Re: [mpls] http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00

Francesco Lazzeri <francesco.lazzeri@ericsson.com> Thu, 10 November 2016 10:02 UTC

Return-Path: <francesco.lazzeri@ericsson.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B85E129639; Thu, 10 Nov 2016 02:02:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level:
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J7J0vulhHL_v; Thu, 10 Nov 2016 02:02:19 -0800 (PST)
Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0DBFE1293D8; Thu, 10 Nov 2016 02:02:17 -0800 (PST)
X-AuditID: c1b4fb25-bf4b398000005623-89-582445a7744f
Received: from ESESSHC017.ericsson.se (Unknown_Domain [153.88.183.69]) by (Symantec Mail Security) with SMTP id AF.00.22051.7A544285; Thu, 10 Nov 2016 11:02:16 +0100 (CET)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (153.88.183.145) by oa.msg.ericsson.com (153.88.183.69) with Microsoft SMTP Server (TLS) id 14.3.319.2; Thu, 10 Nov 2016 11:02:15 +0100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.onmicrosoft.com; s=selector1-ericsson-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=FPdpwOIAn9wUaXZHkZA+Nn3M2dBRajXtH0hCErDniaw=; b=it2eVznJ3Av/C0qGBAKaK5uf5VFzGNzWFweBqnApZmEBny6AnTXMdWeTT16tH7brErJ5ILpXRGzW0RwxZiHHJ89N1RrHSTfMABCe0c/u0A8keq+QLgC0hwxHDV+vzU9wLDtYlXbZeyxharkukD4oORNVMvacJe3jlMxG+zKiUEo=
Received: from AM4PR07MB1521.eurprd07.prod.outlook.com (10.165.248.149) by AM4PR07MB1524.eurprd07.prod.outlook.com (10.165.248.152) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.721.10; Thu, 10 Nov 2016 10:02:13 +0000
Received: from AM4PR07MB1521.eurprd07.prod.outlook.com ([10.165.248.149]) by AM4PR07MB1521.eurprd07.prod.outlook.com ([10.165.248.149]) with mapi id 15.01.0721.010; Thu, 10 Nov 2016 10:02:13 +0000
From: Francesco Lazzeri <francesco.lazzeri@ericsson.com>
To: Igor Bryskin <Igor.Bryskin@huawei.com>, Fatai Zhang <zhangfatai@huawei.com>, Dieter Beller <Dieter.Beller@nokia.com>
Thread-Topic: [mpls] http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00
Thread-Index: AQHSNdcrsnImRWIBx06pjw3t0cGI9KDGvx8AgAABPQCAAAJUAIAAUW6AgAAHrgCAAATCAIAAAkeAgAAFvgCAAALEAIAAJckAgAD66ACAAEl9gIAABo6AgAQaA4CAA7+XAIAAPoyAgAAHQ6CAAAkagIAACboggAAJnACAABlAgIAAI1UAgADWmeA=
Date: Thu, 10 Nov 2016 10:02:13 +0000
Message-ID: <AM4PR07MB1521783F7A322F705278812296B80@AM4PR07MB1521.eurprd07.prod.outlook.com>
References: <AM2PR07MB09943987D6E27931F8C7CF3EF0A30@AM2PR07MB0994.eurprd07.prod.outlook.com> <0C72C38E7EBC34499E8A9E7DD007863908F0EF32@dfweml501-mbx> <655C07320163294895BBADA28372AF5D48B5BB53@FR712WXCHMBA15.zeu.alcatel-lucent.com> <AM2PR07MB0994C0B4EB099666B97844C0F0A30@AM2PR07MB0994.eurprd07.prod.outlook.com> <655C07320163294895BBADA28372AF5D48B5BC01@FR712WXCHMBA15.zeu.alcatel-lucent.com> <7AEB3D6833318045B4AE71C2C87E8E172A8CC9D2@dfweml501-mbx> <655C07320163294895BBADA28372AF5D48B5C82F@FR712WXCHMBA15.zeu.alcatel-lucent.com> <0C72C38E7EBC34499E8A9E7DD007863908F0F10B@dfweml501-mbx> <7AEB3D6833318045B4AE71C2C87E8E172A8CCA51@dfweml501-mbx> <0C72C38E7EBC34499E8A9E7DD007863908F0F12D@dfweml501-mbx> <7AEB3D6833318045B4AE71C2C87E8E172A8CCA9B@dfweml501-mbx> <slkuudfq6hfpvsvrdv85tj8f.1478211220486@email.android.com> <0C72C38E7EBC34499E8A9E7DD007863908F0F1E1@dfweml501-mbx> <9762bdb8-e73c-7653-3243-f7add7a9ce7c@nokia.com> <0C72C38E7EBC34499E8A9E7DD007863908F0F242@dfweml501-mbx> <AM4PR07MB1521420400F50B015E91AA5796A70@AM4PR07MB1521.eurprd07.prod.outlook.com> <F82A4B6D50F9464B8EBA55651F541CF8817AC188@SZXEMA504-MBS.china.huawei.com> <0C72C38E7EBC34499E8A9E7DD007863908F0F747@dfweml501-mbx> <AM4PR07MB1521754E4B30DF2F386DFB7196B90@AM4PR07MB1521.eurprd07.prod.outlook.com> <0C72C38E7EBC34499E8A9E7DD007863908F0F774@dfweml501-mbx> <AM4PR07MB15214CB0075CBB583A96B82B96B90@AM4PR07MB1521.eurprd07.prod.outlook.com> <0C72C38E7EBC34499E8A9E7DD007863908F0F7CA@dfweml501-mbx> <AM4PR07MB1521A6A7B62AFD21D0F0BAAD96B90@AM4PR07MB1521.eurprd07.prod.outlook.com> <0C72C38E7EBC34499E8A9E7DD007863908F0F824@dfweml501-mbx>
