Re: [icnrg] Comments on draft-asaeda-icnrg-contrace (follow-on to the message about the ICNRG minutes)

"Ilya Moiseenko (ilmoisee)" <ilmoisee@cisco.com> Wed, 19 April 2017 00:58 UTC

Return-Path: <ilmoisee@cisco.com>
X-Original-To: icnrg@ietfa.amsl.com
Delivered-To: icnrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F1E881250B8 for <icnrg@ietfa.amsl.com>; Tue, 18 Apr 2017 17:58:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.522
X-Spam-Level:
X-Spam-Status: No, score=-14.522 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 00yHLFkV2M6Q for <icnrg@ietfa.amsl.com>; Tue, 18 Apr 2017 17:58:43 -0700 (PDT)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 49BBB124D68 for <icnrg@irtf.org>; Tue, 18 Apr 2017 17:58:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=8318; q=dns/txt; s=iport; t=1492563523; x=1493773123; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=f1Oz+Ip++IFZw4sGVUC80k6j77It+uXCQYHj2Bf2zYE=; b=Ph/Rft8zx0Oh2+2jMZ2hr3nj+yRmV8K1gMNpqUvDsTLdgeAEuJWPoHNv OZUWVXvbuKoRBd7cyTfWIdlZ2uqrWbfVRQWKWABjHr5AMZIrYTWvytc1n H9BC3z2jkQAU5Mri6X1XuHNHZI0Mf5pw5gN1SFAKFXSBpBAGB7H6HOxYf Y=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0BCAQAAtfZY/5hdJa1cGQEBAQEBAQEBAQEBBwEBAQEBg1OBbAeDYIoVkUEhlWGCD4YkAhqDXD8YAQIBAQEBAQEBayiFFgEEASMRRRACAQgSCAIfBwICAjAVAg4CBA4FGYl4CKwJgiaLMAEBAQEBAQEBAQEBAQEBAQEBAQEBHoELhUeBXSsKgmOEV4MGLoIxBZ0iAYowiDmCAIUxiheUDQEfOIEFYxVVAYUJgUp1iAiBDQEBAQ
X-IronPort-AV: E=Sophos;i="5.37,219,1488844800"; d="scan'208";a="232447846"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Apr 2017 00:58:42 +0000
Received: from XCH-ALN-003.cisco.com (xch-aln-003.cisco.com [173.36.7.13]) by rcdn-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id v3J0wgpF020940 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 19 Apr 2017 00:58:42 GMT
Received: from xch-rcd-004.cisco.com (173.37.102.14) by XCH-ALN-003.cisco.com (173.36.7.13) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Tue, 18 Apr 2017 19:58:41 -0500
Received: from xch-rcd-004.cisco.com ([173.37.102.14]) by XCH-RCD-004.cisco.com ([173.37.102.14]) with mapi id 15.00.1210.000; Tue, 18 Apr 2017 19:58:41 -0500
From: "Ilya Moiseenko (ilmoisee)" <ilmoisee@cisco.com>
To: Hitoshi Asaeda <asaeda@ieee.org>
CC: icnrg <icnrg@irtf.org>
Thread-Topic: [icnrg] Comments on draft-asaeda-icnrg-contrace (follow-on to the message about the ICNRG minutes)
Thread-Index: AQHSs68qPfOoQejRPka03qo+3knyl6HE31GAgAA/wwCAAC/2gIAEETOAgAJnBQA=
Date: Wed, 19 Apr 2017 00:58:41 +0000
Message-ID: <81886929-50B0-4A6E-A5F1-723CD4892741@cisco.com>
References: <21997432-AA8C-4E29-A1A2-6FA0521E4EC2@orandom.net> <2C99F48C-E48F-440D-8252-89207698A06F@ieee.org> <92FD2E81-4E06-4B3E-9D33-C25F71027207@orandom.net> <B0B10D6E-9BD5-41B0-9C9C-4FD63F65C341@cisco.com> <1B4B8117-615B-43A3-AB18-C45EAA7633EC@ieee.org>
In-Reply-To: <1B4B8117-615B-43A3-AB18-C45EAA7633EC@ieee.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.154.164.173]
Content-Type: text/plain; charset="utf-8"
Content-ID: <A8665AA99C38324885C485C39D3909B0@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/icnrg/BRXuJhvb52hRiBuCzPmOP5v3J38>
Subject: Re: [icnrg] Comments on draft-asaeda-icnrg-contrace (follow-on to the message about the ICNRG minutes)
X-BeenThere: icnrg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Information-Centric Networking research group discussion list <icnrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/icnrg>, <mailto:icnrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/icnrg/>
List-Post: <mailto:icnrg@irtf.org>
List-Help: <mailto:icnrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/icnrg>, <mailto:icnrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Apr 2017 00:58:45 -0000

