Re: [trill] Explaining three options for upgrading to FGL (fine-grained-labeling)

Donald Eastlake <d3e3e3@gmail.com> Tue, 29 January 2013 20:50 UTC

Return-Path: <d3e3e3@gmail.com>
X-Original-To: trill@ietfa.amsl.com
Delivered-To: trill@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1DAE221F892F for <trill@ietfa.amsl.com>; Tue, 29 Jan 2013 12:50:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.991
X-Spam-Level:
X-Spam-Status: No, score=-102.991 tagged_above=-999 required=5 tests=[AWL=0.608, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R69uIXVDljGG for <trill@ietfa.amsl.com>; Tue, 29 Jan 2013 12:50:19 -0800 (PST)
Received: from mail-ob0-f180.google.com (mail-ob0-f180.google.com [209.85.214.180]) by ietfa.amsl.com (Postfix) with ESMTP id 3922121F891D for <trill@ietf.org>; Tue, 29 Jan 2013 12:50:19 -0800 (PST)
Received: by mail-ob0-f180.google.com with SMTP id ef5so878319obb.25 for <trill@ietf.org>; Tue, 29 Jan 2013 12:50:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:mime-version:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=f/qtXwy7NOIw47caDtkR4l6fn8uR7tBspFs5cQXbQJ8=; b=LomFr/ZE8fEFN2pRgCe3jwA5WtcyNUS0Sd3pdrnlimbdRDyxpyIPKWWOcwF3GHOKU5 3lQINBkjFaB58lBSMP5Vg3SuLnAmxIjtO1+cVcYVmCYvHxHaROsqxVkS2BDYtSKjWfh7 YBw8thfyEBtSIts1pBDytJHrn3M2rXjssCDvjGHAC/bkrRhrsQ4ejUMmNCdiF/JT1rtD iX1wHZdwIETfjrVh8DNkhaMRS2Mapt1I+9FNisLpwmX/dIOe3bxNzxQNpFOC50PrWkjW EaPUsdqreBHyaNZx9PAm4He6WkvBhEbT6FljFiH7A0hZswWA2xTCOmX3EMdeaq6rkGJG R0kw==
X-Received: by 10.182.48.37 with SMTP id i5mr1887042obn.18.1359492618680; Tue, 29 Jan 2013 12:50:18 -0800 (PST)
MIME-Version: 1.0
Received: by 10.76.98.168 with HTTP; Tue, 29 Jan 2013 12:49:58 -0800 (PST)
In-Reply-To: <CAHD03N89RNX4=XxRZpD+Y2PCktYf-FtVjyYJ5oFS3dui3SsXaA@mail.gmail.com>
References: <CAFOuuo67iBR2JkDtwPFCkrKHs3Fp4U_L1jkmNz5sfht6y05YMw@mail.gmail.com> <CA+-tSzx0E3J4i5Dvfbj4egruCeGi7z1se1Jn5RXtx3RedQLPdg@mail.gmail.com> <CAHD03N89RNX4=XxRZpD+Y2PCktYf-FtVjyYJ5oFS3dui3SsXaA@mail.gmail.com>
From: Donald Eastlake <d3e3e3@gmail.com>
Date: Tue, 29 Jan 2013 15:49:58 -0500
Message-ID: <CAF4+nEG7YKGzGmObAMaOxackivjJsALymqHX=6PKBd5qU-Z+zQ@mail.gmail.com>
To: Ayan Banerjee <ayabaner@gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"
Cc: Anoop Ghanwani <anoop@alumni.duke.edu>, Radia Perlman <radiaperlman@gmail.com>, "trill@ietf.org" <trill@ietf.org>
Subject: Re: [trill] Explaining three options for upgrading to FGL (fine-grained-labeling)
X-BeenThere: trill@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Developing a hybrid router/bridge." <trill.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/trill>, <mailto:trill-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/trill>
List-Post: <mailto:trill@ietf.org>
List-Help: <mailto:trill-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/trill>, <mailto:trill-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Jan 2013 20:50:20 -0000

Hi Ayan,

On Tue, Jan 29, 2013 at 2:45 PM, Ayan Banerjee <ayabaner@gmail.com> wrote:
> I agree with Anoop here.
>
> I think that we are describing a network that is FGL-safe and ready and then
> switch to FGL-mode. However, we need some statements to account for a
> VL-node coming-in/leaving-the network due to a flaky link.

The general assumption is that you are migrating from VL to FGL. First
you migrate to FGL-safe. Then you unleash the FGL traffic, by
configuring FGL ports, which isolates any remaining (FGL-unsafe) VL
switches while still being able to handle VL traffic between VL ports
on FGL-safe switches.

After you have unleashed FGL traffic, it would certainly be possible
that a VL switch could be attached to the network or come and go due
to a flakey link, but this would have almost no effect. With FGL
traffic being handled, VL switches are isolated.

