Re: [iccrg] [tsvwg] New Internet Draft: Congestion Signaling (CSIG)

Jai Kumar <jai.kumar@broadcom.com> Sun, 18 February 2024 17:14 UTC

Return-Path: <jai.kumar@broadcom.com>
X-Original-To: iccrg@ietfa.amsl.com
Delivered-To: iccrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 57CABC14F6A5 for <iccrg@ietfa.amsl.com>; Sun, 18 Feb 2024 09:14:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.105
X-Spam-Level:
X-Spam-Status: No, score=-7.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=broadcom.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7lf_N4KZ0VHB for <iccrg@ietfa.amsl.com>; Sun, 18 Feb 2024 09:14:07 -0800 (PST)
Received: from mail-pf1-x42b.google.com (mail-pf1-x42b.google.com [IPv6:2607:f8b0:4864:20::42b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 43693C14F695 for <iccrg@irtf.org>; Sun, 18 Feb 2024 09:14:05 -0800 (PST)
Received: by mail-pf1-x42b.google.com with SMTP id d2e1a72fcca58-6e435542d41so43311b3a.1 for <iccrg@irtf.org>; Sun, 18 Feb 2024 09:14:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=broadcom.com; s=google; t=1708276445; x=1708881245; darn=irtf.org; h=to:in-reply-to:cc:references:message-id:date:subject:mime-version :from:from:to:cc:subject:date:message-id:reply-to; bh=XdBYmIuL+wYFiUi3sOI82scG7aXKeW4Bj5hJwSPOpTE=; b=ONF/qgYvrvKG0cREqNOUcG7d+21M0NxwOu5LYB0A5sXpcDESODZtb+HjfyjTUEEauf jGooZGPYFfXxvu/csFJHV0+Fvgo/YyukDqpFwN97a0PXsbIIZq3hOUvW+H8rmQvdks1y m5UmqzB+G19PwUU7IA6l1HMtjz0kbmcKPIsyI=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1708276445; x=1708881245; h=to:in-reply-to:cc:references:message-id:date:subject:mime-version :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=XdBYmIuL+wYFiUi3sOI82scG7aXKeW4Bj5hJwSPOpTE=; b=sw3r/Wp6SJLT6lWd7SVJGb1fdRyVNFEKGp7Ayegrjj+3Um2X7UXACkwOTn9ECOfQ9C +vUV3ewdMcBIPZEXPmsl26B4eiywc8h7HKktTKvdyDN9LZPeHpLYYJs+gi0wQalRHT5n /LdIP71kJ5By+mIme9Rl6dvF/XkpEdGFncKgtqq/WA3ui5Nx/rCjZANBfErSDHdT4aD4 KRdhaJ6wiXDXwSXYrkvwhLmeTjPaGg7qKrYwQ7mD8u1rR083cO21ccWumoOg0BUA2SkJ ql/DstUEwj90IKVsrK+tNDxoSsRa1foWk8UkfypakwXbWjYCTZrwfzbgyvAORxNtNrge nfhg==
X-Forwarded-Encrypted: i=1; AJvYcCWEu2JVri260ixK5lW7GwDDbvS+lPscBd6+7nFjiutx8QJT674qzLLFazVPe2R/QhLjBTSc1F2ftL1SUVkeNQ==
