RE: Questions/comments about draft-dunbar-6man-5g-edge-compute-sticky-service
Linda Dunbar <linda.dunbar@futurewei.com> Wed, 31 March 2021 18:58 UTC
Return-Path: <linda.dunbar@futurewei.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 731543A31EC for <ipv6@ietfa.amsl.com>; Wed, 31 Mar 2021 11:58:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.09
X-Spam-Level:
X-Spam-Status: No, score=-2.09 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JLrox7BNbdYm for <ipv6@ietfa.amsl.com>; Wed, 31 Mar 2021 11:58:17 -0700 (PDT)
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2130.outbound.protection.outlook.com [40.107.244.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B8AD93A31CC for <ipv6@ietf.org>; Wed, 31 Mar 2021 11:58:04 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=IU3JUMf1Oq7bCZWCz7Vk1z9qTn1SCZvwhbCV3b11S7awO8kLI8TxudL5peJzCQoUCDaNb801q5UUSziUgm0B0CShjnrl4XvEuOUtUYCyNFtvS2XpLSSgy9+3uEZ/Esu3DPdzk/TUanbfwqkqjoDgG6uT8zXrHa360VX5s+EsqDXGyS46VwfZR/YUCQn4rBqePEUeSpQ+apMwhEFsFuJOXwAyrGjeycFcBmh+qcR7NSYmKzC20lrmH3XHJJBMIjXJ+ayIGE0J1RIAUDwICeER1/AKRaHfxfskSnlA9CBQbLv9t4DbV9+FWik+UfCuhDbWn8qm1+SePNe7rdo5oEx7mA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QQ6MlEfeWvpZo8ITYH1+tH4ww3FgZsw0NOYBFWpCxoQ=; b=fHNlXuDCjTqLf3ryGAjCo2KWhAW+IH1SRm8M6R8C0zCIorxJgGWaMtx/pfxa0ICWYJ+vBG5SHZo9OkW3SJsNqzgi8YoOOrl8yjnY2zMM4LQZdaPXkPPSrUkN90N2Fr2km1OUe9XN5ATPK11PnaLjsG/I+Gy7ss0Rc/2sZX4gpmIFDNpVjliP4/17YkoS5TDKDfU08g0c0wJil2btv4rv1Tfk9U4jYyupL58/HRjx9TKuvEiMeJ/XiDBjbMNoEbPjWU6Cf8gPe71CI/dftAv//1rE6f9yt6293avEt/9ww5+I0yhRyGkFiLoyIDm08UrOiSUm4WMTlHHNziZBptMUEw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QQ6MlEfeWvpZo8ITYH1+tH4ww3FgZsw0NOYBFWpCxoQ=; b=qO2eGUlk+v7xRgTeKklH2o26pqaFTOoubFtFoA5r9PrLsnWDlTdvtAJUwks+QSG0c/lbziW0PNNyQIEuVBznkJHU/ziaU6wCvgZo1D86HNT8tn3KzrpOuFhFY1YMt/4LnSD32jmX8noGGVD8n21z+/+ZylSpCZcDRnSta2c861A=
Received: from SN6PR13MB2334.namprd13.prod.outlook.com (2603:10b6:805:55::16) by SA1PR13MB4816.namprd13.prod.outlook.com (2603:10b6:806:184::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3999.15; Wed, 31 Mar 2021 18:58:02 +0000
Received: from SN6PR13MB2334.namprd13.prod.outlook.com ([fe80::3050:546b:c47:a42a]) by SN6PR13MB2334.namprd13.prod.outlook.com ([fe80::3050:546b:c47:a42a%6]) with mapi id 15.20.3999.026; Wed, 31 Mar 2021 18:58:02 +0000
From: Linda Dunbar <linda.dunbar@futurewei.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, Kaippallimalil John <john.kaippallimalil@futurewei.com>, Mark Smith <markzzzsmith@gmail.com>, "Jeffrey (Zhaohui) Zhang" <zzhang=40juniper.net@dmarc.ietf.org>
CC: IPv6 List <ipv6@ietf.org>
Subject: RE: Questions/comments about draft-dunbar-6man-5g-edge-compute-sticky-service
Thread-Topic: Questions/comments about draft-dunbar-6man-5g-edge-compute-sticky-service
Thread-Index: AdciSsNyEeeG0fk2Tl2oPdOa//JdzQBK/mXgAEpNTUAABUo8MAABG5xQAABGD6AAAKlBMAAAYSJwAAAZJnAAAFna8AADH9oAAASmn/AAHtjmUAAD+nIAAAPSxQAAN7gUgAABG8IAAABZwwA=
Date: Wed, 31 Mar 2021 18:58:02 +0000
Message-ID: <SN6PR13MB23340DEA00CC3F137F486023857C9@SN6PR13MB2334.namprd13.prod.outlook.com>
References: <MN2PR05MB598167E0FA4AB8C4DA1B1500D4619@MN2PR05MB5981.namprd05.prod.outlook.com> <SN6PR13MB23349D25F3B09C44C467BAE0857E9@SN6PR13MB2334.namprd13.prod.outlook.com> <712706464d4048c9840c4e62151dec5e@huawei.com> <SN6PR13MB233493968FFD281807395612857E9@SN6PR13MB2334.namprd13.prod.outlook.com> <MN2PR05MB598172022DA6D29E167CE734D47E9@MN2PR05MB5981.namprd05.prod.outlook.com> <SN6PR13MB23340A4FF33DD912A502BE89857E9@SN6PR13MB2334.namprd13.prod.outlook.com> <MN2PR05MB5981B694BE41847FAC898AC8D47E9@MN2PR05MB5981.namprd05.prod.outlook.com> <SN6PR13MB2334A96A01CEAC1F0446DF8B857E9@SN6PR13MB2334.namprd13.prod.outlook.com> <e68f7bf5-7863-a977-786b-5ef63e7c9f78@joelhalpern.com> <SN6PR13MB2334A6A78425F8688188754A857E9@SN6PR13MB2334.namprd13.prod.outlook.com> <MN2PR05MB5981690A62D916D2F60C2EA6D47D9@MN2PR05MB5981.namprd05.prod.outlook.com> <CAO42Z2wQsLDd8LVtpwmWzoGTnNimpTrN3ViFJLbqHN7VR+HJqw@mail.gmail.com> <SA0PR13MB4080963E5341F886445A16B3E87D9@SA0PR13MB4080.namprd13.prod.outlook.com> <35ca6377-4e67-2457-44e9-5dd59410b02b@joelhalpern.com> <SN6PR13MB233423BB3DD510E2B28D15A0857C9@SN6PR13MB2334.namprd13.prod.outlook.com>
In-Reply-To: <SN6PR13MB233423BB3DD510E2B28D15A0857C9@SN6PR13MB2334.namprd13.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: joelhalpern.com; dkim=none (message not signed) header.d=none;joelhalpern.com; dmarc=none action=none header.from=futurewei.com;
x-originating-ip: [72.180.73.64]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 311124b0-2351-41cb-97b5-08d8f476e8cc
x-ms-traffictypediagnostic: SA1PR13MB4816:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <SA1PR13MB48169779E00AC1BB0F150153857C9@SA1PR13MB4816.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SN6PR13MB2334.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(136003)(396003)(39840400004)(376002)(366004)(346002)(26005)(186003)(2906002)(71200400001)(8936002)(55016002)(9686003)(6506007)(2940100002)(5660300002)(52536014)(4326008)(44832011)(38100700001)(86362001)(66446008)(76116006)(64756008)(66476007)(66946007)(45080400002)(66556008)(478600001)(83380400001)(316002)(966005)(110136005)(66574015)(53546011)(33656002)(8676002)(30864003)(7696005)(559001)(579004); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SN6PR13MB2334.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 311124b0-2351-41cb-97b5-08d8f476e8cc
X-MS-Exchange-CrossTenant-originalarrivaltime: 31 Mar 2021 18:58:02.0476 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: zaTqIogCl6vjGx2TFYuqv6ZjRPn/X2ewRwsEzPuejNBMOc9yIjlgrmS8wbOe8ByAwTUC8lHNcnwVnGAOtuzeOA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR13MB4816
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/ntW6CspsTDmIc_AqLvQ_WdOBX5U>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Mar 2021 18:58:25 -0000
