Re: [mpls] MPLS-RT review of draft-chen-mpls-p2mp-egress-protection

Yimin Shen <yshen@juniper.net> Tue, 17 December 2013 16:54 UTC

Return-Path: <yshen@juniper.net>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE66B1AE14F for <mpls@ietfa.amsl.com>; Tue, 17 Dec 2013 08:54:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6Jkm7ACkUz91 for <mpls@ietfa.amsl.com>; Tue, 17 Dec 2013 08:54:13 -0800 (PST)
Received: from va3outboundpool.messaging.microsoft.com (va3ehsobe005.messaging.microsoft.com [216.32.180.31]) by ietfa.amsl.com (Postfix) with ESMTP id 1C54A1AE02D for <mpls@ietf.org>; Tue, 17 Dec 2013 08:54:12 -0800 (PST)
Received: from mail10-va3-R.bigfish.com (10.7.14.229) by VA3EHSOBE003.bigfish.com (10.7.40.23) with Microsoft SMTP Server id 14.1.225.23; Tue, 17 Dec 2013 16:54:11 +0000
Received: from mail10-va3 (localhost [127.0.0.1]) by mail10-va3-R.bigfish.com (Postfix) with ESMTP id 3DAE21A00A0; Tue, 17 Dec 2013 16:54:11 +0000 (UTC)
X-Forefront-Antispam-Report: CIP:157.56.240.101; KIP:(null); UIP:(null); IPV:NLI; H:BL2PRD0510HT004.namprd05.prod.outlook.com; RD:none; EFVD:NLI
X-SpamScore: -21
X-BigFish: VPS-21(zz9371Ic85fhec9I4015Izz1f42h2148h208ch1ee6h1de0h1fdah2073h2146h1202h1e76h2189h1d1ah1d2ah1fc6hzz1d7338h1de098h1033IL17326ah8275bh8275dh18c673h1c8fb4h1de097h186068hz2fh109h2a8h839hd24hf0ah1288h12a5h12bdh137ah1441h1504h1537h153bh162dh1631h1758h18e1h1946h19b5h19ceh1ad9h1b0ah1bceh224fh1d07h1d0ch1d2eh1d3fh1de9h1dfeh1dffh1fe8h1ff5h20f0h2216h22d0h2336h9a9j1155h)
Received-SPF: pass (mail10-va3: domain of juniper.net designates 157.56.240.101 as permitted sender) client-ip=157.56.240.101; envelope-from=yshen@juniper.net; helo=BL2PRD0510HT004.namprd05.prod.outlook.com ; .outlook.com ;
X-Forefront-Antispam-Report-Untrusted: SFV:NSPM; SFS:(10009001)(189002)(199002)(37854004)(164054003)(377454003)(18717965001)(15202345003)(83322001)(56816005)(47736001)(49866001)(76796001)(76786001)(83072002)(76576001)(4396001)(50986001)(74316001)(47976001)(19580405001)(90146001)(19580395003)(74502001)(74662001)(31966008)(81686001)(74366001)(85852003)(16236675002)(47446002)(81816001)(69226001)(74876001)(74706001)(19300405004)(80976001)(33646001)(19609705001)(15975445006)(54356001)(53806001)(76482001)(46102001)(51856001)(85306002)(2656002)(87936001)(81342001)(56776001)(80022001)(65816001)(63696002)(66066001)(81542001)(87266001)(59766001)(79102001)(77982001)(54316002)(24736002); DIR:OUT; SFP:1101; SCL:1; SRVR:BY2PR05MB711; H:BY2PR05MB728.namprd05.prod.outlook.com; CLIP:66.129.241.17; FPR:; RD:InfoNoRecords; MX:1; A:1; LANG:en;
Received: from mail10-va3 (localhost.localdomain [127.0.0.1]) by mail10-va3 (MessageSwitch) id 1387299249249311_13789; Tue, 17 Dec 2013 16:54:09 +0000 (UTC)
Received: from VA3EHSMHS016.bigfish.com (unknown [10.7.14.226]) by mail10-va3.bigfish.com (Postfix) with ESMTP id 2DC333800F2; Tue, 17 Dec 2013 16:54:09 +0000 (UTC)
Received: from BL2PRD0510HT004.namprd05.prod.outlook.com (157.56.240.101) by VA3EHSMHS016.bigfish.com (10.7.99.26) with Microsoft SMTP Server (TLS) id 14.16.227.3; Tue, 17 Dec 2013 16:54:09 +0000
Received: from BY2PR05MB711.namprd05.prod.outlook.com (10.141.222.149) by BL2PRD0510HT004.namprd05.prod.outlook.com (10.255.100.39) with Microsoft SMTP Server (TLS) id 14.16.383.1; Tue, 17 Dec 2013 16:54:08 +0000
Received: from BY2PR05MB728.namprd05.prod.outlook.com (10.141.223.25) by BY2PR05MB711.namprd05.prod.outlook.com (10.141.222.149) with Microsoft SMTP Server (TLS) id 15.0.837.10; Tue, 17 Dec 2013 16:54:07 +0000
Received: from BY2PR05MB728.namprd05.prod.outlook.com ([10.141.223.25]) by BY2PR05MB728.namprd05.prod.outlook.com ([10.141.223.25]) with mapi id 15.00.0837.004; Tue, 17 Dec 2013 16:54:06 +0000
From: Yimin Shen <yshen@juniper.net>
To: Huaimo Chen <huaimo.chen@huawei.com>, "mpls@ietf.org" <mpls@ietf.org>
Thread-Topic: MPLS-RT review of draft-chen-mpls-p2mp-egress-protection
Thread-Index: AQHO9zz2D8OUboE/BU63IW10jjHvHppYmeWw
Date: Tue, 17 Dec 2013 16:54:05 +0000
Message-ID: <3e2e8b8ddcb54bfc9f1de747bc51efa1@BY2PR05MB728.namprd05.prod.outlook.com>
References: <CAH==cJxdfio1r_v67YDURKOMM=PUufiUW0Sb6Vp_=La8hNzP8w@mail.gmail.com> <5316A0AB3C851246A7CA5758973207D4451E05FA@dfweml509-mbx.china.huawei.com> <CAH==cJwFX=z8Gt2_OdsHpXH7H6334c8L0DAsGz9OUExYTvZTdg@mail.gmail.com> <5316A0AB3C851246A7CA5758973207D4451E102D@dfweml509-mbx.china.huawei.com> <CAH==cJzv1boeOVq6=k_xHSKjkm966eum87QKK1n87Lpjd6LDAA@mail.gmail.com> <5316A0AB3C851246A7CA5758973207D445C1F60D@sjceml501-mbs.china.huawei.com>
In-Reply-To: <5316A0AB3C851246A7CA5758973207D445C1F60D@sjceml501-mbs.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [66.129.241.17]
x-forefront-prvs: 006339698F
Content-Type: multipart/alternative; boundary="_000_3e2e8b8ddcb54bfc9f1de747bc51efa1BY2PR05MB728namprd05pro_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
Cc: Raveendra Torvi <rtorvi@juniper.net>
Subject: Re: [mpls] MPLS-RT review of draft-chen-mpls-p2mp-egress-protection
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Dec 2013 16:54:17 -0000

