Re: [mpls] working group last call ondraft-ietf-mpls-p2mp-sig-requirement-02.txt

Seisho Yasukawa <yasukawa.seisho@lab.ntt.co.jp> Tue, 07 June 2005 11:17 UTC

Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1Dfc55-0004bP-Gi; Tue, 07 Jun 2005 07:17:15 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DfXzY-0006MS-Fh for mpls@megatron.ietf.org; Tue, 07 Jun 2005 02:55:18 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA21593 for <mpls@ietf.org>; Tue, 7 Jun 2005 02:55:14 -0400 (EDT)
Received: from tama5.ecl.ntt.co.jp ([129.60.39.102]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DfYKV-0002kI-2g for mpls@ietf.org; Tue, 07 Jun 2005 03:16:58 -0400
Received: from vcs3.rdh.ecl.ntt.co.jp (vcs3.rdh.ecl.ntt.co.jp [129.60.39.110]) by tama5.ecl.ntt.co.jp (8.12.11/8.12.11) with ESMTP id j576s5Kw014922; Tue, 7 Jun 2005 15:54:05 +0900 (JST)
Received: from vcs3.rdh.ecl.ntt.co.jp (localhost [127.0.0.1]) by vcs3.rdh.ecl.ntt.co.jp (8.12.11/8.12.11) with ESMTP id j576s5cF016721; Tue, 7 Jun 2005 15:54:05 +0900 (JST)
Received: from mfs3.rdh.ecl.ntt.co.jp (mfs3.rdh.ecl.ntt.co.jp [129.60.39.112]) by vcs3.rdh.ecl.ntt.co.jp (8.12.11/8.12.11) with ESMTP id j576s4E3016714; Tue, 7 Jun 2005 15:54:04 +0900 (JST)
Received: from mfs3.rdh.ecl.ntt.co.jp (localhost [127.0.0.1]) by mfs3.rdh.ecl.ntt.co.jp (8.12.11/8.12.11) with ESMTP id j576s4Kv021875; Tue, 7 Jun 2005 15:54:04 +0900 (JST)
Received: from nttmail3.ecl.ntt.co.jp ([129.60.39.100]) by mfs3.rdh.ecl.ntt.co.jp (8.12.11/8.12.11) with ESMTP id j576s4uP021869; Tue, 7 Jun 2005 15:54:04 +0900 (JST)
Received: from eclscan3.m.ecl.ntt.co.jp (eclscan3.m.ecl.ntt.co.jp [129.60.5.69]) by nttmail3.ecl.ntt.co.jp (8.12.11/8.12.11) with ESMTP id j576s49R001159; Tue, 7 Jun 2005 15:54:04 +0900 (JST)
Received: from eclscan3.m.ecl.ntt.co.jp (localhost [127.0.0.1]) by eclscan3.m.ecl.ntt.co.jp (8.12.11/8.12.11) with ESMTP id j576s3Yk005214; Tue, 7 Jun 2005 15:54:03 +0900 (JST)
Received: from imc.m.ecl.ntt.co.jp (imc0.m.ecl.ntt.co.jp [129.60.5.141]) by eclscan3.m.ecl.ntt.co.jp (8.12.11/8.12.11) with ESMTP id j576s3CX005209; Tue, 7 Jun 2005 15:54:03 +0900 (JST)
Received: from WIN-BARRISTER.lab.ntt.co.jp by imc.m.ecl.ntt.co.jp (8.9.3p2/3.7W) with ESMTP id PAA27511; Tue, 7 Jun 2005 15:54:02 +0900 (JST)
Message-Id: <6.0.0.20.2.20050607155256.03a3ce68@imc.m.ecl.ntt.co.jp>
X-Sender: sy003@imc.m.ecl.ntt.co.jp
X-Mailer: QUALCOMM Windows Eudora Version 6J
Date: Tue, 07 Jun 2005 15:56:08 +0900
To: erosen@cisco.com, mpls@ietf.org
From: Seisho Yasukawa <yasukawa.seisho@lab.ntt.co.jp>
Subject: Re: [mpls] working group last call ondraft-ietf-mpls-p2mp-sig-requirement-02.txt
In-Reply-To: <200506021743.j52Hh3l6015520@rtp-core-1.cisco.com>
References: <Your message of Mon, 23 May 2005 13:42:36 +0200.<4291C1AC.2010507@pi.se> <200506021743.j52Hh3l6015520@rtp-core-1.cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Spam-Score: 0.0 (/)
X-Scan-Signature: b787d1992fb8a7f79e3b476be548ce51
Content-Transfer-Encoding: 7bit
X-Mailman-Approved-At: Tue, 07 Jun 2005 07:17:13 -0400
Cc:
X-BeenThere: mpls@lists.ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.lists.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@lists.ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/mpls>
List-Post: <mailto:mpls@lists.ietf.org>
List-Help: <mailto:mpls-request@lists.ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@lists.ietf.org?subject=subscribe>
Sender: mpls-bounces@lists.ietf.org
Errors-To: mpls-bounces@lists.ietf.org

Hi Eric,

Thank you for your detail comments.
We very much appreciate your continuous interest and support
of this draft.

 >Overall,  I think this is a  vast  improvement over last year's
 >version.

Thank you. I'm glad you think so.
Your input on the previous version was a great help.
And thanks to a sufficient discussion and inputs from
the community, we think we get stable requirements right now.

