Re: [pcp] TR: I-D Action: draft-vinapamula-flow-ha-05.txt

Suresh Kumar Vinapamula Venkata <sureshk@juniper.net> Tue, 21 October 2014 19:10 UTC

Return-Path: <sureshk@juniper.net>
X-Original-To: pcp@ietfa.amsl.com
Delivered-To: pcp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7AF321A01F0 for <pcp@ietfa.amsl.com>; Tue, 21 Oct 2014 12:10:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zOV1QYpHMpFD for <pcp@ietfa.amsl.com>; Tue, 21 Oct 2014 12:10:24 -0700 (PDT)
Received: from na01-bn1-obe.outbound.protection.outlook.com (mail-bn1bon0753.outbound.protection.outlook.com [IPv6:2a01:111:f400:fc10::1:753]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DC65D1A01A8 for <pcp@ietf.org>; Tue, 21 Oct 2014 12:10:23 -0700 (PDT)
Received: from DM2PR05MB286.namprd05.prod.outlook.com (10.141.101.12) by DM2PR05MB781.namprd05.prod.outlook.com (10.141.179.139) with Microsoft SMTP Server (TLS) id 15.0.1054.13; Tue, 21 Oct 2014 19:10:00 +0000
Received: from DM2PR05MB288.namprd05.prod.outlook.com (10.141.101.11) by DM2PR05MB286.namprd05.prod.outlook.com (10.141.101.12) with Microsoft SMTP Server (TLS) id 15.0.1049.19; Tue, 21 Oct 2014 19:09:58 +0000
Received: from DM2PR05MB288.namprd05.prod.outlook.com ([10.141.101.11]) by DM2PR05MB288.namprd05.prod.outlook.com ([10.141.101.11]) with mapi id 15.00.1049.012; Tue, 21 Oct 2014 19:09:58 +0000
From: Suresh Kumar Vinapamula Venkata <sureshk@juniper.net>
To: "Reinaldo Penno (repenno)" <repenno@cisco.com>, "Prashanth Patil (praspati)" <praspati@cisco.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "pcp@ietf.org" <pcp@ietf.org>
Thread-Topic: [pcp] TR: I-D Action: draft-vinapamula-flow-ha-05.txt
Thread-Index: AQHP7S3QZRNhohXfuUSkYfgN+OnwDpw6ZceAgABViAD//7otAA==
Date: Tue, 21 Oct 2014 19:09:57 +0000
Message-ID: <D06BF274.53F30%sureshk@juniper.net>
In-Reply-To: <D06BF17D.47A1%repenno@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.3.2.130206
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [66.129.239.10]
x-microsoft-antispam: BCL:0;PCL:0;RULEID:;SRVR:DM2PR05MB286;UriScan:;
x-exchange-antispam-report-test: UriScan:;
x-forefront-prvs: 0371762FE7
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(189002)(24454002)(377424004)(199003)(479174003)(377454003)(55784002)(51704005)(105586002)(561944003)(4396001)(120916001)(87936001)(85306004)(99396003)(99286002)(2501002)(21056001)(36756003)(85852003)(80022003)(31966008)(2656002)(46102003)(19580405001)(95666004)(230783001)(19580395003)(76482002)(40100003)(15975445006)(122556002)(20776003)(101416001)(107046002)(106356001)(86362001)(50986999)(64706001)(106116001)(54356999)(92726001)(2201001)(92566001)(97736003)(66066001)(107886001)(15202345003); DIR:OUT; SFP:1102; SCL:1; SRVR:DM2PR05MB286; H:DM2PR05MB288.namprd05.prod.outlook.com; FPR:; MLV:sfv; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
Content-Type: text/plain; charset="utf-8"
Content-ID: <9922E45C7056BB44B482476270D9597A@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Microsoft-Antispam: BCL:0;PCL:0;RULEID:;SRVR:DM2PR05MB781;
X-OriginatorOrg: juniper.net
Archived-At: http://mailarchive.ietf.org/arch/msg/pcp/YKlZij-cM8lZ29lqE4yVIN6AUJs
Subject: Re: [pcp] TR: I-D Action: draft-vinapamula-flow-ha-05.txt
X-BeenThere: pcp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: PCP wg discussion list <pcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pcp>, <mailto:pcp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pcp/>
List-Post: <mailto:pcp@ietf.org>
List-Help: <mailto:pcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pcp>, <mailto:pcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Oct 2014 19:10:28 -0000

Hi Reinaldo, 

It is not application alone, along with application it is also end user
where ever necessary will help in identifying which flows are critical.
Let me give couple of examples.

Example 1:
Consider Netflix app is the application that has ability to support this
functionality.
The same app is installed in three UEs A B and C. For A it is critical and
doesn’t want interruption and for B it is not, and for C only some
programs are critical.
At the time of installing this App, this can be provisioned. When netflix
starts streaming 
1) It may request user for checkpointing only in case of C.
2) Incase of A all flows are critical. Limiting number of flows to
checkpoint will ensure that UE doesn’t exceed his limit.
3) In case of B it is not an issue as none of these flows are critical for
checkpointing.

Example 2:
Suppose end user is providing a media streaming service. Subscriptions
could be like gold, silver, bronze.
To provide best quality of service, policies are configured such that
1) all the flows associated with gold subscription should be check pointed.
2) Only some flows associated with silver subscription is check pointed.
3) None of the flows associated with bronze subscription is check pointed.
When a user logs in for streaming service, based on login credentials he
may fall into one of those buckets, and according to the configured
policy, his associated streaming flows are automatically check pointed.

