Re: [PWE3] Poll for WG adoption of draft-shen-pwe3-endpoint-fast-protection-04

Yimin Shen <yshen@juniper.net> Thu, 05 September 2013 13:24 UTC

Return-Path: <yshen@juniper.net>
X-Original-To: pwe3@ietfa.amsl.com
Delivered-To: pwe3@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 207E611E8191 for <pwe3@ietfa.amsl.com>; Thu, 5 Sep 2013 06:24:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.399
X-Spam-Level:
X-Spam-Status: No, score=-3.399 tagged_above=-999 required=5 tests=[AWL=-1.000, BAYES_00=-2.599, J_CHICKENPOX_27=0.6, J_CHICKENPOX_55=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UrtiJJZU7CQZ for <pwe3@ietfa.amsl.com>; Thu, 5 Sep 2013 06:24:23 -0700 (PDT)
Received: from co1outboundpool.messaging.microsoft.com (co1ehsobe003.messaging.microsoft.com [216.32.180.186]) by ietfa.amsl.com (Postfix) with ESMTP id 46A8711E8140 for <pwe3@ietf.org>; Thu, 5 Sep 2013 06:24:22 -0700 (PDT)
Received: from mail154-co1-R.bigfish.com (10.243.78.250) by CO1EHSOBE014.bigfish.com (10.243.66.77) with Microsoft SMTP Server id 14.1.225.22; Thu, 5 Sep 2013 13:24:19 +0000
Received: from mail154-co1 (localhost [127.0.0.1]) by mail154-co1-R.bigfish.com (Postfix) with ESMTP id 164F37401C3; Thu, 5 Sep 2013 13:24:19 +0000 (UTC)
X-Forefront-Antispam-Report: CIP:157.56.240.101; KIP:(null); UIP:(null); IPV:NLI; H:BL2PRD0510HT003.namprd05.prod.outlook.com; RD:none; EFVD:NLI
X-SpamScore: -25
X-BigFish: VPS-25(zz98dI9371I542Iec9I1432I4015I1447Izz1f42h208ch1ee6h1de0h1fdah2073h1202h1e76h1d1ah1d2ah1fc6hzz8275ch1de098h1033IL17326ah1de097h186068h8275bh8275dhz2fh2a8h839h944hd24hf0ah1220h1288h12a5h12a9h12bdh137ah13b6h1441h1504h1537h153bh162dh1631h1758h18e1h1946h19b5h19ceh1ad9h1b0ah1d07h1d0ch1d2eh1d3fh1de9h1dfeh1dffh1e1dh1fe8h1ff5h9a9j1155h)
Received-SPF: pass (mail154-co1: domain of juniper.net designates 157.56.240.101 as permitted sender) client-ip=157.56.240.101; envelope-from=yshen@juniper.net; helo=BL2PRD0510HT003.namprd05.prod.outlook.com ; .outlook.com ;
X-Forefront-Antispam-Report-Untrusted: SFV:NSPM; SFS:(37854004)(377454003)(164054003)(51914003)(13464003)(24454002)(199002)(51704005)(189002)(19580405001)(83322001)(74706001)(80976001)(31966008)(19580395003)(74662001)(74502001)(81686001)(47446002)(15975445006)(46102001)(33646001)(76576001)(74876001)(51856001)(63696002)(76796001)(76786001)(66066001)(56776001)(53806001)(65816001)(54316002)(76482001)(15202345003)(81816001)(69226001)(77096001)(80022001)(54356001)(56816003)(81542001)(50986001)(59766001)(47976001)(77982001)(79102001)(74366001)(4396001)(47736001)(74316001)(81342001)(83072001)(49866001)(24736002); DIR:OUT; SFP:; SCL:1; SRVR:BY2PR05MB045; H:BY2PR05MB046.namprd05.prod.outlook.com; CLIP:66.129.232.2; RD:InfoNoRecords; A:1; MX:1; LANG:en;
Received: from mail154-co1 (localhost.localdomain [127.0.0.1]) by mail154-co1 (MessageSwitch) id 137838745728653_2246; Thu, 5 Sep 2013 13:24:17 +0000 (UTC)
Received: from CO1EHSMHS010.bigfish.com (unknown [10.243.78.231]) by mail154-co1.bigfish.com (Postfix) with ESMTP id 03C3710004D; Thu, 5 Sep 2013 13:24:17 +0000 (UTC)
Received: from BL2PRD0510HT003.namprd05.prod.outlook.com (157.56.240.101) by CO1EHSMHS010.bigfish.com (10.243.66.20) with Microsoft SMTP Server (TLS) id 14.16.227.3; Thu, 5 Sep 2013 13:24:16 +0000
Received: from BY2PR05MB045.namprd05.prod.outlook.com (10.242.34.143) by BL2PRD0510HT003.namprd05.prod.outlook.com (10.255.100.38) with Microsoft SMTP Server (TLS) id 14.16.353.4; Thu, 5 Sep 2013 13:24:06 +0000
Received: from BY2PR05MB046.namprd05.prod.outlook.com (10.242.34.144) by BY2PR05MB045.namprd05.prod.outlook.com (10.242.34.143) with Microsoft SMTP Server (TLS) id 15.0.745.25; Thu, 5 Sep 2013 13:24:04 +0000
Received: from BY2PR05MB046.namprd05.prod.outlook.com ([169.254.10.19]) by BY2PR05MB046.namprd05.prod.outlook.com ([169.254.10.37]) with mapi id 15.00.0745.000; Thu, 5 Sep 2013 13:24:03 +0000
From: Yimin Shen <yshen@juniper.net>
To: Sam Aldrin <aldrin.ietf@gmail.com>
Thread-Topic: [PWE3] Poll for WG adoption of draft-shen-pwe3-endpoint-fast-protection-04
Thread-Index: AQHOqQiPTMUBKIaxNEiuxDq0ds+E15m3Hj9Q
Date: Thu, 05 Sep 2013 13:24:03 +0000
Message-ID: <cfdd0e79a16d47ed8a04ad327fd6e377@BY2PR05MB046.namprd05.prod.outlook.com>
References: <CE466A08.4F679%matthew.bocci@alcatel-lucent.com> <CA+C0YO2kyz7yODHZPnZxYaMa++EKekAfzaV6FY5OCP4F9m5eSg@mail.gmail.com> <c1a012bf81624dfb87791af65fc43aed@BY2PR05MB046.namprd05.prod.outlook.com> <0DEEE3CD-FB44-43A5-9ED0-0EA537D31AB9@gmail.com>
In-Reply-To: <0DEEE3CD-FB44-43A5-9ED0-0EA537D31AB9@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [66.129.232.2]
x-forefront-prvs: 096029FF66
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
Cc: "pwe3@ietf.org" <pwe3@ietf.org>
Subject: Re: [PWE3] Poll for WG adoption of draft-shen-pwe3-endpoint-fast-protection-04
X-BeenThere: pwe3@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Pseudo Wires Edge to Edge <pwe3.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pwe3>, <mailto:pwe3-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pwe3>
List-Post: <mailto:pwe3@ietf.org>
List-Help: <mailto:pwe3-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pwe3>, <mailto:pwe3-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Sep 2013 13:24:38 -0000

