Re: [Dclc] planning for ietf90

"Fei Song" <fsong@bjtu.edu.cn> Thu, 24 April 2014 00:10 UTC

Return-Path: <fsong@bjtu.edu.cn>
X-Original-To: dclc@ietfa.amsl.com
Delivered-To: dclc@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5874D1A0765 for <dclc@ietfa.amsl.com>; Wed, 23 Apr 2014 17:10:32 -0700 (PDT)
X-Quarantine-ID: <gwn9sBamov2P>
X-Virus-Scanned: amavisd-new at amsl.com
X-Amavis-Alert: BAD HEADER SECTION, Duplicate header field: "Message-ID"
X-Spam-Flag: NO
X-Spam-Score: 4.657
X-Spam-Level: ****
X-Spam-Status: No, score=4.657 tagged_above=-999 required=5 tests=[BAYES_50=0.8, CN_BODY_35=0.339, CN_BODY_509=0.029, MIME_8BIT_HEADER=0.3, MIME_CHARSET_FARAWAY=2.45, MSGID_FROM_MTA_HEADER=0.001, RCVD_DOUBLE_IP_LOOSE=1.012, RP_MATCHES_RCVD=-0.272, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gwn9sBamov2P for <dclc@ietfa.amsl.com>; Wed, 23 Apr 2014 17:10:30 -0700 (PDT)
Received: from bjtu.edu.cn (mail.bjtu.edu.cn [218.249.29.198]) by ietfa.amsl.com (Postfix) with SMTP id 563201A02AC for <dclc@irtf.org>; Wed, 23 Apr 2014 17:10:28 -0700 (PDT)
X-EYOU-SPAMVALUE: 0
X-EMDG-ORIGINAL-FROM: <fsong@bjtu.edu.cn>
X-EMDG-ORIGINAL-TO: <dclc@irtf.org>
X-EMDG-ORIGINAL-IP: 211.71.74.217
X-EMDG-VER: 4.1.0
Received: (eyou anti_spam gateway 4.1.0); Thu, 24 Apr 2014 08:04:02 +0800
Message-ID: <598297842.11143@bjtu.edu.cn>
X-EMDG-SMTPAUTH: fsong@bjtu.edu.cn
Received: from 211.71.74.217 by 218.249.29.198 with SMTP; Thu, 24 Apr 2014 08:04:02 +0800
Date: Thu, 24 Apr 2014 08:10:44 +0800
From: "Fei Song" <fsong@bjtu.edu.cn>
To: "Fred Baker (fred)" <fred@cisco.com>, =?gb2312?B?tcvB6cDy?= <lingli.deng@139.com>
References: <00c601cf5d26$bf6c7410$3e455c30$@com> <2b095354b337869-0000e.Richmail.00014356897851338097@139.com>, <598290157.20925@bjtu.edu.cn>
X-Priority: 3
X-Has-Attach: no
X-Mailer: Foxmail 7.0.1.91[cn]
Mime-Version: 1.0
Message-ID: <201404240810420620410@bjtu.edu.cn>
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
Archived-At: http://mailarchive.ietf.org/arch/msg/dclc/CKypWNy3kFXChBbiNA_3ZEWE_cw
Cc: dclc <dclc@irtf.org>
Subject: Re: [Dclc] planning for ietf90
X-BeenThere: dclc@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: fsong <fsong@bjtu.edu.cn>
List-Id: Discussion of Data Center Latency Control <dclc.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/dclc>, <mailto:dclc-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/dclc/>
List-Post: <mailto:dclc@irtf.org>
List-Help: <mailto:dclc-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/dclc>, <mailto:dclc-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Apr 2014 00:10:32 -0000

I got the first email as well~

Cheers!

--------------
Fei Song
>I received your first note, and sent a note to ietf-action to see if we can get SpamAssassin tuned to appreciate you a little more…
>
>Other comments inline.
>
>On Apr 20, 2014, at 11:11 PM, 邓灵莉 <lingli.deng@139.com> wrote:
>
>> Hi all,
>>  
>> It seemed that my last email did not get through, so I am resending it via another email account. Sorry if you get duplicate copies of the same content.
>>  
>> Looking forward to your comments and contribution.
>>  
>> Cheers,
>> Lingli
>> 
>> 
>> 
>> 
>> 
>> <11112014031114574914m7.jpg>	
>> 邓灵莉
>> 职务:	研究员/Researcher
>> 公司:	中国移动研究院/China Mobile Research Institute
>> 地址:	北京宣武门西大街32号/32 Xuanwumenxi Ave, Beijing
>> 邮箱:	lingli.deng@139.com
>> 手机:	13810597148
>> 邮编:	100053
>> 日期:	2014年04月21日 星期一
>>  
>> ------------------ 原始邮件 ------------------
>> 发件人: "邓灵莉/Lingli Deng" <denglingli@chinamobile.com>om>;
>> 发送时间: 2014-04-21 13:58:41
>> 收件人: "lingli.deng" <lingli.deng@139.com>om>;
>> 抄送: (无);
>> 主题: 转发: planning for ietf90
>>  
>>  
>> 发件人: 邓灵莉/Lingli Deng [mailto:denglingli@chinamobile.com] 
>> 发送时间: 2014年4月19日 10:34
>> 收件人: 'dclc@irtf.org'
>> 主题: planning for ietf90
>>  
>> Hi all,
>>  
>> From my impression, I believe people showed interest in the following topics, and would like to invite further discussion as we start planning for ietf 90.
>>  
>> 1, Production data sharing: 
>> It seems it is generally agreed that it would be both highly desirable and generally hard to get real data from production DCs. 
>> I suspect that a security personnel would naturally tend to say “NO” if he is asked to share a piece of raw data without knowing the risk it bears. Therefore, It may help if he is provided with a concrete list of aggregated metric/parameters, which is intended to outline the “vague big picture” rather than to capture “every sensitive detail”.
>> Hence, I would suggest that we start working on a more concrete “specification” about what specific data would be helpful based on the experience from the research community on working on a general problem.
>> Take the incast problem for instance, the distribution of flow duration/volume traversing a given bottleneck link may be of interest. What do you think?
>
>I agree that a specification of “what constitutes incast” might be useful. Part of that will involve, for example, the worst case queue depth that happens when an incast event occurs, and how many communications of what kind are involved. If we ask for a literal traffic trace, as you say, the risk is high and value is low. However, if we were to provide some sort of filter that a set of traffic traces could be fed through might come up with a usable summary of the information. Suppose, for example, that we were able to place a wireshark on the links into the bottleneck (Distribution or top-of-rack) switch leading to a requesting host and leading from the TOR to the host:
>
>                     Rack
>  +------------+
>  |Distribution|    +----+
>  |  Switch    +----+TOR |
>  +------------+    +----+
>                    |    |
>                    |    |
>                    +----+
>                    |Host|
>                    +----+
>                    |    |
>                    |    |
>                    |    |
>                    +----+
>
>and capture the seconds before to after the event. We should be able to describe that at the time of the event traffic was arriving into the rack at <some byte/packet rate>, and we saw <description of stream of requests> followed by <description of stream of responses>, followed by a return to ambient traffic. What I would expect we would observe is that the traffic before used some percentage of the link in a manner common to LANs, there was a crunch of data followed by some number of aftershocks as TCP did timeout retransmissions, and when the system returned to ambient behavior the competing traffic had largely been bludgeoned off the link and took a few seconds to recover. We should be able to describe that using anonymized addresses and not reporting potentially-private data.
>
>I would suggest that the wiresharks be time-synchronized using IEEE 1588a if possible.
>
>Would it make sense to post an internet draft describing this kind of thing so that anyone could comment and perhaps execute it?
>
>> 2, Problem statement/analysis
>> I believe it would be of great value to work on further exploring and better understanding the potential problems at least for the early phase of DCLC.
>> It is essential to have merge the understanding from DC operators (use-cases/expectations), understanding from general research (e.g. exploration of the factors contributing to a given problem and how it would affect the expectations) and the understanding from device manufactures (e.g. device features that triggers the contributing factors and affects operator’s expectation).
>> From a very high level, three types of use-cases (i.e. delay-sensitive distributed applications, virtualization, and multi-tenancy) and two types of problems (i.e. incast and bufferbloat) have been mentioned in our previous discussion. I would like to invite more input and concrete work on this direction.
>
>Agreed
>
>> 3, Solutions, of course
>> Original ideas/on-going work/experience on application of existing technologies are all welcome. Comparison or general reasoning among different solutions would also be appreciated.
>
>Agreed
>
>> 4, research/experimental tools
>> Original ideas/on-going work/experience on general simulation platform and testing guidelines (such as testing methodology and benchmarks) for DCLC relevant scenarios.
>> (We have not been discussing this on the list, but as I am planning testing myself, I find it quite desirable and believe it would be a common call.)
>
>Agreed
>
>> These are the ideas from my side, any other thoughts or suggestions?
>>  
>> Looking forward to your feedback and contribution.
>>  
>> Cheers,
>> Lingli
>> _______________________________________________
>> Dclc mailing list
>> Dclc@irtf.org
>> https://www.irtf.org/mailman/listinfo/dclc
>
>
>