Re: [Teas] draft-ietf-teas-yang-path-computation-02 : path computation stateless RPC attributes

Francesco Lazzeri <francesco.lazzeri@ericsson.com> Fri, 27 July 2018 08:16 UTC

Return-Path: <francesco.lazzeri@ericsson.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 61607130E21 for <teas@ietfa.amsl.com>; Fri, 27 Jul 2018 01:16:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.31
X-Spam-Level:
X-Spam-Status: No, score=-4.31 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com header.b=L+uPSuJ2; dkim=pass (1024-bit key) header.d=ericsson.com header.b=FE3JNa0u
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OQpfeQyulIv3 for <teas@ietfa.amsl.com>; Fri, 27 Jul 2018 01:16:11 -0700 (PDT)
Received: from sesbmg22.ericsson.net (sesbmg22.ericsson.net [193.180.251.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8AFBC130DEF for <teas@ietf.org>; Fri, 27 Jul 2018 01:16:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/simple; q=dns/txt; i=@ericsson.com; t=1532679368; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=TmEivvrHQygG3ypR59bAjk/vZOmMpYic7Qf1splO2cE=; b=L+uPSuJ20GosPqnhTQ+n59Wr7JGAHkiGAalyl1sRqFZ95/6lX1bRsMsE9KyZ4lXp Ls+shWcytELWDcofk2fOzJdmEVuRjYrqSOK2ahcu43jHBRueAJTO4Hf13pclNRwX 8mo2n1tfGFza9cFobRZhy3VqUWgrUT3J2PfE6eJX5Mo=;
X-AuditID: c1b4fb30-5cb039c0000059c2-b7-5b5ad4c8eee1
Received: from ESESSMB502.ericsson.se (Unknown_Domain [153.88.183.120]) by sesbmg22.ericsson.net (Symantec Mail Security) with SMTP id 3E.25.22978.8C4DA5B5; Fri, 27 Jul 2018 10:16:08 +0200 (CEST)
Received: from ESESBMR505.ericsson.se (153.88.183.201) by ESESSMB502.ericsson.se (153.88.183.120) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Fri, 27 Jul 2018 10:16:07 +0200
Received: from ESESBMB503.ericsson.se (153.88.183.170) by ESESBMR505.ericsson.se (153.88.183.201) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Fri, 27 Jul 2018 10:16:07 +0200
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (153.88.183.157) by ESESBMB503.ericsson.se (153.88.183.170) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3 via Frontend Transport; Fri, 27 Jul 2018 10:16:07 +0200
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wLpGgGevGjHWEjV352pxWNkYk6upSmR4nmbaOTjWYrs=; b=FE3JNa0ucKrOEZuylkudz44Yps91eucWZfsuQCsN6SCIWyT4dwwP96iS7Gh/xOk4wuEEzbU/n+WScDlvnMH2afJV0qqMprjqIVW7VZd4YXVF/oQnkl0LoVKZhqzQHCeQr43Fwfa+sh1RjYoCaD+MSnEzHUTTpfcS2SgXADCC8tA=
Received: from VI1PR07MB4270.eurprd07.prod.outlook.com (20.176.6.151) by VI1PR07MB4126.eurprd07.prod.outlook.com (52.134.21.143) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.995.13; Fri, 27 Jul 2018 08:16:06 +0000
Received: from VI1PR07MB4270.eurprd07.prod.outlook.com ([fe80::5a9:39a3:8a0e:778b]) by VI1PR07MB4270.eurprd07.prod.outlook.com ([fe80::5a9:39a3:8a0e:778b%5]) with mapi id 15.20.0995.019; Fri, 27 Jul 2018 08:16:05 +0000
From: Francesco Lazzeri <francesco.lazzeri@ericsson.com>
To: Daniele Ceccarelli <daniele.ceccarelli@ericsson.com>, Igor Bryskin <Igor.Bryskin@huawei.com>, "sergio.belotti@nokia.com" <sergio.belotti@nokia.com>, "teas@ietf.org" <teas@ietf.org>, "teas-chairs@ietf.org" <teas-chairs@ietf.org>
