Re: [icnrg] Comments on draft-asaeda-icnrg-contrace (follow-on to the message about the ICNRG minutes)

Hitoshi Asaeda <asaeda@ieee.org> Mon, 17 April 2017 05:17 UTC

Return-Path: <asaeda@ieee.org>
X-Original-To: icnrg@ietfa.amsl.com
Delivered-To: icnrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B8F39127601 for <icnrg@ietfa.amsl.com>; Sun, 16 Apr 2017 22:17:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ieee-org.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fp7BxdvLGogu for <icnrg@ietfa.amsl.com>; Sun, 16 Apr 2017 22:17:22 -0700 (PDT)
Received: from mail-pg0-x232.google.com (mail-pg0-x232.google.com [IPv6:2607:f8b0:400e:c05::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2310512947D for <icnrg@irtf.org>; Sun, 16 Apr 2017 22:17:22 -0700 (PDT)
Received: by mail-pg0-x232.google.com with SMTP id 72so58647962pge.2 for <icnrg@irtf.org>; Sun, 16 Apr 2017 22:17:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ieee-org.20150623.gappssmtp.com; s=20150623; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ojKB0kk10iyayBg5QKZYSF7oPw2zZgec+5mzOdtkJyA=; b=ml/ecwYD0C6kIRh/QrkHVo+1kma2MkQl5wBQUo3zib7wKhdw1MSylX0Li4CfSvae8r zIbCF+bQ8rHLc6PY818enU/oF6djhkPc514CV/wW4zfCIZite5d60N886VO1m5D3+psv 4dWzXTWgCgi086QZlIaGBHvdMq0ZifNVx0ScbNVi3p1O9Y5ZkjhLW4l7EuS+PEksnWZn tXUaLqB51h06ncpa5gh11FSL48NjrObPZadJGIJM0GgPMITcJG3GHI9u//XzPnPjFP4g dgp0UqHuuJ6TrscuzHcS+v8l+cb4zhq2nDB8EFnQwZEgFMaXs2wCR73y9IUqsjchjyqk 5JUg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ojKB0kk10iyayBg5QKZYSF7oPw2zZgec+5mzOdtkJyA=; b=KSkQFJ9TArJ3p4njJv5v9E6+GXc5WKhvd6djgxZXhB2rpCa92hD4+MROoJ2T0gsXu6 +jWQHJNHmBh3BgWMhJXLj5q4WtyzqQ50osL9QD1nrnaSr4FION4tyF3eYmjVC/Eiq8X2 9i1s979Y7kVtmcqMqkkgESgxhMkZeickXf7BrpyXktdKp9FGHV5NZ+D47D5yF1ssv9Yh n41KI7Wu7ujPATwrXWXuhmJvRc+ZtScDpimrrtG2qwl18y5x8sPyiG3534grWbMhNof5 9eAameYO87LpBVBMgJxownaS76WUP+68638Zp/SWLFocQnQeNc6w5BpfsZlG5H/wVuMc StHg==
X-Gm-Message-State: AN3rC/4qdo5SYGvSXDcct1egYFd3mSEW7L4szf1ScNJsQthlKR7uvTl3 0X+UjKzCdSsXN4MO
X-Received: by 10.84.140.129 with SMTP id 1mr13588322plt.11.1492406241657; Sun, 16 Apr 2017 22:17:21 -0700 (PDT)
Received: from [133.69.36.79] ([133.69.36.79]) by smtp.gmail.com with ESMTPSA id h85sm11350404pfd.114.2017.04.16.22.17.20 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Sun, 16 Apr 2017 22:17:21 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Hitoshi Asaeda <asaeda@ieee.org>
In-Reply-To: <B0B10D6E-9BD5-41B0-9C9C-4FD63F65C341@cisco.com>
Date: Mon, 17 Apr 2017 14:17:23 +0900
Cc: icnrg <icnrg@irtf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <1B4B8117-615B-43A3-AB18-C45EAA7633EC@ieee.org>
References: <21997432-AA8C-4E29-A1A2-6FA0521E4EC2@orandom.net> <2C99F48C-E48F-440D-8252-89207698A06F@ieee.org> <92FD2E81-4E06-4B3E-9D33-C25F71027207@orandom.net> <B0B10D6E-9BD5-41B0-9C9C-4FD63F65C341@cisco.com>
To: "Ilya Moiseenko (ilmoisee)" <ilmoisee@cisco.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/icnrg/kqGl9hvJKP9eeMHWk7bSpiVHNhQ>
Subject: Re: [icnrg] Comments on draft-asaeda-icnrg-contrace (follow-on to the message about the ICNRG minutes)
X-BeenThere: icnrg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Information-Centric Networking research group discussion list <icnrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/icnrg>, <mailto:icnrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/icnrg/>
List-Post: <mailto:icnrg@irtf.org>
List-Help: <mailto:icnrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/icnrg>, <mailto:icnrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Apr 2017 05:17:24 -0000

