Re: [bess] Thought about "Application Routing" in draft-dunbar-bess-bgp-sdwan-usage

Adrian Farrel <adrian@olddog.co.uk> Fri, 31 July 2020 08:34 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 28E1C3A1110; Fri, 31 Jul 2020 01:34:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.816
X-Spam-Level:
X-Spam-Status: No, score=-1.816 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G6dOlsElJMUB; Fri, 31 Jul 2020 01:34:47 -0700 (PDT)
Received: from mta8.iomartmail.com (mta8.iomartmail.com [62.128.193.158]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 63BE43A10C5; Fri, 31 Jul 2020 01:34:33 -0700 (PDT)
Received: from vs3.iomartmail.com (vs3.iomartmail.com [10.12.10.124]) by mta8.iomartmail.com (8.14.4/8.14.4) with ESMTP id 06V8YPii029765; Fri, 31 Jul 2020 09:34:25 +0100
Received: from vs3.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id CCCF2221AB; Fri, 31 Jul 2020 09:34:24 +0100 (BST)
Received: from asmtp3.iomartmail.com (unknown [10.12.10.224]) by vs3.iomartmail.com (Postfix) with ESMTPS id BFF3E221AA; Fri, 31 Jul 2020 09:34:24 +0100 (BST)
Received: from LAPTOPK7AS653V ([84.51.134.26]) (authenticated bits=0) by asmtp3.iomartmail.com (8.14.4/8.14.4) with ESMTP id 06V8YMV2010015 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 31 Jul 2020 09:34:23 +0100
Reply-To: adrian@olddog.co.uk
From: Adrian Farrel <adrian@olddog.co.uk>
To: 'Linda Dunbar' <linda.dunbar@futurewei.com>, "'Najem, Basil'" <basil.najem@bell.ca>, bess@ietf.org
Cc: draft-dunbar-bess-bgp-sdwan-usage@ietf.org
References: <0c0301d664d6$d084ee80$718ecb80$@olddog.co.uk> <b9874c661e814aefb47cc871dfc7b6a6@DG4MBX02-WYN.bell.corp.bce.ca> <SN6PR13MB2334E829E9E87F9C02D2F42A85730@SN6PR13MB2334.namprd13.prod.outlook.com> <0c3001d664e1$b5cabbf0$216033d0$@olddog.co.uk> <ebd80842fb26440d9622084b51ff72c4@DG4MBX02-WYN.bell.corp.bce.ca> <0c8d01d664e8$56f62310$04e26930$@olddog.co.uk> <39dd4ec463cf4563b400ba471cb0f705@DG4MBX02-WYN.bell.corp.bce.ca> <SN6PR13MB2334B31E3226EF6FA98A6A1885710@SN6PR13MB2334.namprd13.prod.outlook.com>
In-Reply-To: <SN6PR13MB2334B31E3226EF6FA98A6A1885710@SN6PR13MB2334.namprd13.prod.outlook.com>
Date: Fri, 31 Jul 2020 09:34:21 +0100
Organization: Old Dog Consulting
Message-ID: <00dd01d66715$642b1ed0$2c815c70$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00E3_01D6671D.C5F37E70"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQHx6mTWV8n5Zgm3a5e3mDxdAslM0QGZzUnzAuZg6FsCsTdP2wMkk11nAijopQIB50rR+gEW/HAAqG5ooWA=
Content-Language: en-gb
X-Originating-IP: 84.51.134.26
X-Thinkmail-Auth: adrian@olddog.co.uk
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.0.0.1623-8.2.0.1013-25574.006
X-TM-AS-Result: No--16.361-10.0-31-10
X-imss-scan-details: No--16.361-10.0-31-10
X-TMASE-Version: IMSVA-9.0.0.1623-8.2.1013-25574.006
X-TMASE-Result: 10--16.361100-10.000000
X-TMASE-MatchedRID: TxtdI7DxMqq+AWaOCXs78kNkUF3WMuv+cU9StUObqO0URlGBUHFsxR1i sqcpzooCXvbV/VnUv0p1vEDiNOsDJuFhIZQOllNSdb8fIn0mHYwZ9MKxHrUy4fXuWpt5ue19WGz y6KaAc0K+fDtkcnUNhj/BNDfeKjXQ6sRVYIMxDjbqYCMwwh+POSNViSJ4uDZrsMM2Q8vFmPbst8 E6lVcKCpI3m3wvHQGWFTo2vlU1NyOuIAdaOngkyqM1flC9amBgdhnFihmbnwUtQpEW9dyGbnP8v 3oY0bHkRDoF4SlRechPpNZhWEHrTJfucML7iAp6VT3yAebA8NqyBjDX4sGuTRmyTBaqiJvcIHBH fLiUo8T5ryQXOOhGzxwnDMc0BX2TRpcmbUU6+lsfs6+GayVk3QXGi/7cli9jq1xz4AyB7S2vcOJ bZ17mD2lys1PDhWLo8N3FVnPJiPxuDLE7yxAo356CKaYYGfNGIAjxomarSPA0I3BVHYDiVzL/GH oao0dVMiLlwex70ybNLjbcTwbKJ0VRqSsAR4H/AAj+Lc6r3d0gOuE1o0s+OiiDcgXvAzWybcPp/ oilssjCkpBlk/K6dC6wJgmjdFriRzIfTlkU66cidkD5Vylc98oT2gD1xc7NW6IdALvH8VNs98Z8 fG/6keq3FU+QGAFJ9G7MSVG2SqKxJzIkTUGzGbfptZTbFVSKLGDmqzfHOB9hjNvhgBEbC/68PEw d2eXRCPIvP3uOlZcDNbgylvRz/a92mNzMqYttma85uekQONzsDsv6raIUITRsz6Azwf9SXZmAtj ip/rFnQIwChQz9X7B1jo7RE/3NuXFEQJaCEz4fE8yM4pjsD4MbH85DUZXyuaN8gZEMR2aw7M6dy uYKg4VH0dq7wY7ufjKKUv4Bz6hmGPm0BMCaOwpDDYwWVW4olkd4OKC6PBmaHW1VGtweZQ==
X-TMASE-SNAP-Result: 1.821001.0001-0-1-12:0,22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/yRA6tMKHs7sYh_-kegElweyT-wU>
Subject: Re: [bess] Thought about "Application Routing" in draft-dunbar-bess-bgp-sdwan-usage
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 31 Jul 2020 08:34:56 -0000

