[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: RE : RE : TR : I-D ACTION:draft-leroux-ccamp-gmpls-mrn-eval-00.txt



igor - i will provide a detailed answer concerning a clean method to deal with "virtual FAs" that does not rely on the use of the protection object (and therefore would deliver a clean method to provide signaling for protected "virtual FAs"

hopefully we can discuss this during this IETF meeting,

thanks,
- dimitri.

Igor Bryskin wrote:

Dimitri,

See at the bottom


IB>>Well, are they? They give you a way to signal a
requirement not to commit resources for an LSP

until

further notice and also to require their commitment
when it becomes necessary. Why not to allow working
LSP to be signaled as Secondary according to the
mentioned draft? Then it would be possible even to
signal protected virtual FAs, which is not as

stupid

as it may sound :=)

Sorry but this sounds really bad... Please let me know then how do you signal protected

virtual FAs?

IB>> You signal both working and protection LSPs of

the FA as Secondary. At

the time when you decide to make FA "real" you

re-signal working or both

LSPs (depending on protection type) as Primary.

Don't see why this wouldn't

work.

DP> because what do you do in case the primary

(virtual) FA-LSP fails ? you

are simply going to activate the secondary (virtual)

FA-LSP which is in

clear
opposition with the notion of virtual-FA - the

reason is again because you

are trying to use one bit i.e. S to say something in

a context (protection

object) for which it has not been designed for



IB>> Oh-Oh, what do you mean by "primary (virtual)
FA-LSP fails" and  "you
are simply going to activate the secondary (virtual)
FA-LSP "?  I activate
protection LSP if I have a failure in the *data plane*
of the working LSP.
But working LSP of the virtual FA does not have any
data plane yet, there is
nothing that can trigger the protection LSP activation
and switchover.

DP> but they are associated to resources they do not
use - and the control plane role is to ensure that
when they need to be activated resources can be used -
the question JL raises is the problem of "how do i
protect a virtual FA" and the response is if you are
using the S bit for telling i am a virtual FA you can
not use it anymore to ensure protection of a primary
(and even less a secondary !) - this said an secondary
LSP exists only within the context of its primary

IB>>Here is what I have in mind.

A network operator configures a mesh of virtual FAs.
Working FA LSPs are signaled as Secondary. Once they
are established the FA TE link ends are advertised.
Resources for these LSPs are allocated on the links
the LSPs are going through, however, they are not
committed (not bound into cross-connects). Two or more
virtual FA LSPs may share the resources on common
links. This is especially true for those of them that
are unlikely to become real at the same time.
Furthermore, polices could be such that virtual FA LSP
resources could be allowed to get pre-empted by real
(not necessarily FA-) LSPs. The mentioned resources
also could be involved in mesh restoration schemes and
even be bound into extra traffic LSPs.


When a virtual FA transforms into real FA, its working
FA-LSP is re-signaled as Primary. At this time, the
allocated resources are bound into FA-LSP
cross-connects. Naturally, all other LSPs – virtual or
real – that share resources with the FA-LSP in
question are notified and need to be recomputed and/or
re-signaled.

A virtual FA could be provisioned as protected in a
sense that when it becomes real it will have a certain
protection scheme already in place. Path computation
for backup LSPs of virtual FAs is performed just like
of real FAs, that is, by assuming that associated
working LSPs are Primary (fully built) LSPs.
Regardless of the protection type backup LSPs of
virtual FAs are always signaled as Secondary. At the
time when a virtual FA is transformed into real one
(that is, when its working LSP becomes Primary) its
backup LSP(s) may be activated as well (e.g. 1+1
protection) or may be left Secondary until the working
LSP data plane failure is detected (e.g. shared
protection).

Igor





__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com



.