Re: [mpls] Scalability of the "effective FRR" approach in draft-kini-mpls-ring-frr-facility-backup-00.txt

"Eric Osborne (eosborne)" <eosborne@cisco.com> Tue, 27 July 2010 08:18 UTC

Return-Path: <eosborne@cisco.com>
X-Original-To: mpls@core3.amsl.com
Delivered-To: mpls@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D7E283A6B8C for <mpls@core3.amsl.com>; Tue, 27 Jul 2010 01:18:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PGGbYjv7CzWS for <mpls@core3.amsl.com>; Tue, 27 Jul 2010 01:18:37 -0700 (PDT)
Received: from rtp-iport-2.cisco.com (rtp-iport-2.cisco.com [64.102.122.149]) by core3.amsl.com (Postfix) with ESMTP id 651413A6AB1 for <mpls@ietf.org>; Tue, 27 Jul 2010 01:18:37 -0700 (PDT)
Authentication-Results: rtp-iport-2.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEABczTkytJV2Y/2dsb2JhbACfZXGlOJtFhTYEhAmHGQwB
X-IronPort-AV: E=Sophos;i="4.55,266,1278288000"; d="scan'208";a="139635680"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by rtp-iport-2.cisco.com with ESMTP; 27 Jul 2010 08:18:58 +0000
Received: from xbh-rcd-201.cisco.com (xbh-rcd-201.cisco.com [72.163.62.200]) by rcdn-core-1.cisco.com (8.14.3/8.14.3) with ESMTP id o6R8IwfC002577; Tue, 27 Jul 2010 08:18:58 GMT
Received: from xmb-rcd-202.cisco.com ([72.163.62.209]) by xbh-rcd-201.cisco.com with Microsoft SMTPSVC(6.0.3790.4675); Tue, 27 Jul 2010 03:18:58 -0500
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable
Date: Tue, 27 Jul 2010 03:18:56 -0500
Message-ID: <D29E470202D67745B61059870F433B5402511686@XMB-RCD-202.cisco.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [mpls] Scalability of the "effective FRR" approach indraft-kini-mpls-ring-frr-facility-backup-00.txt
Thread-Index: Acss451Rwl5jkjLdTWWmLbBSEMenUAAAJKaAABzm8kAAAGaFoAAB6yoA
From: "Eric Osborne (eosborne)" <eosborne@cisco.com>
To: Sriganesh Kini <sriganesh.kini@ericsson.com>, Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
X-OriginalArrivalTime: 27 Jul 2010 08:18:58.0417 (UTC) FILETIME=[5CA02610:01CB2D64]
Cc: mpls@ietf.org
Subject: Re: [mpls] Scalability of the "effective FRR" approach in draft-kini-mpls-ring-frr-facility-backup-00.txt
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Jul 2010 08:18:38 -0000

I'm afraid I don't quite see the severity of the u-turn.  Yes, it's
suboptimal.  But how long does the condition last?  All implementations
I'm familiar with will rebuild the new primary LSP (the L9->L6 LSP, in
your example) in O(seconds), so the suboptimal condition is pretty
transient.  Your solution seems like quite a lot of work (BFD, e-backup
tunnels) for a few seconds of gain.

Also, it's not clear to me what happens in the time after the failure
but before fast-alert messages are processed at the u-PLR.  Does the PLR
drop traffic until then?  Does it do inefficient backup?  Is this an
implementations-specific decision?  

Thirdly, I'm not sure how generalizable this solution is to a mesh
topology.  While it will certainly work just as well there as in a ring,
it is entirely possible (and in my experience quite common) that the
backup tunnel does not overlap with many of the tunnels which it is
protecting, and thus you do not have a problem to solve.  As you are
solving a problem that is IMHO predominant only in ring topologies, this
mechanism is more of a specialized, ring-optimized tool than a
general-purpose thing.



