[Aeon] Comments on draft-conet-aeon-problem-statement-00
"Pal Martinsen (palmarti)" <palmarti@cisco.com> Mon, 26 May 2014 12:34 UTC
Return-Path: <palmarti@cisco.com>
X-Original-To: aeon@ietfa.amsl.com
Delivered-To: aeon@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id EFFFA1A0146
for <aeon@ietfa.amsl.com>; Mon, 26 May 2014 05:34:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -13.252
X-Spam-Level:
X-Spam-Status: No, score=-13.252 tagged_above=-999 required=5
tests=[BAYES_20=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5,
RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5]
autolearn=ham
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id 1oF7ZqTWrcqr for <aeon@ietfa.amsl.com>;
Mon, 26 May 2014 05:34:57 -0700 (PDT)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93])
(using TLSv1 with cipher RC4-SHA (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id D09061A0129
for <aeon@ietf.org>; Mon, 26 May 2014 05:34:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
d=cisco.com; i=@cisco.com; l=40972; q=dns/txt;
s=iport; t=1401107694; x=1402317294;
h=from:to:subject:date:message-id:mime-version;
bh=OtLJtuCMlHFR2/kMKIshnKoVJuQmNzc+xxjeLzL1spM=;
b=cecdCQeRmZ3ERbd02gsYtvn4GWRrY3PHbcs4KhaMIlOm0yT41u2ACfsg
Kerb+sduIq6IgxHnPiHVjMbcjnhpFwGkxWuiB7ZQA28tK+/o7FuVl7noH
onZa9ntgw1gRqBxUolLtgMvHLg8a2j6uHKJimrjAmlAR+bv+Ba9uKC/OW c=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AgYFAJY0g1OtJA2G/2dsb2JhbABZgkJFUljCEYEQFnSCLBpaFwFAAT8nBC6IJw2jTbR2EwSNb1+DNoEVBJUshEeTJ4M4gi8
X-IronPort-AV: E=Sophos; i="4.98,913,1392163200"; d="scan'208,217";
a="47276036"
Received: from alln-core-12.cisco.com ([173.36.13.134])
by alln-iport-6.cisco.com with ESMTP; 26 May 2014 12:34:53 +0000
Received: from xhc-rcd-x12.cisco.com (xhc-rcd-x12.cisco.com [173.37.183.86])
by alln-core-12.cisco.com (8.14.5/8.14.5) with ESMTP id s4QCYrgG009847
(version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL)
for <aeon@ietf.org>; Mon, 26 May 2014 12:34:53 GMT
Received: from xmb-rcd-x06.cisco.com ([169.254.6.164]) by
xhc-rcd-x12.cisco.com ([173.37.183.86]) with mapi id 14.03.0123.003; Mon, 26
May 2014 07:34:53 -0500
From: "Pal Martinsen (palmarti)" <palmarti@cisco.com>
To: "aeon@ietf.org" <aeon@ietf.org>
Thread-Topic: Comments on draft-conet-aeon-problem-statement-00
Thread-Index: AQHPeN7kjo24K3rIxEOSwBWusZ+WyA==
Date: Mon, 26 May 2014 12:34:52 +0000
Message-ID: <BEF8A9CD-C3E7-4010-B36A-7AF1CF6DAA53@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.55.154.69]
Content-Type: multipart/alternative;
boundary="_000_BEF8A9CDC3E74010B36A7AF1CF6DAA53ciscocom_"
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/aeon/L7ccv95lo1kASh5V88LacPcRsEk
Subject: [Aeon] Comments on draft-conet-aeon-problem-statement-00
X-BeenThere: aeon@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Application Enabled Open Networking \(AEON\)" <aeon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/aeon>,
<mailto:aeon-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/aeon/>
List-Post: <mailto:aeon@ietf.org>
List-Help: <mailto:aeon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/aeon>,
<mailto:aeon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 May 2014 12:35:00 -0000
Hi all, Thanks to the authors for writing this up. I think this is a huge step in the right direction. Fairly short and easy to read. Below are my comments. (I accidentally pulled the last version from https://github.com/Draft-Mafia/IETF-drafts/tree/master/AEON-Problem-Statement, so all my comments are to that version, not the 00 draft. But they are fairly similar and I only have fairly general comments at this stage.) Abstract Identification and treatment of application flows are important to many application providers and network operators. They often rely on these capabilities to deploy and/or support a wide range of applications. These applications, and the packet flows they generate and consume, may have specific connectivity requirements that can be .. specific flow requirements, such as latency, bandwidth and so on that can be .. To me connectivity is to vague, but might cover it. met if made known to the network. Historically, this functionality has been implemented to the extent possible using heuristics, which inspect and infer flow characteristics. Heuristics may be based on port ranges, network separation (e.g. subnets or VLANs, Deep Flow Inspection (DFI), or Deep Packet Inspection (DPI). But many application flows in current usages are dynamic, adaptive, time- bound, encrypted, peer-to-peer, asymmetric, used on multipurpose devices, and