Re: [Teas-ns-dt] Notes for today's NS-DT meeting

Jeff Tantsura <jefftant.ietf@gmail.com> Wed, 19 February 2020 04:32 UTC

Return-Path: <jefftant.ietf@gmail.com>
X-Original-To: teas-ns-dt@ietfa.amsl.com
Delivered-To: teas-ns-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3893E1208AB for <teas-ns-dt@ietfa.amsl.com>; Tue, 18 Feb 2020 20:32:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8KDWQosaqmD5 for <teas-ns-dt@ietfa.amsl.com>; Tue, 18 Feb 2020 20:32:37 -0800 (PST)
Received: from mail-pl1-x632.google.com (mail-pl1-x632.google.com [IPv6:2607:f8b0:4864:20::632]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CA215120823 for <teas-ns-dt@ietf.org>; Tue, 18 Feb 2020 20:32:37 -0800 (PST)
Received: by mail-pl1-x632.google.com with SMTP id y8so8996308pll.13 for <teas-ns-dt@ietf.org>; Tue, 18 Feb 2020 20:32:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=content-transfer-encoding:from:mime-version:subject:date:message-id :references:cc:in-reply-to:to; bh=AaoYcQ0cqr7Fj/Hh71p9UyO3Byc090504x5DAgJUIKA=; b=LgssBamNrN6VQAvp+ncD4Oyh9xqWpvwymrPkEkUZxxx0IIJ66A7qyBfGM9V1sTIU8Q CGZzaEauiP+ISrcmWS1asKlALa0rvxzAv0U9iFL9eQAh7k//nEl3840ML9Vw6wAm0joX 0T9frQfWvMA1Oijvik1H58LcmEa3piFTiIUgmy3i53Q9smNzlZxOZXQPWqvt3A9Sj3zm F6OXavDJcBEq9FNzMwGqSsuJqfi8vNSr3n0pZL2M0JmPOkcObj/7s7e4Hitc5tpWDntG ebIEYHdTaGAX6SEZdjHHXk/ERhpWjHKGp3b20C4W479vHJkYOjtSt2vhC8XQiuENbdBw mcTQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:content-transfer-encoding:from:mime-version :subject:date:message-id:references:cc:in-reply-to:to; bh=AaoYcQ0cqr7Fj/Hh71p9UyO3Byc090504x5DAgJUIKA=; b=PoINgpBjkJ6Ntu1HaLI/sIW8pRv4I3JU3IwgxSxGrHTSQJOAAVKeEfT7fzWR9W2SEo oWfk/AgE4cA1vJ2lFIbgoK69+MHbd1ZjFAajWufZHNaMHxZI1B5S5BX87HAd2aLvLncu vAD/Dtc9RxPWbRPacYdlK4QHf4ve7zaI+/iPb+Fp72SYpG7apXhStssBzNpiMni+Zw23 51Z0EctYugMbtq6bHPN+5OJWFN92MaBV3egHcMgoHCb7uh9nkVM77CU4tH7HsWR//amO 23ghlqi42sxpVCXznt90bEBeobzIblvjxVv6RrQzw/yrQqQFfCpSIr8nsTYLlpOVyDOF ZR0A==
X-Gm-Message-State: APjAAAV8LXveccpBepuTsEh8Xy2s2R6tGZyzqIeOHTCKOLGkXpL1OkHJ B34lSDVheXil21JB6BDUFVE=
X-Google-Smtp-Source: APXvYqypw7Uf7lAJeFAYgV3G5QmYm17mHRZq51h1BEvk1+IDT5sid7Brpss7tGyYdPoReFbrg1FNTQ==
X-Received: by 2002:a17:90a:c697:: with SMTP id n23mr6559068pjt.37.1582086756668; Tue, 18 Feb 2020 20:32:36 -0800 (PST)
Received: from [192.168.1.19] (c-73-63-232-212.hsd1.ca.comcast.net. [73.63.232.212]) by smtp.gmail.com with ESMTPSA id l64sm543649pga.19.2020.02.18.20.32.34 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 18 Feb 2020 20:32:34 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail-F0828583-41FC-498B-9A4D-0404D2D1AEBC"
Content-Transfer-Encoding: 7bit
From: Jeff Tantsura <jefftant.ietf@gmail.com>
Mime-Version: 1.0 (1.0)
Date: Tue, 18 Feb 2020 20:32:33 -0800
Message-Id: <DAD32DB4-3F7A-460C-ACC0-AC3E3D10963F@gmail.com>
References: <CA+RyBmXnp+2ie8CqkWpkAVuujNo9qjMBr9Re0xFF8v1jkD=UwA@mail.gmail.com>
Cc: John E Drake <jdrake=40juniper.net@dmarc.ietf.org>, Eric Gray <eric.gray=40ericsson.com@dmarc.ietf.org>, "teas-ns-dt@ietf.org" <teas-ns-dt@ietf.org>, Jari Arkko <jari.arkko@ericsson.com>
In-Reply-To: <CA+RyBmXnp+2ie8CqkWpkAVuujNo9qjMBr9Re0xFF8v1jkD=UwA@mail.gmail.com>
To: Greg Mirsky <gregimirsky@gmail.com>
X-Mailer: iPhone Mail (17D50)
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas-ns-dt/C24h_jevof_oRk_AExnRP_klLVs>
Subject: Re: [Teas-ns-dt] Notes for today's NS-DT meeting
X-BeenThere: teas-ns-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TEAS Network Slicing Design Team <teas-ns-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas-ns-dt/>
List-Post: <mailto:teas-ns-dt@ietf.org>
List-Help: <mailto:teas-ns-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Feb 2020 04:32:42 -0000

