Re: WGLC for draft-rtgwg-mrt-frr-architecture
Stewart Bryant <stewart.bryant@gmail.com> Wed, 09 December 2015 11:01 UTC
Return-Path: <stewart.bryant@gmail.com>
X-Original-To: rtgwg@ietfa.amsl.com
Delivered-To: rtgwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 10FAD1A1A99 for <rtgwg@ietfa.amsl.com>; Wed, 9 Dec 2015 03:01:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.288
X-Spam-Level:
X-Spam-Status: No, score=-0.288 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_ADSP_CUSTOM_MED=0.001, DKIM_SIGNED=0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, J_CHICKENPOX_54=0.6, NML_ADSP_CUSTOM_MED=0.9, SPF_PASS=-0.001, T_DKIM_INVALID=0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dqs864gSueaY for <rtgwg@ietfa.amsl.com>; Wed, 9 Dec 2015 03:01:00 -0800 (PST)
Received: from mail-wm0-x235.google.com (mail-wm0-x235.google.com [IPv6:2a00:1450:400c:c09::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D2AFC1A1A82 for <rtgwg@ietf.org>; Wed, 9 Dec 2015 03:00:59 -0800 (PST)
Received: by wmww144 with SMTP id w144so67646225wmw.0 for <rtgwg@ietf.org>; Wed, 09 Dec 2015 03:00:58 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=subject:to:references:cc:from:message-id:date:user-agent :mime-version:in-reply-to:content-type; bh=QylmmufTiEwsnW3ePFlEo4+pDYnp64YGcZCR9CXew3Q=; b=e0PikqJS4Qt8OImkHC5ynZzsXmkQsC4Zq82kGE1Ey89X6lhpzHduxO6+XNmE/nIi+J nweijmah+4OIWgsu+JqLuVRtgnoAqgHziLazbQ/FbBYlrqmegHx91ANTowV5xBvJuXa6 CN+5yI5ouoBeB5k43sr49S2eyWpgEGVEf0Yadu7kgI4tqeIWfreuDbMDJBfx1fG2HjgA xX9L9MwfeqJQ7qJIhTYVX+TVQQrN4aa79PU95LeTzEXv1npUrRsQNogLUzAuTyM9Zk53 l5J6omyyL8Rdd14hpNZ1LnZ1tCA0MC1HirSZQILklPBAtATxW8sZW4GE0NGFh8q+LIJ6 cjVg==
X-Received: by 10.28.50.70 with SMTP id y67mr10671132wmy.91.1449658858372; Wed, 09 Dec 2015 03:00:58 -0800 (PST)
Received: from [192.168.2.132] (host213-123-124-182.in-addr.btopenworld.com. [213.123.124.182]) by smtp.gmail.com with ESMTPSA id d66sm25551555wma.21.2015.12.09.03.00.54 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 09 Dec 2015 03:00:56 -0800 (PST)
Subject: Re: WGLC for draft-rtgwg-mrt-frr-architecture
To: bruno.decraene@orange.com, "Anil Kumar S N (VRP Network BL)" <anil.sn@huawei.com>
References: <56608847.9040505@gmail.com> <327562D94EA7BF428CD805F338C31EF06C08630C@nkgeml512-mbx.china.huawei.com> <5665685D.2020507@gmail.com> <56656947.1070307@gmail.com> <56656D6B.6010600@gmail.com> <327562D94EA7BF428CD805F338C31EF06C0865EE@nkgeml512-mbx.china.huawei.com> <21567_1449586197_5666EE15_21567_14680_1_53C29892C857584299CBF5D05346208A0F6F7476@OPEXCLILM21.corporate.adroot.infra.ftgroup>
From: Stewart Bryant <stewart.bryant@gmail.com>
Message-ID: <566809E5.1020607@gmail.com>
Date: Wed, 09 Dec 2015 11:00:53 +0000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <21567_1449586197_5666EE15_21567_14680_1_53C29892C857584299CBF5D05346208A0F6F7476@OPEXCLILM21.corporate.adroot.infra.ftgroup>
Content-Type: multipart/alternative; boundary="------------090209020004050109060506"
Archived-At: <http://mailarchive.ietf.org/arch/msg/rtgwg/Zu0GOGXyVOZeMyDEMSZ5XktS9zc>
Cc: "draft-ietf-rtgwg-mrt-frr-architecture@tools.ietf.org" <draft-ietf-rtgwg-mrt-frr-architecture@tools.ietf.org>, "rtgwg@ietf.org" <rtgwg@ietf.org>, Mike Shand <mike@mshand.org.uk>
X-BeenThere: rtgwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Routing Area Working Group <rtgwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtgwg/>
List-Post: <mailto:rtgwg@ietf.org>
List-Help: <mailto:rtgwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Dec 2015 11:01:17 -0000
I largely agree with Bruno, although I have some questions about the SR approach as well. Please see inline. Stewart On 08/12/2015 14:49, bruno.decraene@orange.com wrote: > > Hi Anil, > > Since you have cited me, I’m probably forced to join the discussion. > > As a disclaimer, as already expressed, for spring capable networks, I > personally believe that TI-LFA is the best solution. So I’m not sure > that you involved the right guy to support MRT ;-) > SB> A solution based on source routing is a good solution, but I have reservations about the particular solution given the observaion earlier in this thread that you cab get looping repairs. However as I noted there the fix is quite simple. > > As a general comment, we indeed have multiple FRR solutions ( e.g. > TI-LFA, RLFA, RLFA node protection, TI-FRR, MRT, TI-LFA, RSVP-TE 1 hop > link protection, end to end RSVP-TE FRR (multiple flavors and new > additional extensions discussed in MPLS WG), some mid point to some > other mid points RSVP-TE…) plus discussed in multiple WG (RTGWG and > MPLS, a priori TI-LFA would be discussed in RTGWG rather than SPRING > (although TI-FRR could possibly also be discussed in RTGWG rather than > MPLS)) > > So there may be a question whether the IETF: > > a) is fine with documenting multiple/many, independent solutions, > > b) is fine with many solutions but want to evaluate them to see which > one is the best fit depending on the deployment case > > c) whether we need to choose N solutions based on technical merits > > Personally, I don’t really have a strong preference, but they seem > ranked from faster/easier to longer/harder. So