Re: [spring] 答复: SR and DetNet, draft on sr-redundancy-protection

Balázs Varga A <balazs.a.varga@ericsson.com> Thu, 22 July 2021 16:44 UTC

Return-Path: <balazs.a.varga@ericsson.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 58B7E3A082B; Thu, 22 Jul 2021 09:44:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.541
X-Spam-Level:
X-Spam-Status: No, score=-2.541 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XgzmrGf0cGgX; Thu, 22 Jul 2021 09:44:35 -0700 (PDT)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (mail-eopbgr30055.outbound.protection.outlook.com [40.107.3.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 70D243A0823; Thu, 22 Jul 2021 09:44:34 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QoHfOJW5cXZYlFto0pMda/WH2ZRNmwEFtBE7llA29YxgW1ydbVxgttTb9onTSNraVr8Hh1+AJuip45397YIUsDGlGkXPIS2YXO0R/Zqj55pM5qs1UE0yi6omBoBv7c+KeBRdNBgGi726paz0f31vX8p6ZjY7KSlLA3552f5ZhtVlfiHuOLENJetepYNcYXtiH7KqAhs3ok+sZxkcr2wi827JOcIe6IUct51OpNKaw9/x3/O5a1+nQcUKTOZ5ZkcvWhqdWs/B3JoJ5PjJhcb13pU+XGv6o+uUwhu4PgRzZ8sqIfU+73dvw3pYPggmFYDB0wIEpZNAYmM5UjPA9lW8pw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Hqp9HEaZ+AKMxhUC3vxv/qR9MenaMoBoc0NpXbLcjQY=; b=Fn3Jo6+IFTSB0s+AdkZZUmrUCh9VlYuMWg+Rb0VPCUzWjVN2aL2Zr9l7dnMpB4VGp4dbuRnXtzIbnv+soAUr6NhUPurv58ewdg0tJpJ3NKKuKm/yFgVdfiwQGoez2YhkQf5IC8b69oFaZz2YMRvYP0gwMUSyt+zuscaBnMJDuVDaHQiv+dN52C9ZrgAiVOG4gDvigeEMGrQQg6FPXDN94uNBFHlpn3TTTv25hxGSFv8UOFkhMvl241cdpyQmVZe12C30466QDSZzadLoNdpHO708A0hlMijIP/2GJAuzc9GnUMJbUf3E2Qq5Gsr16VgGHO4xJRwJHylhUFLsFNTScA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Hqp9HEaZ+AKMxhUC3vxv/qR9MenaMoBoc0NpXbLcjQY=; b=PzUA/fbnMzOouufOpAowG3usRpwbBkSeTsKvQCupPsESaV0j8FOkbAYsDJlMFkArOd5SysfsxdgkRiG6hynS8qHyxq1uEPMNX14ekZGSK3DrKaWvJdHTYn8RVK0zhbEjY9HDXvvhXWjDyWeQwMzJ3mLmWRbcGfmVdS8TGopLk1w=
Received: from AM0PR07MB5347.eurprd07.prod.outlook.com (2603:10a6:208:e7::31) by AM0PR07MB6226.eurprd07.prod.outlook.com (2603:10a6:20b:154::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4352.17; Thu, 22 Jul 2021 16:44:18 +0000
Received: from AM0PR07MB5347.eurprd07.prod.outlook.com ([fe80::e046:6a3b:148e:d7b9]) by AM0PR07MB5347.eurprd07.prod.outlook.com ([fe80::e046:6a3b:148e:d7b9%6]) with mapi id 15.20.4352.026; Thu, 22 Jul 2021 16:44:18 +0000
From: =?utf-8?B?QmFsw6F6cyBWYXJnYSBB?= <balazs.a.varga@ericsson.com>
To: Gyan Mishra <hayabusagsm@gmail.com>, "Yangfan (IP Standard)" <shirley.yangfan@huawei.com>
