Re: [spring] A belated comment on end-to-end path protection in draft-ietf-spring-resiliency-use-cases

Alexander Vainshtein <Alexander.Vainshtein@ecitele.com> Wed, 17 May 2017 08:20 UTC

Return-Path: <Alexander.Vainshtein@ecitele.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 60ACD129C37; Wed, 17 May 2017 01:20:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.801
X-Spam-Level:
X-Spam-Status: No, score=-1.801 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_DKIM_INVALID=0.01, T_KAM_HTML_FONT_INVALID=0.01] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=eci365.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J8Kuy0GQxL-M; Wed, 17 May 2017 01:20:40 -0700 (PDT)
Received: from mail1.bemta3.messagelabs.com (mail1.bemta3.messagelabs.com [195.245.230.169]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3080B129B25; Wed, 17 May 2017 01:17:02 -0700 (PDT)
Received: from [85.158.138.179] by server-9.bemta-3.messagelabs.com id 6D/FD-26749-CF60C195; Wed, 17 May 2017 08:17:00 +0000
X-Brightmail-Tracker: H4sIAAAAAAAAA1VTaUgUYRjum2tnw4mv1fJt243a7kJTDBKhMiq ooONPh1HkrE7u1u5oM1tYIERZVpqdIG6mUobdx+LVTUZF2yV2sml5lklRdlhqWDN+ZjW/nvd9 nnne5/t4P5423ebMvJTqkRRZdNm4/szk8T9GhXVylriI8l8x0Wdet3DRrTs6qOg7VV0olp5z0 VtrmFNU1EEtopazTtmenBrPOtKrKlDK0ZPG1PTX+wyb0ROvcRfqzzN4Ow3Z3QW0Xpjwfgrqcr spUtQhOJ53XyuMPIengu9ULbcL8XwIngjXHg3RNTTORlD5MI/VNcE4BY4UvujVrIPiPYquCcF bEJT4z9K6hsGjofnS+x5PAa+Ap1/u9E7O4qB4awWjE0ZtmPfEBYOOER4M3/2ne36gcSgEmgp6 MGAMRVce0QQPgneN3SzRZyK4XDiN9G0QOOdnCLZCdUEm0ocBzqLhcf5jlhDzob30k0FPDXgkl LSsJBrNJyc/nSb9tRA4xpD+bgQHPvgMpOiioOveQ44YWaDsxluaEN84+PGVxA7GZqh9shMRbI GWmqus7kpjGdpahu1FY73/HM77l/H2XNJAuJvbxJD2eDh3aRJRj4CDmfUGgsfBtrzDhn/7hch wEo1TJWWDpIRFRoXbFWeSw+MWna6wyIiocLekqmKS5BLtanhCstuHtJ3qp30VqKx8biUawlO2 QcL1uqFxpgH25MSNDlF1rFLWuyS1Ell43gbCAdYSZxqoSElS6mqnS1vMPzTwQbYQ4btOC2qK6 FadSYTyozD+dH3HR8rEyMmyZA4VmnQR1kWO9XKfxZ/1rkZWc7CAtFCmoBRJcTs9//OtKJRHtm CB1V6BKcgpe/omtWohKC3EVj2/oHrEv5R5M7InJqQFOi+8a2guT1i9aWF1/FJ37bHj8ud+7b7 hStZTdsbCLfbAmzS7Z4y1VKbaOlY1WmcuXpMTHutbFlOZnVNVVPPBcYs9v7wsbWYcu+zmr1nz lpS3DTixL97/cs8ra27g6tyGi9OjMrY96JyQIx5aMHvKCzaoOCPR/XxByM9nxnn5NkZ1iJETa EUVfwOKvF7C2QMAAA==
X-Env-Sender: Alexander.Vainshtein@ecitele.com
X-Msg-Ref: server-15.tower-169.messagelabs.com!1495009014!108866339!1
X-Originating-IP: [52.41.248.36]
X-StarScan-Received:
X-StarScan-Version: 9.4.12; banners=ecitele.com,-,-
X-VirusChecked: Checked
Received: (qmail 17874 invoked from network); 17 May 2017 08:16:57 -0000
Received: from ec2-52-41-248-36.us-west-2.compute.amazonaws.com (HELO EUR01-HE1-obe.outbound.protection.outlook.com) (52.41.248.36) by server-15.tower-169.messagelabs.com with AES256-SHA256 encrypted SMTP; 17 May 2017 08:16:57 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ECI365.onmicrosoft.com; s=selector1-ecitele-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=WVmCaOw/o1kWGOGiF0d1RFxPeXGoIKzmQ5+qeeq2jvU=; b=hRXwr2l0MqKi4FarDMWr4Hlwz9TJdIwWOyAMfFq1U9D2CUozSfpZBiTL5cl1oqqbNy1rssdGkM1f5uCadwrQjIzRi6kHQjaMW8dHE4Bqi9rqTitr4DmVBk+MM0Yr4v8YGjJxLNa7RuMTcahkqF2iFGwvTj/Jn5inKFLWohMRmzQ=
Received: from AM4PR03MB1713.eurprd03.prod.outlook.com (10.167.88.15) by AM4PR03MB1715.eurprd03.prod.outlook.com (10.167.88.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1084.16; Wed, 17 May 2017 08:16:52 +0000
Received: from AM4PR03MB1713.eurprd03.prod.outlook.com ([fe80::21f9:af8d:c7ff:3e13]) by AM4PR03MB1713.eurprd03.prod.outlook.com ([fe80::21f9:af8d:c7ff:3e13%14]) with mapi id 15.01.1084.027; Wed, 17 May 2017 08:16:52 +0000
From: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
To: Jeff Tantsura <jefftant.ietf@gmail.com>
CC: "spring@ietf.org" <spring@ietf.org>, "draft-ietf-spring-resiliency-use-cases@ietf.org" <draft-ietf-spring-resiliency-use-cases@ietf.org>
Thread-Topic: [spring] A belated comment on end-to-end path protection in draft-ietf-spring-resiliency-use-cases
Thread-Index: AdLKMfwZZp8yu5h/Ra+WsEpPtv/h+gDQnJYAAClgXmAAAR1WkAACTVYAAABuswAAAVfJAAAAP+pQAACkDVAACzIdAAAAL49AAAE164AAADnRgAAfQO5Q
