RE: comments on "draft-salam-l2vpn-evpn-oam-req-frmwk-02":

Gregory Mirsky <gregory.mirsky@ericsson.com> Fri, 04 April 2014 01:27 UTC

Return-Path: <gregory.mirsky@ericsson.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8975E1A0430 for <l2vpn@ietfa.amsl.com>; Thu, 3 Apr 2014 18:27:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9JDOw7tDmGuB for <l2vpn@ietfa.amsl.com>; Thu, 3 Apr 2014 18:26:58 -0700 (PDT)
Received: from usevmg21.ericsson.net (usevmg21.ericsson.net [198.24.6.65]) by ietfa.amsl.com (Postfix) with ESMTP id B3DE41A042F for <l2vpn@ietf.org>; Thu, 3 Apr 2014 18:26:57 -0700 (PDT)
X-AuditID: c6180641-b7f768e000001855-79-533e07742bc3
Received: from EUSAAHC007.ericsson.se (Unknown_Domain [147.117.188.93]) by usevmg21.ericsson.net (Symantec Mail Security) with SMTP id 9A.9F.06229.4770E335; Fri, 4 Apr 2014 03:14:29 +0200 (CEST)
Received: from EUSAAMB103.ericsson.se ([147.117.188.120]) by EUSAAHC007.ericsson.se ([147.117.188.93]) with mapi id 14.03.0174.001; Thu, 3 Apr 2014 21:26:51 -0400
From: Gregory Mirsky <gregory.mirsky@ericsson.com>
To: Sam Aldrin <aldrin.ietf@gmail.com>
Subject: RE: comments on "draft-salam-l2vpn-evpn-oam-req-frmwk-02":
Thread-Topic: comments on "draft-salam-l2vpn-evpn-oam-req-frmwk-02":
Thread-Index: Ac9CeLdIKfj9gmHqQoGb/BpQJYep2gKmytoAAA23woAACZ34gACGY9WAAAl8aQAAAybP0A==
Date: Fri, 4 Apr 2014 01:26:50 +0000
Message-ID: <7347100B5761DC41A166AC17F22DF1121B78DB2A@eusaamb103.ericsson.se>
References: <C02846B1344F344EB4FAA6FA7AF481F10F3DFF09@SZXEMA502-MBS.china.huawei.com> <CF5F2177.27AC8%ssalam@cisco.com> <C02846B1344F344EB4FAA6FA7AF481F10F3E1B66@SZXEMA502-MBS.china.huawei.com> <8D1DD6FA-2758-4F4A-BD41-E22B59D6843E@gmail.com> <7347100B5761DC41A166AC17F22DF1121B78D9A1@eusaamb103.ericsson.se> <1DB6D64E-2254-40E8-9B68-EDE4DBB781F7@gmail.com>
In-Reply-To: <1DB6D64E-2254-40E8-9B68-EDE4DBB781F7@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [147.117.188.9]
Content-Type: multipart/alternative; boundary="_000_7347100B5761DC41A166AC17F22DF1121B78DB2Aeusaamb103erics_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrNLMWRmVeSWpSXmKPExsUyuXRPrG4pu12wQf8EJosJrV8YLf50HWC2 ePztELvFu7PNLA4sHlN+b2T12DnrLrtHy5G3rB5LlvxkCmCJ4rJJSc3JLEst0rdL4MpoX7+S peDRLaaKhj1TWBoY71xk6mLk5JAQMJHYcOQCM4QtJnHh3nq2LkYuDiGBo4wSHe//QDnLGCVW HzvKAlLFJmAk8WJjDzuILSKgJjF53k1mkCJmgRZGiXmr9oEVCQs4S5yeOJkRoshFYsP1t0wQ dpjE4a9HweIsAioSa9pmgK3mFfCVuLFyFTPEtvdMEntapoNt4BSwlWjf8YYVxGYEuu/7qTVg g5gFxCVuPZkP9YOAxJI956F+EJV4+fgfK4StKLGvH2QOB1B9vsTEe1IQuwQlTs58wjKBUXQW kkmzEKpmIamCCGtKrN+lD1GtKDGl+yE7hK0h0TpnLjuy+AJG9lWMHKXFqWW56UaGmxiBEXhM gs1xB+OCT5aHGKU5WJTEeb+8dQ4SEkhPLEnNTk0tSC2KLyrNSS0+xMjEwSnVwMimr8EhuUPO ZdtGTuMMiwlVJ1OuyB/h//6TbcHeBytXPSi5IfVra0Run8WUiT940lJlH2VKT5dcc/x25gyz HNX0YycfXXd4Zau5nnehcPKStju/AjxuJQeeXVq791/09swDa/Yp75ix6FiwZB4PS/ejm/yr p6nZfRHl5VLeUPTgl5GXd/i52IdKLMUZiYZazEXFiQBhUDgyjgIAAA==
Archived-At: http://mailarchive.ietf.org/arch/msg/l2vpn/sqpMKgdacH7mRPezxYrmy3f9EZ0
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, "Ali Sajassi \(sajassi\)" <sajassi@cisco.com>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Layer 2 Virtual Private Networks <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn/>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Apr 2014 01:27:02 -0000