 >However, I still have a few issues with it.
 >
 >- The presumption that there is a low (indeed, very low) rate of churn
 >   seems to be essential to much of the document.  However, it is only
 >   mentioned in passing  towards  the  end.   As  this  is  a  major
 >   restriction  on the applicability of  the requirements, the presumption
 >   should  be stated near the front of the document; it should  be clear
 >   to anyone who has read only the introduction.  It  might be a good idea
 >   to mention  it in the abstract as well.

It is true that this requirement document assume solution to be tuned to
equip several important P2MP TE features such as FRR, Grafting/Pruning
rather than to be tuned to handle very high rate of churn of P2MP tree.
But we have no intention this requirement document to preclude a solution
and implementations to handle such a condition. We think it is up to
a solution and implementations whether to support high rate
(not so high as other technology) of churn of tree in addition to
support important P2MP TE features.

We also agree that discussion related to "rate of change of the tree" and
"rate of change of the network" is quite late in the document even though
we use almost a page in section 4.19.1.

We had taken it for granted that it is a fundamental part of the
application of Traffic Engineering that there is a low rate of churn
(whether low is actually very low, is subjective).

Nevertheless, there is no issue with highlighting this in the introduction
where we discuss some of the implications of Traffic Engineering.

We will make this change.

 >- There are a number of  references to requirements that are fully
 >   specified only in other documents, mostly from CCAMP.  The
 >   applicability of these is not necessarily obvious to those who don't
 >   follow CCAMP, e.g., crankback, hierarchy.
 >   I'd really  like to see this document  be more self-contained,
 >   so we have a better idea of what we are agreeing to even if we do
 >   not follow CCAMP.


I don't think that we should re-document any material that is present
in other I-Ds. Please note:

- The only requirements that specifically reference CCAMP work are
   in 4.21 and 4.23.
- Hierarchy is an MPLS WG draft and so we should be familiar with this.
- The requirements in this draft are applicable to MPLS TE and GMPLS,
    but we would not expect to re-document the requirements of FRR in
   case they were not familiar to the GMPLS community.
- It is better for everyone who is interested in MPLS TE to follow
   CCAMP.  For example, this is where inter-AS MPLS TE is being
   developed.


 > - There is some  stuff about non-IP payloads which, it  seems to me,
 >    clearly infringes upon  PWE3's scope.  The  stuff about non-IP
 >    payloads should be discussed with PWE3, and if  that stuff remains
 >    in the draft, then PWE3 needs to  review it.  However, since  PWE3
 >    has never  worked on multipoint PWs, I can imagine that this would
 >    be a very long discussion.


No. This discussion is intended to highlight that GMPLS includes
non-packet traffic types. It is not a discussion of carrying packetized
signals in pseudowires.


 > - The authors just can't resist putting in unnecessary plugs for
 >    RSVP-TE ;-)


We tried to remove them all, but maybe some slipped through.
Searching the document, I find one reference in 4.7 that can be removed.
Please note that the reference in section 5 is not an advertisement.
It is a warning!



 >Abstract
 >
 >    This document presents a set of requirements for the establishment
 >    and maintenance of Point-to-Multipoint (P2MP) Traffic Engineered (TE)
 >    Multiprotocol Label Switching (MPLS) Label Switched Paths (LSPs).
 >
 >    There is no intent to specify solution specific details nor
 >    application specific requirements in this document.
 >
 >    It is intended that the requirements presented in this document are
 >    not limited to the requirements of packet switched networks, but also
 >    encompass the requirements of Layer two Switching (L2SC), Time
 >    Division Multiplexing (TDM), lambda and port switching networks
 >    managed by Generalized MPLS (GMPLS) protocols. Protocol solutions
 >    developed to meet the requirements set out in this document must
 >    attempt to be equally applicable to MPLS and GMPLS.
 >
 >**** What is the  right group of people to review  this to determine
 >**** whether the  requirements  apply  to  all these  non-packet-switched
 >**** types of network?

The MPLS and CCAMP working groups have been invited to review the I-D.
And many of the authors are participants in both working groups.


 >**** This seems too vague and open-ended.


If you think "must attempt" is too vague and open-ended, please note
that this was said to cover the fact that it might turn out to be
impossible to have a single solution applicable to MPLS and GMPLS.


 >    [RFC2702] also explains how MPLS is particularly suited to traffic
 >    engineering, and presents the following eight reason.
 >
 >       1. Explicit label switched paths which are not constrained by
 >          the destination based forwarding paradigm can be easily
 >          created through manual administrative action or through
 >          automated action by the underlying protocols.
 >       2. LSPs can potentially be efficiently maintained.
 >       3. Traffic trunks can be instantiated and mapped onto LSPs.
 >
 >**** Applicability of this to P2MP is not obvious.


We can add an explanation at the end of the list (where we say that all of
the points are applicable).


 >    Note that there is a separation between routing and signaling in
 >    MPLS TE. In particular, the path of the MPLS TE LSP is determined by
 >    performing a constraint-based computation (such as CSPF) on a
 >    traffic engineering database (TED). The contents of the TED may be
 >    collected through a variety of mechanism - extensions to the IGPs
 >    are a popular mechanism for P2P MPLS TE.
 >
 >**** The last part of this sentence (following the dash might best be
 >**** omitted.)