Date: Wed, 17 May 2017 08:16:52 +0000
Message-ID: <AM4PR03MB1713172A9D3AB5B4695FDC8B9DE70@AM4PR03MB1713.eurprd03.prod.outlook.com>
References: <AM4PR03MB1713393C262301279EAF29039DED0@AM4PR03MB1713.eurprd03.prod.outlook.com> <4CE8B71E-1CB7-43AF-9DA3-D936E030A2CA@cisco.com> <AM4PR03MB1713F46B5662731126099CFE9DE60@AM4PR03MB1713.eurprd03.prod.outlook.com> <CAKz0y8wPO6VcMJ6Ba_m1A5L2F5bh2rv7761C8vGo51H+xSRfuA@mail.gmail.com> <AM4PR03MB1713AAD69441A6C92D63B5919DE60@AM4PR03MB1713.eurprd03.prod.outlook.com> <CAKz0y8zHzneU4SUtH8RGp0kjKVc=XfFZ3uO6e8NNFGn0X383LQ@mail.gmail.com> <AM4PR03MB171393C194C01D56F00513E59DE60@AM4PR03MB1713.eurprd03.prod.outlook.com> <CAKz0y8xnkL10YFr7+V8i5ECe0Zgzr7hELgKnHjDxm5WgOzdPjQ@mail.gmail.com> <AM4PR03MB17134890B40531136D7EE5719DE60@AM4PR03MB1713.eurprd03.prod.outlook.com> <15C96387-0796-4E0A-9C79-E5B6576D2829@gmail.com> <FD404255-6901-4A6B-BB90-62D3A9F45DEB@gmail.com>
In-Reply-To: <FD404255-6901-4A6B-BB90-62D3A9F45DEB@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [79.176.166.205]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM4PR03MB1715; 7:J9KxtoVRyvXU/aUhNz2ZMAZGsql0oV+/gBc5ylIfratY2dEXF+pOYh8ORiQRDUokzAIZpP8QQ90aORcIcxh4orLYzcHbM03oCcAs6L30vubn38v4sLaMLIrMMCJFn8SnFK8KuRUdc4/y2rOEzEM2Jbig6yo7EbXpmShE+ynWsnphrhejI5stwujW+nEynwWF6KhEZmr3eOGffEK+8wDI2hyoW5gpbXThDrNKX3/wi6Xw8fxLxiDIbOk025NrMlCmIaTz+lF2EiD5yVAYxYFYFF3jClK41oLWubcwohz/kISxx7hYTOYZQCwybZVRfu8DSbXLNUZFvGFn5xzr9W4wgw==
x-ms-office365-filtering-correlation-id: d86b643b-c59a-4a89-a25c-08d49cfd12ce
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254075)(48565401081)(201703131423075)(201703031133081); SRVR:AM4PR03MB1715;
x-microsoft-antispam-prvs: <AM4PR03MB1715E24BAE3B603633EA131C9DE70@AM4PR03MB1715.eurprd03.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(72170088055959)(120809045254105)(131327999870524)(95692535739014)(21748063052155)(279101305709854);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(5005006)(8121501046)(10201501046)(3002001)(93006095)(93001095)(6055026)(6041248)(20161123555025)(20161123564025)(20161123562025)(20161123558100)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123560025)(6072148); SRVR:AM4PR03MB1715; BCL:0; PCL:0; RULEID:; SRVR:AM4PR03MB1715;
x-forefront-prvs: 0310C78181
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39450400003)(39840400002)(39850400002)(39410400002)(39860400002)(39400400002)(51914003)(53754006)(37854004)(13464003)(252514010)(377454003)(24454002)(110136004)(6246003)(561944003)(76176999)(236005)(38730400002)(55016002)(93886004)(230783001)(16200700003)(54906002)(6306002)(54896002)(99286003)(33656002)(2906002)(9686003)(3280700002)(7906003)(25786009)(53936002)(72206003)(86362001)(53546009)(54356999)(81166006)(53946003)(50986999)(39060400002)(3846002)(6116002)(790700001)(102836003)(3660700001)(7736002)(4326008)(2900100001)(189998001)(5250100002)(2950100002)(229853002)(6916009)(6436002)(8676002)(74316002)(7696004)(606005)(8936002)(6506006)(66066001)(478600001)(5660300001)(966005)(569005); DIR:OUT; SFP:1102; SCL:1; SRVR:AM4PR03MB1715; H:AM4PR03MB1713.eurprd03.prod.outlook.com; FPR:; SPF:None; MLV:ovrnspm; PTR:InfoNoRecords; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_AM4PR03MB1713172A9D3AB5B4695FDC8B9DE70AM4PR03MB1713eurp_"
MIME-Version: 1.0
X-OriginatorOrg: ecitele.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 May 2017 08:16:52.1804 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2c514a61-08de-4519-b4c0-921fef62c42a
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR03MB1715
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/wf2FitYg4BbXOv0fev8xocfjUaY>
Subject: Re: [spring] A belated comment on end-to-end path protection in draft-ietf-spring-resiliency-use-cases
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Stacked Tunnels for Source Routing \(STATUS\)." <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 May 2017 08:20:44 -0000

