Re: [Idr] draft-chen-bgp-redist-01.txt

tom petch <ietfc@btconnect.com> Fri, 02 July 2021 09:21 UTC

Return-Path: <ietfc@btconnect.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0153C3A16FA for <idr@ietfa.amsl.com>; Fri, 2 Jul 2021 02:21:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G7n2CXJtj4Jg for <idr@ietfa.amsl.com>; Fri, 2 Jul 2021 02:20:56 -0700 (PDT)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2128.outbound.protection.outlook.com [40.107.20.128]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EFC783A16F9 for <idr@ietf.org>; Fri, 2 Jul 2021 02:20:54 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=i8Qd45LQrJ7OMIOLRSRkXnH2aKfy45nbkzjn0orTn1FlzQu05rThmfzFc4pW8cFptdZoPxtYKIjRZy4f9aP8EKyn5911dxco00Vww1+tq6HpAnYIFrmC9ueN+jtoR/C9pMi+W6/D25dE2NREys0gTf5L5jaV8+3I0Y1AOAZ6uaLTDWecbjfx2sIGZ7GUXcZpId78lhTfjRi0qSneVIc2djKlB3O7NRT/4GP8n8fl3N/26Gi7/6fVUmyrn4y7dlWummtJliJ2VbylGiIbcklGuv2oKLr3jorgfn86gN65h7alwQoLWZH/Z9ATTjqi6AuMk/vUOhIj5lA2hS0LpbYZzA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tm6Bm6sxjhezCoi68Ub6Euwo4pzDwc1HyNml+ZqeVvY=; b=ORR9tIa9EIV3RGEAwNxEnoxiPwTWEq4qDbp6hBCOL+l99XWmSyggvrXId6zv4mtskNBqEJ6Y71GkFeQdJRkMn1NPmC3R7HG49K/KsobKWWDJ1z2VqrCTM0n/gFwZxZdg9xauA5zXD7v8DYjBHLHtIA067xyr8OGCOnMwZ1XzMvH4++wIOVfrzFiRZQxGwpUwm/2WJIckFRh4YJQTCHOSMYjxjVSD8uGS6L5hjQkGA7m22oIcEKTE1xXNCL+xcxoQk8xbrMq5ccUdh/IOwzqu3c5XbpNPaX9Glk4xGQJXIuNQgMQ328Y0v2lyU7++G5s4StQKk1oQu1+5K2I/2NknRg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tm6Bm6sxjhezCoi68Ub6Euwo4pzDwc1HyNml+ZqeVvY=; b=t97b1gJgouGr92O+TzRmq1Eh7iJBwmW6AzxfYNz0C7utQLWhvOW0ECutKpNYQxbgI+WF7a0gznjY7WfH0YHcHiXz5fM2tKzBeiDyu7Img5bAj+7dvOXR6Ue+AednWgpEzvW9yBNKElgzCA5JS6WwIItFWp8ZyjZRmaXi5E6CVvc=
Received: from AM7PR07MB6248.eurprd07.prod.outlook.com (2603:10a6:20b:134::11) by AM7PR07MB6868.eurprd07.prod.outlook.com (2603:10a6:20b:1c2::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4264.11; Fri, 2 Jul 2021 09:20:50 +0000
Received: from AM7PR07MB6248.eurprd07.prod.outlook.com ([fe80::fc5d:ca7a:e2ea:ca9d]) by AM7PR07MB6248.eurprd07.prod.outlook.com ([fe80::fc5d:ca7a:e2ea:ca9d%9]) with mapi id 15.20.4308.012; Fri, 2 Jul 2021 09:20:50 +0000
From: tom petch <ietfc@btconnect.com>
To: "Jakob Heitz (jheitz)" <jheitz=40cisco.com@dmarc.ietf.org>, Gyan Mishra <hayabusagsm@gmail.com>, Robert Raszuk <robert@raszuk.net>
CC: "idr@ietf. org" <idr@ietf.org>, Jenny Yuan <jyuan@paloaltonetworks.com>
Thread-Topic: [Idr] draft-chen-bgp-redist-01.txt
Thread-Index: AQHXbQo0E8VB1g3qmEqgkzNOFn9+OqsrajOAgAC8HwCAAkYYgIAADpQAgABb94CAAAkRAIAABfuAgABYOwCAACb2hQ==
Date: Fri, 02 Jul 2021 09:20:50 +0000
Message-ID: <AM7PR07MB6248B0D69C861D1898EBE921A01F9@AM7PR07MB6248.eurprd07.prod.outlook.com>
References: <CANJ8pZ_2yk666tSca818-e0YdziKjK3dMqhopOtYAP3vKXTEmQ@mail.gmail.com> <CAOj+MME5zZeZDnhpfivbdKj00JwBzi9rjMmzBXxE_fFqkxEVpA@mail.gmail.com> <CANJ8pZ9Und3fF324tzTAkhrMFV0MZfhHYfZussiYSCNUx-n_Hw@mail.gmail.com> <CABNhwV3BXk=+fuxVSg_9j+u+5Ffr+NQGE9P75NCPpTaUr5LqYQ@mail.gmail.com> <CAOj+MMFxM_yvrPDEyQ+dpO7ZxoiQKa0DE4ZQf763Cuidj76QXg@mail.gmail.com> <CABNhwV1q-H1pSypWCvA9VKXBZZTfM3nQNPktjbmbN0D=VSXpBw@mail.gmail.com> <CABNhwV29-t-N6EMmJQzOairgTB5jsPX1h6Q0e+akEgiA2cUpQg@mail.gmail.com> <CABNhwV1QAR8qHdP+rSTOk3eRU5A5tMAfWFFyqXYPQteHtoNyBg@mail.gmail.com>, <BYAPR11MB3207B8AE524F71ED25590B94C01F9@BYAPR11MB3207.namprd11.prod.outlook.com>
In-Reply-To: <BYAPR11MB3207B8AE524F71ED25590B94C01F9@BYAPR11MB3207.namprd11.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: dmarc.ietf.org; dkim=none (message not signed) header.d=none;dmarc.ietf.org; dmarc=none action=none header.from=btconnect.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e4e3772e-9559-420c-fb95-08d93d3aaef1
x-ms-traffictypediagnostic: AM7PR07MB6868:
x-microsoft-antispam-prvs: <AM7PR07MB686801400B56DAF4239E3CA2A01F9@AM7PR07MB6868.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:6430;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM7PR07MB6248.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(346002)(39860400002)(136003)(366004)(376002)(396003)(66576008)(76116006)(66476007)(2906002)(66946007)(52536014)(54906003)(33656002)(316002)(66446008)(66556008)(64756008)(110136005)(7696005)(53546011)(6506007)(186003)(966005)(26005)(122000001)(71200400001)(38100700002)(30864003)(99936003)(91956017)(86362001)(8676002)(5660300002)(8936002)(4326008)(478600001)(83380400001)(66574015)(9686003)(55016002)(586874002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/mixed; boundary="_003_AM7PR07MB6248B0D69C861D1898EBE921A01F9AM7PR07MB6248eurp_"
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM7PR07MB6248.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e4e3772e-9559-420c-fb95-08d93d3aaef1
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Jul 2021 09:20:50.0375 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: iAv/Mh7EXpN1ywbIVv57bAeTLdc32t76eJjpCf0UXrPa4atW85bn0wNSuoQ23QQ8xZ179EEzIarnoI3kLAy5dA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM7PR07MB6868
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/ca6jh28U13UvbyLGZ-G6l__-Vd4>
Subject: Re: [Idr] draft-chen-bgp-redist-01.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Jul 2021 09:21:01 -0000


