Re: [Isis-wg] draft-ginsberg-isis-l2bundles

"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> Mon, 17 August 2015 21:36 UTC

Return-Path: <ginsberg@cisco.com>
X-Original-To: isis-wg@ietfa.amsl.com
Delivered-To: isis-wg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C58241A8844 for <isis-wg@ietfa.amsl.com>; Mon, 17 Aug 2015 14:36:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level:
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8nh5cTpr9M8u for <isis-wg@ietfa.amsl.com>; Mon, 17 Aug 2015 14:36:03 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DB8181A884D for <isis-wg@ietf.org>; Mon, 17 Aug 2015 14:36:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=31262; q=dns/txt; s=iport; t=1439847362; x=1441056962; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=KhfvadoaBqCWQhx6AN838AQwuhQpVm3mGNSK52yk9DM=; b=GChMFtGIvS8TKLC7JqwcIucMqtJxMSuDXD5OxIMqJV27+kgrFjUHtvRm 3Q3HitcknXXtbByP1fMnVR03eCsOHkU1xZygYYM1e5lCOPUjNJiR65dIq O+vPNfSFl7E5EVAnSutfrlaa4cwgSHVD1I2CixakWQu4VBBwUo+L3358a k=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0ASBgB0UtJV/4UNJK1dgk5NVGkGgx66SQEJh28CHIEVFCQUAQEBAQEBAYEKhCMBAQEEIwpcAgEIEQQBAQsWBwMCAgIwFAkIAgQBEggTiBO6eJYkAQEBAQEBAQEBAQEBAQEBAQEBAQEBF4tShCYQAgEfFiEBBoJjL4EUBZIRgwwBjjWEK5BLg2cmgg4cgVNxgUiBBAEBAQ
X-IronPort-AV: E=Sophos; i="5.15,697,1432598400"; d="scan'208,217"; a="24784470"
Received: from alln-core-11.cisco.com ([173.36.13.133]) by rcdn-iport-2.cisco.com with ESMTP; 17 Aug 2015 21:36:01 +0000
Received: from XCH-RCD-002.cisco.com (xch-rcd-002.cisco.com [173.37.102.12]) by alln-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id t7HLa1tt018754 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 17 Aug 2015 21:36:01 GMT
Received: from xch-rcd-002.cisco.com (173.37.102.12) by XCH-RCD-002.cisco.com (173.37.102.12) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Mon, 17 Aug 2015 16:36:00 -0500
Received: from xhc-rcd-x15.cisco.com (173.37.183.89) by xch-rcd-002.cisco.com (173.37.102.12) with Microsoft SMTP Server (TLS) id 15.0.1104.5 via Frontend Transport; Mon, 17 Aug 2015 16:36:00 -0500
Received: from xmb-aln-x02.cisco.com ([169.254.5.3]) by xhc-rcd-x15.cisco.com ([173.37.183.89]) with mapi id 14.03.0248.002; Mon, 17 Aug 2015 16:36:00 -0500
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: "stephane.litkowski@orange.com" <stephane.litkowski@orange.com>, "Ahmed Bashandy (bashandy)" <bashandy@cisco.com>, "Acee Lindem (acee)" <acee@cisco.com>, Ebben Aries <exa@fb.com>, "isis-wg@ietf.org list (isis-wg@ietf.org)" <isis-wg@ietf.org>
Thread-Topic: [Isis-wg] draft-ginsberg-isis-l2bundles
Thread-Index: AdDN623Y8EVm+rlaS12GE2fzf9VY0wBEoDQAABV7GoAAD7p4gAAhy3xQAAcF9AAABO57MP//5B8A///UAYCAAN0JgP//ZGswgAbkNoD/9eR7UP/rxOZQ/9cmh2D/rkaPAP9ciFtA/rin5QA=
Date: Mon, 17 Aug 2015 21:35:59 +0000
Message-ID: <F3ADE4747C9E124B89F0ED2180CC814F5955A95A@xmb-aln-x02.cisco.com>
References: <26030_1438606960_55BF6670_26030_2637_1_9E32478DFA9976438E7A22F69B08FF92166BD55F@OPEXCLILMA4.corporate.adroot.infra.ftgroup> <55C14D02.3040606@fb.com> <9343_1438762371_55C1C583_9343_425_1_9E32478DFA9976438E7A22F69B08FF92166BE011@OPEXCLILMA4.corporate.adroot.infra.ftgroup> <D1E7BBD9.2A539%acee@cisco.com> <29791_1438848107_55C3146B_29791_2196_1_9E32478DFA9976438E7A22F69B08FF92166BE386@OPEXCLILMA4.corporate.adroot.infra.ftgroup> <D1E8CF5E.2A64B%acee@cisco.com> <32556_1438867163_55C35EDB_32556_1906_1_9E32478DFA9976438E7A22F69B08FF92166BE558@OPEXCLILMA4.corporate.adroot.infra.ftgroup> <D1E8D9DC.2A680%acee@cisco.com> <17887_1438871493_55C36FC4_17887_18571_1_9E32478DFA9976438E7A22F69B08FF92166BE5E4@OPEXCLILMA4.corporate.adroot.infra.ftgroup> <D1E96BF1.2A765%acee@cisco.com> <26458_1438932511_55C45E1E_26458_1031_1_9E32478DFA9976438E7A22F69B08FF92166BE826@OPEXCLILMA4.corporate.adroot.infra.ftgroup> <55C93C47.9070909@cisco.com> <23793_1439800879_55D19E2F_23793_781_1_9E32478DFA9976438E7A22F69B08FF92166C0A06@OPEXCLILMA4.corporate.adroot.infra.ftgroup> <F3ADE4747C9E124B89F0ED2180CC814F5955A239@xmb-aln-x02.cisco.com> <27231_1439824629_55D1FAF5_27231_35_1_9E32478DFA9976438E7A22F69B08FF92166C0C31@OPEXCLILMA4.corporate.adroot.infra.ftgroup>
In-Reply-To: <27231_1439824629_55D1FAF5_27231_35_1_9E32478DFA9976438E7A22F69B08FF92166C0C31@OPEXCLILMA4.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.24.167.205]
Content-Type: multipart/alternative; boundary="_000_F3ADE4747C9E124B89F0ED2180CC814F5955A95Axmbalnx02ciscoc_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/isis-wg/QV7KFkIBgHQlNc2NGzZMHy7G9qw>
Subject: Re: [Isis-wg] draft-ginsberg-isis-l2bundles
X-BeenThere: isis-wg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF IS-IS working group <isis-wg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/isis-wg/>
List-Post: <mailto:isis-wg@ietf.org>
List-Help: <mailto:isis-wg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Aug 2015 21:36:05 -0000

