Re: [Lsr] WG Last Call for "IS-IS Flood Reflection" -draft-ietf-lsr-isis-flood-reflection-06

Aijun Wang <wangaijun@tsinghua.org.cn> Tue, 07 December 2021 08:44 UTC

Return-Path: <wangaijun@tsinghua.org.cn>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 197AB3A1431 for <lsr@ietfa.amsl.com>; Tue, 7 Dec 2021 00:44:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uqIsYqniVkuh for <lsr@ietfa.amsl.com>; Tue, 7 Dec 2021 00:44:52 -0800 (PST)
Received: from mail-m17638.qiye.163.com (mail-m17638.qiye.163.com [59.111.176.38]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 38CF43A142E for <lsr@ietf.org>; Tue, 7 Dec 2021 00:44:52 -0800 (PST)
Received: from DESKTOP2IOH5QC (unknown [219.142.69.75]) by mail-m17638.qiye.163.com (Hmail) with ESMTPA id 95C5C1C0133; Tue, 7 Dec 2021 16:44:48 +0800 (CST)
From: Aijun Wang <wangaijun@tsinghua.org.cn>
To: 'Shraddha Hegde' <shraddha=40juniper.net@dmarc.ietf.org>, "'Acee Lindem (acee)'" <acee=40cisco.com@dmarc.ietf.org>, 'Antoni Przygienda' <prz@juniper.net>
Cc: lsr@ietf.org
References: <1649F25F-7CC3-4054-960E-CA5ED1B8273F@cisco.com> <CO1PR05MB83148D3C5804107698E35F97D56E9@CO1PR05MB8314.namprd05.prod.outlook.com>
In-Reply-To: <CO1PR05MB83148D3C5804107698E35F97D56E9@CO1PR05MB8314.namprd05.prod.outlook.com>
Date: Tue, 07 Dec 2021 16:44:41 +0800
Message-ID: <004801d7eb46$b0c186b0$12449410$@tsinghua.org.cn>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0049_01D7EB89.BEE6C280"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQLF61IQ/Q2TQqCP3vlhYYif3rxbSgJC0sh2qjiQqvA=
Content-Language: zh-cn
X-HM-Spam-Status: e1kfGhgUHx5ZQUtXWQgPGg8OCBgUHx5ZQUlOS1dZCBgUCR5ZQVlLVUtZV1 kWDxoPAgseWUFZKDYvK1lXWShZQUpMS0tKN1dZLVlBSVdZDwkaFQgSH1lBWUIeTBlWSx1MSRpPTk lOS00eVRMBExYaEhckFA4PWVdZFhoPEhUdFFlBWVVLWQY+
X-HM-Sender-Digest: e1kMHhlZQR0aFwgeV1kSHx4VD1lBWUc6OBg6SQw5CT5JLk9JLh0UExM4 PioaCiFVSlVKTUhDQ01NTUNCSU9IVTMWGhIXVQwaFRwaEhEOFTsPCBIVHBMOGlUUCRxVGBVFWVdZ EgtZQVlJSkJVSk9JVU1CVUxOWVdZCAFZQU9KSEhLNwY+
X-HM-Tid: 0a7d94111aefd993kuws95c5c1c0133
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/qEj-cVahkcAM8wCaf6QWycZ57Ls>
Subject: Re: [Lsr] WG Last Call for "IS-IS Flood Reflection" -draft-ietf-lsr-isis-flood-reflection-06
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Dec 2021 08:44:57 -0000

Hi, Shraddha:

 

For large L2 networks, the solution
https://datatracker.ietf.org/doc/html/draft-ietf-lsr-isis-ttz is more
suitable.

For CLOS topology that is used to connect disjoint L2 area, as that
described in
https://datatracker.ietf.org/doc/html/draft-ietf-lsr-isis-area-proxy-01, the
area proxy solution is more straightforward. 

Is there any other scenario that the flood reflection solution be applied?

 

Best Regards

 

Aijun Wang

China Telecom

 

From: lsr-bounces@ietf.org <lsr-bounces@ietf.org> On Behalf Of Shraddha
Hegde
Sent: Tuesday, December 7, 2021 2:24 PM
To: Acee Lindem (acee) <acee=40cisco.com@dmarc.ietf.org>; Antoni Przygienda
<prz@juniper.net>
Cc: lsr@ietf.org
Subject: Re: [Lsr] WG Last Call for "IS-IS Flood Reflection"
-draft-ietf-lsr-isis-flood-reflection-06

 

This is a very useful feature for large L2 networks and I support the
publication of this

document.

 

 

I have below nits/suggestions on the document.

