Re: [spring] A technical concern regarding draft-schmutzer-spring-cs-sr-policy-00

Alexander Vainshtein <Alexander.Vainshtein@rbbn.com> Thu, 15 June 2023 13:54 UTC

Return-Path: <alexander.vainshtein@rbbn.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B299C151065 for <spring@ietfa.amsl.com>; Thu, 15 Jun 2023 06:54:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.017
X-Spam-Level:
X-Spam-Status: No, score=0.017 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, GB_VISITOURSITE=2, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=rbbn.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Unvtbe9voxKM for <spring@ietfa.amsl.com>; Thu, 15 Jun 2023 06:54:52 -0700 (PDT)
Received: from usb-smtp-delivery-110.mimecast.com (usb-smtp-delivery-110.mimecast.com [170.10.151.110]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0530AC14CF1D for <spring@ietf.org>; Thu, 15 Jun 2023 06:54:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rbbn.com; s=mimecast20230413; t=1686837290; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=gxbUDVovSDpEHwrN/G0W2jxRpocPXXm0h2xIjOut8Cw=; b=Vk0fJPYCyApy3DQLhZ6uXU2OSrQoWdfh+xCpb1XuS+H73MEcAZXNJHyf3Kpg7MF3pMKOA4 h2nM6OXp0H5FuJaWQYhXUxQwB8MnlLKTfECgOwk2catQW2gDdNBX/nO1Yn+WST7+VfCgdR UlybM8aLi9YD9IDRp37RXbBrR3Ymof4=
Received: from NAM04-DM6-obe.outbound.protection.outlook.com (mail-dm6nam04lp2049.outbound.protection.outlook.com [104.47.73.49]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id usb-mta-13-xHRzDZMbO8mc2BRK4QpI8Q-1; Thu, 15 Jun 2023 06:54:45 -0700
X-MC-Unique: xHRzDZMbO8mc2BRK4QpI8Q-1
Received: from PH0PR03MB6300.namprd03.prod.outlook.com (2603:10b6:510:e2::5) by PH0PR03MB5751.namprd03.prod.outlook.com (2603:10b6:510:37::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.25; Thu, 15 Jun 2023 13:54:41 +0000
Received: from PH0PR03MB6300.namprd03.prod.outlook.com ([fe80::4ce:6269:48da:f302]) by PH0PR03MB6300.namprd03.prod.outlook.com ([fe80::4ce:6269:48da:f302%3]) with mapi id 15.20.6477.037; Thu, 15 Jun 2023 13:54:41 +0000
From: Alexander Vainshtein <Alexander.Vainshtein@rbbn.com>
To: "Christian Schmutzer (cschmutz)" <cschmutz@cisco.com>
CC: "draft-schmutzer-spring-cs-sr-policy.all@ietf.org" <draft-schmutzer-spring-cs-sr-policy.all@ietf.org>, "spring@ietf.org" <spring@ietf.org>, "Dongjie (Jimmy)" <jie.dong@huawei.com>
Thread-Topic: A technical concern regarding draft-schmutzer-spring-cs-sr-policy-00
Thread-Index: Adiffy2snJpRyJ62TvmDqoJV6SGHgAAvkJUAACBaJTAAGxBukCgP5i6ADeJfSwAALcWjkADZ9nuACJ7hxxA=
Importance: high
X-Priority: 1
Date: Thu, 15 Jun 2023 13:54:41 +0000
Message-ID: <PH0PR03MB63001BE463F4AA237C8F9AC8F65BA@PH0PR03MB6300.namprd03.prod.outlook.com>
References: <PH0PR03MB63007D82CD11836C4BE5B13AF6929@PH0PR03MB6300.namprd03.prod.outlook.com> <664D8681-C2DD-4163-B6CD-7BC8E785805D@cisco.com> <PH0PR03MB630015DFF140BC9D1405D311F6949@PH0PR03MB6300.namprd03.prod.outlook.com> <598b3d2ef59b4bb5978f05d225f11925@huawei.com> <54EFE818-3243-4FE0-854E-11866145C79E@cisco.com> <5D7BCEE9-BE8E-42DF-B15A-3270C0678DE0@cisco.com> <71cf2d9e791645f4b84ea032f134e801@huawei.com> <965B838D-A3BA-45CF-AAE1-C98CCCA1717E@cisco.com>
In-Reply-To: <965B838D-A3BA-45CF-AAE1-C98CCCA1717E@cisco.com>
Accept-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR03MB6300:EE_|PH0PR03MB5751:EE_
x-ms-office365-filtering-correlation-id: 7973ed60-9d65-4f47-2f89-08db6da81130
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR03MB6300.namprd03.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(366004)(396003)(346002)(376002)(39860400002)(136003)(451199021)(122000001)(52536014)(86362001)(38070700005)(166002)(38100700002)(5660300002)(316002)(33656002)(8936002)(8676002)(41300700001)(66556008)(66476007)(6916009)(4326008)(64756008)(66946007)(66446008)(76116006)(83380400001)(54906003)(66899021)(53546011)(186003)(9686003)(6506007)(478600001)(26005)(2906002)(30864003)(7696005)(966005)(55016003)(71200400001)(579004); DIR:OUT; SFP:1101
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
MIME-Version: 1.0
X-OriginatorOrg: rbbn.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR03MB6300.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7973ed60-9d65-4f47-2f89-08db6da81130
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Jun 2023 13:54:41.3221 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 29a671dc-ed7e-4a54-b1e5-8da1eb495dc3
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: yZ+n4d8KWgUjn+IS2GrxqC4SNO8SoJn5iRqW9wz86O4uFek8rFSoAUVzZcuE16SE4cJc3xyjOyKQG9zpzMIfWA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR03MB5751
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: rbbn.com
Content-Language: en-US
Content-Type: multipart/alternative; boundary="_000_PH0PR03MB63001BE463F4AA237C8F9AC8F65BAPH0PR03MB6300namp_"
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/AIazeiC7vFTwkeLTuMiiNFRJEEM>
Subject: Re: [spring] A technical concern regarding draft-schmutzer-spring-cs-sr-policy-00
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Jun 2023 13:54:56 -0000

