Pierre,

> Hello everyone,
> 
> We seemed to have some form of consensus on the relevance of the draft, 
> but we also received multiple comments
> on the list, mostly asking to remove references to solutions from the 
> document.
> 
> Here comes an update to the draft trying to satisfy these comments.

The update certainly addresses my comments wrt mixing use case
and solution. Thanks !

I have few more comments on the update.

> 3. Management-free local protection
> 
>    An alternative protection strategy consists in management-free local
>    protection.
> 
>    For example, a PW from C to E, transported over the shortest path to
>    E provided by the SPRING architecture, benefits from management-free
>    local protection by having each node along the path (e.g.  C and D)
>    automatically pre-compute and pre-install a backup path for the
>    destination E. Upon local detection of the failure, the traffic is
>    repaired over the backup path in sub-50msec.
> 
>    The backup path computation should support the following
>    requirements:
> 
>    o  100% link, node, and SRLG protection in any topology
>    o  Automated computation by the IGP
>    o  Selection of the backup path such as to minimize the chance for
>       transient congestion and/or delay during the protection period, as
>       reflected by the IGP metric configuration in the network.
> 
> 
> 4.  Managed local protection
> 
>    There may be cases where a management free repair does not fit the
>    policy of the operator.  For example, the operator may want the
>    backup path to end at the next-hop (or next-next-hop for node
>    failure) hence excluding IPFRR/LFA types of backup path.  Also, the

Such a backup path could be automatically pre-computed and pre-installed,
providing the management-free local protection. 

>    operator might want to tightly control the backup path to the next-
>    hop: for the destination Z upon the failure of link CD, the backup
>    path CGHD might be desired while the backup paths CGD and CHD are
>    refused.
> 
>    The protection mechanism must support the explicit configuration of
>    the backup path either under the form of high-level constraints (end
>    at the next-hop, end at the next-next-hop, minimize this metric,
>    avoid this SRLG...) or under the form of an explicit path. 

It seems that the key distinction between 3 and 4 is that 3 relies
on LFA (and its variations), while 4 relies on building link/node
bypasses. Both LFA-based protection, and protection based on
link/node bypasses could be fully automated. It is true however,
that with link/node bypasses the operator, if desired, could have
a fairly detailed control over the bypass.

With this in mind I would suggest to change the title of Section 3
to something like "LFA-based local protection", Section 4
to something like "Local protection based on link/node bypasses",
and also change the first sentence in section 4 to something like
the following:

    There may be cases where an LFA-based protection local protection
    does not fit the policy of the operator. 

Yakov.


_______________________________________________
spring mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/spring

Reply via email to