Re: [Pce] PCE SID-algo draft extension

"Andrew Stone (Nokia)" <andrew.stone@nokia.com> Fri, 31 March 2023 03:18 UTC

Return-Path: <andrew.stone@nokia.com>
X-Original-To: pce@ietfa.amsl.com
Delivered-To: pce@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B6ADCC15154F; Thu, 30 Mar 2023 20:18:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.094
X-Spam-Level:
X-Spam-Status: No, score=-2.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=nokia.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m5x5kinUyt4D; Thu, 30 Mar 2023 20:18:09 -0700 (PDT)
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on20711.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e88::711]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 42E19C151520; Thu, 30 Mar 2023 20:18:08 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=T+462i2SaeUFVU1Sp8zSrfeIHXovo3wKhgGdEC9dLUxzOFaxZkcVOWLQ7bqrKgMzykPyaRL1/935rkXAqNINEbkovJbjlZNOaCkkA5dfnSaKd/Jprtz90gJCHaaTAmu75D+MgcT0XhsZDj+wf5LjiFL/MiA42FIPUSktelHTgN4Iq9cbbRH4ie2bKgqXVYp0l5FHxl0bkrrJCfrchcacM/yeZQ55zwBKBLjx9zltFnZWK8A1cOuaawxD4jzWlNg/BxU56uk4akNU3j2cr3g6Evc21Bz5XydVDXb6CsOGQPifAUW30szpoXCyavbRW8zeQzViyppeAkk3APNJgQ+vQw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ngzjMPTr8hybHvWSEoXDtndx/FgE4RIOZpcjsildY4g=; b=TwLguXQEV75XzOWu7h9anBPlpavGwYexNpuyqeEpY9Ksdq4gdBSvL7bQdrYb+roiplsVBODRIos1L32nAwtoILGrwbGJcVPcnI4AtiRBWObypkDim3YMp30gjeYi6wGHeLSHVblmYDPvf4fVhk9QgKE3Z+gElL1DoVKwb95QxSE4BIbNI+/JoLmVDibtGU6efcOZfyKKFjmot3rRpjSnQwq9vpZ6pKR6KUgtmASKshZAB6qfrOo4B67rt01mfqBiF0Q7I7JQ0f8CstCd+XuIV6p2W+CHqIclwBJKtyuqJEas7CiEYTAytIodAtGtSy0OnwKxZIxg6dVzv459iMgYqw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ngzjMPTr8hybHvWSEoXDtndx/FgE4RIOZpcjsildY4g=; b=flqSgwJ8g50QBsJ13BVcdhb5EBCejKwEZv26/EBpVNpT4GjKnmPthKAxhFmV31JN6q4085T4Df30hQu/C0vHD5wbkg5X9SZR5KZ4zfjw4Ond5z110HnoiFCcG8emCdFgfy/YTxpOzfpx8npPhlf/9aN61iMiNt/vmqC4MfNetY+UlS7/EhPsXkUqcDKpxB2UG2dmeoiwJAdDUyPPymHxMNHd80Xvqm9poVdjO0rdqg2rY7BvnfHlMnpgad0MMREpozpA0bzCHCJu1/4akf8vHzdtbqxaknO/nvhIz7roNNtNQKoijOYszFA8696dvTwOybVdVfAxzBwj0QlgULeUeg==
Received: from CH0PR08MB7353.namprd08.prod.outlook.com (2603:10b6:610:102::22) by SA2PR08MB6682.namprd08.prod.outlook.com (2603:10b6:806:11c::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6222.35; Fri, 31 Mar 2023 03:18:03 +0000
Received: from CH0PR08MB7353.namprd08.prod.outlook.com ([fe80::4e03:4009:f6cf:e251]) by CH0PR08MB7353.namprd08.prod.outlook.com ([fe80::4e03:4009:f6cf:e251%2]) with mapi id 15.20.6254.021; Fri, 31 Mar 2023 03:18:03 +0000
From: "Andrew Stone (Nokia)" <andrew.stone@nokia.com>
To: "Samuel Sidor (ssidor)" <ssidor@cisco.com>, "peng.shaofu@zte.com.cn" <peng.shaofu@zte.com.cn>
CC: "pce@ietf.org" <pce@ietf.org>, "pce-chairs@ietf.org" <pce-chairs@ietf.org>, "slitkows.ietf@gmail.com" <slitkows.ietf@gmail.com>, "dd@dhruvdhody.com" <dd@dhruvdhody.com>
Thread-Topic: [Pce] PCE SID-algo draft extension
Thread-Index: AdkkIwn5VZC4DRGHRseo4HtBB7ScJAA0GrcAAAd6zAAAVMhT8A7tiqwQAAIi5AAAAVfsAAAxjuEgABvDFIA=
Date: Fri, 31 Mar 2023 03:18:03 +0000
Message-ID: <D1C18591-CE15-4618-967A-FB3656128498@nokia.com>