far I assumed that “a” > had been chosen. May be “b” would make sense, assuming I’m not the one > doing the job ;-) . I’m afraid “c” would burn many times, for limited > benefits. (I can already foresee some lengthy discussions just to pick > the “right” value for N, before even starting the technical evaluation) > > Probably the easiest path, and in particular for the mrt draft, would > be to avoid comparing solutions, and definitely avoid saying that MRT > is the best solution. (And I’m not saying the draft says that, but you > do in the below email) Because IMHO, comparisons are difficult, long > and putting this in the mrt draft is a risk to delay it (possibly > forever). But I’m also fine with discussing the comparisons. It’s > really up to MRT authors. > SB> My interpretation of the text in the draft is that it is making the claim that it is the best solution. SB> My assertion is that this is not the case, and at the moment I hold that position for all of the SB> candidate solutions, since all of them have limitations. SB> SB> I would propose (b) by only publishing the designs as informational and then anointing one or more SB> as standard when we have significant deployment experience. > At least I expect the choice to apply to all solutions (and not option > “a” when RLFA or MRT is discussed,and then option “c” when TI-LFA is > discussed) > > More inline [Bruno] > > *From**:*rtgwg [mailto:rtgwg-bounces@ietf.org] *On Behalf Of *Anil > Kumar S N (VRP Network BL) > *Sent:* Tuesday, December 08, 2015 1:07 PM > *To:* Stewart Bryant; > draft-ietf-rtgwg-mrt-frr-architecture@tools.ietf.org; rtgwg@ietf.org; > Alvaro Retana > *Cc:* Mike Shand > *Subject:* RE: WGLC for draft-rtgwg-mrt-frr-architecture > > Hi Stewart, > > Request you to see inline for reply. > > Thanks & Regards > > Anil S N > > “Be liberal in what you accept, and conservative in what you send” - > Jon Postel > > *From:*Stewart Bryant [mailto:stewart.bryant@gmail.com] > *Sent:* 07 December 2015 19:29 > *To:* Anil Kumar S N (VRP Network BL); > draft-ietf-rtgwg-mrt-frr-architecture@tools.ietf.org > <mailto:draft-ietf-rtgwg-mrt-frr-architecture@tools.ietf.org>; > rtgwg@ietf.org <mailto:rtgwg@ietf.org>; Alvaro Retana > *Cc:* Mike Shand > *Subject:* Re: WGLC for draft-rtgwg-mrt-frr-architecture > > On 07/12/2015 11:11, Stewart Bryant wrote: > > Resending with the correct draft alias > > On 07/12/2015 11:07, Stewart Bryant wrote: > > Hi Anil > > Please see inline. > > Note that here we are just discussion some of the points raised. > > - Stewart > > On 06/12/2015 04:38, Anil Kumar S N (VRP Network BL) wrote: > > Hi Bryant, > > Please find my observation on your > comments in line. > > Thanks & Regards > > Anil S N > > “Be liberal in what you accept, and conservative in what > you send” - Jon Postel > > *From:*rtgwg [mailto:rtgwg-bounces@ietf.org] *On Behalf Of > *Stewart Bryant > *Sent:* 04 December 2015 02:22 > *To:* draft-rtgwg-mrt-frr-architecture@ietf.org > <mailto:draft-rtgwg-mrt-frr-architecture@ietf.org>; > rtgwg@ietf.org <mailto:rtgwg@ietf.org>; Alvaro Retana > *Subject:* WGLC for draft-rtgwg-mrt-frr-architecture > > Resend due to problem sending to the document alias > > Hi, > > I am sorry that this review is late, but a number of > personal matters > > needed priority. Hopefully you can accept it still. > > Firstly my high order bit, and I suspect I will be in the > rough on this. > > I am not convinced that this is the best solution that we > can produce to > > this problem, and I am concerned about the operational > issues that > > result from the non-intuitive repair paths when compared > to other > > methods. I am also concerned about our ability to get a > solution as > > complicated as this right first time in all of the corner > cases. > > Thus I think that rather than recommend this to the industry > > as a standard, we should issue it as informational and see > how it works > > out at scale. > > =========== > > 1. Introduction > > This document gives a complete solution for IP/LDP > fast-reroute > > [RFC5714]. MRT-FRR creates two alternate trees > separate from the > > primary next-hop forwarding used during stable > operation. These two > > trees are maximally diverse from each other, providing > link and node > > protection for 100% of paths and failures as long as > the failure does > > not cut the network into multiple pieces. > > SB> I am concerned that this is an overstatement. > > SB> Firstly you cannot handle multiple concurrent failures in > > SB> even simple pathological cases. If the network is two > > SB> connected and you have both a red and blue failure > > SB> that you need to traverse, you (say) commit to the red > > SB> the you will fail at blue transition, even though the > network is > > SB> is still connected at the link level. > > [Anil >>] I don’t think once packet moved into red path > will fall back to blue path in case of red path failure. > > No other FRR technologies can handle simultaneous multiple > failure without loops[Loop may or may not occur which is > unknown]. > > MRT is one of the FRR technologies which provide alternate > path which tries to move away from failure point to reach > the destination. > > I feel we can count on the positive advantage of MRT. > > SB> I do not think that is correct. > > SB> Methods that construct a repair to the next-hop (link) or > next-next-hop (node) > SB> and refuse to repair a repair can cope with some types of > multiple failure. > SB> For example a repair based on not-via or strict > source-routing can deal > SB> with concatenated repairs. They get tricky when the second > failure is in the > SB> repair path. Mike Shand and I looked at this but I cannot > remember what the > SB> outcome was. However to a limited extent I think that even > that might be > SB> feasible. > > SB> I think that what is important here is that you specify > the degree of completeness > SB> which is single-link, cluster of links with a single > common node and node > SB> failure. > > SB> The root cause of this constraint is the use of a pair of > trees with a single root. > SB> This contrasts with SR and NV which have a tree rooted at > every PLR and > SB> reset the repair constraint once the packet has left the > repair domain. > > SB> As to your point about moving away from the failure, NV > certainly does this > SB> and with SR it depends on whether you set the repair > target as the far > SB> side of the failure or Q space. > > SB> The root cause of the loops in Q space is that you may not > have used > SB> a sufficiently limited estimate of Q space. However if you > require that the > SB> packet get to the next-next hop it is always safe to > release it into a > SB> network that had previously converged. > > [ANIL 2 >> ] > > I remember Bruno pointed out a simple topology with multiple > failure can cause LOOP in SR, > > I am yet to understand Not Via > > Below is the topology, Where all links have a metric of 10, > except AD which has 100 > > For the traffic from A to C, if both AC and BD links fails at > the same time (and were not identified as SRLG), > > there will be a loop between A and B. (and funnily (is it? ;-) > ) as packets are looped, > > the label stack seems to increase to “infinity” as additional > P nodes (alternatively C and D) are used. > > A – B > > | \ | > > C – D > > So multiple failure, the behavior could be undesirable. There > could many unforeseen topologies > > Where the extent of multiple failure and behavior might be > undesired. Please check NV against this topology. > > MRT guarantees one thing for sure; if in case of multiple > failure Packets would be dropped but it will not be looped. > > Which is very important, looping congests line card and will > be trigger for further failures. J > > [Bruno] Let’s compare the solutions with the same assumptions. > If we are ready to support the cost of multiplying the size of > the FIB, Segment Routing could probably advertise 2 SIDs per > segments: one protected with FRR and one not protected. With > this, TI-LFA can use non protected segments and hence chose to > drop the packet in case of multiple unrelated failures. > (rather than risking loops in some cases, to gain protections > for unrelated failures in the other cases). For this TI-LFA > would need to double the number of FIB entries, while I think > that MRT triple it. Not to mention the choice is local and > possibly on a per destination. > SB> That is the right approach, but it is surely not that onerous. You only double the SB> nodal segments, not the whole table. Same for the number of interfaces. I am SB> not sure what the latest numbers are, but when I was studying this, the largest SB> network we had was 500 nodes and k was about 8 to 10, so that would be SB> just over 500 additional labels which seems pretty small. > SB> The text should start with the invariants and assumptions to > > SB> correctly scope the claims in the introduction. > > SB> I think you have to say where the trees are routed since only > > SB> two mean you need a root, and you need to note that this is > > SB> different from the underlying IGP in which there is a tree > > SB> per node. > > Summary Comparison of IP/LDP FRR Methods > > > +---------+-------------+-------------+-----------------------------+ > > | Method | Coverage | Alternate | Computation (in > SPFs) | > > | | | Looping? > | | > > > +---------+-------------+-------------+-----------------------------+ > > | MRT-FRR | 100% | None | less than > 3 | > > | | Link/Node | > | | > > | | | > | | > > | LFA | Partial | Possible | per > neighbor | > > | | Link/Node | > | | > > | | | > | | > > | Remote | Partial | Possible | per neighbor > (link) or | > > | LFA | Link/Node | | neighbor's > neighbor (node) | > > | | | > | | > > | Not-Via | 100% | None | per link and > node | > > | | Link/Node | | > | > > | | | > | | > > | TI-LFA | 100% | Possible | per neighbor > (link) or | > > | | Link/Node | | neighbor's > neighbor (node) | > > > +---------+-------------+-------------+-----------------------------+ > > SB> I really wonder how important the computational complexity is > > SB> given that we are moving to an SDN world where these > calculations > > SB> can be offloaded? > > [Anil >>] JIts not wrong to claim MRT consumes much less > computation compared to other