Hi, Saumya: This is a good question. I think you are right, and here is a problem. We should change this part according to your comments in the next version.
Thanks a lot! ^_^ Dacheng 发件人: "Saumya Dikshit (sadikshi)" <[email protected]> 日期: 2015年7月17日 星期五 下午4:16 至: dacheng de <[email protected]>, "Deepak Kumar (dekumar)" <[email protected]>, Shahram Davari <[email protected]>, "[email protected]" <[email protected]>, liyizhou <[email protected]>, tom <[email protected]> 抄送: "[email protected]" <[email protected]>, nvo3 <[email protected]>, maxpassion <[email protected]> 主题: Re: [nvo3] New draft: Path Detection in VXLAN Overlay Network Hi Dacheng, How is it ensured that incrementing the udp source port (outer header encap) will detect ALL ecmp paths ? As the ecmp hash algorithm may not be a standard one across device vendors. AFAIK, it’s more of proprietary. Thanks Saumya. From: Dacheng Zhang <[email protected]> Date: Thursday, July 9, 2015 at 9:41 AM To: "Deepak Kumar (dekumar)" <[email protected]>, Shahram Davari <[email protected]>, "[email protected]" <[email protected]>, liyizhou <[email protected]>, tom <[email protected]> Cc: "[email protected]" <[email protected]>, nvo3 <[email protected]>, maxpassion <[email protected]> Subject: Re: [nvo3] New draft: Path Detection in VXLAN Overlay Network Hi, Shahram: According to the feedback from the DC manager, this solution is more efficient. Assume a scenario, there are n paths and the length of each path is l. Using TTL, n*l packets needs to be generated to check all the paths while n packets needs to be generated in our solution. 发件人: nvo3 <[email protected]> on behalf of "Deepak Kumar (dekumar)" <[email protected]> 日期: 2015年7月7日 星期二 上午6:49 至: Shahram Davari <[email protected]>, "[email protected]" <[email protected]>, liyizhou <[email protected]>, tom <[email protected]> 抄送: "[email protected]" <[email protected]>, nvo3 <[email protected]>, maxpassion <[email protected]> 主题: Re: [nvo3] New draft: Path Detection in VXLAN Overlay Network Hi Shahram, From: Shahram Davari <[email protected]> Date: Monday, July 6, 2015 at 1:46 PM To: dekumar <[email protected]>, "[email protected]" <[email protected]>, Li Yizhou <[email protected]>, tom <[email protected]> Cc: "[email protected]" <[email protected]>, nvo3 <[email protected]>, maxpassion <[email protected]> Subject: RE: [nvo3] New draft: Path Detection in VXLAN Overlay Network Deepak, If TTL works then why invent a new method. Also this draft is very different from ETH Link Trace, since in Ethernet Link-Trace it is the MAC address that triggers the MIP lookup, while this draft requires deep packet inspection. Agreed. Yes ETH-LT is generated with multicast class2 DA and etype so any of these fields can be used to identify oam packet, In this scenario as we are inside tunnel and to track the packet, Deep packet inspection is required to identify OAM frame if we want to keep it flowing in hardware and identify ingress and egress interface without involving the cpu. Thanks, Deepak UP-MIP (that resides in egress interface) that uses TTL expiry is already defined for MPLS in RFC 7054 and can be used in IP tunnels as well. Thx Shahram From: Deepak Kumar (dekumar) [mailto:[email protected]] Sent: Monday, July 06, 2015 1:31 PM To: Shahram Davari; [email protected]; liyizhou; tom Cc: [email protected]; nvo3; maxpassion Subject: Re: [nvo3] New draft: Path Detection in VXLAN Overlay Network TTL use is fine and it works with existing hardware, but what this document is trying to provide another alternate approach where all devices are OAM capable and can look at O bit. In carrier Ethernet, CFM also generates Link trace message (single message) and all mip reply with link trace reply from both ingress and egress MIP along the path. As per my understanding what this draft is adding MIP in the ip network as whole network is OAM capable (especially datacenters), and the MIP are copying the packet and cpu is filling the ingress and egress interface from actual forwarding copy of packet, along the path and redirect