Re: [arch-d] A Public Option for the Core
Toerless Eckert <tte@cs.fau.de> Mon, 17 August 2020 16:17 UTC
Return-Path: <eckert@i4.informatik.uni-erlangen.de>
X-Original-To: architecture-discuss@ietfa.amsl.com
Delivered-To: architecture-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F034C3A11F9 for <architecture-discuss@ietfa.amsl.com>; Mon, 17 Aug 2020 09:17:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.119
X-Spam-Level:
X-Spam-Status: No, score=-1.119 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qDhqabbryNJP for <architecture-discuss@ietfa.amsl.com>; Mon, 17 Aug 2020 09:17:45 -0700 (PDT)
Received: from faui40.informatik.uni-erlangen.de (faui40.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:40]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CA4513A11F6 for <architecture-discuss@ietf.org>; Mon, 17 Aug 2020 09:17:44 -0700 (PDT)
Received: from faui48f.informatik.uni-erlangen.de (faui48f.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:52]) by faui40.informatik.uni-erlangen.de (Postfix) with ESMTP id 95C1654802F; Mon, 17 Aug 2020 18:17:38 +0200 (CEST)
Received: by faui48f.informatik.uni-erlangen.de (Postfix, from userid 10463) id 8DDE0440059; Mon, 17 Aug 2020 18:17:38 +0200 (CEST)
Date: Mon, 17 Aug 2020 18:17:38 +0200
From: Toerless Eckert <tte@cs.fau.de>
To: Joseph Touch <touch@strayalpha.com>
Cc: architecture-discuss@ietf.org
Message-ID: <20200817161738.GA62842@faui48f.informatik.uni-erlangen.de>
References: <754DE168-DF3B-4471-A145-39C6143E538A@comcast.net> <FB381338-A278-45B2-A40B-3A065E3A3ED1@strayalpha.com> <1fd2ed7d-d4bc-c5b7-9a4a-7966d5e60513@gmail.com> <20200817074637.GW62842@faui48f.informatik.uni-erlangen.de> <60B2B44D-5E6D-4CB2-AD63-1A8CB846BFA3@strayalpha.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <60B2B44D-5E6D-4CB2-AD63-1A8CB846BFA3@strayalpha.com>
User-Agent: Mutt/1.10.1 (2018-07-13)
Archived-At: <https://mailarchive.ietf.org/arch/msg/architecture-discuss/x9HLlnit4ukEmfPwhlt9XTRvaIs>
Subject: Re: [arch-d] A Public Option for the Core
X-BeenThere: architecture-discuss@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: open discussion forum for long/wide-range architectural issues <architecture-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/architecture-discuss/>
List-Post: <mailto:architecture-discuss@ietf.org>
List-Help: <mailto:architecture-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Aug 2020 16:17:47 -0000
On Mon, Aug 17, 2020 at 07:47:04AM -0700, Joseph Touch wrote: > > Then one can have a trusted layer that would map this information to > > actual network service requirements/advisory information. > > That???s an implementation detail inside the endpoint. See my prior answeer to andrew. Just because something may end up as an implementation inside an endpoint doesn't mean it couldn't be good work to standardize the abstract API. Also, what is a host. A bog with a bunch of containers orchestrated together via linux bridges ? ;-) Scott McNealy: The Network is the Computer. Aka: Just a matter of how we model things. I know, for a lot of old-time IETF'er, looking inside a physical box s heresy, but hey, we are even getting TAPS interface RFCs as standards track documents (horray!). > The *network* should not be doing that inference: > > a) because it is typically made to favor the provider, not the user And folks in ISOC may argue that in other countries it will favour governments. And i think we understand these challenges and can build solutions accordingly. > b) because it???s often incorrect, either because the needed info isn???t available (encryption) or deliberately obscured (running DNS over ports other than 53) Sure, IMHO just a technical challenge we can solve. And remember that in vertically integrated networks (see BrianC limited domains) visibility by the network is desired: In a vertial network solution, the application LOVEs to expose the RTP header so that jitter,latency,loss,reordering per flow can be monitored hop-by-hop by the network, problems quickly be isolated and fixed. If an OOT application does not want that service, it can encrypt everything. Why not.. I am sure the OOT will do exactly the same unencypted headers within its own DC for troubleshooting, diagnostics. Aka: the only problem we have in IETF is that we hear mostly from only one side of the spectrum of relevant options, and thats the OTT that do want to prohibit anything more than cheapest cost best effort service, because that type of network service is the basis of their business model and anything better wold be competitive to their business. > My broader concern is the latter part of the second one: I don???t like