[bmwg] Fwd: New Version Notification for draft-lencse-bmwg-benchmarking-stateful-04.txt

Gábor LENCSE <lencse@hit.bme.hu> Thu, 30 June 2022 18:27 UTC

Return-Path: <lencse@hit.bme.hu>
X-Original-To: bmwg@ietfa.amsl.com
Delivered-To: bmwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 038C1C15A748 for <bmwg@ietfa.amsl.com>; Thu, 30 Jun 2022 11:27:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.906
X-Spam-Level:
X-Spam-Status: No, score=-1.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7Fp17J38HKwy for <bmwg@ietfa.amsl.com>; Thu, 30 Jun 2022 11:27:01 -0700 (PDT)
Received: from frogstar.hit.bme.hu (frogstar.hit.bme.hu [IPv6:2001:738:2001:4020::2c]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 16CC2C14F729 for <bmwg@ietf.org>; Thu, 30 Jun 2022 11:27:00 -0700 (PDT)
Received: from [192.168.1.145] (host-79-121-40-125.kabelnet.hu [79.121.40.125]) (authenticated bits=0) by frogstar.hit.bme.hu (8.15.2/8.15.2) with ESMTPSA id 25UIQkIu094920 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO) for <bmwg@ietf.org>; Thu, 30 Jun 2022 20:26:52 +0200 (CEST) (envelope-from lencse@hit.bme.hu)
X-Authentication-Warning: frogstar.hit.bme.hu: Host host-79-121-40-125.kabelnet.hu [79.121.40.125] claimed to be [192.168.1.145]
Content-Type: multipart/alternative; boundary="------------OwZ2w6cSTZ4vmyEpzHAFKDuN"
Message-ID: <b58b9df0-4351-d237-a3fd-7071ae56839c@hit.bme.hu>
Date: Thu, 30 Jun 2022 20:26:40 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.10.0
References: <165661038179.27835.14857088251623373893@ietfa.amsl.com>
Content-Language: en-US
To: "bmwg@ietf.org" <bmwg@ietf.org>
From: Gábor LENCSE <lencse@hit.bme.hu>
In-Reply-To: <165661038179.27835.14857088251623373893@ietfa.amsl.com>
X-Forwarded-Message-Id: <165661038179.27835.14857088251623373893@ietfa.amsl.com>
X-Virus-Scanned: clamav-milter 0.103.2 at frogstar.hit.bme.hu
X-Virus-Status: Clean
Received-SPF: pass (frogstar.hit.bme.hu: authenticated connection) receiver=frogstar.hit.bme.hu; client-ip=79.121.40.125; helo=[192.168.1.145]; envelope-from=lencse@hit.bme.hu; x-software=spfmilter 2.001 http://www.acme.com/software/spfmilter/ with libspf2-1.2.10;
X-DCC--Metrics: frogstar.hit.bme.hu; whitelist
X-Scanned-By: MIMEDefang 2.79 on 152.66.248.44
Archived-At: <https://mailarchive.ietf.org/arch/msg/bmwg/ax6UP0oUun188tD0D44eyJJD_F4>
Subject: [bmwg] Fwd: New Version Notification for draft-lencse-bmwg-benchmarking-stateful-04.txt
X-BeenThere: bmwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Benchmarking Methodology Working Group <bmwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bmwg>, <mailto:bmwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bmwg/>
List-Post: <mailto:bmwg@ietf.org>
List-Help: <mailto:bmwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bmwg>, <mailto:bmwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jun 2022 18:27:03 -0000

Dear BMWG List Members,

The new version of our draft contains:
- a method for the validation of connection establishment (in Section 
4.6) and
- a method for measuring connection tracking table capacity (in Section 
4.9).

Sándor, I hope that we managed to address your concerns.

As usual, I put the measurement results into the v6ops I-D on the 
scalability of IPv4aaS technologies, available: 
https://datatracker.ietf.org/doc/html/draft-lencse-v6ops-transition-scalability

All comments are welcome!

Best regards,

Gábor


-------- Továbbított üzenet --------
Tárgy: 	New Version Notification for 
draft-lencse-bmwg-benchmarking-stateful-04.txt
Dátum: 	Thu, 30 Jun 2022 10:33:01 -0700
Feladó: 	internet-drafts@ietf.org
Címzett: 	Gabor Lencse <lencse@sze.hu>, Keiichi Shima <keiichi@iijlab.net>




A new version of I-D, draft-lencse-bmwg-benchmarking-stateful-04.txt
has been successfully submitted by Gabor Lencse and posted to the
IETF repository.

Name: draft-lencse-bmwg-benchmarking-stateful
Revision: 04
Title: Benchmarking Methodology for Stateful NATxy Gateways using RFC 
4814 Pseudorandom Port Numbers
Document date: 2022-06-30
Group: bmwg
Pages: 22
URL: 
https://www.ietf.org/archive/id/draft-lencse-bmwg-benchmarking-stateful-04.txt
Status: 
https://datatracker.ietf.org/doc/draft-lencse-bmwg-benchmarking-stateful/
Htmlized: 
https://datatracker.ietf.org/doc/html/draft-lencse-bmwg-benchmarking-stateful
Diff: 
https://www.ietf.org/rfcdiff?url2=draft-lencse-bmwg-benchmarking-stateful-04

Abstract:
RFC 2544 has defined a benchmarking methodology for network
interconnect devices. RFC 5180 addressed IPv6 specificities and it
also provided a technology update, but excluded IPv6 transition
technologies. RFC 8219 addressed IPv6 transition technologies,
including stateful NAT64. However, none of them discussed how to
apply RFC 4814 pseudorandom port numbers to any stateful NATxy
(NAT44, NAT64, NAT66) technologies. We discuss why using
pseudorandom port numbers with stateful NATxy gateways is a difficult
problem. We recommend a solution limiting the port number ranges and
using two phases: the preliminary phase and the real test phase. We
show how the classic performance measurement procedures (e.g.
throughput, frame loss rate, latency, etc.) can be carried out. We
also define new performance metrics and measurement procedures for
maximum connection establishment rate, connection tear down rate and
connection tracking table capacity measurements.



The IETF Secretariat