Re: hop-by-hop and router alert options [Re: Question about use of RSVP in Production Networks]

David R Oran <oran@cisco.com> Thu, 12 August 2004 15:06 UTC

Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA07408; Thu, 12 Aug 2004 11:06:06 -0400 (EDT)
Received: from megatron.ietf.org ([132.151.6.71]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1BvHEb-0005dG-Cj; Thu, 12 Aug 2004 11:11:17 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1BvH1h-0005oV-E8; Thu, 12 Aug 2004 10:57:57 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1BvGuQ-0004C5-Ex for ietf@megatron.ietf.org; Thu, 12 Aug 2004 10:50:26 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA06484 for <ietf@ietf.org>; Thu, 12 Aug 2004 10:50:24 -0400 (EDT)
Received: from sj-iport-5.cisco.com ([171.68.10.87]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1BvGzP-0005Ib-5W for ietf@ietf.org; Thu, 12 Aug 2004 10:55:35 -0400
Received: from sj-core-3.cisco.com (171.68.223.137) by sj-iport-5.cisco.com with ESMTP; 12 Aug 2004 07:51:37 -0700
X-BrightmailFiltered: true
Received: from mira-sjc5-d.cisco.com (IDENT:mirapoint@mira-sjc5-d.cisco.com [171.71.163.28]) by sj-core-3.cisco.com (8.12.10/8.12.6) with ESMTP id i7CEnqpp015094; Thu, 12 Aug 2004 07:49:53 -0700 (PDT)
Received: from [192.168.100.32] (sjc-vpn4-458.cisco.com [10.21.81.202]) by mira-sjc5-d.cisco.com (MOS 3.4.6-GR) with ESMTP id ADU43791; Thu, 12 Aug 2004 07:49:52 -0700 (PDT)
In-Reply-To: <Pine.LNX.4.44.0408121539030.1209-100000@netcore.fi>
References: <Pine.LNX.4.44.0408121539030.1209-100000@netcore.fi>
Mime-Version: 1.0 (Apple Message framework v619)
Content-Type: text/plain; charset="US-ASCII"; format="flowed"
Message-Id: <DB083F50-EC6E-11D8-AAFC-000A95C73842@cisco.com>
Content-Transfer-Encoding: 7bit
From: David R Oran <oran@cisco.com>
Date: Thu, 12 Aug 2004 10:49:47 -0400
To: Pekka Savola <pekkas@netcore.fi>
X-Mailer: Apple Mail (2.619)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 34d35111647d654d033d58d318c0d21a
Content-Transfer-Encoding: 7bit
Cc: ietf@ietf.org
Subject: Re: hop-by-hop and router alert options [Re: Question about use of RSVP in Production Networks]
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
Sender: ietf-bounces@ietf.org
Errors-To: ietf-bounces@ietf.org
X-Spam-Score: 0.0 (/)
X-Scan-Signature: e1b0e72ff1bbd457ceef31828f216a86
Content-Transfer-Encoding: 7bit

> I question the usefulness of path-coupled signalling beyond a certain
> point in the network.  Dean Anderson voiced them pretty well in the
> original thread about RSVP -- it just doesn't seem to make any sense
> beyond a very closed environment (like the first hop) -- and in that
> case, you should be able to use another kind of signalling as well.
>
> If we don't learn anything of the mistakes we did with RSVP, we're
> bound to repeat them.
>
First, we have to agree on what the mistakes were :-)

> For example, has the design clearly restricted itself to the first or
> the last hop, or within the first couple of hops?
>
No. Here's one counter-argument. Enterprise networks tend to have 
dumb-bell topologies, where the bottleneck links are in the interior 
rather than at the edges (exactly the opposite of serivce provider 
networks). They have meshes of 100meg+ all over each site, but the 
sites are interconnected with some service (like MPLS VPN, frame relay, 
etc.) which is expensive and often with very limited bandwidth 
(sometimes sub-T1). These links are not necessarily all that easy to 
identify in the topology, because for reliability enterprises configure 
mulitple routers and backup links. There is strong demand for 
flow-granularity admission control on such links, and an end-to-end 
model works better because site-to-site flows can swamp both the uplink 
at one end and the downlink at the other end.

There are other useful examples which I can share if people are 
interested.

> For that purpose, I'm not 100% sure if you would need a path-coupled
> signalling.  You'll certainly want path-coupled signalling for
> signalling with a much wider "span" (because it's the simplest way to
> do it from the host's perspective), but I'm arguing (as Dean was) that
> this isn't an interesting approach from the network operators'
> perspective.
>
What about discovery of the furthest point. Do you not find that a 
persuasive use case?

> ...
>
> As for the alternatives:
>  1) for first-hop only, there's really little need for a router alert,
> any protocol would do, as you already know who your routers are :-)
>  2) for hops beyond the first-hop router, I'd consider setting up a
> single server which would be responsible for brokering the QoS
> capabilities, firewall holes, etc. You contact the server, and ask it
> to open a certain kind of hole, set up certain QoS between (source,
> destination), etc.  There are a number of options how you could
> discover this kind of system:
>     a) a DHCP option
>     b) a DNS lookup (e.g., SRV record based on your DNS search path)
>     c) asking the upstream router using protocol learned in 1).
>
This assume edge tree topologies, which are common but hardly 
ubiquitous.

> These kind of approaches essentially move the intelligence and
> processing to specific nodes who are better capable of handling such
> requests, having policy who can request what, removing the processing
> and cruft from the routers.  And the hosts have have much easier time
> figuring out whether requesting these capabilities is supported in the
> network, instead of spewing a considerable amount of in-band
> signalling attempts to the network.
This is hardly a neutral characterization of the tradeoffs.

Cheers, Dave.

> -- 
> Pekka Savola                 "You each name yourselves king, yet the
> Netcore Oy                    kingdom bleeds."
> Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
>
>
>
>
> _______________________________________________
> Ietf mailing list
> Ietf@ietf.org
> https://www1.ietf.org/mailman/listinfo/ietf
> _______________________________________________
> This message was passed through ietf_censored@carmen.ipv6.cselt.it, 
> which is a sublist of ietf@ietf.org. Not all messages are passed. 
> Decisions on what to pass are made solely by IETF_CENSORED ML 
> Administrator (ietf_admin@ngnet.it)
>
David R. Oran
Cisco Fellow
Cisco Systems
7 Ladyslipper Lane
Acton, MA 01720 USA
Tel: +1 978 264 2048
Email: oran@cisco.com


_______________________________________________
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf