Re: A draft on the encapsulation of end-to-end IETF network slice information in IPv6 data plane

Tom Herbert <tom@herbertland.com> Wed, 26 May 2021 16:13 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E88363A0819 for <ipv6@ietfa.amsl.com>; Wed, 26 May 2021 09:13:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v0l3zoz6Ukw7 for <ipv6@ietfa.amsl.com>; Wed, 26 May 2021 09:13:02 -0700 (PDT)
Received: from mail-ed1-x52d.google.com (mail-ed1-x52d.google.com [IPv6:2a00:1450:4864:20::52d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B632E3A0813 for <6man@ietf.org>; Wed, 26 May 2021 09:13:01 -0700 (PDT)
Received: by mail-ed1-x52d.google.com with SMTP id y7so2233701eda.2 for <6man@ietf.org>; Wed, 26 May 2021 09:13:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=m/g0WvhjgBjVT7li2XfIiaVgoeQvMi9DgkByGeMt/s4=; b=Ipv9NMyQOBE3XiqH5ARXoGJox0L5j0y+wZST7g/2r+yGs5z+KilMbxMwgOZCJAfJGA F9vAE+RhXhps4iWVTrbr0lMvpHSfc/u9tm7ohDqBSlQJN7fG3gjf2e10PmEmymnoqYy6 aDTwkBRfvGwkJLqbExxXs9z8c6+T70zEuXm3LNsL/9jXL6VSmUGAmj5dFy/5ds3Khom5 Ej24v/gBE/6is2Qjvqi0yCJyMBcVXIky6GYdzfCHEvUO4FKV4zY4A9OP+SfROj1CQwl3 H84kKhGJbx7ntx0AgccH/8jo8pGKJD4szIc91RuLKpQpq3pED2rBTwsnBq6MugFvsEkB eXLA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=m/g0WvhjgBjVT7li2XfIiaVgoeQvMi9DgkByGeMt/s4=; b=I5/euyqcZGoqHgK5u1BHC8ZohFLwnsDYRN2lYVssXW+HGYqM2l3vVU2Fv67Li781Zi SZ1HKD38dIfJED9Shp7xuBwZ8uOS/Rw9HdJDKrR+wPvSzTp1UxMxl0icW5lxTQ8AB4nn ocTuq13nyEaEeZmPzy1VnkX4Z+DhQ5Xga7Ky1uhxQGb3J8pBIOkbHAXfTulFeLwwk64g jWlvVppy6G7uGmP5PMpbh92FC6v4Da2TCi7nBekjIgean3dYW9wwMo5r2LQxzjbf5te2 7/SwZljfa6T0Hp3qcb3v+1VVLWzypwkcNScg5iMjuMI1KihwITKwgrsu1UG3QQqSusKs c+6w==
X-Gm-Message-State: AOAM532zhN07r7rxQSSTmUQn8t3Q962JTOazQ9Tv1Drpfa5mRxx9Zg22 DOyKl2SuyXM9XJls9/No2/5uUqLjacwX24NNyAfZBw==
X-Google-Smtp-Source: ABdhPJyW0x/E/Cu2WoGL+B0U0ix/u8zJsHQPgVbpkghH7yoB87JSV9fdM8Dobg/nssPqdhlaQPXQFaxfjRFsyB/XvMc=
X-Received: by 2002:a05:6402:152:: with SMTP id s18mr37509226edu.221.1622045578507; Wed, 26 May 2021 09:12:58 -0700 (PDT)
MIME-Version: 1.0
References: <e4844158fd844388bba27293e91b2265@huawei.com> <DBB92575-BEF4-4EE2-81E7-D62755940F52@employees.org> <a661bbb138704ff1b5130ee4922f3318@huawei.com> <CALx6S34Wh1kAFiTSLE7Wris8+F8ZM2hy2UFxoUrotDuao2K+jg@mail.gmail.com> <2275d6ee052e4173b7a9ba2474567321@huawei.com>
In-Reply-To: <2275d6ee052e4173b7a9ba2474567321@huawei.com>
From: Tom Herbert <tom@herbertland.com>
Date: Wed, 26 May 2021 09:12:47 -0700
Message-ID: <CALx6S34ucNtOojs01aJGNDtB9eWHwPTEW9Foq0jhGkQpeZG3sQ@mail.gmail.com>
Subject: Re: A draft on the encapsulation of end-to-end IETF network slice information in IPv6 data plane
To: "Dongjie (Jimmy)" <jie.dong@huawei.com>
Cc: Ole Troan <otroan@employees.org>, 6MAN <6man@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/ysHC5bLoEqzbHIYQg52u8CWGzXY>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 May 2021 16:13:07 -0000

