Re: [OSPF] draft-kini-ospf-fast-notification-01

Curtis Villamizar <curtis@occnc.com> Tue, 12 April 2011 03:16 UTC

Return-Path: <curtis@occnc.com>
X-Original-To: ospf@ietfc.amsl.com
Delivered-To: ospf@ietfc.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfc.amsl.com (Postfix) with ESMTP id 33577E0663 for <ospf@ietfc.amsl.com>; Mon, 11 Apr 2011 20:16:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.099
X-Spam-Level:
X-Spam-Status: No, score=-0.099 tagged_above=-999 required=5 tests=[AWL=-2.500, BAYES_00=-2.599, GB_SUMOF=5]
Received: from mail.ietf.org ([208.66.40.236]) by localhost (ietfc.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zfTFuPY+3Cmy for <ospf@ietfc.amsl.com>; Mon, 11 Apr 2011 20:16:32 -0700 (PDT)
Received: from harbor.orleans.occnc.com (harbor.orleans.occnc.com [173.9.106.135]) by ietfc.amsl.com (Postfix) with ESMTP id 60AF4E0674 for <ospf@ietf.org>; Mon, 11 Apr 2011 20:16:32 -0700 (PDT)
Received: from harbor.orleans.occnc.com (harbor.orleans.occnc.com [173.9.106.135]) by harbor.orleans.occnc.com (8.13.6/8.13.6) with ESMTP id p3C3GSbv022950; Mon, 11 Apr 2011 23:16:28 -0400 (EDT) (envelope-from curtis@harbor.orleans.occnc.com)
Message-Id: <201104120316.p3C3GSbv022950@harbor.orleans.occnc.com>
To: Greg Mirsky <gregimirsky@gmail.com>
From: Curtis Villamizar <curtis@occnc.com>
In-reply-to: Your message of "Mon, 11 Apr 2011 16:12:26 PDT." <BANLkTinDb-P=dbHuV6q1jdExZ3hyuwdLqA@mail.gmail.com>
Date: Mon, 11 Apr 2011 23:16:28 -0400
Sender: curtis@occnc.com
Cc: ospf@ietf.org
Subject: Re: [OSPF] draft-kini-ospf-fast-notification-01
X-BeenThere: ospf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: curtis@occnc.com
List-Id: The Official IETF OSPG WG Mailing List <ospf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ospf>, <mailto:ospf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ospf>
List-Post: <mailto:ospf@ietf.org>
List-Help: <mailto:ospf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ospf>, <mailto:ospf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Apr 2011 03:16:33 -0000

In message <BANLkTinDb-P=dbHuV6q1jdExZ3hyuwdLqA@mail.gmail.com>
Greg Mirsky writes:
>  
> Dear Anton,
>  
> I believe that MPLS-TE FRR does not address tasks 2 through 5 in the
> same sense as it is required in IPFRR. Certainly, protecting LSP has
> to be calculated by SPF, signaled and RIB/FIB/HW properly updated. But
> these actions all done prior to when an MPLS-TE deemed protected. Upon
> Fault detection the only action required is on the PLR.
>  
> Regards,
> Greg

Greg,

IPFRR does not need tasks 2 through 5 either.  OTOH, IPFRR coverage is
often less than full coverage.

In both MPLS FRR and IPFRR, if protection works it is handled entirely
by the PLR.  In IPFRR, some PLRs have no fast protection and have to
rely on flooding.  In IPFRR and MPLS FRR sometimes unexpected multiple
failures occur since a previously unknown shared resource is
discovered the hard way or an extroidinary event occurs (ie: two
fibers on same fault line, etc).  In this case even protection from
the MPLS FRR PLR doesn't work.

In MPLS if a reroute is required, the CSPF load being N^2 log N (order
N CSPF computation have to be run), the LSA flooding has no
significant impact at all.  In IPFRR where only one SPF has to be run,
flooding is still not the primary contributor to convergence time.  It
may be a combination of 4 and 5 below.

Curtis


> On Mon, Apr 11, 2011 at 1:54 PM, Anton Smirnov <asmirnov@cisco.com> wrote:
>  
> >   Hi all,
> >   even though I put OSPF-FN draft in the subject it is the framework
> > approach FN-FRWK which draws more questions. At the very first line it
> > reads:
> >
> >  This document describes an architectural work that competes with the
> >> IP Fast Re-Route (IPFRR) solution
> >>
> >
> > Lets compare speed of traffic restoration between the two. So, traditional
> > OSPF convergence time consists of the sum of:
> >
> > 1. Failure detection
> > 2. LSA origination
> > 3. Per-hop flooding
> > 4. SPF (delay and calculation itself)
> > 5. RIB/FIB/hardware update
> >
> > 3, 4 and 5 all can be significant depending on network size, number of
> > routes etc.
> >
> > FRR (both MPLS TE FRR and IPFRR) address 2-5. With good implementation FRR
> > should be by order of magnitude as fast as 1.
> >
> > FN addresses only 3. It doesn't address 4 and 5. As I wrote above in many
> > networks they are at least as significant as 3.
> >
> > So, by the speed of convergence FN doesn't look to come anywhere close to
> > FRR.
> >
> >
> >   Now, lets look at FN from another perspective. Router announcing failure
> > doesn't benefit from FN. Its immediate neighbors do not benefit from FN
> > either - 1 hop traditional flooding should be as fast as 1 hop FN flooding.
> > It is only distant routers who benefit from the FN - and the farther is
> > router from the failure the bigger is gain.
> >   On the other hand, if there exists path alternative to the failed one
> > then _typically_ it is not too far (in terms of hops) from the failing one.
> > I.e. from point of view of router which is 15 hops away from the point of
> > failure it is less likely that routes will change. BTW, ordered FIB approach
> > builds on concept that 'old' routes on remote routers do not cause traffic
> > blackholing or loops.
> >
> >   The big problem with FN approach is that routers remote from the point of
> > failure benefit most - but at the same time their convergence is the least
> > important for end-to-end traffic restoration.
> >   The worst case network for FN is fully meshed area. Since each router is
> > 1 hop away from every other one FN will give no benefits.
> >   The best case network for FN is an area consisting of one big ring. In
> > this case alternative path is on diametrically opposite end of the network
> > and convergence of remote routers is crucial.
> >
> >   So yeah, FN will help remote routers to converge faster. But how much
> > this will improve end-to-end traffic restoration in real networks? I suspect
> > not much. Some degree of meshiness in network topology is the norm.
> >
> >   FN is an interesting proposal but it is very far from being convincing.
> > Pitching FN against FRR is a mistake.
> >
> > --
> > Anton