Re: [IPv6] FW: I-D Action: draft-templin-6man-ipid-ext-00.txt

"Templin (US), Fred L" <Fred.L.Templin@boeing.com> Thu, 07 December 2023 16:23 UTC

Return-Path: <Fred.L.Templin@boeing.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BC53DC0111C3; Thu, 7 Dec 2023 08:23:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.404
X-Spam-Level:
X-Spam-Status: No, score=-4.404 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=boeing.com header.b="sepGDGpm"; dkim=pass (1024-bit key) header.d=boeing.onmicrosoft.com header.b="MQoXF6B7"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yq-6T4WI-EJq; Thu, 7 Dec 2023 08:23:23 -0800 (PST)
Received: from ewa-mbsout-01.mbs.boeing.net (ewa-mbsout-01.mbs.boeing.net [130.76.20.194]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8C84DC0111C2; Thu, 7 Dec 2023 08:23:23 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by ewa-mbsout-01.mbs.boeing.net (8.15.2/8.15.2/DOWNSTREAM_MBSOUT) with SMTP id 3B7GNLeq048133; Thu, 7 Dec 2023 08:23:21 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=boeing.com; s=boeing-s1912; t=1701966202; bh=fjqi2MwxnAlQbv9gY1VJLAGYB/o2BRhouymfLibb/ms=; h=From:To:CC:Subject:Date:References:In-Reply-To:From; b=sepGDGpmntnauOIbdFu2jyCIZGmH7hV4q6/hoauub6gmBvyKD+wVz5Cfl0/b8RXsE Tai3d91jG4a2gJN9onPH8FAJrycspkM64MF0PtNXyPLfsQBCLFw++JTlRXFSNvVS06 1jSw3Dx8cxLgBkAF7TI7CF6TI+UVl8VBoAWRxT8ueRpXgmpO2OGkPyurfT5Z1vK9aQ d9/Rdz3In3Vc+IpBDAJBz4YAVonhaOH9sa/+QuRCd8+hni/JEtmE6IpZ+bgxQadR9k QNeOHisfJXSLYzqNIJCnOr649NaSTLS/1WtredPIZBD7Z6FXC6PSPffETQ5JQxC2fF N/54miEBtzaTQ==
Received: from XCH16-01-03.nos.boeing.com (xch16-01-03.nos.boeing.com [137.137.109.148]) by ewa-mbsout-01.mbs.boeing.net (8.15.2/8.15.2/8.15.2/UPSTREAM_MBSOUT) with ESMTPS id 3B7GN9XE047956 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 7 Dec 2023 08:23:09 -0800
Received: from XCH16-07-05.nos.boeing.com (137.137.111.38) by XCH16-01-03.nos.boeing.com (137.137.109.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.34; Thu, 7 Dec 2023 08:23:07 -0800
Received: from XCH19-EDGE-Q02.nos.boeing.com (130.76.23.14) by XCH16-07-05.nos.boeing.com (137.137.111.38) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.34 via Frontend Transport; Thu, 7 Dec 2023 08:23:07 -0800
Received: from USG02-CY1-obe.outbound.protection.office365.us (23.103.199.175) by boeing.com (130.76.23.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.27; Thu, 7 Dec 2023 08:22:52 -0800
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=bNqQ6zZHsj4/ReoEW2oxUdUMG7r/U5eGTfqarThD2Iku493Vc2T9VM3qH3Mnd4A0BDjQV2FrtE6ZvvoXx+y92wnVAWjDSklWG/plpxPvJbxLbk3WY1bZBHgFWIvZqqcASzbmNVktcPKEqw/LjSfueduLIJhffnpjEu1XFCXCxlq48NGCFJKbm9YE631Oyu9EiYtCZ0n/swxetWi0b4VhwUq6ZeslbtNh6LQxwW7KFoTmqEPROL6ReOFMUAkujjbfZGax+5u2T7gLiS43r4v6J2+r3wwS9EPfqFGFeY3/BO+bzOLIdl5viflQQESAY509PeI1CCE6pUFUdCptZNJSbA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=fjqi2MwxnAlQbv9gY1VJLAGYB/o2BRhouymfLibb/ms=; b=vzt38NfS5AR81IUTLoudUhBSiHFcNDN0FjHJ9TZPZwmP7P8yaGtLX02NpA4vD/VixRT9vNJUao7/b2tfMDD/iVyOXrk1iHK4riExet4e8pJVc6rZj5IywMZ1htBSt9pKYCBpEmJ8vye6grTP7al+8U7S3JpmUOzpp7Enufawzyw9N1DXQPfXB7ea2V9wN6rFLLEcBYnkZacK+h6bUgMFBnRK9xPkDSV7xnBuFjhekhdn+tTwSJvWLgrAG7ppagB+fjX7HeyS/rvr8Z1h4j5Ic2SQcIXQZt8NXwUQrVUDGXnTPqHMtmXxCNEsJaQyIhu4IscMOvIf76vFGGJdEkpKtA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=boeing.com; dmarc=pass