In-Reply-To: <0C72C38E7EBC34499E8A9E7DD007863908F0F824@dfweml501-mbx>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=francesco.lazzeri@ericsson.com;
x-originating-ip: [151.0.200.100]
x-microsoft-exchange-diagnostics: 1; AM4PR07MB1524; 7:wTQPiWASyP3CUlzceKclCbWK8Z4n3e20AzYZBp63hzWyXa8vD4JQiW/EhqkH6myezgnA1wZQBjgWOSzgXpcvVzUB4AaSZrXnqR49297zNWba719RvBI4hhucxD2OIaC1ReZCtvOdMbV4Swv240VvK6tIhml9qOaBwiswKLRBp4LrbMcwWkpa7nz95SwFA6YRwWUtKoMzBBN4XypIXIl6gj352sL4zw2uVxnwb6/W0KbDSi+30k42cJbi8R5HjpxMwkbIpdDyspkwk6JWYCT94B/YYPKgJHFGnqDH5BAJZ4nZMcofaMkvOOUWrSBGfRsPSOKzm+irlQ+XwThDOgZ1+i1wJAsQw2rXWqQ2doOkC+E=
x-ms-office365-filtering-correlation-id: 641f7dd9-1346-4964-37ed-08d40950a512
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:AM4PR07MB1524;
x-microsoft-antispam-prvs: <AM4PR07MB1524BEF8A99E32224CCBB92B96B80@AM4PR07MB1524.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(37575265505322)(158342451672863)(72170088055959)(192374486261705)(50582790962513)(82608151540597)(21748063052155)(17755550239193);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040176)(601004)(2401047)(5005006)(8121501046)(10201501046)(3002001); SRVR:AM4PR07MB1524; BCL:0; PCL:0; RULEID:; SRVR:AM4PR07MB1524;
x-forefront-prvs: 01221E3973
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(7916002)(377454003)(189002)(199003)(53754006)(24454002)(561944003)(87936001)(2950100002)(92566002)(122556002)(220493001)(77096005)(66066001)(33656002)(105586002)(6116002)(790700001)(102836003)(3846002)(106356001)(106116001)(5001770100001)(7696004)(97736004)(229853002)(68736007)(76176999)(50986999)(8676002)(54356999)(8936002)(9686002)(2900100001)(101416001)(5660300001)(93886004)(4326007)(2906002)(3280700002)(81166006)(74316002)(81156014)(230783001)(86362001)(3660700001)(76576001)(586003)(189998001)(7906003)(3900700001)(7736002)(7846002)(569005); DIR:OUT; SFP:1101; SCL:1; SRVR:AM4PR07MB1524; H:AM4PR07MB1521.eurprd07.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_AM4PR07MB1521783F7A322F705278812296B80AM4PR07MB1521eurp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Nov 2016 10:02:13.5278 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR07MB1524
X-OriginatorOrg: ericsson.com
X-Brightmail-Tracker: H4sIAAAAAAAAA02SbUhTURjHObt323U4Oi7NB5Og6RAtLa3sGmH5QZBQrC85oreZl6bptN1l Kn2w2hQNK0JDl5jSevEls9JU0srVLM33ipZkWi7CNLMMbVbS7u4Ev/3+z/P/n3Oeh0MRsh6h D5Ws0TFajSpVLpKQZcrm6OBb0f7KjSX5K2hbuZWk603vSfpfVyhtHwyih69XC+kzo1Yxbfjd QtLnz/YLd1Ix+mffhDEmk10QMzI8JNhN7JNsT2JSkzMZ7YbIwxJ1/9wPlDHQLc4qf/IJ5aLT Y6JC5EYB3gz5i2ecLMP1CHoKE3h+geBx565CJKFIXERA7USemBMyXCqANhOXkPAuQ8ssyUVE mIaFZ1ec7Ilz4PO8zWki8FsEFa3vHXGKWon3Q1+eB+85ACVj913+TgQzHe4ck1gBRQ15BMdS h/2Gfcp18y93qBrsdp7jhqPh+x0d50F4Fcx31wk4JrA3DNuuCvjRMJja+gmevWBifFHI+1Vw 12R0edbCQA3HEgdXEjAxYyD5RhxMjHSIl/jS5LwrcAzO/a0X8YE6BA/aX7tEC4Kf45ygHMIX Xt4T8vUxIVS8GUH8Vhm4edvg5JXYB0ZeF6CLKNC47OU8p0PBl1pkdG7AA7rKbCRfDwFrSbGI 53Vwo2qS4DkYShfN5PJ6JRLXIC+WYRPTjoZtCmG0yUdYNl0TomF095Djj3U0/lG0oFdTUWaE KSR3l85E+CllQlUmm51mRkARck+pIspfKZMmqbJzGG36Ie2JVIY1o9UUKfeWhlePJsjwUZWO OcYwGYx2qSug3Hxy0foU82DpO2OsYxy9pXeWTQyJV7WtsXxN8B21INmlxa7WRvVFA34e+zHG VtFBoIcF6qgPx33DTxruhwXEbUnYZp8qVtRFXOg1NZ/aM13ceTmnb2/SzaEmse5l7Jw+g5p8 qrQGNFl2qH8teKvjI9e1E9NbDzYE6q89ykoZt/uxcpJVq0KDCC2r+g+NVJZuXwMAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/mpls/VMPEFVuhx3XTkoD6wLa4wrV1-3U>
Cc: "mpls@ietf.org" <mpls@ietf.org>, "CCAMP (ccamp@ietf.org)" <ccamp@ietf.org>, "Scharf, Michael (Nokia - DE)" <michael.scharf@nokia.com>, "pce@ietf.org" <pce@ietf.org>, "TEAS WG (teas@ietf.org)" <teas@ietf.org>
Subject: Re: [mpls] http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Nov 2016 10:02:25 -0000

