Re: [Lsr] Questions on draft-white-lsr-distoptflood

"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> Mon, 28 November 2022 19:04 UTC

Return-Path: <ginsberg@cisco.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9B124C1526EB; Mon, 28 Nov 2022 11:04:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.395
X-Spam-Level:
X-Spam-Status: No, score=-11.395 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, GB_ABOUTYOU=0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=FBDxyDq5; dkim=pass (1024-bit key) header.d=cisco.com header.b=TNCMfkQK
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TXwb10-SCIGA; Mon, 28 Nov 2022 11:04:45 -0800 (PST)
Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3A641C13A8C2; Mon, 28 Nov 2022 11:04:29 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=74656; q=dns/txt; s=iport; t=1669662269; x=1670871869; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=6aHpvSTvccsHbQchA9lSmTxYOErYFLdHe/zzKIWxLDY=; b=FBDxyDq5Uof+5V4Mio4jKtw//4Gm9viW+hUbyIMEPy5RRoM4hxN1k+JI JXZO+wKInjpENkZ5AJoum3c7yif0Y97AWnwxCDFa9GnD8iCIhSGkpIXrt i8XXIjZPrTHzuxwvIML0tX7wN3DcrNWXMm6jPO4ZZpflHXMU0lr/LN3v9 Q=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:EYurYx2/0rPijhnWsmDPr1BlVkEcU/3cMg0U788hjLRDOuSm8o/5N UPSrfNqkBfSXIrd5v4F7oies63pVWEap5rUtncEfc9AUhYfgpAQmAotSMeOFUz8KqvsaCo3V MRPXVNo5Te1K09QTc3/fFbV5Ha16G16Jw==
IronPort-Data: A9a23:TQcyxa0apcqBZNK0ZPbD5eVxkn2cJEfYwER7XKvMYLTBsI5bp2QFn WQdD2nQPqmPY2WhLt0kbYzk9BtS78DXmNdrQAQ/3Hw8FHgiRegpqji6wuYcGwvIc6UvmWo+t 512huHodZxyFjmGzvuUGuCJQUNUjclkfZKhTr+aUsxNbVU8En140Egzw7dRbrNA2LBVPSvc4 bsenOWHULOV82Yc3rU8sv/rRLtH5ZweiRtA1rAMTakjUGz2yxH5OKkiyZSZdBMUdGX78tmSH I4vxJnhlo/QEoxE5tmNyt4XeWVSKlLe0JTnZnd+A8CfbhZ+SiMa1b4WFMFFSB5ssTTOpYBS2 vlqh4yaYFJ8VkHMsLx1vxhwGiV6O+hN/6XKZCL5us2IxEqAeHzpqxlsJBhpZstDpKAuWicXr qFwxDMlNnhvg8q5wbSgQOR2iewoLdLgO8UUvXQIITTxUqh8GMGdHc0m4/dH5xwUjJ1BQcyAb shHahBgUR2aMyB2bwJ/5JUWxbf02SaXnydjgFaOv4I27nTdigtr39DFPMDcdMDPWsVUgkvdo nncumj4GQ0dLMCRzT2C/jSlm/PPmjngcIMfCLP+8eRl6HWPwWoCExwbSVWTrvywi0r4UNVaQ 3H44QInqaw0sUesVNS4BVuzoWWPuVgXXN84//AGBB+lzbL5wz3AJzE/dD8GUowFpuMRdywA/ wrc9z/2PgBHvLqQQHOb076bqzKuJCQYRVPugwdZF2PpBPG+/ekOYgLzosVLS/Xs14Krcd3k6 3Xb8nZh1ux7Ydsjjf3TwLzRv967SnElpCYc4gHaWApJBSsmOdb8POREBbUnhMuswa6QSl2H+ XMDgcXbtqYFDIqGk2qGR+Bl8FCVCxStbme0bb1HRsZJG9GRF5iLJ9A4DNZWfx0BDyr8UWW1C HI/QCsIjHOpAFOkbLVsf6W6ANkwwK7rGLzND66KP4cROcgqLFXbrUmCgHJ8OUiwzCDAdolia f+mnTqEVh729Iw+lmPtHrdBuVPV7nlmlTO7qW/HI+SPiOrCOyH9pUYtO1qVZedx97KfvAjQ6 L5i2ziilX1ivBnFSnCPq+Y7dAlSRVBiXMyeg5IMLIarfFE5cFzN/teMm9vNjaQ/wfQM/goJl 1ngMnJlJK3X3iaWc1vWOiA7NNsCn/9X9BoGAMDlBn7ws1BLXGplxP53m0cfFVX/yNFe8A==
