Re: [Teas-ns-dt] Notes for today's NS-DT meeting

Jeff Tantsura <jefftant.ietf@gmail.com> Wed, 19 February 2020 02:29 UTC

Return-Path: <jefftant.ietf@gmail.com>
X-Original-To: teas-ns-dt@ietfa.amsl.com
Delivered-To: teas-ns-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 58D0912088A for <teas-ns-dt@ietfa.amsl.com>; Tue, 18 Feb 2020 18:29:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.888
X-Spam-Level:
X-Spam-Status: No, score=-1.888 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C3U1ht1PWmMN for <teas-ns-dt@ietfa.amsl.com>; Tue, 18 Feb 2020 18:29:46 -0800 (PST)
Received: from mail-pj1-x1035.google.com (mail-pj1-x1035.google.com [IPv6:2607:f8b0:4864:20::1035]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EBC1E120811 for <teas-ns-dt@ietf.org>; Tue, 18 Feb 2020 18:29:45 -0800 (PST)
Received: by mail-pj1-x1035.google.com with SMTP id m7so1203057pjs.0 for <teas-ns-dt@ietf.org>; Tue, 18 Feb 2020 18:29:45 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:message-id:in-reply-to:references:subject :mime-version; bh=GQCzh/+GhNnxWEXR4hW2w6Z0NuWQrKY0182EqUFTruQ=; b=sato/NVxyCmoeXfQprlQSzNy0O/TVtXnIaXsvVdFtz/tOG+XZQgBM5oqFQem/hwH9/ SNe/QOV1i2ua0fSw5/EN+h3ao/HgdaLkoBuId5ITc2yrxHaXyjMhG28f2ZfOw2TlHcG7 rJIwmmMzkuXr8wQgY2IeE4N7QGiQ1d9GeSz7gvKfASa3Xeh0G3lYgMWpJ4Ujc6IZ4Cgh NNcCmMMGmvjnW/tU0pjJtBp+fbiNbPt9tqjh5B56QUInwJch95IjJHk2oCO9PDPIZ4Lm cdNw2SWOYeQp+OJ+BUjcaO6TgWvRgDYIx3ISzvy+JL43dBDujB/g/JzLfrWXsk2E4stP mLAA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:message-id:in-reply-to :references:subject:mime-version; bh=GQCzh/+GhNnxWEXR4hW2w6Z0NuWQrKY0182EqUFTruQ=; b=ig7WIWAAIVOKoRxVDTdQJUgzoHmdIpAN3k5vfgGk6nCGnCQS3eiUgEc1stxCaSSKzr i20YiG/wqL6eKhbYocNuF7fQ0Ub56tcL070vEpSwZlSfbptrxPSFQ5uB9gVEhL8Y1jaz WmgC0WU3hcb8/vEK6JqUxDLCqzdNi1Z5ZkgNGXVm4iHgY6bvw5vvgJR0Aqh9GsH95pLp mVZhoVgEmboGGTfM3qQIZ0XRJCXhz+bydwB5XUWBDjb7pSfaVpdCZbQ1/swVoHujTXc9 iKt1V3lonCT5EPDiLK2cf6239X3qomzSBty5l1OnHenyKl5ZGwAtllS2P1Jh9x5Gjx/A ZzGg==
X-Gm-Message-State: APjAAAX64lIw+hXcdqCkEIpnnh+vRpJNQPAzznLCc3ip9cqJ627LWWp9 SXEk6efu0A5n+0eHlM/sP1Y=
X-Google-Smtp-Source: APXvYqwL0veYcFZLCfPIOVN1aY6oygiU1Ax2ms1iDmSC+Wqmyb3UGZcGz2AWQiLYsVZ4jUspS2q0Cw==
X-Received: by 2002:a17:90a:e996:: with SMTP id v22mr6454446pjy.53.1582079385277; Tue, 18 Feb 2020 18:29:45 -0800 (PST)
Received: from [10.5.5.194] ([50.235.77.202]) by smtp.gmail.com with ESMTPSA id iq22sm269501pjb.9.2020.02.18.18.29.43 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 18 Feb 2020 18:29:44 -0800 (PST)
Date: Tue, 18 Feb 2020 18:29:31 -0800
From: Jeff Tantsura <jefftant.ietf@gmail.com>
To: Greg Mirsky <gregimirsky@gmail.com>
Cc: John E Drake <jdrake=40juniper.net@dmarc.ietf.org>, Eric Gray <eric.gray=40ericsson.com@dmarc.ietf.org>, "teas-ns-dt@ietf.org" <teas-ns-dt@ietf.org>, Jari Arkko <jari.arkko@ericsson.com>
Message-ID: <7a812640-e74f-4966-aba7-c7fe1927d849@Spark>
In-Reply-To: <CA+RyBmWSaea8NL2eTEzgJuF8M7S1zJftKcecX=Xd4jd+3fpzsw@mail.gmail.com>
References: <BN8PR15MB26446636F22E9B945759C1B997190@BN8PR15MB2644.namprd15.prod.outlook.com> <945050C2-11DF-4A15-B625-06047D47C791@juniper.net> <BN8PR15MB264494023BBDA4582DD47A9497160@BN8PR15MB2644.namprd15.prod.outlook.com> <694d4c28-07e8-4f9b-8f77-ad6b55434617@Spark> <CA+RyBmWSaea8NL2eTEzgJuF8M7S1zJftKcecX=Xd4jd+3fpzsw@mail.gmail.com>
X-Readdle-Message-ID: 7a812640-e74f-4966-aba7-c7fe1927d849@Spark
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="5e4c9d95_582340f8_496"
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas-ns-dt/0r8e_-LDs8WTySrkGFPmKFTmjwc>
Subject: Re: [Teas-ns-dt] Notes for today's NS-DT meeting
X-BeenThere: teas-ns-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TEAS Network Slicing Design Team <teas-ns-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas-ns-dt/>
List-Post: <mailto:teas-ns-dt@ietf.org>
List-Help: <mailto:teas-ns-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Feb 2020 02:29:49 -0000

