RE: WGLC for draft-rtgwg-mrt-frr-architecture

Chris Bowers <cbowers@juniper.net> Mon, 21 December 2015 14:47 UTC

Return-Path: <cbowers@juniper.net>
X-Original-To: rtgwg@ietfa.amsl.com
Delivered-To: rtgwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E40431A877D for <rtgwg@ietfa.amsl.com>; Mon, 21 Dec 2015 06:47:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E_a-Wposz-pX for <rtgwg@ietfa.amsl.com>; Mon, 21 Dec 2015 06:47:25 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2on0104.outbound.protection.outlook.com [65.55.169.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 68D2D1A86FA for <rtgwg@ietf.org>; Mon, 21 Dec 2015 06:47:20 -0800 (PST)
Received: from CO2PR05MB619.namprd05.prod.outlook.com (10.141.198.148) by CO2PR05MB618.namprd05.prod.outlook.com (10.141.198.146) with Microsoft SMTP Server (TLS) id 15.1.355.16; Mon, 21 Dec 2015 14:47:18 +0000
Received: from CO2PR05MB619.namprd05.prod.outlook.com ([10.141.198.148]) by CO2PR05MB619.namprd05.prod.outlook.com ([10.141.198.148]) with mapi id 15.01.0355.012; Mon, 21 Dec 2015 14:47:18 +0000
From: Chris Bowers <cbowers@juniper.net>
To: Rob Shakir <rjs@rob.sh>, Alvaro Retana <aretana@cisco.com>, "rtgwg@ietf.org" <rtgwg@ietf.org>, "draft-rtgwg-mrt-frr-architecture@tools.ietf.org" <draft-rtgwg-mrt-frr-architecture@tools.ietf.org>, Stewart Bryant <stewart.bryant@gmail.com>
Subject: RE: WGLC for draft-rtgwg-mrt-frr-architecture
Thread-Topic: WGLC for draft-rtgwg-mrt-frr-architecture
Thread-Index: AQHRLfTf9mV+PzSAtUyZECDvldWiE57KzqQAgAiEpQA=
Date: Mon, 21 Dec 2015 14:47:18 +0000
Message-ID: <CO2PR05MB619B671A75A6BB2075DD25DA9E40@CO2PR05MB619.namprd05.prod.outlook.com>
References: <566083D0.1020607@gmail.com> <etPan.566efcf6.5e5c4ea5.122@piccolo.rob.sh>
In-Reply-To: <etPan.566efcf6.5e5c4ea5.122@piccolo.rob.sh>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=cbowers@juniper.net;
x-originating-ip: [66.129.239.13]
x-microsoft-exchange-diagnostics: 1; CO2PR05MB618; 5:n7NCaLhQdUksqQpAiZEfSpv7+VJTHaGu58Gjc/14q8w0VF8ZQ1+J12seHnhuiWuS3HcOMKSGc6kUsSYhYMQYTh2uSnIU8p+ujO4EF8D2XHpyYute+FKcXH6h5Ay0VucvSK/+PZEK3lFhQ/9MiORfHw==; 24:gEmIrpVB1z/6SunEiH+Bd/PLC/8fukjv1YerUopqRRjOOoGyoGE46mcv6HxNdddwJ0OCeEaqUr/534a0ahNsewB/SsQR9f2oM3P2sOJTdHA=
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:CO2PR05MB618;
x-microsoft-antispam-prvs: <CO2PR05MB618DC5E2AA2A12515453315A9E40@CO2PR05MB618.namprd05.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(95692535739014);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(520078)(5005006)(8121501046)(3002001)(10201501046); SRVR:CO2PR05MB618; BCL:0; PCL:0; RULEID:; SRVR:CO2PR05MB618;
x-forefront-prvs: 079756C6B9
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(377454003)(469094003)(13464003)(24454002)(189002)(51444003)(164054003)(71364002)(53484002)(199003)(107886002)(66066001)(189998001)(122556002)(87936001)(86362001)(105586002)(586003)(230783001)(19580395003)(3846002)(2201001)(5001960100002)(106356001)(106116001)(40100003)(97736004)(76176999)(6116002)(5001770100001)(15975445007)(102836003)(99286002)(54356999)(101416001)(5002640100001)(50986999)(92566002)(5003600100002)(2501003)(10400500002)(1220700001)(5008740100001)(33656002)(19580405001)(11100500001)(81156007)(76576001)(2900100001)(74316001)(5004730100002)(1096002)(77096005)(2950100001); DIR:OUT; SFP:1102; SCL:1; SRVR:CO2PR05MB618; H:CO2PR05MB619.namprd05.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
spamdiagnosticoutput: 1:23
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Dec 2015 14:47:18.5667 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO2PR05MB618
Archived-At: <http://mailarchive.ietf.org/arch/msg/rtgwg/ILnVF95G3pPLpzWoTcSEQulcRkw>
X-BeenThere: rtgwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Routing Area Working Group <rtgwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtgwg/>
List-Post: <mailto:rtgwg@ietf.org>
List-Help: <mailto:rtgwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Dec 2015 14:47:28 -0000

Rob,

Thanks for your feedback.  I added the following text to clarify how the alternates computed by MRT can be used together with alternates produced by other FRR technologies.  I also added text to clarify how MRT allows for the specification of different profiles which will generally produce different paths.

The diff of the new version can be found at:

https://www.ietf.org/rfcdiff?url2=draft-ietf-rtgwg-mrt-frr-architecture-08

---------------------

15.  Applying Policy to Select from Multiple Possible Alternates for FRR

   For a given topology, GADAG root, and profile, MRT will provide a
   node-protecting alternate path from each PLR to each destination for
   any single link or node failure, if such a path exists.  Therefore,
   an implementation may choose to only use the alternates determined by
   MRT to provide 100% FRR coverage.

   However, it may be desirable to allow an operator to use MRT
   alternates together with alternates provided by other FRR
   technologies.  A policy-based alternate selection process can allow
   an operator to select the best alternate from those provided by MRT
   and other FRR technologies.  As an example, it may be desirable to
   implement a policy where a node-protecting LFA (if it exists for a
   given failure mode and destination) is preferred over a given MRT
   alternate.  [I-D.ietf-rtgwg-lfa-manageability] discusses many of the
   potential criteria that one might take into account when evaluating
   different alternates for selection.

   Note that future documents may define MRT profiles in addition to the
   default profile defined here.  Different MRT profiles will generally
   produce red and blue paths with different properties.  An
   implementation may allow an operator to use different MRT profiles
   instead of or in addition to the default profile. 

----------------------

I hope this helps to clarify that MRT can be used either alone, or with other FRR technologies.  

I also want to comment on the fact that remote LFA produces multiple alternates to choose from.  With respect to determining if an alternate provides node protection or not, the fact that remote LFA computes many possible alternate paths could be viewed as a drawback, as opposed to an advantage.    For a given PLR and failure mode and destination, in general it will be the case that many nodes qualify as PQ nodes.  In order to determine if the complete repair path from PLR to PQ-node and PQ-node to destination is node-protecting, additional computation is needed.  The most efficient approach seems to be to run a forward SPF from the PQ-node being evaluated.   In some topologies, it is not uncommon for many nodes to qualify as PQ nodes.  In order to avoid spending too much time churning away at running forward SPFs rooted at PQ-nodes, some implementations may find it useful to limit the number of PQ nodes evaluated for node-protection.

By comparison, for roughly the computational cost of evaluating three PQ nodes for node-protection, MRT produces a path which is guaranteed to be node-protecting, if node protection is possible.  In cases where node-protection and maximum coverage is important, it seems reasonable to give operators the option of having an efficient means of generating a node-protecting path as opposed to the trial and error approach of evaluating large numbers of PQ nodes, which may or may not ultimately provide a node-protecting path.

Thanks,
Chris


-----Original Message-----
From: rtgwg [mailto:rtgwg-bounces@ietf.org] On Behalf Of Rob Shakir
Sent: Monday, December 14, 2015 11:32 AM
To: Alvaro Retana <aretana@cisco.com>; rtgwg@ietf.org; draft-rtgwg-mrt-frr-architecture@tools.ietf.org; Stewart Bryant <stewart.bryant@gmail.com>
Subject: Re: WGLC for draft-rtgwg-mrt-frr-architecture

Hi Stewart, Authors,
 
On 3 December 2015 at 11:03:27, Stewart Bryant (stewart.bryant@gmail.com(mailto:stewart.bryant@gmail.com)) wrote:
> Firstly my high order bit, and I suspect I will be in the rough on 
> this. I am not convinced that this is the best solution that we can 
> produce to this problem, and I am concerned about the operational 
> issues that result from the non-intuitive repair paths when compared 
> to other methods. I am also concerned about our ability to get a 
> solution as complicated as this right first time in all of the corner cases. Thus I think that rather than recommend this to the industry as a standard, we should issue it as informational and see how it works out at scale.

Whilst I’m not sure that I can comment whether this is the ‘best’ solution - I have (previously) spent some time thinking about the problem of disjointness and the applicability of this technique to some of the operational problems that I have had to deal with.

I have a couple of operationally-focused considerations that I think the operator of any network that is thinking of deploying MRTs would need to be thinking about. Primarily, we must say that we are happy with having one set of disjoint topologies (the MRT red/blue), which is utilised during the failure case. This might mean that node A and node B, which are topologically very close to one another might forward via a more indirect path based on the fact that the ‘red’ or ‘blue’ single tree that was selected is less optimal than a local set of disjoint paths that could be found. This means that we need to be able to say that the traffic that we are carrying via this network is also tolerant of that sub-optimality between those two nodes. In a world of less networks, and more variant traffic being carried on them, I am not sure that we can.

The second concern that I have with this approach is around operational influence of path selection. I have not re-reviewed the architecture again in great detail before sending this e-mail, so would apologise in advance if there are nuances that I did not understand. We have seen from LFA that whilst there may be N ways for traffic to get from A to B during a repair, from an operational perspective, not all paths are created equal (and hence we have the LFA manageability work). For example, paths that conform to ‘normal’ traffic routing within the network are generally preferred for manageability and capacity planning reasons. I would agree that we should leave this draft as informational, until such time as we have demonstrated, in live networks,  whether these operational challenges can be met by the MRT approach.

The reason for my reticence is that in the networks that I have operated that have tried to have single network-wide distribution trees, or single sets of repair paths, we have always ended up splitting things out (even when from a service perspective, they may have looked the same) to meet the myriad of business and operational concerns that we need to meet. To this end, I would be encouraging any operator that is thinking of using MRT for disjointness, or for repair, to consider what happens when they end up needing different treatment per-application, per-customer, or per-traffic class. At this point, one would want to compare the complexity of whether MRTs could be extended to these applications (that is to say, whether a set of (network-wide) “global” repair paths will be suitable), or whether they really would be better setting the foundation of having the ability to deploy a local repair paths, and building their operational processes around that.

At the end of the day, in my opinion, it is the operational process around these technologies that is the most complex thing to change, and I’m concerned that if I recommended building this process around MRT, I would be establishing new processes around something that offered more ability to do locally- rather than globally-optimal repair paths in the future.

Just my $0.02. There’s some interesting work here, but I share some of Stewart’s concerns.

Kind regards,
r.

_______________________________________________
rtgwg mailing list
rtgwg@ietf.org
https://www.ietf.org/mailman/listinfo/rtgwg