[PCN] Explanation of changes in the PCN edge behaviour drafts

Tom Taylor <tom.taylor.stds@gmail.com> Wed, 21 March 2012 19:08 UTC

Return-Path: <tom.taylor.stds@gmail.com>
X-Original-To: pcn@ietfa.amsl.com
Delivered-To: pcn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8883321E80B0 for <pcn@ietfa.amsl.com>; Wed, 21 Mar 2012 12:08:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.523
X-Spam-Level:
X-Spam-Status: No, score=-3.523 tagged_above=-999 required=5 tests=[AWL=0.076, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4C7E2uxLIFry for <pcn@ietfa.amsl.com>; Wed, 21 Mar 2012 12:08:40 -0700 (PDT)
Received: from mail-gx0-f172.google.com (mail-gx0-f172.google.com [209.85.161.172]) by ietfa.amsl.com (Postfix) with ESMTP id E500C21F8601 for <pcn@ietf.org>; Wed, 21 Mar 2012 12:08:39 -0700 (PDT)
Received: by ggmi1 with SMTP id i1so1401762ggm.31 for <pcn@ietf.org>; Wed, 21 Mar 2012 12:08:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:subject :content-type:content-transfer-encoding:x-antivirus :x-antivirus-status; bh=/DfqUvObih4S/3r5YWmXOZC732fQi6vXZzjYdDiHcgg=; b=GeVmUDAgszkw6LrDTDXxWrMfBqjliSkkeXCJKU1yqBFc4bLYjb+ETZbsgMuyJpja8O qyCBZS5S36Np9EoI8fl2n94BmUm1vigxDqu7Uos9SVoPM5tiAdO+q78t9Of6qUb0Q2En /UGdcxN2icqDW7+CUlxzYlFsu509cWoTbGBs0H/bKaWg/9A3T0zdmN+i31ODYt/OAdg0 p197bZ3xzwzeXAFKlRD/3kxIiSD4m+gHUQi5/DYuToefdHpCkvxmOVj0Bw/Fgvr2kbks S8rCrDz5OP5/jJ3bpt8NIdkt36XQs9X9d3DAxZEEM6H0I3DMJR3vtyNSyN8aDRQPDLak 5RDQ==
Received: by 10.236.144.134 with SMTP id n6mr5208186yhj.45.1332356919438; Wed, 21 Mar 2012 12:08:39 -0700 (PDT)
Received: from [127.0.0.1] (dsl-173-206-3-29.tor.primus.ca. [173.206.3.29]) by mx.google.com with ESMTPS id 2sm3253127ane.12.2012.03.21.12.08.37 (version=TLSv1/SSLv3 cipher=OTHER); Wed, 21 Mar 2012 12:08:38 -0700 (PDT)
Message-ID: <4F6A2736.8040403@gmail.com>
Date: Wed, 21 Mar 2012 15:08:38 -0400
From: Tom Taylor <tom.taylor.stds@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:10.0.2) Gecko/20120216 Thunderbird/10.0.2
MIME-Version: 1.0
To: pcn <pcn@ietf.org>, David Harrington <ietfdbh@comcast.net>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Antivirus: avast! (VPS 120321-0, 21/03/2012), Outbound message
X-Antivirus-Status: Clean
Subject: [PCN] Explanation of changes in the PCN edge behaviour drafts
X-BeenThere: pcn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: PCN WG list <pcn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pcn>, <mailto:pcn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pcn>
List-Post: <mailto:pcn@ietf.org>
List-Help: <mailto:pcn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pcn>, <mailto:pcn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Mar 2012 19:08:41 -0000

All changes apply to both documents except for the change in description 
of the factor U, which is SM-specific.

David, you may not have been aware of the need for item 10. Please 
verify that it is OK.

Hope everyone is happy with the changes. Please note additional fixes 
called out at the end of item 13. I think these can be taken care of in 
AUTH 48.

Changes

1. Added text in the introduction to describe the experiment (requested 
by Pete Resnick).

2. Lower-cased a MUST in the paragraph following the new text, talking 
about the need to fill out a per-hop behaviour template. (Part of an 
attempt to clean out unnecessary RFC 2119 language mentioned by two ADs.)

3. Trivial: replaced all t- and T- names for timers and durations with 
t_ and T_ as suggested by Stephen Farrell to avoid confusion with 
arithmetic operations. (Actually missed a few in the CL draft and will 
have to get them in AUTH 48.)

