RE: draft-palanivelan-bfd-v2-gr-08

"Palanivelan A (apvelan)" <apvelan@cisco.com> Wed, 03 November 2010 07:04 UTC

Return-Path: <apvelan@cisco.com>
X-Original-To: rtg-bfd@core3.amsl.com
Delivered-To: rtg-bfd@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 991803A67E7 for <rtg-bfd@core3.amsl.com>; Wed, 3 Nov 2010 00:04:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d31pcEs2gByu for <rtg-bfd@core3.amsl.com>; Wed, 3 Nov 2010 00:04:32 -0700 (PDT)
Received: from ams-iport-1.cisco.com (ams-iport-1.cisco.com [144.254.224.140]) by core3.amsl.com (Postfix) with ESMTP id DE9523A67F0 for <rtg-bfd@ietf.org>; Wed, 3 Nov 2010 00:04:31 -0700 (PDT)
Authentication-Results: ams-iport-1.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AqQEAASm0EyQ/khNgWdsb2JhbAChXRUBARYiIqBsm2GFRQSEVYkO
X-IronPort-AV: E=Sophos;i="4.58,287,1286150400"; d="scan'208";a="68172836"
Received: from ams-core-4.cisco.com ([144.254.72.77]) by ams-iport-1.cisco.com with ESMTP; 03 Nov 2010 07:04:37 +0000
Received: from xbh-bgl-411.cisco.com (xbh-bgl-411.cisco.com [72.163.129.201]) by ams-core-4.cisco.com (8.14.3/8.14.3) with ESMTP id oA374665001673; Wed, 3 Nov 2010 07:04:37 GMT
Received: from xmb-bgl-411.cisco.com ([72.163.129.207]) by xbh-bgl-411.cisco.com with Microsoft SMTPSVC(6.0.3790.4675); Wed, 3 Nov 2010 12:34:36 +0530
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Subject: RE: draft-palanivelan-bfd-v2-gr-08
Date: Wed, 03 Nov 2010 12:34:28 +0530
Message-ID: <D4A66B38FC6C6E4F820A2470AEEA5CED02D5925F@XMB-BGL-411.cisco.com>
In-Reply-To: <0ED867EB33AB2B45AAB470D5A64CDBF60A9EF900E5@EUSAACMS0701.eamcs.ericsson.se>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: draft-palanivelan-bfd-v2-gr-08
Thread-Index: Act3i65W1yk6Mk4jT46fkkpkBhpHuACuaQOwAASk6G0AFHbswAAd0tKg
References: <D4A66B38FC6C6E4F820A2470AEEA5CED02D58EB6@XMB-BGL-411.cisco.com> <C8F4FED9.1F305%nitinb@juniper.net> <0ED867EB33AB2B45AAB470D5A64CDBF60A9EF900E5@EUSAACMS0701.eamcs.ericsson.se>
From: "Palanivelan A (apvelan)" <apvelan@cisco.com>
To: Jeff Tantsura <jeff.tantsura@ericsson.com>, Nitin Bahadur <nitinb@juniper.net>, Dave Katz <dkatz@juniper.net>
X-OriginalArrivalTime: 03 Nov 2010 07:04:36.0475 (UTC) FILETIME=[5FFF14B0:01CB7B25]
Cc: rtg-bfd WG <rtg-bfd@ietf.org>
X-BeenThere: rtg-bfd@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "RTG Area: Bidirectional Forwarding Detection DT" <rtg-bfd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtg-bfd>
List-Post: <mailto:rtg-bfd@ietf.org>
List-Help: <mailto:rtg-bfd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-bfd>, <mailto:rtg-bfd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Nov 2010 07:04:33 -0000

Nitin and Jeff,

What we are looking at with the solution that you suggested is, turning
off your feature so that it doesn't affect the tied application.
For me, this is more a workaround/ temporary fix to the issue and why do
you want to back-off than actually attacking the issue and solving it.

Again, this doesn't scale too. When the restarter has say about more bfd
sessions/neighbors, we will be adding more cycles to the restarter this
way.
If you look at any of the Graceful restart mechanisms, always the
helpers do more work than the restarter (for the simple reason, in a
scaled scenario, the helper gotto take care of one of its session and if
this is on the restarter, it got to take care for as many connected
neighbors).

Ideally since we have the diag fields available in bfd, we infact should
look to leverage it in managing better and hence have a complete
control.