Jeff,
Lots of thanks for the comment.

I fully agree with your explanation of differences between SR-TE and TE that is based on RSVP-TE LSP.

From my POV the resiliency use cases draft<https://datatracker.ietf.org/doc/draft-ietf-spring-resiliency-use-cases/?include_text=1> implicitly recognizes this differences when it says that E2E path protection requires E2E liveness monitoring of the SR paths involved.

I would like to clarify that I see one more difference between TE that is used on RSVP-TE and SR-TE:

-          RSVP-TE LSPs and “shortest path” (LDP) LSPs run as ships in the night: a local protection scheme that repairs an LDP LSP will not affect any RSVP-TE LSPs and vice versa

-          SR-TE LSPs frequently can be treated as sequences of nested shortest path SR LSPs (at least that is what happens if the ERO of an SR-TE LSP is represented by a sequence of Node SIDs).   Therefore whatever happens to a certain shortest path SR LSP will be “inherited” by all SR-TE LSPs that include it.

This difference is the basic assumption behind  my proposal for combining local and path protection schemes.
It does not assume that PLR makes any decisions “based on transitional changes in a routing protocol”.
Quite on the contrary, local protection would be triggered by locally detected events (e.g., locally detected failure of a link towards the next hop of the shortest path, or loss of IP reachability of this next hop) . Local protection would be then applied to the shortest SR paths (could be IPv6 FRR if the SR data plane is IPv6, or MPLS FRR based  on IP LFA  - same as can be done for LDP LSPs).

