Re: [Isis-wg] draft-raggarwa-isis-cap-00.txt

Shankar Vemulapalli <svemulap@cisco.com> Thu, 03 July 2003 00:28 UTC

Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA05710 for <isis-wg-archive@odin.ietf.org>; Wed, 2 Jul 2003 20:28:55 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19Xrxa-0005ot-AT for isis-wg-archive@odin.ietf.org; Wed, 02 Jul 2003 20:28:27 -0400
Received: (from exim@localhost) by www1.ietf.org (8.12.8/8.12.8/Submit) id h630SQ8k022367 for isis-wg-archive@odin.ietf.org; Wed, 2 Jul 2003 20:28:26 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19Xrxa-0005og-7I for isis-wg-web-archive@optimus.ietf.org; Wed, 02 Jul 2003 20:28:26 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA05615 for <isis-wg-web-archive@ietf.org>; Wed, 2 Jul 2003 20:28:23 -0400 (EDT)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 19XrxY-00079R-00 for isis-wg-web-archive@ietf.org; Wed, 02 Jul 2003 20:28:24 -0400
Received: from ietf.org ([132.151.1.19] helo=optimus.ietf.org) by ietf-mx with esmtp (Exim 4.12) id 19XrxX-00079O-00 for isis-wg-web-archive@ietf.org; Wed, 02 Jul 2003 20:28:23 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19XrxA-0005ld-OE; Wed, 02 Jul 2003 20:28:00 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 19XrwX-0005ik-OW for isis-wg@optimus.ietf.org; Wed, 02 Jul 2003 20:27:21 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA05437 for <isis-wg@ietf.org>; Wed, 2 Jul 2003 20:27:19 -0400 (EDT)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 19XrwV-00074X-00 for isis-wg@ietf.org; Wed, 02 Jul 2003 20:27:19 -0400
Received: from firestar.cisco.com ([171.68.227.75] helo=fire.cisco.com) by ietf-mx with esmtp (Exim 4.12) id 19XrwU-00073E-00 for isis-wg@ietf.org; Wed, 02 Jul 2003 20:27:18 -0400
Received: from sj-cse-138.cisco.com (sj-cse-138.cisco.com [171.69.98.126]) by fire.cisco.com (8.11.7+Sun/8.8.8) with ESMTP id h630I7T09656; Wed, 2 Jul 2003 17:18:07 -0700 (PDT)
From: Shankar Vemulapalli <svemulap@cisco.com>
To: Naiming Shen <naiming@redback.com>
cc: Les Ginsberg <ginsberg@cisco.com>, stefano previdi <sprevidi@cisco.com>, Hannes Gredler <hannes@juniper.net>, jparker@axiowave.com, Jeff Learman <jlearman@cisco.com>, prz@xebeo.com, isis-wg@ietf.org
Subject: Re: [Isis-wg] draft-raggarwa-isis-cap-00.txt
In-Reply-To: <20030702222602.61A278FE6C3@prattle.redback.com>
Message-ID: <Pine.GSO.4.53.0307021643010.16324@sj-cse-138.cisco.com>
References: <20030702222602.61A278FE6C3@prattle.redback.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"
Sender: isis-wg-admin@ietf.org
Errors-To: isis-wg-admin@ietf.org
X-BeenThere: isis-wg@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=unsubscribe>
List-Id: IETF IS-IS working group <isis-wg.ietf.org>
List-Post: <mailto:isis-wg@ietf.org>
List-Help: <mailto:isis-wg-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=subscribe>
List-Archive: <https://www1.ietf.org/pipermail/isis-wg/>
Date: Wed, 02 Jul 2003 17:18:06 -0700

Hi Naiming -

Some ideas/thoughts -

a]
Since most of the TLVs  have a way to get identified to start with the
information in the LSPs - may be we can include information in the Capability
TLV for those which doesnt' have the TLVs -
for. ex:  ISIS & BGP Blackhole Avoidance.

b]
As you said below, may be increasing the size of the TLV to 2 or 3 bytes could
be a better idea which may let include all the TLVs

and
c]
It would be good idea to define the "scope" of the Capability TLV and also
describe the reason why a TLV included vs not the other TLV in the draft.

d]
Or even specify which TLVs should be included as "Mandotory" vs the others.

