my comment to clarify it. It is a point that was somewhat obliquely a Discuss last time round, but I did not properly explain the point. I would raise this as a discuss, but I do not think the review rules permit this.

The text that says : "MPLS FRR protection  mechanisms are generally deployed in a network infrastructure where MPLS is used for provisioning of point-to-point traffic engineered tunnels (tunnel)." and the absence of discussion on the topic elsewhere suggests that you have not considered an important (arguably the most important) deployment case.

In an otherwise LDP network a one hop RSVP-TE tunnel is deployed across a link. This tunnel is normally PHPed, but is protected, so normally no label is pushed on the main tunnel. This case will impact the LSR configuration compared to the pure RSVP-TE case and will impact the restoration, because you have three routing process that interact - the IGP, LDP and RSVP-TE. You do the same think for node protection, but cannot of course PHP.

You might want to rule the case out of scope, although this will reduce the utility of the testing, or you could consider it, but you really ought to provide evidence that you have thought about the implications and validity of your tests in this network environment.
2012-12-14
14 Stewart Bryant [Ballot Position Update] Position for Stewart Bryant has been changed to No Objection from Discuss
2012-11-27
14 (System) Sub state has been changed to AD Followup from Revised ID Needed
2012-11-27
14 Rajiv Papneja New version available: draft-ietf-bmwg-protection-meth-14.txt
2012-11-15
13 Cindy Morgan State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation
2012-11-15
13 Russ Housley
[Ballot comment]
  Thanks for addressing the issues raised in the Gen-ART Review by
  Joel Halpern on 9-Mar-2012.  Joel did a second review on …
[Ballot comment]
  Thanks for addressing the issues raised in the Gen-ART Review by
  Joel Halpern on 9-Mar-2012.  Joel did a second review on 12-Nov-2012.
  Please consider these non-blocking comments from the second review.

  In section 5.1 "some" failure events are listed. It is unclear
  whether this list is the ones to be tested for, or just "some"
  events.  I think it is intended to be comprehensive, so why "some".

  I presume that the use of the term Layer2 VC in section 6 is
  intended to refer to a pt-to-pt layer2 VPN component.  Is there an
  existing document where that term is used that way?  Could it be
  referenced?  For that matter, since the number of labels is the same
  in the Layer3 cases and the Layer2 cases, could the Layer2 cases be
  omitted without loss of generality?
2012-11-15
13 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss
2012-11-15
13 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo
2012-11-15
13 Stewart Bryant
[Ballot discuss]
As far as I can see from reading the document the authors are considering FRR solely in the explicit case of MPLS-TE FRR …
[Ballot discuss]
As far as I can see from reading the document the authors are considering FRR solely in the explicit case of MPLS-TE FRR being used to protect an MPLS-TE LSP. FRR and MPLS protection have developed considerably since that initial concept. Additionally one of the most common uses of MPLS-TE FRR is to protect a one hop tunnel with PHP (i.e. a null tunnel) which in turn is used as a method of protecting a hop in an LDP MPLS network.

Please can the authors make it much clearer in the introduction and scoping of the document that testing issues related to MPLS/LDP, IPFRR applied to MPLS networks (RFC5714 applied to MPLS), and MPLS-TP have not been taken into  consideration, and are thus out of scope for this document.

I think that there is a zero label case that needs to be tested - one hop php tunnel at network egress protected by a TE tunnel.
2012-11-15
13 Stewart Bryant
[Ballot comment]

MPLS FRR protection
mechanisms are generally deployed in a network infrastructure where
MPLS is used for provisioning of point-to-point traffic engineered
tunnels (tunnel).  …
[Ballot comment]

MPLS FRR protection
mechanisms are generally deployed in a network infrastructure where
MPLS is used for provisioning of point-to-point traffic engineered
tunnels (tunnel). 

True, but one of the most common deployments of those P2P TE tunnels is to protect a ling or node in an MPLS LDP network.

=====

Planned failures are predictable.

I am not sure whether that is true by definition or an oxymoron. Presumable you mean planned exercise of the
protection mechanism, or planned reconfiguration or maintenance
of the network.

