Re: [Lsr] Using IS-IS Multi-Topology (MT) for Segment Routing based Virtual Transport Network

Aijun Wang <wangaijun@tsinghua.org.cn> Fri, 27 March 2020 01:37 UTC

Return-Path: <wangaijun@tsinghua.org.cn>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3DE3D3A07CB for <lsr@ietfa.amsl.com>; Thu, 26 Mar 2020 18:37:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yH0a3RdO6iVN for <lsr@ietfa.amsl.com>; Thu, 26 Mar 2020 18:37:16 -0700 (PDT)
Received: from m176115.mail.qiye.163.com (m176115.mail.qiye.163.com [59.111.176.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C9D943A0402 for <lsr@ietf.org>; Thu, 26 Mar 2020 18:37:15 -0700 (PDT)
Received: from [240.0.0.1] (unknown [188.119.64.219]) by m176115.mail.qiye.163.com (Hmail) with ESMTPA id 0E3CE661E84; Fri, 27 Mar 2020 09:37:06 +0800 (CST)
Content-Type: multipart/alternative; boundary="Apple-Mail-38F6765B-EA0C-4E0B-99D2-7E978F928263"
Content-Transfer-Encoding: 7bit
From: Aijun Wang <wangaijun@tsinghua.org.cn>
Mime-Version: 1.0 (1.0)
Date: Fri, 27 Mar 2020 09:36:58 +0800
Message-Id: <07020B13-4679-43D0-955B-197F102C9148@tsinghua.org.cn>
References: <DM5PR05MB3388321814E27A7DBB1491DEC7CF0@DM5PR05MB3388.namprd05.prod.outlook.com>
Cc: "Joel M. Halpern" <jmh@joelhalpern.com>, "xiechf@chinatelecom.cn" <xiechf@chinatelecom.cn>, lsr <lsr@ietf.org>
In-Reply-To: <DM5PR05MB3388321814E27A7DBB1491DEC7CF0@DM5PR05MB3388.namprd05.prod.outlook.com>
To: John E Drake <jdrake=40juniper.net@dmarc.ietf.org>
X-Mailer: iPhone Mail (17D50)
X-HM-Spam-Status: e1kfGhgUHx5ZQUtXWQgYFAkeWUFZS1VMSkJLS0tISEJOS0NLTkxZV1koWU FKTEtLSjdXWS1ZQUlXWQkOFx4IWUFZNTQpNjo3JCkuNz5ZBg++
X-HM-Sender-Digest: e1kMHhlZQR0aFwgeV1kSHx4VD1lBWUc6NSo6Czo4DTg2LCExEhMYHwIw QzEKC1FVSlVKTkNOSUxIS0hJS0pDVTMWGhIXVQwaFRwaEhEOFTsPCBIVHBMOGlUUCRxVGBVFWVdZ EgtZQVlKQ0NVSkpCVU1PVUlKQllXWQgBWUFMTkhINwY+
X-HM-Tid: 0a7119a2b60e9373kuws0e3ce661e84
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/K6bPQAPWlR4QjxCYSfRG1I4cjMk>
Subject: Re: [Lsr] Using IS-IS Multi-Topology (MT) for Segment Routing based Virtual Transport Network
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Mar 2020 01:37:21 -0000

Hi, John:
In your proposal, there is the following text “ the network controller SHOULD ensure that the IGP and TE metrics for these resources is higher than the metrics for the underlay network resources allocated to non-enhanced VPNs.”
Considering these resources will span across the network and be changed upon the slicing requirements , will such arrangement make the metric allocation within the network a mess?
If the above statement can’t be met, how you ensure the traffic that pass the P router use the dedicated resource(for example, bandwidth)?

Aijun Wang
China Telecom

> On Mar 26, 2020, at 23:31, John E Drake <jdrake=40juniper.net@dmarc.ietf.org> wrote:
> 
> Hi,
> 
> As Joel notes, it is true that enhanced VPNs require the use of specific underlay network resources, either dedicated or shared, but the this needs to be done without installing overlay VPN awareness in the P routers, which is inherently unscalable and operationally complex.  Also, since VPNs span multiple ASes, putting overlay VPN state in an IGP doesn't work. 
> 
> Please see:  https://tools.ietf.org/html/draft-drake-bess-enhanced-vpn-02
> 
> Yours Irrespectively,
> 
> John
> 
> 
> Juniper Business Use Only
> 
>> -----Original Message-----
>> From: Lsr <lsr-bounces@ietf.org> On Behalf Of Joel M. Halpern
>> Sent: Thursday, March 26, 2020 9:36 AM
>> To: xiechf@chinatelecom.cn; lsr <lsr@ietf.org>
>> Subject: Re: [Lsr] Using IS-IS Multi-Topology (MT) for Segment Routing based
>> Virtual Transport Network
>> 
>> [External Email. Be cautious of content]
>> 
>> 
>> In once sense, the statement is inherently true.  A VPN technology without
>> underlay support would seem to have significant difficulty in consistently
>> meeting an SLA.  Having said that much, the rest does not seem to follow.
>> 
>> Yours,
>> Joel