Igor,
I assumed in fact a multi-domain ACTN scenario, as stated in the abstract of draft-busibel-teas-yang-path-computation-00, where I believe we have the most interesting use cases for path computation services. I believe we should consider all of these, as the same model shall be used both for single and multi-domain scenarios.
Regarding path computation on MDSC: in an ideal world MDSC could read topology from PNCs and compute itself end-to-end paths but there are cases where this could be either impossible or not convenient:


-          For some reasons (e.g. security/privacy) the PNC doesn't export full topology information to the MDSC, so that such information is not suitable for a path computation on MDSC

-          For some reasons (e.g. scalability) MDSC doesn't want to get full topology information from the subtended domains

-          For some reasons (e.g. lack of knowledge about the internal model of the equipment managed by the PNC : especially in WDM networks) MDSC is not capable to cumpute reliably a feasible path in a domain

BR
Francesco


From: Igor Bryskin [mailto:Igor.Bryskin@huawei.com]
Sent: 09 November, 2016 8:33 PM
To: Francesco Lazzeri <francesco.lazzeri@ericsson.com>; Fatai Zhang <zhangfatai@huawei.com>; Dieter Beller <Dieter.Beller@nokia.com>
Cc: mpls@ietf.org; CCAMP (ccamp@ietf.org) <ccamp@ietf.org>; Scharf, Michael (Nokia - DE) <michael.scharf@nokia.com>; pce@ietf.org; TEAS WG (teas@ietf.org) <teas@ietf.org>
Subject: RE: [mpls] http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00

Francesco,

Please, note that the context of this discussion is single domain. In my opinion MDSC  should not rely on the Path computation services (stateless or stateful) provided by PNCs, rather, on its own path computation on TE topology, the product of  merging of abstract TE topologies catered by the subordinate PNCs. And BTW said abstract TE topologies should be kept up-to-date by the PNCs (i.e. with updates, stateful).

Igor



From: Teas [mailto:teas-bounces@ietf.org] On Behalf Of Francesco Lazzeri
Sent: Wednesday, November 09, 2016 12:42 PM
To: Igor Bryskin; Fatai Zhang; Dieter Beller
Cc: mpls@ietf.org<mailto:mpls@ietf.org>; CCAMP (ccamp@ietf.org<mailto:ccamp@ietf.org>); Scharf, Michael (Nokia - DE); pce@ietf.org<mailto:pce@ietf.org>; TEAS WG (teas@ietf.org<mailto:teas@ietf.org>)
Subject: Re: [Teas] [mpls] http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00

Well, I know implementations of both the "flavours", and I would say that the most complex are the pre-planned ones.
So, it could be an interesting use case, but we need to be aware that it comes with a price.
Take also into account that the path recomputation inside the provider could not necessarily offer an optimal solution end-to-end, and the client (the MDSC actually) should anyway check whether the end-to-end path, when a change happens on a segment, is still in compliance with its constraints (e.g. if there is a latency constraint on the end-to-end path, it may happen that the recomputed segment has a longer latency that leads to exceeding the constraint on the end to end path : but the provider only sees that single segment of the end-to-end path and taking into account the end-to-end constraints could be really difficult).

