RE: Meta-issues: On the deprecation of the fragmentation function

"Templin, Fred L" <Fred.L.Templin@boeing.com> Wed, 10 July 2013 20:07 UTC

Return-Path: <Fred.L.Templin@boeing.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 82B7721F9E91 for <ipv6@ietfa.amsl.com>; Wed, 10 Jul 2013 13:07:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.542
X-Spam-Level:
X-Spam-Status: No, score=-6.542 tagged_above=-999 required=5 tests=[AWL=0.057, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tYNCLbpv+pFQ for <ipv6@ietfa.amsl.com>; Wed, 10 Jul 2013 13:07:34 -0700 (PDT)
Received: from slb-mbsout-01.boeing.com (slb-mbsout-01.boeing.com [130.76.64.128]) by ietfa.amsl.com (Postfix) with ESMTP id 704C221F9A51 for <ipv6@ietf.org>; Wed, 10 Jul 2013 13:07:34 -0700 (PDT)
Received: from slb-mbsout-01.boeing.com (localhost.localdomain [127.0.0.1]) by slb-mbsout-01.boeing.com (8.14.4/8.14.4/DOWNSTREAM_MBSOUT) with ESMTP id r6AK7XBZ021884 for <ipv6@ietf.org>; Wed, 10 Jul 2013 13:07:33 -0700
Received: from XCH-NWHT-10.nw.nos.boeing.com (xch-nwht-10.nw.nos.boeing.com [130.247.25.113]) by slb-mbsout-01.boeing.com (8.14.4/8.14.4/UPSTREAM_MBSOUT) with ESMTP id r6AK7X8h021874 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=OK); Wed, 10 Jul 2013 13:07:33 -0700
Received: from XCH-BLV-102.nw.nos.boeing.com (130.247.25.117) by XCH-NWHT-10.nw.nos.boeing.com (130.247.25.113) with Microsoft SMTP Server (TLS) id 8.3.297.1; Wed, 10 Jul 2013 13:07:32 -0700
Received: from XCH-BLV-504.nw.nos.boeing.com ([169.254.4.48]) by XCH-BLV-102.nw.nos.boeing.com ([169.254.2.19]) with mapi id 14.02.0328.011; Wed, 10 Jul 2013 13:07:32 -0700
From: "Templin, Fred L" <Fred.L.Templin@boeing.com>
To: james woodyatt <jhw@apple.com>, "ipv6@ietf.org" <ipv6@ietf.org>
Subject: RE: Meta-issues: On the deprecation of the fragmentation function
Thread-Topic: Meta-issues: On the deprecation of the fragmentation function
Thread-Index: AQHOfZp7EVtgyhVSFES4anVAs4ggI5leTEDggAAJ9YA=
Date: Wed, 10 Jul 2013 20:07:31 +0000
Message-ID: <2134F8430051B64F815C691A62D983180B875D@XCH-BLV-504.nw.nos.boeing.com>
References: <FAD482FE-4583-472A-8B57-E789A942686E@gmail.com> <1DF7BDE3-1490-41FE-A959-EC8EC54B0A5F@tzi.org> <8B84E185-36AC-4F22-A88E-5A2F1200AE8B@gmail.com> <51DC48F7.2080901@dougbarton.us> <2CF4CB03E2AA464BA0982EC92A02CE2509FA39E2@BL2PRD0512MB646.namprd05.prod.outlook.com> <51DC5955.4030700@dougbarton.us> <2CF4CB03E2AA464BA0982EC92A02CE2509FB8317@BY2PRD0512MB653.namprd05.prod.outlook.com> <2134F8430051B64F815C691A62D983180B812F@XCH-BLV-504.nw.nos.boeing.com> <2CF4CB03E2AA464BA0982EC92A02CE2509FBAB7B@BY2PRD0512MB653.namprd05.prod.outlook.com> <B5A72885-678A-442A-86D7-D710D2324A28@apple.com> <2134F8430051B64F815C691A62D983180B86A9@XCH-BLV-504.nw.nos.boeing.com>
In-Reply-To: <2134F8430051B64F815C691A62D983180B86A9@XCH-BLV-504.nw.nos.boeing.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [130.247.104.6]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-TM-AS-MML: disable
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Jul 2013 20:07:43 -0000

Hi,

> A quick read of Section
> 4 of my new draft should be all you need to understand
> what I'm talking about:
> 
>   http://tools.ietf.org/html/draft-generic-6man-tunfrag-08

Here is the text I'm talking about so I won't have to keep
repeating myself:

Thanks - Fred
fred.l.templin@boeing.com

---

4.  IPv6 Tunnels

   IPv6 tunnels are used for many purposes, including transition,
   security, mobility, routing control, etc.  While it is assumed that
   transition mechanisms will eventually give way to native IPv6, it is
   clear that the use of tunnels for other purposes will continue and
   even expand.  A long term strategy for dealing with tunnel MTUs is
   therefore required.