the impact of anti-inference strategies on network architecture. It tends to force designers to reinvent the Internet at other layers (inside HTTP, e.g.). Yes. But even worse is as i said above the influence mongering to ensure that no alternative technologies are allowed to be worked on in the IETF - by making the sham argument about what is or is not good for "the Internet". Such as when SPUD/PLUS where acted against. To make a funny analogy: There are use cases that rightfully so go even much further in their anti-inference/perpass strategy than the OTT, but they do not go running around the IETF trying to argue their way is the only way the IETF should go. Aka: If you want to see the (crrent) final word on protection against perpass: draft-ietf-ipsecme-iptfs ;-)) > Ultimately, there are only a few things the network can do with a packet: forward it, queue it, or drop it. Having classes of service that don???t map directly to those behaviors is an invitation for unnecessary state and complexity anyway. You forgot FEC insert/delete , duplication&merge, or even more general network coding). And of course there is a huge variety of differences in service level objective outcomes by how you forward (QoS routing), and/or how you queue. Having worked for decades on per-flow behavior in routers i do think that the most interesting area to explore is one which does not require per-flow state but allows to distinguish SLO on a per-packet level. This would allow us to introduce INtServ like functionality with even better than DiffServ scalability. > Back to neutrality, though, the point is that the *network* should be neutral to the user and use of a service, not that there should be only one service. Well... I would love to say "exactly right", but: a) Is there actually any accepted definition of net neutrality that says exactly this ? b) Even that definition goes way beyond differentiation in any other type of market. E.g.: If you are a tier1 OTT like e.g.: netflix, amazom prime, your ability to get your cache into pops of access SPs or peering bandwidth etc. is just going to be a lot better than a tier2 OTT will get. Aka: We already today have the same type of "volume of the deal" negotiations. But we have this in any other market as well. German example of course being: oh, you want to buy 50,000 cars for your employees... of yourse you get better pricing and/or get them earlier or get specials we don't offer to other customers. Aka: How do we argue that selling of packets should be different than selling of cars ? Toerless > Joe >
- Re: [arch-d] A Public Option for the Core Brian E Carpenter
- Re: [arch-d] A Public Option for the Core John Grant
- Re: [arch-d] A Public Option for the Core Jared Mauch
- Re: [arch-d] A Public Option for the Core Scott Shenker
- Re: [arch-d] A Public Option for the Core Toerless Eckert
- Re: [arch-d] A Public Option for the Core Christian Huitema
- Re: [arch-d] A Public Option for the Core Scott Shenker
- Re: [arch-d] A Public Option for the Core Brian E Carpenter
- Re: [arch-d] A Public Option for the Core Joseph Touch
- Re: [arch-d] A Public Option for the Core John Grant
- [arch-d] Fwd: A Public Option for the Core John Day
- Re: [arch-d] Fwd: A Public Option for the Core Joe Touch
- Re: [arch-d] Fwd: A Public Option for the Core Brian E Carpenter
- Re: [arch-d] Fwd: A Public Option for the Core Toerless Eckert
- Re: [arch-d] Fwd: A Public Option for the Core John Day
- Re: [arch-d] Fwd: A Public Option for the Core Toerless Eckert
- Re: [arch-d] Fwd: A Public Option for the Core Andrew Campling
- Re: [arch-d] A Public Option for the Core Joseph Touch
- Re: [arch-d] A Public Option for the Core Joseph Touch
- Re: [arch-d] Fwd: A Public Option for the Core Toerless Eckert
- Re: [arch-d] A Public Option for the Core Christian Huitema
- Re: [arch-d] A Public Option for the Core Toerless Eckert
- Re: [arch-d] A Public Option for the Core Toerless Eckert
- Re: [arch-d] A Public Option for the Core Christian Huitema
- Re: [arch-d] A Public Option for the Core Joseph Touch
- Re: [arch-d] A Public Option for the Core Joseph Touch
- Re: [arch-d] A Public Option for the Core John Levine
- Re: [arch-d] A Public Option for the Core Toerless Eckert
- Re: [arch-d] A Public Option for the Core Brian E Carpenter
- Re: [arch-d] A Public Option for the Core Toerless Eckert
- Re: [arch-d] A Public Option for the Core Joseph Touch
- Re: [arch-d] A Public Option for the Core Brian E Carpenter
- Re: [arch-d] A Public Option for the Core Marie-Jose Montpetit
- Re: [arch-d] A Public Option for the Core Andrew Campling
- Re: [arch-d] A Public Option for the Core Toerless Eckert