Re: [Teas-ns-dt] Notes for today's NS-DT meeting

Greg Mirsky <gregimirsky@gmail.com> Wed, 19 February 2020 04:01 UTC

Return-Path: <gregimirsky@gmail.com>
X-Original-To: teas-ns-dt@ietfa.amsl.com
Delivered-To: teas-ns-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B16F01208A0 for <teas-ns-dt@ietfa.amsl.com>; Tue, 18 Feb 2020 20:01:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hMN_0bBjB_dF for <teas-ns-dt@ietfa.amsl.com>; Tue, 18 Feb 2020 20:01:18 -0800 (PST)
Received: from mail-lf1-x131.google.com (mail-lf1-x131.google.com [IPv6:2a00:1450:4864:20::131]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BC213120836 for <teas-ns-dt@ietf.org>; Tue, 18 Feb 2020 20:01:17 -0800 (PST)
Received: by mail-lf1-x131.google.com with SMTP id t23so16208063lfk.6 for <teas-ns-dt@ietf.org>; Tue, 18 Feb 2020 20:01:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=XxHI741GMPSqr6WI+qMKLp3WhVFN2Pp0Dg48nQFdrB0=; b=jO9uo3FlannGSq+DwlNmYEcssRmkuBhbUXL3lD9NGSqpCZi02RFUBkNP1V6Fq7aqW+ SGk3wg3Ew2WOW2dF3Cz7AUi3Sh5JYh8Idse05lRq/QumyUKkZZK/ZE8cOVwNtwg+qwuX LLvg2zljXhoYux76cKeTmNxe1YKeCILeEn0SM6wb0w/el4zg09Z6XrgrsFooDkoCAItR e/3RZaztud6Nq2aT4Y5j/afELIOXlnM+w0kJTm+shSmBMFdwi3Q5j4nL/opFiNaYZ4MO B/1CIW3a3KamdTGTIQt/39TJJU0KYi0uA8doRbUiZGE31W4VUwGDakQHyTksJUmZrbGo wwRg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=XxHI741GMPSqr6WI+qMKLp3WhVFN2Pp0Dg48nQFdrB0=; b=azD1QVABYhgzwekVHfepqy+2VFKumETRHPr6vs4QZ6n/lZzcipUgba5/rhY53p/QyV u9gDGV5870/IDr+pEHcKLoJuskgjeh69JY1E7gOfOroWqZljNbnWWsrLgCka5uisr2ZF T+YaCj4DbrlQonCXWsLaTsquT7sfgJeKfCsIjbKWv59qm0GLuZ7xVAGcCSw9hQkKe+g8 wDlAclajE/HDbaaHktkZ4v+tsTUAVulSMNPHub7Ls48rIM0KclISUPECJ10gKmPZaT0i PlWwzZ06cP1Xs19mbfDoYR2yHZ/rZ7/SAYZrARgyHXyLBh83KZBjwlyinUNI3bBeYVhU jFpg==
X-Gm-Message-State: APjAAAXi12+i86vrz4fGOl/BCRMXWZ9vw/RA3pe/jb7gl2Wf9s41tOAW k/4IPswQ+En7LS4yUWf8dgtTpngOtH/+NO2KK48=
X-Google-Smtp-Source: APXvYqzJGAff1lmDenIQaACE3xOJc+zjgVc78pih9nlx8TeunoxDMy1VjDQCvIr3xoeNx9RWa3f4njBex8y6vaOLGOc=
X-Received: by 2002:ac2:5196:: with SMTP id u22mr11487015lfi.123.1582084875962; Tue, 18 Feb 2020 20:01:15 -0800 (PST)
MIME-Version: 1.0
References: <BN8PR15MB26446636F22E9B945759C1B997190@BN8PR15MB2644.namprd15.prod.outlook.com> <945050C2-11DF-4A15-B625-06047D47C791@juniper.net> <BN8PR15MB264494023BBDA4582DD47A9497160@BN8PR15MB2644.namprd15.prod.outlook.com> <694d4c28-07e8-4f9b-8f77-ad6b55434617@Spark> <CA+RyBmWSaea8NL2eTEzgJuF8M7S1zJftKcecX=Xd4jd+3fpzsw@mail.gmail.com> <7a812640-e74f-4966-aba7-c7fe1927d849@Spark>
In-Reply-To: <7a812640-e74f-4966-aba7-c7fe1927d849@Spark>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Tue, 18 Feb 2020 20:01:04 -0800
Message-ID: <CA+RyBmXnp+2ie8CqkWpkAVuujNo9qjMBr9Re0xFF8v1jkD=UwA@mail.gmail.com>
To: Jeff Tantsura <jefftant.ietf@gmail.com>
Cc: John E Drake <jdrake=40juniper.net@dmarc.ietf.org>, Eric Gray <eric.gray=40ericsson.com@dmarc.ietf.org>, "teas-ns-dt@ietf.org" <teas-ns-dt@ietf.org>, Jari Arkko <jari.arkko@ericsson.com>
Content-Type: multipart/alternative; boundary="000000000000094f8b059ee5d790"
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas-ns-dt/cva_zoBG2vK9exMgvDpqqh3Buco>
Subject: Re: [Teas-ns-dt] Notes for today's NS-DT meeting
X-BeenThere: teas-ns-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TEAS Network Slicing Design Team <teas-ns-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas-ns-dt/>
List-Post: <mailto:teas-ns-dt@ietf.org>
List-Help: <mailto:teas-ns-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Feb 2020 04:01:22 -0000

