Re: [mpls-tp] BFD sessions wrt protection types

Maarten Vissers <maarten.vissers@huawei.com> Thu, 10 June 2010 08:43 UTC

Return-Path: <maarten.vissers@huawei.com>
X-Original-To: mpls-tp@core3.amsl.com
Delivered-To: mpls-tp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4F1073A6928 for <mpls-tp@core3.amsl.com>; Thu, 10 Jun 2010 01:43:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.001
X-Spam-Level:
X-Spam-Status: No, score=0.001 tagged_above=-999 required=5 tests=[BAYES_50=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g1erzkAq-9e2 for <mpls-tp@core3.amsl.com>; Thu, 10 Jun 2010 01:43:17 -0700 (PDT)
Received: from szxga04-in.huawei.com (szxga04-in.huawei.com [119.145.14.67]) by core3.amsl.com (Postfix) with ESMTP id 35EA43A6950 for <mpls-tp@ietf.org>; Thu, 10 Jun 2010 01:43:14 -0700 (PDT)
Received: from huawei.com (szxga04-in [172.24.2.12]) by szxga04-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0L3S00K8FITKF2@szxga04-in.huawei.com> for mpls-tp@ietf.org; Thu, 10 Jun 2010 16:41:44 +0800 (CST)
Received: from huawei.com ([172.24.2.119]) by szxga04-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0L3S00MRGITJ94@szxga04-in.huawei.com> for mpls-tp@ietf.org; Thu, 10 Jun 2010 16:41:44 +0800 (CST)
Received: from M00900002 ([156.106.219.113]) by szxml02-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTPA id <0L3S00I8TITEFX@szxml02-in.huawei.com>; Thu, 10 Jun 2010 16:41:43 +0800 (CST)
Date: Thu, 10 Jun 2010 10:41:50 +0200
From: Maarten Vissers <maarten.vissers@huawei.com>
In-reply-to: <60C093A41B5E45409A19D42CF7786DFD4FD772813E@EUSAACMS0703.eamcs.ericsson.se>
To: 'David Allan I' <david.i.allan@ericsson.com>, 'Lavanya Srivatsa' <lavanya.srivatsa@aricent.com>, 'MPLS TP' <mpls-tp@ietf.org>
Message-id: <CA08D0CCA37149C2B436CFCA4C5BD212@china.huawei.com>
MIME-version: 1.0
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.5931
X-Mailer: Microsoft Office Outlook 11
Content-type: text/plain; charset=us-ascii
Content-transfer-encoding: 7BIT
Thread-index: AcsHyTVFfLyTNt2fR5mS6ReefWpUvQAM8AjAAB2FDYA=
References: <AF085525D89CCA4EB233BE7E5BF2FDAB1693EBA7AF@GUREXMB02.ASIAN.AD.ARICENT.COM> <60C093A41B5E45409A19D42CF7786DFD4FD772813E@EUSAACMS0703.eamcs.ericsson.se>
Subject: Re: [mpls-tp] BFD sessions wrt protection types
X-BeenThere: mpls-tp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: MPLS-TP Mailing list <mpls-tp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mpls-tp>, <mailto:mpls-tp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls-tp>
List-Post: <mailto:mpls-tp@ietf.org>
List-Help: <mailto:mpls-tp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls-tp>, <mailto:mpls-tp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Jun 2010 08:43:19 -0000

Dave, Lavanya,
 
The 1+1 SNC/N protection architecture is the following:
 
                                            MEP Sink A
                   W                           | W
                  /---->-------MIP-MIP------->----\
--MEP-MIP----MIP-+                                 \--MIP-----MIP-MEP->
   X              \-----MIP-MIP-----MIP-MIP-->----/                Y
                   P                           | P
                                            MEP Sink B


                  MEP Sink C
                   W |                           W
                  /------------MIP-MIP-------<----\
<-MEP-MIP----MIP-/                                 +--MIP-----MIP-MEP-
   X              \-----MIP-MIP-----MIP-MIP--<----/                Y
                   P |                           P
                  MEP Sink D

In this 1+1 SNC/N architecture the MEP functions (X,Y) are located outside
the protected domain. Inside the protected domain two pairs of MEP Sink
functions (A,B and C,D) are present in which the OAM from MEP X to MEP Y and
vice versa from MEP Y to MEP X is non-intrusively monitored.

MEP X generates CC/CV, LM and RDI OAM and this OAM is terminated in MEP Y.
MEP Y generates CC/CV, LM and RDI OAM and this OAM is terminated in MEP X.

MEP Sink A and B monitor non-intrusively the CC/CV and LM OAM information
generated by MEP X.
MEP Sink C and D monitor non-intrusively the CC/CV and LM OAM information
generated by MEP Y.
Note that there is no return path from A to X, from B to X, from C to Y and
from D to Y.