Thanks,



/Shankar

At 3:26pm 07/02/03 -0700, Naiming Shen wrote:
>
>
> Les, Stefano, Hannes and Jeffs,
>
>
> thanks for the good comments, a couple of things I want to mention
> about this capability TLV.
>
>
> - this TLV can be "flooded" over the entire IGP domain, not exactly
>   like LSPs which is only confined in area/level.
>
> - one of the purposes of this TLV is for network troubleshooting, so
>   even if there are ways to exmain the entire fragments of LSPs from
>   one particular router to find answer, it still helps to list
>   all of them in a well-known place and a show command can list them
>   all together. I think this will be easier than to find a way to
>   dump raw ISIS packets and search for one particular feature.
>
> - the capabilities of this TLV can be group into 3 categories,
>    (1) for protocol functionality, such as the Path computation
>   application for example;
>    (2) for software to detect misconfig or mismatch
>   automatically, for example, short/wide capability bits. We can
>   specify here(not yet) if one supports short-only, short-and-wide
>   or wide-only mode, we can announce them with those two bits. If
>   any router in the area detect a mismatch(i only run wide-only,
>   and someone in the area runs short-only), it can spit out a
>   warning message. NOTICE, this is not for protocol use, protocol
>   can still run as is, but it gives us a powerful auto-checking
>   mechanism to detect errors during transtion. This may not just
>   be short/wide application, other transitions later on, for example,
>   diff IPv6 schemes which requires area wide coordination, we could
>   use that;
>    (3) informational. this is only for operators troubleshooting,
>   rathar than ask them to have tcpdump on ISIS packets and
>   search for TLVs, it allows a router to announce them explicitly
>   in a well-known TLV(not to mention for non-LSP related things).
>   Most of the routers now have a way to display system-id vs hostname
>   using dynamic-hostname TLV, similarly they can
>   later on have a command to display the router-id, with a list of
>   capabilities. Certain things like IPv6 capability, it will be nice
>   to know this router is capable of running IPv6 in the current
>   version of software, but (maybe due to misconfig or something) none
>   of the interfaces is configured with IPv6, then even you dump the
>   packets, there is no indication of "IPv6 capability" of the router.
>
> - I do agree with most of you that, in the current draft, the meaning
>   of each capability is unclear. We need to list each one of them(if
>   they are needed) to define exactly the meaning of them, and how do
>   people use them, the short/wide bit is a good example. People should
>   comment on those and we'll include them in the next version.
>
> some comments inline,
>
>  ] At 08:13 AM 7/2/2003 +0200, stefano previdi wrote:
>  ] >On Wednesday 02 July 2003 08:07, Hannes Gredler wrote:
>  ] > > On Wed, Jul 02, 2003 at 01:41:22AM -0400, Jeff Learman wrote:
>  ] > > |
>  ] > > | I think we want to know what a router IS DOING.  We should
>  ] > > | rely on product documentation to find out what it is capable of
>  ] > > | being configured to do and how to do so.  Or is this the "marketing
>  ] > > | protocol" ;)
>  ] > >
>  ] > > well if this would be the "marketing proto" then we would need probably
>  ] > > to dedicate a few fragments ...
>  ] > >
>  ] > > wrt what the router IS doing ? - i still got no answer
>  ] > > to my original question:
>  ] > >
>  ] > > what information does the capability vector as-is provide that cannot
>  ] > > be gathered from the TLV list of the LSP? [beside link-local
>  ] > > things like ptp-IIH over LANs, graceful restart etc.]
>  ] >
>  ] >I agree. Note that the capabilities draft has been originally
>  ] >written for propagating Traffic Engineering capabilities that
>  ] >couldn't be inferred from the existance (or absence) of TE
>  ] >sub TLV. The first capability defined was the PCS (Path
>  ] >Computation Server) which tells that the box is capable to
>  ] >compute path across area/domain boundaries (or something
>  ] >similar to that, sorry I'm not a TE expert).
>  ] >
>  ] >Then, for reasnos I don't know, we added other capabilities
>  ] >bits&flags but not sure it makes a lot of sense.
>  ] >
>  ] >s.
>  ]
>  ]
>  ] I also agree with Hannes/Stefano. Where the capabilities are clearly
>  ] visible from TLVs sent by the originating system, putting a bit for them in
>  ] the capabilities flag field simply raises the bizarre possibility that a
>  ] system could advertise that it supports something but not send the matching