=====

          - Interface Shutdown on PLR side with POS Alarm
          - Interface Shutdown on remote side with POS Alarm

I am not sure why the author single out  POS here, surely there are many p2p link types including Ethernet supported by Y.1731?
2012-11-15
13 Stewart Bryant [Ballot Position Update] New position, Discuss, has been recorded for Stewart Bryant
2012-11-15
13 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded for Ralph Droms
2012-11-15
13 Benoît Claise
[Ballot comment]
Minor points.

  Within the context of MPLS
  protection mechanisms, failures that arise due to Shared Risk Link
  Groups (SRLG) [ …
[Ballot comment]
Minor points.

  Within the context of MPLS
  protection mechanisms, failures that arise due to Shared Risk Link
  Groups (SRLG) [RFC 4090] can be considered as correlated failures.

Isn't the reference rfc4202? RFC4090 doesn't even spell the acronym

Spell out the acronym or give references in (surely the RFC editor would note that as well)

  "Within the context of MPLS
  protection mechanisms, failures that arise due to Shared Risk Link
  Groups (SRLG) [RFC 4090] can be considered as correlated failures."
2012-11-15
13 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2012-11-14
13 Pete Resnick
[Ballot comment]
Aside from Barry's comment about the 2119 template (which I agree is poorly worded and should be changed), I don't really understand why …
[Ballot comment]
Aside from Barry's comment about the 2119 template (which I agree is poorly worded and should be changed), I don't really understand why any of the 2119 language in this document is useful. For example, when you say, "The tester MUST record the number of lost, duplicate, and out-of-order packets" in section 4, I am left to ask, "Why MUST the tester do that?" It's not explained, and I suspect all it means is, "The tester has to record those things if it wants to know those things." I'm pretty sure that all of the 2119 language could be removed from the document without changing its utility.
2012-11-14
13 Pete Resnick [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick
2012-11-14
13 Rajiv Papneja New version available: draft-ietf-bmwg-protection-meth-13.txt
2012-11-14
12 Sean Turner [Ballot Position Update] New position, No Objection, has been recorded for Sean Turner
2012-11-14
12 Martin Stiemerling [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling
2012-11-13
12 Brian Haberman [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman
2012-11-13
12 Russ Housley
[Ballot discuss]

  Thanks for addressing the issues raised in the Gen-ART Review by
  Joel Halpern on 9-Mar-2012.  Joel did a second review on …
[Ballot discuss]

  Thanks for addressing the issues raised in the Gen-ART Review by
  Joel Halpern on 9-Mar-2012.  Joel did a second review on 12-Nov-2012,
  which raised an additional concern.

  Section 5.7 is still internally inconsistent.  It says that "It is
  suggested that there be three or more traffic streams..." in the
  first paragraph.  The second paragraph then begins "At least 16 flows
  should be used, ..."  I have compared the definitions in RFC 4689,
  and I can not see how 3 streams (A group of packets treated as a
  single entity by the traffic receiver) can be 16 flows (one or more
  packets sharing a common intended pair of ingress and egress
  interfaces.)  I suspect that the issue is what traffic receiver is
  intended.  Is the intent that there be at least 3 LSPs with 16 or
  more flows running through them?
2012-11-13
12 Russ Housley
[Ballot comment]

  Thanks for addressing the issues raised in the Gen-ART Review by
  Joel Halpern on 9-Mar-2012.  Joel did a second review on …
[Ballot comment]

  Thanks for addressing the issues raised in the Gen-ART Review by
  Joel Halpern on 9-Mar-2012.  Joel did a second review on 12-Nov-2012.
  Please consider these non-blocking comments from the second review.

  In section 5.1 "some" failure events are listed. It is unclear
  whether this list is the ones to be tested for, or just "some"
  events.  I think it is intended to be comprehensive, so why "some".

