Re: [mpls] [sfc] Progress with draft-farrel-mpls-sfc

<mohamed.boucadair@orange.com> Mon, 19 March 2018 13:21 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB6131242F5; Mon, 19 Mar 2018 06:21:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.628
X-Spam-Level:
X-Spam-Status: No, score=-2.628 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HrPcXSo2wR-4; Mon, 19 Mar 2018 06:21:47 -0700 (PDT)
Received: from orange.com (mta239.mail.business.static.orange.com [80.12.66.39]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6292B12704A; Mon, 19 Mar 2018 06:21:47 -0700 (PDT)
Received: from opfedar06.francetelecom.fr (unknown [xx.xx.xx.8]) by opfedar26.francetelecom.fr (ESMTP service) with ESMTP id 16D0B1C0735; Mon, 19 Mar 2018 14:21:46 +0100 (CET)
Received: from Exchangemail-eme3.itn.ftgroup (unknown [xx.xx.50.53]) by opfedar06.francetelecom.fr (ESMTP service) with ESMTP id C330C80066; Mon, 19 Mar 2018 14:21:45 +0100 (CET)
Received: from OPEXCNORMAD.corporate.adroot.infra.ftgroup ([fe80::f1a0:3c6b:bc7b:3aaf]) by OPEXCNORM61.corporate.adroot.infra.ftgroup ([fe80::89e:f34e:3a8e:4519%21]) with mapi id 14.03.0382.000; Mon, 19 Mar 2018 14:21:45 +0100
From: mohamed.boucadair@orange.com
To: "UTTARO, JAMES" <ju1738@att.com>, "Henderickx, Wim (Nokia - BE/Antwerp)" <wim.henderickx@nokia.com>, Robert Raszuk <robert@raszuk.net>, Adrian Farrel <adrian@olddog.co.uk>
CC: mpls <mpls@ietf.org>, SPRING WG List <spring@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, "bess@ietf.org" <bess@ietf.org>
Thread-Topic: [sfc] [mpls] Progress with draft-farrel-mpls-sfc
Thread-Index: AQHTvdwBcqREQthFDE6UszN0/AHMcKPU9xWAgAAHlYCAAN1DgIABu0iA///nz9CAAAw5sA==
Date: Mon, 19 Mar 2018 13:21:44 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B93302DEE304D@OPEXCNORMAD.corporate.adroot.infra.ftgroup>
References: <019501d3bd6b$657d7ef0$30787cd0$@olddog.co.uk> <BB36A9A4-284C-4B36-BDE0-6B919273AB02@nokia.com> <00a001d3be17$e0ec3ca0$a2c4b5e0$@olddog.co.uk> <CA+b+ERmMKfuEaHgH4ZD3mq6A8YRuxKVxhmTtDQEFHU9zE4pwRQ@mail.gmail.com> <90F4F09A-4E4D-41B0-8B91-09AF2EDFC1A5@nokia.com> <787AE7BB302AE849A7480A190F8B93302DEE2A47@OPEXCNORMAD.corporate.adroot.infra.ftgroup> <B17A6910EEDD1F45980687268941550F36721A4D@MISOUT7MSGUSRCD.ITServices.sbc.com>
In-Reply-To: <B17A6910EEDD1F45980687268941550F36721A4D@MISOUT7MSGUSRCD.ITServices.sbc.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.168.234.4]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B93302DEE304DOPEXCNORMADcorp_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/mpls/AGk0SmC8S1jC61X6df_Crdoqdgw>
Subject: Re: [mpls] [sfc] Progress with draft-farrel-mpls-sfc
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Mar 2018 13:21:51 -0000

Hi Jim,

Perhaps I missed your point, but I’m not asking to disallow whatever transport encapsulation scheme deployed in a network for SFC purposes.

What I’m saying is:
* the IETF has defined a generic SFC architecture and went with a transport-agnostic approach that can be deployed in conjunction with one’s favorite transport encapsulation protocol.
* Having a transport-agnostic approach get us away from redundant solutions to solve the same problem, redundant codes, etc.
* If we allow to mimic NSH in MPLS, there is no reason to do this for MPLS only.
* Instead of mimic NSH, I would personally favor re-using NSH.

Cheers,
Med

De : UTTARO, JAMES [mailto:ju1738@att.com]
Envoyé : lundi 19 mars 2018 12:33
À : BOUCADAIR Mohamed IMT/OLN; Henderickx, Wim (Nokia - BE/Antwerp); Robert Raszuk; Adrian Farrel
Cc : mpls; SPRING WG List; sfc@ietf.org; bess@ietf.org
Objet : RE: [sfc] [mpls] Progress with draft-farrel-mpls-sfc

Where I get a little lost in this discussion is assuming that there must be one encap for SFC chains.. IMO SFC should define encap agnostic behaviors, NSH is an encap that has tons of functionality but if a simple chain is needed why is it that an existing encap should be disallowed by the IETF?? I want to simplify the network, when I say network it is all of the plumbing to realize a service for a customer including, WAN, MAN, DC etc.… From an OpS POV having a single encap across an integrated solution is quite attractive.