Yes. Just because it is used widely, doesn't mean it is popular :-)


 >    A P2MP TE LSP will be set up with TE constraints and will allow
 >    efficient packet or data replication at various branching points in
 >    the network. Note that the notion of "efficient" packet replication
 >    is relative and may have different meanings depending on the
 >    objectives (see section 4.2).
 >
 >**** The notion of efficient packet replication is a data plane notion,
 >**** not a signaling  notion.  The document purports to  be setting
 >**** requirements only on  the control plane mechanisms
 >**** ("signaling requirements"), yet clearly there are some requirements
 >**** on  the data plane as well. This is an issue of scope that really
 >**** needs to be clarified.


If there are different data plane efficiencies and objectives
(I think this is always a case with TE), it is the responsiblity of the
control plane (signaling) to install the LSP so that the service
requirements are met.
For example, a common "efficiency" dictates that only one copy of any
packet flows down any link. This can be seen as an issue of efficient
packet replication - the packet must be replicated at the branch point
not further up the tree.


 >1.1 Non-Objectives
 >
 >**** This section  seems to talk about mechanisms rather than
 >**** requirements.(It seems like it might have been cut and pasted
 >**** from a solutions doc.)


No, it was written specially to address your concerns in a previous
review. If it seems to concentrate on mechansims, this may be because
mechanisms are out of scope, and this section lists the items that
are out of scope.



 >    P2MP-ID (Pid):
 >
 >**** "Pid" has another meaning, not the best acronym here.


Agreed.
Would P2ID be OK?


 >    This document does not restrict the choice of signaling protocol
 >    used to set up a P2MP TE LSP, but it should be noted that [RFC3468]
 >    states
 >      ... the consensus reached by the Multiprotocol Label Switching
 >    (MPLS) Working Group within the IETF to focus its efforts on
 >    "Resource Reservation Protocol (RSVP)-TE: Extensions to RSVP for
 >    Label-Switched Paths (LSP) Tunnels" (RFC 3209) as the MPLS signaling
 >    protocol for traffic engineering applications...
 >
 >**** This statement does not seem to be within the scope of this
 >**** document.


It is very strongly our opinion that this document should not restrict
the choice of signaling protocol.


 >    The P2MP TE LSP setup mechanism MUST include the ability to
 >    add/remove egress LSRs to/from an existing P2MP TE LSP and MUST
 >    allow for the support of all the TE LSP management procedures
 >    already defined for P2P TE LSP such as the non disruptive rerouting
 >    (the so called "Make before break" procedure).
 >
 >**** I  don't  see the  point  of  requiring support  for  "ALL  the TE
 >**** LSP management procedures  already defined for P2P", and  then
 >**** mentioning a single  example of  one.  It's  also not  clear what
 >****  "already defined" means or will be taken to mean  years from now
 >**** when folks read the RFC.
 >**** I'd say  either explicitly list the  things for which  support is
 >**** being required, or reference specific RFCs.


You make a good point, but inclusive lists are notoriously hard to
achieve. (Perhaps they require extra thought by the authors.)

If you would like to suggest a list we will see if we can include it.
Otherwise we suggest to change the text to read...


      and MUST
      allow for the support of all the TE LSP management procedures
      already defined for P2P TE LSP. Further, when new TE LSP procedures
      are developed for P2P TE LSPs equivalent or identical procedures
      SHOULD be developed for P2MP TE LSPs.


 >4.1 P2MP LSP tunnels
 >
 >    The P2MP TE extensions MUST be applicable to the signaling of LSPs
 >    of different traffic types. For example, it MUST be possible to
 >    signal a P2MP TE LSP to carry any kind of payload being packet or
 >    non-packet based (including frame, cell, TDM un/structured, etc.)
 >
 >**** I don't understand what is being required here.
 >**** As  far  as  I  know,  these  non-packet things  are  carried  by
 >**** PWE3 pseudowires, and  there hasn't  been much work  on multipoint
 >**** PWs. Is direct  MPLS   encapsulation  (no  PWE3)  of   non-packet
 >**** stuff being envisioned?  I don't see why that should be required.
 >**** Perhaps this requirement infringes upon the scope of the PWE3 group.


As above. GMPLS (non-packet) LSPs carry non-packet traffic types.
We will try to tidy up this text.


 >    One example is the Steiner P2MP tree (Cost minimum P2MP tree)
 >    [STEINER]. This P2MP tree is suitable for constructing a cost
 >    minimum P2MP tree so as to minimize the bandwidth consumption in
 >    the core. To realize this P2MP tree, several intermediate LSRs must
 >    be both MPLS data terminating LSRs and transit LSRs (LSRs E, F, G,
 >    H, I, J and K in the figure 4). This means that the LSRs must
 >    perform both label swapping and popping at the same time. Therefore,
 >    the P2MP TE solution MUST support a mechanism that can setup this
 >    kind of bud LSR between an ingress LSR and egress LSRs. Note that
 >    this includes constrained Steiner trees that allow for the
 >    computation of a minimal cost trees with some other constraints such
 >    as a bounded delay between the source and every receiver.
 >
 >**** It seems to me that this  is not a signaling requirement (or not
 >**** merely a signaling requirement) but also a requirement on the data
 >**** plane.


Yes, there is a requirement on the data plane if this type of tree (with
buds) is to be supported. Another requirement on the data plane is that it
supports MPLS labels.

We could probably safely remove the statement that support of buds
"...means that the LSRs must perform both label swapping and popping at
the same time" because there are other possible ways of achieving this in
the data plane. The principal requirement remains, as stated here, that
there is a requirement on the control plane to be able to signal LSPs that
have buds. Clearly, this would only be used when the data plane supports
buds.


