Re: hop-by-hop and router alert options [Re: Question about use of RSVP in Production Networks]

"James M. Polk" <jmpolk@cisco.com> Thu, 12 August 2004 23:09 UTC

Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA16141; Thu, 12 Aug 2004 19:09:30 -0400 (EDT)
Received: from megatron.ietf.org ([132.151.6.71]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1BvOmU-0000dJ-Io; Thu, 12 Aug 2004 19:14:46 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1BvOch-000770-RX; Thu, 12 Aug 2004 19:04:39 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1BvOYq-0006CU-4D for ietf@megatron.ietf.org; Thu, 12 Aug 2004 19:00:40 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA15610 for <ietf@ietf.org>; Thu, 12 Aug 2004 19:00:37 -0400 (EDT)
Received: from sj-iport-3-in.cisco.com ([171.71.176.72] helo=sj-iport-3.cisco.com) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1BvOds-0000Qs-Vu for ietf@ietf.org; Thu, 12 Aug 2004 19:05:53 -0400
Received: from sj-core-1.cisco.com (171.71.177.237) by sj-iport-3.cisco.com with ESMTP; 12 Aug 2004 16:04:16 +0000
X-BrightmailFiltered: true
Received: from wells.cisco.com (wells.cisco.com [171.71.177.223]) by sj-core-1.cisco.com (8.12.10/8.12.6) with ESMTP id i7CM05Mx016388; Thu, 12 Aug 2004 15:00:05 -0700 (PDT)
Received: from jmpolk-w2k01.diablo.cisco.com (ssh-sjc-1.cisco.com [171.68.225.134]) by wells.cisco.com (8.8.6 (PHNE_14041)/CISCO.SERVER.1.2) with ESMTP id QAA29754; Thu, 12 Aug 2004 16:00:05 -0700 (PDT)
Message-Id: <4.3.2.7.2.20040812175058.0303df00@localhost>
X-Sender: jmpolk@localhost
X-Mailer: QUALCOMM Windows Eudora Version 4.3.2
Date: Thu, 12 Aug 2004 18:00:50 -0500
To: Pekka Savola <pekkas@netcore.fi>
From: "James M. Polk" <jmpolk@cisco.com>
In-Reply-To: <Pine.LNX.4.44.0408130008110.10008-100000@netcore.fi>
References: <DB083F50-EC6E-11D8-AAFC-000A95C73842@cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
X-Spam-Score: 2.3 (++)
X-Scan-Signature: f49c97ce49302a02285a2d36a99eef8c
Cc: ietf@ietf.org
Subject: Re: hop-by-hop and router alert options [Re: Question about use of RSVP in Production Networks]
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
Sender: ietf-bounces@ietf.org
Errors-To: ietf-bounces@ietf.org
X-Spam-Score: 2.3 (++)
X-Scan-Signature: 42e3ed3f10a1d8bef690f09da16f507a

Pekka

While it is clear your distaste for RSVP, you haven't stated anything other 
than handwave why RSVP is so bad ("in the first place"). You mention there 
were mistakes and a BB will fix them, but you don't list a set of mistakes 
RSVP made for folks to digest. I don't know if you think they are so 
obvious you don't have to state them or you don't want to list them for 
whatever reason.

Humor me (and a few others here) with a few listed mistakes you believe 
RSVP made in its design, with how you would redo them (either with a BB or 
just a better RSVP design).

Without this, you are just ranting without substance to me - as I cannot 
glean anything real from your messages other than your distaste of RSVP in 
favor of a Bandwidth Broker...

