Re: [netconf] Tsvart early review of draft-ietf-netconf-udp-notif-11

Alex Huang Feng <alex.huang-feng@insa-lyon.fr> Mon, 22 January 2024 07:57 UTC

Return-Path: <alex.huang-feng@insa-lyon.fr>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB115C14F684; Sun, 21 Jan 2024 23:57:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.539
X-Spam-Level:
X-Spam-Status: No, score=-4.539 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_HELO_IP_MISMATCH=2.368, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XAka00Jx73aO; Sun, 21 Jan 2024 23:57:30 -0800 (PST)
Received: from smtpout01-ext2.partage.renater.fr (smtpout01-ext2.partage.renater.fr [194.254.240.33]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 10FCCC14F5E6; Sun, 21 Jan 2024 23:57:26 -0800 (PST)
Received: from zmtaauth01.partage.renater.fr (zmtaauth01.partage.renater.fr [194.254.240.25]) by smtpout10.partage.renater.fr (Postfix) with ESMTP id 5830A637B0; Mon, 22 Jan 2024 08:40:19 +0100 (CET)
Received: from zmtaauth01.partage.renater.fr (localhost [127.0.0.1]) by zmtaauth01.partage.renater.fr (Postfix) with ESMTPS id 434C2140151; Mon, 22 Jan 2024 08:40:19 +0100 (CET)
Received: from localhost (localhost [127.0.0.1]) by zmtaauth01.partage.renater.fr (Postfix) with ESMTP id 343B3140108; Mon, 22 Jan 2024 08:40:19 +0100 (CET)
Received: from zmtaauth01.partage.renater.fr ([127.0.0.1]) by localhost (zmtaauth01.partage.renater.fr [127.0.0.1]) (amavis, port 10026) with ESMTP id XbuJaDgAOokA; Mon, 22 Jan 2024 08:40:19 +0100 (CET)
Received: from 150.100.50.83 (unknown [194.254.241.250]) by zmtaauth01.partage.renater.fr (Postfix) with ESMTPA id 8E8C61400B5; Mon, 22 Jan 2024 08:40:17 +0100 (CET)
From: Alex Huang Feng <alex.huang-feng@insa-lyon.fr>
Message-Id: <EC62EC02-5EFF-465B-ADCE-E9CA29E3CC30@insa-lyon.fr>
Content-Type: multipart/alternative; boundary="Apple-Mail=_175C4B31-0AE5-4A41-B879-97C3259F4189"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6\))
Date: Mon, 22 Jan 2024 16:40:05 +0900
In-Reply-To: <8F324146-3BAF-4E6B-AD70-20DB8EE812AB@fh-muenster.de>
Cc: Mahesh Jethanandani <mjethanandani@gmail.com>, tsv-art@ietf.org, draft-ietf-netconf-udp-notif.all@ietf.org, netconf@ietf.org
To: tuexen@fh-muenster.de
References: <170006128089.20545.9787644071978443627@ietfa.amsl.com> <2F7D6971-8A3A-4DCA-824B-3482148FBDEF@gmail.com> <A00B77E0-2D43-4FA3-8646-85EEF5AA3204@fh-muenster.de> <0DA44491-C18A-4848-AA5B-7B4E81E6C807@gmail.com> <8F324146-3BAF-4E6B-AD70-20DB8EE812AB@fh-muenster.de>
X-Mailer: Apple Mail (2.3731.700.6)
X-Virus-Scanned: clamav-milter 0.103.8 at clamav04
X-Virus-Status: Clean
X-Renater-Ptge-SpamState: clean
X-Renater-Ptge-SpamScore: -100
X-Renater-Ptge-SpamCause: gggruggvucftvghtrhhoucdtuddrgedvkedrvdekhedguddtkecutefuodetggdotefrodftvfcurfhrohhfihhlvgemucftgffptefvgfftnecuuegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenucfjughrpefhkfgtggfuffgjvefvfhfosegrtdhmrehhtdejnecuhfhrohhmpeetlhgvgicujfhurghnghcuhfgvnhhguceorghlvgigrdhhuhgrnhhgqdhfvghnghesihhnshgrqdhlhihonhdrfhhrqeenucggtffrrghtthgvrhhnpeduudegkeeffeekiefhheekieehtdetiedvjeefleegueekjeehiedtieeufeeuueenucffohhmrghinhepihgvthhfrdhorhhgpdhrfhgtqdgvughithhorhdrohhrghenucfkphepudelgedrvdehgedrvdeguddrvdehtdenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepihhnvghtpeduleegrddvheegrddvgedurddvhedtpdhhvghlohepudehtddruddttddrhedtrdekfedpmhgrihhlfhhrohhmpeetlhgvgicujfhurghnghcuhfgvnhhguceorghlvgigrdhhuhgrnhhgqdhfvghnghesihhnshgrqdhlhihonhdrfhhrqedpnhgspghrtghpthhtohephedprhgtphhtthhopehtuhgvgigvnhesfhhhqdhmuhgvnhhsthgvrhdruggvpdhrtghpthhtohepmhhjvghthhgrnhgrnhgurghnihesghhmrghilhdrtghomhdprhgtphhtthhopehtshhvqdgrrhhtsehivghtfhdrohhrghdprhgtphhtthhopegu rhgrfhhtqdhivghtfhdqnhgvthgtohhnfhdquhguphdqnhhothhifhdrrghllhesihgvthhfrdhorhhgpdhrtghpthhtohepnhgvthgtohhnfhesihgvthhfrdhorhhg
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/LLeejdfRJybO0NdrkV5G4tOz_Mo>
Subject: Re: [netconf] Tsvart early review of draft-ietf-netconf-udp-notif-11
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Jan 2024 07:57:34 -0000