 >4.3 Explicit Path Loose Hops and Widely Scoped Abstract Nodes
 >
 >    A P2MP tree is completely specified if all of the required branches
 >    and hops between a sender and leaf LSR are indicated.
 >
 >    A P2MP tree is partially specified if only a subset of intermediate
 >    branches and hops are indicated. This may be achieved using loose
 >    hops in the explicit path, or using widely scoped abstract nodes
 >    such as IPv4 prefixes shorter than 32 bits, or AS numbers.
 >
 >**** I  think the  notion  of "widely  scoped  abstract nodes"  needs to
 >**** be defined and explicated.


OK. Do you feel that the examples of IPv4 prefixes shorter than 32 bits
and AS numbers are unclear, or you feel that we should give a more precise
definition or a reference to RFC3209?


 >    Protocol solutions MUST allow the P2MP tree to be completely
 >    specified at the ingress where sufficient information exists to
 >    allow the full tree to be computed.
 >
 >**** The usefulness  of complete specification  at the ingress  depends
 >**** both upon the  presence of  sufficient information and  on the
 >**** existence of suitable policies along the path.


Agreed.


 >    In all cases, the egress nodes of the P2MP TE LSP must be fully
 >    specified.
 >
 >**** Why?

We will clarify. I assume you have in mind a TE LSP that targets a group
address.

 >    In case of a tree being computed by some downstream LSRs (e.g. the
 >    case of hops specified as loose hops), the solution MUST provide
 >    the ability for the ingress LSR of the P2MP TE LSP to learn the full
 >    P2MP tree. Note that this requirement MAY be relaxed in some
 >    environments (e.g. Inter-AS) where confidentiality must be
 >    preserved.
 >
 >**** I think that what paragraph is  trying to say is that the solution
 >**** MUST provide protocol to enable the  ingress to learn the full
 >**** specification of the tree, but that this information may not always
 >**** be obtainable due to  policy  considerations.   But  then  perhaps
 >**** it  should  pose some requirement as to what happens in  cases where
 >**** some of the path remains confidential.


Yes, your interpretation is correct, and your wording is helpful.

We will add a note that where part of the path remains confidential it
MUST be reported through aggregation (for example, using an AS number).


 >4.4 P2MP TE LSP establishment, teardown, and modification mechanisms
 >
 >    The P2MP TE solution MUST support establishment, maintenance and
 >    teardown of P2MP TE LSPs in a scalable manner. This MUST include
 >    both the existence of very many LSPs at once, and the existence of
 >    very many destinations for a single P2MP LSP.
 >
 >**** This would  seem to  preclude any mechanism  in which add/removes
 >**** of a leaf  requires a  message  to be  sent  to the  ingress.
 >**** Is that the intention?  Or  is the "no churn"  presumption supposed
 >**** to rule out of scope any conditions under which this is not scalable?


Actually the presumption is for linear scalability.
However, if certain mechanisms are precluded by this requirement, then
that is the point exposing the requirement.

 >    In addition to P2MP TE LSP establishment and teardown mechanism, it
 >    SHOULD implement partial P2MP tree modification mechanism.
 >
 >**** I  don't  believe  that   the  term  "partial  P2MP  tree
 >**** modification mechanism" has been defined yet.


Section 2.2.1 describes partial P2MP trees.


 >    For the purpose of adding sub-P2MP TE LSPs to an existing P2MP TE
 >    LSP, the extensions SHOULD support a grafting mechanism. For the
 >    purpose of deleting a sub-P2MP TE LSPs from an existing P2MP TE LSP,
 >    the extensions SHOULD support a pruning mechanism.
 >
 >    It is RECOMMENDED that these grafting and pruning operations do not
 >    cause any additional processing in nodes except along the path to
 >    the grafting and pruning node and its downstream nodes. Moreover,
 >    both grafting and pruning operations MUST not be traffic disruptive
 >    for the traffic currently forwarded along the P2MP tree.
 >
 >**** I'm  having a little  trouble putting  together "scalable  grafting
 >**** and pruning" with "explicit routing".


Yes, this is a complex subject. There is no assumption that the explicitly
routed P2MP LSP remains on an optimal path after several grafts and prunes
have occurred. Scalable refers to the signaling process within the context
of the P2MP TE LSP. The TE nature of the LSP allows that re-optimization
may take place from time to time.



 >4.5 Fragmentation
 >
 >    The P2MP TE solution MUST handle the situation where a single
 >    protocol message cannot contain all of the information necessary to
 >    signal the establishment of the P2MP LSP. It MUST be possible to
 >    establish the LSP in these circumstances.
 >
 >    This situation may arise in either of the following circumstances.
 >      a. The ingress LSR cannot signal the whole tree in a single
 >         message.
 >
 >      b. The information in a message expands to be too large (or is
 >         discovered to be too large) at some transit node. This may
 >         occur because of some increase in the information that needs
 >         to be signaled or because of a reduction in the size of
 >         signaling message that is supported.
 >
 >    The solution to these problems SHOULD NOT rely on IP fragmentation,
 >    it is RECOMMENDED to rely on some protocol procedures specific to
 >    the signaling solution.
 >
 >    It is NOT RECOMMENDED that fragmented protocol messages are
 >    re-combined at any downstream LSR.
 >
 >**** The term  is "reassembled", not  "recombined".  If IP  fragmentation
 >**** of protocol messages is  allowed, it hardly makes sense  to recommend
 >**** that the fragments not be reassembled!
 >**** I think  what this section is trying  to do is to  prohibit the
 >**** control messages from ever being fragmented, instead requiring that the
 >**** control protocol always generate messages that  will not need to be
 >**** fragmented.
 >**** If so, that should be made clear.  However, it's not completely
 >**** obvious to me that this requirement can be met in all environments.