CC: "Karthik.Sethuraman@necam.com" <Karthik.Sethuraman@necam.com>, "michael.scharf@nokia.com" <michael.scharf@nokia.com>, "vlopez@tid.es" <vlopez@tid.es>, "oscar.gonzalezdedios@telefonica.com" <oscar.gonzalezdedios@telefonica.com>, "dieter.beller@nokia.com" <dieter.beller@nokia.com>, Carlo Perocchio <carlo.perocchio@ericsson.com>, Leeyoung <leeyoung@huawei.com>, "ansha@google.com" <ansha@google.com>, "ricard.vilalta@cttc.es" <ricard.vilalta@cttc.es>, "shiyan49@chinaunicom.cn" <shiyan49@chinaunicom.cn>, Italo Busi <Italo.Busi@huawei.com>
Thread-Topic: [Teas] draft-ietf-teas-yang-path-computation-02 : path computation stateless RPC attributes
Thread-Index: AdQkvNfVJK0UViBSSaelX1MjWeaTXAACJLZwAAqffwAAIJt5cAACfTsA
Date: Fri, 27 Jul 2018 08:16:05 +0000
Message-ID: <VI1PR07MB4270CB8B54E4A5DDC587929C962A0@VI1PR07MB4270.eurprd07.prod.outlook.com>
References: <DB6PR0701MB27272B2E7AF6970DDF0C50F6912B0@DB6PR0701MB2727.eurprd07.prod.outlook.com>, <HE1PR07MB16753FC8D0D876FE54ADBD51F02B0@HE1PR07MB1675.eurprd07.prod.outlook.com> <etPan.5b59df86.6d3e5bb5.7394@localhost> <VI1PR07MB16807711951A9443E70E2428F02A0@VI1PR07MB1680.eurprd07.prod.outlook.com>
In-Reply-To: <VI1PR07MB16807711951A9443E70E2428F02A0@VI1PR07MB1680.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=francesco.lazzeri@ericsson.com;
x-originating-ip: [151.0.200.100]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR07MB4126; 6:iF8u9ckuXVkFzgc+vIId6FXiZWHv4DI93WkwvGpbg3vVvepTix3hnOEA0mrdFIopEtg59ZlX/HPOz5XuylzyV+kTW9jOnSCxYCw9ctbffM32qOQgitClkF/VCe8cFs2mqNuxXuQR9Di/FkDj70C5AGwMU/k8vID1RIrPDSFjhMy71cNNVp9Y9vfY3GMutkxWG52Ty28n1WjEhYDuCPdXq2YzrwpJbe3f1TQmjVCFBgGdvNfNGWjNtk5yzl4RPrkJt2zikDpSxMvd9jomCpA9yANz/hnyjodzJthaBJ1OKjsBUOqf6WFg94JDNv4VWJZj0xvfq+xRQR0/JX0wKvn0o02BBx8z6VotNsXSMUeJzBDPKsQpaAu2XqKIpWiO1TlkM7OlGy44hrPliI3Jo5GuDXqn7+nfzMOY6y0TA7ifYIWV2eXBtpv7sVWH0Yo7BwzwPDg/Gh7ngM7sIzftdMizdA==; 5:H9vpmsA/WvgM4wRfnjyYBMoEcHzY8UC8VoWW4f9dF9BCODwn7HiqKxHWQh+5O7in1GdqK5GoYiRxE2UjgP4svHEsIkO7zPZQIgyETfyice/1FFp8g1ygWnn2MU7UvOAh/OKmHVjBxgqGBPpy8vZ33/wb3Ox4QvcJigJr8sypxFQ=; 7:bJvdVKk6c1gljIAKU8SWx0EVcDwTKzRkw5OaQuo16NN3r/kTucEMYPhbP+Wvc6v7DXldDQ25F9IYqdbe7NNBzzzt9mHT0g6GEs5L9DhzGNo6NgrSgKWV4e9gewld4D5ZHd8MZjNZyKgN0CPWegESkDVbqOhxmES5VbzWVpnIU17nNuyoLlVV4+aPSbprljsdCaVcFb9XuuwYWVbCxtdhKRBmX/0EgO7SvlDJksAt/jaPoKJuz4GLvU6mwtyXcjvE
x-ms-exchange-antispam-srfa-diagnostics: SOS;SOR;
x-forefront-antispam-report: SFV:SKI; SCL:-1; SFV:NSPM; SFS:(10009020)(366004)(396003)(376002)(39860400002)(346002)(136003)(189003)(199004)(53754006)(229853002)(6306002)(81156014)(33656002)(93886005)(2906002)(6436002)(106356001)(2900100001)(54896002)(606006)(14444005)(7696005)(256004)(5250100002)(2501003)(446003)(6246003)(76176011)(14454004)(66066001)(97736004)(790700001)(26005)(102836004)(6116002)(3846002)(25786009)(478600001)(105586002)(68736007)(236005)(6506007)(4326008)(316002)(53946003)(9686003)(110136005)(54906003)(7416002)(8936002)(5660300001)(55016002)(966005)(2201001)(74316002)(81166006)(7736002)(99286004)(44832011)(86362001)(53546011)(486006)(53936002)(8676002)(11346002)(476003); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR07MB4126; H:VI1PR07MB4270.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