Regarding the TE-link, I was actually interested on what the provider (that is the PNC) advertises to the client (MDSC) when reservation occurs. It cannot advertise A'B' as it knows only A and B, but advertising AB seems to me not correct.

BR
Francesco

From: Igor Bryskin [mailto:Igor.Bryskin@huawei.com]
Sent: 09 November, 2016 4:56 PM
To: Francesco Lazzeri <francesco.lazzeri@ericsson.com<mailto:francesco.lazzeri@ericsson.com>>; Fatai Zhang <zhangfatai@huawei.com<mailto:zhangfatai@huawei.com>>; Dieter Beller <Dieter.Beller@nokia.com<mailto:Dieter.Beller@nokia.com>>
Cc: mpls@ietf.org<mailto:mpls@ietf.org>; CCAMP (ccamp@ietf.org<mailto:ccamp@ietf.org>) <ccamp@ietf.org<mailto:ccamp@ietf.org>>; Scharf, Michael (Nokia - DE) <michael.scharf@nokia.com<mailto:michael.scharf@nokia.com>>; pce@ietf.org<mailto:pce@ietf.org>; TEAS WG (teas@ietf.org<mailto:teas@ietf.org>) <teas@ietf.org<mailto:teas@ietf.org>>
Subject: RE: [mpls] http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00

Francesco,

Please, see in-line.

Igor



From: Teas [mailto:teas-bounces@ietf.org] On Behalf Of Francesco Lazzeri
Sent: Wednesday, November 09, 2016 10:27 AM
To: Igor Bryskin; Fatai Zhang; Dieter Beller
Cc: mpls@ietf.org<mailto:mpls@ietf.org>; CCAMP (ccamp@ietf.org<mailto:ccamp@ietf.org>); Scharf, Michael (Nokia - DE); pce@ietf.org<mailto:pce@ietf.org>; TEAS WG (teas@ietf.org<mailto:teas@ietf.org>)
Subject: Re: [Teas] [mpls] http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00

Igor,


1)      IMHO simplicity pays back. Instead than maintaining all these states, notifying clients all the times something changes, and repeating path-computation as needed, isn't better for a client (and provider) to ask what is needed when it's needed, and get the best result back at that moment ?
IB>> What happens it the provider at this moment says: " No, I have nothing for you" ?  What if the path was relied upon by the client for a failure recovery or congestion avoidance strategy or disaster topology re-configuration?
       FL>> Probably the same in case the provider notifies "Hey, I have no longer anything for you".

IB>> But this would be a bit too late, wouldn't it? Wouldn't it be better if the client has learnt about the previously returned path unfeasibility ahead of time, so that it could re-plan it's failure recovery scheme?

If there is no (more) path, there is no path. The client could only try and crankback looking for some different path or report an alarm.

IB>> Relying on crankbaks in an unpredictable way is not exactly a good solution, right?

The scenario that seems more applicable to your proposal is a pre-planned restoration mechanism where we have a worker path in-service and a protection path just computed (but not reserving network resources, in order to share them among several protection paths), in a multi-domain network. In that case, reserving te-tunnels like you suggest, could give an advantage, as the end-to-end cranckback could occur when the notification with "no-path" is triggered by the provider (that means the protection path or some of its segments is no longer valid) and not when the path deployment is triggered by the client (that means the worker path is gone and we need the protection immediately). Is this the case you are considering ?

IB>> Exactly. All the scenarios you can think of where you don't know when and where a problem may happen and you want to maintain flexibility and share the network resources to protect as much as you can

In other cases, as when used during an end-to-end path computation with immediate deployment to reduce the possibility of conflicts among concurrent procedures, it seems to me less important or applicable, as all these procedures will likely be orchestrated by the same entity, which could well avoid conflicts.

IB>> All cases where the provider wants to expose a potentiality without committing resources to cover for the client multiple use cases and provide at the same time some degree (albeit not perfect) predictability.




2)      Regarding the abstract link in the overlay topology, I still can't see what the provider will advertise. If it's a new link representing the forwarding adjacency between A' and B', how it will be represented by the provider ?

IB>> According to the TE topology model abstract TE link A'B' points to the underlay (provider) TE topology where the path is computed and provisioned as supporting TE tunnel for committed TE link or not provisioned (but monitored) for uncommitted TE link (i.e. link advertising potentiality in the provider network). In either case TE link's attributes (e.g. available bandwidth, SRLGs) are defined by the path.
FL>> This means that the provider just sends the reply to the path computation request and doesn't advertise any new TE link to the client ? This is actually what I would expect: the task to manage TE-links in the overlay topology is with the client.