Yes. Thank you for the clarifying words.
This requirement follows the requirements expressed in RFC3209. In
particular, it notes the problems for a protocol when one of the IP
fragments is lost.


 >**** With regard to the  recommendation that there be some
 >**** protocol-specific procedure  to allow  arbitrarily  large control
 >**** messages without ever incurring  IP  fragmentation, I  wonder  if
 >**** this is all really just infringing on the solution space.


Yes. it is very close.
Perhaps we can rephrase this requirement in terms of absolute requirements
without thinking about the solution.


 >    Note that application-specific requirement documents may introduce
 >    even more stringent requirement, such as no packet loss, as a
 >    trade-off for the relaxation of other requirements, such as increased
 >    bandwidth consumption.
 >
 >**** I  don't  understand whether  the  solution  is  supposed to  meet
 >**** the unspecified  requirements  of  future application-specific
 >**** requirement documents or  not.  If not,  why mention it?
 >****  But then does  that mean that  different  applications  are  going
 >****  to  end  up  with different solutions?

We will clarify.
The intention is to indicate that the requirements expressed here are
general and that the solution that meets them will therefore be general.
Specific applications may have more additional requirements or may want to
relax some other requirements. this may lead to variations in the
solution.

 >    The solution SHOULD also support the ability to meet other network
 >    recovery requirements such as bandwidth protection and bounded
 >    propagation delay increase along the backup path during failure.
 >
 >    A P2MP TE solution MUST support P2MP fast protection mechanism to
 >    handle P2MP applications sensitive to traffic disruption.
 >
 >    The report of the failure of delivery to fewer than all of the
 >
 >**** Report?  What report?

Any report.

We will tidy the text. We cannot say "failure to deliver" because it is
the knowledge that we have failed to delliver that is important.


 >    egress nodes SHOULD NOT cause automatic teardown of the P2MP TE LSP.
 >    That is, while some egress nodes remain connected to the P2MP tree
 >    it should be a matter of local policy at the ingress whether the
 >    P2MP LSP is retained.
 >
 >**** That would  be some  protocol that stopped  an entire  multicast
 >**** stream because one egress goes down!


No. That would be a local policy that determined whether the service was
to deliver to a certain percentage of the intended recipients. This is why
the text says "SHOULD NOT cause automatic teardown" etc.


Note that the final "should" should be "SHOULD".


 >    When all egress nodes downstream of a branch node have become
 >    disconnected from the P2MP tree, and the some branch node is unable
 >    to restore connectivity to any of them by means of some recovery or
 >    protection mechanisms, the branch node MAY remove itself from the
 >    P2MP tree provided that it is not also an egress LSR. Since the
 >    faults that severed the various downstream egress nodes from the
 >    P2MP tree may be disparate, the branch node MUST report all such
 >    errors to its upstream neighbor. The ingress node can then decide
 >    to re-compute the path to those particular egress nodes, around the
 >    failure point.
 >
 >**** I  don't  understand just  what  is  being  required here.   Any
 >**** fault anywhere downstream  is supposed to  be reported to the
 >**** ingress? That seems to have scaling problems.

Nevertheless, this is in inherrant in TE. There may be a choice to be made
when deciding whether to deploy TE, but that is out of scope.


 >4.7 Record route of P2MP TE LSP tunnels
 >
 >    Being able to identify the established topology of P2MP TE LSP is
 >    very important for various purposes such as management and operation
 >    of some local recovery mechanisms like Fast Reroute [FRR]. A network
 >    operator uses this information to manage P2MP TE LSPs. Therefore,
 >    topology information MUST be collected and updated after P2MP TE LSP
 >    establishment and modification process.
 >
 >    The P2MP TE solution MUST support a mechanism which can collect and
 >    update P2MP tree topology information after P2MP LSP establishment
 >    and modification process. For example, the P2P MPLS TE mechanism of
 >    route recording could be extended and used if RSVP-TE was used as
 >    the P2MP signaling protocol.
 >
 >**** There's  a big  difference between  saying that  topology info  MUST
 >**** be collected and saying  that the solution MUST support  a mechanism
 >**** which can collect  topology information.  Which  is intended?  How  does
 >**** this interact with a  previous requirement stating some of  the topology
 >**** may be confidential?   Fragmentation and scaling issues  also seem
 >**** relevant here.


The intent is to say that the solution MUST include a mechanism to gather
and report the topology of the tree.

The confidentiality issue is handled in the note at the top of this email.

Fragmentation and scaling issues are indeed a concern and the solution
should address them. We can add this point.


 >    It is RECOMMENDED that the information is collected in a data format
 >    by which the sender node can recognize the P2MP tree topology
 >    without involving some complicated data calculation process.
 >
 >**** I'm not sure this is an objective requirement.  I'd hate to have the
 >**** WG deciding whether some calculation process is "complicated" or not.


:-)

We will rephrase.