4. First line of Section 3.2.1: replaced "MUST" with "needs to" for 
metering. Changed "informational note" to "Note" after the bullets (both 
at Pete Resnick's suggestion).

5. Section 3.3, first paragraph, talking about support of flow admission 
and termination mechanisms: changed "A Decision Point MUST support both 
mechanisms, but ..." to "If a Decision Point supports both mechanisms, 
...". (Pete Resnick -- couldn't see any interoperability issue to 
justify the MUST.)

6. Section 3.3.3, talking about failure to receive a response from the 
ingress node. Rewrote in an attempt both to satisfy Pete Resnick's 
concern about over-use of mandatory language and to make the mandatory 
procedures clearer.

OLD

    A centralized Decision Point SHOULD start a timer t-sndFail when it
    sends a request for the estimated value of PCN-sent-rate to a given
    PCN-ingress-node.  If the Decision Point fails to receive a response
    from the PCN-ingress-node before t-sndFail reaches the configurable
    value T-crit, the Decision Point SHOULD repeat the request but MAY
    also use ETM-rate as an estimate of the amount of traffic to be
    terminated in place of the quantity

       PCN-sent-rate - SAR

    specified in Section 3.3.2.  Because this will over-estimate the
    amount of traffic to be terminated due to dropping of PCN-packets by
    interior nodes, the Decision Point SHOULD use multiple rounds of
    termination under these circumstances.  If the second request to the
    PCN-ingress-node also fails, the Decision Point SHOULD notify
    management.

       The use of T-crit is an approximation.  A more precise limit would
       be of the order of two round-trip times, plus an allowance for
       processing at each end, plus an allowance for variance in these
       values.

NEW

    If a centralized Decision Point sends a request for the estimated
    value of PCN-sent-rate to a given PCN-ingress-node and fails to
    receive a response in a reasonable amount of time, the Decision Point
    SHOULD repeat the request once.  While waiting after sending this
    second request, the Decision Point MAY begin selecting flows to
    terminate, using ETM-rate as an estimate of the amount of traffic to
    be terminated in place of the quantity

       PCN-sent-rate - SAR

    specified in Section 3.3.2.  Because ETM-rate will over-estimate the
    amount of traffic to be terminated due to dropping of PCN-packets by
    interior nodes, the Decision Point SHOULD terminate less than the
    full amount ETM-rate in the first pass and recalculate the additional
    amount to terminate in additional passes based on subsequent reports
    from the PCN-egress-node.  If the second request to the PCN-ingress-
    node also fails, the Decision Point MUST select flows to terminate
    based on the ETM-rate approximation as just described and should
    notify management.

       The response timer t_sndFail with upper bound T_crit is specified
       in Section 3.5.  The use of T_crit is an approximation.  A more
       precise limit would be of the order of two round-trip times, plus
       an allowance for processing at each end, plus an allowance for
       variance in these values.

7. Section 3.4, note giving an example of how the PCN-ingress-node does 
its estimate: changed the "MAY" to a "can".

8. Section 3.5, action for expiry of t_sndFail: referred back to Section 
3.3.3 instead of the previous inaccurate summary of a fairly complex 
procedure.

9. Removed all RFC 2119 language from Section 4 (the per-hop behaviour 
section). Originally responding to a comment by Sean Turner that Section 
4.2.1 claimed to paraphrase RFC 5559 but had such language where RFC 
5559 did not. Decided that it wasn't necessary elsewhere in the section, 
either.

10. Based on discussion of the 3-in-1 draft, at Bob Briscoe's request, 
changed section 4.2.1 to focus only on the tunneling option and the 
resulting non-problem with use of ECN bits.

OLD

    Packets at the ingress to the domain are classified as either PCN or
    non-PCN.  Non-PCN packets MAY share the network with PCN packets
    within the domain.  Because the encoding specified in [RFC5696] and
    used in this document requires the use of the ECN fields, PCN-
    ingress-nodes MUST prevent ECN-capable traffic that uses the same
    DSCP as PCN from entering the PCN-domain directly.  The PCN-ingress-
    node can accomplish this in three ways.  The choice between these
    depends on local policy.

    o  ECN-capable traffic MAY be dropped.  This policy is NOT
       RECOMMENDED, since it prevents the proper operation of end-to-end
       ECN as a means of controlling congestion.

    o  ECN-capable traffic MAY be assigned a different DSCP from PCN
       traffic.  This could mean that it is relegated to a lower-priority
       behaviour aggregate.

    o  ECN-capable traffic MAY be tunneled across the PCN-domain.  If
       this is done, the PCN-ingress-node MUST mark packets as either
       not-PCN or PCN-not-marked only after the encapsulation of the
       packet, including any initial setting of the ECN field, has been
       completed.

NEW

    Packets at the ingress to the domain are classified as either PCN or
    non-PCN.  Non-PCN packets can share the network with PCN packets
    within the domain.  The encoding specified in [RFC5696] and used in
    this document requires the use of the ECN fields.  PCN-ingress-nodes
    need to prevent ECN-capable traffic that uses the same DSCP as PCN
    from entering the PCN-domain directly.  This is not an issue when
    tunneling of PCN-packets between the PCN-ingress-node and the PCN-
    egress-node is done, as recommended in Section 5.1.2, provided that
    the original ECN markings of arriving packets are preserved in the
    encapsulated headers.

11. In the next paragraph, originally said that PCN packets of 
non-admitted flows are dropped. Replaced this with "blocked" and a 
backward reference to the definition of blocking in Section 1. 
(Follow-through on comments by Brian Carpenter, fixed elsewhere.

12. Section 4.7: originally said PCN use of ECN bits could interfere 
with the end-to-end use of ECN. Replaced with the following text:

    The PCN CL per-domain behaviour could theoretically interfere with
    the use of end-to-end ECN due to reuse of ECN bits for PCN marking.
    However, this is not a problem in practice because of the need to
    tunnel PCN-packets from ingress to egress (see Section 5.1.2).  The
    encapsulated header can retain the original ECN markings as received
    at the PCN-ingress-node, leaving the ECN bits in the encapsulating
    header fully available for use by PCN.

13. Section 5.1.3, basically editorial rearrangement of text to take 
account of the fact that the ingress node will always perform 
encapsulation. Talking about extensions to the DiffServ MIB.

OLD

    ... The required
    extensions specifically include objects for re-marking the ECN field
    at the PCN-ingress-node and an extension to the classifiers to
    include the ECN field at PCN-interior and PCN-egress-nodes.  In
    addition, the MIB has to be extended to include a potential
    encapsulation action following re-classification by ingress-egress-
    aggregate.  Finally, a new metering algorithm may need to be defined
    at the PCN-interior-nodes to handle excess-traffic-marking.

NEW

    ... The required
    extensions specifically include an encapsulation action following re-
    classification by ingress-egress-aggregate.  In addition, the MIB has
    to be extended to include objects for marking the ECN field in the
    outer header at the PCN-ingress-node and an extension to the
    classifiers to include the ECN field at PCN-interior and PCN-egress-
    nodes.  Finally, new metering algorithms may need to be defined at
    the PCN-interior-nodes to handle threshold-marking and packet-size-
    independent excess-traffic-marking.

*Oops noted* -- that text was taken from the SM document. Have to remove 
the reference to threshold-marking, and have to mark that point 
"[CL-specific]" in the CL document.

*Speaking of oops*: Section 5.1.1 still talks about the operator having 
to decide whether to use tunneling. Should that stay or go?

14. Security consideration added (Section 6), in response to comments by 
two ADs. Section now reads:

    [RFC5559] provides a general description of the security
    considerations for PCN.  This memo introduces one new consideration,
    related to the use of a centralized Decision Point.  The Decision
    Point itself is a trusted entity.  However, its use implies the
    existence of an interface on the PCN-ingress-node through which
    communication of policy decisions takes place.  That interface is a
    point of vulnerability which must be protected from denial of service
    attacks.

15. Fixed reference Mele12, naming the journal in which the article will 
appear.

16. SM-specific change in Section 3.3.2 to improve the description of 
the factor U. The new text reads:

    1.  [SM-specific] The sustainable aggregate rate (SAR) for the given
        ingress-egress-aggregate is estimated using the formula:

           SAR = U * NM-Rate

        for the latest reported interval, where U is a configurable
        factor greater than one which is the same for all ingress-egress-
        aggregates.  In effect, the value of the PCN-supportable-rate for
        each link is approximated by the expression

           U*PCN-admissible-rate

        rather than being calculated explicitly.