Re: [altoext] i2aex BOF - Large Bandwidth Use Case

Greg Bernstein <gregb@grotto-networking.com> Sun, 25 March 2012 18:48 UTC

Return-Path: <gregb@grotto-networking.com>
X-Original-To: altoext@ietfa.amsl.com
Delivered-To: altoext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E633521F844B; Sun, 25 Mar 2012 11:48:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.524
X-Spam-Level:
X-Spam-Status: No, score=-2.524 tagged_above=-999 required=5 tests=[AWL=0.075, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AaZp-OB3VSj0; Sun, 25 Mar 2012 11:48:32 -0700 (PDT)
Received: from mail14c40.carrierzone.com (mail14c40.carrierzone.com [209.235.156.154]) by ietfa.amsl.com (Postfix) with ESMTP id 0722621F8448; Sun, 25 Mar 2012 11:48:31 -0700 (PDT)
X-Authenticated-User: gregb.grotto-networking.com
Received: from [192.168.0.124] (c-67-170-243-110.hsd1.ca.comcast.net [67.170.243.110]) (authenticated bits=0) by mail14c40.carrierzone.com (8.13.6/8.13.1) with ESMTP id q2PImFGm027627 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 25 Mar 2012 18:48:17 +0000
Message-ID: <4F6F686F.5020202@grotto-networking.com>
Date: Sun, 25 Mar 2012 11:48:15 -0700
From: Greg Bernstein <gregb@grotto-networking.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:11.0) Gecko/20120312 Thunderbird/11.0
MIME-Version: 1.0
To: "Y. R. Yang" <yry@cs.yale.edu>
References: <7AEB3D6833318045B4AE71C2C87E8E1720C8E5DC@dfweml511-mbx.china.huawei.com> <2C0E90B7-4B30-45F4-A7B0-1887E8654A66@cs.yale.edu>
In-Reply-To: <2C0E90B7-4B30-45F4-A7B0-1887E8654A66@cs.yale.edu>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-CSC: 0
X-CHA: v=1.1 cv=wZ7f1WoqF095RO+51JJDijztcQdEV5npvW4zOvifbtg= c=1 sm=1 a=goTC-lfFygsA:10 a=wZstjOM_WBIA:10 a=xOaALFOtT5cA:10 a=8nJEP1OIZ-IA:10 a=B4uWGr+4DaAYpgidvygSiQ==:17 a=i0EeH86SAAAA:8 a=48vgC7mUAAAA:8 a=8k3uyMJxDSQSUaXYG34A:9 a=AZMvDDKxh60BEx_cXjwA:7 a=wPNLvfGTeEIA:10 a=EgY3od2ZU2QA:10 a=h-I_03WOSDMA:10 a=hPjdaMEvmhQA:10 a=lZB815dzVvQA:10 a=lE2kpCAage-OtwY8:21 a=_3XfuEBsXrpiLgyM:21 a=B4uWGr+4DaAYpgidvygSiQ==:117
X-CTCH-Spam: Unknown
X-CTCH-RefID: str=0001.0A02020A.4F6F6874.000C, ss=1, re=0.000, recu=0.000, reip=0.000, cl=1, cld=1, fgs=0
Cc: "altoext@ietf.org" <altoext@ietf.org>, Enrico Marocco <enrico.marocco@telecomitalia.it>, "alto@ietf.org" <alto@ietf.org>, Spencer Dawkins <spencer@wonderhamster.org>, Leeyoung <leeyoung@huawei.com>, DIEGO LOPEZ GARCIA <diego@tid.es>, "Vijay K. Gurbani" <vkg@bell-labs.com>
Subject: Re: [altoext] i2aex BOF - Large Bandwidth Use Case
X-BeenThere: altoext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Non-WG list for discussions related to ALTO Protocol Extensions <altoext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/altoext>, <mailto:altoext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/altoext>
List-Post: <mailto:altoext@ietf.org>
List-Help: <mailto:altoext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/altoext>, <mailto:altoext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 25 Mar 2012 18:48:33 -0000

Hi Richard good questions and comments see below for a few more comments.
Folks remember to talk clearly into the microphones at the meeting. A 
number of use will be "remote"!
Cheers
Greg
On 3/24/2012 4:27 PM, Y. R. Yang wrote:
> Hi Young,
>
> Very nice deck of slides with some very interesting use cases!
>
> A quick comment/question on using approximate graphs to address the interesting issues of shared bottlenecks that may not be exposed by e2e links. In a dynamic, interactive constraint solving/joint optimization setting, such internal coupling will show up as "cost" increase on one source-dest pair, when using another independent pair.
--> When Young and I have formulated multi-commodity flow problems for 
TDM and wavelength networks we usually start by keeping the constraint 
notions of bandwidth (timeslots, wavelength) separate from cost 
notions.  In some formulations we will allow for overcapacity (generally 
to see where to light up more fiber) by adding a severe cost penalty for 
over utilized links.
>
> But your use case does show another way to expose infrastructure info. We consider the use case that the path for a source, destination pair is computed by the infrastructure, not by the app (otherwise, it is a different story).
--> We consider the case where an app may have some control/preference 
over route choices. In GMPLS we have the notion of loose routes/paths. 
In the optical world, particularly high reliability, there may be more 
factors in the app wanting to have some say over the routes.
> Then one issue of exposing only a graph is ambiguity for an app to determine the path for a source, destination pair, unless the underlying graph has no loop, since then the computed path then will depend on the policy of the infrastructure.
--> The "tree" graph in the draft was easiest to draw but the slides 
show more realistic graphs with rings and meshes. If the app will not 
have a choice in path or has no way to tell the infrastructure the path, 
then I'm not sure of need of a graph over a cost map or a distance vector.
> For example, consider a graph, where each s1, s2, rs, r1, r2, rd, d1, d2 is a pid, si is source ER, and di is destination ER in your example:
>
> s1 ->  rs
> s2 ->  rs
> rs ->  r1
> rs ->  r2
> r1 ->  rd
> r2 ->  rd
> rd ->  d1
> rd ->  d2
>
> Then the app may not be able to figure out the path for s1 to d1, or s2 to d2.
--> From the perspective of ambiguity since there are multiple paths 
that could be taken?
>
> One possibility is to expose the node path in a "cost" map, where the value of each entry is a (bgp style) path vector, in addition to a graph topology map. I get a feeling that others may have better, more compact representation, but the preceding seems simple.  What do you think?
--> Hmm, interesting. Are you suggesting to use both a graph to capture 
bottlenecks and a path vector to show costs and provider selected 
routes? Hmm, this sounds useful without the "reservation interface" that 
we would also like ;-) .
>
> Thanks!
>
> Richard
>
> On Mar 23, 2012, at 1:40 PM, Leeyoung<leeyoung@huawei.com>  wrote:
>
>> WARNING: contains banned part
>> This message cannot be displayed because of the way it is formatted. Ask the sender to send it again using a different format or email program. multipart/mixed
>> _______________________________________________
>> altoext mailing list
>> altoext@ietf.org
>> https://www.ietf.org/mailman/listinfo/altoext
> _______________________________________________
> altoext mailing list
> altoext@ietf.org
> https://www.ietf.org/mailman/listinfo/altoext
>
>


-- 
===================================================
Dr Greg Bernstein, Grotto Networking (510) 573-2237