Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard

"Eggert, Lars" <lars@netapp.com> Thu, 23 January 2014 10:37 UTC

Return-Path: <lars@netapp.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BBD0F1A03A9; Thu, 23 Jan 2014 02:37:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.437
X-Spam-Level:
X-Spam-Status: No, score=-2.437 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-0.535, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cPsch87rsW8E; Thu, 23 Jan 2014 02:37:07 -0800 (PST)
Received: from mx11.netapp.com (mx11.netapp.com [216.240.18.76]) by ietfa.amsl.com (Postfix) with ESMTP id D803D1A03D5; Thu, 23 Jan 2014 02:37:07 -0800 (PST)
X-IronPort-AV: E=Sophos; i="4.95,705,1384329600"; d="asc'?scan'208"; a="97660183"
Received: from vmwexceht02-prd.hq.netapp.com ([10.106.76.240]) by mx11-out.netapp.com with ESMTP; 23 Jan 2014 02:37:07 -0800
Received: from SACEXCMBX06-PRD.hq.netapp.com ([169.254.9.60]) by vmwexceht02-prd.hq.netapp.com ([10.106.76.240]) with mapi id 14.03.0123.003; Thu, 23 Jan 2014 02:37:07 -0800
From: "Eggert, Lars" <lars@netapp.com>
To: Noel Chiappa <jnc@mercury.lcs.mit.edu>
Thread-Topic: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard
Thread-Index: AQHPF6BSFyKjVtdEy02x6qUpK40JLJqSpPgA
Date: Thu, 23 Jan 2014 10:37:06 +0000
Message-ID: <0DCB269E-D53D-4BF5-8D1A-42445ABBBB1E@netapp.com>
References: <20140122183237.0FE0918C144@mercury.lcs.mit.edu>
In-Reply-To: <20140122183237.0FE0918C144@mercury.lcs.mit.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [10.106.53.51]
Content-Type: multipart/signed; boundary="Apple-Mail=_D267C342-22A5-4375-B74A-7185400A74A7"; protocol="application/pgp-signature"; micalg="pgp-sha1"
MIME-Version: 1.0
Cc: "mpls@ietf.org" <mpls@ietf.org>, IETF discussion list <ietf@ietf.org>
Subject: Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Jan 2014 10:37:11 -0000

Hi,

On 2014-1-22, at 19:32, Noel Chiappa <jnc@mercury.lcs.mit.edu> wrote:
>> From: "Eggert, Lars" <lars@netapp.com>
> 
>> Depends on the reach of that encapsulation. .. If it traversed such
>> middleboxes by default, as UDP does, it has the same issues.
> 
> Exactly. The problem is not specific to UDP. So why is the discussion
> (seemingly) trying to solve it in a UDP-specific way?

you conveniently cut the part of my original message where I tried to explain that the difference is in *reach* of the traffic.

> I repeat: even if people were _not_ using UDP encapsulations, the exact same
> problem (of potential congestion caused by non-congestion-compliant
> applications) would still exist. Switching to a different encapsulation method
> is not going to get rid of _any_ potential congestion - not one packet's
> worth.

The severity of the problem depends on the reach of the traffic. Encapsulating something inside some "obscure" IP protocol number limits the reach. Encapsulating in UDP does not.

> So can we just drop all mention of UDP, since it's irrelevant to the _real_
> problem?

But it isn't.

>>> But saying that _intermediate forwarding nodes_ have to detect
>>> down-stream congestion, and respond, represents a fundamental change
>>> to the Internet's architecture for congestion control.
> 
>> And here's the fallacy: UDP encapsulators are forwarding nodes *only*
>> from the viewpoint of the final endpoints. From the viewpoint of the
>> rest of the Internet, they are traffic *sources*, not *forwarders*.
> 
> I present two boxes. In one, a packet comes in, and after some manipulation of
> headers, the packet goes out. In the other, a packet comes in, and after some
> header changes, the packet goes out. You're trying to tell me that,
> architecturally, one _is_ an intermediate forwarding node (which doesn't have
> to detect downsteam congestion, and respond), and the other is not (and so
> does have to)?

You have oversimplified the scenario. 

In one case, an L2 packet comes in, and goes out as an L2 packet that is limited in reach to the L2 topology, or as an L3 packet with an obscure IP protocol number that will make it die at the next middlebox (in the case of MPLS in IP).

In the other case, an L2 packet comes in and it comes out as an L4 UDP packet that can now go anywhere on the Internet.

Surely you see the difference?

> And I repeat: mandating that nodes which are forwarding nodes have to detect,
> and respond to, downsteam congestion caused by non-congestion-compliant
> traffic flowing _through_ them is a fundamental change to the Internet's
> existing framework for congestion control.

Since we're repeating ourselves, I'll again say that encapsulators are not forwarding nodes from the viewpoint of the network they tunnel over. They are traffic sources.

> Not that I'm opposed to such a change (it might make sense, I'd have to go
> away and think about it), but if we're going to make such an architectural
> change, i) we should do so explicitly, and ii) such a requirement should fall
> on _all_ packet forwarding nodes - including regular routers, since they could
> equally possibly be given non-congestion-compliant traffic to forward.

Lars