[bmwg] Fwd: New Version Notification for draft-lencse-bmwg-multiple-ip-addresses-00.txt

Gábor LENCSE <lencse@hit.bme.hu> Fri, 20 October 2023 08:41 UTC

Return-Path: <lencse@hit.bme.hu>
X-Original-To: bmwg@ietfa.amsl.com
Delivered-To: bmwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 61FECC1516E9 for <bmwg@ietfa.amsl.com>; Fri, 20 Oct 2023 01:41:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.907
X-Spam-Level:
X-Spam-Status: No, score=-6.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Vd42ZRWgYImH for <bmwg@ietfa.amsl.com>; Fri, 20 Oct 2023 01:41:22 -0700 (PDT)
Received: from frogstar.hit.bme.hu (frogstar.hit.bme.hu [IPv6:2001:738:2001:4020::2c]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 45435C151070 for <bmwg@ietf.org>; Fri, 20 Oct 2023 01:41:21 -0700 (PDT)
Received: from [192.168.123.11] (szefw.sze.hu [193.224.128.20]) (authenticated bits=0) by frogstar.hit.bme.hu (8.17.1/8.17.1) with ESMTPSA id 39K8f8B8041127 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO) for <bmwg@ietf.org>; Fri, 20 Oct 2023 10:41:14 +0200 (CEST) (envelope-from lencse@hit.bme.hu)
X-Authentication-Warning: frogstar.hit.bme.hu: Host szefw.sze.hu [193.224.128.20] claimed to be [192.168.123.11]
Content-Type: multipart/alternative; boundary="------------CAKgfGE00GyZ1qnO0QjKOXLy"
Message-ID: <e2ca2d8d-87f5-4b7b-b0ee-422d47398ca0@hit.bme.hu>
Date: Fri, 20 Oct 2023 10:41:06 +0200
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
References: <169779074966.18245.9470306526773026642@ietfa.amsl.com>
Content-Language: en-US
To: "bmwg@ietf.org" <bmwg@ietf.org>
From: Gábor LENCSE <lencse@hit.bme.hu>
In-Reply-To: <169779074966.18245.9470306526773026642@ietfa.amsl.com>
X-Forwarded-Message-Id: <169779074966.18245.9470306526773026642@ietfa.amsl.com>
X-Virus-Scanned: clamav-milter 0.103.8 at frogstar.hit.bme.hu
X-Virus-Status: Clean
Received-SPF: pass (frogstar.hit.bme.hu: authenticated connection) receiver=frogstar.hit.bme.hu; client-ip=193.224.128.20; helo=[192.168.123.11]; envelope-from=lencse@hit.bme.hu; x-software=spfmilter 2.001 http://www.acme.com/software/spfmilter/ with libspf2-1.2.11;
X-DCC--Metrics: frogstar.hit.bme.hu; whitelist
X-Scanned-By: MIMEDefang 2.86 on 152.66.248.44
Archived-At: <https://mailarchive.ietf.org/arch/msg/bmwg/xHi4ZbNnViHrhsmGflHOfZPoZA8>
Subject: [bmwg] Fwd: New Version Notification for draft-lencse-bmwg-multiple-ip-addresses-00.txt
X-BeenThere: bmwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Benchmarking Methodology Working Group <bmwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bmwg>, <mailto:bmwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bmwg/>
List-Post: <mailto:bmwg@ietf.org>
List-Help: <mailto:bmwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bmwg>, <mailto:bmwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Oct 2023 08:41:26 -0000

Dear BMWG Chairs and Members,

I have just submitted our new I-D "Recommendations for using Multiple IP 
Addresses in Benchmarking Tests".

It is quite short and focuses on a single problem described in its 
abstract (please see below).

Could you please read and comment it?

I would like to shortly present it at IETF 118 in Prague, in which I 
plan to take part in person -- first time in my life. :-)

Best regards,

Gábor


-------- Továbbított üzenet --------
Tárgy: 	New Version Notification for 
draft-lencse-bmwg-multiple-ip-addresses-00.txt
Dátum: 	Fri, 20 Oct 2023 01:32:29 -0700
Feladó: 	internet-drafts@ietf.org
Címzett: 	Gábor Lencse <lencse@sze.hu>, Gabor Lencse <lencse@sze.hu>, 
Keiichi Shima <shima@wide.ad.jp>



A new version of Internet-Draft 
draft-lencse-bmwg-multiple-ip-addresses-00.txt
has been successfully submitted by Gábor Lencse and posted to the
IETF repository.

Name: draft-lencse-bmwg-multiple-ip-addresses
Revision: 00
Title: Recommendations for using Multiple IP Addresses in Benchmarking Tests
Date: 2023-10-20
Group: Individual Submission
Pages: 8
URL: 
https://www.ietf.org/archive/id/draft-lencse-bmwg-multiple-ip-addresses-00.txt
Status: 
https://datatracker.ietf.org/doc/draft-lencse-bmwg-multiple-ip-addresses/
HTMLized: 
https://datatracker.ietf.org/doc/html/draft-lencse-bmwg-multiple-ip-addresses


Abstract:

RFC 2544 has defined a benchmarking methodology for network
interconnect devices. Its test frame format contained fixed IP
addresses and fixed port numbers. RFC 4814 introduced pseudorandom
port numbers, but it kept the usage of a single source and
destination IP address pair when a single destination network is
used. This limitation may cause an issue when the device under test
uses Receive-Side Scaling (RSS) mechanism in the packet processing
flow. RSS has two types of implementations: the first one only
includes the IP addresses, whereas the second one also includes the
port numbers into the tuple used for hashing. Benchmarking tests
that use a single IP address pair and RFC 4814 pseudorandom port
numbers are biased against the first type of RSS implementation,
because in this case, the traffic is not distributed among the
processing elements. This document recommends the usage of
pseudorandom IP addresses in a similar manner as RFC 4814 did it with
the port numbers.

If accepted, this document updates all affected RFCs, including RFC
2544, RFC 4814, RFC 5180, RFC 8219.



The IETF Secretariat