Re: [Teas-ns-dt] Notes for today's NS-DT meeting

Xufeng Liu <xufeng.liu.ietf@gmail.com> Thu, 20 February 2020 14:27 UTC

Return-Path: <xufeng.liu.ietf@gmail.com>
X-Original-To: teas-ns-dt@ietfa.amsl.com
Delivered-To: teas-ns-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAD181200D7 for <teas-ns-dt@ietfa.amsl.com>; Thu, 20 Feb 2020 06:27:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6czTaByv2WD2 for <teas-ns-dt@ietfa.amsl.com>; Thu, 20 Feb 2020 06:26:57 -0800 (PST)
Received: from mail-io1-xd35.google.com (mail-io1-xd35.google.com [IPv6:2607:f8b0:4864:20::d35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 56944120073 for <teas-ns-dt@ietf.org>; Thu, 20 Feb 2020 06:26:57 -0800 (PST)
Received: by mail-io1-xd35.google.com with SMTP id z193so4885236iof.1 for <teas-ns-dt@ietf.org>; Thu, 20 Feb 2020 06:26:57 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=q4GBwEk7QRpMZCeVh0eBKG/rC7lMk+ikXAOEd2plpIs=; b=cbUQkGL4pJcaUEfhtUtuOkp4A+trkYaiSJc5wDamTw1wK1UFyuGL2ZLdKZYJ5rZhcU mOuxCRrRVQOGeIiVxdQwd9LWSlrZ9xKi8xu3up+ukB5NC350kfHeIQ2x85gWekT57XkW C7hz93NPBlvGuivPfd11a+ICWsom7fFW8SP9Dseh+Tnh0r1xy3NzQMJ1ap6x3kd1teXc tBSIqS3Ge24pTtFAnJCAY4XzQ70wN9Yx/eHAgEdbS5DIxOC0CC5VR0tkTbIQDlqA3u9I OL+kra1fNtx0+Q9TS4nVBKydNs/uYy58UN3jXxaUP8Cu/3evqcQB9IuMj/IpEcwS2c9Q 4WNQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=q4GBwEk7QRpMZCeVh0eBKG/rC7lMk+ikXAOEd2plpIs=; b=tP1+kiuJ2TWRFtZCWRzJyMEJaO3v1wZBN/INTW9GH4SNXeniFlDjhizoPc3TCOs3rP kdOW080MLsLNWwCVfbRjG4Qi3brugc1oOc+McXswpXWpPG58I9iufr+2yo2iAciMsjrA iUUGGhhzBBuq+CXgAgbOm5pnC2BejmmQK1LL6tMrWTsvk9HTaPWv0XKxJiP8wM9aXi7G iKrdnz51CugxGO5FdabVU7a76tqljNzTKBzIzJeb+kAjoDEJGGFK8qs0u+GDzDZL0OFx 0BZNMh3h3jg5Ylokht0ZL3dnRGSf1kbTeBdGUX8LKQLnrNW3I1CL9OEpjpiQ5oxSRLyf 9zPw==
X-Gm-Message-State: APjAAAXWpG45KYug/nDy9TxPzxd7kSFj9n9umLu9f9EZphA8ce2MHcBc Uc0MpPFWm0ATi98IcmNJFsiyEMtADM/mCN9rhK4=
X-Google-Smtp-Source: APXvYqx5seJMV5V/yyYk8ch23UQ5gGiJqPKa6kR0L8C8RRgNIPPOBZBqkN2bpaVFk0b3qCi3LZ1lDFet9PVuinGKjUc=
X-Received: by 2002:a5e:860e:: with SMTP id z14mr23812571ioj.10.1582208816569; Thu, 20 Feb 2020 06:26:56 -0800 (PST)
MIME-Version: 1.0
References: <CA+RyBmXnp+2ie8CqkWpkAVuujNo9qjMBr9Re0xFF8v1jkD=UwA@mail.gmail.com> <DAD32DB4-3F7A-460C-ACC0-AC3E3D10963F@gmail.com> <CA+RyBmUxiEQc86pJ_dOipL_PUyXUk4pcqrw2agdemU+Wzuuo+g@mail.gmail.com>
In-Reply-To: <CA+RyBmUxiEQc86pJ_dOipL_PUyXUk4pcqrw2agdemU+Wzuuo+g@mail.gmail.com>
From: Xufeng Liu <xufeng.liu.ietf@gmail.com>
Date: Thu, 20 Feb 2020 09:26:41 -0500
Message-ID: <CAEz6PPSSWxyPQP7Mm2xZfKT5AN=Mz1rZEt-9yZsQMJ_VxfKyKg@mail.gmail.com>
To: Greg Mirsky <gregimirsky@gmail.com>
Cc: Jeff Tantsura <jefftant.ietf@gmail.com>, Eric Gray <eric.gray=40ericsson.com@dmarc.ietf.org>, "teas-ns-dt@ietf.org" <teas-ns-dt@ietf.org>, John E Drake <jdrake=40juniper.net@dmarc.ietf.org>, Jari Arkko <jari.arkko@ericsson.com>
Content-Type: multipart/alternative; boundary="00000000000078e009059f02b23d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas-ns-dt/sTRSwhFeIecEvYIr5rqc07bfscY>
Subject: Re: [Teas-ns-dt] Notes for today's NS-DT meeting
X-BeenThere: teas-ns-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TEAS Network Slicing Design Team <teas-ns-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas-ns-dt/>
List-Post: <mailto:teas-ns-dt@ietf.org>
List-Help: <mailto:teas-ns-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Feb 2020 14:27:02 -0000