IronPort-HdrOrdr: A9a23:2txolqs0IFIHA5pY9o1y2ZvJ7skCyIMji2hC6mlwRA09TyXGra 6TdaUguiMc1gx8ZJh5o6H9BEGBKUmskaKdkrNhQotKPTOW9VdASbsC0WKM+UyZJ8STzJ8+6U 4kSdkCNDSSNyk3sS+Z2njCLz9I+rDum8rE5Za8854ud3ARV0gK1XYfNu/vKDwOeOAwP+teKH Pz3LsjmxOQPVAsKuirDHgMWObO4/fRkoj9XBIADxk7rCGTkDKB8tfBYlel9yZbdwkK7aYp8G DDnQC8zL6kqeuHxhjV0HKWx4hKmeHm1sBICKW3+4Yow3TX+0eVjbZaKv6/VQMO0aOSAZER4Z zxSiIbToROArXqDyWISFXWqk7dOX0VmgHfIBej8AreSIrCNXQH4w4rv/MATvMfgHBQ5e2UmZ g7r16xpt5ZCwjNkz/64MWNXxZ2llCsqX5niuILiWdDOLFuIIO5gLZvin+9Kq1wVR7S+cQiCq 1jHcvc7PFZfReTaG3YpHBmxJipUm4oFhmLT0AesojNugIm1kxR3g8d3ogSj30A/JUyR91N4P nFKL1hkPVLQtUNZaxwCe8dSY+8C3DLQxjLLGWOSG6XX50vKjbIsdr68b817OaldNgBy4Yzgo 3IVBdCuWs7ayvVeLqzNV1wg2TwqUmGLEHQI5tllutEU5XHNcjWDRE=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.96,200,1665446400"; d="scan'208,217";a="7621966"
Received: from alln-core-2.cisco.com ([173.36.13.135]) by rcdn-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 28 Nov 2022 19:04:27 +0000
Received: from mail.cisco.com (xfe-rcd-001.cisco.com [173.37.227.249]) by alln-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 2ASJ4R4l011478 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Mon, 28 Nov 2022 19:04:27 GMT
Received: from xfe-rcd-003.cisco.com (173.37.227.251) by xfe-rcd-001.cisco.com (173.37.227.249) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9; Mon, 28 Nov 2022 13:04:27 -0600
Received: from NAM10-MW2-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-003.cisco.com (173.37.227.251) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9 via Frontend Transport; Mon, 28 Nov 2022 13:04:27 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DYx5WiAeORg9wFLjrhAj9ZXOZoeHaJuucSoxmgGJCLmTLCo1wTNJmtSAGrsz+1N7oH4EfqjgaYFUbhzIAvmWyB70xtK4getBXAezUOHMXJTYz0Vt7UBZ+RRiGuvQuw6wpVk0v0XKzTg6y38tcvAlQ+fXzfywBwlsZv68GKtadA+icNLHk2+d0XGuyWl5fuS7uu0rzAAnOkwsyul4+gBnvOx1Ffcvl2Zl46jRY5lUnmxBQFwLab6AiRU5pjF+QIcfHnhZFy+LKRX59A3hcMkn9bsXg6UVkv/ud07P48Yv+GlJ109Ddx9sEE6Cb6mY0maSSSNJBam++Zgn8mb/Wrbu2A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6aHpvSTvccsHbQchA9lSmTxYOErYFLdHe/zzKIWxLDY=; b=jpWDViNG/pXgJez9IcLnGFd4UXsY0r7tIS5UBJth1Y0kOR0GaZW45bSOd0moPeC22piMA4dGzYpzoMU36KWpgOvz/sgGgwzZDi0XYNoKNqkn/vnVG4/BqqWvZn5Q7rQorY0NHBakFl+xfvgZKiDOvYPuWL8G2+fH9l5cckqxp1VTppbOp5jczl91/BQX5FmrTWYunos1UYYDcDNmsGKkfRRquF4kMdO+Yi31uljZItu5c1bQDlC5JU38xhTRTU5E76tChkNd1dKXcTCbj6JLXV/z6zzfSZBK08I2fcRJj8DSLVRcQ8w/phKwOralffnVH5H9UQwOjhBnFwVIryu8Gg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6aHpvSTvccsHbQchA9lSmTxYOErYFLdHe/zzKIWxLDY=; b=TNCMfkQKVF6fhif/pn0SLjLGmVbI0RHdMOKICGnmdVQV3KDbb/0vOVGj/tgPpoVagPx6Il+X7KHxZAdAbt2xk/hs211lG39HLgQz4T/TAljUfimdUD8ES3LYpA6zySDPslEyWrmdf3MHAb9wX3ZECGk7Hp9U9Zw7DSV4ZURWtmE=
Received: from BY5PR11MB4337.namprd11.prod.outlook.com (2603:10b6:a03:1c1::14) by CY8PR11MB7395.namprd11.prod.outlook.com (2603:10b6:930:86::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5857.23; Mon, 28 Nov 2022 19:04:25 +0000
