Re: [Lsr] Dynamic Flooding on Dense Graphs - draft-ietf-lsr-dynamic-flooding

Robert Raszuk <robert@raszuk.net> Thu, 16 June 2022 09:43 UTC

Return-Path: <robert@raszuk.net>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E0C7C14F74C for <lsr@ietfa.amsl.com>; Thu, 16 Jun 2022 02:43:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=raszuk.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CIGo8t5PYsMC for <lsr@ietfa.amsl.com>; Thu, 16 Jun 2022 02:43:26 -0700 (PDT)
Received: from mail-ed1-x535.google.com (mail-ed1-x535.google.com [IPv6:2a00:1450:4864:20::535]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 12109C14F733 for <lsr@ietf.org>; Thu, 16 Jun 2022 02:43:25 -0700 (PDT)
Received: by mail-ed1-x535.google.com with SMTP id z7so1368049edm.13 for <lsr@ietf.org>; Thu, 16 Jun 2022 02:43:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=raszuk.net; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=c047JOMN2N2xwQ0BvmDzF2Knu5NtSNWV1pV+9LBqpvk=; b=ANuwgEffD174lCiSDyoJP6tAwQFm5E3RM6MQ7ymbh8rf2XEi6xQlmbaI4x24eSScVW JSdm33Jprz5HoltQF7Fr/4SVdSY8WxWOzXje1+hE0/sylVIQcZfYOwGOTyx0EnIKCDHt ESTsKnyEOOs2FlqAxh0cvE29v2HBKGdT6k0hP2ALe9SdIAZ+YMelg3G1duD/T8FdIO9b TxZlEjG+2j0yHrNuT49GJrV8Sf4CyLI8z3gVYEc8hGoeN32bgBXXVO1nVOLd2IGULhFC efnT6Doc3aea91+LLyiscI08vw93eqCW65UVAPAnsTMuZ0804f06yfxe6t83dUiUNvwq zAow==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=c047JOMN2N2xwQ0BvmDzF2Knu5NtSNWV1pV+9LBqpvk=; b=7hLqbKCKxP0q3g9ODNjOh/BcxyiUBfKN1jtc23OwnRoQAYf2vhodcKQ04oKk7VL1mw Xvq8Qf/1BuUnXqmB8RkyjW9vn4YhvSgYDBC56U0ceTg2OboXQPnMBaddhTBQV7l2rorG fir8lqtIWUHTidfozCVAZeHzg7UQu2q0CzxXPV3HgZlduJLdd59ULDw+utcRLM8wZRT9 fZbvC4ruMv7BAIPBAaY9AMO6ImYo7uhRPR4hkjmoFNtCwJePNWmfsG10pcc960Z9Feuy Waj9oXzqDOmqkrmzGzeemZrXC6G+xX6mjgG/4s/9y6h0K9OKN9n5Zvk6+fYrSoq2yHHw 0E2A==
X-Gm-Message-State: AJIora8d+IWXksBjwaELgB9kr/VBtrf62Ietbfy6KI6DGKRyAd4K0K3c QqalRMSWap86ztFX4LZKQNNFo844pWRK7eQ5DUGC6Q==
X-Google-Smtp-Source: AGRyM1s6VasMqK07+BJ/QxxkgTyBNeMVIiOD2lq34dWqqQ5RwXPi+WmcEN5hdOFxO6R9z5gGzy+bKohwoB0yvcbnQaU=
