Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard

Alexander Vainshtein <Alexander.Vainshtein@ecitele.com> Tue, 14 January 2014 16:05 UTC

Return-Path: <Alexander.Vainshtein@ecitele.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A07F1AE0FC; Tue, 14 Jan 2014 08:05:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.602
X-Spam-Level:
X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AgibuoPPVc-q; Tue, 14 Jan 2014 08:05:37 -0800 (PST)
Received: from emea01-am1-obe.outbound.protection.outlook.com (mail-am1lp0012.outbound.protection.outlook.com [213.199.154.12]) by ietfa.amsl.com (Postfix) with ESMTP id 3BAB61AE0DC; Tue, 14 Jan 2014 08:05:35 -0800 (PST)
Received: from AM3PR03MB532.eurprd03.prod.outlook.com (10.242.109.156) by AM3PR03MB531.eurprd03.prod.outlook.com (10.242.109.155) with Microsoft SMTP Server (TLS) id 15.0.851.11; Tue, 14 Jan 2014 16:05:22 +0000
Received: from AM3PR03MB532.eurprd03.prod.outlook.com ([10.242.109.156]) by AM3PR03MB532.eurprd03.prod.outlook.com ([10.242.109.156]) with mapi id 15.00.0851.011; Tue, 14 Jan 2014 16:05:22 +0000
From: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Thread-Topic: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard
Thread-Index: AQHPEBE8NB1HxYhr0E+Bh7qVSMaw6pqCWMcAgAB1zoCAADdMAIABCbaAgAAklwCAAAtugIAAB9QAgAAQr4CAAAEJgIAAAZQAgAAFVgCAAANwMA==
Date: Tue, 14 Jan 2014 16:05:21 +0000
Message-ID: <5b1067567abb40dca321c071a751d552@AM3PR03MB532.eurprd03.prod.outlook.com>
References: <20140102151419.4692.48031.idtracker@ietfa.amsl.com> <5933BB7D-2D2D-4145-A0B2-E92C8DA25844@netapp.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE08242A8E@NKGEML512-MBS.china.huawei.com> <43B89809-F517-4BE2-BE1B-748A4B78FC7F@netapp.com> <52D01383.2080509@joelhalpern.com> <8DCFAFEE-2B06-4334-A5D7-7698D8D3081A@netapp.com> <CAPv4CP-iwoHEiV=xtNAd7qT4r8OYvfE1ZjnKE=wWY5VVcQ3x8w@mail.gmail.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0824427A@NKGEML512-MBS.china.huawei.com> <A1F82D9D-F9D0-46C1-B666-0C13DB79A845@netapp.com> <52D40B91.8040101@joelhalpern.com> <CAPv4CP9R-6Dv9O_H8Ox_-uLWMSzqpx7Gn97TF8jceFkVKPLWTw@mail.gmail.com> <52D518D9.7010703@cisco.com> <CAPv4CP-eNJuOKv4vWxGkiUPUTMkYyqY4cbTmj8M4sn+jXzmCkw@mail.gmail.com> <CAPv4CP-DnNdSoVEFTg9N53xP=yOd6pNe97WxmXJeGHBPKC2h6w@mail.gmail.com> <52D547B2.1060302@cisco.com> <DB6CF60F-FFBA-47DA-9FD6-7288CCB260A6@netapp.com> <52D5568F.2070600@joelhalpern.com> <3D9BA53E-F0F7-4B8B-8433-4DFE6852AF87@netapp.com> <52D55C5C.80001@joelhalpern.com>
In-Reply-To: <52D55C5C.80001@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [147.234.56.21]
x-forefront-prvs: 0091C8F1EB
x-forefront-antispam-report: SFV:NSPM; SFS:(10009001)(689001)(679001)(779001)(377424004)(13464003)(51704005)(189002)(199002)(479174003)(377454003)(24454002)(252514010)(54356001)(53806001)(79102001)(49866001)(76796001)(54316002)(76786001)(50986001)(46102001)(63696002)(47976001)(65816001)(51856001)(83322001)(80976001)(19580395003)(47736001)(19580405001)(33646001)(93136001)(81816001)(56776001)(59766001)(92566001)(77982001)(76482001)(76576001)(74876001)(87936001)(31966008)(81686001)(4396001)(80022001)(81342001)(87266001)(85306002)(66066001)(69226001)(74662001)(2656002)(56816005)(15975445006)(83072002)(81542001)(90146001)(47446002)(74706001)(74366001)(74502001)(74316001)(85852003)(24736002); DIR:OUT; SFP:1101; SCL:1; SRVR:AM3PR03MB531; H:AM3PR03MB532.eurprd03.prod.outlook.com; CLIP:147.234.56.21; FPR:; RD:InfoNoRecords; MX:1; A:1; LANG:en;
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: ecitele.com
Cc: "mpls@ietf.org" <mpls@ietf.org>, Scott Brim <scott.brim@gmail.com>, IETF discussion list <ietf@ietf.org>, "Eggert, Lars" <lars@netapp.com>
Subject: Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Jan 2014 16:05:39 -0000