  I presume that the use of the term Layer2 VC in section 6 is
  intended to refer to a pt-to-pt layer2 VPN component.  Is there an
  existing document where that term is used that way?  Could it be
  referenced?  For that matter, since the number of labels is the same
  in the Layer3 cases and the Layer2 cases, could the Layer2 cases be
  omitted without loss of generality?
2012-11-13
12 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded for Russ Housley
2012-11-13
12 Stephen Farrell
[Ballot comment]

- s2, saying you cover "all possible failure scenarios" seems
ambitious - is it really true? How about buggy code?  I'd
suggest s/all …
[Ballot comment]

- s2, saying you cover "all possible failure scenarios" seems
ambitious - is it really true? How about buggy code?  I'd
suggest s/all possible/a set of interesting/

- s4, it'd be good to say what the lines in Figure 1 represent,
e.g. physical connections or routes or tunnels or whatever,
that may be well known for MPLS developers but perhaps less so
for testers?

- s4, probably a dumb question (sorry;-) but is the definition
of the number of re-ordered packets clear?  e.g. does the
sequence 1,4,3,2,5,6 have two or three re-ordered packets?
What about 1,4,4,3,2,5,6? Later sections also talk about
"Out-of-order" packets, is that meant to be the same thing?
Better to use one term only if so.

- s5.7, last para: fwiw, this seems a bit open-ended for a
benchmark to my uneducated eye. If it makes no difference to
the outcome, be good to say that maybe.
2012-11-13
12 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell
2012-11-13
12 Adrian Farrel
[Ballot comment]
Thanks to the authors for addressing most (but not all) of the issues
I raised in my review last time this document came …
[Ballot comment]
Thanks to the authors for addressing most (but not all) of the issues
I raised in my review last time this document came to the IESG.

Although I have a number of comments and concerns about this document
I will not stand in the way.

---

Reading the earlier part of the document, I got the impression that the
mechanism of failure detection and reporting was out of scope.

However, looking at later sections (such as Section 5.9) I see that you
propose to measure based on packet loss or timestamped packets over the
failure. Both of these measures are dependent on the methods of
detection and reporting.

So I don't understand how the test cases work for anything other than
local errors. And even in these cases, it seems you are more likely
testing and recording fault report times in the DUT than measuring the
actual failover times.

---

Section 7.1.1 etc.

      3.  Verify primary and backup LSPs are up and that primary is
          protected.

      4.  Verify Fast Reroute protection is enabled and ready.

I don't find any description of how these items are verified.

---

Abstract

  This draft describes the methodology for benchmarking MPLS Protection
  mechanisms for link and node protection as defined in [RFC 4090].

It would be nice if this was alligned with the document title by
specifically stating "MPLS Fast Reroute Protection"

===

The following are nits that you may want to sort out before passing the
document to the RFC Editor...

---

I think Jean Louis needs to be correclty abreviated on the front page
viz. JL. Le Roux.

---

It would be good to replace "draft" with "document" so that the text is
consistent when published as an RFC

---

Citations should not be pesent in the Abstract.

---

The Abstract suggests that the document considers "all other factors".
This seems a little unlikely :-)

---

Section 3

This section could usefully include a pointer to Appendix B.

---

Section 5

Slightly odd that the 7 points listed don't match the sub-sections of
this section.
2012-11-13
12 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel
2012-11-12
12 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded for Robert Sparks
2012-11-12
12 Wesley Eddy [Ballot Position Update] New position, No Objection, has been recorded for Wesley Eddy
2012-11-08
12 Jean Mahoney Request for Telechat review by GENART is assigned to Joel Halpern
2012-11-08
12 Jean Mahoney Request for Telechat review by GENART is assigned to Joel Halpern
2012-11-04
12 Rajiv Papneja New version available: draft-ietf-bmwg-protection-meth-12.txt
2012-10-30
11 Barry Leiba
[Ballot comment]
Non-blocking comments only.  No need to respond, though I'll be happy to chat with you about them if you like.

The datatracker and …
[Ballot comment]
Non-blocking comments only.  No need to respond, though I'll be happy to chat with you about them if you like.

The datatracker and shepherd writeup say this is targeted as Informational, but the document says it's Standards Track.  Which is it?