Hi Huaimo,

In the traditional RSVP FRR (RFC 4090), an ingress router requests link protection, node protection and/or bandwidth protection by setting some flags in the Path message, and it's the decision of a transit router whether to actually set up FRR, based on its capability, local policy and local topology.

In this draft, the model seems completely ingress-driven. The ingress not only requests FRR, but also pushes an explicit bypass route to the PLR to force to set it up. So I have a doubt whether this is always desirable and possible? IMO, we may not assume that the ingress router can always  have the visibility of the topology of entire network (including the location of protected node, PLR and protector) and the knowledge of local policies of each PLR. For example, there are cases where a P2MP LSP needs to traverse multiple domains, some kind of topology abstraction/hiding is required between domains, and loose hop expansion has to be performed at domain boundaries.

Thanks,

/Yimin


From: mpls [mailto:mpls-bounces@ietf.org] On Behalf Of Huaimo Chen
Sent: Thursday, December 12, 2013 8:21 AM
To: mpls@ietf.org
Cc: Raveendra Torvi
Subject: Re: [mpls] MPLS-RT review of draft-chen-mpls-p2mp-egress-protection

draft-chen-mpls-p2mp-egress-protection was reviewed by the MPLS Review team prior to being polled for WG adoption. The authors have updated the draft according to the comments. We have had responses from some of the reviewers that they are comfortable with how the comments have been addressed. We would like to have the same response from the other two reviewers.

Best Regards,
Huaimo