Re: [mpls-tp] BFD sessions wrt protection types

John E Drake <jdrake@juniper.net> Mon, 14 June 2010 15:28 UTC

Return-Path: <jdrake@juniper.net>
X-Original-To: mpls-tp@core3.amsl.com
Delivered-To: mpls-tp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B03233A691E for <mpls-tp@core3.amsl.com>; Mon, 14 Jun 2010 08:28:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.37
X-Spam-Level:
X-Spam-Status: No, score=-4.37 tagged_above=-999 required=5 tests=[AWL=-0.371, BAYES_50=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UH6V2KSLNfSB for <mpls-tp@core3.amsl.com>; Mon, 14 Jun 2010 08:28:08 -0700 (PDT)
Received: from exprod7og106.obsmtp.com (exprod7og106.obsmtp.com [64.18.2.165]) by core3.amsl.com (Postfix) with ESMTP id CC9C33A68F8 for <mpls-tp@ietf.org>; Mon, 14 Jun 2010 08:28:06 -0700 (PDT)
Received: from source ([66.129.224.36]) (using TLSv1) by exprod7ob106.postini.com ([64.18.6.12]) with SMTP ID DSNKTBZKhn9ESkAU7gD3eoxzwoOKU5tK/3ni@postini.com; Mon, 14 Jun 2010 08:28:12 PDT
Received: from EMBX01-HQ.jnpr.net ([fe80::c821:7c81:f21f:8bc7]) by P-EMHUB01-HQ.jnpr.net ([fe80::fc92:eb1:759:2c72%11]) with mapi; Mon, 14 Jun 2010 08:26:18 -0700
From: John E Drake <jdrake@juniper.net>
To: Lavanya Srivatsa <lavanya.srivatsa@aricent.com>, MPLS TP <mpls-tp@ietf.org>, David Allan I <david.i.allan@ericsson.com>
Date: Mon, 14 Jun 2010 08:26:17 -0700
Thread-Topic: BFD sessions wrt protection types
Thread-Index: AcsHyTVFfLyTNt2fR5mS6ReefWpUvQAM8AjAALVL2c4AQDSI0A==
Message-ID: <5E893DB832F57341992548CDBB33316398422731D4@EMBX01-HQ.jnpr.net>
References: <AF085525D89CCA4EB233BE7E5BF2FDAB1693EBA7AF@GUREXMB02.ASIAN.AD.ARICENT.COM>, <60C093A41B5E45409A19D42CF7786DFD4FD772813E@EUSAACMS0703.eamcs.ericsson.se> <AF085525D89CCA4EB233BE7E5BF2FDAB1693A75070@GUREXMB02.ASIAN.AD.ARICENT.COM>
In-Reply-To: <AF085525D89CCA4EB233BE7E5BF2FDAB1693A75070@GUREXMB02.ASIAN.AD.ARICENT.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [mpls-tp] BFD sessions wrt protection types
X-BeenThere: mpls-tp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: MPLS-TP Mailing list <mpls-tp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mpls-tp>, <mailto:mpls-tp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls-tp>
List-Post: <mailto:mpls-tp@ietf.org>
List-Help: <mailto:mpls-tp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls-tp>, <mailto:mpls-tp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Jun 2010 15:28:09 -0000

Hi,

The latest version of cc-cv-rdi will remove all references to protection switching.

In order to have a mode in which an LSP failure in one direction did not cause a failure in the other direction, it turns out that using two essentially uni-directional BFD sessions minimized the changes to BFD.  As indicated in the I-D, we basically just have several clarifications to existing BFD behavior. 

Thanks,

John  

> -----Original Message-----
> From: mpls-tp-bounces@ietf.org [mailto:mpls-tp-bounces@ietf.org] On Behalf
> Of Lavanya Srivatsa
> Sent: Sunday, June 13, 2010 12:10 PM
> To: MPLS TP; David Allan I
> Subject: Re: [mpls-tp] BFD sessions wrt protection types
> 
> Dave,
> 
> Please see inline.
> 
> - Lavanya
> 
> ________________________________
> 
> From: David Allan I [david.i.allan@ericsson.com]
> Sent: Wednesday, June 09, 2010 11:32 PM
> To: Lavanya Srivatsa; MPLS TP
> Subject: RE: BFD sessions wrt protection types
> 
> 
> HI Lavanya:
> 
> 
> 
> When the draft-ietf-mpls-tp-cc-cv-rdi states:
> 
> "A single bi-directional BFD session is used for fate sharing operation.
> Two independent BFD sessions are used for independent operation.
> 
> ....
> 
> The normal usage is that 1:1 protected paths must use fate sharing, and
> independent operation applies to 1+1 protected paths."
> 
> 
> 
> Does this mean that every time (and whenever it is done so) the protection
> switching architecture is changed by configuration/administrator from one
> to the other, the number of BFD sessions must change? Changing BFD
> sessions would include tear down or new setup of sessions?
> 
> 
> 
> As currently written the answer would be "yes". However how frequently do
> you actually expect this to happen in practice. Isn't this a change that
> moves at the speed of lawyers?
> 
> 
> 
> [LS] Agreed, this is not expected to change often, maybe only once during
> network setup too. But I was trying to make a different point here. I feel
> that protection is one way of using the, if I may call it, "output" of an
> OAM process. As an alternate, (and just for argument's sake), faults
> detected by an OAM process need not necessarily result in a protection
> switch. An operator (again just for argument's sake) could simply choose
> to have alarms generated and to take corrective actions through manual
> intervention.
> 
> Similarly, a protection switch onto a recovery path need not be the result
> of an OAM indication, but could be manually driven.
> 
> So, on the whole, I feel the OAM and protection switch processes are
> related but not dependent. Therefore imposing restrictions on the number
> of BFD sessions based on the protection switching architecture, IMHO, does
> not seem to be right.
> 
> For eg: if 1:1 requires fate share, it should be of no interest to the
> protection switch process, whether the OAM process chose to run 1 OAM/BFD
> session or 2 OAM/BFD sessions. All the protection switch process needs is
> that, irrespective of the number of sessions, the traffic of both
> directions of the path fate share even during an unidirectional fault. How
> the OAM process does this should not be of any concern to the protection
> switch process.
> 
> 
> 
> Since protection switching is an "application" that uses the OAM
> functionality to protect traffic, why should the "underlying" OAM
> operation be disturbed just because the "application" above it undergoes a
> change?
> 
> 
> 
> I am unable to understand the dependency of the number of BFD-OAM sessions
> based on the protection switching architectures/types.
> 
> 
> 
> In a perfect world specifying a greenfield technology you'd get that
> decoupling. My take is that BFD cares about whether somthing is up or down
> in order to conserve nodal resources. When something is broken, the node
> has better things to do than expend compute cycles originiating large
> numbers of messages that simply black hole. That is when the nodal
> resources are better spent being available for management or CP activity,
> and restoration will happen faster in some implementations as a
> consequence of dialing back superfluous BFD message generation.
> 
> 
> 
> I hope this helps
> 
> D
> 
>