X-Gm-Message-State: AOJu0Yx36MiQi7V3b77HbBnzFaRJZ6q7ORnwI+Vv3hDnEMdgluZ5Kv7o ofCYLliFqRIiu4PwH0b4YqGR06YR4lf7kZUEfu5YtebPZc/RHk2+/H7593u1RKZbl8gEJ89J5Cu pyQsW4tbMm26jukHCvP1Lqq5OmLHNsf33
X-Google-Smtp-Source: AGHT+IFplrBMVPiZocR2DtQqk2o9NuUvJhG/AxI6n/uMoJVR78AoFfU+0v7uhM4LPz/ULZYYVlktHg==
X-Received: by 2002:a05:6a20:c890:b0:19b:a07a:344d with SMTP id hb16-20020a056a20c89000b0019ba07a344dmr10066428pzb.7.1708276444665; Sun, 18 Feb 2024 09:14:04 -0800 (PST)
Received: from smtpclient.apple (c-24-7-93-112.hsd1.ca.comcast.net. [24.7.93.112]) by smtp.gmail.com with ESMTPSA id t1-20020a632d01000000b005dc9ab425c2sm3191323pgt.35.2024.02.18.09.14.03 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 18 Feb 2024 09:14:03 -0800 (PST)
From: Jai Kumar <jai.kumar@broadcom.com>
Mime-Version: 1.0 (1.0)
Date: Sun, 18 Feb 2024 09:13:52 -0800
Message-Id: <7CD9EBE2-8517-4FD4-9EB5-054D65DCA79C@broadcom.com>
References: <CALx6S347exOZhHtsJCwDA3mZEBjMW=c5GYRgOiAJUNUbEG=SOQ@mail.gmail.com>
Cc: Matt Mathis <mattmathis@measurementlab.net>, Nandita Dukkipati <nanditad@google.com>, Abhiram Ravi <abhiramr@google.com>, IETF IPPM WG <ippm@ietf.org>, tsvwg <tsvwg@ietf.org>, ccwg@ietf.org, iccrg@irtf.org, Naoshad Mehta <naoshad@google.com>
In-Reply-To: <CALx6S347exOZhHtsJCwDA3mZEBjMW=c5GYRgOiAJUNUbEG=SOQ@mail.gmail.com>
To: Tom Herbert <tom@herbertland.com>
X-Mailer: iPhone Mail (21C66)
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="000000000000b06a1c0611ab1ae7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/iccrg/m0uZfBSrnxtylGMzr-3NRVdV4IE>
Subject: Re: [iccrg] [tsvwg] New Internet Draft: Congestion Signaling (CSIG)
X-BeenThere: iccrg@irtf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Discussions of Internet Congestion Control Research Group \(ICCRG\)" <iccrg.irtf.org>
List-Unsubscribe: <https://mailman.irtf.org/mailman/options/iccrg>, <mailto:iccrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iccrg/>
List-Post: <mailto:iccrg@irtf.org>
List-Help: <mailto:iccrg-request@irtf.org?subject=help>
List-Subscribe: <https://mailman.irtf.org/mailman/listinfo/iccrg>, <mailto:iccrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sun, 18 Feb 2024 17:14:12 -0000