References: <202303291745388369897@zte.com.cn> <EB0E3AEE-0026-4C93-8819-2A398F27F65D@nokia.com> <DM6PR11MB4122C067CBBC8127A216E587D08E9@DM6PR11MB4122.namprd11.prod.outlook.com>
In-Reply-To: <DM6PR11MB4122C067CBBC8127A216E587D08E9@DM6PR11MB4122.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.71.23032500
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nokia.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CH0PR08MB7353:EE_|SA2PR08MB6682:EE_
x-ms-office365-filtering-correlation-id: 855e0eb0-4b50-4899-1fa3-08db31968a0a
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: ryqvdtHHrm5Sn3nPn7hFJdBOpORa+7c7IrezolGIjJpby4fFTZVLhEIS9zLabU1pItT7x+c6jC45d5MR7zOzFCAGbqllHIoH3dZwdZS5c75gfeiFtJpy6t/GRH+vDUG/KB0T8A5ZETXG8oE9dn7SjvPioBuV+kZV5gZ6B6/xjChxkcV8Io+2tKCHfYWnZJBSI4lgBGwvEXgzY1tTMNb/y0Vgn6Hi8bbs4RnK+gSaMrlM/AenVzhHmi/VMgenQuP7kyP3G4oqoXoya8swa/WB2xXiS2P2FWPm7Bxe1Z7seerOf6aVffszXubLic3hXq22zpe9NyUsvL66w/c6xoFxDJrj1SOaYviUpwJ8D2916JS/EQ8LUIcGyhOMpBx/B1RJW+jK2cQ0bQN0JVJsUSKrDHePlmEtMBkBSKmhwdi4+rxTxHkibcPIif8u8rdus/+wTTrvVq4sm3xAXfbNTgEzG1VmXXEDgRnsvPl1lDpQ+dWvf2WNWgi/U/t5XyPzoqKNmpBJwF/hLAK/nQKPnBWWmC9ZBkfwq0S6snkdSCTH0EkO0ARUWaPLYN7rAkn+kUp4r6O17gdpJOeFDo7oglij4Ew79kll+xPVlrA645BQKS0UVph1QBCKKs5aLPGtzuVf2IUHcDtpdosmcvap+K7kDbTW1ZN8Am3/7keUi/fVm6TLxo8kn3kd0mYY3ym6KDjKmKXJCcpUIa9fmv1T7JGg1sTlxvkVvwsHzyuxqcW43hA=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH0PR08MB7353.namprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(136003)(39860400002)(396003)(366004)(346002)(376002)(451199021)(26005)(6486002)(122000001)(6506007)(478600001)(82960400001)(53546011)(66946007)(38100700002)(966005)(166002)(30864003)(33656002)(2616005)(186003)(5660300002)(2906002)(8936002)(9326002)(54906003)(36756003)(6512007)(38070700005)(86362001)(66556008)(110136005)(64756008)(41300700001)(71200400001)(316002)(4326008)(66446008)(8676002)(66476007)(76116006)(83380400001)(66899021)(45980500001)(579004)(10090945012)(9984715007); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_D1C18591CE154618967AFB3656128498nokiacom_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH0PR08MB7353.namprd08.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 855e0eb0-4b50-4899-1fa3-08db31968a0a
X-MS-Exchange-CrossTenant-originalarrivaltime: 31 Mar 2023 03:18:03.3468 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Bzr7ndj5hORUL4Aqx+bq0oiKfxyBiYYi0KXmt5/etAnUOhaWyAf/9EhRndpSY/W3j2y5qEbmmwhKXaCHX6fhvA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA2PR08MB6682
Archived-At: <https://mailarchive.ietf.org/arch/msg/pce/hEFNjKwL-jv4mpOyOaHWwxrfqCw>
Subject: Re: [Pce] PCE SID-algo draft extension
X-BeenThere: pce@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Path Computation Element <pce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pce>, <mailto:pce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pce/>
List-Post: <mailto:pce@ietf.org>
List-Help: <mailto:pce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pce>, <mailto:pce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 31 Mar 2023 03:18:13 -0000

