Re: [tcmtf] Answers to possible questions in the BOF

Dan Wing <dwing@cisco.com> Wed, 03 July 2013 18:55 UTC

Return-Path: <dwing@cisco.com>
X-Original-To: tcmtf@ietfa.amsl.com
Delivered-To: tcmtf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 19FB821F9BF5 for <tcmtf@ietfa.amsl.com>; Wed, 3 Jul 2013 11:55:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.46
X-Spam-Level:
X-Spam-Status: No, score=-110.46 tagged_above=-999 required=5 tests=[AWL=0.139, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X98hFGiZBPFC for <tcmtf@ietfa.amsl.com>; Wed, 3 Jul 2013 11:55:55 -0700 (PDT)
Received: from mtv-iport-3.cisco.com (mtv-iport-3.cisco.com [173.36.130.14]) by ietfa.amsl.com (Postfix) with ESMTP id BF21F11E81F9 for <tcmtf@ietf.org>; Wed, 3 Jul 2013 11:55:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=6018; q=dns/txt; s=iport; t=1372877754; x=1374087354; h=mime-version:subject:from:in-reply-to:date:cc: content-transfer-encoding:message-id:references:to; bh=q7Nk1zxR9Ditjn8HmtHA4RvxXAvgTVWlM+E5cUioRSI=; b=ctFHnLIuoTxU6Ro/juoOjO5XOgv9fMkLqvQutQdQjaNzTFKRorz+9FLj knAUx2FRUgcIpk/05WkJZycScqrWXfnFa0syKYz8r+UPnfTbDkhOt76de XbAm0HpZvbanfxrog0mSKiZCVvztF+WDvCHy0ZumzDZlHKCF1YLPG8olO Q=;
X-IronPort-AV: E=Sophos;i="4.87,989,1363132800"; d="scan'208";a="82638786"
Received: from mtv-core-4.cisco.com ([171.68.58.9]) by mtv-iport-3.cisco.com with ESMTP; 03 Jul 2013 18:55:46 +0000
Received: from sjc-vpn2-667.cisco.com (sjc-vpn2-667.cisco.com [10.21.114.155]) by mtv-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id r63Ith3Q010750; Wed, 3 Jul 2013 18:55:43 GMT
Content-Type: text/plain; charset="iso-8859-1"
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
From: Dan Wing <dwing@cisco.com>
In-Reply-To: <E721D8C6A2E1544DB2DEBC313AF54DE22417E050@xmb-rcd-x02.cisco.com>
Date: Wed, 03 Jul 2013 11:55:43 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <23E6BFC1-4D3C-48A5-A9A2-3BD32863F9A6@cisco.com>
References: <007e01ce70c9$fe1a0aa0$fa4e1fe0$@unizar.es> <009901ce725a$d1623360$74269a20$@unizar.es> <2543ED38-A2FF-49D7-85E0-4790A31415BC@cisco.com> <20130628105725.lmag0xgqsgogggww@webmail.unizar.es> <EFFB6AC1-BF9A-47D9-B5B8-3DD34A508FE8@cisco.com> <E721D8C6A2E1544DB2DEBC313AF54DE22417E050@xmb-rcd-x02.cisco.com>
To: Muthu Arul Mozhi Perumal <mperumal@cisco.com>
X-Mailer: Apple Mail (2.1508)
Cc: "tcmtf@ietf.org" <tcmtf@ietf.org>, "jltornos@unizar.es" <jltornos@unizar.es>, "jsaldana@unizar.es" <jsaldana@unizar.es>
Subject: Re: [tcmtf] Answers to possible questions in the BOF
X-BeenThere: tcmtf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Tunneling Compressed Multiplexed Traffic Flows \(TCMTF\) discussion list" <tcmtf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcmtf>, <mailto:tcmtf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcmtf>
List-Post: <mailto:tcmtf@ietf.org>
List-Help: <mailto:tcmtf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcmtf>, <mailto:tcmtf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Jul 2013 18:55:59 -0000

On Jul 3, 2013, at 11:51 AM, Muthu Arul Mozhi Perumal (mperumal) <mperumal@cisco.com> wrote:

> |However, if there are a bunch of IPsec packets sharing a common path, 
> |I could see them being successfully multiplexed into one larger packet 
> |at one tunnel endpoint and then de-multiplexed at the other tunnel endpoint.  
> |This can provide a packet per second reduction.  I don't think there are
> |enough bytes in an IPsec header to bother trying to do IPsec header 
> |compression (SPI and sequence number are only 64 bits).
> 
> Actually, RFC5856 describes how ROHC can be used over IPSec (ROHCoIPsec).

My read of it was:  apply ROHC at the endpoint ("inner headers") and then do IPsec.  That is, compress and then encrypt.