X-Received: by 2002:a05:6402:17d0:b0:42d:ccc1:f4e4 with SMTP id s16-20020a05640217d000b0042dccc1f4e4mr5306981edy.150.1655372603672; Thu, 16 Jun 2022 02:43:23 -0700 (PDT)
MIME-Version: 1.0
References: <AC1AF8B2-07D5-46CB-85B9-DC8607C5E88B@cisco.com> <AM7PR07MB6248CDBA763EF1A0BAF626ADA0AB9@AM7PR07MB6248.eurprd07.prod.outlook.com> <8C14FCF1-C477-4D9C-A7C2-2260F2B7B7A5@tony.li> <BY5PR11MB43377349791AE499BE49682DC1AB9@BY5PR11MB4337.namprd11.prod.outlook.com> <3E5027F4-5A78-4AC0-BB24-5A0E13D2F979@tony.li> <BY5PR11MB433717C52D1A960ED987EFA6C1AB9@BY5PR11MB4337.namprd11.prod.outlook.com> <0076DD08-6CCB-40F7-82F9-6A42257C0A50@juniper.net> <BY5PR11MB4337E1D6A9487B37DC600DE0C1AA9@BY5PR11MB4337.namprd11.prod.outlook.com> <BY3PR05MB8081E3E92BBD7AA4C28B433EC7AA9@BY3PR05MB8081.namprd05.prod.outlook.com> <BY5PR11MB4337AFA5277F57D824740835C1AA9@BY5PR11MB4337.namprd11.prod.outlook.com> <BY3PR05MB8081900E45C9E1CBFFD9C5B4C7AA9@BY3PR05MB8081.namprd05.prod.outlook.com> <CABNhwV2=-nqguuvgcrooeyBwkyPhNbAsqyE2J4+0PvYOEvXjWA@mail.gmail.com> <4AD1A78E-0EB9-401C-9A6F-91245C5B8B44@tony.li> <CABNhwV0EZxbcZZhpMyvsU5ddPvhmbKDeRrs2fKc4z_N8Qs052w@mail.gmail.com>
In-Reply-To: <CABNhwV0EZxbcZZhpMyvsU5ddPvhmbKDeRrs2fKc4z_N8Qs052w@mail.gmail.com>
From: Robert Raszuk <robert@raszuk.net>
Date: Thu, 16 Jun 2022 11:43:21 +0200
Message-ID: <CAOj+MMEhDtchc8yT=eOrHp0pPoYsDfYRG+bdbK3i6SAiR-au7g@mail.gmail.com>
To: Gyan Mishra <hayabusagsm@gmail.com>
Cc: Tony Li <tony.li@tony.li>, "Acee Lindem (acee)" <acee@cisco.com>, John E Drake <jdrake=40juniper.net@dmarc.ietf.org>, John Scudder <jgs@juniper.net>, "Les Ginsberg (ginsberg)" <ginsberg=40cisco.com@dmarc.ietf.org>, "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>, "lsr@ietf.org" <lsr@ietf.org>, tom petch <ietfc@btconnect.com>
Content-Type: multipart/alternative; boundary="000000000000035ebe05e18d78c9"
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/lroV3n0F5b9IlFub3qlOJQOzgq8>
Subject: Re: [Lsr] Dynamic Flooding on Dense Graphs - draft-ietf-lsr-dynamic-flooding
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Jun 2022 09:43:30 -0000