Received: from BY5PR11MB4337.namprd11.prod.outlook.com ([fe80::bf20:1c7d:5873:dbf2]) by BY5PR11MB4337.namprd11.prod.outlook.com ([fe80::bf20:1c7d:5873:dbf2%5]) with mapi id 15.20.5857.023; Mon, 28 Nov 2022 19:04:25 +0000
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: Tony Przygienda <tonysietf@gmail.com>
CC: "draft-white-lsr-distoptflood.authors@ietf.org" <draft-white-lsr-distoptflood.authors@ietf.org>, "lsr@ietf.org" <lsr@ietf.org>
Thread-Topic: [Lsr] Questions on draft-white-lsr-distoptflood
Thread-Index: Adj+zQRVJGgtVYOkTpu3owg13vnbmwB4BIeAAJOE4BAAFvgtAAABNFrw
Date: Mon, 28 Nov 2022 19:04:24 +0000
Message-ID: <BY5PR11MB4337E4D98B82D6C339C5DDCFC1139@BY5PR11MB4337.namprd11.prod.outlook.com>
References: <BY5PR11MB43378D8C6A80969C4172ABE4C10C9@BY5PR11MB4337.namprd11.prod.outlook.com> <CA+wi2hNJyUi92i=mH5KuRZ2KuWvswHcbAfYUoGYFZPbTdSCcTg@mail.gmail.com> <BY5PR11MB433702159FD821BBD449D341C1139@BY5PR11MB4337.namprd11.prod.outlook.com> <CA+wi2hNk528V1nAaiPR2iNFGv8KYKwZ9K0K9TN3gZx=a=6GyaA@mail.gmail.com>
In-Reply-To: <CA+wi2hNk528V1nAaiPR2iNFGv8KYKwZ9K0K9TN3gZx=a=6GyaA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BY5PR11MB4337:EE_|CY8PR11MB7395:EE_
x-ms-office365-filtering-correlation-id: 76e4d031-0b87-421e-bde3-08dad1735db1
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4337.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(376002)(136003)(366004)(346002)(396003)(39860400002)(451199015)(8676002)(122000001)(66446008)(64756008)(66476007)(5660300002)(4326008)(71200400001)(30864003)(166002)(6506007)(86362001)(7696005)(53546011)(41300700001)(54906003)(6916009)(52536014)(8936002)(38100700002)(186003)(316002)(9686003)(66899015)(33656002)(2906002)(38070700005)(966005)(55016003)(83380400001)(478600001)(76116006)(66946007)(66556008); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BY5PR11MB4337E4D98B82D6C339C5DDCFC1139BY5PR11MB4337namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4337.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 76e4d031-0b87-421e-bde3-08dad1735db1
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Nov 2022 19:04:24.9564 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: LT4jqEY1b8NRBmBqwztC5TVLCZvLklOg5pU6kv4lpp0TjE0oJkggYH898B/kcoR7KHkubw5p+LX63t6ycuU3ow==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY8PR11MB7395
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.227.249, xfe-rcd-001.cisco.com
X-Outbound-Node: alln-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/od79ZmdQcSvpuxSWKBrAl-4PGD8>
Subject: Re: [Lsr] Questions on draft-white-lsr-distoptflood
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Nov 2022 19:04:49 -0000