Hi Greg,

My point was specifically to replication, the definitions are fine, however “dedicated” is perhaps applicable to optical networking but not to IP/MPLS.

Cheers,
Jeff
On Feb 18, 2020, 5:05 PM -0800, Greg Mirsky <gregimirsky@gmail.com>, wrote:
> Hi Jeff,
> I do agree with Eric's characterization of 1+1, m:n, and 1:n (1:1 being the special case of the former). G.808.1 (attached) gives a good overview of protection architectures and I think that we can use that as the foundation and the dictionary when talking about protection in the network slicing. For example, section 7.1 explains 1+1 protection as follows:
> > In the 1+1 architecture type, a protection transport entity is dedicated as a backup facility to the
> > working transport entity with the normal traffic signal bridged onto the protection transport entity at
> > the source endpoint of the protected domain. The normal traffic on working and protection transport
> > entities is transmitted simultaneously to the sink endpoint of the protected domain where a selection
> > between the working and protection transport entity is made,
> The next section explains the architecture of 1:n protection scheme:
> > In the 1:n architecture type, a dedicated protection transport entity is a shared backup facility for n
> > working transport entities. The bandwidth of the protection transport entity should be allocated in
> > such a way that it may be possible to protect any of the n working transport entities in case the
> > protection transport entity is available.
> One of the differences between 1+1 and 1:n/1:1 is that in the latter the protection path may be used to carry extra traffic given that it will be affected when the working path fails or deemed degraded below a pre-determined level.
> On the second point, regarding differences in the protection and switchover of unidirectional vs. bi-directional line, I believe that it is better to address the bi-directional (viewed as a single object) and consider the unidirectional protection as the special case of the former.
>
> > On Tue, Feb 18, 2020 at 1:08 PM Jeff Tantsura <jefftant.ietf@gmail.com> wrote:
> > > Eric,
> > >
> > > I disagree with you, also reference to DetNet is not applicable here, they replicate because they follow TSN logic.
> > > In general 1+1 (1:1) protection means that the secondary (protecting) path available is equal in its characteristics to the primary, whether they share fate is an additional property and could have many different semantics (from shared line-card to shared fiber duct).
> > > It is very uncommon to send traffic on both, protected and protecting paths, often protecting path carries other traffic that would be pushed out based on priorities.
> > > As a separate note - we need to discuss unidirectional vs bidirectional protection,  since they have different times to repair, in bidirectional case as long as return path has not been recovered forward path is considered down.
> > >
> > > Cheers,
> > > Jeff
> > > On Feb 17, 2020, 12:29 PM -0800, Eric Gray <eric.gray=40ericsson.com@dmarc.ietf.org>, wrote:
> > > > John,
> > > >
> > > >               With 1+1 protection, the sender sends traffic on both the working and protection path, so quite often – while there is a “switchover time” – it is basically a “name-changing” event (the protection path becomes the working path, but nothing else changes without operator intervention) and it is quite often the case that no traffic is impacted.  In other words, the switchover time is irrelevant, as long as it is not so long that a second failure may occur before the switchover is reported to the operator.