CC: "detnet@ietf.org" <detnet@ietf.org>, "draft-geng-spring-sr-redundancy-protection@ietf.org" <draft-geng-spring-sr-redundancy-protection@ietf.org>, spring <spring@ietf.org>
Thread-Topic: =?utf-8?B?W3NwcmluZ10g562U5aSNOiBTUiBhbmQgRGV0TmV0LCBkcmFmdCBvbiBzci1y?= =?utf-8?Q?edundancy-protection?=
Thread-Index: AddewvSL8KiUghQTQGO6l6GoThOP4wAdSB4wAUcLDdAA9nFA0AKeTbUAAxskJBA=
Date: Thu, 22 Jul 2021 16:44:18 +0000
Message-ID: <AM0PR07MB5347DF1D9167763FE813D443ACE49@AM0PR07MB5347.eurprd07.prod.outlook.com>
References: <AM0PR07MB5347AE468EC4B5BA146C6013AC349@AM0PR07MB5347.eurprd07.prod.outlook.com> <d840f86867f347bfb52223b96f43fc19@huawei.com> <AM0PR07MB53471A1557CE429F31C0CB37AC0D9@AM0PR07MB5347.eurprd07.prod.outlook.com> <61b8831e19bd41c98655f46e1c089ade@huawei.com> <CABNhwV0GhKY533U3_R+3yOWvTBmo4tnp2o+rmFWCKN5sF7x==w@mail.gmail.com>
In-Reply-To: <CABNhwV0GhKY533U3_R+3yOWvTBmo4tnp2o+rmFWCKN5sF7x==w@mail.gmail.com>
Accept-Language: hu-HU, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=ericsson.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4d16c306-8459-4dc6-6c4c-08d94d2ff2d3
x-ms-traffictypediagnostic: AM0PR07MB6226:
x-microsoft-antispam-prvs: <AM0PR07MB62267E48101385B2BC4B45F0ACE49@AM0PR07MB6226.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM0PR07MB5347.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(396003)(346002)(136003)(366004)(39860400002)(376002)(85182001)(86362001)(30864003)(966005)(66574015)(2906002)(66556008)(85202003)(66446008)(5660300002)(166002)(53546011)(7696005)(83380400001)(33656002)(66476007)(38100700002)(478600001)(110136005)(122000001)(55016002)(71200400001)(186003)(9326002)(316002)(4326008)(66946007)(9686003)(8936002)(54906003)(26005)(64756008)(224303003)(76116006)(52536014)(6506007)(38070700004)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?TVZ4M2RWMk9oV3BwTUtjc0liRWxOWDRWbWl2ZzJza3Ztak5wWTBQZTVaRWxQ?= =?utf-8?B?ekhlSURxSFVTdmpNWTNsNTlMSXg4bG5DZm1YTE9WbTZZcVhIRTdYR1o2d1Uy?= =?utf-8?B?YitYY0hoRTZwUXlUdVlPaTRHMktBeDRmTUp0Uml0WWpHU1hxQ1ZRa2ptR1Mv?= =?utf-8?B?NnJHbEYvdW8xRjFmZzFyYlg0T3pMSlpHNDM3NGxWVStSVDZqV2lwT1poMlZI?= =?utf-8?B?aytINWpmc2ZXNW1GK0FhYzk0SjB2bmRIV0hCYlB0Z0dUUi91SWF3azlNUVp1?= =?utf-8?B?K3dTVXlPR0NZcDZIdTgvUXRTV09kME9jTDlhamJRVWFFckZXcXUxSHJ1UU9r?= =?utf-8?B?MXBmVGN4bjJUTFBmbDlvZW03Vlk2SzF0Rmw4bXRpMXpOdUJYanBqdjFIVFlQ?= =?utf-8?B?T1VEN0htV05ESzU2UzFNWE5pN3Q4Rmt0NmNiV3Vsbk9LS2xoKzFUa28vZGdH?