Hello Tom,

As a major switch vendor provider, I can with confidence say that your statement is not correct.
Quote:
“ we insert more information into L2 that makes it a variable length header which actually makes processing *harder*, not easier especially for legacy devices that don't support CSIG.”

Layer 3 parsing is much more complex specifically when packet traverses thru multiple tunnel domains where packet need to be encap’ed or decap’ed. Not only the parsing gets impacted, transit nodes need to worry about checksum and/or encrypted, auth packet as well.

HW implement is one of the challenges IOAM is facing and that’s why it has such a sparse (or no) support from switch vendors.

Keeping CSIG in layer 2 or 2.5 (like MPLS) simplifies complexity of hw implementation by multitude.

Best,
-Jai


> On Feb 18, 2024, at 8:49 AM, Tom Herbert <tom@herbertland.com> wrote:
> 
> On Sat, Feb 17, 2024 at 11:17 AM Matt Mathis
> <mattmathis@measurementlab.net> wrote:
>> 
> 
> Hi Matt,
> 
>> I think the L2/L4 split is brilliant.
> 
> As opposed to the L1-L7 split being brilliant? :-)
> 
>> Putting the forward instrumentation as low as possible in the stack permits easy processing in HW w/o parsing any L3.
> 
> A switch is already doing IP routing which requires parsing of L3. If
> we insert more information into L2 that makes it a variable length
> header which actually makes processing *harder*, not easier,
> especially for legacy devices that don't support CSIG. If this is done
> in a Hop-by-Hop Option, then all the protocols a router looks at are
> at fixed offsets and fixed length (Ethernet header could be at offset
> 0, IPv6 header is at offset 14, and the CSIG information is at offset
> 54)-- that's the best case scenario for Hw router processing.
> 
>> Putting the replies in L4 only requires a handful of implementations to cover all possible paths,
> 
> I'm not sure "a handful of implementations" could cover all possible
> paths. The draft only talks about TCP and QUIC, but that is hardly a
> complete set of protocols-- there's RTP, GTP, ROCEE, and various
> tunneling protocols to name a few. On the other hand, if this
> information is in the Network layer then there are at most two
> protocols that need to be extended: IPv4 and IPv6. This also true at
> the link layer, this proposal would need to extend Ethernet, Mobile,
> and tunnels. The fundamental premise of a network layer protocol is
> that it works with *any* transport layer above it, and *any* link
> layer protocol below it (that to me is the brilliant thing :-) ).
> 
>> and piggybacks on existing solutions to session layer issues, such as authentication and authorization.
> 
> But that only considers the return path of the signals, not the
> forward path so it could only solve half the problem. If the forward
> path is in L2 then we can't leverage Internet protocols for
> authentication (maybe there's ways to do this at L2 but then we have
> to consider every L2 protocol and regardless the the path
> characteristics are very different in both directions of
> communications and the protocols aren't even under the same SDO). If
> we use L3 in both directions then we can leverage all of the IETF
> protocols. For instance, if E2E authentication is required, then it's
> just a matter of using AH in both directions (note the presence of AH
> in packet doesn't affect router processing).
> 
>> 
>> I would consider mentioning but then temporarily excluding alternet placements: either as a shim at the top of L2, sort of like VLAN tags, or within an L3 option.   Both of these have their own challenges, but might be extremely valuable in some environments.
> 
> There have been a *lot* of discussions and work in IETF on how to
> optimize router processing for network to host signaling like this
> draft is proposing.  Please look at IOAM, the work being done in 6man
> to make Hop-by-Hop Options viable, and work done in tunneling
> protocols that are intended to be processed in HW.
> 
> Tom
> 
>> 
>>> On Sat, Feb 10, 2024 at 7:42 AM Tom Herbert <tom=40herbertland.com@dmarc.ietf.org> wrote:
>>> 
>>> On Fri, Feb 9, 2024 at 10:53 PM Nandita Dukkipati <nanditad@google.com> wrote:
>>>> 
>>>> Hi Tom,
>>>> 
>>>> We updated the draft, correcting some nit errata, and to not let the draft expire. It's not discussed in any other mailing lists.
>>> 
>>> Thanks Nandita.
>>> 
>>> I still have fundamental concerns about the protocol layering in this
>>> draft, please see my previous comments on that. The draft defines a
>>> protocol for end-to-end network to host signaling and IMO, such a
>>> protocol belongs in the network layer but the draft puts the protocol