action=none header.from=boeing.com; dkim=pass header.d=boeing.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=boeing.onmicrosoft.com; s=selector1-boeing-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fjqi2MwxnAlQbv9gY1VJLAGYB/o2BRhouymfLibb/ms=; b=MQoXF6B7Sfq80om5W26FYD/QrtIa0CqDEC0jxTTYtADjXlISTUqB9A+mFAmDRSl7NMjG3xJcx6Nv+eZ1lR82Yepffbhfdk7h6vCb1MuZ6PbJFlr36KX8jJ4MIXTIA45/wRLG2esi9XyzJlro4Xjv/I7s/a3iK9UmnuUeVrxt9v8=
Received: from BN0P110MB1420.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:183::19) by BN0P110MB1143.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:16f::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7002.40; Thu, 7 Dec 2023 16:22:41 +0000
Received: from BN0P110MB1420.NAMP110.PROD.OUTLOOK.COM ([fe80::5df2:a8d0:34f2:c244]) by BN0P110MB1420.NAMP110.PROD.OUTLOOK.COM ([fe80::5df2:a8d0:34f2:c244%5]) with mapi id 15.20.7002.040; Thu, 7 Dec 2023 16:22:41 +0000
From: "Templin (US), Fred L" <Fred.L.Templin@boeing.com>
To: "Templin (US), Fred L" <Fred.L.Templin=40boeing.com@dmarc.ietf.org>, Tom Herbert <tom=40herbertland.com@dmarc.ietf.org>
CC: IPv6 List <ipv6@ietf.org>
Thread-Topic: [IPv6] FW: I-D Action: draft-templin-6man-ipid-ext-00.txt
Thread-Index: AQHaKSYbvEqsng2B5ESfGSJ6dMS4jbCeAOSA
Date: Thu, 07 Dec 2023 16:22:40 +0000
Message-ID: <BN0P110MB1420EDAB17B1A49650D90B07A38BA@BN0P110MB1420.NAMP110.PROD.OUTLOOK.COM>
References: <13091d25c5874d5ba27b2de77d337646@boeing.com> <CALx6S371iasRTW+gzjgCPT1BY-KxZZau2Fu3qGYnoHpiu3o9tQ@mail.gmail.com> <BN0P110MB14205F118B67DD0225A18634A38BA@BN0P110MB1420.NAMP110.PROD.OUTLOOK.COM>
In-Reply-To: <BN0P110MB14205F118B67DD0225A18634A38BA@BN0P110MB1420.NAMP110.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=boeing.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN0P110MB1420:EE_|BN0P110MB1143:EE_
x-ms-office365-filtering-correlation-id: adf603c8-834d-4269-336e-08dbf740bc31
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: auHvJHfq9SpkqbdlKf8pV9kOxQn9jWPfwXujE9s8RzlnnESfGogKJzbiRSKVYZ6uVBeQufSoUt/KgRjEeyGY0r6J5t2WSlap+Ek233mVFCCvp1fcNpmYpVRGTUnGR5fdK1IzOh4dk6wDNz2iQXlYeyJmLWNsPV62jBRWxrRoVXhJuM20wwe0SVf82KOvv5Q9AhVxiWP5jb1TY+/iL/1y7Srk/phmGhPIqKfnyL1eipGYnrk0NRumxwAIvuXUFSFGekN61JsT5dzPnkEeiBanjVEOiKgXaDkR18Mvld/2CL2AeczElVxQtKtx8sTc9PuGWcC8FGHd0yw1HFa456ezxVkQQNxteAlJzdvPKVwQgYNcqivDtB03J1rHG8ZrFTHEW/iOe1WjPUjQETi35BFIN3MOkr8/GOojtZd2+Qy+rs6RAsjH1iqfEPxkg8MB0gAmNByaLvwaByVvQmjFOlh8pyHoRQKCNGCWdOIF9yIOQaD7SE/HGiZqphvGC/Dl9bQEq/Q8FL0y5bYza7HCBRR0yQl4dDkmkWgrLdBLDstykGeaj+T6vNl+CbCfmIMn945zH8/RuKJHrXuTxYg5DsnyR+Meo6PT8LM2nJNSd5j+tmg=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN0P110MB1420.NAMP110.