Re: [Pce] Multipath / replication segment comment

"Mike Koldychev (mkoldych)" <mkoldych@cisco.com> Fri, 20 December 2019 21:32 UTC

Return-Path: <mkoldych@cisco.com>
X-Original-To: pce@ietfa.amsl.com
Delivered-To: pce@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 789F71208BB for <pce@ietfa.amsl.com>; Fri, 20 Dec 2019 13:32:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=dqsuHZft; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=zEfPpOwF
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WaveHzU51Zaq for <pce@ietfa.amsl.com>; Fri, 20 Dec 2019 13:32:03 -0800 (PST)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A2A38120839 for <pce@ietf.org>; Fri, 20 Dec 2019 13:32:02 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=11956; q=dns/txt; s=iport; t=1576877522; x=1578087122; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=On4487w5rd4GerJ3+d8DnwFhV8cE0Rb7L6kEZ+zJZww=; b=dqsuHZftj0LvPNwARXf0pgirSRoCxtNgN/LhgNkfxdbqNh1Za/p7+2Bi d7YRWNtzH8JRlm1N0reQnRi9dWHYrrKC+gr0rPy9hUtHICERH/qWInn76 u7L2MUJJ479LILi0qOqFzAoA9bd1OoW0GghPN8H8U+CxDAaHeST77+sx7 o=;
IronPort-PHdr: 9a23:ARdtrhDzVlxaNT+HGffTUyQJPHJ1sqjoPgMT9pssgq5PdaLm5Zn5IUjD/qs03kTRU9Dd7PRJw6rNvqbsVHZIwK7JsWtKMfkuHwQAld1QmgUhBMCfDkiuKf3tayArF8RqX15+9Hb9Ok9QS47z
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DqAQAqPf1d/5ldJa1lGwEBAQEBAQEFAQEBEQEBAwMBAQGBfIFNJCwFbFggBAsqCoN9g0YDinSCX4lejiqCUgNUCQEBAQwBARgLCgIBAYRAAheCBSQ4EwIDDQEBBAEBAQIBBQRthTcMhV4BAQEBAgEBAQwEEREMAQEjCQQHAQsEAgEIEQQBAQECAiYCAgIfBgsVCAgCBAENBQgTB4MBgkYDDiABDqEEAoE4iGF1gTKCfgEBBYUcDQuCDAMGgQ4ojBkagUE/gRABR4JMPoIbSQEBgR9GFQ+CajKCLI1DgnWdZTFDCoI0kXKEQYJEmBGOUYFGiSiPZgIEAgQFAg4BAQWBaSKBWHAVO4JsUBgNjRIMF4NQhRSFP3SBKI97K4EEAYEPAQE
X-IronPort-AV: E=Sophos;i="5.69,337,1571702400"; d="scan'208";a="405974003"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 20 Dec 2019 21:32:01 +0000
Received: from XCH-ALN-006.cisco.com (xch-aln-006.cisco.com [173.36.7.16]) by rcdn-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id xBKLW1Xs001065 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 20 Dec 2019 21:32:01 GMT
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by XCH-ALN-006.cisco.com (173.36.7.16) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 20 Dec 2019 15:32:00 -0600
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 20 Dec 2019 15:32:00 -0600
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Fri, 20 Dec 2019 15:32:00 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=a//zfxSCshUHq2FKtTm0AJhM70sb24kGLODt7wDFJh0xyhK6kV0MtnaNR3OaJDa6FIxu/zfTGcufRgWj/ItHUV/TQH3n8bawTi5bEkvlys+ABS5dKyKYDfJzD02suXI14kk5MV1UMbWf7jhH5yU7PB0cd/af4JfLmIRzBcMNsOZ+/h4y2vCTtEwqGOEHuMfQVpAWc8KkgFxH1hJPXTRmyPf9i9ivLRcSEsK+3CfegPcd+uNp9rVRsVVZ6F2ZMVaC4tvve2f74TlFo3UvtVik0Ii5NJvh36rWl4rKc3REqdWFeJmsD/5XIOIfTOpjgVdZnRaaNGuxp+AFW9bJeFEzuw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=On4487w5rd4GerJ3+d8DnwFhV8cE0Rb7L6kEZ+zJZww=; b=blWdMJeqbo58rZo/t1lnU69LqCJ9eWG92MyHbsZpBM7NdEh/iKjRjDUc7g8ri/en+LgluOhQja+TpJG+iZPrFUBPSsBATuaF1e5LXxTwEMPSUhFVpNMXSX6CDJxAcksrrAtpsQGCg6j3eVL8G8vknDQymcdLzeFyWuXm+YFgqY63NAgH675fBSKERIyFkMykU4VqNeuyzMXH9P8s8v985ctgEusjcOoWwy87LijfZi9YxQS3CE7RO+6OUNWQuVHNHOzCRh+lMNQgPlfnZegjQXBmG/1Iubeza08Gkf/u9Scs45Sz5lVL09VzyoGLsVlXgKdk0KZSaOtVrPU4BRc+Jg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=On4487w5rd4GerJ3+d8DnwFhV8cE0Rb7L6kEZ+zJZww=; b=zEfPpOwFW4hLYQAINEXV1rmf0UQpeJZOKmsbQrJrAEEKJFINspuadMn7TQQnd+/JPrXRVRpkVUvgYb17sVae/VQ1keDJe6uU73lR/3Ngw7Qm3GvWrUjf+ek2+QcyQAd3EbJa075rqZlwKBJRQDip+5TiRgfAG7Umlo+0I3nrF9k=
