Re: [OSPF] [Isis-wg] Mail regarding draft-ietf-ospf-segment-routing-extensions

Rob Shakir <rjs@rob.sh> Mon, 29 December 2014 09:08 UTC

Return-Path: <rjs@rob.sh>
X-Original-To: ospf@ietfa.amsl.com
Delivered-To: ospf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6A5991A0058; Mon, 29 Dec 2014 01:08:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6aLrrpdf154W; Mon, 29 Dec 2014 01:08:12 -0800 (PST)
Received: from cappuccino.rob.sh (cappuccino.rob.sh [IPv6:2a03:9800:10:4c::cafe:b00c]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A754E1A0006; Mon, 29 Dec 2014 01:08:11 -0800 (PST)
Received: from [86.180.124.183] (helo=[192.168.1.78]) by cappuccino.rob.sh with esmtpsa (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.80) (envelope-from <rjs@rob.sh>) id 1Y5WIy-0000Ff-T0; Mon, 29 Dec 2014 09:08:00 +0000
Mime-Version: 1.0 (Mac OS X Mail 8.0 \(1990.1\))
Content-Type: text/plain; charset="utf-8"
From: Rob Shakir <rjs@rob.sh>
In-Reply-To: <54A1173D.6000200@cisco.com>
Date: Mon, 29 Dec 2014 09:07:59 +0000
Content-Transfer-Encoding: quoted-printable
Message-Id: <8673017E-4E86-4D2E-8522-DF49ED869E2D@rob.sh>
References: <BY1PR0501MB13819883015276791F20D631D5540@BY1PR0501MB1381.namprd05.prod.outlook.com> <54A10B35.4030301@cisco.com> <BY1PR0501MB1381B131A68B321264B7E930D5510@BY1PR0501MB1381.namprd05.prod.outlook.com> <54A10E78.6030006@cisco.com> <BY1PR0501MB1381610E47F46E81528B5416D5510@BY1PR0501MB1381.namprd05.prod.outlook.com> <54A11188.8040301@cisco.com> <BY1PR0501MB1381860D81EE3DF32A76B6D7D5510@BY1PR0501MB1381.namprd05.prod.outlook.com> <54A1173D.6000200@cisco.com>
To: Peter Psenak <ppsenak@cisco.com>, Shraddha Hegde <shraddha@juniper.net>
X-Mailer: Apple Mail (2.1990.1)
Archived-At: http://mailarchive.ietf.org/arch/msg/ospf/c85N1SeVNlCu4vEuz4XBGY8pYd4
Cc: "ospf@ietf.org" <ospf@ietf.org>, "draft-ietf-ospf-segment-routing-extensions@tools.ietf.org" <draft-ietf-ospf-segment-routing-extensions@tools.ietf.org>, "isis-wg@ietf.org" <isis-wg@ietf.org>, "draft-ietf-isis-segment-routing-extensions@tools.ietf.org" <draft-ietf-isis-segment-routing-extensions@tools.ietf.org>
Subject: Re: [OSPF] [Isis-wg] Mail regarding draft-ietf-ospf-segment-routing-extensions
X-BeenThere: ospf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: The Official IETF OSPG WG Mailing List <ospf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ospf>, <mailto:ospf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ospf/>
List-Post: <mailto:ospf@ietf.org>
List-Help: <mailto:ospf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ospf>, <mailto:ospf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Dec 2014 09:08:26 -0000

Peter, Shraddha,

Primarily —  I don’t think that use of the ‘B’ flag in the Adj-SID implies that there MUST be a backup route installed, it merely indicates that the Adj-SID MAY be subject to re-routing (and hence strict placement on an adjacency may not be honoured during link failures).

For me, I’m unclear on what the practical use of not requesting backup for a {Node,Prefix}-SID could be — its very nature (“the shortest path to X” where X is a node/prefix) means that it is not well defined in terms of a route through the network, and hence is not well defined in terms of performance. This (to me) says that we cannot really rely on such a SID for performance-sensitive traffic, and hence must always be able to tolerate events such as FRR paths during protection.

The fact that AdjSID maps deterministically to a particular link, about which the calculating entity (PCE/iLER) can know details of, means that performance can be inferred - and hence strict affinity to that path (and/or failure when it is not available) is of utility.

Kind regards,
r.


