Hi Yimin,

    Thanks for your comments.
    My answers/explanations are inline below.

Best Regards,
Huaimo
________________________________
From: Yimin Shen <[email protected]>
Sent: Saturday, February 22, 2020 9:10 PM
To: Huaimo Chen <[email protected]>; [email protected] <[email protected]>
Subject: Re: Mail regarding draft-hu-rtgwg-srv6-egress-protection

Hi Huaimo, Authors,

>> Step 1:  Find the P-Space P(Z, X) and the Q-Space Q(Y, X), which are similar 
>> to those in [RFC7490];

Unfortunately this is not a right solution. As I mentioned before, in egress 
protection, bypass path computation should not rely on LFA, because it is not 
finding a path to merge back to the protected/primary router. I have already 
suggested in a previous email to remove the link between PE3 and PE4, to make 
your discussion more generic. Similarly, the draft should not assume there is a 
multi-hop path from PE4 to PE3 which does not traverse P1. Your  mechanism must 
be able to return a bypass path in these cases. My suggestion is to take the 
guidelines in RFC 8679, and use context-IDs as locators.

[HC]: This is for finding a backup path to the backup egress node, where Y in 
Q(Y, X) is the backup egress node. Removing the link between PE3 and PE4 that 
you suggested is covered by considering (or removing resource X) in Q(Y, X), 
which seems more generic than removing the link (between PE3 and PE4), which is 
attached to X (e.g., PE3).

>>    Step 5:  Try to find a shortest path from Z to Y without going through X;

As a transit router, Z is supposed to perform generic bypass calculation for X 
(like other IPv6 addresses), based on a general FRR logic. So, how would Z even 
know to "Try" in this step ? What is it trying ? Isn't this "shortest path from 
Z to Y without going through X" the bypass path you are looking for in Step 1 - 
3 ?

[HC]: Node Z as the PLR and the direct previous hop of the egress node, it 
calculates a backup path to the backup egress node. At first, the procedure 
finds a backup path to the backup egress node in a way similar to the one in SR 
TI-LFA. If a backup path is found in this way, then the path is returned; 
otherwise, it finds a shortest path from Z to Y without going through X (e.g., 
egress node PE3).

>>    For a (primary) locator associated with the (primary) egress node of a SR 
>> path/tunnel, most often the locator is routable.  This is the case we 
>> assumed,

Non-routable locator should be supported, and it can be supported. In this 
case, bypass path calculation should be based on BGP nexthop. Again, please 
refer to RFC 8679 regarding how to use context-ID as BGP nexthop for a solution.

[HC]:  The backup egress node used by the backup path calculation may be 
determined based on BGP nexthop and locator. Using BGP nexthop will be included 
in the next version of the draft.

Thanks,
-- Yimin


From: Huaimo Chen <[email protected]>
Date: Friday, February 21, 2020 at 11:45 PM
To: Yimin Shen <[email protected]>, "[email protected]" <[email protected]>
Subject: Re: Mail regarding draft-hu-rtgwg-srv6-egress-protection

Hi Yimin,
    Thanks much for your comments.
    The procedure with details that a PLR uses to compute a backup path has 
been added into the draft, which has been uploaded.
Best Regards,
Huaimo
Hi Huaimo, authors,

>>> Node P1's pre-computed backup path for PE3 is from P1 to PE4 via P2.

I’m still concerned that there is no details in this draft about the procedures 
how a PLR computes a backup path to the protector, in both of the two cases 
below.

[1] the primary locator is routable.
[2] the primary locator is not routable.

Thanks,
-- Yimin



_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg

Reply via email to