[bess] Re: Inverse multi-layer OAM
Greg Mirsky <gregimirsky@gmail.com> Thu, 20 March 2025 03:15 UTC
Return-Path: <gregimirsky@gmail.com>
X-Original-To: bess@mail2.ietf.org
Delivered-To: bess@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 566A7F3B168; Wed, 19 Mar 2025 20:15:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WC8MLkgVMLio; Wed, 19 Mar 2025 20:15:04 -0700 (PDT)
Received: from mail-pj1-x102d.google.com (mail-pj1-x102d.google.com [IPv6:2607:f8b0:4864:20::102d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id B11AFF3B132; Wed, 19 Mar 2025 20:15:01 -0700 (PDT)
Received: by mail-pj1-x102d.google.com with SMTP id 98e67ed59e1d1-301d6cbbd5bso537989a91.3; Wed, 19 Mar 2025 20:15:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1742440501; x=1743045301; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=am5oZfXtXkA1fb3Q9vxyiSeiCqNXsSLTZ21rc4FOhZ8=; b=Qnw6nret9/BfTBau0ta5CGc2BvPlk9Oh5JrVqXdQC8n/vefJ7JEf0OB+3UcjH53xHX URXMAz/5vbEvZEVM4u435gT0CUEhrtlsDFPFAQiHWdzHG2Ivcbmzx2DyEwuErtnz/Skt FLS3gatKkiun0nhfc0PkFGxX12CDUylkrQ5OJq/iFts5CeSR6h8KBes5Qs0IFXT+XPTr FV1hS1ssRoX70EegH8MwE7+08yYiXmnKkj/bnF3IWSKpN38LcKV6IR9oqKfrbftYQvtI yw+FW5BWityZN6ZDTz7eOYVZLHS4na0p37gLj1E/cDs37KDSWnIDNqWAuVoTy8PqaxWZ NLCw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1742440501; x=1743045301; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=am5oZfXtXkA1fb3Q9vxyiSeiCqNXsSLTZ21rc4FOhZ8=; b=X25KIeFTZyIbuDu4a2X8AwTZzWzvlax/1nGIdyu0ViQs6dYnFYxbvVK4jcDcKJ39kk U/rV3LYB2YAAZKIMvxAyxnTg5oAK0WTagQBelcymD/Q1UDUr+eLKJgx0viS6L1DVErID hmxmIxzDUGXsAzWNvsydUGJMkhNTdiz5bksmXZcm07E4L82iqvdKB5SHFq3ddSOmFxLb yb5TiWTIoP1OxAe1ejD8tEBFTC/PbkgM4crOEhR8Zfdzm8eqGrH63IVokdeNA2hSWQOb olKa3gVbnshkVxCvcHvMl+S9F4kCvmezrWRxM1kOpUaf41HKMQPNtYyLCGzWq2ToR+mN tdaw==
X-Forwarded-Encrypted: i=1; AJvYcCUN1NDC7bh/yVeJGXZJtMTLSB0B9zFhDnUgddKb38P1tyQ/c5nkcY3qYDk40PTqVkopSgrfq9rqznv/uOFvQ2eolyrQw7OHxeK74TDqbzcAbiDlRF8l145I8C3FnJoH@ietf.org, AJvYcCWqPtN8dN9o4u6eyHziiIrBHugOxtwzIa8XXG2RnJAVW1xVIabRsHeVS9hgCELWZPizDgKd@ietf.org
X-Gm-Message-State: AOJu0Yx7EK0rdshO3wzbMEDzqKQ03k1/JKu0kL31RB1plaebKT0PI9Xi MD6mwrpONkLsqwyX0zO8tXxxA0A0yBixu+UFeKUZGS8VgCXLpL4UtSXD2P9tTP5GsYeid0CYaZs hrfc9UKwY406wz//l1Wzkca/F4bU=
X-Gm-Gg: ASbGncuwnkn8lpP4RXtSg/TyeqOyTA7rysJCaGFK/JjchXR/Fzrzi4l145uj2qq02w+ wSzEEa7IiwkQHdzdr4+uTr1jT0FN+E4kGCg4FSecoJD7Ok4eaf4u7bl3lmht6OUZeC/KEt9x4PW WtDUG9nRr+abbku7lKUrm3xVCT1chdPb9+KSanHOuQZRbm6/FBKM0UE4U1
X-Google-Smtp-Source: AGHT+IFsm/+wqIdnr38nw7g7kJjVUEvm01meAyVw9Ypd8vzc6RukhxiG2Dzayg5Hq8o44HSKEPTjXlgWibNOD3tters=
X-Received: by 2002:a17:90b:3e84:b0:2f4:434d:c7ed with SMTP id 98e67ed59e1d1-301bdf86158mr9182899a91.16.1742440500656; Wed, 19 Mar 2025 20:15:00 -0700 (PDT)
MIME-Version: 1.0
References: <CA+RyBmWh8aShHPz4NaJxmtZvoTjhjH2Ecw1SAcE0VD7N3KwNdg@mail.gmail.com> <CAOj+MMGs-vUwV8V2ieGUF9zYFoRcP6q8emnVKhj9o5vJccD4-A@mail.gmail.com>
In-Reply-To: <CAOj+MMGs-vUwV8V2ieGUF9zYFoRcP6q8emnVKhj9o5vJccD4-A@mail.gmail.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Thu, 20 Mar 2025 10:14:50 +0700
X-Gm-Features: AQ5f1JpKAu0h9H-hnSWvLrOW6yAP9XqeT8OX2Dra7m9lTHsBIlTZfx5BhyG5VPc
Message-ID: <CA+RyBmWiiHj4eMK_A15cPD7xpuM+cu=GhSG0-JDwZrR0vnTE=A@mail.gmail.com>
To: Robert Raszuk <robert@raszuk.net>
Content-Type: multipart/alternative; boundary="0000000000001581bb0630bd8b31"
Message-ID-Hash: 3LN6SPIYYN7NL36SHMJNK7XVJS7J2YQ5
X-Message-ID-Hash: 3LN6SPIYYN7NL36SHMJNK7XVJS7J2YQ5
X-MailFrom: gregimirsky@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-bess.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "Shah, Himanshu" <hshah@ciena.com>, BESS <bess@ietf.org>, draft-karboubi-spring-sidlist-optimized-cs-sr@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [bess] Re: Inverse multi-layer OAM
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/dLENPqApyPmhVhXPJXQ2WYMt0r8>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Owner: <mailto:bess-owner@ietf.org>
List-Post: <mailto:bess@ietf.org>
List-Subscribe: <mailto:bess-join@ietf.org>
List-Unsubscribe: <mailto:bess-leave@ietf.org>
