Re: [pcp] FW: New Version Notification for draft-vinapamula-flow-ha-01.txt

Suresh Kumar Vinapamula Venkata <sureshk@juniper.net> Mon, 11 August 2014 18:36 UTC

Return-Path: <sureshk@juniper.net>
X-Original-To: pcp@ietfa.amsl.com
Delivered-To: pcp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 74A5E1A0761 for <pcp@ietfa.amsl.com>; Mon, 11 Aug 2014 11:36:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jJokWGOHuY8C for <pcp@ietfa.amsl.com>; Mon, 11 Aug 2014 11:36:36 -0700 (PDT)
Received: from na01-bn1-obe.outbound.protection.outlook.com (mail-bn1lp0145.outbound.protection.outlook.com [207.46.163.145]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 213CA1A075B for <pcp@ietf.org>; Mon, 11 Aug 2014 11:36:33 -0700 (PDT)
Received: from CO1PR05MB284.namprd05.prod.outlook.com (10.141.70.144) by CO1PR05MB282.namprd05.prod.outlook.com (10.141.70.148) with Microsoft SMTP Server (TLS) id 15.0.1005.10; Mon, 11 Aug 2014 18:36:25 +0000
Received: from CO1PR05MB284.namprd05.prod.outlook.com ([10.141.70.144]) by CO1PR05MB284.namprd05.prod.outlook.com ([10.141.70.144]) with mapi id 15.00.1005.008; Mon, 11 Aug 2014 18:36:26 +0000
From: Suresh Kumar Vinapamula Venkata <sureshk@juniper.net>
To: "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>
Thread-Topic: [pcp] FW: New Version Notification for draft-vinapamula-flow-ha-01.txt
Thread-Index: AQHPh106u/PcvthDCk26TaHNEsrzH5tvN7qAgFYJUICAAWREkIAE/OoA
Date: Mon, 11 Aug 2014 18:36:25 +0000
Message-ID: <D00A75EE.49479%sureshk@juniper.net>
In-Reply-To: <913383AAA69FF945B8F946018B75898A283031F5@xmb-rcd-x10.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.3.2.130206
x-originating-ip: [66.129.239.14]
x-microsoft-antispam: BCL:0;PCL:0;RULEID:;UriScan:;
x-forefront-prvs: 03008837BD
x-forefront-antispam-report: SFV:NSPM; SFS:(6009001)(189002)(199002)(51704005)(24454002)(377424004)(479174003)(377454003)(107046002)(92566001)(4396001)(110136001)(101416001)(46102001)(2656002)(87936001)(50986999)(64706001)(80022001)(66066001)(76482001)(99396002)(54356999)(85306004)(19580395003)(79102001)(77982001)(19580405001)(20776003)(83322001)(81342001)(106116001)(92726001)(81542001)(105586002)(15975445006)(36756003)(99286002)(83072002)(85852003)(21056001)(95666004)(15202345003)(86362001)(106356001)(31966008)(74502001)(74662001)(83506001); DIR:OUT; SFP:; SCL:1; SRVR:CO1PR05MB282; H:CO1PR05MB284.namprd05.prod.outlook.com; FPR:; MLV:sfv; PTR:InfoNoRecords; MX:1; LANG:en;
Content-Type: text/plain; charset="Windows-1252"
Content-ID: <DE84A6E7D9EF5949957FA51FE1F41647@namprd05.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
Archived-At: http://mailarchive.ietf.org/arch/msg/pcp/7LQnZ7TnARp2lxIpOf3rKYYddKs
Cc: "pcp@ietf.org" <pcp@ietf.org>
Subject: Re: [pcp] FW: New Version Notification for draft-vinapamula-flow-ha-01.txt
X-BeenThere: pcp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: PCP wg discussion list <pcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pcp>, <mailto:pcp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pcp/>
List-Post: <mailto:pcp@ietf.org>
List-Help: <mailto:pcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pcp>, <mailto:pcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Aug 2014 18:36:38 -0000

Thanks for your comments. Please see inline.

