Re: I-D ACTION:draft-shen-bfd-intf-p2p-nbr-00.txt

"Miya Kohno \(mkohno\)" <mkohno@cisco.com> Tue, 03 April 2007 15:50 UTC

Return-path: <rtg-bfd-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HYlGx-0008AX-TZ; Tue, 03 Apr 2007 11:50:15 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HYlGv-0008AG-T2 for rtg-bfd@ietf.org; Tue, 03 Apr 2007 11:50:13 -0400
Received: from ind-iport-1.cisco.com ([64.104.129.195]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1HYlGt-0007hy-Q9 for rtg-bfd@ietf.org; Tue, 03 Apr 2007 11:50:13 -0400
Received: from hkg-dkim-2.cisco.com ([10.75.231.163]) by ind-iport-1.cisco.com with ESMTP; 04 Apr 2007 10:18:22 +0530
X-IronPort-AV: i="4.14,366,1170613800"; d="scan'208"; a="77698611:sNHT68292588"
Received: from hkg-core-1.cisco.com (hkg-core-1.cisco.com [64.104.123.94]) by hkg-dkim-2.cisco.com (8.12.11/8.12.11) with ESMTP id l33Fo7K0016055 for <rtg-bfd@ietf.org>; Tue, 3 Apr 2007 23:50:07 +0800
Received: from xbh-hkg-411.apac.cisco.com (xbh-hkg-411.cisco.com [64.104.123.72]) by hkg-core-1.cisco.com (8.12.10/8.12.6) with ESMTP id l33Fo2jO013830 for <rtg-bfd@ietf.org>; Tue, 3 Apr 2007 15:50:07 GMT
Received: from xmb-hkg-416.apac.cisco.com ([64.104.123.88]) by xbh-hkg-411.apac.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); Tue, 3 Apr 2007 23:50:00 +0800
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Tue, 03 Apr 2007 23:49:50 +0800
Message-ID: <35912544FC930E49BF20EF16C3EF2765021A004E@xmb-hkg-416.apac.cisco.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: Re: I-D ACTION:draft-shen-bfd-intf-p2p-nbr-00.txt
Thread-Index: Acd2B7btnJE7PXGiTHCxVqspu1Eflw==
From: "Miya Kohno (mkohno)" <mkohno@cisco.com>
To: rtg-bfd@ietf.org
X-OriginalArrivalTime: 03 Apr 2007 15:50:00.0886 (UTC) FILETIME=[BCDDF560:01C77607]
DKIM-Signature: v=0.5; a=rsa-sha256; q=dns/txt; l=1880; t=1175615407; x=1176479407; c=relaxed/simple; s=hkgdkim2001; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=mkohno@cisco.com; z=From:=20=22Miya=20Kohno=20\(mkohno\)=22=20<mkohno@cisco.com> |Subject:=20Re=3A=20I-D=20ACTION=3Adraft-shen-bfd-intf-p2p-nbr-00.txt=20 |Sender:=20; bh=ZYMnkQ+Gxo7aJZ9ql3aVtjEFlEfCZgReh8W/kY5ACs4=; b=PQqQWAV3u8PkmNplGQ/c+ADCRND/8PmK0mvx8MxTGvcYXA6z74hkxVHFHwudkGrti/OproVl +n8QhB1cnSAMR4Ro6MD6XSqn3kBn2Y4gdlZGbQLUDZjj1R7MNGtl50bKyVDYZ9H1nlHkTr/XmV DZxZCpJEVBNeXrb36mJoUBpw8=;
Authentication-Results: hkg-dkim-2; header.From=mkohno@cisco.com; dkim=pass ( sig from cisco.com/hkgdkim2001 verified; );
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 50a516d93fd399dc60588708fd9a3002
Cc:
Subject: Re: I-D ACTION:draft-shen-bfd-intf-p2p-nbr-00.txt
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
Errors-To: rtg-bfd-bounces@ietf.org

Hi,

On Apr 2, 2007:1:14 PM, at 1:14 PM, Naiming Shen wrote:
> I agree the intf UP->Down signal is the key of this draft; but as I
pointed out
> in the previous email, there is also an important difference in the
bring-up stage
> in terms of non-protocol services, that the bfd session state is
condensed into
> an intf-based indication, which is very easy for implementation. Since
those
> services looking at the intf state anyway, to augment with tins
intf-p2p bfd,
> is just simply a one-line diff to those services.

I think the protocol-agnostic nature is more the essence of the draft,
rather than the interface UP->Down.

I've been thinking that, assuming the primary goal of BFD is to detect
the (un)liveness of underlying layer when it cannot generate/propagate
its fault status, it should not necessarily be tightly coupled with L3
protocols...

The protocol-agnostic nature would be very much suitable for static, TE
FRR/local protection and global path restoration/ protection (by
detecting-node generating PATH error to headend), which don't have a
direct upperlayer protocol peer. It could also be applicable for the
OSPFv3 prefixes, when it shares the same topology as OSPFv2. In fact,
the single topology is pretty much common in v4/v6 dual stack
deployment, so separately running BFDv6 session could be viewed as an
unnecessary overhead. 

A concern would be that bringing down the interface might be too
aggressive, depending on various situations. 

So how about including a less aggressive way ?  i.e.

  1) BFD session is to be associated with each p2p interface, not L3
protocol.
  2) each protocol instance register itself as a BFD client
  3) BFD clients should be notfiied in case of BFD session timeout

1) is only a bit new by the draft. But 2) and 3) is the same as the
existing implementation.

Miya