Re: [mpls] Scalability of the "effective FRR" approach in draft-kini-mpls-ring-frr-facility-backup-00.txt

"Eric Osborne (eosborne)" <eosborne@cisco.com> Tue, 27 July 2010 09:18 UTC

Return-Path: <eosborne@cisco.com>
X-Original-To: mpls@core3.amsl.com
Delivered-To: mpls@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 26D963A6BB7 for <mpls@core3.amsl.com>; Tue, 27 Jul 2010 02:18:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ByT-yx3PRq6s for <mpls@core3.amsl.com>; Tue, 27 Jul 2010 02:18:20 -0700 (PDT)
Received: from rtp-iport-1.cisco.com (rtp-iport-1.cisco.com [64.102.122.148]) by core3.amsl.com (Postfix) with ESMTP id 319853A6BB3 for <mpls@ietf.org>; Tue, 27 Jul 2010 02:17:58 -0700 (PDT)
Authentication-Results: rtp-iport-1.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEAGNBTkytJV2a/2dsb2JhbACfZXGlIptMhTYEhAmHGQwB
X-IronPort-AV: E=Sophos;i="4.55,267,1278288000"; d="scan'208";a="139611295"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by rtp-iport-1.cisco.com with ESMTP; 27 Jul 2010 09:18:19 +0000
Received: from xbh-rcd-302.cisco.com (xbh-rcd-302.cisco.com [72.163.63.9]) by rcdn-core-3.cisco.com (8.14.3/8.14.3) with ESMTP id o6R9IJxx029916; Tue, 27 Jul 2010 09:18:19 GMT
Received: from xmb-rcd-202.cisco.com ([72.163.62.209]) by xbh-rcd-302.cisco.com with Microsoft SMTPSVC(6.0.3790.4675); Tue, 27 Jul 2010 04:18:19 -0500
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable
Date: Tue, 27 Jul 2010 04:18:16 -0500
Message-ID: <D29E470202D67745B61059870F433B5402511689@XMB-RCD-202.cisco.com>
In-Reply-To: <5A5E55DF96F73844AF7DFB0F48721F0F567DB80E8F@EUSAACMS0703.eamcs.ericsson.se>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [mpls] Scalability of the "effective FRR" approach in draft-kini-mpls-ring-frr-facility-backup-00.txt
Thread-Index: Acss451Rwl5jkjLdTWWmLbBSEMenUAAAJKaAABzm8kAAAGaFoAAB6yoAAADgilAAAUKywA==
References: <D29E470202D67745B61059870F433B5402511686@XMB-RCD-202.cisco.com> <5A5E55DF96F73844AF7DFB0F48721F0F567DB80E8F@EUSAACMS0703.eamcs.ericsson.se>
From: "Eric Osborne (eosborne)" <eosborne@cisco.com>
To: Sriganesh Kini <sriganesh.kini@ericsson.com>, Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
X-OriginalArrivalTime: 27 Jul 2010 09:18:19.0347 (UTC) FILETIME=[A71AF230:01CB2D6C]
Cc: mpls@ietf.org
Subject: Re: [mpls] Scalability of the "effective FRR" approach in draft-kini-mpls-ring-frr-facility-backup-00.txt
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Jul 2010 09:18:28 -0000

Inline with EO#

> -----Original Message-----
> From: Sriganesh Kini [mailto:sriganesh.kini@ericsson.com]
> Sent: Tuesday, July 27, 2010 10:52 AM
> To: Eric Osborne (eosborne); Alexander Vainshtein
> Cc: mpls@ietf.org
> Subject: RE: [mpls] Scalability of the "effective FRR" approach in
draft-kini-
> mpls-ring-frr-facility-backup-00.txt
> 
> Eric, pls see inline @ [Sri]
> 
> - Sri
> 
> 
> > -----Original Message-----
> > From: Eric Osborne (eosborne) [mailto:eosborne@cisco.com]
> > Sent: Tuesday, July 27, 2010 1:19 AM
> > To: Sriganesh Kini; Alexander Vainshtein
> > Cc: mpls@ietf.org
> > Subject: RE: [mpls] Scalability of the "effective FRR"
> > approach in draft-kini-mpls-ring-frr-facility-backup-00.txt
> >
> > I'm afraid I don't quite see the severity of the u-turn.
> > Yes, it's suboptimal.  But how long does the condition last?
> > All implementations I'm familiar with will rebuild the new primary
LSP
> > (the L9->L6 LSP, in your example) in O(seconds), so the suboptimal
> > condition is pretty transient.  Your solution seems like quite a lot
> > of work (BFD, e-backup
> > tunnels) for a few seconds of gain.
> 
> This solution aims for characteristics as close to MPLS-FRR when
repair is
> done at an LSR adjacent to the failure. MPLS-FRR is used for networks
> requiring failure recovery with very low traffic loss (typically sub
50msec). If
> the network you are considering is tolerant to several seconds of
traffic loss,
> plain old IGP convergence should be more than enough.

