Hi Levente,

"I did not consider any possible way of determining PQ-nodes, only used the 
description of P and Q spaces from the original draft, and from my research on 
this topic, where every kind of spaces were defined in cost terms to easily 
analyze the network theoretically."

The original Q-space definition is...
"the set of routers which can reach the primary neighbor E can without 
traversing the link (S-E) being protected"

What will the definition for Q-space definition in this case? Do you mean...
" the set of routers than can reach the primary neighbor E without traversing 
any links originating from E"? That will leave no routers in the set.. Right?

What makes sense is "the set of routers that can reach destination without 
traversing any links originating/attached to E".... For doing that we will have 
two options

1.       RSPF rooted on the destination (will be very expensive if we have to 
do that for every destination node in the network)..  OR

2.       FSPF rooted on the PQ-node and check if primary neighbor E is on the 
SPF path from PQ-node to destination.. This is what is specified in our draft.. 
Assuming number of PQ-nodes are far less than number of nodes in the network 
this approach looked more feasible. Also now we are able to collect full path 
attributes for RLFA backup paths for LFA-manageability. Also RLFA does not 
attempt to provide 100% coverage. So like already said, implementations can 
decide to only consider upto a certain number of PQ-nodes to be considered in 
the whole network to limit the number of extra FSPFs to be computed.

Thanks
-Pushpasis

From: Levente Csikor [mailto:[email protected]]
Sent: Wednesday, October 09, 2013 5:17 PM
To: Pushpasis Sarkar
Cc: [email protected]; Chris Bowers
Subject: Re: Request for review - 
draft-psarkar-rtgwg-rlfa-node-protection-01.txt

Dear Pushpasis,
thanks for your comments.
For reactions see mine inline:
On 10/09/2013 12:49 PM, Pushpasis Sarkar wrote:

Hi Levente,



Please find few comments inline...



Thanks

-Pushpasis



-----Original Message-----
From: Levente Csikor [mailto:[email protected]]
Sent: Wednesday, October 09, 2013 2:00 PM
To: [email protected]<mailto:[email protected]>
Subject: Re: Request for review - 
draft-psarkar-rtgwg-rlfa-node-protection-01.txt



Dear All,

I also support to work more on the node protection draft first, before merging 
it with "basic rLFA spec", because of various reasons:



First, I think it would be almost a good approach to show how node-protecting 
remote LFA works on the same, or almost the same sample network topology used 
in the basic rLFA spec., but for easier and more comprehensive understanding, a 
bit more complex but still simple example should be given. IMHO, in the basic 
rLFA spec. it is a bit confusing that node E is considered as a destination and 
this node is the next-hop as well, since the important parts of the different 
roles are not dissevering enough. Because of this, the similar example in node 
prot spec. is also not straightforward:

[Pushpasis] If you see Table 1,2, and 3 in 
draft-psarkar-rtgwg-rlfa-node-protection-01 we have specified the destinations 
E, F (and their corresponding RLFA backup paths explicitly), that will be 
affected by node-failure of E. Also the destination G has been included which 
will still be reachable in the case of node-failure of E. Perhaps basic RLFA 
spec can also include such kind of illustrations
    Yeah, I know and there is also the entry in the back-up path column for G, 
but here, I wanted to emphasized that the connectedness of the network does not 
remain any other opportunities to be considered.
In other words, if there were an additional node between F and G, say H, and 
nodes E-D-G-H-F would also form a 5-cycle, then all your claims will remain 
valid, since C's shortest path to F won't avoid the failed node E, but the 
graph-topological requirements would be not so confusing (maybe only for me :) 
, but when I analyze a network to calculate the rLFA protection coverage, then 
I always assume this basic graph topological property to easily derive the 
level of protection (in percent, for example) of the possible attainable 100%).




"In the event of the node-failure on primary nexthop E, the alternate path from 
Remote-LFA nexthop C to E and F also becomes unavailable."

[Pushpasis] That is exactly we are also saying in this draft(I mean 
draft-psarkar-rtgwg-rlfa-node-protection-01).. If any destination takes the 
shortest-path segment C...E that will not have node-protection using C as the 
PQ node, because C is going to forward the traffic to E anyhow. In Table 2 we 
see that the path segment C->D->E is included in the shortest path from C to E 
and F. That is why in case of node-failure of E, E and F cannot provide 
node-protection
    It was a quote from the draft, so it is really the fact that you are saying 
:)




According to the well-known last-hop problem, it is obvious that if the 
destination (in the first case: node E) goes down, then it cannot be protected. 
Moreover, since the example network topologyis not 2-node-connected, it is 
obvious again that the node F, which can be accessed only via node E, then the 
failure of node E infers that the node F can be never reached.