Hi Samuel,

Replies inline below with [Andrew]

Thanks
Andrew

From: "Samuel Sidor (ssidor)" <ssidor@cisco.com>
Date: Thursday, March 30, 2023 at 8:22 AM
To: "Andrew Stone (Nokia)" <andrew.stone@nokia.com>, "peng.shaofu@zte.com.cn" <peng.shaofu@zte.com.cn>
Cc: "pce@ietf.org" <pce@ietf.org>, "pce-chairs@ietf.org" <pce-chairs@ietf.org>, "slitkows.ietf@gmail.com" <slitkows.ietf@gmail.com>, "dd@dhruvdhody.com" <dd@dhruvdhody.com>
Subject: RE: [Pce] PCE SID-algo draft extension


CAUTION: This is an external email. Please be very careful when clicking links or opening attachments. See http://nok.it/ext for additional information.


Hi Andrew,

Thanks for good comment.

There are really 3 things – optionA, optionB and L flag.

Option A + option B:
Option A cannot be combined with Option B as main difference here is source of optimization metric/constraints and topology attributes, which are supposed to be used in the path-computation (ASLA vs legacy).

[Andrew] Agreed

Option A + L flag:
I would say that option A can be combined with L flag as you are really doing path-computation based on “legacy” constraints specified in PCRpt. That will result in some path, which is translated into SID list and algo of those SIDs is not that important (if IGP path of those SIDs is congruent with computed path).

[Andrew] Agreed. My interpretation for a use case on the original adoption was that if PCE is setting up a path, it would be more ideal to set it up following a given Algo, so that way any native IGP convergence or protection mechanisms will still respect a metric/constraints differing from algo-0, and if you fail to resolve a SID list using the algo be permitted to use any SIDs available.

Option B + L flag:
Option B is implicitly restricting topology to only nodes/links with participation in that FA (PCE need to follow from path-computation what IGP is doing for that option). Constraints and metric-type in FAD are defining FA ASLA constraints, so even in the path-computation PCE is supposed to use FA ASLA link attributes. So if PCE would suddenly need to use links/nodes (if we would allow usage of non-FA topology for L=1), which does not advertise those attributes, then PCE would have to fallback into legacy (non-ASLA) link attributes and resulting path would have for example accumulated metric, which is combining ASLA latency of some links with non-ASLA latency of other links (it seems to me like mixing apples and oranges as it is not guaranteed that FA ASLA metric value for specific link is same as legacy metric value of same link). So I tend to say that topology should be restricted even with L=1 with option B.

[Andrew] Yes, agree that topology(edges in the graph) should be restricted with L=1. Topology must be restricted to links matching the flex algo, and thus any path programmed must only be for links within that flex algo, and If a given resource violates the FAD it must be pruned. But I do think there’s two sides to it, topology filtering vs SID selection to encode the selected the path in a given topology. If we take a simplistic case of a FAD with metric Delay without any constraints, assuming the entire network supports the Algo, Algo=0 and Algo=Delay are one-to-one with a difference of weights, so the concern for topological filtering is not as significant – what matters is encoding of the intended “best path” (FAD+LspConstraints+Rules imposed on PCE) using SIDs from Algo 0 or Algo=Delay.  (Secondary comment about MSD below)

I just described topology which must be used and not SIDs. I can still imagine that if L=1 is set, then PCE will use FA topology, but it can still fallback into Algo-0 Prefix SIDs (even if I think that there is higher change that adj SIDs + FA SIDs will be used) assuming that final computed path will still be shortest path of specified ASLA metric and it will satisfy ASLA constraints from FAD.

[Andrew] Yep agreed.

Btw for your other example with MSD – I assume that in most of the cases you will end up with smaller number of SIDs if you will use FA SIDs (as IGP forwarding will be more aligned with intended constraints in PCE path-computation) when compared with algo-0 SIDs.

[Andrew] While I generally agree with you, it could still be possible (likely outlier scenarios)  where the path constraints and behavior imposed by PCE may need to deviate from the Algo shortest path (ex: Delay) significantly enough that MSD becomes constraining. This would be more likely to occur with combination of factors imposed at PCE, such as de-congestion optimization and rules such as Bidirectionality and/or Diversity which by its nature generally requires avoiding the shortest path, potentially for each set of LSPs having diversity imposed on them.

I’ll think about it a little bit more, L flag is definitely introducing extra complexity into both cases, so maybe even dropping that flag may work (PCE can still compute path mix of FA and algo0 SIDs even without any constraint, so maybe added value of SID-algo constraint + L=1 is relatively small) or we can modify it to restrict it to combination of FA SIDs + adj SIDs.

[Andrew] ACK. Will think more about it as well. I don’t have a concrete suggestion at this moment. I do agree we need one or many knobs in the picture , and it seems reasonable to drop knob(s) into the FA SID TLV, but just want to make sure we’re covering exactly what scenarios these knobs are intending to cover/not cover.

Regards,
Samuel

From: Andrew Stone (Nokia) <andrew.stone@nokia.com>
Sent: Wednesday, March 29, 2023 4:24 PM
To: peng.shaofu@zte.com.cn; Samuel Sidor (ssidor) <ssidor@cisco.com>
Cc: pce@ietf.org; pce-chairs@ietf.org; slitkows.ietf@gmail.com; dd@dhruvdhody.com
Subject: Re: [Pce] PCE SID-algo draft extension

Hi Samuel, PCE WG

I think your comparison points cover the differences well. Comparing/contrasting the two scenarios and behaviors should probably be in the updated document, too.

It does seem a need to signal the different behavior intention in some form or another (whether flag or inclusion/exclusion of constructs). Something not remarked in (B), is PCE implicitly restricted to using only SIDs found from the Flex Algo Tree? Or is it still permitted to use any SID it wants (existing draft L=1) if the path is using resources respecting the FAD. As an example, Let's say PCE computes a path based on FAD constraints but needs to work around constraints defined outside of the algo, such as known planned maintenance or other impairments/rules. Due to MSD, maybe it can't encode this path within the confines of the Algo specified. However, if it used Algo-0 or another SIDs it can encode the path. I would assume this should be permitted, but Is there a need to prohibit this and restrict (B) to also use only the SIDs from the same algo? I think I’m looking to clarify, if (A) is filtering strictness and (B) metric/constraint, is the behavior needed actually A||B, or is it A=true/false, B=true/false?

Thanks
Andrew

From: "peng.shaofu@zte.com.cn<mailto:peng.shaofu@zte.com.cn>" <peng.shaofu@zte.com.cn<mailto:peng.shaofu@zte.com.cn>>
Date: Wednesday, March 29, 2023 at 5:46 AM
To: "ssidor@cisco.com<mailto:ssidor@cisco.com>" <ssidor@cisco.com<mailto:ssidor@cisco.com>>
Cc: "pce@ietf.org<mailto:pce@ietf.org>" <pce@ietf.org<mailto:pce@ietf.org>>, "pce-chairs@ietf.org<mailto:pce-chairs@ietf.org>" <pce-chairs@ietf.org<mailto:pce-chairs@ietf.org>>, "slitkows.ietf@gmail.com<mailto:slitkows.ietf@gmail.com>" <slitkows.ietf@gmail.com<mailto:slitkows.ietf@gmail.com>>, "dd@dhruvdhody.com<mailto:dd@dhruvdhody.com>" <dd@dhruvdhody.com<mailto:dd@dhruvdhody.com>>, "Andrew Stone (Nokia)" <andrew.stone@nokia.com<mailto:andrew.stone@nokia.com>>
Subject: Re: [Pce] PCE SID-algo draft extension


CAUTION: This is an external email. Please be very careful when clicking links or opening attachments. See http://nok.it/ext for additional information.





Hi Samuel, WG,



Thanks for the effort work to get the consensus about path computation according to the content of FAD.

An explicit flag based on the existing SID-algo constraint for the purpose of behavior b, seems good to me.



Regards,

PSF




Original
From: SamuelSidor(ssidor) <ssidor@cisco.com<mailto:ssidor@cisco.com>>
To: pce@ietf.org<mailto:pce@ietf.org> <pce@ietf.org<mailto:pce@ietf.org>>;'pce-chairs' <pce-chairs@ietf.org<mailto:pce-chairs@ietf.org>>;
Cc: slitkows.ietf@gmail.com<mailto:slitkows.ietf@gmail.com> <slitkows.ietf@gmail.com<mailto:slitkows.ietf@gmail.com>>;'Dhruv Dhody' <dd@dhruvdhody.com<mailto:dd@dhruvdhody.com>>;彭少富10053815;Stone, Andrew (Nokia - CA/Ottawa) <andrew.stone@nokia.com<mailto:andrew.stone@nokia.com>>;
Date: 2023年03月29日 17:10
Subject: RE: [Pce] PCE SID-algo draft extension
Hi all,

Thanks all for discussion, which happened during PCE session and thanks for supporting this extension.

I think that we agreed that it is necessary to consider FAD in the path-computation on PCE side if SID-algo constraint was specified, but we were not able to finish discussion whether there is a need to introduce new flag, which will control whether original behavior (SID-algo filtering) or new behavior should be used, so re-opening this mail thread to finish that discussion.

I would say that there are really at least two usecases/behaviors for SID-algo constraint and we need new flag in SID-algorithm constraint to allow PCC to pick required behavior.


  1.  SID-filtering - already exists in the draft (valid for all algorithms)

  *   Path-computation should occur on the topology associated with specified SID-algo
  *   Computed path can have only SIDs of specified algo value (+ adjacency SIDs)
  *   PCE path-computation is done based on metric-type and constraints from PCRpt
  *   Flex-algo specific part:

     *   PCE still has to make sure that IGP path of FA SID is congruent with computed path

  1.  Path-computation based on FAD (only valid for Flex-algo)

  *   Metric-type and constraints are primarily retrieved from FAD
  *   Path-computation follow IGP Flex-algo path-computation logic

     *   Flex-algo participation, ASLA attributes,...

  *   Metric-type from FAD is overriding metric-type from PCRpt
  *   PCUpdate will use metric-type from FAD
  *   PCC can send metric-type in PCRpt and it does not have to be same as metric-type from FAD, but it is recommended to do not advertise any optimization metric
  *   Other constraints from PCRpt:

     *   PCE implementation can decide based on flags in PCEP object
     *   It is not recommended to specify constraints in PCRpt, which are already specified in FAD
     *   PCE is not supposed to include constraints from FAD in PCUpdate

Description here is slightly different then the proposal presented in original slides, but main idea is still same and more details is provided now. Please provide any comments.

Thanks,
Samuel

From: Pce <pce-bounces@ietf.org<mailto:pce-bounces@ietf.org>> On Behalf Of Samuel Sidor (ssidor)
Sent: Thursday, January 12, 2023 10:12 AM
To: slitkows.ietf@gmail.com<mailto:slitkows.ietf@gmail.com>; 'Dhruv Dhody' <dd@dhruvdhody.com<mailto:dd@dhruvdhody.com>>
Cc: pce@ietf.org<mailto:pce@ietf.org>; 'pce-chairs' <pce-chairs@ietf.org<mailto:pce-chairs@ietf.org>>
Subject: Re: [Pce] PCE SID-algo draft extension

Hi Dhruv,

Thanks for feedback. I completely agree – I would like to hear from WG if they can see added value in both (or they can specify even other) use-cases – using SID-algo constraint just for SID filtering and using it also for specification of constraints from FAD (I agree with Stephane here – computation based on in FAD seems to be even more important use-case to me and it is not covered in current version of that draft).

For constraint conflict solving – there are multiple possible solutions, but I would prefer to ignore metric-type from PCRpt (as metric-type would be retrieved from FAD) or reject PCEP Metric object completely (that may have potential issues with backward compatibility). Do not block usage of other constraints on top of SID-algo constraint explicitly in the draft – actual PCE implementation can still reject any combination of constraints, which PCE cannot handle (with PCUpdate with empty ERO or with some specific PCError) That would allow usage of some specific constraints like metric bounds on top of path computed with constraints from FAD. I would like to clearly specify in the draft that PCC is not supposed to reflect constraints from FAD in PCRpt as intended/requested attributes (only constraints, which should be used on top of FAD should be specified).

For SID-algo constraint signaling – can you please specify benefit of using association in this case? FAD with constraints is part of topology information received from IGP/BGP-LS, so we need to encode only algorithm number (and potentially source IGP, but that is separate story).

Thanks,
Samuel

From: slitkows.ietf@gmail.com<mailto:slitkows.ietf@gmail.com> <slitkows.ietf@gmail.com<mailto:slitkows.ietf@gmail.com>>
Sent: Tuesday, January 10, 2023 5:34 PM
To: 'Dhruv Dhody' <dd@dhruvdhody.com<mailto:dd@dhruvdhody.com>>; Samuel Sidor (ssidor) <ssidor@cisco.com<mailto:ssidor@cisco.com>>
Cc: pce@ietf.org<mailto:pce@ietf.org>; 'pce-chairs' <pce-chairs@ietf.org<mailto:pce-chairs@ietf.org>>
Subject: RE: [Pce] PCE SID-algo draft extension

Hi

Happy new year guys !

IMO, from a use case point of view, the SID filtering use case is far more limited and niche (e.g.: plane selection…) vs the interdomain FA path computation which is widely required. For large networks that are multidomain, there must be a PCE based solution for interdomain FA path computation.

Brgds,

Stephane

From: Pce <pce-bounces@ietf.org<mailto:pce-bounces@ietf.org>> On Behalf Of Dhruv Dhody
Sent: mardi 10 janvier 2023 14:00
To: Samuel Sidor (ssidor) <ssidor@cisco.com<mailto:ssidor@cisco.com>>
Cc: pce@ietf.org<mailto:pce@ietf.org>; pce-chairs <pce-chairs@ietf.org<mailto:pce-chairs@ietf.org>>
Subject: Re: [Pce] PCE SID-algo draft extension

Hi Samuel,

As a WG participant --- Assuming the WG agrees with the usecase, we need a clear way to signal when the Algo is a constraint along with others (current) v/s when Algo is a shorthand to refer to the constraints as per the IGP definition (proposed).

This could be a flag in the SID Algorithm TLV or could be a brand new mechanism (such as a new dynamic association type for FlexAlgo). More importantly, we need to be clear on how other PCEP constraints interact with the constraints referred in the IGP. The easiest thing would be to not allow other PCEP constraints to be encoded at all and rely only on IGP; or have flags to signal how to handle the complexity of combining them including mismatch! This needs to be handled with care!

Thanks!
Dhruv

On Tue, Jan 10, 2023 at 3:51 PM Samuel Sidor (ssidor) <ssidor@cisco.com<mailto:ssidor@cisco.com>> wrote:
Hi all,

I would like to get feedback from PCE WG for one extension proposed for existing SID-algo draft<https://datatracker.ietf.org/doc/html/draft-tokar-pce-sid-algo-05#name-sid-algorithm-constraint-2> (currently expired), which is trying to cover all existing algorithm types as defined in IGP – that includes SPF (algo 0), Strict-SPF (algo 1) and Flex-algo (algo 128-255)
It introduced SID-algo constraint, which currently can be used for filtering SIDs used in path computed by PCE.
To be able to compute inter-domain Flex-algo path, PCE Flex-algo path-computation must be aligned with path-computation done by IGP (Use ASLA attributes, honor FAD lookup priorities,…). This use-case is different one from SID filtering we need to use constraints/metric-type from Flex-algo definition that is bound to SID algo number specified in constraint.

Before we modify the draft, we would like to know if WG has any objection.

Thanks,
Samuel