Re: [Lsr] Flooding Negotiation bit

"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> Tue, 21 May 2019 21:34 UTC

Return-Path: <ginsberg@cisco.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9E0E9120103 for <lsr@ietfa.amsl.com>; Tue, 21 May 2019 14:34:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=LPa229Ef; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=x19kWIIq
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2pTPybQeFOOB for <lsr@ietfa.amsl.com>; Tue, 21 May 2019 14:33:59 -0700 (PDT)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 164B6120047 for <lsr@ietf.org>; Tue, 21 May 2019 14:33:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=44028; q=dns/txt; s=iport; t=1558474439; x=1559684039; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=fTEekFtSVg6Tue7nBDIDD50N7HTbuFfrIEr698vtWk4=; b=LPa229Ef4XfdV8KvlVW1CM39wDB6C2sTmmIKX8CPV4PeOhU0qtgn1m6K JQCBgIeQ0TJcNvSx1ldZdTtCLJJK18cvsRzq2lAi9p+50+YiCLS6eBKYl hCPdLjJXYnusCMJRKn26+GGnSU93tGOfmCkUrstlLadqdVKTO7u5DTPRP 4=;
IronPort-PHdr: 9a23:LMeKDxy8TEb5UXjXCy+N+z0EezQntrPoPwUc9psgjfdUf7+++4j5YhWN/u1j2VnOW4iTq+lJjebbqejBYSQB+t7A1RJKa5lQT1kAgMQSkRYnBZuKCEvgJvPwYAQxHd9JUxlu+HToeUU=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AIAAA1buRc/5JdJa1lGgEBAQEBAgEBAQEHAgEBAQGBUQUBAQEBCwGBDi8kLANpVSAECyiEE4NHA4RSiiSCV4lAjWeBLoEkA1QJAQEBDAEBJQgCAQGEQAIXgg8jNAkOAQMBAQQBAQIBBG0cDIVKAQEBBBIRChMBATcBDwIBCBEEAQEhAQYDAgICHxEUCQgCBAENBQgagwGBHU0DHQECDJwTAoE1iF9xgS+CeQEBBYUDDQuCDwMGgTQBhGaGaheBQD+BEEeCTD6CGkcBAQIBgTcBKCQHCYJUMoImiyaCVIReiBqMUCw5CQKCDYYuhEGEM4N5gh6GW40zjFaGcoFTjQMCBAIEBQIOAQEFgU84Q4EUcBWDJ4IPg2+DRoFOhT9yAQGBJ4stASUEgigBAQ
X-IronPort-AV: E=Sophos;i="5.60,496,1549929600"; d="scan'208,217";a="280657038"
Received: from rcdn-core-10.cisco.com ([173.37.93.146]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 21 May 2019 21:33:57 +0000
Received: from XCH-ALN-020.cisco.com (xch-aln-020.cisco.com [173.36.7.30]) by rcdn-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id x4LLXvfc023579 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 21 May 2019 21:33:57 GMT
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by XCH-ALN-020.cisco.com (173.36.7.30) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 21 May 2019 16:33:56 -0500
Received: from xhs-aln-001.cisco.com (173.37.135.118) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 21 May 2019 17:33:55 -0400
Received: from NAM01-BY2-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Tue, 21 May 2019 16:33:55 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fTEekFtSVg6Tue7nBDIDD50N7HTbuFfrIEr698vtWk4=; b=x19kWIIqyoEs6b70oYrbfApFFqJoVkiQyNsAEhE3g4CVT0CJ8w3g8ZbNIR7Sh67a5aBah+/am18Y5hRUWgB7WP2wLjLw/lwnh3mXILUPQCMfbb5NIIdKP3INwssIYAf4icXDxuoiIHCUo40DIbj5FRcz/87SudxjxMbmZcLLOXc=
Received: from BYAPR11MB3638.namprd11.prod.outlook.com (20.178.237.19) by BYAPR11MB3783.namprd11.prod.outlook.com (20.178.238.225) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1922.15; Tue, 21 May 2019 21:33:53 +0000
Received: from BYAPR11MB3638.namprd11.prod.outlook.com ([fe80::ace2:8693:202d:5a30]) by BYAPR11MB3638.namprd11.prod.outlook.com ([fe80::ace2:8693:202d:5a30%7]) with mapi id 15.20.1900.020; Tue, 21 May 2019 21:33:53 +0000
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: Huaimo Chen <huaimo.chen@huawei.com>, "tony.li@tony.li" <tony.li@tony.li>
CC: "lsr@ietf.org" <lsr@ietf.org>
Thread-Topic: Flooding Negotiation bit
Thread-Index: AQHVCy/zB5BU5X9Q/Uqsv4NPlhnZ3KZvnFbwgATqCwCAAZaSMA==
Date: Tue, 21 May 2019 21:33:53 +0000
Message-ID: <BYAPR11MB36381EE68D6FA7483209D736C1070@BYAPR11MB3638.namprd11.prod.outlook.com>
References: <5316A0AB3C851246A7CA5758973207D463BB69D9@sjceml521-mbx.china.huawei.com> <C9C79F82-D68C-4843-91EF-2EC38833C51F@tony.li> <5316A0AB3C851246A7CA5758973207D463BB6C9B@sjceml521-mbx.china.huawei.com> <BYAPR11MB363885F9441C029341C5436CC10B0@BYAPR11MB3638.namprd11.prod.outlook.com> <5316A0AB3C851246A7CA5758973207D463BC5950@sjceml521-mbx.china.huawei.com>
In-Reply-To: <5316A0AB3C851246A7CA5758973207D463BC5950@sjceml521-mbx.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ginsberg@cisco.com;
x-originating-ip: [2001:420:30d:1320:f5e3:c513:cec3:4a76]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ef1c555e-5c41-4e0b-5e31-08d6de3405f5
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(7193020); SRVR:BYAPR11MB3783;
x-ms-traffictypediagnostic: BYAPR11MB3783:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <BYAPR11MB3783229CC4DC204B9DF3C791C1070@BYAPR11MB3783.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0044C17179
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(366004)(376002)(346002)(136003)(39860400002)(189003)(199004)(51444003)(68736007)(476003)(64756008)(486006)(66946007)(99286004)(66476007)(66556008)(66446008)(186003)(606006)(11346002)(6246003)(446003)(73956011)(46003)(86362001)(33656002)(53546011)(6506007)(76116006)(7116003)(102836004)(74316002)(478600001)(55016002)(53936002)(76176011)(790700001)(7696005)(236005)(9686003)(6436002)(110136005)(6306002)(25786009)(54896002)(2501003)(229853002)(6116002)(316002)(256004)(14444005)(4326008)(66574012)(14454004)(81156014)(8936002)(81166006)(8676002)(3480700005)(5660300002)(966005)(7736002)(2906002)(52536014)(71200400001)(71190400001); DIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR11MB3783; H:BYAPR11MB3638.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: GY/do9Ej2bBJbO3oPDQrJJeFq+/UU1xC7vmaL5bSmmP8j/vuPAbxoBmcjc1s6zCdchKycJWKzQ7Z13VVPpnTeHWDmz2v9JP0X8XyrXyD+2MBdIskYSMmOCabsYWOamesTSopX9SVF8mkthLo5d8p7vEeelbqFM6goOKuiepu3yRFt8XeTlCWoD8qfduQ41JUFjPsvqnf2z/omUYZW53yfgqk6loaNwzAZmMza6zZWx2JPzTxcDVd9OGIOAf8FZPYTj11EQ5YqbI8mask3GpmsNpRaQn4IvrFJGRvjnEktDNa/TlTb/Rz/ItglhhcEU4Q+LZPJT2MjRCEdRQpL8FvWRdxnDD5qWAzES5vM8CJajlX4Wlega8pgs5f6sr7A049S44spi8TJDggKm7IkqniakWGryuckMtwrC5+9sNLEV4=
Content-Type: multipart/alternative; boundary="_000_BYAPR11MB36381EE68D6FA7483209D736C1070BYAPR11MB3638namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: ef1c555e-5c41-4e0b-5e31-08d6de3405f5
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 May 2019 21:33:53.7566 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB3783
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.30, xch-aln-020.cisco.com
X-Outbound-Node: rcdn-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/bCFICmaoIdBRGaasAB0uK_wUuMs>
Subject: Re: [Lsr] Flooding Negotiation bit
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 May 2019 21:34:02 -0000