Greg,

In RSVT-TE case the protecting path is indeed pre-signaled and instantiated in forwarding however enforcement is often done by other means (reservation is soft).
In SR-TE case behavior is defined hop-by-hop (SID->action mappings are local), enforcement is always done by other means.

Regards,
Jeff

> On Feb 18, 2020, at 20:01, Greg Mirsky <gregimirsky@gmail.com> wrote:
> 
> 
> Hi Jeff,
> thank you for the clarification it helped a lot. I think that in IP/MPLS, i.e. without the ability to signal an explicit path, e2e protection cannot be realized but only local protection can be. I'd note that any protection scheme, 1+1 or 1:n, is based on pre-computed and instantiated in the data plane paths. Hence is the difference between protection and restoration, which is based on the control plane and its convergence.
> 
> Regards,
> Greg
> 
>> On Tue, Feb 18, 2020 at 6:29 PM Jeff Tantsura <jefftant.ietf@gmail.com> wrote:
>> Hi Greg,
>> 
>> My point was specifically to replication, the definitions are fine, however “dedicated” is perhaps applicable to optical networking but not to IP/MPLS.
>> 
>> Cheers,
>> Jeff
>>> On Feb 18, 2020, 5:05 PM -0800, Greg Mirsky <gregimirsky@gmail.com>, wrote:
>>> Hi Jeff,
>>> I do agree with Eric's characterization of 1+1, m:n, and 1:n (1:1 being the special case of the former). G.808.1 (attached) gives a good overview of protection architectures and I think that we can use that as the foundation and the dictionary when talking about protection in the network slicing. For example, section 7.1 explains 1+1 protection as follows:
>>> In the 1+1 architecture type, a protection transport entity is dedicated as a backup facility to the
>>> working transport entity with the normal traffic signal bridged onto the protection transport entity at
>>> the source endpoint of the protected domain. The normal traffic on working and protection transport
>>> entities is transmitted simultaneously to the sink endpoint of the protected domain where a selection
>>> between the working and protection transport entity is made,
>>> The next section explains the architecture of 1:n protection scheme:
>>> In the 1:n architecture type, a dedicated protection transport entity is a shared backup facility for n
>>> working transport entities. The bandwidth of the protection transport entity should be allocated in
>>> such a way that it may be possible to protect any of the n working transport entities in case the
>>> protection transport entity is available.
>>> One of the differences between 1+1 and 1:n/1:1 is that in the latter the protection path may be used to carry extra traffic given that it will be affected when the working path fails or deemed degraded below a pre-determined level.
>>> On the second point, regarding differences in the protection and switchover of unidirectional vs. bi-directional line, I believe that it is better to address the bi-directional (viewed as a single object) and consider the unidirectional protection as the special case of the former.
>>> 
>>>> On Tue, Feb 18, 2020 at 1:08 PM Jeff Tantsura <jefftant.ietf@gmail.com> wrote:
>>>> Eric,
>>>> 
>>>> I disagree with you, also reference to DetNet is not applicable here, they replicate because they follow TSN logic.
>>>> In general 1+1 (1:1) protection means that the secondary (protecting) path available is equal in its characteristics to the primary, whether they share fate is an additional property and could have many different semantics (from shared line-card to shared fiber duct).
>>>> It is very uncommon to send traffic on both, protected and protecting paths, often protecting path carries other traffic that would be pushed out based on priorities.
>>>> As a separate note - we need to discuss unidirectional vs bidirectional protection,  since they have different times to repair, in bidirectional case as long as return path has not been recovered forward path is considered down. 
>>>> 
>>>> Cheers,
>>>> Jeff
>>>>> On Feb 17, 2020, 12:29 PM -0800, Eric Gray <eric.gray=40ericsson.com@dmarc.ietf.org>, wrote:
>>>>> John,
>>>>> 
>>>>>  
>>>>> 