I'd agree with Eric on the following statement within the context of
slicing:

> But I fail to see how any of these are inherently cases involving
“isolation.”

I'd say that the scope of the "isolation" is important when we mention the
"isolation". In the context of protection or recovery, the isolation is
used as a technique between links or paths, but all these links or paths
are "isolated" (or "disjoined") within the same customer's topology
(meaning that they are in the same slice). In the context of slicing, the
scope of "isolation" is between customers (or slices).

Thanks,
- Xufeng

On Tue, Feb 18, 2020 at 11:52 PM Greg Mirsky <gregimirsky@gmail.com> wrote:

> H Jeff,
> could you please clarify what is included in "enforcement"? Obviously,
> protection depends on the failure detection mechanism. Also, a mechanism to
> select working and protecting paths (could be centralized or distributed)
> based on the configuration of the protection domain. Then, a protocol to
> coordinate a switchover at the endpoints is necessary. Is that what is
> included in the enforcement of protection?
>
> Regards,
> Greg
>
> On Tue, Feb 18, 2020 at 8:32 PM Jeff Tantsura <jefftant.ietf@gmail.com>
> wrote:
>
>> Greg,
>>
>> In RSVT-TE case the protecting path is indeed pre-signaled and
>> instantiated in forwarding however enforcement is often done by other means
>> (reservation is soft).
>> In SR-TE case behavior is defined hop-by-hop (SID->action mappings are
>> local), enforcement is always done by other means.
>>
>> Regards,
>> Jeff
>>
>> On Feb 18, 2020, at 20:01, Greg Mirsky <gregimirsky@gmail.com> wrote:
>>
>> 
>> Hi Jeff,
>> thank you for the clarification it helped a lot. I think that in IP/MPLS,
>> i.e. without the ability to signal an explicit path, e2e protection cannot
>> be realized but only local protection can be. I'd note that any protection
>> scheme, 1+1 or 1:n, is based on pre-computed and instantiated in the data
>> plane paths. Hence is the difference between protection and restoration,
>> which is based on the control plane and its convergence.
>>
>> Regards,
>> Greg
>>
>> On Tue, Feb 18, 2020 at 6:29 PM Jeff Tantsura <jefftant.ietf@gmail.com>
>> wrote:
>>
>>> Hi Greg,
>>>
>>> My point was specifically to replication, the definitions are fine,
>>> however “dedicated” is perhaps applicable to optical networking but not
>>> to IP/MPLS.
>>>
>>> Cheers,
>>> Jeff
>>> On Feb 18, 2020, 5:05 PM -0800, Greg Mirsky <gregimirsky@gmail.com>,
>>> wrote:
>>>
>>> Hi Jeff,
>>> I do agree with Eric's characterization of 1+1, m:n, and 1:n (1:1 being
>>> the special case of the former). G.808.1 (attached) gives a good overview
>>> of protection architectures and I think that we can use that as the
>>> foundation and the dictionary when talking about protection in the network
>>> slicing. For example, section 7.1 explains 1+1 protection as follows:
>>>
>>> In the 1+1 architecture type, a protection transport entity is dedicated
>>> as a backup facility to the
>>> working transport entity with the normal traffic signal bridged onto the
>>> protection transport entity at
>>> the source endpoint of the protected domain. The normal traffic on
>>> working and protection transport
>>> entities is transmitted simultaneously to the sink endpoint of the
>>> protected domain where a selection
>>> between the working and protection transport entity is made,
>>>
>>> The next section explains the architecture of 1:n protection scheme:
>>>
>>> In the 1:n architecture type, a dedicated protection transport entity is
>>> a shared backup facility for n
