[Fecframe] Ops/Management Cons. text for fecframe
"Ali C. Begen (abegen)" <abegen@cisco.com> Thu, 10 February 2011 20:51 UTC
Return-Path: <abegen@cisco.com>
X-Original-To: fecframe@core3.amsl.com
Delivered-To: fecframe@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 58A623A6901 for <fecframe@core3.amsl.com>; Thu, 10 Feb 2011 12:51:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IqrxSk7YjiuI for <fecframe@core3.amsl.com>; Thu, 10 Feb 2011 12:51:44 -0800 (PST)
Received: from sj-iport-6.cisco.com (sj-iport-6.cisco.com [171.71.176.117]) by core3.amsl.com (Postfix) with ESMTP id 035533A6833 for <fecframe@ietf.org>; Thu, 10 Feb 2011 12:51:44 -0800 (PST)
Authentication-Results: sj-iport-6.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEAAbfU02rRN+K/2dsb2JhbAClanOfMZszgn0TgkwEhQGKMA
X-IronPort-AV: E=Sophos;i="4.60,451,1291593600"; d="scan'208";a="661640329"
Received: from sj-core-4.cisco.com ([171.68.223.138]) by sj-iport-6.cisco.com with ESMTP; 10 Feb 2011 20:51:54 +0000
Received: from xbh-sjc-231.amer.cisco.com (xbh-sjc-231.cisco.com [128.107.191.100]) by sj-core-4.cisco.com (8.13.8/8.14.3) with ESMTP id p1AKpstN013969; Thu, 10 Feb 2011 20:51:54 GMT
Received: from xmb-sjc-215.amer.cisco.com ([171.70.151.169]) by xbh-sjc-231.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.4675); Thu, 10 Feb 2011 12:51:54 -0800
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Date: Thu, 10 Feb 2011 12:51:02 -0800
Message-ID: <04CAD96D4C5A3D48B1919248A8FE0D540E4C7BA9@xmb-sjc-215.amer.cisco.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: Ops/Management Cons. text for fecframe
Thread-Index: AcvJX4LOUPpFWWZQSDGUx+2+eq2IFg==
From: "Ali C. Begen (abegen)" <abegen@cisco.com>
To: fecframe@ietf.org
X-OriginalArrivalTime: 10 Feb 2011 20:51:54.0029 (UTC) FILETIME=[592DFDD0:01CBC964]
Cc: Sean Turner <turners@ieca.com>, Russ Housley <housley@vigilsec.com>, dromasca@avaya.com
Subject: [Fecframe] Ops/Management Cons. text for fecframe
X-BeenThere: fecframe@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of FEC Framework <fecframe.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/fecframe>, <mailto:fecframe-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/fecframe>
List-Post: <mailto:fecframe@ietf.org>
List-Help: <mailto:fecframe-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fecframe>, <mailto:fecframe-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Feb 2011 20:51:45 -0000
We have not seen any email from the DISCUSS holders (except David) regarding the framework draft in the mailing list (I did not see any private email, either and for some reason the system is not including me in the emails from IESG). We need to publish this specification as it is holding several other documents, and even the WG itself (Clearly, many of us are eager to close the WG). Here is a summary of where we stand now: The DISCUSS from Russ H. is about some inconsistency in section 5, which was fixed 2 versions ago. The DISCUSS Sean T. is about the security related issues, which were addressed in the last revision. Russ, Sean, if you still have issues with the revised text, please raise them. The DISCUSS from Dan R. and David H. are related to ops/management issues. We had a lot discussion on this in the mailing list, and the text below attempts to reflect the view of the WG on this subject. We would like to get your (WG individuals but in particular the DISCUSS holders) comments on this text. The sooner the better as we would like to close this issue before the next meeting and ship the draft to the editor. Approvals/objections are welcome as usual. -acbegen 10. Operations and Management Considerations The question of operating and managing the FEC Framework and the associated FEC scheme(s) is of high practical importance. The goals of this section are to discuss the general requirements, aspects related to a specific deployment and solutions whenever possible. In particular, this section discusses the questions of interoperability across vendors/use cases and whether defining mandatory to implement (but not mandatory to use) solutions is beneficial. 10.1. What are the Key Aspects to Consider? Several aspects need to be considered since they will directly impact the way the FEC Framework and the associated FEC schemes can be operated and managed. This section lists them as follows: o A Single Small Generic Component within a Larger (and Often Legacy) Solution: The FEC Framework is one component within a larger solution which includes both one or several upper-layer applications (that generate one or several ADU flows) and an underlying protocol stack. A key design principle is that the FEC Framework should be able to work without making any assumption with respect to either the upper-layer application(s) or the underlying protocol stack, even if there are special cases where assumptions are made. o One-to-One with Feedback vs. One-to-Many with Feedback vs. One-to- Many without Feedback Scenarios: The FEC Framework can be used in use cases that completely differ from one another. Some use cases are one-way (e.g., in broadcast networks), with either a one-to- one, one-to-many or many-to-many transmission model, and the receiver(s) cannot send any feedback to the sender(s). Other use cases follow a bidirectional one-to-one, one-to-many, or many-to- many scenario, and the receiver(s) can send feedback to the sender(s). o Non-FEC Framework Capable Receivers: With the one-to-many and many-to-many use cases, the receiver population might have different capabilities with respect to the FEC Framework itself and the supported FEC schemes. Some receivers might not be capable of decoding the repair packets belonging to a particular FEC scheme, while some other receivers might not be supporting the FEC Framework at all. o Internet vs. non-Internet Networks: The FEC Framework can be useful in many use cases that use a transport network that is not the public Internet (e.g., with IPTV or Mobile TV). In such networks, the operational and management considerations can be achieved through an open or proprietary solution, which is specified outside of the IETF. o Congestion Control Considerations: See Section 8 for a discussion on whether congestion control is needed or not, and its relationships with the FEC Framework. o Within End-Systems vs. within Middleboxes: The FEC Framework can be used within end-systems, very close to the upper-layer application, or within dedicated middleboxes, for instance when it is desired to protect one or several flows while they cross a lossy channel between two or more remote sites. o Protecting a Single Flow vs. Several Flows Globally: The FEC Framework can be used to protect a single flow, or several flows globally. 