Re: [re-ECN] CONEX problem statement

<toby.moncaster@bt.com> Wed, 02 December 2009 17:23 UTC

Return-Path: <toby.moncaster@bt.com>
X-Original-To: re-ecn@core3.amsl.com
Delivered-To: re-ecn@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EB1833A67EF for <re-ecn@core3.amsl.com>; Wed, 2 Dec 2009 09:23:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.299
X-Spam-Level:
X-Spam-Status: No, score=-3.299 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, J_CHICKENPOX_72=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0iQS9cnoGEKo for <re-ecn@core3.amsl.com>; Wed, 2 Dec 2009 09:23:32 -0800 (PST)
Received: from smtp1.smtp.bt.com (smtp1.smtp.bt.com [217.32.164.137]) by core3.amsl.com (Postfix) with ESMTP id 6C8D73A67C1 for <re-ecn@ietf.org>; Wed, 2 Dec 2009 09:23:32 -0800 (PST)
Received: from E03MVZ1-UKDY.domain1.systemhost.net ([193.113.30.65]) by smtp1.smtp.bt.com with Microsoft SMTPSVC(6.0.3790.3959); Wed, 2 Dec 2009 17:23:23 +0000
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Wed, 2 Dec 2009 17:23:22 -0000
Message-ID: <AEDCAF87EEC94F49BA92EBDD49854CC70E38259E@E03MVZ1-UKDY.domain1.systemhost.net>
In-Reply-To: <4A916DBC72536E419A0BD955EDECEDEC06363B10@E03MVB1-UKBR.domain1.systemhost.net>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [re-ECN] CONEX problem statement
Thread-Index: AcpqNJItWN6+7fVnT5iEaqss3+XGZwJOFWmgAAGP5BA=
References: <4B071E5A.8030000@thinkingcat.com> <4A916DBC72536E419A0BD955EDECEDEC06363B10@E03MVB1-UKBR.domain1.systemhost.net>
From: <toby.moncaster@bt.com>
To: <philip.eardley@bt.com>, <leslie@thinkingcat.com>, <re-ecn@ietf.org>
X-OriginalArrivalTime: 02 Dec 2009 17:23:23.0729 (UTC) FILETIME=[26C47410:01CA7374]
Subject: Re: [re-ECN] CONEX problem statement
X-BeenThere: re-ecn@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: re-inserted explicit congestion notification <re-ecn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>, <mailto:re-ecn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/re-ecn>
List-Post: <mailto:re-ecn@ietf.org>
List-Help: <mailto:re-ecn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>, <mailto:re-ecn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Dec 2009 17:23:34 -0000

This seems pretty reasonable to me. I would think at least some of the
existing problem statement draft can be re-used for the applicability
statement along with some of the non-protocol specific text in the two
re-ECN drafts.

For capability negotiation I assume you mean the specific mechanism is
out of scope, not the need for some form of mechanism?

In 4. Use Cases did "... cases, not to..." mean "... cases, nor to..."?

Should we specify some common structure or similar for the use cases? In
other words what info do we need in the use case documents to make them
useful. It is easy to think up use cases and just say "it can be used
for this" harder to check that they are sensible unless we require a
certain rigour in how they are presented... 