IB>> Overlay TE topology manager advertises a TE link that is supported not by a provisioned in a server layer TE tunnel (connection), rather, by a computed and monitored path. This way the overlay TE topology manger can advertise multiple abstract TE links mapped onto the same network resources

Francesco


From: Igor Bryskin [mailto:Igor.Bryskin@huawei.com]
Sent: 09 November, 2016 3:47 PM
To: Francesco Lazzeri <francesco.lazzeri@ericsson.com<mailto:francesco.lazzeri@ericsson.com>>; Fatai Zhang <zhangfatai@huawei.com<mailto:zhangfatai@huawei.com>>; Dieter Beller <Dieter.Beller@nokia.com<mailto:Dieter.Beller@nokia.com>>
Cc: mpls@ietf.org<mailto:mpls@ietf.org>; CCAMP (ccamp@ietf.org<mailto:ccamp@ietf.org>) <ccamp@ietf.org<mailto:ccamp@ietf.org>>; Scharf, Michael (Nokia - DE) <michael.scharf@nokia.com<mailto:michael.scharf@nokia.com>>; pce@ietf.org<mailto:pce@ietf.org>; TEAS WG (teas@ietf.org<mailto:teas@ietf.org>) <teas@ietf.org<mailto:teas@ietf.org>>
Subject: RE: [mpls] http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00

Francesco,


1)      IMHO simplicity pays back. Instead than maintaining all these states, notifying clients all the times something changes, and repeating path-computation as needed, isn't better for a client (and provider) to ask what is needed when it's needed, and get the best result back at that moment ?
IB>> What happens it the provider at this moment says: " No, I have nothing for you" ?  What if the path was relied upon by the client for a failure recovery or congestion avoidance strategy or disaster topology re-configuration?





2)      Regarding the abstract link in the overlay topology, I still can't see what the provider will advertise. If it's a new link representing the forwarding adjacency between A' and B', how it will be represented by the provider ?

IB>> According to the TE topology model abstract TE link A'B' points to the underlay (provider) TE topology where the path is computed and provisioned as supporting TE tunnel for committed TE link or not provisioned (but monitored) for uncommitted TE link (i.e. link advertising potentiality in the provider network). In either case TE link's attributes (e.g. available bandwidth, SRLGs) are defined by the path.


Igor


From: Francesco Lazzeri [mailto:francesco.lazzeri@ericsson.com]
Sent: Wednesday, November 09, 2016 9:26 AM
To: Igor Bryskin; Fatai Zhang; Dieter Beller
Cc: mpls@ietf.org<mailto:mpls@ietf.org>; CCAMP (ccamp@ietf.org<mailto:ccamp@ietf.org>); Scharf, Michael (Nokia - DE); pce@ietf.org<mailto:pce@ietf.org>; TEAS WG (teas@ietf.org<mailto:teas@ietf.org>)
Subject: RE: [mpls] http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00

Igor,
IMHO simplicity pays back. Instead than maintaining all these states, notifying clients all the times something changes, and repeating path-computation as needed, isn't better for a client (and provider) to ask what is needed when it's needed, and get the best result back at that moment ?
Regarding the abstract link in the overlay topology, I still can't see what the provider will advertise. If it's a new link representing the forwarding adjacency between A' and B', how it will be represented by the provider ?

BR
Francesco

From: Igor Bryskin [mailto:Igor.Bryskin@huawei.com]
Sent: 09 November, 2016 2:48 PM
To: Fatai Zhang <zhangfatai@huawei.com<mailto:zhangfatai@huawei.com>>; Francesco Lazzeri <francesco.lazzeri@ericsson.com<mailto:francesco.lazzeri@ericsson.com>>; Dieter Beller <Dieter.Beller@nokia.com<mailto:Dieter.Beller@nokia.com>>
Cc: mpls@ietf.org<mailto:mpls@ietf.org>; CCAMP (ccamp@ietf.org<mailto:ccamp@ietf.org>) <ccamp@ietf.org<mailto:ccamp@ietf.org>>; Scharf, Michael (Nokia - DE) <michael.scharf@nokia.com<mailto:michael.scharf@nokia.com>>; pce@ietf.org<mailto:pce@ietf.org>; TEAS WG (teas@ietf.org<mailto:teas@ietf.org>) <teas@ietf.org<mailto:teas@ietf.org>>
Subject: RE: [mpls] http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00

Hi Francesco,

Please, see in-line.

Cheers,
Igor

The point here is for how long the provider should keep the computed path and its request parameters

IB>> As far as the provider is concerned, the requested path and its parameters is a TE tunnel (albeit computed but not provisioned). So it keeps the state until the client removes the TE tunnel.