Dear Michael,

Thanks for all the comments and raised issues. 
Thanks Mahesh for arranging the tsvdir review.

We have submitted a new version of the draft addressing the raised issues: 
- https://datatracker.ietf.org/doc/html/draft-ietf-netconf-udp-notif-12
- Diff: https://author-tools.ietf.org/iddiff?url1=draft-ietf-netconf-udp-notif-11&url2=draft-ietf-netconf-udp-notif-12&difftype=--html

We also have some comments regarding some raised points:

* I wonder how the sender side knows, what the receiver is able to process.
  It might make sense to exchange this information at the beginning of
  the communication.
AHF: UDP-notif is designed for “Configured Subscriptions”, meaning it is expected that the operator configures transport in the exporter node and the collector.

* Using the suggested protocol results in a high bandwidth using UDP based
  communication. It is really suggested to use some sort of congestion
  control. However, the document arguments that this is not needed, since
  the protocol is used only on "managed networks" as stated in Section 5.1.
  What confuses me is that in Section 6, the document discusses the use
  of the protocol in "open or unsecured" networks. How does this relates
  to "managed networks"? In my understanding, this does not fit. Do you
  really not need some congestion controller?
  I would expect to see some sort of circuit breaker, but have not seen
  a description of it.
AHF: We have removed “open networks” from the draft. UDP-notif is designed to be deployed in controlled environments provisioned for the purpose of monitoring, not the General Internet as defined in https://www.rfc-editor.org/rfc/rfc8085.html#section-3.6

* Section 4.2
  What should happen if the Private Encoding Option is present, but the S-bit is
  not set? What should happen if the S-bit is set, but the Private Encoding Option
  is not present?
AHF: The private Encoding Option is informative, the operator can configure the collector anticipating the collection of a private encoding.
We have added that when S is set, the private option SHOULD be present.