Hi Gyan,

While I agree with your final conclusion and description there is one
important detail missing.

PODs consist of both network elements and compute nodes. Virtualization
happens in the latter. Dynamic routing between those almost in all
cases talk BGP in the underlay not IGP simply as there is no great open
source IGP code to leverage to run link state protocol on the
compute nodes. We know that for over two decades. Some were eager to
produce ISIS-lite but to the best of my knowledge that never fully
surfaced (Yes there is ISIS and OSPFv2/v3 code in FRR or OSPF in BIRD, but
are those implementations ready for production scale ... not sure).

I would love to be corrected though and see any CNI deployment using ISIS.

Sure you can still interconnect clusters (collection of PODs) with IGP in
the underlay. But running IGP to computes I am unfortunately not seeing.

Thx,
Robert.




On Thu, Jun 16, 2022 at 6:42 AM Gyan Mishra <hayabusagsm@gmail.com> wrote:

>
> Hi Tony
>
> “So, can we PLEASE stop beating a dead horse?”
>
> As data center have evolved over the years prior to NVO overlay
> architectures becoming more prevalent, many operators had moved to from L2
> fault domains to an L3 POD based architecture carving the DC or MSDC into
> many smaller PODs sub domains where each POD is a BGP AS onto itself
> peering to a DCI core AS.
>
> From the DC POD architecture, operators have moved towards an NVO clos
> topology where  the size of the topology is not as massive as a single AS
> DC fabric, as now each POD becomes a fabric onto itself.  This does
> considerably reduce scope of the flooding as each POD is a BGP AS onto
> itself peering with a DCI core AS super spine.  As well within the POD, 2
> tier and now 3 or 4 tier micro fabrics within a POD can now further reduce
> the dense clos fabric as desired with scale up scale out as needed.  Each
> micro fabric could be carved up into mini AS or left as single AS per POD
> as desired.
>
> I  am sure there are BGP only MSDC installed base, however there are still
> plenty for of MSDC as I described above using POD architecture that have
> IGP based underlay that could definitely benefit from this draft.  As well
> operators with single AS MSDC that are not BGP Only that could take
> advantage of the draft.
>
>
> Kind Regards
>
> Gyan
>
>
> On Tue, Jun 14, 2022 at 5:01 PM Tony Li <tony.li@tony.li> wrote:
>
>>
>> Gyan,
>>
>> Cisco has (reportedly) implemented this, but done so with their own
>> proprietary, undocumented distributed algorithm.
>>
>> The responses that I have seen from operators have been somewhat
>> disappointing:
>>
>> “There is no <expletive> way that I would ever let a <expletive> IGP into
>> my data center.”
>>
>> Others have been more polite, but similarly dismissive.
>>
>> The fact of the matter is that there is an installed base of BGP and
>> folks are not open to experimenting with anything else.
>>
>> So, can we PLEASE stop beating a dead horse?
>>
>> Tony
>>
>>
>> On Jun 14, 2022, at 1:43 PM, Gyan Mishra <hayabusagsm@gmail.com> wrote:
>>
>> All
>>
>> I agree this is important work for operators in DC networks  NVO CLOS
>> architecture with extremely dense fabrics and massively scaled out spines.
>>
>> I agree we can move forward with progressing with only ISIS being
>> implemented.
>>
>> I do think that after the draft is published hopefully implementations
>> include OSPF as well as there is a lot of OSPF used by operators.
>>
>> NVO CLOS architecture I would say is being universally being deployed as
>> defacto standard  in the DC arena.  As well as most operators don’t want to
>> go for the BGP only solution in the DC due to the complexity as well as
>> having to provision many public ASNs.
>>
>> I support #1 first followed by #2.
>>
>> So far we have Arista implementation, and we have both Cisco and Juniper
>> Co-Authors as  well  on the draft.
>>
>> I think we have a good chance at #1 - Standards track.
>>
>> Les & Tony & Tony
>>
>> What is the chance of getting this implemented by Cisco & Juniper?
>>
>>
>> We also have a few major stakeholders in the industry supporting the
>> draft, Verizon, ATT and CenturyLink as co-authors which I think shows how
>> important this draft is for the industry.
>>
>> Kind Regards
>>