(in fact if we want to have a possibly better path, at any change inside provider topology, resource status and usage, the provider should check if the computed path is still feasible and/or redo path computation to find a better path). This could be an overhead, in my view.

IB>> For example, if provider is to ensure the path's feasibility, all it needs is to detect a change in a TE link the path is going through and make sure that the  change does not make the path unfeasible. Only in the latter case the path re-computation needs to be scheduled and performed in a background thread.

Furthermore, I can't see how the provider could export the abstract TE-link, as this is inside the client topology;
IB>> The abstract link is a part of the abstract topology "cooked" (customized) for the client, which is supported by the computed path in the underlay topology, which is the provider's topology.

in fact, if the client is asking for a path between A and B (A and B inside provider topology), having A' (in client topology) connected to A and B' (in client topology) connected to B, the relevant abstract TE link (the forwarding adjacency) should be built between A' and B', that is in the client topology; therefore the client should be in charge of managing it, as the provider is not aware of A' and B'.

IB>> This is correct, but note that the two topologies (underlay and overlay) according to the TE topology model have independent and unrelated name spaces for node, link and SRLG IDs. So it is perfectly Ok.

IB>> Also note that according  to TE topology model  one important attribute of a TE node (especially abstract composite node) is connectivity matrix, which is nothing but a set of stateful paths computed, re-computed and constantly monitored (but not reserved) over the TE topology the node encapsulates.  This means that stateful unreserved paths play already a very important part in supporting TE topologies with asymmetrical blocking abstract TE nodes.

Igor




BR
Francesco

From: CCAMP [mailto:ccamp-bounces@ietf.org] On Behalf Of Igor Bryskin
Sent: 04 November, 2016 7:12 PM
To: Dieter Beller <Dieter.Beller@nokia.com<mailto:Dieter.Beller@nokia.com>>
Cc: mpls@ietf.org<mailto:mpls@ietf.org>; CCAMP (ccamp@ietf.org<mailto:ccamp@ietf.org>) <ccamp@ietf.org<mailto:ccamp@ietf.org>>; Scharf, Michael (Nokia - DE) <michael.scharf@nokia.com<mailto:michael.scharf@nokia.com>>; TEAS WG (teas@ietf.org<mailto:teas@ietf.org>) <teas@ietf.org<mailto:teas@ietf.org>>; pce@ietf.org<mailto:pce@ietf.org>
Subject: Re: [CCAMP] [mpls] http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00

Dieter,

A client may ask for a path not to be used immediately (e.g. to present as an abstract TE link to its own client, in some failure restoration scheme or as a part of disaster recovery network topology re-configuration) without committing any network resources. In this case the client would want to know at least  if/when the path has stopped being feasible any longer or (ideally) a better path is available.

This is similar to exposing to a client an abstract TE topology with an uncommitted abstract TE link (i.e. TE link that does not have a committed TE tunnel supporting it and advertises potentiality). Once such link is provided, the provider is expected to send updates when/if the TE link attributes change. For uncommitted/potential TE link such updates could be provided based on event driven re-computation of the potentiality the TE link represents.
The point is that an uncommitted abstract TE link and COMPUTE_ONLY TE tunnel can represent (each in its own way) the same network potentiality

Cheers,
Igor



From: Dieter Beller [mailto:Dieter.Beller@nokia.com]
Sent: Friday, November 04, 2016 1:49 PM
To: Igor Bryskin
Cc: Leeyoung; Scharf, Michael (Nokia - DE); Daniele Ceccarelli; CCAMP (ccamp@ietf.org<mailto:ccamp@ietf.org>); pce@ietf.org<mailto:pce@ietf.org>; TEAS WG (teas@ietf.org<mailto:teas@ietf.org>); mpls@ietf.org<mailto:mpls@ietf.org>
Subject: Re: [mpls] http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00

Hi Igor,

could you please clarify how useful a stateful path without resource allocation is. I can't see the benefits of this use case.


Thanks,
Dieter
On 04.11.2016 14:25, Igor Bryskin wrote:
Hi Dieter,

A provider may compute path(s) for a TE tunnel, and then (without any resource allocation) may start monitoring/ensuring the path validity/optimality by re-computing them in an event driven manner. For example, it can trigger the re-computation of the path(s) when detecting a change in a state of a TE link the current path(s) are going through.  Depending on the results additional notifications may be sent to the client.

Note that this is in addition to the reasons you correctly identified for implementing stateful path computation (such as compute_and_reserve).

