Re: [mpls] Entropy size in draft-decraene-mpls-slid-encoded-entropy-label-id

bruno.decraene@orange.com Fri, 01 April 2022 16:33 UTC

Return-Path: <bruno.decraene@orange.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 893B23A0F02 for <mpls@ietfa.amsl.com>; Fri, 1 Apr 2022 09:33:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.109
X-Spam-Level:
X-Spam-Status: No, score=-2.109 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qNnK-Quh8ksq for <mpls@ietfa.amsl.com>; Fri, 1 Apr 2022 09:33:33 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.70.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E7ECE3A10E7 for <mpls@ietf.org>; Fri, 1 Apr 2022 09:32:56 -0700 (PDT)
Received: from opfednr03.francetelecom.fr (unknown [xx.xx.xx.67]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfednr24.francetelecom.fr (ESMTP service) with ESMTPS id 4KVQh65pt0z2027; Fri, 1 Apr 2022 18:32:54 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1648830774; bh=oqBncMgQd7SUwn3zr/HuTL9+JmKXX0rj78gJZjAQDq0=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=o8YEEkAL70+HNvYWVbxF9tZQDLdTYnAZV7luMaAp7oRH3ncqjz1jBGbPhH45/koIZ rwxdpf3zgEXWLT6JtbziQYdKkw7Eot07nG2fpTt+HoFzuORwKkewgeFPvGh0eOP0y+ 9TftkWGVU7FZmDAR5H8hH1KlaHoykv6WVoLfgN7lb/fp/v42ExbBrF4pD1VNqSNuLo V184YlLV2nbvrAcLkbEipq7U5tW8tFckkKT4FQaiVn8vEnyH1CSHPWBex9de/eSjsO 6TVjpf2IZ16mMAe7TsWr7fihBnfOucxj1XpM5bjf9hkx65u6yqPZ0tAJWf76PlLkNj C1E6ez2rYkhlQ==
From: bruno.decraene@orange.com
To: "Joel M. Halpern" <jmh@joelhalpern.com>
CC: "mpls@ietf.org" <mpls@ietf.org>
Thread-Topic: [mpls] Entropy size in draft-decraene-mpls-slid-encoded-entropy-label-id
Thread-Index: AQHYRRm0zZe5rqHkC0+RWO5qkGr+Z6zbPIwg
Date: Fri, 01 Apr 2022 16:32:54 +0000
Message-ID: <24246_1648830774_62472936_24246_25_1_baf0408415464ab89310ef08c6052d34@orange.com>
References: <8b20b564-6591-91f4-2d4f-d2619a0e0921@joelhalpern.com>
In-Reply-To: <8b20b564-6591-91f4-2d4f-d2619a0e0921@joelhalpern.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Enabled=true; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_SetDate=2022-04-01T16:32:52Z; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Method=Standard; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Name=Orange_restricted_external.2; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_ActionId=34579216-ad79-44f8-b3c7-d0bf19a9d666; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_ContentBits=2
x-originating-ip: [10.115.27.53]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/mpls/5pgURUcKMNWU99wfjpt1UKBGQxQ>
Subject: Re: [mpls] Entropy size in draft-decraene-mpls-slid-encoded-entropy-label-id
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2022 16:33:43 -0000

Joel,

Please see inline

> From: mpls <mpls-bounces@ietf.org> On Behalf Of Joel M. Halpern
> 
> I am trying to understand if the opposing forces for field size in this
> draft mesh weell or badly.

Thanks for your technical comment and analysis.
 
> As I read the draft, the number of bits being used for what the draft
> calls the slice ID has to be sufficient to represent the number of
> distinct slice-like-things (I think these are roughly what Bestbaer
> calls slice aggregates) that the network forwarding has to be aware of?

Yes.

> While that is a much smaller number than the number of external network
> slices, it still takes 8 or 10 bits on many networks?

I don't really have data on this. And so far, whoever I asked the question to, also had little clue about. Would you have data?
Personally, I would have expected that 100 of aggregate slides seems already plenty to me (both from a management aspect and from hardware capability standpoint on core interfaces (optimized for bandwidth and cost))
 
> Side note:  If it is actually intended to number the external network
> slice instances rather than IETF network slices or bestbar slice
> aggregates, then significantly more bits will be needed.

No, it's not. (i.e. you were correct)
 
> At the same time, we need enough bits left over for effective entropy
> operation within an identified slice-like collection. 

IMO, what we need is enough entropy across all flows (not flows within one slice) so that all ECMP are used roughly evenly.
So even assuming that all traffic belong to slices (which seems debatable to me, at the very least higher than mobile only (pre) aggregation), IMO both the slide ID and the entropy number are usable to hash on.

> While some of
> those will have only a few flows, some of them will have a lot.
> Still,we could hash down to a small field.  But...  this seems likely to
> reduce the efficacy of ECMP within the slice-like-collection.  I do not
> see any discussion of this in the draft.  Has it been analysed for
> sufficiency?

I agree that splitting the 20 bits of entropy labels in two fields is slightly less efficient than a perfect hash. However, EL is 20 bits not because we needed 20 bits, but because we had 20 bits. Also, RFC6790 does not discuss, not to mention specify the " load-balancing function" not how the entropy value is computed. All it says is " apply the load-balancing function to these input fields and let LB be the output. [...] Use LB to generate the entropy label EL.". IMO draft-decraene-mpls-slid-encoded-entropy-label-id is fully compliant with this.
Also, I think that I've been told that some implementations don't fully use the 20 fields; while I'm pretty sure that they would call themselves to be compliant with RFC6790.

Finally, I don't recall that RFC 6790 discussed what was the right number of bits. Hence it seems difficult for subsequent draft to update the analysis.


Yours,
--Bruno
 
> Yours,
> Joel
> 
> _______________________________________________
> mpls mailing list
> mpls@ietf.org
> https://www.ietf.org/mailman/listinfo/mpls

Orange Restricted

_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.