Tony –

I will wait for the next draft version – seems like we are in general agreement.

I would caution regarding periodic CSNPs on P2P networks. Yes – many implementations support this – but not all do so by default. So assuming that periodic CSNPs are sent on P2P circuits and therefore nothing needs to be said in this regard isn’t justified.

   Les

From: Tony Przygienda <tonysietf@gmail.com>
Sent: Monday, November 28, 2022 10:27 AM
To: Les Ginsberg (ginsberg) <ginsberg@cisco.com>
Cc: draft-white-lsr-distoptflood.authors@ietf.org; lsr@ietf.org
Subject: Re: [Lsr] Questions on draft-white-lsr-distoptflood



On Mon, Nov 28, 2022 at 9:39 AM Les Ginsberg (ginsberg) <ginsberg@cisco.com<mailto:ginsberg@cisco.com>> wrote:
Tony –

In the interest of brevity, I am not going to respond in detail to each of your points. My reply focuses on two things.

okey, thanks, point 1) answered in other meail.

...

The mechanisms proposed in draft-ietf-lsr-dynamic-flooding are analogous to what is used for DIS election and (more recently) for selecting the winning FAD for a given flex-algo. Given the significant deployment of flex-algo and the long history of DIS election, I am surprised at the degree of concern you have for the use of these mechanisms.

well, DIS is on a single LAN, not network wide so you can break a single LAN.  I stay out the FAD discussion given how fresh the stuff is ;-) Plus, a broken FAD would break a FAD (or in other one topology flavor/parts of network AFAIR), a broken flood reduction would brck the whole network.


2)Regarding the use of PSNPs…you propose to send a PSNP (once apparently) which has the LSP entries for all the LSPs which you chose NOT to flood to a given node (minus any LSPs for which you may have received an explicit ack) in the most recent time interval - suggested to be one second.

ack

What will happen when you send this? Let’s use a simple example where one LSP was selectively flooded – call it A.00-01(Seq #100).
NOTE: This example assumes a P2P circuit.

a)Neighbor receives the PSNP, already has A.00-01(Seq #100) in its LSPDB – no action taken. All is good.
b)Neighbor receives the PSNP, does not have A.00-1(Seq #100) in its LSPDB – sends a PSNP back to the originator requesting that the LSP be flooded. At this point I assume normal flooding procedures apply i.e., SRM flag is set, causing the LSP to be flooded, and I assume SRM remains set until the LSP is acknowledged.
All is good – but the additional flooding is likely to be redundant as the node which had the responsibility for sending this LSP to your neighbor should be doing so reliably.

yepp. During normal flooding it should be minuscule overhead. During heavy flooding we batch PSNP, about as good as we can do AFAIS.

c)Neighbor does not receive the PSNP. If the neighbor does not have A.00-01(Seq #100) in its database, the one time sending of the special PSNP won’t trigger sending of the missing LSP. As the draft does not propose that the special PSNP be resent, I assume during the next time interval the only LSP entries that would be sent in the next special PSNP would be other LSPs that were partially flooded in the subsequent interval – not A.00-01.

yepp, in this scenario where our belt breaks we have the CSNP suspenders since we cannot differentiate this from scenario a). Not that different from normal ISIS where on a CNSP a node sends a PSNP to get a missing LSP. We don't retransmit that either AFAIR (which would be a possibility in the protocol though a complex one). Unless my brain skipped a cycle here and I'm too lazy right now to dig through the implementation/10589 to remember ...


Periodic CSNPs can be dropped as well, but as periodic CSNPs are guaranteed to be sent continuously at some interval and they cover the entire LSPDB, reliability of the Update process is assured. Under some pathological conditions it might take a significant amount of time to converge, but it is assured.

NOw, if you assume that we drop PSNP and _then_ we drop CSNP then we end up in the discussion of "how much do you lose until protocol stops converging" and discover that reduction always slows down convergence, makes it more fragile. Yes, no matter what, it's an optimization and optimizations make things less robust in almost all circumstances.