x-ms-office365-filtering-correlation-id: 532f4105-018d-4993-f7e1-08d5f39932f7
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600074)(711020)(2017052603328)(7153060)(7193020); SRVR:VI1PR07MB4126;
x-ms-traffictypediagnostic: VI1PR07MB4126:
x-microsoft-antispam-prvs: <VI1PR07MB4126A005C18F6181993A943B962A0@VI1PR07MB4126.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(37575265505322)(28532068793085)(40392960112811)(158342451672863)(166708455590820)(50582790962513)(82608151540597)(109105607167333)(195916259791689)(211936372134217);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(10201501046)(3002001)(93006095)(93001095)(3231311)(944501410)(52105095)(149027)(150027)(6041310)(20161123562045)(20161123560045)(20161123564045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011)(7699016); SRVR:VI1PR07MB4126; BCL:0; PCL:0; RULEID:; SRVR:VI1PR07MB4126;
x-forefront-prvs: 07467C4D33
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: OIvEbMA/lU/Jv7JV6tIM+iTFrmfDJiEyypGPVJ2GpHMwBkI4Vfbzh23jpiMWNRKZTEPv4Gr49uSy8su77ulMMJ4Gl4KfagUjNVn8LA/NxlKU24+RE004aNvgl69vdjcci8EKafslb657q+H2t/MZ94FxgCgMMQmlKqFV1CzQj400MkBNY8gOWV04PfgYTss+gOpEkyZj5j+6X8M/ShvVIikDwZbmJqeMN5P3k/23efcUVXCnOYAXSg9JlGZTsnFUfNqMUqPOYuhEfSkx+5R2tSgahY9FdW1UmLfex8epcIYIaRGU/IVIud28UtGQiO0mkuoyJI4E5BrDXUEz7WkeGLdeJn8reYpU3P1oRXockEM=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR07MB4270CB8B54E4A5DDC587929C962A0VI1PR07MB4270eurp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 532f4105-018d-4993-f7e1-08d5f39932f7
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Jul 2018 08:16:05.2229 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB4126
X-OriginatorOrg: ericsson.com
X-Brightmail-Tracker: H4sIAAAAAAAAA01Se0hTYRTvu4/tbrS4LZsHo6hBFLNMrT9uFj0o45Ik0QNqGjnzYqZO2bW0 ojBN02W1ZQ9dLS0vgXO9zSxftYxSEsvKwkokX5hpEqHOoeR2Z/jf73HO+Z3z8VG4MkfiR8Xp UziDXpeglsiJwj1P0pa/+aiNCBx7tJIxD/eTzF3hG8GMNwQx40NVJFOTZSaZKzdCGed7DdNX 1IOYWxMdiPkxYiQYS/tvKZNhfYYxWaOVBFNg3LxhFntpIA+xWa/OEGzxw8Ps6foBkhUEJ8ZW mn5h7Pe2FozNdeFs13g5vl2mla+N4RLijnCGFeui5Ad//fkpTT5nwdPaWm1kOmrrxoxIRgG9 Cuo+XZUYkZxS0q8QWJscuEiGETSNNaP/ZLDJRYhEwOB6ZwfpJgRtwqE9f1AqOmYMvpjSvdM6 EFwdEkh3jIRmYKz+GuHGPvQAghKz1l2E03YCci86pW5jDn0Icm1DmFgUD39LXkpEvAVaTfmT zdRk3mJ4mRPvlhV0JFhrCrzJ9zC4WGr3BMjofZBZ0e4JRrQKRhrtnpk47QttXUXeu2kQqptx Ec+Fvs4Jb70OHggWb80ieGebwvOhpeis5zWArpVCZ3YvIRpB8Lq0DheNagmY80ok7k2B3gYV GRpRNyIw5hilYoMG7lc9RiKOh7fdrbgJBVmmLSjiJCi3l5EWz6WzoaGwixD1APhy+ZJExP5w +2Y/LuLlUDDhIKbrxUhqQ3N5jo9OjA0ODuAMcQd4PkkfoOdSHqLJ//mi3BVYifp6NzoQTSH1 TMXqD9oIJak7wh9NdCCgcLWPwv55b4RSEaM7eowzJO03HE7geAeaRxFqXwUT/kirpGN1KVw8 xyVzhikXo2R+6ah00ZJ23/PbK86NjAt1e2XLNPmlSap91uMhJ1x/dsTttO0OC+FPn/D3V9R1 16aOOIdmqJ6fsvao7oQuiAyJTm/KCsvemHhh4a5RuUpo6QhPDN8TlUYeW/pUlqpdM+PDWL09 c5MrW9mo3zpYFtbrUK9TuNZ/LRyIuVwBXZack37JTjXBH9QFaXADr/sHxxCHyZsDAAA=
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/PkdpOHR91Xf2-XRaqdofllJTdUA>
Subject: Re: [Teas] draft-ietf-teas-yang-path-computation-02 : path computation stateless RPC attributes
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Jul 2018 08:16:18 -0000

