Re: [sfc] Magnus Westerlund's Discuss on draft-ietf-sfc-serviceid-header-12: (with DISCUSS)

mohamed.boucadair@orange.com Mon, 09 November 2020 13:29 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9929E3A10D0; Mon, 9 Nov 2020 05:29:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 32qf0JnV9P0T; Mon, 9 Nov 2020 05:29:45 -0800 (PST)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.39]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 99FE03A10D6; Mon, 9 Nov 2020 05:29:45 -0800 (PST)
Received: from opfedar05.francetelecom.fr (unknown [xx.xx.xx.7]) by opfedar25.francetelecom.fr (ESMTP service) with ESMTP id 4CVBgD0rCzz8syL; Mon, 9 Nov 2020 14:29:44 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1604928584; bh=ghnXsLJkZmBCLRNZcraTvPGWQ8Kxi6Ro6B9qmwezIiA=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=oMvCxaqz39psyL3VH+z1+BiLH6LgBNmY8pgwDsxNi+glQXnblVNBkL2gIxyoEtTVD eLOLjQppj7Gcpe/tmHSZh6uVnt4P7PBMMIPZTgn56wHI60rYGzeeXhPAv3i53bH4UL ypyl9bsBwpmaWbsVNHMlmqLFuqFhB8Uiv24sFbpgWxwVmQ2Cr8+nWt3pM919AXl2SC KowBsVLVigsxKpelvhUwdqUvF6ycdjBrzQnRhbSstuvBvwWEX+yd5rdeuf46/MfB6q U/TgEeA/wYeWnmL/GnoSiuV06BlHJiGKsvouVssxC0xXa0XXSamduKreRguhOXZcZu wHmPbvwK0Lwcw==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.32]) by opfedar05.francetelecom.fr (ESMTP service) with ESMTP id 4CVBgC6VCWz2xKY; Mon, 9 Nov 2020 14:29:43 +0100 (CET)
From: mohamed.boucadair@orange.com
To: Magnus Westerlund <magnus.westerlund@ericsson.com>, "iesg@ietf.org" <iesg@ietf.org>
CC: "gregimirsky@gmail.com" <gregimirsky@gmail.com>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "draft-ietf-sfc-serviceid-header@ietf.org" <draft-ietf-sfc-serviceid-header@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: Magnus Westerlund's Discuss on draft-ietf-sfc-serviceid-header-12: (with DISCUSS)
Thread-Index: AQHWssF/CmHQKdCToU+vFzXZfqmpE6m4JhoAgAETaoCABpeBQA==
Date: Mon, 09 Nov 2020 13:29:42 +0000
Message-ID: <20493_1604928583_5FA94447_20493_21_1_787AE7BB302AE849A7480A190F8B933031573B31@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <160450470734.24291.6996019706264327799@ietfa.amsl.com> <1512_1604506572_5FA2D3CC_1512_131_1_787AE7BB302AE849A7480A190F8B93303156FF0E@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <8680e33ad1a6b4d9f940e8dc1ad9a9261d82f743.camel@ericsson.com>
In-Reply-To: <8680e33ad1a6b4d9f940e8dc1ad9a9261d82f743.camel@ericsson.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.114.13.245]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/S8CPC6zXMjBg7iXVZsCFrq6VWDg>
Subject: Re: [sfc] Magnus Westerlund's Discuss on draft-ietf-sfc-serviceid-header-12: (with DISCUSS)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Nov 2020 13:29:49 -0000

Hi Magnus, 

OK to restate it. What about the following:   

==
5.  MTU Considerations

   As discussed in Section 5.6 of [RFC7665], the SFC architecture
   prescribes that additional information be added to packets to:

   o  Identify SFPs: this is typically the NSH Base (Section 2.2 of
      [RFC8300]) and Service Path Headers (Section 2.3 of [RFC8300]).

   o  Carry metadata such those defined in Sections 3 and 4.

   o  Steer the traffic along the SFPs: transport encapsulation.

   This added information increases the size of the packet to be carried
   along an SFP.

   Aligned with Section 5 of [RFC8300], it is RECOMMENDED for network
   operators to increase the underlying MTU so that NSH traffic is
   forwarded within an SFC-enabled domain without fragmentation.  The
   available underlying MTU should be taken into account by network
   operators when providing SFs with the required Context Headers to be
   injected per SFP and the size of the data to be carried in these
   Context Headers.

   If the underlying MTU cannot be increased to accommodate the NSH
   overhead, network operators may rely upon a transport encapsulation
   protocol to the required fragmentation handling.  The impact of
   activating such feature on SFFs should be carefully assessed by
   network operators (Section 5.6 of [RFC7665]).

   When dealing with MTU issues, network operators should consider the
   limitations of various transport encapsulations such as those
   discussed in [I-D.ietf-intarea-tunnels].
==

The control plane is not mentioned on purpose as this is out of scope. 

Cheers,
Med

> -----Message d'origine-----
> De : Magnus Westerlund [mailto:magnus.westerlund@ericsson.com]
> Envoyé : jeudi 5 novembre 2020 09:42
> À : iesg@ietf.org; BOUCADAIR Mohamed TGI/OLN
> <mohamed.boucadair@orange.com>
> Cc : gregimirsky@gmail.com; sfc-chairs@ietf.org; draft-ietf-sfc-
> serviceid-header@ietf.org; sfc@ietf.org
> Objet : Re: Magnus Westerlund's Discuss on draft-ietf-sfc-serviceid-
> header-12: (with DISCUSS)
> 
> On Wed, 2020-11-04 at 16:16 +0000, mohamed.boucadair@orange.com
> wrote:
> > Hi Magnus,
> >
> > Eric raised a similar comment but I'm afraid that this is not
> specific to this
> > spec as we don't have a full visibility on the full set of
> metadata that will
> > be included in a service chain. This is a generic consideration
> when deploying
> > NSH. This is why we point the reader to Section 5 of RFC8300.
> >
> > As NSH is deployed within a single domain, and that the operator
> knows the SFs
> > that will inject these headers (but also other context headers)
> and the full
> > set of metadata to be conveyed on a per chain basis, a first reco
> in RFC8300
> > is to increase the MTU.
> >
> > If the MTU can't be increased, the next reco in RFC8300 is to rely
> on the
> > fragmentation/reassembly at the transport encapsulation. We can't
> call a
> > specific transport encapsulation because this is deployment-
> specific.
> >
> > Do you have in mind a specific point that we need to record? Do
> you see a
> > value if we add an informative reference to draft-ietf-intarea-
> tunnels?
> 
> I think you need to be explicit about the issue, especially as it
> might be a
> consideration both in which form of identifiers are used and thus
> their size, as
> well as how many one tries to put on. I think you should state it is
> a
> requirement on the control plane to consider congifuration options
> so that not
> more headers are added than can fit, or the domain operator needs to
> ensure that
> a lower layer transport that support fragmentation is supported.
> intarea-tunnels
> may contribute to context.
> 
> Cheers
> 
> Magnus

_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.