Re: [bmwg] Scalability measurement results of the Jool stateful NAT64 solution

Gábor LENCSE <lencse@hit.bme.hu> Mon, 07 March 2022 21:15 UTC

Return-Path: <lencse@hit.bme.hu>
X-Original-To: bmwg@ietfa.amsl.com
Delivered-To: bmwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 836BE3A0B21 for <bmwg@ietfa.amsl.com>; Mon, 7 Mar 2022 13:15:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.81
X-Spam-Level:
X-Spam-Status: No, score=-1.81 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, NICE_REPLY_A=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MdqTrdPaMx2s for <bmwg@ietfa.amsl.com>; Mon, 7 Mar 2022 13:14:57 -0800 (PST)
Received: from frogstar.hit.bme.hu (frogstar.hit.bme.hu [IPv6:2001:738:2001:4020::2c]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 934C43A0ADC for <bmwg@ietf.org>; Mon, 7 Mar 2022 13:14:55 -0800 (PST)
Received: from [192.168.1.145] (host-79-121-41-67.kabelnet.hu [79.121.41.67]) (authenticated bits=0) by frogstar.hit.bme.hu (8.15.2/8.15.2) with ESMTPSA id 227LETYG008362 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Mon, 7 Mar 2022 22:14:34 +0100 (CET) (envelope-from lencse@hit.bme.hu)
X-Authentication-Warning: frogstar.hit.bme.hu: Host host-79-121-41-67.kabelnet.hu [79.121.41.67] claimed to be [192.168.1.145]
Content-Type: multipart/alternative; boundary="------------e2HqgtXM4mEuwCWvcVq2evc3"
Message-ID: <62f3a73c-c177-d00e-f912-c17af623fd08@hit.bme.hu>
Date: Mon, 07 Mar 2022 22:14:23 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.6.2
Content-Language: en-US
To: "MORTON JR., AL" <acmorton@att.com>, "bmwg@ietf.org" <bmwg@ietf.org>
References: <9a857a06-d3b8-f06e-6fc7-49428ea1f7cd@sze.hu> <92240261-0a63-7b53-42ec-3fdaa92c9442@hit.bme.hu> <CH0PR02MB7980733FDCBF962412450AEBD3049@CH0PR02MB7980.namprd02.prod.outlook.com>
From: Gábor LENCSE <lencse@hit.bme.hu>
In-Reply-To: <CH0PR02MB7980733FDCBF962412450AEBD3049@CH0PR02MB7980.namprd02.prod.outlook.com>
X-Virus-Scanned: clamav-milter 0.103.2 at frogstar.hit.bme.hu
X-Virus-Status: Clean
Received-SPF: pass (frogstar.hit.bme.hu: authenticated connection) receiver=frogstar.hit.bme.hu; client-ip=79.121.41.67; helo=[192.168.1.145]; envelope-from=lencse@hit.bme.hu; x-software=spfmilter 2.001 http://www.acme.com/software/spfmilter/ with libspf2-1.2.10;
X-DCC--Metrics: frogstar.hit.bme.hu; whitelist
X-Scanned-By: MIMEDefang 2.79 on 152.66.248.44
Archived-At: <https://mailarchive.ietf.org/arch/msg/bmwg/1mugzUqwQ9w_XelDuEnBSpzuyZs>
X-Mailman-Approved-At: Mon, 07 Mar 2022 13:27:34 -0800
Subject: Re: [bmwg] Scalability measurement results of the Jool stateful NAT64 solution
X-BeenThere: bmwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Benchmarking Methodology Working Group <bmwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bmwg>, <mailto:bmwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bmwg/>
List-Post: <mailto:bmwg@ietf.org>
List-Help: <mailto:bmwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bmwg>, <mailto:bmwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2022 21:15:02 -0000

Dear Al,

3/3/2022 4:20 PM keltezéssel, MORTON JR., AL írta:
>
> Hi Gábor,
>
> I read through your measurements this morning, thanks for sharing them.
>

Thank you very much for being interested in them!