= =?utf-8?B?d3V6WUVmeVNvQzdDbUtBdnNYcElQVzZZeFk1V2dFNS9Ib2xMNGRJTmRJOEtG?= =?utf-8?B?MlBEU2xSVGpTZXRsSW5EYktBcFkzbFI0NUhtS3ZUclJqdjVtWFRtYTlwU1Ax?= =?utf-8?B?b3lhMlgycGF5WEdXUmo0U0svL1lvdk9BNnJJVVdSaXM5djE5VnBONDk1NUNo?= =?utf-8?B?a09ZVGJjTFBwN3dYZlNzWWYxWlVWVlljUWlpcDFyV0FBVG92SHF1ZEFGc2Ur?= =?utf-8?B?K3F5czRYZytNUHJQLzl4K1hNNTlmb0piMFZjREVNOXhvYXZPQmJmT3QzaUVv?= =?utf-8?B?Q1lLcVhROXlFRENSa0FCd2orbmtzODNUQmZWV1JkQmF0NEQzTmJLR1N1QTJx?= =?utf-8?B?ZW5JakV5UVBaNGlZb04zeERvZUdTSVFKS1JJQWRwRnJ6QncrNG5KZmhuSGRo?= =?utf-8?B?MFBtOXdkM3U0R1Rid0FTQ0RTT0RUTE45c1ZmdjR3dHMrRkN6QU5HV3ZSaERZ?= =?utf-8?B?TWwwNFpaak13NnNyVXZXTVcrcnM2V0N3c0xFK0w0ZFVKR2JDdnFuUXVNT09q?= =?utf-8?B?UkJ4cFk1MkJKVDFSTFV1SllScUNFZXRPbnZkKzBrSGxPb2pmL1FDYkVkUGIr?= =?utf-8?B?UDY4ZUIvaXdWZkNOcCs2OTRxTUZCaUZxeU0wOVVuZ2ZSc3ZxNkZUQ2tWbWV3?= =?utf-8?B?YTYrb2M3bXdXcURwT0lTVTIyazdsZzhEdm41SVZZTE0wS1E5NlZtb2k3T2g5?= =?utf-8?B?ZnI0bGxxNmoxVnVsbEo3d3NzL1VzY0ZQNEYxQlRPVzhuOTFJVEJVYnVBMDM3?= =?utf-8?B?RnB0b01mTEhONFVxZjB5Vis2MXh2YmROMzFlYlJhNW1ieFRkNjNvYmNuc1pa?= =?utf-8?B?NnRTZndzOXRnVElNNzNvNUFmRFdGMGtFRHBaWmJOd2VUdW56dDFucjNIWWdm?= =?utf-8?B?WEpSVEUydWl6ZytzbzNWK2VBVTdTQmE1U0Z3cWRvczVaZkNZNGthZjdxZVdX?= =?utf-8?B?RWJpWTd5NmhHZ0R1Ylpjc3JvYjB1WExTeEd2K0w1UVE1Q3ZNSE1jWVUxWlhn?= =?utf-8?B?eHRXaVl5d05DOUlDa1JaV3BlUlJqNC96WFVKUWE5Nzd3ZXFob2dMSWxWcWlq?= =?utf-8?B?M2FEbTFIRDlsd2p0bEVRTXhNS0RLS3AxZTNudnpGMGYvYmw1RUtjN091ZGtF?= =?utf-8?B?emRPa0RTUVF0dnFoQnl3MXJDNTdsbyt4VWRDNGZWTlJoK29kMmZvMU5GYXZ0?= =?utf-8?B?UGJxU1RWOTBmSVFrZVJNOUtJNkRUTFloL2c1TDBGR1lmbURkdXhFVlFwaGF6?= =?utf-8?Q?LLJDOGkGG99waaDHSw=3D?=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_AM0PR07MB5347DF1D9167763FE813D443ACE49AM0PR07MB5347eurp_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM0PR07MB5347.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4d16c306-8459-4dc6-6c4c-08d94d2ff2d3
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jul 2021 16:44:18.0680 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Ko+0xLPJL3TO6nVYT7OV9/EKv//VD8ditkKhHSnt4ib6yIH8QENG4yt6b6O+3qf3AHQQV0xJZhZgRWwAs1iOyOK1oFnsf9Eb2vXCI8t+wos=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR07MB6226
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/1zuIyepm8qeEf-x8GqIad1EHXeo>
Subject: Re: [spring] =?utf-8?b?562U5aSNOiBTUiBhbmQgRGV0TmV0LCBkcmFmdCBvbiBz?= =?utf-8?q?r-redundancy-protection?=
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Jul 2021 16:44:42 -0000

Hi Gyan,

Thanks for sharing your view. Just two comments/clarifications:

1, Using SR:
Again, it was never a question that SR is a valuable tool to provide explicit routes for DetNet.
Adding a figure showing how encapsulation and SR-headers are changed along the path would
help a lot for further discussions.
Please note, that DetNet supports both P2P and P2MP flows.


2, IP & PREOF:
> Also the draft below provides a solution for SR-MPLS data plane but not for SRv6.
> https://datatracker.ietf.org/doc/html/draft-varga-detnet-ip-preof-00

Some clarifications would be useful here.
https://datatracker.ietf.org/doc/html/draft-varga-detnet-ip-preof-00 is for IP data plane.
This is explained, e.g., in the abstract:
   This document describes how DetNet IP data plane can support the
   Packet Replication, Elimination, and Ordering Functions (PREOF) based
   on [RFC9025<https://datatracker.ietf.org/doc/html/rfc9025>]5>].

Note that RFC 9025 is part of DetNet IP data plane; it is UDP over IP.
This solution leverages MPLS header fields over UDP, but that does not make it MPLS data plane;
it is still IP data plane; actually, applicable both to IPv6 and IPv4.

A key aspect of this solution is that no new header fields are specified, i.e., it is available already,
both for IPv6 and IPv4.

SRv6 provides a routing technique for IPv6.

Therefore, SRv6 can provide routing for https://datatracker.ietf.org/doc/html/draft-varga-detnet-ip-preof-00
used in IPv6; nothing special needs to be done. In other words, SRv6 can provide the routing as part of DetNet
forwarding sublayer for PREOF service protection as per
https://datatracker.ietf.org/doc/html/draft-varga-detnet-ip-preof-00 operating in the DetNet service sublayer.

Thanks & Cheers
Bala’zs

From: Gyan Mishra <hayabusagsm@gmail.com>
Sent: Tuesday, July 6, 2021 10:41 PM
To: Yangfan (IP Standard) <shirley.yangfan@huawei.com>
Cc: Balázs Varga A <balazs.a.varga@ericsson.com>om>; detnet@ietf.org; draft-geng-spring-sr-redundancy-protection@ietf.org; spring <spring@ietf.org>
Subject: Re: [spring] 答复: SR and DetNet, draft on sr-redundancy-protection


Hi  Bala'zs

As one of the Co-authors with Fan on the issue raised related to duplication of effort of DETNET architecture service protection sub layer providing the PREOF, sequencing function for the PRF node replication function and PEF node elimination function, in the DETNET framework specification  RFC 8938.

RFC 8938 excerpt


4.3<https://datatracker.ietf.org/doc/html/rfc8938#section-4.3>.3>.  Packet Replication, Elimination, and Ordering Functions (PREOF)



   The Controller Plane protocol solution required for managing the

   processing of PREOF is outside the scope of this document.  That

   said, it should be noted that the ability to determine, for a

   particular flow, optimal packet replication and elimination points in

   the DetNet domain requires explicit support.  There may be existing

   capabilities that can be used or extended -- for example, GMPLS end-

   to-end recovery [RFC4872<https://datatracker.ietf.org/doc/html/rfc4872>] and GMPLS segment recovery [RFC4873<https://datatracker.ietf.org/doc/html/rfc4873>]3>].

I would like to note here that the DETNET framework is flexible and as far as the service protection sub layer and how the PEF and PRF are performed that other solutions such as this drafts redundancy protection can be used for service protection sub layer.

Also as far as service protection can use mechanisms that are outside of Detnet architecture for path protection for POF function.


3.5.1.3<https://datatracker.ietf.org/doc/html/rfc8938#section-3.5.1.3>.3>.  Service Protection



   Service protection involves the use of multiple packet streams using

   multiple paths -- for example, 1+1 or 1:1 linear protection.  For

   DetNet, this primarily relates to packet replication and elimination

   capabilities.  MPLS offers a number of protection schemes.  MPLS

   hitless protection can be used to switch traffic to an already-

   established path in order to restore delivery rapidly after a

   failure.  Path changes, even in the case of failure recovery, can

   lead to the out-of-order delivery of data requiring POFs either

   within the DetNet service or at a high layer in the application

   traffic.  Establishment of new paths after a failure is out of scope

   for DetNet services.







Also RFC 9025 DETNET MPLS over UDP/IP centralized controller based model for PREOF, PRF and PEF functions and sequencing see excerpt from RFC 8938 below:



4.2<https://datatracker.ietf.org/doc/html/rfc8938#section-4.2>.2>.  Generic Controller Plane Considerations



   This section covers control plane considerations that are independent

   of the data plane technology used for DetNet service delivery.



   While the management plane and the control plane are traditionally

   considered separately, from a data plane perspective, there is no

   practical difference based on the origin of flow-provisioning

   information, and the DetNet architecture [RFC8655<https://datatracker.ietf.org/doc/html/rfc8655>] refers to these collectively as the "Controller Plane".  This document therefore does

   not distinguish between information provided by distributed control

   plane protocols (e.g., RSVP-TE [RFC3209<https://datatracker.ietf.org/doc/html/rfc3209>] [RFC3473<https://datatracker.ietf.org/doc/html/rfc3473>]) or centralized

   network management mechanisms (e.g., RESTCONF [RFC8040<https://datatracker.ietf.org/doc/html/rfc8040>]0>], YANG

   [RFC7950<https://datatracker.ietf.org/doc/html/rfc7950>]0>], PCEP [PCECC<https://datatracker.ietf.org/doc/html/rfc8938#ref-PCECC>])>]), or any combination thereof.  Specific

   considerations and requirements for the DetNet Controller Plane are

   discussed in Section 4.1<https://datatracker.ietf.org/doc/html/rfc8938#section-4.1>.1>.


Each respective data plane document also covers the control plane

   considerations for that technology.  For example, [RFC8939<https://datatracker.ietf.org/doc/html/rfc8939>] also

   covers IP control plane normative considerations, and [DetNet-MPLS<https://datatracker.ietf.org/doc/html/rfc8938#ref-DetNet-MPLS>]

   also covers MPLS control plane normative considerations.


From a centralized controller management perspective as far as instantiation of DETNET flow service protection sub layer over forwarding plane sub layer as you can see their is some overlap.

Your point is well taken that DETNET provides its own service protection sub layer for PREOF, however I think the DETNET framework is open to other solutions such as this redundancy protection draft to provide a service protection sub layer solution that is separate from the existing RFC 9025 solution.

Also the draft below provides a solution for SR-MPLS data plane but not for SRv6.

https://datatracker.ietf.org/doc/html/draft-varga-detnet-ip-preof-00


Kind Regards

Gyan


On Wed, Jun 23, 2021 at 9:21 AM Yangfan (IP Standard) <shirley.yangfan@huawei.com<mailto:shirley.yangfan@huawei.com>> wrote:
Hi Bala‘zs,

Not only does SR facilitate explicit routes, several WG drafts also give examples on the service function providing to other areas.
https://datatracker.ietf.org/doc/html/draft-ietf-spring-sr-service-programming
https://datatracker.ietf.org/doc/html/draft-ietf-spring-sr-replication-segment
https://datatracker.ietf.org/doc/html/draft-ietf-spring-resource-aware-segments
so I understand by leveraging redundancy segment and merging segment to provide PRF and PEF to DetNet is natural and acceptable.

I see there is a DetNet solution for PRF and PEF in IP data plane, and thanks very much for submitting another contribution to elaborate the details.
Similar like draft IPv6-HbH-Options-for-DetNet, the intent of the draft is also to bring extra capabilities from IPv6 EHs to DetNet current IP+UDP solution, in order to extend and progress existing work.
Thanks for the discussion.

Fan


发件人: Balázs Varga A [mailto:balazs.a.varga@ericsson.com<mailto:balazs.a.varga@ericsson.com>]
发送时间: 2021年6月18日 23:16
收件人: Yangfan (IP Standard) <shirley.yangfan@huawei.com<mailto:shirley.yangfan@huawei.com>>; draft-geng-spring-sr-redundancy-protection@ietf.org<mailto:draft-geng-spring-sr-redundancy-protection@ietf.org>
抄送: detnet@ietf.org<mailto:detnet@ietf.org>; spring <spring@ietf.org<mailto:spring@ietf.org>>
主题: RE: SR and DetNet, draft on sr-redundancy-protection

Hi Fan,

Thank you for the clarifications. Now I see the intended behavior better.

It was never a question that SR is a valuable tool to provide explicit routes for DetNet. Of course,
that part is fully in-line with DetNet RFCs, which place those functionalities at the DetNet
forwarding sub-layer, which is the natural location for SR.

The concerns are about the functionalities that are provided by the DetNet service sub-layer. It
looks strange to me to repeat DetNet service sub-layer functionalities by a tool that is naturally
for the DetNet forwarding sub-layer, in particular by SR in this case.

Note at the first place, that DetNet relay nodes are the ones that are capable to perform DetNet
service sub-layer functions. DetNet relay nodes need to perform DetNet flow identification at the
first place, which is based on 6-tuple in the case of IP data plane. Furthermore, DetNet already
includes an IP data plane that provides sequence number for PREOF as specified by RFC 9025. A
contribution has been submitted to describe how to leverage that for PREOF:
https://datatracker.ietf.org/doc/draft-varga-detnet-ip-preof/.

This all can be supported by SR with explicit routes in the natural way SR has been designed, just
like any other type of traffic on top of SR, not only DetNet. Nothing DetNet specific needed from
SR. That is, this is also fully in-line with SR today, not only DetNet.

Thanks
Bala'zs





From: Yangfan (IP Standard) <shirley.yangfan@huawei.com<mailto:shirley.yangfan@huawei.com>>
Sent: Saturday, June 12, 2021 8:07 AM
To: Balázs Varga A <balazs.a.varga@ericsson.com<mailto:balazs.a.varga@ericsson.com>>; draft-geng-spring-sr-redundancy-protection@ietf.org<mailto:draft-geng-spring-sr-redundancy-protection@ietf.org>
Cc: detnet@ietf.org<mailto:detnet@ietf.org>; spring <spring@ietf.org<mailto:spring@ietf.org>>
Subject: 答复: SR and DetNet, draft on sr-redundancy-protection

Hi Bala’zs,
Thank you for your comments. Please see my reply inline starts with Fan1>>

发件人: Balázs Varga A [mailto:balazs.a.varga@ericsson.com]
发送时间: 2021年6月11日 21:12
收件人: draft-geng-spring-sr-redundancy-protection@ietf.org<mailto:draft-geng-spring-sr-redundancy-protection@ietf.org>
抄送: detnet@ietf.org<mailto:detnet@ietf.org>; spring <spring@ietf.org<mailto:spring@ietf.org>>
主题: SR and DetNet, draft on sr-redundancy-protection

Hi Authors,

thanks for the update of your draft, to clarify the proposed mechanism of
redundancy protection.

I have concerns regarding this draft as (1) the SRv6 approach does not follow the
DetNet architecture, and (2) repeats functionalities that are provided by the DetNet
service sub-layer but with serious limitations.

