Re: [Banana] Updated Charter

Margaret Cullen <margaretw42@gmail.com> Thu, 28 September 2017 18:49 UTC

Return-Path: <margaretw42@gmail.com>
X-Original-To: banana@ietfa.amsl.com
Delivered-To: banana@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 96EC01347BC for <banana@ietfa.amsl.com>; Thu, 28 Sep 2017 11:49:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.748
X-Spam-Level:
X-Spam-Status: No, score=-1.748 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id syTneUicType for <banana@ietfa.amsl.com>; Thu, 28 Sep 2017 11:49:06 -0700 (PDT)
Received: from mail-qt0-x231.google.com (mail-qt0-x231.google.com [IPv6:2607:f8b0:400d:c0d::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1BF7313479A for <banana@ietf.org>; Thu, 28 Sep 2017 11:49:06 -0700 (PDT)
Received: by mail-qt0-x231.google.com with SMTP id l25so2946039qtf.13 for <banana@ietf.org>; Thu, 28 Sep 2017 11:49:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc:message-id:references :to; bh=JP0tei7UtW+2Ec7uieMbfRqkCuKfXWU1ALr8svWcRY0=; b=CrmalUhpREXul9KRQNZHmyKtIxtLKMf+tP1SDZlLGcaAFMzL/ZCjg5ts6OAqVDb+wQ B8MCl5I1/axqsR5w5oYdcPwsnirMzT4cEDvLLjVs68wl03jUnev13l9Zang8O9oNZpLf WfxedI1LPHv31gkOx6nCwbkOiq6nThQGfvubbM6Ab1cBmOBs2DdiyS4sFk/kMYnXqntx XhCpvAbi1z/G1oK/pFxQRlu/MF1ktoe4i2fAEerJqgS86ttCCtk2kAF0jTvveoiyd3a1 LM1A7I/UYE1PTnkf1PmcnuEk29vDDC6pUlmm/wKd9FSH5h/o2TRyMkOCQBOJFzFAnGd8 zRCw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=JP0tei7UtW+2Ec7uieMbfRqkCuKfXWU1ALr8svWcRY0=; b=oYyqOnEsEM8ZrFJ1t4ye4I2EOGYk0fR1OYkjasCBUz9rjgc/yYnn7rpHe+jIUzsekV /CT7ioGbqkBh1qUpuiBVbH6llxNJdkU61OnO7t98eUnaLGiyUyEIG3Wza5BK/aBlKYo2 bK/pCgx5zEQccY94rTHzLeJfU25R23nYoGb0frAI5zzgdPtipvvwyP2mCRJP8QT5/fES KEdIWMrL7NK9T/tZ8iL63IkGTcIdsHtY975eX1j4Jgi/NzilTXgyBZE9OMzdPaQ+GTrx NgPQWrlHdyyf3gNIyFddohISp2oNXsoiuduH5fnzcUSdHQIA93LIpmMl17SZ3N2gNmPC rbTQ==
X-Gm-Message-State: AMCzsaWYoyMcyb/rzgxal/6Ee2aLCcm5FveW0ebzs9EenqPQ4nUpF34q LDnINbpcePLWPqS6UtRhxKk=
X-Google-Smtp-Source: AOwi7QAruyBw7ZlQWOY7QP+7nk5+AOnAJFJdkrHdKRXZjxNqePfSzlx4AbDvDq6I+OkRi+P1W1JXog==
X-Received: by 10.200.2.147 with SMTP id p19mr2364866qtg.242.1506624545220; Thu, 28 Sep 2017 11:49:05 -0700 (PDT)
Received: from ?IPv6:2601:18c:503:a54a:dd80:b7c7:708e:b64e? ([2601:18c:503:a54a:dd80:b7c7:708e:b64e]) by smtp.gmail.com with ESMTPSA id j206sm1451248qke.7.2017.09.28.11.49.03 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 28 Sep 2017 11:49:03 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_47F5387C-7A31-4F98-AF48-18A1647B6EAD"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Margaret Cullen <margaretw42@gmail.com>
In-Reply-To: <D5F26882.5810%sgundave@cisco.com>
Date: Thu, 28 Sep 2017 14:49:02 -0400
Cc: "philip.eardley@bt.com" <philip.eardley@bt.com>, "wim.henderickx@nokia.com" <wim.henderickx@nokia.com>, "david.i.allan@ericsson.com" <david.i.allan@ericsson.com>, "banana@ietf.org" <banana@ietf.org>
Message-Id: <D760CAA0-60B7-4DE6-A0CD-690B159E8249@gmail.com>
References: <2F845727-395A-4FDD-9E6D-41734E22F9BD@gmail.com> <a7717b292b2f4ece916410f98dc38cb4@rew09926dag03b.domain1.systemhost.net> <BEBED891-9A4B-421F-BD80-606D20FB803B@gmail.com> <E6C17D2345AC7A45B7D054D407AA205C68F6B38A@eusaamb105.ericsson.se> <E8628CC1-A63B-422C-AF18-3A16AF3F9223@gmail.com> <E6C17D2345AC7A45B7D054D407AA205C68F6B49C@eusaamb105.ericsson.se> <B420FF35-A139-45EB-AE64-A330B58A5E28@nokia.com> <0C6764E0-B414-4F0A-A04C-B9CC9E5DFABB@gmail.com> <D5F00874.28BB74%sgundave@cisco.com> <A0ED15BD-D3D2-461A-83A8-FC4015A73EE2@gmail.com> <D5F1703B.5643%sgundave@cisco.com> <495513e936694f4da78b8ccf3091c618@rew09926dag03b.domain1.systemhost.net> <D5F26882.5810%sgundave@cisco.com>
To: "Sri Gundavelli (sgundave)" <sgundave@cisco.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/banana/N0CL7vQaToke-UhmL4WfS-vRjlQ>
Subject: Re: [Banana] Updated Charter
X-BeenThere: banana@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Bandwidth Aggregation for interNet Access: Discussion of bandwidth aggregation solutions based on IETF technologies." <banana.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/banana>, <mailto:banana-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/banana/>
List-Post: <mailto:banana@ietf.org>
List-Help: <mailto:banana-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/banana>, <mailto:banana-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Sep 2017 18:49:07 -0000