Cheers,

Alex, on behalf of the authors


> On 17 Nov 2023, at 17:52, tuexen@fh-muenster.de wrote:
> 
>> On Nov 16, 2023, at 01:37, Mahesh Jethanandani <mjethanandani@gmail.com> wrote:
>> 
>> 
>> 
>>> On Nov 15, 2023, at 2:17 PM, tuexen@fh-muenster.de wrote:
>>> 
>>>> On Nov 15, 2023, at 22:47, Mahesh Jethanandani <mjethanandani@gmail.com> wrote:
>>>> 
>>>> Hi Michael,
>>>> 
>>>> Thanks for your review of the document.
>>>> 
>>>> One of the discussions before the WG was on what the draft calls out as “segmentation”. The draft proposes this solution to deal with UDP packets that are larger than the path MTU, and will result in fragmentation at the IP level. Note, the end application requires that packets be received in sequence and be complete for the application to process. Otherwise, the packet needs to be discarded. Also to note is that there is no retransmission of the frame if the packet is discarded for any reason.
>>>> 
>>>> Did you have any comments from a transport perspective, on applications that run over UDP, and propose to use fragmentation (segmentation in this draft) and reassembly logic at the application level with no retransmission?
>>> Hi Mahesh,
>>> 
>>> what user message sizes or number of fragments per user message do you expect?
>> 
>> The discussion was for max-size UDP message - 64K.
> I updated the review. Sorry for missing to read the comment in the review request.
> 
> If you have further questions, please let me know.
> 
> Best regards
> Michael
>> 
>> Thanks
>> 
>>> 
>>> Best regards
>>> Michael
>>>> 
>>>> Thanks.
>>>> 
>>>>> On Nov 15, 2023, at 7:14 AM, Michael Tüxen via Datatracker <noreply@ietf.org> wrote:
>>>>> 
>>>>> Reviewer: Michael Tüxen
>>>>> Review result: Not Ready
>>>>> 
>>>>> Major issue:
>>>>> Using the suggested protocol results in a high bandwidth using UDP based
>>>>> communication. It is really suggested to use some sort of congestion
>>>>> control. However, the document arguments that this is not needed, since
>>>>> the protocol is used only on "managed networks" as stated in Section 5.1.
>>>>> What confuses me is that in Section 6, the document discusses the use
>>>>> of the protocol in "open or unsecured" networks. How does this relates
>>>>> to "managed networks"? In my understanding, this does not fit. Do you
>>>>> really not need some congestion controller?
>>>>> I would expect to see some sort of circuit breaker, but have not seen
>>>>> a description of it.
>>>>> 
>>>>> Minor issues:
>>>>> * Section 3.2
>>>>> I guess all binary fields in the header shown are expected to be transmitted
>>>>> and received in network byte order (big endian), but I would prefer to make
>>>>> this explicit.
>>>>> * Section 3.2
>>>>> Is it allowed that the Message ID wraps around? It seems so, but I think it is
>>>>> better to make that explicit.
>>>>> * Section 4.1
>>>>> The length field in the UDP header is limited to 65535 bytes, therefore the
>>>>> UDP payload is limited to 65535 - 8 bytes, which is 65527 bytes. This is smaller
>>>>> than stated in the first sentence. In addition to that, when using IPv4, the size
>>>>> is even 20 bytes smaller, since the IPv6 header contains a 16-bit field holding
>>>>> the total length of the IPv4 packet.
>>>>> * Section 4.2
>>>>> What should happen if the Private Encoding Option is present, but the S-bit is
>>>>> not set? What should happen if the S-bit is set, but the Private Encoding Option
>>>>> is not present?
>>>>> 
>>>>> 
>>>>> 
>>>> 
>>>> 
>>>> Mahesh Jethanandani
>>>> mjethanandani@gmail.com
>> 
>> 
>> 
>> Mahesh Jethanandani
>> mjethanandani@gmail.com
>> 
>> 
>> 
>> 
>> 
>> 
> 
> _______________________________________________
> netconf mailing list
> netconf@ietf.org
> https://www.ietf.org/mailman/listinfo/netconf