Hi Sam, et. al,
I only noted that I don’t believe that it is possible to distinguish between path failure and failure of a node along that path without very sophisticated fault correlation heuristics usually associated with the NMS.
With so extensive and interesting discussion it is bit hard to understand current state of the document and suggest any specific text. I’m looking forward for the version that incorporates this round of discussion.

                Regards,
                                Greg

From: Sam Aldrin [mailto:aldrin.ietf@gmail.com]
Sent: Thursday, April 03, 2014 3:51 PM
To: Gregory Mirsky
Cc: Xialiang (Frank); l2vpn@ietf.org; Ali Sajassi (sajassi)
Subject: Re: comments on "draft-salam-l2vpn-evpn-oam-req-frmwk-02":

Greg, Frank et al,

Any proposal to have clear text is always welcome. So, kindly propose the text on what you would like to see.

Sam

Sent from my iPhone

On Apr 3, 2014, at 3:24 PM, Gregory Mirsky <gregory.mirsky@ericsson.com<mailto:gregory.mirsky@ericsson.com>> wrote:
Dear Sam and Frank,
even though we’re discussing requirements and framework of EVPN OAM I wonder if you can give reference to  OAM method that can differentiate or distinguish between path and node failures as implied in:
3. Yes, a representative path maps to a test flow. This is a simple function, and is actually a degenerate case of the per user-flow OAM, because test fields are specified for the N-Tuple. That's why it is mandatory. As to the details of the mechanism, that is left to the solution draft – after all, this is the requirements and framework draft, it does not cover the solution details for implementation.
[Frank] : From my personal view, I don’t think the paragraph describing the requirement of a representative path is clear enough. For example, why can it be used for node failure detection but not path failure detection?
Whether one uses for node or path failure detection is for the solution to decide. This is requirements draft. If you think better wording is required, please do propose, will consider that.

                Regards,
                                Greg

From: L2vpn [mailto:l2vpn-bounces@ietf.org] On Behalf Of Sam Aldrin
Sent: Monday, March 31, 2014 7:12 PM
To: Xialiang (Frank)
Cc: l2vpn@ietf.org<mailto:l2vpn@ietf.org>; Ali Sajassi (sajassi)
Subject: Re: comments on "draft-salam-l2vpn-evpn-oam-req-frmwk-02":

Frank,

Comments inline.
On Mar 31, 2014, at 7:00 PM, Xialiang (Frank) <frank.xialiang@huawei.com<mailto:frank.xialiang@huawei.com>> wrote:



Hi Samer,
Please see inline:

From: Samer Salam (ssalam) [mailto:ssalam@cisco.com]
Sent: Tuesday, April 01, 2014 5:03 AM
To: Xialiang (Frank); Ali Sajassi (sajassi); aldrin.ietf@gmail.com<mailto:aldrin.ietf@gmail.com>; jdrake@juniper.net<mailto:jdrake@juniper.net>
Cc: l2vpn@ietf.org<mailto:l2vpn@ietf.org>
Subject: Re: comments on "draft-salam-l2vpn-evpn-oam-req-frmwk-02":

Hi Frank,

Thanks for your comments. Please find responses below:

1. In this draft, we cite RFC 6136 as reference, and hence we do not repeat the definition of common OAM terms (MEP, MIP, Maintenance Domain, In-band OAM, OAM layering etc.). Regarding Discovery, please note that E-VPN has automatic discovery built-in via the Inclusive Multicast Route and the Ethernet A-D Route. Hence, no further mechanisms are required.

