Re: [PWE3] [mpls] Seeking feedback on I-D "MPLS-TPLinearProtectionApplicability to MS-PW"

"Sprecher, Nurit (NSN - IL/Hod HaSharon)" <nurit.sprecher@nsn.com> Mon, 13 June 2011 15:23 UTC

Return-Path: <nurit.sprecher@nsn.com>
X-Original-To: pwe3@ietfa.amsl.com
Delivered-To: pwe3@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA67521F84A2; Mon, 13 Jun 2011 08:23:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.997
X-Spam-Level:
X-Spam-Status: No, score=-5.997 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HS_INDEX_PARAM=0.001, HTML_MESSAGE=0.001, J_CHICKENPOX_29=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oiZ9CLZ31lVI; Mon, 13 Jun 2011 08:23:33 -0700 (PDT)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) by ietfa.amsl.com (Postfix) with ESMTP id A62F621F8493; Mon, 13 Jun 2011 08:23:32 -0700 (PDT)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd001.nsn-inter.net (8.12.11.20060308/8.12.11) with ESMTP id p5DFNS69019138 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 13 Jun 2011 17:23:28 +0200
Received: from demuexc022.nsn-intra.net (demuexc022.nsn-intra.net [10.150.128.35]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id p5DFNRtA028980; Mon, 13 Jun 2011 17:23:27 +0200
Received: from DEMUEXC014.nsn-intra.net ([10.150.128.25]) by demuexc022.nsn-intra.net with Microsoft SMTPSVC(6.0.3790.4675); Mon, 13 Jun 2011 17:23:27 +0200
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01CC29DD.D836CE89"
Date: Mon, 13 Jun 2011 17:23:25 +0200
Message-ID: <077E41CFFD002C4CAB7DFA4386A5326403F64A13@DEMUEXC014.nsn-intra.net>
In-Reply-To: <A3C5DF08D38B6049839A6F553B331C76E9BDCA9AB7@ILPTMAIL02.ecitele.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [mpls] [PWE3] Seeking feedback on I-D "MPLS-TPLinearProtectionApplicability to MS-PW"
Thread-Index: AcwpxQYkt1VB87JDQZmWlDJG9yJyKgAABTPQAADcskAABE5ygAAADmpwAADpDNA=
References: <OF7EF3F6D6.7AE4C202-ON482578AE.00430DDE-482578AE.0044404E@zte.com.cn><A3C5DF08D38B6049839A6F553B331C76E9BDCA9A38@ILPTMAIL02.ecitele.com> <077E41CFFD002C4CAB7DFA4386A5326403F64953@DEMUEXC014.nsn-intra.net> <44F4E579A764584EA9BDFD07D0CA081306CF33B5@tlvmail1> <A3C5DF08D38B6049839A6F553B331C76E9BDCA9AB7@ILPTMAIL02.ecitele.com>
From: "Sprecher, Nurit (NSN - IL/Hod HaSharon)" <nurit.sprecher@nsn.com>
To: ext Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>, Daniel Cohn <DanielC@orckit.com>
X-OriginalArrivalTime: 13 Jun 2011 15:23:27.0803 (UTC) FILETIME=[D829C8B0:01CC29DD]
Cc: ma.yuxia@zte.com.cn, mpls@ietf.org, pwe3@ietf.org
Subject: Re: [PWE3] [mpls] Seeking feedback on I-D "MPLS-TPLinearProtectionApplicability to MS-PW"
X-BeenThere: pwe3@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Pseudo Wires Edge to Edge <pwe3.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pwe3>, <mailto:pwe3-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pwe3>
List-Post: <mailto:pwe3@ietf.org>
List-Help: <mailto:pwe3-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pwe3>, <mailto:pwe3-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Jun 2011 15:23:39 -0000

If you do it on the client service layer, you can protect also the
T-PE...

Why do you want to protect only against a failure of the S-PE? The PW
starts at the T-PE...

 

From: ext Alexander Vainshtein [mailto:Alexander.Vainshtein@ecitele.com]

Sent: Monday, June 13, 2011 6:11 PM
To: Daniel Cohn
Cc: mpls@ietf.org; pwe3@ietf.org; Sprecher, Nurit (NSN - IL/Hod
HaSharon); ma.yuxia@zte.com.cn
Subject: RE: [mpls] [PWE3] Seeking feedback on I-D
"MPLS-TPLinearProtectionApplicability to MS-PW"

 

Daniel and all,

Please see some comments inline below.