FRR technologies. > > Be it SDN controlled or distributed. > > [Bruno] The point is that there are multiple/many metrics to > compare solutions. Picking a subset has a risk of biasing the > discussion/choices. > SB> Again, exactly my point. > > > SB> ... but it is important to consider the importance of the > computation constraint. > SB> In SDN you potentially have a lot more compute power > available than you > SB> have in the small processor/memory systems. You also have > the potential > SB> (due to massive storage) to maintain a history of common > network states > SB> and thus have the configuration of the post-failure or > post-repair states > SB> on file. > > SB> You also need to consider how long it takes to do > loop-free reconvergence > SB> to see whether the new state repair time calculation is a > factor or not. > SB> For example, if you could do 50 SPF/sec it would take 10s > to run one > SB> per node on a 500 node network. So then you get to the > question of > SB> whether the LF strategy can be executed, and its > completion notifed > SB> in 10s? If not, then the SPF computation time is not a factor. > > [ANIL 2 >> ] > > Let’s compare TI-LFA and MRT computation constraints, I > believe MRT need less computation than TI-LFA > > TI-LFA need to calculate Extended P-Space for set of > destination which used each other nexthop. > > Number of SPF directly depends on Number of Neighbors. > > [Bruno] Yes and no. No TI-LFA does not require to compute the > extended P space. But yes, you need 1 SPF per protected > interface. Yes this is a cost, but this comes with a benefit > of taking the best/optimal path, for each case of failure. > IMHO 1 SPF per IGP interface seems a reasonable cost to me, > especially before the failure. > SB> Exactly, and to put that in perspective that is something like k(=10) * 20ms (SPF time). SB> not a big deal. > > If Node protection is desired then more computation is expected. > > [Bruno] Fully agreed. But this gets topology dependent. > > In contrary, MRT has to prepare a graph and select alternates. > > If preparation of GADAG is considered as one SPF then it boils > down to be very simple. > > [Bruno] “very simple”. As a network provider, I’d rather have > the solution simple to compute/understand for the human and > complex to compute for the computer. Especially as human brain > is not following More’s law. > > Yes “simple” is difficult to measure, but I’m pretty sure that > if you pick 10 regulars people, give them a network topology > and ask them what would be the network behavior in case of > failure, then would find TI-LFA algo easier than the MRT one. > SB> They would find any SPF solution easier to follow, since they are familiar with the SB> concept of adding up the metrics from the point where the packet is. SB> SB> With MRT they have to figure this out based on the global topology, not the local fragment. > > Since GADAG root is fixed, If central controller in place, if > controller can collect link state information from topology > > Using BGP LS or by forming IGP peer. The GADAG calculation can > be delegated to controller. > > Only alternate information can be downloaded by Controller. > This cannot be achieved > > With this ease in case where LFA calculation done for tree > rooted at every PLR > > My point is measurement can be of any form/measurement units, > MRT has computation advantage but with > implementation/understanding/algorithm complexity. > > [Bruno] My point is that this is one metric among many. And > possibly not the most important. > > SB> > > SB> I think that it is fair to note that the other method use the > > SB> existing routing protocol and calculate alternate paths using > > SB> the methods of that routing protocol. Whereas with MRT you > > SB> really have a new routing protocol with all of the associated > > SB> operations overhead. > > [Anil >>] As you stated in previous comment, Moving to SDN > world overhead can be offloaded J > > [Bruno] Assuming you still need people to run and troubleshoot > the network when something goes wrong, they need to understand > the > > network. Many be your point is that at some point, these > people may be softwarized in the SDN, but I’m afraid I can’t > see that far in the future. > > But I don’t feel there is much overhead compared to R-LFA or > TI-LFA > > [Bruno] We could discuss the R-LFA vs MRT case, but IMHO it’s > much easier to understand TI-LFA behavior than MRT or RLFA one. > > SB> You miss my point. With MRT you have the complexity and > SB> operation characteristics of a new routing protocol to > take into > SB> account. That is also the case for some of the other FRR > methods > SB> but by no means all of them. > > [ANIL 2 >> ] > > In fact , MRT provides less operation complexity, > > [Bruno] I disagree. > > If administrator know what is GADAG, he could easily figure > out what would be alternate path visually for an extent. > > [Bruno] I’m not that familiar with MRT, but that sound like > ‘if the operator know the path, then he can figure out the > alternate path’. Sure, but this only move the question 1 step > further: how do the operator know the