2. Per user flow means a traffic stream that maps to actual user data, with a specified N-tuple characteristics (MAC DA/SA, VLAN, IP DA/SA, Src/Dest Port…).  The reason why this is different between Network & Service OAM is because the Service OAM mechanisms may or may not be able to support per-flow OAM, depending on the  service layer and its associated OAM capabilities. For instance, in the case where Ethernet CFM (IEEE 802.1ag) is the service OAM, it is not possible to perform per-flow continuity check, as the destination MAC address is set by the protocol to a multicast address.

3. Yes, a representative path maps to a test flow. This is a simple function, and is actually a degenerate case of the per user-flow OAM, because test fields are specified for the N-Tuple. That's why it is mandatory. As to the details of the mechanism, that is left to the solution draft – after all, this is the requirements and framework draft, it does not cover the solution details for implementation.
[Frank] : From my personal view, I don’t think the paragraph describing the requirement of a representative path is clear enough. For example, why can it be used for node failure detection but not path failure detection?
Whether one uses for node or path failure detection is for the solution to decide. This is requirements draft. If you think better wording is required, please do propose, will consider that.



4. Test packets can be either unicast or multicast. The problem we are describing here is that relying on normal packet counters in unreliable given that E-VPN offers many-to-many connectivity. For e.g., consider 3 endpoints A, B and C. Let's say we are interested in measuring the loss between A and C. A sends a packet to C, but it gets dropped. Now B also sends to C and that packet is delivered. If we were to examine the packet counter on C, we will find that the counter shows 1 packet received. But that doesn't mean that we have 100% packet delivery rate between A and C. The packet actually came from another source and hence the packet counter on C is ambiguous. Unless the implementation keeps packet counters per-flow (which will be expensive and impractical), it is not reliable to use packet counters to measure loss in a technology that supports multipoint-to-multipoint connectivity.
[Frank] : Yes. This clarification is more clear than the current content of draft~~ Also, I think “a statistical means of approximating packet loss rate” you proposed in draft is not the suitable solution for this problem. Actually, this is more an implementation issue, i.e., we can set the same value of flow characteristics for a test flow to ensure all test flow packets send/receive between 2 nodes exactly.
Again, this is requirement draft only. What you are eluding to is how one should perform, which clearly falls in solution category. As Samer clarified earlier, using actual data packet counters doesn’t meet the requirements, hence ‘synthetic' measurement is required.

-sam



Regards,
Samer

From: "Xialiang (Frank)" <frank.xialiang@huawei.com<mailto:frank.xialiang@huawei.com>>
Date: Tuesday, 18 March, 2014 12:07 AM
To: Samer Salam <ssalam@cisco.com<mailto:ssalam@cisco.com>>, "Ali Sajassi (sajassi)" <sajassi@cisco.com<mailto:sajassi@cisco.com>>, "aldrin.ietf@gmail.com<mailto:aldrin.ietf@gmail.com>" <aldrin.ietf@gmail.com<mailto:aldrin.ietf@gmail.com>>, "jdrake@juniper.net<mailto:jdrake@juniper.net>" <jdrake@juniper.net<mailto:jdrake@juniper.net>>
Cc: "l2vpn@ietf.org<mailto:l2vpn@ietf.org>" <l2vpn@ietf.org<mailto:l2vpn@ietf.org>>
Subject: comments on "draft-salam-l2vpn-evpn-oam-req-frmwk-02":

Hi authors,
I have reviewed this important draft, and have some comments as below:
1. By comparing with RFC6136 (L2VPN OAM req and frm), from the integrity point of view, I think there are some part missing: EVPN MEP and MIP, Discovery, Data Path Forwarding, Scalability, Transport/Application Independence;
2. In section 3.1.1.1, what is the definition of per user flow? Why is it different to support it between E-VPN Network OAM and E-VPN Service OAM?
3. In section 3.1.1.1, does the section of "a representative path" mean using test flow to detect the node failure? if yes, how to do? Is it a necessary requirement of proactive fault detection?
4. In section 3.2.1, I do not quite understand the describing reason for the inaccuracy of Loss Measurement. Do you mean that test packets of Loss Measurement are all BUM packets? Can you clarify why peer MEPs will receive some unnecessary packets? Why not use unicast packets for Loss Measurement?

Hoping for your feedback~~

B.R.
Frank