Skip to main content

Early Review of draft-ietf-manet-dlep-traffic-classification-12
review-ietf-manet-dlep-traffic-classification-12-opsdir-early-tsou-2024-07-30-00

Request Review of draft-ietf-manet-dlep-traffic-classification
Requested revision No specific revision (document currently at 13)
Type Early Review
Team Ops Directorate (opsdir)
Deadline 2024-08-13
Requested 2024-07-23
Requested by Jim Guichard
Authors Bow-Nan Cheng , David Wiggins , Lou Berger , Don Fedyk
I-D last updated 2024-07-30
Completed reviews Tsvart Early review of -06 by David L. Black (diff)
Opsdir Early review of -12 by Tina Tsou (Ting ZOU) (diff)
Rtgdir Early review of -12 by Darren Dukes (diff)
Secdir Early review of -12 by Shawn M Emery (diff)
Genart Last Call review of -12 by Stewart Bryant (diff)
Secdir Telechat review of -13 by Shawn M Emery
Assignment Reviewer Tina Tsou (Ting ZOU)
State Completed
Request Early review on draft-ietf-manet-dlep-traffic-classification by Ops Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/ops-dir/B8GO78lq73cmU7zPcCgLbULMaGk
Reviewed revision 12 (document currently at 13)
Result Has issues
Completed 2024-07-30
review-ietf-manet-dlep-traffic-classification-12-opsdir-early-tsou-2024-07-30-00
1. Introduction: The purpose and scope are well-defined. Consider providing
additional real-world examples to illustrate the need for traffic
classification.

2. Traffic Classification Types: The classification types are comprehensive.
Ensure that the definitions are aligned with industry standards.

3. Traffic Classification Attributes: The attributes are detailed and
well-explained. Verify that the attribute values cover all potential use cases.

4. Traffic Classification Procedures: The procedures are clear and logically
structured. Consider adding flowcharts or diagrams to visualize the message
exchanges.

5. IANA Considerations: The section is thorough. Double-check the parameter
values and ensure all necessary registrations are included.

6. Security Considerations: The security section addresses key risks. Consider
expanding on specific attack scenarios and their mitigations.

By addressing these feedback areas, the document can be improved for clarity,
completeness, and technical accuracy.