> > > >
> > > >               Note that the technology being defined in DetNet, uses packet replication and elimination, which is analogous to 1+1 protection in that sense.  In addition, 1+1 protection is defined for label switching as well.  In fact, 1+1 protection can be applied in any technology that allows for establishing diverse alternative paths.
> > > >
> > > >               Hence, a choice to use packet-switching should be orthogonal to a choice to use 1+1 protection.  And none of these choices has very much to do with “isolation.”
> > > >
> > > >               What you are probably referring to is a distinction between either 1+1 or 1:1, and 1:N or M:N protection – primarily because there is no dedicated protection path in either of the latter two cases.  Either there is 1 protection path for N working paths, or there are M protection paths for N working paths (where M is assumed to be less than N) in those cases, so a switchover may be non-trivial and (possibly) performance impacting.
> > > >
> > > >               For example, not having a dedicated alternative path in the 1:N case means that – if two working path connections fail both will see performance degradation.  Similarly, for the M:N case, if M+1 out of the N working paths fail, the users for at least two of the failed paths will see some performance loss.
> > > >
> > > >               But I fail to see how any of these are inherently cases involving “isolation.”
> > > >
> > > >               One thing I have heard of is using the term “protection isolation” to mean isolation of alternative paths, ensuring that a single failure does not take more than one working or protection path down.  But this is (possibly) more commonly referred to as “shared risk avoidance.”
> > > >
> > > > --
> > > > Eric
> > > >
> > > > From: John E Drake <jdrake=40juniper.net@dmarc.ietf.org>
> > > > Sent: Monday, February 10, 2020 12:25 PM
> > > > To: Eric Gray <eric.gray@ericsson.com>
> > > > Cc: teas-ns-dt@ietf.org; Jari Arkko <jari.arkko@ericsson.com>
> > > > Subject: Re: [Teas-ns-dt] Notes for today's NS-DT meeting
> > > > Importance: High
> > > >
> > > > Hi,
> > > >
> > > > Wrt protection isolation, if you have dedicated 1+1 protection you still have the switchover time, so this is the minimum service interruption with hard isolation.  If you have packet switching (soft isolation) there are a range of technologies that provide a range of service disruption times.
> > > >
> > > > Sent from my iPhone
> > > >
> > > >
> > > > > On Feb 10, 2020, at 12:15 PM, Eric Gray <eric.gray=40ericsson.com@dmarc.ietf.org> wrote:
> > > > > Are available at: https://etherpad.ietf.org/p/ns-dt-notes-feb10.
> > > > >
> > > > > Please review these notes and either add to them anything we discussed at the meeting, or send comments to me.
> > > > >
> > > > > Jari, later this week, could you push these to the GitHub repository at: https://github.com/teas-wg/teas-ns-dt/tree/master/notes (in md format, I guess)?
> > > > >
> > > > > --
> > > > > Eric
> > > > > --
> > > > > Teas-ns-dt mailing list
> > > > > Teas-ns-dt@ietf.org
> > > > > https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/teas-ns-dt__;!!NEt6yMaO-gk!R9MKmiaYXBuhuTZBYpZvNsiVYjnzH2xbzR2wZ5WPPMspWRsv7tVCr1efVwcxTqI$
> > > > --
> > > > Teas-ns-dt mailing list
> > > > Teas-ns-dt@ietf.org
> > > > https://www.ietf.org/mailman/listinfo/teas-ns-dt
> > > --
> > > Teas-ns-dt mailing list
> > > Teas-ns-dt@ietf.org
> > > https://www.ietf.org/mailman/listinfo/teas-ns-dt