Re: [re-ECN] VIability issue #2

HeinerHummel@aol.com Fri, 06 November 2009 13:32 UTC

Return-Path: <HeinerHummel@aol.com>
X-Original-To: re-ecn@core3.amsl.com
Delivered-To: re-ecn@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 96A623A6A93 for <re-ecn@core3.amsl.com>; Fri, 6 Nov 2009 05:32:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.773
X-Spam-Level:
X-Spam-Status: No, score=-0.773 tagged_above=-999 required=5 tests=[AWL=1.225, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_43=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hb+J7A6ULtEL for <re-ecn@core3.amsl.com>; Fri, 6 Nov 2009 05:32:01 -0800 (PST)
Received: from imr-da01.mx.aol.com (imr-da01.mx.aol.com [205.188.105.143]) by core3.amsl.com (Postfix) with ESMTP id F37AD3A69CA for <re-ecn@ietf.org>; Fri, 6 Nov 2009 05:31:57 -0800 (PST)
Received: from imo-da04.mx.aol.com (imo-da04.mx.aol.com [205.188.169.202]) by imr-da01.mx.aol.com (8.14.1/8.14.1) with ESMTP id nA6DW0TP026645; Fri, 6 Nov 2009 08:32:00 -0500
Received: from HeinerHummel@aol.com by imo-da04.mx.aol.com (mail_out_v42.5.) id p.c7d.59b825c5 (39330); Fri, 6 Nov 2009 08:31:55 -0500 (EST)
From: HeinerHummel@aol.com
Message-ID: <c7d.59b825c5.38257f4a@aol.com>
Date: Fri, 6 Nov 2009 08:31:54 EST
To: toby.moncaster@bt.com, leslie@thinkingcat.com, re-ecn@ietf.org
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="-----------------------------1257514314"
X-Mailer: 9.0 SE for Windows sub 5021
X-AOL-SENDER: HeinerHummel@aol.com
Subject: Re: [re-ECN] VIability issue #2
X-BeenThere: re-ecn@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: re-inserted explicit congestion notification <re-ecn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>, <mailto:re-ecn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/re-ecn>
List-Post: <mailto:re-ecn@ietf.org>
List-Help: <mailto:re-ecn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>, <mailto:re-ecn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2009 13:32:02 -0000

See my comments inline,
Heiner
 
 
In einer eMail vom 06.11.2009 12:47:31 Westeuropäische Normalzeit schreibt  
toby.moncaster@bt.com:

 
Viability  Issue #2

The expectation is that congestion exposure information will  be carried 
in IP packet headers.  Is there really enough room to do  that 
effectively (in IPv4)?


For discussion:
This assumes  tight timing -- that feedback is received and acted upon 
such that  subsequent flows will experience the same or similar network  
state.  What are the implications (or likelihood) of different  paths? 
Or, are there other network state changes that will (could)  change in 
that timeframe (now or in future  developments).

 

1)      Congestion  should be signalled only to those upstream (not 
downstream !) routers which  are tempted to use this congested router for transit. 
{TM}  This is exactly what re-ECN achieves. There are only two possible 
ways in  which a router can signal to routers upstream that it is congested. It 
could  do this directly by trying to send messages back along the path to 
say it is  congested, but such approaches have long been shown to be 
unworkable for a  number of reasons (and are getting more difficult not less). 
Before making such a generalized statement, have a look  at the network 
picture 
at _www.hummel-research.de_ (http://www.hummel-research.de)  : It not  only 
shows multiple shortest and/or detouring loop-free paths to some given  
destination node (red node), ut also with respect to any particular (congested) 
 node what is the precise upstream located subnetwork whose nodes would use 
it  (the picked, congested one) for transit.Provided that each node knows 
the  network topology, it can make this multipath determination, and also, 
for the  sake of congestion notification send out messages to the respective 
upstream  neighbor nodes, which in return may forward them further upstream 
until there is  no further upstream one.
 
The tree-like branching upstream directed notification  message could even 
count the number of hops to the (downstream located)  congested node, with 
the result that closer neighbors thereof might  continue forwarding the flows 
unchanged, while those farer up  might take action by-pass the congested 
node. Yes, some of the  few bits of the IPv4-header might be used to impose a 
best by-pass  forwarding. See my point 2).
 
 

The other alternative is to inform downstream nodes and for  the receiver 
to pass this back to the sender. The sender can then insert this  and thus a 
router that is upstream can calculate how much congestion is being  caused 
downstream of it.
Routers  ALREADY inform downstream nodes that they are congested. They 
either do this  implicitly by drop (requiring some digging into flow state to be 
spotted) or  they do it explicitly by ECN. 
This  is not an information per single ip-packet, instead an information 
from time  to time informing about the degree of congestion. I.e. it needs to 
be a  message of some other protocol type. Also some mechanism  must guide 
the notification message as to progress in a tree-way fashion  upstream  but  
not beyond the points where flows wouldn't use the  actually congested node 
anyway.  
{TM} Congestion varies  on near RTT scales. It is pointless to send 
periodic notifications of  congestion levels because these would simply miss the 
potentially enormous  short-term fluctuations. Ideally therefore the 
information should be carried  with every packet. 
This is certainly not true:the change of the degree of  congestion can be 
communicated right away rather than by periodic  notifications.

This  (upstream) area to be informed can easily be identified with respect 
to  flows to some distinct destination node. Hence  congestions due to  
flows to one and the same destination node can easily and properly be handled.  
More patient work is needed if the congestion is due to flows destined to  
different destination nodes (that's what a working group is for, isn't it  
?). 
{TM} I am not sure what  you are getting at here. As far as I know it is 
pretty hard to identify the  reverse path for a given flow given paths are 
often asymmetric. Even if it  were possible why would the upstream node trust 
the downstream node. What  would prevent an attacker spoofing pushback 
messages? And it sounds like you  are suggesting using flow state in the core? 

See above. It takes however the knowledge about the  network topology. This 
is -  BTW - something I tried to tell the RRG of the  IRTF: With distance 
vector algorithm (BGP as of today) you have no rear mirrow  in your car :-)
 

I am  afraid re-ECN has something else in mind :-( 
 

 
2)  The few bits in the IP-header are definitely needed and should be saved 
for  routing, e.g. for extending multipath such that even crankback (which 
is de  facto a loop) becomes ok, i.e.  so that endless-loops can be avoided  
hereby.  
{TM} Is there any firm  proposal yet which makes use of these bits in such 
a fashion? If so, please  could you send a link to a relevant paper or ID to 
this  list?
No there is definitely no work or relevant paper or ID  yet. But try out by 
yourself:
A bottle of wine for you if you can detect a single  loop of arrows on the 
picture in my website. 
However there are a lot of RFCs dealing with loops and  micro-loops.

 
Heiner