Hi Sri,

> On Sep 28, 2017, at 12:18 PM, Sri Gundavelli (sgundave) <sgundave@cisco.com> wrote:
> 
> We cannot solve market fragmentation issue around protocol use and at least that cannot be the reason for defining a new protocol, or WG creation.  If that is the PS, Wim’s suggestion to focus on an information elements is a great proposal to get all solutions towards a common approach, but not by mandating a specific protocol use.

The point of standardization, at least IETF standardization, is so that there can be products from multiple vendors that _interoperate_.  In my opinion, this is a case where interoperability would be particularly desirable, especially for situations where bandwidth aggregation is performed over-the-top (as Dave Sinicrope would say), rather than terminating in an operator's network.  The good news is that we already have multiple options for bandwidth aggregation out there, with running code, and they work.  The downside is that they are all proprietary, so they don’t work _together_.  In your terminology, you can only get the benefits of bandwidth aggregation if N1 and N2 were bought from the same vendor, and the goal of this WG would be to fix that.

> N1 wants to discover N2; It can be based on DNS FQDN, DNS SRV lookup, DHCP option, an attribute in AAA that comes to the device as part of the access authentication, or a static IP address configured locally. 

Most of these choices require some sort of standards development work:  a DHCP option, defining a AAA attribute, defining a new DNS SRV type, etc…  None of these things can just magically be used to find “N2” in an interoperable fashion, without some standards work.  Having 6 options is about as useful, for interoperability, as having no option at all.  So, it would be good to define one way that N1 finds N2 (or a limited set of ways, and an order for trying them), so that boxes from different vendors can actually find each other without users having to populate multiple databases, deal with multiple boxes that do different things with the same configuration information,  or configure the same information into half-a-dozen places.  

> N1 wants to register with N2. N1 wants to presents its identity, authorize it self. N2 needs to use the identify and check AAA/local DB to authorize N1 

Or it could use TLS, or DTLS, or…  There are numerous ways to authenticate between boxes, and we won’t get any interoperability until we pick exactly one.  If we wanted to use AAA (RADIUS or Diameter), we would also (at the very least) need to define a service name, and agree to at least one “mandatory to implement” method.  AAA might not be the best choice, though, given that we probably don’t want to limit bandwidth aggregation to the case where N1 and N2 have a single authority or overarching federation to run the AAA infrastructure.  So, a certificate-based or PKI system might be better?  

> N1 wants some flexible way to generate its identify, based on access network, hardware identifiers ..etc
> N1 wants to register its reachability with N2. I have IP1 from LTE and IP2 from DSL
> N1 wants a ask N2 for a set of prefixes for its ingress network from the anchor. It can obtain/register/negotiate Prefix P1, P2 and P3. 
> N1 wants an overlay tunnel to N2 over LTE. and another tunnel over DSL So, N2 can forward the traffic bound to N1’s ingress prefixes over an overlay path. Hiding the ingress prefix traffic from the transport topology
> N1/N2 wants to continuously check path-reachability/peer-loss over DSL and also over LTE
[…]

These are the sorts of things that require the exchange of control information.  [With the caveat that I don’t think anything should be DSL/LTE-specific, though, or assume that there are exactly two links, or that there is only one “N2” that can reach a given end-node]  Perhaps you are saying that MIP already has a control-information-exchange mechanism that we could use for this?  If so, then great, you should propose it, and we should consider it!  We might need to extend a MIP control-information-exchange to include the information that is needed for per-packet load-balancing and recombination.  If we also used MIP as the tunnel-based Bandwidth Aggregation mechanism, we might also need to extend the MIP tunnel support to include per-packet load balancing and recombination functions — perhaps adding a packet sequence number, for example.  If the proposed BANANA WG decides this is the best approach, perhaps we could work with the DMM WG to standardize those extensions?  There may be other protocols we should consider for this role, though, that don’t have existing IETF WGs.  In those cases, we might do the extensions in the proposed BANANA WG. 

I would also add something that you didn’t include:

There might be more than one Bandwidth Aggregation mechanism available on N1.  For example, we might have an MPTCP-Proxy-based mechanism available that can be used for Bandwidth Aggregation of TCP traffic, and a tunneling mechanism that can handle any IP traffic.  N1 might want to know which mechanisms are available on N2 (or potentially on N3 or N4 if they can be used to reach the same end node), and what types of traffic they can handle.  We might need some mechanism to resolve what traffic will be sent where, etc.  If we envision a world with multiple standard Bandwidth Aggregation mechanisms, we may need to choose at least one mandatory-to-implement Bandwidth Aggregation mechanism that all of N1…Nn will support, so that we can ensure interoperability.

Margaret