Re: [Fecframe] Ops/Management Cons. text for fecframe

"Ali C. Begen (abegen)" <abegen@cisco.com> Fri, 11 February 2011 14:14 UTC

Return-Path: <abegen@cisco.com>
X-Original-To: fecframe@core3.amsl.com
Delivered-To: fecframe@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 10DA73A6A5D for <fecframe@core3.amsl.com>; Fri, 11 Feb 2011 06:14:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FuJVryt-JtrT for <fecframe@core3.amsl.com>; Fri, 11 Feb 2011 06:14:57 -0800 (PST)
Received: from sj-iport-5.cisco.com (sj-iport-5.cisco.com [171.68.10.87]) by core3.amsl.com (Postfix) with ESMTP id 889AA3A6AEE for <fecframe@ietf.org>; Fri, 11 Feb 2011 06:14:57 -0800 (PST)
Authentication-Results: sj-iport-5.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AiYBAALTVE2rR7Ht/2dsb2JhbACXF45dc59BmziCfROCTQSFAYoz
X-IronPort-AV: E=Sophos;i="4.60,455,1291593600"; d="scan'208";a="328396531"
Received: from sj-core-1.cisco.com ([171.71.177.237]) by sj-iport-5.cisco.com with ESMTP; 11 Feb 2011 14:15:12 +0000
Received: from xbh-sjc-221.amer.cisco.com (xbh-sjc-221.cisco.com [128.107.191.63]) by sj-core-1.cisco.com (8.13.8/8.14.3) with ESMTP id p1BEFCLp001433; Fri, 11 Feb 2011 14:15:12 GMT
Received: from xmb-sjc-215.amer.cisco.com ([171.70.151.169]) by xbh-sjc-221.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.4675); Fri, 11 Feb 2011 06:15:12 -0800
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
Date: Fri, 11 Feb 2011 06:15:09 -0800
Message-ID: <04CAD96D4C5A3D48B1919248A8FE0D540E4C7DDD@xmb-sjc-215.amer.cisco.com>
In-Reply-To: <C979BB5C.9527%luby@qualcomm.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [Fecframe] Ops/Management Cons. text for fecframe
Thread-Index: AcvJX4LOUPpFWWZQSDGUx+2+eq2IFgAHruXhAB3rtbA=
References: <04CAD96D4C5A3D48B1919248A8FE0D540E4C7BA9@xmb-sjc-215.amer.cisco.com> <C979BB5C.9527%luby@qualcomm.com>
From: "Ali C. Begen (abegen)" <abegen@cisco.com>
To: "Luby, Michael" <luby@qualcomm.com>, fecframe@ietf.org
X-OriginalArrivalTime: 11 Feb 2011 14:15:12.0337 (UTC) FILETIME=[18ADC410:01CBC9F6]
Cc: dromasca@avaya.com, Sean Turner <turners@ieca.com>, Russ Housley <housley@vigilsec.com>
Subject: Re: [Fecframe] Ops/Management Cons. text for fecframe
X-BeenThere: fecframe@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of FEC Framework <fecframe.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/fecframe>, <mailto:fecframe-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/fecframe>
List-Post: <mailto:fecframe@ietf.org>
List-Help: <mailto:fecframe-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fecframe>, <mailto:fecframe-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Feb 2011 14:14:59 -0000

> -----Original Message-----
> From: Luby, Michael [mailto:luby@qualcomm.com]
> Sent: Thursday, February 10, 2011 6:57 PM
> To: Ali C. Begen (abegen); fecframe@ietf.org
> Cc: Sean Turner; Russ Housley; dromasca@avaya.com; Luby, Michael
> Subject: Re: [Fecframe] Ops/Management Cons. text for fecframe
> 
> This looks good Ali.  One thing to perhaps add at the end of Section 10.2 is
> that if multiple "source flows" are protected by a single FEC repair stream
> (generated from the bundle of the source flows) then it should be the case
> that all of these flows are received by receivers who expect to receive and
> use the FEC repair stream generated from them (as otherwise the source flows
> that are not received will be considered as loss by the receiver, and also
> it might allow the receiver to recover flows that are not meant for it to
> receive, a security concern).

Good point.
 
> I guess perhaps it is good to add a general security statement that says
> that it is important to only allow FEC repair be received by receivers for
> which all of the original source from which the FEC repair is generated can
> be received by those receivers.  (Otherwise, the receivers might be able to
> recover source flows using FEC repair that they are not supposed to
> receive.)

Better point.

