On 08/12/2016 01:00, Robert Raszuk wrote:
Dear Stewart,

On Wed, Dec 7, 2016 at 12:03 PM, Stewart Bryant <[email protected] <mailto:[email protected]>> wrote:

    Using a RSVP-TE tunnel to provide an LDP FRR solution is well
    ​
known and deployed.

I was not particularly advocating this, indeed as you know I have spent many years looking at alternatives. Perhaps I misread the draft, we are discussing, but I read the draft and saw the presentation at IETF97 and the draft seems to be proposing this very idea. I was trying to give it its proper context.

That said, it maybe that by using an appropriate mix of modern distributed and centralized path computation the deployment issues that concern you become addressed.


​That may or may not be the case. Yes we (well some of us) have been involved for decades in making those solutions to somehow work in a very very limited real production scale (if at all). One hop LSPs for FRR have been sporadically deployed in very few cases. Yet the overhead associated with such endeavor is significant especially in OPEX cost and training of internal teams to maintain it.

Those who just focus on vendor's world may not always realize this. What works on the ppt, rfc or patent turns often very costly in real deployments.

RSVP-TE extensions or LDP are both redundant and frankly unnecessary protocols and the sooner we get rid of those the better. They bring no value and to all of us who have been involved in defining and deploying those this should be of no surprise. It is only those who has been heavily infected by various marketing forces think overwise.

That is a much wider discussion.

My reading of your statement is that you are proposing the deprecation of RSVP-TE and LDP. If that is case, then that is a much wider and deeper discussion for the MPLS WG.


Therefor I do object using terms of "well known or deployed" as any form of judgement of new work in any form. Even so without real data on how well know or wide deployed that would be. And even if it is deployed in few places this is no reason not to recommend improvements even if those would result in innovative proposals.

Indeed, there are many innovations that can be applied to FRR. My point to the authors was to look at the work that has been published in the IETF and build on it.


As to your comments on speed and compute costs let's do realize that what have been a factor 5 or 10 years ago where everything needed to run on weak REs today computation is done outside of network elements. And while we are not there in mass scale the number of modern vendors which I am testing do have very significant innovations in control plane computing paradigms .. something which we never imagined x years back.

I seem to remember proposing splitting compute from routers in the generation being designed 17 years ago and using best in class computing systems rather than compute power that would fit on a blade. The idea was not acceptable then. Every idea has to live in it's own time. However going forward what is needed is a mixture of both distributed, autonomous operation and remote compute operation, and I don't think it is yet clear what the structure of the design needs to look like.


Yes your point may very well be valid that we will still find nits to work and fix down the road, but those again are not in any rationale sense to stop the work or adjust it to status quo. It is like you would still prefer to cross Atlantic using Titanic as opposed to kill 380 or 787s just because it is no a ship.

I am not saying that. I think you need to re-read what I have written.


Bottom line .. I highly support TI-LFA even if for some vendors it means departure from their years of selling RSVP/LDP mantra.

I am not arguing against TI-LFA in this thread, although I do have concerns about some aspects of that work, which I am sure we will discuss at some point.

An approach that I think might be reasonable, and I get the impression that this is where the authors are headed, is to look at how to do node repairs in a repair technology independent way. Whether one implements the repair by a explicit hard path, or a soft path, and how you set up that path is independent of this calculation. However I would hope that the draft would build upon what we have already published rather than start from scratch.

- Stewart



​Yours,
Robert.​

    The specific case of node protection is
    called out in Figure 3 of RFC4090. I am surprised that the
    complete solution is not documented, but if that is the case
    it should be, with proper attribution.

    Getting the next next hop label set is problematic, the standard
    solution
    needing a targetted LDP session to each NNH. There was a proposal
    to address this proposed draft-shen-mpls-ldp-nnhop-label-02 which
    is worth examining.

    The method of finding the next next hop is well documented
    for example in RFC6981 and these should be referenced at least in the
    development phase of this work to allow cross checking.


    "The discovery of the next next-hop (depending
     on an implementation) may not involve any additional SPF, above and
       beyond what would be needed by ISIS/OSPF anyway, as the next next-
       hop, just like the next-hop, is a by-product of SPF computation."

    That is what I thought when I started work on IPFRR, but it is
    very much
    dependent on the speed and memory optimizations used and because this
    information is not needed for normal operation it is often discarded.


    " If
       for a given <LSP, PLR, N> triplet the node protected by the PLR
    is an
       Area Border Router (ABR), then the PLR and the next next-hop
    may end
       up in different IGP areas (this could happen when an LSP traversing
       the PLR and the protected node does not terminate in the same IGP
       area as the PLR).  In this situation the PLR may not be able to
       determine the next next-hop from either its Traffic Engineering
       database or Link State database, and thus may not be able to
    use the
       next next-hop as the MPT.  In this scenario the PLR uses an
       "alternative" ABR as the MPT, where an alternative ABR is
    defined as
       follows. For a given LSP that traverses the PLR and the (protected)
       ABR, an alternative ABR is defined as any ABR that advertises into
       PLR's own IGP area reachability to the FEC associated with the LSP.
       Note that even if a PLR protects an ABR, for some of the LSPs
       traversing the PLR and the ABR, the next next-hops may be in
    the same
       IGP area as the PLR, in which case these next next-hops act as MPTs
       for these LSPs. Note that even if the protected node is not an ABR,
       if an LSP traversing the PLR and the protected node does not
       terminate in the same IGP area as the PLR, then for this LSP
    the PLR
       MAY use an alternative ABR (as defined above), rather than the next
       next-hop as the MPT. "

    In a general solution, I would like to see this written so that it is
    OSPF/ISIS agnostic.

    This an example of the general case of multi-homed prefixes.
    Addressing
    MHP requires that egress be forced to prevent packet looping.



    "4. Constructing Bypass LSPs"

    There is quite a lot of work on the calculation of node avoiding paths
    that you should look at, for example RFC6981 to verify that nothing
    has been forgotten.



    " 5. Obtaining Label Mapping from MPT"

    Again it is worth looking at existing work in this space.



    "6. Forwarding Considerations

       When a PLR detects failure of the protected node then rather than
       swapping an incoming label with a label that the PLR received from
       the protected node, the PLR swap the incoming label with the label
       that the PLR receives from the MPT, and then pushes the label
       associated with the bypass LSP to that MPT. To minimize micro-loop
       during the IGP global convergence PLR may continue to use the
    bypass
       LSP during network convergence by adding small delay before
    switching
       to a new path."

    It is nowhere as simple as that. Again there is a lot of writing
    on the
    subject. For example RFC5715.

    Sure you need to keep the repair path in place and using an RSVP-TE
    tunnel means that you will not suffer the problem of microlooping
    along
    that tunnel. What you need to be clear about is that you are not
    protecting against any other microloop, for example between hop
    PLR-1 and PLR-2.

    - Stewart


    _______________________________________________
    mpls mailing list
    [email protected] <mailto:[email protected]>
    https://www.ietf.org/mailman/listinfo/mpls
    <https://www.ietf.org/mailman/listinfo/mpls>


_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg

Reply via email to