On 8/8/14 1:22 AM, "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>
wrote:

>Hi Suresh,
>
>Comments:
>
>[1] What is the reason for updating the reserved field in the PCP Common
>Request Packet Format ?
>A new PCP option can also be defined to signal if it's a critical flow or
>not.

Suresh> Yes, a PCP option can also be used and we thought about it. We
were debating if option would be an overkill, as there is nothing
negotiated unlike other options, while indicating checkpointing. We are
debating on the use cases where bit is not sufficient and an option is
required. Please let us know if you think of cases where bit will not work.
>
>[1b] It may help the client to know if the flow is check pointed or not,
>this way the client can make a decision to prioritize the flows
>accordingly when multiple interfaces with associated PCP servers are
>involved.

Suresh> A reserve bit in the PCP response can indicate that PCP server
honored PCP checkpoint request or not. Will update the draft.
>
>[1c] Success or fail response ((e.g. Quota exceeded) from PCP server can
>also help the client to remove check pointing for some of the existing
>flows so as to check point new flows.
Suresh> Would response to 1b handle it?
>
>[2] This document describes a mechanism for a host to signal various
>   network functions' High Availability (HA) module to checkpoint
>   interested connections through PCP.
>
>Comment> The above line is not clear.

Suresh> Not sure what is not clear, What I meant to say here is, this
document provides a mechanism to signal any network functions' (firewall
NAT IPSec etcŠ) high availability module for checkpointing interested
connections by host. If this is still not clear, can you please be more
specific?

> 
>
>[3]   Internet service continuity is critical in service provider
>        environment.  To achieve this, most service providers have active-
>        backup systems.
>
>Comment> Enterprise networks also typically deploy Active-Standby.
Suresh> Ok will update document.
> 
>
>[4] For service continuity of those connections on backup
>   when active fail, that corresponding state had to be checkpointed on
>   the backup.
>
>Nit> Replace "fail" with "fails"
Suresh> ok.
>
>[5]   Typically, this is addressed by identifying long lived connections
>        and checkpointing state of only those connections that lived long
>         enough, to the backup for service continuity.
>
>Comment> You may want to add that identification is also done by DPI,
>which fails with encrypted traffic.
Suresh> ok
>
>[6]   2.  A connection may not be long lived but critical like shorter
>       phone conversations.
>
>Comment> Replace "phone conversation" with "VOIP conversation"
Suresh> ok
>
>[7]     3.  Similarly not every long lived connection need to be critical,
>       say a free-service connection of a hosted service need not be
>       checkpointed while a paid-service connection has to be
>       checkpointed.
>
>Comment> Why would the application client differentiate and not signal
>that it's a critical flow in both the cases. Are you envisioning that the
>application client software makes this decision internally or it involves
>human intervention from some UI to signal to the network that it's a
>critical flow.
Suresh> Human intervention may or may not be required. What involves in
signaling is out of scope and is left for implementation. For example, a
hosted service knows if the subscriber is a free subscriber or a paid
subscriber. A policy may be enforced to automatically trigger checkpoint
if the service requested is from a paid subscriber and not trigger if the
service requested is from a free subscriber. As another example, a human
may be given a choice for signaling, just like human intervention when a
location based services app is launched. Or in some cases application may
decide. And, one may come up with an even smarter way of when to signal.
So, what involves in signaling is left for implementation and is of scope
of this document. However, I can mention the above as examples, if
required.
>
>[8] How would this work when PCP authentication is used ?
>(I mean will authentication related info be also check pointed or client
>will have to authenticate afresh when backup becomes active and other
>related issues.)
Suresh> I would not expect another authentication to happen. The
implementation should ensure all the necessary state is check pointed on
backup so that it doesn¹t need to re authenticate.
>
>[9]   1.  Disruption in a phone connection is not desired.  Application
>       that is initiating a phone connection MUST mark connection HA bit
>       in the header, while initiating a PCP request for checkpointing.
>
>Comment> Are you referring to VoIP signaling connection ?
Suresh> I am referring to VOIP signaling and data.
>
>[10]   2.  Similarly disruption in media streaming is not desired.  A user
>       hosting a media service, MUST mark HA bit in the header while
>       initiating a mapping request, and MAY mark connection associated
>       with that mapping, depending on whether the connection is from a
>       paid subscriber or from a free subscriber through a PEER request.
>       So checkpointing mapping doesn't result in auto checkpointing of
>       connections, as it gives flexibility to the end user to pick
>       specific connections only to checkpoint.
>
>Comment> I am not sure why this distinction is required b/w free and paid
>VoIP calls, free call could also be an emergency call or high-priority
>call.
Suresh> In this context, media streaming refers to streaming services like
netflix, hulu, yupptv, spotify or some privately owned services etcŠ Yes,
emergency calls are free and are high priority and implementor can always
initiate checkpointing for those calls. And, I am not sure why you are
relating them here? Am I missing something?
>
>6.   In conjunction with NAT, other network functions that MAY maintain
>   state for each conneciton such as Stateful Firewall, IPSec, Load
>   balancing etc..., MAY register to PCP server, and MAY be triggered
>   for checkpointing respective state of that connection.
>
>Comment1> Are there stateless firewalls ?
Suresh> Yes, simple packet filters or ASIC based firewall etcŠ

