Re: [Teas] WG Last Call: draft-ietf-teas-gmpls-controller-inter-work-09
"Linyi (Yi)" <yi.lin@huawei.com> Thu, 16 February 2023 07:46 UTC
Return-Path: <yi.lin@huawei.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B4A9DC15171F; Wed, 15 Feb 2023 23:46:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.197
X-Spam-Level:
X-Spam-Status: No, score=-4.197 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9_A-2pLZIWdb; Wed, 15 Feb 2023 23:46:07 -0800 (PST)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1A3AFC15171B; Wed, 15 Feb 2023 23:46:06 -0800 (PST)
Received: from lhrpeml500004.china.huawei.com (unknown [172.18.147.206]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4PHRm26Bf7z6J9hM; Thu, 16 Feb 2023 15:44:18 +0800 (CST)
Received: from canpemm500002.china.huawei.com (7.192.104.244) by lhrpeml500004.china.huawei.com (7.191.163.9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.17; Thu, 16 Feb 2023 07:46:02 +0000
Received: from dggpemm100007.china.huawei.com (7.185.36.116) by canpemm500002.china.huawei.com (7.192.104.244) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.17; Thu, 16 Feb 2023 15:46:00 +0800
Received: from dggpemm100007.china.huawei.com ([7.185.36.116]) by dggpemm100007.china.huawei.com ([7.185.36.116]) with mapi id 15.01.2507.017; Thu, 16 Feb 2023 15:46:00 +0800
From: "Linyi (Yi)" <yi.lin@huawei.com>
To: "adrian@olddog.co.uk" <adrian@olddog.co.uk>
CC: 'TEAS WG Chairs' <teas-chairs@ietf.org>, 'Vishnu Pavan Beeram' <vishnupavan@gmail.com>, 'TEAS WG' <teas@ietf.org>
Thread-Topic: [Teas] WG Last Call: draft-ietf-teas-gmpls-controller-inter-work-09
Thread-Index: Adk6yTwt8a9+A8pGQjCZz8yiz017HA==
Date: Thu, 16 Feb 2023 07:46:00 +0000
Message-ID: <2ac951e2c8e5456db4616642197ff962@huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [10.50.76.143]
Content-Type: multipart/mixed; boundary="_004_2ac951e2c8e5456db4616642197ff962huaweicom_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/bYaTvx5qoUCzOkPgLOSFIoagy4g>
Subject: Re: [Teas] WG Last Call: draft-ietf-teas-gmpls-controller-inter-work-09
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Feb 2023 07:46:11 -0000
Dear Adrian, Thank you for your detailed review on the draft. Please see below the replies in-line with [Authors]. We’ll post the new revision (-10) before the deadline of the upcoming IETF 116th, if you could agree on our replies and changes. Thank you. B.R. Yi LIN HUAWEI Technologies Co., Ltd. Address: Huawei Industrial Base Bantian Longgang Shenzhen 518129, P.R.China http://www.huawei.com<http://www.huawei.com/> --------------------------------------------------------------------------------------------- This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it! 发件人: Teas [mailto:teas-bounces@ietf.org] 代表 Adrian Farrel 发送时间: 2023年1月1日 01:32 收件人: 'Vishnu Pavan Beeram' <vishnupavan@gmail.com>; 'TEAS WG' <teas@ietf.org> 抄送: 'TEAS WG Chairs' <teas-chairs@ietf.org> 主题: Re: [Teas] WG Last Call: draft-ietf-teas-gmpls-controller-inter-work-09 Hi all, I've read this draft as part of working group last call, and I think is ready to progress for publication. Plenty of nits, below. Happy New Year, Adrian === Throughout: According to RFC 6241, you should use "NETCONF" According to RFC 8040, you should use "RESTCONF" [Authors] OK --- Title s/System/Systems/ [Authors] OK --- Abstract s/issue/issues/ s/-vendor/-vendor,/ Should expand "ACTN" [Authors] OK --- 1. s/More generic description for/A more generic description of/ s/with centralized/with a centralized/ s/in transport/in a transport/ [Authors] OK --- 2.1 the controller can also collect node and link resources in the network Technically, the controller doesn't collect the resources. Perhaps... the controller can also collect information about node and link resources in the network [Authors] OK --- 2.2 s/and standard/and a standard/ [Authors] OK --- OLD 2.3. GMPLS Control Interwork with Centralized Controller System NEW 2.3. GMPLS Control Interworking with a Centralized Controller System END [Authors] OK --- 2.3 s/Besides the GMPLS/Besides GMPLS/ s/a NE/an NE/ s/initiate LSP/initiate LSPs/ s/element