Re: More comments about draft-boutros-l2vpn-evpn-vpws-04

"Ali Sajassi (sajassi)" <sajassi@cisco.com> Thu, 24 July 2014 17:11 UTC

Return-Path: <sajassi@cisco.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 691CA1A0538 for <l2vpn@ietfa.amsl.com>; Thu, 24 Jul 2014 10:11:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.502
X-Spam-Level:
X-Spam-Status: No, score=-14.502 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VQhDO4MUlUDq for <l2vpn@ietfa.amsl.com>; Thu, 24 Jul 2014 10:11:05 -0700 (PDT)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 72CF41A04E7 for <l2vpn@ietf.org>; Thu, 24 Jul 2014 10:11:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=10900; q=dns/txt; s=iport; t=1406221865; x=1407431465; h=from:to:subject:date:message-id:in-reply-to:content-id: content-transfer-encoding:mime-version; bh=v4JxDwhPtP9kse6KQvQbMZ5PJ1V5LNKBDO2L2bIXc2A=; b=QIo9rfiyVbMU5R/7OFTRu/m3yDqEJ4VLTBogMI7vMBKolyAEUdSbE6/9 osFW/I2TSjfQKHq29iYbMGuvjzZgc27hZ3L3eJBHj8dy5oft9/6BdEmoO 9CWd6WjogSXAhADuKnTWaEVzoAaDr87dYoAgQg0DA5VThpM8A6TmWt7x2 I=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AhYFAAE90VOtJA2B/2dsb2JhbABYgmokgSkEgnTOBwEZdBZ3hAMBAQEEIxFRBgEIEQMBAgECAiYCBDAVCAgCBAESiEIBqC6XSReBLI00FCwyBAKCcoFOBZAuhmmEH5RFg0hsgQMBBhki
X-IronPort-AV: E=Sophos;i="5.01,725,1400025600"; d="scan'208";a="342594613"
Received: from alln-core-9.cisco.com ([173.36.13.129]) by rcdn-iport-8.cisco.com with ESMTP; 24 Jul 2014 17:11:04 +0000
Received: from xhc-rcd-x05.cisco.com (xhc-rcd-x05.cisco.com [173.37.183.79]) by alln-core-9.cisco.com (8.14.5/8.14.5) with ESMTP id s6OHB4Uo005425 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 24 Jul 2014 17:11:04 GMT
Received: from xmb-aln-x13.cisco.com ([fe80::5404:b599:9f57:834b]) by xhc-rcd-x05.cisco.com ([173.37.183.79]) with mapi id 14.03.0123.003; Thu, 24 Jul 2014 12:11:04 -0500
From: "Ali Sajassi (sajassi)" <sajassi@cisco.com>
To: "Rabadan, Jorge (Jorge)" <jorge.rabadan@alcatel-lucent.com>, "Sami Boutros (sboutros)" <sboutros@cisco.com>, "l2vpn@ietf.org" <l2vpn@ietf.org>
Subject: Re: More comments about draft-boutros-l2vpn-evpn-vpws-04
Thread-Topic: More comments about draft-boutros-l2vpn-evpn-vpws-04
Thread-Index: AQHPpvtzEwPjTENQmkGDW9yXyn0zOpuvYiYA//9eDwCAAMcMgA==
Date: Thu, 24 Jul 2014 17:11:03 +0000
Message-ID: <CFF69C88.E359B%sajassi@cisco.com>
In-Reply-To: <CFF66FC6.49482%jorge.rabadan@alcatel-lucent.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.3.4.130416
x-originating-ip: [10.21.64.5]
Content-Type: text/plain; charset="utf-8"
Content-ID: <582B6BB7DD4D5F4CB302E333FACAED5F@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/l2vpn/RtykkkFjPXHuKkikwr3gHS7lrO8
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Layer 2 Virtual Private Networks <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn/>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Jul 2014 17:11:12 -0000

Hi Jorge,


On 7/24/14 11:18 AM, "Rabadan, Jorge (Jorge)"
<jorge.rabadan@alcatel-lucent.com> wrote:

