Re: [mpls] Question regarding SD protection in draft-ietf-mpls-tp-psc-itu

Huub van Helvoort <huubatwork@gmail.com> Fri, 27 December 2013 13:25 UTC

Return-Path: <huubatwork@gmail.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D7ECD1ADE72 for <mpls@ietfa.amsl.com>; Fri, 27 Dec 2013 05:25:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cRvZK9qgm7Wz for <mpls@ietfa.amsl.com>; Fri, 27 Dec 2013 05:25:44 -0800 (PST)
Received: from mail-ea0-x231.google.com (mail-ea0-x231.google.com [IPv6:2a00:1450:4013:c01::231]) by ietfa.amsl.com (Postfix) with ESMTP id 946101AE11C for <mpls@ietf.org>; Fri, 27 Dec 2013 05:25:44 -0800 (PST)
Received: by mail-ea0-f177.google.com with SMTP id n15so4091385ead.22 for <mpls@ietf.org>; Fri, 27 Dec 2013 05:25:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:disposition-notification-to:date:from:reply-to :user-agent:mime-version:to:cc:subject:references:in-reply-to :content-type:content-transfer-encoding; bh=p1X9EQ5JCXfSExXpaPO5IFJAUOwkP79VtFNfKVn6Xew=; b=Tshu9sXUWP0/oEe6pjoSuUskkIvvdy0aP29rztLTEoLht73Q2byNPsyuJiE1rgiCW8 OiHey2zAWZkw/LiEiCnsza9v991lQCxGvj+TE9tXT5u3ismkDANe4mtYy9QKgHZDno34 ubmeYypv6nO/7QfbB6xEiSnv862c1Ttj0oJ91P1JPSTv3Y2t6vPR5hm0nM5atleNR0kj zX51UWborOar9IyZEnCNTSTkYV4k0hcZWfBdr8UUQAMFFBfwlWM7wadAA1YovL/p8flK JbsCAJOIuRa1m+YnogOaMTRkKoWwlrigi0W05vwzp03/h/m4tIYay3jrqfM9aFrdUwBR qbxw==
X-Received: by 10.14.241.130 with SMTP id g2mr11921504eer.106.1388150739394; Fri, 27 Dec 2013 05:25:39 -0800 (PST)
Received: from McAsterix.local (g215085.upc-g.chello.nl. [80.57.215.85]) by mx.google.com with ESMTPSA id j46sm81770591eew.18.2013.12.27.05.25.38 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 27 Dec 2013 05:25:38 -0800 (PST)
Message-ID: <52BD7FD1.90007@gmail.com>
Date: Fri, 27 Dec 2013 14:25:37 +0100
From: Huub van Helvoort <huubatwork@gmail.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: Loa Andersson <loa@pi.nu>, "Ryoo, Jeong-dong" <ryoo@etri.re.kr>, Yaacov Weingarten <wyaacov@gmail.com>
References: <CAM0WBXWgKMEsAHuZME10QU_u-dwUNMQoqF8JH_71tPYJjg5AVQ@mail.gmail.com> <5B4A6CBE3924BB41A3BEE462A8E0B75A286AD485@SMTP2.etri.info>, <CAM0WBXVygMGvfjHg9stxKPTwK4tSMtXprvmxHYVu1sWmNAg3Jw@mail.gmail.com> <5B4A6CBE3924BB41A3BEE462A8E0B75A286AEF39@SMTP2.etri.info> <52BBD59D.8000104@pi.nu>
In-Reply-To: <52BBD59D.8000104@pi.nu>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Cc: "mpls@ietf.org" <mpls@ietf.org>, "draft-ietf-mpls-tp-psc-itu@tools.ietf.org" <draft-ietf-mpls-tp-psc-itu@tools.ietf.org>
Subject: Re: [mpls] Question regarding SD protection in draft-ietf-mpls-tp-psc-itu
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: huubatwork@gmail.com
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Dec 2013 13:25:49 -0000

Hello Loa,

You replied:

> Is this simply a matter of terminology.

I think it is.

> Each layer needs to perform its
> own protection switching, i.e. there has to be a *bridge function* and a
> *selector function* (on each layer depending on the implementation);

I f you want to refer to the functionality, then we should consequently
also use *protection switch function*.
A *protection switch* is also a physical entity...