I believe that the main point for deciding whether all the parameters (including name, description and so on) are needed or not for stateless path computation is the adoption of policies.
When I think about policies, I go to the definitions present in RFC3060, where policy information model is described.
According to 3060, basically policies are a (set of) rules where each rule is defined by enabling conditions (boolean expressions that "enable" the policy actions as soon as they become true) and policy actions (the behavior of the policy).
If we introduce this concept in path computation we could think for example to create two policies for a given domain D:


  *   The first one is enabled when the tunnel description contains the string "igor", and the relevant action is avoiding the node X inside the relevant domain.
  *   The second one is enabled when the tunnel description con contains the string "francesco", and the levant action is avoiding the node Y inside the relevant domain.

Let suppose we don't want to use stateless path computation (e.g. the domain is "white", so we have full topology information about it, or, if domain is "black" or "gray",  we just use its abstract connectivity).
We are asking for a new tunnel with description "igor".
Assuming the client (MDSC) knows nothing about those policies, it does path computation end-to-end using the topology information it collected,  and find that the best end-to-end path passing through D.
This path could well use node X: MDSC doesn't care, as it doesn't know that there is a policy installed in D the will ask to avoid that node.
When the end-to-end path needs to be deployed the tunnel requested on D will be created using a path avoding X, because the path creation is done by the controller of the domain D which is aware of and enforces that policy.
But, being this path different from the one computed during the end-to-end path computation, it could have different te-cost, igp-cost, latency and so on, leading to end-to-end figures possibly not in compliance with the end-to-end constraints.
In my view, this is not acceptable.