>Hey Ali,
>
>Thank you. A couple more comments in-line.
>
>-----Original Message-----
>From: "Ali Sajassi   (sajassi)" <sajassi@cisco.com>
>Date: Thursday, July 24, 2014 at 7:58 AM
>To: Jorge Rabadan <jorge.rabadan@alcatel-lucent.com>om>, "Sami Boutros
>(sboutros)" <sboutros@cisco.com>om>, "l2vpn@ietf.org" <l2vpn@ietf.org>
>Subject: Re: More comments about draft-boutros-l2vpn-evpn-vpws-04
>
>>Hi Jorge,
>>
>>Thanks for your comments, please refer to my in-line reply below ...
>>
>>On 7/24/14 12:55 AM, "Rabadan, Jorge (Jorge)"
>><jorge.rabadan@alcatel-lucent.com> wrote:
>>
>>>Sami, as discussed:
>>>
>>>I am personally glad to see the way this draft has evolved. I believe it
>>>is now in the right direction after some issues, especially in the first
>>>2
>>>versions. I support this work for WG adoption.
>>>
>>>Some comments though:
>>>
>>>- Minor: all the references to ³E-VPN² should be changed to ³EVPN²
>>>- Section 1.2 - extra missing requirements:
>>>.- EP-LAN and EVP-LAN services could be supported on the same PE and on
>>>the same ports
>>
>>Agreed.
>>
>>>.- ESIs could be shared among VPWS and EVPN services
>>
>>Yes, the wording should be "ESI can be shared among EVPL and EVP-LAN
>>services."
>>
>>>
>>>- Some differences with EVPN that should be clarified:
>>>
>>>a) VPWS Service instance identifier encoded in the eth-tag: according to
>>>EVPN either a 12-bit or a 24-bit identifier is encoded in this 4-byte
>>>field.
>>>.- How many bits does the VPWS identifier have? 12/24? if it is 32 it
>>>has
>>>to be explicitly said (the slides infer you can use the 4 bytes).
>>>.- Since the scope of the VPWS identifier is the EVI, 12-bits is enough,
>>>right?. This allows us to use this in the same way as the EVPN
>>>VLAN-aware
>>>bundle mode and use the VPWS identifier as a normalized VID that we can
>>>include in the MPLS-encapsulated frames to carry the customer pbits
>>>transparently. This can be equivalent to the vc-type VLAN in PWs.
>>
>>It should be 24-bit. We don't want to unnecessarily create EVIs because
>>we
>>4K scale limit. It should be noted that you may have a single EVI for the
>>whole network.
>
>OK, that’s a fair point. But then we should define a way to include a
>normalized ethernet tag in the data plane for the case where you define
>several VPWS identifiers within the same EVI and VID translation is
>required (as well as carry pbits transparently between ACs). In VLAN-aware
>bundle interfaces we use the 12-bit VID in the eth-tag as the normalized
>tag...

Since there is no BD, I don't think we need to have a normalized Ether-tag
similar to VLAN-aware bundling in EVPN. We do the VID translation at the
egress PE using MPLS label alone.