Hi Linda,

 

Thank you so much for continuing to try to accommodate me. Please consider this my last attempt to fix this unless someone else on the mailing list joins in to support my opinion.

 

I do not believe the term “application forwarding” is either defined in the document or particularly meaningful. It is no better than “application routing” in this respect.

 

I think that you are trying to refer to “individual traffic flows associated with a specific application” (although you may intend to refer to “individual packets”). And you are either trying to describe how traffic is “classified” onto paths/tunnels (as in bullet 3) or trying to indicate how packets may be handled within the network (possibly bullet 4), or both.

 

You also have the use of an application identifier as a mechanism to classify traffic. If you go down that path you must discuss privacy and netneutrality even if all you have to say is that this function takes place within a private (enterprise) network where all users are assumed to be required to comply with the network operator’s usage rules.

 

I’ll stop now.

 

Once again, thanks for trying to make me happy 😊

 

Best,

Adrian

 

From: Linda Dunbar <linda.dunbar@futurewei.com> 
Sent: 30 July 2020 23:34
To: Najem, Basil <basil.najem@bell.ca>; adrian@olddog.co.uk; bess@ietf.org
Cc: draft-dunbar-bess-bgp-sdwan-usage@ietf.org
Subject: RE: Thought about "Application Routing" in draft-dunbar-bess-bgp-sdwan-usage

 

Adrian, 

 

Thank you very much for the comments and suggestions. 

Per your suggestions, we have changed the wording to the following. Do you think it is clear? 