Huaimo –

Node startup has two aspects to be considered:

1)Database synchronization occurs as part of adjacency bringup (details differ between IS-IS and OSPF). If a large number of neighbors are brought up simultaneously then there is a lot of redundant flooding which can significantly lengthen the process. This issue has nothing to do with flooding optimizations. Since we have deliberately chosen not to alter the adjacency state machine – it will not be addressed by flooding optimizations. Smart implementations have addressed this issue w/o requiring any protocol extensions.

2)Addition of a new node to the network introduces a form of partitioning of the flooding topology in that the new node is initially NOT part of the flooding topology. This introduces the possibility that each neighbor of the new node could enable temporary flooding to the new node. The best way to solve this is to have the new node limit the rate at which new adjacencies are brought up. This reduces the number of neighbors of the new node who have to make a decision about enabling temporary flooding. It also has the side benefit of significantly reducing the amount of  redundant flooding which occurs as part of adjacency bringup.

Introducing a “Flooding Negotiation Protocol” introduces a good deal of unneeded complexity. The complexity occurs because you are requiring a “three way handshake” before enabling temporary flooding. As it is only the new node which is temporarily NOT part of the flooding topology, it is natural to allow the new node to determine what edges to enable for temporary flooding. This is far simpler than trying to negotiate agreement between the new node and each of its neighbors.

We have published V1 of the draft which includes a limited discussion of this issue. Please see https://tools.ietf.org/html/draft-ietf-lsr-dynamic-flooding-01#section-6.8.3 .

Thanx.

    Les


From: Huaimo Chen <huaimo.chen@huawei.com>
Sent: Monday, May 20, 2019 1:56 PM
To: Les Ginsberg (ginsberg) <ginsberg@cisco.com>; tony.li@tony.li
Cc: lsr@ietf.org
Subject: RE: Flooding Negotiation bit

Hi Les,

The problem/case is raised by Tony on 3/6.

