Skip to main content

Multicast Protocol for Low-Power and Lossy Networks (MPL)
draft-ietf-roll-trickle-mcast-12

Yes

(Alvaro Retana)

No Objection

(Alia Atlas)
(Benoît Claise)
(Joel Jaeggli)
(Martin Stiemerling)
(Pete Resnick)
(Richard Barnes)
(Spencer Dawkins)
(Ted Lemon)

Note: This ballot was opened for revision 11 and is now closed.

Adrian Farrel Former IESG member
Yes
Yes (2015-02-01 for -11) Unknown
Updated after additional review...

While balloting "Yes" on this document I have a number of small editorials that I believe should be made to improve the document. These are presented roughly in order of appearance in the document, you can fix them now or after the rest of the IESG ballots are in (5th February).

===

Globally you should change s/an MPL/a MPL/ as indicated by the ROLL chairs.

---

I think the Abstract could be a bit clearer to note the two modes of operation.

Something like

   This document specifies the Multicast Protocol for Low power and
   Lossy Networks (MPL) that provides IPv6 multicast forwarding in
   constrained networks.  MPL avoids the need to construct or maintain
   any multicast forwarding topology, disseminating messages to all MPL
   Forwarders in an MPL Domain.  

   MPL has two modes of operation. One mode uses the Trickle
   algorithm to manage control- and data-plane message transmissions,
   and is applicable for deployments with few multicast sources. The
   other mode uses classic flooding. By providing both modes and 
   parameterization of the Trickle algorithm, a MPL implementation
   can be used in a variety of multicast deployments and can trade
   between dissemination latency and transmission efficiency.

---

Section 2 : MPL Forwarder

Please add...

   The term "node" is used within this document to refer to a MPL Forwarder.

---

Section 3
OLD
   MPL is parameterized to support different dissemination techniques.
   In one parameterization, MPL may utilize the classic flooding method
   that involves having each device receiving a message rebroadcast the
   message.  In another parameterization, MPL may utilize Trickle's
   [RFC6206] "polite gossip" method that involves transmission
   suppression and adaptive timing techniques.  By supporting both
   simple flooding and Trickle methods, MPL can be configured to operate
   well in a variety of situations [Clausen2013].
NEW
   MPL is parameterized to support different dissemination techniques.
   In one parameterization, MPL may utilize the classic flooding method
   that involves having each device receiving a message rebroadcast the
   message.  In another parameterization, MPL may utilize Trickle's
   [RFC6206] "polite gossip" method that involves transmission
   suppression and adaptive timing techniques. [Clausen2013] questions 
   the efficiency of Trickle's "polite gossip" mechanism in some
   multicast scenarios, so by also including a classic flooding mode of 
   operation MPL  aims to be able to perform satisfactorily in a variety
   of situations
END

---

4.1 has a little mix of "scope value of nnn" and "scop value mmm".
Since 7346 uses "scop value" I suggest you change all to be in that style.

Ditto 5.1

---

In 5.4 under PROACTIVE_FORWARDING I think you need some simple statement like:

   All MPL interfaces on the same link SHOULD be configured with the same 
   value of PROACTIVE_FORWARDING.

I thought about asking for "MUST", but I think that is too strong. However, if using
"SHOULD" it would also be good to have something like...

   An implementation MAY choose to vary the value of PROACTIVE_FORWARDING
   across interfaces on the same link if <supply text here>.

---

Section 6.3

   The Option Data (in particular the M flag) of the MPL Option is
   updated by MPL Forwarders as the MPL Data Message is forwarded.

s/in particular/specifically/

---

Section 13.

Please add a short paragraph on the comparative security implications of classic flooding mode.

---

Please update the reference to read as follows:

   [Clausen2013]
             Clausen, T., Colin de Verdiere, A., and J. Yi,
             "Performance Analysis of Trickle as a Flooding Mechanism",
             November 2013. The 5th IEEE International Conference on 
             Communication Technology (ICCT2013)
Alvaro Retana Former IESG member
Yes
Yes () Unknown

                            
Alia Atlas Former IESG member
No Objection
No Objection (for -11) Unknown

                            
Barry Leiba Former IESG member
No Objection
No Objection (2015-01-26 for -11) Unknown
Adrian comments: "Globally you should change s/an MPL/a MPL/ as indicated by the ROLL chairs."

"Mipple", then?  Oy.  Ripple trickle mipple.  But don't tipple.

Dig.
Benoît Claise Former IESG member
No Objection
No Objection (for -11) Unknown

                            
Brian Haberman Former IESG member
(was Discuss) No Objection
No Objection (2015-06-12) Unknown
Thank you for the updated text on the multicast addresses in section 4.1.  I will leave it up to you and your AD as to whether the text in section 5.1 needs to be updated in a similar fashion.
Jari Arkko Former IESG member
No Objection
No Objection (2015-02-03 for -11) Unknown
Christer Holmberg's Gen-ART review had some minor editorial suggestions. Please treat these as comments that you may take into account in your editing process.

Section 1:
------------
 
Q_1_1:
 
I assume "LLN" stands for "Low power and Lossy Networks", but there is no extension anywhere. Please insert "Low power and Lossy Networks (LLN)" on first occurance.
 
 
Section 3:
------------
 
Q_3_1:
 
In a few places the text says "this protocol". I would suggest to replace that with "MPL".
 
 
Section 4:
-----------
  
Q_4_2:
 
I would suggest to add something in front of "Overview" in the subject of section 4.3. Overview of what? :)
Joel Jaeggli Former IESG member
No Objection
No Objection (for -11) Unknown

                            
Kathleen Moriarty Former IESG member
No Objection
No Objection (2015-02-04 for -11) Unknown
Thank you for responding to the SecDir review addressing Tero's questions.
https://www.ietf.org/mail-archive/web/secdir/current/msg04411.html
Martin Stiemerling Former IESG member
No Objection
No Objection (for -11) Unknown

                            
Pete Resnick Former IESG member
No Objection
No Objection (for -11) Unknown

                            
Richard Barnes Former IESG member
No Objection
No Objection (for -11) Unknown

                            
Spencer Dawkins Former IESG member
No Objection
No Objection (for -11) Unknown

                            
Stephen Farrell Former IESG member
(was Discuss) No Objection
No Objection (2015-06-29) Unknown
Thanks for adding the new text saying that this shouldn't be used
if those authorised to access the n/w can be a source of attacks.

I think you could improve the way you say that though, it'd be
better to s/attack vector/threat model/ in both the intro and 
in the security considerations. But that's really a nit and is ok to
fix (or not) at AUTH-48 IMO.
Ted Lemon Former IESG member
No Objection
No Objection (for -11) Unknown