Re: [bmwg] Last Call: <draft-ietf-bmwg-protection-meth-09.txt> (Methodology for benchmarking MPLS protection mechanisms) to Informational RFC

Gregory Mirsky <gregory.mirsky@ericsson.com> Wed, 25 July 2012 23:20 UTC

Return-Path: <gregory.mirsky@ericsson.com>
X-Original-To: bmwg@ietfa.amsl.com
Delivered-To: bmwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6819321F849C; Wed, 25 Jul 2012 16:20:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level:
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IQYSwEDuswvN; Wed, 25 Jul 2012 16:20:01 -0700 (PDT)
Received: from imr4.ericy.com (imr4.ericy.com [198.24.6.9]) by ietfa.amsl.com (Postfix) with ESMTP id 1B8B621F849B; Wed, 25 Jul 2012 16:20:01 -0700 (PDT)
Received: from eusaamw0706.eamcs.ericsson.se ([147.117.20.31]) by imr4.ericy.com (8.14.3/8.14.3/Debian-9.1ubuntu1) with ESMTP id q6PNJwF7010762; Wed, 25 Jul 2012 18:20:00 -0500
Received: from EUSAACMS0715.eamcs.ericsson.se ([169.254.1.13]) by eusaamw0706.eamcs.ericsson.se ([147.117.20.31]) with mapi; Wed, 25 Jul 2012 19:19:55 -0400
From: Gregory Mirsky <gregory.mirsky@ericsson.com>
To: "Jay Karthik (jakarthi)" <jakarthi@cisco.com>
Date: Wed, 25 Jul 2012 19:19:54 -0400
Thread-Topic: [bmwg] Last Call: <draft-ietf-bmwg-protection-meth-09.txt> (Methodology for benchmarking MPLS protection mechanisms) to Informational RFC
Thread-Index: AQHNYWO0kGwKRFph702BQ4vGfDLCsJct7k9w
Message-ID: <FE60A4E52763E84B935532D7D9294FF13924C82A1F@EUSAACMS0715.eamcs.ericsson.se>
References: <CC25A814.F5BB%jakarthi@cisco.com> <CC264611.10247%jakarthi@cisco.com>
In-Reply-To: <CC264611.10247%jakarthi@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_FE60A4E52763E84B935532D7D9294FF13924C82A1FEUSAACMS0715e_"
MIME-Version: 1.0
Cc: "mpls@ietf.org" <mpls@ietf.org>, "bmwg@ietf.org" <bmwg@ietf.org>
Subject: Re: [bmwg] Last Call: <draft-ietf-bmwg-protection-meth-09.txt> (Methodology for benchmarking MPLS protection mechanisms) to Informational RFC
X-BeenThere: bmwg@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Benchmarking Methodology Working Group <bmwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bmwg>, <mailto:bmwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/bmwg>
List-Post: <mailto:bmwg@ietf.org>
List-Help: <mailto:bmwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bmwg>, <mailto:bmwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Jul 2012 23:20:02 -0000

Hi Jay, et al.,
thank you for your careful consideration of my comments. Couple more notes on -10 version follow:

 *
"MPLS-FRR" might be interpretted as both MPLS-TE-FRR and LDP-FRR. I would consider using in the document MPLS-TE-FRR or RSVP-TE-FRR.
 *
Section 5.2 I think that "Ethernet based links do not have layer 2 failure indicators, and therefore relies on layer 3 signaling for failure detection" is not entirely accurate. I'd point to IEEE 802.1ag/CFM and Y.1731 that can be used to monitor continuity among MEPs of specified MA/MEG. Thus use of Layer 3 is not required but optional.
 *
Section 5.2 In reference to BFD "These methods can be used for the layer 3 failure indicators ..." I'd note that BFD can be used in ACH, i.e. non-IP, encapsulation to monitor LSP, Segment or Section.
 *
Section 5.6 Restoration and Reversion. Restoration in MPLS-TE FRR network relies on the control plane signalling. As I interpret Section 2. Document Scope, the document concentrates on defining benchmarking test cases to measure performance of facility backup FRR as defined in RFC 4090. I think that Restoration and Reversion are out of that scope. If that is the case, then statement "It is important to include Restoration and Reversion as a step in each test case to measure the amount of packet loss, out of order packets, or duplicate packets that occurs in this process" is confusing.
 *
Section 6.1. I find most test cases very confusing. As stated in the Section 2, the scope of this document is on facility backup method of MPLS-TE FRR. Thus backup tunnel is bypass backup tunnel that is encapsulating protected LSP(s).
 *
Section 6.1 and 6.2 I don't see enough rational for so many test cases. IMO, PLR performance in protection switchover is not affected by topology of a bypass tunnel. And I'm concerned that failure detection has not been separated from protection switchover itself and will make benchmark testing results, e.g. larger BFD interval being used larger variation in detection time will be in the tests. Hence, after a switchover protected LSP would have an extra label on its stack.
 *
Section 7.1 Benchmarking MPLS Performance seems outside of scope for this document. Can it be spawn into a separate document and then referenced?

    Regards,
        Greg

________________________________
From: Jay Karthik (jakarthi) [mailto:jakarthi@cisco.com]
Sent: Friday, July 13, 2012 6:55 PM
To: Gregory Mirsky
Cc: bmwg@ietf.org; mpls@ietf.org
Subject: Re: [bmwg] Last Call: <draft-ietf-bmwg-protection-meth-09.txt> (Methodology for benchmarking MPLS protection mechanisms) to Informational RFC

Greg,

First of all, apologies in getting back to you this late. Even though we incorporated your comments in the most recent version (-10, published on 5/29), a formal response to your comments should have been made sooner.

Please see inline marked (JK) for the specific response to your comments.

Thanks for your thorough review.

Best,
Jay

I'm concerned with the very title of the document, Methodology for benchmarking MPLS protection mechanisms, even though only MPLS-TE FRR being considered while LSP end-to-end and segment protection implicitly being kept out of the scope.

JK: Modified the title to be more explicit in the most recent version posted.

I've found several textual inaccuracies related to both MPLS and BFD to make me wonder if the document was liasioned to MPLS WG.
List of acronyms is missing - PLR, OIR, LOS, AIS, etc.

JK: PLR is defined in Term RFC 6414 that we are referencing. OIR Is mentioned in Appendix B. Other acronyms such as AIS and LOS are added in rev 10.

Introduction. I think that for "planned link or node failure" MBB is more efficient and useful than FRR. But MBB is not being mentioned in the document.

JK: We have used the term Revision which implies MBB

Introduction. "A correlated failure is the simultaneous occurrence of two or more failures." Personally, as correlated events I consider events with cause-effect relationship.
Introduction. Path restoration after FRR discussion does not appear logical, in the scope of benchmarking document.

JK: We have modified section 5.6

Document Scope. "Protection from Bi-directional Forwarding Detection (BFD) is outside the scope of this document." I frankly couldn't decode this sentense.

JK: Addressed in rev 10

Document Scope. Several references to Path Restoration as Re-optimization - doubt that it belongs in the document at all.

JK: Section 5.6 adds more color to this discussion

Sections 6.1.1 through 6.2.4 - what is relevance of listing numbers of labels in the stack?

JK: Convergence, performance may be dependent on the label stack depth.

Peerformance of control plane should be outside of the scope of benchmarking as it is end-to-end metrics, not explicitly of DUT.

JK: Scope modified