Hi Ilya,

> ILYA: Can you elaborate on how the regular traceroute is
> "substantially" different from normal IP forwarding?
>
>From your draft:
>  "Contrace supports multipath forwarding.  The Request messages can be
>   forwarded to multiple neighbor routers.  Some router may have
>   strategy for multipath forwarding; when it sends Interest messages to
>   multiple neighbor routers, it may delay or prioritize to send the message.  
>   For the Contrace Request, however, such strategy SHOULD be
>   ignored and the router sends Interests to multiple routers
>   simultaneously."
>
> You are proposing to ignore the actual setup of the data plane
> (i.e. forwarding strategies) in order to discover all available
> paths, correct?

Thanks for pointing it out. This capital SHOULD might be too strong to
think of its protocol extension (see below). I'll revise the text.

Anyway, discovering all available paths for content retrieval is the
basic behavior and the default currently defined for sure. However,
any kinds of extensions can be adopted/applied to the fundamental
protocol if they are reasonable or feasible enough.

For example, let's see the latest IP multicast traceroute (mtrace2)
design from which Contrace is inspired lots. There are several
extensions proposed such as mtrace2 for MVPNs and mtrace2 for
dual-path. They are based on the mtrace2 specification and do not
require the basic protocol change. For example, mtrace2 provides the
standard response block, which is a mandatory TLV, and the augmented
response block, which is defined to give protocol flexibility. To cope
with BGP-MVPN, mtrace2-MVPNs inserts the special augmented response
block to change the default behavior of mtrace2.

In summary, the current draft describes the Contrace basics. If some
extensions are needed, optional header fields or TLVs can be defined
to change the basic behaviors to fit demands.

> In other words, the results of contrace request will display the
> control plane to the user, but will not display the actual state of
> the data plane (where the packets are actually going for normal ICN
> applications).

If we want to forward request packets to be compliant with forwarding
strategy, as the functional extension, we can define a new field or
TLV to change the default behavior. I think it is not difficult to add
a field specifying to follow the forwarding strategy for Contrace
request messages. I'll define it in the revised draft if people wish.

> Why is that the goal at all?  You may need to check MPLS treetrace
> design. Its purpose is to display and monitor the state of the
> actual data plane. 

In my knowledge, MPLS tree trace is the extension of the traditional
traceroute concept/protocol. I think Contrace has the potential to
support various situations with/without adding fields/TLVs. What we
need to agree here is whether all of these potential TLVs must be
defined in the current base document or not.

> I agree with Dave's comment that Contrace might not be that useful
> from the point of view of network operations. In fact, the network
> operator already has the control plane design and they definitely
> don't need to discover it, and what they really need is to check
> whether the paths are properly used by the applications.

Maybe I need to more study the real current situation from operators'
visions, but I don't agree with above your thought.
End users do not need to know/care from where the content comes. This
is the fundamental benefit of ICN. But how about operators or
researchers? Don't they need to know in-network cache/function
properly or better works in their networks? How they can know the
link conditons applications use? What metrics are you saying to check
whether the paths are properly used by the applications?

If you believe this proposal is "not useful", please tell me what it
should be. I'll think more carefully.
Thanks.

Regards,
--
Hitoshi Asaeda