Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard

"Joel M. Halpern" <jmh@joelhalpern.com> Mon, 13 January 2014 15:51 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B6E181AE115; Mon, 13 Jan 2014 07:51:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D5LWw16SU__M; Mon, 13 Jan 2014 07:51:58 -0800 (PST)
Received: from mailc2.tigertech.net (mailc2.tigertech.net [208.80.4.156]) by ietfa.amsl.com (Postfix) with ESMTP id 796A11AE098; Mon, 13 Jan 2014 07:51:58 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailc2.tigertech.net (Postfix) with ESMTP id C9E631C06303; Mon, 13 Jan 2014 07:51:47 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at c2.tigertech.net
Received: from Joels-MacBook-Pro.local (pool-70-106-135-128.clppva.east.verizon.net [70.106.135.128]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailc2.tigertech.net (Postfix) with ESMTPSA id 6F31B1C06304; Mon, 13 Jan 2014 07:51:46 -0800 (PST)
Message-ID: <52D40B91.8040101@joelhalpern.com>
Date: Mon, 13 Jan 2014 10:51:45 -0500
From: "Joel M. Halpern" <jmh@joelhalpern.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:24.0) Gecko/20100101 Thunderbird/24.1.1
MIME-Version: 1.0
To: "Eggert, Lars" <lars@netapp.com>, Xuxiaohu <xuxiaohu@huawei.com>
References: <20140102151419.4692.48031.idtracker@ietfa.amsl.com> <5933BB7D-2D2D-4145-A0B2-E92C8DA25844@netapp.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE08242A8E@NKGEML512-MBS.china.huawei.com> <43B89809-F517-4BE2-BE1B-748A4B78FC7F@netapp.com> <52D01383.2080509@joelhalpern.com> <8DCFAFEE-2B06-4334-A5D7-7698D8D3081A@netapp.com> <CAPv4CP-iwoHEiV=xtNAd7qT4r8OYvfE1ZjnKE=wWY5VVcQ3x8w@mail.gmail.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0824427A@NKGEML512-MBS.china.huawei.com> <A1F82D9D-F9D0-46C1-B666-0C13DB79A845@netapp.com>
In-Reply-To: <A1F82D9D-F9D0-46C1-B666-0C13DB79A845@netapp.com>
Content-Type: text/plain; charset="GB2312"
Content-Transfer-Encoding: 7bit
Cc: "mpls@ietf.org" <mpls@ietf.org>, Scott Brim <scott.brim@gmail.com>, IETF <ietf@ietf.org>
Subject: Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Jan 2014 15:51:59 -0000

Lars, are you really asking that the document say:
1) That the UDP encapsulation of MPLS can only be used when the devices
performing the encapsulation and decapsulation know what protocol (above
IP, if IP is being carried; above Ethernet and IP if the frame is
Ethernet carrying IP) is being used
2) That those devices need to engage in a congestion control protocol if
the carried packets are not TCP, SCTP, or DCCP?

Those both look like excessive and difficult requirements.  Which is
fine if our goal is to pretend we are telling folks not to use UDP
encapsulation of MPLS.  (I had not thought that was our goal.)

In practice, I simply do not see how anyone implementing this will pay
any attention to either requirement.

Yours,
Joel

On 1/13/14 3:50 AM, Eggert, Lars wrote:
> Hi,
> 
> On 2014-1-13, at 4:40, Xuxiaohu <xuxiaohu@huawei.com> wrote:
>>> I don't think it's right to try to solve this in MPLS, because
>>> MPLS is not a forwarding protocol - it's a connectivity
>>> protocol.
> 
> right, MPLS is the wrong place to address is. The UDP encaps/decaps
> function needs to have this functionality.
> 
>>> In any use of UDP, congestion control is either left to something
>>> above UDP or ignored (left to queue management).
> 
> There are several cases, see Section 3.1.3 of RFC5405. MPLS-over-UDP
> can fall into any of the three cases, depending on what traffic is
> inside the LSP being encapsulated.
> 
> You'll notice that RFC5405 for the first case - encapsulation of
> IP-based congestion controlled "normal" Internet traffic - even says
> that the tunnel SHOULD NOT employ any congestion control scheme of
> its own. Having layered control loops fighting is not productive.
> 
> The issue with MPLS-in-UDP (and GRE-in-UDP, and any other encaps
> scheme that can carry non-IP traffic) are with cases two and three.
> When the workload that is being encapsulated isn't known to be
> congestion controlled by its endpoints, it is the obligation of the
> tunnel to detect congestion and react to it by reducing the traffic
> volume. Because for the rest of the network, that tunnel is the UDP
> sender, and we have IETF consensus that we don't want UDP senders
> that don't react to congestion on the net. (That's one of the main
> reasons for the existence of the RMCAT WG - we don't want
> non-congestion-controlled RTP media traffic on the net.)
> 
> The key difference between putting MPLS e.g. into IP compared to
> putting it into UDP is that once it's in UDP, it can go pretty much
> anywhere on the net, because UDP traverses NATs and firewalls much
> more easily than IP traffic with a rare protocol number does.
> 
>>> Similarly, you want the client of MPLS to be responsible for 
>>> managing its traffic. MPLS gives you paths, it doesn't push
>>> packets over them.
> 
> Right. However, once you slap a UDP header on a packet during
> encapsulation, you now subjected yourself to the rules for Internet
> UDP senders. Those are documented in RFC5405, and require the tunnel
> to implement some sort of congestion detection and control. I'd
> personally consider a circuit breaker mechanism sufficient, like RTP
> and I think PWE are using.
> 
>> Fully agree. The congestion control should be performed either by
>> the UDP tunnel itself or the client of MPLS. In the former case,
>> it'd better to specify the practical congestion control mechanisms
>> (if there were any) in a generic draft (e.g., RFC5405bis) and then
>> any use of the UDP tunnel could refer to that generic draft with
>> regard to congestion control.
> 
> The general concept of a circuit breaker is easy enough that it
> doesn't really need to be written down. And it wouldn't be possible
> to describe it in a generic fashion, because congestion detection is
> typically specific to the protocol being encapsulated (e.g., RTP uses
> RTCP feedback to derive loss information, etc.) And the reaction to
> congestion is also dependent on the protocol being encapsulated (does
> it support multiple rates or only on/off, what timescales are OK for
> reaction, etc.)
> 
>> In the latter case, if the client of MPLS is TCP-friendly, that is
>> great. Otherwise (e.g., circuit emulation service), it shouldn't be
>> deployed on the Internet at all, just as has been pointed out in
>> RFC3985, therefore there is no need for any specific congestion
>> control mechanism on the client.
>> 
>> "... In essence, this requirement states that it is not acceptable
>> to deploy an application (using PWE3 or any other transport
>> protocol) on the best-effort Internet, which consumes bandwidth
>> arbitrarily and does not compete fairly with TCP within an order of
>> magnitude." (quoted from Section 6.5 of RFC3985)
>> 
>> The above choice seems no conflict with the following congestion
>> control guidelines as quoted from Section 3.1.1 of RFC5405, as
>> those non-TCP-friendly traffic would be transported over a
>> provisioned path, rather than on the Internet.
>> 
>> "...Finally, some bulk transfer applications may choose not to
>> implement any congestion control mechanism and instead rely on
>> transmitting across reserved path capacity.  This might be an
>> acceptable choice for a subset of restricted networking
>> environments, but is by no means a safe practice for operation in
>> the Internet."
> 
> How is that in conflict? Both quotes say that Internet traffic needs
> congestion control, which is a restatement of RFC2914.
> 
> Lars
>