Re: [Banana] Updated Charter

Florin Baboescu <florin.baboescu@broadcom.com> Fri, 29 September 2017 20:53 UTC

Return-Path: <florin.baboescu@broadcom.com>
X-Original-To: banana@ietfa.amsl.com
Delivered-To: banana@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 82ED5134224 for <banana@ietfa.amsl.com>; Fri, 29 Sep 2017 13:53:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.44
X-Spam-Level:
X-Spam-Status: No, score=-2.44 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTML_OBFUSCATE_05_10=0.26, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=broadcom.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LGQMOgXqu__b for <banana@ietfa.amsl.com>; Fri, 29 Sep 2017 13:53:15 -0700 (PDT)
Received: from mail-io0-x22e.google.com (mail-io0-x22e.google.com [IPv6:2607:f8b0:4001:c06::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C3257124B18 for <banana@ietf.org>; Fri, 29 Sep 2017 13:53:14 -0700 (PDT)
Received: by mail-io0-x22e.google.com with SMTP id w94so829590ioi.7 for <banana@ietf.org>; Fri, 29 Sep 2017 13:53:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=broadcom.com; s=google; h=from:references:in-reply-to:mime-version:thread-index:date :message-id:subject:to:cc; bh=ogFytvq2HLULso3RR+2I8m2l+JBVbGJdL97SIcSX8D8=; b=UZihmufWSBVeZFyORtq50Atak9Tp/LzWOAhi2Z+ZvJxUvnRP7NAuwrY41cNxrTKrS3 HDkH/KswIoWYjoDq6anqyMQ7TyxOkJKzXHaq9uhOGAQZwzOCg7tluNivX8gQs7kBtOjx k4wf4ddm0+1ro+jSR3KrFx7OzVb57KXjRsl4o=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:references:in-reply-to:mime-version :thread-index:date:message-id:subject:to:cc; bh=ogFytvq2HLULso3RR+2I8m2l+JBVbGJdL97SIcSX8D8=; b=nY6cxgo3uzRTs38A0aP6tRCrHEaxBgfX8ayLygUyCzB2MOnmvxAd0UUVtyegQsGhkw 0WpVZWt56Q/hIoeL29d3Jz5q9FyjlWvStL0Zb4C/u3POBYy9SjuZKgZq5BLEI0JiAPgZ i34sRHC0CWvNcpnpKBDtmlh9Znx3C1StwAkVI+DNYDP6OKT8HGPP2KpT2MOH1l8RpZT/ dlUhPd4ZCHB0mZgRiBYfuNzyiAzO8MKXmifSuDpT6PbLKq2ysK8dHFIhKJqcyu+cDzML yXZcm27WEx1K7XAKABTkrJM2KfKvENRMqOln00kRJB55V8ST7b8RScLFGKMIavh2AJKs 5ECg==
X-Gm-Message-State: AMCzsaV1gOY4+yIKjKReuFRnK4SquU6Vh1Rj9ULQ1Xe6013t7uWPaupg a/UoYiOmVLufn+opfGWoZNeJMxBUhTh8yxnuNJExeg==
X-Google-Smtp-Source: AOwi7QAifCPiVx0BpFcyW7W7FI09F3QqnTLVqKsCqZyw4cq9hT5MGoUAjjRA7Iqvxo5qXVVxY4KvqTs2eoS1kuOGMmw=
X-Received: by 10.107.133.24 with SMTP id h24mr13847495iod.87.1506718393764; Fri, 29 Sep 2017 13:53:13 -0700 (PDT)
From: Florin Baboescu <florin.baboescu@broadcom.com>
References: <2F845727-395A-4FDD-9E6D-41734E22F9BD@gmail.com> <a7717b292b2f4ece916410f98dc38cb4@rew09926dag03b.domain1.systemhost.net> <BEBED891-9A4B-421F-BD80-606D20FB803B@gmail.com> <E6C17D2345AC7A45B7D054D407AA205C68F6B38A@eusaamb105.ericsson.se> <E8628CC1-A63B-422C-AF18-3A16AF3F9223@gmail.com> <E6C17D2345AC7A45B7D054D407AA205C68F6B49C@eusaamb105.ericsson.se> <B420FF35-A139-45EB-AE64-A330B58A5E28@nokia.com> <0C6764E0-B414-4F0A-A04C-B9CC9E5DFABB@gmail.com> <D5F00874.28BB74%sgundave@cisco.com> <A0ED15BD-D3D2-461A-83A8-FC4015A73EE2@gmail.com> <D5F1703B.5643%sgundave@cisco.com> <495513e936694f4da78b8ccf3091c618@rew09926dag03b.domain1.systemhost.net> <D5F26882.5810%sgundave@cisco.com> <D760CAA0-60B7-4DE6-A0CD-690B159E8249@gmail.com> <4552F0907735844E9204A62BBDD325E7A6643E46@NKGEML515-MBS.china.huawei.com>
In-Reply-To: <4552F0907735844E9204A62BBDD325E7A6643E46@NKGEML515-MBS.china.huawei.com>
MIME-Version: 1.0
X-Mailer: Microsoft Outlook 15.0
Thread-Index: AQHdU6RcjcScsilFXW7Xhv91jlchfAI2vvIfAZUpZAICMJ8V2gGJutnaAm/ZKRMBoGQ5xAORv2ywAn0P8UcCG6egswH42ieiAsxhhAkCQ5bSlgHGZ8oxAcpLmJShxUqNcA==
Date: Fri, 29 Sep 2017 13:53:11 -0700
Message-ID: <9a8b3079a54b71627142d339c2a5a676@mail.gmail.com>
To: "Zhangmingui (Martin)" <zhangmingui@huawei.com>, Margaret Cullen <margaretw42@gmail.com>, "Sri Gundavelli (sgundave)" <sgundave@cisco.com>
Cc: philip.eardley@bt.com, wim.henderickx@nokia.com, david.i.allan@ericsson.com, banana@ietf.org
Content-Type: multipart/alternative; boundary="001a113fc0fca34500055a5a36d0"
Archived-At: <https://mailarchive.ietf.org/arch/msg/banana/c7cpGjDRYDy0sCK2fyCb42mEZ8Y>
Subject: Re: [Banana] Updated Charter
X-BeenThere: banana@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Bandwidth Aggregation for interNet Access: Discussion of bandwidth aggregation solutions based on IETF technologies." <banana.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/banana>, <mailto:banana-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/banana/>
List-Post: <mailto:banana@ietf.org>
List-Help: <mailto:banana-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/banana>, <mailto:banana-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Sep 2017 20:53:18 -0000