Hi Hitoshi,

On 4/16/17, 10:17 PM, "Hitoshi Asaeda" <asaeda@ieee.org> wrote:

    Hi Ilya,
    
    > ILYA: Can you elaborate on how the regular traceroute is
    > "substantially" different from normal IP forwarding?
    >
    >From your draft:
    >  "Contrace supports multipath forwarding.  The Request messages can be
    >   forwarded to multiple neighbor routers.  Some router may have
    >   strategy for multipath forwarding; when it sends Interest messages to
    >   multiple neighbor routers, it may delay or prioritize to send the message.  
    >   For the Contrace Request, however, such strategy SHOULD be
    >   ignored and the router sends Interests to multiple routers
    >   simultaneously."
    >
    > You are proposing to ignore the actual setup of the data plane
    > (i.e. forwarding strategies) in order to discover all available
    > paths, correct?
    
    Thanks for pointing it out. This capital SHOULD might be too strong to
    think of its protocol extension (see below). I'll revise the text.
    
    Anyway, discovering all available paths for content retrieval is the
    basic behavior and the default currently defined for sure. However,
    any kinds of extensions can be adopted/applied to the fundamental
    protocol if they are reasonable or feasible enough.
    
    For example, let's see the latest IP multicast traceroute (mtrace2)
    design from which Contrace is inspired lots. There are several
    extensions proposed such as mtrace2 for MVPNs and mtrace2 for
    dual-path. They are based on the mtrace2 specification and do not
    require the basic protocol change. For example, mtrace2 provides the
    standard response block, which is a mandatory TLV, and the augmented
    response block, which is defined to give protocol flexibility. To cope
    with BGP-MVPN, mtrace2-MVPNs inserts the special augmented response
    block to change the default behavior of mtrace2.
    
    In summary, the current draft describes the Contrace basics. If some
    extensions are needed, optional header fields or TLVs can be defined
    to change the basic behaviors to fit demands.
    
    > In other words, the results of contrace request will display the
    > control plane to the user, but will not display the actual state of
    > the data plane (where the packets are actually going for normal ICN
    > applications).
    
    If we want to forward request packets to be compliant with forwarding
    strategy, as the functional extension, we can define a new field or
    TLV to change the default behavior. I think it is not difficult to add
    a field specifying to follow the forwarding strategy for Contrace
    request messages. I'll define it in the revised draft if people wish.
    
    > Why is that the goal at all?  You may need to check MPLS treetrace
    > design. Its purpose is to display and monitor the state of the
    > actual data plane. 
    
    In my knowledge, MPLS tree trace is the extension of the traditional
    traceroute concept/protocol.

ILYA: No, it’s quite different from regular traceroute in my opinion.

    I think Contrace has the potential to
    support various situations with/without adding fields/TLVs. What we
    need to agree here is whether all of these potential TLVs must be
    defined in the current base document or not.
    
    > I agree with Dave's comment that Contrace might not be that useful
    > from the point of view of network operations. In fact, the network
    > operator already has the control plane design and they definitely
    > don't need to discover it, and what they really need is to check
    > whether the paths are properly used by the applications.
    
    Maybe I need to more study the real current situation from operators'
    visions, but I don't agree with above your thought.
    End users do not need to know/care from where the content comes. This
    is the fundamental benefit of ICN.

ILYA: ICN architecture might make it possible for toy applications to ignore “where the content comes from”, but any decent app will care VERY much about.

    But how about operators or researchers? Don't they need to know in-network cache/function
    properly or better works in their networks?

ILYA: Yes, absolutely, network operators will watch it very closely. And I’m trying to explain that contrace does not do enough. Right now, there is a very strong push towards the programmable networks. The control plane is modeled/tested prior to the actual deployment onto the real network. But as a user of contrace, I can only see how my control plane looks like. I have zero understanding which paths are actually used by applications (this is a subset of control plane because of the active forwarding plane). I don’t know the actual real life performance of the path (RTT, jitter, loss, etc.). I don’t know which path is still alive and which one went down. By the way, I can run MPLS tree trace in non-stop ping mode to detect path RTT and path failure events. I’m arguing that it would be very hard to have equivalent functionality in contrace, because there is no mechanism to put Interests on the specific path. 

Now, CDNs do very similar monitoring above the transport layer (in the application layer) for many reasons. It is possible to argue that the same could be done with ICN networks, and we don’t need the stuff I was talking about in the network layer, but then it’s is not clear why ICN is better than IP from the point of view of network operations. Also, it is not clear what to do with those claims of ICN replacing CDNs.



  How they can know the
    link conditons applications use? What metrics are you saying to check
    whether the paths are properly used by the applications?   
 
    If you believe this proposal is "not useful", please tell me what it
    should be. I'll think more carefully.
    Thanks.
    
    Regards,
    --
    Hitoshi Asaeda