Re: [Lsr] Thoughts on the area proxy and flood reflector drafts.

Christian Hopps <chopps@chopps.org> Wed, 10 June 2020 18:04 UTC

Return-Path: <chopps@chopps.org>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DCA333A09FD for <lsr@ietfa.amsl.com>; Wed, 10 Jun 2020 11:04:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1L03t0d-veKE for <lsr@ietfa.amsl.com>; Wed, 10 Jun 2020 11:04:46 -0700 (PDT)
Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by ietfa.amsl.com (Postfix) with ESMTP id 6F0623A0982 for <lsr@ietf.org>; Wed, 10 Jun 2020 11:04:46 -0700 (PDT)
Received: from stubbs.int.chopps.org (047-050-069-038.biz.spectrum.com [47.50.69.38]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id DD64C60D9D; Wed, 10 Jun 2020 18:04:45 +0000 (UTC)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\))
From: Christian Hopps <chopps@chopps.org>
In-Reply-To: <CA+wi2hNSzKmF1r8c5AbgiMDHYKNfkZfzfoOQERySHsYt_+9d8Q@mail.gmail.com>
Date: Wed, 10 Jun 2020 14:04:45 -0400
Cc: Christian Hopps <chopps@chopps.org>, lsr@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <60C6D2D1-BC9C-4A43-BFC2-7583A85FBD40@chopps.org>
References: <790B898F-DB03-499E-BAAE-369504539475@chopps.org> <22086D70-6A19-4EA3-B15B-405FD5271262@chopps.org> <CA+wi2hMGcfqgPBoWLbqhS5vrF_Jy1RtAM7iMan4uYUjEc9X_2Q@mail.gmail.com> <48779A7B-FC92-495E-A2D6-98700E9FB337@chopps.org> <CA+wi2hOPEP=xT34QVV=ZYAg3ou1=gsg1n=5x3ZQXy_p84dt65A@mail.gmail.com> <EFCF321D-1D96-4DC7-931C-75037BCA4DF0@chopps.org> <CA+wi2hNSzKmF1r8c5AbgiMDHYKNfkZfzfoOQERySHsYt_+9d8Q@mail.gmail.com>
To: Tony Przygienda <tonysietf@gmail.com>
X-Mailer: Apple Mail (2.3608.80.23.2.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/DZXf0ygeWv0EdqMP6vqGvzHoWoY>
Subject: Re: [Lsr] Thoughts on the area proxy and flood reflector drafts.
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Jun 2020 18:04:48 -0000


> On Jun 10, 2020, at 1:56 PM, Tony Przygienda <tonysietf@gmail.com> wrote:
> 
> 
> 
> On Wed, Jun 10, 2020 at 10:29 AM Christian Hopps <chopps@chopps.org> wrote:
> 
> 
> 
> > 
> > 
> > Hmmm, AFAIR the implementation of OSPF virtual links was having no tunnel at all (and that's how I remember I implemented it then). I cite 
> 
> Correct, that's why I'm suggesting that any solution without tunnels is going to reduce to OSPF virtual links.
> 
> 
> Good to hear you implemented virtual w/o tunnels. 
> 
> But then FR is not a solution "without tunnels" so the whole logic of "it's not the same hence it's the same for me" escapes me completely now and I let it rest. 
>  
> 
> 
> If it seems like I'm "carrying the torch" it's b/c as I understand the drafts currently, the area proxy seems like a much simpler solution (KISS), and I haven't yet been able to figure out what the benefits of using the flood reflector method instead would bring. If those benefits were more obvious I'd probably like it too. :)
> 
> 
> looking @ the amount of protocol extensions in terms of TLVs, flooding scoping, configuration etc necessary in either case and involved fork-lifting, new-constructs necessary in operational tooling I dare say you hold a somewhat unique "opinion" IMO ... 
> 
> As to simplicity you see and since your mental model seems fixed around virtual links concept,

Tony,

I think you have misunderstood me at some point. When asked about the requirement of tunnels you said that they were not required, and that a solution could be done with carefully scoped reachability, this was also mentioned in your second presentation.

*ALL* I've been talking about WRT virtual links is that when you hint at a non-tunnel solution in your draft and presentation involving reachability, that your going to end up with OSPF virtual links. That is all.

Thanks,
Chris.
[as WG member]


> I also suggest to look up why in PNNI we ended up introducing a special "L1 equivalent" computation to the peer group leader to validate that it was actually reachable for correct operation (especially hierarchy negotiations) on peer group egresses which in a sense was like but worse than virtual links operationally IME. I was suggesting then to keep an SVC from PGL to every border for that reason since a partition of a PGL led otherwise to the peer groups looking like the same thing for a while with highly undesirable operational effects (my memory doesn't reach that far really but we had at least discussions then to implement proprietary solution in Fore to have such SVCs for more stable deployments). In more abstract terms, flooding is extremely good to quickly "route around failures" when e'ones state is completely decentralized but is simply not a great mechanism if you have to talk to an entity couple hops away in a stable manner, especially if this entity hold state you need for correct operation when talking to your peers. 
> 
> -- tony 
>