Hi Margaret, Mingui,



Very unfortunate pick of the naming convention in the examples below.
Consider that the N1-N4 have all a very clear meaning in the 5G System
architecture. Anyway, going back to the content, you mentioned below:

“Providers want performance measurement probes to be transmitted along the
same path as data packets. These probes will be defined as control
messages. Think about the above anycast mechanism. Providers do not expect
these probes to be exchanged between N1 and N2. In order to make the probes
be exchanged between N1 and N3 (or N4), these control messages (better all
the control messages) need to take the same tunnels as data packets. I do
not know an existing standard control protocol that meets this requirement
and can be used in the BANANA scenario. ”

There are already various tools for peer loss/path loss/path performance
measurements that IETF has standardized and that have already been in used
in various vendor solutions. Probes can be sent over a tunnel or on normal
transport path. Why exactly do I need a new one?

Thanks,

-Florin







*From:* Banana [mailto:banana-bounces@ietf.org] *On Behalf Of *Zhangmingui
(Martin)
*Sent:* Friday, September 29, 2017 4:49 AM
*To:* Margaret Cullen <margaretw42@gmail.com>; Sri Gundavelli (sgundave) <
sgundave@cisco.com>
*Cc:* philip.eardley@bt.com; wim.henderickx@nokia.com;
david.i.allan@ericsson.com; banana@ietf.org
*Subject:* Re: [Banana] Updated Charter



Hi Margaret,



> [With the caveat that I don’t think anything should be DSL/LTE-specific,
though, or assume that there are exactly two links, or that there is only
one “N2” that can reach a given end-node]



This is a good point. It’s common that providers use multiple aggregation
BANANA boxes to achieve load balance. N2 would be a branch router (not the
aggregation BANANA box) that adopts anycast mechanism. Suppose the
aggregation BANANA boxes behind N2 are N3 and N4, then the tunnel endpoints
would be N1-N3 or N1-N4 rather than N1-N2. For this reason, N3 needs to let
N1 know he is the real tunnel endpoint. To me, this feature has to be
realized by a BANANA control protocol. DNS does not support this feature.



We can also identify several other features that require BANANA control
protocol(s).



Bypass is another important feature that requires BANANA control
protocol(s). Basically, this requirement requires the two BANANA boxes to
use the control protocol to timely exchange the traffic types that need to
bypass the two bonding tunnels.



Providers want performance measurement probes to be transmitted along the
same path as data packets. These probes will be defined as control
messages. Think about the above anycast mechanism. Providers do not expect
these probes to be exchanged between N1 and N2. In order to make the probes
be exchanged between N1 and N3 (or N4), these control messages (better all
the control messages) need to take the same tunnels as data packets. I do
not know an existing standard control protocol that meets this requirement
and can be used in the BANANA scenario.



If the quality of one of the tunnels downgrades below a certain level
(e.g., the measured RTT exceeds 300ms), the two BANANA boxes have to agree
on to disable this tunnel instantly while remain the other tunnel. This
action has to be executed relying on the control protocol. Is there an
existing standard control protocol already supports this feature. I don’t
think so.



