Re: [mpls] Scalability of the "effective FRR" approach in draft-kini-mpls-ring-frr-facility-backup-00.txt
"Eric Osborne (eosborne)" <eosborne@cisco.com> Tue, 27 July 2010 09:18 UTC
Return-Path: <eosborne@cisco.com>
X-Original-To: mpls@core3.amsl.com
Delivered-To: mpls@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 26D963A6BB7 for <mpls@core3.amsl.com>; Tue, 27 Jul 2010 02:18:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ByT-yx3PRq6s for <mpls@core3.amsl.com>; Tue, 27 Jul 2010 02:18:20 -0700 (PDT)
Received: from rtp-iport-1.cisco.com (rtp-iport-1.cisco.com [64.102.122.148]) by core3.amsl.com (Postfix) with ESMTP id 319853A6BB3 for <mpls@ietf.org>; Tue, 27 Jul 2010 02:17:58 -0700 (PDT)
Authentication-Results: rtp-iport-1.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEAGNBTkytJV2a/2dsb2JhbACfZXGlIptMhTYEhAmHGQwB
X-IronPort-AV: E=Sophos;i="4.55,267,1278288000"; d="scan'208";a="139611295"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by rtp-iport-1.cisco.com with ESMTP; 27 Jul 2010 09:18:19 +0000
Received: from xbh-rcd-302.cisco.com (xbh-rcd-302.cisco.com [72.163.63.9]) by rcdn-core-3.cisco.com (8.14.3/8.14.3) with ESMTP id o6R9IJxx029916; Tue, 27 Jul 2010 09:18:19 GMT
Received: from xmb-rcd-202.cisco.com ([72.163.62.209]) by xbh-rcd-302.cisco.com with Microsoft SMTPSVC(6.0.3790.4675); Tue, 27 Jul 2010 04:18:19 -0500
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable
Date: Tue, 27 Jul 2010 04:18:16 -0500
Message-ID: <D29E470202D67745B61059870F433B5402511689@XMB-RCD-202.cisco.com>
In-Reply-To: <5A5E55DF96F73844AF7DFB0F48721F0F567DB80E8F@EUSAACMS0703.eamcs.ericsson.se>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [mpls] Scalability of the "effective FRR" approach in draft-kini-mpls-ring-frr-facility-backup-00.txt
Thread-Index: Acss451Rwl5jkjLdTWWmLbBSEMenUAAAJKaAABzm8kAAAGaFoAAB6yoAAADgilAAAUKywA==
References: <D29E470202D67745B61059870F433B5402511686@XMB-RCD-202.cisco.com> <5A5E55DF96F73844AF7DFB0F48721F0F567DB80E8F@EUSAACMS0703.eamcs.ericsson.se>
From: "Eric Osborne (eosborne)" <eosborne@cisco.com>
To: Sriganesh Kini <sriganesh.kini@ericsson.com>, Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
X-OriginalArrivalTime: 27 Jul 2010 09:18:19.0347 (UTC) FILETIME=[A71AF230:01CB2D6C]
Cc: mpls@ietf.org
Subject: Re: [mpls] Scalability of the "effective FRR" approach in draft-kini-mpls-ring-frr-facility-backup-00.txt
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Jul 2010 09:18:28 -0000
Inline with EO# > -----Original Message----- > From: Sriganesh Kini [mailto:sriganesh.kini@ericsson.com] > Sent: Tuesday, July 27, 2010 10:52 AM > To: Eric Osborne (eosborne); Alexander Vainshtein > Cc: mpls@ietf.org > Subject: RE: [mpls] Scalability of the "effective FRR" approach in draft-kini- > mpls-ring-frr-facility-backup-00.txt > > Eric, pls see inline @ [Sri] > > - Sri > > > > -----Original Message----- > > From: Eric Osborne (eosborne) [mailto:eosborne@cisco.com] > > Sent: Tuesday, July 27, 2010 1:19 AM > > To: Sriganesh Kini; Alexander Vainshtein > > Cc: mpls@ietf.org > > Subject: RE: [mpls] Scalability of the "effective FRR" > > approach in draft-kini-mpls-ring-frr-facility-backup-00.txt > > > > I'm afraid I don't quite see the severity of the u-turn. > > Yes, it's suboptimal. But how long does the condition last? > > All implementations I'm familiar with will rebuild the new primary LSP > > (the L9->L6 LSP, in your example) in O(seconds), so the suboptimal > > condition is pretty transient. Your solution seems like quite a lot > > of work (BFD, e-backup > > tunnels) for a few seconds of gain. > > This solution aims for characteristics as close to MPLS-FRR when repair is > done at an LSR adjacent to the failure. MPLS-FRR is used for networks > requiring failure recovery with very low traffic loss (typically sub 50msec). If > the network you are considering is tolerant to several seconds of traffic loss, > plain old IGP convergence should be more than enough. EO# Yes, I'm familiar with how that works and that's not my point. In FRR networks as currently deployed, the timeline goes something like this: i) failure happens ii) PLR kicks in protection. Traffic is protected, but may (in some topologies) be routed in the manner you refer to as suboptimal iii) headend of the protected tunnel is notified of the failure and reroutes to a new primary path Elapsed time: (i) -> (ii) <=50ms (ii)->(iii) ~= O(seconds) The point I'm making is not that there are O(seconds) of loss, but O(seconds) of suboptimality. And I'm questioning whether the amount of work you're proposing is worth it in order to minimize this O(seconds) of suboptimality. If the suboptimality lasted for a long time (minutes? hours?) I think it may be worth trying to optimize away, but it doesn't and thus IMHO isn't. There are also existing mechanisms to minimize the impact of this suboptimality. They include proper placement of primary and backup paths, QoS for congestion control, and path protection. None of these are mandatory, but all of them are useful. To me, this further reduces the utility of the mechanism you describe. This is, of course, always going to be a matter of opinion. And don't even get me started on "if you don't like how ring networks behave, don't build ring networks". That's a whole different topic. eric > > > > Also, it's not clear to me what happens in the time after the failure > > but before fast-alert messages are processed at the u-PLR. Does the > > PLR drop traffic until then? Does it do inefficient backup? Is this > > an implementations-specific decision? > > Typically a protection switch at PLR should result in lower overall loss than > completely dropping traffic. If there are very specific conditions where > completely dropping traffic is more advantageous, it may be an additional > behavior. OK, so your desire is that the PLR locally (suboptimally) protect traffic until the u-PLR does its thing. > > > > > Thirdly, I'm not sure how generalizable this solution is to a mesh > > topology. While it will certainly work just as well there as in a > > ring, it is entirely possible (and in my experience quite common) that > > the backup tunnel does not overlap with many of the tunnels which it > > is protecting, and thus you do not have a problem to solve. As you > > are solving a problem that is IMHO predominant only in ring > > topologies, this mechanism is more of a specialized, ring-optimized > > tool than a general-purpose thing. > > The draft makes a statement about applicability to general topologies and as > you correctly noted it works just as well. How much of overlap is there will > vary from one network to another. > > > > > > > > > eric > > > > > > > -----Original Message----- > > > From: mpls-bounces@ietf.org [mailto:mpls-bounces@ietf.org] On Behalf > > Of > > > Sriganesh Kini > > > Sent: Tuesday, July 27, 2010 9:28 AM > > > To: Alexander Vainshtein > > > Cc: mpls@ietf.org > > > Subject: Re: [mpls] Scalability of the "effective FRR" approach in > > draft-kini- > > > mpls-ring-frr-facility-backup-00.txt > > > > > > Sasha, you are welcome. > > > > > > It should be noted that path computation for e-backup is > > trivial when > > routed > > > along the backup. That should not impact operational experience. > > > Setup/maintenance of e-backup should be fairly straightforward. It > > would be > > > helpful if you can quantify a 'proliferation'. > > > > > > Bandwidth can be shared between the e-backup and the backup tunnel. > > > When the e-backup is routed along the backup, there should > > not be any > > > extra bandwidth consumed compared to [MPLS-FRR]. The benefit is that > > the > > > problematic U-turn goes away. > > > > > > Thanks > > > > > > - Sri > > > > > > > > > > > > > > > ________________________________ > > > > > > From: Alexander Vainshtein > > > [mailto:Alexander.Vainshtein@ecitele.com] > > > Sent: Monday, July 26, 2010 11:55 PM > > > To: Sriganesh Kini > > > Cc: mpls@ietf.org > > > Subject: RE: [mpls] Scalability of the "effective FRR" approach > > in > > > draft-kini-mpls-ring-frr-facility-backup-00.txt > > > > > > > > > > > > Sri, > > > > > > Lots of thanks for a prompt response. It seems that we more or > > less > > > agree on the facts (proliferation of e-backup LSPs) but we > > differ in > > > interpreting the impact of these facts on the actual operational > > experience. > > > > > > > > > > > > However, I'd like to notice that "BW effectiveness" of e-backup > > LSPs > > > is also somewhat problematic IMO. > > > > > > Please note that both the regular backup and e-backup > > bypass tunnels > > > cross multiple links that are not involved with the original > > set of LSPs > > > they are protecting. And they both consume BW on these > > links. The only > > > difference is that they are competing for BW with other > > LSPs, not with > > ones > > > they are protecting. But the overall effect is exactly the same IMO. > > > > > > > > > > > > My 2c, > > > > > > Sasha > > > > > > > > > > > > From: Sriganesh Kini [mailto:sriganesh.kini@ericsson.com] > > > Sent: Monday, July 26, 2010 8:01 PM > > > To: Alexander Vainshtein > > > Cc: mpls@ietf.org > > > Subject: RE: [mpls] Scalability of the "effective FRR" approach > > in > > > draft-kini-mpls-ring-frr-facility-backup-00.txt > > > > > > > > > > > > Sasha, > > > > > > > > > > > > As you noted the e-backup tunnel protects all LSPs that > > have a common > > > {head-end, tail-end} pair. More precisely, the e-backup can > > be shared > > > to protect all LSPs that have a common {ring-ingress-LSR, > > ring-egress- > > > LSR} pair (that is path is disjoint with the e-backup). > > > > > > > > > > > > If I understood correctly your concern is about the > > number of number > > > of e-backup tunnels? > > > > > > > > > > > > E-backup tunnels should be setup based on protected > > LSP's {ring- > > > ingress, ring-egress} LSRs. Consider a typical case where in a ring, > > there is a > > > 'ring-head-end' and LSPs are setup from other LSRs on the > > ring to the > > 'ring- > > > head-end'. An e-backup should be setup from each LSR on the ring to > > the > > > 'ring-head-end'. This is order(n). > > > > > > > > > > > > Even for cases where protected LSPs have many possible > > combinations > > > for {ring-ingress, ring-egress}, for typical ring sizes, > > the number > > > of tunnels required should not be a concern for today's > > implementations. > > > > > > > > > > > > Also, in many topologies an LSR that is purely a transit for > > protected > > > LSPs, does not have to originate any e-backup. > > > > > > > > > > > > Thanks > > > > > > - Sri > > > > > > PS: Regular facility FRR requires more that two backup tunnels, > > > depending on what is being protected. > > > > > > > > > > > > > > > ________________________________ > > > > > > > > > From: mpls-bounces@ietf.org [mailto:mpls- > > bounces@ietf.org] On > > > Behalf Of Alexander Vainshtein > > > Sent: Monday, July 26, 2010 9:57 AM > > > To: Sriganesh Kini > > > Cc: mpls@ietf.org > > > Subject: [mpls] Scalability of the "effective FRR" > > approach in > > > draft-kini-mpls-ring-frr-facility-backup-00.txt > > > > > > Sriganesh and all, > > > > > > If I understood you correctly, your proposal > > requires a dedicated > > > backup tunnel for all LSPs with the given {head-end, > > tail-end} pair > > > of LSRs in the ring. (Regular facility FRR requires just two backup > > tunnels). > > > > > > If this understanding is correct, this looks to like a > > serious > > > scalability issue with your approach. > > > > > > > > > > > > Regards, > > > > > > Sasha > > > > > > > > > >
- [mpls] Scalability of the "effective FRR" approac… Alexander Vainshtein
- Re: [mpls] Scalability of the "effective FRR" app… Sriganesh Kini
- Re: [mpls] Scalability of the "effective FRR" app… Alexander Vainshtein
- Re: [mpls] Scalability of the "effective FRR" app… Sriganesh Kini
- Re: [mpls] Scalability of the "effective FRR" app… Eric Osborne (eosborne)
- Re: [mpls] Scalability of the "effective FRR" app… Sriganesh Kini
- Re: [mpls] Scalability of the "effective FRR" app… Eric Osborne (eosborne)
- Re: [mpls] Scalability of the "effective FRR" app… Sriganesh Kini
- Re: [mpls] Scalability of the "effective FRR" app… Eric Osborne (eosborne)
- Re: [mpls] Scalability of the "effective FRR" app… Sriganesh Kini
- Re: [mpls] Scalability of the "effective FRR" app… Eric Osborne (eosborne)
- Re: [mpls] Scalability of the "effective FRR" app… Sriganesh Kini
- Re: [mpls] Scalability of the "effective FRR" app… Sriganesh Kini
- Re: [mpls] Scalability of the "effective FRR" app… Greg Mirsky
- Re: [mpls] Scalability of the "effective FRR" app… Sriganesh Kini