[PANRG] Some comments on draft-irtf-panrg-questions-11
"Y. Richard Yang" <yry@cs.yale.edu> Mon, 29 November 2021 04:07 UTC
Return-Path: <yang.r.yang@gmail.com>
X-Original-To: panrg@ietfa.amsl.com
Delivered-To: panrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0BF6B3A0C36 for <panrg@ietfa.amsl.com>; Sun, 28 Nov 2021 20:07:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.399
X-Spam-Level:
X-Spam-Status: No, score=-1.399 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.25, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OUiygu5rMmVg for <panrg@ietfa.amsl.com>; Sun, 28 Nov 2021 20:07:54 -0800 (PST)
Received: from mail-yb1-f170.google.com (mail-yb1-f170.google.com [209.85.219.170]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D4C023A0C35 for <panrg@irtf.org>; Sun, 28 Nov 2021 20:07:53 -0800 (PST)
Received: by mail-yb1-f170.google.com with SMTP id x32so38288322ybi.12 for <panrg@irtf.org>; Sun, 28 Nov 2021 20:07:53 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=hDlP/qn20/T8LH/Dmm6c4u+8m15foAsZSiWVehgEggY=; b=bAgKg8KgN5fth4ugWHgG3yBOUkc1CJSm59b11WarnlffpiA656zleGtue/USGv5nl4 qkN5/0USop5bavSkbWdi58VRCabzkWw2SYnp1s47KMKAKihm5IMpn7Mx7inMZ2xyfdPG wUBOwBnC5vurEnHQiLvooosYy7r6s1umXz/R7Um6+zYKEinuuEuFULDJRaFDrREB3Xip aSiSL++4UpCBJS9YOx27g6j97ZLMgbvys+pvxCC3yeoFm13JjY2qCgwZ1x9SEmOElFVz 5YZ3wwiSDWS7yO7g4aDb3ykT9DoRGS+CQQb5b+r2H7modfCSisHSB8UXlpYTn1bxjkzz QNpQ==
X-Gm-Message-State: AOAM5315PhiEHa+v3eCGPV6TwMEZm3yj750isUvDqp3oRBLcOguwucc2 JLDp5PHXJz6+hJVEwAIdT2GDBzqbWX92eoX2wWhBTT0QAeU=
X-Google-Smtp-Source: ABdhPJz47FWNJcKTGOTy+PQLV/ffixLKnPiIA5kUZsIoPUZNwWvvtpWuIOFC0/X62n6D7KIN44/keQv/X/jcLswN/cE=
X-Received: by 2002:a25:fc5:: with SMTP id 188mr4534870ybp.608.1638158872607; Sun, 28 Nov 2021 20:07:52 -0800 (PST)
MIME-Version: 1.0
From: "Y. Richard Yang" <yry@cs.yale.edu>
Date: Sun, 28 Nov 2021 23:07:40 -0500
Message-ID: <CANUuoLqE=sBdai2_R-3--FT3r46DOPmmu04icJABth1AU-6KDQ@mail.gmail.com>
To: IRTF PANRG <panrg@irtf.org>, IETF ALTO <alto@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000affe8b05d1e5955f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/panrg/YJ7aLs2FxD2ng-ZThIO67xorqTU>
Subject: [PANRG] Some comments on draft-irtf-panrg-questions-11
X-BeenThere: panrg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Path Aware Networking \(Proposed\) Research Group discussion list" <panrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/panrg>, <mailto:panrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/panrg/>
List-Post: <mailto:panrg@irtf.org>
List-Help: <mailto:panrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/panrg>, <mailto:panrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Nov 2021 04:07:56 -0000
Hi Brian, all, Thank you for this wonderful IRTF document, which summarizes open questions in the field of path-aware networking. I have read this document quickly before and today I read the latest version from the beginning to Sec. 2.4 with great interest. Below are some comments, whose goals are to help with understanding, not to slow down the publications of the document. Sec. 1 - "In the current Internet architecture, ...": Add a citation to give a snapshot of current? - "the network layer provides an unverifiable": the meaning of verifiable is not clear at an early stage. I can think of source address verification, path property verification, ... It helps to give a citation or list some example properties. From the second paragraph, it introduces IPSec and TLS. It helps to clarify early. - " ... and Software-Defined Wide Area Network (SD-WAN) approaches": give a citation, such as the B4 paper? - "In this environment ...": It is not clear what this environment is. To use the topical sentence, does it mean "Under this architecture"? - "A transport layer protocol such as TCP ... a protocol above the network layer ..." It is clear that this sentence is describing existing extension services on the basic network layer, but it takes effort to parse. - "... explicit information about the path is available to the endpoint, ..." This is the first time that the word "path" appears. It helps to introduce the word path before this. One possibility might be the last sentence of the preceding paragraph, e.g., "In this environment, an application can assume that a packet with a given (unicast) destination address will eventually be forwarded toward that destination along a path, " - "... about the path is available to the endpoint" -> endpoint(s). - " assumptions about that path often do not hold ": A reader may wonder what assumptions they are, and it is not clear who is making the assumptions. I would put it in a slightly different way: first state the applications which make assumptions and then state the impacts. - The next two paragraphs: "... endpoints have the ability to select or influence the path through the network used by any given packet or flow." and "Path selection provides