Re: [Teas-ns-dt] Notes for today's NS-DT meeting

Greg Mirsky <gregimirsky@gmail.com> Wed, 19 February 2020 04:52 UTC

Return-Path: <gregimirsky@gmail.com>
X-Original-To: teas-ns-dt@ietfa.amsl.com
Delivered-To: teas-ns-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D35BA12089B for <teas-ns-dt@ietfa.amsl.com>; Tue, 18 Feb 2020 20:52:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gPEO0BW0HjL3 for <teas-ns-dt@ietfa.amsl.com>; Tue, 18 Feb 2020 20:52:39 -0800 (PST)
Received: from mail-lf1-x12c.google.com (mail-lf1-x12c.google.com [IPv6:2a00:1450:4864:20::12c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BB4DD1200A1 for <teas-ns-dt@ietf.org>; Tue, 18 Feb 2020 20:52:38 -0800 (PST)
Received: by mail-lf1-x12c.google.com with SMTP id z26so16248855lfg.13 for <teas-ns-dt@ietf.org>; Tue, 18 Feb 2020 20:52:38 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=yKdfyFJFpCJLI5M03T28VIScnGI/OiXBejlAL9aDp6A=; b=mMikZinJRILCbU3d+keyQTzRSF1Wt9nn6DHGJB7ZGTYMsElviso53nzzcVOBWqMLq4 0oO9gt761Ej2DdnMm5mhlguM2Ub5lpCfanM6zjBxm7qEK2Tnb/GuSgT2LtftN7IO7wiL AJKqAVSrOV016Dq0Mrl2HQHIRdce2L7tc/TPt8haIljmG3fLpHDU62Bl2jTPaU8+tdgv Bw2Y1u092IVFB9L+3EkXQ6Z+Ce2ba1QUiF019m/WqPQJnadOf9hh3MeRFG1uphLdTAQv mlpk33bt1XqIaZv9KM2+iURD4Yk9fZ/QvHKVkbs1OyGyNqGLcOW6lptzanR9OT06gxy7 uwbQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=yKdfyFJFpCJLI5M03T28VIScnGI/OiXBejlAL9aDp6A=; b=P3ps+tLo0TZGHOncOBVhM58ofEbus3/hG0BUgBm1rorfNDmBPGHjur4kjCL5SvKfX/ XhHodMd0cS/pCkHFmBwEys6LRAod4MBq38byOK5eFE8y4JyOUfYParJawAUGbB7WwKzu rDQU2L2nbfujOYXgkGsf+cWbI5PIQ+d2EpVrQi/tO9dmLqfmtSsFrUD7otc5x+CeChI1 z3fWg3G1pZXTRmu2xpZhxEdeJGGUBjQaXGFYTzWd04TxjJ+rFJ3qdx+iKT+AY5tZJEHj mzB+rVBmnsk7U13Em9zDSEuWwd2VwlgDLBqeTLim0JGZg3o6cvcFWg0ZuUF7IVq7qxg0 LAJg==
X-Gm-Message-State: APjAAAXe/EergV0NH1dtL5zGjxXdDWJnGDqxSyGnRCcGi/W8/u1mINXt WukVvp9zB/p9qQtFCFZr0754fkbBssn4abtiCdg=
X-Google-Smtp-Source: APXvYqxqct5nZxEzcz6SCztf8WYSDvUiU5p05rm7GRXY04G+uaqkXfRp9fAGHmhEclq86NHlk+A1q1jc6xcOrbL5CEA=
X-Received: by 2002:a05:6512:15d:: with SMTP id m29mr672468lfo.158.1582087956937; Tue, 18 Feb 2020 20:52:36 -0800 (PST)
MIME-Version: 1.0
References: <CA+RyBmXnp+2ie8CqkWpkAVuujNo9qjMBr9Re0xFF8v1jkD=UwA@mail.gmail.com> <DAD32DB4-3F7A-460C-ACC0-AC3E3D10963F@gmail.com>
In-Reply-To: <DAD32DB4-3F7A-460C-ACC0-AC3E3D10963F@gmail.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Tue, 18 Feb 2020 20:52:25 -0800
Message-ID: <CA+RyBmUxiEQc86pJ_dOipL_PUyXUk4pcqrw2agdemU+Wzuuo+g@mail.gmail.com>
To: Jeff Tantsura <jefftant.ietf@gmail.com>
Cc: John E Drake <jdrake=40juniper.net@dmarc.ietf.org>, Eric Gray <eric.gray=40ericsson.com@dmarc.ietf.org>, "teas-ns-dt@ietf.org" <teas-ns-dt@ietf.org>, Jari Arkko <jari.arkko@ericsson.com>
Content-Type: multipart/alternative; boundary="000000000000ad3e7d059ee68e76"
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas-ns-dt/9vKDQXl0qOkvb_5o1n4ZnprsGAs>
Subject: Re: [Teas-ns-dt] Notes for today's NS-DT meeting
X-BeenThere: teas-ns-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TEAS Network Slicing Design Team <teas-ns-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas-ns-dt/>
List-Post: <mailto:teas-ns-dt@ietf.org>