>>> working transport entities. The bandwidth of the protection transport
>>> entity should be allocated in
>>> such a way that it may be possible to protect any of the n working
>>> transport entities in case the
>>> protection transport entity is available.
>>>
>>> One of the differences between 1+1 and 1:n/1:1 is that in the latter the
>>> protection path may be used to carry extra traffic given that it will be
>>> affected when the working path fails or deemed degraded below a
>>> pre-determined level.
>>> On the second point, regarding differences in the protection and
>>> switchover of unidirectional vs. bi-directional line, I believe that it is
>>> better to address the bi-directional (viewed as a single object) and
>>> consider the unidirectional protection as the special case of the former.
>>>
>>> On Tue, Feb 18, 2020 at 1:08 PM Jeff Tantsura <jefftant.ietf@gmail.com>
>>> wrote:
>>>
>>>> Eric,
>>>>
>>>> I disagree with you, also reference to DetNet is not applicable here,
>>>> they replicate because they follow TSN logic.
>>>> In general 1+1 (1:1) protection means that the secondary (protecting)
>>>> path available is equal in its characteristics to the primary, whether they
>>>> share fate is an additional property and could have many different
>>>> semantics (from shared line-card to shared fiber duct).
>>>> It is very uncommon to send traffic on both, protected and protecting
>>>> paths, often protecting path carries other traffic that would be pushed out
>>>> based on priorities.
>>>> As a separate note - we need to discuss unidirectional vs bidirectional
>>>> protection,  since they have different times to repair, in bidirectional
>>>> case as long as return path has not been recovered forward path is
>>>> considered down.
>>>>
>>>> Cheers,
>>>> Jeff
>>>> On Feb 17, 2020, 12:29 PM -0800, Eric Gray <eric.gray=
>>>> 40ericsson.com@dmarc.ietf.org>, wrote:
>>>>
>>>> John,
>>>>
>>>>
>>>>
>>>>               With 1+1 protection, the sender sends traffic on both the
>>>> working and protection path, so quite often – while there is a “switchover
>>>> time” – it is basically a “name-changing” event (the protection path
>>>> becomes the working path, but nothing else changes without operator
>>>> intervention) and it is quite often the case that no traffic is impacted.
>>>> In other words, the switchover time is irrelevant, as long as it is not so
>>>> long that a second failure may occur before the switchover is reported to
>>>> the operator.
>>>>
>>>>
>>>>
>>>>               Note that the technology being defined in DetNet, uses
>>>> packet replication and elimination, which is analogous to 1+1 protection in
>>>> that sense.  In addition, 1+1 protection is defined for label switching as
>>>> well.  In fact, 1+1 protection can be applied in any technology that allows
>>>> for establishing diverse alternative paths.
>>>>
>>>>
>>>>
>>>>               Hence, a choice to use packet-switching should be
>>>> orthogonal to a choice to use 1+1 protection.  And none of these choices
>>>> has very much to do with “isolation.”
>>>>
>>>>
>>>>
>>>>               What you are probably referring to is a distinction
>>>> between either 1+1 or 1:1, and 1:N or M:N protection – primarily because
>>>> there is no dedicated protection path in either of the latter two cases.
>>>> Either there is 1 protection path for N working paths, or there are M
>>>> protection paths for N working paths (where M is assumed to be less than N)
>>>> in those cases, so a switchover may be non-trivial and (possibly)
>>>> performance impacting.