Example 3:
Similarly a phone app may provide ability to checkpoint flows associated
with phone calls.
No matter what is configured, some calls are always check pointed, say
call to 911. Application has to identify such calls.

In short the point I wanted to make is,

1) Application has ability to checkpoint.
2) Application has some default setting and should be programmable.
3) Exposing and enforcing these features is application specific.
4) If applications don’t honor this, they are treated as rogue
applications.
5) To ensure users don’t exceed their quota (knowingly/unknowingly) limits
are enforced.

Please let me know if the above makes sense.

Thanks
Suresh


On 10/21/14 11:19 AM, "Reinaldo Penno (repenno)" <repenno@cisco.com> wrote:

>In all fairness this does not quite answers the question. What precludes
>every single appellation from requesting their flows to be checkpointerd
>and defeating the original purpose of the new option.
>
>On 10/21/14, 11:13 AM, "Suresh Kumar Vinapamula Venkata"
><sureshk@juniper.net> wrote:
>
>>Hi Prashanth, 
>>
>>Thanks for your comment.
>>
>>It is not just the application alone, it is application and end user of
>>that application(where ever applicable) decides if a flow associated with
>>that application is business critical.
>>An application may have a default setting, and may be programmable by end
>>user. Way to program the application is application specific, such as,
>>
>>1) Change default settings while installing that application.
>>2) Popup window to confirm when ever an application is launched.
>>3) Some of them are critical and will not be altered. Say for example a
>>call to 911 is critical.
>>Etc...
>>
>>Configuration of these settings are very similar to configuration of
>>location services by various apps in your iPhone, options to handle popup
>>windows in browsers etc...
>>
>>-Suresh
>>
>>
>>On 10/21/14 5:52 AM, "Prashanth Patil (praspati)" <praspati@cisco.com>
>>wrote:
>>
>>>My concern with the proposal is that that an application will always
>>>choose to checkpoint its flows. Why would an application ever consider
>>>otherwise i.e. consider its flow not critical?
>>>The draft suggests "Administration SHOULD restrict the number of
>>>connections that can be elected to be backed up and the rate of
>>>check-pointing on per PCP client.", which doesn¹t really address the
>>>above
>>>problem.
>>>
>>>
>>>-Prashanth
>>>
>>>On 10/21/14 12:22 PM, "mohamed.boucadair@orange.com"
>>><mohamed.boucadair@orange.com> wrote:
>>>
>>>>Dear all,
>>>>
>>>>An updated version is available online. (comments received during the
>>>>interim meeting were addressed in a previous version)
>>>>
>>>>This version is ready for adoption.
>>>>
>>>>Cheers,
>>>>Med
>>>>
>>>>-----Message d'origine-----
>>>>De : I-D-Announce [mailto:i-d-announce-bounces@ietf.org] De la part de
>>>>internet-drafts@ietf.org
>>>>Envoyé : mardi 21 octobre 2014 08:06
>>>>À : i-d-announce@ietf.org
>>>>Objet : I-D Action: draft-vinapamula-flow-ha-05.txt
>>>>
>>>>
>>>>A New Internet-Draft is available from the on-line Internet-Drafts
>>>>directories.
>>>>
>>>>
>>>>        Title           : Application-Initiated Flow High Availability
>>>>Awareness through PCP
>>>>        Authors         : Suresh Vinapamula
>>>>                          Senthil Sivakumar
>>>>                          Mohamed Boucadair
>>>>                          Tirumaleswar Reddy
>>>>	Filename        : draft-vinapamula-flow-ha-05.txt
>>>>	Pages           : 9
>>>>	Date            : 2014-10-20
>>>>
>>>>Abstract:
>>>>   This document specifies a mechanism for a host to signal via Port
>>>>   Control Protocol (PCP) which connections should be protected against
>>>>   network failures.  These connections will be elected to be subject
>>>>to
>>>>   high availability mechanisms enabled at the network side.
>>>>
>>>>   This approach assumes that applications/users have more visibility
>>>>   about sensitive connections rather than any heuristic that can be
>>>>   enabled at the network side to guess which connections should be
>>>>   secured.
>>>>
>>>>
>>>>
>>>>The IETF datatracker status page for this draft is:
>>>>https://datatracker.ietf.org/doc/draft-vinapamula-flow-ha/
>>>>
>>>>There's also a htmlized version available at:
>>>>http://tools.ietf.org/html/draft-vinapamula-flow-ha-05
>>>>
>>>>A diff from the previous version is available at:
>>>>http://www.ietf.org/rfcdiff?url2=draft-vinapamula-flow-ha-05
>>>>
>>>>
>>>>Please note that it may take a couple of minutes from the time of
>>>>submission
>>>>until the htmlized version and diff are available at tools.ietf.org.
>>>>
>>>>Internet-Drafts are also available by anonymous FTP at:
>>>>ftp://ftp.ietf.org/internet-drafts/
>>>>
>>>>_______________________________________________
>>>>I-D-Announce mailing list
>>>>I-D-Announce@ietf.org
>>>>https://www.ietf.org/mailman/listinfo/i-d-announce
>>>>Internet-Draft directories: http://www.ietf.org/shadow.html
>>>>or ftp://ftp.ietf.org/ietf/1shadow-sites.txt
>>>>
>>>>_______________________________________________
>>>>pcp mailing list
>>>>pcp@ietf.org
>>>>https://www.ietf.org/mailman/listinfo/pcp
>>>
>>>_______________________________________________
>>>pcp mailing list
>>>pcp@ietf.org
>>>https://www.ietf.org/mailman/listinfo/pcp
>>
>>_______________________________________________
>>pcp mailing list
>>pcp@ietf.org
>>https://www.ietf.org/mailman/listinfo/pcp
>