Cheers,
Igor


From: Beller, Dieter (Nokia - DE) [mailto:dieter.beller@nokia.com]
Sent: Thursday, November 03, 2016 6:27 PM
To: Leeyoung
Cc: Igor Bryskin; Scharf, Michael (Nokia - DE); Daniele Ceccarelli; CCAMP (ccamp@ietf.org<mailto:ccamp@ietf.org>); pce@ietf.org<mailto:pce@ietf.org>; TEAS WG (teas@ietf.org<mailto:teas@ietf.org>); mpls@ietf.org<mailto:mpls@ietf.org>
Subject: Re: [mpls] http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00


Hi all,



when we talk about the stateful path computation use case, it means IMHO that when a path has been calculated successfully in response to a request, a new path object is created in the data store. This does only make sense if the resources have been allocated in the TED of the PCE irrespective of the fact whether the connection along this path will be established right away or at a later point in time. This will prevent further path computation requests from assuming that the resources are still available. As the TED of the PCE also has to reflect the network state, I would assume that the network resources can be in one of the following three states: available, allocatedButNotInUse,  allocatedAndInUse. The path objects also need state information reflecting for example the alarm state of the allocated resources. The path calculated earlier may become (temporarily) invalid due to a link failure affecting the path.



Does this make sense?





Thanks,

Dieter



Sent from my tablet



Leeyoung <leeyoung@huawei.com><mailto:leeyoung@huawei.com> wrote:


Igor,

When you say "state", are you referring to the YANG datastore or some other "interim" state of those paths that are calculated but not instantiated as LSPs? If we were to update the YANG datastore for this, I would think that we may have some issue when the customer decided not to instantiate the TE tunnel (after the path compute request).

Thanks.
Young


From: Igor Bryskin
Sent: Thursday, November 03, 2016 3:02 PM
To: Leeyoung; Scharf, Michael (Nokia - DE); Daniele Ceccarelli; CCAMP (ccamp@ietf.org<mailto:ccamp@ietf.org>); pce@ietf.org<mailto:pce@ietf.org>; TEAS WG (teas@ietf.org<mailto:teas@ietf.org>); mpls@ietf.org<mailto:mpls@ietf.org>
Subject: RE: http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00

Young,

>From the provider controller point of view COMPUTE_ONLY TE tunnels will have exactly the same state as "normal" (COMPUTE_ADN_PROVISION) TE tunnels.

Igor

From: Leeyoung
Sent: Thursday, November 03, 2016 3:42 PM
To: Igor Bryskin; Scharf, Michael (Nokia - DE); Daniele Ceccarelli; CCAMP (ccamp@ietf.org<mailto:ccamp@ietf.org>); pce@ietf.org<mailto:pce@ietf.org>; TEAS WG (teas@ietf.org<mailto:teas@ietf.org>); mpls@ietf.org<mailto:mpls@ietf.org>
Subject: RE: http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00

Igor,

In such case, would the YANG datastore be updated? I guess not. If not, then the system/controller has to keep this interim state, would it?

Thanks.
Young

From: Igor Bryskin
Sent: Thursday, November 03, 2016 2:34 PM
To: Scharf, Michael (Nokia - DE); Leeyoung; Daniele Ceccarelli; CCAMP (ccamp@ietf.org<mailto:ccamp@ietf.org>); pce@ietf.org<mailto:pce@ietf.org>; TEAS WG (teas@ietf.org<mailto:teas@ietf.org>); mpls@ietf.org<mailto:mpls@ietf.org>
Subject: RE: http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00

Michael,
You are exactly right. The purpose of the "compute-only" TE tunnel is to create/maintain the normal TE tunnel state and (re-)compute TE paths for the TE tunnel connections/LSPs but not signal/provision the LSPs.

Igor

From: Scharf, Michael (Nokia - DE) [mailto:michael.scharf@nokia.com]
Sent: Thursday, November 03, 2016 3:17 PM
To: Leeyoung; Daniele Ceccarelli; Igor Bryskin; CCAMP (ccamp@ietf.org<mailto:ccamp@ietf.org>); pce@ietf.org<mailto:pce@ietf.org>; TEAS WG (teas@ietf.org<mailto:teas@ietf.org>); mpls@ietf.org<mailto:mpls@ietf.org>
Subject: RE: http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00

Isn't the intention of defining "compute-only tunnels" to create state in the controller, but not to signal them? If the tunnel should be signaled and resources shall be allocated, why not just configure a vanilla tunnel? Uses cases seem to exist for both variants, and both can be encoded in YANG. Is there anything I miss here?

Michael


From: Leeyoung [mailto:leeyoung@huawei.com]
Sent: Thursday, November 03, 2016 7:49 PM
To: Scharf, Michael (Nokia - DE); Daniele Ceccarelli; Igor Bryskin; CCAMP (ccamp@ietf.org<mailto:ccamp@ietf.org>); pce@ietf.org<mailto:pce@ietf.org>; TEAS WG (teas@ietf.org<mailto:teas@ietf.org>); mpls@ietf.org<mailto:mpls@ietf.org>
Subject: RE: http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00

Hi Michael,

I think I am with you on your point. If we use rpc, it is clear. On the other hand, if we were to use "stateful compute-only" it seems that the system/controller has to keep the state of the paths somewhere which is not YANG datastore. My understanding is that YANG datastore is updated only when the path is signaled and resource is allocated. Would this give the system/controller additional burden to keep the "interim" state?