> while *bridge* and *selector* are the physical layer entities?

Best regards. Huub.


> On 2013-12-26 12:51, Ryoo, Jeong-dong wrote:
>> Yaacov, thanks for your email. Somehow, I forgot to respond and am sorry
>> for the delay.
>>
>> First of all, Yaacov, it is not true that the protection switching of
>> Ethernet or SDH describes the operation of any layer below. Rather, each
>> layer is supposed to operate independently. However, there are a few
>> exceptions, such as hold-off timer and AIS (as a trigger from lower
>> layer). Even though there exist some proprietary implementations that
>> use other information from lower layer, most of them are not recommended
>> in ITU-T standards.
>>
>> Bridge and selector are not in the physical layer, but they are part of
>> protection switching. One of the important output actions from the PSC
>> control logic is coordinating the positions of bridge and selector.
>> Also, the bridge operation responding to the PSC control logic is also
>> part of protection switching. However, how to realize the bridge and
>> selector (for example, how to manipulate a packet forwarding mechanism)
>> is an implementation matter.
>>
>> When we mention 1+1 or 1:1 in protection architecture, we deal with the
>> operation of bridge. For 1+1 architecture, the traffic needs to be
>> duplicated at the sender and sent to both paths all the time, which is
>> the same description as the “permanent bridge”. For 1:1 architecture,
>> “selector bridge” is used to send the traffic only one of the paths. As
>> the protection path can be used by best traffic in packet networks and
>> the packet duplication takes much more effort/internal bandwidth inside
>> a switch than the time slot copy of circuit networks. 1:1 is considered
>> as preferable architecture in packet networks.
>>
>> As you might recall from G.8031 – Ethernet linear protection, the
>> selector bridge is not recommended due to the traffic flapping under SD
>> conditions on both paths. Instead “broadcast bridge” is introduced to
>> support protection switching against SD. But, this broadcast bridge is
>> not recommended in non-revertive mode as the working path needs to be
>> occupied by traffic all the time. Also the broadcast bridge is not
>> efficient, since by definition, the packet duplication should occur
>> during not only SD but also SF, FS, MS, etc. In this document, we are
>> introducing an improved bridge mechanism, which behaves like a selector
>> bridge but duplicates the traffic only under SD condition, and we
>> believe that it addresses all the issues with existing bridges.
>>
>> What we mean by SD protection is agnostic to the SD detection method is
>> that the proposed SD protection method (again how to operate a bridge or
>> what brige is used is a part of protection switching) can be used no
>> matter what kind of SD detection methods (data packet counting, CCM
>> packet counting, or even proprietary server layer SD detection) is used.
>>
>> I think I answered all the questions on your email.
>>
>> Yaacov, if you have any further concerns or questions, please let me
>> know.
>>
>> Best regards,
>>
>> Jeong-dong
>>
>>
>>
>>
>> ------------------------------------------------------------------------
>> *From : *"Yaacov Weingarten" <wyaacov@gmail.com>
>> *Sent : *2013-12-10 16:04:17 ( +09:00 )
>> *To : *Ryoo, Jeong-dong <ryoo@etri.re.kr>
>> *Cc : *draft-ietf-mpls-tp-psc-itu@tools.ietf.org
>> <draft-ietf-mpls-tp-psc-itu@tools.ietf.org>, mpls@ietf.org
>> <mpls@ietf.org>
>> *Subject : *Re: Question regarding SD protection in
>> draft-ietf-mpls-tp-psc-itu
>>
>> Jeong-dong, hi
>>
>> Thank you for your reply. Your answer seems to be an appropriate answer
>> for other SDOs, not sure that it is true for the context of MPLS and
>> IETF work.
>>
>> 1. You wrote "any protection switching (including PSC) is supposed to
>> describe the operation of bridge and selector." - this may be true for
>> Ethernet andSDH and for documents that are describing the operation of
>> the physical layer. However, the IETF (to my understanding - and I am
>> certainly willing to be corrected on this point) is concerned with the