Cheers,
Ali

> 
>
>> 
>>
>>>
>>>b) single-active MH behavior:
>>>.- all-active MH behavior should be equivalent to EVPN (except for
>>>split-horizon which does not make sense in VPWS) hence there is no need
>>>to
>>>document.
>>
>>Since the concept of all-active multi-homing is new in P2P services, I
>>think a short description is in order but it should be mentioned that it
>>is per baseline-EVPN procedure. Besides, the text is brief.
>
>Agreed.
>
>>
>>>.- in single-active MH the behavior is ³slightly" different and MUST be
>>>documented: 
>>>In EVPN, for single-active MH, the two MH PEs (PE1 and PE2 for ESI1)
>>>will
>>>send both their per ESI AD routes and per EVI AD routes. When the DF
>>>(PE1)
>>>sends MAC1/ESI1/next-hop=PE1, the remote PE3 will install MAC1 with
>>>next-hop = PE1 and backup next-hop = PE2.
>>>In VPWS the DF will obviously not send a MAC route, hence the question
>>>is:
>>>how does PE3 know whether to send the traffic for the VPWS id to PE1 or
>>>PE2? the non-DF for the VPWS id (PE2) should not - in this case - send a
>>>per EVI AD route for ESI1. Only the per-ESI AD route.
>>
>>Or we can follow the same procedure as baseline EVPN and send a MAC route
>>with Ether-tag set to the service-id (as before) and with MAC set to
>>NULL.
>>Let's discuss it further.
>
>Sounds like a good idea. I would suggest the use of mac route with MAC =
>0/48 (reusing the unknown mac route of the evpn-overlay-dci draft.
>
>>
>>>.- Section 4 should be clarified, specifying the handling failure
>>>situations for all-active and single-active.
>>
>>Agreed.
>>
>>Cheers,
>>Ali
>>
>>>
>>>Thank you.
>>>Jorge
>>>
>>>
>>>
>>>
>>>From:  <Rabadan>, Jorge Rabadan <jorge.rabadan@alcatel-lucent.com>
>>>Date:  Friday, November 15, 2013 at 1:04 PM
>>>To:  "Ali Sajassi (sajassi)" <sajassi@cisco.com>om>, "sboutros@cisco.com"
>>><sboutros@cisco.com>
>>>Cc:  "Henderickx, Wim (Wim)" <wim.henderickx@alcatel-lucent.com>
>>>Subject:  The use of ESI in draft-boutros-l2vpn-evpn-vpws-02
>>>
>>>
>>>>Hi Sami and Ali,
>>>>
>>>>As I mentioned during the IETF-88 I believe we have an issue with the
>>>>definition of the ESI in this draft.
>>>>There are not many details in the draft, but if I understand the
>>>>document, the ESI of the A-D routes is encoded with the
>>>>{system-MAC+AC-ID} value. While this ³might² be interesting for packing
>>>>many AC-IDs in the same update, it has many issues related
>>>> to the current EVPN definition. This is my view:
>>>>
>>>>1. Service Providers will implement EVPN VPWS for two main reasons: a)
>>>>they already have EVPN for ELAN services and want to use the same
>>>>technology for VPWS and b) all-active multi-homing. With the current
>>>>EVPN
>>>>VPWS definition, procedures and operations are
>>>> different from the ones defined for EVPN, so the motivation
>>>>diminishes.
>>>>2. SPs will deploy EVPN and EVPN-VPWS in the same network. It is then
>>>>very important to have an homogeneous ESI definition that allows
>>>>auto-derived and configured ESIs. The EVPN-VPWS definition of the ESI
>>>>clashes with this concept, as you indicated in Vancouver.
>>>>3. For all-active multihoming, I assume the ESI must be the same for a
>>>>given CE in the multi-homed PEs. If so, the current ESI definition
>>>>makes
>>>>the ESI auto-derivation very complex.
>>>>4. Why encoding the AC-ID in the ESI? is it the purpose to be able to
>>>>pack up to 4k AC-Ids in the same NLRI with the same RT?? if so:
>>>>
>>>>* There is no longer an RT per VPWS hence you can¹t take advantage of
>>>>RT-constraint, etc.
>>>>* I don¹t see many benefits, unless all the AC-IDs are originated and
>>>>terminated only in two PEsŠ which is a debatable use-case.
>>>>
>>>>
>>>>
>>>>My proposal would be:
>>>>
>>>>* Use an homogeneous ESI definition in both EVPN and EVPN-VPWS. This
>>>>means ESI=0 for single-home CEs, non-zero for multi-homed CEs.
>>>>* Auto-derive the RT from the EVI identifier, each VPWS will have a
>>>>different one. Auto-derive the RD as well.
>>>>* Define single-active MH and all-active MH in-line with EVPN
>>>>* Allow the use of A-D routes per ESI for mass withdraw.
>>>>
>>>>* This can be also useful in the case of single-homed CEs.
>>>>* Also, if regular EVPNs co-exist in the same ESI, the same A-D routes
>>>>per ESI will be used for EVPN and VPWS. They will just use the RTs of
>>>>all
>>>>the services irrespective of being ELAN/LINE.
>>>>
>>>>
>>>>* This would be a solid and basic implementation. From this point on,
>>>>we
>>>>can expand the technology, but to me the above points should be the
>>>>foundation. 
>>>>
>>>>I believe this new proposal makes things easier, and has more
>>>>advantages
>>>>compared to the existing draft. Please let me know if I am missing
>>>>something.
>>>>
>>>>If you agree with this, I am willing to work with you in the draft with
>>>>sections or paragraph or whatever way you consider. I¹m open to
>>>>suggestions.
>>>>
>>>>Thank you.
>>>>Jorge
>>>
>>
>