to controller but packet keeps forwarding like normal data packet. R1 —— R2—— R3 Now if packet keeps forwarded in hardware in R2, and MIPs are placed on all interfaces, then you get correct ingress interface when R2 ingress mip is hit and correct egress interfce when R2 egress mip is hit and thus ingress and egress interface is provided. With TTL approach, once packet is punted to cpu, we can also figure out egress interface by calling hardware forwarding hashing algorithm, but then it’s cpu driven and not hardware copy of the exact data frame. Now forwarding hashing algorithm should be able to find the exact physical link if virtual links are present. Thanks, Deepak From: Shahram Davari <[email protected]> Date: Monday, July 6, 2015 at 12:01 PM To: "[email protected]" <[email protected]>, Li Yizhou <[email protected]>, tom <[email protected]>, dekumar <[email protected]> Cc: "[email protected]" <[email protected]>, nvo3 <[email protected]>, maxpassion <[email protected]> Subject: RE: [nvo3] New draft: Path Detection in VXLAN Overlay Network I agree. You should use TTL. TTL use will also solve layer violation issue. Thx SD From: nvo3 [mailto:[email protected]] On Behalf Of [email protected] Sent: Monday, July 06, 2015 6:21 AM To: liyizhou; tom; dekumar Cc: [email protected]; nvo3; maxpassion Subject: Re: [nvo3] New draft: Path Detection in VXLAN Overlay Network If we use TTL, at least we could say the path between ingress and egress node is OK if OAM is OK. Because the OAM packet goes through exactly the same forwarding behavior as the data packets. But for the mechanims in this document, if OAM is OK, we could not say the data path is OK. We could only get to know that the link between the nodes along the path is OK. That's the difference between this new OAM and other OAM mechanism (e.g., TTL based). Regards Lizhong > > > > From: Liyizhou <mailto:[email protected]> > > Date: 2015-07-06 14:58 > > To: Lizhong Jin <mailto:[email protected]> ; 'Tom Herbert' > <mailto:[email protected]> ; 'Deepak Kumar (dekumar)' > <mailto:[email protected]> > > CC: [email protected]; 'Dapeng Liu' <mailto:[email protected]> ; > [email protected] > > Subject: RE: [nvo3] New draft: Path Detection in VXLAN Overlay Network > > Hi Lizhong, > > > > No matter which way we use to capture a packet for further diagnose, it always > involves additional operations. Here following real data path is guaranteed. > > > > If we take receiving packet along the path as positive, there may be little > chance of false negative, e.g. data path is ok but replication of frame at > some node is not working so that the central sever misinterprets it as a loss > of the packet. However the next node will receive that packet and report it > correctly in most of the cases. In extreme corner case, there is no more node > along the path or all nodes have breaking replication function. Then it might > be a false negative. I kind of think it happens in almost all the OAM > mechanisms. Little chance like TTL=0 is not handled correctly, the response of > ping is not generated correctly, etc. > > > > I do not see a chance for false positive. > > > > Thanks, > > Yizhou > > > > -----Original Message----- > > From: Lizhong Jin [mailto:[email protected]] > > Sent: Monday, July 06, 2015 12:29 PM > > To: Liyizhou; 'Tom Herbert'; 'Deepak Kumar (dekumar)' > > Cc: [email protected]; 'Dapeng Liu' > > Subject: RE: [nvo3] New draft: Path Detection in VXLAN Overlay Network > > > > Hi Yizhou, > > The OAM packet with "copy/replicate" action will have different logic in the > chip with the normal data packet (e.g., the OAM packet will generate > "copy/replicate" action by special logic, and replicate one copy from original > packet, but normal data packet may not have these logic in some design). That > means they will have different data path in the chip. And loss of OAM packet > could not be ensured that normal data packet is also data, and normal packet > loss could not infer that OAM packet will also be lost. > > > > Lizhong > > > >> > -----Original