[Teas] Re: Revisiting NRP Selector

"Dongjie (Jimmy)" <jie.dong@huawei.com> Mon, 03 February 2025 00:06 UTC

Return-Path: <jie.dong@huawei.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 190FCC1840F8; Sun, 2 Feb 2025 16:06:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.335
X-Spam-Level:
X-Spam-Status: No, score=-1.335 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, INVALID_MSGID=0.568, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gM1qoy70WXWi; Sun, 2 Feb 2025 16:06:40 -0800 (PST)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E34A4C1D5301; Sun, 2 Feb 2025 16:06:39 -0800 (PST)
Received: from mail.maildlp.com (unknown [172.18.186.216]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4YmRYg26T5z67CtS; Mon, 3 Feb 2025 08:04:07 +0800 (CST)
Received: from lhrpeml100002.china.huawei.com (unknown [7.191.160.241]) by mail.maildlp.com (Postfix) with ESMTPS id 82AC8140B73; Mon, 3 Feb 2025 08:06:37 +0800 (CST)
Received: from dggpemf500009.china.huawei.com (7.185.36.50) by lhrpeml100002.china.huawei.com (7.191.160.241) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.39; Mon, 3 Feb 2025 00:06:36 +0000
Received: from kwepemf100006.china.huawei.com (7.202.181.220) by dggpemf500009.china.huawei.com (7.185.36.50) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.11; Mon, 3 Feb 2025 08:06:33 +0800
Received: from kwepemf100006.china.huawei.com ([7.202.181.220]) by kwepemf100006.china.huawei.com ([7.202.181.220]) with mapi id 15.02.1544.011; Mon, 3 Feb 2025 08:06:33 +0800
From: "Dongjie (Jimmy)" <jie.dong@huawei.com>
To: Ketan Talaulikar <ketant.ietf@gmail.com>, Vishnu Pavan Beeram <vishnupavan@gmail.com>
Thread-Topic: [Teas] Re: Revisiting NRP Selector
Thread-Index: AQHbbEI3J4uM6F8K0UyRfqoiCT1P5rMtgfGAgAdEgmA=
Date: Mon, 03 Feb 2025 00:06:33 +0000
Message-ID: 5DE83AC1-199B-437B-B6E1-CE90F66EA4BF
References: <CA+YzgTu9CKq7wMKkUhhDdZXTqvp+BHLvWeQmXa-PmeknA2VaNw@mail.gmail.com> <CA+YzgTua7DAU82r0fBFVKvd2LPdfGmH+i1-C7Co8+V+ohxnSjQ@mail.gmail.com>,<CAH6gdPzr8by3Jq_0FonqkSL-iGPNcH_-RcZQRr--_n60ZWBQAA@mail.gmail.com>
In-Reply-To: <CAH6gdPzr8by3Jq_0FonqkSL-iGPNcH_-RcZQRr--_n60ZWBQAA@mail.gmail.com>
Accept-Language: en-US, zh-CN
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Content-Type: multipart/alternative; boundary="_000_5DE83AC1199B437BB6E1CE90F66EA4BF_"
MIME-Version: 1.0
Message-ID-Hash: SZ5KOJMUSEUSU3BNF3WGYDGTSGI7MNLZ
X-Message-ID-Hash: SZ5KOJMUSEUSU3BNF3WGYDGTSGI7MNLZ
X-MailFrom: jie.dong@huawei.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-teas.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: TEAS WG <teas@ietf.org>, TEAS WG Chairs <teas-chairs@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Teas] Re: Revisiting NRP Selector
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/77z8MoBmTsDdQwdLKM3xbuODPrE>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Owner: <mailto:teas-owner@ietf.org>
List-Post: <mailto:teas@ietf.org>
List-Subscribe: <mailto:teas-join@ietf.org>
List-Unsubscribe: <mailto:teas-leave@ietf.org>

Hi Ketan,

Thanks for sharing your opinion on this thread, please see some comments inline with [Jie]:



发件人:Ketan Talaulikar <ketant.ietf@gmail.com<mailto:ketant.ietf@gmail.com>>
收件人:Vishnu Pavan Beeram <vishnupavan@gmail.com<mailto:vishnupavan@gmail.com>>
抄 送:TEAS WG <teas@ietf.org<mailto:teas@ietf.org>>;TEAS WG Chairs <teas-chairs@ietf.org<mailto:teas-chairs@ietf.org>>
时 间:2025-01-30 01:09:29
主 题:[Teas] Re: Revisiting NRP Selector

Hi Pavan,

Please check inline below.


On Wed, Jan 22, 2025 at 1:52 AM Vishnu Pavan Beeram <vishnupavan@gmail.com<mailto:vishnupavan@gmail.com>> wrote:

The chairs would like to draw a consensus based on the responses to the questions posed in this thread. Thanks to everyone who sent in their responses. We will leave this thread open till Jan 27th to see if there are more responses.

We had a couple of opinions expressed at the mike during the last TEAS WG session on this topic (https://datatracker.ietf.org/doc/minutes-121-teas/#08-1410-10-min-title-realizing-network-slices-in-ipmpls-networks) Please do bring that discussion to the list.