have different priorities depending on direction of flow, user preferences, and other factors. Any combination of these properties renders heuristic based techniques less effective and may result in compromises to application security or user privacy. Are we planning to cover feedback from network to application (Something ECN like) as well? To me this is an equally important part as it enables clients to adopt to changing network conditions. Thus maximising the usefulness of the network. For example rate limiting mechanisms that exist today might react in a much more precise and predictable way. I see that Req-4 covers somewhat covers that. I would like to add some wording regarding notification for changed network conditions or something similar. Table of Contents 1. Introduction 2. Typical Workflows 3. Limitations of Heuristic Based Solutions 4. Limitations of Existing Signaling Mechanisms 5. Efforts in Progress 6. Requirements 7. Acknowledgements 8. Informative References Authors' Addresses 1. Introduction Networks today, whether public or private, are challenged with demands to support rapidly increasing amounts of traffic. New channels for creating and consuming rich media are deployed at a rapid pace. Pervasive video and access on demand are becoming second nature to consumers. Communication applications make extensive use of rich media, placing unprecedented quality of experience expectation on the underlying network. These trends present challenges for network forecast and planning operations. Now more so than ever before, identification and treatment of application flows are critical for the successful deployment and operation of a growing number of business and household applications. These applications are based on wide range of signaling protocols and deployed by a diverse set of application providers that is not necessarily affiliated with the network providers across which the applications are used. Should we mention the SDN trend here as well? This have the potential to make SDN networks more powerful and easier to manage for the controller. The more exact flow information the SDN controller can chew on, the better the result. Historically, identification of application flows has been accomplished using heuristics, which infer flow characteristics based on port ranges, network separation, or inspection of the flow itself. Inspection techniques include DPI, which matches against characteristic signatures (e.g. key string, binary sequence, etc.) and DFI, which analyzes statistical characteristics and connection behavior of flows. Each of these techniques suffers from a set of limitations, particularly in the face of the challenges on the network outlined previously. Again having ECN like information going back to the client would be nice. Some feedback regarding available bandwidth would also be nice. But not as a “hard” reservation as done with RSVP. Just getting a hint would make clients much more robust in selection an appropriate sending rate for sits media. Heuristic-based approaches may not be efficient and require continuous updates of application signatures. Port based solutions suffer from port overloading and inconsistent port usage. Network separation techniques like IP subnetting are error prone and increase network management complexity. DPI and DFI are computationally expensive, prone to error, and become more challenging with greater adoption of encrypted signaling and secured media. An additional drawback of DPI and DFI is that any insights are not available, or need to be recomputed, at network nodes further down the application flow path. As the IETF establishes default behaviors that thwart pervasive surveillance (e.g. [RFC7258]), it will be important to provide mechanisms for applications that want to have the network provide differential flow treatment for their data. The intent is to have applications protect the contents of their flows, yet have the ability to opt-in to information exchanges that provide a more precise allocation of network resources and thus a better user experience. Yes. And it is important to standardise this to avoid unwanted information leakage. We should probably add a sentence or two regarding that. 2. Typical Workflows Various heuristic based approaches are used prevalently and successfully for the following workflows: 1. Provide network operators with visibility of traffic usage and patterns for troubleshooting, capacity planning, and other off network workflows. This is done by exporting observed traffic analysis via standard protocols such as IPFIX [RFC7011] and SNMP [RFC3416]as well as by proprietary protocols and methods. 2. Provide network operators with visibility of application and data usage for accounting and billing. 3. Provide differentiated network services for specific traffic according to network operator defined policies, including traffic classification, policing and shaping (e.g. [RFC2475]), providing admission control (e.g. [RFC6601]), impacting routing, and permitting passage of specific traffic (e.g. firewall functions). 4. Provide network feedback to the client. This data can be used by the client to improve rate adopting schemes, and might also provide better hints on how much bandwidth a client can expect to send through the network. (RMCAT WG might chime in here) 3. Limitations of Heuristic Based Solutions [cut] 4. Limitations of Existing Signaling Mechanisms The IETF has standardized several mechanisms involving explicit signaling between applications and the network that may be used to support visibility and differentiated network services workflows. Unfortunately, none of these has experienced widespread deployment success, nor are they well suited for the applications usages described previously. Existing signaling options include the following: o RSVP [RFC2205] is the original on-path signaling protocol standardized by the IETF. It is transported out-of-band and could be used to signal information about any transport protocol traffic (it currently supports TCP and UDP). Its original goal was to provide admission control. Its requirement for explicit reservation of resources end to end proved too heavy for most network environments. Its success was further impacted by its reliance on router-alert, which often leads to RSVP packets being filtered by intervening networks, and by its requirement for access to a raw socket, something that is generally not available to applications running in user space. To date, more lightweight signaling workflows utilizing RSVP have not been standardized within the IETF. o NSIS (next Steps in Signaling) [RFC5978] is the next iteration of RSVP-like signaling defined by the IETF. It focused on the same fundamental workflow as RSVP admission control as its main driver, and because it did not provide significant enough use-case benefits over RSVP, it has seen even less adoption than RSVP. o DiffServ [RFC4594] and VAN Tagging [IEEE-802.1Q] style packet marking can help provide QoS in some environments, but such markings are often modified or removed at various points in the network or when crossing network boundaries. There are additional limitations when using DiffServ with real-time communications applications, and the DART working group has been chartered to write a document that explains the limitations that exist with DiffServ when used with RTP in general as well in the specific RTCWeb use cases [I-D.ietf-rtcweb-use-cases-and-requirements]. And if we are doing network to client feedback. * ECN. Only works for TCP. Same problems as DSCP. Difficult for applications to get access to information in the TCP header or IP header. 5. Efforts in Progress [cut] 6. Requirements Rather than encourage independent, protocol specific solutions to this problem, this document advocates a protocol and application independent information model and individual data models that can be applied in a consistent fashion across a variety of protocols to enable explicit communication between applications and the networks on which they are used. The requirements are: Req-1: Allow applications to explicitly signal their flow characteristics to the network. Req-2: Provide network nodes visibility to application flow characteristics. Req-3: Enable network nodes to contribute to application flow descriptions. Req-4: Allow applications to receive resulting flow descriptions as feedback from the network. Req-4b: Allow application to receive notifications regarding changing network conditions? Req-5: Complement existing heuristic based mechanisms. Req-6: Provide differentiated service for both directions of a flow, including flows that cross administrative boundaries. Req-7: Provide mechanism to authenticate and authorize endpoints/ applications to signal flow characteristics, including 3rd party authentication and authorization for over-the-top (OTT) applications. Req-8: Provide mechanism for integrity protection and replay protection of messages exchanged between the application and the network. .-. Pål-Erik
- [Aeon] Comments on draft-conet-aeon-problem-state… Pal Martinsen (palmarti)