Thanks,
                Jim Uttaro

From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>
Sent: Monday, March 19, 2018 5:52 AM
To: Henderickx, Wim (Nokia - BE/Antwerp) <wim.henderickx@nokia.com<mailto:wim.henderickx@nokia.com>>; Robert Raszuk <robert@raszuk.net<mailto:robert@raszuk.net>>; Adrian Farrel <adrian@olddog.co.uk<mailto:adrian@olddog.co.uk>>
Cc: mpls <mpls@ietf.org<mailto:mpls@ietf.org>>; SPRING WG List <spring@ietf.org<mailto:spring@ietf.org>>; sfc@ietf.org<mailto:sfc@ietf.org>; bess@ietf.org<mailto:bess@ietf.org>
Subject: Re: [sfc] [mpls] Progress with draft-farrel-mpls-sfc

Hi all,

Wim has a point here.


For all these proposals, a new behavior is needed to be followed by SFC-aware nodes. What differs is the channel used to signal a chain and to supply additional data for SFC purposes.



Leveraging on existing code/capabilities is good for a vendor/implementer, but the risk is that a given solution will need to support all/many of these flavors. Which is not optimal.



The IETF has already a consensus on a transport-agnostic solution. If we open the door for MPLS, we need to open it also for IPv6 EH and so on. Are we OK to go that way? If yes, what is the NEW problem are we trying to solve?



Cheers,

Med

De : sfc [mailto:sfc-bounces@ietf.org] De la part de Henderickx, Wim (Nokia - BE/Antwerp)
Envoyé : dimanche 18 mars 2018 07:26
À : Robert Raszuk; Adrian Farrel
Cc : mpls; SPRING WG List; bess@ietf.org<mailto:bess@ietf.org>; sfc@ietf.org<mailto:sfc@ietf.org>
Objet : Re: [sfc] [mpls] Progress with draft-farrel-mpls-sfc

Indeed, this is exactly my point. If you want an interim solution you want to use what we have and draft-ietf-bess-service-chaining-04 is an example of how you can use the existing data-plane for service chaining. draft-farrel-mpls-sfc requires an implementation change in the data-plane, whether we like it or not and an upgrade is required even in brownfield deployments. So, you better go directly to the final solution defined in IETF SFC WG. If we standardize draft-farrel-mpls-sfc we end up supporting both forever.

From: <rraszuk@gmail.com<mailto:rraszuk@gmail.com>> on behalf of Robert Raszuk <robert@raszuk.net<mailto:robert@raszuk.net>>
Date: Saturday, 17 March 2018 at 19:13
To: Adrian Farrel <adrian@olddog.co.uk<mailto:adrian@olddog.co.uk>>
Cc: "Henderickx, Wim (Nokia - BE/Antwerp)" <wim.henderickx@nokia.com<mailto:wim.henderickx@nokia.com>>, mpls <mpls@ietf.org<mailto:mpls@ietf.org>>, SPRING WG List <spring@ietf.org<mailto:spring@ietf.org>>, "sfc@ietf.org<mailto:sfc@ietf.org>" <sfc@ietf.org<mailto:sfc@ietf.org>>, "bess@ietf.org<mailto:bess@ietf.org>" <bess@ietf.org<mailto:bess@ietf.org>>
Subject: Re: [sfc] [mpls] Progress with draft-farrel-mpls-sfc

Hi Adrian,

> That proxy may be a bump in the wire between the SFF and SF

I am not so sure about that ... If this would be just "bump in the wire" you would have zero guarantees that all packets which need to go via given function will actually hit that bump - so this is far from a reliable network service.

There must be associated control plane component attracting traffic to such bump.

That mechanism with basic MPLS (where labels by based MPLS architecture are of local significance) is available with L3VPN extensions as already progressing in BESS (draft-ietf-bess-service-chaining-04) so why not use this for as you state "interim" ?

No one really addressed that question yet and I think it is a critical one to make any further judgement  as to the future of this individual submission.

Cheers,
R.



On Sat, Mar 17, 2018 at 6:46 PM, Adrian Farrel <adrian@olddog.co.uk<mailto:adrian@olddog.co.uk>> wrote:
Hi Wim,

Thanks for reading the draft so carefully.

> Adrian, on replacement of NSH. You will have to change the SF with this proposal
> in Non proxy case so this proposal does not solve a brownfield case. Which SF(s)
> support MPLS?

This is not about "replacing" the NSH. As you'll see from point 2, below, this is about providing an interim / migration technology.

Clearly (and I think you agree) in the case where an SF is not SFC-aware, a proxy must be used. That proxy may be a bump in the wire between the SFF and SF, a module of the SFF, or a module of the SF. In the case of PNFs, only the first two options are available. In the case of a VNF, all three options exist.

Now, let us recall where we are starting from. There are PNFs and there are VNFs built to look like PNFs. These SFs do not support MPLS or NSH.

Similarly, there are routers that do not support the NSH.

Now, of course, we would all love to sell major upgrades so that every component of the network is SFC-aware. But we would also like to start deploying SFC into existing network infrastructure.

So your question misses the point. The question to ask is which brownfield routers and SFs support NSH?

Cheers,
Adrian