[PANRG] Some comments on draft-irtf-panrg-questions-11

"Y. Richard Yang" <yry@cs.yale.edu> Mon, 29 November 2021 04:07 UTC

Return-Path: <yang.r.yang@gmail.com>
X-Original-To: panrg@ietfa.amsl.com
Delivered-To: panrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0BF6B3A0C36 for <panrg@ietfa.amsl.com>; Sun, 28 Nov 2021 20:07:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.399
X-Spam-Level:
X-Spam-Status: No, score=-1.399 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.25, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OUiygu5rMmVg for <panrg@ietfa.amsl.com>; Sun, 28 Nov 2021 20:07:54 -0800 (PST)
Received: from mail-yb1-f170.google.com (mail-yb1-f170.google.com [209.85.219.170]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D4C023A0C35 for <panrg@irtf.org>; Sun, 28 Nov 2021 20:07:53 -0800 (PST)
Received: by mail-yb1-f170.google.com with SMTP id x32so38288322ybi.12 for <panrg@irtf.org>; Sun, 28 Nov 2021 20:07:53 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=hDlP/qn20/T8LH/Dmm6c4u+8m15foAsZSiWVehgEggY=; b=bAgKg8KgN5fth4ugWHgG3yBOUkc1CJSm59b11WarnlffpiA656zleGtue/USGv5nl4 qkN5/0USop5bavSkbWdi58VRCabzkWw2SYnp1s47KMKAKihm5IMpn7Mx7inMZ2xyfdPG wUBOwBnC5vurEnHQiLvooosYy7r6s1umXz/R7Um6+zYKEinuuEuFULDJRaFDrREB3Xip aSiSL++4UpCBJS9YOx27g6j97ZLMgbvys+pvxCC3yeoFm13JjY2qCgwZ1x9SEmOElFVz 5YZ3wwiSDWS7yO7g4aDb3ykT9DoRGS+CQQb5b+r2H7modfCSisHSB8UXlpYTn1bxjkzz QNpQ==
X-Gm-Message-State: AOAM5315PhiEHa+v3eCGPV6TwMEZm3yj750isUvDqp3oRBLcOguwucc2 JLDp5PHXJz6+hJVEwAIdT2GDBzqbWX92eoX2wWhBTT0QAeU=
X-Google-Smtp-Source: ABdhPJz47FWNJcKTGOTy+PQLV/ffixLKnPiIA5kUZsIoPUZNwWvvtpWuIOFC0/X62n6D7KIN44/keQv/X/jcLswN/cE=
X-Received: by 2002:a25:fc5:: with SMTP id 188mr4534870ybp.608.1638158872607; Sun, 28 Nov 2021 20:07:52 -0800 (PST)
MIME-Version: 1.0
From: "Y. Richard Yang" <yry@cs.yale.edu>
Date: Sun, 28 Nov 2021 23:07:40 -0500
Message-ID: <CANUuoLqE=sBdai2_R-3--FT3r46DOPmmu04icJABth1AU-6KDQ@mail.gmail.com>
To: IRTF PANRG <panrg@irtf.org>, IETF ALTO <alto@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000affe8b05d1e5955f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/panrg/YJ7aLs2FxD2ng-ZThIO67xorqTU>
Subject: [PANRG] Some comments on draft-irtf-panrg-questions-11
X-BeenThere: panrg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Path Aware Networking \(Proposed\) Research Group discussion list" <panrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/panrg>, <mailto:panrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/panrg/>
List-Post: <mailto:panrg@irtf.org>
List-Help: <mailto:panrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/panrg>, <mailto:panrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Nov 2021 04:07:56 -0000

Hi Brian, all,

Thank you for this wonderful IRTF document, which summarizes open
questions in the field of path-aware networking. I have read this document
quickly before and today I read the latest version from the beginning to
Sec. 2.4 with great interest. Below are some comments, whose goals are to
help with understanding, not to slow down the publications of the document.

Sec.  1
- "In the current Internet architecture, ...": Add a citation to give a
snapshot of current?
- "the network layer provides an unverifiable": the meaning of verifiable
is not clear at an early stage. I can think of source address verification,
path property verification, ... It helps to give a citation or list some
example properties. From the second paragraph, it introduces IPSec and TLS.
It helps to clarify early.
- " ... and Software-Defined Wide Area Network (SD-WAN) approaches": give a
citation, such as the B4 paper?
- "In this environment ...": It is not clear what this environment is. To
use the topical sentence, does it mean "Under this architecture"?