Christian and all,
I have read Section 3.1 of the latest available version of the draft<https://datatracker.ietf.org/doc/html/draft-schmutzer-spring-cs-sr-policy-02#section-3.1>, and it seems that the BW guarantee mechanisms proposed in this section rely on some mechanisms that prevent non-CS traffic from stealing resources from the CS-SR Policies in all cases including such unplanned events as activation of TI-LFA paths following link failure and/or activation of micro-loop avoidance paths following, say, link recovery.

There seems to be no way to guarantee that this mechanisms would be actually deployed and used correctly.

IMHO and FWIW a clean and “pure SR” solution (at least for SR-MPLS) can be provided along the following lines:

  1.  Activate multi-topology IGP (e.g., MT-ISIS, RFC 5120<https://datatracker.ietf.org/doc/html/rfc5120>)
  2.  Configure a certain non-default topology on all the interfaces that you expect to use for CS-RS policies, and:
     *   Allocate the required resources (BW etc.) for this topology on each link where it is defined
     *   Request MT-ISIS to advertise Adj-SIDs for this topology (in addition to whatever is advertised for the default topology), and take care that packets received with the labels allocated for these adjacencies are forwarded using the topology-specific resources
  3.  Report multi-topology configuration and Adj-SIDs to the SDN controller and instruct it to build CS-SR Policies from Adj-SIDs belonging to the SC-SR topology.

Your feedback would be highly appreciated.

Regards,
Sasha

From: Christian Schmutzer (cschmutz) <cschmutz@cisco.com>
Sent: Tuesday, May 2, 2023 7:29 PM
To: Dongjie (Jimmy) <jie.dong@huawei.com>
Cc: Christian Schmutzer (cschmutz) <cschmutz@cisco.com>; Alexander Vainshtein <Alexander.Vainshtein@rbbn.com>; draft-schmutzer-spring-cs-sr-policy.all@ietf.org; spring@ietf.org
Subject: [EXTERNAL] Re: A technical concern regarding draft-schmutzer-spring-cs-sr-policy-00

Hi Dongjie,

As long as traffic of a CS-SR policy is within the “bandwidth contract” established during the CS-SR policy instantiation (or last update) I don’t see any issue with resource competition.