eric


> -----Original Message-----
> From: mpls-bounces@ietf.org [mailto:mpls-bounces@ietf.org] On Behalf
Of
> Sriganesh Kini
> Sent: Tuesday, July 27, 2010 9:28 AM
> To: Alexander Vainshtein
> Cc: mpls@ietf.org
> Subject: Re: [mpls] Scalability of the "effective FRR" approach in
draft-kini-
> mpls-ring-frr-facility-backup-00.txt
> 
> Sasha, you are welcome.
> 
> It should be noted that path computation for e-backup is trivial when
routed
> along the backup. That should not impact operational experience.
> Setup/maintenance of e-backup should be fairly straightforward. It
would be
> helpful if you can quantify a 'proliferation'.
> 
> Bandwidth can be shared between the e-backup and the backup tunnel.
> When the e-backup is routed along the backup, there should not be any
> extra bandwidth consumed compared to [MPLS-FRR]. The benefit is that
the
> problematic U-turn goes away.
> 
> Thanks
> 
> - Sri
> 
> 
> 
> 
> ________________________________
> 
> 	From: Alexander Vainshtein
> [mailto:Alexander.Vainshtein@ecitele.com]
> 	Sent: Monday, July 26, 2010 11:55 PM
> 	To: Sriganesh Kini
> 	Cc: mpls@ietf.org
> 	Subject: RE: [mpls] Scalability of the "effective FRR" approach
in
> draft-kini-mpls-ring-frr-facility-backup-00.txt
> 
> 
> 
> 	Sri,
> 
> 	Lots of thanks for a prompt response. It seems that we more or
less
> agree on the facts (proliferation of e-backup LSPs) but we differ in
> interpreting  the impact  of these facts  on the actual operational
experience.
> 
> 
> 
> 	However, I'd like to notice that "BW effectiveness" of e-backup
LSPs
> is also somewhat problematic IMO.
> 
> 	Please note that both the regular backup and e-backup bypass
> tunnels cross multiple links that are not involved with the original
set of LSPs
> they are protecting. And they both consume BW on these links. The only
> difference is that they are competing for BW with other LSPs, not with
ones
> they are protecting. But the overall effect is exactly the same IMO.
> 
> 
> 
> 	My 2c,
> 
> 	     Sasha
> 
> 
> 
> 	From: Sriganesh Kini [mailto:sriganesh.kini@ericsson.com]
> 	Sent: Monday, July 26, 2010 8:01 PM
> 	To: Alexander Vainshtein
> 	Cc: mpls@ietf.org
> 	Subject: RE: [mpls] Scalability of the "effective FRR" approach
in
> draft-kini-mpls-ring-frr-facility-backup-00.txt
> 
> 
> 
> 	Sasha,
> 
> 
> 
> 	As you noted the e-backup tunnel protects all LSPs that have a
> common {head-end, tail-end} pair. More precisely, the e-backup can be
> shared to protect all LSPs that have a common {ring-ingress-LSR,
ring-egress-
> LSR} pair (that is path is disjoint with the e-backup).
> 
> 
> 
> 	If I understood correctly your concern is about the number of
> number of e-backup tunnels?
> 
> 
> 
> 	E-backup tunnels should be setup based on protected LSP's {ring-
> ingress, ring-egress} LSRs. Consider a typical case where in a ring,
there is a
> 'ring-head-end' and LSPs are setup from other LSRs on the ring to the
'ring-
> head-end'. An e-backup should be setup from each LSR on the ring to
the
> 'ring-head-end'. This is order(n).
> 
> 
> 
> 	Even for cases where protected LSPs have many possible
> combinations for {ring-ingress, ring-egress}, for typical ring sizes,
the number
> of tunnels required should not be a concern for today's
implementations.
> 
> 
> 
> 	Also, in many topologies an LSR that is purely a transit for
protected
> LSPs, does not have to originate any e-backup.
> 
> 
> 
> 	Thanks
> 
> 	- Sri
> 
> 	PS: Regular facility FRR requires more that two backup tunnels,
> depending on what is being protected.
> 
> 
> 
> 
> ________________________________
> 
> 
> 		From: mpls-bounces@ietf.org [mailto:mpls-
> bounces@ietf.org] On Behalf Of Alexander Vainshtein
> 		Sent: Monday, July 26, 2010 9:57 AM
> 		To: Sriganesh Kini
> 		Cc: mpls@ietf.org
> 		Subject: [mpls] Scalability of the "effective FRR"
approach in
> draft-kini-mpls-ring-frr-facility-backup-00.txt
> 
> 		Sriganesh and all,
> 
> 		If I understood you correctly, your proposal requires a
> dedicated backup tunnel for all LSPs with the given {head-end,
tail-end} pair
> of LSRs in the ring. (Regular facility FRR requires just two backup
tunnels).
> 
> 		If this understanding is correct, this looks to like a
serious
> scalability issue with your approach.
> 
> 
> 
> 		Regards,
> 
> 		     Sasha
> 
>