10.2. Operational and Management Recommendations Overall, from the discussion of Section 10.1, it is clear that the CDPs and FEC schemes compatible with the FEC Framework widely differ in their capabilities, application and deployment scenarios such that a common operation and management tool that works well for all of them does not exist. Thus, as a design choice, the FEC Framework does not dictate the use of any particular technology or protocol for transporting FEC data, managing the hosts, signaling the configuration information or encoding the configuration information. This provides flexibility and was one of the main goals of the FEC Framework. However, this section gives some recommendations. o A Single Small Generic Component within a Larger (and Often Legacy) Solution: It is anticipated that the FEC Framework will often be used to protect one or several RTP streams. Therefore, there are use cases that may take advantage of RTCP to collect feedback information, and one can take advantage of the associated tools to operate and manage the FEC Framework instance along with the associated FEC schemes. o One-to-One with Feedback vs. One-to-Many with Feedback vs. One-to- Many without Feedback Scenarios: With use cases that are one-way, the FEC Framework sender does not have any way to gather feedback from receivers. With use cases that are bidirectional, the FEC Framework sender can collect detailed feedback (e.g., in case of a one-to-one scenario) or at least occasional feedback (e.g., in case of a multicast, one-to-many scenario). All these applications have naturally different operational and management aspects. If any, they also have different requirements or features for collecting feedback, processing it and acting on it. The data structures for carrying the feedback also vary. o Non-FEC Framework Capable Receivers: Section 5.3 gives recommendations on how to provide backward compatibility in presence of receivers that cannot support the FEC scheme being used, or the FEC Framework itself: basically the use of Explicit Source FEC Payload ID is banned. Additionally, a non-FEC Framework capable receiver MUST also have a means not to receive the repair packets that it will not be able to decode in the first place or a means to identify and discard them appropriately upon receiving them. This can be achieved by sending repair packets on a different transport-layer flow. In case of an RTP source flow, this can also be achieved by using an RTP framing for FEC repair packets with a different payload type. Both source and repair packets can then be sent on the same transport-layer flow. It is the responsibility of the sender to select the appropriate mechanism when needed. o Congestion Control Considerations: See Section 8 for a discussion on whether congestion control is needed or not, and its relationships with the FEC Framework. o Within End-Systems vs. within Middleboxes: When the FEC Framework is used within middleboxes, it is RECOMMENDED that the paths between the hosts where the sending applications run and the middlebox that performs FEC encoding be as reliable as possible, since these paths are not protected against erasures by default. Similarly, it is RECOMMENDED that the paths between the middleboxes that perform FEC decoding and the end-systems where the receiving applications operate, in situations where this is a different host, be as reliable as possible since these paths are not protected against losses by default. The recommendation for the sending side is particularly important with FEC schemes that do not modify the ADU for backward compatibility purposes (i.e. do not use any Explicit Source FEC Payload ID) and rely for instance on the RTP sequence number field to identify FEC source packets within their source block. In this case, a loss on this path directly leads to a gap in the RTP sequence number space seen by the FECFRAME instance. This MUST be considered during source block creation by the FEC scheme. With FEC schemes that indicate in the Repair FEC Payload ID, for each source block, the base RTP sequence number and number of consecutive RTP packets that belong to this source block, an ADU loss requires to switch to a new source block. This SHOULD be discussed in the FEC scheme when there is a chance of losing a packet. o Protecting a Single Flow vs. Several Flows Globally: In the general case, the various ADU flows that are globally protected can have different features, and in particular different real-time requirements (in case of real-time flows). The process of globally protecting these flows SHOULD take into account the requirements of each individual flow. In particular, it would be counter-productive to add repair traffic to a real-time flow for which the FEC decoding delay at a receiver makes decoded ADUs for this flow useless because they do not satisfy the associated real- time constraints. From a practical point of view, this means that the source block creation process at the sending FEC Framework instance, SHOULD consider the most stringent real-time requirements of the ADU flows being globally protected.
- [Fecframe] Ops/Management Cons. text for fecframe Ali C. Begen (abegen)
- Re: [Fecframe] Ops/Management Cons. text for fecf… Luby, Michael
- Re: [Fecframe] Ops/Management Cons. text for fecf… Ali C. Begen (abegen)
- Re: [Fecframe] Ops/Management Cons. text for fecf… Vincent Roca
- Re: [Fecframe] Ops/Management Cons. text for fecf… Luby, Michael
- Re: [Fecframe] Ops/Management Cons. text for fecf… Ali C. Begen (abegen)
- Re: [Fecframe] Ops/Management Cons. text for fecf… Ali C. Begen (abegen)
- Re: [Fecframe] Ops/Management Cons. text for fecf… Greg Shepherd
- Re: [Fecframe] Ops/Management Cons. text for fecf… Ali C. Begen (abegen)
- Re: [Fecframe] Ops/Management Cons. text for fecf… Luby, Michael
- Re: [Fecframe] Ops/Management Cons. text for fecf… Ali C. Begen (abegen)
- Re: [Fecframe] Ops/Management Cons. text for fecf… Vincent Roca
- Re: [Fecframe] Ops/Management Cons. text for fecf… Luby, Michael
- Re: [Fecframe] Ops/Management Cons. text for fecf… Ali C. Begen (abegen)