Once this happens and shortest SR LSPs that suffered from the failure are repaired by the local protection action, all SR-TE LSPs that use these shortest path LSPs would be automatically repaired as well.

Hopefully these notes clarify my position on the subject.

Regards,
Sasha

Office: +972-39266302
Cell:      +972-549266302
Email:   Alexander.Vainshtein@ecitele.com

From: Jeff Tantsura [mailto:jefftant.ietf@gmail.com]
Sent: Tuesday, May 16, 2017 7:58 PM
To: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
Cc: spring@ietf.org; draft-ietf-spring-resiliency-use-cases@ietf.org
Subject: Re: [spring] A belated comment on end-to-end path protection in draft-ietf-spring-resiliency-use-cases

resending with reduced number of recipients.

Cheers,
Jeff

Sasha,

Don’t forget – RSVP-TE FRR has explicit signaling and state associated with it, as well as well defined state transitions, SR on contrary doesn’t.
Changes in topology (link/node down events) are not communicated back to the head-end directly but rather flooded thru a routing protocol (for sake of this discussion lets ignore the possibility of running fast failure detection over SR tunnels).
Trying to derive operation state at PLR based on transitional changes in a routing protocol is a rather complicated task.

Cheers,
Jeff


From: spring <spring-bounces@ietf.org<mailto:spring-bounces@ietf.org>> on behalf of Alexander Vainshtein <Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>>
Date: Tuesday, May 16, 2017 at 09:23
To: Muthu Arul Mozhi Perumal <muthu.arul@gmail.com<mailto:muthu.arul@gmail.com>>
Cc: "spring@ietf.org<mailto:spring@ietf.org>" <spring@ietf.org<mailto:spring@ietf.org>>, Shell Nakash <Shell.Nakash@ecitele.com<mailto:Shell.Nakash@ecitele.com>>, Michael Gorokhovsky <Michael.Gorokhovsky@ecitele.com<mailto:Michael.Gorokhovsky@ecitele.com>>, "draft-ietf-spring-resiliency-use-cases@ietf.org<mailto:draft-ietf-spring-resiliency-use-cases@ietf.org>" <draft-ietf-spring-resiliency-use-cases@ietf.org<mailto:draft-ietf-spring-resiliency-use-cases@ietf.org>>, Sidd Aanand <Sidd.Aanand@ecitele.com<mailto:Sidd.Aanand@ecitele.com>>, "Stefano Previdi (sprevidi)" <sprevidi@cisco.com<mailto:sprevidi@cisco.com>>, Ron Sdayoor <Ron.Sdayoor@ecitele.com<mailto:Ron.Sdayoor@ecitele.com>>, Rotem Cohen <Rotem.Cohen@ecitele.com<mailto:Rotem.Cohen@ecitele.com>>
Subject: Re: [spring] A belated comment on end-to-end path protection in draft-ietf-spring-resiliency-use-cases

Muthu,
Again lots of thanks for a prompt response.

We seem to agree on the following points:

&#0;.     In SR some failures cannot be handled by local protection (actually, there is an expired draft that defines how this could be done, but it introduces serious complexity)

&#0;.     Combining local protection with end-to-end path protection is possible. In particular, such a combination speeds up handling of failures that that can be handled locally while also handling failures that could not be addressed by local protection.

Whether combining both forms of protection carries with it some new problems or not is a different story.

Regards,
Sasha

Office: +972-39266302
Cell:      +972-549266302
Email:   Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>

From: Muthu Arul Mozhi Perumal [mailto:muthu.arul@gmail.com]
Sent: Tuesday, May 16, 2017 7:11 PM
To: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>>
Cc: Stefano Previdi (sprevidi) <sprevidi@cisco.com<mailto:sprevidi@cisco.com>>; spring@ietf.org<mailto:spring@ietf.org>; Shell Nakash <Shell.Nakash@ecitele.com<mailto:Shell.Nakash@ecitele.com>>; Michael Gorokhovsky <Michael.Gorokhovsky@ecitele.com<mailto:Michael.Gorokhovsky@ecitele.com>>; draft-ietf-spring-resiliency-use-cases@ietf.org<mailto:draft-ietf-spring-resiliency-use-cases@ietf.org>; Sidd Aanand <Sidd.Aanand@ecitele.com<mailto:Sidd.Aanand@ecitele.com>>; Ron Sdayoor <Ron.Sdayoor@ecitele.com<mailto:Ron.Sdayoor@ecitele.com>>; Rotem Cohen <Rotem.Cohen@ecitele.com<mailto:Rotem.Cohen@ecitele.com>>
Subject: Re: [spring] A belated comment on end-to-end path protection in draft-ietf-spring-resiliency-use-cases

