[mpls] MPLS-RT review of draft-wijnands-mpls-mldp-node-protection-02 and of draft-zhao-mpls-mldp-protections-03
Martin Vigoureux <martin.vigoureux@alcatel-lucent.com> Mon, 22 April 2013 15:30 UTC
Return-Path: <martin.vigoureux@alcatel-lucent.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F419D21F902B for <mpls@ietfa.amsl.com>; Mon, 22 Apr 2013 08:30:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -109.449
X-Spam-Level:
X-Spam-Status: No, score=-109.449 tagged_above=-999 required=5 tests=[AWL=-1.150, BAYES_00=-2.599, MANGLED_NAIL=2.3, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ETnZduuST6eo for <mpls@ietfa.amsl.com>; Mon, 22 Apr 2013 08:30:11 -0700 (PDT)
Received: from ihemail2.lucent.com (ihemail2.lucent.com [135.245.0.35]) by ietfa.amsl.com (Postfix) with ESMTP id 2697B21F8D70 for <mpls@ietf.org>; Mon, 22 Apr 2013 08:30:11 -0700 (PDT)
Received: from us70uusmtp4.zam.alcatel-lucent.com (h135-5-2-66.lucent.com [135.5.2.66]) by ihemail2.lucent.com (8.13.8/IER-o) with ESMTP id r3MFU711027116 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Mon, 22 Apr 2013 10:30:08 -0500 (CDT)
Received: from US70TWXCHHUB04.zam.alcatel-lucent.com (us70twxchhub04.zam.alcatel-lucent.com [135.5.2.36]) by us70uusmtp4.zam.alcatel-lucent.com (GMO) with ESMTP id r3MFU5MY002062 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 22 Apr 2013 11:30:07 -0400
Received: from FR711WXCHHUB01.zeu.alcatel-lucent.com (135.239.2.111) by US70TWXCHHUB04.zam.alcatel-lucent.com (135.5.2.36) with Microsoft SMTP Server (TLS) id 14.2.247.3; Mon, 22 Apr 2013 11:30:06 -0400
Received: from [172.27.205.176] (135.239.27.40) by FR711WXCHHUB01.zeu.alcatel-lucent.com (135.239.2.111) with Microsoft SMTP Server (TLS) id 14.2.247.3; Mon, 22 Apr 2013 17:29:46 +0200
Message-ID: <5175576A.5030700@alcatel-lucent.com>
Date: Mon, 22 Apr 2013 17:29:46 +0200
From: Martin Vigoureux <martin.vigoureux@alcatel-lucent.com>
Organization: Alcatel-Lucent
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20130307 Thunderbird/17.0.4
MIME-Version: 1.0
To: mpls-chairs@tools.ietf.org, martin.vigoureux@alcatel-lucent.com, draft-wijnands-mpls-mldp-node-protection@tools.ietf.org, draft-zhao-mpls-mldp-protections@tools.ietf.org
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Originating-IP: [135.239.27.40]
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.35
Cc: mpls@ietf.org
Subject: [mpls] MPLS-RT review of draft-wijnands-mpls-mldp-node-protection-02 and of draft-zhao-mpls-mldp-protections-03
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Apr 2013 15:30:12 -0000
Hello, I have reviewed draft-wijnands-mpls-mldp-node-protection-02 and draft-zhao-mpls-mldp-protections-03 Relating to the specific question asked to the reviewers: The documents describe two different ways of achieving the same useful thing (mLDP node protection). * I do not think the two documents should be merged * draft-wijnands-mpls-mldp-node-protection-02 is more ready to be progressed as WG document than draft-zhao-mpls-mldp-protections-03 is. * If both documents were to be progressed as WG documents, an applicability document providing for example information on the situations in which a solution is more desirable than the other, if relevant, and/or a discussion on the scalability of the approaches, and/or on the capability to effectively find disjoint paths in such contexts, and/or on the use of such mechanism(s) in conjunction with other protection mechanisms, ..., might be valuable for those wishing to deploy such technology/ies. Note that the last two points are relevant even if a single document is progressed. Please see below my observations for the two documents. -m --- draft-wijnands-mpls-mldp-node-protection-02 General * well written and quite concise but at the expense of a perfectly clear description of the procedures which would thus benefit from extra clarification * the document is coherent, useful and technically sound, yet it could benefit from a discussion on the scalability of the proposed solution especially with regards to the t-ldp sessions. * the document is ready to be considered for WG adoption. * Some "must" might need to be capitalized Section 2.2 s/N's/N/ In order to protect node N, all the members of the MP2MP must participate in protecting node N by acting both as PLR and MPT LSR. Is it really all the members of the MP2MP LSP or only the LDP peers of the root? Confusion can come from the fact that figure 