There are two ways to overcome this issue:


  *   Requesting path computation to the domain D also during end-to-end path computation. This is stateless path computation actually, and means that abstract topology is useless (as we actully are renouncing to use it).
  *   Exposing information about policies to the MDSC (or the client requesting end-to-end path computation). But this is still not enough: abstract topology should be also enhanced in order to take into account the possible policies enforced.
In this example we should have one (or more) abstract connectivity information for ingress-egress of D in case neither "igor" or "francesco" policies are enforced, "igor" is enforced, "francesco" is enforced, "igor" and "francesco" are enforced at once (e.g. asking a path having name "igor and francesco like ietf").
In this case policy information known to MDSC could be limited to the enabling conditions, which should also be referred by the relevant abstract connectivity, of course, so MDSC can select the right connectivity information.


In the past we already had discussions about the scalability of the abstract connectivity model, and basically the stateful model was born because this very reason. The presence of policies makes the scalability issue even more evident, multiplying each abstract link times the number of the combinations of the installed policies in the domain.

So, now we can:


  *   Renounce at all to use policies (or provide for them a definition different from RFC3060, please suggest). In this case not all the attributes present in ietf-te are managed by ietf-te-path-computation are needed.
  *   Use the policies and use only ietf-te-path-computation; this lead to a deep revision of the entire ietf model of the traffic and topology, because abstract connectivity information is no longer needed.
  *   Go ahead with ietf-te plus these policies and face either wrong results or the "dragon" of scalability.

My 2 cents
Francesco


From: Daniele Ceccarelli
Sent: 27 July, 2018 8:29 AM
To: Igor Bryskin <Igor.Bryskin@huawei.com>om>; sergio.belotti@nokia.com; teas@ietf.org; teas-chairs@ietf.org
Cc: Francesco Lazzeri <francesco.lazzeri@ericsson.com>om>; Karthik.Sethuraman@necam.com; michael.scharf@nokia.com; vlopez@tid.es; oscar.gonzalezdedios@telefonica.com; dieter.beller@nokia.com; Carlo Perocchio <carlo.perocchio@ericsson.com>om>; Leeyoung <leeyoung@huawei.com>om>; ansha@google.com; ricard.vilalta@cttc.es; shiyan49@chinaunicom.cn; Italo Busi <Italo.Busi@huawei.com>
Subject: RE: [Teas] draft-ietf-teas-yang-path-computation-02 : path computation stateless RPC attributes

Hi Igor,

what you are describing is just one of the use cases.


  *   Statefull path computation: I want the request/response to be guaranteed along the same path returned via path computation response.
  *   Stateless path computation: I don't really care about the path, I just want to know that a path exists with given characteristics between A and B.

Here we're talking about stateless path computation. As I said before if a H-PCE needs to find the best path across multiple domains and there are different links/nodes that allow going from one domain to the other, the number of iterations between the H-PCE and the various PCE is huge, hence it should be very simple and in 99% of the cases who cares about an intra domain path? The only thing that cares is that between two border nodes there are X Gbps with given TE characteristics.

Cheers
Daniele

From: Igor Bryskin <Igor.Bryskin@huawei.com<mailto:Igor.Bryskin@huawei.com>>
Sent: giovedì 26 luglio 2018 16:50
To: Daniele Ceccarelli <daniele.ceccarelli@ericsson.com<mailto:daniele.ceccarelli@ericsson.com>>; sergio.belotti@nokia.com<mailto:sergio.belotti@nokia.com>; teas@ietf.org<mailto:teas@ietf.org>; teas-chairs@ietf.org<mailto:teas-chairs@ietf.org>
Cc: Francesco Lazzeri <francesco.lazzeri@ericsson.com<mailto:francesco.lazzeri@ericsson.com>>; Karthik.Sethuraman@necam.com<mailto:Karthik.Sethuraman@necam.com>; michael.scharf@nokia.com<mailto:michael.scharf@nokia.com>; vlopez@tid.es<mailto:vlopez@tid.es>; oscar.gonzalezdedios@telefonica.com<mailto:oscar.gonzalezdedios@telefonica.com>; dieter.beller@nokia.com<mailto:dieter.beller@nokia.com>; Carlo Perocchio <carlo.perocchio@ericsson.com<mailto:carlo.perocchio@ericsson.com>>; Leeyoung <leeyoung@huawei.com<mailto:leeyoung@huawei.com>>; ansha@google.com<mailto:ansha@google.com>; ricard.vilalta@cttc.es<mailto:ricard.vilalta@cttc.es>; shiyan49@chinaunicom.cn<mailto:shiyan49@chinaunicom.cn>; Italo Busi <Italo.Busi@huawei.com<mailto:Italo.Busi@huawei.com>>
Subject: Re: [Teas] draft-ietf-teas-yang-path-computation-02 : path computation stateless RPC attributes

