Re: [re-ECN] Complete draft Charter for proposed CONEX WG
<philip.eardley@bt.com> Thu, 10 December 2009 10:41 UTC
Return-Path: <philip.eardley@bt.com>
X-Original-To: re-ecn@core3.amsl.com
Delivered-To: re-ecn@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id 0F89D3A6AD1 for <re-ecn@core3.amsl.com>;
Thu, 10 Dec 2009 02:41:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.359
X-Spam-Level:
X-Spam-Status: No, score=-3.359 tagged_above=-999 required=5 tests=[AWL=0.240,
BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OujTOctxgrio for
<re-ecn@core3.amsl.com>; Thu, 10 Dec 2009 02:41:00 -0800 (PST)
Received: from smtp4.smtp.bt.com (smtp4.smtp.bt.com [217.32.164.151]) by
core3.amsl.com (Postfix) with ESMTP id 570CA3A6AC5 for <re-ecn@ietf.org>;
Thu, 10 Dec 2009 02:41:00 -0800 (PST)
Received: from E03MVB1-UKBR.domain1.systemhost.net ([193.113.197.107]) by
smtp4.smtp.bt.com with Microsoft SMTPSVC(6.0.3790.3959);
Thu, 10 Dec 2009 10:40:45 +0000
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable
Date: Thu, 10 Dec 2009 10:40:45 -0000
Message-ID: <4A916DBC72536E419A0BD955EDECEDEC06363B83@E03MVB1-UKBR.domain1.systemhost.net>
In-Reply-To: <AEDCAF87EEC94F49BA92EBDD49854CC70E4ED147@E03MVZ1-UKDY.domain1.systemhost.net>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [re-ECN] Complete draft Charter for proposed CONEX WG
Thread-Index: Acp4Gx0EP2kuvs7QSlqymk5yJ6ln6wAl+MYQAAAIGAAAM1LLgA==
From: <philip.eardley@bt.com>
To: <toby.moncaster@bt.com>, <re-ecn@ietf.org>
X-OriginalArrivalTime: 10 Dec 2009 10:40:45.0708 (UTC)
FILETIME=[3AC4FCC0:01CA7985]
Subject: Re: [re-ECN] Complete draft Charter for proposed CONEX WG
X-BeenThere: re-ecn@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: re-inserted explicit congestion notification <re-ecn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>,
<mailto:re-ecn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/re-ecn>
List-Post: <mailto:re-ecn@ietf.org>
List-Help: <mailto:re-ecn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>,
<mailto:re-ecn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Dec 2009 10:41:02 -0000
Thanks toby & john > > --- > > > > The purpose of the CONEX working group is to develop a mechanism to > > The CONEX working group will develop mechanisms to "mechanisms" might imply that we going to develop several different ways of doing this. So I prefer keeping as "a mechanism" (albeit one with several parts - which I think was your point) > > > allow senders to inform the network of the level of congestion they > > expect their packets to encounter. This information is > currently only > > visible at the transport layer. > I think everyone so far is ok with mirja's suggestion to add "in the end systems", please shout if I mis-interpreted. > Although I agree with Mirja's comment, an argument that could > be made to say the information is visible in the network if > you use DPI equipment... However I think highlighting that > only the end-systems are DESIGNED to see the info is a good thing... > > > With the output of CONEX, it will be > > possible to provide sufficient information in each IP > datagram so that > > any node in the network can see the expected rest-of-path > congestion. > > I think I would prefer to say "The main output of CONEX will > be a protocol that allows each IP datagram to carry > sufficient information to allow any node in the network to > see the whole path congestion." I make the subtle distinction > between rest of path and whole path so that we leave the door > open for Matt Mathis's mark on drop suggestion... Please can you remind me what Matt's suggestion is. At the moment, prefer to leave as "rest-of-path congestion" (knowing one implies knowing the other, and rest-of-path emphasises the new info useful for a router, as john says) > > > Once any node can see the impact it causes (and suffers) by > sending or > > forwarding packets, it will be possible to hold senders and whole > > networks accountable for the congestion they cause > downstream. Tools > > that exploit the CONEX output could be used for mitigating > distributed > > denial of service (DDoS); simplifying differentiation of quality of > > service (QoS); policing compliance to congestion control; > and so on. > > Intended output of the WG: 1. An applicability statement > that consists > > of > > Don't like "consists of" would prefer something like > "explains" or "describes" Ok > > > A. the functionality / capability that is expected to be > provided by > > the CONEX mechanism itself, including its architectural features, > > limitations and assumptions it makes about networks and end > systems B. > > deployment analysis - how the CONEX mechanism can be deployed in > > networks (non vs ECN vs perhaps CONEX routers) and end systems > > Including analysis of the impact of full vs partial > deployment (or something like this - highlight that what > matters is how we get to a system that is useful) This raises an interesting question. There are several deployment issues: * the functionality of the routers (non, ECN, maybe CONEX, maybe a mix) * the functionality of the end systems (is the destination non, ECN, CONEX?) * the functionality of the network (specifically, this about the enforcement of trustworthiness of conex info) The 3rd one seems to me a big issue, & one that first requires work on the mechanism in 3B. So I see network-by-network partial deployment as a use case, potentially to be explored under item 4. "Output Item 1" (APPlicability) is intended to be early work "to detail the key functional and non-functional considerations that guide the work on the mechanism's design". I'm not convinced that network-by-network