- "A transport layer protocol such as TCP ... a protocol above the network
layer ..." It is clear that this sentence is describing existing
extension services on the basic network layer, but it takes effort to
parse.
- "... explicit information about the path is available to the endpoint,
..." This is the first time that the word "path" appears. It helps to
introduce the word path before this. One possibility might be the last
sentence of the preceding paragraph, e.g., "In this environment, an
application can assume that a packet with a given (unicast) destination
address will eventually be forwarded toward that destination along a path, "
- "... about the path is available to the endpoint" -> endpoint(s).
- " assumptions about that path often do not hold ": A reader may wonder
what assumptions they are, and it is not clear who is making the
assumptions. I would put it in a slightly different way: first state the
applications which make assumptions and then state the impacts.

- The next two paragraphs: "... endpoints have the ability to select or
influence the path through the network used by any given packet or flow."
and "Path selection provides explicit visibility and control of
network treatment to applications and users of the network." can be
slightly confusing to read. One suggestion is to move the definitions early
to clarify the concepts and terms, path aware networking and path aware
internetworking.

Sec. 1.1
- "For purposes of this document, "path aware networking" describes
endpoint ": Do want to limit to endpoint (e.g., it can be the controller of
an application consisting of endpoint) or here endpoint is a generic term?
If so, it helps to clarify.
- I spent some time trying to understand the differences between "path
aware networking" and "path aware internetworking". The latter is specified
as "expanding" the former. From the wording, the former consists of
"discovery" and "reaction", and the latter "discovery" and "selection". Is
this the right way to understand? If so, it helps to pinpoint this key
difference.
- "Research into path aware networking..." Does this imply restricting to
"path aware networking", not "path aware internetworking", or it is a
general term from this point on (see first sentence of Sec. 2)?

Sec. 2.1
This is an excellent open question. Some detailed comments:
- "A Vocabulary of Path Properties" => "A Vocabulary of Paths and
Properties"

- 2nd paragraph: Since the focus is cross domains, it helps to add this
aspect in the paragraph to highlight the challenge, e.g.,
"The elements of this vocabulary could include terminology for components
of a path and properties defined for these components, for the entire path,
or for subpaths of a path."
=>
"The elements of this vocabulary could include terminology for components
of a path and properties defined for these components, for the entire path,
for subpath inside each network, or for the interconnection of these
subpaths defining a global path."

- I will see challenges in addition to expressiveness, and it may help to
connect back to the original question (how to represent). Hence, one
suggestion:
"This vocabulary must be defined carefully, as its design will have impacts
on the expressiveness of a given path-aware internetworking
 architecture."
=>
"This vocabulary and its representation must be defined carefully, as its
design will have impacts on properties (e.g., expressiveness,  scalability,
security) of a given path-aware internetworking architecture."

It might be that only paths and path properties are not enough in the basic
vocabulary. For example, with adaptive flows such as TCP/Reno/Cubic, the
congestion control algorithm of the flows can have impact on the path
properties, e.g., path bandwidth share. It might be helpful to include a
sentence in this paragraph.

Sec. 2.2
- A minor point: "how do endpoints and applications get access to accurate,
useful, and trustworthy path properties?" This reads that there is a fixed
path (with contrast to Sec. 2.3).  It helps to clarify that this is the
case.
- A key challenge is composing a single property from segments spanning
multiple networks.
"Once endpoints and networks have a shared vocabulary for expressing path
properties, the network must have some method for distributing those path
properties to the endpoint."
=>
"Once endpoints and networks have a shared vocabulary for expressing path
properties, the network*s* must have some method for distributing those
path properties to the endpoint. Either the networks or the endpoints need
to aggregate subpath properties from multiple networks"

"Regardless of how path property information is distributed to the
endpoints, the endpoints require a method to authenticate the properties --
to determine that they originated from and pertain to the path that they
purport to."
=>
"Regardless of how path property information is distributed to the
endpoints, the endpoints require a method to authenticate the properties --
to determine that they originated from and pertain to the path that they
purport to, even when the path spans multiple networks."

"Possible dimensions in the space of distribution methods include in-band
versus out-of-band, push versus pull versus publish-subscribe, and so on."
=>
"Possible dimensions in the space of distribution methods include in-band
versus out-of-band, push versus pull versus publish-subscribe,
application-aggregation vs network aggregation, and so on."

At this point, I feel that it may help to add an open question from the
network operator's point of view, e.g., how to protect network operator
privacy?

Sec. 2.3
This is a good open question but can be quite broad, in particular in a
cross-domain setting. To me, it includes PCE and QoS routing as special
cases, and hence can be quite challenging. I would limit the scope but
broad scope may be what this document is intended.

Sec. 2.4
Is the interface for applications/endpoints or more broadly?

Thanks for writing the document guiding the community.

Richard