>>> in L2 and L4 and seems to avoid L3 without explanation. IOAM defines a
>>> very similar method of signaling and RFC9486 is a good model for
>>> network layer protocol that provides network to host signaling.
>>> 
>>> Tom
>>> 
>>>> 
>>>> Nandita
>>>> 
>>>> On Thu, Feb 8, 2024 at 3:53 PM Tom Herbert <tom@herbertland.com> wrote:
>>>>> 
>>>>> Hi,
>>>>> 
>>>>> I noticed there is now an -01 version of the draft posted on Feb. 2.
>>>>> Is this draft being discussed on some other list?
>>>>> 
>>>>> Thanks,
>>>>> Tom
>>>>> 
>>>>> On Sat, Sep 9, 2023 at 9:09 AM Tom Herbert <tom@herbertland.com> wrote:
>>>>>> 
>>>>>> Hi, thanks for draft!
>>>>>> 
>>>>>> The first thing that stands out to me is the carrier of the new packet headers. In the forward path it would be in L2 and in reflection it would be L4. As the draft describes, this would entail having to support the protocol in multiple L2 and multiple L4 protocols-- that's going to be a pretty big lift! Also, L2 is not really an end-to-end protocol (would legacy switches in the path also forward the header)l?).
>>>>>> 
>>>>>> The signaling being described in the draft is network layer information, and hence IMO should be conveyed in network layer headers. That's is L3 which conveniently is the average of L2+L4 :-)
>>>>>> 
>>>>>> IMO, the proper carrier of the signal data is Hop-by-Hop Options. This is end-to-end and allows modification of data in-flight. The typical concern with Hop-by-Hop Options is high drop rates on the Internet, however in this case the protocol is explicitly confined to a limited domain so I don't see that as a blocking issue for this use case.
>>>>>> 
>>>>>> The information being carried seems very similar to that of IOAM (IOAM uses Hop-by-Hop Options and supports reflection). I suppose the differences are that this protocol is meant to be consumed by the transport Layer and the data is a condensed summary of path characteristics. IOAM seems pretty extensible, so maybe it could be adapted to carry the signals of this draft?
>>>>>> 
>>>>>> A related proposal might be FAST draft-herbert-fast. Where the CSIG is network to host signaling, FAST is host to network signaling for the purposes of requesting network services. These might be complementary and options for both may be in the same packet. FAST also uses reflection, so we might be able to leverage some common implementation at a destination.
>>>>>> 
>>>>>> Tom
>>>>>> 
>>>>>> On Fri, Sep 8, 2023, 7:43 PM Abhiram Ravi <abhiramr=40google.com@dmarc.ietf.org> wrote:
>>>>>>> 
>>>>>>> Hi IPPM folks,
>>>>>>> 
>>>>>>> I am pleased to announce the publication of a new internet draft, Congestion Signaling (CSIG): https://www.google.com/url?q=https://datatracker.ietf.org/doc/draft-ravi-ippm-csig/&source=gmail-imap&ust=1708879744000000&usg=AOvVaw2NqlnBohcTmRfPfCpkG028
>>>>>>> 
>>>>>>> CSIG is a new end-to-end packet header mechanism for in-band signaling that is simple, efficient, deployable, and grounded in concrete use cases of congestion control, traffic management, and network debuggability. We believe that CSIG is an important new protocol that builds on top of existing in-band network telemetry protocols.
>>>>>>> 
>>>>>>> We encourage you to read the CSIG draft and provide your feedback and comments. We have also cc'd the TSVWG, CCWG, and ICCRG mailing lists, as we believe that this work may be of interest to their members as well.
>>>>>>> 
>>>>>>> Thank you for your time and consideration.
>>>>>>> 
>>>>>>> Sincerely,
>>>>>>> Abhiram Ravi
>>>>>>> On behalf of the CSIG authors
>>> 
>>> _______________________________________________
>>> iccrg mailing list
>>> iccrg@irtf.org
>>> https://www.google.com/url?q=https://mailman.irtf.org/mailman/listinfo/iccrg&source=gmail-imap&ust=1708879744000000&usg=AOvVaw1WMuz9B16Iot8u2lJtzb-U
>> 
>> 
>> 
>> --
>> Thanks,
>> --MM--
>> Evil is defined by mortals who think they know "The Truth" and use force to apply it to others.

-- 
This electronic communication and the information and any files transmitted 
with it, or attached to it, are confidential and are intended solely for 
the use of the individual or entity to whom it is addressed and may contain 
information that is confidential, legally privileged, protected by privacy 
laws, or otherwise restricted from disclosure to anyone else. If you are 
not the intended recipient or the person responsible for delivering the 
e-mail to the intended recipient, you are hereby notified that any use, 
copying, distributing, dissemination, forwarding, printing, or copying of 
this e-mail is strictly prohibited. If you received this e-mail in error, 
please return the e-mail to the sender, delete it from your computer, and 
destroy any printed copy of it.