>>>>
>>>>
>>>>
>>>>               For example, not having a dedicated alternative path in
>>>> the 1:N case means that – if two working path connections fail both will
>>>> see performance degradation.  Similarly, for the M:N case, if M+1 out of
>>>> the N working paths fail, the users for at least two of the failed paths
>>>> will see some performance loss.
>>>>
>>>>
>>>>
>>>>               But I fail to see how any of these are inherently cases
>>>> involving “isolation.”
>>>>
>>>>
>>>>
>>>>               One thing I have heard of is using the term “protection
>>>> isolation” to mean isolation of alternative paths, ensuring that a single
>>>> failure does not take more than one working or protection path down.  But
>>>> this is (possibly) more commonly referred to as “shared risk avoidance.”
>>>>
>>>>
>>>>
>>>> --
>>>>
>>>> Eric
>>>>
>>>>
>>>>
>>>> *From:* John E Drake <jdrake=40juniper.net@dmarc.ietf.org>
>>>> *Sent:* Monday, February 10, 2020 12:25 PM
>>>> *To:* Eric Gray <eric.gray@ericsson.com>
>>>> *Cc:* teas-ns-dt@ietf.org; Jari Arkko <jari.arkko@ericsson.com>
>>>> *Subject:* Re: [Teas-ns-dt] Notes for today's NS-DT meeting
>>>> *Importance:* High
>>>>
>>>>
>>>>
>>>> Hi,
>>>>
>>>>
>>>>
>>>> Wrt protection isolation, if you have dedicated 1+1 protection you
>>>> still have the switchover time, so this is the minimum service interruption
>>>> with hard isolation.  If you have packet switching (soft isolation) there
>>>> are a range of technologies that provide a range of service disruption
>>>> times.
>>>>
>>>>
>>>>
>>>> Sent from my iPhone
>>>>
>>>>
>>>>
>>>> On Feb 10, 2020, at 12:15 PM, Eric Gray <
>>>> eric.gray=40ericsson.com@dmarc.ietf.org> wrote:
>>>>
>>>> 
>>>>
>>>> Are available at: https://etherpad.ietf.org/p/ns-dt-notes-feb10
>>>> <https://protect2.fireeye.com/v1/url?k=4896fa91-141f5558-4896ba0a-0cc47ad93e1c-a95572c8cb9519ed&q=1&e=138ed022-c29c-4668-bda7-71975eb05cd5&u=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fetherpad.ietf.org%2Fp%2Fns-dt-notes-feb10__%3B%21%21NEt6yMaO-gk%21R9MKmiaYXBuhuTZBYpZvNsiVYjnzH2xbzR2wZ5WPPMspWRsv7tVCr1efC9sXFr8%24>
>>>> .
>>>>
>>>>
>>>>
>>>> Please review these notes and either add to them anything we discussed
>>>> at the meeting, or send comments to me.
>>>>
>>>>
>>>>
>>>> Jari, later this week, could you push these to the GitHub repository
>>>> at: https://github.com/teas-wg/teas-ns-dt/tree/master/notes
>>>> <https://protect2.fireeye.com/v1/url?k=060f429c-5a86ed55-060f0207-0cc47ad93e1c-2d4397becaf63c66&q=1&e=138ed022-c29c-4668-bda7-71975eb05cd5&u=https%3A%2F%2Fgithub.com%2Fteas-wg%2Fteas-ns-dt%2Ftree%2Fmaster%2Fnotes>
>>>> (in md format, I guess)?
>>>>
>>>>
>>>>
>>>> --
>>>>
>>>> Eric
>>>>
>>>> --
>>>> Teas-ns-dt mailing list
>>>> Teas-ns-dt@ietf.org
>>>>
>>>> https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/teas-ns-dt__;!!NEt6yMaO-gk!R9MKmiaYXBuhuTZBYpZvNsiVYjnzH2xbzR2wZ5WPPMspWRsv7tVCr1efVwcxTqI$
>>>> <https://protect2.fireeye.com/v1/url?k=e6e8e9e1-ba614628-e6e8a97a-0cc47ad93e1c-b7c1747faaad98e8&q=1&e=138ed022-c29c-4668-bda7-71975eb05cd5&u=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fteas-ns-dt__%3B%21%21NEt6yMaO-gk%21R9MKmiaYXBuhuTZBYpZvNsiVYjnzH2xbzR2wZ5WPPMspWRsv7tVCr1efVwcxTqI%24>
>>>>
>>>> --
>>>> Teas-ns-dt mailing list
>>>> Teas-ns-dt@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/teas-ns-dt
>>>>
>>>> --
>>>> Teas-ns-dt mailing list
>>>> Teas-ns-dt@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/teas-ns-dt
>>>>
>>> --
> Teas-ns-dt mailing list
> Teas-ns-dt@ietf.org
> https://www.ietf.org/mailman/listinfo/teas-ns-dt
>