Re: [mpls] Scalability of the "effective FRR" approach in draft-kini-mpls-ring-frr-facility-backup-00.txt

Sriganesh Kini <sriganesh.kini@ericsson.com> Tue, 27 July 2010 08:51 UTC

Return-Path: <sriganesh.kini@ericsson.com>
X-Original-To: mpls@core3.amsl.com
Delivered-To: mpls@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DB0633A6859 for <mpls@core3.amsl.com>; Tue, 27 Jul 2010 01:51:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.098
X-Spam-Level:
X-Spam-Status: No, score=-5.098 tagged_above=-999 required=5 tests=[AWL=1.501, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A75yaGr-NNqS for <mpls@core3.amsl.com>; Tue, 27 Jul 2010 01:51:47 -0700 (PDT)
Received: from imr1.ericy.com (imr1.ericy.com [198.24.6.9]) by core3.amsl.com (Postfix) with ESMTP id 352773A6BA4 for <mpls@ietf.org>; Tue, 27 Jul 2010 01:51:47 -0700 (PDT)
Received: from eusaamw0707.eamcs.ericsson.se ([147.117.20.32]) by imr1.ericy.com (8.13.1/8.13.1) with ESMTP id o6R90bDJ017479; Tue, 27 Jul 2010 04:00:37 -0500
Received: from EUSAACMS0703.eamcs.ericsson.se ([169.254.1.134]) by eusaamw0707.eamcs.ericsson.se ([147.117.20.32]) with mapi; Tue, 27 Jul 2010 04:51:36 -0400
From: Sriganesh Kini <sriganesh.kini@ericsson.com>
To: "Eric Osborne (eosborne)" <eosborne@cisco.com>, Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
Date: Tue, 27 Jul 2010 04:51:35 -0400
Thread-Topic: [mpls] Scalability of the "effective FRR" approach in draft-kini-mpls-ring-frr-facility-backup-00.txt
Thread-Index: Acss451Rwl5jkjLdTWWmLbBSEMenUAAAJKaAABzm8kAAAGaFoAAB6yoAAADgilA=
Message-ID: <5A5E55DF96F73844AF7DFB0F48721F0F567DB80E8F@EUSAACMS0703.eamcs.ericsson.se>
References: <D29E470202D67745B61059870F433B5402511686@XMB-RCD-202.cisco.com>
In-Reply-To: <D29E470202D67745B61059870F433B5402511686@XMB-RCD-202.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "mpls@ietf.org" <mpls@ietf.org>
Subject: Re: [mpls] Scalability of the "effective FRR" approach in draft-kini-mpls-ring-frr-facility-backup-00.txt
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Jul 2010 08:51:49 -0000

Eric, pls see inline @ [Sri]

- Sri
 

> -----Original Message-----
> From: Eric Osborne (eosborne) [mailto:eosborne@cisco.com] 
> Sent: Tuesday, July 27, 2010 1:19 AM
> To: Sriganesh Kini; Alexander Vainshtein
> Cc: mpls@ietf.org
> Subject: RE: [mpls] Scalability of the "effective FRR" 
> approach in draft-kini-mpls-ring-frr-facility-backup-00.txt
> 
> I'm afraid I don't quite see the severity of the u-turn.  
> Yes, it's suboptimal.  But how long does the condition last?  
> All implementations I'm familiar with will rebuild the new 
> primary LSP (the L9->L6 LSP, in your example) in O(seconds), 
> so the suboptimal condition is pretty transient.  Your 
> solution seems like quite a lot of work (BFD, e-backup
> tunnels) for a few seconds of gain.

This solution aims for characteristics as close to MPLS-FRR when repair is done at an LSR adjacent to the failure. MPLS-FRR is used for networks requiring failure recovery with very low traffic loss (typically sub 50msec). If the network you are considering is tolerant to several seconds of traffic loss, plain old IGP convergence should be more than enough.

> 
> Also, it's not clear to me what happens in the time after the 
> failure but before fast-alert messages are processed at the 
> u-PLR.  Does the PLR drop traffic until then?  Does it do 
> inefficient backup?  Is this an implementations-specific decision?  

Typically a protection switch at PLR should result in lower overall loss than completely dropping traffic. If there are very specific conditions where completely dropping traffic is more advantageous, it may be an additional behavior.

> 
> Thirdly, I'm not sure how generalizable this solution is to a 
> mesh topology.  While it will certainly work just as well 
> there as in a ring, it is entirely possible (and in my 
> experience quite common) that the backup tunnel does not 
> overlap with many of the tunnels which it is protecting, and 
> thus you do not have a problem to solve.  As you are solving 
> a problem that is IMHO predominant only in ring topologies, 
> this mechanism is more of a specialized, ring-optimized tool 
> than a general-purpose thing.

The draft makes a statement about applicability to general topologies and as you correctly noted it works just as well. How much of overlap is there will vary from one network to another.