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230031)(366004)(230922051799003)(186009)(451199024)(1800799012)(83380400001)(55016003)(122000001)(8676002)(4326008)(8936002)(86362001)(66574015)(7696005)(6506007)(38070700009)(2940100002)(53546011)(9686003)(38100700002)(71200400001)(498600001)(966005)(66899024)(66556008)(64756008)(66476007)(66446008)(76116006)(110136005)(66946007)(2906002)(33656002)(4001150100001)(30864003)(52536014)(5660300002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN0P110MB1420.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: adf603c8-834d-4269-336e-08dbf740bc31
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Dec 2023 16:22:41.0095 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bcf48bba-4d6f-4dee-a0d2-7df59cc36629
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN0P110MB1143
X-OriginatorOrg: boeing.com
X-TM-SNTS-SMTP: 9350014DE3173CF207EA9C896A53FF9882ADBBB8EC23604C5A11193774E2F7B52000:8
X-TM-AS-GCONF: 00
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/M3Y8ct_cB6UNsQ0Da8oMZ2h4P6c>
Subject: Re: [IPv6] FW: I-D Action: draft-templin-6man-ipid-ext-00.txt
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Dec 2023 16:23:27 -0000

Tom, also important to note is that performance is best when the path MTU itself
is increased to larger sizes allowing for larger transport layer segments without the
need for IP fragmentation. But, since the Internet cell size is still 1500, fragmentation
will still be needed until more and more paths begin to use larger MTUs.

Fred

> -----Original Message-----
> From: ipv6 <ipv6-bounces@ietf.org> On Behalf Of Templin (US), Fred L
> Sent: Thursday, December 07, 2023 7:58 AM
> To: Tom Herbert <tom=40herbertland.com@dmarc.ietf.org>
> Cc: IPv6 List <ipv6@ietf.org>
> Subject: Re: [IPv6] FW: I-D Action: draft-templin-6man-ipid-ext-00.txt
> 
> Tom, to the point on performance:
> 
> > Please provide references to these studies. Also, note IP
> > fragmentation is only one possibility, PMTUD and transport layer
> > segmentation is another and that latter seems more prevalent.
> 
> If by transport layer segmentation you mean GSO/GRO, it is not the same thing
> as IP fragmentation at all. GSO/GRO provide a means for the application of the
> source to transfer a block of data containing multiple MTU- or smaller-sized
> segments to the kernel in a single system call, then the kernel breaks the
> segments out into individual packets that are all no larger than the path MTU
> and sends them to the destination. The destination kernel then gathers them
> up and posts them to the local application in a reassembled buffer possibly
> as large as that used by the original source. But, if some packets are lost,
> the destination kernel instead sends up what it has gathered so far which
> may be less than the block used by the original source.