>>>>>               With 1+1 protection, the sender sends traffic on both the working and protection path, so quite often – while there is a “switchover time” – it is basically a “name-changing” event (the protection path becomes the working path, but nothing else changes without operator intervention) and it is quite often the case that no traffic is impacted.  In other words, the switchover time is irrelevant, as long as it is not so long that a second failure may occur before the switchover is reported to the operator.
>>>>> 
>>>>>  
>>>>> 
>>>>>               Note that the technology being defined in DetNet, uses packet replication and elimination, which is analogous to 1+1 protection in that sense.  In addition, 1+1 protection is defined for label switching as well.  In fact, 1+1 protection can be applied in any technology that allows for establishing diverse alternative paths.
>>>>> 
>>>>>  
>>>>> 
>>>>>               Hence, a choice to use packet-switching should be orthogonal to a choice to use 1+1 protection.  And none of these choices has very much to do with “isolation.”
>>>>> 
>>>>>  
>>>>> 
>>>>>               What you are probably referring to is a distinction between either 1+1 or 1:1, and 1:N or M:N protection – primarily because there is no dedicated protection path in either of the latter two cases.  Either there is 1 protection path for N working paths, or there are M protection paths for N working paths (where M is assumed to be less than N) in those cases, so a switchover may be non-trivial and (possibly) performance impacting.
>>>>> 
>>>>>  
>>>>> 
>>>>>               For example, not having a dedicated alternative path in the 1:N case means that – if two working path connections fail both will see performance degradation.  Similarly, for the M:N case, if M+1 out of the N working paths fail, the users for at least two of the failed paths will see some performance loss.
>>>>> 
>>>>>  
>>>>> 
>>>>>               But I fail to see how any of these are inherently cases involving “isolation.” 
>>>>> 
>>>>>  
>>>>> 
>>>>>               One thing I have heard of is using the term “protection isolation” to mean isolation of alternative paths, ensuring that a single failure does not take more than one working or protection path down.  But this is (possibly) more commonly referred to as “shared risk avoidance.”
>>>>> 
>>>>>  
>>>>> 
>>>>> --
>>>>> 
>>>>> Eric
>>>>> 
>>>>>  
>>>>> 
>>>>> From: John E Drake <jdrake=40juniper.net@dmarc.ietf.org>
>>>>> Sent: Monday, February 10, 2020 12:25 PM
>>>>> To: Eric Gray <eric.gray@ericsson.com>
>>>>> Cc: teas-ns-dt@ietf.org; Jari Arkko <jari.arkko@ericsson.com>
>>>>> Subject: Re: [Teas-ns-dt] Notes for today's NS-DT meeting
>>>>> Importance: High
>>>>> 
>>>>>  
>>>>> 
>>>>> Hi,
>>>>> 
>>>>>  
>>>>> 
>>>>> Wrt protection isolation, if you have dedicated 1+1 protection you still have the switchover time, so this is the minimum service interruption with hard isolation.  If you have packet switching (soft isolation) there are a range of technologies that provide a range of service disruption times.
>>>>> 
>>>>>  
>>>>> 
>>>>> Sent from my iPhone
>>>>> 
>>>>> 
>>>>> 
>>>>> 
>>>>> On Feb 10, 2020, at 12:15 PM, Eric Gray <eric.gray=40ericsson.com@dmarc.ietf.org> wrote:
>>>>> 
>>>>> 
>>>>> 
>>>>> Are available at: https://etherpad.ietf.org/p/ns-dt-notes-feb10.
>>>>> 
>>>>>  
>>>>> 
>>>>> Please review these notes and either add to them anything we discussed at the meeting, or send comments to me.
>>>>> 
>>>>>  
>>>>> 
>>>>> Jari, later this week, could you push these to the GitHub repository at: https://github.com/teas-wg/teas-ns-dt/tree/master/notes (in md format, I guess)?
>>>>> 
>>>>>  
>>>>> 
>>>>> --
>>>>> 
>>>>> Eric
>>>>> 
>>>>> --
>>>>> Teas-ns-dt mailing list
>>>>> Teas-ns-dt@ietf.org
>>>>> https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/teas-ns-dt__;!!NEt6yMaO-gk!R9MKmiaYXBuhuTZBYpZvNsiVYjnzH2xbzR2wZ5WPPMspWRsv7tVCr1efVwcxTqI$
>>>>> 
>>>>> --
>>>>> Teas-ns-dt mailing list
>>>>> Teas-ns-dt@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/teas-ns-dt
>>>> --
>>>> Teas-ns-dt mailing list
>>>> Teas-ns-dt@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/teas-ns-dt