Re: [Roll] [Bier] comments on draft-bergmann-bier-ccast

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Wed, 24 August 2016 08:43 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: roll@ietfa.amsl.com
Delivered-To: roll@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 722FE12D105; Wed, 24 Aug 2016 01:43:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.068
X-Spam-Level:
X-Spam-Status: No, score=-15.068 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.548, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BcnCF9tWkzpS; Wed, 24 Aug 2016 01:43:32 -0700 (PDT)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 78F6A12B006; Wed, 24 Aug 2016 01:43:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=18912; q=dns/txt; s=iport; t=1472028212; x=1473237812; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=36aoe3WtDhu86oA0hJGrqg1H5+9Yn2JpviuSeHqWWuE=; b=dgVz9QRGng9jcLvOXQXUELHw1VqGwMYEhKRknVgjwuFskAy2SeQACVhf GxXqz9TeZW7hO9S+OBHf2yy09j1HfgtfvoRSIZfv/7z+8MuwCp8sLLgop a/EW/y2DKpd/rzSA8DWHVwYbjjVVbz7QcTb+/gMKNEj26BmdJCQlb3GZJ c=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CeAgA1Xb1X/4wNJK1TCoJ2MwEBAQEBHlZ8B7J/hQiBfiSFeQIcgSw4FAIBAQEBAQEBXieEYQEBBQEBIQpBCwULAgEGAhEEAQEBJwMCAgIlCxQJCAIEAQ0FCIgpDpEwnSKPfQEBAQEBAQEBAQEBAQEBAQEBAQEBARcFhi2DSoEDhBgEClCCS4JaBY4fhTmFcAGPGo9XjECDeAEeNoN6cIRMgS9/AQEB
X-IronPort-AV: E=Sophos;i="5.28,570,1464652800"; d="scan'208,217";a="141281519"
Received: from alln-core-7.cisco.com ([173.36.13.140]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 24 Aug 2016 08:43:31 +0000
Received: from XCH-ALN-002.cisco.com (xch-aln-002.cisco.com [173.36.7.12]) by alln-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id u7O8hVxk026455 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 24 Aug 2016 08:43:31 GMT
Received: from xch-rcd-001.cisco.com (173.37.102.11) by XCH-ALN-002.cisco.com (173.36.7.12) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Wed, 24 Aug 2016 03:43:30 -0500
Received: from xch-rcd-001.cisco.com ([173.37.102.11]) by XCH-RCD-001.cisco.com ([173.37.102.11]) with mapi id 15.00.1210.000; Wed, 24 Aug 2016 03:43:30 -0500
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Routing Over Low power and Lossy networks <roll@ietf.org>, "Toerless Eckert (eckert)" <eckert@cisco.com>
Thread-Topic: [Roll] [Bier] comments on draft-bergmann-bier-ccast
Thread-Index: AQHR42H9QkvIKraad06ufrAuq2A536BX/SLA
Date: Wed, 24 Aug 2016 08:43:18 +0000
Deferred-Delivery: Wed, 24 Aug 2016 08:43:00 +0000
Message-ID: <7ae35a98f9154acda69488f93e8d8e6d@XCH-RCD-001.cisco.com>
References: <CA+wi2hOQOG+8YYTNRp7eW42dpFynuiiSd+UofjansWgLYv8DPQ@mail.gmail.com> <579058F8.1040701@tzi.org> <20160721091318.GA21876@cisco.com> <CA+wi2hMM=tGvpUOPs+SWj1uGsZLzA3jXkDe1qxGKFK868Rvgvw@mail.gmail.com>
In-Reply-To: <CA+wi2hMM=tGvpUOPs+SWj1uGsZLzA3jXkDe1qxGKFK868Rvgvw@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.228.216.17]
Content-Type: multipart/alternative; boundary="_000_7ae35a98f9154acda69488f93e8d8e6dXCHRCD001ciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/roll/Q1f4wKphSrCdtfeR9kgXRPJFQgA>
Cc: "bier@ietf.org" <bier@ietf.org>, "draft-bergmann-bier-ccast@ietf.org" <draft-bergmann-bier-ccast@ietf.org>
Subject: Re: [Roll] [Bier] comments on draft-bergmann-bier-ccast
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
Reply-To: Routing Over Low power and Lossy networks <roll@ietf.org>
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/roll>, <mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/roll/>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>, <mailto:roll-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Aug 2016 08:43:35 -0000

If you have a spanning tree (like a RPL preferred parent tree) or even a DODAG (the traditional structure RPL builds), and then you follow it, the packets will not loop.
The false positive causes a packet to be forwarded down the tree by a grand-parent to a parent that has children that match some of the bits and other children that match some others of the bits; so the parent as an advertiser of the whole set of bits for all its children appears to match all the bits. The false positive makes it so that the parent will get an extraneous copy of the packet. And the packet may be forwarded uselessly down the tree till the parent with the fork, some bits only via one child and some other bits only via another child, so no match. That parent will drop the packet. End of the story.