> On 29 Dec 2014, at 08:56, Peter Psenak <ppsenak@cisco.com> wrote:
> 
> Shraddha,
> 
> I do not see how an originator of the node-sid can mandate a protection for the prefix on other routers. What if there is no backup available on a certain node along the path?
> 
> The parallel with the B-flag in adj-sids is not right - in case of adj-sid the originator has the knowledge about the local adjacency protection and as such can signal it it it's LSA.
> 
> thanks,
> Peter
> 
> 
> On 12/29/14 09:47 , Shraddha Hegde wrote:
>> Peter,
>> 
>> 
>> Pls see inline.
>> 
>> Rgds
>> Shraddha
>> 
>> -----Original Message-----
>> From: Peter Psenak [mailto:ppsenak@cisco.com]
>> Sent: Monday, December 29, 2014 2:02 PM
>> To: Shraddha Hegde; draft-ietf-ospf-segment-routing-extensions@tools.ietf.org; draft-ietf-isis-segment-routing-extensions@tools.ietf.org
>> Cc: ospf@ietf.org; isis-wg@ietf.org
>> Subject: Re: [Isis-wg] Mail regarding draft-ietf-ospf-segment-routing-extensions
>> 
>> Shraddha,
>> 
>> I do not see how an originator can set any flag regarding the protection of the locally attached prefix.
>> <Shraddha> The originator advertises 2 node-sids. One with p flag set and the other without the p-flag set.
>> 
>>  It's all the routers on the path towards such prefix that need to deal with the protection.
>> <Shraddha> The receiving nodes will download protected path for the node-sid with p-flag set and download
>> Unprotected path for the node-sid with p-flag unset.
>> 
>> Signaling anything from the originator seems useless.
>> <Shraddha>  For node-sids it's the others who need to build the forwarding plane but it's only the originator who can signal which of
>>                         Sid need to be built with protection and which not. Other routers on the path cannot signal this information.
> 
> 
> 
>> 
>> With this you have two paths for the node. One is protected and the other is unprotected. This meets the requirement of having an un-protected path.
>> 
>> It's very much in parallel to B-flag in adj-sids. It is similar to advertising multiple adj-sids one with B-flag on and other with b-flag off , to get protected and unprotected
>> Adj-sids.
>> 
>> thanks,
>> Peter
>> 
>> On 12/29/14 09:26 , Shraddha Hegde wrote:
>>> Yes.You are right.
>>> 
>>> Lets say a prefix sid has a flag "p flag". If this is on it means build a path and provide protection.
>>> If this is off it means build a path with no protection.
>>> The receivers of the prefix-sid will build forwarding plane based on this flag.
>>> 
>>> The applications building the paths will either use prefix-sids with p flag on or off based on the need of the service.
>>> Rgds
>>> Shraddha
>>> 
>>> 
>>> -----Original Message-----
>>> From: Peter Psenak [mailto:ppsenak@cisco.com]
>>> Sent: Monday, December 29, 2014 1:49 PM
>>> To: Shraddha Hegde;
>>> draft-ietf-ospf-segment-routing-extensions@tools.ietf.org;
>>> draft-ietf-isis-segment-routing-extensions@tools.ietf.org
>>> Cc: ospf@ietf.org; isis-wg@ietf.org
>>> Subject: Re: [Isis-wg] Mail regarding
>>> draft-ietf-ospf-segment-routing-extensions
>>> 
>>> Shraddha,
>>> 
>>> the problem is that the node that is advertising the node-sid can not advertise any data regarding the protection of such prefix, because the prefix is locally attached.
>>> 
>>> thanks,
>>> Peter
>>> 
>>> On 12/29/14 09:15 , Shraddha Hegde wrote:
>>>> Peter,
>>>> 
>>>> If there is a service which has to use un-protected path and while
>>>> building such a path if the node-sids Need to be used (one reason
>>>> could be label stack compression) , then there has to be unprotected node-sid that this service can make use of.
>>>> 
>>>> Prefix -sids could also be used to represent different service
>>>> endpoints which makes it even more relevant to have A means of representing  unprotected paths.
>>>> 
>>>> Would be good to hear from others on this, especially operators.
>>>> 
>>>> Rgds
>>>> Shraddha
>>>> 
>>>> 
>>>> -----Original Message-----
>>>> From: Peter Psenak [mailto:ppsenak@cisco.com]
>>>> Sent: Monday, December 29, 2014 1:35 PM
>>>> To: Shraddha Hegde;
>>>> draft-ietf-ospf-segment-routing-extensions@tools.ietf.org;
>>>> draft-ietf-isis-segment-routing-extensions@tools.ietf.org
>>>> Cc: ospf@ietf.org; isis-wg@ietf.org
>>>> Subject: Re: [Isis-wg] Mail regarding
>>>> draft-ietf-ospf-segment-routing-extensions
>>>> 
>>>> Shraddha,
>>>> 
>>>> node-SID is advertised by the router for the prefix that is directly attached to it. Protection for such local prefix does not mean much.
>>>> 
>>>> thanks,
>>>> Peter
>>>> 
>>>> On 12/24/14 11:57 , Shraddha Hegde wrote:
>>>>> Authors,
>>>>> We have a "backup flag" in adjacency sid to indicate whether the
>>>>> label is protected or not.
>>>>> Similarly. I think we need a flag in prefix-sid as well to indicate
>>>>> whether the node-sid is to be protected or not.
>>>>> Any thoughts on this?
>>>>> Rgds
>>>>> Shraddha
>>>>> 
>>>>> 
>>>>> _______________________________________________
>>>>> Isis-wg mailing list
>>>>> Isis-wg@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/isis-wg
>>>>> 
>>>> 
>>>> .
>>>> 
>>> 
>>> .
>>> 
>> 
>> .
>> 
> 
> _______________________________________________
> Isis-wg mailing list
> Isis-wg@ietf.org
> https://www.ietf.org/mailman/listinfo/isis-wg