EO#  Yes, I'm familiar with how that works and that's not my point.  In
FRR networks as currently deployed, the timeline goes something like
this:

i) failure happens
ii) PLR kicks in protection.  Traffic is protected, but may (in some
topologies) be routed in the manner you refer to as suboptimal
iii) headend of the protected tunnel is notified of the failure and
reroutes to a new primary path

Elapsed time:
(i) -> (ii)  <=50ms
(ii)->(iii) ~= O(seconds)

The point I'm making is not that there are O(seconds) of loss, but
O(seconds) of suboptimality.  And I'm questioning whether the amount of
work you're proposing is worth it in order to minimize this O(seconds)
of suboptimality.  If the suboptimality lasted for a long time (minutes?
hours?) I think it may be worth trying to optimize away, but it doesn't
and thus IMHO isn't.

There are also existing mechanisms to minimize the impact of this
suboptimality.  They include proper placement of primary and backup
paths, QoS for congestion control, and path protection.  None of these
are mandatory, but all of them are useful.  To me, this further reduces
the utility of the mechanism you describe.  This is, of course, always
going to be a matter of opinion.

And don't even get me started on "if you don't like how ring networks
behave, don't build ring networks".  That's a whole different topic.



eric

> >
> > Also, it's not clear to me what happens in the time after the
failure
> > but before fast-alert messages are processed at the u-PLR.  Does the
> > PLR drop traffic until then?  Does it do inefficient backup?  Is
this
> > an implementations-specific decision?
> 
> Typically a protection switch at PLR should result in lower overall
loss than
> completely dropping traffic. If there are very specific conditions
where
> completely dropping traffic is more advantageous, it may be an
additional
> behavior.

OK, so your desire is that the PLR locally (suboptimally) protect
traffic until the u-PLR does its thing.