What then do these special PSNPs provide? It could be argued that they provide a lower cost and more targeted recovery mechanism in some circumstances – and that using them in conjunction with periodic CSNPs may speed convergence. However, I think the existing proposal discussed in Section 2.3 of the draft lacks detail and is unlikely to achieve this goal in most circumstances.

what they provide is fast belt in case some kind of things went wrong upstream from us (origination being source). Let's say a flooding packet got lost, stuck on queues, the non-reflooding node can speed up convergence by making sure the reflooder got the LSP if things upstream choke.


The time period of 1 second is too aggressive. You may end up sending the special PSNP before the node which has the responsibility for flooding the LSP to your neighbor has even had a chance to do the flooding – which will undermine the benefits of the flooding reduction.

yes, that can be discussed and frankly, it's really just an implemenation variable, we don't even have to make constant. It's state compression vs. responsiveness vs. context change in implementation. Normal discussions.


If you consider the cost of sending/receiving a PSNP is roughly equivalent to the cost of sending/receiving an LSP, you will have created the equivalent of full mesh flooding every second since every node can expect to receive a PSNP from every neighbor whenever an LSP update is triggered. NOTE: The relative impact will be more noticeable when a small # of LSPs are updated.

the point of PSNPs is that we pack them and you only send a small header so no, I think the cost will be significantly lower. We could have optimized further and say " _if_ something is a reflooder it should NOT send the PSNP to the non-reflooders." since those are "leaves" hanmging off but this makes algoirithm less robust on e.g. hash mismatches during convergnece


And since the node which is responsible for flooding to a particular neighbor should be doing so reliably, under most circumstances the special PSNP is not needed at all – so why choose an aggressive time interval for sending it?

I read you. Basically anything much faster than CSNP intervals is fine AFAIS. And ideally, yes, it should make for significant PSNP packing under heavy flooding and not cuase the other nodes to request the LSP since they already got it ;-)


Periodic CSNPs are sufficient – are typically done at a slow rate (10s of seconds) – and apparently (from your response below) you seem to intend to send periodic CSNPs also (though the draft does not mention this). I am not seeing the benefit of the special PSNP – but if you are committed to this, please provide a more robust description of how they should be used in the draft and an analysis of the benefits under some realistic flooding scenarios.

we omitted the CSNP since nothing changes. And yes, we can say CSNPs stay of course and we should say please, please send CSNP on p2p even if 10589 doesn't say so (but almost all implemenations I know do it by default anyway since long time).

so yes, very good points you make and feel free to suggest verbiage to cover it or otherwise we take care of that in next releasee

-- tony




   Les


From: Tony Przygienda <tonysietf@gmail.com<mailto:tonysietf@gmail.com>>
Sent: Friday, November 25, 2022 1:06 AM
To: Les Ginsberg (ginsberg) <ginsberg@cisco.com<mailto:ginsberg@cisco.com>>
Cc: draft-white-lsr-distoptflood.authors@ietf.org<mailto:draft-white-lsr-distoptflood.authors@ietf.org>; lsr@ietf.org<mailto:lsr@ietf.org>
Subject: Re: [Lsr] Questions on draft-white-lsr-distoptflood


Les, bits delay since I had to think a bits about your comment to do it justice and it's bit long'ish

1. So, to start with a cut and dry summary and reasoning for it, I am firmly against adding signaling to the whole thing by some means (or rather any procedures to act upon distribution of info about the algorithm used by any of the nodes involved, i.e. I'm ok with having the algorithm advertised solely for info purposes with me though I don't see what function it serves except detecting nodes that do not reduce yet in transition of a network or maybe, as you say, detect algorithm mismatch). More detailed reasoning follows:

a. First reason is the fact that the additional flexibility of maybe having one day some better hash algorithm will add very serious amount of complexity in implementation/behavior in case we are talking about adding it to the centralized variant of the dynamic flooding draft and having a leader advertising the algorithm.
    i. backup machinery needs to be added/spec'ed properly. What does the network do if backup has different algorithm than the current leader? First we would have a transition phase, some nodes have old algorithm, some the old, network may stop converging for a bit that way, worst case we partition the PGL algorithm advertisement from new nodes so we have to wait CSNP * diameter etc. Big network bleep is the result. I know there is lots verbiage in the dynamic flooding draft but I know the reality of implementations of such things and they are extraordinarily high for the bit flexibility the whole thing would buy us I see you suggesting.
   ii. What happens if PGL doesn't say anything? Default algorithm? Full flooding again? in case of full-flooding-regression all of a sudden one fat finger on PGL (or PGL moving unexpectedly due to fat finger/some other node config changes) can basically crash your network and worst case stop convergence if reduction allowed before to converge but full flooding seriously slows down everything. I know, this would be a network tethering on the edge already but why have additional daemons hiding in a single point of failure on top.
  iii. lots of remaining subtle things. e.g. to make sure the whole thing works each node havs to compute reachability to the leader (not sure that's in the dynamic flooding draft now), otherwise they may use stable LSPs from a leader that is gone/partitioned. This reachability computation will have adverse effects. The timing is unpredictable in the network and may lead to problems mentioned in i).   If nodes don't do the reachability we may end up in Paxos unintentionally BTW.

Generally, I can claim that I lived the PGL in ATM so I've seen the "central leader in IGP" game. Not excited about it from experience and it was much easier in ATM already due to hard state of SVCs. To sum it up again, I see here a suggestion to add massive amount of complexity/fragility for an assumed, unspecified benefit in the future. As footnote: centralization in an IGP a cardinal sin in my eyes moving away from the first premise that made distributed routing so successful. I spoke against it and still hold the same opinion and if that's heresy I'm more than happy to be bumped off the author's list of the dynamic-flooding draft ;-).

so maybe as iv) here:  WHAT additional variables in the hash do you imagine would constitute a _better_ algorithm? AFAIS there are none I can imagine and the current algorithm provides pretty much best entropy with clearly cap'ed state per node needed to balance per LSP originator/fragment. So instead of "pledging for flexibility for flexibilitity's sake" I'd rather see you suggesting something that would change/improve the behavior in the future/now in concrete terms and then let's talk about specifics.

b. Then, as second reason when talking towards a distributed solution, i.e. each node flooding the algorithm it uses. We still do NOT know what to do in case nodes will advertise different algorithms each, no matter it's advertised or not. Shut down the network, fall back to full flooding if one node disagrees (which makes every node a potential attack vector)? We had that kind of discussion before, last on multi-TLV where you were insisting on killing the cap indication so it would be funny to add it here.  Complexity without any concrete benefit whatsoever AFAIS and lots of ratholes again.

2. To go to your reliable PSNP/CSNP objection now. First, they were never reliable. Neither were LSPs. We can make a very fine argument that if PSNPs/CSNPs are not reliable then ISIS will not converge at all. We can start to argue then how many we lose and when and how one variation of flooding is "more robust" than other and we can actually discover that if the redundancy factor in graph is higher than the largest fanout than we are in normal ISIS and hence the reduced flooding redundancy factor (in extreme case it's basically infinity for existent flooding algorithm in ISIS) + PSNP unreliability are two variables (plus network radius + origination rates + etc) which in extreme case can be shown to not converge the network anymore no matter the flooding (e.g. if the re-origination rate + radius is higher than the propagation time under CSNP/PSNP losses).  In short, the objection brings nothing new to the table, Les, this has been around forever and we're talking here about the fact that any flooding reduction makes flooding "less" reliable somewhat. That's trivia.

b. to more productive arguments: the solution does NOT reduce the full CSNP advertisement and this will fix any bug in an algorithm. We agree that far I think.

3. Then, let's have the up-to-date PSNP in glossary with a better name, e.g. "consistency assuring PSNP" or CA-PSNP which describes better what it is. It cannot hurt