Daniele,
What is the point of path computation request / response if it can not be guaranteed, generally speaking, that a TE tunnel configured on a given network will take the same path as returned via path computation response?
The policies installed in the network are not expected to be known to all clients, but the policies could significantly  influence  on tunnel routing.
All we are saying is that when the same information is passed for tunnel configuration and in path computation request for the tunnel  in questuon, there will be no reason for a path computation return one path, while the actual tunnel, when requested,  taking  a different one.
Note also that all extra parameters we are talking about are optional and could be omitted in path computation RPC if it is known, for example, from experience that they do not affect the actual tunnel routing.

Igor
From:Daniele Ceccarelli
To:Belotti, Sergio (Nokia - IT/Vimercate),TEAS WG,teas-chairs@ietf.org,
Cc:Francesco Lazzeri,Sethuraman, Karthik,Scharf, Michael (Nokia - DE/Stuttgart),Victor Lopez,OSCAR GONZALEZ DE DIOS (oscar.gonzalezdedios@telefonica.com),Beller<mailto:oscar.gonzalezdedios@telefonica.com),Beller>, Dieter (Nokia - DE/Stuttgart),Carlo Perocchio,Leeyoung,Anurag Sharma (ansha@google.com),Ricard<mailto:ansha@google.com),Ricard> Vilalta,shiyan49@chinaunicom.cn,Italo Busi,
Date:2018-07-26 05:54:16
Subject:Re: [Teas] draft-ietf-teas-yang-path-computation-02 : path computation stateless RPC attributes

Hi,

>The question is: are there benefits in including in input of Path Computation Request RPC also te-tunnel attributes without any foreseen recommended usage by path computation engine?

Absolutely no.

Main reasons:

  1.  Policies might not be shared with the MDSC
  2.  Policies may be different from PNC to PNC
  3.  A high number of path computation results will be discarded (stateless path computation is needed also by the MDSC to understand what are the different options to get from a node in a domain to another node in a different domain and possibly through a number of other domains...hence a high number of comination)
  4.  Last but not least simplification.

BR
Daniele

From: Belotti, Sergio (Nokia - IT/Vimercate) <sergio.belotti@nokia..com<mailto:sergio.belotti@nokia..com>>
Sent: giovedì 26 luglio 2018 11:00
To: TEAS WG <teas@ietf.org<mailto:teas@ietf.org>>; teas-chairs@ietf.org<mailto:teas-chairs@ietf.org>
Cc: Italo Busi <Italo.Busi@huawei.com<mailto:Italo.Busi@huawei.com>>; Belotti, Sergio (Nokia - IT/Vimercate) <sergio.belotti@nokia.com<mailto:sergio.belotti@nokia.com>>; Francesco Lazzeri <francesco.lazzeri@ericsson.com<mailto:francesco.lazzeri@ericsson.com>>; Carlo Perocchio <carlo.perocchio@ericsson.com<mailto:carlo.perocchio@ericsson.com>>; Scharf, Michael (Nokia - DE/Stuttgart) <michael.scharf@nokia.com<mailto:michael.scharf@nokia.com>>; Anurag Sharma (ansha@google.com<mailto:ansha@google.com>) <ansha@google.com<mailto:ansha@google.com>>; ylee@huawei.com<mailto:ylee@huawei.com>; shiyan49@chinaunicom.cn<mailto:shiyan49@chinaunicom.cn>; Ricard Vilalta <ricard.vilalta@cttc.es<mailto:ricard.vilalta@cttc.es>>; OSCAR GONZALEZ DE DIOS (oscar.gonzalezdedios@telefonica.com<mailto:oscar.gonzalezdedios@telefonica.com>) <oscar.gonzalezdedios@telefonica.com<mailto:oscar.gonzalezdedios@telefonica.com>>; Victor Lopez <vlopez@tid.es<mailto:vlopez@tid.es>>; Daniele Ceccarelli <daniele.ceccarelli@ericsson.com<mailto:daniele.ceccarelli@ericsson.com>>; Beller, Dieter (Nokia - DE/Stuttgart) <dieter.beller@nokia.com<mailto:dieter.beller@nokia.com>>; Sethuraman, Karthik <Karthik.Sethuraman@necam.com<mailto:Karthik.Sethuraman@necam.com>>
Subject: draft-ietf-teas-yang-path-computation-02 : path computation stateless RPC attributes