>> Gyan
>>
>> On Tue, Jun 14, 2022 at 4:05 PM John E Drake <jdrake=
>> 40juniper.net@dmarc.ietf.org> wrote:
>>
>>> Les,
>>>
>>> I'm happy with either 1 or 2.  It's good work and I think it will become
>>> important.
>>>
>>> Yours Irrespectively,
>>>
>>> John
>>>
>>>
>>> Juniper Business Use Only
>>>
>>> > -----Original Message-----
>>> > From: Les Ginsberg (ginsberg) <ginsberg=40cisco.com@dmarc.ietf.org>
>>> > Sent: Tuesday, June 14, 2022 4:01 PM
>>> > To: John E Drake <jdrake@juniper.net>; Les Ginsberg (ginsberg)
>>> > <ginsberg@cisco.com>; John Scudder <jgs@juniper.net>
>>> > Cc: Tony Li <tony.li@tony.li>; tom petch <ietfc@btconnect.com>; Acee
>>> Lindem
>>> > (acee) <acee@cisco.com>; lsr@ietf.org
>>> > Subject: RE: [Lsr] Dynamic Flooding on Dense Graphs -
>>> draft-ietf-lsr-dynamic-
>>> > flooding
>>> >
>>> > [External Email. Be cautious of content]
>>> >
>>> >
>>> > John -
>>> >
>>> > I would be inclined to agree with you - but...to my knowledge (happy
>>> to be
>>> > corrected...) -
>>> >
>>> > There has been no interoperability testing.
>>> > It is really only possible to do interoperability testing on
>>> centralized mode at
>>> > present, since distributed mode requires standardization/multi-vendor
>>> > implementation of at least one algorithm - which hasn’t happened yet.
>>> > So, a significant portion of the protocol extensions remain untested.
>>> And since
>>> > enthusiasm for this work has waned - perhaps only temporarily - it
>>> seems
>>> > unlikely that these gaps will be closed in the immediate future.
>>> > Moving to standards track RFC with these gaps seems unwise and to some
>>> > degree "irresponsible".
>>> >
>>> > I think there are then three viable paths:
>>> >
>>> > 1)Continue to refresh the draft until such time as the gaps are closed
>>> or it
>>> > becomes clear the work is more permanently not of interest 2)Capture
>>> the
>>> > current contents as an Experimental RFC - noting the remaining work.
>>> > 3)Capture the current contents as a Historic RFC - noting the
>>> remaining work.
>>> >
>>> > I am not in favor of #3.
>>> > I would be OK with #1 or #2.
>>> >
>>> >    Les
>>> >
>>> >
>>> > > -----Original Message-----
>>> > > From: Lsr <lsr-bounces@ietf.org> On Behalf Of John E Drake
>>> > > Sent: Tuesday, June 14, 2022 11:23 AM
>>> > > To: Les Ginsberg (ginsberg) <ginsberg=40cisco.com@dmarc.ietf.org>;
>>> > > John Scudder <jgs=40juniper.net@dmarc.ietf.org>
>>> > > Cc: Tony Li <tony.li@tony.li>; tom petch <ietfc@btconnect.com>; Acee
>>> > > Lindem (acee) <acee@cisco.com>; lsr@ietf.org
>>> > > Subject: Re: [Lsr] Dynamic Flooding on Dense Graphs -
>>> > > draft-ietf-lsr-dynamic- flooding
>>> > >
>>> > > Hi,
>>> > >
>>> > > I don't understand why we don't just go through the normal Standards
>>> > > track process.  I am sure there are any number of Standards track
>>> RFCs
>>> > > which are published and which are neither widely implemented nor
>>> > > widely deployed, but which may become so in the future.
>>> > >
>>> > > As Peter noted in the context of another draft, we are starting to
>>> see
>>> > > extreme growth in the size of IGPs  which to me indicates that the
>>> > > subject draft will be perceived as timely in the not too distant
>>> future.
>>> > >
>>> > > Yours Irrespectively,
>>> > >
>>> > > John
>>> > >
>>> > >
>>> > > Juniper Business Use Only
>>> > >
>>> > > > -----Original Message-----
>>> > > > From: Lsr <lsr-bounces@ietf.org> On Behalf Of Les Ginsberg
>>> > > > (ginsberg)
>>> > > > Sent: Tuesday, June 14, 2022 12:19 PM
>>> > > > To: John Scudder <jgs=40juniper.net@dmarc.ietf.org>
>>> > > > Cc: Tony Li <tony.li@tony.li>; tom petch <ietfc@btconnect.com>;
>>> Acee
>>> > > Lindem
>>> > > > (acee) <acee@cisco.com>; lsr@ietf.org
>>> > > > Subject: Re: [Lsr] Dynamic Flooding on Dense Graphs -
>>> > > > draft-ietf-lsr-
>>> > > dynamic-
>>> > > > flooding
>>> > > >
>>> > > > [External Email. Be cautious of content]
>>> > > >
>>> > > >
>>> > > > John -
>>> > > >
>>> > > > Thanx for the information.
>>> > > >
>>> > > > I think what is relevant as regards the dynamic-flooding draft is
>>> > > > that we
>>> > > may be
>>> > > > prematurely burying it.
>>> > > > It is true, as Tony has stated, that the marketplace has not shown
>>> > > > an active interest in deploying this technology - but I am not yet
