Re: [CCAMP] The description of Path Key retaining time in RFC5553

John E Drake <jdrake@juniper.net> Mon, 18 November 2013 13:56 UTC

Return-Path: <jdrake@juniper.net>
X-Original-To: ccamp@ietfa.amsl.com
Delivered-To: ccamp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA7F811E8156 for <ccamp@ietfa.amsl.com>; Mon, 18 Nov 2013 05:56:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.049
X-Spam-Level:
X-Spam-Status: No, score=-4.049 tagged_above=-999 required=5 tests=[AWL=-1.050, BAYES_00=-2.599, J_CHICKENPOX_42=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id quqxshBa80tS for <ccamp@ietfa.amsl.com>; Mon, 18 Nov 2013 05:56:33 -0800 (PST)
Received: from ch1outboundpool.messaging.microsoft.com (ch1ehsobe002.messaging.microsoft.com [216.32.181.182]) by ietfa.amsl.com (Postfix) with ESMTP id 4C32E11E810B for <ccamp@ietf.org>; Mon, 18 Nov 2013 05:56:25 -0800 (PST)
Received: from mail9-ch1-R.bigfish.com (10.43.68.247) by CH1EHSOBE004.bigfish.com (10.43.70.54) with Microsoft SMTP Server id 14.1.225.22; Mon, 18 Nov 2013 13:56:22 +0000
Received: from mail9-ch1 (localhost [127.0.0.1]) by mail9-ch1-R.bigfish.com (Postfix) with ESMTP id 0D3C61201B5; Mon, 18 Nov 2013 13:56:22 +0000 (UTC)
X-Forefront-Antispam-Report: CIP:157.56.240.101; KIP:(null); UIP:(null); IPV:NLI; H:BL2PRD0510HT001.namprd05.prod.outlook.com; RD:none; EFVD:NLI
X-SpamScore: -21
X-BigFish: VPS-21(zz9371I542I1432Izz1f42h2148h208ch1ee6h1de0h1fdah2073h2146h1202h1e76h1d1ah1d2ah1fc6hzz1de098h1033IL8275bh8275dh1de097h186068hz2fh109h2a8h839h945hd24hf0ah1288h12a5h12a9h12bdh137ah13b6h1441h1504h1537h153bh162dh1631h1758h18e1h1946h19b5h19ceh1ad9h1b0ah224fh1d07h1d0ch1d2eh1d3fh1de9h1dfeh1dffh1fe8h1ff5h2216h9a9j1155h)
Received-SPF: pass (mail9-ch1: domain of juniper.net designates 157.56.240.101 as permitted sender) client-ip=157.56.240.101; envelope-from=jdrake@juniper.net; helo=BL2PRD0510HT001.namprd05.prod.outlook.com ; .outlook.com ;
X-Forefront-Antispam-Report-Untrusted: SFV:NSPM; SFS:(51704005)(377454003)(13464003)(199002)(189002)(49866001)(19580405001)(56776001)(47446002)(74502001)(50986001)(47976001)(74366001)(47736001)(4396001)(74316001)(87266001)(2656002)(31966008)(81816001)(54316002)(19580395003)(81686001)(85306002)(83322001)(80976001)(74662001)(87936001)(33646001)(76796001)(76786001)(15975445006)(76482001)(76576001)(46102001)(63696002)(51856001)(54356001)(74876001)(53806001)(79102001)(65816001)(74706001)(81542001)(80022001)(83072001)(69226001)(56816003)(81342001)(66066001)(59766001)(77982001)(24736002); DIR:OUT; SFP:; SCL:1; SRVR:BLUPR05MB562; H:BLUPR05MB562.namprd05.prod.outlook.com; CLIP:66.129.239.10; FPR:; RD:InfoNoRecords; A:1; MX:1; LANG:en;
