Correcting the subject line so as not to cause confusion. Sorry. From: Anthony Magee Sent: 08 December 2011 08:54 To: Yaakov Stein Cc: Ron Cohen; [email protected]; Shahram Davari; [email protected] Subject: Re: [TICTOC] FW: I-D Action: draft-ietf-tictoc-1588overmpls-02.txtaak
Hi Yaakov, No I assume that only a single MAC address per Ethernet interface is used. Only those protocols which have an associated higher layer entity on the device should be affected, and only if those protocols are addressed in such a way that causes/allows those higher layer entities to process their associated traffic. I believe that this is how 802.1 models allow extensions and other functions to sit on alongside the baggy pants model. This is associated with the internal sublayer service as specified in IEEE Std 802.1Q-2005 clause 8.5.1 I don't see this as affecting any other protocols. Ie the higher layer entity would be specific to 1588oEthernet traffic addressed that higher layer entity. I assume this function sits above the actual layer 2 transport and MPLS LSP/PW parsing function since the 1588oEthernet traffic will be transported within a PW? I also think it could be argued that this is still a transparent clock in essence given the previous offical responses to questions/clarifications relating to swapping of source MAC address from IEEE 1588 experts. As for the layer violation associated with your response, I assume by layer 1 entity you mean the timestamp? In which case how does NTP get around the layer violation argument? I am just trying to make it clear that the layer violation arguments are sometimes unclear and in my view shouldn't be treated as a reason not to realize the transparent clock function. I agree with your concerns about security, but think this topic applies to BC and TC devices alike and would best be treated as a separate discussion from the layer violation topic. Best regards, Anthony On 8 Dec 2011, at 07:14, "Yaakov Stein" <[email protected]<mailto:[email protected]>> wrote: Ron and Anthony, First, I don't see the difference between MPLS and Ethernet. In principle, taking a layer-1 entity and putting it into an MPLS client's payload is just as much a layer violation as putting it into an Ethernet client's payload. There may be other reasons that this is less intrusive. For example, since MPLS doesn't have a standardized security mechanism such as MACsec it wouldn't be affected by a security mechanism. But then again you wouldn't have the security. The idea of changing MAC addresses has been discussed before. Since the intermediate switch is now terminating the Ethernet and originating a "new" message, there is no layer violation. However this makes a middlebox into something different - mid-way between a TC and a BC. It is also midway between a switch and a router (perhaps not an IP router, but something that routes the Ethernet's client). I assume that you want everything else to go through without MAC swapping (since otherwise you break layer-2 continuity, and a lot of things will malfunction, including ARP, OAM, G.803x). So we also have the interesting situation where the switch uses two different MAC source addresses on the same baggy-pants leg. This behavior may cause problems with quite a number of protocols. I would have to think about it, but STP, TRILL, ELMI, LLDP, and MEF-8 come to mind. Y(J)S From: Ron Cohen [mailto:[email protected]]<mailto:[mailto:[email protected]]> Sent: Tuesday, November 29, 2011 23:01 To: Anthony Magee Cc: Yaakov Stein; [email protected]<mailto:[email protected]>; Shahram Davari; [email protected]<mailto:[email protected]> Subject: Re: [TICTOC] FW: I-D Action: draft-ietf-tictoc-1588overmpls-02.txt If the encapsulation was directly over MPLS, i.e. no Ethernet / IP layers in between MPLS and PTP, there were no layers to violate.... On Tue, Nov 29, 2011 at 8:35 PM, Anthony Magee <[email protected]<mailto:[email protected]>> wrote: Hi Yaakov, The layer violation issue is something which I believe needs further discussion. If a higher layer entity is placed inside a device and is used to act as the Transparent Clock i.e. calculating residence time and modifying the correction field in the layer with which that higher layer entity is associated, one could use an identifier such as a label, or a multicast Destination address in order to address that higher layer entity, allowing it to make the change without it being a layer violation. Then on the transmit side, there is nothing specifically incorrect in a device modifying the Source Address of the packet sent from a Transparent Clock within the scope of IEEE 1588 and this would be needed in order to indicate that the device has effectively created a new packet - however, the function of the node is still that of a Transparent Clock. So as long as the various standards are observed and the modifying devices update the packets in a standards compliant manner, I don't see that such a Transparent Clock would constitute a layer violation. Anthony -----Original Message----- From: [email protected]<mailto:[email protected]> [mailto:[email protected]<mailto:[email protected]>] On Behalf Of Yaakov Stein Sent: 26 November 2011 20:25 To: [email protected]<mailto:[email protected]>; Shahram Davari Cc: '[email protected]<mailto:[email protected]>' Subject: Re: [TICTOC] FW: I-D Action: draft-ietf-tictoc-1588overmpls-02.txt Shahram and Stewart If we need intermediate MPLS nodes to perform special processing on 1588oMPLS packets there are several methods to lower the processing requirements. Of course, DPI could be performed to go below the MPLS and IP headers as Shahram said, but as Stewart pointed out this would be prohibitively expensive. Two methods have been proposed. The method of the present draft is to use the standard encapsulations (after ensuring that 1588 is supported) and to inform the intermediate nodes that the particular label value being used is special. For this special label value the node has been informed of what to do, e.g., has the offset of a TC. Any use of TC is necessarily a layer violation (after all, the timestamp is a layer-0 entity and we are placing it in a layer 2 or higher field), but correcting a field inside 1588 in UDP in IP in MPLS is not really that much worse than correcting on in 1588 in UDP in IP in Ethernet. The alternative method that I proposed is to invent a completely new timestamping mechanism. This has the advantage of being applicable to all MPLS packets (and thus can solve other problems), but requires inventing yet another timing distribution protocol. I know that Stewart succeeded in inventing a new packet loss and delay measurement protocol for TP, but I didn't gauge support in TICTOC for something new here. Y(J)S -----Original Message----- From: Stewart Bryant [mailto:[email protected]<mailto:[email protected]>] Sent: Thursday, November 24, 2011 19:30 To: Shahram Davari Cc: '[email protected]<mailto:[email protected]>'; '[email protected]<mailto:[email protected]>' Subject: Re: [TICTOC] FW: I-D Action: draft-ietf-tictoc-1588overmpls-02.txt Shahram I will ponder the answer to this question, but will note that you have not addressed my second question which relates to whether there is MPLS WG buy-in for this proposal. - Stewart On 24/11/2011 16:34, Shahram Davari wrote: > Hi Stewart, > > The parsing required by the draft is not complex and almost all MPLS routers > have support it already. The idea was to reuse existing data plane mechanisms > and not invent a new one. This I believe is in the spirit of IETF to reuse > existing mechanisms. > > I don't believe adding a shim makes the design simpler. You still need to > detect that such shim exists and for that you need parsing that doesn't even > exist today. > > > This draft has been implemented by vendors, so we have a working code and I > believe we also have rough consensus. > > Thanks > Shahram > > > > ----- Original Message ----- > From: Stewart Bryant [mailto:[email protected]<mailto:[email protected]>] > Sent: Thursday, November 24, 2011 07:58 AM > To: > [email protected]<mailto:[email protected]><[email protected]<mailto:[email protected]>> > Cc: > [email protected]<mailto:[email protected]><[email protected]<mailto:[email protected]>>; > [email protected]<mailto:[email protected]><[email protected]<mailto:[email protected]>> > Subject: Re: [TICTOC] FW: I-D Action: > draft-ietf-tictoc-1588overmpls-02.txt > > Can we wind back to my original points here which have not addressed. > > Why are is the WG proposing a design that needs such complex parsing, > against the ethos of MPLS, when a simpler design would be more > universally applicable? > > Does the WG have any input to suggest that the design will survive a > review by MPLS/PWE3 WG and then by IESG? > > - Stewart > > > On 22/11/2011 09:12, Stewart Bryant wrote: >> Speaking as an individual here, I really have a hard time >> understanding why it is necessary to have quite the egregious layer >> violation that this draft uses. >> >> The idea of having an LSP type that is dedicated to tracking the time >> of passage through the network is a good idea. However MPLS is >> completely geared to the concept that only the LSP endpoints know how >> to resolve the payload type. >> >> The function that you require could be achieved by including a shim >> that contains the time compensation information and adjust the >> payload on egress from the LSP. That would be rather more consistent >> with the MPLS architecture. >> >> I have not seen a request for review by the MPLS or PWE3 WGs and I >> would suggest that you request that sooner rather than later since it >> is inevitable that the draft will be sent there later in it's life, >> and if they do not subscribe to your mode of operation the draft is >> unlikely to progress. >> >> I would also suggest that you discuss the extent of layer violation >> with your AD to make sure he is confident that this draft will pass >> IESG review. >> >> - Stewart >> >> >> _______________________________________________ >> TICTOC mailing list >> [email protected]<mailto:[email protected]> >> https://www.ietf.org/mailman/listinfo/tictoc >> > -- For corporate legal information go to: http://www.cisco.com/web/about/doing_business/legal/cri/index.html _______________________________________________ TICTOC mailing list [email protected]<mailto:[email protected]> https://www.ietf.org/mailman/listinfo/tictoc _______________________________________________ TICTOC mailing list [email protected]<mailto:[email protected]> https://www.ietf.org/mailman/listinfo/tictoc
_______________________________________________ TICTOC mailing list [email protected] https://www.ietf.org/mailman/listinfo/tictoc