Thanks and Regards,
A.Palanivelan

-----Original Message-----
From: Jeff Tantsura [mailto:jeff.tantsura@ericsson.com] 
Sent: Tuesday, November 02, 2010 9:50 PM
To: Nitin Bahadur; Palanivelan A (apvelan); Dave Katz
Cc: rtg-bfd WG
Subject: RE: draft-palanivelan-bfd-v2-gr-08

+1

Regards,
Jeff  
-----Original Message-----
From: rtg-bfd-bounces@ietf.org [mailto:rtg-bfd-bounces@ietf.org] On
Behalf Of Nitin Bahadur
Sent: Monday, November 01, 2010 23:34
To: Palanivelan A (apvelan); Dave Katz
Cc: rtg-bfd WG
Subject: Re: draft-palanivelan-bfd-v2-gr-08
Importance: High


Can u solve the first problem by bringing the BFD session
administratively
down on the router that is restarting? On an admin down, the remote peer
should not affect the BFD clients...and the sessions also won't time
out.

Thanks
Nitin

On 11/1/10 10:04 PM, "Palanivelan A (apvelan)" <apvelan@cisco.com>
wrote:

> To get started on this draft,
> This draft documents two issues with BFD and suggests a single
solution
> to address both.
> 
> 1) The first one is about the BFD failures during GRs in Planned
> Restarts, when co-existing with other Process intensive applications.
> This draft explains on such an issue, when scaled broadband
> configurations co-exist in the system that has routing protocols
enabled
> with GR and BFD.
> Here, though the remote system (restarter) signals about the planned
> restart and the local system does get to know about the restart,
during
> the restart,
> the local system still looks for BFD packets at the pre-negotiated
timer
> values. Now, we have the tied routing protocol adjusting its timers to
> wait for an extended time (as negotiated for GR),but BFD still waiting
> for the originally negotiated timer values.
> 
> Though this works fine in simple, less intensive environment, in a
> process intensive scenario, wherein I had given an example of BB
configs
> in the draft, BFD may miss the packets, declare the remote neighbor
down
> to the tied application (routing protocol) and hence bringing down the
> adjacency. This is also true for a system that has deep-packet
> inspection application like NBAR enabled in the system. I Have seen
this
> in deployments with the products of the top-2 datacom companies and
> hence feel there is every reason to document and address this.
> 
> For BFD to survive in such a scenario, The implementers look to use
> Flags/Timers or "Flags and Timers" to manage BFD timer values. Here
> again, though the timers are managed, there is no way of indicating at
> the local system that, the remote system is (gracefully) restarting.
The
> local system anyway knows that the remote peer is restarting, why not
> have it in the diag field? And let that be set by the remote peer and
> why not have a bfd state indicating this state?.
> 
> These two can be done within the existing framework of bfd (with
> additions to bfd diag and state). I thought negotiating the GR timers,
> between the peer makes it a much more standardized way of doing it and
> hence suggested the same in this draft.
> 
> Not many would disagree to what I have said here, but whether this can
> be within the framework or not can be debated and also on whether this
> can be suggested as a BCP or otherwise.
> 
> 2) The second one is about unplanned restarts and I see this working
> group is pretty much convinced that this problem won't be solved with
> what is suggested in this draft.
> Though I do think this extension would help solve the problem, I do
not
> have it implemented anywhere to prove that it actually does.
> 
> 
> Appreciate your comments on my thoughts.
> 
> Regards,
> A. Palanivelan
> 
> -----Original Message-----
> From: Dave Katz [mailto:dkatz@juniper.net]
> Sent: Friday, October 29, 2010 10:34 PM
> To: Palanivelan A (apvelan)
> Cc: rtg-bfd WG
> Subject: Re: draft-palanivelan-bfd-v2-gr-08
> 
> 
> On Oct 29, 2010, at 12:33 AM, Palanivelan A (apvelan) wrote:
> 
>> My experience with the process is not much to talk about but let me
>> confirm it is not easy even to get it to Historic :).
>> I loved to be part of working group in working through this document
> and
>> unfortunately it did not happen.
>> 
>> Any good suggestions in how to go about, I would love to take it
Dave.
> 
> If the group thinks it to be worthwhile (I personally think it would
> be), it would be quite valuable to discuss the GR issues on this list,
> particularly any that you've run across that we did not foresee, with
> the goal of producing a BCP that more thoroughly documents how the
> various pieces of BFD and the control protocols might be pulled
together
> to achieve GR.  If you feel that our technical evaluation of your
> proposal is in error, or that the existing mechanisms are insufficient
> and yours adds value, that would be extremely helpful as well.
> 
> Thanks,
> 
> --Dave
>