Re: [Lsr] Request for Working Group Adoption: Area Proxy

Hannes Gredler <hannes@gredler.at> Thu, 04 June 2020 17:25 UTC

Return-Path: <hannes@gredler.at>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E64403A08F6 for <lsr@ietfa.amsl.com>; Thu, 4 Jun 2020 10:25:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WdBFdH4LFP8t for <lsr@ietfa.amsl.com>; Thu, 4 Jun 2020 10:25:09 -0700 (PDT)
Received: from hirzer.gredler.at (hirzer.gredler.at [165.22.72.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3CD153A08D1 for <lsr@ietf.org>; Thu, 4 Jun 2020 10:25:05 -0700 (PDT)
Received: from [192.168.1.168] (node-pt089-105-165-062.infra.schwaz.net [::ffff:89.105.165.62]) (AUTH: PLAIN hannes, SSL: TLS1.2,256bits,ECDHE_RSA_AES_256_GCM_SHA384) by hirzer with ESMTPSA; Thu, 04 Jun 2020 19:25:02 +0200 id 000000000003F069.000000005ED92E6E.0000793A
Content-Type: multipart/alternative; boundary="Apple-Mail-DB0A2D6C-AC88-417D-8365-EB6EC0A42872"
Content-Transfer-Encoding: 7bit
From: Hannes Gredler <hannes@gredler.at>
Mime-Version: 1.0 (1.0)
Date: Thu, 04 Jun 2020 19:25:01 +0200
Message-Id: <D14DFA88-129C-4C99-B660-56153ACCFCE4@gredler.at>
References: <BAD13DBC-8FA2-4722-9C00-327F59C5F6C7@tony.li>
Cc: lsr@ietf.org
In-Reply-To: <BAD13DBC-8FA2-4722-9C00-327F59C5F6C7@tony.li>
To: tony.li@tony.li
X-Mailer: iPhone Mail (17F75)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/c1H3-mOHVYnsfSyJmq6FzStkSxc>
Subject: Re: [Lsr] Request for Working Group Adoption: Area Proxy
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Jun 2020 17:25:12 -0000

support

Sent from my iPhone

> On 04.06.2020, at 18:43, tony.li@tony.li wrote:
> 
> 
> 
> Dear Gentlebeings,
> 
> I would like to formally request working group adoption of “Area Proxy for IS-IS” (https://tools.ietf.org/html/draft-li-lsr-isis-area-proxy-03).
> 
> The goal of this work is to improve scalability of IS-IS when transit L1 areas are in use.  In legacy IS-IS, for the L1 area topology to be utilized by L2, part of the topology must be configured as both Level 1 and Level 2. In the case where the transit topology is most or all of the L1 area, this creates a scalability issue as the size of the L2 LSDB approaches that of the entire network.
> 
> We propose to address this by injecting only a single LSP into Level 2. We call this the Proxy LSP and it contains all reachability information for the L1 area plus connectivity from the L1 area to L2 adjacencies. The result is that the L1 area is now opaque, reachable, and fully capable of providing L2 transit.
> 
> Our use case is the deployment of Clos topologies (e.g., spine-leaf topologies) as transit nodes, allowing these topologies to replace individual routers. We also see applications of this approach to abstract entire data centers or POPs as single nodes within the L2 area.
> 
> There are two other proposals of note before the working group.
> 
> In Topology Transparent Zones (https://tools.ietf.org/html/draft-chen-isis-ttz-08), an area (or zone) may be represented by a single node or as a full mesh of tunnels between the edges of the zone. In addition, there is a mechanism to attempt to seamlessly enable and disable the effectiveness of the zone. Relative to our proposal and for our use cases, the full mesh of tunnels is not as effective at providing scalability. In the specific case of spine-leaf networks, the leaves are typically the majority of the nodes in the network. As they become the edges of the area, with the full mesh approach, the majority of the area is not abstracted out of the L2 LSDB. For our use case, we have concerns about enabling and disabling the abstraction mechanism. There is added complexity to support this mechanism. In networks at scale, disabling abstraction may cause scalability failures. Enabling abstraction may cause failures as LSPs age out at dissimlar times. We feel that establishing abstraction is fundamental to the architecture of the network and that changing it on the fly is a highly risky operation, best suited for maintenance windows. Accordingly, the additional complexity of the transition mechanism is not required.
> 
> In IS-IS Flood Reflection (https://tools.ietf.org/html/draft-przygienda-lsr-flood-reflection-01), abstraction is achieved by mechanisms similar to ours, but transit service is achieved by tunneling transit traffic. That’s not necessary in our propsal.  In Flood Reduction, the also is coupled to the flooding reduction, whereas in our proposal, the two are independent, tho they do share the Area Leader mechanism.
> 
> While both of these proposals are very worthy, we believe that our proposal has substantial merit. We ask that the WG adopt Area Proxy for further work.
> 
> Regards,
> Tony & Sarah
> _______________________________________________
> Lsr mailing list
> Lsr@ietf.org
> https://www.ietf.org/mailman/listinfo/lsr