Regards,
-Pavan and Oscar

On Wed, Oct 9, 2024 at 12:45 PM Vishnu Pavan Beeram <vishnupavan@gmail.com<mailto:vishnupavan@gmail.com>> wrote:
We had a virtual interim meeting on May 29th 2024 to discuss the following NRP Selector specific items:

  *   Generic requirements and options for carrying NRP Selector in IP and MPLS packets
  *   The relevant modeling aspects
  *   The data plane specific extensions that come into play when a dedicated identifier is used as the NRP selector.
The meeting minutes are captured at:

  *   https://datatracker.ietf.org/meeting/interim-2024-teas-01/materials/minutes-interim-2024-teas-01-202405291400-00
We (the chairs) are starting a thread to close on some of the items specific to having a dedicated identifier that is used as NRP selector (note that NRP selector refers to the marking in the packet’s network layer header that is used to associate the packet with an NRP).

  *   What do we call this dedicated identifier field?
     *   “NRP Selector ID” and “NRP Data Plane ID” have been proposed so far.

KT> I prefer "NRP Selector ID". This comes from https://www.ietf.org/archive/id/draft-ietf-teas-ns-ip-mpls-04.html#section-5.1.1 where NRP Selector is defined and then we said that we need a new specific purpose ID in the packet and so perhaps we call it NRP Selector ID.

[Jie] draft-ietf-teas-ns-ip-mpls-04 introduces the term NRP Selector as a general concept for different ways of implementing NRP identification in data packet, including both overloading existing identifiers and introducing dedicated identifiers. Please refer to section 5.1.1 for some details of NRP selector implementation options. My concern with the term "NRP Selector ID" is that it covers multiple approaches discussed in the ns-ip-mpls draft (both overloaded id and dedicated id), while what we want here is a term only for the "dedicated id" approach.

[Jie] On the other hand,  the term NRP ID has been used for NRP identification in the management plane and control plane. By adding "data plane" as a determiner to "NRP ID", its usage can be extended to the data plane naturally.

[Jie] That said, I am not a big fan of nitpicking on the terms. As long as the WG can reach some comsensus, I will be OK with it.



  *   Length of the dedicated identifier field
     *   Is it okay for this to be different for different data-plane types?

KT> Yes

[Jie] Agree and it is reasonable to allow different ID length for different encodings.



     *   A 32-bit field has been proposed for the IPv6 Data-Plane; A couple of options – 8 bits and 13 bits – have been proposed for the MPLS data plane
        *   Please note that the actual data-plane specific encodings are outside the scope of the TEAS WG.

KT> The point was that an NRP which goesp across domains with different data planes - e.g., SRv6 and MPLS. Having a consistent NRP Selector ID just makes things simpler without the need for mapping between these domains. Now, a NRP Selector ID that is 8-bit size will fit into a field that is 32-bit size - so this becomes more of an operational/deployment option that I really want us to retain for simplicity of deployment. Based on all the feedback that I've received from multiple operators and colleagues from across vendors, most do not foresee the number of NRPs that exceed 8-bit space. So, why not keep a 8-bit consistent size as an option in the various data planes - specifically MPLS (MNA) and SRv6 to start with? Especially, if it is easily possible to extend if/when the need truly arises.

[Jie] I fully understand your point on the ID mapping between different domains, and I agree some approach for carrying/mapping a small-sized ID into a large-sized ID is needed as deloyment considerations. We have this kind of mapping in existing scenarios, such as IPv4 to IPv6 address mapping.

[Jie] I understand the needed number of NRP in some early deployments may be relatively small, while in protocol design we always consider scalability for future needs. Another thing we may need to consider is the scope of the NRP. It may be used within a local domain (e.g. for MPLS), or it may have visibility across multiple domains (e.g. for IPv6). Thus my suggestion is IPv6 itself may need larger-sized ID, and it can accomodate the smaller-sized ID for mapping and interworking.



  *   “Strict” match indicator
     *   When a dedicated identifier is used as the NRP Selector, is it useful to have an explicit indicator to determine what to do with a packet that cannot be mapped to an NRP?
        *   Drop the packet vs Map it to a default set of network resources

KT> I believe it should always be a strict match check. The raison d'etre for NRP is to guarantee dedicated network resources partitioning. If the routing is not ensuring that forwarding of designated service flows is within that NRP OR if there is an issue in provisioning of the NRP (something is missed), then that seems like an error condition to me. Now, it is entirely possible that implementations want to provide policy/config knobs for fallback in some deployments, but I am not sure if we want this as an indication to be carried per-packet. The "fallback" could also be done at the slice or the service level?

[Jie] I agree with you that theoratically the NRP match should be strict, while in some cases the customer of an NRP may prefer better availabilty for some services when there is no matching of NRP resources so that the service can fallback to best effort forwarding. Actually in past discussion some people said they want "fallback" as the default behavior. It shows different match policy is required, and it can be at different granularities. The complexity to achieve the same with configuration has been shown with examples.


     *   The actual encoding of this “indicator” could be different for different data-plane types and will need to be discussed in the respective WGs (outside the scope of TEAS WG).

KT> Agree. However, I believe the TEAS WG should cover the requirement and functional aspects in our documents based on which the other WGs can design the actual encodings.

[Jie] Agreed. TEAS should give general design guidlines and leave the encoding details to the relevant WGs.

Best regards,
Jie

Thanks,
Ketan
Please chime in with your thoughts on these items.
- Pavan and Oscar
ps: @Jie – Thanks for the offline prod. Please feel free to add other open items specific to NRP selector (that we may have missed) to the above list.
_______________________________________________
Teas mailing list -- teas@ietf.org<mailto:teas@ietf.org>
To unsubscribe send an email to teas-leave@ietf.org<mailto:teas-leave@ietf.org>