Received: from BN6PR11MB0051.namprd11.prod.outlook.com (10.161.153.153) by BN6PR11MB1812.namprd11.prod.outlook.com (10.175.98.141) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2559.14; Fri, 20 Dec 2019 21:31:59 +0000
Received: from BN6PR11MB0051.namprd11.prod.outlook.com ([fe80::586b:142e:6864:ea06]) by BN6PR11MB0051.namprd11.prod.outlook.com ([fe80::586b:142e:6864:ea06%7]) with mapi id 15.20.2559.016; Fri, 20 Dec 2019 21:31:59 +0000
From: "Mike Koldychev (mkoldych)" <mkoldych@cisco.com>
To: "Stone, Andrew (Nokia - CA/Ottawa)" <andrew.stone@nokia.com>, Dhruv Dhody <dhruv.ietf@gmail.com>
CC: "pce@ietf.org" <pce@ietf.org>
Thread-Topic: [Pce] Multipath / replication segment comment
Thread-Index: AQHVtdD2xl49iCDRxUm0ovoN47taVafBWbGAgAAHmQCAAijj0A==
Date: Fri, 20 Dec 2019 21:31:59 +0000
Message-ID: <BN6PR11MB005176FEAD020116D05E4AC7D32D0@BN6PR11MB0051.namprd11.prod.outlook.com>
References: <89FB1D82-8245-490A-BEF9-6AD5268A3FBC@nokia.com> <CAB75xn6PO1Dix-O4Fq6BTKx-bDyNG3uV=FUYzhbfWgECj3nFqQ@mail.gmail.com> <5F7FCDF4-0561-46D8-9253-63753704FC7C@nokia.com>
In-Reply-To: <5F7FCDF4-0561-46D8-9253-63753704FC7C@nokia.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=mkoldych@cisco.com;
x-originating-ip: [173.38.117.76]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 77e06d7f-8743-4ea7-e5f6-08d785940bcf
x-ms-traffictypediagnostic: BN6PR11MB1812:
x-microsoft-antispam-prvs: <BN6PR11MB18129C2D30BDE1C18B2C88D6D32D0@BN6PR11MB1812.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:5797;
x-forefront-prvs: 025796F161
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(376002)(396003)(39860400002)(366004)(136003)(53754006)(199004)(189003)(37854004)(13464003)(64756008)(66556008)(66476007)(6506007)(478600001)(66946007)(186003)(81166006)(76116006)(33656002)(26005)(9686003)(66446008)(8936002)(2906002)(966005)(52536014)(81156014)(4001150100001)(86362001)(7696005)(8676002)(4326008)(5660300002)(71200400001)(110136005)(53546011)(66574012)(55016002)(296002)(316002); DIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR11MB1812; H:BN6PR11MB0051.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 77e06d7f-8743-4ea7-e5f6-08d785940bcf
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Dec 2019 21:31:59.5283 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: zpRJLLh56RNtLwxE+olXrk10zJopNM1t8RFB/+hMcDgns6c1eBiZOK1rZkB7i0IGbb2c3ssQ0uSZkMo9VClglg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR11MB1812
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.16, xch-aln-006.cisco.com
X-Outbound-Node: rcdn-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/pce/LwV8USNJKPo0Uf_NJW3_OqeEPEU>
Subject: Re: [Pce] Multipath / replication segment comment
X-BeenThere: pce@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Path Computation Element <pce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pce>, <mailto:pce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pce/>
List-Post: <mailto:pce@ietf.org>
List-Help: <mailto:pce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pce>, <mailto:pce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Dec 2019 21:32:06 -0000

