[LOOPS] LOOPS Comments

Martin Duke <martin.h.duke@gmail.com> Wed, 13 May 2020 16:01 UTC

Return-Path: <martin.h.duke@gmail.com>
X-Original-To: loops@ietfa.amsl.com
Delivered-To: loops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E644A3A0FF6 for <loops@ietfa.amsl.com>; Wed, 13 May 2020 09:01:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1Z-oRtTRtK-W for <loops@ietfa.amsl.com>; Wed, 13 May 2020 09:01:56 -0700 (PDT)
Received: from mail-io1-xd2a.google.com (mail-io1-xd2a.google.com [IPv6:2607:f8b0:4864:20::d2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 293A43A1001 for <loops@ietf.org>; Wed, 13 May 2020 09:01:56 -0700 (PDT)
Received: by mail-io1-xd2a.google.com with SMTP id u11so18613359iow.4 for <loops@ietf.org>; Wed, 13 May 2020 09:01:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=K89O73+hghX3Qo413IqqfArvsxSrTAOAgWMMW5PiSXk=; b=GTuB1lIEvvnvyuLgs43/iPX3uGlBU9LMkX7rfnWbA6dqtU4pDFdPn6b9Rw+g/qZ/i6 khGxvK6BXdhqaaYRKnpUwXcf/zaMsGuroecUloOnuJOFa5MydTBvEKLtlBSpehpvimh5 KxMsZsQMGRoGxTWJU+dswhqxRWTXbsJ5cV4K5s076CGTHVYl+Y5ehlDD/zO2mS4bo9Dd BprHyToDait86SUNPkScdLp4mqZuDKm9NGLnce2kgebEGxaR3Q/cF8MZm/9eNqgHBzaP 5JNKnaZlBRmEuNiye+kH00ovzORjtJ04pSD5MRrtgvjzG4PlQ3dKUS4qZWkVkSWSLfMV /gZw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=K89O73+hghX3Qo413IqqfArvsxSrTAOAgWMMW5PiSXk=; b=i517Jwy1AtYiNwQDILTc0iYiJSlKLK9A1u3vj6WU+CjL6mSWgRKjDOa8vnpxOpOdfA n2IgxxvDGhCsIO+29rcijxSwCixPqUzH+mJLYE2fL5MzlZDBlXwaNRoeLzYP5GVIizz/ 1Vk44FtmBZnUhs10iI/6V9rhqW4zPCcpnGeKrkxSqVhH/scqMbY/fb6Z2ANZeLI6rn4s 2Ijx+8qMOgpGbi1AHDO81HBEzd4NA5QQqqxW4cnYRpQGroHQmnsMnE2RotDlZh7F7QH0 i80puuVUTJyXUWgyC5bUGBX7GwyGLWNLVKUGRRDoL8yhtMYsZJFXrSHkCsuG4e+TCaeD Bi5A==
X-Gm-Message-State: AGi0PuZ7iDr/ub69Yv+qfjZvVZVrRGp6DjHtO/w6FvEk0IWcyfbZ1B1K BX1cBlpHdlubCRGcwoJqV/VtR4pkxOEXq//ylt3eTbdy
X-Google-Smtp-Source: APiQypLNGm9d2lgNz91FuFhr5EcJIaHN6V4EbrPZBFzqnbE4otW0IXw2mxPonJsdfZm1FKj9vaqFQSuEU8T7t7trGNg=
X-Received: by 2002:a02:5249:: with SMTP id d70mr205025jab.121.1589385714601; Wed, 13 May 2020 09:01:54 -0700 (PDT)
MIME-Version: 1.0
From: Martin Duke <martin.h.duke@gmail.com>
Date: Wed, 13 May 2020 09:01:43 -0700
Message-ID: <CAM4esxTU68mA9TcAysBjOkxOaERcuhgdxyJs09JJt5Qx9nThUw@mail.gmail.com>
To: loops@ietf.org
Content-Type: multipart/alternative; boundary="000000000000ee136005a589b21f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/loops/xvVx_2VNK_Rq9Ze6GKvumu8k1m0>
Subject: [LOOPS] LOOPS Comments
X-BeenThere: loops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Local Optimizations on Path Segments <loops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/loops>, <mailto:loops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/loops/>
List-Post: <mailto:loops@ietf.org>
List-Help: <mailto:loops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/loops>, <mailto:loops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 May 2020 16:01:58 -0000

High-level comments about LOOPS:

This work will be valuable in several use cases, in particular encrypted
transports (or IPSec) running over links with RF losses. I think it would
benefit from a more detailed consideration of what problem(s) you are
trying to solve. A generalized solution will require lots of additional
mitigation mechanisms, which would scale up the work significantly.

The gen-info and problem-opportunities drafts mention a lot of these
concerns, and imply several different mechanisms.

For example:
- Detecting congestion losses vs. RF losses: this is hard, but certain
network architectures can eliminate the problem by, e.g. rate limiting at
the ingress point.
- ECT vs non-ECT traffic: a general solution will have to provide different
mechanisms for both; if it is sufficient to initially support one or the
other, that may be half as much algorithm to design.
- Relatedly, initially requiring the entire LOOPS path to support ECN
marking would reduce the problem space.
- Varying transport behaviors: different flows will have different e2e
latencies, reordering thresholds, and reactions to delay variation and
delay spikes. These will be hard to detect! It may be unavoidable to do a
lot of work here, but limiting the cases where LOOPS can be applied (e.g.
the added delay is a small fraction of the LOOPS segment min delay, which
IIUC would require FEC) would simplify as much as possible. Alternatively,
if there is a means for endpoints to explicitly request the service, then
one can assume that they have configured themselves correctly to leverage
LOOPS.
- Identifying one, or a handful, of tunneling protocols with a good
deployment story before chartering will reduce the risk there is not a
critical mass to do any of them.

One possible minimal increment of work would be: FEC-based LOOPS with a
Geneve encapsulation to be applied only to ECT-marked traffic over a
segment with ECN-enabled routers and a rate limiter at ingress.

I emphasize that the above is only example of a use case that is
constrained enough to present a small group of problems to solve. I'd
encourage the group to zoom in on a similarly constrained use case that
meets demand in the real internet.

A similarly constrained used case would allow you to put in the basic
protocol elements and then recharter to tackle more difficult problems.

Martin