Sasha,

On Tue, May 16, 2017 at 4:29 PM, Alexander Vainshtein <Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>> wrote:
Muthu,
An additional clarification:

•         If the link BC were OK, B could pop B from the stack and send packets to C with just D in the stack

•         When the link BC fails, B will leave the stack as (CD) IMHO – it would be  just trying to bypass the failed link BC.

•         If the failure of BC as perceived by B was cause by the failure of node B, such a failure could not be recovered by local protection. This is exactly the scenario where local protection for shortest SR path comprising an SR-TE path should be augmented by end-to-end path protection.
​If node B fails, the e2e path monitoring at  node A would anyway detect the failure and switch the traffic over an alternate disjoint path...​

Regarding combination of local protection with end-to-end protection for RSVP-TE – AFAIK this was never used because it would not provide any added value.
In SR this is not so because local protection is usually faster (and scales better) than end-to-end protection, but, as opposed to RSVP-TE, there are failures that local protection cannot fix.

​Agree, there are failures in SR-TE that local protection cannot fix as desired, so it calls for e2e path protection. However, enabling them together is not always the best approach since it can introduce other problems to solve.

Regards,
Muthu


Regards,
Sasha

Office: +972-39266302<tel:+972%203-926-6302>
Cell:      +972-549266302<tel:+972%2054-926-6302>
Email:   Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>

From: Alexander Vainshtein
Sent: Tuesday, May 16, 2017 1:42 PM
To: 'Muthu Arul Mozhi Perumal' <muthu.arul@gmail.com<mailto:muthu.arul@gmail.com>>
Cc: Stefano Previdi (sprevidi) <sprevidi@cisco.com<mailto:sprevidi@cisco.com>>; spring@ietf.org<mailto:spring@ietf.org>; Shell Nakash <Shell.Nakash@ecitele.com<mailto:Shell.Nakash@ecitele.com>>; Michael Gorokhovsky <Michael.Gorokhovsky@ecitele.com<mailto:Michael.Gorokhovsky@ecitele.com>>; draft-ietf-spring-resiliency-use-cases@ietf.org<mailto:draft-ietf-spring-resiliency-use-cases@ietf.org>; Sidd Aanand <Sidd.Aanand@ecitele.com<mailto:Sidd.Aanand@ecitele.com>>; Ron Sdayoor <Ron.Sdayoor@ecitele.com<mailto:Ron.Sdayoor@ecitele.com>>; Rotem Cohen <Rotem.Cohen@ecitele.com<mailto:Rotem.Cohen@ecitele.com>>
Subject: RE: [spring] A belated comment on end-to-end path protection in draft-ietf-spring-resiliency-use-cases

Muthu,
Again lots of thanks for a prompt response. I still do not think a loop would really form because:

•         A sends packet to its local next hop for B with the stack (B, C, D)

•         B receives this packet with the stack (C, D), but the link C has failed. So B sends to its next hop for it back to A with stack (C,D)

•         A now sends the packet to its next hop for C with the same stack.

Regards,
Sasha

Office: +972-39266302<tel:+972%203-926-6302>
Cell:      +972-549266302<tel:+972%2054-926-6302>
Email:   Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>

From: Muthu Arul Mozhi Perumal [mailto:muthu.arul@gmail.com]
Sent: Tuesday, May 16, 2017 1:25 PM

To: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>>
Cc: Stefano Previdi (sprevidi) <sprevidi@cisco.com<mailto:sprevidi@cisco.com>>; spring@ietf.org<mailto:spring@ietf.org>; Shell Nakash <Shell.Nakash@ecitele.com<mailto:Shell.Nakash@ecitele.com>>; Michael Gorokhovsky <Michael.Gorokhovsky@ecitele.com<mailto:Michael.Gorokhovsky@ecitele.com>>; draft-ietf-spring-resiliency-use-cases@ietf.org<mailto:draft-ietf-spring-resiliency-use-cases@ietf.org>; Sidd Aanand <Sidd.Aanand@ecitele.com<mailto:Sidd.Aanand@ecitele.com>>; Ron Sdayoor <Ron.Sdayoor@ecitele.com<mailto:Ron.Sdayoor@ecitele.com>>; Rotem Cohen <Rotem.Cohen@ecitele.com<mailto:Rotem.Cohen@ecitele.com>>
Subject: Re: [spring] A belated comment on end-to-end path protection in draft-ietf-spring-resiliency-use-cases

On Tue, May 16, 2017 at 3:27 PM, Alexander Vainshtein <Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>> wrote:
Muthu,
Lots of thanks for a prompt response.

