RE: WG Adoption Call for draft-psarkar-rtgwg-rlfa-node-protection

<bruno.decraene@orange.com> Tue, 18 March 2014 20:47 UTC

Return-Path: <bruno.decraene@orange.com>
X-Original-To: rtgwg@ietfa.amsl.com
Delivered-To: rtgwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0AA651A03F1 for <rtgwg@ietfa.amsl.com>; Tue, 18 Mar 2014 13:47:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.298
X-Spam-Level:
X-Spam-Status: No, score=-1.298 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, J_CHICKENPOX_42=0.6, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id biIoMzzDNj40 for <rtgwg@ietfa.amsl.com>; Tue, 18 Mar 2014 13:47:24 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) by ietfa.amsl.com (Postfix) with ESMTP id F1A881A01A5 for <rtgwg@ietf.org>; Tue, 18 Mar 2014 13:47:23 -0700 (PDT)
Received: from omfedm08.si.francetelecom.fr (unknown [xx.xx.xx.4]) by omfedm14.si.francetelecom.fr (ESMTP service) with ESMTP id 52D3022C5A1; Tue, 18 Mar 2014 21:47:14 +0100 (CET)
Received: from Exchangemail-eme1.itn.ftgroup (unknown [10.114.1.183]) by omfedm08.si.francetelecom.fr (ESMTP service) with ESMTP id 33D04238062; Tue, 18 Mar 2014 21:47:14 +0100 (CET)
Received: from PEXCVZYM11.corporate.adroot.infra.ftgroup ([fe80::a441:e6a9:6143:6f0f]) by PEXCVZYH02.corporate.adroot.infra.ftgroup ([::1]) with mapi id 14.03.0174.001; Tue, 18 Mar 2014 21:47:13 +0100
From: bruno.decraene@orange.com
To: Pushpasis Sarkar <psarkar@juniper.net>, "draft-psarkar-rtgwg-rlfa-node-protection@tools.ietf.org" <draft-psarkar-rtgwg-rlfa-node-protection@tools.ietf.org>
Subject: RE: WG Adoption Call for draft-psarkar-rtgwg-rlfa-node-protection
Thread-Topic: WG Adoption Call for draft-psarkar-rtgwg-rlfa-node-protection
Thread-Index: AQHPP0J+1fYrM2rA6Ui8swo42YsDw5rm7aHQgAAlqyCAADnEYA==
Date: Tue, 18 Mar 2014 20:47:13 +0000
Message-ID: <28652_1395175634_5328B0D2_28652_5811_1_53C29892C857584299CBF5D05346208A0711A129@PEXCVZYM11.corporate.adroot.infra.ftgroup>
References: <CF480575.5095C%aretana@cisco.com> <20825_1395160636_5328763C_20825_2806_1_53C29892C857584299CBF5D05346208A07119F80@PEXCVZYM11.corporate.adroot.infra.ftgroup> <758bbd568a014f879ae0db848902ee43@BN1PR05MB520.namprd05.prod.outlook.com>
In-Reply-To: <758bbd568a014f879ae0db848902ee43@BN1PR05MB520.namprd05.prod.outlook.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.197.38.6]
Content-Type: multipart/alternative; boundary="_000_53C29892C857584299CBF5D05346208A0711A129PEXCVZYM11corpo_"
MIME-Version: 1.0
X-PMX-Version: 6.0.3.2322014, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2014.3.18.134216
Archived-At: http://mailarchive.ietf.org/arch/msg/rtgwg/Yd10jrVVPWJev_B89MZ4plHEejA
Cc: "rtgwg@ietf.org" <rtgwg@ietf.org>
X-BeenThere: rtgwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Routing Area Working Group <rtgwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtgwg/>
List-Post: <mailto:rtgwg@ietf.org>
List-Help: <mailto:rtgwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Mar 2014 20:47:30 -0000

Hi Pushpasis,

Please find some comments inline with [Bruno]

Thanks,
Bruno


From: Pushpasis Sarkar [mailto:psarkar@juniper.net]
Sent: Tuesday, March 18, 2014 6:12 PM
To: DECRAENE Bruno IMT/OLN; draft-psarkar-rtgwg-rlfa-node-protection@tools.ietf.org
Cc: rtgwg@ietf.org; Alvaro Retana (aretana)
Subject: RE: WG Adoption Call for draft-psarkar-rtgwg-rlfa-node-protection