Joel, When multiple servers have the same IP address (i.e. the ANYCAST), the cost propagated by IGP/BGP to a failed server will be huge, triggering routers to select a path to another server with the same IP address. That is how ANYCAST can eliminate the bottleneck to one specific server. Linda -----Original Message----- From: Linda Dunbar Sent: Wednesday, March 31, 2021 1:50 PM To: Joel M. Halpern <jmh@joelhalpern.com>; Kaippallimalil John <john.kaippallimalil@futurewei.com>; Mark Smith <markzzzsmith@gmail.com>; Jeffrey (Zhaohui) Zhang <zzhang=40juniper.net@dmarc.ietf.org> Cc: IPv6 List <ipv6@ietf.org> Subject: RE: Questions/comments about draft-dunbar-6man-5g-edge-compute-sticky-service Joel, To routers with multiple paths to one Address, they can use the cost propagated by the IGP/BGP messages. Most commercial routers support Flow Affinity. Linda -----Original Message----- From: Joel M. Halpern <jmh@joelhalpern.com> Sent: Wednesday, March 31, 2021 1:11 PM To: Kaippallimalil John <john.kaippallimalil@futurewei.com>; Mark Smith <markzzzsmith@gmail.com>; Jeffrey (Zhaohui) Zhang <zzhang=40juniper.net@dmarc.ietf.org> Cc: Linda Dunbar <linda.dunbar@futurewei.com>; IPv6 List <ipv6@ietf.org> Subject: Re: Questions/comments about draft-dunbar-6man-5g-edge-compute-sticky-service There seems to be a leap in the description of flow handling in routers. As far as I know, most routers go to some trouble to make sure that packets of a flow follow the same path. They do NOT, to the best of my knowledge, do this by establishing flow state (soft or otherwise). They do so by hashing fields in the packet when selecting among equal cost paths. Also, they make no effort to provide anything related to flow stability when routing changes. Yours, Joel PS: Trying to make anycast do the right thing when servers fail depends very heavily on what you define as "right". If 'whatever routing does" works for you, then sure, ti does the "right" thing. If you want the flows to go to the instance which has been sharing operational state with the failed instance, then no, anycast will not do what you want. On 3/30/2021 3:24 PM, Kaippallimalil John wrote: > Hi Mark, Jeffrey, > > I see the point that Jeffrey raises regarding scaling as the sticky > service can result in not just having flow state in routers on path, > but that it is also flooded in the network. > > We'll think of other solutions that do not require flow state to be flooded. > > Re: Mark's comments and considering just unipath flows for now. > > The assumption we had is that routers on path keep flow soft state so > that all packets of a flow follow the same path. > > My understanding is that routers do this already (Jeffrey mentioned > this also in the earlier response too) > > Anycast looked attractive because it could provide fault tolerance > against server failure, not only at session setup, but also for the > duration of the session. > > For edge computing scenarios with small remote sites/few servers, > anycast could offer automatic server reselection on site failure. > > 0-RTT connection setup with QUIC makes this more appealing too (and > TLS state, data replicated across other local servers/sites as needed > by the > application) > > Regards, > > John > > *From:* Mark Smith <markzzzsmith@gmail.com> > *Sent:* Tuesday, March 30, 2021 8:46 AM > *To:* Jeffrey (Zhaohui) Zhang <zzhang=40juniper.net@dmarc.ietf.org> > *Cc:* Linda Dunbar <linda.dunbar@futurewei.com>; Joel M. Halpern > <jmh@joelhalpern.com>; IPv6 List <ipv6@ietf.org>; Kaippallimalil John > <john.kaippallimalil@futurewei.com> > *Subject:* Re: Questions/comments about > draft-dunbar-6man-5g-edge-compute-sticky-service > > On Wed, 31 Mar 2021, 00:05 Jeffrey (Zhaohui) Zhang, > <zzhang=40juniper.net@dmarc.ietf.org > <mailto:40juniper.net@dmarc.ietf.org>> wrote: > > Hi Linda, > > You're not "leverage network control plane" - you're adding > complications to the network forwarding plane (and the control plane > because you need to coordinate among the ingress routers) with that > sticky-service-table with (Sticky Service ID, Flow Label. Sticky > Egress address, Timer) entries. The 5G/MEC control plane solution I > mentioned does not need a UE to query for a new address when its > location changes. > > The variation of that sticky-service-table based on (Sticky Service > ID, UE address, Sticky Egress address, Timer) is slightly better, > because it could be generalized to forwarding based on (source, > destination), which is not different from IP multicast (except that > there is no replication). While that reduces the complication in the > forwarding plane, it still has the scaling issue - you will still > have a large table and you will still have to coordinate among > different ingress routers. > > Granted, with the trendy AI, the coordination can be more precisely > - the 5G system can predict where a UE is moving to and push the > corresponding entry only to the new ingress router and ahead of > time. If the UE address does not change after its anchoring UPF > changes, the coordination can be simpler (otherwise the new ingress > router needs to be able to associate the old and new addresses). > > Retaining the same UE address after relocation can be done, and it > is documented in " Solution #26: Persistent address allocation for > mobile UEs that need MEC access" of 3GPP SA2 TR 23.748. I did not > get to defend it during the final stage of study but I still think > it is a viable solution (and preferred for application servers that > do not deal well with client address changes) - would love to > discuss that further with John on 3GPP SA2 mailing list. > > Having said all the above, I still believe it's the easiest and most > scalable solution if the UEs are told by 5G/MEC control plane what > true unicast address of the server or load balancer to use. > > Anycast to initially set things up, switch to unicast once that is > done so there is no ongoing "anycast stickiness" required, and > therefore no corresponding ongoing "anycast stickiness" state required > in the network forwarding plane. > > I think the existing and coming multipath transport layer protocols > can facilitate that. Initial connection setup via anycast, once that > is established, then establish 1 or more unicast sub-connections > (subflows in MPTCP) for ongoing communication, and abandon the anycast > connection once the first unicast sub-connection is established. > > Anycast is used for setup, but not for ongoing communication. > > See section 5.7.7 of this ID. > > https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftool > s.ietf.org%2Fid%2Fdraft-smith-6man-form-func-anycast-addresses-01.html > %23rfc.section.5.7.7&data=04%7C01%7Clinda.dunbar%40futurewei.com%7 > C58c60724b1fe434f313108d8f4704e73%7C0fee8ff2a3b240189c753a1d5591fedc%7 > C1%7C0%7C637528110502834818%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMD > AiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=WnFI > MnsjGb%2B8ycljBXslxndaC5ZI0pRnipaXbv7CokM%3D&reserved=0 > <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftoo > ls.ietf.org%2Fid%2Fdraft-smith-6man-form-func-anycast-addresses-01.htm > l%23rfc.section.5.7.7&data=04%7C01%7Clinda.dunbar%40futurewei.com% > 7C58c60724b1fe434f313108d8f4704e73%7C0fee8ff2a3b240189c753a1d5591fedc% > 7C1%7C0%7C637528110502834818%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwM > DAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=WnF > IMnsjGb%2B8ycljBXslxndaC5ZI0pRnipaXbv7CokM%3D&reserved=0> > > Regards, > > Mark. > > > Jeffrey > > -----Original Message----- > From: Linda Dunbar <linda.dunbar@futurewei.com > <mailto:linda.dunbar@futurewei.com>> > Sent: Monday, March 29, 2021 5:16 PM > To: Joel M. Halpern <jmh@joelhalpern.com > <mailto:jmh@joelhalpern.com>>; Jeffrey (Zhaohui) Zhang > <zzhang@juniper.net <mailto:zzhang@juniper.net>>; 'IPv6 List' > <ipv6@ietf.org <mailto:ipv6@ietf.org>> > Subject: RE: Questions/comments about > draft-dunbar-6man-5g-edge-compute-sticky-service > > [External Email. Be cautious of content] > > > Joel, > > I am confused of your statement. > > The problem I described is: > An end node (e.g. a drone) moves constantly. There are multiple > servers hosted in Edge DCs close to Cell towers to process requests > from the end node to achieve ultra-low latency. It is not realistic > for the end node to send DNS query every time it anchors to a new > Cell Tower. > > The suggested solution is to leverage network control plane to find > the optimal server to serve the end node. > > You stated that "it is not at all clear that is the best answer or > even a good one". Why? > > Linda > > > -----Original Message----- > From: Joel M. Halpern <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>> > Sent: Monday, March 29, 2021 1:56 PM > To: Linda Dunbar <linda.dunbar@futurewei.com > <mailto:linda.dunbar@futurewei.com>>; Jeffrey (Zhaohui) Zhang > <zzhang@juniper.net <mailto:zzhang@juniper.net>>; 'IPv6 List' > <ipv6@ietf.org <mailto:ipv6@ietf.org>> > Subject: Re: Questions/comments about > draft-dunbar-6man-5g-edge-compute-sticky-service > > Linda, you are assserting that the answer is "to leverage the > network control plane". > As Jeffrey has pointed out, given the problem you have described, it > is not at all clear that is the best answer, or even a good one. > > Yours, > Joel > > On 3/29/2021 1:30 PM, Linda Dunbar wrote: > > Jeffrey, > > > > The draft is to leverage the network control plane to determine > which server is the most appropriate one for the device. > > > > You can definitely use the Controller to choose the optimal > server. To > > simplify the IP address allocation, the draft suggest using the > Egress > > router addresses as the proxy for reaching the desired server. We can > > add a section to describe this scenario > > > > Linda > > > > -----Original Message----- > > From: Jeffrey (Zhaohui) Zhang <zzhang@juniper.net > <mailto:zzhang@juniper.net>> > > Sent: Monday, March 29, 2021 12:20 PM > > To: Linda Dunbar <linda.dunbar@futurewei.com > <mailto:linda.dunbar@futurewei.com>>; Vasilenko Eduard > > <vasilenko.eduard@huawei.com > <mailto:vasilenko.eduard@huawei.com>>; Kaippallimalil John > > <john.kaippallimalil@futurewei.com > <mailto:john.kaippallimalil@futurewei.com>>; 'IPv6 List' > <ipv6@ietf.org <mailto:ipv6@ietf.org>> > > Subject: RE: Questions/comments about > > draft-dunbar-6man-5g-edge-compute-sticky-service > > > > Since it is for "sticky service", you don't want to get a new > server address every time you move - unless the previous one is no > longer appropriate. That means it is best for a controller to > determine which one to use both initially and later when situation > changes (when a UE relocates or server load situation changes), and > that does not necessarily mean it is always through DNS. > > > > Jeffrey > > > > -----Original Message----- > > From: Linda Dunbar <linda.dunbar@futurewei.com > <mailto:linda.dunbar@futurewei.com>> > > Sent: Monday, March 29, 2021 1:15 PM > > To: Jeffrey (Zhaohui) Zhang <zzhang@juniper.net > <mailto:zzhang@juniper.net>>; Vasilenko Eduard > > <vasilenko.eduard@huawei.com > <mailto:vasilenko.eduard@huawei.com>>; Kaippallimalil John > > <john.kaippallimalil@futurewei.com > <mailto:john.kaippallimalil@futurewei.com>>; 'IPv6 List' > <ipv6@ietf.org <mailto:ipv6@ietf.org>> > > Subject: RE: Questions/comments about > > draft-dunbar-6man-5g-edge-compute-sticky-service > > > > [External Email. Be cautious of content] > > > > > > Jeffrey, > > > > The Devices are moving consistently, it is not reasonable to > require them to consistently query DNS for the "correct" non-ANYcast > address . > > > > Linda > > > > -----Original Message----- > > From: Jeffrey (Zhaohui) Zhang <zzhang@juniper.net > <mailto:zzhang@juniper.net>> > > Sent: Monday, March 29, 2021 12:04 PM > > To: Linda Dunbar <linda.dunbar@futurewei.com > <mailto:linda.dunbar@futurewei.com>>; Vasilenko Eduard > > <vasilenko.eduard@huawei.com > <mailto:vasilenko.eduard@huawei.com>>; Kaippallimalil John > > <john.kaippallimalil@futurewei.com > <mailto:john.kaippallimalil@futurewei.com>>; 'IPv6 List' > <ipv6@ietf.org <mailto:ipv6@ietf.org>> > > Subject: RE: Questions/comments about > > draft-dunbar-6man-5g-edge-compute-sticky-service > > > > Even if you could get over the security/trust hurdle, using a > controller to let the UEs know which unicast non-anycast address to > use is a much simpler/better solution. > > > > Jeffrey > > > > -----Original Message----- > > From: Linda Dunbar <linda.dunbar@futurewei.com > <mailto:linda.dunbar@futurewei.com>> > > Sent: Monday, March 29, 2021 12:50 PM > > To: Vasilenko Eduard <vasilenko.eduard@huawei.com > <mailto:vasilenko.eduard@huawei.com>>; Jeffrey (Zhaohui) > > Zhang <zzhang@juniper.net <mailto:zzhang@juniper.net>>; > Kaippallimalil John > > <john.kaippallimalil@futurewei.com > <mailto:john.kaippallimalil@futurewei.com>>; 'IPv6 List' > <ipv6@ietf.org <mailto:ipv6@ietf.org>> > > Subject: RE: Questions/comments about > > draft-dunbar-6man-5g-edge-compute-sticky-service > > > > [External Email. Be cautious of content] > > > > > > Ed, > > > > Yes, they are in one domain. Here is one example: > > > > 5G Connected devices, such as drones for fighting fires or > natural disasters or robots in Industry 4.0 environments, need > ultra-low latency responses from their analytic servers hosted in > the Edge data centers. To reach ultra-low latency, there are > multiple servers hosting the analytic functions in the Edge DCs. > > All the functions (including networking and analytics) and > devices are administrated by one operator. Those functions might be > provided by different vendors, therefore needing interoperable > solutions. > > > > Linda > > > > -----Original Message----- > > From: Vasilenko Eduard <vasilenko.eduard@huawei.com > <mailto:vasilenko.eduard@huawei.com>> > > Sent: Monday, March 29, 2021 11:41 AM > > To: Linda Dunbar <linda.dunbar@futurewei.com > <mailto:linda.dunbar@futurewei.com>>; Jeffrey (Zhaohui) Zhang > > <zzhang@juniper.net <mailto:zzhang@juniper.net>>; Kaippallimalil John > > <john.kaippallimalil@futurewei.com > <mailto:john.kaippallimalil@futurewei.com>>; 'IPv6 List' > <ipv6@ietf.org <mailto:ipv6@ietf.org>> > > Subject: RE: Questions/comments about > > draft-dunbar-6man-5g-edge-compute-sticky-service > > > > It could be the problem. > > Because all SR RFCs and drafts clearly say: only inside the domain. > > Else could be a huge security risk. UE could not be trusted. > > Cross-domain security is the principal question that should be > discussed in SPRING first. > > Current SR architecture does not try to resolve it yet. > > > > > > Segment Routing in general and SRv6 in particular are claimed to > be designed for Trusted environments only: > > - Segment routing architecture (RFC 8402) section 8 > > - SRH - Segment Routing Header (RFC 8754) section 5 > > - SRv6 Network Programming > (draft-ietf-spring-srv6-network-programming-25) section 9 SRH RFC is > especially verbal how to filter-out any SR-related information on > the border of "SR domain". > > Ed/ > > -----Original Message----- > > From: ipv6 [mailto:ipv6-bounces@ietf.org > <mailto:ipv6-bounces@ietf.org>] On Behalf Of Linda Dunbar > > Sent: Monday, March 29, 2021 7:09 PM > > To: Jeffrey (Zhaohui) Zhang <zzhang@juniper.net > <mailto:zzhang@juniper.net>>; Kaippallimalil John > > <john.kaippallimalil@futurewei.com > <mailto:john.kaippallimalil@futurewei.com>>; 'IPv6 List' > <ipv6@ietf.org <mailto:ipv6@ietf.org>> > > Subject: RE: Questions/comments about > > draft-dunbar-6man-5g-edge-compute-sticky-service > > > > Jeffrey, > > > > We can definitely add the option of UE inserting SRH. I am just > not sure how many UEs or end devices will do those actions. If very > few UEs can do this action, the solution itself is not useful. > However, it doesn't hurt for IETF to specify such a solution so that > future IoT or 5G devices can have a reference to do the actions. > > > > Another point, the number of Sticky Service is not large. The > Ingress routers are configured with the policies ( ACLs) to filter > those flows. > > > > Linda > > > > -----Original Message----- > > From: Jeffrey (Zhaohui) Zhang <zzhang@juniper.net > <mailto:zzhang@juniper.net>> > > Sent: Monday, March 29, 2021 9:18 AM > > To: Linda Dunbar <linda.dunbar@futurewei.com > <mailto:linda.dunbar@futurewei.com>>; Kaippallimalil John > > <john.kaippallimalil@futurewei.com > <mailto:john.kaippallimalil@futurewei.com>>; 'IPv6 List' > <ipv6@ietf.org <mailto:ipv6@ietf.org>> > > Subject: RE: Questions/comments about > > draft-dunbar-6man-5g-edge-compute-sticky-service > > > > Hi Linda, > > > > You proposed two ways of providing "sticky services" - when a UE > moves to a new location, the ingress router at that new location > will still route the packets of the same flow to the previous egress > router. That flow cannot be identified by the destination address > alone, since it is an anycast address that are shared by servers > behind different egress routers. > > > > Essentially, you're trying to turn the ingress router into a load > balancer, especially with your option #2 (section 5, "tunnel based" > solution). I don't think we want the routers to do that - while > routers can make use of 5-tuple for ECMP hashing, we don't want to > make routers more complicated and do forwarding based on a > sticky-service-table with (Sticky Service ID, Flow Label. Sticky > Egress address, Timer) entries. It's not only complicated but also > does not scale (we can discuss the scaling aspect wrt the flow > labels separately). > > > > The variation of option #1 that I suggested would be better, if > the following were true: > > > > 1. The UE can insert an SRH > > 2. The ingress router can trust the SRH from the UEs > > > > In that case, it would be better for the UE to learn the egress > router via 5G/MEC control plane, instead of relying on the egress > router to put that into the DOH of every server->UE packets for > sticky services and for the UE to retrieve that information from > each incoming sticky service packets. One thing I learned is that > the entire 5G system is very much heavy with control/management > plane and I would think it is a much better option to provide that > information to the UEs. > > > > On the other hand, once you go that way, the control plane can > simply provide the regular, non-anycast addresses of the servers > instead of the egress router address. Then, all the problems > disappear and corresponding proposals are no longer needed, > including the ones in > draft-dunbar-idr-5g-edge-compute-app-meta-data, and we only need > existing simple routing functions. > > > > Thanks. > > > > Jeffrey > > > > -----Original Message----- > > From: Linda Dunbar <linda.dunbar@futurewei.com > <mailto:linda.dunbar@futurewei.com>> > > Sent: Saturday, March 27, 2021 10:45 PM > > To: Jeffrey (Zhaohui) Zhang <zzhang@juniper.net > <mailto:zzhang@juniper.net>>; Kaippallimalil John > > <john.kaippallimalil@futurewei.com > <mailto:john.kaippallimalil@futurewei.com>>; 'IPv6 List' > <ipv6@ietf.org <mailto:ipv6@ietf.org>> > > Subject: RE: Questions/comments about > > draft-dunbar-6man-5g-edge-compute-sticky-service > > > > [External Email. Be cautious of content] > > > > > > Jeffrey, > > > > Thank