Hi Robert, I wholeheartedly agree that local and e2e OAM are complementary tools in an operator's toolbox. Usually, a multi-layer OAM is constructed so that e2e provides the network with a safety net. In that manner, local repair of a link failure is expected to restore services before the failure is detected on the e2e level. As I understand it, the proposal uses a different scheme. According to it, e2e network detection is expected to be more aggressive than the link-level OAM. To me, that's an unusual arrangement. As for performance monitoring, although some performance metrics can be measured spatially to compose e2e metrics, e2e performance monitoring is easier to deploy in many environments. Regards, Greg On Wed, Mar 19, 2025 at 11:21 PM Robert Raszuk <robert@raszuk.net> wrote: > Hi Greg, > > I am very much in support of end to end path assurance. And by assurance I > mean not only e2e liveness but also e2e loss, delays, jitter etc ... > > The main reason is that link layer failures (even if done on every link in > the path) does not provide any information about transit via network > devices. And those can be subject to packet drops, selective packet drops > (brownouts), delays and jitter via box fabrics in distributed systems etc > ... So to me even if e2e is slower then local link detection it still very > much a preferred way to assure end to end path quality. > > Sure some of them is done at the application layer, but then it is done > mainly for statistics and reporting. Doing it at network layer opens up > possibilities to choose different path (quite likely via different > provider) when original path experiences some issues or service degradation > which with link by link failure detection is invisible to the endpoints. > > I think at the end of the day those two are not really competing solutions > but complimentary. And of course end to end makes sense especially in > deployments when you can have diverse paths end to end. > > Cheers > Robert > > On Wed, Mar 19, 2025 at 4:58 AM Greg Mirsky <gregimirsky@gmail.com> wrote: > >> Hi Himanshu, >> >> Thank you for the presentation of >> draft-karboubi-spring-sidlist-optimized-cs-sr >> <https://datatracker.ietf.org/doc/draft-karboubi-spring-sidlist-optimized-cs-sr/>. >> If I understood your response to Ali correctly, the proposed mechanism is >> expected to use more aggressive network failure detection than the link >> layer. If that is correct, I have several questions about the multi-layer >> OAM: >> >> - AFAIK link-layer failures are detected within 10 ms using a >> connectivity check mechanism (CCM of Y.1731 or a single-hop BFD) with a 3.3 >> ms interval. >> - If the link failure is detectable within 10 ms, what detection time >> for the path, i.e., E2E connection failure detection, is suggested? What >> interval between test probes will be used in that case? >> - Furthermore, even if the path converges around the link failure >> before the local protection is deployed, the link failure will be detected, >> and the protection mechanism will be deployed despite the Orchestrator >> setting up its recovery path in the network. If that is correct, local >> defect detection and protection are unnecessary overheads. Would you agree? >> >> >> Regards, >> >> Greg >> _______________________________________________ >> BESS mailing list -- bess@ietf.org >> To unsubscribe send an email to bess-leave@ietf.org >> >
- [bess] Inverse multi-layer OAM Greg Mirsky
- [bess] Re: [**EXTERNAL**] Inverse multi-layer OAM Shah, Himanshu
- [bess] Re: Inverse multi-layer OAM Robert Raszuk
- [bess] Re: Inverse multi-layer OAM Greg Mirsky
- [bess] Re: Inverse multi-layer OAM Joel Halpern
- [bess] Re: [**EXTERNAL**] Re: Re: Inverse multi-l… Shah, Himanshu
- [bess] Re: [**EXTERNAL**] Re: Re: Inverse multi-l… Joel Halpern
- [bess] Re: [**EXTERNAL**] Re: Re: Inverse multi-l… Shah, Himanshu
- [bess] Re: [**EXTERNAL**] Re: Re: Inverse multi-l… Greg Mirsky
- [bess] Re: [**EXTERNAL**] Re: Re: Inverse multi-l… Shah, Himanshu
- [bess] Re: [**EXTERNAL**] Re: Re: Inverse multi-l… Zafar Ali (zali)
- [bess] Re: [**EXTERNAL**] Re: Re: Inverse multi-l… Shah, Himanshu
- [bess] Re: Inverse multi-layer OAM Zafar Ali (zali)
- [bess] Re: Inverse multi-layer OAM Shah, Himanshu