Re: [pim] I-D ACTION:draft-ietf-pim-group-rp-mapping-01.txt

"Andy Kessler (kessler)" <kessler@cisco.com> Mon, 06 July 2009 05:21 UTC

Return-Path: <kessler@cisco.com>
X-Original-To: pim@core3.amsl.com
Delivered-To: pim@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6C52F3A6927 for <pim@core3.amsl.com>; Sun, 5 Jul 2009 22:21:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mrI+MEpaXyXP for <pim@core3.amsl.com>; Sun, 5 Jul 2009 22:21:04 -0700 (PDT)
Received: from sj-iport-2.cisco.com (sj-iport-2.cisco.com [171.71.176.71]) by core3.amsl.com (Postfix) with ESMTP id 483213A69EC for <pim@ietf.org>; Sun, 5 Jul 2009 22:21:04 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.42,354,1243814400"; d="scan'208";a="182983054"
Received: from sj-dkim-4.cisco.com ([171.71.179.196]) by sj-iport-2.cisco.com with ESMTP; 06 Jul 2009 05:21:29 +0000
Received: from sj-core-1.cisco.com (sj-core-1.cisco.com [171.71.177.237]) by sj-dkim-4.cisco.com (8.12.11/8.12.11) with ESMTP id n665LTLq010603; Sun, 5 Jul 2009 22:21:29 -0700
Received: from xbh-sjc-231.amer.cisco.com (xbh-sjc-231.cisco.com [128.107.191.100]) by sj-core-1.cisco.com (8.13.8/8.14.3) with ESMTP id n665LTea028635; Mon, 6 Jul 2009 05:21:29 GMT
Received: from xmb-sjc-215.amer.cisco.com ([171.70.151.169]) by xbh-sjc-231.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.3959); Sun, 5 Jul 2009 22:21:29 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Sun, 05 Jul 2009 22:21:26 -0700
Message-ID: <65B900A32A86DB4EBF57C0D07F9B2A9E016DAA1E@xmb-sjc-215.amer.cisco.com>
In-Reply-To: <20090702115157.J82722@zircon.juniper.net>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [pim] I-D ACTION:draft-ietf-pim-group-rp-mapping-01.txt
Thread-Index: Acn7SBgLKcFo81WPQLixN/+3nZDDpQCrO1SA
References: <20090625174502.0FEDC3A6DE0@core3.amsl.com> <F35F8210-74BB-40B6-9389-054B2254A7A9@cisco.com> <65B900A32A86DB4EBF57C0D07F9B2A9E016581EB@xmb-sjc-215.amer.cisco.com> <20090701124258.Q34799@zircon.juniper.net> <65B900A32A86DB4EBF57C0D07F9B2A9E016DA35C@xmb-sjc-215.amer.cisco.com> <20090702115157.J82722@zircon.juniper.net>
From: "Andy Kessler (kessler)" <kessler@cisco.com>
To: Leonard Giuliano <lenny@juniper.net>
X-OriginalArrivalTime: 06 Jul 2009 05:21:29.0444 (UTC) FILETIME=[9DE45240:01C9FDF9]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=3339; t=1246857689; x=1247721689; c=relaxed/simple; s=sjdkim4002; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=kessler@cisco.com; z=From:=20=22Andy=20Kessler=20(kessler)=22=20<kessler@cisco. com> |Subject:=20RE=3A=20[pim]=20I-D=20ACTION=3Adraft-ietf-pim-g roup-rp-mapping-01.txt |Sender:=20; bh=QWmIj7NtgN+18f4xvrv3RoXawPX435efjXSYbuRpSkQ=; b=p6K0abD6W6L0uwbeOKC1u/iOu2mtWlurwTX8y0C0UjclopJpT7Wi4w8njg bxIoL/Nu7T+PjKfBjNaX7i6stCeFP3JAKBkFRuwxPZKmOY0TyK7D9lGd+Uv3 Oofsk6LQZH;
Authentication-Results: sj-dkim-4; header.From=kessler@cisco.com; dkim=pass ( sig from cisco.com/sjdkim4002 verified; );
Cc: pim@ietf.org
Subject: Re: [pim] I-D ACTION:draft-ietf-pim-group-rp-mapping-01.txt
X-BeenThere: pim@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Protocol Independent Multicast <pim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/pim>, <mailto:pim-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pim>
List-Post: <mailto:pim@ietf.org>
List-Help: <mailto:pim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pim>, <mailto:pim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jul 2009 05:21:05 -0000

Lenny, 

Yes, what you describe is what I was suggesting in my first reply
- that BSR applies the hash function to its mapping cache before
they are added to the common group-to-rp mapping table. 

We could go ahead and specify that in this draft and it might 
be fine. However, these are some of the other issues we should 
consider: 

o There are complications with creating hardware forwarding entries
  with PIM-Bidir maybe PIM-SM if the hash is used

o We want to clarify Section 4.7.1 and 4.7.2 of RFC 4601 which 
  describes the steps for group to RP mapping and use of the
  hash function. We are trying to improve the algorithm to also 
  consider: 

  - the origin of a group-to-rp mapping 
    (e.g. bsr, autorp, static, etc)

  - Allow for static override

  - Allow for higher priority of PIM-Bidir over PIM-SM which is
    described in section 3.3 of RFC 5059 [BSR]

Removing the hash from the group-to-rp mapping algorithm makes sense
for these reasons. But if we can come up with some language to describe
how the hash will be applied for BSR mappings and not in the general
case
- we may be open to that approach. 

Andy

-----Original Message-----
From: Leonard Giuliano [mailto:lenny@juniper.net] 
Sent: Thursday, July 02, 2009 12:00 PM
To: Andy Kessler (kessler)
Cc: pim@ietf.org
Subject: Re: [pim] I-D ACTION:draft-ietf-pim-group-rp-mapping-01.txt


Andy- to be clear, last year I suggested deprecating BSR, not just the 
hash, as Static Anycast is a much better approach.  However, if you are 
unwise enough to use BSR, the hash doesn't seem like a terribly
offensive 
way to load balance among multiple RPs.

I am not following you on the problem with the hash's applicability to 
other mechanisms.  The hash is just a tiebreaker within the BSR
mechanism.  
I don't see why it needs to be applicable to static or Auto-RP, just as 
local-pref is only applicable to BGP and means nothing to 
ISIS/OSPF/Static/etc.  What am I missing?


On Wed, 1 Jul 2009, Andy Kessler (kessler) wrote:

-) 
-) Hi Lenny, 
-) 
-) Routers can learn group to RP mapping information from several
sources 
-) including statically assigned, BSR, AutoRP and embedded RP. The
purpose 
-) of this draft is to develop a deterministic way to select a
particular 
-) mapping when we have a conflict. It doesn't have anything to do with 
-) advertising those mappings.
-) 
-) The problem with the hash function is that it only applies to BSR.
How 
-) do you apply the hash across static RP or any of the other methods ?
We 
-) debated at one point in saying that the BSR code itself could use the

-) hash and then decide which mappings it would present to the common 
-) group to RP mapping table. Then we thought it would be best just to 
-) drop it and recommend Anycast RP. We discussed this on the list.
-) 
-) Last year about this time you said that you agreed that Anycast is a 
-) better method for load balancing than the hashing function. You still

-) agree with that, right ?
-) 
-) I personally would never implement a network with the BSR hash. I'd 
-) want to which RP was responsible for which group - even if there was 
-) load sharing with Anycast.
-) 
-) Andy
-)