RE: [PCN] PCN & tunnelling

<philip.eardley@bt.com> Wed, 24 October 2007 19:06 UTC

Return-path: <pcn-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IklZ5-0001aK-DT; Wed, 24 Oct 2007 15:06:51 -0400
Received: from pcn by megatron.ietf.org with local (Exim 4.43) id 1IklZ4-0001Vt-4i for pcn-confirm+ok@megatron.ietf.org; Wed, 24 Oct 2007 15:06:50 -0400
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IklZ2-0001SJ-S2 for pcn@ietf.org; Wed, 24 Oct 2007 15:06:49 -0400
Received: from smtp4.smtp.bt.com ([217.32.164.151]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IklZ2-0006mE-6k for pcn@ietf.org; Wed, 24 Oct 2007 15:06:48 -0400
Received: from E03MVZ1-UKDY.domain1.systemhost.net ([193.113.30.63]) by smtp4.smtp.bt.com with Microsoft SMTPSVC(6.0.3790.1830); Wed, 24 Oct 2007 20:06:47 +0100
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Subject: RE: [PCN] PCN & tunnelling
Date: Wed, 24 Oct 2007 20:06:47 +0100
Message-ID: <75A199C5D243C741BF3D3F1EBCEF9BA5019DC5F8@E03MVZ1-UKDY.domain1.systemhost.net>
In-Reply-To: <1B6169C658325341A3B8066E23919E1C0DE924@S4DE8PSAANK.mitte.t-com.de>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [PCN] PCN & tunnelling
Thread-Index: AcgWJ+54M2I8eYc4QJu/kWUfuySz/QABQXZQAA2JTqA=
From: philip.eardley@bt.com
To: Ruediger.Geib@t-systems.com
X-OriginalArrivalTime: 24 Oct 2007 19:06:47.0495 (UTC) FILETIME=[066C8570:01C81671]
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 182294e3fdac3aef093c0503b87ed133
Cc: pcn@ietf.org
X-BeenThere: pcn@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: PCN WG list <pcn.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/pcn>, <mailto:pcn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/pcn>
List-Post: <mailto:pcn@ietf.org>
List-Help: <mailto:pcn-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/pcn>, <mailto:pcn-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1516154670=="
Errors-To: pcn-bounces@ietf.org

Ruediger,

 

Yes, it is a more general problem. I've been trying to read 2983
[diffserv & tunnels] and 3270 [mpls & diffserv - similar kinds of
issues]

 

2983 has 2 conceptual models, Uniform & Pipe:

- Uniform: tunnel is an artefact on the e2e path from a traffic
conditioning viewpoint; pkt effectively has one DS field that's used for
traffic conditioning. Copy DSCP value to the outer header at encaps and
copy outer header's dscp value to inner IP header at decaps. 

- Pipe: IP tunnel hides the nodes so they don't really participate in
traffic conditioning. Tunnel egress ignores the outer header's dscp &
uses the inner header's DSCP (or rather the traffic conditioning info it
conveys - to cover the case where the same meaning is encoded by
different values of dscp). Tunnel links DS domains at end points into a
diffserv region ('virtually' contiguous). 

 

When it comes to PCN & tunnels, something analogous to the Uniform model
seems more appropriate to me - ie the pkt effectively has one field for
PCN-marking that's used for PCN-based adm ctrl (& termination); the
operation is at decaps, if the outer header's PCN-marking is more severe
than the inner IP header's, then copy it to the inner IP header. 

At least I think the Uniform model is best for the normal (?) case where
the tunnel is within the PCN-domain - because we want all nodes in the
PCN-domain to be able potentially to PCN-mark & hence contribute to the
adm ctrl decisions. If the tunnel is partly within a PCN-domain and
partly outside I think the uniform model is still the right one (not too
sure - there are lots of things complicating it, some of which mentioned
in first email below, but I think the conceptual model should still be
the same]. 

 

Ruediger: question about what you call 'downpropagation', I assume this
is the copying operation I refer to in the Uniform model. I agree with
you for PCN marking [text is already in the archit draft on these
lines]. However, you also mention downpropagation of DSCP which I don't
think is correct. 

 

Ruediger, you mention where the DSCP values have different meanings at
the tunnel ingress & egress (tunnel crosses a diffserv domain boundary).
Yes, I believe this is a general diffserv issue and is covered by 2475.

 

phil

 

-----Original Message-----
From: Geib, Ruediger [mailto:Ruediger.Geib@t-systems.com] 
Sent: 24 October 2007 12:10
To: Eardley,PL,Philip,CXR9 R
Cc: pcn@ietf.org
Subject: RE: [PCN] PCN & tunnelling

 

Phil,

 

I guess this is a general DiffServ issue too. In case [2] you assume the
same DSCP to be used by the tunnel end point PCN domain as at the tunnel
entry. This assumption may not hold, if the set DSCP is used for another
service class or unused at the end point. 

 

I had a brief glance on RFC2983, "Differentiated Services and Tunnels".
Downpropagation of outer IP header DSCP/PCN settings may be a fairly
good recommendation.

 

Regards,

 

Rudiger

	-----Original Message-----
	From: philip.eardley@bt.com [mailto:philip.eardley@bt.com]
	Sent: Wednesday, October 24, 2007 12:24 PM
	To: pcn@ietf.org
	Subject: [PCN] PCN & tunnelling

	Hi,

	 

	I was chatting with Bob about section 5.8 tunnelling. We've
realised there's the following nasty case which we hadn't thought about.
The scenario is when a tunnel starts inside a PCN-domain and finishes
outside it. 

	 

	First we follow what happens when the current text is followed.
Imagine that the pkt is PCN-marked by some PCN-node before the tunnel
start node. On encapsulation the PCN-mark is copied onto the outer
header. Hence the PCN-egress-node 'sees' the PCN-mark as normal - this
is ok. The PCN-egress-node clears the marking in the (outer) header and
forwards the pkt into the next domain. The pkt is decapsulated at the
tunnel end point. But the decapsulated pkt is already PCN-marked.
Potential problems: [1] if it's decapsulated in a non-PCN-domain, then
the pkt may confuse nodes in this domain [depending on what encoding is
used for a PCN-mark] ; [2] if it's decapsulated in a PCN-domain, then
the pkt is PCN-marked [which might lead this PCN-domain to terminate or
block a flow unnecessarily].

	 

	The problem arises because the PCN-egress-node clears
PCN-marking on the outer header but not on the inner header. (This is a
new problem compared with ECN & tunnelling.) 

	 

	Possible solution: if the pkt is PCN-marked, then the tunnel
start node checks whether the tunnel egress is inside or outside the
PCN-domain - if it's outside, then it clears the PCN-marking on the
inner header (effectively it does this on behalf of the
PCN-egress-node). (Also, the PCN-mark is copied onto the outer header,
as the current text says.)

	 

	Thoughts?

	 

	Thanks,

	Phil/  

_______________________________________________
PCN mailing list
PCN@ietf.org
https://www1.ietf.org/mailman/listinfo/pcn