Young

From: CCAMP [mailto:ccamp-bounces@ietf.org] On Behalf Of Scharf, Michael (Nokia - DE)
Sent: Thursday, November 03, 2016 8:58 AM
To: Daniele Ceccarelli; Igor Bryskin; CCAMP (ccamp@ietf.org<mailto:ccamp@ietf.org>); pce@ietf.org<mailto:pce@ietf.org>; TEAS WG (teas@ietf.org<mailto:teas@ietf.org>); mpls@ietf.org<mailto:mpls@ietf.org>
Subject: Re: [CCAMP] http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00

Maybe I miss something, but to me, the domain controller either computes a path stateless, which can be modeled in YANG in an RPC. Or the domain controller computes a path, stores state, and provides access to the result in the YANG datastore. In the latter case, whether resources are allocated, or whether the NEs get actually provisioned, is an orthogonal question.

As a side note, I am not sure of I would call a domain controller or an NMS a PCE. Path computation is only a subset of the functions of a domain controller.

Michael



From: Daniele Ceccarelli [mailto:daniele.ceccarelli@ericsson.com]
Sent: Thursday, November 03, 2016 2:49 PM
To: Scharf, Michael (Nokia - DE); Igor Bryskin; CCAMP (ccamp@ietf.org<mailto:ccamp@ietf.org>); pce@ietf.org<mailto:pce@ietf.org>; TEAS WG (teas@ietf.org<mailto:teas@ietf.org>); mpls@ietf.org<mailto:mpls@ietf.org>
Subject: RE: http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00

Can you please explain what the "stateful compute-only" stands for I don't understand what is stateful in a path computation request only.
IMHO either I ask the PCE (SDN controller, NMS, whatever) to compute a path and then forget about it or I ask to compute and provision it. I don't understand the value of asking for it and remembering about it.

BR
Daniele

From: Scharf, Michael (Nokia - DE) [mailto:michael.scharf@nokia.com]
Sent: giovedì 3 novembre 2016 14:45
To: Igor Bryskin <Igor.Bryskin@huawei.com<mailto:Igor.Bryskin@huawei.com>>; Daniele Ceccarelli <daniele.ceccarelli@ericsson.com<mailto:daniele.ceccarelli@ericsson.com>>; CCAMP (ccamp@ietf.org<mailto:ccamp@ietf.org>) <ccamp@ietf.org<mailto:ccamp@ietf.org>>; pce@ietf.org<mailto:pce@ietf.org>; TEAS WG (teas@ietf.org<mailto:teas@ietf.org>) <teas@ietf.org<mailto:teas@ietf.org>>; mpls@ietf.org<mailto:mpls@ietf.org>
Subject: RE: http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00

We have discussed this before. From an implementer's perspective, the two clean solutions to the problem seem to either stateful "compute-only" tunnels or a stateless RPC.

Michael


From: mpls [mailto:mpls-bounces@ietf.org] On Behalf Of Igor Bryskin
Sent: Thursday, November 03, 2016 2:34 PM
To: Daniele Ceccarelli; CCAMP (ccamp@ietf.org<mailto:ccamp@ietf.org>); pce@ietf.org<mailto:pce@ietf.org>; TEAS WG (teas@ietf.org<mailto:teas@ietf.org>); mpls@ietf.org<mailto:mpls@ietf.org>
Subject: [ALU] [mpls]http://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00

Hi,

>From the draft:

6.    YANG Model for requesting Path Computation


   Work on extending the TE Tunnel YANG model to support the need to
   request path computation has recently started also in the context of
   the [TE-TUNNEL<https://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00#ref-TE-TUNNEL>] draft.

   It is possible to request path computation by configuring a
   "compute-only" TE tunnel and retrieving the computed path(s) in the
   LSP(s) Record-Route Object (RRO) list as described in [TE-TUNNEL<https://tools.ietf.org/html/draft-busibel-teas-yang-path-computation-00#ref-TE-TUNNEL>].

   This is a stateful solution since the state of each created
   "compute-only" TE tunnel needs to be maintained and updated, when
   underlying network conditions change.

   The need also for a stateless solution, based on an RPC, has been
   recognized.


   The YANG model to support stateless RPC is for further study.





IB>> Please, note, that in the TE Tunnel model we consider the COMPUTE_AND_FORGET mode. We also consider the concept of path computation action to be defined under the TE tunnel node. All this is to facilitate stateless path computations.

Cheers,
Igor