Re: [6tsch] architecture with remote BBR

"Raghuram Sudhaakar (rsudhaak)" <rsudhaak@cisco.com> Wed, 19 June 2013 03:53 UTC

Return-Path: <rsudhaak@cisco.com>
X-Original-To: 6tsch@ietfa.amsl.com
Delivered-To: 6tsch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D41ED21E80B3 for <6tsch@ietfa.amsl.com>; Tue, 18 Jun 2013 20:53:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level:
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4Yb2BxhKpkkc for <6tsch@ietfa.amsl.com>; Tue, 18 Jun 2013 20:53:51 -0700 (PDT)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) by ietfa.amsl.com (Postfix) with ESMTP id 9726C21E8089 for <6tsch@ietf.org>; Tue, 18 Jun 2013 20:53:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=25699; q=dns/txt; s=iport; t=1371614031; x=1372823631; h=from:to:cc:subject:date:message-id:in-reply-to: mime-version; bh=mexGyLuKqF0P2qbuRccQx1IBfDOI+AHtNCugkVdlpio=; b=bodAce+km/ro6rOKjVdssc+o4bllGuUCwZ5hbgELq/L2rq/rF6wwnfzp GW9Jn4R7edTxYY7tydkxFn1lnTtM2VL357Z3gwbJinG/zfDQd10uDfJyD jtujjCRDxy29oI/Hou1kwz4z9pcFqsZPKngofhc21QTE0Gi+uFnoxJXsx 4=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AgsFAIMqwVGtJXG8/2dsb2JhbABQCg6CN0QxSb8YgQgWdIIjAQEBBAEBAWsLEgEIEQECAQILFgcoBgsUAwYIAgQBDQUIE4dhAw8MsX8NiE4EjFeBKIELIA0EBgGDAGEDlVqOBoUkglE+gig
X-IronPort-AV: E=Sophos; i="4.87,894,1363132800"; d="scan'208,217"; a="224582448"
Received: from rcdn-core2-1.cisco.com ([173.37.113.188]) by rcdn-iport-3.cisco.com with ESMTP; 19 Jun 2013 03:53:51 +0000
Received: from xhc-rcd-x14.cisco.com (xhc-rcd-x14.cisco.com [173.37.183.88]) by rcdn-core2-1.cisco.com (8.14.5/8.14.5) with ESMTP id r5J3roBv018784 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Wed, 19 Jun 2013 03:53:50 GMT
Received: from xmb-rcd-x04.cisco.com ([169.254.8.77]) by xhc-rcd-x14.cisco.com ([173.37.183.88]) with mapi id 14.02.0318.004; Tue, 18 Jun 2013 22:53:50 -0500
From: "Raghuram Sudhaakar (rsudhaak)" <rsudhaak@cisco.com>
To: Pascal Thubert <pascal.thubert@gmail.com>, Thomas Watteyne <watteyne@eecs.berkeley.edu>
Thread-Topic: [6tsch] architecture with remote BBR
Thread-Index: AQHObKCbKFwIhzQdRUu70IwqC3Q6Yg==
Date: Wed, 19 Jun 2013 03:53:50 +0000
Message-ID: <2C3A8CAFDCAFCA41B8BF705CD9471C5B184C2E33@xmb-rcd-x04.cisco.com>
In-Reply-To: <CADPqcJJfiO0Va7mvHAFTEH5yRWiCD3LYf5Ajh-fXcugNgzbgYQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.3.5.130515
x-originating-ip: [10.21.82.208]
Content-Type: multipart/alternative; boundary="_000_2C3A8CAFDCAFCA41B8BF705CD9471C5B184C2E33xmbrcdx04ciscoc_"
MIME-Version: 1.0
Cc: 6TSCH <6tsch@ietf.org>
Subject: Re: [6tsch] architecture with remote BBR
X-BeenThere: 6tsch@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Discuss link layer model for Deterministic IPv6 over the TSCH mode of IEEE 802.15.4e, and impacts on RPL and 6LoWPAN such as resource allocation" <6tsch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tsch>, <mailto:6tsch-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6tsch>
List-Post: <mailto:6tsch@ietf.org>
List-Help: <mailto:6tsch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tsch>, <mailto:6tsch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jun 2013 03:53:57 -0000

Thomas,
I agree conceptually with the cons that you mention for option 1. However, tunneling and VLANs are a well understood concept in the network setup/administration and used widely by IT teams. Pascal has pointed out the specific Cisco technologies too. So, in the practical world tunneling is the best/proven solution.

In Option 2, the reliance of the BBR on the PCE to identify its peer may be a cause for concern. It means that we implicitly mandate a PCE. This may not be applicable to certain deployments that may want to use 6TSCH without a PCE. Or a different routing computation technique/protocol/standard.

IMO, the PCE, ND must be maintained as separate elements for the above reasons as well as applicability to wider range of scenarios.

I lean toward the idea that 6TSCH does not need to define anything to create the connectivity between the BBRs. Instead the requirement can be detailed along with possible solutions leaving the decision open. This will hopefully help  in wider applicability and interoperability.

-raghuram


From: Pascal Thubert <pascal.thubert@gmail.com<mailto:pascal.thubert@gmail.com>>
Date: Tuesday, June 18, 2013 10:08 AM
To: Thomas Watteyne <watteyne@eecs.berkeley.edu<mailto:watteyne@eecs.berkeley.edu>>
Cc: 6TSCH <6tsch@ietf.org<mailto:6tsch@ietf.org>>
Subject: Re: [6tsch] architecture with remote BBR

Hello Thomas:

And then we need to add the case of the backhaul that looks like your case 1 but has applications on the other side of the VPN as opposed to another wlan.
This is actually being studied at ISA100.15 ...

