Re: [multipathtcp] Multipath deployment and fate sharing

Joe Touch <touch@ISI.EDU> Mon, 14 December 2009 18:38 UTC

Return-Path: <touch@ISI.EDU>
X-Original-To: multipathtcp@core3.amsl.com
Delivered-To: multipathtcp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4E8463A6909 for <multipathtcp@core3.amsl.com>; Mon, 14 Dec 2009 10:38:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.679
X-Spam-Level:
X-Spam-Status: No, score=-1.679 tagged_above=-999 required=5 tests=[AWL=-0.920, BAYES_00=-2.599, J_CHICKENPOX_48=0.6, SARE_LWSHORTT=1.24]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id quf8r4JIwXzA for <multipathtcp@core3.amsl.com>; Mon, 14 Dec 2009 10:38:18 -0800 (PST)
Received: from vapor.isi.edu (vapor.isi.edu [128.9.64.64]) by core3.amsl.com (Postfix) with ESMTP id 740D03A6905 for <multipathtcp@ietf.org>; Mon, 14 Dec 2009 10:38:18 -0800 (PST)
Received: from [75.214.253.111] (111.sub-75-214-253.myvzw.com [75.214.253.111]) (authenticated bits=0) by vapor.isi.edu (8.13.8/8.13.8) with ESMTP id nBEIaRqk024000 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Mon, 14 Dec 2009 10:36:30 -0800 (PST)
Message-ID: <4B2685A8.5070201@isi.edu>
Date: Mon, 14 Dec 2009 10:36:24 -0800
From: Joe Touch <touch@ISI.EDU>
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: "Laganier, Julien" <julienl@qualcomm.com>
References: <E9EE0C1A-C9D3-4EBC-97FD-E1B1628CD2E7@iki.fi> <4B0C607A.6060503@isi.edu> <BF345F63074F8040B58C00A186FCA57F1C65FB29C0@NALASEXMB04.na.qualcomm.com> <4B0C6590.9010000@isi.edu> <BF345F63074F8040B58C00A186FCA57F1C65FB29C6@NALASEXMB04.na.qualcomm.com> <4B0C6C13.2060103@isi.edu> <BF345F63074F8040B58C00A186FCA57F1C65FB29CB@NALASEXMB04.na.qualcomm.com> <4B0C6FBE.40003@isi.edu> <alpine.DEB.2.00.0911250211520.23603@ayourtch-lnx.stdio.be> <alpine.DEB.2.00.0911250428590.23603@ayourtch-lnx.stdio.be> <BE063B0C-BB34-4C75-A57E-1BAB0BE6780A@cs.ucl.ac.uk> <4B0D52D5.9090403@isi.edu> <58B2A4B2-F! 276-4E96-87FB-F8273FD78ED0@muada.com> <BF345F63074F8040B58C00A186FCA57F1C67584040@NALASEXMB04.na.qualcomm.com> <C6411A99-FB39-40E8-8F66-93ACA7B18016@muada.com> <BF345F63074F8040B58C00A186FCA57F1C67584054@NALASEXMB04.na.qualcomm.com> <4B2679D0.8040207@isi.edu> <BF345F63074F8040B58C00A186FCA57F1C67584057@NALASEXMB04.na.qualcomm.com>
In-Reply-To: <BF345F63074F8040B58C00A186FCA57F1C67584057@NALASEXMB04.na.qualcomm.com>
X-Enigmail-Version: 0.96.0
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Cc: "multipathtcp@ietf.org List" <multipathtcp@ietf.org>
Subject: Re: [multipathtcp] Multipath deployment and fate sharing
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/multipathtcp>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Dec 2009 18:38:19 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



Laganier, Julien wrote:
> Joe Touch wrote:
>> Laganier, Julien wrote:
>>> Iljitsch van Beijnum wrote:
>>>> On 14 dec 2009, at 17:38, Laganier, Julien wrote:
>>>>> With IPv4 of course the situation would be different due to the
>>>>> IPv4 address space exhaustion, presence of NATs, and DHCP 
>>>>> allocation with[Laganier, Julien]  short term leases. So in IPv4
>>>>> we can't rule out situation #2, and thus we want to make fate 
>>>>> sharing the default IPv4.
>>>> I don't see that. With NAT you don't know who you're going to
>>>> encounter behind a given address, anyway.
>>> This is a valid point.
>>>
>>> Thus it seems that whether or not MPTCP implements fate sharing, 
>>> a host can never be sure who's really behind a given IPv4 address.
>>> Essentially the address semantic is broken end-to-end.
>>>
>>> For purely local matters, fate-sharing can be used to maintain some
>>> applications' expectations regarding the relationship between local
>>> addresses and the transport connections that are bound on them.
>>
>> Apps have those expectations - local or remote. That's why some apps
>> break when they go through NATs. Let's not compound that situation with
>> by assuming fate sharing can be ignored.
> 
> Not what I intended to say, should have been more precise.
> 
> Fate sharing does not solve (neither its absence make worse) the 
> issue of a remote address X not being uniquely associated with a
> peer. For example, with fate sharing and normal TCP there's the issue
> of an application connected to a peer application on remote address X
> not being able to connect to the same peer when issuing another
> connect().
>
> This is different from the issue of an application expecting a
> connection to be up if and only if the remote address X is still in use
> by its peer. That one is influenced by our decision regarding fate-sharing.

I agree fate sharing doesn't solve the issue, but its absence definitely
does make it "worse", where "worse" is considered (by me) to be "not
what existing TCP does".

IMO, if you want to use TCP as the basis of MPTCP, then you need to have
defaults that do what TCP does, as visible to the app. layer, w.r.t.
addresses.

Joe

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)

iEYEARECAAYFAksmhagACgkQE5f5cImnZrsV2gCfXtlziKZ6kYgGjjXxJTOgfSTs
BpsAn3jwTXcQ0g5qY+KTQASds2IebpFL
=484d
-----END PGP SIGNATURE-----