On Wed, May 26, 2021 at 8:20 AM Dongjie (Jimmy) <jie.dong@huawei.com> wrote:
>
> Hi Tom,
>
>
>
> Thanks for your comment. Please see inline:
>
>
>
> From: Tom Herbert [mailto:tom@herbertland.com]
> Sent: Monday, May 24, 2021 11:34 PM
> To: Dongjie (Jimmy) <jie.dong@huawei.com>
> Cc: Ole Troan <otroan@employees.org>; 6MAN <6man@ietf.org>
> Subject: Re: A draft on the encapsulation of end-to-end IETF network slice information in IPv6 data plane
>
>
>
>
>
> On Mon, May 24, 2021, 4:26 AM Dongjie (Jimmy) <jie.dong@huawei.com> wrote:
>
> Hi Ole,
>
> Thanks for your comment.
>
> It is expected that the identifiers defined in this draft will be parsed or processed by some network nodes along the path, rather than only the endpoints, thus maybe it is more convenient to carry them in the IPv6 header. This could also reduce the overhead of introducing other tunnel layers to the IPv6 network.
>
>
>
> A HBH option to provide acillary information for IPIP encapsulation makes a lot of sense to me, however this proposed format wouldn't be extensible to carry other type of information that might be of interest beyond a four byte ID.
>
>
>
> [Jie] For different types of information to be carried in HBH, one approach is to define them as different HBH options.
>
>
>
> A way to make the format extensible could simply be to add a sixteen bit flags that can indicate flag-fields like in GRE or GUE. This allow other optional fields in option. Since HBH EH needs to be eight bytes anyway, there's no additional overhead if this is only HBH option. Also, this is a way to pack data into one option as opposed to using separate options (so less overhead and limiting number of options in HBH EH is a good thing).
>
>
>
> [Jie] The approach you suggested is to introduce optional fields in one HBH option, and use flags to indicate their existence. This could reduce the number of options and may have a better packing efficiency, while how to introduce new fields based on this approach may need some further consideration. With separate options, the processing behavior and the length of each option can be determined from the option type and option length fields. Can similar function be provided with the one packed option approach?

Hi Jie,

Yes, in flag-fields if a given flag is set then that indicates the
presence of a field of specific length. The optional data is well
ordered and the length of each possible option is fixed (multi-bit
flags can be used to allow a few different lengths for select
options). The big advantage of flag-fields over a traditional TLV list
is that flag-fields have a strict order of fixed length fields whereas
TLVs have combinatorial ordering and variable length fields-- so
flag-fields are more amenable to hardware. For instance the 16 bit
flags could be run through a TCAM to parse all the present options in
O(1) time; TLVs require serial processing to parse so are at least
O(n) parsing and also have overhead of type and length fields.

If the supposition of draft-hinden-6man-hbh-processing-00 is correct
in that restricting the HBH options to one option will promote support
of HBH options in hardware implementation, then using flag-fields in
that one option to encode different options in a hardware friendly
manner would be consistent with the goals. In the case of HBH options,
most that are defined are going to be ignored if unrecognized, so we
could carry that to sub-options. Since flag-fields are well ordered,
new options are added as contiguous flags to existing options. An
implementation would support N flags (e.g. the first N defined
options) and any flags beyond the first N would be ignored.

Tom

>
>
>
> Best regards,
>
> Jie
>
>
>
> Tom
>
>
>
>
>
> Best regards,
> Jie
>
> > -----Original Message-----
> > From: otroan@employees.org [mailto:otroan@employees.org]
> > Sent: Friday, May 21, 2021 4:58 PM
> > To: Dongjie (Jimmy) <jie.dong@huawei.com>
> > Cc: 6man@ietf.org
> > Subject: Re: A draft on the encapsulation of end-to-end IETF network slice
> > information in IPv6 data plane
> >
> > Hi Jie,
> >
> > > Recently we published a draft on the encapsulation of end-to-end IETF
> > network slice information in IPv6 data plane:
> > >
> > >
> > https://datatracker.ietf.org/doc/html/draft-li-6man-e2e-ietf-network-slicing
> > >
> > > This document defines the mechanism of encapsulating the end-to-end
> > network slice related identifiers in IPv6 packet, which is aligned with the
> > framework as defined in draft-li-teas-e2e-ietf-network-slicing.
> >
> > What are the benefits of using an IPv6 extension header to carry the meta
> > data?
> > In contrast to embedding it in a tunnel header (like what GRE, Geneve, etc,
> > etc does).
> >
> > Best regards,
> > Ole
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------