[bmwg] Fwd: New Version Notification for draft-lencse-bmwg-benchmarking-stateful-04.txt
Gábor LENCSE <lencse@hit.bme.hu> Thu, 30 June 2022 18:27 UTC
Return-Path: <lencse@hit.bme.hu>
X-Original-To: bmwg@ietfa.amsl.com
Delivered-To: bmwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 038C1C15A748 for <bmwg@ietfa.amsl.com>; Thu, 30 Jun 2022 11:27:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.906
X-Spam-Level:
X-Spam-Status: No, score=-1.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7Fp17J38HKwy for <bmwg@ietfa.amsl.com>; Thu, 30 Jun 2022 11:27:01 -0700 (PDT)
Received: from frogstar.hit.bme.hu (frogstar.hit.bme.hu [IPv6:2001:738:2001:4020::2c]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 16CC2C14F729 for <bmwg@ietf.org>; Thu, 30 Jun 2022 11:27:00 -0700 (PDT)
Received: from [192.168.1.145] (host-79-121-40-125.kabelnet.hu [79.121.40.125]) (authenticated bits=0) by frogstar.hit.bme.hu (8.15.2/8.15.2) with ESMTPSA id 25UIQkIu094920 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO) for <bmwg@ietf.org>; Thu, 30 Jun 2022 20:26:52 +0200 (CEST) (envelope-from lencse@hit.bme.hu)
X-Authentication-Warning: frogstar.hit.bme.hu: Host host-79-121-40-125.kabelnet.hu [79.121.40.125] claimed to be [192.168.1.145]
Content-Type: multipart/alternative; boundary="------------OwZ2w6cSTZ4vmyEpzHAFKDuN"
Message-ID: <b58b9df0-4351-d237-a3fd-7071ae56839c@hit.bme.hu>
Date: Thu, 30 Jun 2022 20:26:40 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.10.0
References: <165661038179.27835.14857088251623373893@ietfa.amsl.com>
Content-Language: en-US
To: "bmwg@ietf.org" <bmwg@ietf.org>
From: Gábor LENCSE <lencse@hit.bme.hu>
In-Reply-To: <165661038179.27835.14857088251623373893@ietfa.amsl.com>
X-Forwarded-Message-Id: <165661038179.27835.14857088251623373893@ietfa.amsl.com>
X-Virus-Scanned: clamav-milter 0.103.2 at frogstar.hit.bme.hu
X-Virus-Status: Clean
Received-SPF: pass (frogstar.hit.bme.hu: authenticated connection) receiver=frogstar.hit.bme.hu; client-ip=79.121.40.125; helo=[192.168.1.145]; envelope-from=lencse@hit.bme.hu; x-software=spfmilter 2.001 http://www.acme.com/software/spfmilter/ with libspf2-1.2.10;
X-DCC--Metrics: frogstar.hit.bme.hu; whitelist
X-Scanned-By: MIMEDefang 2.79 on 152.66.248.44
Archived-At: <https://mailarchive.ietf.org/arch/msg/bmwg/ax6UP0oUun188tD0D44eyJJD_F4>
Subject: [bmwg] Fwd: New Version Notification for draft-lencse-bmwg-benchmarking-stateful-04.txt
X-BeenThere: bmwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Benchmarking Methodology Working Group <bmwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bmwg>, <mailto:bmwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bmwg/>
List-Post: <mailto:bmwg@ietf.org>
List-Help: <mailto:bmwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bmwg>, <mailto:bmwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jun 2022 18:27:03 -0000
Dear BMWG List Members, The new version of our draft contains: - a method for the validation of connection establishment (in Section 4.6) and - a method for measuring connection tracking table capacity (in Section 4.9). Sándor, I hope that we managed to address your concerns. As usual, I put the measurement results into the v6ops I-D on the scalability of IPv4aaS technologies, available: https://datatracker.ietf.org/doc/html/draft-lencse-v6ops-transition-scalability All comments are welcome! Best regards, Gábor -------- Továbbított üzenet -------- Tárgy: New Version Notification for draft-lencse-bmwg-benchmarking-stateful-04.txt Dátum: Thu, 30 Jun 2022 10:33:01 -0700 Feladó: internet-drafts@ietf.org Címzett: Gabor Lencse <lencse@sze.hu>, Keiichi Shima <keiichi@iijlab.net> A new version of I-D, draft-lencse-bmwg-benchmarking-stateful-04.txt has been successfully submitted by Gabor Lencse and posted to the IETF repository. Name: draft-lencse-bmwg-benchmarking-stateful Revision: 04 Title: Benchmarking Methodology for Stateful NATxy Gateways using RFC 4814 Pseudorandom Port Numbers Document date: 2022-06-30 Group: bmwg Pages: 22 URL: https://www.ietf.org/archive/id/draft-lencse-bmwg-benchmarking-stateful-04.txt Status: https://datatracker.ietf.org/doc/draft-lencse-bmwg-benchmarking-stateful/ Htmlized: https://datatracker.ietf.org/doc/html/draft-lencse-bmwg-benchmarking-stateful Diff: https://www.ietf.org/rfcdiff?url2=draft-lencse-bmwg-benchmarking-stateful-04 Abstract: RFC 2544 has defined a benchmarking methodology for network interconnect devices. RFC 5180 addressed IPv6 specificities and it also provided a technology update, but excluded IPv6 transition technologies. RFC 8219 addressed IPv6 transition technologies, including stateful NAT64. However, none of them discussed how to apply RFC 4814 pseudorandom port numbers to any stateful NATxy (NAT44, NAT64, NAT66) technologies. We discuss why using pseudorandom port numbers with stateful NATxy gateways is a difficult problem. We recommend a solution limiting the port number ranges and using two phases: the preliminary phase and the real test phase. We show how the classic performance measurement procedures (e.g. throughput, frame loss rate, latency, etc.) can be carried out. We also define new performance metrics and measurement procedures for maximum connection establishment rate, connection tear down rate and connection tracking table capacity measurements. The IETF Secretariat
- [bmwg] Fwd: New Version Notification for draft-le… Gábor LENCSE