> 
> 
> 
> eric
> 
> 
> > -----Original Message-----
> > From: mpls-bounces@ietf.org [mailto:mpls-bounces@ietf.org] On Behalf
> Of
> > Sriganesh Kini
> > Sent: Tuesday, July 27, 2010 9:28 AM
> > To: Alexander Vainshtein
> > Cc: mpls@ietf.org
> > Subject: Re: [mpls] Scalability of the "effective FRR" approach in
> draft-kini-
> > mpls-ring-frr-facility-backup-00.txt
> > 
> > Sasha, you are welcome.
> > 
> > It should be noted that path computation for e-backup is 
> trivial when
> routed
> > along the backup. That should not impact operational experience.
> > Setup/maintenance of e-backup should be fairly straightforward. It
> would be
> > helpful if you can quantify a 'proliferation'.
> > 
> > Bandwidth can be shared between the e-backup and the backup tunnel.
> > When the e-backup is routed along the backup, there should 
> not be any 
> > extra bandwidth consumed compared to [MPLS-FRR]. The benefit is that
> the
> > problematic U-turn goes away.
> > 
> > Thanks
> > 
> > - Sri
> > 
> > 
> > 
> > 
> > ________________________________
> > 
> > 	From: Alexander Vainshtein
> > [mailto:Alexander.Vainshtein@ecitele.com]
> > 	Sent: Monday, July 26, 2010 11:55 PM
> > 	To: Sriganesh Kini
> > 	Cc: mpls@ietf.org
> > 	Subject: RE: [mpls] Scalability of the "effective FRR" approach
> in
> > draft-kini-mpls-ring-frr-facility-backup-00.txt
> > 
> > 
> > 
> > 	Sri,
> > 
> > 	Lots of thanks for a prompt response. It seems that we more or
> less
> > agree on the facts (proliferation of e-backup LSPs) but we 
> differ in 
> > interpreting  the impact  of these facts  on the actual operational
> experience.
> > 
> > 
> > 
> > 	However, I'd like to notice that "BW effectiveness" of e-backup
> LSPs
> > is also somewhat problematic IMO.
> > 
> > 	Please note that both the regular backup and e-backup 
> bypass tunnels 
> > cross multiple links that are not involved with the original
> set of LSPs
> > they are protecting. And they both consume BW on these 
> links. The only 
> > difference is that they are competing for BW with other 
> LSPs, not with
> ones
> > they are protecting. But the overall effect is exactly the same IMO.
> > 
> > 
> > 
> > 	My 2c,
> > 
> > 	     Sasha
> > 
> > 
> > 
> > 	From: Sriganesh Kini [mailto:sriganesh.kini@ericsson.com]
> > 	Sent: Monday, July 26, 2010 8:01 PM
> > 	To: Alexander Vainshtein
> > 	Cc: mpls@ietf.org
> > 	Subject: RE: [mpls] Scalability of the "effective FRR" approach
> in
> > draft-kini-mpls-ring-frr-facility-backup-00.txt
> > 
> > 
> > 
> > 	Sasha,
> > 
> > 
> > 
> > 	As you noted the e-backup tunnel protects all LSPs that 
> have a common 
> > {head-end, tail-end} pair. More precisely, the e-backup can 
> be shared 
> > to protect all LSPs that have a common {ring-ingress-LSR,
> ring-egress-
> > LSR} pair (that is path is disjoint with the e-backup).
> > 
> > 
> > 
> > 	If I understood correctly your concern is about the 
> number of number 
> > of e-backup tunnels?
> > 
> > 
> > 
> > 	E-backup tunnels should be setup based on protected 
> LSP's {ring- 
> > ingress, ring-egress} LSRs. Consider a typical case where in a ring,
> there is a
> > 'ring-head-end' and LSPs are setup from other LSRs on the 
> ring to the
> 'ring-
> > head-end'. An e-backup should be setup from each LSR on the ring to
> the
> > 'ring-head-end'. This is order(n).
> > 
> > 
> > 
> > 	Even for cases where protected LSPs have many possible 
> combinations 
> > for {ring-ingress, ring-egress}, for typical ring sizes,
> the number
> > of tunnels required should not be a concern for today's
> implementations.
> > 
> > 
> > 
> > 	Also, in many topologies an LSR that is purely a transit for
> protected
> > LSPs, does not have to originate any e-backup.
> > 
> > 
> > 
> > 	Thanks
> > 
> > 	- Sri
> > 
> > 	PS: Regular facility FRR requires more that two backup tunnels, 
> > depending on what is being protected.
> > 
> > 
> > 
> > 
> > ________________________________
> > 
> > 
> > 		From: mpls-bounces@ietf.org [mailto:mpls- 
> bounces@ietf.org] On 
> > Behalf Of Alexander Vainshtein
> > 		Sent: Monday, July 26, 2010 9:57 AM
> > 		To: Sriganesh Kini
> > 		Cc: mpls@ietf.org
> > 		Subject: [mpls] Scalability of the "effective FRR"
> approach in
> > draft-kini-mpls-ring-frr-facility-backup-00.txt
> > 
> > 		Sriganesh and all,
> > 
> > 		If I understood you correctly, your proposal 
> requires a dedicated 
> > backup tunnel for all LSPs with the given {head-end,
> tail-end} pair
> > of LSRs in the ring. (Regular facility FRR requires just two backup
> tunnels).
> > 
> > 		If this understanding is correct, this looks to like a
> serious
> > scalability issue with your approach.
> > 
> > 
> > 
> > 		Regards,
> > 
> > 		     Sasha
> > 
> > 
> 
>