Re: [mpls] Scalability of the "effective FRR" approach in draft-kini-mpls-ring-frr-facility-backup-00.txt
"Eric Osborne (eosborne)" <eosborne@cisco.com> Tue, 27 July 2010 08:18 UTC
Return-Path: <eosborne@cisco.com>
X-Original-To: mpls@core3.amsl.com
Delivered-To: mpls@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D7E283A6B8C for <mpls@core3.amsl.com>; Tue, 27 Jul 2010 01:18:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PGGbYjv7CzWS for <mpls@core3.amsl.com>; Tue, 27 Jul 2010 01:18:37 -0700 (PDT)
Received: from rtp-iport-2.cisco.com (rtp-iport-2.cisco.com [64.102.122.149]) by core3.amsl.com (Postfix) with ESMTP id 651413A6AB1 for <mpls@ietf.org>; Tue, 27 Jul 2010 01:18:37 -0700 (PDT)
Authentication-Results: rtp-iport-2.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEABczTkytJV2Y/2dsb2JhbACfZXGlOJtFhTYEhAmHGQwB
X-IronPort-AV: E=Sophos;i="4.55,266,1278288000"; d="scan'208";a="139635680"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by rtp-iport-2.cisco.com with ESMTP; 27 Jul 2010 08:18:58 +0000
Received: from xbh-rcd-201.cisco.com (xbh-rcd-201.cisco.com [72.163.62.200]) by rcdn-core-1.cisco.com (8.14.3/8.14.3) with ESMTP id o6R8IwfC002577; Tue, 27 Jul 2010 08:18:58 GMT
Received: from xmb-rcd-202.cisco.com ([72.163.62.209]) by xbh-rcd-201.cisco.com with Microsoft SMTPSVC(6.0.3790.4675); Tue, 27 Jul 2010 03:18:58 -0500
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable
Date: Tue, 27 Jul 2010 03:18:56 -0500
Message-ID: <D29E470202D67745B61059870F433B5402511686@XMB-RCD-202.cisco.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [mpls] Scalability of the "effective FRR" approach indraft-kini-mpls-ring-frr-facility-backup-00.txt
Thread-Index: Acss451Rwl5jkjLdTWWmLbBSEMenUAAAJKaAABzm8kAAAGaFoAAB6yoA
From: "Eric Osborne (eosborne)" <eosborne@cisco.com>
To: Sriganesh Kini <sriganesh.kini@ericsson.com>, Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
X-OriginalArrivalTime: 27 Jul 2010 08:18:58.0417 (UTC) FILETIME=[5CA02610:01CB2D64]
Cc: mpls@ietf.org
Subject: Re: [mpls] Scalability of the "effective FRR" approach in draft-kini-mpls-ring-frr-facility-backup-00.txt
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Jul 2010 08:18:38 -0000
I'm afraid I don't quite see the severity of the u-turn. Yes, it's suboptimal. But how long does the condition last? All implementations I'm familiar with will rebuild the new primary LSP (the L9->L6 LSP, in your example) in O(seconds), so the suboptimal condition is pretty transient. Your solution seems like quite a lot of work (BFD, e-backup tunnels) for a few seconds of gain. Also, it's not clear to me what happens in the time after the failure but before fast-alert messages are processed at the u-PLR. Does the PLR drop traffic until then? Does it do inefficient backup? Is this an implementations-specific decision? Thirdly, I'm not sure how generalizable this solution is to a mesh topology. While it will certainly work just as well there as in a ring, it is entirely possible (and in my experience quite common) that the backup tunnel does not overlap with many of the tunnels which it is protecting, and thus you do not have a problem to solve. As you are solving a problem that is IMHO predominant only in ring topologies, this mechanism is more of a specialized, ring-optimized tool than a general-purpose thing. eric > -----Original Message----- > From: mpls-bounces@ietf.org [mailto:mpls-bounces@ietf.org] On Behalf Of > Sriganesh Kini > Sent: Tuesday, July 27, 2010 9:28 AM > To: Alexander Vainshtein > Cc: mpls@ietf.org > Subject: Re: [mpls] Scalability of the "effective FRR" approach in draft-kini- > mpls-ring-frr-facility-backup-00.txt > > Sasha, you are welcome. > > It should be noted that path computation for e-backup is trivial when routed > along the backup. That should not impact operational experience. > Setup/maintenance of e-backup should be fairly straightforward. It would be > helpful if you can quantify a 'proliferation'. > > Bandwidth can be shared between the e-backup and the backup tunnel. > When the e-backup is routed along the backup, there should not be any > extra bandwidth consumed compared to [MPLS-FRR]. The benefit is that the > problematic U-turn goes away. > > Thanks > > - Sri > > > > > ________________________________ > > From: Alexander Vainshtein > [mailto:Alexander.Vainshtein@ecitele.com] > Sent: Monday, July 26, 2010 11:55 PM > To: Sriganesh Kini > Cc: mpls@ietf.org > Subject: RE: [mpls] Scalability of the "effective FRR" approach in > draft-kini-mpls-ring-frr-facility-backup-00.txt > > > > Sri, > > Lots of thanks for a prompt response. It seems that we more or less > agree on the facts (proliferation of e-backup LSPs) but we differ in > interpreting the impact of these facts on the actual operational experience. > > > > However, I'd like to notice that "BW effectiveness" of e-backup LSPs > is also somewhat problematic IMO. > > Please note that both the regular backup and e-backup bypass > tunnels cross multiple links that are not involved with the original set of LSPs > they are protecting. And they both consume BW on these links. The only > difference is that they are competing for BW with other LSPs, not with ones > they are protecting. But the overall effect is exactly the same IMO. > > > > My 2c, > > Sasha > > > > From: Sriganesh Kini [mailto:sriganesh.kini@ericsson.com] > Sent: Monday, July 26, 2010 8:01 PM > To: Alexander Vainshtein > Cc: mpls@ietf.org > Subject: RE: [mpls] Scalability of the "effective FRR" approach in > draft-kini-mpls-ring-frr-facility-backup-00.txt > > > > Sasha, > > > > As you noted the e-backup tunnel protects all LSPs that have a > common {head-end, tail-end} pair. More precisely, the e-backup can be > shared to protect all LSPs that have a common {ring-ingress-LSR, ring-egress- > LSR} pair (that is path is disjoint with the e-backup). > > > > If I understood correctly your concern is about the number of > number of e-backup tunnels? > > > > E-backup tunnels should be setup based on protected LSP's {ring- > ingress, ring-egress} LSRs. Consider a typical case where in a ring, there is a > 'ring-head-end' and LSPs are setup from other LSRs on the ring to the 'ring- > head-end'. An e-backup should be setup from each LSR on the ring to the > 'ring-head-end'. This is order(n). > > > > Even for cases where protected LSPs have many possible > combinations for {ring-ingress, ring-egress}, for typical ring sizes, the number > of tunnels required should not be a concern for today's implementations. > > > > Also, in many topologies an LSR that is purely a transit for protected > LSPs, does not have to originate any e-backup. > > > > Thanks > > - Sri > > PS: Regular facility FRR requires more that two backup tunnels, > depending on what is being protected. > > > > > ________________________________ > > > From: mpls-bounces@ietf.org [mailto:mpls- > bounces@ietf.org] On Behalf Of Alexander Vainshtein > Sent: Monday, July 26, 2010 9:57 AM > To: Sriganesh Kini > Cc: mpls@ietf.org > Subject: [mpls] Scalability of the "effective FRR" approach in > draft-kini-mpls-ring-frr-facility-backup-00.txt > > Sriganesh and all, > > If I understood you correctly, your proposal requires a > dedicated backup tunnel for all LSPs with the given {head-end, tail-end} pair > of LSRs in the ring. (Regular facility FRR requires just two backup tunnels). > > If this understanding is correct, this looks to like a serious > scalability issue with your approach. > > > > Regards, > > Sasha > >
- [mpls] Scalability of the "effective FRR" approac… Alexander Vainshtein
- Re: [mpls] Scalability of the "effective FRR" app… Sriganesh Kini
- Re: [mpls] Scalability of the "effective FRR" app… Alexander Vainshtein
- Re: [mpls] Scalability of the "effective FRR" app… Sriganesh Kini
- Re: [mpls] Scalability of the "effective FRR" app… Eric Osborne (eosborne)
- Re: [mpls] Scalability of the "effective FRR" app… Sriganesh Kini
- Re: [mpls] Scalability of the "effective FRR" app… Eric Osborne (eosborne)
- Re: [mpls] Scalability of the "effective FRR" app… Sriganesh Kini
- Re: [mpls] Scalability of the "effective FRR" app… Eric Osborne (eosborne)
- Re: [mpls] Scalability of the "effective FRR" app… Sriganesh Kini
- Re: [mpls] Scalability of the "effective FRR" app… Eric Osborne (eosborne)
- Re: [mpls] Scalability of the "effective FRR" app… Sriganesh Kini
- Re: [mpls] Scalability of the "effective FRR" app… Sriganesh Kini
- Re: [mpls] Scalability of the "effective FRR" app… Greg Mirsky
- Re: [mpls] Scalability of the "effective FRR" app… Sriganesh Kini