you very much for the constructive comments. > > Replies are inserted below: > > > > -----Original Message----- > > From: Jeffrey (Zhaohui) Zhang <zzhang@juniper.net > <mailto:zzhang@juniper.net>> > > Sent: Friday, March 26, 2021 3:59 PM > > To: Linda Dunbar <linda.dunbar@futurewei.com > <mailto:linda.dunbar@futurewei.com>>; Kaippallimalil John > > <john.kaippallimalil@futurewei.com > <mailto:john.kaippallimalil@futurewei.com>>; 'IPv6 List' > <ipv6@ietf.org <mailto:ipv6@ietf.org>> > > Subject: Questions/comments about > > draft-dunbar-6man-5g-edge-compute-sticky-service > > > > Hi Linda, John, > > > > When a UE (User Equipment) initiates application packets > using the > > destination address from a DNS reply or from its own cache, the > > packets from the UE are carried in a PDU session through 5G Core > > [5GC] to the 5G UPF-PSA (User Plan Function - PDU Session > Anchor). > > The UPF-PSA decapsulate the 5G GTP outer header and forwards the > > packets from the UEs to the Ingress router of the Edge > Computing (EC) > > Local Data Network (LDN). The LDN for 5G EC, which is the IP > Networks > > from 5GC perspective, is responsible for forwarding the > packets to > > the intended destinations. > > > > A nit comment about "5G Core" above. When I first started > learning 4G/5G It took me a while to realize the 3GPP "core network" > concept in vastly different from what IETF people are used to. It's > not about topology and now the "core network" functions are being > more and more distributed into edges. Therefore, in this context it > may be better to simply strike the "through 5G Core [5GC]" wording > to reduce the confusion to some readers. > > > > [Linda] That is very true. Removed the term per your suggestion. > 5G Core refers to all the functions from Radio to UPF. > > > > 1.3. Problem #1: ANYCAST in 5G EC Environment > > > > Increasingly, ANYCAST is used extensively by various application > > providers and CDNs because it is possible to dynamically load > balance > > across multiple locations of the same address based on network > > conditions. BGP is an integral part in the way IP anycast usually > > functions. Within BGP routing there are multiple routes for > the same > > IP address which are pointing to different locations. > > > > Not only BGP - but all IP routing protocols should work well with > anycast. My understanding is that BGP being integral part here is > really that the data network here is likely realized by VPNs over > the same transport network. Is that a correct understanding? > > > > [Linda] ANYCAST has traditionally been used for servers or loader > balancers that are placed in geographically diverse locations, so > that BGP alone is enough for the traffic in one region to be > forwarded to one server. But for the 5G Edge Computing where > multiple Servers/load Balancers with the same ANYCAST addresses are > placed close proximity, IGP is needed. > > > > Of course, BGP does have flexibility in providing better/more > control of route selection than IGP does in the context of the > companion draft-dunbar-idr-5g-edge-compute-app-meta-data. > > [Linda] Correct. > > > > But, having multiple locations for the same ANYCAST address in 5G > > Edge Computing environment can be problematic because all > those edge > > computing Data Centers can be close in proximity. There > might not be > > any difference in the routing cost to reach the Application > Servers > > in different Edge DCs. Same routing cost to multiple ANYCAST > > locations can cause packets from one flow to be forwarded to > > different locations, which can cause service glitches. > > > > As pointed out later in this same document, modern routers > support "Flow Affinity" and should not cause packets of a flow on a > specific router to be forwarded to different locations. The real > problem is when a UE moves to a different location, the new router > at that location may send it to a different egress router. However, > that is the "sticky service" problem described in 1.4. > > [Linda] Correct. > > > >>From draft-dunbar-idr-5g-edge-compute-app-meta-data, I understand > that on a specific router it needs to choose a location that can > best serve an application based on some non-routing factors. If 1.3 > is really for that purpose, it should be reworded accordingly. As I > mentioned in an earlier email, the two documents should better align > on the problem descriptions. > > > > Here is the overview of the End-Node based Sticky Service > solution: > > - Each ANYCAST Edge Computing server either learns or is > informed > > of the unicast Sticky Egress address (Section 3). The > goal of > > the network is to deliver packets belonging to one flow > to the > > same Sticky Egress address for the ANYCAST address. > Section 4.1 > > describes how Edge Computing Servers discover their > > corresponding Sticky Egress unicast addresses. > > - When an Edge Computing server sends data packets to a UE (or > > client), it inserts the Sticky-Dst-SubTLV (described in > Section > > 4.2) into the packets' Destination Option Header. > > - UE (or client) needs to copy the Destination Option > Header from > > the received packet to the next packet's Destination > Header if > > the next packet belongs to the same flow as the previous > packet. > > > > I was really confused by "next packet". I finally realized you > may be referring to response packets from the UE to the server, and > the "same flow" should be "same service". Better wording is needed here. > > > > - If the following conditions are true, the ingress router > > encapsulates the packet from the UE in a tunnel whose outer > > destination address is set to the Sticky Egress Address > > extracted from the packet's Sticky-Dst-SubTLV: > > o The destination of the packet from the UE side matches > > with one of the Sticky Service ACLs configured on the > > ingress router of the LDN, > > o the packet header has the Destination Option present > with > > Sticky-Dst-SubTLV. > > > > Wouldn't it be better for the UE to put in an SRH with one SID > for the server address and set the DA to be the egress router > address? That way you don't need the ACL or the DOH (the > Sticky-Dst-SubTLV information in the DOH is not for consumption by > the server