 

Regards,

     Sasha

 

From: Daniel Cohn [mailto:DanielC@orckit.com] 
Sent: Monday, June 13, 2011 5:55 PM
To: Sprecher, Nurit (NSN - IL/Hod HaSharon); Alexander Vainshtein;
ma.yuxia@zte.com.cn
Cc: mpls@ietf.org; pwe3@ietf.org
Subject: RE: [mpls] [PWE3] Seeking feedback on I-D
"MPLS-TPLinearProtection Applicability to MS-PW"

 

Hi,

 

Thanks all for the feedback. I believe we all agree that PW protection
is only required in the event of S-PE failure at an MS-PW - this  is
clearly stated in the draft. Now, both Sasha and Nurit mention that the
PW redundancy mechanism can meet the MPLS-TP PW protection requirements.

 

First of all a word on scalability. Please note that in an MPLS-TP
environment without a control plane, the PW redundancy mechanism must
also rely on proactive connectivity check for fast failure detection to
meet the sub-50 ms requirement. [[[Sasha]]] IMO there is nothing
specific to MPLS-TP here. Detecting S-PE failures based on the control
plane would  not fast enough.

Therefore any scalability considerations that apply to the PW protection
draft apply to the PW redundancy draft as well.[[[Sasha]]] I have not
raised the scalability issue. My issue was limited applicability scope
when compared to PW redundancy. E.g., the PW redundancy mechanisms take
care of dual-homed CEs in SS- and MS-PWs - something that liner
protection of PWs cannot do.

Also wrt scalability, there is no such thing as "scales" or "doesn't
scale" - scalability is not a binary concept. You can say that PW
protection scales worse than LSP protection, just like you can say that
LSP protection scales worse than interface protection. Which didn't stop
IETF from defining LSP protection for scenarios where interface
protection doesn't do the job.

 

Now let's turn our attention back to whether the PW redundancy draaft
can be used to meet MPLS-TP PW protection requirements. I can identify
the following reasons why in its current form it doesn't:

 

-          It explicitly ("outside the scope") does not define
protection triggers and how to handle coexisting triggers, as requested
in RFC 5654 (MPLS-TP Requirements), reqs #75, #76 and #79

[[[Sasha]]] So what? Definition of triggers is orthogonal to how
coordinated protection switching happens.

-          It does not support the ability to distinguish between
different types of triggers (i.e. one end doesn't know why the other end
triggered switch), as requested in RFC 5654 (MPLS-TP Requirements), req
#77

-          It does not define revertive/nonrevertive behavior, as
requested in RFC 5654 (MPLS-TP Requirements), req #64

-          It does not define holdoff support, which is especially
important to avoid race conditions with LSP protection when it exists

-          It doesn't support 1+1 mode, as requested in RFC 5654
(MPLS-TP Requirements), req #65 

[[[Sasha]]] All these claims are correct - and  this should not be a
surprise, because MPLS-TP requirements have been defined much later than
the PW redundancy mechanism. 

But I do not think that this justifies co-existence of two different
mechanisms.

-          It's a two-phase protocol, with the consequent impact on
timing[[[Sasha]]] Could you please elaborate? 

-          It doesn't define retransmission of protection coordination
messages, so loss of a single PDU can result in switchover not taking
place, thus not supporting sub-50 ms recovery in this case

[[[Sasha]]] The PW redundancy protocol runs either on top of LDP (which
benefits from TCP retransmissions) or on top of static PW status
messages (where retransmission is defined). 

 

In summary, PW redundancy was not designed with TP requirements in mind,
and as such does not meet the TP requirements. Of course modifications
may be introduced, but why reinvent the wheel when there is a protocol
(draft-ietf-mpls-tp-linear-protection-06) in the standards track that
supports all the above requirements and can be applied to MS-PW
protection with minor modifications?

[[[Sasha]]] As I said, because the applicability scope is by far too
narrow to justify a dedicated protocol.

 

Regards,

 

Daniel

 

 

From: mpls-bounces@ietf.org [mailto:mpls-bounces@ietf.org] On Behalf Of
Sprecher, Nurit (NSN - IL/Hod HaSharon)
Sent: Monday, June 13, 2011 4:02 PM
To: ext Alexander Vainshtein; ma.yuxia@zte.com.cn
Cc: mpls@ietf.org; pwe3@ietf.org
Subject: Re: [mpls] [PWE3] Seeking feedback on I-D
"MPLS-TPLinearProtection Applicability to MS-PW"

 

Hi,

I would like to second Sasha.