Hi Jeff,
thank you for the clarification it helped a lot. I think that in IP/MPLS,
i.e. without the ability to signal an explicit path, e2e protection cannot
be realized but only local protection can be. I'd note that any protection
scheme, 1+1 or 1:n, is based on pre-computed and instantiated in the data
plane paths. Hence is the difference between protection and restoration,
which is based on the control plane and its convergence.

Regards,
Greg

On Tue, Feb 18, 2020 at 6:29 PM Jeff Tantsura <jefftant.ietf@gmail.com>
wrote:

> Hi Greg,
>
> My point was specifically to replication, the definitions are fine,
> however “dedicated” is perhaps applicable to optical networking but not
> to IP/MPLS.
>
> Cheers,
> Jeff
> On Feb 18, 2020, 5:05 PM -0800, Greg Mirsky <gregimirsky@gmail.com>,
> wrote:
>
> Hi Jeff,
> I do agree with Eric's characterization of 1+1, m:n, and 1:n (1:1 being
> the special case of the former). G.808.1 (attached) gives a good overview
> of protection architectures and I think that we can use that as the
> foundation and the dictionary when talking about protection in the network
> slicing. For example, section 7.1 explains 1+1 protection as follows:
>
> In the 1+1 architecture type, a protection transport entity is dedicated
> as a backup facility to the
> working transport entity with the normal traffic signal bridged onto the
> protection transport entity at
> the source endpoint of the protected domain. The normal traffic on working
> and protection transport
> entities is transmitted simultaneously to the sink endpoint of the
> protected domain where a selection
> between the working and protection transport entity is made,
>
> The next section explains the architecture of 1:n protection scheme:
>
> In the 1:n architecture type, a dedicated protection transport entity is a
> shared backup facility for n
> working transport entities. The bandwidth of the protection transport
> entity should be allocated in
> such a way that it may be possible to protect any of the n working
> transport entities in case the
> protection transport entity is available.
>
> One of the differences between 1+1 and 1:n/1:1 is that in the latter the
> protection path may be used to carry extra traffic given that it will be
> affected when the working path fails or deemed degraded below a
> pre-determined level.
> On the second point, regarding differences in the protection and
> switchover of unidirectional vs. bi-directional line, I believe that it is
> better to address the bi-directional (viewed as a single object) and
> consider the unidirectional protection as the special case of the former.
>
> On Tue, Feb 18, 2020 at 1:08 PM Jeff Tantsura <jefftant.ietf@gmail.com>
> wrote:
>
>> Eric,
>>
>> I disagree with you, also reference to DetNet is not applicable here,
>> they replicate because they follow TSN logic.
>> In general 1+1 (1:1) protection means that the secondary (protecting)
>> path available is equal in its characteristics to the primary, whether they
>> share fate is an additional property and could have many different
>> semantics (from shared line-card to shared fiber duct).
>> It is very uncommon to send traffic on both, protected and protecting
>> paths, often protecting path carries other traffic that would be pushed out
>> based on priorities.
>> As a separate note - we need to discuss unidirectional vs bidirectional
>> protection,  since they have different times to repair, in bidirectional
>> case as long as return path has not been recovered forward path is
>> considered down.
>>
>> Cheers,
>> Jeff
>> On Feb 17, 2020, 12:29 PM -0800, Eric Gray <eric.gray=
>> 40ericsson.com@dmarc.ietf.org>, wrote:
>>
>> John,
>>
>>
>>
>>               With 1+1 protection, the sender sends traffic on both the
>> working and protection path, so quite often – while there is a “switchover
>> time” – it is basically a “name-changing” event (the protection path
>> becomes the working path, but nothing else changes without operator
>> intervention) and it is quite often the case that no traffic is impacted.
>> In other words, the switchover time is irrelevant, as long as it is not so
>> long that a second failure may occur before the switchover is reported to
>> the operator.
>>
>>
>>