At 12:21 AM 8/13/2004 +0300, Pekka Savola wrote:
>Inline..
>
>On Thu, 12 Aug 2004, David R Oran wrote:
> > > I question the usefulness of path-coupled signalling beyond a certain
> > > point in the network.  Dean Anderson voiced them pretty well in the
> > > original thread about RSVP -- it just doesn't seem to make any sense
> > > beyond a very closed environment (like the first hop) -- and in that
> > > case, you should be able to use another kind of signalling as well.
> > >
> > > If we don't learn anything of the mistakes we did with RSVP, we're
> > > bound to repeat them.
> >
> > First, we have to agree on what the mistakes were :-)
>
>Of course.  Then why this wasn't the first thing NSIS did after going
>for on-path signalling, or didn't I just manage to find it?
>
>I really really hope that there has been a problem statement...
>
> > > For example, has the design clearly restricted itself to the first or
> > > the last hop, or within the first couple of hops?
> >
> > No. Here's one counter-argument. Enterprise networks tend to have
> > dumb-bell topologies, where the bottleneck links are in the interior
> > rather than at the edges (exactly the opposite of serivce provider
> > networks). They have meshes of 100meg+ all over each site, but the
> > sites are interconnected with some service (like MPLS VPN, frame relay,
> > etc.) which is expensive and often with very limited bandwidth
> > (sometimes sub-T1). These links are not necessarily all that easy to
> > identify in the topology, because for reliability enterprises configure
> > mulitple routers and backup links. There is strong demand for
> > flow-granularity admission control on such links, and an end-to-end
> > model works better because site-to-site flows can swamp both the uplink
> > at one end and the downlink at the other end.
> >
> > There are other useful examples which I can share if people are
> > interested.
>
>Agreed, this seems like a possible use case; but again, this is within
>a site, and the congestion points can be well-defined.  If it's not
>the first hop, then it's a predetermined point (or points) in the
>network.  Hardly something you absolutely need on-path signalling for.
>
> > > For that purpose, I'm not 100% sure if you would need a path-coupled
> > > signalling.  You'll certainly want path-coupled signalling for
> > > signalling with a much wider "span" (because it's the simplest way to
> > > do it from the host's perspective), but I'm arguing (as Dean was) that
> > > this isn't an interesting approach from the network operators'
> > > perspective.
> >
> > What about discovery of the furthest point. Do you not find that a
> > persuasive use case?
>
>Further point where you can use path-coupled signalling, you mean?
>Not really, as there seems to be something seriously broken if you
>need set up priorization except in well-defined points in the network.
>And to achieve that, you could use a "bandwidth broker": either it's
>able to set up the required bandwidth (it's in the same site, or at a
>site your site has a roaming agreement with), or it isn't and the
>approach is going to fail in any case, because the sites out in the
>Internet don't want outsiders to request bandwidth allocations.
>
> > > As for the alternatives:
> > >  1) for first-hop only, there's really little need for a router alert,
> > > any protocol would do, as you already know who your routers are :-)
> > >  2) for hops beyond the first-hop router, I'd consider setting up a
> > > single server which would be responsible for brokering the QoS
> > > capabilities, firewall holes, etc. You contact the server, and ask it
> > > to open a certain kind of hole, set up certain QoS between (source,
> > > destination), etc.  There are a number of options how you could
> > > discover this kind of system:
> > >     a) a DHCP option
> > >     b) a DNS lookup (e.g., SRV record based on your DNS search path)
> > >     c) asking the upstream router using protocol learned in 1).
> >
> > This assume edge tree topologies, which are common but hardly
> > ubiquitous.
>
>I don't think I assumed edge tree topologies.  Please elaborate.
>
> > > These kind of approaches essentially move the intelligence and
> > > processing to specific nodes who are better capable of handling such
> > > requests, having policy who can request what, removing the processing
> > > and cruft from the routers.  And the hosts have have much easier time
> > > figuring out whether requesting these capabilities is supported in the
> > > network, instead of spewing a considerable amount of in-band
> > > signalling attempts to the network.
> >
> > This is hardly a neutral characterization of the tradeoffs.
>
>(warning, could be flammatory)
>
>True enough, I had my operator hat on ;-).  My mind just boggled when
>I started to realize that some part of the IETF is still in denial on
>why RSVP didn't go through, and is now in the process of reinventing
>it .. wasting a lot of time and effort that could be much better spent
>on making an operationally more feasible system to provide these
>reservations in a well-defined, constrained points of the network.
>
>What I can't figure why this is happening.  I guess the IESG must have
>been asleep, or the most people just thought, "well.. let them waste
>their energy on that.. at least they don't bother us while they are
>bashing the heads in the wall.."
>
>--
>Pekka Savola                 "You each name yourselves king, yet the
>Netcore Oy                    kingdom bleeds."
>Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
>
>
>_______________________________________________
>Ietf mailing list
>Ietf@ietf.org
>https://www1.ietf.org/mailman/listinfo/ietf


cheers,
James

                                *******************
                 Truth is not to be argued... it is to be presented


_______________________________________________
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf