Re: [tcpm] draft-eggert-tcpm-historicize-00

"Biswas, Anumita" <Anumita.Biswas@netapp.com> Sun, 27 June 2010 19:22 UTC

Return-Path: <Anumita.Biswas@netapp.com>
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3BCAE3A69BF for <tcpm@core3.amsl.com>; Sun, 27 Jun 2010 12:22:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.732
X-Spam-Level:
X-Spam-Status: No, score=-5.732 tagged_above=-999 required=5 tests=[AWL=0.867, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O3H6o8yhU9YI for <tcpm@core3.amsl.com>; Sun, 27 Jun 2010 12:22:25 -0700 (PDT)
Received: from mx2.netapp.com (mx2.netapp.com [216.240.18.37]) by core3.amsl.com (Postfix) with ESMTP id 92A2D3A69C8 for <tcpm@ietf.org>; Sun, 27 Jun 2010 12:22:25 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.53,492,1272870000"; d="scan'208";a="390677895"
Received: from smtp2.corp.netapp.com ([10.57.159.114]) by mx2-out.netapp.com with ESMTP; 27 Jun 2010 12:22:25 -0700
Received: from svlrsexc1-prd.hq.netapp.com (svlrsexc1-prd.hq.netapp.com [10.57.115.30]) by smtp2.corp.netapp.com (8.13.1/8.13.1/NTAP-1.6) with ESMTP id o5RJMOKs029462; Sun, 27 Jun 2010 12:22:25 -0700 (PDT)
Received: from SACMVEXC2-PRD.hq.netapp.com ([10.99.115.17]) by svlrsexc1-prd.hq.netapp.com with Microsoft SMTPSVC(6.0.3790.3959); Sun, 27 Jun 2010 12:22:24 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Sun, 27 Jun 2010 12:22:24 -0700
Message-ID: <A3D02FB7C6883741952C425A59E261A50973253A@SACMVEXC2-PRD.hq.netapp.com>
In-Reply-To: <4C279DA4.8080604@isi.edu>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [tcpm] draft-eggert-tcpm-historicize-00
thread-index: AcsWKdbTsDOfNqeaTpC5e3sZg0qXtgAAkKqA
From: "Biswas, Anumita" <Anumita.Biswas@netapp.com>
To: Joe Touch <touch@isi.edu>
X-OriginalArrivalTime: 27 Jun 2010 19:22:24.0739 (UTC) FILETIME=[12A65B30:01CB162E]
Cc: tcpm@ietf.org, ananth@cisco.com, L.Wood@surrey.ac.uk
Subject: Re: [tcpm] draft-eggert-tcpm-historicize-00
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 27 Jun 2010 19:22:29 -0000

> -----Original Message-----
> From: Joe Touch [mailto:touch@isi.edu] 
> Sent: Sunday, June 27, 2010 11:51 AM
> To: Biswas, Anumita
> Cc: L.Wood@surrey.ac.uk; tcpm@ietf.org; ananth@cisco.com
> Subject: Re: [tcpm] draft-eggert-tcpm-historicize-00
> 
> 
> Hi, Anumita,
> 
> Biswas, Anumita wrote:
> ...
> > I have heard only anecdotal evidence of a very large company doing 
> > very large copies of data (about a Tera Byte) across a 
> local network 
> > and then finding bit corruptions in the data received on 
> the other end 
> > - clearly the link CRC and the TCP 1s compl summation 
> checksum failed 
> > to catch those errors.
> 
> Well, that's the point. It's not so clear that the checks are 
> what failed. It could easily have been a bug in the 
> implementation, or an error in the hardware that corrupted 
> data after it was received correctly. I.e., no matter how 
> good these checks, there are other ways in which data can be 
> corrupted.
> 
> > In my own company, I have seen a case where a very large 
> block (1460 
> > bytes - a packet size) of data was replaced and gone 
> undetected and we 
> > could not root cause the problem - the problem just 
> disappeared after 
> > showing up for a few weeks - but in this case, it is 
> possible that the 
> > corruption occurred before the data was sent by TCP itself.
> 
> Yes, that's my concern.
> 
> > So to me, to hinge whether we support a new TCP CRC based 
> checksum or 
> > not, on practical experience in the wild, is probably not a safe 
> > approach. Ofcourse, if we had multiple proven examples of 
> this in the 
> > wild, we'd feel more motivated to do this.
> 
> I don't follow this logic. We have no measured evidence of 
> this ever occurring. The evidence we have to date is that the 
> end system software is more likely the problem.
> 
> Everything so far points to the need for an application 
> protocol check, i.e., a final, total transfer checksum on 
> each large transaction (i.e., the whole file). That was one 
> conclusion of the 2000 paper, FWIW.
> 
I mentioned the advantage of being able to offload a TCP based checksum
to the NIC. If I were to extend your argument that end system software
is more likely the problem - a checksum over the whole file could also
be prone to error. 

I think we are only trying to deploy a "stronger" checksum - we are not
making claims that it will find all problems in end to end software -
and as such is not the strongest checksum.

> > Also, I am more worried about packet sizes greater than 
> 1500 bytes - 
> > where the Ethernet CRC checksum becomes weaker. Typical 
> ethernet MTUs 
> > across the internet does not exceed 1500 bytes today - so 
> right now, 
> > the problem scope is limited to Data Centers and other such 
> local LANs 
> > where the end to end PMTU is greater than 1500 bytes.
> 
> That should be verifiable. Then again, if the CRC32 fails on 
> jumboframes, why would adding CRC16 at TCP help? other than 
> the fact that it's a 'different' sum?  
The draft suggests using the Castagnoli 32-bit polynomial used in the
"CRC 32C" algorithm which generates a 32 bit checksum quantity. No
mention of CRC16.
The draft specifies using a different "space" in the TCP options area,
to transfer this checksum. It does not suggest using the 16-bit TCP
checksum space for this value. It does debate over what to do with the
16-bit summation checksum. Now, after many discussions, it is more clear
that we do need the 16-bit checksum as well to prevent middleboxes from
breaking. 

http://tools.ietf.org/html/draft-anumita-tcpm-stronger-checksum-00

Please read why the Castagnoli polynomial based CRC checksum is stronger
than the Ethernet CRC32 checksum carried by the Ethernet frame. 

Your argument suggests 
> that such data centers need different *ethernet* checksums, 
> not different TCP ones. Then the data centers can leverage - 
> and reuse - that where necessary.
The ideal way to do this would be to have Ethernet frames include the
CRC32C checksum instead of the CRC32 checksum. But changing the Ethernet
standard across the board is impossible due to backward compatibility
issues. But TCP options provides a much easier path to introducing a
stronger checksum as it does not break backward compatibility and can be
offloaded to the NIC as well. 

Data Centers are one place where Jumbo frames are deployed - but there
could be others. So I don't understand what you mean by "data centers
can leverage and reuse that where necessary".

> 
> Joe
> 
>