End-to-end PW protection (with diverse paths) does not scale, and put
hard restrictions on the utilization of the resources.  

MPLS-TP PWs are carried across the network inside MPLS-TP LSPs.
Therefore, an obvious way to provide protection for a PW is to protect
the LSP that carries it.  

If the PW is a multi-segment PW, then LSP recovery can only protect the
PW in individual segments.  This means that a single LSP recovery action
cannot protect against a failure of a PW switching point (an S-PE).

When protecting against an AC or T/S-PE failure by dual connectivity, PW
redundancy mechanisms provide means for the PEs to coordinate over which
LSP the traffic of the PW is carried. 

I also doubt why there is a need for additional mechanism. 

Best regards,

Nurit

 

From: pwe3-bounces@ietf.org [mailto:pwe3-bounces@ietf.org] On Behalf Of
ext Alexander Vainshtein
Sent: Monday, June 13, 2011 3:43 PM
To: ma.yuxia@zte.com.cn
Cc: mpls@ietf.org; pwe3@ietf.org
Subject: Re: [PWE3] [mpls] Seeking feedback on I-D "MPLS-TP
LinearProtection Applicability to MS-PW"

 

Dear Ma and all,

Adding the PWE3 WG to my response.

 

The PW redundancy mechanism supports linear protection of MS-PWs as one
of many additional application use cases:

Appendix A of the PW redundancy Bit draft
<http://datatracker.ietf.org/doc/draft-ietf-pwe3-redundancy-bit/?include
_text=1>  describes 5 application uses cases in addition to MS-PW with
single-homed CEs (which is listed there as use case 5).

And it is equally applicable to IP/MPLS and MPLS - with the help of  the
Static PW Status Messages draft
<http://datatracker.ietf.org/doc/draft-ietf-pwe3-static-pw-status/?inclu
de_text=1> ( if, for whatever reason, you do not want  to, or cannot,
use RFC 4447 <http://datatracker.ietf.org/doc/rfc4447/?include_text=1>
).

 

Hence I doubt the need for yet another PW redundancy  mechanism with
narrow scope of applicability.

 

Regards,

     Sasha

 

From: mpls-bounces@ietf.org [mailto:mpls-bounces@ietf.org] On Behalf Of
ma.yuxia@zte.com.cn
Sent: Monday, June 13, 2011 3:25 PM
To: mpls@ietf.org
Subject: Re: [mpls] Seeking feedback on I-D "MPLS-TP Linear Protection
Applicability to MS-PW"

 

Hi all, 

The linear protection mechanism for LSP and PW(including MS-PW) should
be the same and it is valuable to describe it clearly. 

BTW, there is a typo, it is "T-PE Z" instead of "T-PE B". 

 " 
  Figure 1 illustrates such a scenario, where two MS-PWs are 
  established between T-PE A and T-PE B, over S-PEs 1-2 and 3-4 
  respectively. Each PW segment is established over an LSP (e.g. PW- 
  s12 over LSP12). 
 " 

-----Original Message-----
From: Daniel Cohn 
Sent: Tuesday, May 17, 2011 4:14 PM
To: mpls
Subject: Seeking feedback on I-D "MPLS-TP Linear Protection
Applicability to MS-PW"
Importance: High

Hi MPLSers,

I uploaded "MPLS-TP Linear Protection Applicability to MS-PW" I-D
(http://tools.ietf.org/html/draft-cohn-mpls-tp-pw-protection-00)

The abstract goes:

One of the requirements of the MPLS transport profile [RFC 5654] is
to provide linear protection for transport paths, which include both
LSPs and PWs. The functional architecture described in [SurvivFwk]
is applicable to both LSP and PWs, however [LinearProt] does not
explicitly describe mechanisms for PW protection in MPLS-TP.

This document extends the applicability of the linear protection
mechanism described in [LinearProt] to MPLS-TP segmented PWs 
(MS-PWs) as defined in [RFC 6073].

Could you please review it and send feedback to the mailing list or
directly to the author? 

Looking forward to your feedback, 

Daniel 

This e-mail message is intended for the recipient only and contains
information which is CONFIDENTIAL and which may be proprietary to ECI
Telecom. If you have received this transmission in error, please inform
us by e-mail, phone or fax, and then delete the original and all copies
thereof. 

This e-mail message is intended for the recipient only and contains
information which is CONFIDENTIAL and which may be proprietary to ECI
Telecom. If you have received this transmission in error, please inform
us by e-mail, phone or fax, and then delete the original and all copies
thereof.