Re: [mpls] 答复: working group lst call on draft-ietf-mpls-targeted-mldp

Eric Rosen <erosen@cisco.com> Mon, 15 July 2013 14:29 UTC

Return-Path: <erosen@cisco.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2C2011E80E4 for <mpls@ietfa.amsl.com>; Mon, 15 Jul 2013 07:29:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.177
X-Spam-Level:
X-Spam-Status: No, score=-8.177 tagged_above=-999 required=5 tests=[AWL=-2.423, BAYES_00=-2.599, CHARSET_FARAWAY_HEADER=3.2, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_HI=-8, SARE_SUB_ENC_GB2312=1.345]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KwaL91+In943 for <mpls@ietfa.amsl.com>; Mon, 15 Jul 2013 07:29:17 -0700 (PDT)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) by ietfa.amsl.com (Postfix) with ESMTP id 2754C21F9E97 for <mpls@ietf.org>; Mon, 15 Jul 2013 07:29:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3664; q=dns/txt; s=iport; t=1373898543; x=1375108143; h=from:to:cc:subject:in-reply-to:reply-to:date:message-id; bh=d0oiqvDMpNhITf+x41PMuy8VThiEZVwr9NGMZbAl8Ok=; b=cYvqtLkmEm8v8DJKwsYyoI62CKz2Tr+lXPJlF8hU2gxq2KMFCJ5jcLfw z9s+CaCAkYfo41fv7nPwEBeEVJU1eRhOe/dQY/30ZbSpGIAy1Z+n4qFBa HmzSMWbJkwy5AtqLbLZIUs3Wl4s9p9750IEdmjKNlaxtJY1AANMJufwlL A=;
X-IronPort-AV: E=Sophos;i="4.89,669,1367971200"; d="scan'208";a="234956647"
Received: from rcdn-core2-2.cisco.com ([173.37.113.189]) by rcdn-iport-8.cisco.com with ESMTP; 15 Jul 2013 14:28:53 +0000
Received: from erosen-linux.cisco.com (erosen-linux.cisco.com [161.44.70.34]) by rcdn-core2-2.cisco.com (8.14.5/8.14.5) with ESMTP id r6FESqWS005288 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 15 Jul 2013 14:28:52 GMT
Received: from erosen-linux (localhost.localdomain [127.0.0.1]) by erosen-linux.cisco.com (8.13.8/8.13.8) with ESMTP id r6FESo82003619; Mon, 15 Jul 2013 10:28:51 -0400
From: Eric Rosen <erosen@cisco.com>
To: Lizhenbin <lizhenbin@huawei.com>
In-reply-to: Your message of Wed, 03 Jul 2013 07:13:52 -0000. <5A5B4DE12C0DAC44AF501CD9A2B01A8D08187790@nkgeml506-mbx.china.huawei.com>
Date: Mon, 15 Jul 2013 10:28:50 -0400
Message-ID: <3618.1373898530@erosen-linux>
Cc: "mpls@ietf.org" <mpls@ietf.org>
Subject: Re: [mpls] 答复: working group lst call on draft-ietf-mpls-targeted-mldp
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: erosen@cisco.com
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Jul 2013 14:29:22 -0000

Thanks for your comments.

> We think the targeted mldp scenario is necessary. After review, follow
> comments are proposed:

> 1. Since using unicast or multicast tunnel is decided by downstream node,
> unicast and others choose multicast, then what is U's choice? Maybe it can
> treat the multicast tunnel as one branch with other unicast tunnel or can
> use one new capability to negotiate this before MP-LSP setting up.

Actually, we presupposed that the tunneling technique would be predetermined
by the Service Provider, and that the provisioning process would ensure that
all nodes know in advance what kind of tunneling is to be used.  I see now
that this presupposition is not clearly stated in the draft; I'll add some
text to make it clear.

It is conceivable that one might want to choose the tunneling type based on
some characteristic of the data flow.  E.g., perhaps one would want to use
unicast tunneling for flows of low bandwidth (or low fanout), but use an
RSVP-TE P2MP tunnel for other flows.  However, that choice would need to be
made by the upstream node.

I don't think we need to support that scenario in this draft, but if any
Service Provider shows interest in that scenario, additional procedures could
be devised and a followup draft written.

> 2. Maybe the procedure for the unsymmetrical network can be improved. For
> example, the next hop interface from D to the root is a physical interface
> but from U to D is an RSVP-TE tunnel , so D send one label mapping but
> maybe U is waiting for one upstream label request.

Section 1.3.1 describes two ways of determining the upstream LSR, and allows
for other methods.  (Section 1.4 seems to disallow other methods; that's a
mistake.) The intention is to specify two possible methods, but not to rule
out other methods that might make sense in a particular Service Provider's
environment.

We do presume that the method of determining the upstream LSR is known a
priori, rather than determined dynamically.  It is true that we have not
specified a method that applies to the sort of asymmetric network you
describe.

I'll add some text to make it clear that while alternative methods of
determining the LSR may be needed in some environments, specification of
those alternative methods is outside the scope of the current document.

> 3. In section 3(Targeted mLDP with Multicast Tunneling), if U choose using
> different multicast tunnel for different MP-LSPs, maybe it can try other
> methods to avoid upstream label allocation. For example, using one
> 'Recursive Opaque TLV' in RFC6512, we can redirect the root to the U, and
> trigger one multicast tunnel setup between U and D. Even we can avoid
> tunneling since node D knows the in-label should map to which MP-LSP.

If you want mLDP-created P2MP LSPs in the core, and don't want to aggregate,
then the use of Targeted mLDP is not the best solution.

> 4. The unicast tunneling method is still unsatisfactory since it may cause
> traffic congestion if some of the unicast tunnels shares one link and this
> is a very possible case under current backbone network deployment.

Certainly multicast tunneling provides a more optimal use of bandwidth than
unicast tunneling.  However, some Service Providers regard the sub-optimal
use of bandwidth as a good trade-off for the elimination of multicast state
and control plane load in the "intermediate nodes" along the path of the
unicast tunnel.  This draft provides procedures for both tunneling
techniques, but intentionally does not make any judgments about which
technique is better in which circumstances.