 

 

1. Figure 1: Example Topology of L1 with L2 Borders

The diagram is not legible. The connections between L1 routers 

can be removed from the diagram and a description can be added that

R1 layer routers are all connected to R2 layer and so on.

>From the diagram it appears that there is connectivity between R10 and R11

and R11 and R12. If so that link can flood L2 domains and L2 is not

fully disjoint. I would suggest to remove the R10->R11 link to show a pure
clos topology

in L1.

 

2.

4.1 Flood reflection TLV

"On a given router, the same value

      of the Flood Reflection Cluster ID MUST be advertised across all

      interfaces advertising the Flood Reflection TLV in IIHs. "

                

Do we really need this restriction of one single cluster-id on a router?

I am imagining, this cluster-id mechanism can be used to segregate a single
fabric

into two or more clusters if the fabric size becomes too huge. 

The usecase itself is described out of scope for this document elsewhere

which is fine but too restrictive statements like above would discourage
further

enhancements so may be worth considering these restrictions to be removed.

 

3.

4.2.  Flood Reflection Discovery Sub-TLV

" A router receiving multiple Flood Reflection

   Discovery sub-TLVs in TLV 242 MUST use the values in the first sub-

   TLV"

   

   first sub-TLV is not deterministic as multiple TLV 242 can come is
different fragments.

   Suggest to change as below.

   " A router receiving multiple Flood Reflection

   Discovery sub-TLVs in TLV 242 MUST use the values in the first sub-

   TLV of the lowest numbered fragment"

   

   4.

   "flood reflection tunnel endpoint" and "L1 shortcut"

   terminology should be added to the glossary. These terms are used in sec
4.3

   and reader may not get the context of these terms.

   

   

   

   5. section 4.3

   

   do we need the F bit? Looks like this info can be derived from the

   C bit in Flood Reflection Discovery Sub-TLV. The ones with C bit set are
possible shortcut endpoints.

   The ones with C bit cleared are the flood reflector tunnel endpoints.

   

   

   6. The tunnel encapsulation attribute has use outside of flood reflector

   (such as RFC 8663). I am more in favor of getting rid of the F bit from
this sub-TLV

   as to avoid the confusions that may arise when it is used in the absence
of flood reflectors.

   

   7.

   " A flood reflector receiving multiple Flood Reflection Discovery

   Tunnel Type sub-sub-TLVs in Flood Reflection Discovery sub-TLV with F

   flag set SHOULD use one or more of the specified tunnel endpoints to

   automatically establish one or more tunnels that will serve as flood

   reflection adjacency(-ies)."

   

   A flood reflector should establish tunnels with clients only and not with

   other flood reflectors. also the cluster id needs to match.

   This text as well as next para needs revision.

   

   8. sec 4.4

   

   "The Flood Reflection Adjacency sub-TLV SHOULD NOT appear more than

   once in a given TLV.  A router receiving multiple Flood Reflection

   Adjacency sub-TLVs in a TLV MUST use the values in the first sub-TLV

   and it SHOULD adequately log such violations subject to rate

   limiting."

   

   IMO should talk abt possibility of same TLV 22 in multiple fragments and 

   MUST use first sub-TLV from lowest numbered fragment.

   

   9.

   

   "If the clients have a

   direct L2 adjacency they SHOULD use it instead of instantiating a new

   tunnel."

   

   above statement seems to contradict statement below in sec 4.5

   " A router acting as a flood reflector MUST NOT have any traditional L2

   adjacencies. "

 

 

 

 

Juniper Business Use Only

From: Lsr <lsr-bounces@ietf.org <mailto:lsr-bounces@ietf.org> > On Behalf Of
Acee Lindem (acee)
Sent: Friday, December 3, 2021 9:22 PM
To: Antoni Przygienda <prz@juniper.net <mailto:prz@juniper.net> >
Cc: lsr@ietf.org <mailto:lsr@ietf.org> 
Subject: [Lsr] WG Last Call for "IS-IS Flood Reflection"
-draft-ietf-lsr-isis-flood-reflection-06

 

[External Email. Be cautious of content]

 

Speaking as WG member:

 

I have already supported publication. I have a couple comments:

 

1.       Can you add "leave" to the glossary in section 2? 

2.       Section 5.2 is a bit hard to read. I have some suggested changes in
my

editorial comments but it would be good to expand the cases into smaller

chunks and make state the overall goals ahead rather than after the details.

          Your call though.

3.       In section 7, would an IS-IS router really set the overload-bit in
L1 but not L2? 

 

 

I've also attached some suggested editorial changes. Some of these are very
subjective

and I won't feel bad if you don't include them all. 

 

Thanks,

Acee