________________________________________
From: Idr <idr-bounces@ietf.org> on behalf of Jakob Heitz (jheitz) <jheitz=40cisco.com@dmarc.ietf.org>
Sent: 02 July 2021 07:33
To: Gyan Mishra; Robert Raszuk
Cc: idr@ietf. org; Jenny Yuan
Subject: Re: [Idr] draft-chen-bgp-redist-01.txt

Admin-distance is not defined in any RFCs. It is a vendor only concept.

<tp>

I encounter it in (at least)

RFC8349
RFC8022
ospf-yang

Tom Petch


I can speak about it from the Cisco IOS-XR and Redback perspective.
In both of these implementations, RIB and BGP are separate processes
with separate memory spaces and their own routing tables.
Routes are passed between them using inter-process communication messages.
They cannot access each other's routing tables. Other routing protoclos,
such as OSPF, ISIS and static are also separate processes. Each of the routing
protocols downloads their valid routes to RIB. If the same IP prefix is
sent to RIB by multiple routing protocols, RIB will select one to be used
for forwarding and resolving nexthops. RIB uses admin-distance to decide.
Routing protocols get their local routes from RIB.

A static route has admin-distance of 1 by default.
However, a static route can be configured with a different admin-distance.
It is possible to configure a backup static route by configuring a high
admin-distance for it.
In that case, if another route is found for the given prefix by another
routing protocol, say an ISIS route, then the ISIS route will be used
for forwarding. Only if the ISIS route disappears will the backup static
route be used.

Now, suppose we want to advertise that prefix in BGP. We can do that
with a "redistribute" statement or with a "network" statement.
They work a little bit differently, but either command will import
the route from the RIB into BGP.
Once the route is in BGP, it loses its admin-distance.
BGP has no knowledge of the admin-distance that this route had in RIB.
There is no admin-distance in section 9.1 of RFC 4271.
This is the root of the problem that Enke and Jenny are trying to solve.

The problem occurs if the same prefix can be learnt by BGP from
a BGP peer. BGP may download it into RIB. The draft addresses the
different outcome if BGP learns the route first from it peer or learns
it first from the local RIB.

Regards,
Jakob.

From: Idr <idr-bounces@ietf.org> On Behalf Of Gyan Mishra
Sent: Thursday, July 1, 2021 6:18 PM
To: Robert Raszuk <robert@raszuk.net>
Cc: idr@ietf. org <idr@ietf.org>; Jenny Yuan <jyuan@paloaltonetworks.com>
Subject: Re: [Idr] draft-chen-bgp-redist-01.txt


>From a network design POV, in general within a an IP transit AS their is no need to redistribute BGP into IGP unless their are non BGP speaking routers within the network.

As for sourcing routes into BGP advertisement from a customer edge best practice is to originate the advertisement as close to the source routers as possible, and if it’s a summary then use a network statement and if LPM routes are required then redistribution of IGP into BGP via policy is the best way but also as close to the source of the prefixes.

>From a core perspective IP or MPLS it is common to redistribute connected or IGP into BGP global table still separate from customer traffic in SP operator core where MPLS any-any VPN VRF is used to carry Internet traffic and in that case the NOC may sit in the Internet VRF and NMS systems need telemetry access back to the global table.


Kind Regards

Gyan

On Thu, Jul 1, 2021 at 8:56 PM Gyan Mishra <hayabusagsm@gmail.com<mailto:hayabusagsm@gmail.com>> wrote:

Hi Enke

I am still trying to understand the need for this draft.


Their are two main methods to locally originate routes into BGP done at the customer edge which is via redistribution or network statement.  When you redistribute routes into BGP the origin flag is set to incomplete.  When you use a network statement with exact match of prefix installed in the RIB, the route origin changes to IGP origin.   The pecking order for Orgin is EGP, IGP, Incomplete so if the routes is also advertised via network statement and redistribution by two different ASBR the best path selection will converge on the best path IGP origin via network statement over redistribution.  Maybe that is the intention of the draft to prefer incomplete over IGP origin and that can be set via policy as well so that both are equal so load balancing can occur.

At the bottom of page 2 below is stated as the premise for this draft.


Currently the admin-distance does not play any role in BGP route

selection.



I disagree.  Indeed AD plays an important role in redistribution or locally sourcing of prefixes into BGP advertisement.  All vendor implementations do this the same way and that is that only the lowest AD source

Of a particular prefix is what is installed onto the RIB and FIB.  So when doing either a redistribution or using network statement exact match to source local routes into a BGP advertisement only the prefixes installed in the RIB that match exactly via network statement or if you have a redistribution policy matches the prefix and source protocol for the route being redistributed.



Let’s say you have a redistributing OSPF into BGP however their is a static route exact match for the prefix you want to redistribute that matches your redistribution prefix list

however as OSPF has AD 110 and static had AD 1 default and if you are trying to redistribute ospf into BGP the redistribution will not work since the RIB has the static route as the source for the prefix installed in the RIB.



Example of how AD plays an important role in how redistribution can or may not occur properly due to AD of the protocol sourcing the prefix

And the protocol being redistributed must match or the redistribution will fail.



I have noticed one issue with both redistribution and network statement which is problematic is that the IGP metric is passed into BGP as MED which is higher in the BGP best path selection which can result in sub optimal routing.  The workaround is to reset MED to 0 with a policy.





Kind Regards



Gyan

On Thu, Jul 1, 2021 at 8:23 PM Gyan Mishra <hayabusagsm@gmail.com<mailto:hayabusagsm@gmail.com>> wrote:

The main protocols are BGP, OSPF, ISIS, Static

Juniper

https://www.juniper.net/documentation/en_US/junose15.1/topics/task/configuration/ip-route-administrative-distance-configuration.html


Route Source

Default Distance

Connected interface

0

Static route

1

Internal access route

2

Access route

3

External BGP

20

OSPF

110

IS-IS

115

RIP

120

Internal BGP

200

Unknown

255


Cisco

https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/15986-admin-distance.html


Route Source
Default Distance Values
Connected interface
0
Static route
1
Enhanced Interior Gateway Routing Protocol (EIGRP) summary route
5
External Border Gateway Protocol (BGP)
20
Internal EIGRP
90
IGRP
100
OSPF
110
Intermediate System-to-Intermediate System (IS-IS)
115
Routing Information Protocol (RIP)
120
Exterior Gateway Protocol (EGP)
140
On Demand Routing (ODR)
160
External EIGRP
170
Internal BGP
200
Unknown*
255



On Thu, Jul 1, 2021 at 2:54 PM Robert Raszuk <robert@raszuk.net<mailto:robert@raszuk.net>> wrote:
Gyan,

> My understanding is by default most all implementations that I know of for example Cisco & Juniper which have use identical default AD

Can you provide source(s) of your above information ?

To the best of my knowledge they are quite different ...

Cisco:

[cid:image001.png@01D76ECC.FA73DD40]

Juniper:

[cid:image002.png@01D76ECC.FA73DD40]

Except connected I do not see much of "identical default AD"

And that is as the draft says especially important when your intention is to control active - backup paths for a given net.

Thx,
R.


On Thu, Jul 1, 2021 at 8:02 PM Gyan Mishra <hayabusagsm@gmail.com<mailto:hayabusagsm@gmail.com>> wrote:

Hi Enke

My understanding is by default most all implementations that I know of for example Cisco & Juniper which have use identical default AD, redistribution of the route only occurs from the source protocol that is being redistributed for example static versus OSPF or ISIS based on AD.

So if you have multiple protocols redistribution into BGP, the source protocol with the lowest AD is what is inserted into the default RIB/FIB and its that specific route from the source protocol that is redistributed into BGP.   All implementations that I know of work that way.

I don’t see any issue with deterministic redistribution as exists today with implementations.

Normally you are only running one IGP but let’s say you are running OSPF and ISIS and you have a Juniper and Cisco ASBR redistribution into BGP, as OSPF has default AD 110, the OSPF prefix would be inserted into the Default RIB and redistributed into BGP.  Let’s say you set AD for ISIS down to 90 and now the ISIS route is inserted into the RIB and now both Juniper and Cisco ASBR Will redistribute the ISIS route into BGP.

I am not seeing the issue that you are trying to solve.

Kind Regards

Gyan

On Wed, Jun 30, 2021 at 3:19 AM Enke Chen <enchen@paloaltonetworks.com<mailto:enchen@paloaltonetworks.com>> wrote:
Hi, Robert:

1) Usually the default admin-distance is configurable. Having the same admin-distance across implementations would certainly make things simpler, but that is not required. What matters is the local_pref value for the redistribute backup route:

            local_pref = default_local_pref - delta;

It needs to be in the right order (relatively) for the "role" the route is supposed to play.

It's a good question. We will try to clarify it in the next revision.

2) Certainly it would work if we define the "delta" (or "local_pref") for the redistributed route based on its role (e.g., primary, secondary, tertiary). But extra config would be needed for specifying the "role".  The algorithm described in the draft does not require additional config other than the existing "admin-distance".  When more than two paths are involved in a multi-vendor environment, the admin-distance needs to be carefully assigned in order to get the desired local_pref value.

Thanks.   -- Enke

On Tue, Jun 29, 2021 at 1:05 PM Robert Raszuk <robert@raszuk.net<mailto:robert@raszuk.net>> wrote:
Hi Enke,

How do you assure that admin distance is the same or delta would be the same across implementations ?

Looking at say junos I see quite different values then when comparing with other implementations ...

https://www.juniper.net/documentation/en_US/junos/topics/reference/general/routing-protocols-default-route-preference-values.html<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.juniper.net_documentation_en-5FUS_junos_topics_reference_general_routing-2Dprotocols-2Ddefault-2Droute-2Dpreference-2Dvalues.html&d=DwMFaQ&c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&r=OPLTTSu-451-QhDoSINhI2xYdwiMmfF5A2l8luvN11E&m=iUboWFiSpP9QvSDj9hoG8_DO7R_8EOQvfEHnwyX-mc0&s=GOhXjwEf1z0GAfIQVgVAc4sHvcAog6czTO30VhKwzQk&e=>

Would it be simpler to define here verbatim what the local pref should be for redistributed routes ? Then at least those could be used as default local pref values unless overwritten by operator's policy during redistribution.

Thx,
Robert


On Tue, Jun 29, 2021 at 7:14 PM Enke Chen <enchen@paloaltonetworks.com<mailto:enchen@paloaltonetworks.com>> wrote:
Hi, Folks:

Apologies for the very long delay in updating the draft:

       https://datatracker.ietf.org/doc/draft-chen-bgp-redist/01/<https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dchen-2Dbgp-2Dredist_01_&d=DwMFaQ&c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&r=OPLTTSu-451-QhDoSINhI2xYdwiMmfF5A2l8luvN11E&m=iUboWFiSpP9QvSDj9hoG8_DO7R_8EOQvfEHnwyX-mc0&s=IBn3kTJmGrWISvSq8L3M9GLLamXIqw7t2PvEdtvhmos&e=>

The issue still exists, and shows up from time to time. The revised version provides a complete solution that covers the use cases involving a single router as well as multiple routers in a network.

Your review and comments are welcome.

Thanks.   -- Enke


_______________________________________________
Idr mailing list
Idr@ietf.org<mailto:Idr@ietf.org>
https://www.ietf.org/mailman/listinfo/idr<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_idr&d=DwMFaQ&c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&r=OPLTTSu-451-QhDoSINhI2xYdwiMmfF5A2l8luvN11E&m=iUboWFiSpP9QvSDj9hoG8_DO7R_8EOQvfEHnwyX-mc0&s=O1wpTf7XmDmE4-mQGDJ9YNEx2UVZW-k1meY3fd-tQrE&e=>
_______________________________________________
Idr mailing list
Idr@ietf.org<mailto:Idr@ietf.org>
https://www.ietf.org/mailman/listinfo/idr
--

[http://ss7.vzw.com/is/image/VerizonWireless/vz-logo-email]<http://www.verizon.com/>

Gyan Mishra

Network Solutions Architect

Email gyan.s.mishra@verizon.com<mailto:gyan.s.mishra@verizon.com>

M 301 502-1347

--

[http://ss7.vzw.com/is/image/VerizonWireless/vz-logo-email]<http://www.verizon.com/>

Gyan Mishra

Network Solutions Architect

Email gyan.s.mishra@verizon.com<mailto:gyan.s.mishra@verizon.com>

M 301 502-1347

--

[http://ss7.vzw.com/is/image/VerizonWireless/vz-logo-email]<http://www.verizon.com/>

Gyan Mishra

Network Solutions Architect

Email gyan.s.mishra@verizon.com<mailto:gyan.s.mishra@verizon.com>

M 301 502-1347

--

[http://ss7.vzw.com/is/image/VerizonWireless/vz-logo-email]<http://www.verizon.com/>

Gyan Mishra

Network Solutions Architect

Email gyan.s.mishra@verizon.com<mailto:gyan.s.mishra@verizon.com>

M 301 502-1347