GADAG in a given topology? > > In simple case, if primary path matches with blue then > alternate path is red. The same cannot be expected with R-LFA > or TI-LFA. > > [Bruno] TI-LFA follows the regular Post Convergence IGP > shortest path. I can’t see what would be more simpler (there > is no new path/algo) > SB> I do have some concerns about this, but we should take those to a different thread. SB> Specifically the paths are only aligned from the PLR, and not from the point of entry SB> into the network, and thus I do not understand what advantage this constraint has SB> in practice. > > It’s even difficult to send OAM packets to verify backup path > in case of R-LFA and TI-LFA. > > For MRT administrator can send OAM packets on RED or on BLUE > path to a specific path. > > MRT is quite different from traditional FRR technologies, > which really has unique positive qualities. > > [Bruno] In which case it will be easy for you to demonstrate. > > Only thing I feel which is lacking in MRT is capability to > handle multiple failure and that should not be only criteria > to reject a good protocol J > > Hope its gets due appreciation for its unique capabilities J > > ============ > > 1.1. Importance of 100% Coverage > > Fast-reroute is based upon the single failure assumption - > that the > > time between single failures is long enough for a network to > > reconverge and start forwarding on the new shortest paths. > That does > > not imply that the network will only experience one failure or > > change. > > SB> The above needs to be much earlier to qualify "complete" > > =========== > > 4. Maximally Redundant Trees (MRT) > > SB> Please remind me is there one red topology or one per failure. > > SB> There is just one - correct - so it would be useful to > > SB> explain what happens in a number of instances of failure. > > [Anil >>] Each devices will maintain three forwarding tables, > one for default SPF calculated topology and other two for RED > and BLUE topologies. > > Default forwarding table would have backup path on red or blue > forwarding table based on alternate selection. > > On failure if Blue is selected as alternate path, packet will > switch to Blue forwarding table. > > Packet stays in blue path till it reaches the destination > > If any failure is detected on blue path, packet will be > dropped till SPF convergence. > > SB> This needs to be highlighted, together with the mechanism > that you will use > SB> to abandon the LF reconvergence. > > [ANIL 2 >> ] I am not an author, I wish I would; since I like > this protocol J, > > I am sure authors will update it. > > ============ > > 5. Maximally Redundant Trees (MRT) and Fast-Reroute > > When there is a link or node failure affecting, but not > partitioning, > > SB> that should be "a single link or single node" > > [Anil >>] In case of MRT there is Cut-Vertex and Cut-Link, > When these vertex or link fails then network is partitioned > > Otherwise there exists a path to reach destination, the same > would have been selected by MRT > > SB> Strictly it is partitioned in the chosen MRT topology. I > think it can > SB> be unpartitioned in base or the other MRT topology, it is > just that > SB> they are not available to you. > [ANIL 2 >> ] I request you to elaborate this point. I didn’t > understand. > > As far I can say, If network has no cut vertex or cut link. > MRT can provide alternate path for single failure without any > issue. > > Cut-vertex and Cut-Link is a issue for any FRR technologies. > So it finally boils down to multiple failure which MRT doesn’t > support. > > ============ > > 6. Unicast Forwarding with MRT Fast-Reroute > > As mentioned before, MRT FRR needs multi-topology forwarding. > > Unfortunately, neither IP nor LDP provides extra bits for a > packet to > > indicate its topology. Once the MRTs are computed, the two > sets of > > MRTs can be used as two additional forwarding topologies. > The same > > considerations apply for forwarding along the MRTs as for > handling > > multiple topologies. > > SB> It would be good to explain how you solve the problem > mentioned > > SB> in the previous para. Maybe a forward ref to a later section? > > ============= > > 6.1.1.1. Topology-scoped FEC encoded using a single label > (Option 1A) > > [RFC7307] provides a mechanism to distribute FEC-Label bindings > > scoped to a given MPLS topology (represented by MPLS > MT-ID). To use > > multi-topology LDP to create MRT forwarding topologies, we > associate > > two MPLS MT-IDs with the MRT-Red and MRT-Blue forwarding > topologies, > > in addition to the default shortest path forwarding > topology with MT- > > ID=0. > > SB> Presumably you could MRT a topology other than default? > > SB> To be clear - you need 3 * the number of delivery labels > in the > > SB> network, and in some cases these labels identify prefix or a > > SB> VPN exit point. > > SB> This is a lot more labels than some of the competing schemes > > SB> and so I think we really need a label table size comparison > > SB> in the comparison section earlier in the document. > > [Anil >>] Yes MRT needs multiple tables only then packet can > be guided to take disjoint path to destination. > > The devices with higher forwarding entry capacity can choose > to use MRT. > > In case of TI-LFA label stack size is a constraint, for older > devices with limited label stack capacity that would be a > serious restriction. > > [Bruno] For TI-LFA link protection, assuming the metric are > symmetric, you can mathematically prove that the maximum > number of additional labels to push is 2. For node protection > this topology dependent and unbounded in theory. In practice, > we have run simulation and for our networks the maximum number > of labels is 4 (and if could can only push 3 labels, you only > loose 0,02% of coverage). cfMPLS World Congress 2015 presentation. > SB> So - at this is really a question for the WG as a whole, is the symmetry constraint in or out? SB> I think the MRT team are asserting that the symmetry constraint is not being applied, and SB> indeed this is a basis for some of their own assertions. SB> SB> A symmetry constraint would be a major and useful constraint in simplifying the solution design. > > So point is it’s a tradeoff > > SB> Indeed, it is a tradeoff, but I don't think you set out > the full tradeoff > SB> earlier in the text, and it is by no means clear that MRT > is always > SB> the best trade-off. > > [Bruno] +1 It’s indeed a trade-off on multiple metrics. IMHO > it’s clear MRT is not always the best. > > > > SB> Also you need to make it clear how large the tables are. > > [ANIL 2 >> ] MRT can be a best trade off in cases where , > Network device has low computing powers but better forwarding > capacity (access devices), > > Network devices hassmall label stack support etc... > > [Bruno] access device are usually deployed in simple > topologies, replicated N times. e.g. U,V, ring. In those 3 > topologies, the access device has only 2 IGP links, which mean > that TI-LFA link protection needs 1 SPF, typically 0 to 1 > additional label to push, and typically link protection will > offer de facto node protection. > > May be to prove the point Comparison section is needed J > > [Bruno] definitely needed. I’m not sure that a section will be > enough. I’d rather see a research paper. > SB> Well in the IETF context it needs a draft -> RFC. SB> However it would be acceptable in my view to develop and deploy the various solutions, SB> do the analysis, and then make a statement about which the IETF endorse through SB> the standards process. > > ============= > > 6.1.1.2. Topology and FEC encoded using a two label stack > (Option 1B) > > With this forwarding mechanism, a two label stack is used > to encode > > the topology and the FEC of the packet. The top label > (topology-id > > label) identifies the MRT forwarding topology, while the > second label > > (FEC label) identifies the FEC. The top label would be a > new FEC > > type with two values corresponding to MRT Red and Blue > topologies. > > When an MRT transit router receives a packet with a topology-id > > label, the router pops the top label and uses that it to > guide the > > next-hop selection in combination with the next label in > the stack > > (the FEC label). The router then swaps the FEC label, > using the FEC- > > label bindings learned through normal LDP mechanisms. The > router > > then pushes the topology-id label for the next-hop. > > As with Option 1A, this forwarding mechanism also has the > useful > > property that the FEC associated with the packet is > maintained in the > > labels at each hop along the MRT. > > This forwarding mechanism has minimal usage of additional > labels, > > memory and LDP communication. It does increase the size of > packets > > and the complexity of the required label operations and > look-ups. > > This forwarding option is consistent with context-specific > label > > spaces, as described in [RFC 5331]. However, the precise LDP > > behavior required to support this option for MRT has not been > > specified. > > SB> So I wonder if this should be normative text given that > the underlying > > SB> control plane behavior is currently unknown? > > SB> You should comment on the impact on forwarding moving from > > SB> a one to a two label action at every hop along the repair > path. > > SB> This is not an issue that the competing approaches have and so > > SB> should feature in the comparison section. > > [Anil >>] I agree to move to comparison section. > > ============ > > 6.1.2. MRT IP tunnels (Options 2A and 2B) > > IP tunneling can also be used as an MRT transit forwarding > mechanism. > > Each router supporting this MRT transit forwarding mechanism > > announces two additional loopback addresses and their > associated MRT > > color. Those addresses are used as destination addresses > for MRT- > > blue and MRT-red IP tunnels respectively. The special loopback > > addresses allow the transit nodes to identify the traffic > as being > > forwarded along either the MRT-blue or MRT-red topology to > reach the > > tunnel destination. Announcements of these two additional > loopback > > addresses per router with their MRT color requires IGP > extensions, > > which have not been defined. > > SB> So help me understand here. How do you do this with just two > > SB> loopback addresses. If I have red to a, red to b etc how > > SB> do I distinguish them. Presumably you have to do this by > > SB> looking inside the tunnel to find the payload. Unlike MPLS > > SB> this is a much larger departure from the standard forwarding > > SB> process isn't it? Again this needs to go in the comparision. > > [Anil >>] I agree to move to comparison section. > > Either IPv4 (option 2A) or IPv6 (option 2B) can be used as the > > tunneling mechanism. > > Note that the two forwarding mechanisms using LDP Label > options do > > not require additional loopbacks per router, as is required > by the IP > > tunneling mechanism. This is because LDP labels are used > on a hop- > > by-hop basis to identify MRT-blue and MRT-red forwarding > topologies. > > 6.2. Forwarding LDP Unicast Traffic over MRT Paths > > In the previous section, we examined several options for > providing > > MRT transit forwarding functionality, which is independent > of the > > type of traffic being carried. We now look at the MRT ingress > > functionality, which will depend on the type of traffic > being carried > > (IP or LDP). We start by considering LDP traffic. > > We also simplify the initial discussion by assuming that > the network > > consists of a single IGP area, and that all routers in the > network > > participate in MRT. Other deployment scenarios that > require MRT > > egress functionality are considered later in this document. > > In principle, it is possible to carry LDP traffic in MRT IP > tunnels. > > However, for LDP traffic, it is very desirable to avoid > tunneling. > > Tunneling LDP traffic to a remote node requires knowledge > of remote > > FEC-label bindings so that the LDP traffic can continue to be > > forwarded properly when it leaves the tunnel. This > requires targeted > > LDP sessions which can add management complexity. > > SB> I have been thinking a lot about this problem just recently > > SB> whilst gardening, and you could take page from the SR > playbook and use the > > SB> known offset approach. I guess that is a big change, but > > SB> I think we might be able to use it to avoid the > longstanding distribution > > SB> issue - i.e. convert the problem to offset math. > > The two MRT LDP > > Label forwarding mechanisms have the useful property that > the FEC > > associated with the packet is maintained in the labels at > each hop > > Atlas, et al. Expires April 17, 2016 > [Page 14] > > Internet-Draft MRT Unicast FRR Architecture > October 2015 > > along the MRT, as long as an MRT to the originator of the > FEC is > > used. The MRT IP tunneling mechanism does not have this useful > > property. Therefore, this document only considers the two > MRT LDP > > Label forwarding mechanisms for protecting LDP traffic with > MRT fast- > > reroute. > > SB> I do not understand the preceding text > > =========== > > 6.2.3. Other considerations for forwarding LDP traffic using > MRT LDP > > Labels > > Note that forwarding LDP traffic using MRT LDP Labels > requires that > > an MRT to the originator of the FEC be used. For example, > one might > > find it desirable to have the PLR use an MRT to reach the > primary > > next-next-hop for the FEC, and then continue forwarding the LDP > > packet along the shortest path tree from the primary > next-next-hop. > > SB> Does this mean that the packet looses it's MRT marking at > this point? > > SB> If so can't this result in a multi-failure repair loops? > > ============= > > 6.3. Forwarding IP Unicast Traffic over MRT Paths > > For IP traffic, there is no currently practical alternative > except > > tunneling to gain the bits needed to indicate the MRT-Blue > or MRT-Red > > forwarding topology. > > SB> Well isn't there a possible solution based on IPv6 options? > > The choice of tunnel egress MAY be flexible > > since any router closer to the destination than the > next-hop can > > work. > > SB> Again isn't there an SRLG or other multiple failure issue > with this? > > ========== > > 6.3.1.2. Tunneling IP traffic using MRT LDP Labels (Option 1B) > > The MRT LDP Label option 1B forwarding mechanism encodes > the topology > > and the FEC using a two label stack as described in Section > 6.1.1.2. > > When a PLR receives an IP packet that needs to be forwarded > on the > > Red MRT to a particular tunnel endpoint, the PLR pushes two > labels on > > the IP packet. The first (inner) label is the normal LDP label > > learned from the next-hop on the Red MRT, associated with a FEC > > originated by the tunnel endpoint. The second (outer) > label is the > > topology-identification label associated with the Red MRT. > > For completeness, we note here a potential optimization. > In order to > > tunnel an IP packet over an MRT to the destination of the > IP packet > > (as opposed to an arbitrary tunnel endpoint), then we could > just push > > a topology-identification label directly onto the packet. > An MRT > > transit router would need to pop the topology-id label, do > an IP > > route lookup in the context of that topology-id , and push the > > topology-id label. > > SB> What are you optimizing - certainly