(1) DetNet has defined two sub-layers: the service sub-layer and the forwarding
sub-layer. The service sub-layer is responsible for service protection and the
forwarding sub-layer provides forwarding paths and resource allocation on top of
them for the DetNet flows. DetNet specifications allow to use any technology in
the forwarding sub-layer, including Segment Routing.

The SRv6 approach described in "draft-geng-spring-sr-redundancy-protection" breaks
the clear concept of the sub-layers by mixing them up. It contradicts to several
points at least to RFC8655 (DetNet Architecture), RFC8938 (Data Plane Framework)
and RFC8964 (DetNet MPLS Data Plane).

Fan1>> Segment routing extends IPv6 by introducing SRH extension header and SID programming. From the perspective of SID list in SRH, it provides the explicit route to IPv6 data plane in forwarding sub-layer. From the perspective of SID programming and Endpoint behaviors, it provides the packets replication and elimination in service sub-layer. So Redundancy segment could include the routing characteristic and service indication at the same time. Similar happens to Merging segment. I think this is why you called it breaking the concepts of two sub-layers and mixing them up.
Triggered by the discussions in SPRING, I think we can define redundancy segment and merging segment as a functional segment without routing and topological semantics, and use different segment for the routing purpose. Thus, redundancy segment and merging segment are segments with pure service semantics and don’t violate the sub-layers definition in DetNet architecture.
Besides, in RFC8655 4.1.2 DetNet data-plane overview, it says,
This separation of DetNet sub-layers, while helpful, should not be considered a formal requirement. For example, some technologies may violate these strict sub-layers and still be able to deliver a DetNet service
I think SRv6 could be acceptable based on this.

In addition, I guess where to encapsulate meta data could be one concern. According to DetNet, they should be identified and encapsulated at SR edge node. We plan to include both possibilities in next update. To carry them at SR edge node would be recommended as the first choice, and thus does not violate DetNet architecture. Right now I still want to keep the possibility for redundancy segment to add meta data for some corner case.

So far, I didn’t realize there are other points contradict to DetNet RFCs. We are very happy to discuss them.

(2) The motivation for "draft-geng-spring-sr-redundancy-protection" is not clear especially
as the SRv6 approach seems to be repeating DetNet service sub-layer functionalities; however,
with a limited set of functionalities without any clear benefits.
Fan1>> as what I said in previous email to Joel, redundancy protection comes from service protection specified in DetNet, but more focus on how to do it when Segment Routing is introduced to MPLS and IPv6. Currently, DetNet defines IP and MPLS data planes for DetNet in RFC8939 and RFC8964. There is segment routing consideration in RFC8964, but not in RFC8939. In our draft, we try to focus on definition in SRv6, and for MPLS-SR just obeys the specifications in RFC8964. It is clear that we are not repeating DetNet service sub-layer functionality, but to fill the gap between RFC8939 and SRv6. If WG thinks the SR-MPLS sections are redundant, we can take reference from RFC8964 for simplicity in next update.
I don’t think there is no clear benefit what segment routing brings to IP(v6). By using the redundancy protection mechanism, DetNet services running over SRv6 don’t rely on IP+UDP/TCP tuple to provide PREOF. The authors believe this draft is meaningful.
Thank you for bring this topic into DetNet and SPRING. I take it as whether SRv6 is worth to be specified separately besides the existing DetNet data plane RFCs. It is a valid and important question for DetNet, we may need some guide from the WG.
My 2 cents.

Best regards,
Fan


Cheers
Bala'zs
_______________________________________________
spring mailing list
spring@ietf.org<mailto:spring@ietf.org>
https://www.ietf.org/mailman/listinfo/spring
--

[http://ss7.vzw.com/is/image/VerizonWireless/vz-logo-email]<http://www.verizon.com/>

Gyan Mishra

Network Solutions Architect

Email gyan.s.mishra@verizon.com<mailto:gyan.s.mishra@verizon.com>

M 301 502-1347