were/elements were/ s/control can be purely/control is purely/ s/GMPLS capability/GMPLS capabilities/ s/LSAs for/LSAs, for/ s/using for example/using, for example,/ s/the e.g. [RFC8795] Yang/the, e.g., [RFC8795] YANG/ s/domain and export/domain, and export/ s/create topology graph/create a topology graph/ s/To setup a/To set up a/ s/exploit e.g. [TE-Tunnel] Yang/exploit, e.g., [TE-Tunnel] YANG/ s/between the GMPLS/between GMPLS/ s/domain(s)/domains/ (twice) s/controller(s)/controllers/ s/if exists/if it exists/ [Authors] OK --- Figure 1 s/interworks/interworking/ [Authors] OK --- 3. s/need/needs/ [Authors] OK --- 3.1 s/property/properties/ [Authors] OK --- 4. s/In centralized/In a centralized/ s/system, centralized/system, the centralized/ s/at the GMPLS network/in the GMPLS network/ [Authors] OK --- 4.1 s/OSPF protocol/OSPF/ OTN and WSON need to be expanded s/flexi-grid network/flexi-grid networks/ [Authors] OK --- 4.3 s/Besides, these/These/ [Authors] OK --- 5. s/Yang/YANG/ [Authors] OK --- In section 5 where you say that a controller can interact with another controller using [PAT-COMP], why do you not also mention that controllers can interact with each other using PCEP? [Authors] We do not mention PCEP here for the reason that we had a specific section (Section 5.2) describing PCE and PCEP usage. The YANG for path computation request is exactly in the scope of this paragraph. So we have 3 methods for path computation: 1) YANG path computation request (in Section 5) 2) GMPLS source node (in Section 5.1) 3) PCE and PCEP (in Section 5.2) We suggest to make the text originally in Section 5 as Section 5.1, and change the original Section 5.1 and 5.2 to Section 5.2 and 5.3 accordingly. I.e.: OLD 5. Path Computation Once a controller learns … 5.1. Constraint-based Path Computing in GMPLS Control In GMPLS control, a routing path … 5.2. Path Computation Element (PCE) PCE has been introduced … NEW 5. Path Computation 5.1 Controller-based Path Computation Once a controller learns … 5.2. Constraint-based Path Computing in GMPLS Control In GMPLS control, a routing path … 5.3. Path Computation Element (PCE) PCE has been introduced … END --- 5.1 In GMPLS control, a routing path is computed by the ingress node [RFC3473] and is based on the ingress node TED. Constraint-based path computation is performed according to the local policy of the ingress node. This *may* be true, but it is also possible for the request to set up the LSP to arrive with the path explicitly specified. This option is available on most CLI implementations. [Authors] Since this section is about constraint-based path computing, we think it’s not necessary to mention the option about explicit ERO. So how about: OLD In GMPLS control, a routing path is computed by the ingress node [RFC3473] and is based on the ingress node TED. Constraint-based path computation is performed according to the local policy of the ingress node. NEW In GMPLS control, a routing path may be computed by the ingress node ([RFC3473]) based on the ingress node TED. In this case, constraint-based path computation is performed according to the local policy of the ingress node. END --- 5.2 s/compute path/compute paths/ OLD the Traffic Engineering Database (TED), which maintains the link resources in the network NEW the Traffic Engineering Database (TED), which maintains a view of the link resources in the network END s/efficiently improve/efficiently improves/ s/In PCE Initiation/With PCE-Initiated LSPs/ s/PCC to/PCC to perform/ s/In centralized/In a centralized/ s/architecture can be found at/architectures can be found in/ [Authors] OK --- 6. s/setup LSPs/set up LSPs/ [Authors] OK --- 7.1 s/element(s)/elements/ [Authors] OK --- 7.2 s/request coordination/require coordination/ s/of such asymmetrical segment/of such asymmetrical segments/ s/links are also needed/links also need/ s/If the resource of inter-domain/If the resources of inter-domain/ s/using IETF Topology model/using the IETF Topology YANG model/ s/Once that the/Once the/ s/boarder/border/ (four times) [Authors] OK --- 7.2 option 2) For example, the