> Some small suggestions:
>
> In the tables of results, I thought it might be useful to have a table 
> that explains the abbreviations you used in the left-hand column. For 
> example, the abbreviation for connections per second, cps, doesn’t 
> appear in the text, and I had to look-around to find that throughput 
> is expressed in units of packets per second. But otherwise the tables 
> of results are very useful. You expressed the variation of repeated 
> measurements, etc.
>

Yes, it was really missing. Did you think something like this one?

    abbreviation          explanation
    ------------          -----------
    num. CPU cores        number of CPU cores
    src ports             size of the source port number range
    dst ports             size of the destination port number range
    num. conn.            number of connections = src ports * dst ports
    conntrack t. s.       size of the connection tracking table of the
                          DUT
    hash table size       size of the hash table of the DUT
    c.t.s/num.conn.       conntrack table size / number of connections
    num. experiments      number of experiments
    error                 the difference between the upper and the lower
                          bound of the binary search when it stops
    cps (median/min/max)  maximum connection establishment rate
                          (median, minimum, maximum)
    cps rel. scale up     the relative scale up of the maximum connection
                          establishment rate against the number of CPU
                          cores
    tp. rel. scale up     the relative scale up of the throughput
    throughput ratio (%)  the ratio of the throughput of iptables and the
                          throughput of IPv4 packet forwarding

        Figure 3: Explanation of the abbreviations for the scale up of
                   iptables against the number of CPU cores


I prepared it only as a sample. I plan to prepare similar ones for the 
other tables in the next version.


> Also, it would be good to use network addresses from the benchmarking 
> v4 and v6 address space. The nits check is flagging the current 
> addresses, which may have been the actual addresses used in your 
> experiment (and that’s normal practice, but nits will continue to flag 
> them unless you substitute...). See below.
>

In theory, I agree with your suggestion, however, I think that the usage 
of the documentation IP addresses would be inappropriate in this special 
case.
Why?
- I used the 10.0.0.1 and 10.0.0.2 private IPv4 addresses to express 
that "this is the private side of the NAT44 box".
- I used the 198.19.0.1 and 198.19.0.2 IPv4 addresses as well as the 
2001:2::1 and 2001:2::1 IPv6 addresses to express that "this drawing 
depicts a benchmarking setup".

What do you think of it?