I do not think that the loop you have described would actually appear in the scenario you’ve described.

To the best of my understanding of TI-LFA, B would send the traffic back to A complete with an explicit route that says B--> A--> C-->D, and no loop would be formed.

Not necessarily. B was asked to send the traffic to C and knows that if it sends the traffic to A, then A will send it to C over the shortest path (i.e from B's perspective only the labeled next-hop changes). Unfortunately, A has an explicit route pointing back to B (over the SR-TE tunnel T1) that B isn't aware of. If B does strict explicit route for everything, then B can run out of its MSD..

​

Similar “loops” can happen also in MPLS FRR with RSVP-TE when the PLR sends some traffic back  - but it sends it with the suitable label stack of the bypass tunnel so that eventually it reaches the MP.

​Are there existing deployments where both e2e path protection and local protection are used together with RSVP-TE?

Regards,
Muthu


Regards,
Sasha

Office: +972-39266302<tel:+972%203-926-6302>
Cell:      +972-549266302<tel:+972%2054-926-6302>
Email:   Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>

From: Muthu Arul Mozhi Perumal [mailto:muthu.arul@gmail.com<mailto:muthu.arul@gmail.com>]
Sent: Tuesday, May 16, 2017 12:34 PM
To: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>>
Cc: Stefano Previdi (sprevidi) <sprevidi@cisco.com<mailto:sprevidi@cisco.com>>; spring@ietf.org<mailto:spring@ietf.org>; Shell Nakash <Shell.Nakash@ecitele.com<mailto:Shell.Nakash@ecitele.com>>; Michael Gorokhovsky <Michael.Gorokhovsky@ecitele.com<mailto:Michael.Gorokhovsky@ecitele.com>>; draft-ietf-spring-resiliency-use-cases@ietf.org<mailto:draft-ietf-spring-resiliency-use-cases@ietf.org>; Sidd Aanand <Sidd.Aanand@ecitele.com<mailto:Sidd.Aanand@ecitele.com>>; Ron Sdayoor <Ron.Sdayoor@ecitele.com<mailto:Ron.Sdayoor@ecitele.com>>; Rotem Cohen <Rotem.Cohen@ecitele.com<mailto:Rotem.Cohen@ecitele.com>>

Subject: Re: [spring] A belated comment on end-to-end path protection in draft-ietf-spring-resiliency-use-cases

Using end-to-end path protection together with local protection can result in traffic loops. Consider the foll. topology:

B-----C
|    / \
|   /   \
|  /     \
| /       \D----+
A/              Z (CE)
 \         F----+
  \       /
   \     /
    \   /
     \E/

- All links are of equal cost.
- A, D and F are BGP peers.
- Z is a dual-homed CE.

A resolves its BGP next-hop D over the SR-TE tunnel T1.
T1: A->B, B->C, C->D (loosely routed)

Suppose A has enabled end-to-end path protection over tunnel T1 and B has TI-LFA enabled, and the detection timers are configured as described in your previous email. If the BC link goes down, B will immediately start rerouting the traffic via A (in FRR fashion) creating a loop b/w A and B.

A solution would be to make the A-B link ineligible for TI-LFA backup computation at B. However, managing this network-wide could become operational expensive. Hence, deploying one of end-to-end path protection or local protection with sufficiently short detection timers keeps things simple, IMHO.