The Introduction says, "For any conflicting content, this document supersedes [RFC 6414]."  Doesn't that mean that this should Update 6414?

The 2119 boilerplate (Section 3) adds this:

  RFC 2119 defines the use of these key words to help make the
  intent of standards track documents as clear as possible.  While this
  document uses these keywords, this document is not a standards track
  document.

That seems *really* odd: you're saying that these words aren't meant for the purpose that 2119 uses them for, but you don't say what purpose they *are* used for.  If you feel you need to explain this, you should focus on explaining, not disclaiming.  Something more like this (word it as you see appropriate):

  While RFC 2119 defines the use of these key words primarily for
  Standards Track documents, this Informational document uses them
  to [...insert explanation here...].

-- Figure 1 --
The text should perhaps say what all the "Rn" boxes are, and make it clear that they are not part of the Tester -- only the TG and TA are.  It might also expand "DUT" on first use (it's not expanded until Section 5.3).
2012-10-30
11 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2012-10-26
11 Ron Bonica Placed on agenda for telechat - 2012-11-15
2012-10-26
11 Ron Bonica State changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup
2012-09-28
11 (System) Sub state has been changed to AD Followup from Revised ID Needed
2012-09-28
11 Rajiv Papneja New version available: draft-ietf-bmwg-protection-meth-11.txt
2012-08-30
10 Ron Bonica State changed to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead
2012-08-10
10 Joel Halpern Request for Last Call review by GENART Completed: Ready. Reviewer: Joel Halpern.
2012-05-28
10 Rajiv Papneja New version available: draft-ietf-bmwg-protection-meth-10.txt
2012-04-13
09 Ron Bonica Removed from agenda for telechat
2012-04-05
09 Ron Bonica Telechat date has been changed to 2012-04-26 from 2012-04-12
2012-04-03
09 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Kathleen Moriarty.
2012-03-20
09 Amanda Baber We understand that this document doesn't have any IANA actions.
2012-03-20
09 (System) State changed to Waiting for AD Go-Ahead from In Last Call
2012-03-09
09 Jean Mahoney Request for Last Call review by GENART is assigned to Joel Halpern
2012-03-09
09 Jean Mahoney Request for Last Call review by GENART is assigned to Joel Halpern
2012-03-08
09 Samuel Weiler Request for Last Call review by SECDIR is assigned to Kathleen Moriarty
2012-03-08
09 Samuel Weiler Request for Last Call review by SECDIR is assigned to Kathleen Moriarty
2012-03-06
09 Cindy Morgan Last call sent
2012-03-06
09 Cindy Morgan
State changed to In Last Call from Last Call Requested

The following Last Call Announcement was sent out:

From: The IESG

To: IETF-Announce

CC:

Reply-To: …
State changed to In Last Call from Last Call Requested

The following Last Call Announcement was sent out:

From: The IESG

To: IETF-Announce

CC:

Reply-To: ietf@ietf.org

Subject: Last Call:  (Methodology for benchmarking MPLS protection mechanisms) to Informational RFC





The IESG has received a request from the Benchmarking Methodology WG

(bmwg) to consider the following document:

- 'Methodology for benchmarking MPLS protection mechanisms'

  as an Informational RFC



The IESG plans to make a decision in the next few weeks, and solicits

final comments on this action. Please send substantive comments to the

ietf@ietf.org mailing lists by 2012-03-20. Exceptionally, comments may be

sent to iesg@ietf.org instead. In either case, please retain the

beginning of the Subject line to allow automated sorting.



Abstract





  This draft describes the methodology for benchmarking MPLS Protection

  mechanisms for link and node protection as defined in [MPLS-FRR-EXT].

  This document provides test methodologies and testbed setup for

  measuring failover times while considering all dependencies that

  might impact faster recovery of real-time applications bound to MPLS

  based traffic engineered tunnels.  The benchmarking terms used in

  this document are defined in [TERM-ID].