Cases where a CS-SR policy is “out of contract” we tried to address so far with those two sentences
https://datatracker.ietf.org/doc/html/draft-schmutzer-spring-cs-sr-policy-01#section-3.1-6<https://clicktime.symantec.com/15siQpeisyPpFpXcXd89A?h=QFoPsVQa-vRttLx1U4FMJVlNfX7oOWNTtn7GXokENHk=&u=https://datatracker.ietf.org/doc/html/draft-schmutzer-spring-cs-sr-policy-01%23section-3.1-6>
https://datatracker.ietf.org/doc/html/draft-schmutzer-spring-cs-sr-policy-01#section-7.3-3<https://clicktime.symantec.com/15siVer1Lb5QfmMY5BXHn?h=oQjT6Rcm1EY8Zb3gB2lANSSC4BXWoMyuZiyYj1mD174=&u=https://datatracker.ietf.org/doc/html/draft-schmutzer-spring-cs-sr-policy-01%23section-7.3-3>

Packet bursts of course are a different story, but do equally apply to RSVP-TE and MPLS-TP/GMPLS and I don’t think have been explicitely discussed in respective documents there? Having said that we can think of expanding on https://datatracker.ietf.org/doc/html/draft-schmutzer-spring-cs-sr-policy-01#section-3.1-3.1<https://clicktime.symantec.com/15siKzTSRMiDqshgz4izY?h=BTGVvXgC4AaxgRce4XH1qR7Qa6oeiGHW7JcUQzx_6bM=&u=https://datatracker.ietf.org/doc/html/draft-schmutzer-spring-cs-sr-policy-01%23section-3.1-3.1> and discuss how policer burst values and network interface queue limits can be tuned to accomodate for bursts.

I would propose to incorporate potential changes in the future, or do you see final text for these topics gating WG adoption call?

regards
Christian


On 28.04.2023, at 10:58, Dongjie (Jimmy) <jie.dong@huawei.com<mailto:jie.dong@huawei.com>> wrote:

Hi Christian,

Thanks for updating the draft and reminding me about my comments on the previous version.

I’ve gone through the text in section 3.1, and think it describes useful approaches for providing bandwidth guarantee to CS policies. While I have one remaining question:

My reading is that the bandwidth is allocated to all the CS SR policies (either via a physical link, a logical link or a queue), this could ensure the total bandwidth of all the CS policies are guaranteed. While since different CS policies share the same set of resources, is it possible that in some cases the services carried by the CS policies may compete with each other for that set of shared resources (e.g. due to burst in some CS services)? If so, do you want to mention this in the draft, and may also provide some approaches to avoid or mitigate this effect.

Best regards,
Jie

From: Christian Schmutzer (cschmutz) [mailto:cschmutz@cisco.com]
Sent: Thursday, April 27, 2023 6:37 PM
To: Dongjie (Jimmy) <jie.dong@huawei.com<mailto:jie.dong@huawei.com>>; Alexander Vainshtein <Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>>
Cc: Christian Schmutzer (cschmutz) <cschmutz@cisco.com<mailto:cschmutz@cisco.com>>; draft-schmutzer-spring-cs-sr-policy.all@ietf.org<mailto:draft-schmutzer-spring-cs-sr-policy.all@ietf.org>; spring@ietf.org<mailto:spring@ietf.org>
Subject: Re: A technical concern regarding draft-schmutzer-spring-cs-sr-policy-00

Dear WG,

As we are preparing for WG adoption call, could you please let us know if the concerns have been addressed?

Thanks in advance
Christian



On 15.02.2023, at 19:24, Christian Schmutzer (cschmutz) <cschmutz@cisco.com<mailto:cschmutz@cisco.com>> wrote:

Hi Jie and Sasha,

We recently published a new version of the draft trying to address your concerns on assumptions and procedures for guaranteeing bandwidth for CS-SR policies in the following section https://datatracker.ietf.org/doc/html/draft-schmutzer-spring-cs-sr-policy-01#name-ensuring-bandwidth-guarante<https://clicktime.symantec.com/15siFAG9xk2dRvsmSWKqv?h=Xh2pyKVkbcPM9xX055CHed6lCPfVTAYEYm2YzmNDNVo=&u=https://datatracker.ietf.org/doc/html/draft-schmutzer-spring-cs-sr-policy-01%23name-ensuring-bandwidth-guarante>

Probably not perfect but wondering what you think? Further input and discussion is welcome !

regards
Christian



On 26.07.2022, at 22:23, Dongjie (Jimmy) <jie.dong@huawei.com<mailto:jie.dong@huawei.com>> wrote:

Hi Sasha and Christian,

To my understanding the potential services of CS-SR require some level of performance guarantee, which means the traffic needs to be distinguished from other traffic in the network and be treated separately. As discussed in this thread, one approach would be to steer the traffic to a separate queue or a separate set of resources.

