Dear All,
I agree and subscribe to the proposal to discuss the problem and the
possible solution based on BFD protocol. And adoption of this document, in
my view, is a logical step. I may point out that RFC 6423 described the use
of the existing BFD session providing connectivity verification over p2p
bidirectional MPLS-TP LSP or PW (note that BFD, in fact, provides
continuity check, not checking connectivity in transport network sense).

Regards,
Greg

On Tue, Oct 23, 2018 at 9:31 AM Acee Lindem (acee) <a...@cisco.com> wrote:

> Hi Albert, Les,
>
>
>
> I tend to agree with Les that BFD doesn’t seem like the right protocol for
> this. Note that if you use OSPF as your IGP and flap the interface when the
> MTU changes, you’ll detect MTU mismatches immediately due to OSPF’s DB
> exchange MTU negotiation. Granted, control plane detection won’t detect
> data plane bugs resulting in MTU fluctuations but I don’t see this as a
> frequent event.
>
>
>
> Thanks,
>
> Acee
>
>
>
> *From: *Rtg-bfd <rtg-bfd-boun...@ietf.org> on behalf of "Albert Fu
> (BLOOMBERG/ 120 PARK)" <af...@bloomberg.net>
> *Reply-To: *Albert Fu <af...@bloomberg.net>
> *Date: *Tuesday, October 23, 2018 at 11:44 AM
> *To: *"rtg-bfd@ietf.org" <rtg-bfd@ietf.org>, "Les Ginsberg (ginsberg)" <
> ginsb...@cisco.com>
> *Subject: *RE: BFD WG adoption for draft-haas-bfd-large-packets
>
>
>
> Hi Les,
>
>
>
> Given that it takes relative lengthy time to troubleshoot the MTU issue,
> and the associated impact on customer traffic, it is important to have a
> reliable and fast mechanism to detect the issue.
>
>
>
> I believe BFD, especially for single hop control-plane independent
> situation (btw, this covers majority of our BFD use case), is indeed an
> ideal and reliable solution for this purpose. It is also closely tied with
> the routing protocols, and enable traffic to be diverted very quickly.
>
>
>
> The choice of BFD timer is also one of the design tradeoffs - low BFD
> detection timer will cause more network churns. We do not need extremely
> aggressive BFD timer to achieve fast convergence. For example, with
> protection, we can achieve end to end sub-second convergence by using
> relatively high BFD interval of 150ms.
>
>
>
> In the case where the path will be used for a variety of encapsulations
> (e.g. Pure IP and L3VPN traffic), we would set the BFD padding to cater for
> the largest possible payload. So, in our case, our link needs to carry a
> mix of pure IP (1500 max payload) and MPLS traffic (1500 + 3 headers), we
> would set the padding so that the total padded BFD packet size is 1512
> bytes.
>
>
>
> As you rightly pointed out, ISIS routing protocol does support hello
> padding, but since this is a control plane process, we can not use
> aggressive timer. The lowest hello interval the can be configured is 1s, so
> with default multiplier of 3, the best we can achieve is 3s detection time.
>
>
>
> What we would like is a simple mechanism to validate that a link can
> indeed carry the expected max payload size before we put it into
> production. If an issue occurs where this is no longer the case (e.g. due
> to outages or re-routing within the Telco circuit), we would like a
> reliable mechanism to detect this, and also divert traffic around the link
> quickly. I feel BFD is a good method for this purpose.
>
>
>
> Thanks
>
> Albert
>
>
>
> From: ginsb...@cisco.com At: 10/23/18 10:45:02
>
> To: Albert Fu (BLOOMBERG/ 120 PARK ) <af...@bloomberg.net>,
> rtg-bfd@ietf.org
> Subject: RE: BFD WG adoption for draft-haas-bfd-large-packets
>
> Albert –
>
>
>
> Please understand that I fully agree with the importance of being able to
> detect/report MTU issues. In my own experience this can be a difficult
> problem to diagnose. You do not have to convince me that some improvement
> in detection/reporting is needed. The question really is whether using BFD
> is the best option.
>
>
>
> Could you respond to my original questions – particularly why sub-second
> detection of this issue is a requirement?
>
>
>
> For your convenience:
>
>
>
> *<snip>*
>
> *It has been stated that there is a need for sub-second detection of this
> condition – but I really question that requirement. *
>
> *What I would expect is that MTU changes only occur as a result of some
> maintenance operation (configuration change, link addition/bringup,
> insertion of a new box in the physical path etc.). The idea of using a
> mechanism which is specifically tailored for sub-second detection to
> monitor something that is only going to change occasionally seems
> inappropriate. It makes me think that other mechanisms (some form of OAM,
> enhancements to routing protocols to do what IS-IS already does **J)
> could be more appropriate and would still meet the operational
> requirements.*
>
>
>
> *I have listened to the Montreal recording – and I know there was
> discussion related to these issues (not sending padded packets all the
> time, use of BFD echo, etc.) – but I would be interested in more discussion
> of the need for sub-second detection.*
>
>
>
> *Also, given that a path might be used with a variety of encapsulations,
> how do you see such a mechanism being used when multiple BFD clients share
> the same BFD session and their MTU constraints are different?*
>
> *<end snip>*
>
>
>
> Thanx.
>
>
>
>    Les
>
>
>
>
>
>

Reply via email to