   Tunnels may cross links (perhaps even other tunnels) that configue
   only the IPv6 minMTU of 1280 bytes while the tunnel ingress must be
   able to send packets that are at least 1280 bytes in length so that
   the IPv6 minMTU is extended to the source.  However, these tunneled
   packets become (1280 + HLEN) bytes on the wire (where HLEN is the
   length of the encapsulating headers), meaning that they would be
   vulerable to loss at a link within the tunnel that configures a
   smaller MTU.  Therefore, the only way to satisfy the IPv6 minMTU is
   through network layer fragmentation and reassembly between the tunnel
   ingress and egress, where the ingress fragments its tunneled packets
   that are larger than (1280 - HLEN) bytes.

   Unfortunately, fragmentation and reassembly are a pain point for in-
   the-network routers - especially for those that are nearer the core
   of the network.  It is therefore highly desirable for the tunnel
   ingress to discover whether this fragmentation and reassembly can be
   avoided.  This can only be done by allowing the ingress to probe the
   path to the egress by sending whole 1500 byte probe packets to
   discover whether the probes can be delivered to the egress without
   fragmentation.  These 1500 byte probes appear as (1500 + HLEN) bytes
   on the wire, therefore the path must support an MTU of at least this
   size in order for the probe to succeed.

   The tunnel fragmentation and reassembly strategy is therefore as
   follows:

   1.  When the tunnel ingress receives a packet that is no larger than
       (1280-HLEN) bytes, it encapsulates the packet and sends it to the
       egress without fragmentation.  The egress will receive the packet
       since it is small enough to fit within the IPv6 minMTU of 1280
       bytes.

   2.  When the tunnel egress receives a packet that is larger than 1500
       bytes, it encapsulates the packet and sends it to the egress
       without fragmentation.  If the packet is lost in the network due
       to a size restriction, the ingress may or may not reeceive a PTB
       message which it can then forward to the original soruce.
       Whether or not a PTB message is received, however, it is the
       responsibility of the original source to ensure that its packets
       larger than 1500 bytes are making it to the final destination by
       using a path probing technique such as specified by [RFC4821].

   3.  When the tunnel ingress receives a packet larger than (1280 -
       HLEN) but no larger than 1500 bytes, and it is not yet known
       whether packets of this size can reach the egress without
       fragmentation, the ingress encapsulates the packet and uses
       network layer fragmentation to fragment it into two pieces that
       are each signifiicantly smaller than (1280 - HLEN) bytes.  At the
       same time, the tunnel ingress sends an unfragmented 1500 byte
       probe packet toward the egress (subject to rate limiting) which
       will appear as (1500 + HLEN) bytes on the wire.  If the egress
       receives the probe, it informs the ingress that the probe
       succeeded.  If the probe succeeds, the ingress can suspend the
       fragmentation process and send packets between (1280-HLEN) and
       1500 bytes without using fragmentation.  This probing process
       exactly parallels [RFC4821].

   In this method, the tunnel egress must configure a slightly larger
   MRU than the minMRU specified for IPv6 in order to accommodate the
   HLEN bytes of tunnel encapsulation during reassembly. 2KB is
   recommended as the minMRU for this reason.

   These procedures give way to the ability for the tunnel ingress to
   configure an unlimited MTU (theoretical limit is 2^16 bytes for IPv4
   and 2^32 bytes for IPv6).  They will therefore naturally lead to the
   Internet migrating to larger packet sizes with no dependence on
   traditional path MTU discovery.  Operators will also soon discover
   that configuring larger MTUs on links between routers (e.g., 2KB or
   larger) will dampen the fragmentation and reassembly requirements
   until fragmentation and reassembly usage is gradually tuned out of
   the network.

   These procedures are not supported by the existing IPv6 fragmentation
   procedures, however they are exactly those specified in the
   Subnetwork Encapsulation and Adaptation Layer (SEAL)
   [I-D.templin-intarea-seal].  Widespread adoption of SEAL will
   therefore naturally lead to an Internet which no longer places MTU
   restrictions on tunnels and therefore supports natural migration to
   unbounded packet sizes.

---