> 
> IP fragmentation is very different and operates on a single large transport
> layer segment instead of multiple smaller ones. And, the studies I am referring
> to show that performance was most positively affected by increasing the
> segment size even to larger than the path MTU. I implemented GSO/GRO
> in the ion-dtn LTP/UDP implementation and noted that the performance
> increase I saw was very minor and related to more efficient packaging
> and not a system call bottleneck. Conversely, when I increased the segment
> sizes to larger than the path MTU and intentionally invoked IP fragmentation
> the performance increase was dramatic. You can see this in the charts I
> showed at IETF118 intarea here:
> 
> https://datatracker.ietf.org/meeting/118/materials/slides-118-intarea-identification-extension-for-the-internet-protocol-00
> 
> Again, GSO/GRO address performance limitations of the application/kernel
> system call interface which seems to have a positive performance effect for
> some applications. But, IP fragmentation addresses a performance limitation
> of transport layer protocols in allowing the transport protocol to use larger
> segment sizes and therefore have fewer segments to deal with. This latter
> service showed significant performance increases for LTP/UDP and historically
> provided better performance for services like NFS over UDP. GSO/GRO does
> not show a similar performance increase for LTP/UDP.
> 
> Fred
> 
> > In a
> > lossy network, transport layer segmentation will likely have better
> > performance than IP fragmentation since we can do selective ACKs (i.e.
> > if a fragment is dropped the whole chain needs to be retransmitted). I
> > suggest removing this and just provide the need for a larger
> > identification field in IP fragmentation (the second half of the
> > paragraph).
> 
> > -----Original Message-----
> > From: Tom Herbert <tom=40herbertland.com@dmarc.ietf.org>
> > Sent: Monday, December 04, 2023 2:30 PM
> > To: Templin (US), Fred L <Fred.L.Templin@boeing.com>
> > Cc: IPv6 List <ipv6@ietf.org>
> > Subject: Re: [IPv6] FW: I-D Action: draft-templin-6man-ipid-ext-00.txt
> >
> > On Tue, Nov 28, 2023 at 1:42 PM Templin (US), Fred L
> > <Fred.L.Templin=40boeing.com@dmarc.ietf.org> wrote:
> > >
> > > 6man, here is a -00 draft that I am moving over here from intarea where it saw some earlier
> > > discussion while paring down to focus only on IPv6 aspects. The previous draft version was
> > > presented at the intarea session at IETF118, per the minutes:
> > >
> > > https://datatracker.ietf.org/doc/minutes-118-intarea-202311091400/
> > >
> > > The draft is titled: "IPv6 Identification Extension", and its goal is to make IPv6 fragmentation
> > > and reassembly robust at least within limited domain networks to start with but also for the
> > > future of more general open IPv6 Internetworks. This is one aspect of a comprehensive set
> > > of services that should support better Internetworking performance through packet size
> > > diversity. The draft proposes to update RFC8900.
> > >
> > > Please review and send comments,
> > >
> >
> > Hi Fred,
> >
> > Here are some comments.
> >
> > >From the draft:
> > "Studies over many decades have shown that upper layer protocols often
> > achieve greater performance by configuring segment sizes that exceed
> > the path Maximum Transmission Unit (MTU). When the segment size
> > exceeds the path MTU, IP fragmentation at some layer is a natural
> > consequence."
> >
> > Please provide references to these studies. Also, note IP
> > fragmentation is only one possibility, PMTUD and transport layer
> > segmentation is another and that latter seems more prevalent. In a
> > lossy network, transport layer segmentation will likely have better
> > performance than IP fragmentation since we can do selective ACKs (i.e.
> > if a fragment is dropped the whole chain needs to be retransmitted). I
> > suggest removing this and just provide the need for a larger
> > identification field in IP fragmentation (the second half of the
> > paragraph).
> >
> > >From the draft: "A recent study [I-D.templin-dtn-ltpfrag] proved that
> > configuring segment sizes that cause IPv4 packets to exceed the path
> > MTU (thereby invoking IPv4 fragmentation and reassembly) provides
> > substantial performance increases.. This contradicts decades of
> > unfounded assertions to the contrary..."
> >
> > It's not clear to me what that draft proves, nor what the substantial
> > performance increases are. But even if it did prove something and
> > "contradicts decades of unfounded assertions to the contrary", I'm not
> > sure it's very relevant since that means there's been decades of
> > implementation and burned in deployment based on these assertions. IMO
> > this paragraph could be removed since it seems to be more about
> > generally promoting the use of IP fragmentation and not extending it
> > which is the topic draft.
> >
> > >From the draft: "Following reassembly, if the Routing Header is
> > present the destination resets the Routing Header Next Header field to
> > the value cached in the Extended Fragment Header."