I think that it needs to be addressed too from flooding reduction’s perspective.  After a node with 1K links reboots and has 1K adjacencies up to full states,  we should not add 1K links to the FT temporarily. “Adding all of them is likely to trigger a cascade failure. “ from Tony.

To address this problem, we should have a Flooding Negotiation bit. Through using this bit, we can add one or just a few links (from 1K links) to the FT temporarily after 1K adjacencies are fully formed.

It seems that the various methods you mentioned do the work and are for reducing the load before 1K adjacencies are fully formed.

Best Regards,
Huaimo
==== A case from Tony on 3/6 ====
If the node that rebooted has 1000 interfaces, which interfaces should be temporarily added?  Adding all of them is likely to trigger a cascade failure.  The TLV allows us to signal which ones should be enabled.

From: Les Ginsberg (ginsberg) [mailto:ginsberg@cisco.com]
Sent: Friday, May 17, 2019 2:02 PM
To: Huaimo Chen <huaimo.chen@huawei.com<mailto:huaimo.chen@huawei.com>>; tony.li@tony.li<mailto:tony.li@tony.li>
Cc: lsr@ietf.org<mailto:lsr@ietf.org>
Subject: RE: Flooding Negotiation bit

Huaimo –

It seems to me from your description that you are trying to deal with the startup case where a node reboots, has a large number of neighbors which need to be formed, and if this is done all simultaneously there will be a lot of redundant flooding between the new node and each of its neighbors.

If so, this is a well known problem which has nothing to do with optimizing flooding across the network. Clever implementers have already devised strategies wherein neighbors are not all brought up in parallel and the use of various protocol mechanisms (OL bit, max-metric, the SA bit from RFC 5306) are used to prevent the rebooting router from being used as a transit router until it has fully synced with all of its neighbors.

This has nothing whatever to do with the problem being addressed in the flooding optimizations draft – and there are no protocol extensions required to address the issue. I don’t think what you propose is needed – and if it were needed I do not think it would belong in flooding optimizations draft.

   Les


From: Lsr <lsr-bounces@ietf.org<mailto:lsr-bounces@ietf.org>> On Behalf Of Huaimo Chen
Sent: Wednesday, May 15, 2019 8:07 AM
To: tony.li@tony.li<mailto:tony.li@tony.li>
Cc: lsr@ietf.org<mailto:lsr@ietf.org>
Subject: Re: [Lsr] Flooding Negotiation bit

Hi Tony,

There are two different cases in which a link is to be added to the FT temporarily.
In one case, a negotiation is needed to be done before a link is to be added to the FT temporarily.
In the other case, no negotiation is needed. It is determined that a link is added to the FT temporarily.

In section 5.1.5 or section 5.2.7, it seems that there is no details on negotiations.

Best Regards,
Huaimo
From: Tony Li [mailto:tony1athome@gmail.com] On Behalf Of tony.li@tony.li<mailto:tony.li@tony.li>
Sent: Tuesday, May 14, 2019 4:31 PM
To: Huaimo Chen <huaimo.chen@huawei.com<mailto:huaimo.chen@huawei.com>>
Cc: lsr@ietf.org<mailto:lsr@ietf.org>
Subject: Re: Flooding Negotiation bit


Hi Huaimo,

If I understand you correctly, this seems to have almost the same semantics as the Flooding Request TLV (section 5.1.5) or the Flooding Request Bit (section 5.2.7).

If I’m not understanding you, could you please clarify the differences and why the current mechanisms are insufficient.

Tony


On May 14, 2019, at 1:09 PM, Huaimo Chen <huaimo.chen@huawei.com<mailto:huaimo.chen@huawei.com>> wrote:

Hi Tony,

For the case you described below, in order to add one or a limited number of links to the flooding topology temporarily, a new bit, called Flooding Negotiation bit (FN bit for short), should be defined and used. In OSPF, the FN bit is defined in Extended Options and Flag (EOF) TLV in OSPF Hello. In IS-IS, the FN bit is defined in the new TLV used for FR bit.

When a node N (with 1000 interfaces/links for example) reboots, , each (node X) of the nodes connected to node N will establish an adjacency with node N. During the process of the adjacency establishment between node X and node N, node X sends a FN-bit set to one in its Hello to node N, node N selects one link/node (or a limited number of links) for temporarily flooding and sends only to this selected node a FN-bit set to one in its Hello. Node N adds the selected link/node to the FT temporarily after receiving the FT bit set to one from the selected node. After receiving the FN bit set to one from node N, the selected node adds the link (connected to node N) to the FT temporarily.
In other words, a node Y connected to node N adds the link to node N to the FT temporarily after it sends and receives the FT bit set to one to/from node N; node N adds a selected link to the FT temporarily after it receives and sends the FT bit set to one from/to node Y.

Best Regards,
Huaimo

==== A case from Tony on 3/6 ====
If the node that rebooted has 1000 interfaces, which interfaces should be temporarily added?  Adding all of them is likely to trigger a cascade failure.  The TLV allows us to signal which ones should be enabled.