 >4.12 Data Duplication
 >
 >    Data duplication refers to the receipt by any recipient of duplicate
 >    instances of the data. In a packet environment this means the
 >    receipt of duplicate packets - although this should be a benign (if
 >    inefficient) situation, it may be catastrophic in certain existing
 >    and deployed applications.
 >
 >**** It's hard to see how  duplication is both benign and catastrophic.
 >**** The suggestion here is that a benign situation is turned into a
 >**** catastrophe by  stupid applications.   But  I don't  think  that the
 >**** long-standing duplication of  a multicast  stream is just  benign;
 >**** it could  be quite damaging to the endsystems, no matter what the
 >**** application.


It is not suggested that it is both benign and catastrophic. It is
suggested that it should be benign, but may be catastrophic. It is not our
intention to be judgmental about any applications, simply to report on the
consequences.

You are correct that we should draw a distinction between the duplication
of a few packets (which can still wreck some applications) and long-term
duplication which may be damaging if for no other reason than it causes
additional pressures on throughput.


 >    Instead, the solution:
 >    - SHOULD limit to transitory conditions only the cases where
 >      network bandwidth is wasted by the existence of duplicate
 >      delivery paths.
 >    - MUST limit the cases of delivery of duplicate data to an
 >      application to error cases or rare transitory conditions.
 >
 >**** Limit duplication to error cases?  What does that mean exactly?


We cannot regulate against error cases.


 >**** Whether  a  transitory  condition  is  "rare"  or  not  is
 >**** notoriously difficult  to predict.   It might  be  better to
 >**** say that duplication should only occur in transitory  conditions
 >**** and only if the duration of the transitory condition can be
 >**** suitably bounded.


Agreed.


 >4.13 IPv4/IPv6 support
 >
 >    Any P2MP TE solution MUST be equally applicable to IPv4 and IPv6.
 >
 >**** It might be  better just to say that any P2MP  TE solution MUST
 >**** support both IPv4 and  IPv6.  I don't like the term
 >**** "equally applicable", if a solution supports  v4 and v6
 >****  I don't want  to have to ask  whether the
 >****  solution is also "equally applicable" to each of them.


Yes.


 >4.14 P2MP MPLS Label
 >
 >    A P2MP TE solution MUST support establishment of both P2P and P2MP
 >    TE LSPs and MUST NOT impede the operation of P2P TE LSPs within the
 >    same network.
 >
 >**** This could  be interpreted as meaning  that P2P TE  LSPs get
 >**** preference for the bandwidth.  I don't think that is what is meant.


Agreed.


 >    A P2MP TE solution MUST be specified in such a way
 >    that it allows P2MP and P2P TE LSPs to be signaled on the same
 >    interface. Labels for P2MP TE LSPs and P2P TE LSPs MAY be assigned
 >    from shared or dedicated label space(s). Label space shareability is
 >    implementation specific.
 >
 >**** I would  strike the last  two sentences.  They  may end up  coming
 >**** into conflict with  the two recent  drafts on MPLS multicast
 >**** codepoints and upstream-assigned labels.  The  issues of multicast/
 >**** unicast codepoints, label spaces, etc.,  are really left up to
 >**** the solutions. Whether they are implementation-specific  is a
 >**** solutions issue, not  a requirements issue.


The two recent drafts on MPLS multicast do not mention TE.
Nevertheless, there seems to be no great need to make this point and we
can drop it if that makes people more comfortable.


 >4.15 Routing advertisement of P2MP capability
 >
 >    Several high-level requirements have been identified to determine
 >    the capabilities of LSRs within a P2MP network. The aim of such
 >    information is to facilitate the computation of P2MP trees using TE
 >    constraints within a network that contains LSRs that do not all have
 >    the same capabilities levels with respect to P2MP signaling and data
 >    forwarding.
 >
 >    These capabilities include, but are not limited to:
 >
 >    - the ability of an LSR to support branching.
 >    - the ability of an LSR to act as an egress and a branch for the
 >      same LSP.
 >    - the ability of an LSR to support P2MP MPLS-TE signaling.
 >
 >    It is expected that it may be appropriate to gather this information
 >    through extensions to TE IGPs (see [RFC3630] and [IS-IS-TE]), but
 >    the precise requirements and mechanisms are out of the scope of this
 >    document. It is expected that a separate document will cover this
 >    requirement.
 >
 >**** I  don't like when  a document  says, "we  don't require  X, but  it
 >**** is expected  that  X will  be  required  by  some other  document".
 >**** This paragraph should just be stricken.


Agreed. This implies a preference for a particular solution and should not
be present.


 >4.16 Multi-Area/AS LSP
 >
 >    P2MP TE solutions SHOULD support multi-area/AS P2MP TE LSPs.
 >
 >    The precise requirements in support of multi-area/AS P2MP TE LSPs is
 >    out of the scope of this document. It is expected that a separate
 >    document will cover this requirement.
 >
 >**** Again, it makes no sense to say that the solutions are required to
 >**** meet some requirements which are going to be specified in some
 >**** document that doesn't exist yet.  This section is out of scope
 >**** and should be stricken.


Yes. You make a good point.
We came under strong pressure to say something about multi-area and
multi-AS support because this is of great interest to several people at
the moment. But this is a non-objective and should be removed.