>  ] TLVs. Which one do you believe? Who needs this problem?
>
> see above.
>
>  ]
>  ] So, if we look at the current proposed list:
>  ]
>  ]    0-3           Reserved
>  ]
>  ] For what (BTW)???
>  ]
>  ]     4             IS-IS graceful restart capable [4]
>  ]
>  ] Not needed. Restart TLV must always be included in IIHs if the capability
>  ] is supported
>  ]
>  ]     5             IS-IS and BGP blackhole avoidance capable [6]
>  ]
>  ] OK
>  ]
>  ]     6             IS-IS wide metric processing capable [3]
>  ]     7             IS-IS short metric processing capable [1]
>  ]
>  ] For these two, the capability is not needed since you can deduce that from
>  ] the TLVs present, but you cannot always know what metrics are currently
>  ] being used in the SPF. For example, the transition strategy suggested in
>  ] draft-ietf-isis-ip-interoperable (Section 8.1) defines periods where a TLV
>  ] may be sent but not used in the SPF. So these could more usefully be
>  ] defined to indicate what is currently being used in the local system's SPF.
>  ] Given that the capabilities TLV is meant to be leaked into other levels,
>  ] this creates a problem in that the usage can differ for the same router at
>  ] Level 1 and Level 2. I suppose this could be solved by adding two more bits
>  ] and making the bits level specific.
>  ]
>  ]     8             IS-IS hmac-md5 authentication capable [5]
>  ]
>  ] Not needed.
>  ]
>  ]     9             IS-IS Traffic Engineering support [3]
>  ]
>  ] Not needed.
>  ]
>  ]     10            IS-IS point-to-point over LAN [7]
>  ]
>  ] ??? Maybe this is useful...but if one side supports this and another
>  ] doesn't the adjacency won't come up. I don't think this is very hard to
>  ] debug on any system with useful event logging, but maybe...
>  ]
>  ]     11            IS-IS Path Computation Server discovery [10]
>  ]
>  ] OK
>  ]
>  ]     12            M-ISIS capable [8]
>  ]
>  ] Not needed.
>  ]
>  ]     13            IS-IS IPv6 capable [9]
>  ]
>  ] Not needed.
>
> we can discuss this and include more info on each bit, see above.
>
>  ]
>  ]
>  ] Some other comments:
>  ]
>  ] 1)The use of "router-id" to identify the source of this TLV may be OK - but
>  ] it is a bit problematic as has been pointed by Nagi. It is conceivable that
>  ] an implementation may support this draft but NOT support TE, in which case
>  ] it might not have a Router ID. (Unlikely but conceivable.) More relevant to
>  ] me is the fact that in other aspects of the protocol the source information
>  ] is always identified by the systemID - here we seem to break that rule. But
>  ] if we were to use systemID, we must be careful as well, because the fact
>  ] that this TLV is to be leaked places additional requirements on the
>  ] systemID i.e. that it be unique throughout the domain, which is a stronger
>  ] requirement than ISO 10589 imposes. As a practical matter this may not be a
>  ] significant issue, but would need to be explicitly stated.
>
> Usually when a ISP running ISIS in the domain, they don't use the same
> IP address for their router-id/loopback0-address. It's a good idea anyway
> to define an unique IP address for each router in the domain. Even if
> the systemID is used instead of router-id, as you mentioned, this systemID
> does not need to be unique in the domain, and this TLV can be "flooded"
> over the entire domain, so what will be the result? the later one always
> overwrites the previous one even they are from different sources? So use
> router-id and require they be unique(from operation point of view) is
> important.
>
>  ]
>  ] 2)Requiring the length field in a sub-TLV to be set to a multiple of 4
>  ] seems very non-IS-IS-like.
>
> Only the capability flag sub-TLV, not the other sub-TLVs. But this is
> a minor issue, I don't have strong opinion on this.
>
>  ]
>  ] 3)Requiring the capability flag sub-TLV (code 1) to be present in each
>  ] instance of this TLV seems like a bad idea. From what I have seen of
>  ] proposals for use of sub-TLVs of this TLV, it seems quite likely that a
>  ] system will have to send multiple TLVs to advertise all of the sub-TLV
>  ] information. There seems no need to repeat the capabilities flag sub-TLV
>  ] each time.
>
> each router suppose to advertise one TLV, but in the level boundary, a
> router can advertise one for itself and many for other. Still it needs
> to have this capability flag for each one of them.
>
>  ]
>  ] 4)Why do we need 29 bits of "Reserved Information Flag"?? This seems like
>  ] an attempt to 32 bit align the contents of the TLV - which is futile.
>
> True, we can change this to one, two or three bytes instead, just to
> avoid the suspicion of OSPF blood contamination:-)
>
> thanks.
>
>  ]
>  ]     Les
>  ]
>  ]
>  ] > >
>  ] > >
>  ] > > ---
>  ] > > also there may be some need to spend more bits as some of the features
>  ] > > being listed in the draft may have a asymmetric nature; i.e.
>  ] > > a router does not actively send a certain TLV but may be capable
>  ] > > of processing this TLV on receipt; ... sort/wide metric and the
>  ] > > completetely wild [i.e. very vendor has its own] transition methods
>  ] > > are a good example;
>  ] > >
>  ] > >
>  ] > > /hannes
>  ] > >
>  ] > > | Jeff
>  ] > > |
>  ] > > | At 01:30 AM 7/2/2003, Hannes Gredler wrote:
>  ] > > | >jeff,
>  ] > > | >
>  ] > > | >changed subject -
>  ] > > | >
>  ] > > | >On Tue, Jul 01, 2003 at 03:21:10PM -0400, Jeff Learman wrote:
>  ] > > | >|
>  ] > > | >| Presumably it's functions that are enabled.  A protocol doesn't
>  ] > > | >| need to say what a router could do if configured differently,
>  ] > > | >| just what it's prepared and able to do right now.
>  ] > > | >
>  ] > > | >hmmm don't agree - that brings us back to the question what
>  ] > > | >is the objective of the draft ? i read between the lines that
>  ] > > | >it was intended as quick view what the IS-IS SW can do and whats
>  ] > > | >enabled;
>  ] > > | >
>  ] > > | >the network administrator should have the choice to
>  ] > > | >
>  ] > > | >  a. upgrade the software or
>  ] > > | >  b. turn feature X on
>  ] > > | >
>  ] > > | >for doing that IMHO you need two subTLVs/bitvectors
>  ] > > | >
>  ] > > | >  1. one displaying the SW capabilities
>  ] > > | >  2. one displaying whats actually configured
>  ] > > | >
>  ] > > | >i agree that 2. is largely redundant becasue one can
>  ] > > | >look at the TLV list of a specific node to see what
>  ] > > | >is turned on;
>  ] > > | >
>  ] > > | >or in other words: what information does the
>  ] > > | >capability vector as-is provide that cannot
>  ] > > | >be gathered from the TLV list ? [beside link-local
>  ] > > | >things like ptp-IIH over LANs, graceful restart etc.]
>  ] > > | >
>  ] > > | >/hannes
>  ] > > | >
>  ] > > | >| I suppose that could be made clear in the text.
>  ] > > | >|
>  ] > > | >| At 02:00 PM 7/1/2003, Hannes Gredler wrote:
>  ] > > | >| >On Mon, Jun 30, 2003 at 10:17:55AM -0700, Naiming Shen wrote:
>  ] > > | >| >| folks,
>  ] > > | >| >|
>  ] > > | >| >| this draft is the isis part of the IGP capability, please review
>  ] > > | >| >| and comment, thanks.
>  ] > > | >| >|
>  ] > > | >| >| http://www.ietf.org/internet-drafts/draft-raggarwa-isis-cap-00.t
> xt
>  ] > > | >| >
>  ] > > | >| >naiming,
>  ] > > | >| >
>  ] > > | >| >when you talk about capabilities in the draft what is really meant
>  ?
>  ] > > | >| >  actual capabilities or potential capabilies ?
>  ] > > | >| >
>  ] > > | >| >  when does a router has to set a bit ? - e.g. if capability X has
>  ] > > | >| >  been configured or there is in general support for capability X
>  ] > > | >| >  in the current loaded SW;
>  ] > > | >| >
>  ] > > | >| >/hannes
>  ] > > | >| >
>  ] > > | >| >---
>  ] > > | >| >
>  ] > > | >| >4.3 Reserved IS-IS Router Capability Bits
>  ] > > | >| >
>  ] > > | >| >   We have assigned some pre-determined bits to the first capabili
> ty
>  ] > > | >| >   flag.
>  ] > > | >| >
>  ] > > | >| >   Bit           Capabilities
>  ] > > | >| >
>  ] > > | >| >   0-3           Reserved
>  ] > > | >| >   4             IS-IS graceful restart capable [4]
>  ] > > | >| >   5             IS-IS and BGP blackhole avoidance capable [6]
>  ] > > | >| >   6             IS-IS wide metric processing capable [3]
>  ] > > | >| >   7             IS-IS short metric processing capable [1]
>  ] > > | >| >   8             IS-IS hmac-md5 authentication capable [5]
>  ] > > | >| >   9             IS-IS Traffic Engineering support [3]
>  ] > > | >| >   10            IS-IS point-to-point over LAN [7]
>  ] > > | >| >   11            IS-IS Path Computation Server discovery [10]
>  ] > > | >| >   12            M-ISIS capable [8]
>  ] > > | >| >   13            IS-IS IPv6 capable [9]
>  ] > > | >| >   14-31         For future assignments
>  ] > >
>  ] >
>  ] >_______________________________________________
>  ] >Isis-wg mailing list
>  ] >Isis-wg@ietf.org
>  ] >https://www1.ietf.org/mailman/listinfo/isis-wg
>  ]
>
> - Naiming
>
> _______________________________________________
> Isis-wg mailing list
> Isis-wg@ietf.org
> https://www1.ietf.org/mailman/listinfo/isis-wg
>

_______________________________________________
Isis-wg mailing list
Isis-wg@ietf.org
https://www1.ietf.org/mailman/listinfo/isis-wg