Sam,

Hope the following can clarify for you...

PLR (point of local repair) and protector are two different routers in this mechanism. PLR detects failure and performs local repair. In egress PE and S-PE protection, the PLR is the PHP router (most likely a P router), and it repairs the transport tunnel locally by using any existing FRR mechanisms for RSVP, LDP and IP. The PLR (PHP router) shouldn't require configuration in your static PW case. The protector is the router that maintains context label tables and performs context specific label switching. This is where you may need some configuration for your scenario.

In the MS-PW case, there is a PW label swapping at the protector. In the co-located protector model, the protector swaps the PW label to the PW label of the next segment of the backup PW; In centralized protector model, the protector swaps the PW label to the PW label of the current corresponding segment of the backup PW. In any case, the PW label is NOT tunneled unchanged all the way to the egress T-PE.

The transport tunnel should not carry non-PW traffic. This because the destination of the tunnel is the context ID of {primary PE, protector}, rather than a private IP address of the primary PE. The destination should differentiate the tunnel from regular tunnels to the primary PE, and hence the ingress PE should not put non-PW traffic on this tunnel.

This mechanism has no impact on PW OAM (e.g. VCCV). In egress AC failure, OAM should be up, because the primary PW is still up. In egress PE and S-PW failure, OAM should go down (as it does today without egress protection), which is exactly the desired behavior because we want to rely on it to trigger and expedite a global repair at ingress PE.



Thanks,

-Yimin



-----Original Message-----
From: Sam Aldrin [mailto:aldrin.ietf@gmail.com] 
Sent: Tuesday, September 03, 2013 8:49 PM
To: Yimin Shen
Cc: Bocci, Matthew (Matthew); pwe3@ietf.org
Subject: Re: [PWE3] Poll for WG adoption of draft-shen-pwe3-endpoint-fast-protection-04

Yimin,

Thanks for the reply.
My comments inline with %sam.
On Aug 31, 2013, at 6:40 AM, Yimin Shen <yshen@juniper.net> wrote:

> Sam,
> 
> Thanks for your questions. 
> 
> This draft assumes LDP-signaled PWs, which is the case in most PWE3 deployment. But we can add some text to also address the scenarios that you mentioned with static PWs or mixture of dynamic + static PWs. In fact, all the procedures in the draft will still apply in this case, except that you won't need the LDP extension in section 5, because you don't have LDP. 
%sam - I would definitely like to see explicit text added regarding PW with no dynamic signaling. Would like to see how it affects in static MS-PW with S-TLV, if any. 
> 
> So instead of running LDP between a pair of primary PE and protector, all you need is static configuration on the protector to coordinate it with the primary PE and make sure correct forwarding state is installed, so that the protector can send redirected traffic towards the target CE. The PLR's behavior will be the same as currently specified. In particular, you will need to do the followings on the protector.
%sam - What you say is true for CE protection. But I do not think it is the same for (T/S) PE protection. You are requiring configuration on PHP. See further questions below, on why.
> 
> - know which primary PEs and primary PWs or PW segments that the protector protects.
> - create a context label table for each primary PE.
> - install a label route for each protected PW or PW segment in the corresponding context label table. The next hop should be the backup AC (in the case of SS-PW) or a label swap to the label of the next segment of the backup PW (in the case of MS-PW).
> - point incoming bypass tunnel(s) to their corresponding context label table, to result in a label look-up in that table.
%sam - the above will not work in all the cases.

1. In the case of MSPW interAS option B, it will fail as you cannot tunnel through the PW label and assume it to be constant across the segments.
2. when you perform OAM, like trace of MSPW using LSP ping with VCCV, it will fail with the existing model. There are lot of other scenarios which I could think off, where existing OAM mechanisms.
3. For T/S PE protection(fig 7), you are actually creating protection for the underlying transport lsp. correct? If so, it is not actually PW protection, rather the underlying LSP protection. In that case, it will (configuration) affect any traffic which uses that transport LSP. Have you considered non-PW traffic using the same transport lsp as PW? Also, why is it in PWE3 working group and not in MPLS 4. If you say, the configuration/context label+table is created on PHP (in case of S/T PE) is only for PW, this is now introducing config on PHP, on which there is no PW awareness, right. And I am not clear with the text in this regard.
5. I do not see any section on how this will cause impact on OAM. As in the above question, it will impact and also cause breakage of existing mechanisms.

Like I said earlier, I fail to see the current draft describing clearly the scenarios I have identified for now. would like to see them clarified prior to adoption.

-sam
> 
> Then your forwarding state is ready in place. This is applicable to static SS-PWs, static MS-PWs, and static and dynamic MS-PW segment stitching. Essentially, the forwarding state in the data-plane is the ultimate goal of this PW endpoint protection. If your network already has LDP for PW signaling, you can used the LDP extension to coordinate your protector with primary PE. Otherwise, just use static configuration to achieve the same.
> 
> Hope this has answered your questions.
> 
> 
> Thanks,
> 
> -Yimin Shen
> Juniper Networks
> 
> 
> From: pwe3-bounces@ietf.org [mailto:pwe3-bounces@ietf.org] On Behalf 
> Of Sam Aldrin
> Sent: Friday, August 30, 2013 2:29 PM
> To: Bocci, Matthew (Matthew)
> Cc: pwe3@ietf.org
> Subject: Re: [PWE3] Poll for WG adoption of 
> draft-shen-pwe3-endpoint-fast-protection-04
> 
> Hi,
> I would like to see the  following questions answered before the document could be adopted.
> Here are the reasons why.
> 1. The scope of the document says End point protection for SS-PW and MS-PW. But what it is failing to consider is the absence of signaling component. I do not see how this will work when the PW's are set up statically w/o the dynamic signaling in both SS-PW and MS-PW?
> 
> 2. Would also like to see how the protection works, in terms of setup and working model, where a MS-PW is made of dynamically signaled SS-PW and statically setup SS-PW stitched to form a MS-PW.
> 3. By reading sec 5. the way I understood that this is only possible with control plane being present. If my understanding is incorrect, would like to see text detailing on how this could be achieved in the absence of CP(control plane).
> 4. In case CP is mandatory, I would like to see the document title and scope to change to reflect the same.
> thanks
> -sam
> 
> On Fri, Aug 30, 2013 at 7:26 AM, Bocci, Matthew (Matthew) <matthew.bocci@alcatel-lucent.com> wrote:
> This email begins a two week poll to help the chairs determine if there is consensus to adopt draft-shen-pwe3-endpoint-fast-protection-04 as an PWE3 working group draft.
> 
> The draft can be found here: 
> http://tools.ietf.org/id/draft-shen-pwe3-endpoint-fast-protection-04.t
> xt
> 
> Please read the draft and indicate to the list if you support adoption, or if you do not support adoption (giving reasons).
> 
> Please note that this is only a call for adoption. There needs to be consensus that this draft is a good basis for the work, but it does not need to be perfect at this stage.
> 
> The poll for adoption will close in two weeks time, on Friday 13th September.
> 
> Best regards,
> 
> Matthew
> 
> _______________________________________________
> pwe3 mailing list
> pwe3@ietf.org
> https://www.ietf.org/mailman/listinfo/pwe3
> 
>