Hi Bruno,

Many many thanks for your thoughts. Please find some comments inline with [Pushpasis]

Thanks
-Pushpasis

From: bruno.decraene@orange.com<mailto:bruno.decraene@orange.com> [mailto:bruno.decraene@orange.com]
Sent: Tuesday, March 18, 2014 10:07 PM
To: draft-psarkar-rtgwg-rlfa-node-protection@tools.ietf.org<mailto:draft-psarkar-rtgwg-rlfa-node-protection@tools.ietf.org>
Cc: rtgwg@ietf.org<mailto:rtgwg@ietf.org>; Alvaro Retana (aretana)
Subject: RE: WG Adoption Call for draft-psarkar-rtgwg-rlfa-node-protection

Hi authors,

This is an interesting work, thanks for the draft and the rtgwg presentation.


1)      Regarding node protection, have you considered/evaluated the use of the algorithm proposed in TI-LFA (draft-francois-segment-routing-ti-lfa)?
Namely: computing the backup path with a (C)SPF (without the protected node), and enforcing this explicit path using multiple segments/labels?
[Pushpasis] We have gone through the TI-LFA and draft, and to the best of my understanding this requires a CSPF for each destination node in the network with the primary link as well as primary-nexthop node as exclude constraints for finding a backup path(if feasible) all the way to the destination.
[Bruno] TI-LFA has a 2 steps process:
- find the Post Convergence Path (assuming the protected element (node or link) has failed). This requires  1 CSPF rooted on the PLR, excluding the failed element. This single CSPF gives you the path for all destination (just like the regular IGP one)
- then we need to find how to enforce an explicit route toward each destinations. There are different ways to do this,  which may depend on your existing (r)LFA implementation. But as an example, you can compute the (regular) extended P space. Cost (so far...) is one SPF per neighbor  (just like for LFA). Then you explore your post convergence graph and "intersect" it with your extended P space and you get all the destinations, along the post convergence path, which are reachable with no additional encapsulation (à la LFA).
So far so good. To go further, you can use the RLFA trick: send the packet to a remote destination using encapsulation (IP or MPLS or whatever.) Those destinations are all farest Q nodes, along the post convergence path. Number of those nodes is topology dependent. According to Stéphane simulations, this is very manageable. Then you run a CSPF on those P nodes, so see what you destinations, along the post convergence path, you can reach via this P nodes. You can install those in you FIB, using the encapsulation required to reach the P (a la RLFA). According the Stéphane simultations (just sent) at this step you can expect 81%- 99% coverage, with guaranteed node protection and a single layer of encapsulation (label)
Then you can apply the same RLFA trick recursively, adding a layer of encapsulation each time (to get to the first P, then from the first P to the second...), until you have explored you complete CSPF/post convergence graph. Here, we see that MPLS is a better encapsulation as the header is shorter (4 octets) compared to an IPv4 or IPv6 encapsulation.
Without segment routing, when following your post convergence graph, there are high metrics links, that you will not be able to cross. (e.g. links with "infinity" metrics).

This will need far more computation than 1 forward SPF per PQ-nodes.
[Bruno] The number of CSPF is topology dependant so we will need simulation to compare. If your are limited by SPF computation, but may also prune some path along your post convergence SPF, at the cost of reduced coverage. (e.g. limiting the depth of the number of P nodes required to reach the destination, or pruning the sub-tree that the depth / destinations is too high.
Obviously it has the advantage of finding 100% of all possible node-protecting backup paths. With 16 PQ-nodes selected on the basis of the default heuristic suggested in this draft it was seen to find ~96-97% of all possible node-protecting backup paths on some of the common SP topologies we have run a simulation on. Adding so much of extra computation to achieve rest 3% of feasible node-protecting backup paths seemed insignificant and not worth exploring.
[Bruno] indeed, 16 CSPF is low, but Stéphane could probably get some result on its simulations. Or you could also evaluate yourself the TI-LFA algo on your topologies. Based on simulations I got, this seems manageable, but the more simulations, the better.
Note also the TI-LFA also provide the optimal backup path that RLFA/draft-psarkar does not provides.