>> protocol and leave the lower layers to implementation. Also, I am not
>> sure that the concepts of Bridge and Selector really apply to MPLS
>> (although I admit that we did mention them in the original PSC
>> definition).
>>
>> 2. You cite what was written in G8031 as justification for including
>> content into your draft. Again it is hard to transfer methodology from
>> one SDO to another and therefore, while I highly respect the work of the
>> ITU, I do not feel that this is a very clear justification for inclusion
>> into an internet-draft. Even when the draft states that its purpose is
>> to address the concerns of the ITU.
>>
>> 3. To the actual point of my earlier comment, that you do not seem to
>> address - the paragraph in Section 7.3 seems to state that SD protection
>> changes according to the method that is used to detect the SD. This
>> means that SD protection is not agnostic to the method used for the
>> detection.
>> Alternatively, we could break this dependence and state that SD
>> protection is always provided by changing the transmission of the data
>> to 1+1 protection in cases of SD detection, which is what the paragraph
>> is suggesting to do for some cases.
>>
>> I hope this formulation make my comment clearer and we are able to
>> discuss the technological approach rather than the philosophical
>> differences.
>>
>> Thank you,
>> yaacov
>>
>>
>> On Mon, Dec 9, 2013 at 10:04 PM, Ryoo, Jeong-dong <ryoo@etri.re.kr
>> <mailto:ryoo@etri.re.kr>> wrote:
>>
>>     Yaacov,
>>
>>     Yes, PSC is supposed to be agnostic to the method used for the
>>     detection of SF/SD.
>>
>>     It is also true that any protection switching (including PSC) is
>>     supposed to describe the operation of bridge and selector.
>>
>>     As there are multiple options for detecting SD, we needed to
>>     describe the behavior of the bridge to cover all the possible
>>     detection methods. Describing the operation of bridge for SD
>>     protection is not a new thing. For example, G.8031 - Ethernet linear
>>     protection also describes what bridge can be used in order to
>>     provide protection against SD.
>>
>>     Best regards,
>>
>>     Jeong-dong
>>
>>
>>
>>
>>
>> ------------------------------------------------------------------------
>>     *From : *"Yaacov Weingarten" <wyaacov@gmail.com
>>     <mailto:wyaacov@gmail.com>>
>>     *Sent : *2013-12-08 20:01:55 ( +09:00 )
>>     *To : *draft-ietf-mpls-tp-psc-itu@tools.ietf.org
>>     <mailto:draft-ietf-mpls-tp-psc-itu@tools.ietf.org>
>>     <draft-ietf-mpls-tp-psc-itu@tools.ietf.org
>>     <mailto:draft-ietf-mpls-tp-psc-itu@tools.ietf.org>>, mpls@ietf.org
>>     <mailto:mpls@ietf.org> <mpls@ietf.org <mailto:mpls@ietf.org>>
>>     *Cc : *
>>     *Subject : *Question regarding SD protection in
>>     draft-ietf-mpls-tp-psc-itu
>>
>>
>>     Hi,
>>
>>     After reading through your draft on the extensions to PSC to support
>>     SD situations, I have a question for clarification -
>>     In your introduction - you state that the method used to detect SD
>>     situations is out-of-scope of the document. Does this mean that PSC
>>     is supposed to be agnostic to the method used for this detection? It
>>     should react only to the indication, similarly to the reaction and
>>     relationship to the method for detecting and declaring a SF
>> situation.
>>     However, when you explain the behavior of the SD protection in
>>     section 7.3 you have a paragraph that starts with "If the detection
>>     of a SD depends on the presence of user data packets ..."  that
>>     seems to indicate that the behavior of the system is dependent upon
>>     the detection method! Clarification would be appreciated.
>>
>>     --
>>     Thanx and BR,
>>     yaacov
>>
>>     /Still looking for new opportunity/
>>
>>
>>
>>
>> --
>> Thanx and BR,
>> yaacov
>>
>> /Still looking for new opportunity/
>>
>>
>> _______________________________________________
>> mpls mailing list
>> mpls@ietf.org
>> https://www.ietf.org/mailman/listinfo/mpls
>>
>


-- 
*****************************************************************
               请记住,你是独一无二的,就像其他每一个人一样