Re: [RAM] The mapping problem: rendezvous points?

Eliot Lear <lear@cisco.com> Thu, 10 May 2007 11:30 UTC

Return-path: <ram-bounces@iab.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1Hm6qk-0001Yf-AB; Thu, 10 May 2007 07:30:22 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Hm6qh-0001YZ-PR for ram@iab.org; Thu, 10 May 2007 07:30:19 -0400
Received: from ams-iport-1.cisco.com ([144.254.224.140]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Hm6qg-0005yA-Eh for ram@iab.org; Thu, 10 May 2007 07:30:19 -0400
Received: from ams-dkim-1.cisco.com ([144.254.224.138]) by ams-iport-1.cisco.com with ESMTP; 10 May 2007 13:30:18 +0200
Received: from ams-core-1.cisco.com (ams-core-1.cisco.com [144.254.224.150]) by ams-dkim-1.cisco.com (8.12.11/8.12.11) with ESMTP id l4ABUHtR029200; Thu, 10 May 2007 13:30:17 +0200
Received: from adsl-247-5-fixip.tiscali.ch (ams3-vpn-dhcp4225.cisco.com [10.61.80.128]) by ams-core-1.cisco.com (8.12.10/8.12.6) with ESMTP id l4ABUGlZ028326; Thu, 10 May 2007 11:30:17 GMT
Message-ID: <46430241.4050304@cisco.com>
Date: Thu, 10 May 2007 13:30:09 +0200
From: Eliot Lear <lear@cisco.com>
User-Agent: Thunderbird 2.0.0.0 (Macintosh/20070326)
MIME-Version: 1.0
To: David Conrad <drc@virtualized.org>
Subject: Re: [RAM] The mapping problem: rendezvous points?
References: <8F47F550-6224-4AFF-8359-CBA98D3F2FAB@muada.com> <271CF87FD652F34DBF877CB0CB5D16FC054EA470@WIN-MSG-21.wingroup.windeploy.ntdev.microsoft.com> <9C228355-9425-4C66-A9A7-47498490E3B1@virtualized.org> <271CF87FD652F34DBF877CB0CB5D16FC054EA59D@WIN-MSG-21.wingroup.windeploy.ntdev.microsoft.com> <86588E66-ACED-4DD2-B286-3DA5B2518B1A@virtualized.org> <4641750A.9010906@cisco.com> <283D52E5-AD3A-40FA-B81C-27DD950176CA@virtualized.org> <4641F33B.4070103@cisco.com> <2CB91D98-4CA3-4F4E-A2F6-CFEF5E04C0DB@virtualized.org> <4642008D.2010100@cisco.com> <64CA7B5D-44BE-485C-8BE1-B5C5185E59C0@virtualized.org>
In-Reply-To: <64CA7B5D-44BE-485C-8BE1-B5C5185E59C0@virtualized.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
DKIM-Signature: v=0.5; a=rsa-sha256; q=dns/txt; l=3110; t=1178796617; x=1179660617; c=relaxed/simple; s=amsdkim1002; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=lear@cisco.com; z=From:=20Eliot=20Lear=20<lear@cisco.com> |Subject:=20Re=3A=20[RAM]=20The=20mapping=20problem=3A=20rendezvous=20poi nts? |Sender:=20; bh=RP2YIETiaUmj5NeS9CGUitzqVnFMzr/8QzqqzJf6IR0=; b=eBuWrvN25WMGTojLJ+i79ivtYjX1yNIDIJwmNr1w+L4IHKPUVGBxEOWxrB0x6vOQVkb+M2lv qxOogXQVwpw6N7jZkzlTU5RuSL/bPUUBLl+kFW/tfK6P9OgfbbsxgG7H;
Authentication-Results: ams-dkim-1; header.From=lear@cisco.com; dkim=pass (s ig from cisco.com/amsdkim1002 verified; );
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 0a7aa2e6e558383d84476dc338324fab
Cc: ram@iab.org
X-BeenThere: ram@iab.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Routing and Addressing Mailing List <ram.iab.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ram>, <mailto:ram-request@iab.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/ram>
List-Post: <mailto:ram@iab.org>
List-Help: <mailto:ram-request@iab.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ram>, <mailto:ram-request@iab.org?subject=subscribe>
Errors-To: ram-bounces@iab.org

David Conrad wrote:
> There are numerous tradeoffs that have to be taken into account when 
> choosing where to do the mapping.  The closer to the host you get, the 
> less scope is affected by the mapping.  For example, if the mapping is 
> done for a "site", changing the mapping has the effect of instantly 
> changing the locator/ID mapping for all devices within the "site".  
> Move down to the host, and the change obviously only affects the one 
> host.

Right.  And while it is perhaps inelegant in some eyes, there may yet be 
room for two separate approaches: one on the host and one off the host 
and somewhere in the network.  It may be possible to extend LISP into 
the host as well.  Clear functional separation may provide us with 
several approaches to deal with the mapping.  In an experimental 
environment that would be a good thing.
>
>> Then there are security and continuity considerations.
>
> Agreed there are security considerations (I'm not sure what 
> "continuity" considerations are).  There are security considerations 
> in everything including both push and pull models of mapping 
> distribution.

Yes. Let's evaluate them.  When I say continuity, I mean, what happens 
when a router fails or comes into service.  Does its return to service 
mean that a bunch of name servers are about to be attacked?  Can it only 
but drop packets for the first few minutes because it needs to take the 
"suboptimal stretch"?  I'm talking about later versions of LISP here, 
for example, where there is no backup.

>
>>> In response I get vague handwaving about voice or video (I know from 
>>> personal experience that UDP-based NFS works fine in the face of an 
>>> initial packet delay of 10s of milliseconds) or descriptions about 
>>> classes of applications that would appear to be degenerate cases and 
>>> asymmetric routing that would likely have unpredictable performance 
>>> characteristics with pull or push.
>> You talk delay.  I talk loss.  Routers don't just keep packets lying 
>> around if they can't deliver them.
>
> How does that ARP thing work again?
ARP represents a millisecond delay.  Routers themselves ARP so rarely 
that it's not a factor.  What is a factor is when packets in the middle 
of a path are just dropped.

> Of course, this isn't really relevant as the only added delay in a 
> pull model would occur primarily during the initial session 
> initiation, e.g., when the domain name of the voice or video server 
> was being looked up or the connection initiation packet was being sent.

You cannot say with certainty whether we're in session initiation or at 
some other point.  In the case of a routing transition, the new router 
will have to query to restart the connection, causing seconds of delay.  
The same will occur when things transition back, if either the old 
router has lost its cache or has been down sufficiently long for the 
cache to expire.  During this period of time the router would need to 
make as many queries (and maybe more) as it has conversations going on.

Eliot

_______________________________________________
RAM mailing list
RAM@iab.org
https://www1.ietf.org/mailman/listinfo/ram