RE: RE:

"HENDERICKX Wim" <wim.henderickx@alcatel-lucent.be> Sun, 10 August 2008 06:58 UTC

Return-Path: <l2vpn-bounces@ietf.org>
X-Original-To: l2vpn-archive@megatron.ietf.org
Delivered-To: ietfarch-l2vpn-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 141413A6BE0; Sat, 9 Aug 2008 23:58:11 -0700 (PDT)
X-Original-To: l2vpn@core3.amsl.com
Delivered-To: l2vpn@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 46C573A6BE0 for <l2vpn@core3.amsl.com>; Sat, 9 Aug 2008 23:58:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.896
X-Spam-Level: **
X-Spam-Status: No, score=2.896 tagged_above=-999 required=5 tests=[AWL=-0.139, BAYES_50=0.001, HELO_EQ_FR=0.35, HTML_FONT_FACE_BAD=0.884, HTML_MESSAGE=0.001, J_CHICKENPOX_31=0.6, J_CHICKENPOX_73=0.6, J_CHICKENPOX_74=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UiJj-VskMiKc for <l2vpn@core3.amsl.com>; Sat, 9 Aug 2008 23:58:08 -0700 (PDT)
Received: from smail5.alcatel.fr (smail5.alcatel.fr [64.208.49.27]) by core3.amsl.com (Postfix) with ESMTP id E886C3A6BDD for <l2vpn@ietf.org>; Sat, 9 Aug 2008 23:58:07 -0700 (PDT)
Received: from FRVELSBHS02.ad2.ad.alcatel.com (frvelsbhs02.ad2.ad.alcatel.com [155.132.6.74]) by smail5.alcatel.fr (8.13.8/8.13.8/ICT) with ESMTP id m7A6vfR7027153; Sun, 10 Aug 2008 08:57:43 +0200
Received: from FRVELSMBS22.ad2.ad.alcatel.com ([155.132.6.51]) by FRVELSBHS02.ad2.ad.alcatel.com with Microsoft SMTPSVC(6.0.3790.2499); Sun, 10 Aug 2008 08:57:41 +0200
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C8FAB6.6171B596"
Subject: RE: RE:
Date: Sun, 10 Aug 2008 08:57:44 +0200
Message-ID: <B128F666D4C8BD4FBF56CEAFB2DB66D70302CB8F@FRVELSMBS22.ad2.ad.alcatel.com>
In-Reply-To: <007301c8f935$ea290980$454d460a@china.huawei.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: RE:
Thread-Index: Acj5Nfs80Rg9H1fiQkW9rVLMvQVW+QANvj+A
References: <001c01c8f7a6$fa221ab0$5d4d460a@china.huawei.com> <B128F666D4C8BD4FBF56CEAFB2DB66D70302C5FC@FRVELSMBS22.ad2.ad.alcatel.com> <006c01c8f842$1347c620$5d4d460a@china.huawei.com> <B128F666D4C8BD4FBF56CEAFB2DB66D70302C624@FRVELSMBS22.ad2.ad.alcatel.com> <007d01c8f85f$99578350$5d4d460a@china.huawei.com> <B128F666D4C8BD4FBF56CEAFB2DB66D70302C877@FRVELSMBS22.ad2.ad.alcatel.com> <007301c8f935$ea290980$454d460a@china.huawei.com>
From: HENDERICKX Wim <wim.henderickx@alcatel-lucent.be>
To: Jiang Yuan-long <yljiang@huawei.com>
X-OriginalArrivalTime: 10 Aug 2008 06:57:41.0486 (UTC) FILETIME=[61FA88E0:01C8FAB6]
X-Scanned-By: MIMEDefang 2.57 on 155.132.188.13
Cc: l2vpn@ietf.org
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
Sender: l2vpn-bounces@ietf.org
Errors-To: l2vpn-bounces@ietf.org

Yuanlong, more in-line


________________________________

From: Jiang Yuan-long [mailto:yljiang@huawei.com] 
Sent: vrijdag 8 augustus 2008 11:06
To: HENDERICKX Wim
Cc: l2vpn@ietf.org
Subject: Re: RE:


Hi,Wim,Please see my comments in line.

