Now I see where the disconnect was, thank you for pointing it out to me.As I understand it, the notifications from leaves to the root will not use DetNet resources and, as a result, would not congest DetNet flows although may have negative effect on other flows. I've updated text as follows:NEW TEXT:As described above, an ingress LSR that has received the BFD Controlpacket sends the unicast IP/UDP encapsulated BFD Control packet withthe Final (F) bit set to the egress LSR. In some scenarios, e.g.,when a p2mp LSP is broken close to its root, and the number of egressLSRs is significantly large, the root might receive a large number ofnotifications. The notifications from leaves to the root will notuse DetNet resources and, as a result, will not congest DetNet flows,although they may negatively affect other flows. However, thecontrol plane of the ingress LSR might be congested by the BFDControl packets transmitted by egress LSRs and the process ofgenerating unicast BFD Control packets, as noted above. To mitigatethat, a BFD implementation that supports this specification isRECOMMENDED to use a rate limiter of received BFD Control packetspassed to the ingress LSR’s control plane for processing.
What are your thoughts?
Regards,Greg
On Sat, Feb 24, 2024 at 5:56 PM Joel Halpern <jmh@xxxxxxxxxxxxxxx> wrote:
Mostly. THere is one other aspect. You may consider it irrelevant, in which case we can simply say so. Can the inbound notifications coming from a large number of leaves at the same time cause data plane congestion?
Yours,
Joel
On 2/24/2024 8:44 PM, Greg Mirsky wrote:
Hi Joel,thank you for your quick response. I consider two risks that may stress the root's control plane:
- notifications transmitted by the leaves reporting the failure of the p2mp LSP
- notifications transmitted by the root to every leave closing the Poll sequence
As I understand it, you refer to the former as inbound congestion. The latter - outbound. Is that correct? I agree that even the inbound stream of notifications may overload the root's control plane. And the outbound process further increases the probability of the congestion in the control plane. My proposal is to apply a rate limiter to control inbound flow of BFD Control messages punted to the control plane.What would you suggest in addition to the proposed text?
Best regards,Greg
On Sat, Feb 24, 2024 at 3:28 PM Joel Halpern <jmh.direct@xxxxxxxxxxxxxxx> wrote:
What you say makes sense. I think we need to acknowledge the inbound congestion risk, even if we choose not to try to ameliorate it. Your approaches seems to address the outbound congestion risk from the root.
YOurs,
Joel
On 2/24/2024 6:25 PM, Greg Mirsky wrote:
Hi Joel,
thank you for the clarification. My idea is to use a rate limiter at the root of the p2mp LSP that may receive notifications from the leaves affected by the failure. I imagine that the threshold of the rate limiter might be exceeded and the notifications will be discarded. As a result, some notifications will be processed by the headend of the p2mp BFD session later, as the tails transmit notifications periodically until the receive the BFD Control message with the Final flag set. Thus, we cannot avoid the congestion but mitigate the negative effect it might cause by extending the convergence. Does that make sense?
Regards,Greg
On Sat, Feb 24, 2024 at 2:39 PM Joel Halpern <jmh@xxxxxxxxxxxxxxx> wrote:
That covers part of my concern. But.... A failure near the root means that a lot of leaves will see failure, and they will all send notifications converging on the root. Those notifications themselves, not just the final messages, seem able to cause congestion. I am not sure what can be done about it, but we aren't allowed to ignore it.
Yours,
Joel
On 2/24/2024 3:34 PM, Greg Mirsky wrote:
Hi Joel,
thank you for your support of this work and the suggestion. Would the following update of the last paragraph of Section 5 help:OLD TEXT:An ingress LSR that has received the BFD Control packet, as describedabove, sends the unicast IP/UDP encapsulated BFD Control packet withthe Final (F) bit set to the egress LSR.NEW TEXT:As described above, an ingress LSR that has received the BFD Controlpacket sends the unicast IP/UDP encapsulated BFD Control packet withthe Final (F) bit set to the egress LSR. In some scenarios, e.g.,when a p2mp LSP is broken close to its root, and the number of egressLSRs is significantly large, the control plane of the ingress LSRmight be congested by the BFD Control packets transmitted by egressLSRs and the process of generating unicast BFD Control packets, asnoted above. To mitigate that, a BFD implementation that supportsthis specification is RECOMMENDED to use a rate limiter of receivedBFD Control packets passed to processing in the control plane of theingress LSR.
Regards,Greg
On Thu, Feb 22, 2024 at 4:10 PM Joel Halpern via Datatracker <noreply@xxxxxxxx> wrote:
Reviewer: Joel Halpern
Review result: Ready
Hello,
I have been selected as the Routing Directorate reviewer for this draft. The
Routing Directorate seeks to review all routing or routing-related drafts as
they pass through IETF last call and IESG review, and sometimes on special
request. The purpose of the review is to provide assistance to the Routing ADs.
For more information about the Routing Directorate, please see
https://wiki.ietf.org/en/group/rtg/RtgDir
Although these comments are primarily for the use of the Routing ADs, it would
be helpful if you could consider them along with any other IETF Last Call
comments that you receive, and strive to resolve them through discussion or by
updating the draft.
Document: draft-name-version
Reviewer: your-name
Review Date: date
IETF LC End Date: date-if-known
Intended Status: copy-from-I-D
Summary: This document is ready for publication as a Proposed Standard.
I do have one question that I would appreciate being considered.
Comments:
The document is clear and readable, with careful references for those
needing additional details.
Major Issues: None
Minor Issues:
I note that the security considerations (section 6) does refer to
congestion issues caused by excessive transmission of BFD requests. I
wonder if section 5 ("Operation of Multipoint BFD with Active Tail over
P2MP MPLS LSP") should include a discussion of the congestion implications
of multiple tails sending notifications at the rate of 1 per second to the
head end, particularly if the failure is near the head end. While I
suspect that the 1 / second rate is low enough for this to be safe,
discussion in the document would be helpful.
-- last-call mailing list last-call@xxxxxxxx https://www.ietf.org/mailman/listinfo/last-call