anyway), and you don't even need tunneling or BGP (unless > VPN is used - but that's orthogonal to this). Existing SRv6 function > takes care of it. > > > > [Linda] 3GPP has rejected using SRH in the 5G Core. We can think > about using them in the N6 interface. > > > > Also, the Sticky-Dst-SubTLV in DOH of the server->UE traffic > would be better renamed as "return waypoint" for more generic purpose. > > [Linda] that is interesting suggestion. > > > > 4.1. Sticky Egress Address Discovery > > > > To an App server with ANYCAST address, the Sticky Egress > address is > > same as its default Gateway address. > > > > To prevent malicious UEs (or clients) sending DDOS attacks to > routers > > within 5G EC LDN, e.g. the Sticky Egress address that is > encoded in > > the Destination option header in the packets sent back to the > UEs (or > > clients), a proxy Sticky Egress address can be encoded in the > > Destination option header. The proxy Sticky Egress address is > only > > recognizable by the 5G EC LDN ingress nodes, i.e. the Ra and > Rb in > > the Figure 1, but not routable in other networks. The LDN ingress > > routers can translate the proxy Sticky Egress to a routable > address > > for the Sticky Egress node after the source addresses of the > packets > > are authenticated. > > > > Why is the 4.1 title called "... discovery"? Does not seem to be > about "discovery". > > [Linda] it is about remembering which Egress router was used for > the flow. Should it be "Sticky Egress Memory"? > > > > 4.3. Expected behavior at the UE > > ... > > Section 4 describes the network layer processing if UEs do not > > perform the steps described here. > > > > Should be "Section 5". > > > > [Linda] Thank you. > > > > 5. Tunnel based Sticky Service Solutions 5.1. Ingress and Egress > > Routers Processing Behavior > > > > The solution assumes that both ingress routers and egress routers > > support at least one type of tunnel and are configured with > ACLs to > > filter out packets whose destination or source addresses > match with > > the Sticky Service Identifier. The solution also assumes > there are > > only limited number of Sticky Services to be supported. > > An ingress router needs to build a Sticky-Service-Table, with the > > minimum following attributes. The Sticky-Service-Table is > initialized > > to be empty. > > - Sticky Service ID > > - Flow Label > > - Sticky Egress address > > - Timer > > > > Editor's Note: > > When a UE moves from one 5G Site to another, the same UE > will have > > a new IP address. "Flow Label + Sticky Service ID" stays > the same > > when a UE is anchored to a new PSA. Therefore, this > solution use > > "Flow Label + Sticky Service ID" to identify a sticky flow. > Since > > the chance of different UEs sending packets to the same ANYCAST > > address using the same Flow Label is very low, it is with high > > probability that "Flow Label + Sticky Service ID" can uniquely > > identify a flow. When multiple UEs using the same Flow Label > > sending packets to the same ANYCAST address, the solution > described > > in this section will stick the flows to the same ANYCAST server > > attached to the Sticky Egress router. This behavior doesn't > cause > > any harm. > > > > It seems that the same flow label is used for traffic of the same > service in both directions. So who will assign the flow label? > > [Linda] The "flow label" from the IPv6 header should be managed > by the hosts & servers. > > > > If two UEs of the same service happen to use the same flow label, > then sticky service is not guaranteed. For example, initially > they're anchored at different UPFs, and UE1 traffic is sent to > egress router 1 while UE2 traffic is sent to egress router 2. When > UE 1 relocates to the same UPF as UE 2's, its traffic will be sent > to egress node 2 because the same flow label is used. > > > > Therefore, there should be a central controller to assign flow > labels based on UE id, and the UE id is not based on IP address > (since it could change). > > [Linda] Since the "Flow Label" is randomly generated (by Host > OS), the chance of two UEs reaching the same service having the same > Flow Label is very small. We can explore the option of getting the > Control Plane involved. > > > > Note: since there are only small number of Sticky services, the > > Sticky-Service-Table is not very large. > > > > With the above understanding, the table could get large? > > [Linda]? > > > > When an ingress router receives a packet from a UE matching > with one > > of the Sticky Service ACLs and there is no entry in the Sticky- > > Service-Table matching the Flow Label and the Sticky Service > ID, the > > ingress router considers the packet to be the first packet of the > > flow. There is no need to sticking the packet to any > location. The > > ingress router uses its own algorithm to select the optimal > egress > > node as the Sticky Egress address for the ANYCAST address, > > encapsulates the packet with a tunnel that is supported by > the egress > > node. The tunnel's destination address is set to the egress node > > address. > > > > If a UE was using egress router 1 and it relocates to a new UPF, > the new ingress router will likely have no corresponding entry for > it? What if the new ingress router pick egress router 2? > > It seems that the ingress routers need to pre-exchange entries in > the table? > > I see it's discussed later that the routers do exchange the > information. It should be mentioned up front when the table is > introduced. > > [Linda] Would Adding a reference be enough? > > > > When an ingress router receives a packet in a tunnel from any > egress > > router and the packet's source address matches with a Sticky > Service > > ID, the egress router address is set as the Sticky Egress > address for > > the Sticky Service ID. The ingress router adds the entry of > "Sticky- > > Service-ID + Flow Label + the associated Sticky Egress address + > > Timer" to the Sticky-Service-Table if the entry doesn't exist > yet in > > the table. If the entry exists, the ingress router refreshes the > > Timer of the entry in the table. > > > > When the ingress router receives the subsequent packets of a flow > > from the 5G side matching with an Sticky Service ID and the > Sticky- > > Service