Pascal

From: Roll [mailto:roll-bounces@ietf.org] On Behalf Of Tony Przygienda
Sent: jeudi 21 juillet 2016 17:07
To: Toerless Eckert (eckert) <eckert@cisco.com>
Cc: Routing Over Low power and Lossy networks <roll@ietf.org>; bier@ietf.org; draft-bergmann-bier-ccast@ietf.org
Subject: Re: [Roll] [Bier] comments on draft-bergmann-bier-ccast

yep, all good discussion. Of all, I missed the possible looping for BIER of false positives. That needs treatment before the whole idea is feasible I think ...

On Thu, Jul 21, 2016 at 2:13 AM, Toerless Eckert <eckert@cisco.com<mailto:eckert@cisco.com>> wrote:
Thinking more of it (fun to analyse ;-):

Without having done the math, i'd suspect this might be very efficient in
very large networks for small-receiver-sets. Aka: 2048 NFER/receivers, 64
bits bitstring, max normal number of receivers ca. 16 for a packet.

This could be very efficient in very large networks for "small-receiver-set".
Aka: 2048 BFER/receivers. Maybe typically 16 receivers.

This is not 100% tied to RPL. Consider a data-center with 100,000 VMs,
with thousands of 'vlans', each hosting a typically a quite limited
number of VMs. Instead of creating per-VLAN flood-state across the DC
(which AFAIK gets complicated with all the overlay options involved),
you could simply use maybe hmm... 256 ? bits bitstring.

You need spanning tree forwarding (no redundancy). And you need some
logic figuring out the intermediate  interfaces in the bitstring. In
RPL, the root does this. In a DC this could be more tricky.

On Thu, Jul 21, 2016 at 07:09:12AM +0200, Carsten Bormann wrote:
> Hi Tony,
>
> thanks for taking note of this draft.
>
> > Generally, not sure how it touches BIER specifically. It seems to
> > specify RPL extensions.
>
> Indeed. We used the "WG name" BIER in the draft at the time we submitted
> the first version because the BIER BOF was just happening and we weren't
> sure where this would end up.  By now it is pretty clear this will end
> up in ROLL (if at all), but resubmitting the draft to create a new -00
> just for a WG name change is confusing.
>
> > Yes, one could reuse the BIER bit mask to
> > propagate a BLOOM filter instead of a perfect mask @ the benefit of 'set
> > bit mask compression' vs. the cost of spurious transmissions as the
> > draft acknowledges where the degenerate case is a full broadcast. The
> > according BIER procedures/approach is nowhere to be found in the draft
> > though ...
>
> No, as we are indeed focusing on RPL.
>
> One very important thing we get from RPL is the rank, which allows us to
> avoid forwarding loops even though the individual routers are pretty
> much oblivious about the structure of the network (non-storing mode is
> based on source routes from the root of the destination-oriented
> directed acyclic graph, DODAG).  So I wouldn't immediately know how to
> generalize the current approach to other underlying unicast routing
> protocols.  But the use of bloom filters (instead of bitmaps) to
> identify a set of outgoing interfaces is probably extractable, if that
> is useful somewhere else.
>
> > As nit I didn't find in 6550 anything talking about "storing mode" so a
> > better reference is needed.
>
> Hmm, I find 81 places in there.  (But Ccast is for non-storing mode.)
>
> Grüße, Carsten
>
> _______________________________________________
> Roll mailing list
> Roll@ietf.org<mailto:Roll@ietf.org>
> https://www.ietf.org/mailman/listinfo/roll

--
---
Toerless Eckert, eckert@cisco.com<mailto:eckert@cisco.com>



--
We’ve heard that a million monkeys at a million keyboards could produce the complete works of Shakespeare; now, thanks to the Internet, we know that is not true.
—Robert Wilensky