For your option 1, is it often (/ sometimes?) mandatory that the 2 LLNs share a same L2 domain ( / IPv6 subnet) ? When they do not, we are back in classical routing, with VPN iff crossing an untrusted area ( ; eg the IT network from an OT perspective ; )
The case of a single subnet crossing layer 3 boundaries is very classical in datacenters. We use overlays to solve the issue; e.g. cisco OTV, but also LISP, L2TP, and pseudowires in general.
We should probably describe the case in the architecture and explain how this can be achieved with the above technologies; and that probably 6TSCH does not need to add anything new. Or does it?
About option 2, I see the links to the PCE as either a single vlan or a mix of vlan and vpn, depending on which domain must be crossed. The structure has its benefits, but we probably need to come up with the same model and multiple disjoint paths via multiple PCEs for high availability and load balancing.

what do you think?

Pascal


2013/6/17 Thomas Watteyne <watteyne@eecs.berkeley.edu<mailto:watteyne@eecs.berkeley.edu>>
All,

There is a case I believe we are not covering explicitly in the architecture.

The architecture draft now considers the following topology:


               ---+------------------------
                  |      External Network
                  |
               +-----+                  +-----+
               |     | Router           |     | PCE
               |     |                  |     |
               +-----+                  +-----+
                  |                        |
                  |     Subnet Backbone    |
            +--------------------+------------------+
            |                    |                  |
         +-----+             +-----+             +-----+
         |     | Backbone    |     | Backbone    |     | Backbone
    o    |     | router      |     | router      |     | router
         +-----+             +-----+             +-----+
    o                  o                   o                 o   o
        o    o   o         o   o  o   o         o  o   o    o
   o             o        o  LLN      o      o         o      o
      o   o    o      o      o o     o  o   o    o    o     o


The backbone needs to be one broadcast domain for the ND proxy operations defines in draft-thubert-6lowpan-backbone-router-03 to work.

Now, let's consider a campus-wide deployment, where the requirements is that (1) all the nodes use the same IPv6 prefix, and (2) all are managed by the same PCE. Since BBRs are "far apart", they will not all live on the same (broadcast) backbone.

This is a very realistic scenario that I have come across multiple times, and which I believe 6TSCH group could/should address.

I can see the following options:

Option 1: "under-the-hood" tunneling

When installing the network, network administrators interconnect the different pieces of the BB using some VLAN solution, essentially recreating a broadcast domain.

pros:
- This option does not require any change the ND operation.
cons:
- IMO, in most multi-BBR deployments, the remote BBR case is the rule rather than the exception. Using tunnels looks more like a "patch" which might be seen as overly complex if it needs to be applied all the time.



               ---+------------------------
                  |      External Network
                  |
               +-----+                  +-----+
               |     | Router           |     | PCE
               |     |                  |     |
               +-----+                  +-----+
                  |                        |
                  |     Subnet Backbone    |    ==========
            +--------------------+--------------  TUNNEL  ----+
            |                    |              ==========    |
         +-----+             +-----+                       +-----+ (remote)
         |     | Backbone    |     | Backbone              |     | Backbone
    o    |     | router      |     | router                |     | router
         +-----+             +-----+                       +-----+
    o                  o                   o                 o   o
        o    o   o         o   o  o   o                  o  o   o    o
   o             o        o  LLN      o      o             o      o
      o   o    o      o      o o     o  o   o             o    o     o


Option 2: PCE responsible for forwarding to correct BBR

Each BBR establishes an explicit (and secure) connection to the PCE. Since the PCE is aware of the nodes connected through each BBR, it can forward some inbound packet to the appropriate BBR.

The functionality of the PCE and Router can be merged. The PCE/Router gets a packet for a particular node, and forwards it to the appropriate BBR over the explicit connection to that BBR.



                --------------+-------------------
                              |  External Network
                              |
                           +-----+
                           |     | PCE/Router
                           |     |
                           +-----+
                            ^ ^ ^

                            | | |

            +---------------+ | +----------------+
            |                 |                  |
            v                 v                  v

         +-----+           +-----+            +-----+
         |     | Backbone  |     | Backbone   |     | Backbone
    o    |     | router    |     | router     |     | router
         +-----+           +-----+            +-----+
    o                  o                   o                 o   o
        o    o   o         o   o  o   o         o  o   o    o
   o             o        o  LLN      o      o         o      o
      o   o    o      o      o o     o  o   o    o    o     o


Option 3: hybrid


This is the same as option 2, but the router and the PCE as separate. The PCE acts as the ND proxy for all the nodes attached to all the BBRs it is managing. The router is a regular router.


  ---+-----------------------

     |   External Network
     |
  +-----+                  +-----+
  |     | Router           |     | PCE
  |     |               +--|     |
  +-----+               |  +-----+

| | ^ ^ ^

     |                  |   | | |

  ------------------------  | | |
                            | | |

                            | | |

            +---------------+ | +----------------+
            |                 |                  |
            v                 v                  v

         +-----+           +-----+            +-----+
         |     | Backbone  |     | Backbone   |     | Backbone
    o    |     | router    |     | router     |     | router
         +-----+           +-----+            +-----+
    o                  o                   o                 o   o
        o    o   o         o   o  o   o         o  o   o    o
   o             o        o  LLN      o      o         o      o
      o   o    o      o      o o     o  o   o    o    o     o



Thoughts?


Thomas

_______________________________________________
6tsch mailing list
6tsch@ietf.org<mailto:6tsch@ietf.org>
https://www.ietf.org/mailman/listinfo/6tsch




--
Pascal