Re: [Teas-ns-dt] Notes for today's NS-DT meeting

Greg Mirsky <gregimirsky@gmail.com> Wed, 19 February 2020 01:05 UTC

Return-Path: <gregimirsky@gmail.com>
X-Original-To: teas-ns-dt@ietfa.amsl.com
Delivered-To: teas-ns-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3B9912085A for <teas-ns-dt@ietfa.amsl.com>; Tue, 18 Feb 2020 17:05:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.888
X-Spam-Level:
X-Spam-Status: No, score=-1.888 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_FREEMAIL_DOC_PDF=0.01] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rzp6FMpdTxeu for <teas-ns-dt@ietfa.amsl.com>; Tue, 18 Feb 2020 17:05:43 -0800 (PST)
Received: from mail-lj1-x236.google.com (mail-lj1-x236.google.com [IPv6:2a00:1450:4864:20::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E7B18120856 for <teas-ns-dt@ietf.org>; Tue, 18 Feb 2020 17:05:41 -0800 (PST)
Received: by mail-lj1-x236.google.com with SMTP id y6so25200204lji.0 for <teas-ns-dt@ietf.org>; Tue, 18 Feb 2020 17:05:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=NhsYYXnMKyY9f76vAvRpJf93/s0wOAiUFRrBkxM3vMY=; b=eek0nKZ35LOdzL8glXH94hlL3sD0cOOGWxCsyMmGU09EO+0HWJ/+D7rVVDQZmJ9gDq duzVhvoKPKkyuqQYfEa20n7fNlDg0ilGa/VcVLUnFeGKOtOs7YPY5uyUMCzc45iqglDN Aozs9/k+cqIKzFCwYaGLHFy803pAVeOjrhNMMftoonTyxjh3Q8jfczlHvVa6D65N4Xrx ttWbJ68cRtt3bKu8xYo36FC+MKG0dh75pC7N0FZjZ2eo7OMICzeHzfrla+ta7s+QZ4uK 2S6TDmUae+xZ1WUrvZldsKMknqTjBbA4MLt45/UfkkeepgSGfIp4twlV0MzB5YCPmZGl vYyg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=NhsYYXnMKyY9f76vAvRpJf93/s0wOAiUFRrBkxM3vMY=; b=K1cY1EwDoYF29HuO4acUhqQSFzdj3a9ObfT/DvhTFdPIYsUoYskZcckAFVx01qvCfB aDbcCJj7+XTiKdOKH/YDbSALBYVvFR4LkZEcB24J2MdSOhLjXohXvGNYwZa0kP+PWd5O EjXw1jhvo5kZhvAISsA1MfKMsjtXqye01VZLhwQNwn3ZbFKsEw580MJehtNsNhPyapoI G07ih9+uxTm6qUh5a7U6h9zsZYeuazoSSwIMOJb2X0Z1dMojHiQ+/19FlRYl3a/MjFuB PVQaRxzBDnCaIuzOW3URFy0qP9vjsc7r9LWpbxZb1BQEDkfc/b6GIzqncine0Rz342Wc gMfA==
X-Gm-Message-State: APjAAAVyTWyol430xakDr0ggSJTawDVY2pVw4unVjXCjyRHuTTrwrwBK P/B3mxFPmtKWLvRFvM8a55MO4a8MrUB80nGIMjCHzw==
X-Google-Smtp-Source: APXvYqxxte0kEmuotatvHs5ucOMaadB7lZdg+WXwM+rLDDJA3gmeHQnDM2veoEVRouF04piJCUrAdroXC1XCxUXYnpE=
X-Received: by 2002:a2e:88c4:: with SMTP id a4mr14678728ljk.174.1582074338560; Tue, 18 Feb 2020 17:05:38 -0800 (PST)
MIME-Version: 1.0
References: <BN8PR15MB26446636F22E9B945759C1B997190@BN8PR15MB2644.namprd15.prod.outlook.com> <945050C2-11DF-4A15-B625-06047D47C791@juniper.net> <BN8PR15MB264494023BBDA4582DD47A9497160@BN8PR15MB2644.namprd15.prod.outlook.com> <694d4c28-07e8-4f9b-8f77-ad6b55434617@Spark>
In-Reply-To: <694d4c28-07e8-4f9b-8f77-ad6b55434617@Spark>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Tue, 18 Feb 2020 17:05:24 -0800
Message-ID: <CA+RyBmWSaea8NL2eTEzgJuF8M7S1zJftKcecX=Xd4jd+3fpzsw@mail.gmail.com>
To: Jeff Tantsura <jefftant.ietf@gmail.com>
Cc: John E Drake <jdrake=40juniper.net@dmarc.ietf.org>, Eric Gray <eric.gray=40ericsson.com@dmarc.ietf.org>, "teas-ns-dt@ietf.org" <teas-ns-dt@ietf.org>, Jari Arkko <jari.arkko@ericsson.com>
Content-Type: multipart/mixed; boundary="000000000000f5e9dc059ee362e4"
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas-ns-dt/bJ6g6kaef0nkzHB9-mW4JwA1YaU>
Subject: Re: [Teas-ns-dt] Notes for today's NS-DT meeting
X-BeenThere: teas-ns-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TEAS Network Slicing Design Team <teas-ns-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas-ns-dt/>
List-Post: <mailto:teas-ns-dt@ietf.org>
List-Help: <mailto:teas-ns-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Feb 2020 01:05:52 -0000

Hi Jeff,
I do agree with Eric's characterization of 1+1, m:n, and 1:n (1:1 being the
special case of the former). G.808.1 (attached) gives a good overview of
protection architectures and I think that we can use that as the foundation
and the dictionary when talking about protection in the network slicing.
For example, section 7.1 explains 1+1 protection as follows:

In the 1+1 architecture type, a protection transport entity is dedicated as
a backup facility to the
working transport entity with the normal traffic signal bridged onto the
protection transport entity at
the source endpoint of the protected domain. The normal traffic on working
and protection transport
entities is transmitted simultaneously to the sink endpoint of the
protected domain where a selection
between the working and protection transport entity is made,

The next section explains the architecture of 1:n protection scheme:

In the 1:n architecture type, a dedicated protection transport entity is a
shared backup facility for n
working transport entities. The bandwidth of the protection transport
entity should be allocated in
such a way that it may be possible to protect any of the n working
transport entities in case the
protection transport entity is available.

One of the differences between 1+1 and 1:n/1:1 is that in the latter the
protection path may be used to carry extra traffic given that it will be
affected when the working path fails or deemed degraded below a
pre-determined level.
On the second point, regarding differences in the protection and switchover
of unidirectional vs. bi-directional line, I believe that it is better to
address the bi-directional (viewed as a single object) and consider the
unidirectional protection as the special case of the former.

On Tue, Feb 18, 2020 at 1:08 PM Jeff Tantsura <jefftant.ietf@gmail.com>
wrote:

> Eric,
>
> I disagree with you, also reference to DetNet is not applicable here, they
> replicate because they follow TSN logic.
> In general 1+1 (1:1) protection means that the secondary (protecting) path
> available is equal in its characteristics to the primary, whether they
> share fate is an additional property and could have many different
> semantics (from shared line-card to shared fiber duct).
> It is very uncommon to send traffic on both, protected and protecting
> paths, often protecting path carries other traffic that would be pushed out
> based on priorities.
> As a separate note - we need to discuss unidirectional vs bidirectional
> protection,  since they have different times to repair, in bidirectional
> case as long as return path has not been recovered forward path is
> considered down.
>
> Cheers,
> Jeff
> On Feb 17, 2020, 12:29 PM -0800, Eric Gray <eric.gray=
> 40ericsson.com@dmarc.ietf.org>, wrote:
>
> John,
>
>
>
>               With 1+1 protection, the sender sends traffic on both the
> working and protection path, so quite often – while there is a “switchover
> time” – it is basically a “name-changing” event (the protection path
> becomes the working path, but nothing else changes without operator
> intervention) and it is quite often the case that no traffic is impacted.
> In other words, the switchover time is irrelevant, as long as it is not so
> long that a second failure may occur before the switchover is reported to
> the operator.
>
>
>
>               Note that the technology being defined in DetNet, uses
> packet replication and elimination, which is analogous to 1+1 protection in
> that sense.  In addition, 1+1 protection is defined for label switching as
> well.  In fact, 1+1 protection can be applied in any technology that allows
> for establishing diverse alternative paths.
>
>
>
>               Hence, a choice to use packet-switching should be orthogonal
> to a choice to use 1+1 protection.  And none of these choices has very much
> to do with “isolation.”
>
>
>
>               What you are probably referring to is a distinction between
> either 1+1 or 1:1, and 1:N or M:N protection – primarily because there is
> no dedicated protection path in either of the latter two cases.  Either
> there is 1 protection path for N working paths, or there are M protection
> paths for N working paths (where M is assumed to be less than N) in those
> cases, so a switchover may be non-trivial and (possibly) performance
> impacting.
>
>
>
>               For example, not having a dedicated alternative path in the
> 1:N case means that – if two working path connections fail both will see
> performance degradation.  Similarly, for the M:N case, if M+1 out of the N
> working paths fail, the users for at least two of the failed paths will see
> some performance loss.
>
>
>
>               But I fail to see how any of these are inherently cases
> involving “isolation.”
>
>
>
>               One thing I have heard of is using the term “protection
> isolation” to mean isolation of alternative paths, ensuring that a single
> failure does not take more than one working or protection path down.  But
> this is (possibly) more commonly referred to as “shared risk avoidance.”
>
>
>
> --
>
> Eric
>
>
>
> *From:* John E Drake <jdrake=40juniper.net@dmarc.ietf.org>
> *Sent:* Monday, February 10, 2020 12:25 PM
> *To:* Eric Gray <eric.gray@ericsson.com>
> *Cc:* teas-ns-dt@ietf.org; Jari Arkko <jari.arkko@ericsson.com>
> *Subject:* Re: [Teas-ns-dt] Notes for today's NS-DT meeting
> *Importance:* High
>
>
>
> Hi,
>
>
>
> Wrt protection isolation, if you have dedicated 1+1 protection you still
> have the switchover time, so this is the minimum service interruption with
> hard isolation.  If you have packet switching (soft isolation) there are a
> range of technologies that provide a range of service disruption times.
>
>
>
> Sent from my iPhone
>
>
>
> On Feb 10, 2020, at 12:15 PM, Eric Gray <
> eric.gray=40ericsson.com@dmarc.ietf.org> wrote:
>
> 
>
> Are available at: https://etherpad.ietf.org/p/ns-dt-notes-feb10
> <https://protect2.fireeye.com/v1/url?k=4896fa91-141f5558-4896ba0a-0cc47ad93e1c-a95572c8cb9519ed&q=1&e=138ed022-c29c-4668-bda7-71975eb05cd5&u=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fetherpad.ietf.org%2Fp%2Fns-dt-notes-feb10__%3B%21%21NEt6yMaO-gk%21R9MKmiaYXBuhuTZBYpZvNsiVYjnzH2xbzR2wZ5WPPMspWRsv7tVCr1efC9sXFr8%24>
> .
>
>
>
> Please review these notes and either add to them anything we discussed at
> the meeting, or send comments to me.
>
>
>
> Jari, later this week, could you push these to the GitHub repository at:
> https://github.com/teas-wg/teas-ns-dt/tree/master/notes
> <https://protect2.fireeye.com/v1/url?k=060f429c-5a86ed55-060f0207-0cc47ad93e1c-2d4397becaf63c66&q=1&e=138ed022-c29c-4668-bda7-71975eb05cd5&u=https%3A%2F%2Fgithub.com%2Fteas-wg%2Fteas-ns-dt%2Ftree%2Fmaster%2Fnotes>
> (in md format, I guess)?
>
>
>
> --
>
> Eric
>
> --
> Teas-ns-dt mailing list
> Teas-ns-dt@ietf.org
>
> https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/teas-ns-dt__;!!NEt6yMaO-gk!R9MKmiaYXBuhuTZBYpZvNsiVYjnzH2xbzR2wZ5WPPMspWRsv7tVCr1efVwcxTqI$
> <https://protect2.fireeye.com/v1/url?k=e6e8e9e1-ba614628-e6e8a97a-0cc47ad93e1c-b7c1747faaad98e8&q=1&e=138ed022-c29c-4668-bda7-71975eb05cd5&u=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fteas-ns-dt__%3B%21%21NEt6yMaO-gk%21R9MKmiaYXBuhuTZBYpZvNsiVYjnzH2xbzR2wZ5WPPMspWRsv7tVCr1efVwcxTqI%24>
>
> --
> Teas-ns-dt mailing list
> Teas-ns-dt@ietf.org
> https://www.ietf.org/mailman/listinfo/teas-ns-dt
>
> --
> Teas-ns-dt mailing list
> Teas-ns-dt@ietf.org
> https://www.ietf.org/mailman/listinfo/teas-ns-dt
>