Hi all,

After the discussion held during the last TEAS WG session in IETF102 and some offline talks, we are trying to summarize the questions that we need to answer to resolve the open issue 31 (reference for background https://github.com/rvilalta/ietf-te-path-computation/issues/31) .

The question is: are there benefits in including in input of Path Computation Request RPC also te-tunnel attributes without any foreseen recommended usage by path computation engine? For example this is the case of administration attributes such as 'tunnel description' or of those attributes that are relevant only for the provisioning phase e.g provisioning-state... Please consider that the question is in the scope of a 'Stateless-Path-Computation' service: no state or data is saved by PCE after RPC output is returned to the client.

One of the main use case for the Path Computation RPC design is to support multi domain path computation. In this case the MDSC (the RPC client) addresses to a PNC (the RPC server) a request to compute a path within the PNC native/controlled topology during the quest for a multi-domain path at a given time T1; at a later time T2 (once, for example, the e2e path is identified) MDSC requests southbound to PNC per domain Tunnel setup (the segments of the multi-domain tunnel) with either the same or different metrics and constraints (MDSC implementation decision), to guarantee that the PNC would setup a path equivalent or better than the one computed at time T1.

Example: the MDSC computes a multi-domain end-to-end path between points A and Z and selects a path having te-metric 100. The path A-Z passes through the  domain controlled by PNC  X, entering in B and exiting in C, for which path computation RPC has returned a B-C path with te-metric 20. When asking  PNC X to setup the path B-C, a constraint on te-metric must be provided in order to avoid PNC X finding a suitable path satisfying all the other constraints of the end-to-end path but with te-metric higher than 20. If a different path is found with a metric < 20, that's fine. So, it's not essential that the same identical path is produced at the second path computation. The only requirement is on its metrics.

 Depending on the abstraction level applied by the domain controller the client may never know the actual computed path: the only important requirement is that the path metrics and constraints are met.
Therefore it is not necessary to guaranteed that the path setup at time T2 is exactly the same as the path computed at time T1 but only that it has the same or better metrics.

Regarding the policies, it has been said in the ietf meeting (see the relevant transcript) that they allow a "private" behavior of the server triggered by a condition depending possibly on any attribute of the tunnel request. This actually prevents a client application to perform autonomously the end-to-end path computation (e.g. using detailed connectivity matrix), as it doesn't know how each domain will behave when recomputing the tunnel for deployment (and so applying policies the client doesn't know and which could be even different for different domains).
In order to prevent this, policies should be explicitly shared with the clients, and be included in the detailed connectivity matrix information exposed by each domain to take into account not only the possible alternative path computation parameters, but also all the possible combinations of applicable policies. The client shall then select the suitable detailed connectivity matrix taking into account both the path computation parameters AND the applicable policies.
When such policy attributes are defined, they will be included in the path computation RPC.

Italo and Sergio (on behalf of co-authors/contributors)

Sergio Belotti
Senior System Engineer and Standardization Architect
IP/Optical Networks, Optics BU
Nokia
M: +39-335761776
Via Energy Park, 20871 Vimercate (MB) , Italy
sergio.belotti@nokia.com<mailto:sergio.belotti@nokia.com>