2 shows a very simple MP2MP LSP where all members of the LSP are also directly-connected-to-N members Section 2.3 s/If the PLR address on N changes for a give MP LSP/If the PLR address on N changes for a given MP LSP/ Section 3 s/the PLR would have assign a Label Mapping/the PLR would have assigned a Label Mapping/ Section 4 and Section 5 These sections need a bit more work to clarify the procedures and sequence of events, so as to lift potential misunderstandings. With regards to the reachability of N. Beginning of Section 4 the text says: When LSR1 discovered that node N is unreachable, it can't determine whether it is the 'LSR1 - N' link or node N that failed. but first paragraph of Section 5 says: The procedures following are depending on whether the link 'LSR1 - N' has failed or node N itself. The two pieces of text seem contradictory. Information should be given on how (and when?) the distinction could be made. Also, with regards to the reachability of N, it should be clarified if it is only considered through the 'LSR1 - N' link or not. Also, the two following sentences seem to contradict each other: If only the link failed, LSR2 and LSR3 will receive duplicate packets due to the two protection mechanisms. To prevent duplicate packets to be forwarded to LSR2 and LSR3, either the primary upstream LSRs or the secondary upstream LSRs should be forwarding MPLS packets, but never both at the same time. The first one says that duplicate packets will be received while the second says that duplicate packets should not be received. Strictly speaking it seems that duplicate packets will be received by LSR2 and LSR3 but be dropped and that it will be the case until label is withdrawn, and from that point on no duplicate traffic will be received. Also, in Section 4 the use of forwarding is somehow misleading. Indeed, rather than which primary or secondary LSR forwards the packets, the point seems to be more about which primary or secondary LSR do the MPTs decide to receive traffic from. Section 5.1 and 5.2 Similarly to a previous remark, it appears that LSR2 and LSR3 need to be able to make a distinction between 'LSR1 - N' link failure and node N failure. While I understand that both the capability to detect that N is unreachable and the capability to make a distinction between the two types of failures is outside of the scope of the document, I believe that the described procedures strongly depends on this capability. If so, I would suggest to add somewhere something like "It MUST be possible to distinguish 'LSR1 - N' link failure from node N failure". One could wonder why Section 5.1 and 5.2 are not in Section 4. Section 5.2 If N is still reachable why does LSR1 invoke the node protection mechanism? More generally, the procedures described in the document are based on the fact that both protection mechanisms are invoked while Section 4 states that is is only a MAY. Section 5.3 LSR1 will find that M is its new primary upstream LSR to reach the Root and LSR3 will find Q. I guess what was meant is: LSR2 will find that P is its new primary upstream LSR to reach the Root and LSR3 will find Q. Also I tend to think that M should be switched to P in: As soon as the new primary upstream LSRs M and Q are activated, Section 10.1 Update reference for draft-napierala-mpls-targeted-mldp --- --- draft-zhao-mpls-mldp-protections-03 * The document substantially lacks coherency and clarity. It seems that the intent was to be exhaustive in the cases/options covered but this is at the expense of readability/understandability. * Also, and more importantly, there are indications that parts of the solution are still incomplete from a design perspective (qualified as "TBD" or requiring further research, e.g., Section 4.2, 4.3.1, 5.). * Also, while the discussion on disjointness is in principle interesting and valuable, the way it is currently covered in the document participates to making it hard to read. * The document would also benefit from resolving a good number of phrasing/wording/editorial issues. As such, I do not think the document is ready to be considered for WG adoption. A substantial revision seems necessary before being able to appropriately assess the document. ---
- [mpls] MPLS-RT review of draft-wijnands-mpls-mldp… Martin Vigoureux
- Re: [mpls] MPLS-RT review of draft-wijnands-mpls-… IJsbrand Wijnands
- Re: [mpls] MPLS-RT review of draft-wijnands-mpls-… Martin Vigoureux