Joel,
You have said (and I fully agree with you) that the UDP encapsulator does not even know (in some cases) what the service is for.
If this is the case, how will the UDP encapsulator assign entropy source UDP ports to specific MPLS packets it encapsulates without breaking reordering-sensitive micro-flows within this service?

Regards,
       Sasha 
Email: Alexander.Vainshtein@ecitele.com
Mobile: 054-9266302


> -----Original Message-----
> From: mpls [mailto:mpls-bounces@ietf.org] On Behalf Of Joel M. Halpern
> Sent: Tuesday, January 14, 2014 5:49 PM
> To: Eggert, Lars
> Cc: mpls@ietf.org; Scott Brim; IETF discussion list
> Subject: Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating
> MPLS in UDP) to Proposed Standard
> 
> So a customer buys an Ethernet service from an operator.  And it is delivered
> via MPLS.  Possibly across some other operators (Internet as a
> Service.)
> If it is tunneled in IP, or GRE (with or without MPLS), then that is fine.
> But if I add a UDP header I must suddenly add congestion control at the point
> I add the UDP header?
> 
> I can understand (disagree with, but understand) Llyod's argument that the
> UDP header may reach a host, so the checksum might be an issue.  I think
> taht is dealt with by the fact that the host will drop packets with 0 UDP
> checksums.  But I understand the increased reach concern there.
> 
> For congestion control?  Adding an in-network control loop?  When the UDP
> encapsulator may not even know what the service is being used for?
> And so is probably more likely to apply an inner congestion control to a TCP
> stream running over IP over Ethernet over MPLS over UDP as to some
> unconstrained flow?
> 
> Yours,
> Joel
> 
> On 1/14/14 10:29 AM, Eggert, Lars wrote:
> > Hi,
> >
> > On 2014-1-14, at 16:23, Joel M. Halpern <jmh@joelhalpern.com> wrote:
> >> Isn't that basically the problem of the inner traffic sender, not the
> problem of the tunnel that is carrying the traffic?
> >
> > no, because the sender of the inner traffic may be blasting some L2 traffic,
> for an L2 where that is OK behavior. But that traffic is now being
> encapsulated inside UDP and can hence go anywhere on the net *without
> the sender being aware of this*.
> >
> >> Asking tunnel's to solve the problem of applications with undesirable
> behavior seems backwards.
> >
> > It is the *tunnel* that performs the encapsulation and allows that traffic to
> go places it couldn't before. And so it's the tunnel's responsibility to make
> sure that the traffic it injects into the Internet complies with the BCPs we
> have on congestion control.
> >
> > Lars
> >
> _______________________________________________
> mpls mailing list
> mpls@ietf.org
> https://www.ietf.org/mailman/listinfo/mpls