Hi Greg,

See my answers/explanations inline below.

Best Regards,
Huaimo
From: Gregory Mirsky [mailto:[email protected]]
Sent: Tuesday, December 01, 2015 9:12 PM
To: Huaimo Chen; [email protected]; 
[email protected]; [email protected]
Cc: [email protected]; [email protected]
Subject: RE: [mpls] Comments to draft-ietf-teas-rsvp-egress-protection

Hi Huaimo, et. al,
apologies for such very late response. I’ve read the -02 version and below 
you’ll find my notes to changes I’ve found. My responses to our discussion are 
in-line and tagged GIM>>.
Notes to -02 version:

*        section 5.1 states
   A backup egress SHOULD be configured on the ingress of an LSP to
   protect a primary egress of the LSP.
Are there scenario when this SHOULD NOT be done, when the backup egress(es) are 
not configured?
And if this is such strong requirement, then the same is applicable to the next 
sentence that currently reads as “…optional egress backup descriptor list for 
protecting egresses of the LSP”. I think that the descriptor list SHOULD be 
included in the Path message by the ingress.

Huaimo: Yes. See the paragraph below in the draft.
The PLR (upstream node of the primary egress) extracts the backup
egress from the respective EGRESS_BACKUP object in the egress backup
descriptor list. If no matching EGRESS_BACKUP object is found or the
list is empty, the PLR may apply a local policy to determine the
backup egress and add an EGRESS_BACKUP object with the backup egress
and primary egress into a Path message to the primary egress.


*        section 5.2 states:
   If the transit node is the upstream node of a primary egress to be
   protected, it determines the backup egress, obtains a path for the
   backup LSP and sets up the backup LSP along the path.
Which, in my view, contradicts with the statement in section 5.1 that backup 
egress(es) SHOULD be configured at LSP ingress.

Huaimo: It seems that this is not contradicts with the statement in section 5.1 
that backup egress(es) SHOULD be configured at LSP ingress.  Just in the 
paragraph below the one you mentioned, it gives the details.
“The PLR (upstream node of the primary egress) extracts the backup
egress from the respective EGRESS_BACKUP object in the egress backup
descriptor list. If no matching EGRESS_BACKUP object is found or the
list is empty, the PLR may apply a local policy to determine the
backup egress and add an EGRESS_BACKUP object with the backup egress
and primary egress into a Path message to the primary egress.”




                Regards,
                                Greg

From: Huaimo Chen [mailto:[email protected]]
Sent: Monday, April 13, 2015 8:19 PM
To: Gregory Mirsky; [email protected]; 
[email protected]; [email protected]
Cc: [email protected]; [email protected]
Subject: RE: [mpls] Comments to draft-ietf-teas-rsvp-egress-protection

Hi Greg,

Thanks for your comments.
My answers/explanations are inline below.

Best Regards,
Huaimo
From: mpls [mailto:[email protected]] On Behalf Of Gregory Mirsky
Sent: Monday, April 13, 2015 2:58 PM
To: 
[email protected]<mailto:[email protected]>;
 [email protected]<mailto:[email protected]>; 
[email protected]<mailto:[email protected]>
Cc: [email protected]<mailto:[email protected]>; 
[email protected]<mailto:[email protected]>
Subject: [mpls] Comments to draft-ietf-teas-rsvp-egress-protection

Dear Editors,
please kindly consider my comments to the current version of this work:

*        Introduction

o   The third paragraph mentions that an end-to-end protection may be slower to 
detect failure and perform switchover then an arbitrary local protection 
method. I believe that that is not the case and, as been demonstrated by 
deployments of G.8031, G.8032 and RFC 6378 end-to-end provides sub-50 msec 
switchover and G.8013/Y.1731 and RFC 5884 failure detection is 10 msec.
[Huaimo] It seems that the statement in the paragraph is true.  For a global 
protection (or an end-to-end protection), it may take more time since the time 
includes the propagation time and processing time. The propagation time may 
depend on the size of the network. In general, the bigger the network, the 
longer the propagation delay. The processing time may comprise the related 
processing time on every node along the path from the egress node to a node 
interesting the failure and doing switchover.
GIM>> I think that distance, whether in number of intermediate hops or miles, 
does not affect guaranteed defect detection time when continuity check protocol 
being used. In that case detection time depends only on definition of Loss of 
Continuity defect for the given protocol. For example, in CFM it is period of 
time between 3.25 and 3.5 CCM intervals when no CCM received from remote MEP. 
BFD is little different and DetectMultiplier can be negotiated between end 
points of the given BFD session. But regardless of these differences, using CFM 
or BFD enables detection of LoC defect within 10 ms regardless of the distance 
between end-points.

o   The last in Section 1.1 suggests that node R3 may detect failure of the 
node L1 through monitoring BFD session between two nodes. Firstly, if this is 
multi-hop BFD session over IP network, then there’s no guarantee that its path 
is co-routed with the LSP segment R1-L3. Secondly, if it is assumed that RFC 
5884 may be used, I have to remind, that RFC 5884 operates between LSP end 
points and R1 is not end point. Thus, Sub-Path Maintenance Entity (SPME) 
co-routed with the segment R1-L3 MUST be established.
[Huaimo] It seems that R3 is the upstream node of L1 and there is no multi-hop 
BFD session between R3 and L1.
This current version of the document focuses on extending the protection of RFC 
4090 from a transit node to an egress node. It seems that it is better to have 
another document for others if needed.
GIM>> I couldn’t find in the document statement that the PLR R3 MUST be 
upstream to the egress. If this is the requirement, then it must be explicitly 
stated as, in my view, it is restrictive and limits number of networks where 
proposed method can be used.

*        Section 5.2

o   The third paragraph assumes that if a PLR cannot establish LSP to any 
listed LSR in the EGRESS_BACKUP object it SHOULD select it locally and record 
it in the EGRESS_BACKUP object. I believe that that implies that a PLR, i.e. 
any LSR in the MPLS domain is aware of all services, i.e. CEs, as that is 
required when selecting backup egress. That is serious security concern and 
must be properly addressed in Security Considerations section of the draft.
[Huaimo] This paragraph says that the upstream node of the primary egress 
knows/determines that  there is not any backup egress given for the primary 
egress. In this case, the upstream node selects a backup egress according to a 
local policy. The upstream node may not need to be aware of any services or CEs.
GIM>> As commented above to section 5.2, this contradicts statement made in 
section 5.1 that backup egress(es) SHOULD be configured at LSP ingress.


Regards,
                Greg

Reply via email to