Best regards,

Gábor

> Al
>
> Checking nits according to https://www.ietf.org/id-info/checklist :
>
> ----------------------------------------------------------------------------
>
> == There are 2 instances of lines with non-RFC6890-compliant IPv4 
> addresses
>
> in the document.If these are example addresses, they should be changed.
>
> == There are 2 instances of lines with private range IPv4 addresses in the
>
> document.If these are generic example addresses, they should be changed
>
> to use any of the ranges defined in RFC 6890 (or successor): 192.0.2.x,
>
> 198.51.100.x or 203.0.113.x.
>
> == There are 1 instance of lines with non-RFC3849-compliant IPv6 addresses
>
> in the document.If these are example addresses, they should be changed.
>
> *From:*bmwg <bmwg-bounces@ietf.org> *On Behalf Of *Gábor LENCSE
> *Sent:* Monday, February 21, 2022 4:01 PM
> *To:* bmwg@ietf.org
> *Subject:* [bmwg] Scalability measurement results of the Jool stateful 
> NAT64 solution
>
> Dear All,
>
>
> As an application of you draft "Benchmarking Methodology for Stateful 
> NATxy Gateways using RFC 4814 Pseudorandom Port Numbers", I have 
> measured the peformance of the Jool stateful NAT64 implementation. I 
> have examined, how its performance metrics (maximum connection 
> establisment rate and throughput) scale up with the number of CPU 
> cores, and how the number of connections degrade its performance. 
> (Jool scaled up much less well than iptables.)
>
> Taday I have uploaded the updated version of my v6ops I-D about the 
> results. You can find the new results in its Section 3: 
> https://datatracker.ietf.org/doc/html/draft-lencse-v6ops-transition-scalability-01#section-3 
> <https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-lencse-v6ops-transition-scalability-01*section-3__;Iw!!BhdT!kifrO2k7qtNtx_d0VHH5xBEEO8NQ3xajmXH03ZaWpd7lqGLB0DjiL7-PUqRHWKSsdaUgIac7g-9L0jU$>
>
>
> Any comments, recommendations, questions, etc. are welcome!
>
> We plan to update our BMWG draft about the methodology in 1-2 weeks 
> (by adding the method for measuring connection tear down rate).
>
> Best regards,
>
> Gábor
>
> -------- Továbbított üzenet --------
>
> *Tárgy: *
>
> 	
>
> New Version Notification for 
> draft-lencse-v6ops-transition-scalability-01.txt
>
> *Dátum: *
>
> 	
>
> Mon, 21 Feb 2022 05:13:54 -0800
>
> *Feladó: *
>
> 	
>
> internet-drafts@ietf.org
>
> *Címzett: *
>
> 	
>
> Gabor Lencse <lencse@sze.hu> <mailto:lencse@sze.hu>
>
>
>
>
> A new version of I-D, draft-lencse-v6ops-transition-scalability-01.txt
> has been successfully submitted by Gabor Lencse and posted to the
> IETF repository.
>
> Name: draft-lencse-v6ops-transition-scalability
> Revision: 01
> Title: Scalability of IPv6 Transition Technologies for IPv4aaS
> Document date: 2022-02-21
> Group: Individual Submission
> Pages: 12
> URL: 
> https://www.ietf.org/archive/id/draft-lencse-v6ops-transition-scalability-01.txt 
> <https://urldefense.com/v3/__https:/www.ietf.org/archive/id/draft-lencse-v6ops-transition-scalability-01.txt__;!!BhdT!kifrO2k7qtNtx_d0VHH5xBEEO8NQ3xajmXH03ZaWpd7lqGLB0DjiL7-PUqRHWKSsdaUgIac7ifFqxTI$>
> Status: 
> https://datatracker.ietf.org/doc/draft-lencse-v6ops-transition-scalability/ 
> <https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/draft-lencse-v6ops-transition-scalability/__;!!BhdT!kifrO2k7qtNtx_d0VHH5xBEEO8NQ3xajmXH03ZaWpd7lqGLB0DjiL7-PUqRHWKSsdaUgIac7si8Vb2k$>
> Htmlized: 
> https://datatracker.ietf.org/doc/html/draft-lencse-v6ops-transition-scalability 
> <https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-lencse-v6ops-transition-scalability__;!!BhdT!kifrO2k7qtNtx_d0VHH5xBEEO8NQ3xajmXH03ZaWpd7lqGLB0DjiL7-PUqRHWKSsdaUgIac7MZBB174$>
> Diff: 
> https://www.ietf.org/rfcdiff?url2=draft-lencse-v6ops-transition-scalability-01 
> <https://urldefense.com/v3/__https:/www.ietf.org/rfcdiff?url2=draft-lencse-v6ops-transition-scalability-01__;!!BhdT!kifrO2k7qtNtx_d0VHH5xBEEO8NQ3xajmXH03ZaWpd7lqGLB0DjiL7-PUqRHWKSsdaUgIac7ABCA1pM$>
>
> Abstract:
> Several IPv6 transition technologies have been developed to provide
> customers with IPv4-as-a-Service (IPv4aaS) for ISPs with an IPv6-only
> access and/or core network. All these technologies have their
> advantages and disadvantages, and depending on existing topology,
> skills, strategy and other preferences, one of these technologies may
> be the most appropriate solution for a network operator.
>
> This document examines the scalability of the five most prominent
> IPv4aaS technologies (464XLAT, Dual Stack Lite, Lightweight 4over6,
> MAP-E, MAP-T) considering two aspects: (1) how their performance
> scales up with the number of CPU cores, (2) how their performance
> degrades, when the number of concurrent sessions is increased until
> hardware limit is reached.
>
>
>
> The IETF Secretariat
>