[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Chair review of draft-ietf-ccamp-inter-domain-rsvp-te-04.txt



Dimitri,

Thanks for getting these review comments in before last call started. Most welcome.

o) section 3.4: processing is clearly indicated but on inter-domain basis
one of the issue is that the processing can have to be performed on nodes
that will further Notifies toward an AS-path that is completely different
from its corresponding TE LSP e.g. A-B-...-C-D, but Notify msg flows along
A-E-C-D, or A-B-F-D, we have a situation where B Notify msg toward X would
travel via the tail-end (D) and C Notify msg would loop via the head-end
(A) - advisable to prevent such thing

     ----------E--------
    |                   |
e.g. A --- B -... X ...- C --- D
          |                   |
           ---------F---------

To clarify this point, you are concerned about how the Notify recipient may be replaced in a Path message as it enters the domain, and as it exits the domain (ditto Resv message).

This issue is dicussed somewhat in the GMPLS-UNI (RFC4208) and in segment protection. And there is a trade-off and a modelling question.

The trade-off is that it is probably highly beneficial to repair problems within the domain. Therefore, the domain entry point should replace the Notify Recipient with its own ID. The down side of this is that a Notify that genuinely needs to go to the original Notify Recipient must be forwarded (at the RSVP level) by the domain entry point.

The modelling is issue concerns how the Notify Recipient should be set on the Path message as it leaves a domain. The domain is not interested in knowing about notifiable events that happen outside the domain, so ideally we would replace the Notify Recipient with the original recipient used before entering the domain, but htis information is not known.

Actually, however, this replacement is only appropriate in nested domains. In sequential domains, when we leave one domain, we enter another, and so the new domain will want to use its own domain entry point as the Notify Recipient. This introduces the trade-off benefit again because the local issues are handled locally (which is good) but notifications that should go (for example) to the ingress, must now be forwarded multiople times, domain by domain.

Now, note that the inter-domain framework (RFC4726) was careful to put nested domains out of scope. They are more appropriate to the MLN work. We could observe that the domain-by-domain forwarding technique could be used for nested domains as well, but it doesn't look so pretty. Igor and I proposed a solution to this issue for nested in domains in That Book, but AFAIK, no-one has come close to needing to deploy a solution for nested domains yet.

So, I have added some discussion to the I-D around this subject.

o) section 6: it is unclear from section 6 why an LSP head-end would ever
desire to exercise control re-opt in part. when non-contiguous, at the end
the only realistic reason for requesting such kind of request from the
head-end is lost of performance e.g increasing loss, delay, etc.

I think you have answered your question to some extent.

A transit domain may be aware of the potential for reoptimization, but not bother because it is not worried by the level of service being provided. But the cumulative effect on the end-to-end LSP may cause the head-end to worry and trigger a reoptimization request (of course, the transit domain may choose to ignore the request).

But there is another benefit to end-to-end reoptimization that per-domain reoptimization cannot address. Per-domain re-optimization is restricted to preserve the domain entry and exit points (since to do otherwise would break the LSP!). But end-to-end reoptimization is more flexible and can select new domain border LSRs.

You are also right to observe that end-to-end reoptimization may involve a non-local modification and that might select new entry / exit points. In this case, we can observe that local re-optimization is more easily and flexibly achieved using nesting or stitching, and the "locality principle" (i.e., the idea of keeping information only where it is needed) is best achieved using stitching or nesting. That said, a contiguous LSP can easily be modified to take advantage of local reoptimizations (as defined in RFC4736) even if, as you observe, this would require the dissemination of information and the invocation of signaling outside the local domain.

I will update section 6 to bring out these points.

there is also a clear diff. between a desirable re-opt. when the LSP is
contiguous (and thus triggerable only by the head-end) and a
local-/domain-specific resource re-opt. in other cases

You mean the cost/benefit analysis of reoptimization may be different.
Yes, that is correct and worth adding to section 6.

o) section 7: the document could be more specific for the hello exchanges
at inter-domain boundaries - in the same section specific security in
using MPLS-BFD for end-to-end TE LSP should be clarified

I think you are raising some issues about peering and trust models at domain borders. These models relate to the establishment of signaling adjacencies (for example, but not limited to) through the exchange of Hello messages. Also relevant is the trust that one can assign to the content of signaling messages (including restart messages) and this is an example of the issues raised by the IESG with various recent I-Ds, in particular the restart extensions I-D.

AFAICS there is required to be *some* trust relationship between neighbors across a domain boundary if signaling is to be used. If this trust does not exist, do not use this function. It is not a requirement to signal across domain boundaries, but it is a requirement to provide a mechanism to support it if neighboring domains wish to.

Should this trust relationship be any different from between intra-domain peers? Possibly.

Should domain border nodes be able to selectively disallow certain "vulnerable" features at domain borders? Absolutely. And it is worth pointing out that the restart function could be disabled on the links between domain borders if it is considered vulnerable.

I have made several updates to the security section.

- in the same section specific security in
using MPLS-BFD for end-to-end TE LSP should be clarified

Absolutely. I have added a note about OAM, although this is largely to
reference other material since OAM is out of scope for this signaling
draft.

Many thanks,

Adrian