> 
> >
> > Thirdly, I'm not sure how generalizable this solution is to a mesh
> > topology.  While it will certainly work just as well there as in a
> > ring, it is entirely possible (and in my experience quite common)
that
> > the backup tunnel does not overlap with many of the tunnels which it
> > is protecting, and thus you do not have a problem to solve.  As you
> > are solving a problem that is IMHO predominant only in ring
> > topologies, this mechanism is more of a specialized, ring-optimized
> > tool than a general-purpose thing.
> 
> The draft makes a statement about applicability to general topologies
and as
> you correctly noted it works just as well. How much of overlap is
there will
> vary from one network to another.
> 
> >
> >
> >
> > eric
> >
> >
> > > -----Original Message-----
> > > From: mpls-bounces@ietf.org [mailto:mpls-bounces@ietf.org] On
Behalf
> > Of
> > > Sriganesh Kini
> > > Sent: Tuesday, July 27, 2010 9:28 AM
> > > To: Alexander Vainshtein
> > > Cc: mpls@ietf.org
> > > Subject: Re: [mpls] Scalability of the "effective FRR" approach in
> > draft-kini-
> > > mpls-ring-frr-facility-backup-00.txt
> > >
> > > Sasha, you are welcome.
> > >
> > > It should be noted that path computation for e-backup is
> > trivial when
> > routed
> > > along the backup. That should not impact operational experience.
> > > Setup/maintenance of e-backup should be fairly straightforward. It
> > would be
> > > helpful if you can quantify a 'proliferation'.
> > >
> > > Bandwidth can be shared between the e-backup and the backup
tunnel.
> > > When the e-backup is routed along the backup, there should
> > not be any
> > > extra bandwidth consumed compared to [MPLS-FRR]. The benefit is
that
> > the
> > > problematic U-turn goes away.
> > >
> > > Thanks
> > >
> > > - Sri
> > >
> > >
> > >
> > >
> > > ________________________________
> > >
> > > 	From: Alexander Vainshtein
> > > [mailto:Alexander.Vainshtein@ecitele.com]
> > > 	Sent: Monday, July 26, 2010 11:55 PM
> > > 	To: Sriganesh Kini
> > > 	Cc: mpls@ietf.org
> > > 	Subject: RE: [mpls] Scalability of the "effective FRR" approach
> > in
> > > draft-kini-mpls-ring-frr-facility-backup-00.txt
> > >
> > >
> > >
> > > 	Sri,
> > >
> > > 	Lots of thanks for a prompt response. It seems that we more or
> > less
> > > agree on the facts (proliferation of e-backup LSPs) but we
> > differ in
> > > interpreting  the impact  of these facts  on the actual
operational
> > experience.
> > >
> > >
> > >
> > > 	However, I'd like to notice that "BW effectiveness" of e-backup
> > LSPs
> > > is also somewhat problematic IMO.
> > >
> > > 	Please note that both the regular backup and e-backup
> > bypass tunnels
> > > cross multiple links that are not involved with the original
> > set of LSPs
> > > they are protecting. And they both consume BW on these
> > links. The only
> > > difference is that they are competing for BW with other
> > LSPs, not with
> > ones
> > > they are protecting. But the overall effect is exactly the same
IMO.
> > >
> > >
> > >
> > > 	My 2c,
> > >
> > > 	     Sasha
> > >
> > >
> > >
> > > 	From: Sriganesh Kini [mailto:sriganesh.kini@ericsson.com]
> > > 	Sent: Monday, July 26, 2010 8:01 PM
> > > 	To: Alexander Vainshtein
> > > 	Cc: mpls@ietf.org
> > > 	Subject: RE: [mpls] Scalability of the "effective FRR" approach
> > in
> > > draft-kini-mpls-ring-frr-facility-backup-00.txt
> > >
> > >
> > >
> > > 	Sasha,
> > >
> > >
> > >
> > > 	As you noted the e-backup tunnel protects all LSPs that
> > have a common
> > > {head-end, tail-end} pair. More precisely, the e-backup can
> > be shared
> > > to protect all LSPs that have a common {ring-ingress-LSR,
> > ring-egress-
> > > LSR} pair (that is path is disjoint with the e-backup).
> > >
> > >
> > >
> > > 	If I understood correctly your concern is about the
> > number of number
> > > of e-backup tunnels?
> > >
> > >
> > >
> > > 	E-backup tunnels should be setup based on protected
> > LSP's {ring-
> > > ingress, ring-egress} LSRs. Consider a typical case where in a
ring,
> > there is a
> > > 'ring-head-end' and LSPs are setup from other LSRs on the
> > ring to the
> > 'ring-
> > > head-end'. An e-backup should be setup from each LSR on the ring
to
> > the
> > > 'ring-head-end'. This is order(n).
> > >
> > >
> > >
> > > 	Even for cases where protected LSPs have many possible
> > combinations
> > > for {ring-ingress, ring-egress}, for typical ring sizes,
> > the number
> > > of tunnels required should not be a concern for today's
> > implementations.
> > >
> > >
> > >
> > > 	Also, in many topologies an LSR that is purely a transit for
> > protected
> > > LSPs, does not have to originate any e-backup.
> > >
> > >
> > >
> > > 	Thanks
> > >
> > > 	- Sri
> > >
> > > 	PS: Regular facility FRR requires more that two backup tunnels,
> > > depending on what is being protected.
> > >
> > >
> > >
> > >
> > > ________________________________
> > >
> > >
> > > 		From: mpls-bounces@ietf.org [mailto:mpls-
> > bounces@ietf.org] On
> > > Behalf Of Alexander Vainshtein
> > > 		Sent: Monday, July 26, 2010 9:57 AM
> > > 		To: Sriganesh Kini
> > > 		Cc: mpls@ietf.org
> > > 		Subject: [mpls] Scalability of the "effective FRR"
> > approach in
> > > draft-kini-mpls-ring-frr-facility-backup-00.txt
> > >
> > > 		Sriganesh and all,
> > >
> > > 		If I understood you correctly, your proposal
> > requires a dedicated
> > > backup tunnel for all LSPs with the given {head-end,
> > tail-end} pair
> > > of LSRs in the ring. (Regular facility FRR requires just two
backup
> > tunnels).
> > >
> > > 		If this understanding is correct, this looks to like a
> > serious
> > > scalability issue with your approach.
> > >
> > >
> > >
> > > 		Regards,
> > >
> > > 		     Sasha
> > >
> > >
> >
> >