Thanks.
-acbegen
 
> 
> On 2/10/11 12:51 PM, "Ali C. Begen (abegen)" <abegen@cisco.com> wrote:
> 
> > We have not seen any email from the DISCUSS holders (except David) regarding
> > the framework draft in the mailing list (I did not see any private email,
> > either and for some reason the system is not including me in the emails from
> > IESG). We need to publish this specification as it is holding several other
> > documents, and even the WG itself (Clearly, many of us are eager to close the
> > WG).
> >
> > Here is a summary of where we stand now:
> >
> > The DISCUSS from Russ H. is about some inconsistency in section 5, which was
> > fixed 2 versions ago.
> >
> > The DISCUSS Sean T. is about the security related issues, which were addressed
> > in the last revision.
> >
> > Russ, Sean, if you still have issues with the revised text, please raise them.
> >
> > The DISCUSS from Dan R. and David H. are related to ops/management issues. We
> > had a lot discussion on this in the mailing list, and the text below attempts
> > to reflect the view of the WG on this subject.
> >
> > We would like to get your (WG individuals but in particular the DISCUSS
> > holders) comments on this text. The sooner the better as we would like to
> > close this issue before the next meeting and ship the draft to the editor.
> >
> > Approvals/objections are welcome as usual.
> >
> > -acbegen
> >
> >
> > 10.  Operations and Management Considerations
> >
> >    The question of operating and managing the FEC Framework and the
> >    associated FEC scheme(s) is of high practical importance.  The goals
> >    of this section are to discuss the general requirements, aspects
> >    related to a specific deployment and solutions whenever possible.
> >
> >    In particular, this section discusses the questions of
> >    interoperability across vendors/use cases and whether defining
> >    mandatory to implement (but not mandatory to use) solutions is
> >    beneficial.
> >
> > 10.1.  What are the Key Aspects to Consider?
> >
> >    Several aspects need to be considered since they will directly impact
> >    the way the FEC Framework and the associated FEC schemes can be
> >    operated and managed.
> >
> >    This section lists them as follows:
> >
> >    o  A Single Small Generic Component within a Larger (and Often
> >       Legacy) Solution: The FEC Framework is one component within a
> >       larger solution which includes both one or several upper-layer
> >       applications (that generate one or several ADU flows) and an
> >       underlying protocol stack.  A key design principle is that the FEC
> >       Framework should be able to work without making any assumption
> >       with respect to either the upper-layer application(s) or the
> >       underlying protocol stack, even if there are special cases where
> >       assumptions are made.
> >
> >    o  One-to-One with Feedback vs. One-to-Many with Feedback vs. One-to-
> >       Many without Feedback Scenarios: The FEC Framework can be used in
> >       use cases that completely differ from one another.  Some use cases
> >       are one-way (e.g., in broadcast networks), with either a one-to-
> >       one, one-to-many or many-to-many transmission model, and the
> >       receiver(s) cannot send any feedback to the sender(s).  Other use
> >       cases follow a bidirectional one-to-one, one-to-many, or many-to-
> >       many scenario, and the receiver(s) can send feedback to the
> >       sender(s).
> >
> >    o  Non-FEC Framework Capable Receivers: With the one-to-many and
> >       many-to-many use cases, the receiver population might have
> >       different capabilities with respect to the FEC Framework itself
> >       and the supported FEC schemes.  Some receivers might not be
> >       capable of decoding the repair packets belonging to a particular
> >       FEC scheme, while some other receivers might not be supporting the
> >       FEC Framework at all.
> >
> >    o  Internet vs. non-Internet Networks: The FEC Framework can be
> >       useful in many use cases that use a transport network that is not
> >       the public Internet (e.g., with IPTV or Mobile TV).  In such
> >       networks, the operational and management considerations can be
> >       achieved through an open or proprietary solution, which is
> >       specified outside of the IETF.
> >
> >    o  Congestion Control Considerations: See Section 8 for a discussion
> >       on whether congestion control is needed or not, and its
> >       relationships with the FEC Framework.
> >
> >    o  Within End-Systems vs. within Middleboxes: The FEC Framework can
> >       be used within end-systems, very close to the upper-layer
> >       application, or within dedicated middleboxes, for instance when it
> >       is desired to protect one or several flows while they cross a
> >       lossy channel between two or more remote sites.
> >
> >    o  Protecting a Single Flow vs. Several Flows Globally: The FEC
> >       Framework can be used to protect a single flow, or several flows
> >       globally.
> >
> > 10.2.  Operational and Management Recommendations
> >
> >    Overall, from the discussion of Section 10.1, it is clear that the
> >    CDPs and FEC schemes compatible with the FEC Framework widely differ
> >    in their capabilities, application and deployment scenarios such that
> >    a common operation and management tool that works well for all of
> >    them does not exist.  Thus, as a design choice, the FEC Framework
> >    does not dictate the use of any particular technology or protocol for
