Re: BFD stability follow-up from IETF-91

Mahesh Jethanandani <mjethanandani@gmail.com> Mon, 08 December 2014 07:33 UTC

Return-Path: <mjethanandani@gmail.com>
X-Original-To: rtg-bfd@ietfa.amsl.com
Delivered-To: rtg-bfd@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F15AD1A6FDF for <rtg-bfd@ietfa.amsl.com>; Sun, 7 Dec 2014 23:33:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tyFuBFnaMrud for <rtg-bfd@ietfa.amsl.com>; Sun, 7 Dec 2014 23:33:20 -0800 (PST)
Received: from mail-qa0-x22b.google.com (mail-qa0-x22b.google.com [IPv6:2607:f8b0:400d:c00::22b]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 41B691A6FD8 for <rtg-bfd@ietf.org>; Sun, 7 Dec 2014 23:33:20 -0800 (PST)
Received: by mail-qa0-f43.google.com with SMTP id bm13so2999341qab.16 for <rtg-bfd@ietf.org>; Sun, 07 Dec 2014 23:33:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=NAS89/GYZReQSbzkAOGzb/UeeKvH5RgF+oHAV3TMfcw=; b=J2jk3yPurz3bxv7tV+zTVyJ00pXLewODQTef6D2TaYaqKrplnzu4xGiPdIScwpjFZf CnC5eA2tBBX6Jxosq4+ewzF5tweaKHZbYD6T7yv1F2d00Ixb7nxEcvROOm6ztxf1OGIW BKY96w+F03yrun7PYf728NslPnkFl9XEu5hLSjAJ4yFD/OwZfqUGWdz74shH9pFZhxPe W/jxI/8MnSFKuvAXgnZrQMfnI1dOJLVOGQ6X1nbs3utyrUt9x/R1fy0mzoggB/YwxloZ DKVIqY6t4Upk2MMBXj3COzUD4NB0YK3HaTEF9R0UAFaQe9HcZYXeOeq0xRicdZ9qV6Od Zj6Q==
X-Received: by 10.140.88.177 with SMTP id t46mr48557536qgd.36.1418023999415; Sun, 07 Dec 2014 23:33:19 -0800 (PST)
Received: from [192.168.1.133] (108-247-127-76.lightspeed.sntcca.sbcglobal.net. [108.247.127.76]) by mx.google.com with ESMTPSA id l3sm32944800qav.16.2014.12.07.23.33.17 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Sun, 07 Dec 2014 23:33:18 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_DB7ED1CE-7C6A-47F6-893F-9C8578D8C170"
Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\))
Subject: Re: BFD stability follow-up from IETF-91
From: Mahesh Jethanandani <mjethanandani@gmail.com>
In-Reply-To: <D0AB424E.28B01%mmudigon@cisco.com>
Date: Sun, 07 Dec 2014 23:33:16 -0800
Message-Id: <3BF271DB-C70D-47FB-A702-B9A6157B123B@gmail.com>
References: <D0AB424E.28B01%mmudigon@cisco.com>
To: "MALLIK MUDIGONDA (mmudigon)" <mmudigon@cisco.com>
X-Mailer: Apple Mail (2.1993)
Archived-At: http://mailarchive.ietf.org/arch/msg/rtg-bfd/HzqqOoz1iU1LRXxj5rYS8b78_CM
Cc: "rtg-bfd@ietf.org" <rtg-bfd@ietf.org>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtg-bfd/>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Dec 2014 07:33:22 -0000

Let me try to see if I can bring the focus back on at least what the draft is trying to achieve. And I will do this by way of a customer scenario. 

Customer configures MPLS-TP with working and protect tunnels. Customer then configures BFD on both the working and protect tunnels. BFD flaps and triggers a failover to the protect tunnel. After the fact the customer wants to know why did the failover happen. 

We do not have the option of saying that they needed to change their hardware (to perform echo or hardware based time stamping) or to run other protocols continuously without impacting their network. I am outlining these parameters not because I want the solution to be limited to this situation but because most of the explanations or solutions seemed to have missed the fact that one is dealing with an existing network with existing hardware. So while the solution can extend itself to more configurations/situations it cannot ignore the existing setup.

How do we determine why a BFD session flapped? There are really two explanations to a BFD session flapping. Either the BFD packets were lost or packets were delayed. So the first determination is to do just that.

That essentially is germane to why the draft is written.

Cheers.

p.s. And to tell the customer that we had no way to explain why one of the features used to detect problems in the network cannot explain *why* a particular problem happens also does not help.

Mahesh Jethanandani
mjethanandani@gmail.com