explicit visibility and control of network treatment to applications and users of the network." can be slightly confusing to read. One suggestion is to move the definitions early to clarify the concepts and terms, path aware networking and path aware internetworking. Sec. 1.1 - "For purposes of this document, "path aware networking" describes endpoint ": Do want to limit to endpoint (e.g., it can be the controller of an application consisting of endpoint) or here endpoint is a generic term? If so, it helps to clarify. - I spent some time trying to understand the differences between "path aware networking" and "path aware internetworking". The latter is specified as "expanding" the former. From the wording, the former consists of "discovery" and "reaction", and the latter "discovery" and "selection". Is this the right way to understand? If so, it helps to pinpoint this key difference. - "Research into path aware networking..." Does this imply restricting to "path aware networking", not "path aware internetworking", or it is a general term from this point on (see first sentence of Sec. 2)? Sec. 2.1 This is an excellent open question. Some detailed comments: - "A Vocabulary of Path Properties" => "A Vocabulary of Paths and Properties" - 2nd paragraph: Since the focus is cross domains, it helps to add this aspect in the paragraph to highlight the challenge, e.g., "The elements of this vocabulary could include terminology for components of a path and properties defined for these components, for the entire path, or for subpaths of a path." => "The elements of this vocabulary could include terminology for components of a path and properties defined for these components, for the entire path, for subpath inside each network, or for the interconnection of these subpaths defining a global path." - I will see challenges in addition to expressiveness, and it may help to connect back to the original question (how to represent). Hence, one suggestion: "This vocabulary must be defined carefully, as its design will have impacts on the expressiveness of a given path-aware internetworking architecture." => "This vocabulary and its representation must be defined carefully, as its design will have impacts on properties (e.g., expressiveness, scalability, security) of a given path-aware internetworking architecture." It might be that only paths and path properties are not enough in the basic vocabulary. For example, with adaptive flows such as TCP/Reno/Cubic, the congestion control algorithm of the flows can have impact on the path properties, e.g., path bandwidth share. It might be helpful to include a sentence in this paragraph. Sec. 2.2 - A minor point: "how do endpoints and applications get access to accurate, useful, and trustworthy path properties?" This reads that there is a fixed path (with contrast to Sec. 2.3). It helps to clarify that this is the case. - A key challenge is composing a single property from segments spanning multiple networks. "Once endpoints and networks have a shared vocabulary for expressing path properties, the network must have some method for distributing those path properties to the endpoint." => "Once endpoints and networks have a shared vocabulary for expressing path properties, the network*s* must have some method for distributing those path properties to the endpoint. Either the networks or the endpoints need to aggregate subpath properties from multiple networks" "Regardless of how path property information is distributed to the endpoints, the endpoints require a method to authenticate the properties -- to determine that they originated from and pertain to the path that they purport to." => "Regardless of how path property information is distributed to the endpoints, the endpoints require a method to authenticate the properties -- to determine that they originated from and pertain to the path that they purport to, even when the path spans multiple networks." "Possible dimensions in the space of distribution methods include in-band versus out-of-band, push versus pull versus publish-subscribe, and so on." => "Possible dimensions in the space of distribution methods include in-band versus out-of-band, push versus pull versus publish-subscribe, application-aggregation vs network aggregation, and so on." At this point, I feel that it may help to add an open question from the network operator's point of view, e.g., how to protect network operator privacy? Sec. 2.3 This is a good open question but can be quite broad, in particular in a cross-domain setting. To me, it includes PCE and QoS routing as special cases, and hence can be quite challenging. I would limit the scope but broad scope may be what this document is intended. Sec. 2.4 Is the interface for applications/endpoints or more broadly? Thanks for writing the document guiding the community. Richard
- [PANRG] Some comments on draft-irtf-panrg-questio… Y. Richard Yang