Re: [Int-dir] R: Intdir last call review of draft-ietf-ippm-alt-mark-10

Brian Haberman <brian@innovationslab.net> Wed, 20 September 2017 14:29 UTC

Return-Path: <brian@innovationslab.net>
X-Original-To: int-dir@ietfa.amsl.com
Delivered-To: int-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 28F9F13293A; Wed, 20 Sep 2017 07:29:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id diaX3W-RDVD8; Wed, 20 Sep 2017 07:29:03 -0700 (PDT)
Received: from uillean.fuaim.com (uillean.fuaim.com [206.197.161.140]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 239D713217D; Wed, 20 Sep 2017 07:29:03 -0700 (PDT)
Received: from clairseach.fuaim.com (clairseach-high.fuaim.com [206.197.161.158]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by uillean.fuaim.com (Postfix) with ESMTP id 137E5880F5; Wed, 20 Sep 2017 07:29:03 -0700 (PDT)
Received: from clemson.local (swifi-nat.jhuapl.edu [128.244.87.133]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by clairseach.fuaim.com (Postfix) with ESMTP id 789443280AE4; Wed, 20 Sep 2017 07:29:02 -0700 (PDT)
To: Fioccola Giuseppe <giuseppe.fioccola@telecomitalia.it>, "int-dir@ietf.org" <int-dir@ietf.org>
Cc: "draft-ietf-ippm-alt-mark.all@ietf.org" <draft-ietf-ippm-alt-mark.all@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>
References: <150574562717.15655.17755871925264723529@ietfa.amsl.com> <25fa600863494417bf02e3f1416cb010@TELMBXB02RM001.telecomitalia.local>
From: Brian Haberman <brian@innovationslab.net>
Message-ID: <f96ae0b7-ac01-37af-8323-e27bb80b3039@innovationslab.net>
Date: Wed, 20 Sep 2017 10:28:56 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:52.0) Gecko/20100101 Thunderbird/52.3.0
MIME-Version: 1.0
In-Reply-To: <25fa600863494417bf02e3f1416cb010@TELMBXB02RM001.telecomitalia.local>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="AlhPkKesosIBDv44KpfpGHE1fpfqhVrhF"
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-dir/i00aq1my5atHBOnmWLYKLZdseUs>
Subject: Re: [Int-dir] R: Intdir last call review of draft-ietf-ippm-alt-mark-10
X-BeenThere: int-dir@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "This list is for discussion between the members of the Internet Area directorate." <int-dir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-dir>, <mailto:int-dir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-dir/>
List-Post: <mailto:int-dir@ietf.org>
List-Help: <mailto:int-dir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-dir>, <mailto:int-dir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Sep 2017 14:29:05 -0000

Hi Giuseppe,
     I am fine with your proposed changes, but I would recommend that
you wait until the AD or doc shepherd indicate that the changes be made.