Stephane –

I guess I don’t understand what you mean when you say:

“With solution #4, you have the choice per protocol/application to use the LAG or individual interfaces.”

Do you mean that it is not necessary to have L3 adjacencies on all interfaces? If so, even with the solution defined in the draft it is a local matter as to what L2 bundle members are advertised. It could be all of them or a subset – that is a matter for local configuration and does not need to be standardized. This is why I said your new column seems no different than Ahmed’s existing column 3 – other than perhaps you are suggesting we should not use unnumbered – in which case I think you have made using L3 adjacencies more onerous.

Please clarify.
Thanx.

   Les


From: stephane.litkowski@orange.com [mailto:stephane.litkowski@orange.com]
Sent: Monday, August 17, 2015 8:17 AM
To: Les Ginsberg (ginsberg); Ahmed Bashandy (bashandy); Acee Lindem (acee); Ebben Aries; isis-wg@ietf.org list (isis-wg@ietf.org)
Subject: RE: [Isis-wg] draft-ginsberg-isis-l2bundles


Les,

I thought that column #3 was using L3 bundles with unnumbered interfaces, and in this case you loose the ability to hide topology to some protocols : all layer 3 protocols see individual links. With solution #4, you have the choice per protocol/application to use the LAG or individual interfaces.


As I mentioned in my previous mail, here are my comments :

Column#3 scaling :  it adds some adjacencies, but honestly I don’t think today this is an issue with controlplane resources we have and multithreading. But yes there is an additional cost.


In the table, you can also add  a section regarding failure detection :
As for solution #1 (L2 bundles in ISIS) and solution #2 (BGP-LS), you need a mechanism outside the protocol to monitor the status on each individual link and report it to the protocol which requires to implement something in addition (it does not work by itself), solution#3 and #4 (see above) : ISIS hellos are doing the job if fast detection is not required.


Regarding the risk :
What is the risk to deploy BGP-LS ? It’s an operational cost (and you already count it before) but IMO there is no risk associated with. Do you know networks that would use this feature and that does not have already a BGP controlplane ?
For column#3, all the individual links have to be seen by the management system, so whatever they are L2 or L3, there is no scaling issue here.

Column#3 impact on base routing, what is the impact on the base routing ?

Regarding the criteria : “Using 1 protocol for diverse functionalities”, This is always counted in “Mandate the deployment of a protocol that was not deployed before” moreover using IMO, 1 protocol to do everything is never good … (like using a single router to do every features ☺ )



Best Regards,

Stephane


From: Les Ginsberg (ginsberg) [mailto:ginsberg@cisco.com]
Sent: Monday, August 17, 2015 16:41
To: LITKOWSKI Stephane SCE/IBNF; Ahmed Bashandy (bashandy); Acee Lindem (acee); Ebben Aries; isis-wg@ietf.org<mailto:isis-wg@ietf.org> list (isis-wg@ietf.org<mailto:isis-wg@ietf.org>)
Subject: RE: [Isis-wg] draft-ginsberg-isis-l2bundles

Stephane –

Your new column is already covered by Ahmed’s column #3: “L2 bundles as unnumbered interfaces in ISIS”

Problem is – the two of you disagree on what is +/- for a number of rows.

I don’t think assigning addresses for a much larger set of interfaces (e.g. if there are 128 bundle members this is 128 * the number of L3 interfaces) should be considered easy to do – which is why Ahmed suggested using unnumbered.

Perhaps you could explain why you disagree with Ahmed’s assessment of the rows for his column #3??

    Les



_________________________________________________________________________________________________________________________



Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.



This message and its attachments may contain confidential or privileged information that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and delete this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.

Thank you.