path segment 1 and 3 in Figure 3 are asymmetrical segments, because one end of the segment requires mapping GE into ODU0, while the other end of the segment requires setting up ODU0 cross-connect. The introduction of GE and ODU0 in this example suddenly seems very technical when we were previously happy with abstract examples. While this is certainly an example, would it be possible to generalise it? [Authors] Agree to generalise the example, by using “client signal” instead of “GE”, and using “Server layer tunnel” instead of “ODU0”. Please see below: OLD Note that path segments in the source domain and the destination domain are “asymmetrical” segments, because the configuration of client signal mapping into server layer tunnel is needed at only one end of the segment, while configuration of server layer cross- connect is needed at the other end of the segment. For example, the path segment 1 and 3 in Figure 3 are asymmetrical segments, because one end of the segment requires mapping GE into ODU0, while the other end of the segment requires setting up ODU0 cross-connect. +------------------------+ | Orchestrator(MD) | +-----------+------------+ | +---------------+ +------V-------+ +---------------+ | Controller | | Controller | | Controller | +-------+-------+ +------+-------+ +-------+-------+ | | | +--------V--------+ +-------V--------+ +--------V--------+ |Client | | | | Client| |Signal Domain 1| | Domain 2 | |Domain 3 Signal| |(GE) | | | | (GE) | | | ODU0 tunnel| | | | | | |+-+-+ ^ | | | | +-+-+| || | | +--+ |+--+| |+--+ +--+ +--+| |+--+ +--+ | | || || | | | | || || || | | | | || || | | | | | || || ******************************************************** || || | | | | || . || | | | | || . || | | | | || |+---+ +--+ +--+| . |+--+ +--+ +--+| . |+--+ +--+ +---+| +-----------------+ . +----------------+ . +-----------------+ . . . . .<-Path Segment 1->.<--Path Segment 2-->.<-Path Segment 3->. Figure 3: Example of asymmetrical path segment NEW Note that path segments in the source domain and the destination domain are “asymmetrical” segments, because the configuration of client signal mapping into server layer tunnel is needed at only one end of the segment, while configuration of server layer cross- connect is needed at the other end of the segment. See the example in Figure 3. +------------------------+ | Orchestrator(MD) | +-----------+------------+ | +---------------+ +------V-------+ +---------------+ | Controller | | Controller | | Controller | +-------+-------+ +------+-------+ +-------+-------+ | | | +--------V--------+ +-------V--------+ +--------V--------+ |Client Domain 1| | Domain 2 | | Domain 3 Client| |Signal | | | | Signal| | | Server layer| | | | | | | | tunnel | | | | | | |+-+-+ ^ | | | | +-+-+| || | | +--+ |+--+| |+--+ +--+ +--+| |+--+ +--+ | | || || | | | | || || || | | | | || || | | | | | || || ******************************************************** || || | | | | || . || | | | | || . || | | | | || |+---+ +--+ +--+| . |+--+ +--+ +--+| . |+--+ +--+ +---+| +-----------------+ . +----------------+ . +-----------------+ . . . . .<-Path Segment 1->.<--Path Segment 2-->.<-Path Segment 3->. Figure 3: Example of asymmetrical path segment END --- 7.2 Please expand BRPC and H-PCE on first use [Authors] OK --- 7.3.1 Please expand NMS and VNTM [Authors] OK --- 7.3.2 s/then can/can then/ Please expand ERO [Authors] OK --- 7.3.3 Please expand FA/FA-LSP s/separated GMPLS/separate GMPLS/ s/one of the both layer/one of the layer/ [Authors] OK --- 7.4.2 If you are going to mention APS, shouldn't you reference RFCs 7271 and 8234? [Authors] Added the references to [RFC7271] and [RFC8234]. --- 7.4.2 To avoid making a recommendation from this Informational document and so bringing up the debate about using "RECOMMENDED", how about... OLD In the scenario of interworking between GMPLS and centralized controller system, it is recommended to still use these distributed mechanisms rather than centralized mechanism (i.e., the controller triggers the protection switchover). This can significantly shorten the protection switching time. NEW In the