deployment analysis falls into this category. But maybe just my perception! > > > C. security analysis - threats from falsifying or blanking > CONEX info > > Think I would just all that a threat analysis and I think > there is a good chance it could exist as a separate document... > > > The purpose is > > [1] to detail the key functional and non-functional considerations > > that guide the work on the mechanism's design [2] to allow > exploration > > of use cases to begin before work on the mechanism is complete > > > > 2. Specification of IP (v4 & v6) packet structure to carry CONEX > > information (header bits, interpretation) > > > > 3. Transport-related Best practices and specifications: > > Add the word "covering" after specifications... Ok > > > A. for the transport of congestion information from the > destination to > > the sender, > > For the timely transport ? > > > B. for ensuring the trustworthiness of the CONEX information > > Note: capability negotiation is out of scope, except to the extent > > that a CONEX sender should either be able to work with a legacy > > destination or be able to fall-back to non-CONEX operation. > > Somewhere in work items 2 or 3 we need to specifically refer > to a need to mitigate those threats identified in the threat > analysis... Ok > > > > > > 4. Use cases -- possible uses of CONEX information to reduce > > congestion and/or increase the accountability for it. > > This first sentence seems to pre-suppose which use cases are > of interest... Perhaps change it to "possible uses of CONEX > information which include controlling or reducing congestion > and increasing accountability for congestion." Ok. Widening the text allows things like simply monitoring the info, in order to do some off-line network planning perhaps > > > The main purpose is to > > encourage experiments that use CONEX information and to > describe their > > results; it is not to delineate all potential uses cases, nor to > > provide a full architectural/deployment/security analysis of use > > cases. Future work may include specifications to implement > one or more > > use cases. > > Highlight that we expect there to be a number of use case > documents (or a number of sections within a master use case document). Think we can leave this to the WG to decide. > > > The output is Informational and Experimental, apart from #2 > which is > > tentatively slated as Standards track. > > > > Milestones > > Feb 2010 Internet-Draft functionality statement (Output > item 1A) Mar > > 2010 Internet-Draft applicability statement (Output item > 1A, B, C) Mar > > 2010 Internet-Draft(s) for CONEX IPv4 & IPv6 specifications (Output > > item 2) May 2010 Internet-Draft use cases (Ouput item 4) > > Jun 2010 First WG draft CONEX IPv4 specification > > Jun 2010 First WG draft CONEX IPv6 specification > > Jun 2010 Draft transport-related best practices > > Jun 2010 Proposals (individual I-Ds) for TCP modification > (Ouput item > > 3A) > > Jun 2010 Proposals (individual I-Ds) for mechanism to ensure > > trustworthiness of CONEX information (Ouput item 3B) > > Sep 2010 Complete applicability statement (sent to IESG) > > Nov 2010 CONEX IPv4 specification to WGLC > > Nov 2010 CONEX IPv6 specification to WGLC > > Jan 2011 Complete IPv4 specification (sent to IESG) > > Jan 2011 Complete IPv6 specification (sent to IESG) > > Mar 2011 Spec of TCP modification to WGLC > > Mar 2011 Spec of mechanism to ensure trustworthiness to WGLC > > Mar 2011 Transport-related best practices to WGLC > > Mar 2011 Use cases to WGLC > > May 2011 Complete remaining docs (sent to IESG) > > Jun 2011 Close or re-charter > > My word that's an exhaustive list of milestones! For > simplicity can we also break out the list of intended > publication dates for the final outputs? My personal instinct > is that we should be able to publish the applicability > statement in July or at least WGLC it. Also sometime round > November 2010 we need to actually select which individual IDs > we are progressing for TCP and trustworthiness... Thnks, we'll have a think whether there's a better way to list them. > > Toby >
- [re-ECN] Complete draft Charter for proposed CONE… philip.eardley
- Re: [re-ECN] Complete draft Charter for proposed … Mirja Kühlewind
- Re: [re-ECN] Complete draft Charter for proposed … philip.eardley
- Re: [re-ECN] Complete draft Charter for proposed … toby.moncaster
- Re: [re-ECN] Complete draft Charter for proposed … John Leslie
- Re: [re-ECN] Complete draft Charter for proposed … philip.eardley
- Re: [re-ECN] Complete draft Charter for proposed … toby.moncaster
- Re: [re-ECN] Complete draft Charter for proposed … Leslie Daigle
- Re: [re-ECN] Complete draft Charter for proposed … philip.eardley
- Re: [re-ECN] Complete draft Charter for proposed … Bob Briscoe
- Re: [re-ECN] Complete draft Charter for proposed … philip.eardley
- Re: [re-ECN] Complete draft Charter for proposed … Bob Briscoe
- Re: [re-ECN] Complete draft Charter for proposed … Bob Briscoe
- Re: [re-ECN] Complete draft Charter for proposed … Leslie Daigle
- Re: [re-ECN] Complete draft Charter for proposed … Bob Briscoe
- Re: [re-ECN] Complete draft Charter for proposed … philip.eardley
- Re: [re-ECN] Complete draft Charter for proposed … Bob Briscoe
- Re: [re-ECN] Complete draft Charter for proposed … Ingemar Johansson S
- Re: [re-ECN] Complete draft Charter for proposed … Leslie Daigle
- Re: [re-ECN] Complete draft Charter for proposed … Lars Eggert
- Re: [re-ECN] Complete draft Charter for proposed … Bob Briscoe
- Re: [re-ECN] Complete draft Charter for proposed … Ingemar Johansson S
- Re: [re-ECN] Complete draft Charter for proposed … philip.eardley