Regarding SID lists terminating on the same node.... This cannot be mandated/enforced from a protocol point of view. There are use cases, as Andrew pointed out, where the SID list(s) terminate prior to reaching the end-point and the packets go the rest of the way unencapsulated.

It may be that some implementations of SR-TE head-end may choose to validate the ERO(s) and verify that they actually do reach the end-point node, but this extra validation is purely optional.

Thanks,
Mike.

-----Original Message-----
From: Pce <pce-bounces@ietf.org> On Behalf Of Stone, Andrew (Nokia - CA/Ottawa)
Sent: Thursday, December 19, 2019 12:19 PM
To: Dhruv Dhody <dhruv.ietf@gmail.com>
Cc: pce@ietf.org
Subject: Re: [Pce] Multipath / replication segment comment

Few comments below,

Cheers
Andrew

On 2019-12-19, 6:52 AM, "Dhruv Dhody" <dhruv.ietf@gmail.com> wrote:

    Hi Andrew,
    
    Speaking as a WG contributor...
    
    On Wed, Dec 18, 2019 at 11:58 PM Stone, Andrew (Nokia - CA/Ottawa)
    <andrew.stone@nokia.com> wrote:
    >
    > Hi all,
    >
    >
    >
    > In Singapore I made a remark about draft-koldychev-pce-multipath that it’s a helpful draft and is also applicable to the replication segment.
    >
    >
    >
    > I received a follow up question emailed directly, asking about whether “EROs need to share same source and destination” and how/if this could be related to RFC 8623.
    >
    >
    >
    > For openness, sending my thoughts/comments here to the WG:
    >
    >
    >
    > There is no requirement listed in draft-koldychev-pce-multipath that I can see which requires EROs to terminate on the same source/destination, I haven’t seen that expectation anywhere, and in my opinion there should not be.
    
    [Dhruv] You are right, this is not explicit in the I-D. But based on
    the scope of past discussion IMHO it was always about multiple paths
    (ERO) for a single tunnel and thus finding a way to encode them within
    a single report/update in a PCEP message.

[Andrew] True, the original intent of multiple paths within the same tunnel in a single report/update, but that could still be leveraged in the replication case, i.e I want a single report/update to modify the state of a replication segment. I think it becomes a gray area in interpretation of whether or not a replication segment creates a P2MP tunnel or if it's actually just creating multiple P2P tunnels from a single ingress label. If the interpretation is it's a P2MP tunnel, then using multiple EROs to define the forwarding of a P2MP. Tunnel requires those EROs to terminate on different nods. 
    
    The new ERO-ATTRIB object in the I-D is just a separator between
    several ERO objects in a existing PCEP message which reports/update a
    particular LSP (identified by PLSP-ID in the LSP object).
    
    > For example, one of the use cases of draft-koldychev-pce-multipath is for SR Policy to support multiple SID lists, combine that with use case such as SR-EPE, you could have multiple SID lists and have weighted ECMP traffic out different egress nodes intentionally to load balance across different peer nodes.
    
    [Dhruv] As per the SR policy as it is currently defined - End point is
    the property of the SR Policy. Each segment-list inside a candidate
    path would be a specific source-routed path from the headend to the
    endpoint of the corresponding SR policy. That said, in this use case
    perhaps you would use an anycast address but still the same endpoint
    from the SR policy point of view.
    