It goes like this (which I thought was already decently clear in the draft but nothing wrong in spelling that out)
a) the algorithm figures out during computation that LSP-ID X/fragment Y is NOT flooded on since other RNL members took over. Now, the according LSP-ID X/fragment Y is put on PSNP queue of all the members in TN that are your neighbors (optimization here) or as the draft says "all your neighbors" which is bits too conservative.  Flood out those PSNPs on a second timer unless they were killed during normal ISIS processing rules or already went out.  Observe that NO changes are made to normal ISIS CSNP/LSP/PSNP processing here except dropping those PSNPs into the according queues to go out. If the neighbor gets the PSNP and interprets it as something newer, normal procedures kick in. If it already has it nothing will happen really per normal procedures.  If your implementation is very conservative you can choose yourself super conservative constants, e.g. unless you see tripple coverage by other RNLs you flood nevertheless. Or if it turns out you send PSNPs to your neighbors in expectation that they covered the TNLs and you get requests back, either the other TNLs are dead slow or something is off and an alarm can be given as in "flooding reduction here struggles". Nothing to do with this solution, this will happen on any type of flood reduction, chokepoints may get created (and observe that this draft load balances flooding and not only reduces, one of the lessons I learned implementing those things in my earlier lives ;-)

So, to sum up the argument chain, I err on the side of simplicity here since from experience, simplicity allows us to deploy and stand straight-faced in front of customers with very large, dense networks. This draft is something  that consists of 12 pages including examples and about 4-5 pages boilerplate. And on top bases on old clean work and pretty much e'thing in it proven by implementation and previous art IME. This vs. an adopted design-by-comittee draft of 46 pages that at this point in time I think does not standardize any interoperability but standardizes how to find out why things don't interoperate due to all possible combinations of centralized vs. distributed plus bring your own algorithm on top by every vendor (based on my last read of it) ...

-- tony






On Wed, Nov 23, 2022 at 1:14 AM Les Ginsberg (ginsberg) <ginsberg=40cisco.com@dmarc.ietf.org<mailto:40cisco.com@dmarc.ietf.org>> wrote:
Draft authors -

The WG adoption call reminded me that I had some questions following the presentation of this draft at IETF 114 which we decided to "take to the list" - but we/I never did.
Looking at the minutes, there was this exchange:

<snip>
Les:           I'm not convinced that you don't need to advertise
               whether a node needs support this. If not, why not define
               this as an algorithm and use the dynamic flooding?
Tony P:        First bring me a case why we need to signal this.
Les:           If I'm not going to flood and I'm expecting someone else
               to flood, and I don't know whether we're in sync.
Tony:          Think it through, the mix with old nodes just fine. The
               old guy still do the full flooding and that's fine.
Les:           You use the term up-to-date PSNP, I have no idea how you
               determine whether the PSNP is "up-to-date"? unlike CSNP,
               PSNP doesn't have the info.
Tony:          You have to list all those things.
Les:           Let's take it to the list.
<end snip>

Question #1: Why not define this as an algorithm and use draft-ietf-lsr-dynamic-flooding (in distributed mode)?
This question is of significance both from a correctness standpoint and what track (Informational or Standard) the draft should target.

Tony P's reply above suggests this isn't needed - but I don't think this is true. The draft itself says in Section 2.1:

<snip>
Once this flooding group is determined, the members of the flooding
   group will each (independently) choose which of the members should
   re-flood the received information.  Each member of the flooding group
   calculates this independently of all the other members, but a common
   hash MUST be used across a set of shared variables so each member of
   the group comes to the same conclusion.
<end snip>

If a "common hash MUST be used across a set of shared variables" (and I agree that it MUST) then all nodes which support the optimization MUST agree to use the same algorithm. Given that there are likely many hash algorithms which could be used, some way to signal the algorithm in use seems to be required.
By publishing a given algorithm(including the hash) and having it assigned an identifier in the registry defined in https://www.ietf.org/archive/id/draft-ietf-lsr-dynamic-flooding-11.html#section-7.3 - and using the Area Leader logic defined in the same draft, consistency is achieved.
Without that, I don't think this is guaranteed to work.

Note the issue here has nothing to do with legacy nodes - I agree with Tony P's comment above that legacy nodes do not present a problem - they just limit the benefits.

Question #2: Please define and demonstrate how "up-to-date PSNPs" work to recover from flooding failures.

We know that periodic CSNPs robustly address this issue - and their use has been recommended for flooding reduction solutions over the years.
Please more completely define "up-to-date PSNPs" and spend some time demonstrating how they are guaranteed to work - and consider in that discussion that transmission of SNPs of either type is not 100% reliable.

Thanx.

    Les

_______________________________________________
Lsr mailing list
Lsr@ietf.org<mailto:Lsr@ietf.org>
https://www.ietf.org/mailman/listinfo/lsr