 

Here are some key characteristics of “SDWAN” networks:

-   Augment of transport, which refers to utilizing overlay paths over different underlay networks. Very often there are multiple parallel overlay paths between any two SDWAN edges, some of which are private networks over which traffic can traverse with or without encryption, others require encryption, e.g. over untrusted public networks. 

-   Enable direct Internet access from remote sites, instead hauling all traffic to Corporate HQ for centralized policy control. 

-   Some traffic can be forwarded based on their application IDs instead of based on destination IP addresses. For example, placing traffic onto specific overlay paths based on their application IDs.  

-   The Application forwarding can also be based on specific performance criteria (e.g. packets delay, packet loos, jitter) to provide better application performance by choosing the right underlay that meets or exceeds the specified criteria. 

 

If it is not clear, can you help to wordsmith it? 

 

Linda Dunbar

From: Najem, Basil <basil.najem@bell.ca <mailto:basil.najem@bell.ca> > 
Sent: Tuesday, July 28, 2020 9:46 AM
To: adrian@olddog.co.uk <mailto:adrian@olddog.co.uk> ; Linda Dunbar <linda.dunbar@futurewei.com <mailto:linda.dunbar@futurewei.com> >; bess@ietf.org <mailto:bess@ietf.org> 
Cc: draft-dunbar-bess-bgp-sdwan-usage@ietf.org <mailto:draft-dunbar-bess-bgp-sdwan-usage@ietf.org> 
Subject: RE: Thought about "Application Routing" in draft-dunbar-bess-bgp-sdwan-usage

 

Hi Adrian;

 

Given the context in the document, I’d revert back to the original paragraph (my proposed text in the thread) and change “route/routed” to “forward/forwarded”.

 

Regards;

 

Basil

 

From: Adrian Farrel <adrian@olddog.co.uk <mailto:adrian@olddog.co.uk> > 
Sent: July-28-20 10:07 AM
To: Najem, Basil <basil.najem@bell.ca <mailto:basil.najem@bell.ca> >; 'Linda Dunbar' <linda.dunbar@futurewei.com <mailto:linda.dunbar@futurewei.com> >; bess@ietf.org <mailto:bess@ietf.org> 
Cc: draft-dunbar-bess-bgp-sdwan-usage@ietf.org <mailto:draft-dunbar-bess-bgp-sdwan-usage@ietf.org> 
Subject: [EXT]RE: Thought about "Application Routing" in draft-dunbar-bess-bgp-sdwan-usage

 

The issue I am trying to get at is that the text you have in the draft is unclear and probably going to explode.

*	We have an approximate solution for that

 

The secondary issue is whether you are talking about routing/forwarding within the network, or placing the traffic onto tunnels at the edge.

*	You are pretty clear on what you mean, and I am fine with that since it fits with my understanding of VPN.
*	Possibly Linda is thinking about how those tunnels are maintained and operated to meet the service levels that they offer. That would be (I think) out of scope for a BGP VPN

 

Maybe we can polish the paragraph in question to become…

 

Better user experience can be provided by placing traffic flows for an application onto tunnels over an underlay network that meet or exceed the specified performance criteria (e.g., packets delay, packet lose, jitter) for those traffic flows.

 

Cheers,

Adrian

 

From: Najem, Basil <basil.najem@bell.ca <mailto:basil.najem@bell.ca> > 
Sent: 28 July 2020 14:28
To: adrian@olddog.co.uk <mailto:adrian@olddog.co.uk> ; 'Linda Dunbar' <linda.dunbar@futurewei.com <mailto:linda.dunbar@futurewei.com> >; bess@ietf.org <mailto:bess@ietf.org> 
Cc: draft-dunbar-bess-bgp-sdwan-usage@ietf.org <mailto:draft-dunbar-bess-bgp-sdwan-usage@ietf.org> 
Subject: RE: Thought about "Application Routing" in draft-dunbar-bess-bgp-sdwan-usage

 

Let’s get back to what SD-WAN is doing: it can steer/forward the application traffic based on specified performance criteria value requirement. This criteria is set by the subscriber (user) to ensure a better experience (by choosing the best tunnel over an underlay). Not sure what’s the issue here Adrian? Can we capture this statement as per your suggestion and remove the word “route” (or routed) and replace it with “forward” (or forwarded)? 