I agree with Sasha that requesting a dedicated traffic class may not be easy. Sasha gave a mechanism based on the coexistence of MPLS-TP and SR-MPLS. An alternative to that would be to use a separate set of SR SIDs for the CS-SR, and associate such set of SR SIDs with a separate set of network resources (e.g. sub-interfaces or queue). That could be achieved by using resource-aware SIDs as defined in draft-ietf-spring-resource-aware-segments.

Best regards,
Jie

From: Pce [mailto:pce-bounces@ietf.org] On Behalf Of Alexander Vainshtein
Sent: Tuesday, July 26, 2022 3:48 PM
To: Christian Schmutzer (cschmutz) <cschmutz@cisco.com<mailto:cschmutz@cisco.com>>
Cc: draft-schmutzer-spring-cs-sr-policy.all@ietf.org<mailto:draft-schmutzer-spring-cs-sr-policy.all@ietf.org>; spring@ietf.org<mailto:spring@ietf.org>; Rotem Cohen <Rotem.Cohen@rbbn.com<mailto:Rotem.Cohen@rbbn.com>>; Nitsan Dolev <Nitsan.Dolev@rbbn.com<mailto:Nitsan.Dolev@rbbn.com>>; pce@ietf.org<mailto:pce@ietf.org>; Michael Gorokhovsky <Michael.Gorokhovsky@rbbn.com<mailto:Michael.Gorokhovsky@rbbn.com>>
Subject: Re: [Pce] A technical concern regarding draft-schmutzer-spring-cs-sr-policy-00

Christian,
Lots of thanks for your prompt response to my concerns about the SR-CS Policy draft.
Unfortunately I will not be able to attend the SPRING session later today (even remotely).

Regarding your explanation, I believe that the key point is the sentence “everything not running over CS-SR has no bandwidth guarantee, is of lower priority and can undergo packet drops during DiffServ PHB processing”.

This statement is an assumption that:
1.  Is critical for SR-CS to deliver its promise
2.  Is actually a requirement (and quite a strong one) for the operator of the SR network to enforce strict separation of traffic that uses SR-CS and all the rest of traffic to different traffic classes. Implementing this requirement in a live operational network may be quite a non-trivial operation
3.  Unless I am mistaken, is not explicitly stated in the current version of the draft (or in any of the associated drafts),

At the same time, I agree that, if this assumption holds, SR-CS can deliver its promise.

Please notice also that in the  case of MPLS networks the same results can be achieved with MPLS-TP running as “ships in the night” with SR-MPLS but without the overhead of deep label stacks required by SR-CS. This approach has been developed and deployed for quite some time now. IMHO it would be interesting to compare these two approaches.

Regards,
Sasha

Office: +972-39266302
Cell:      +972-549266302
Email:   Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>

From: Christian Schmutzer (cschmutz) <cschmutz@cisco.com<mailto:cschmutz@cisco.com>>
Sent: Monday, July 25, 2022 6:45 PM
To: Alexander Vainshtein <Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>>
Cc: Christian Schmutzer (cschmutz) <cschmutz@cisco.com<mailto:cschmutz@cisco.com>>; draft-schmutzer-spring-cs-sr-policy.all@ietf.org<mailto:draft-schmutzer-spring-cs-sr-policy.all@ietf.org>; spring@ietf.org<mailto:spring@ietf.org>; Rotem Cohen <Rotem.Cohen@rbbn.com<mailto:Rotem.Cohen@rbbn.com>>; Nitsan Dolev <Nitsan.Dolev@rbbn.com<mailto:Nitsan.Dolev@rbbn.com>>; pce@ietf.org<mailto:pce@ietf.org>; Michael Gorokhovsky <Michael.Gorokhovsky@rbbn.com<mailto:Michael.Gorokhovsky@rbbn.com>>
Subject: [EXTERNAL] Re: A technical concern regarding draft-schmutzer-spring-cs-sr-policy-00

Hi Sasha,

Many thanks for reviewing draft-schmutzer-pce-cs-sr-policy (draft-schmutzer-spring-cs-sr-policy) and sharing your input / concerns. Let me try to address them.

CS-SR policies don’t require additional unprotected adj-SIDs. The unprotected adj-SID part of the two adj-SIDs you mentioned typically being present per link in a network does suffice.