ID exists in the Sticky-Service-Table, the ingress router > > uses the Sticky Egress address found in the > Sticky-Service-Table to > > encapsulate the packet and refresh the Timer of the entry. If the > > Sticky-Service ID doesn't exist in the table, the ingress router > > considers the packet as the first packet of a flow. > > > > The above is what leads me to believe that the flow label is the > same in both directions. > > [Linda] they don't have to be the same, do they? > > > > 5.3. Scenario 2: With communication with 5G system > > ... > > The ingress and egress router processing are the same as > described in > > Section 5.1 except a flow is now uniquely identified by the > "Sticky > > Service ID" + "UE address" instead of "Sticky Service ID" + "Flow > > Label". > > > > This confirms my earlier understanding for scenario 1 that "there > should be a central controller to assign flow labels based on UE id, > and the UE id is not based on IP address (since it could change)" > and that the table could get large. > > > > Of course now for scenario 2, you're not using the flow label any > more. While the table only contains entries that this ingress router > actually need, the following are still true: > > - The table could still get large (if the number of attached UEs for > > the sticky services is large) > > - On demand fetching of the table entry may not be fast enough > > > > Additionally, instead of "scenario", "option" or "solution" would > be a better wording. > > [Linda] Good suggestion! > > > > More importantly, this stateful flow steering based on the > additional table is just too heavy and complicated. Why not simply > have the UEs support SRH so that traffic will be routed via the > desired egress router using standard SRv6 mechanism? > > [Linda] It is not realistic for UEs (your smart phone) to support > SRH. > > > > Jeffrey > > > > > > -----Original Message----- > > From: Jeffrey (Zhaohui) Zhang > > Sent: Thursday, March 25, 2021 3:46 PM > > To: Linda Dunbar <linda.dunbar@futurewei.com > <mailto:linda.dunbar@futurewei.com>>; Kaippallimalil John > > <john.kaippallimalil@FUTUREWEI.COM > <mailto:john.kaippallimalil@FUTUREWEI.COM>>; IPv6 List > <ipv6@ietf.org <mailto:ipv6@ietf.org>>; > > idr@ietf. org <idr@ietf.org <mailto:idr@ietf.org>> > > Subject: questions about > > draft-dunbar-idr-5g-edge-compute-app-meta-data and > > draft-dunbar-6man-5g-edge-compute-sticky-service > > > > Hi Linda, John, > > > > I have the following questions. > > > > The two related drafts listed the following three problems > respectively: > > > > 1.3. Problem#1: ANYCAST in 5G EC Environment.............. 6 > > 1.4. Problem #2: Unbalanced Anycast Distribution due to UE > Mobility.................................................. 7 > > 1.5. Problem 3: Application Server Relocation............. 7 > > > > 1.2. Problem #1: ANYCAST in 5G EC Environment.............. 4 > > 1.3. Problem #2: sticking to original App Server........... 5 > > 1.4. Problem #3: Application Server Relocation............. 5 > > > > Why is problem #2 different in the two drafts? Is it true that > none of the two drafts address problem #3? > > The idr draft talk about "soft anchoring" problem and solution - > how is that different from the "sticky service"? > > > > Thanks. > > Jeffrey > > > > Juniper Business Use Only > > > > Juniper Business Use Only > > > > Juniper Business Use Only > > -------------------------------------------------------------------- > > IETF IPv6 working group mailing list > > ipv6@ietf.org <mailto:ipv6@ietf.org> > > Administrative Requests: > https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fnam11.safelinks.protection.outlook.com%2F%3Furl%3Dhttps*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fnam11.safelinks.protection.outlook.com*2F*3Furl*3Dhttps*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fnam11.safelinks.protection.outlook.com*2F*3Furl*3Dhttps*3A*2F*2Fwww.ietf.org*2Fmailman*2Flistinfo*2Fipv6*26amp*3Bdata*3D04*7C01*7Clinda.dunbar*40futurewei.com*7C4209e8a9acae47b96d1808d8f2d16b8d*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C0*7C637526328578769822*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C1000*26amp*3Bsdata*3DA39pqHVUBFsssO3DLSqrTUtPpcXAr*2F8pi*2Bmw*2BtIJNME*3D*26amp*3Breserved*3D0__*3BJSUlJSUlJSUlJSUlJSUlJSUlJSUlJQ!!NEt6yMaO-gk!QWI34EOzIdgzRLkkdD3rdv_fn4CLHXnnMvDpOOeQB4ELlElbfawu6WXv0nbjgi-z*24*26amp*3Bdata*3D04*7C01*7Clinda.dunbar*40futurewei.com*7C2b126cc5be8541bd43cc08d8f2d4a7ab*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C0*7C637526342463012256*7CUnknown*7CTWFpbGZsb3&data=04%7C01%7Clinda.dunbar%40futurewei.com%7C58c60724b1fe434f313108d8f4704e73%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637528110502834818%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=TNG%2BMNWM9kwvdNCBeVXZtkNVDihZIuBfRRdwsaDkWXM%3D&reserved=0 > <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fnam11.safelinks.protection.outlook.com%2F%3Furl%3Dhttps*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fnam11.safelinks.protection.outlook.com*2F*3Furl*3Dhttps*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fnam11.safelinks.protection.outlook.com*2F*3Furl*3Dhttps*3A*2F*2Fwww.ietf.org*2Fmailman*2Flistinfo*2Fipv6*26amp*3Bdata*3D04*7C01*7Clinda.dunbar*40futurewei.com*7C4209e8a9acae47b96d1808d8f2d16b8d*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C0*7C637526328578769822*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C1000*26amp*3Bsdata*3DA39pqHVUBFsssO3DLSqrTUtPpcXAr*2F8pi*2Bmw*2BtIJNME*3D*26amp*3Breserved*3D0__*3BJSUlJSUlJSUlJSUlJSUlJSUlJSUlJQ!!NEt6yMaO-gk!QWI34EOzIdgzRLkkdD3rdv_fn4CLHXnnMvDpOOeQB4ELlElbfawu6WXv0nbjgi-z*24*26amp*3Bdata*3D04*7C01*7Clinda.dunbar*40futurewei.com*7C2b126cc5be8541bd43cc08d8f2d4a7ab*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C0*7C637526342463012256*7CUnknown*7CTWFpbGZsb3&data=04%7C01%7Clinda.dunbar%40futurewei.com%7C58c60724b1fe434f313108d8f4704e73%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637528110502834818%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=TNG%2BMNWM9kwvdNCBeVXZtkNVDihZIuBfRRdwsaDkWXM%3D&reserved=0> > d8eyJWIjoiMC4wLjAwMDAiLCJQIjoi__;JSUlJSUlJSUlJSUqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKiUlJSoqKioqKioqKio!!NEt6yMaO-gk!VemUe-2PHPVnuVFBu0NeOKMAx3tulW_X0zDToehm7avqQhBqbE3FDykd8nYVAqHW$ > > > > > V2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C1000%26amp%3Bsdata%3DaOw1DkDc > > > Qu0*2FmMi6RfWlUyRcLB2jRcsbBAhcpoaX5yE*3D%26amp%3Breserved%3D0__%3BJSUl > > > JSUlJSUlJSUqKioqKiolJSUqKioqKioqKioqKiolJSUqKioqJSUlJSUlJSUlJSUlJSUlJS > > > UlJQ!!NEt6yMaO-gk!Q-hLtDzPuot4CQsvyUhfrEcNgHIIBEdRDT4RgyHgVCE1f5Vt6Dlv > > zYC-o7693kZ1%24&data=04%7C01%7Clinda.dunbar%40futurewei.com > <https://nam11.safelinks.protection.outlook.com/?url=http%3A%2F%2F40futurewei.com%2F&data=04%7C01%7Clinda.dunbar%40futurewei.com%7C58c60724b1fe434f313108d8f4704e73%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637528110502844816%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=2xaPm869MrUiDL9%2ByoTEsqBktpf6ID8b9Mp8rxGPs7E%3D&reserved=0>%7C67c9 > > > 07b1d8e643cc5a5108d8f2d6f104%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C > > > 0%7C637526352290503133%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJ > > > QIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=Be%2FU8Mh > > JT%2BA5b83e8ZLFCeamlBcSoit3SJ6Xk3X9%2Bz8%3D&reserved=0 > > -------------------------------------------------------------------- > > > > Juniper Business Use Only > > > > Juniper Business Use Only > > > > Juniper Business Use Only > > > > -------------------------------------------------------------------- > > IETF IPv6 working group mailing list > > ipv6@ietf.org <mailto:ipv6@ietf.org> > > Administrative Requests: > > > https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fnam11.safelinks.protection.outlook.com%2F%3Furl%3Dhttps*3A*2F*2Fwww__%3BJSUl!!NEt6yMaO-gk!VemUe-2PHPVnuVFBu0NeOKMAx3tulW_X0zDToehm7avqQhBqbE3FDykd8ujmRF-e%24&data=04%7C01%7Clinda.dunbar%40futurewei.com%7C58c60724b1fe434f313108d8f4704e73%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637528110502844816%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=XEOWX%2Fl8GESNNafvu%2BtekCqSSlgs%2F2l8HLGXyw8U%2Fn0%3D&reserved=0 > <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fnam11.safelinks.protection.outlook.com%2F%3Furl%3Dhttps*3A*2F*2Fwww__%3BJSUl!!NEt6yMaO-gk!VemUe-2PHPVnuVFBu0NeOKMAx3tulW_X0zDToehm7avqQhBqbE3FDykd8ujmRF-e%24&data=04%7C01%7Clinda.dunbar%40futurewei.com%7C58c60724b1fe434f313108d8f4704e73%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637528110502844816%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=XEOWX%2Fl8GESNNafvu%2BtekCqSSlgs%2F2l8HLGXyw8U%2Fn0%3D&reserved=0> > . > > ietf.org > <https://nam11.safelinks.protection.outlook.com/?url=http%3A%2F%2Fietf.org%2F&data=04%7C01%7Clinda.dunbar%40futurewei.com%7C58c60724b1fe434f313108d8f4704e73%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637528110502844816%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=n3zK2zENL16JEkq4iwW19VBUnSB3ii78O%2FIpsROC7hA%3D&reserved=0>%2Fmailman%2Flistinfo%2Fipv6&data=04%7C01%7Clinda.dunbar%4 > > 0futurewei.com > <https://nam11.safelinks.protection.outlook.com/?url=http%3A%2F%2F0futurewei.com%2F&data=04%7C01%7Clinda.dunbar%40futurewei.com%7C58c60724b1fe434f313108d8f4704e73%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637528110502844816%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=XAXtrpwH%2FQ4ij8PcDUP6VViJLdjA1vOpoNifkmdyoQo%3D&reserved=0>%7Ca73842e8d0e7473e591d08d8f2e43b9f%7C0fee8ff2a3b240189c > > > 753a1d5591fedc%7C1%7C0%7C637526409383434704%7CUnknown%7CTWFpbGZsb3d8ey > > > JWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C100 > > > 0&sdata=qkqfI%2B3ZLo76yZFXDIxUxjfwyhA5MNJIqUwzUyTGXqc%3D&reser > > ved=0 > > -------------------------------------------------------------------- > > > > Juniper Business Use Only > > -------------------------------------------------------------------- > IETF IPv6 working group mailing list > ipv6@ietf.org <mailto:ipv6@ietf.org> > Administrative Requests: https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fipv6&data=04%7C01%7Clinda.dunbar%40futurewei.com%7C58c60724b1fe434f313108d8f4704e73%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637528110502844816%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=klLXVxQwPzN2pbIBqpBGuOmFnNbQlk468c60TOiErXY%3D&reserved=0 > > <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww > .ietf.org%2Fmailman%2Flistinfo%2Fipv6&data=04%7C01%7Clinda.dunbar% > 40futurewei.com%7C58c60724b1fe434f313108d8f4704e73%7C0fee8ff2a3b240189 > c753a1d5591fedc%7C1%7C0%7C637528110502844816%7CUnknown%7CTWFpbGZsb3d8e > yJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C10 > 00&sdata=klLXVxQwPzN2pbIBqpBGuOmFnNbQlk468c60TOiErXY%3D&reserv > ed=0> > > -------------------------------------------------------------------- >
- Questions/comments about draft-dunbar-6man-5g-edg… Jeffrey (Zhaohui) Zhang
- RE: Questions/comments about draft-dunbar-6man-5g… Linda Dunbar
- RE: Questions/comments about draft-dunbar-6man-5g… Jeffrey (Zhaohui) Zhang
- RE: Questions/comments about draft-dunbar-6man-5g… Linda Dunbar
- RE: Questions/comments about draft-dunbar-6man-5g… Vasilenko Eduard
- RE: Questions/comments about draft-dunbar-6man-5g… Linda Dunbar
- RE: Questions/comments about draft-dunbar-6man-5g… Jeffrey (Zhaohui) Zhang
- RE: Questions/comments about draft-dunbar-6man-5g… Jeffrey (Zhaohui) Zhang
- RE: Questions/comments about draft-dunbar-6man-5g… Linda Dunbar
- RE: Questions/comments about draft-dunbar-6man-5g… Jeffrey (Zhaohui) Zhang
- RE: Questions/comments about draft-dunbar-6man-5g… Linda Dunbar
- Re: Questions/comments about draft-dunbar-6man-5g… Joel M. Halpern
- RE: Questions/comments about draft-dunbar-6man-5g… Linda Dunbar
- Re: Questions/comments about draft-dunbar-6man-5g… Joel M. Halpern
- RE: Questions/comments about draft-dunbar-6man-5g… Linda Dunbar
- Re: Questions/comments about draft-dunbar-6man-5g… Joel Halpern Direct
- RE: Questions/comments about draft-dunbar-6man-5g… Jeffrey (Zhaohui) Zhang
- Re: Questions/comments about draft-dunbar-6man-5g… Mark Smith
- RE: Questions/comments about draft-dunbar-6man-5g… Jeffrey (Zhaohui) Zhang
- RE: Questions/comments about draft-dunbar-6man-5g… Linda Dunbar
- RE: Questions/comments about draft-dunbar-6man-5g… Linda Dunbar
- Re: Questions/comments about draft-dunbar-6man-5g… Joel M. Halpern
- RE: Questions/comments about draft-dunbar-6man-5g… Linda Dunbar
- RE: Questions/comments about draft-dunbar-6man-5g… Linda Dunbar