Regards,
Muthu

On Tue, May 16, 2017 at 1:59 PM, Alexander Vainshtein <Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>> wrote:


Regards,
Sasha

Office: +972-39266302<tel:+972%203-926-6302>
Cell:      +972-549266302<tel:+972%2054-926-6302>
Email:   Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>

From: Alexander Vainshtein
Sent: Tuesday, May 16, 2017 11:28 AM
To: 'Stefano Previdi (sprevidi)' <sprevidi@cisco.com<mailto:sprevidi@cisco.com>>
Cc: draft-ietf-spring-resliency-use-cases@ietf.org<mailto:draft-ietf-spring-resliency-use-cases@ietf.org>; spring@ietf.org<mailto:spring@ietf.org>; Shell Nakash <Shell.Nakash@ecitele.com<mailto:Shell.Nakash@ecitele.com>>; Michael Gorokhovsky <Michael.Gorokhovsky@ecitele.com<mailto:Michael.Gorokhovsky@ecitele.com>>; Sidd Aanand <Sidd.Aanand@ecitele.com<mailto:Sidd.Aanand@ecitele.com>>; Ron Sdayoor <Ron.Sdayoor@ecitele.com<mailto:Ron.Sdayoor@ecitele.com>>; Rotem Cohen <Rotem.Cohen@ecitele.com<mailto:Rotem.Cohen@ecitele.com>>
Subject: RE: [spring] A belated comment on end-to-end path protection in draft-ietf-spring-resiliency-use-cases


Stefano,

Lots of thanks for a prompt response.



A couple of short comments if you do not mind:



Using 2119 language in a "use cases" document:

1.       Going back to the source I see that “MUST NOT… mean that the definition is an absolute prohibition of the specification”

2.       I agree that the use case document defines which scenarios should be addressed, but I do not see how it can impose an absolute prohibition on a certain scenario.



Little sense link protection has in the case of path protection:

1.       This was definitely correct for traditional traffic engineering because the “shortest traffic paths” (e.g., LDL PSPs) could be easily differentiated from the “engineered traffic paths”.

2.       In addition, traditional local protection (e.g., MPLS FRR using RSVP-TE) could deal with link and node failures regardless of whether the failed link or node appeared in the ERO of the protected path.

3.       IMHO and FWIW, with SR  the situation is quite different:

o   The shortest traffic paths not only coexist with engineered traffic paths: the latter are in many cases “tunneled” within the former.

o   Path protection cannot be applied to shortest traffic paths so they must rely on local protection

o   Local protection in the case of failure of a node or link that appears in the ERO of an engineered SR path is highly non-trivial at best, so path protection for the engineered LSPs looks like a preferred solution to me.

I fully agree with you that the operators deploying SR should provide feedback on this point based on actual operational experience.

Meanwhile I doubt that a priori declaring some use cases as absolutely prohibited is the right thing to do.



My 2c,

Sasha



Office: +972-39266302<tel:+972%203-926-6302>

Cell:      +972-549266302<tel:+972%2054-926-6302>

Email:   Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>





-----Original Message-----
From: Stefano Previdi (sprevidi) [mailto:sprevidi@cisco.com]
Sent: Monday, May 15, 2017 11:12 AM
To: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>>
Cc: draft-ietf-spring-resliency-use-cases@ietf.org<mailto:draft-ietf-spring-resliency-use-cases@ietf.org>; spring@ietf.org<mailto:spring@ietf.org>; Shell Nakash <Shell.Nakash@ecitele.com<mailto:Shell.Nakash@ecitele.com>>; Michael Gorokhovsky <Michael.Gorokhovsky@ecitele.com<mailto:Michael.Gorokhovsky@ecitele.com>>; Sidd Aanand <Sidd.Aanand@ecitele.com<mailto:Sidd.Aanand@ecitele.com>>; Ron Sdayoor <Ron.Sdayoor@ecitele.com<mailto:Ron.Sdayoor@ecitele.com>>; Rotem Cohen <Rotem.Cohen@ecitele.com<mailto:Rotem.Cohen@ecitele.com>>
Subject: Re: [spring] A belated comment on end-to-end path protection in draft-ietf-spring-resiliency-use-cases





> On May 11, 2017, at 12:04 PM, Alexander Vainshtein <Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>> wrote:

>

> Hi all,

> I have a belated (but hopefully late is still better than never) comment on path protection as defined in Section 2 of the draft.

>

> This second para in this section says:

>    A first protection strategy consists in excluding any local repair

>

>    but instead use end-to-end path protection where each SPRING path

> is

>

>    protected by a second disjoint SPRING path.  In this case local

>

>    protection MUST NOT be used.

>

> First of all, I do not think that RFC 2119 language should be used in Informational documents, especially in the documents that describe use cases.





this document is also a requirements document for the resiliency use-case. RFC2119 terminology is perfectly usable and even more, it adds clarity on what the solution is expected to provide.