	----- Original Message ----- 
	From: HENDERICKX Wim <mailto:wim.henderickx@alcatel-lucent.be>  
	To: Jiang Yuan-long <mailto:yljiang@huawei.com>  
	Cc: l2vpn@ietf.org 
	Sent: Friday, August 08, 2008 3:39 AM
	Subject: RE: RE:
	
	
	
	Yuanlong, see in-line

________________________________

	From: Jiang Yuan-long [mailto:yljiang@huawei.com] 
	Sent: donderdag 7 augustus 2008 9:31
	To: HENDERICKX Wim
	Cc: l2vpn@ietf.org
	Subject: Re: RE:
	
	
	Wim:
	 
	In VPLS with dual-homed topology, we must pre-configure the working PE and backup PE to form a protection group, 
	such as described in ICCP (defined in draft-martini-pwe3-iccp-00), and pre-configure working PWs with their 
	respective backup PWs, as described in "PW redundancy"(draft-ietf-pwe3-redundancy-bit-00).
	Anyway, these configurations are prerequesite to provide sevice resiliency for VPLS, and the roles of the respective 
	PE or PW will change automatically after PE or PW switching (ie. backup PE becomes working PE, backup PW becomes 
	working PW).
	The mechanism in my draft is based on such a protection relationship of PEs and PWs, I am not sure what other 
	configurations need to be changed, can you give me some more clues?
	 
	WH> We don;t need any of this for PW resilience in VPLS according to me as PW status together with the existing MAC flushes do the job for these topologies.
	 
	Jiang: But how to set the exact PW status? When a CE is dual-homed to PEs by attached circuits, and if the working AC fails, 
	how do the PEs coordinate their PWs? IMHO, RFC 4762 is not perfect for these problems.  
	 
	Wh> The way it works is you use PW status as defined in the draft-muley-dutta-pwe3-redundancy-bit-02.txt and if the PW status changes you should perform a MAC flush in the full mesh VPLS domain.
	 
	RFC 4762 already provides some selective flushing mechansms, such as flushing some specified MACs or all MACs except 
	those associated with specific PWs. So what you mean may be that all the existing implementations only provide 
	flushing "all" MACs blindly in a VPLS instance, is that true? 
	 
	WH> There are certain cases where we need to extend them like for PBB where we have C-MAC ties to B-MACs.
	Jiang: As far as I know, nowadays even some enterprise-oriented routers can selectively flush MACs. 
	 
	WH> Isn't the main reason for this the fact that they can't handle large floods of traffic?  
	 
	As our anlysis and other sources(such as draft-pdutta-l2vpn-vpls-ldp-mac-opt-03) shows, blindly flushing adversely 
	impacts all sites in a VPLS instance, even their topology is not affected, the MACs must be re-leaned may be numerous,
	and the number of frames flooded may be not so small. Thus blindly flushing is unacceptable to a carrier grade VPLS 
	service,and for this reason we proposed some optimized MAC operations such as MAC Switching and MAC notification.
	 
	WH> The optimizations which are suggested in the mentioned drafts are very simple, whilst your proposal is fairly complex and depends on the topology you propose but might not be efficient in case we change the service topology.
	

	Jiang: The draft mentioned above also do selective flushing, not blind flushing. And for what I know, this very draft may depend 
	on the hub-and-spoke network topology while our draft seems to be capable of a broader application scenario such as a CE dual-homed 
	to PEs by ACs. The formats and contents of the LDP messages are similar in all these drafts or RFC for selective flushing, and as 
	my analysis goes, complexity (times of lookup and write) in dataplane may be commensurate for all these mechanisms.  
	 
	WH> Right but the main difference is that you only need to indicate the PE or PW for which the MAC flush is performed. In your proposal you need to indicate the full MAC address list which will be very processing intensive if you have a large amount of MAC addresses in the VPLS service. The message will get very big and you will have to sent lots of them due to fragmentation implications. 
	Draft-pdutta-l2vpn-vpls-ldp-mac-opt-03 provides a simple (blind was maybe the wrong wording) flush mechanism. The indication will be fast and the re-learning will happen instantly after the MAC is removed from the MAC FIB.
	 
	You proposal will delay the trigger when the amount of MAC @ grows and on top the receiving PE needs a fast lookup mechanism to find he proper MAC and replace it which means delay the removal of the FIB.
	 