Message----- > >> > From: Liyizhou [mailto:[email protected]] > >> > Sent: 2015年7月6日 11:12 > >> > To: Lizhong Jin; 'Tom Herbert'; 'Deepak Kumar (dekumar)' > >> > Cc: [email protected]; 'Dapeng Liu' > >> > Subject: RE: [nvo3] New draft: Path Detection in VXLAN Overlay Network > >> > > >> > Hi Lizhong, > >> > > >> > I believe "copy" here means replicate. The original data packet will > >> > be keeping going to the final destination. > >> > > >> > Thank, > >> > Yizhou > >> > > >> > -----Original Message----- > >> > From: nvo3 [mailto:[email protected]] On Behalf Of Lizhong Jin > >> > Sent: Monday, July 06, 2015 9:59 AM > >> > To: 'Tom Herbert'; 'Deepak Kumar (dekumar)' > >> > Cc: [email protected]; 'Dapeng Liu' > >> > Subject: Re: [nvo3] New draft: Path Detection in VXLAN Overlay Network > >> > > >> > Hi guys, > >> > In the draft, it says: > >> > Each network device receives the Path Tracking packet from its > >> > upstream device, makes a copy of it and passes the copy to its CPU. > >> > > >> > That means the OAM packet will have different data path with the > >> > normal packet. The normal packet will not have "copy" action in the > >> > datapath. Then how could the OAM packet detect the liveness of the > >> > datapath? Did I missed something? > >> > > >> > Regards > >> > Lizhong > >> > > >>> > > -----Original Message----- > >>> > > From: Tom Herbert [mailto:[email protected]] > >>> > > Sent: 2015年6月29日 23:37 > >>> > > To: Deepak Kumar (dekumar) > >>> > > Cc: [email protected]; Dapeng Liu > >>> > > Subject: Re: [nvo3] New draft: Path Detection in VXLAN Overlay > >>> > > Network > >>> > > > >>> > > On Mon, Jun 29, 2015 at 6:48 AM, Deepak Kumar (dekumar) > >>> > > <[email protected]> wrote: > >>>> > > > Hi Dapeng Liu, > >>>> > > > > >>>> > > > I support idea of hardware and controller based Path detection and > >>>> > > > tracking where whole network is OAM capable and packet keeps > >>>> > > > forwarding > >>> > > in hardware. > >>>> > > > I believe you guys presented this solution in ONS summit also. > >>>> > > > You should explicitly call out in draft that this solution is not > >>>> > > > backward compatible and all switches require to be OAM capable in > >>>> > > > hardware to look at new bit to punt and copy the packet even in >>>> underlay. > >>>> > > > > >>> > > VXLAN-GPE already defines an OAM bit. If all the hardware needs to > >>> > > be updated anyway, why not just move to that and avoid having to > >>> > > worry about the compatibility problem? > >>> > > > >>> > > Thanks, > >>> > > Tom > >>> > > > >>>> > > > Thanks, > >>>> > > > Deepak > >>>> > > > > >>>> > > > From: Dapeng Liu <[email protected]> > >>>> > > > Date: Saturday, June 20, 2015 at 10:04 AM > >>>> > > > To: <[email protected]> > >>>> > > > Subject: [nvo3] New draft: Path Detection in VXLAN Overlay Network > >>>> > > > > >>>> > > > Hello all, > >>>> > > > > >>>> > > > We have submitted a draft for path detection in VXLAN overlay >>>> network. > >>>> > > > http://datatracker.ietf.org/doc/draft-pang-nvo3-vxlan-path-detecti > >>>> > > > on > >>>> > > > / > >>>> > > > > >>>> > > > The draft proposes a method for path detection in VXLAN network > >>>> > > > and it defines the path detection packet format by using one > >>>> > > > reserve bit in the VXLAN header. > >>>> > > > > >>>> > > > Comments & suggestions are welcomed. > >>>> > > > > >>>> > > > > >>>> > > > -- > >>>> > > > Dapeng Liu > >>>> > > > > >>>> > > > > >>>> > > > _______________________________________________ > >>>> > > > nvo3 mailing list > >>>> > > > [email protected] > >>>> > > > https://www.ietf.org/mailman/listinfo/nvo3 > >>>> > > > > >>> > > > >> > > >> > > >> > _______________________________________________ > >> > nvo3 mailing list > >> > [email protected] > >> > https://www.ietf.org/mailman/listinfo/nvo3 > > _______________________________________________ nvo3 mailing list [email protected] https://www.ietf.org/mailman/listinfo/nvo3
_______________________________________________ nvo3 mailing list [email protected] https://www.ietf.org/mailman/listinfo/nvo3