List-Help: <mailto:teas-ns-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Feb 2020 04:52:44 -0000

H Jeff,
could you please clarify what is included in "enforcement"? Obviously,
protection depends on the failure detection mechanism. Also, a mechanism to
select working and protecting paths (could be centralized or distributed)
based on the configuration of the protection domain. Then, a protocol to
coordinate a switchover at the endpoints is necessary. Is that what is
included in the enforcement of protection?

Regards,
Greg

On Tue, Feb 18, 2020 at 8:32 PM Jeff Tantsura <jefftant.ietf@gmail.com>
wrote:

> Greg,
>
> In RSVT-TE case the protecting path is indeed pre-signaled and
> instantiated in forwarding however enforcement is often done by other means
> (reservation is soft).
> In SR-TE case behavior is defined hop-by-hop (SID->action mappings are
> local), enforcement is always done by other means.
>
> Regards,
> Jeff
>
> On Feb 18, 2020, at 20:01, Greg Mirsky <gregimirsky@gmail.com> wrote:
>
> 
> Hi Jeff,
> thank you for the clarification it helped a lot. I think that in IP/MPLS,
> i.e. without the ability to signal an explicit path, e2e protection cannot
> be realized but only local protection can be. I'd note that any protection
> scheme, 1+1 or 1:n, is based on pre-computed and instantiated in the data
> plane paths. Hence is the difference between protection and restoration,
> which is based on the control plane and its convergence.
>
> Regards,
> Greg
>
> On Tue, Feb 18, 2020 at 6:29 PM Jeff Tantsura <jefftant.ietf@gmail.com>
> wrote:
>
>> Hi Greg,
>>
>> My point was specifically to replication, the definitions are fine,
>> however “dedicated” is perhaps applicable to optical networking but not
>> to IP/MPLS.
>>
>> Cheers,
>> Jeff
>> On Feb 18, 2020, 5:05 PM -0800, Greg Mirsky <gregimirsky@gmail.com>,
>> wrote:
>>
>> Hi Jeff,
>> I do agree with Eric's characterization of 1+1, m:n, and 1:n (1:1 being
>> the special case of the former). G.808.1 (attached) gives a good overview
>> of protection architectures and I think that we can use that as the
>> foundation and the dictionary when talking about protection in the network
>> slicing. For example, section 7.1 explains 1+1 protection as follows:
>>
>> In the 1+1 architecture type, a protection transport entity is dedicated
>> as a backup facility to the
>> working transport entity with the normal traffic signal bridged onto the
>> protection transport entity at
>> the source endpoint of the protected domain. The normal traffic on
>> working and protection transport
>> entities is transmitted simultaneously to the sink endpoint of the
>> protected domain where a selection
>> between the working and protection transport entity is made,
>>
>> The next section explains the architecture of 1:n protection scheme:
>>
>> In the 1:n architecture type, a dedicated protection transport entity is
>> a shared backup facility for n
>> working transport entities. The bandwidth of the protection transport
>> entity should be allocated in
>> such a way that it may be possible to protect any of the n working
>> transport entities in case the
>> protection transport entity is available.
