Re: [multipathtcp] Proposed changes to the protocol draft

Olivier Bonaventure <Olivier.Bonaventure@uclouvain.be> Sat, 10 September 2011 09:41 UTC

Return-Path: <olivier.bonaventure@uclouvain.be>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2EF9621F856A for <multipathtcp@ietfa.amsl.com>; Sat, 10 Sep 2011 02:41:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.999
X-Spam-Level:
X-Spam-Status: No, score=-5.999 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_38=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kiYgH71BXlBI for <multipathtcp@ietfa.amsl.com>; Sat, 10 Sep 2011 02:41:29 -0700 (PDT)
Received: from smtp5.sgsi.ucl.ac.be (smtp.sgsi.ucl.ac.be [130.104.5.67]) by ietfa.amsl.com (Postfix) with ESMTP id F16F421F84DF for <multipathtcp@ietf.org>; Sat, 10 Sep 2011 02:41:19 -0700 (PDT)
Received: from mbpobo.local (host-85-27-91-91.brutele.be [85.27.91.91]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: obonaventure@smtp5.sgsi.ucl.ac.be) by smtp5.sgsi.ucl.ac.be (Postfix) with ESMTPSA id 6A89A11E45C; Sat, 10 Sep 2011 11:43:10 +0200 (CEST)
X-DKIM: Sendmail DKIM Filter v2.8.3 smtp5.sgsi.ucl.ac.be 6A89A11E45C
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=uclouvain.be; s=selucl; t=1315647790; bh=CUg+lHPq7yVR3W77Je9IFVD72PRbutr5mpl/xuVAGlQ=; h=Message-ID:Date:From:Reply-To:MIME-Version:To:CC:Subject: References:In-Reply-To:Content-Type:Content-Transfer-Encoding; b=dIObngRD61HhEPazQwD6hA+XmqtWulF9LAZMyjZ/H0ZI2Qy0DkROksTIiG1AgFrqo ax8DKnYTYOvlZiJVAT8L+d3WGY44YkQbP1eRDslY9ezfOGKCpXBAMv+ITzqWO4Uo6U izFnuGNvbiou9ws12JxHWEDrkyBV356QsQATL1xA=
Message-ID: <4E6B312E.8060707@uclouvain.be>
Date: Sat, 10 Sep 2011 11:43:10 +0200
From: Olivier Bonaventure <Olivier.Bonaventure@uclouvain.be>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:6.0.1) Gecko/20110830 Thunderbird/6.0.1
MIME-Version: 1.0
To: Yoshifumi Nishida <nishida@sfc.wide.ad.jp>
References: <9510D26531EF184D9017DF24659BB87F330AFB97A2@EMV65-UKRD.domain1.systemhost.net> <CAOs_kTark+NQ1Js9iBSwhwetXWHm6QAXneRmGZWiRpM7uLJpSQ@mail.gmail.com> <CAOs_kTbnSk4=nBxCdVSAmCcCyscmXDdDBGWuEud_hYxjwRUehA@mail.gmail.com> <461C6AC0-D817-4908-85EB-EAB3ABFB04AD@cs.ucl.ac.uk> <57AB2D9B-1902-4215-8CA4-5FA14C56ACCF@cs.ucl.ac.uk> <CABxaRLFMRsoUkgBOaj2PO=iPWKqV6jH9fqic5X9HDgEp_pmNHw@mail.gmail.com> <154773479ED2314980CB638A48FC443486DE961D@USNAVSXCHMBSA2.ndc.alcatel-lucent.com> <CABxaRLEqKv962SWya-wyL-UcrJT4TeNn6KewKX=UCn1SqtQZUg@mail.gmail.com>
In-Reply-To: <CABxaRLEqKv962SWya-wyL-UcrJT4TeNn6KewKX=UCn1SqtQZUg@mail.gmail.com>
X-Enigmail-Version: 1.3.1
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: clamav-milter 0.97-exp at smtp-5.sipr-dc.ucl.ac.be
X-Virus-Status: Clean
X-Sgsi-Spamcheck: SASL authenticated,
X-SGSI-MailScanner-ID: 6A89A11E45C.A367D
X-SGSI-MailScanner: Found to be clean
X-SGSI-From: olivier.bonaventure@uclouvain.be
X-SGSI-Spam-Status: No
Cc: "multipathtcp@ietf.org List" <multipathtcp@ietf.org>
Subject: Re: [multipathtcp] Proposed changes to the protocol draft
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: Olivier.Bonaventure@uclouvain.be
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/multipathtcp>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 10 Sep 2011 09:41:30 -0000

Hello,
> 
> 2011/9/9 Hampel, K Georg (K Georg) <georg.hampel@alcatel-lucent.com>om>:
>> Hi Christoph, Costin, Yoshifumi, all,
>>
>> Fallback issue: I agree that when checksums are not used, there is no way for the end hosts to tell if payload has been rewritten, and hence, there's no reason to enter fallback due to payload rewriting. Obviously, if payload rewriting still occurs, the connection may get corrupted or it may break.
>>
>> I'm striving for something else: If checksums are *not* used and only one subflow runs traffic, DSS can principally be omitted. 

We'd need to define precisely define when there is a single subflow that
runs traffic.

Does this means that only one flow has been established ? or only one
subflow is active (e.g. previous subflows have timedout) or there
unacknowledged data on only one subflow ? or another definition ?

We need an unambiguous definition that can be easily supported by
implementations

> This reduces overhead and improves processing speed. 

But this increases the implementation complexity and the number of
corner cases that have to be considered by implementors.

>Omission of DSS can be announced via DSS with infinity setting. DSS must be re-inserted as soon as another subflow carries traffic. This is done via conventional DSSs.

Implementations will also need to hanlde the case when :
- at time t0, there is a single subflow and thus dss=infinite
- at time t1, a second subflow is used and thus we send dss
- at time t2, we go back to a single subflow and dss=infinite

I fear that this would add unnecessary complexity and would prefer to
wait for more implementation experience before looking at such
optimisations in the main spec


>> What problems does this simplification raise?
> 
> Please correct me if I'm wrong.
> In my understanding, there seems to be two distinct modes in this.
> 
>    fallback mode:  where we want to omit MPTCP signaling since it
> might not be very safe.

Agree. As soon as we go in fallback mode, we must stop all MPTCP signalling.

>    one path mode: where we want to suppress MPTCP signaling to reduce
> the overhead and improve the performance.
> 
> I'm so far inclined to disable all MPTCP features (including opening
> subflows) in the fallback mode.

Agreed


>> Proxy issue:
>> First a clarification (in my opinion): In presence of a proxy, there can *only* *ever* be two independent "end points" that do MPTCP signaling. If host A and host B do MPTCP, the proxy must remain out of the picture and let all MPTCP signaling pass. If the proxy wants to be in the picture, it has to shun host A's MPTCP signaling from host B and respond on behalf of host A.
> 
> Well, I'm not sure if this is a good example, But, a mobile MPTCP node
> in future might want to say something like this...
> "I'm going to leave this network and will come back with new address
> after for a while. In the meantime, you can send data to this proxy if
> you want"

Adding proxy to the main spec will add complexity to the protocol.
Wouldn't it be better to :
- reserve a few bits in the main spec to have some space to add the
proxy bits that are being discussed but leave proxy out of the main spec
- start a new draft that works on these proxy issues

MPTCP has already several use cases without proxies and I think that it
is important to stabilise the main MPTCP spec based on implementation
experience before trying to add new features and new complexity.



Olivier


-- 
INL, ICTEAM, UCLouvain, Belgium, http://inl.info.ucl.ac.be