 

Regards;

 

Basil

 

 

From: Adrian Farrel <adrian@olddog.co.uk <mailto:adrian@olddog.co.uk> > 
Sent: July-28-20 9:19 AM
To: 'Linda Dunbar' <linda.dunbar@futurewei.com <mailto:linda.dunbar@futurewei.com> >; Najem, Basil <basil.najem@bell.ca <mailto:basil.najem@bell.ca> >; bess@ietf.org <mailto:bess@ietf.org> 
Cc: draft-dunbar-bess-bgp-sdwan-usage@ietf.org <mailto:draft-dunbar-bess-bgp-sdwan-usage@ietf.org> 
Subject: [EXT]RE: Thought about "Application Routing" in draft-dunbar-bess-bgp-sdwan-usage

 

Thanks to both Linda and Basil,

 

My response is a little unthought as I am currently following two simultaneous sessions (sorry about that), but it seems to me that the answers from the two of you seem to be slightly at odds.

 

Basil is talking about steering whole traffic flows onto tunnels to be carried over the network; Linda is talking about routing individual packets within the network.

 

I would still caution you to avoid tying too tightly to the term “application”. A single application may generate multiple flows with different performance criteria and you will treat the flows differently. Conversely, two applications may generate flows that have identical performance criteria.

 

Thanks,

Adrian

 

From: Linda Dunbar <linda.dunbar@futurewei.com <mailto:linda.dunbar@futurewei.com> > 
Sent: 28 July 2020 14:05
To: Najem, Basil <basil.najem@bell.ca <mailto:basil.najem@bell.ca> >; adrian@olddog.co.uk <mailto:adrian@olddog.co.uk> ; bess@ietf.org <mailto:bess@ietf.org> 
Cc: draft-dunbar-bess-bgp-sdwan-usage@ietf.org <mailto:draft-dunbar-bess-bgp-sdwan-usage@ietf.org> 
Subject: RE: Thought about "Application Routing" in draft-dunbar-bess-bgp-sdwan-usage

 

Adrian, 

 

You said: 

As will be seen from the Application Aware Networking (APN) effort, the concept of traffic flows being routed according to the identity of the application is made complicated by various privacy and security concerns, not to mention issues of registering application identities.

 

The "Application" doesn't necessary mean all the bits in the payload. The "Application" can be any criteria that Client has indicated to Network Operators, for example the IPsec SA header bits, the TCP/UDP port number, the Source Addresses, etc. 

The network will not alter the forwarding behavior unless there is the request from the client to inform the network to forward their traffic based on its provided criteria.

 

This draft, which was written 2 years ago, is indeed to show that BGP can be effectively used to “do something similar to APN: that is, to classify the service that a particular application-sourced flow wants to receive from the network”. 

 

Since SDWAN is over different types of underlay networks, with different performance and security aspects, clients may want their specific traffic to traverse specific underlay networks, or specific peers. 

 

Yes, indeed that the goal is to “ the packets are 'coloured' for routing and treatment in the network.”

 

There is another draft in IDR to describe the encoding “Color” or “IPsec SA ID”: https://datatracker.ietf.org/doc/draft-dunbar-idr-sdwan-edge-discovery/ <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-dunbar-idr-sdwan-edge-discovery%2F&data=02%7C01%7Clinda.dunbar%40futurewei.com%7C44850878a9dc4196eccf08d83304e94c%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637315443483105481&sdata=noR0DNtSG7kVGTzqR98UCO33pMVQLFTvyOfCo1Jf%2BAk%3D&reserved=0> 

 

Welcome your comments to that draft. 