>>
>> One of the differences between 1+1 and 1:n/1:1 is that in the latter the
>> protection path may be used to carry extra traffic given that it will be
>> affected when the working path fails or deemed degraded below a
>> pre-determined level.
>> On the second point, regarding differences in the protection and
>> switchover of unidirectional vs. bi-directional line, I believe that it is
>> better to address the bi-directional (viewed as a single object) and
>> consider the unidirectional protection as the special case of the former.
>>
>> On Tue, Feb 18, 2020 at 1:08 PM Jeff Tantsura <jefftant.ietf@gmail.com>
>> wrote:
>>
>>> Eric,
>>>
>>> I disagree with you, also reference to DetNet is not applicable here,
>>> they replicate because they follow TSN logic.
>>> In general 1+1 (1:1) protection means that the secondary (protecting)
>>> path available is equal in its characteristics to the primary, whether they
>>> share fate is an additional property and could have many different
>>> semantics (from shared line-card to shared fiber duct).
>>> It is very uncommon to send traffic on both, protected and protecting
>>> paths, often protecting path carries other traffic that would be pushed out
>>> based on priorities.
>>> As a separate note - we need to discuss unidirectional vs bidirectional
>>> protection,  since they have different times to repair, in bidirectional
>>> case as long as return path has not been recovered forward path is
>>> considered down.
>>>
>>> Cheers,
>>> Jeff
>>> On Feb 17, 2020, 12:29 PM -0800, Eric Gray <eric.gray=
>>> 40ericsson.com@dmarc.ietf.org>, wrote:
>>>
>>> John,
>>>
>>>
>>>
>>>               With 1+1 protection, the sender sends traffic on both the
>>> working and protection path, so quite often – while there is a “switchover
>>> time” – it is basically a “name-changing” event (the protection path
>>> becomes the working path, but nothing else changes without operator
>>> intervention) and it is quite often the case that no traffic is impacted.
>>> In other words, the switchover time is irrelevant, as long as it is not so
>>> long that a second failure may occur before the switchover is reported to
>>> the operator.
>>>
>>>
>>>
>>>               Note that the technology being defined in DetNet, uses
>>> packet replication and elimination, which is analogous to 1+1 protection in
>>> that sense.  In addition, 1+1 protection is defined for label switching as
>>> well.  In fact, 1+1 protection can be applied in any technology that allows
>>> for establishing diverse alternative paths.
>>>
>>>
>>>
>>>               Hence, a choice to use packet-switching should be
>>> orthogonal to a choice to use 1+1 protection.  And none of these choices
>>> has very much to do with “isolation.”
>>>
>>>
>>>
>>>               What you are probably referring to is a distinction
>>> between either 1+1 or 1:1, and 1:N or M:N protection – primarily because
>>> there is no dedicated protection path in either of the latter two cases.
>>> Either there is 1 protection path for N working paths, or there are M
>>> protection paths for N working paths (where M is assumed to be less than N)
>>> in those cases, so a switchover may be non-trivial and (possibly)
>>> performance impacting.
>>>
>>>
>>>
>>>               For example, not having a dedicated alternative path in
>>> the 1:N case means that – if two working path connections fail both will
>>> see performance degradation.  Similarly, for the M:N case, if M+1 out of
>>> the N working paths fail, the users for at least two of the failed paths
>>> will see some performance loss.
>>>
>>>
>>>
>>>               But I fail to see how any of these are inherently cases
>>> involving “isolation.”
>>>
>>>
>>>
>>>               One thing I have heard of is using the term “protection
>>> isolation” to mean isolation of alternative paths, ensuring that a single
>>> failure does not take more than one working or protection path down.  But
>>> this is (possibly) more commonly referred to as “shared risk avoidance.”