>Comment 2> I did not understand this draft usage with load balancers and
>IPSec.
Suresh> Suppose IPSec as a gateway service along with firewall and NAT.
IPSec may register with PCP, such that IPSec's HA module will be triggered
by PCP server to checkpoint state associated with a flow, when a PCP
request for that flow with HA bit set is received.
Similarly for load balancing.
>
>Cheers,
>-Tiru
>
>
>> 
>> On 6/13/14 4:19 PM, "Suresh Kumar Vinapamula Venkata"
>> <sureshk@juniper.net> wrote:
>> 
>> >Hi
>> >
>> >This new version of draft address review comments received on the
>> >previous version. Kindly review.
>> >Sorry for the delay.
>> >
>> >Thanks
>> >Suresh
>> >
>> >On 6/13/14 4:14 PM, "internet-drafts@ietf.org"
>> ><internet-drafts@ietf.org>
>> >wrote:
>> >
>> >>
>> >>A new version of I-D, draft-vinapamula-flow-ha-01.txt has been
>> >>successfully submitted by Suresh Vinapamula and posted to the IETF
>> >>repository.
>> >>
>> >>Name:		draft-vinapamula-flow-ha
>> >>Revision:	01
>> >>Title:		Flow high availability through PCP
>> >>Document date:	2014-06-13
>> >>Group:		Individual Submission
>> >>Pages:		6
>> >>URL:
>> >>http://www.ietf.org/internet-drafts/draft-vinapamula-flow-ha-01.txt
>> >>Status:
>> >>https://datatracker.ietf.org/doc/draft-vinapamula-flow-ha/
>> >>Htmlized:       http://tools.ietf.org/html/draft-vinapamula-flow-ha-01
>> >>Diff:
>> >>http://www.ietf.org/rfcdiff?url2=draft-vinapamula-flow-ha-01
>> >>
>> >>Abstract:
>> >>   This document describes a mechanism for a host to signal various
>> >>   network functions' High Availability (HA) module to checkpoint
>> >>   interested connections through PCP.
>> >>
>> >>
>> >>
>> >>
>> >>
>> >>Please note that it may take a couple of minutes from the time of
>> >>submission until the htmlized version and diff are available at
>> >>tools.ietf.org.
>> >>
>> >>The IETF Secretariat
>> >>
>> >
>> >_______________________________________________
>> >pcp mailing list
>> >pcp@ietf.org
>> >https://www.ietf.org/mailman/listinfo/pcp
>