 >4.17 Multi-access LANs
 >
 >    P2MP MPLS TE may be used to traverse network segments that are
 >    provided by multi-access media such as Ethernet. In these cases, it
 >    is also possible that the entry point to the network segment is a
 >    branch point of the P2MP LSP.
 >
 >    Two options clearly exist:
 >
 >     - the branch point replicates the data and transmits multiple
 >       copies onto the segment
 >     - the branch point sends a single copy of the data to the segment
 >       and relies on the exit points to discriminate the reception of
 >       the data.
 >
 >    The first option has a significant scaling issue since all
 >    replicated data must be sent through the same port and carried on
 >    the same segment. Thus, a solution SHOULD provide a mechanism for a
 >    branch node to send a single copy of the data onto a multi-access
 >    network and reach multiple (adjacent) downstream nodes.
 >
 >**** The second option also has  scaling issues, of course.  In addition,
 >**** it has some label distribution issues.


Yes. The issues for the second option are control plane rather than data
link issues. We will add a note.


 >4.18 P2MP MPLS OAM
 >
 >    Management of P2MP LSPs is as important as the management of P2P
 >    LSPs.
 >
 >**** This sentence has no real content and should be stricken.


Does it do any harm?


 >4.19 Scalability
 >
 >    Scalability is a key requirement in P2MP MPLS systems. Solutions
 >    MUST be designed to scale well with an increase in the number of any
 >    of the following:
 >
 >    - the number of recipients
 >    - the number of branch points
 >    - the number of branches.
 >
 >    Both scalability of performance and operation MUST be considered.
 >
 >**** I think I know what "performance" is, but what is "operation"?


We will clarify.


 >    Key considerations MUST include:
 >    - the amount of refresh processing associated with maintaining
 >      a P2MP TE LSP.
 >    - the amount of protocol state that must be maintained by ingress
 >      and transit LSRs along a P2MP tree.
 >    - the number of protocol messages required to set up or tear down a
 >      P2MP LSP as a function of the number of egress LSRs.
 >    - the number of protocol messages required to repair a P2MP LSP
 >      after failure or perform make-before-break.
 >    - the amount of protocol information transmitted to manage
 >      a P2MP TE LSP (i.e. the message size).
 >    - the amount of potential routing extensions.
 >
 >**** I think  this should be  the "number" of potential  routing
 >**** extensions, but I'm not really sure what is meant here.


It is meant to be quantative, but a simple count of the number of
extensions. One new TLV in the TE opaque LSA is only one extension, but if
it carries 10,000 bytes for each TE link it is going to be a problem.

We will attempt to clarify.


 >4.19.1 Absolute Limits
 >
 >    In order to achieve the best solution for the problem space it is
 >    helpful to clarify the boundaries for P2MP TE LSPs.
 >
 >    - Number of recipients.
 >      A P2MP TE LSP MUST reduce to similar scaling properties as a P2P
 >      LSP when the number of recipients reduces to one.
 >
 >**** I don't see why.  Frankly, who cares about the case of  a P2MP LSP
 >**** with one recipient?


I think many people will care.
But this is not the point. The intention is to describe the limiting bound
on the scaling.


 >      It is important to classify the problem as a Traffic Engineering
 >      problem.
 >
 >**** I don't  understand.  What problem?   Why is it important  "to
 >**** classify the problem"?
 >
 >      It is anticipated that the initial deployments of P2MP TE
 >      LSPs will be limited to a maximum of around a hundred recipients,
 >      but that medium term deployments may increase this to several
 >      hundred, and that future deployments may require significantly
 >      larger numbers.
 >
 >      An acceptable solution, therefore, is one that scales linearly
 >      with the number of recipients.
 >
 >**** If you don't  do any P2MP stuff at all, but  have the ingress
 >**** replicate everything  and do  one P2P  tunnel per  receipient,
 >**** then  doesn't that scale linearly with the number of recipients?
 >**** Generally you want your multicast-specific stuff to scale much
 >**** better than that.


This sets a top bound.
You are right that a target is better than linear in typical network
topologies.
We will add text.


 >      Solutions that scale worse than linear (that is, exponential or
 >      polynomial) are not acceptable whatever the number of recipients
 >      they could support
 >
 >**** missing text?


Missing period.


 >    - Number of branch points.
 >      Solutions MUST support all possibilities from one extreme of a
 >      single branch point that forks to all leaves on a separate branch,
 >      to the greatest number of branch points which is (n-1) for n
 >      recipients. Assumptions MUST NOT be made in the solution regarding
 >      which topology is more common, and the solution MUST be designed
 >      to ensure scalability in all topologies.
 >
 >**** Is this saying  that the scalability must be  independent of the
 >**** number of  branch points?  Given  the need  to replicate  the packet
 >**** for each branch point, that seems unlikely.  (The number of packet
 >**** transmissions scales better with more branch points, for example.)


Recall that this is a signaling requirements draft, and not data plane
requirements.
It says that the solution (i.e. the signaling) must scale well in all
branching scenarios. Since the branching scenario is a function of the
path computation algorithm and constraints, control of the branch points
is outside the control of the signaling protocol.


 >    - Dynamics of P2MP tree.
 >      Recall that the mechanisms for determining which recipients should
 >      be added to an LSP, and for adding and removing recipients from
 >      that group are out of the scope of this document. Nevertheless, it
 >      is useful to understand the expected rates of arrival and
 >      departure of recipients since this can impact the selection of
 >      solution techniques.
 >      Again, it must be recalled that this document is limited to
 >      Traffic Engineering, and in this model the rate of change of
 >      recipients may be expected to be lower than in an IP multicast
 >      group.
 >
 >**** I'd like  to see  an explanation of  this point.   I wonder if  this
 >**** is anything more than a tautology, in the  sense that if you have a
 >**** lot of churn traffic engineering is too inefficient to use.