Further the draft does not assume bandwidth guarantees for those unprotected adj-SIDs. Bandwidth is managed by the PCE at a link level and bandwidth guarantees are achieved by ensuring that the total amount of bandwidth requested by all candidate-paths going via a link is kept below the reservable maximum bandwidth defined.

To ensure a link is never congested by just CS-SR traffic, end-to-end path-protection and restoration is used. This ensures traffic does only flow along a path (working, protect or restore) for which bandwidth admission control has been done during path establishment.

You are correct, mechanisms such as TI-LFA may lead to congestion, but the assumption is that everything not running over CS-SR, has no bandwidth guarantee, is of lower priority and can undergo packet drops during DiffServ PHB processing.

There are many ways to fulfil those PHB processing requirements. One way is to mark CS-SR policy traffic with a unique EXP/DSCP and map it into a dedicated priority queue. CS-SR traffic may share a EXP/DSCP and/or queue with other traffic if the operate is certain that the queue will never be congested (i.e. the non CS-SR traffic is important but has very low volume and the queue’s bandwidth is over-provisioned to be enough for CS-SR and non CS-SR traffic together)

I will take the action on thinking about how some more / better text could be added to the draft without being to specific to limit deployment choices.

Hopefully the above does provide a bit more clarity. I am happy to discuss more, fyi I will present the draft in the SPRING WG session, but will be attending IETF114 online only.

Regards
Christian


On 24.07.2022, at 19:02, Alexander Vainshtein <Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>> wrote:

Hi all,
I would like to clarify that, from my POV, my technical concerns about draft-schmutzer-pce-sr-cs-routing-policies<https://clicktime.symantec.com/15t5ZrUvivrzY8sT1ijxH?h=oARDBH4W-5ffeLBR147jEqYwP_rR1J1Akb38blbagcY=&u=https://datatracker.ietf.org/doc/html/draft-schmutzer-pce-cs-sr-policy-02> presented in my email dated 11-Jul-22<https://clicktime.symantec.com/15t5eggDBYYax5hNZH96u?h=SF8xdDZrlCfJegvv79QramWDaqy05gg48KBreJtvyuM=&u=https://mailarchive.ietf.org/arch/msg/spring/ctrAx6JFaNwLhMCQB5QUdBCR7B8/> fully apply to this draft.

Specifically, the authors do not define any mechanisms that would prevent possible usage of unprotected Adj-SIDs used in the configuration of the candidate paths of CR-CS policies from being also used by such well-known and widely deployed mechanisms as TI-LFA and Segment Routing Microloop Avoidance.  As a consequence, the “strict BW guarantees”  that are expected of SR-CS policies would be violated every time one of these mechanisms would result in some “regular” traffic being sent via the paths defined by such mechanisms.

Even if such mechanisms were defined in a future version of  draft-schmutzer-spring-cs-sr-policy, a retrofit of existing implementations of TI-LFA and/or SR Microloop Avoidance would be required.

I understand the motivation for CR-SC Policies, but I strongly suspect that SR cannot be used as a replacement for MPLS-TP when it comes to BW guarantees.

Regards,
Sasha

Office: +972-39266302
Cell:      +972-549266302
Email:   Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>


Notice: This e-mail together with any attachments may contain information of Ribbon Communications Inc. and its Affiliates that is confidential and/or proprietary for the sole use of the intended recipient. Any review, disclosure, reliance or distribution by others or forwarding without express permission is strictly prohibited. If you are not the intended recipient, please notify the sender immediately and then delete all copies, including any attachments.


Notice: This e-mail together with any attachments may contain information of Ribbon Communications Inc. and its Affiliates that is confidential and/or proprietary for the sole use of the intended recipient. Any review, disclosure, reliance or distribution by others or forwarding without express permission is strictly prohibited. If you are not the intended recipient, please notify the sender immediately and then delete all copies, including any attachments.

Disclaimer

The information contained in this communication from the sender is confidential. It is intended solely for use by the recipient and others authorized to receive it. If you are not the recipient, you are hereby notified that any disclosure, copying, distribution or taking action in relation of the contents of this information is strictly prohibited and may be unlawful.

This email has been scanned for viruses and malware, and may have been automatically archived by Mimecast, a leader in email security and cyber resilience. Mimecast integrates email defenses with brand protection, security awareness training, web security, compliance and other essential capabilities. Mimecast helps protect large and small organizations from malicious activity, human error and technology failure; and to lead the movement toward building a more resilient world. To find out more, visit our website.