not the forwarding cycles. > > ============= > > 12.2. MRT Recalculation > > When a failure event happens, traffic is put by the PLRs > onto the MRT > > topologies. After that, each router recomputes its > shortest path > > tree (SPT) and moves traffic over to that. Only after all > the PLRs > > have switched to using their SPTs and traffic has drained > from the > > MRT topologies should each router install the recomputed > MRTs into > > the FIBs. > > At each router, therefore, the sequence is as follows: > > 1. Receive failure notification > > 2. Recompute SPT > > 3. Install new SPT > > 4. If the network was stable before the failure occured, > wait a > > configured (or advertised) period for all routers to be > using > > their SPTs and traffic to drain from the MRTs. > > Atlas, et al. Expires April 17, 2016 > [Page 34] > > Internet-Draft MRT Unicast FRR Architecture > October 2015 > > 5. Recompute MRTs > > 6. Install new MRTs. > > While the recomputed MRTs are not installed in the FIB, > protection > > coverage is lowered. Therefore, it is important to > recalculate the > > MRTs and install them quickly. > > SB> that is one way of doing it, anothey way is to have n MRTs > running > > SB> ships in the night as each failure occurs and clean up > later. I think > > SB> that this makes the migration timing less critical. I an not > > SB> sure whether you don't need some approach like "new > labels" to make > > SB> this unconditionally safe. > > =========== > > 15. IANA Considerations > > Please create an MRT Profile registry for the MRT Profile > TLV. The > > range is 0 to 255. The default MRT Profile has value 0. > Values > > 1-200 are by Standards Action. Values 201-220 are for > > experimentation. Values 221-255 are for vendor private use. > > SB> I am suprised that this is not in a protocol documnet > rather than the > > SB> architecture since you have no data structures or > encodings in here. > > 16. Security Considerations > > This architecture is not currently believed to introduce > new security > > concerns. > > SB> I suppose you could express this in terms of the > parameters being > > SB> carried in the existing routing and thus you inherit their > security > > SB> mechanisms, and that the topology boundary is set by their > boundary > > SB> and thus you inherit their security and privacy > characteristics. > > SB> I am supprised that the draft does not say anything about the > > SB> management of this new approach to FRR and the OAM that > you will > > SB> need to test it. > > =========== > > _________________________________________________________________________________________________________________________ > > Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc > pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler > a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, > France Telecom - Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci > > This message and its attachments may contain confidential or privileged information that may be protected by law; > they should not be distributed, used or copied without authorization. > If you have received this email in error, please notify the sender and delete this message and its attachments. > As emails may be altered, France Telecom - Orange shall not be liable if this message was modified, changed or falsified. > Thank you.
- WGLC for draft-rtgwg-mrt-frr-architecture Stewart Bryant
- WGLC for draft-rtgwg-mrt-frr-architecture Stewart Bryant
- Re: WGLC for draft-rtgwg-mrt-frr-architecture Stewart Bryant
- RE: WGLC for draft-rtgwg-mrt-frr-architecture Anil Kumar S N (VRP Network BL)
- Re: WGLC for draft-rtgwg-mrt-frr-architecture Stewart Bryant
- Re: WGLC for draft-rtgwg-mrt-frr-architecture Stewart Bryant
- Re: WGLC for draft-rtgwg-mrt-frr-architecture Stewart Bryant
- RE: WGLC for draft-rtgwg-mrt-frr-architecture Anil Kumar S N (VRP Network BL)
- RE: WGLC for draft-rtgwg-mrt-frr-architecture bruno.decraene
- RE: WGLC for draft-rtgwg-mrt-frr-architecture Anil Kumar S N (VRP Network BL)
- Re: WGLC for draft-rtgwg-mrt-frr-architecture Stewart Bryant
- Re: WGLC for draft-rtgwg-mrt-frr-architecture Stewart Bryant
- Re: WGLC for draft-rtgwg-mrt-frr-architecture Stewart Bryant
- Re: WGLC for draft-rtgwg-mrt-frr-architecture Alvaro Retana (aretana)
- Re: WGLC for draft-rtgwg-mrt-frr-architecture Stewart Bryant
- RE: WGLC for draft-rtgwg-mrt-frr-architecture bruno.decraene
- Re: WGLC for draft-rtgwg-mrt-frr-architecture Alvaro Retana (aretana)
- Re: WGLC for draft-rtgwg-mrt-frr-architecture Rob Shakir
- RE: WGLC for draft-rtgwg-mrt-frr-architecture Chris Bowers
- RE: WGLC for draft-rtgwg-mrt-frr-architecture Chris Bowers
- RE: WGLC for draft-rtgwg-mrt-frr-architecture Chris Bowers
- RE: WGLC for draft-rtgwg-mrt-frr-architecture Rob Shakir
- Re: WGLC for draft-rtgwg-mrt-frr-architecture Stewart Bryant
- Re: WGLC for draft-rtgwg-mrt-frr-architecture Stewart Bryant
- Re: WGLC for draft-rtgwg-mrt-frr-architecture Stewart Bryant
- RE: WGLC for draft-rtgwg-mrt-frr-architecture Chris Bowers
- Re: WGLC for draft-rtgwg-mrt-frr-architecture Stewart Bryant
- RE: WGLC for draft-rtgwg-mrt-frr-architecture Chris Bowers