To (re)solve this issue, I suggest to use another network (in the basic rLFA 
spec. as well), which could be the following (all link costs are unit costs):





A----------B---------C

|          |       / |

|          |      /  |

|          |     /   |

F          G    /    H

|          |   /     |

|          |  /      |

|          | /       |

D----------E---------S



In this case, assuming that source node S wants to send a packet to node D, the 
next-hop of S is node E.

  - Link protecting case: If link(s,e) fails, then P-space of node S regarding 
to the failed link, would consist of node H,C,B and A, whilst the Q-space of D 
would consist all nodes except S and H. In this case, the PQ-nodes, as the 
possible repair tunnel endpoints, are node A,B and C.

  - Node protecting case: However, if node E itself fails, then the P-space of 
S would not alter, but the Q-space of D would only contain node F and A 
resulting that only node A is present in the set of PQ-nodes.

[Pushpasis] Can you elaborate on the method you used for deriving the PQ-nodes 
A and F here... Seems to me like you are doing a RSPF rooted on destination D 
and then pruning all links originating from E... I think Chris Bowers has 
already pointed on a different thread that while best way to guarantee 
node-protection is to run a RSPF rooted on each destination, we cannot afford 
to do so in reality... It will be much more feasible to run FSPF on fewer 
PQ-nodes as specified in our draft..
    I did not consider any possible way of determining PQ-nodes, only used the 
description of P and Q spaces from the original draft, and from my research on 
this topic, where every kind of spaces were defined in cost terms to easily 
analyze the network theoretically.




Also, the method specified by our draft also finds A as the node-protecting 
PQ-node, becoz the draft suggest to find the shortest-path from the PQ-nodes 
(C, B, and A) to destination D. Only the SPF path from A does not go through E, 
so only A will provide node-protection for D.



I think that this network also shows the different between the node protection 
and link protection, but in a more comprehensive manner. And it also 
demonstrates the fact mentioned in Figure 2 that for node-protecting rLFA, only 
the Q-spaces should be checked with those distance functions.



Moreover, if we assume that in the example network above, there is a link (A,E) 
and node E itself failed again, than PQ-space would be and empty set meaning 
that this case cannot be protected.

[Pushpasis] True. Our draft will also pick A->E->D as the SPF from A to D in 
that case and disqualify A as node-protecting PQ-node. In reality too there is 
no feasible path in this case till A re-converges after learning E's 
node-failure
    I know that it is true, I just wanted to say that by this network, the case 
of absence of node protection could be demonstrated easily assuming that the 
main example was the network described above.




Second, it would be better in the draft if the questions about "how difficult 
or impossible to obtain those distances" would be clearly stated in a bullet 
point list:

For example:

  - Q-space can be obtained by rSPF calculated at destination node D

  - P-space can be obtained through SPF calculation at source node S and its 
1-hop neighbor.

  - SPF at a PQ-node is impossible or if not what extensions should be 
implemented (actually, IMHO, this is the one, which is not clear enough)

[Pushpasis] The first two should really be addressed in the original RLFA 
draft. Chris has already written to the authors on this mailing list with 
suggesting text for the draft. The third one is no different than standard SPF 
we need for RFC5286 implementation.. only difference being that it is rooted on 
PQ-nodes  in case of RLFA... It is up to individual implementations to come up 
with ways to constraint those to a limit.
    Thanks




Third, according to the Targeted-LDP discussion, which is about the fact that 
if some node do not support TLDP, then how can be the inner MPLS label obtained 
from the PQ-node; I think that if we want remote LFA protection then the nodes 
MUST implement/support this feature, because without this the protection cannot 
be guaranteed. For me, it is similar to a hypothetic case for example of 
Not-via, where if the router do not support Not-via, then it cannot be used. Or 
isn't it so simple?

[Pushpasis] Again this is more related to original RLFA draft. I will prefer 
the corresponding authors to address this point :)
    Thanks




Please comment my observations, in order to help me and may others as well to 
understand every aspects and little pieces of remote LFA specifications.



Best Regards,

Levente Csikor






Thanks,

Levente Csikor

_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg

Reply via email to