This is correct some case. Although it can be seen the other way around
as well. For example, you do not typically have a high rate of churn in
VPN sites.
And I do not think TE is inefficient for a lot of churn traffic because
I could assume some SPs would introduce P2MP TE within a backbone area
to stabilize the network by terminating such a churn at the area boundary
with expecting enough Bandwidth in the backbone.

 >**** This is rather late in the document  to be saying, "by the way, none
 >**** of these requirements apply in some  of the most common cases of
 >**** multicast use".


We were requested to remove all comparisons with IP multicast.
I think it is widely understood that core Traffic Engineering is not
applicable to individual IP flows, but we will highlight this point in the
Introduction.


 >      Although the absolute number of recipients coming and going is the
 >      important element for determining the scalability of a solution,
 >      it may be noted that a percentage may be a more comprehensible
 >      measure but that this is not as significant for LSPs with a small
 >      number of recipients.
 >      A working figure for an established P2MP TE LSP is less than 10%
 >      churn per day. That is, a relatively slow rate of churn.
 >      We could say that a P2MP LSP would be shared by multiple multicast
 >      groups and dynamics of P2MP LSP would be relatively small.
 >      Considering applicability that P2MP LSP to use L2 multi-access
 >      path technology, we can consider stable P2MP L2 path even when we
 >      transfer IP multicast traffic over the path.
 >
 >      Solutions MUST optimize around such relatively low rates of change
 >      and are NOT REQUIRED to optimize for significantly higher rates
 >      of change.
 >
 >**** In light of this, I think  that "low rate of churn" should be
 >**** mentioned at the front of the document  as one of the fundamental
 >**** assumptions for traffic  engineering.   This  would   then  provide
 >**** some  context for statements like "there  has to be a scalable
 >**** method for adding/pruning receivers", which otherwise seem questionable.

I agreed to incorporate some text to explain our optimization policy
(we are much interested in optimizing solution to have important
P2MP TE features and not interested in optimizing solution to handle
high rate churn traffic at the price of decreasing these feature)
the front of the document. See top of this email.


 >4.21 GMPLS
 >
 >    The requirement for P2MP services for non-packet switch interfaces
 >    is similar to that for PSC interfaces. Therefore, it is a requirement
 >
 >**** This is  the first occurrence  of the term  "PSC" in this  document.I
 >**** wonder what it means.


"PSC" stands for Packet-Switch Capable.


 >    that reasonable attempts must be made to make all the features/
 >    mechanisms (and protocol extensions) that will be defined to provide
 >    MPLS P2MP TE LSPs equally applicable to P2MP PSC and non-PSC TE-LSPs.
 >    If the requirements of non-PSC networks over-complicate the PSC
 >    solution a decision may be taken to separate the solutions. This
 >    decision must be taken in full consultation with the MPLS and CCAMP
 >    working groups.
 >
 >**** Requirements on  the decision making  process are out of  scope,
 >**** aren't they?


We can remove this text if you like.
Looking at our notes, it was added becuase of a comment you made in your
previous review.


Eric> For all
Eric> I know,  GMPLS might introduce  a variety of  additional
Eric> complications that aren't necessary in MPLS.  If this is so,
Eric> I would not necessarily support using the same solution in
Eric> both cases.


We have added text to indicate that this separation may be necessary, and
also to describe the process needed to make the separation.


 >4.22 Requirements for Hierarchical P2MP TE LSPs
 >
 >    [LSP-HIER] defines concepts and procedures for P2P LSP hierarchy.
 >
 >    The P2MP MPLS-TE solution SHOULD support the concept of region and
 >    region hierarchy (PSC1<PSC2<PSC3<PSC4<L2SC<TDM<LSC<FSC).
 >
 >    Particularly it SHOULD allow a Region i P2MP TE LSP to be nested
 >    into a region j P2MP TE LSP or multiple region j P2P TE LSPs,
 >    providing that i<j.
 >
 >    The precise requirements and mechanisms for this function are out of
 >    the scope of this document. It is expected that a separate document
 >    will cover these requirements.
 >
 >**** I think  this section  should be removed,  as it  provides
 >**** insufficient information to determine what the requirements are.
 >**** You can't put in a requirement saying  that the solution  must meet
 >**** the  requirements that are to be specified in some other document
 >****  which is forthcoming.


Agreed to defer the discussion of this requirement if other also want to
remove it.


 >4.23 P2MP Crankback routing
 >
 >    P2MP solutions SHOULD support crankback requirements as defined in
 >    [CRANKBACK]. In particular, they SHOULD provide sufficient
 >    information to a branch LSR from downstream LSRs to allow the branch
 >    LSR to re-route a sub-tree around any failures or problems in the
 >    network.
 >
 >**** I think  this section  either needs to  be omitted  or else made  a
 >**** lotlonger.


There doesn't seem to be anything else to say unless we repeat the
(protocol independent) requirements from another I-D.


Thank you once again for spending time and supporting this I-D. We will
include your ideas in a new revision when the last call completes.


Best Regards,
Seisho 


_______________________________________________
mpls mailing list
mpls@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/mpls