	
	Best regards,
	 
	Yuanlong

		----- Original Message ----- 
		From: HENDERICKX Wim <mailto:wim.henderickx@alcatel-lucent.be>  
		To: Jiang Yuan-long <mailto:yljiang@huawei.com>  
		Cc: l2vpn@ietf.org 
		Sent: Thursday, August 07, 2008 1:24 PM
		Subject: RE: RE:
		
		
		
		Yuanlong,
		 
		My point is that how are you going to define the behavior on each PE when the topology is adapted. I hope you are not going to change the configuration on each PE in the VPLS each time.
		 
		On top, by doing selective MAC flush you need to go one by one to the items and hence the processing to withdraw the MAC(s) will be longer. When you use the existing mechanisms you can flush without the extra lookups and hence the performance will be faster. FLushing a MAC will result in re-learning which means you do not have traffic impact, just a small flooding until the MAC address is re-learned.
		 
		Cheers,
		Wim
		
________________________________

		From: Jiang Yuan-long [mailto:yljiang@huawei.com] 
		Sent: donderdag 7 augustus 2008 6:00
		To: HENDERICKX Wim
		Cc: l2vpn@ietf.org
		Subject: Re: RE:
		
		
		 
		Wim:
		 
		Thanks for you comment. My draft is not a standlone protocol, it can be deployed with other protocol suites.
		For what I know, "PW redundancy" is being standardized in PWE3 WG, which can synchronize the behavior of
		the PEs and PWs in PW switching. So it is not such a difficult task to do PW switching, and do MAC switching
		subsequently. 
		 
		The MAC withdrawal process defined in RFC 4762 is not so simple as you think, it maybe not just "flush all MACs" 
		blindly, but can selectively flush MACs, which computation comlexity is on the same level as my draft.

			----- Original Message ----- 
			From: HENDERICKX Wim <mailto:wim.henderickx@alcatel-lucent.be>  
			To: Jiang Yuan-long <mailto:yljiang@huawei.com>  ; sajassi@cisco.com 
			Cc: l2vpn@ietf.org 
			Sent: Thursday, August 07, 2008 4:18 AM
			Subject: RE:

			Yuanlong,
			 
			The difficulty with your draft is that it requires a PE to do different things depending in which situation the PE is in, and this makes it very cumbersome in case changes happen to topologies or configurations.
			 
			My view is that we need a simple MAC flush which we have today in LDP.
			 
			Cheers,
			WIm

________________________________

			From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf Of Jiang Yuan-long
			Sent: woensdag 6 augustus 2008 11:30
			To: sajassi@cisco.com
			Cc: l2vpn@ietf.org
			Subject: 
			
			
			Hi, Ali:
			 
			Thanks for your comments in the last L2VPN WG meeting, I will try to give you some reasons here.
			Following are the two questions:
			 
			1. What do you think will be faster convergence? When you flush MAC addresses, 
			the learning is done in data plane at wire speed. Why does that prolong convergence time?
			
			 
			-Faster convergence means the time to associate the MACs with the "exact" out port
			will be shorter. Though learning is done in data plane at wire speed, the time for a frame to arrive 
			at the end host and the response time for a host to send a reverse frame accross the PE (on which the 
			MACs is flushed) will be a rather long time. So the learning process is not only determined solely by 
			the wire speed, but also on the host processing time and delays on all the intermediate routers.
			For this reason, flooding may also last for a rather long time.
			 
			 
			2. You consider a simple case with simple backup for primary. In cases where primary fails and traffic gets
			 distributed among multiple PE's, how do you take care of that?
			 
			-I believe the most commonly deployed scenario is one backup PE for a primary PE.
			In my opinion, for the scenario of multiple backup PEs protecting a primary PE, 
			only one PE out of them will be elected as the working PE when the primary PE failed, 
			rather than distribute the traffic over multiple backup PEs,
			otherwise, loops may be introduced to the attached customer site.
			BTW, in a similar way, for PW redundancy mechanism, only 1 secondary is selected as the working PW (see 
			draft-ietf-pwe3-redundancy-bit-00.txt in PWE3 WG)
			Anyway, if there is any such requirements confirmed, I think it will be OK for us to find some solutions and 
			add them to the future drafts. 
			 
			cheers,
			Yuanlong