MEP Sink A,B,C and D determine then the SF and SD status of the Working and
Protection connections.

MEP X and Y determine the SF and SD status and near-end and far-end
performance of the protected connection.


The 1+1 SNC/S architecture is the following:

                   W                                   W
                  /-MEP-----------MIP-MIP------->---MEP-\
--MEP-MIP----MIP-+   W1                             W2
\--MIP-----MIP-MEP->
   X              \-MEP----MIP-MIP-----MIP-MIP-->---MEP-/                Y
                   P P1                             P2 P

                   W                                   W
                  /-MEP-----------MIP-MIP-------<---MEP-\
<-MEP-MIP----MIP-/   W1                             W2   +--MIP-----MIP-MEP-
   X              \-MEP----MIP-MIP-----MIP-MIP--<---MEP-/                Y
                   P P1                             P2 P

The 1:1 SNC/S architecture is the following:

                   W                                   W
                  /-MEP-----------MIP-MIP------->---MEP-\
--MEP-MIP----MIP-/   W1                             W2
\--MIP-----MIP-MEP->
   X              \-MEP----MIP-MIP-----MIP-MIP-->---MEP-/                Y
                   P P1                             P2 P

                   W                                   W
                  /-MEP-----------MIP-MIP-------<---MEP-\
<-MEP-MIP----MIP-/   W1                             W2   \--MIP-----MIP-MEP-
   X              \-MEP----MIP-MIP-----MIP-MIP--<---MEP-/                Y
                   P P1                             P2 P

Both SNC/S protection architectures have a common model. The difference
between the two architectures is the type of protection bridge process: 1+1
SNC/S deploys a "broadcast bridge" and 1:1 SNC/S deploys a "selector
bridge".

In this 1+1/1:1 SNC/S architecture MEP functions (X,Y) are located outside
the protected domain. Inside the protected domain two pairs of MEP functions
(W1,P1 and W2,P2) are present. MEP W1 and MEP W2 monitor the Working
connection. MEP P1 and MEP P2 monitor the protection connection. 

MEP X generates CC/CV, LM and RDI OAM and this OAM is terminated in MEP Y.
MEP Y generates CC/CV, LM and RDI OAM and this OAM is terminated in MEP X.

MEP W1 generates CC/CV, LM and RDI OAM and this OAM is terminated in MEP W2.
MEP W2 generates CC/CV, LM and RDI OAM and this OAM is terminated in MEP W1.
MEP P1 generates CC/CV, LM and RDI OAM and this OAM is terminated in MEP P2.
MEP P2 generates CC/CV, LM and RDI OAM and this OAM is terminated in MEP P1.

MEP W1, W2, P1 and P2 determine the SF and SD status of the working and
protection connections.

MEP X and Y determine the SF and SD status and near-end and far-end
performance of the protected connection.


Comparing the three SNC protection architectures one can observe that
- 1+1 and 1:1 SNC/S protection architectures are identical and have the same
type of OAM
- 1+1 SNC/N protection architecture and the 1+1/1:1 SNC/S protection
architectures are different. The OAM generated by the MEP X and Y in both
architectures is the same.

Regards,
Maarten
________________________________

From: mpls-tp-bounces@ietf.org [mailto:mpls-tp-bounces@ietf.org] On Behalf
Of David Allan I
Sent: woensdag 9 juni 2010 20:02
To: Lavanya Srivatsa; MPLS TP
Subject: Re: [mpls-tp] BFD sessions wrt protection types


HI Lavanya:

 

When the draft-ietf-mpls-tp-cc-cv-rdi states:

"A single bi-directional BFD session is used for fate sharing operation. Two
independent BFD sessions are used for independent operation.

..

The normal usage is that 1:1 protected paths must use fate sharing, and
independent operation applies to 1+1 protected paths."

 

Does this mean that every time (and whenever it is done so) the protection
switching architecture is changed by configuration/administrator from one to
the other, the number of BFD sessions must change? Changing BFD sessions
would include tear down or new setup of sessions? 

 

As currently written the answer would be "yes". However how frequently do
you actually expect this to happen in practice. Isn't this a change that
moves at the speed of lawyers?

 

Since protection switching is an "application" that uses the OAM
functionality to protect traffic, why should the "underlying" OAM operation
be disturbed just because the "application" above it undergoes a change? 

 

I am unable to understand the dependency of the number of BFD-OAM sessions
based on the protection switching architectures/types. 

 

In a perfect world specifying a greenfield technology you'd get that
decoupling. My take is that BFD cares about whether somthing is up or down
in order to conserve nodal resources. When something is broken, the node has
better things to do than expend compute cycles originiating large numbers of
messages that simply black hole. That is when the nodal resources are better
spent being available for management or CP activity, and restoration will
happen faster in some implementations as a consequence of dialing back
superfluous BFD message generation.  

 

I hope this helps

D