-d


> Combining it with multiplexing the entire packets could provide significant reduction in the header overhead, especially for IPv6, I think.
> 
> Muthu
> 
> |-----Original Message-----
> |From: tcmtf-bounces@ietf.org [mailto:tcmtf-bounces@ietf.org] On Behalf Of Dan Wing (dwing)
> |Sent: Monday, July 01, 2013 10:25 PM
> |To: jltornos@unizar.es
> |Cc: tcmtf@ietf.org; jsaldana@unizar.es
> |Subject: Re: [tcmtf] Answers to possible questions in the BOF
> |
> |
> |On Jun 28, 2013, at 1:57 AM, jltornos@unizar.es wrote:
> |
> |> Hi all,
> |>
> |> Few days ago Julian talked about TCM-TF's security and now I've read in the link included by Dan,
> |saying that the gain obtained when multiplexing Ipsec-encrypted packets is 20-to-1. We have been
> |looking for more information about this issue and thinking about a way to reduce the needed  bandwidth
> |in IPsec flows.
> |>
> |> The main idea is to find a way to change the authentication of the individual packets and merge all
> |of them in a unique authentication. Thus, instead of using 20 IPsec tunnels, we would have a single
> |tunnel including 20 flows. Is this something similar than how Cisco gets the improvement?
> |
> |We would not be able to change IPsec any more than we could change TCP, so I would not look at how to
> |change IPsec authentication.
> |
> |However, if there are a bunch of IPsec packets sharing a common path, I could see them being
> |successfully multiplexed into one larger packet at one tunnel endpoint and then de-multiplexed at the
> |other tunnel endpoint.  This can provide a packet per second reduction.  I don't think there are
> |enough bytes in an IPsec header to bother trying to do IPsec header compression (SPI and sequence
> |number are only 64 bits).
> |
> |-d
> |
> |
> |>
> |> José Luis
> |>
> |>
> |>
> |> Dan Wing <dwing@cisco.com> ha escrito:
> |>
> |>>
> |>> On Jun 26, 2013, at 3:49 AM, Jose Saldana <jsaldana@unizar.es> wrote:
> |>>
> |>>> Question 4: Is TCM-TF interesting for the Industry? Should the IETF  standardize this?
> |>>>
> |>>> Answer:
> |>>>
> |>>> 1) TCM-TF intends to update RFC4170, which optimizes RTP VoIP  traffic. So if RFC4170 was
> |interesting, why not updating it?
> |>>>
> |>>> 2) TCM-TF can be useful in order to save bandwidth in many cases:
> |>>>
> |>>> - Aggregation network of *network operators*: We are saving  bandwidth by optimizing and putting
> |together traffic flows. Is this  interesting for a network operator? What about overprovisioning?  The
> |idea is that there are places and moments in which a number of  flows based on small packets are in
> |the same place and at the same  moment. Then, TCM-TF can be applied in order to provide  flexibility.
> |We are not optimizing the overall Internet traffic, we  are optimizing specific flows with very tight
> |delay requirements,  which network operators have to take care of in a special way.
> |>>> www.huawei.com/ilink/en/download/HW_193034
> |>>>
> |>>> - *End to end* optimization: Nowadays, many appliances are used to  connect remote offices of the
> |same company (creating a VPN). So if  a tunnel exists, why not optimizing this traffic when possible?
> |We  would save bandwidth in the access network, where it can be scarce.
> |>>>
> |>>> - Wireless and satellite scenarios.
> |>>
> |>> "Cisco adds IP multiplexing to mobile satellite package", April  2012,
> |http://www.networkworld.com/news/2012/040912-cisco-ip-multiplexing-258082.html
> |>>
> |>>
> |>>
> |>>>
> |>>>
> |>>> Any other thoughts? Any other scenarios in mind? Potential beneficiaries?
> |>>
> |>> Some networks, today, use cRTP (RFC2508) on their access links.   This gives bandwidth savings on
> |the access link, but consumes  considerable CPU horsepower on the aggregation router (to perform
> |cRTP), but provides no bandwidth savings across the network core.   If, instead, the bandwidth could
> |be saved on the access link, across  the core, and on the far-end access link -- all without the CPU
> |impact on the aggregation router -- it is a considerable win.
> |>>
> |>> -d
> |>>
> |>>
> |>>
> |>>>
> |>>>
> |>>> Jose
> |>>>
> |>>> De: tcmtf-bounces@ietf.org [mailto:tcmtf-bounces@ietf.org] En  nombre de Jose Saldana
> |>>> Enviado el: lunes, 24 de junio de 2013 13:00
> |>>> Para: tcmtf@ietf.org
> |>>> Asunto: [tcmtf] Answers to possible questions in the BOF
> |>>>
> |>>> I would like to start a thread about possible questions people may  ask in the BOF. Obviously, we
> |also need answers, so we should  cooperate.
> |>>>
> |>>> This is different from the "questions to ask in the BOF". This will  be discussed separately.
> |>>>
> |>>> Thanks!
> |>>>
> |>>> Jose
> |>>>
> |>>> _______________________________________________
> |>>> tcmtf mailing list
> |>>> tcmtf@ietf.org
> |>>> https://www.ietf.org/mailman/listinfo/tcmtf
> |>>
> |>>
> |>
> |>
> |>
> |
> |_______________________________________________
> |tcmtf mailing list
> |tcmtf@ietf.org
> |https://www.ietf.org/mailman/listinfo/tcmtf