Re: [TERNLI] Forwarding corrupt packets

Michael Welzl <michael.welzl@uibk.ac.at> Mon, 04 September 2006 11:28 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1GKCd5-00031b-UC; Mon, 04 Sep 2006 07:28:39 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1GKCd3-00031W-TH for ternli@ietf.org; Mon, 04 Sep 2006 07:28:37 -0400
Received: from gibson.q2s.ntnu.no ([129.241.205.18]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1GKCd2-0001fA-De for ternli@ietf.org; Mon, 04 Sep 2006 07:28:37 -0400
Received: from dhcp103.q2s.ntnu.no (dhcp103.q2s.ntnu.no [129.241.205.103]) by gibson.q2s.ntnu.no (Postfix) with ESMTP id 6C7C22DD329; Mon, 4 Sep 2006 13:28:35 +0200 (CEST)
Subject: Re: [TERNLI] Forwarding corrupt packets
From: Michael Welzl <michael.welzl@uibk.ac.at>
To: gorry@erg.abdn.ac.uk
In-Reply-To: <44FC0790.6010200@erg.abdn.ac.uk>
References: <1157097623.3192.34.camel@lap10-c703.uibk.ac.at> <44F83E74.1080603@isi.edu> <1157121036.3192.148.camel@lap10-c703.uibk.ac.at> <44FC0790.6010200@erg.abdn.ac.uk>
Content-Type: text/plain
Organization: University of Innsbruck
Message-Id: <1157369310.3197.140.camel@lap10-c703.uibk.ac.at>
Mime-Version: 1.0
X-Mailer: Ximian Evolution 1.2.2 (1.2.2-4)
Date: Mon, 04 Sep 2006 13:28:30 +0200
Content-Transfer-Encoding: 7bit
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 25620135586de10c627e3628c432b04a
Cc: ternli@ietf.org, Joe Touch <touch@ISI.EDU>
X-BeenThere: ternli@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Transport-Enhancing Refinements to the Network Layer Interface <ternli.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ternli>, <mailto:ternli-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/ternli>
List-Post: <mailto:ternli@ietf.org>
List-Help: <mailto:ternli-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ternli>, <mailto:ternli-request@ietf.org?subject=subscribe>
Errors-To: ternli-bounces@ietf.org

On Mon, 2006-09-04 at 13:01, Gorry Fairhurst wrote:
> A) On which link layers support this?

Thanks for all the interesting details!


> B) On whether this extra signalling is useful?

At this point, I should perhaps mention that I'm not
making a very concrete proposal here which I try to
defend - the way I understood it, TERNLI is still in
its defining stage and people are just tossing ideas
around. So I thought I'd add an idea and see what the
reaction would be - and the reactions are surely
interesting, thanks a lot to both of you for the
feedback you gave so far!


> What I don't understand is the "essence" of the message that you need to 
> generate to utilise this, since you seem to suggest in this thread using 
> explicit signalling to set L2 state, rather than per-packet choices.

at least in the "From transport end point to network" case, yes.

> 
>  > "From transport end point to network"
> - I think we already have this as a transport option.
> - not sure I am convinced we need the signal.
> - I don't understand this signal... it seems to bind a specific TSpec 
> (IPsrc,IPdst, Transport, srcport,dstport)to a L2 identity... How do you 
> differentiate when a new app replaces the previous one with different 
> semantics?

When I proposed this, I didn't think of the parts of
the UDP-Lite and DCCP specs that Joe pointed me to,
which require link layers to detect that forwarding
corrupt packets is desired.

The "beauty" of this design notwithstanding, that signal
is therefore already existent on a per-packet basis,
so I would now agree that the message isn't useful anymore
in this direction.


>  > From network to transport end point:"Corruption Forwarding supported 
> (CF)"
> - Why do we need to know this at the transport layer?
> - If your end systems (and any L4 middleboxes!) support UDP-Lite and/or 
> DCCP with partial coverage it is FINE to use this irrespective of 
> whether the links do anyrthing special. you don't gain, but you don't 
> loose either.
> 
> - Can you clarify how the extra signalling helps?

In DCCP, the data checksum option is extra overhead, but it is
useless unless you have a link which delivers known-corrupt
data. Here I'd say that it would help.

As for UDP-Lite, a reason not to use it is (as with any
new protocol) the fact that it might not pass through
firewalls. Thus, my application could first use UDP =>
extra signaling tells me to try UDP-Lite, so I do.

Theoretically, it might be preferrable to always try
UDP-Lite first, and switch back to UDP in case of failure.
But will application programmers do this? I imagine that
the outlook of receiving a message which tells an application
to use UDP-Lite might be a more convincing argument for
application programmers to support the protocol at all.
Then again, maybe not - I'm really just guessing here.

Cheers,
Michael