Re: comments on "draft-salam-l2vpn-evpn-oam-req-frmwk-02":

Sam Aldrin <aldrin.ietf@gmail.com> Wed, 02 April 2014 03:20 UTC

Return-Path: <aldrin.ietf@gmail.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C855F1A00D5 for <l2vpn@ietfa.amsl.com>; Tue, 1 Apr 2014 20:20:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S7S2ehyiqmeF for <l2vpn@ietfa.amsl.com>; Tue, 1 Apr 2014 20:20:28 -0700 (PDT)
Received: from mail-pa0-x236.google.com (mail-pa0-x236.google.com [IPv6:2607:f8b0:400e:c03::236]) by ietfa.amsl.com (Postfix) with ESMTP id 8D0DA1A00B6 for <l2vpn@ietf.org>; Tue, 1 Apr 2014 20:20:28 -0700 (PDT)
Received: by mail-pa0-f54.google.com with SMTP id lf10so10781797pab.41 for <l2vpn@ietf.org>; Tue, 01 Apr 2014 20:20:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=cQgoAHHQCned5G0ytKl3fHcijggxpkyO2bq4FRULfjk=; b=q67JpFOurIlr2cjEsd4oAvFrxuxPDqI4pxDUw1LeGPTx55VxvJzKVfFOrxgfKWg0kt PdTiYr+w6+LyrGJLS2ns0INz5YPaaKGk66jL5XvpZIRRDqLQFgICIqfgd7LoioE8VCAJ h/RqwPdPEVgPEvO1WDdawAu/6U8VdviU8xgDnG+ICnutpFDO3t5bjZQIEuSYmSmFYtAO wOfwMHkgnBVPBP9yjl/CTnxmrzr22b813QDSBDGNhiTdgeMJSEzAHy8NV1wEUUMp9XRz Gg0nF5Ch36lkh8hJL78M+LscbSB9htzOuom4vjuqucfWjwrGyqsHHC8wwqjBh3/H5mkl XnhQ==
X-Received: by 10.68.197.8 with SMTP id iq8mr17379496pbc.124.1396408824957; Tue, 01 Apr 2014 20:20:24 -0700 (PDT)
Received: from [192.168.1.9] (c-107-3-154-60.hsd1.ca.comcast.net. [107.3.154.60]) by mx.google.com with ESMTPSA id vo1sm2730508pab.32.2014.04.01.20.20.23 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 01 Apr 2014 20:20:24 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_43B0EF78-7B56-4132-A75E-AB0F880DA5DB"
Mime-Version: 1.0 (Mac OS X Mail 7.2 \(1874\))
Subject: Re: comments on "draft-salam-l2vpn-evpn-oam-req-frmwk-02":
From: Sam Aldrin <aldrin.ietf@gmail.com>
In-Reply-To: <C02846B1344F344EB4FAA6FA7AF481F10F3E1D9C@SZXEMA502-MBS.china.huawei.com>
Date: Tue, 01 Apr 2014 20:20:25 -0700
Message-Id: <D407D2AA-48C5-42CC-870E-D49F77A7C2D6@gmail.com>
References: <C02846B1344F344EB4FAA6FA7AF481F10F3DFF09@SZXEMA502-MBS.china.huawei.com> <CF5F2177.27AC8%ssalam@cisco.com> <C02846B1344F344EB4FAA6FA7AF481F10F3E1B66@SZXEMA502-MBS.china.huawei.com> <8D1DD6FA-2758-4F4A-BD41-E22B59D6843E@gmail.com> <C02846B1344F344EB4FAA6FA7AF481F10F3E1D9C@SZXEMA502-MBS.china.huawei.com>
To: "Xialiang (Frank)" <frank.xialiang@huawei.com>
X-Mailer: Apple Mail (2.1874)
Archived-At: http://mailarchive.ietf.org/arch/msg/l2vpn/-oqFVCDa7NW6xE6hSEKlVxODtxs
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, "Ali Sajassi (sajassi)" <sajassi@cisco.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Layer 2 Virtual Private Networks <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn/>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Apr 2014 03:20:32 -0000

Inline with %sam.

On Apr 1, 2014, at 8:02 PM, Xialiang (Frank) <frank.xialiang@huawei.com> wrote:

> Sam,
> Please see my response inline:
>  
> From: Sam Aldrin [mailto:aldrin.ietf@gmail.com] 
> Sent: Tuesday, April 01, 2014 10:12 AM
> To: Xialiang (Frank)
> Cc: Samer Salam (ssalam); Ali Sajassi (sajassi); jdrake@juniper.net; l2vpn@ietf.org
> Subject: Re: comments on "draft-salam-l2vpn-evpn-oam-req-frmwk-02":
>  
> Frank,
>  
> Comments inline.
> On Mar 31, 2014, at 7:00 PM, Xialiang (Frank) <frank.xialiang@huawei.com> wrote:
> 
> 
> Hi Samer,
> Please see inline:
>  
> From: Samer Salam (ssalam) [mailto:ssalam@cisco.com] 
> Sent: Tuesday, April 01, 2014 5:03 AM
> To: Xialiang (Frank); Ali Sajassi (sajassi); aldrin.ietf@gmail.com; jdrake@juniper.net
> Cc: l2vpn@ietf.org
> Subject: Re: comments on "draft-salam-l2vpn-evpn-oam-req-frmwk-02":
>  
> Hi Frank,
>  
> Thanks for your comments. Please find responses below:
>  
> 1. In this draft, we cite RFC 6136 as reference, and hence we do not repeat the definition of common OAM terms (MEP, MIP, Maintenance Domain, In-band OAM, OAM layering etc.). Regarding Discovery, please note that E-VPN has automatic discovery built-in via the Inclusive Multicast Route and the Ethernet A-D Route. Hence, no further mechanisms are required.
>  
> 2. Per user flow means a traffic stream that maps to actual user data, with a specified N-tuple characteristics (MAC DA/SA, VLAN, IP DA/SA, Src/Dest Port…).  The reason why this is different between Network & Service OAM is because the Service OAM mechanisms may or may not be able to support per-flow OAM, depending on the  service layer and its associated OAM capabilities. For instance, in the case where Ethernet CFM (IEEE 802.1ag) is the service OAM, it is not possible to perform per-flow continuity check, as the destination MAC address is set by the protocol to a multicast address.
>  
> 3. Yes, a representative path maps to a test flow. This is a simple function, and is actually a degenerate case of the per user-flow OAM, because test fields are specified for the N-Tuple. That's why it is mandatory. As to the details of the mechanism, that is left to the solution draft – after all, this is the requirements and framework draft, it does not cover the solution details for implementation.
> [Frank] : From my personal view, I don’t think the paragraph describing the requirement of a representative path is clear enough. For example, why can it be used for node failure detection but not path failure detection?
> Whether one uses for node or path failure detection is for the solution to decide. This is requirements draft. If you think better wording is required, please do propose, will consider that.
> [Frank] : I agree with the principle of requirement draft. Actually, What I suggest is better wording for better understanding the goal of representative path check.
%sam - When continuity to a MEP is lost, one could conclude there is a node failure, but IMO, one cannot conclude path has failed as there could be a different load balanced path exist. That is the reason we used the term ‘conclusively’. If one’s implementation could determine it is indeed path failure, so be it. But from requirement point of view, we do not want to enforce node failure = path failure. Which translates to, solution and implementations could innovate to conclusively determine path failure.

Hope this is clear. 

cheers
-sam

> 
> 
>  
> 4. Test packets can be either unicast or multicast. The problem we are describing here is that relying on normal packet counters in unreliable given that E-VPN offers many-to-many connectivity. For e.g., consider 3 endpoints A, B and C. Let's say we are interested in measuring the loss between A and C. A sends a packet to C, but it gets dropped. Now B also sends to C and that packet is delivered. If we were to examine the packet counter on C, we will find that the counter shows 1 packet received. But that doesn't mean that we have 100% packet delivery rate between A and C. The packet actually came from another source and hence the packet counter on C is ambiguous. Unless the implementation keeps packet counters per-flow (which will be expensive and impractical), it is not reliable to use packet counters to measure loss in a technology that supports multipoint-to-multipoint connectivity.
> [Frank] : Yes. This clarification is more clear than the current content of draft~~ Also, I think “a statistical means of approximating packet loss rate” you proposed in draft is not the suitable solution for this problem. Actually, this is more an implementation issue, i.e., we can set the same value of flow characteristics for a test flow to ensure all test flow packets send/receive between 2 nodes exactly.
> Again, this is requirement draft only. What you are eluding to is how one should perform, which clearly falls in solution category. As Samer clarified earlier, using actual data packet counters doesn’t meet the requirements, hence ‘synthetic' measurement is required. 
> [Frank] : OK
>  
> -sam
> 
>  
> Regards,
> Samer
>  
> From: "Xialiang (Frank)" <frank.xialiang@huawei.com>
> Date: Tuesday, 18 March, 2014 12:07 AM
> To: Samer Salam <ssalam@cisco.com>, "Ali Sajassi (sajassi)" <sajassi@cisco.com>, "aldrin.ietf@gmail.com" <aldrin.ietf@gmail.com>, "jdrake@juniper.net" <jdrake@juniper.net>
> Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>
> Subject: comments on "draft-salam-l2vpn-evpn-oam-req-frmwk-02":
>  
> Hi authors,
> I have reviewed this important draft, and have some comments as below:
> 1. By comparing with RFC6136 (L2VPN OAM req and frm), from the integrity point of view, I think there are some part missing: EVPN MEP and MIP, Discovery, Data Path Forwarding, Scalability, Transport/Application Independence;
> 2. In section 3.1.1.1, what is the definition of per user flow? Why is it different to support it between E-VPN Network OAM and E-VPN Service OAM?
> 3. In section 3.1.1.1, does the section of "a representative path" mean using test flow to detect the node failure? if yes, how to do? Is it a necessary requirement of proactive fault detection?
> 4. In section 3.2.1, I do not quite understand the describing reason for the inaccuracy of Loss Measurement. Do you mean that test packets of Loss Measurement are all BUM packets? Can you clarify why peer MEPs will receive some unnecessary packets? Why not use unicast packets for Loss Measurement?
>  
> Hoping for your feedback~~
>  
> B.R.
> Frank
>