>>               Note that the technology being defined in DetNet, uses
>> packet replication and elimination, which is analogous to 1+1 protection in
>> that sense.  In addition, 1+1 protection is defined for label switching as
>> well.  In fact, 1+1 protection can be applied in any technology that allows
>> for establishing diverse alternative paths.
>>
>>
>>
>>               Hence, a choice to use packet-switching should be
>> orthogonal to a choice to use 1+1 protection.  And none of these choices
>> has very much to do with “isolation.”
>>
>>
>>
>>               What you are probably referring to is a distinction between
>> either 1+1 or 1:1, and 1:N or M:N protection – primarily because there is
>> no dedicated protection path in either of the latter two cases.  Either
>> there is 1 protection path for N working paths, or there are M protection
>> paths for N working paths (where M is assumed to be less than N) in those
>> cases, so a switchover may be non-trivial and (possibly) performance
>> impacting.
>>
>>
>>
>>               For example, not having a dedicated alternative path in the
>> 1:N case means that – if two working path connections fail both will see
>> performance degradation.  Similarly, for the M:N case, if M+1 out of the N
>> working paths fail, the users for at least two of the failed paths will see
>> some performance loss.
>>
>>
>>
>>               But I fail to see how any of these are inherently cases
>> involving “isolation.”
>>
>>
>>
>>               One thing I have heard of is using the term “protection
>> isolation” to mean isolation of alternative paths, ensuring that a single
>> failure does not take more than one working or protection path down.  But
>> this is (possibly) more commonly referred to as “shared risk avoidance.”
>>
>>
>>
>> --
>>
>> Eric
>>
>>
>>
>> *From:* John E Drake <jdrake=40juniper.net@dmarc.ietf.org>
>> *Sent:* Monday, February 10, 2020 12:25 PM
>> *To:* Eric Gray <eric.gray@ericsson.com>
>> *Cc:* teas-ns-dt@ietf.org; Jari Arkko <jari.arkko@ericsson.com>
>> *Subject:* Re: [Teas-ns-dt] Notes for today's NS-DT meeting
>> *Importance:* High
>>
>>
>>
>> Hi,
>>
>>
>>
>> Wrt protection isolation, if you have dedicated 1+1 protection you still
>> have the switchover time, so this is the minimum service interruption with
>> hard isolation.  If you have packet switching (soft isolation) there are a
>> range of technologies that provide a range of service disruption times.
>>
>>
>>
>> Sent from my iPhone
>>
>>
>>
>> On Feb 10, 2020, at 12:15 PM, Eric Gray <
>> eric.gray=40ericsson.com@dmarc.ietf.org> wrote:
>>
>> 
>>
>> Are available at: https://etherpad.ietf.org/p/ns-dt-notes-feb10
>> <https://protect2.fireeye.com/v1/url?k=4896fa91-141f5558-4896ba0a-0cc47ad93e1c-a95572c8cb9519ed&q=1&e=138ed022-c29c-4668-bda7-71975eb05cd5&u=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fetherpad.ietf.org%2Fp%2Fns-dt-notes-feb10__%3B%21%21NEt6yMaO-gk%21R9MKmiaYXBuhuTZBYpZvNsiVYjnzH2xbzR2wZ5WPPMspWRsv7tVCr1efC9sXFr8%24>
>> .
>>
>>
>>
>> Please review these notes and either add to them anything we discussed at
>> the meeting, or send comments to me.
>>
>>
>>
>> Jari, later this week, could you push these to the GitHub repository at:
>> https://github.com/teas-wg/teas-ns-dt/tree/master/notes
>> <https://protect2.fireeye.com/v1/url?k=060f429c-5a86ed55-060f0207-0cc47ad93e1c-2d4397becaf63c66&q=1&e=138ed022-c29c-4668-bda7-71975eb05cd5&u=https%3A%2F%2Fgithub.com%2Fteas-wg%2Fteas-ns-dt%2Ftree%2Fmaster%2Fnotes>
>> (in md format, I guess)?
>>
>>
>>
>> --
>>
>> Eric
>>
>> --
>> Teas-ns-dt mailing list
>> Teas-ns-dt@ietf.org
>>
>> https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/teas-ns-dt__;!!NEt6yMaO-gk!R9MKmiaYXBuhuTZBYpZvNsiVYjnzH2xbzR2wZ5WPPMspWRsv7tVCr1efVwcxTqI$
>> <https://protect2.fireeye.com/v1/url?k=e6e8e9e1-ba614628-e6e8a97a-0cc47ad93e1c-b7c1747faaad98e8&q=1&e=138ed022-c29c-4668-bda7-71975eb05cd5&u=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fteas-ns-dt__%3B%21%21NEt6yMaO-gk%21R9MKmiaYXBuhuTZBYpZvNsiVYjnzH2xbzR2wZ5WPPMspWRsv7tVCr1efVwcxTqI%24>
>>
>> --
>> Teas-ns-dt mailing list
>> Teas-ns-dt@ietf.org
>> https://www.ietf.org/mailman/listinfo/teas-ns-dt
>>
>> --
>> Teas-ns-dt mailing list
>> Teas-ns-dt@ietf.org
>> https://www.ietf.org/mailman/listinfo/teas-ns-dt
>>
>