scenario of interworking between GMPLS and centralized controller system, using these distributed mechanisms rather than centralized mechanism (i.e., the controller triggers the protection switchover) can significantly shorten the protection switching time. END [Authors] OK --- 7.4.3 - Pre-planned LSP rerouting (including shared-mesh restoration): In pre-planned protecting, the protecting LSP is established only in the control plane in the provisioning phase, and will be activated in the data plane once failure occurs. This is confusing! The bullet heading uses "rerouting" and the text says "protecting" (should be "protection" not "protecting"). Is it intentional that two terms are used, or should they be the same? (Compare with the next bullet.) [Authors] These terms (working LSP, protecting LSP) are from RFC4872. We suggest to keep consistency with that RFC on the terms used for pre-planned LSP rerouting. Please see Section 8 of RFC4872: https://www.rfc-editor.org/rfc/rfc4872#section-8 PS: We’ve noticed that RFC4872 uses “protecting LSP” in most places. Only one “protection LSP” is used in Section 9. --- 7.4.5 Another case of "recommended" can be handled as... OLD If a PLR detects that failure occurs, it is recommended to still use the distributed mechanisms described in [RFC4090] to switch the traffic to the related detour LSP or bypass tunnel, rather than in a centralized way. This can significantly shorten the protection switching time. NEW If a PLR detects that failure occurs, it may significantly shorten the protection switching time by using the distributed mechanisms described in [RFC4090] to switch the traffic to the related detour LSP or bypass tunnel, rather than in a centralized way. OLD [Authors] OK --- 7.5 Once a controller is shut down, the network should operate as well. I think this is ambiguous. Clearly, with the controller shut down you cannot expect the same level of operation (no new LSPs, for example). So you may mean... If the controller is shut down or disconnected from the network, it is highly desirable that all of the services currently provisioned in the network continue to function and carry traffic. Furthermore, protection switching to pre-established paths should also function. Additionally, it is desirable to provide protection mechanisms, such as redundancy, so that full operational control can be maintained even when one instance of the controller fails. [Authors] OK --- 7.5 s/It can be/This can be/ [Authors] OK From: Teas <teas-bounces@ietf.org<mailto:teas-bounces@ietf.org>> On Behalf Of Vishnu Pavan Beeram Sent: 28 December 2022 12:11 To: TEAS WG <teas@ietf.org<mailto:teas@ietf.org>> Cc: TEAS WG Chairs <teas-chairs@ietf.org<mailto:teas-chairs@ietf.org>> Subject: [Teas] WG Last Call: draft-ietf-teas-gmpls-controller-inter-work-09 All, This starts a three-week working group last call on https://datatracker.ietf.org/doc/draft-ietf-teas-gmpls-controller-inter-work/ The working group last call ends on January 18th, 2023. Please send your comments to the working group mailing list. Positive comments, e.g., "I've reviewed this document and believe it is ready for publication", are welcome! This is useful and important, even from authors. Note: There is no IPR disclosed for this draft. Thank you, Pavan and Lou
- [Teas] WG Last Call: draft-ietf-teas-gmpls-contro… Vishnu Pavan Beeram
- Re: [Teas] WG Last Call: draft-ietf-teas-gmpls-co… Adrian Farrel
- [Teas] 答复: WG Last Call: draft-ietf-teas-gmpls-co… Zhenghaomian
- Re: [Teas] WG Last Call: draft-ietf-teas-gmpls-co… Sergio Belotti (Nokia)
- Re: [Teas] WG Last Call: draft-ietf-teas-gmpls-co… Vishnu Pavan Beeram
- Re: [Teas] WG Last Call: draft-ietf-teas-gmpls-co… Dieter Beller
- Re: [Teas] WG Last Call: draft-ietf-teas-gmpls-co… Vishnu Pavan Beeram
- Re: [Teas] WG Last Call: draft-ietf-teas-gmpls-co… Linyi (Yi)
- Re: [Teas] WG Last Call: draft-ietf-teas-gmpls-co… Linyi (Yi)
- Re: [Teas] WG Last Call: draft-ietf-teas-gmpls-co… Adrian Farrel
- Re: [Teas] WG Last Call: draft-ietf-teas-gmpls-co… Linyi (Yi)
- Re: [Teas] WG Last Call: draft-ietf-teas-gmpls-co… Adrian Farrel