[Nsi-wg] time issue

Jerry Sobieski jerry at nordu.net
Tue Sep 28 16:40:04 CDT 2010


Hi Radak - see comment below...

Radek Krzywania wrote:
>
> Hi Jerry,
>
> IMHO setup and tear down times should be considered global (all NSA 
> along a path). User is not interested in partial results, as he/she is 
> not even aware/interested in which NSAs/domains are involved. User 
> doesn’t care (if everything works fine ;) ).
>
But we cannot expect all NSAs clocks to be exactly synchronized.    
Clocks are critical to bookahead scheduling, and independent 
quasi-synchronized clocks (however slightly skewed) will cause 
problems.    Some of those problems are evident in this discussion.

Open issue for discussion:  How do we address the issue of clock skew 
across a scheduled network?
>
>  
>
> For tear down, it does not matter where you start to removing the 
> configuration (end point, or any point along the path). Since you 
> remove single configuration point – the service is not available any 
> more. That the time where available time ends.
>
Actually, I would assert that the "available" time ends when the End 
Time elapses.  The "End Time" is by definition when the connection is no 
longer available, and the user should therefore not assume they are 
usable past that time.   Maybe the path resources will stay in place, 
but maybe not.  During reconfiguration, the state of cross connects 
along the path is indeterminate, and if /when they are reconfigured, 
then user data can be [mis]routed to 3rd parties, and 3rd party data may 
be [mis]routed to the egress STP.   

The real issue in my mind is "when is the actual End Time?"  Given that 
we cannot guarantee exactly when each NSA may reach their repective End 
Time, the End Time should be (IMHO:-) an Estimated End Time "plus or 
minus", and the user should consider the ramifications of this.  

We do not know which NSA will reach End Time first and begin to tear 
down the connection.  Nor do we know the delta between this first NSA's 
clock and the user's clock.  

I think the ideal situation is that the user sees the Estimated End Time 
approaching (via their own clock) and stops sending some user defined 
time prior to End Time.  The user lets the connection drain - still 
prior to End TIme.    Once the user traffic is drained, the user RA 
issues a Release Request.  We can, I think, assume that if the user 
issues the manual Release Request before the scheduled availability has 
ended, then the user has verified that no important data remains in the 
pipe.    But due to clock skew and due to the estimated End Time, the 
user's estimate of how much time is remaining may be substantially 
under-estimated.   This is why I think maybe a 2-minute warning might be 
useful - the user can request a warning of "n" seconds, and that warning 
will bubble up from the NSA who's clock is most advanced.  The user can 
then throttle down their traffic accordingly and then issue a Release 
Request.    While this might be nice, it is not fundamentally necessary 
for the protocol.  It helps the user, but the protocol must still be 
able to deterministically handle a user that ignores the warning and 
drives off the cliff.

Fundamentally, we want to make sure the user isn't surprised by an 
earlier than expected release due to clock skew.    And we won't know 
until close to the End Time who's clock is going to trigger the Release 
first.  The warning announces reveals that NSA and gives the user fair 
warning.

Whatever the method for initiating the release,  the network should 
insure that any user data accepted at the ingress prior to the End Time 
is not misrouted - even after the end time.    The network's only 
options are to try to deliver in-flight data properly or drop it.   
Since the End Time has been reached, the network can no longer assume 
that any segments are still usable, so delivering it is not really an 
option either.  The network must drop any stranded traffic.   Thus, we 
need to have some means of blocking new ingress data, and insuring bytes 
in flight get dropped asap. 

One might take a different view if we hold the connection in place for 
some safety/guard time past the local End Time.  This would do several 
things:  1) it would make sure the End Time has elapsed for all NSAs 
especially the user RA thus allowing full use during the available 
timeframe, and b) wait a few mils longer (latency time) so that any data 
in flight is delivered.  At this point (after all NSAs have reached the 
end time plus a latency factor) any remaing data in flight was 
definately sent after the reservation.  Bad user, bad user.   In this 
case, any data in flight is no longer the network's concern.   Then, we 
can reconfigure without regard to securing the user information.

Finally, we might consider how to insure that the connection is not torn 
down until *all* NSAs have reached the End Time.   THis could be 
indicated by flooding a "End Time Alert" notification  or some simlar 
message along the tree.   When that message is acknowledge by all NSAs 
in the connection, then a Release can begin.   Of course, here again, if 
an acknowledge is not received in a finite time, the connection is torn 
down unilaterally.  

I do however, think we need to address End Time processing in V1.0   
This is important - we need to have a clearly defined lifecycle and 
primitievs that do not promise something the protocol cannot deliver.   
 From this discussion, we cannot clearly state when the availability of 
the connection ends.

These are some very interesting and challenging nuances.   I hope this 
was useful musings...
br
Jerry
>
> We can discuss whether it should be synchronized or signaled, but I 
> would even left it for v2 (or v1.1, or whatever we decide). Since ALL 
> segments of connection has configuration removed, the resource time is 
> ended. I agree that resource time is difficult to forecast, yet we 
> need to fit that into calendar full of other reservations and 
> synchronize them.  Thus we need to estimate, guess, or use magic to 
> get those values as realistic as possible. Overlapping is forbidden, 
> and leaving gaps of unused resources will be waste of resources and 
> money at the end.
>
>  
>
> “Two minute warning” is not speaking to me. I don’t see a reason to 
> warn a domain or user that the connection will be closed soon, while 
> user knows what was requested and domain is tracking that with a 
> calendar. We can discuss some internal notifiers, but that’s 
> implementation.
>
>  
>
> Best regards
>
> Radek
>
>  
>
> ________________________________________________________________________
>
> Radoslaw Krzywania                      Network Research and Development
>
>                                            Poznan Supercomputing and 
>
> radek.krzywania at man.poznan.pl 
> <mailto:radek.krzywania at man.poznan.pl>                   Networking Center
>
> +48 61 850 25 26                             http://www.man.poznan.pl
>
> ________________________________________________________________________
>
>  
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.ogf.org/pipermail/nsi-wg/attachments/20100928/1e122a23/attachment.html 


More information about the nsi-wg mailing list