Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard

"Eggert, Lars" <lars@netapp.com> Mon, 13 January 2014 08:50 UTC

Return-Path: <lars@netapp.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8CF951ADF7A; Mon, 13 Jan 2014 00:50:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.44
X-Spam-Level:
X-Spam-Status: No, score=-2.44 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-0.538, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aGMaXgZLYPmw; Mon, 13 Jan 2014 00:50:18 -0800 (PST)
Received: from mx11.netapp.com (mx11.netapp.com [216.240.18.76]) by ietfa.amsl.com (Postfix) with ESMTP id F35CE1AE070; Mon, 13 Jan 2014 00:50:17 -0800 (PST)
X-IronPort-AV: E=Sophos; i="4.95,651,1384329600"; d="asc'?scan'208"; a="95683981"
Received: from vmwexceht01-prd.hq.netapp.com ([10.106.76.239]) by mx11-out.netapp.com with ESMTP; 13 Jan 2014 00:50:07 -0800
Received: from SACEXCMBX06-PRD.hq.netapp.com ([169.254.9.60]) by vmwexceht01-prd.hq.netapp.com ([10.106.76.239]) with mapi id 14.03.0123.003; Mon, 13 Jan 2014 00:50:07 -0800
From: "Eggert, Lars" <lars@netapp.com>
To: Xuxiaohu <xuxiaohu@huawei.com>
Thread-Topic: Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard
Thread-Index: AQHPB81hZzPPQlRcgk6ua2U45NfiYJp7LVMAgAK2KoCAAFQ2gIAAckuAgAAJQICAAAZIAIAD31WAgABWjoA=
Date: Mon, 13 Jan 2014 08:50:06 +0000
Message-ID: <A1F82D9D-F9D0-46C1-B666-0C13DB79A845@netapp.com>
References: <20140102151419.4692.48031.idtracker@ietfa.amsl.com> <5933BB7D-2D2D-4145-A0B2-E92C8DA25844@netapp.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE08242A8E@NKGEML512-MBS.china.huawei.com> <43B89809-F517-4BE2-BE1B-748A4B78FC7F@netapp.com> <52D01383.2080509@joelhalpern.com> <8DCFAFEE-2B06-4334-A5D7-7698D8D3081A@netapp.com> <CAPv4CP-iwoHEiV=xtNAd7qT4r8OYvfE1ZjnKE=wWY5VVcQ3x8w@mail.gmail.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0824427A@NKGEML512-MBS.china.huawei.com>
In-Reply-To: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0824427A@NKGEML512-MBS.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [10.106.53.51]
Content-Type: multipart/signed; boundary="Apple-Mail=_F966CFC8-CF7E-4540-8EA2-FE7CAF7DBF1D"; protocol="application/pgp-signature"; micalg="pgp-sha1"
MIME-Version: 1.0
Cc: "mpls@ietf.org" <mpls@ietf.org>, Scott Brim <scott.brim@gmail.com>, IETF <ietf@ietf.org>
Subject: Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Jan 2014 08:50:20 -0000

Hi,

On 2014-1-13, at 4:40, Xuxiaohu <xuxiaohu@huawei.com> wrote:
>> I don't think it's right to try to solve this in MPLS, because MPLS is not a
>> forwarding protocol - it's a connectivity protocol.

right, MPLS is the wrong place to address is. The UDP encaps/decaps function needs to have this functionality.

>> In any use of UDP, congestion
>> control is either left to something above UDP or ignored (left to queue
>> management).

There are several cases, see Section 3.1.3 of RFC5405. MPLS-over-UDP can fall into any of the three cases, depending on what traffic is inside the LSP being encapsulated. 

You'll notice that RFC5405 for the first case - encapsulation of IP-based congestion controlled "normal" Internet traffic - even says that the tunnel SHOULD NOT employ any congestion control scheme of its own. Having layered control loops fighting is not productive.

The issue with MPLS-in-UDP (and GRE-in-UDP, and any other encaps scheme that can carry non-IP traffic) are with cases two and three. When the workload that is being encapsulated isn't known to be congestion controlled by its endpoints, it is the obligation of the tunnel to detect congestion and react to it by reducing the traffic volume. Because for the rest of the network, that tunnel is the UDP sender, and we have IETF consensus that we don't want UDP senders that don't react to congestion on the net. (That's one of the main reasons for the existence of the RMCAT WG - we don't want non-congestion-controlled RTP media traffic on the net.)

The key difference between putting MPLS e.g. into IP compared to putting it into UDP is that once it's in UDP, it can go pretty much anywhere on the net, because UDP traverses NATs and firewalls much more easily than IP traffic with a rare protocol number does.

>> Similarly, you want the client of MPLS to be responsible for
>> managing its traffic. MPLS gives you paths, it doesn't push packets over them.

Right. However, once you slap a UDP header on a packet during encapsulation, you now subjected yourself to the rules for Internet UDP senders. Those are documented in RFC5405, and require the tunnel to implement some sort of congestion detection and control. I'd personally consider a circuit breaker mechanism sufficient, like RTP and I think PWE are using.

> Fully agree. The congestion control should be performed either by the UDP tunnel itself or the client of MPLS. In the former case, it'd better to specify the practical congestion control mechanisms (if there were any) in a generic draft (e.g., RFC5405bis) and then any use of the UDP tunnel could refer to that generic draft with regard to congestion control.

The general concept of a circuit breaker is easy enough that it doesn't really need to be written down. And it wouldn't be possible to describe it in a generic fashion, because congestion detection is typically specific to the protocol being encapsulated (e.g., RTP uses RTCP feedback to derive loss information, etc.) And the reaction to congestion is also dependent on the protocol being encapsulated (does it support multiple rates or only on/off, what timescales are OK for reaction, etc.)

> In the latter case, if the client of MPLS is TCP-friendly, that is great. Otherwise (e.g., circuit emulation service), it shouldn't be deployed on the Internet at all, just as has been pointed out in RFC3985, therefore there is no need for any specific congestion control mechanism on the client.
> 
>  "... In essence, this requirement states that it is
>   not acceptable to deploy an application (using PWE3 or any other
>   transport protocol) on the best-effort Internet, which consumes
>   bandwidth arbitrarily and does not compete fairly with TCP within an
>   order of magnitude." (quoted from Section 6.5 of RFC3985)
> 
> The above choice seems no conflict with the following congestion control guidelines as quoted from Section 3.1.1 of RFC5405, as those non-TCP-friendly traffic would be transported over a provisioned path, rather than on the Internet.
> 
>   "...Finally, some bulk transfer applications may choose not to implement
>   any congestion control mechanism and instead rely on transmitting
>   across reserved path capacity.  This might be an acceptable choice
>   for a subset of restricted networking environments, but is by no
>   means a safe practice for operation in the Internet."

How is that in conflict? Both quotes say that Internet traffic needs congestion control, which is a restatement of RFC2914.

Lars