> >
> > I think it will be much simpler to just say that the fragmentation
> > option cannot be used in Destination Options before a Routing Header.
> >
> > The Destination option is type is 00 which means skip if unknown. I
> > believe this should be 01 to ensure that the destination host ensures
> > that it sees the fragment and properly processes the packet.
> >
> > >From the draft: "This allows the source to test whether a destination
> > recognizes the Extended Fragment Header by occasionally sending a
> > fragmented "probe" packet using the option."
> >
> > It should be noted that IP is inherently a stateless protocol so
> > probing like this is at most best effort-- it assumes bi-directional
> > communications, doesn't work for multicast, or anycast, and has other
> > failure cases.
> >
> > Section 6 "IPv6 Network Fragmentation" would be major protocol changes
> > to IPv6. This would allow IPv6 routers to fragment, and also
> > intermediate nodes would be processing Destination Options. I think
> > there needs to be a very clear motivation for this and what the exact
> > protocol normative requirements are.
> >
> > >From the draft: "Extended Fragment Header further MUST appear as the
> > first option in the first Destination Options Header". Why is this
> > requirement needed?
> >
> > >From the draft: "Rather than encourage timely course corrections,
> > however, the IETF somehow forgot that IP fragmentation and reassembly
> > still serve as essential internetworking functions." This seems
> > subjective or potentially provocative. I suggest removing it and
> > probably all of Section 9 can be removed without loss of content for
> > the main purpose of the draft.
> >
> > >From the draft: "The option sets "act" to '00', "chg" to '1'". I'm not
> > sure what it means to mark a Destination Options as modifiable in
> > flight. I suppose this could be applied to Destination Options before
> > the Routing Header, but I don't think that's the intent here. Maybe
> > this is related to the idea of network node fragmentation?
> >
> > IMO, Multicast and Anycast requirements shouldn't be relegated to an appendix.
> >
> >
> > Tom
> >
> >
> >
> >
> >
> >
> >
> >
> > > Fred
> > >
> > > -----Original Message-----
> > > From: I-D-Announce <i-d-announce-bounces@ietf.org> On Behalf Of internet-drafts@ietf.org
> > > Sent: Tuesday, November 28, 2023 1:26 PM
> > > To: i-d-announce@ietf.org
> > > Subject:  I-D Action: draft-templin-6man-ipid-ext-00.txt
> > >
> > > Internet-Draft draft-templin-6man-ipid-ext-00.txt is now available.
> > >
> > >    Title:   IPv6 Identification Extension
> > >    Author:  Fred L. Templin
> > >    Name:    draft-templin-6man-ipid-ext-00.txt
> > >    Pages:   18
> > >    Dates:   2023-11-28
> > >
> > > Abstract:
> > >
> > >    The Internet Protocol, version 4 (IPv4) header includes a 16-bit
> > >    Identification field in all packets, but this length is too small to
> > >    ensure reassembly integrity even at moderate data rates in modern
> > >    networks.  Even for Internet Protocol, version 6 (IPv6), the 32-bit
> > >    Identification field included when a Fragment Header is present may
> > >    be smaller than desired for some applications.  This specification
> > >    addresses these limitations by specifying an IPv6 Hop-by-Hop option
> > >    for Identification Extension; it further provides a messaging service
> > >    for fragmentation and reassembly congestion management.
> > >
> > > The IETF datatracker status page for this Internet-Draft is:
> > > https://datatracker.ietf.org/doc/draft-templin-6man-ipid-ext/
> > >
> > > There is also an HTMLized version available at:
> > > https://datatracker.ietf.org/doc/html/draft-templin-6man-ipid-ext-00
> > >
> > > Internet-Drafts are also available by rsync at:
> > > rsync.ietf.org::internet-drafts
> > >
> > >
> > > _______________________________________________
> > > I-D-Announce mailing list
> > > I-D-Announce@ietf.org
> > > https://www.ietf.org/mailman/listinfo/i-d-announce
> > >
> > > --------------------------------------------------------------------
> > > IETF IPv6 working group mailing list
> > > ipv6@ietf.org
> > > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> > > --------------------------------------------------------------------
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------