The file can be obtained via

http://datatracker.ietf.org/doc/draft-ietf-bmwg-protection-meth/



IESG discussion can be tracked via

http://datatracker.ietf.org/doc/draft-ietf-bmwg-protection-meth/ballot/





No IPR declarations have been submitted directly on this I-D.





2012-03-06
09 Cindy Morgan Last call announcement was generated
2012-03-06
09 Ron Bonica Placed on agenda for telechat - 2012-04-12
2012-03-06
09 Ron Bonica Ballot has been issued
2012-03-06
09 Ron Bonica [Ballot Position Update] New position, Yes, has been recorded for Ronald Bonica
2012-03-06
09 Ron Bonica Created "Approve" ballot
2012-03-06
09 Ron Bonica Last call was requested
2012-03-06
09 Ron Bonica State changed to Last Call Requested from Publication Requested
2012-02-09
09 Al Morton Changed protocol writeup
2012-02-09
09 Al Morton Completed WGLC, submitted Feb 2
2012-02-09
09 Al Morton IETF state changed to Submitted to IESG for Publication from In WG Last Call
2012-02-03
09 (System) Ballot writeup text was added
2012-02-03
09 (System) Last call text was added
2012-02-03
09 (System) Ballot approval text was added
2012-02-03
09 Ron Bonica Ballot writeup text changed
2012-02-03
09 Cindy Morgan Intended Status has been changed to Informational from Proposed Standard
2012-02-03
09 Cindy Morgan
This is a Publication Request from bmwg:

Document Title:  Methodology for benchmarking MPLS protection
mechanisms
Filename:        draft-ietf-bmwg-protection-meth-09.txt
Intended Status: Informational


  (1.a) …
This is a Publication Request from bmwg:

Document Title:  Methodology for benchmarking MPLS protection
mechanisms
Filename:        draft-ietf-bmwg-protection-meth-09.txt
Intended Status: Informational


  (1.a) Who is the Document Shepherd for this document? Has the
        Document Shepherd personally reviewed this version of the
        document and, in particular, does he or she believe this
        version is ready for forwarding to the IESG for publication?
Al Morton, who has reviewed the memo. It is ready (+/- a few minor edits,
see the end of this write-up).

  (1.b) Has the document had adequate review both from key WG members
        and from key non-WG members? Does the Document Shepherd have
        any concerns about the depth or breadth of the reviews that
        have been performed?
This memo has been developed over a period of 8 years, beginning with the
merger of two independent efforts, then narrowing of the scope to become a
working group draft, followed by many reviews and WGLCs. No concerns
about the current degree of review and feedback.

  (1.c) Does the Document Shepherd have concerns that the document
        needs more review from a particular or broader perspective,
        e.g., security, operational complexity, someone familiar with
        AAA, internationalization or XML?
No.

  (1.d) Does the Document Shepherd have any specific concerns or
        issues with this document that the Responsible Area Director
        and/or the IESG should be aware of? For example, perhaps he
        or she is uncomfortable with certain parts of the document, or
        has concerns whether there really is a need for it. In any
        event, if the WG has discussed those issues and has indicated
        that it still wishes to advance the document, detail those
        concerns here. Has an IPR disclosure related to this document
        been filed? If so, please include a reference to the
        disclosure and summarize the WG discussion and conclusion on
        this issue.
This memo follows the referenced Terminology RFC as expected,
although some of the terms agreed by the WG still feel awkward to me
(e.g., use of "Failover Event" where cases where "Failure" would do).

No IPR disclosures have been filed.

  (1.e) How solid is the WG consensus behind this document? Does it
        represent the strong concurrence of a few individuals, with
        others being silent, or does the WG as a whole understand and
        agree with it?
The WG reached consensus on this memo years ago, but it was agreed to
hold this draft until the IGP-Dataplane Benchmarking was completed.
Another WGLC was held in December 2011, and there were no additional
comments.

  (1.f) Has anyone threatened an appeal or otherwise indicated extreme
        discontent? If so, please summarise the areas of conflict in
        separate email messages to the Responsible Area Director. (It
        should be in a separate email because this questionnaire is
        entered into the ID Tracker.)
No.

  (1.g) Has the Document Shepherd personally verified that the
        document satisfies all ID nits? (See the Internet-Drafts Checklist
        and http://tools.ietf.org/tools/idnits/). Boilerplate checks are
        not enough; this check needs to be thorough. Has the document
        met all formal review criteria it needs to, such as the MIB
        Doctor, media type and URI type reviews?
The nits check calls out some of the same reference issues mentioned in
the Editorial comments, attached below.

  (1.h) Has the document split its references into normative and
        informative? Are there normative references to documents that
        are not ready for advancement or are otherwise in an unclear
        state? If such normative references exist, what is the
        strategy for their completion? Are there normative references
        that are downward references, as described in [RFC3967]? If
        so, list these downward references to support the Area
        Director in the Last Call procedure for them [RFC3967].
The references are split, and no DownRefs.
Many of the Informative References provide essential terminology definitions,
and are therefore Normative (see below).

  (1.i) Has the Document Shepherd verified that the document IANA
        consideration section exists and is consistent with the body
        of the document? If the document specifies protocol
        extensions, are reservations requested in appropriate IANA
        registries? Are the IANA registries clearly identified? If
        the document creates a new registry, does it define the
        proposed initial contents of the registry and an allocation
        procedure for future registrations? Does it suggest a
        reasonable name for the new registry? See [RFC5226]. If the
        document describes an Expert Review process has Shepherd
        conferred with the Responsible Area Director so that the IESG
        can appoint the needed Expert during the IESG Evaluation?
IANA section exists, making no IANA requests, as is usual in bmwg.

  (1.j) Has the Document Shepherd verified that sections of the
        document that are written in a formal language, such as XML
        code, BNF rules, MIB definitions, etc., validate correctly in
        an automated checker?
NA

  (1.k) The IESG approval announcement includes a Document
        Announcement Write-Up.

      Technical Summary
Service providers and testing organizations need to benchmark the
performance of network protection mechanisms. The BMWG took-up this work
and defined a general terminology and set of benchmarks in RFC 6414.
This memo describes the methodology for benchmarking MPLS Protection
mechanisms for link and node protection. It provides test methodologies
and test setups for measuring failover times while considering all
dependencies that might impact the recovery of real-time applications
carried in MPLS-based traffic engineered tunnels.
The test procedures in this document cover local failure or remote failure
scenarios for comprehensive benchmarking and to evaluate failover
performance independent of the failure detection techniques.


      Working Group Summary
This memo has been developed over a period of 8 years, beginning with the
merger of two independent efforts, then narrowing of the scope to become a
working group draft, followed by many reviews and WGLCs.
The WG reached consensus on this memo years ago, but it was agreed to
hold this draft until the IGP-Dataplane Benchmarking was completed.
Another WGLC was held in December 2011, and there were no additional
comments.

      Document Quality
The reviews and suggestions of Jean Philip Vasseur, Curtis Villamizar, and
Bhavani Parise are acknowledged.


-=-=-=-=-=-=-=-=-=-=-=- MINOR EDITORIAL COMMENTS -=-=-=-=-=-=-=-=-=-=-=-

Abstract and everywhere else:
s/draft/document/
s/[TERM-ID]/[RFC6414]

Sec 1, 5th para
s/assurance/continuity/

Sec 1, 7th para
s/General Model/General Model (step 3b below)/

Sec 2, 3rd para (BFD mentioned in many places, but out of scope)
s/this document/the test procedures, but mentioned in discussion sections/

Sec 3,
These may not be Primary References, should be replaced with Primary RFC:
                  Out-of-order Packet      [Ref.[Po06], section 3.3.2]
                  Duplicate Packet          [Ref.[Po06], section 3.3.3]

Sec 4
s/stack is dependent of/stack is dependent on/

Spell-out PLR at first use, which is here:
      (2)  # of remaining hops of the primary tunnel from the PLR

Sec 5.7, 2nd para (very redundantly worded)
    ... At least 16 flows should be used, and more if possible.  Prefix-
    dependency behaviors are key in IP and tests with route-specific
    flows spread across the routing table will reveal this dependency.
    Generating traffic to all of the prefixes reachable by the protected
    tunnel (probably in a Round-Robin fashion, where the traffic is
    destined to all the prefixes but one prefix at a time in a cyclic
    manner) is not recommended.  The reason why traffic generation is not
    recommended in a Round-Robin fashion to all the prefixes, one at a
    time is that if there are many prefixes reachable through the LSP the
    time interval between 2 packets destined to one prefix may be
    significantly high and may be comparable with the failover time being
    measured which does not aid in getting an accurate failover
    measurement.

Sec 7.1
spell out "pps" at first use.

Sec 7.1.1 (and 7.1.2 and 7.1.3)
modify steps as follows:

      6.  Send the required MPLS traffic load over the primary LSP
            to achieve the Throughput supported by the DUT (determined using
            section X of RFC 2544).

...
      9.  Verify that the offered load gets mapped to the backup tunnel
            and measure the Additive Backup Delay (as defined in section YY
            of RFC 6414).

...

      12.  Record the final Throughput, which corresponds to the
offered load that
            will be used for the Headend PLR failover test cases.



Sec 7.1.2 only
s/of the 9 from section 6/of the 8 from section 6/

Sec 7.4 and 7.5, Procedure
      4.  Verify Fast Reroute protection. << is enabled?

Sec 8
s/recommended/RECOMMENDED/

s/Offered Load/Offered Load (Throughput)/

References:
Because these refs provide essential terms and definitions,
they should be normative:

    [IGP-METH]
THIS is now RFC 6412
              Poretsky, S., Imhoff, B., and K. Michielsen, "Terminology
              for Benchmarking Link-State IGP Data Plane Route
              Convergence", draft-ietf-bmwg-igp-dataplane-conv-term-23
              (work in progress), February 2011.

    [Br91]    Bradner, S., "Benchmarking terminology for network
              interconnection devices", RFC 1242, July 1991.

    [RFC2544]  Bradner, S. and J. McQuaid, "Benchmarking Methodology for
              Network Interconnect Devices", RFC 2544, March 1999.

    [MPLS-FRR-EXT]
              Pan, P., Swallow, G., and A. Atlas, "Fast Reroute
              Extensions to RSVP-TE for LSP Tunnels", RFC 4090,
              May 2005.

    [MPLS-FWD] Akhter, A., Asati, R., and C. Pignataro, "MPLS Forwarding
              Benchmarking Methodology for IP Flows", RFC 5695,
              November 2009.

    [RFC6414]  Papneja, R., Poretsky, S., Vapiwala, S., and J. Karthik,
              "Benchmarking Terminology for Protection Performance",
              RFC 6414, October 2011.


2012-02-03
09 Cindy Morgan Draft added in state Publication Requested
2012-02-03
09 Cindy Morgan [Note]: 'Al Morton (acmorton@att.com) is the document shepherd.' added
2011-12-05
09 Al Morton WGLC ends Jan 1, 2011
2011-12-05
09 Al Morton IETF state changed to In WG Last Call from WG Document
2011-10-28
09 (System) New version available: draft-ietf-bmwg-protection-meth-09.txt
2011-09-13
08 (System) New version available: draft-ietf-bmwg-protection-meth-08.txt
2010-06-24
09 (System) Document has expired
2009-12-21
07 (System) New version available: draft-ietf-bmwg-protection-meth-07.txt
2009-10-16
06 (System) New version available: draft-ietf-bmwg-protection-meth-06.txt
2009-03-08
05 (System) New version available: draft-ietf-bmwg-protection-meth-05.txt
2008-11-03
04 (System) New version available: draft-ietf-bmwg-protection-meth-04.txt
2008-02-20
03 (System) New version available: draft-ietf-bmwg-protection-meth-03.txt
2007-07-23
02 (System) New version available: draft-ietf-bmwg-protection-meth-02.txt
2007-03-02
01 (System) New version available: draft-ietf-bmwg-protection-meth-01.txt
2006-10-18
00 (System) New version available: draft-ietf-bmwg-protection-meth-00.txt