Re: [DMM] Warren Kumari's Discuss on draft-ietf-dmm-mag-multihoming-04: (with DISCUSS)

Warren Kumari <warren@kumari.net> Thu, 17 August 2017 01:49 UTC

Return-Path: <warren@kumari.net>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 77CA7132407 for <dmm@ietfa.amsl.com>; Wed, 16 Aug 2017 18:49:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=kumari-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MAuSoRBWpPgt for <dmm@ietfa.amsl.com>; Wed, 16 Aug 2017 18:49:52 -0700 (PDT)
Received: from mail-wr0-x22e.google.com (mail-wr0-x22e.google.com [IPv6:2a00:1450:400c:c0c::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EBBBA132441 for <dmm@ietf.org>; Wed, 16 Aug 2017 18:49:46 -0700 (PDT)
Received: by mail-wr0-x22e.google.com with SMTP id 5so4627665wrz.5 for <dmm@ietf.org>; Wed, 16 Aug 2017 18:49:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kumari-net.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=HBlj1gE7Fk5hdjL2BPypPpC73eXHEU6hWdD40XhA8SI=; b=erOAR76Vh9zryvs8Ca4/jFvoZg+VkDBK6Wexdjblcp4dCQE/acMhs5lgW1jSQlnbRj WKs0EgnDjsoH/sxC/xK2ta1CezBh6yOX3ravKaeIShoj80g8/C1EmpiZCZGjSP88KxtM wmJvvo7DW4g8Tj4g3BFPNi/QIBO1wdyqz9iGK16au57M6QQR00IBgs7PfNbsuZgkr6tq GROMqEFmd9vRIe2llkVo5dqOqFpCFFNFvgvPuPK2+boZ7hOZnb9E71VP7yagjTZlQE23 68UzMfOgRC1M2xcdxnB+LQOH6bj+UqXeGB/qjtBCj22zG8cMGyEjKvCc4LY4r4wWx3P4 R8Ag==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=HBlj1gE7Fk5hdjL2BPypPpC73eXHEU6hWdD40XhA8SI=; b=rxBgDWI1ZBRXZUxiHTYW2xGqy7Zj4Odb8wSSljW/4ewyBlNiK5g03agzziAWY0JPoA JBi8+dP3BbaDz2xz2+dRHN4s7++eTjkWQjD5FlDkDAzmPnsVsX7nI8J3gSrNb/Fl8vAu Z8tNl+/cThDFrBgVnjGUPttx7ZQz7FvDAO6RlGQD4nryT1vfCwcnRwdxR8WrrQ577OfR Ma9FeQU+hM6qcpSP6i8JnjvzsiiHaXkRBe45ryKT54Tlc5nRW/qQmwfBE87yWWqGftXo G+jagRRb7i8tAYewbsQpHPVrcRoc1O3AhdGhg/XYx9tz78nsZuOZpbRGGQHGF6vgygsT LiQw==
X-Gm-Message-State: AHYfb5geNFZCGEjsSIP5ZqIP0Q46in/M65wOtWLVCxXawJ/TEZ9TXXsM 3erIP1zBUiUVr8QVU8R6NPx0X6tMsupO
X-Received: by 10.28.100.132 with SMTP id y126mr157094wmb.18.1502934584839; Wed, 16 Aug 2017 18:49:44 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.164.135 with HTTP; Wed, 16 Aug 2017 18:49:04 -0700 (PDT)
In-Reply-To: <D5B8F046.287689%sgundave@cisco.com>
References: <12323_1501708737_598241C1_12323_28_1_p123omkxf24p6fskvw4pi68k.1501708734898@email.android.com> <CAHw9_i+1Am7aSMAzrj9ctKCiLjDnb96Khn_LvTOveCN=Y6+g9g@mail.gmail.com> <D5B8F046.287689%sgundave@cisco.com>
From: Warren Kumari <warren@kumari.net>
Date: Wed, 16 Aug 2017 21:49:04 -0400
Message-ID: <CAHw9_iJs2Uwdo4T6LWB32wFW1a_oauzcmer+tXpGAOdWjjh4ng@mail.gmail.com>
To: "Sri Gundavelli (sgundave)" <sgundave@cisco.com>
Cc: "pierrick.seite@orange.com" <pierrick.seite@orange.com>, The IESG <iesg@ietf.org>, "draft-ietf-dmm-mag-multihoming@ietf.org" <draft-ietf-dmm-mag-multihoming@ietf.org>, Jouni Korhonen <jouni.nospam@gmail.com>, "dmm-chairs@ietf.org" <dmm-chairs@ietf.org>, "dmm@ietf.org" <dmm@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmm/Vq57VKKUiTzYdhks5G3bdk-_8rA>
Subject: Re: [DMM] Warren Kumari's Discuss on draft-ietf-dmm-mag-multihoming-04: (with DISCUSS)
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmm/>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Aug 2017 01:49:54 -0000

Thank you. This addresses my concerns.

W

On Tue, Aug 15, 2017 at 9:40 PM, Sri Gundavelli (sgundave)
<sgundave@cisco.com> wrote:
> Hi Warren,
>
> Slight rewrite of this paragraph without changing the original intent.
> Removed unnecessary text; identified the key issues.
>
> Please let me know if this addresses your concerns.
>
> Regards
> Sri
>
>
> ————————————-
>
> NEW:
>
> 3.2.  Traffic distribution schemes
>
> When the MAG has registered multipath binding with the LMA, there will be
> multiple established overlay tunnels between them. The MAG and the LMA can
> use any one, or more of the available tunnels paths for routing the mobile
> node’s IP traffic.  This specification does not recommend, or define any
> specific traffic distribution scheme, however it identifies two well-known
> approaches that implementations can potentially use. These approaches are,
> Per-flow and Per-packet Traffic distribution schemes.
>
> Per-Flow Traffic Distribution:
>
> In this approach the MAG and the LMA associate each of the IP flows
> (upstream and downstream) to a specific tunnel path. The packets in a given
> IP flow are always routed on the same overlay tunnel path; they are never
> split and routed concurrently on more than one tunnel path.  It is possible
> a given flow may be moved from one tunnel path to another, but the flow is
> never split. The decision to bind a given IP flow to a specific tunnel path
> is based on traffic distribution policy. This traffic distribution policy is
> either statically configured on both the MAG and the LMA, or dynamically
> negotiated  over Proxy Mobile IPv6 signaling.   The Flow Binding extension
> [6089] defines the mechanism and the semantics for exchanging the traffic
> policy between two tunnel peers and the same mechanism and the mobility
> options are used here.
>
> Per-Packet Traffic Distribution:
>
> In this approach, packets belonging a given IP flow will be split and routed
> across more than one tunnel paths. The exact approach for traffic
> distribution, or the distribution weights is outside the scope of this
> specification. In a very simplistic approach, assuming the established
> tunnel paths have symmetric characteristics, the packets can be equally
> distributed on all the available tunnel paths. In a different scenario when
> the links have different speeds, the chosen approach can be based on
> weighted distribution (Ex: n:m ratio). However, in any of these chosen
> approaches, implementations have to be sensitive to issues related to
> asymmetric link characteristics and the resulting issues such as
> re-ordering, buffering and the impact to the application performance. Care
> must be taken to ensure there is no negative impact to the application
> performance due to the use of this approach.
>
> —————————————————————-
>
> OD:
>
> 3.2.  Traffic distribution schemes
>
>    When receiving packets from the MN, the MAG distributes packets over
>    tunnels that have been established.  Traffic distribution can be
>    managed either on a per-flow or on a per-packet basis:
>
>    o  Per-flow traffic management: each IP flow (both upstream and
>       downstream) is mapped to a given tunnel, corresponding to a given
>       WAN interface.  Flow binding extension [RFC6089] is used to
>       exchange, and synchronize, IP flow management policies (i.e. rules
>       associating traffic selectors [RFC6088] to a tunnel).
>
>    o  Per-packet management: the LMA and the MAG distribute packets,
>       belonging to a same IP flow, over more than one bindings (i.e.
>       more than one WAN interface).  Packet distribution can be done
>       either at the transport level, e.g. using MPTCP or at When
>       operating at the IP packet level, different packets distribution
>       algorithms are possible.  For example, the algorithm may give
>       precedence to one given access: the MAG overflows traffic from the
>       primary access, e.g.  WLAN, to the second one, only when load on
>       primary access reaches a given threshold.  The distribution
>       algorithm is left to implementer but whatever the algorithm is,
>       packets distribution likely introduces packet latency and out-of-
>       order delivery.  LMA and MAG shall thus be able to make reordering
>       before packets delivery.  Sequence number can be can be used for
>       that purpose, for example using GRE with sequence number option
>       [RFC5845].  However, more detailed considerations on reordering
>       and IP packet distribution scheme (e.g. definition of packets
>       distribution algorithm) are out the scope of this document.
>
>    Because latency introduced by per-packet can cause injury to some
>    application, per-flow and per-packet distribution schemes could be
>    used in conjunction.  For example, high throughput services (e.g.
>    video streaming) may benefit from per-packet distribution scheme,
>    while latency sensitive applications (e.g.  VoIP) are not be spread
>    over different WAN paths.  IP flow mobility extensions, [RFC6089] and
>    [RFC6088], can be used to provision the MAG with such flow policies.
>
>
>
>
>
> On 8/15/17, 10:46 AM, "Warren Kumari" <warren@kumari.net> wrote:
>
> This document is on Thursday's telechat - I have not seen proposed
> text to address my concerns, and so I'm continuing to hold my DISCUSS
> position.
>
> W
>
> On Wed, Aug 2, 2017 at 5:18 PM,  <pierrick.seite@orange.com> wrote:
>
> Hello
>
> Please see inline
>
> Pierrick
>
>
>
> Sent from my cell phone, mind the typos.
>
> -------- Message d'origine --------
> De : Warren Kumari <warren@kumari.net>
> Date : 02/08/2017 22:23 (GMT+01:00)
> À : The IESG <iesg@ietf.org>
> Cc : draft-ietf-dmm-mag-multihoming@ietf.org, Jouni Korhonen
> <jouni.nospam@gmail.com>, dmm-chairs@ietf.org, jouni.nospam@gmail.com,
> dmm@ietf.org
> Objet : Warren Kumari's Discuss on draft-ietf-dmm-mag-multihoming-04: (with
> DISCUSS)
>
> Warren Kumari has entered the following ballot position for
> draft-ietf-dmm-mag-multihoming-04: Discuss
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-dmm-mag-multihoming/
>
>
>
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
>
> Section 3.2.  Traffic distribution schemes
> "Per-packet management: the LMA and the MAG distribute packets, belonging to
> a
> same IP flow, over more than one bindings (i.e. more than one WAN
> interface)."
> This immediately made my out-of-order-packets antenna pop up, so I read the
> section looking for mitigations. The very next sentence reads: "Packet
> distribution can be done either at the transport level, e.g. using MPTCP or
> at
> When operating at the IP packet level, different packets distribution
> algorithms are possible. " -- the fact that this sentence is a: malformed
> and
> b: hand-wavy did nothing to allay my concerns, so I read further: "The
> distribution algorithm is left to implementer but whatever the algorithm is,
> packets distribution likely introduces packet latency and out-of-order
> delivery.  LMA and MAG shall thus be able to make reordering before packets
> delivery." - I agree with the first sentence (although it is poorly worded),
> but the second sentence doesn't follow from the first; "shall thus be able
> to"
> implies that the prior text somehow provides a solution, not points out a
> problem (the sentence is also malformed)-- I think you mean something like
> "The
> LMA and MAG thus need to be able reorder packets to their original order
> before
> delivery."
>
> This then continues with "Sequence number can be can be used for that
> purpose,
> for example using GRE with sequence number option [RFC5845]." - I think that
> the actual reference should be RFC2890, but regardless of this, I don't
> think
> that what you are proposing works - "The Sequence Number field is used to
> maintain sequence of packets **within** the GRE Tunnel." (from RFC2890,
> emphasis added). This means that sequence numbers are local to the tunnel,
> and
> (as I understand it) your solution involves diverse tunnels. Further,
> Section
> 2.2. Sequence Number says: "The receiver may perform a small amount of
> buffering in an attempt to recover the original sequence of transmitted
> packets. In this case, the packet may be placed in a buffer sorted by
> sequence
> number." - if you are proposing using a single sequence number space for
> multiple tunnels, you will end up with sequence number space gabs, and lots
> of
> buffering, etc. The section ends with: "However, more detailed
> considerations
> on reordering  and IP packet distribution scheme (e.g. definition of packets
> distribution algorithm) are out the scope of this document." - I think that,
> unless the prior paragraph is significantly reworked, it should not try and
> suggest any mitigations.
>
> ok
>
>
> The whole idea of striping packets of a flow across (notably) different
> transports seems like a really bad idea to me -- is it actually needed?
>
> some use-cases implement per-packet distribution. However this document
> does not aim to make recommendation on the way to distribute packets
>
>
>
> _________________________________________________________________________________________________________________________
>
> Ce message et ses pieces jointes peuvent contenir des informations
> confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu
> ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages
> electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou
> falsifie. Merci.
>
> This message and its attachments may contain confidential or privileged
> information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and
> delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been
> modified, changed or falsified.
> Thank you.
>
>
>
>
> --
> I don't think the execution is relevant when it was obviously a bad
> idea in the first place.
> This is like putting rabid weasels in your pants, and later expressing
> regret at having chosen those particular rabid weasels and that pair
> of pants.
>    ---maf
>



-- 
I don't think the execution is relevant when it was obviously a bad
idea in the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair
of pants.
   ---maf