Thanks,

Mingui



*From:* Banana [mailto:banana-bounces@ietf.org <banana-bounces@ietf.org>] *On
Behalf Of *Margaret Cullen
*Sent:* Friday, September 29, 2017 2:49 AM
*To:* Sri Gundavelli (sgundave)
*Cc:* philip.eardley@bt.com; wim.henderickx@nokia.com;
david.i.allan@ericsson.com; banana@ietf.org
*Subject:* Re: [Banana] Updated Charter



Hi Sri,



On Sep 28, 2017, at 12:18 PM, Sri Gundavelli (sgundave) <sgundave@cisco.com>
wrote:



We cannot solve market fragmentation issue around protocol use and at least
that cannot be the reason for defining a new protocol, or WG creation.  If
that is the PS, Wim’s suggestion to focus on an information elements is a
great proposal to get all solutions towards a common approach, but not by
mandating a specific protocol use.



The point of standardization, at least IETF standardization, is so that
there can be products from multiple vendors that _interoperate_.  In my
opinion, this is a case where interoperability would be particularly
desirable, especially for situations where bandwidth aggregation is
performed over-the-top (as Dave Sinicrope would say), rather than
terminating in an operator's network.  The good news is that we already
have multiple options for bandwidth aggregation out there, with running
code, and they work.  The downside is that they are all proprietary, so
they don’t work _together_.  In your terminology, you can only get the
benefits of bandwidth aggregation if N1 and N2 were bought from the same
vendor, and the goal of this WG would be to fix that.



N1 wants to discover N2; It can be based on DNS FQDN, DNS SRV lookup, DHCP
option, an attribute in AAA that comes to the device as part of the access
authentication, or a static IP address configured locally.



Most of these choices require some sort of standards development work:  a
DHCP option, defining a AAA attribute, defining a new DNS SRV type, etc…
 None of these things can just magically be used to find “N2” in an
interoperable fashion, without some standards work.  Having 6 options is
about as useful, for interoperability, as having no option at all.  So, it
would be good to define one way that N1 finds N2 (or a limited set of ways,
and an order for trying them), so that boxes from different vendors can
actually find each other without users having to populate multiple
databases, deal with multiple boxes that do different things with the same
configuration information,  or configure the same information into
half-a-dozen places.



N1 wants to register with N2. N1 wants to presents its identity, authorize
it self. N2 needs to use the identify and check AAA/local DB to authorize
N1



Or it could use TLS, or DTLS, or…  There are numerous ways to authenticate
between boxes, and we won’t get any interoperability until we pick exactly
one.  If we wanted to use AAA (RADIUS or Diameter), we would also (at the
very least) need to define a service name, and agree to at least one “mandatory
to implement” method.  AAA might not be the best choice, though, given that
we probably don’t want to limit bandwidth aggregation to the case where N1
and N2 have a single authority or overarching federation to run the AAA
infrastructure.  So, a certificate-based or PKI system might be better?



N1 wants some flexible way to generate its identify, based on access
network, hardware identifiers ..etc

N1 wants to register its reachability with N2. I have IP1 from LTE and IP2
from DSL

N1 wants a ask N2 for a set of prefixes for its ingress network from the
anchor. It can obtain/register/negotiate Prefix P1, P2 and P3.

N1 wants an overlay tunnel to N2 over LTE. and another tunnel over DSL So,
N2 can forward the traffic bound to N1’s ingress prefixes over an overlay
path. Hiding the ingress prefix traffic from the transport topology

N1/N2 wants to continuously check path-reachability/peer-loss over DSL and
also over LTE

[…]



These are the sorts of things that require the exchange of control
information.  [With the caveat that I don’t think anything should be
DSL/LTE-specific, though, or assume that there are exactly two links, or
that there is only one “N2” that can reach a given end-node]  Perhaps you
are saying that MIP already has a control-information-exchange mechanism
that we could use for this?  If so, then great, you should propose it, and
we should consider it!  We might need to extend a MIP
control-information-exchange to include the information that is needed for
per-packet load-balancing and recombination.  If we also used MIP as the
tunnel-based Bandwidth Aggregation mechanism, we might also need to extend
the MIP tunnel support to include per-packet load balancing and
recombination functions — perhaps adding a packet sequence number, for
example.  If the proposed BANANA WG decides this is the best approach,
perhaps we could work with the DMM WG to standardize those extensions?
There may be other protocols we should consider for this role, though, that
don’t have existing IETF WGs.  In those cases, we might do the extensions
in the proposed BANANA WG.



I would also add something that you didn’t include:



There might be more than one Bandwidth Aggregation mechanism available on
N1.  For example, we might have an MPTCP-Proxy-based mechanism available
that can be used for Bandwidth Aggregation of TCP traffic, and a tunneling
mechanism that can handle any IP traffic.  N1 might want to know which
mechanisms are available on N2 (or potentially on N3 or N4 if they can be
used to reach the same end node), and what types of traffic they can
handle.  We might need some mechanism to resolve what traffic will be sent
where, etc.  If we envision a world with multiple standard Bandwidth
Aggregation mechanisms, we may need to choose at least one
mandatory-to-implement Bandwidth Aggregation mechanism that all of N1…Nn
will support, so that we can ensure interoperability.



Margaret