Toby

> -----Original Message-----
> From: re-ecn-bounces@ietf.org [mailto:re-ecn-bounces@ietf.org] On
> Behalf Of philip.eardley@bt.com
> Sent: 02 December 2009 16:37
> To: leslie@thinkingcat.com; re-ecn@ietf.org
> Subject: Re: [re-ECN] CONEX problem statement
> 
> To supplement the charter problem statement below, here is a proposal
> for CONEX output. We will firm up Milestones when there is some
> agreement on the list of Output.
> 
> Please send comments. Sorry for the delay.
> Thanks
> Phil & Leslie
> 
> == CONEX output ==
> 1. An applicability statement that consists of
> A. the functionality /capability that is expected to be provided by
the
> conex mechanism itself, including its architectural features,
> limitations and assumptions it makes about networks and end systems
> B. deployment analysis - how the conex mechanism can be deployed in
> networks (non vs ECN vs [perhaps] Conex routers) and end systems
> C. security analysis - threats from falsifying or blanking conex info
> 
> The purpose is
> [1] to detail the key functional and non-functional considerations
that
> guide the work on the mechanism's design
> [2] to allow exploration of use cases to begin before work on the
> mechanism is complete
> 
> 2. Specification of IP (v4 & v6) packet structure to carry conex
> information (header bits, interpretation)
> 
> 3. Transport-related Best practices and specifications:
> [1] for the transport of congestion information from the destination
to
> the sender,
> [2] for ensuring the trustworthiness of the conex information
> Note: capability negotiation is out of scope, except to the extent
that
> a Conex sender should either be able to work with a legacy destination
> or be able to fall-back to non-Conex operation.
> 
> 4. Use cases -- possible uses of conex information to reduce
congestion
> and/or increase the accountability for it. The main purpose is to
> encourage experiments that use conex information and to describe their
> results; it is not to delineate all potential uses cases, not to
> provide
> a full architectural /deployment /security analysis of use cases.
> Future
> work may include specifications to implement one or more use cases.
> 
> The output is Informational and Experimental, apart from #2 which is
> tentatively slated as Standards track.
> 
> == Milestones include ==
> Milestone: spec of TCP modification to achieve 3[1]. Note, other
> transport-related issues eg capability negotiation is out of scope of
> this milestone.
> 
> Milestone: spec of a mechanism to achieve 3[2]. Note, the purpose is
to
> ensure the viable *use* of congestion exposure, so the spec should not
> be targeted at a specific use case.
> 
> Note: these 2 spec Milestones don't have to wait for the Transport
best
> practices doc; doing the specs should help with it.
> 
> More Milestones - to be decided
> ----
> 
> > -----Original Message-----
> > From: Leslie Daigle [mailto:leslie@thinkingcat.com]
> > Sent: 20 November 2009 22:55
> > To: re-ecn@ietf.org
> > Cc: Eardley,PL,Philip,DEE1 R
> > Subject: CONEX problem statement
> >
> >
> >  From the BoF, this is the text of the proposed charter problem
> > statement for which there was support:
> >
> > "The purpose of the CONEX working group is to develop a mechanism to
> > allow senders to inform the network of the level of congestion they
> > expect their packets to encounter. This information is currently
only
> > visible at the transport layer. With the output of CONEX, it will be
> > possible to provide sufficient information in each IP datagram so
> that
> > any node in the network can see the expected rest-of-path
congestion.
> > Once any node can see the impact it causes (and suffers) by sending
> or
> > forwarding packets, it will be possible to hold senders and whole
> > networks accountable for the congestion they cause downstream. Tools
> > that exploit the CONEX output could be used for mitigating
> distributed
> > denial of service (DDoS); simplifying differentiation of quality of
> > service (QoS); policing compliance to congestion control; and so on.
> > "
> >
> > In the interest of making progress, I'd like to leave this on the
> table
> > as the set problem statement for now, and get back to focusing on
the
> > next section -- the planned output of the proposed WG.
> >
> > Phil has been drafting some thoughts, and he & I will be back with
> some
> > proposed text for that, next week, but I'd like to flag that I've
> heard:
> >
> > . for education/illustration/general success, we need applicability
> > statement(s) and/or congestion exposure definition.
> >
> > . the chief specification for IP packets only (not transport)
> >
> > . we do need a transport specification -- as these illustrate how to
> use
> > the IP packet information, but are independent of IP packet
> > specification.  There may be multiple.  We'll have one listed in the
> > milestones section.
> >
> > . the detail work will be in determining what needs to be documented
> to
> > ensure viable *use* of congestion exposure, without muddling crisp
> > specifications or bending them to specific cases.
> >
> > . to demonstrate viability of the overall approach, we need to have
> some
> > expression of deployability -- can this (at the IP layer, or
> transport)
> > be useful if it is not supported globally, out of the box? (And
there
> > are "yes" answers -- the point here is that they will need to be
> > documented).
> >
> >
> > Leslie.
> >
> >
> > --
> >
> > -------------------------------------------------------------------
> > "Reality:
> >       Yours to discover."
> >                                  -- ThinkingCat
> > Leslie Daigle
> > leslie@thinkingcat.com
> > -------------------------------------------------------------------
> _______________________________________________
> re-ECN mailing list
> re-ECN@ietf.org
> https://www.ietf.org/mailman/listinfo/re-ecn