> >    transporting FEC data, managing the hosts, signaling the
> >    configuration information or encoding the configuration information.
> >    This provides flexibility and was one of the main goals of the FEC
> >    Framework.  However, this section gives some recommendations.
> >
> >    o  A Single Small Generic Component within a Larger (and Often
> >       Legacy) Solution: It is anticipated that the FEC Framework will
> >       often be used to protect one or several RTP streams.  Therefore,
> >       there are use cases that may take advantage of RTCP to collect
> >       feedback information, and one can take advantage of the associated
> >       tools to operate and manage the FEC Framework instance along with
> >       the associated FEC schemes.
> >
> >    o  One-to-One with Feedback vs. One-to-Many with Feedback vs. One-to-
> >       Many without Feedback Scenarios: With use cases that are one-way,
> >       the FEC Framework sender does not have any way to gather feedback
> >       from receivers.  With use cases that are bidirectional, the FEC
> >       Framework sender can collect detailed feedback (e.g., in case of a
> >       one-to-one scenario) or at least occasional feedback (e.g., in
> >       case of a multicast, one-to-many scenario).  All these
> >       applications have naturally different operational and management
> >       aspects.  If any, they also have different requirements or
> >       features for collecting feedback, processing it and acting on it.
> >       The data structures for carrying the feedback also vary.
> >
> >    o  Non-FEC Framework Capable Receivers: Section 5.3 gives
> >       recommendations on how to provide backward compatibility in
> >       presence of receivers that cannot support the FEC scheme being
> >       used, or the FEC Framework itself: basically the use of Explicit
> >       Source FEC Payload ID is banned.  Additionally, a non-FEC
> >       Framework capable receiver MUST also have a means not to receive
> >       the repair packets that it will not be able to decode in the first
> >       place or a means to identify and discard them appropriately upon
> >       receiving them.  This can be achieved by sending repair packets on
> >       a different transport-layer flow.  In case of an RTP source flow,
> >       this can also be achieved by using an RTP framing for FEC repair
> >       packets with a different payload type.  Both source and repair
> >       packets can then be sent on the same transport-layer flow.  It is
> >       the responsibility of the sender to select the appropriate
> >       mechanism when needed.
> >
> >    o  Congestion Control Considerations: See Section 8 for a discussion
> >       on whether congestion control is needed or not, and its
> >       relationships with the FEC Framework.
> >
> >    o  Within End-Systems vs. within Middleboxes: When the FEC Framework
> >       is used within middleboxes, it is RECOMMENDED that the paths
> >       between the hosts where the sending applications run and the
> >       middlebox that performs FEC encoding be as reliable as possible,
> >       since these paths are not protected against erasures by default.
> >       Similarly, it is RECOMMENDED that the paths between the
> >       middleboxes that perform FEC decoding and the end-systems where
> >       the receiving applications operate, in situations where this is a
> >       different host, be as reliable as possible since these paths are
> >       not protected against losses by default.
> >
> >       The recommendation for the sending side is particularly important
> >       with FEC schemes that do not modify the ADU for backward
> >       compatibility purposes (i.e. do not use any Explicit Source FEC
> >       Payload ID) and rely for instance on the RTP sequence number field
> >       to identify FEC source packets within their source block.  In this
> >       case, a loss on this path directly leads to a gap in the RTP
> >       sequence number space seen by the FECFRAME instance.  This MUST be
> >       considered during source block creation by the FEC scheme.  With
> >       FEC schemes that indicate in the Repair FEC Payload ID, for each
> >       source block, the base RTP sequence number and number of
> >       consecutive RTP packets that belong to this source block, an ADU
> >       loss requires to switch to a new source block.  This SHOULD be
> >       discussed in the FEC scheme when there is a chance of losing a
> >       packet.
> >
> >    o  Protecting a Single Flow vs. Several Flows Globally: In the
> >       general case, the various ADU flows that are globally protected
> >       can have different features, and in particular different real-time
> >       requirements (in case of real-time flows).  The process of
> >       globally protecting these flows SHOULD take into account the
> >       requirements of each individual flow.  In particular, it would be
> >       counter-productive to add repair traffic to a real-time flow for
> >       which the FEC decoding delay at a receiver makes decoded ADUs for
> >       this flow useless because they do not satisfy the associated real-
> >       time constraints.  From a practical point of view, this means that
> >       the source block creation process at the sending FEC Framework
> >       instance, SHOULD consider the most stringent real-time
> >       requirements of the ADU flows being globally protected.
> >
> >
> > _______________________________________________
> > Fecframe mailing list
> > Fecframe@ietf.org
> > https://www.ietf.org/mailman/listinfo/fecframe