>>> > > > convinced that this is
>>> > > the
>>> > > > final disposition. As the scale of IGP networks increases and the
>>> > > > use of fast- flooding is deployed, it may be that interest in
>>> dynamic-flooding
>>> > is revived.
>>> > > >
>>> > > > Publishing the draft as Experimental leaves open the possibilities.
>>> > > > It could still be moved to Historic somewhere down the road if
>>> there
>>> > > continues
>>> > > > to be no deployment interest.
>>> > > >
>>> > > > I suppose it is also possible (as your post indicates) that we move
>>> > > > it to
>>> > > historic
>>> > > > now and find a way to move it from historic if/when the need arises
>>> > > > - but I frankly find such an approach very odd.
>>> > > >
>>> > > > I do not know why we are in a rush to "bury this". I think Acee has
>>> > > > raised a
>>> > > valid
>>> > > > point - given that there was broad consensus on the protocol
>>> > > > extensions themselves - that it would be good to formally preserve
>>> > > > the draft content. I
>>> > > think
>>> > > > Experimental is the best way to do that.
>>> > > >
>>> > > >     Les
>>> > > >
>>> > > > > -----Original Message-----
>>> > > > > From: John Scudder <jgs=40juniper.net@dmarc.ietf.org>
>>> > > > > Sent: Tuesday, June 14, 2022 7:46 AM
>>> > > > > To: Les Ginsberg (ginsberg) <ginsberg@cisco.com>
>>> > > > > Cc: Tony Li <tony.li@tony.li>; tom petch <ietfc@btconnect.com>;
>>> > > > > Acee Lindem (acee) <acee@cisco.com>; lsr@ietf.org
>>> > > > > Subject: Re: [Lsr] Dynamic Flooding on Dense Graphs -
>>> > > > > draft-ietf-lsr-dynamic- flooding
>>> > > > >
>>> > > > > Hi Les and all,
>>> > > > >
>>> > > > > > On Jun 13, 2022, at 2:22 PM, Les Ginsberg (ginsberg)
>>> > > > > <ginsberg=40cisco.com@dmarc.ietf.org> wrote:
>>> > > > > >
>>> > > > > > So you are suggesting that we publish something that was never
>>> > > > > > actually
>>> > > > > published as an RFC as a "historic RFC"?
>>> > > > > >
>>> > > > > > The logic of that escapes me.
>>> > > > >
>>> > > > > It so happens I recently became aware that this publication track
>>> > > > > is explicitly considered to be OK.
>>> > > > >
>>> > >
>>> https://urldefense.com/v3/__https://www.ietf.org/about/groups/iesg/sta
>>> > > > > tements/designating-rfcs-__;!!NEt6yMaO-gk!GYT66d5pSskUh-
>>> > > > l3RWY9vSXdEA8b
>>> > > > >
>>> > > >
>>> > > Ue7d8_9gGpIfpVLwvuDJs5gcVY6ekmyERneakOWjjjCfV0DvppQpFMmp2bSw
>>> > > HRw
>>> > > > YyGo$
>>> > > > > historic-2014-07-20/ sez
>>> > > > >
>>> > > > > "An RFC may be published directly as Historic, with no earlier
>>> > > > > status to change (see, for example, RFC 4870). This is usually
>>> > > > > done to document ideas that were considered and discarded, or
>>> > > > > protocols that were already historic when it was decided to
>>> > > > > document them. Those publications are handled as are any other
>>> RFCs.”
>>> > > > >
>>> > > > > $0.02,
>>> > > > >
>>> > > > > —John
>>> > > > _______________________________________________
>>> > > > Lsr mailing list
>>> > > > Lsr@ietf.org
>>> > > >
>>> > >
>>> https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/lsr__
>>> ;!
>>> > > !NEt
>>> > > > 6yMaO-gk!GYT66d5pSskUh-
>>> > > >
>>> > > l3RWY9vSXdEA8bUe7d8_9gGpIfpVLwvuDJs5gcVY6ekmyERneakOWjjjCfV0Dv
>>> > > ppQ
>>> > > > pFMmp2bSwFi578Bc$
>>> > > _______________________________________________
>>> > > Lsr mailing list
>>> > > Lsr@ietf.org
>>> > >
>>> https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/lsr_
>>> > > _;!!NEt6yMaO-
>>> > gk!FgD3U4E76lPBUWCjE2THKu9v6Ky9kpkbKKM5bm__xq22wLi0NUYiVw
>>> > > lsok2zdPLSLPRhfqAx2bDuepvCjy_F-M4kM4FMo7I$
>>> _______________________________________________
>>> Lsr mailing list
>>> Lsr@ietf.org
>>> https://www.ietf.org/mailman/listinfo/lsr
>>>
>> --
>>
>> <http://www.verizon.com/>
>> *Gyan Mishra*
>> *Network Solutions A**rchitect *
>> *Email gyan.s.mishra@verizon.com <gyan.s.mishra@verizon.com>*
>>
>>
>> *M 301 502-1347*
>>
>>
>> --
>
> <http://www.verizon.com/>
>
> *Gyan Mishra*
>
> *Network Solutions A**rchitect *
>
> *Email gyan.s.mishra@verizon.com <gyan.s.mishra@verizon.com>*
>
>
>
> *M 301 502-1347*
>
> _______________________________________________
> Lsr mailing list
> Lsr@ietf.org
> https://www.ietf.org/mailman/listinfo/lsr
>