Received: from mail9-ch1 (localhost.localdomain [127.0.0.1]) by mail9-ch1 (MessageSwitch) id 1384782980530515_13691; Mon, 18 Nov 2013 13:56:20 +0000 (UTC)
Received: from CH1EHSMHS002.bigfish.com (snatpool3.int.messaging.microsoft.com [10.43.68.226]) by mail9-ch1.bigfish.com (Postfix) with ESMTP id 7C45A2200B4; Mon, 18 Nov 2013 13:56:20 +0000 (UTC)
Received: from BL2PRD0510HT001.namprd05.prod.outlook.com (157.56.240.101) by CH1EHSMHS002.bigfish.com (10.43.70.2) with Microsoft SMTP Server (TLS) id 14.16.227.3; Mon, 18 Nov 2013 13:56:20 +0000
Received: from BLUPR05MB562.namprd05.prod.outlook.com (10.141.202.141) by BL2PRD0510HT001.namprd05.prod.outlook.com (10.255.100.36) with Microsoft SMTP Server (TLS) id 14.16.383.1; Mon, 18 Nov 2013 13:56:19 +0000
Received: from BLUPR05MB562.namprd05.prod.outlook.com (10.141.202.141) by BLUPR05MB562.namprd05.prod.outlook.com (10.141.202.141) with Microsoft SMTP Server (TLS) id 15.0.820.5; Mon, 18 Nov 2013 13:56:17 +0000
Received: from BLUPR05MB562.namprd05.prod.outlook.com ([10.141.202.141]) by BLUPR05MB562.namprd05.prod.outlook.com ([10.141.202.141]) with mapi id 15.00.0820.005; Mon, 18 Nov 2013 13:56:17 +0000
From: John E Drake <jdrake@juniper.net>
To: "Zhangxian (Xian)" <zhang.xian@huawei.com>, "Zafar Ali (zali)" <zali@cisco.com>
Thread-Topic: The description of Path Key retaining time in RFC5553
Thread-Index: AQHO2+75nyh5MwjjqEemfNXW9E7a+JobcMqAgAVubRCABNrUAP//8xawgAEUZ4CAA+mkAIAAZtGQ
Date: Mon, 18 Nov 2013 13:56:07 +0000
Message-ID: <f7206a2313634e668e0fce7dbadafbce@BLUPR05MB562.namprd05.prod.outlook.com>
References: <C636AF2FA540124E9B9ACB5A6BECCE6B263E4E61@szxeml510-mbx.china.huawei.com> <CEABD34B.84772%zali@cisco.com> <C636AF2FA540124E9B9ACB5A6BECCE6B2F839647@szxeml510-mbx.china.huawei.com>
In-Reply-To: <C636AF2FA540124E9B9ACB5A6BECCE6B2F839647@szxeml510-mbx.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [66.129.239.10]
x-forefront-prvs: 00342DD5BC
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
Cc: "ccamp@ietf.org" <ccamp@ietf.org>
Subject: Re: [CCAMP] The description of Path Key retaining time in RFC5553
X-BeenThere: ccamp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion list for the CCAMP working group <ccamp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ccamp>, <mailto:ccamp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ccamp>
List-Post: <mailto:ccamp@ietf.org>
List-Help: <mailto:ccamp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ccamp>, <mailto:ccamp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Nov 2013 13:56:45 -0000

