Re: [mpls-tp] BFD sessions wrt protection types
John E Drake <jdrake@juniper.net> Mon, 14 June 2010 15:28 UTC
Return-Path: <jdrake@juniper.net>
X-Original-To: mpls-tp@core3.amsl.com
Delivered-To: mpls-tp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id B03233A691E for <mpls-tp@core3.amsl.com>;
Mon, 14 Jun 2010 08:28:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.37
X-Spam-Level:
X-Spam-Status: No, score=-4.37 tagged_above=-999 required=5 tests=[AWL=-0.371,
BAYES_50=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UH6V2KSLNfSB for
<mpls-tp@core3.amsl.com>; Mon, 14 Jun 2010 08:28:08 -0700 (PDT)
Received: from exprod7og106.obsmtp.com (exprod7og106.obsmtp.com [64.18.2.165])
by core3.amsl.com (Postfix) with ESMTP id CC9C33A68F8 for <mpls-tp@ietf.org>;
Mon, 14 Jun 2010 08:28:06 -0700 (PDT)
Received: from source ([66.129.224.36]) (using TLSv1) by
exprod7ob106.postini.com ([64.18.6.12]) with SMTP ID
DSNKTBZKhn9ESkAU7gD3eoxzwoOKU5tK/3ni@postini.com;
Mon, 14 Jun 2010 08:28:12 PDT
Received: from EMBX01-HQ.jnpr.net ([fe80::c821:7c81:f21f:8bc7]) by
P-EMHUB01-HQ.jnpr.net ([fe80::fc92:eb1:759:2c72%11]) with mapi;
Mon, 14 Jun 2010 08:26:18 -0700
From: John E Drake <jdrake@juniper.net>
To: Lavanya Srivatsa <lavanya.srivatsa@aricent.com>, MPLS TP <mpls-tp@ietf.org>,
David Allan I <david.i.allan@ericsson.com>
Date: Mon, 14 Jun 2010 08:26:17 -0700
Thread-Topic: BFD sessions wrt protection types
Thread-Index: AcsHyTVFfLyTNt2fR5mS6ReefWpUvQAM8AjAALVL2c4AQDSI0A==
Message-ID: <5E893DB832F57341992548CDBB33316398422731D4@EMBX01-HQ.jnpr.net>
References: <AF085525D89CCA4EB233BE7E5BF2FDAB1693EBA7AF@GUREXMB02.ASIAN.AD.ARICENT.COM>,
<60C093A41B5E45409A19D42CF7786DFD4FD772813E@EUSAACMS0703.eamcs.ericsson.se>
<AF085525D89CCA4EB233BE7E5BF2FDAB1693A75070@GUREXMB02.ASIAN.AD.ARICENT.COM>
In-Reply-To: <AF085525D89CCA4EB233BE7E5BF2FDAB1693A75070@GUREXMB02.ASIAN.AD.ARICENT.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [mpls-tp] BFD sessions wrt protection types
X-BeenThere: mpls-tp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: MPLS-TP Mailing list <mpls-tp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mpls-tp>,
<mailto:mpls-tp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls-tp>
List-Post: <mailto:mpls-tp@ietf.org>
List-Help: <mailto:mpls-tp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls-tp>,
<mailto:mpls-tp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Jun 2010 15:28:09 -0000
Hi, The latest version of cc-cv-rdi will remove all references to protection switching. In order to have a mode in which an LSP failure in one direction did not cause a failure in the other direction, it turns out that using two essentially uni-directional BFD sessions minimized the changes to BFD. As indicated in the I-D, we basically just have several clarifications to existing BFD behavior. Thanks, John > -----Original Message----- > From: mpls-tp-bounces@ietf.org [mailto:mpls-tp-bounces@ietf.org] On Behalf > Of Lavanya Srivatsa > Sent: Sunday, June 13, 2010 12:10 PM > To: MPLS TP; David Allan I > Subject: Re: [mpls-tp] BFD sessions wrt protection types > > Dave, > > Please see inline. > > - Lavanya > > ________________________________ > > From: David Allan I [david.i.allan@ericsson.com] > Sent: Wednesday, June 09, 2010 11:32 PM > To: Lavanya Srivatsa; MPLS TP > Subject: RE: BFD sessions wrt protection types > > > HI Lavanya: > > > > When the draft-ietf-mpls-tp-cc-cv-rdi states: > > "A single bi-directional BFD session is used for fate sharing operation. > Two independent BFD sessions are used for independent operation. > > .... > > The normal usage is that 1:1 protected paths must use fate sharing, and > independent operation applies to 1+1 protected paths." > > > > Does this mean that every time (and whenever it is done so) the protection > switching architecture is changed by configuration/administrator from one > to the other, the number of BFD sessions must change? Changing BFD > sessions would include tear down or new setup of sessions? > > > > As currently written the answer would be "yes". However how frequently do > you actually expect this to happen in practice. Isn't this a change that > moves at the speed of lawyers? > > > > [LS] Agreed, this is not expected to change often, maybe only once during > network setup too. But I was trying to make a different point here. I feel > that protection is one way of using the, if I may call it, "output" of an > OAM process. As an alternate, (and just for argument's sake), faults > detected by an OAM process need not necessarily result in a protection > switch. An operator (again just for argument's sake) could simply choose > to have alarms generated and to take corrective actions through manual > intervention. > > Similarly, a protection switch onto a recovery path need not be the result > of an OAM indication, but could be manually driven. > > So, on the whole, I feel the OAM and protection switch processes are > related but not dependent. Therefore imposing restrictions on the number > of BFD sessions based on the protection switching architecture, IMHO, does > not seem to be right. > > For eg: if 1:1 requires fate share, it should be of no interest to the > protection switch process, whether the OAM process chose to run 1 OAM/BFD > session or 2 OAM/BFD sessions. All the protection switch process needs is > that, irrespective of the number of sessions, the traffic of both > directions of the path fate share even during an unidirectional fault. How > the OAM process does this should not be of any concern to the protection > switch process. > > > > Since protection switching is an "application" that uses the OAM > functionality to protect traffic, why should the "underlying" OAM > operation be disturbed just because the "application" above it undergoes a > change? > > > > I am unable to understand the dependency of the number of BFD-OAM sessions > based on the protection switching architectures/types. > > > > In a perfect world specifying a greenfield technology you'd get that > decoupling. My take is that BFD cares about whether somthing is up or down > in order to conserve nodal resources. When something is broken, the node > has better things to do than expend compute cycles originiating large > numbers of messages that simply black hole. That is when the nodal > resources are better spent being available for management or CP activity, > and restoration will happen faster in some implementations as a > consequence of dialing back superfluous BFD message generation. > > > > I hope this helps > > D > >
- [mpls-tp] BFD sessions wrt protection types Lavanya Srivatsa
- Re: [mpls-tp] BFD sessions wrt protection types David Allan I
- Re: [mpls-tp] BFD sessions wrt protection types Maarten Vissers
- Re: [mpls-tp] BFD sessions wrt protection types Lavanya Srivatsa
- Re: [mpls-tp] BFD sessions wrt protection types John E Drake
- Re: [mpls-tp] BFD sessions wrt protection types John E Drake