Clearly, using TI-LFA in the absence of Segment Routing (more precisely the absence of adjacency segments/labels), 100% coverage is not possible.
[Pushpasis] My understanding is that since with TI-LFA we are going to run CSPF for each destination, we will find 100% of all the feasible node-protecting paths to each destination.
[Bruno] A single CSPF is enough to get all the path. Now we need to compute the list of P nodes on the path to each destinations and this requires more SPF. Should be much lower than one for all destinations.
Then we can't have 100% coverage since high metric links can't be crossed using regular IGP routing.
There may be destinations for which there are no feasible/possible node-protecting backup paths at all. Those destinations cannot be covered because there is no possible node-protecting backup paths for them.

But this is also not possible with draft-psarkar.
[Pushpasis] True. Like Stephane mentioned already, it is a tradeoff :)

It's a priori not clear to me if the coverage would be increased or decreased.
[Pushpasis] Obviously with TI-LFA will provide more coverage, like I explained above. But that will come at the cost of lot of extra computational overhead of running a lot of CSPFs.
On the pro side, the use of multiple segments increases the coverage by allowing reaching more Q nodes. On the con side, the additional constraints added during the computation (namely enforcing the post convergence path (only)) decreases the coverage as this specific path may require an adjacency segment to cross a high metric link.
Evaluating this option would probably be interesting (in term of coverage, control plane computation, label stack depth, routing optimality, number of T-LDP sessions).
[Pushpasis]Looks like you are referring to protection of MPLS traffic. I hope you remember that this draft also applies to IP-FRR.


2)      On a related note, a possible heuristic for draft-psarkar to pick a node protecting PQ, would be to pick the PQ on the post convergence SPF (as per above/TI-LFA). That's simple, computationally not expensive (one SPF), and reduce the set of Candidate Node-Protecting PQ to a single element at most (not considering ECMP, to simply). If the set has one node, a node protecting PQ node has been found (on the optimal path, as a free property). If the set is empty, you may choose to fall back on draft-psarkar (picking a subset of PQ using heuristic and running SPF on those PQ).
[Pushpasis] Not sure if I got what you are trying to say here. But, I think it will be best to not bring in TI-LFA in this.
[Bruno] IMO, it would be good to have simulations to compare both approach. But as it's would require you/Stéphane to do the simulation work, it really is up to you.
This draft was intended to cover the lack of node-protection in the original RLFA draft and address the need of some of the network deployments which still need node-protection to be guaranteed. The intention of using a heuristic is to choose a subset of all PQ-nodes found in the network and restrict the number of FSPFs to a maximum number, and still achieve a hight percentage of coverage with the same subset of PQ-nodes.
[Bruno] indeed. But in the end, the performance of the solutions (in term of control plane CPU, coverage, path optimality, number of T-LDP sessions for LDP networks) is topology dependent hence seems difficult to compare without simulations. Hence my original question to see if you had explore this option.

Many thanks,
Bruno


Thanks,
Regards,
Bruno

From: rtgwg [mailto:rtgwg-bounces@ietf.org] On Behalf Of Alvaro Retana (aretana)
Sent: Friday, March 14, 2014 6:02 AM
To: rtgwg@ietf.org<mailto:rtgwg@ietf.org>
Cc: draft-psarkar-rtgwg-rlfa-node-protection@tools.ietf.org<mailto:draft-psarkar-rtgwg-rlfa-node-protection@tools.ietf.org>
Subject: WG Adoption Call for draft-psarkar-rtgwg-rlfa-node-protection

Hi!

During the meeting in London the authors asked for the WG to adopt this draft.

This message officially starts the call for adoption for draft-psarkar-rtgwg-rlfa-node-protection.  Please indicate your position about adopting it by end-of-day on March 28, 2014.

http://tools.ietf.org/html/draft-psarkar-rtgwg-rlfa-node-protection

Thanks!

Alvaro.

_________________________________________________________________________________________________________________________



Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.



This message and its attachments may contain confidential or privileged information that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and delete this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.

Thank you.

_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.