Xian,

As Cyril pointed out, Zafar does not understand that RFC 5553 deals with paths rather than with LSPs.  Hence his arguments wrt the lack of the scalability of an RFC 5553 based solution are specious. 

Yours Irrespectively,

John

> -----Original Message-----
> From: ccamp-bounces@ietf.org [mailto:ccamp-bounces@ietf.org] On Behalf
> Of Zhangxian (Xian)
> Sent: Monday, November 18, 2013 12:22 AM
> To: Zafar Ali (zali)
> Cc: ccamp@ietf.org
> Subject: Re: [CCAMP] The description of Path Key retaining time in RFC5553
> 
> Hi, Zafar,
> 
>     Let me summarize a bit, so that whoever follow our discussion are not lost.
> 
> 1st viewpoint: you still think that 16-bit PKS is not sufficient, since it limits the
> number of a LSP within a network to be 64k.
> Our Reply: the purpose of this draft is to address the LSPs that across UNI
> and/or multi-domains, *NOT* the LSP within a network. Let's not argue
> theoretically it can be any number for the former. From current deployment, it
> is far from enough. Besides, we also provide a PKS+ first node of the encode
> segment as an alternative for the problem you worry much about, is it
> enough?
> 
> 2nd viewpoint: you believe that the PCE needs to store the PKS information
> longer than required as RFC5520 and you would like to give a name to it.
> Our reply: We get your point and will add into our draft this information, as you
> suggested. However, we disagree to use the term "stateful" since people
> already accept the definition of stateful PCE in PCE WG. Also, it is meaningless
> to argue on the terminologies as long as we make the point clear in the draft.
> Please do not forget that the border node can be the "PCE" for decoding the PK
> (which you should be much aware of), storing such information is not an
> problem. Having said that, our draft do not limit the model of how PKS is
> decoded.
> 
>   As usual, we can agree to disagree, but I think we both have made the point
> clear enough till now.
> 
>   Please do not forget the reason we write this draft. As you John already
> mentioned, we do not see any description in draft-ietf-ccamp-lsp-diversity
> about how the border node can decode the sub-object defined upon receiving
> the path diversity constraint, thus there is NO complete solution in your draft. I
> vaguely remember you mentioned a proprietary method for doing so, do you
> mean that whoever implement draft-ietf-ccamp-lsp-diversity are forced to
> need to consult the draft authors for a complete solution? Please consider this
> in the next update of this draft.
> 
> 
> Cheers,
> Xian(on behalf of all co-authors of the draft draft-zhang-ccamp-route-exclusion-
> pathkey)
> 
> -----Original Message-----
> From: Zafar Ali (zali) [mailto:zali@cisco.com]
> Sent: 2013年11月16日 2:56
> To: Zhangxian (Xian); Fatai Zhang
> Cc: ccamp@ietf.org
> Subject: Re: The description of Path Key retaining time in RFC5553
> 
> Hi Xian:
> 
> Please see in-line.
> 
> Thanks
> 
> Regards … Zafar
> 
> 
> -----Original Message-----
> From: "Zhangxian   (Xian)" <zhang.xian@huawei.com>
> Date: Thursday, November 14, 2013 10:43 PM
> To: zali <zali@cisco.com>, Fatai Zhang <zhangfatai@huawei.com>
> Cc: "ccamp@ietf.org" <ccamp@ietf.org>
> Subject: RE: The description of Path Key retaining time in RFC5553
> 
> >Hi, Zafar,
> >
> >   Thank you for sharing your thought. But I disagree. Why having a
> >16-bit PK space will constrain the network to have only 64k LSPs? PK is
> >needed only when the LSP is needed to use as a constraint for path
> >diversity.
> 
> I disagree -
> 
> - How would PCC or PCE know ahead of time which LSP will be used for
> diversity by another LSP in a future time? E.g., if you are signaling LSP1 at t1.
> How would PCC or PCE will know that some other LSP (LSP2) will be requesting
> diversity from LSP1 at a future time t2.
> 
> >
> >
> >   Furthermore, I do not see why storing PKS in PCE for a longer time,
> >even if the lifetime of LSP, will cause any scalability issue. PKS can
> >be used locally by the PCE (stateless) per node basis
> 
> Please stop calling a solution that mandate (path key, path) "states" to be
> stored for lifetime of the connection as a stateless solution. It is stateful w.r.t.
> Path info states. Let's define a new term for such stateful PCE and use it.
> Furthermore, as you solution required PCE to keep path states for life time of
> the connection, why not just use stateful PCE, instead?
> 
> 
> >, i.e. combining PKS + source node address as a way for PCE to solve
> >the issue you mentioned below, which is internal to the PCE.
> >Do you agree?
> 
> No... In your solution a PCE cannot serve more than 64 paths in the network. If
> you have a centralized PCE, you cannot have more than 64K LSPs in the *entire
> network*. This does not fly.
> 
> 
> > If needed, we can capture this in the manageability section.
> >
> >Regards,
> >Xian
> >
> >-----Original Message-----
> >From: Zafar Ali (zali) [mailto:zali@cisco.com]
> >Sent: 2013年11月15日 11:13
> >To: Fatai Zhang; Zhangxian (Xian)
> >Cc: ccamp@ietf.org
> >Subject: Re: The description of Path Key retaining time in RFC5553
> >
> >
> >-----Original Message-----
> >From: Fatai Zhang <zhangfatai@huawei.com>
> >Date: Monday, November 11, 2013 9:09 PM
> >To: zali <zali@cisco.com>, "Zhangxian (Xian)" <zhang.xian@huawei.com>
> >Cc: "ccamp@ietf.org" <ccamp@ietf.org>
> >Subject: RE: The description of Path Key retaining time in RFC5553
> >
> >>Please don't argue scaliblity issue because you can see even a GMPLS
> >>node can store lots of informaiton.
> >>
> >
> >Fatai-
> >
> >I did not get what you are saying. What I was saying is:
> >
> >* Tunnel-id is 16 bit. I.e., client name space is 16 bit. There can be
> >more than one LSP per tunnel.
> >* Path key is 16 bits. I.e., server name space is 16 bits. Each LSP
> >needs a Path Key.
> >* There is 1:N relationship between PCC and PCE (server). PCE sever may
> >even be centralized.
> >* You are requiring (Path key, path info) "state" to be stored at the
> >PCE server for the life time of the connections.
> >* Path keys have hold-off timer of 30 minutes before they can be reused.
> >
> >Hence, in your solution, PCE server would run out of Path Keys much
> >before clients runs out of tunnel name space. In your solution, if you
> >have a centralized PCE, you can only support 64K connection IN THE
> >NETWORK! I am not sure why you want to ignore these scaling restrictions.
> >
> >Thanks
> >
> >Regards...Zafar
> >
> >>
> >
> 
> _______________________________________________
> CCAMP mailing list
> CCAMP@ietf.org
> https://www.ietf.org/mailman/listinfo/ccamp