Thanks,
Donald
=============================
 Donald E. Eastlake 3rd   +1-508-333-2270 (cell)
 155 Beaver Street, Milford, MA 01757 USA
 d3e3e3@gmail.com

> Thanks,
> Ayan
>
>
>
> On Tue, Jan 29, 2013 at 6:42 AM, Anoop Ghanwani <anoop@alumni.duke.edu>
> wrote:
>>
>> At noted, option 1 looks dangerous so that should be ruled out.
>>
>> Option 2 seems reasonable.  It might be useful to clarify a couple of
>> things:
>> - Can the FGL-safe campus have both VLAN & FGL frames going around?
>> - Do all RBridges need to agree on when the campus is FGL-safe?  I would
>>   hope not.  But the problem I'm thinking about is where RB1 thinks
>> the campus is
>>   FGL-safe and starts announcing attachment to FGL links, but RB2 hadn't
>> yet
>>   concluded that process and it see RB3 which happens to be VL.
>>
>> Option 3 seems to introduce more complexity to solve this problem than
>> is necessary.
>>
>> Anoop
>>
>> On Fri, Jan 25, 2013 at 11:00 AM, Radia Perlman <radiaperlman@gmail.com>
>> wrote:
>> > I'm going to summarize three options for phasing-in FGL, and explain the
>> > tradeoffs, to help people have informed opinions about the implications
>> > of
>> > the three approaches.  There are infinite variations, of course, but as
>> > I
>> > said, I'll describe three main ones.
>> >
>> > Option 1:  Original draft, no changes.  There are two types of RBridges.
>> > The
>> > first type is "VL" which only understands VLAN tags, and have unknown
>> > and
>> > possibly dangerous behavior when they receive an FGL-labeled packet.
>> > (e.g.,
>> > decapsulate a packet onto a link where it is not allowed, or mistakenly
>> > prune a multicast so it does not reach everywhere it should). The second
>> > type is "FGL".  FGL guys need to do two things: 1) understand FGL tags
>> > and
>> > do the right thing with them, and 2) ostrasize VL guys...meaning that an
>> > FGL
>> > guy refuses to form an adjacency with a VL guy.  This option is very
>> > simple
>> > for implementers of FGL, but the implication is that you have to upgrade
>> > your entire campus to FGL at once.  There is no coexistence.
>> >
>> > Option 2: Two types of RBridges, but the 2nd type is different from
>> > option
>> > 1.  VL guys of course are the same as in option 1...they cannot be
>> > trusted
>> > with FGL frames. The second type I will call "FGL-safe". An FGL-safe
>> > RBridge
>> > must advertise in its LSP that it is FGL-safe, and it must not "do
>> > anything
>> > bad" with FGL frames, meaning that it is allowed to ignore pruning of
>> > FGL
>> > (or even VL frames) entirely...it just can't falsely drop FGL frames.
>> > And
>> > it must not decapsulate an FGL frame onto a link for which that FGL
>> > frame
>> > doesn't belong. In this option, all RBridges must be upgraded to
>> > FGL-safe,
>> > but it need not happen instantaneously...it's fine to mix FGL-safe
>> > RBridges
>> > with VL RBridges...it's just not safe to inject FGL frames yet.  Once
>> > all
>> > the RBridges have been upgraded to be FGL-safe, then edge RBridges can
>> > start
>> > announcing they are connected to an FGL link, and can start injecting
>> > FGL
>> > packets.  It is considered a misconfiguration if you start injecting FGL
>> > frames before all the RBridges are upgraded to FGL-safe, so an
>> > additional
>> > chore for an FGL-safe RBridge R1 is to examine LSPs, and if any RBridge
>> > claims to be attached to an FGL link, then R1 must ostrasize any VL
>> > neighbors.  (don't start ostrasizing VL guys until it is necessary
>> > because
>> > of actually starting to use FGL frames, in other words). This option is
>> > more
>> > work for the upgraded RBridges than option 1, and there still isn't good
>> > coexistence with VL guys long-term (as option 3 will), but it does allow
>> > upgrading RBridges one by one in a working campus without causing
>> > disruption.
>> >
>> > Option 3: Two types of RBridges.  VL, of course, is the same as in
>> > options 1
>> > and 2.  This option makes FGL guys do more work, but allows maximal long
>> > term coexistence of VL and FGL guys. In this option, FGL guys calculate
>> > unicast paths to FGL edge guys that avoid any VL guys, and calculate at
>> > least one FGL-friendly multicast tree that also avoids any VL guys. So
>> > let's
>> > say R1 is an FGL guy.  R1 discards all LSPs from VL guys (ones that
>> > don't
>> > advertise FGL capability in their LSP), when calculating paths to other
>> > FGL
>> > RBridges. Then R1 calculates paths to the VL guys using all LSPs.
>> > Likewise,
>> > when calculating an FGL-friendly tree, R1 calculates a tree through only
>> > FGL
>> > guys.   This option is more work for the upgraded RBridges (because they
>> > have to calculate Dijkstra in two different ways, one for reaching VL
>> > guys,
>> > and one for reaching FGL guys).  However, it does allow having long-term
>> > coexistence with VL guys.  For instance, you could forever keep some VL
>> > edge
>> > RBridges that communicate just fine through an FGL core.  They can stay
>> > there forever, and still be able to communicate through the core to all
>> > the
>> > links attaching to their VLAN.
>> >
>> > _______________________________________________
>> > trill mailing list
>> > trill@ietf.org
>> > https://www.ietf.org/mailman/listinfo/trill
>> >
>> _______________________________________________
>> trill mailing list
>> trill@ietf.org
>> https://www.ietf.org/mailman/listinfo/trill
>
>
>
> _______________________________________________
> trill mailing list
> trill@ietf.org
> https://www.ietf.org/mailman/listinfo/trill
>