 

I will attend the APN side meeting on Thurs to understand more. 

 

 

Linda Dunbar

 

-----Original Message-----
From: Najem, Basil <basil.najem@bell.ca <mailto:basil.najem@bell.ca> > 
Sent: Tuesday, July 28, 2020 7:10 AM
To: adrian@olddog.co.uk <mailto:adrian@olddog.co.uk> ; bess@ietf.org <mailto:bess@ietf.org> 
Cc: draft-dunbar-bess-bgp-sdwan-usage@ietf.org <mailto:draft-dunbar-bess-bgp-sdwan-usage@ietf.org> 
Subject: RE: Thought about "Application Routing" in draft-dunbar-bess-bgp-sdwan-usage

 

Thanks Adrian for your comment.

 

How about changing the paragraph to something like:

 

"The application can be routed based on specific performance criteria (e.g. packets delay, packet lose, jitter) to provide a better experience by choosing a tunnel over an underlay that meets or exceeds the specified performance criteria threshold for that application"

 

Regards;

 

Basil

 

 

 

-----Original Message-----

From: Adrian Farrel <adrian@olddog.co.uk <mailto:adrian@olddog.co.uk> > 

Sent: July-28-20 8:01 AM

To: bess@ietf.org <mailto:bess@ietf.org> 

Cc: draft-dunbar-bess-bgp-sdwan-usage@ietf.org <mailto:draft-dunbar-bess-bgp-sdwan-usage@ietf.org> 

Subject: [EXT]Thought about "Application Routing" in draft-dunbar-bess-bgp-sdwan-usage

 

Hi,

 

As Linda noted in her agenda slot today, draft-dunbar-bess-bgp-sdwan-usage version 08 introduced a new paragraph in the Introduction that says:

 

    - The Application Routing can also be based on specific

       performance criteria (e.g. packets delay, packet loos, jitter)

       to provide better application performance by choosing the right

       underlay that meets or exceeds the specified criteria.

 

Firstly, s/loos/loss/ 😊

 

But I am concerned by the concept of "application routing" and I note that the term is not used elsewhere in the document nor is the concept expanded upon.

 

As will be seen from the Application Aware Networking (APN) effort, the concept of traffic flows being routed according to the identity of the application is made complicated by various privacy and security concerns, not to mention issues of registering application identities.

 

Fortunately, I suspect that this draft wants to do something similar to APN: that is, to classify the service that a particular application-sourced flow wants to receive from the network. This may be considerably more complex than DSCP, but the concept is the same that either a tunnel/pipe/flow is negotiated and established for use by the application, or the packets are 'coloured' for routing and treatment in the network.

 

I would suggest two things:

1. Be a lot more clear about what is meant by "application routing" possibly even using a different term 2. Have a look at the APN work - side meeting on Thursday; see https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FAPN-Community%2FIETF108-Side-Meeting-APN <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FAPN-Community%2FIETF108-Side-Meeting-APN&data=02%7C01%7Clinda.dunbar%40futurewei.com%7C44850878a9dc4196eccf08d83304e94c%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637315443483115477&sdata=1SI6sXCb0WQGtpvgQxFheQ1KhnOIZhnSDSpbmUA5mvY%3D&reserved=0> &amp;data=02%7C01%7Clinda.dunbar%40futurewei.com%7C456da5e6ae9e4fc3ff6808d832ef2ef0%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637315350161504633&amp;sdata=B4QkVHS%2FkUs%2BWFZgAFQ64BDIhNlIqYxnSrlQNOx%2Bblg%3D&amp;reserved=0 for all the details

 

Best,

Adrian

 

------------------------------------------------------------------------------

External Email: Please use caution when opening links and attachments / Courriel externe: Soyez prudent avec les liens et documents joints

 

  _____  

External Email: Please use caution when opening links and attachments / Courriel externe: Soyez prudent avec les liens et documents joints 

  _____  

External Email: Please use caution when opening links and attachments / Courriel externe: Soyez prudent avec les liens et documents joints