> In addition, I specifically disagree with the quoted statement above, because, from my POV:

> ·         Local repair and end-to-end path protection can be combined for the same path

> ·         Such a combination may be beneficial for the operators.





are you talking by experience or is it just something that came into your mind ? I’d like to hear from operators using a combination of path and link protection.



This document has been deeply reviewed also by operators and it has been always obvious the little sense link protection has in case of path protection.





> One possible way to combine the two is described below:

>

> 1.       A pair of SR paths is set up between the given two nodes – later referred to as source and destination -  in the network. These paths are “SR-disjoint” in the sense that their “explicit routes”  do not have any common elements, be they nodes or adjacencies, with exclusion of the final destination

> 2.       Local repair for these paths is enabled in the network. It is triggered by locally observed events (link failures etc.), applied by the nodes adjacent to the failure and guarantees that, in the case of a link or node failure that is not specified in the explicit route, traffic along the affected path would be restored within <X> milliseconds

> 3.       End-to-end liveness monitoring is enabled for the two SR paths, and detects end-to-end failures of these paths within <Y> milliseconds where Y >> X. In other words, end-to-end liveness monitoring for these paths will ignore any failures that local repair can fix, but will detect failures that cannot be locally repaired (e.g., failures of nodes or links that have been specified in the explicit route of one of the paths

> 4.       End-to-end liveness monitoring triggers end-to-end path protection to be applied by the source node in the following way:

> a.       If it recognizes both paths as alive, one of them will carry the customer traffic, while the other one will be idle. The rules for selecting the active path in this scenario may vary

> b.      If end-to-end failure of one of these paths is detected while the other one remains alive, traffic will be carried across the live path

> c.       If end-to-end failure of both paths is detected (e.g., if the final destination node fails, or if the network is partitioned), this is recognized as an unrecoverable failure.

>

> From my POV the combination of local repair and end-to-end protection for SR paths is one of a few possibilities to protect such paths against failures of nodes and/or links that have been specified in their explicit routes. (Another option has been described in Node Protection for SR-TE Paths, but this draft has expired).

>

> Do I miss something substantial?





to my view you created a use-case that doesn’t bring much to the picture but I’d let operators to comment.



s.





>

> Regards,

> Sasha

>

> Office: +972-39266302<tel:+972%203-926-6302>

> Cell:      +972-549266302<tel:+972%2054-926-6302>

> Email:   Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>

>

>

> ______________________________________________________________________

> _____

>

> This e-mail message is intended for the recipient only and contains

> information which is CONFIDENTIAL and which may be proprietary to ECI

> Telecom. If you have received this transmission in error, please

> inform us by e-mail, phone or fax, and then delete the original and all copies thereof.

> ______________________________________________________________________

> _____ _______________________________________________

> spring mailing list

> spring@ietf.org<mailto:spring@ietf.org>

> https://www.ietf.org/mailman/listinfo/spring



___________________________________________________________________________

This e-mail message is intended for the recipient only and contains information which is
CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have received this
transmission in error, please inform us by e-mail, phone or fax, and then delete the original
and all copies thereof.
___________________________________________________________________________

_______________________________________________
spring mailing list
spring@ietf.org<mailto:spring@ietf.org>
https://www.ietf.org/mailman/listinfo/spring


___________________________________________________________________________

This e-mail message is intended for the recipient only and contains information which is
CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have received this
transmission in error, please inform us by e-mail, phone or fax, and then delete the original
and all copies thereof.
___________________________________________________________________________


___________________________________________________________________________

This e-mail message is intended for the recipient only and contains information which is
CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have received this
transmission in error, please inform us by e-mail, phone or fax, and then delete the original
and all copies thereof.
___________________________________________________________________________


___________________________________________________________________________

This e-mail message is intended for the recipient only and contains information which is
CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have received this
transmission in error, please inform us by e-mail, phone or fax, and then delete the original
and all copies thereof.
___________________________________________________________________________
_______________________________________________ spring mailing list spring@ietf.org<mailto:spring@ietf.org> https://www.ietf.org/mailman/listinfo/spring

___________________________________________________________________________

This e-mail message is intended for the recipient only and contains information which is 
CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have received this 
transmission in error, please inform us by e-mail, phone or fax, and then delete the original 
and all copies thereof.
___________________________________________________________________________