[Andrew] Coincidentally this was just mentioned in SPRING mailing list, whether in SR Policy endpoint is the tunnel termination vs a prefix/route to reach (which I kind of have to agree with), which seemed to have been raised because there's the concept of null/0.0.0.0 (and some wording on whether or not this is a valid "endpoint"). Anyways, in an EPE case I don't need to specify a path to reach the absolute endpoint, I just need to specify a path to steer to an egress peer, and with last label in the stack being an EPE Peer link or node, and that egress peer can take over the packet (likely not MPLS encaped anymore) and steer, forward or tunnel however it chooses. In this regard the SID list specified on the headend SR Policy "stops early" before the "real endpoint". From this perspective whether my ECMP SID lists stop on different routers or not is not really relevant for reaching the "real endpoint". Section 4.7 in draft-ietf-spring-segment-routing-central-epe-10 briefly comments on this, in the sense that to reach an internet route a SID list comprised of only SID(s) to reach the border node, and a SID to specify the peering router is sufficient. In this regard the path terminates on the peering router, despite the fact that my endpoint is much further in the network / perhaps across the internet. 


    > Another example, with ingress replication, is the multipath ERO can also be re-used to describe the egress downstream paths which will be going to different receiver(s), for either further replication or consumption.
    >
    >
    >
    > My comment regarding multipath to be used for ingress replication is because there is a need in replication segment to be able to program backup paths for each egress ERO. There were comments on this in the earlier sr-replication draft in spring wg, but appears the wording has been redone / drafts are still in a state of change. None the less, the multipath backup TLV via the ERO attributes object in draft-koldychev-pce-multipath permits the relation between the normal ERO and the backup (PCE computed) ERO, something that the current RFC 8623 does not. There’s a desire to build this into replication segment and draft-hsd-pce-sr-p2mp-policy-01  is leveraging this construct (probably need further remarks on this in the drafts to describe this intention). Comparing to RFC 8623, considering all of the nuances of replication segment (p2mp-lsp-identifier-tlv, replication-sid/binding-label, backup eros) it seems reasonable to me that draft-hsd-pce-sr-p2mp-policy defines the replication segment (draft-hsd-pce-sr-p2mp-policy-01 section 3.3) while leveraging existing/other common constructs, and defining it’s behaviour, rather than trying to just use all of RFC8623 and attempt to update and squeeze in (or out) other elements of the RFC.
    >
    >
    
    [Dhruv]: For the SR-P2MP usecase you have two building blocks in PCEP
    (1) PCEP-SR for P2P (2) PCEP-RSVP-TE for P2MP. I would suggest you to
    build on both of these. The (1) offers you SR-ERO, SR-Policy
    association etc. The (2) offers you P2MP END-POINT object with
    multiple destination, S2LS object to report status to each leaf etc.
    
    Regarding backup, Protection Association could be used even for P2MP
    as well. I would not look only at a feature like 'backup' to make this
    fundamental judgment on how to encode SR-P2MP in PCEP.
    
    I like the fact that as far as PCEP message encoding is concerned,
    there is a minimal difference between SR and RSVP-TE. I would like to
    see if we can continue to keep that true for SR-P2MP as well :)
    
[Andrew] ACK, something I guess that will need to be discussed further in the shaping of PCEP replication segment draft. Configuring stitched replication segments (and each replication segment does not perform any network signalling), one could leverage independent RSVP LSP(s) in between replication segments along their unicast path, but it's not clear to me if there could/would/should be RSVP signalling for the replication segment itself, so I'm not sure how directly mapped to an RSVP use case it is, as the current focus is SR-MPLS/SRv6-like functionality. Keeping data models and message encoding the same as much as possible, I do agree with, and the replication segment draft has attempted to do that by re-using the model encoding from all the previous IETF work. Side note, the separation of the P2MP Policy vs Replication Segment in PCEP is also key to keeping the solution manageable in PCEP to handle cases of mbb, redundancy and transport re-usability - it's not clear to me how that split looks like if one were to completely build on the RFC 8623. 


    Thanks!
    Dhruv
    
    >
    > Cheers
    >
    > Andrew
    >
    >
    >
    > _______________________________________________
    > Pce mailing list
    > Pce@ietf.org
    > https://www.ietf.org/mailman/listinfo/pce
    

_______________________________________________
Pce mailing list
Pce@ietf.org
https://www.ietf.org/mailman/listinfo/pce