Regards,
Brian


On 9/19/17 8:22 AM, Fioccola Giuseppe wrote:
> Hi Brian,
> Thanks for your valuable review of the document.
> Please see my answers inline tagged as [GF].
> 
> Best Regards,
> 
> Giuseppe
> 
> -----Messaggio originale-----
> Da: Brian Haberman [mailto:brian@innovationslab.net] 
> Inviato: lunedì 18 settembre 2017 16:40
> A: int-dir@ietf.org
> Cc: draft-ietf-ippm-alt-mark.all@ietf.org; ietf@ietf.org; ippm@ietf.org
> Oggetto: Intdir last call review of draft-ietf-ippm-alt-mark-10
> 
> Reviewer: Brian Haberman
> Review result: Ready with Nits
> 
> * The shepherd writeup mentions IPR 2557 in relation to this draft. However, the IPR declaration is only associated with the original individual draft. The IPR declaration needs to be updated to refer to the WG draft.
> 
> [GF]: If needed we can renew the IPR declaration to refer to the WG draft.
> 
> * The introduction says that this technique is needed to help monitor time & loss sensitive traffic. That would seem to indicate a need to associate these counters with individual flows. Has anyone done any calculations on how these counters will scale? Section 5 seems to indicate that there were only a few number of counters implemented via ACLs.
> 
> [GF]: It is important to say that you can select the flow to monitor in several ways. In general a flow can be defined by a set of selection rules (e.g. headers fields) used to match a subset of the packets. In this way it is possible to control the number of involved nodes, the paths followed by the packets and the size of the flows. That is a general consideration. 
> In practice, as an example, the Telecom Italia experiment has been applied to the BackHauling traffic implemented with a VPN MPLS and we consider a flow as all the packets sharing the same source IP address or the same destination IP address, depending on the direction. It has been implemented by using router capabilities, so we developed scripts for the automation, policies for marking and ACLs for counting. Our implementation scale up to 500 flows monitored together on Cisco 7609 router, 1000 IPv4 and 1000 IPv6 flows on Cisco ASR9000. We have also an experimental implementation on dedicated HW that scales more. If you agree I can add more information in Section 5.
> 
> * The draft sets out to develop this technique without augmenting packet formats. That makes the statement in section 3.1.1 about how to color packets is out of scope a bit disingenuous. I would have preferred a brief description of the few available options on coloring packets in this section.
> 
> [GF]: This sentence may be useful to open the door to future implementation. Section 5 explains the examples of implementation we have for now. But, of course, we can add a reference to section 5 in section 3.1.1.
> 
> * The mention of maintaining timestamps for delay measurements is under-specified. Would the 32-bit NTP timestamp format be sufficient? The 64-bit NTP timestamp format? Guidance on how to carry out experimentation with this approach seems useful. Does the concept of adding timestamps per color block conflict with the first bullet of section 7 (only uses features already available on routers)?
> 
> [GF]: the first bullet of section 7 means that a basic "homemade" implementation of the method can be possible by using features already available on routers: policy for marking, ACL for counting and Netflow to obtain timestamps of first/last packets of a batch. But in general we hope to have an optimized implementation that, as you point out, makes this sentence not true. So I propose to modify the sentence in the first bullet of section 7. 
> Regarding timestamps we can say that all the timestamp formats are allowed, because it's managed out-of-band. The format (NTP or PTP) depends on the precision you want.
> 
> * If the above statement on per-flow counters is not true, can I not accomplish the same capability by harvesting ifMib stats per interface and compare xmit/recv/drop stats across the network?
> 
> [GF]: Yes you can do that but it is not so precise because you cannot know that nodes you are comparing are referring to exactly the same time interval and exactly the same packets. The great advantage of alternate marking method is that it solves these synchronization issues creating packet batches.
> 
> * The description of the Telecom Italia experiment references a 5-minute window per color. For time sensitive traffic like IPTV, how useful was the 5-minute reporting window? Were corrective actions taken prior to calls being handled by support?
> 
> [GF]: The choice of 5 minutes period has been made to make it coherent with the reporting window of our NMS. We use a threshold for the packet loss rate in 5 minutes that originates alarms for the Operation department. Another reason is that long windows simplify our "homemade" implementation. For example the Huawei implementation (section 5.2) uses very short windows (seconds).
> 
> * The Telecom Italia experiment writeup does not mention how the counters were harvested from the routers. Were readily available tools used to do this?
> 
> [GF]: Our scripts on board of the router collect the counters of the flows under monitoring and then send them out to the NMS that will make packet loss calculation. The tools have been developed in our NMS development team. Also Huawei developed this features in its network management tool.
> 
> 
> Questo messaggio e i suoi allegati sono indirizzati esclusivamente alle persone indicate. La diffusione, copia o qualsiasi altra azione derivante dalla conoscenza di queste informazioni sono rigorosamente vietate. Qualora abbiate ricevuto questo documento per errore siete cortesemente pregati di darne immediata comunicazione al mittente e di provvedere alla sua distruzione, Grazie. 
> 
> This e-mail and any attachments is confidential and may contain privileged information intended for the addressee(s) only. Dissemination, copying, printing or use by anybody else is unauthorised. If you are not the intended recipient, please delete this message and any attachments and advise the sender by return e-mail, Thanks. 
> 
> Rispetta l'ambiente. Non stampare questa mail se non è necessario.
>