Re: [Idr] BGP-LS and the like ...

"Susan Hares" <shares@ndzh.com> Tue, 26 June 2018 16:28 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 821EE13108C for <idr@ietfa.amsl.com>; Tue, 26 Jun 2018 09:28:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.957
X-Spam-Level:
X-Spam-Status: No, score=0.957 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ROZETNmkJ_YK for <idr@ietfa.amsl.com>; Tue, 26 Jun 2018 09:28:26 -0700 (PDT)
Received: from hickoryhill-consulting.com (50-245-122-97-static.hfc.comcastbusiness.net [50.245.122.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2F122131090 for <idr@ietf.org>; Tue, 26 Jun 2018 09:28:26 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=174.124.195.103;
From: Susan Hares <shares@ndzh.com>
To: 'Eric C Rosen' <erosen@juniper.net>, "'Ketan Talaulikar (ketant)'" <ketant@cisco.com>, 'Robert Raszuk' <robert@raszuk.net>
Cc: "'idr@ietf. org'" <idr@ietf.org>
References: <CA+b+ERnS+b-OatPY+cnGX74Z+9yqF2AckgXAFnt1=osqELrdJA@mail.gmail.com> <09bc6cd3217645c4a503d5d44298d720@XCH-ALN-008.cisco.com> <05cb01d40a1c$0126d070$03747150$@ndzh.com> <71a1e810277f4dfe9ab89bb09803989b@XCH-ALN-008.cisco.com> <009301d40c97$aaeed1c0$00cc7540$@ndzh.com> <9081a0e6-362a-49a1-9008-8a1e9633cadb@juniper.net> <006701d40d55$2fecb410$8fc61c30$@ndzh.com> <3c50efa2-859c-d815-2f9e-58b961a794ee@juniper.net>
In-Reply-To: <3c50efa2-859c-d815-2f9e-58b961a794ee@juniper.net>
Date: Tue, 26 Jun 2018 12:28:05 -0400
Message-ID: <011201d40d6a$a9c23ac0$fd46b040$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0113_01D40D49.22B555B0"
X-Mailer: Microsoft Outlook 14.0
Content-Language: en-us
Thread-Index: AQGZa+0dNjI6mdMjSHKSmjyXz0SKgwHvb6iHAf0n9ZQA5q4rPAHP++ouAhb0LhAA8UiJGgHaw/eApIvHqDA=
X-Antivirus: AVG (VPS 180626-4, 06/26/2018), Outbound message
X-Antivirus-Status: Not-Tested
X-Authenticated-User: skh@ndzh.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/wf1yqcYmCYm4Mad2o3C3CVmJm3I>
Subject: Re: [Idr] BGP-LS and the like ...
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Jun 2018 16:28:28 -0000

Eric:

 

The context was whether SRGB TLV in BGP PREFIX-SID qualified for the attribute discard (per RFC7606) error handling.

 

I’m open to either “yes” or “no” to this question - as long as the answer comes a discussion regarding the impact of label stack availability on TE algorithms or segment routing policies used to build segment routes in a network.   See the statements from bgp-prefix-sid below. 

 

I started a new thread on this topic that you are welcome to join. 

 

Sue Hares 

 

---------------

See statements by draft-ietf-idr-bgp-prefix-sid-26:

 

      If a prefix segment is to be included in an MPLS label stack,

      e.g., for traffic engineering purposes, the knowledge of the SRGB

      of the originator of the prefix is required in order to compute

      the local label used by the originator.

 

Section 3.2 





   The Originator SRGB TLV contains the SRGB of the node originating the

   prefix to which the BGP Prefix-SID is attached.  The Originator SRGB

   TLV MUST NOT be changed during the propagation of the BGP update.  It

   is used to build segment routing policies when different SRGBs are

   used in the fabric, for example

   ([I-D.ietf-spring-segment-routing-msdc <https://tools.ietf.org/html/draft-ietf-idr-bgp-prefix-sid-26#ref-I-D.ietf-spring-segment-routing-msdc> ]).

 

From: Eric C Rosen [mailto:erosen@juniper.net] 
Sent: Tuesday, June 26, 2018 11:37 AM
To: Susan Hares; 'Ketan Talaulikar (ketant)'; 'Robert Raszuk'
Cc: 'idr@ietf. org'
Subject: Re: [Idr] BGP-LS and the like ...

 

On 6/26/2018 9:54 AM, Susan Hares wrote:



Eric: 

 

On your questions for #1,  The ARPANET’s original algorithm 

 

Used a “link metric, which was an instantaneous sample rather than an average, was a poor indicator of expected delay on a link as the quantity being sampled fluctuated fairly rapidly at all traffic levels.”  This is a quote from the reference academic paper link below (circa 1989).  


I am very familiar with this issue about feedback loops in the ARPAnet, but I don't understand what it has to do with the draft under discussion.








If you suggest that hints to the buffer algorithm do not cause fluctuations, then provide the discussion on the list that provides this proof.   


Are we still talking about the prefix-SID attribute draft?  It has nothing to do with buffer allocations.  Also, it has no feedback loops.

Or are you talking about the BGP-LS draft?  That draft just describes the distribution of information; if you're worried about feeback loops created by the use of that information, I think you need to go to the LSVR WG.  The BGP-LS stuff has nothing to do with the prefix-SID draft though.




A group of drafts defining this new technology should provide a cogent definition for the administrative boundary of segment routing in either the segment routing drafts.  This SR domain boundary should be detectable by management process.  






Defining the admin boundary of an SR domain would be outside the scope of any BGP document.   

It would be nice if BGP had a simple way of restricting the distribution of attributes and/or communities and/or extended communities and/or large communities and/or super-duper communities to specified administrative domains.  Unfortunately, it doesn't.  But this is a long-standing problem that is generally dealt with on an ad hoc basis by policy.