>>>
>>>
>>>
>>> --
>>>
>>> Eric
>>>
>>>
>>>
>>> *From:* John E Drake <jdrake=40juniper.net@dmarc.ietf.org>
>>> *Sent:* Monday, February 10, 2020 12:25 PM
>>> *To:* Eric Gray <eric.gray@ericsson.com>
>>> *Cc:* teas-ns-dt@ietf.org; Jari Arkko <jari.arkko@ericsson.com>
>>> *Subject:* Re: [Teas-ns-dt] Notes for today's NS-DT meeting
>>> *Importance:* High
>>>
>>>
>>>
>>> Hi,
>>>
>>>
>>>
>>> Wrt protection isolation, if you have dedicated 1+1 protection you still
>>> have the switchover time, so this is the minimum service interruption with
>>> hard isolation.  If you have packet switching (soft isolation) there are a
>>> range of technologies that provide a range of service disruption times.
>>>
>>>
>>>
>>> Sent from my iPhone
>>>
>>>
>>>
>>> On Feb 10, 2020, at 12:15 PM, Eric Gray <
>>> eric.gray=40ericsson.com@dmarc.ietf.org> wrote:
>>>
>>> 
>>>
>>> Are available at: https://etherpad.ietf.org/p/ns-dt-notes-feb10
>>> <https://protect2.fireeye.com/v1/url?k=4896fa91-141f5558-4896ba0a-0cc47ad93e1c-a95572c8cb9519ed&q=1&e=138ed022-c29c-4668-bda7-71975eb05cd5&u=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fetherpad.ietf.org%2Fp%2Fns-dt-notes-feb10__%3B%21%21NEt6yMaO-gk%21R9MKmiaYXBuhuTZBYpZvNsiVYjnzH2xbzR2wZ5WPPMspWRsv7tVCr1efC9sXFr8%24>
>>> .
>>>
>>>
>>>
>>> Please review these notes and either add to them anything we discussed
>>> at the meeting, or send comments to me.
>>>
>>>
>>>
>>> Jari, later this week, could you push these to the GitHub repository at:
>>> https://github.com/teas-wg/teas-ns-dt/tree/master/notes
>>> <https://protect2.fireeye.com/v1/url?k=060f429c-5a86ed55-060f0207-0cc47ad93e1c-2d4397becaf63c66&q=1&e=138ed022-c29c-4668-bda7-71975eb05cd5&u=https%3A%2F%2Fgithub.com%2Fteas-wg%2Fteas-ns-dt%2Ftree%2Fmaster%2Fnotes>
>>> (in md format, I guess)?
>>>
>>>
>>>
>>> --
>>>
>>> Eric
>>>
>>> --
>>> Teas-ns-dt mailing list
>>> Teas-ns-dt@ietf.org
>>>
>>> https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/teas-ns-dt__;!!NEt6yMaO-gk!R9MKmiaYXBuhuTZBYpZvNsiVYjnzH2xbzR2wZ5WPPMspWRsv7tVCr1efVwcxTqI$
>>> <https://protect2.fireeye.com/v1/url?k=e6e8e9e1-ba614628-e6e8a97a-0cc47ad93e1c-b7c1747faaad98e8&q=1&e=138ed022-c29c-4668-bda7-71975eb05cd5&u=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fteas-ns-dt__%3B%21%21NEt6yMaO-gk%21R9MKmiaYXBuhuTZBYpZvNsiVYjnzH2xbzR2wZ5WPPMspWRsv7tVCr1efVwcxTqI%24>
>>>
>>> --
>>> Teas-ns-dt mailing list
>>> Teas-ns-dt@ietf.org
>>> https://www.ietf.org/mailman/listinfo/teas-ns-dt
>>>
>>> --
>>> Teas-ns-dt mailing list
>>> Teas-ns-dt@ietf.org
>>> https://www.ietf.org/mailman/listinfo/teas-ns-dt
>>>
>>