Re: [trill] Tsvart telechat review of draft-ietf-trill-mtu-negotiation-06

Warren Kumari <warren@kumari.net> Wed, 05 July 2017 21:21 UTC

Return-Path: <warren@kumari.net>
X-Original-To: trill@ietfa.amsl.com
Delivered-To: trill@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 94019131DEC for <trill@ietfa.amsl.com>; Wed, 5 Jul 2017 14:21:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=kumari-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vjKJtdOne3rg for <trill@ietfa.amsl.com>; Wed, 5 Jul 2017 14:21:10 -0700 (PDT)
Received: from mail-vk0-x232.google.com (mail-vk0-x232.google.com [IPv6:2607:f8b0:400c:c05::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B6B5A131DE1 for <trill@ietf.org>; Wed, 5 Jul 2017 14:21:07 -0700 (PDT)
Received: by mail-vk0-x232.google.com with SMTP id y70so506341vky.3 for <trill@ietf.org>; Wed, 05 Jul 2017 14:21:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kumari-net.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=ypmNCJ5tpUYBBtW6z5rFClnHI6OoFjhfc1gORxAQC5M=; b=B9jkYbMC7HbC/6HaG4yjsdlEnSeS245W5IhoTUZ+l8zqjfDDL5csTJMBdMKtceF97i tgxXnmak5gKGvbywKBkFD4HcjKERXIivO2veBBxzjgOi7nVr9f+oPRXSa5oRjZly9LvN EpFrJSJvld3+s00Es0T7+N6lc3kxxci9E07nD3F3yTik5xWEET08ogFP1LiEhWx6gf9J Z183Ob7TRDgUV351Brl51dWIglPGw4H+HFMJ7lrwPTFh+2RFW/xxN/Tz56tQ2ee+l1CC FEuNjp6fHZ3tQHC0O2MLIdV4SsvvKg3OZrL1l1JLP94G0vkysYEN8Mk6xi39e8VCJhxY pTMA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=ypmNCJ5tpUYBBtW6z5rFClnHI6OoFjhfc1gORxAQC5M=; b=LpM+VBlhLsMA8PWXr2v0GhXd1vnAGoILqH+K64X7Mwr6UBU9xD6WZ0PJNXT75Bcr3t yh4vYR83U2/FGIZ6P6I4iMtQDx2T6YN8USiiiy/fXgz560mhloh74MNZ9iiClhBtARa+ jGIVCz2fywl3vKEZIbCGsOFST3M4uv/Vd8nXt5jCoU3+OiytDw7MJYJsxzkx4I91/QuK HZhpay0JJ+Z8j8gp/NcGLzK+H98zQspUJxhjafb2jCrlEle0kB5spZeNjbjOx2WgQSjm LvzZfZZ/hlxTNkmyeK47uJuzamlShNb5PDyged9qWqv5F+tVrBKG+XQIFAEuhVbur+6m jipA==
X-Gm-Message-State: AIVw111K0lKgDYBxtib3T3yei9ya6lvK8fmYga1EegPEFp2whzfKNMIq /MLTYcrE74JvtT+FbWtDfkHNzRgdMTGy
X-Received: by 10.31.75.66 with SMTP id y63mr3967308vka.65.1499289666622; Wed, 05 Jul 2017 14:21:06 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.159.39.165 with HTTP; Wed, 5 Jul 2017 14:20:26 -0700 (PDT)
In-Reply-To: <149925973580.17545.6979655005275084891@ietfa.amsl.com>
References: <149925973580.17545.6979655005275084891@ietfa.amsl.com>
From: Warren Kumari <warren@kumari.net>
Date: Wed, 05 Jul 2017 17:20:26 -0400
Message-ID: <CAHw9_iJPpDj5Sz6dcXT8H-886v-QhXfyR+m2SpEkgYLr9UPkkA@mail.gmail.com>
To: Magnus Westerlund <magnus.westerlund@ericsson.com>
Cc: tsv-art@ietf.org, draft-ietf-trill-mtu-negotiation.all@ietf.org, IETF Discuss <ietf@ietf.org>, trill@ietf.org
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/trill/TNy1injrfGNgKJcFf8yDfChXEBg>
Subject: Re: [trill] Tsvart telechat review of draft-ietf-trill-mtu-negotiation-06
X-BeenThere: trill@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Developing a hybrid router/bridge." <trill.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/trill>, <mailto:trill-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/trill/>
List-Post: <mailto:trill@ietf.org>
List-Help: <mailto:trill-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/trill>, <mailto:trill-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jul 2017 21:21:12 -0000

I wanted to quickly thank Magnus for this review - it is well thought
out, and clear.

I usually focus on the OpsDir reviews, but wanted to explicitly call
this out as a good one.

W

On Wed, Jul 5, 2017 at 9:02 AM, Magnus Westerlund
<magnus.westerlund@ericsson.com> wrote:
> Reviewer: Magnus Westerlund
> Review result: Not Ready
>
> This TSV-ART review is influenced by that I did the review of
> draft-ietf-trill-over-ip.
>
> 1. So draft-ietf-trill-over-ip-10 has MTU discovery needs for
> determining if the UDP encapsulation will work or not. It references  in
> Section 8.4 the old RFC, i.e. RFC 6325, which is updated by
> draft-ietf-trill-mtu-negotiation.
>
>     TRILL IS-IS MTU PDUs, as specified in Section 5 of [RFC6325] and in
>     [RFC7177], can be used to obtain added assurance of the MTU of a
>     link.
>
> However, this is not quite true, as if the IP path MTU is below 1470
> bytes, which is not unheard of, the algorithm in the MTU negotiation
> draft can't determine it. It will only report the IP path as having an
> MTU to small when the 1470 bytes probe fail.
>
> So, if the trill-over-ip authors want to use this as a mechanism, then the MTU
> negotiation draft needs to be expanded to have more flexible lower
> boundaries. However, that appear to affect MTU negotiation quite
> significant as it needs to separate algorithm for finding MTU, from the
> different usage of the algorithm with different starting points. Where
> the normal will have a lower bound of 1470, and be more tightly coupled
> to Sz when finding Lz. While the Trill-over-IP has a different usage.
>
> I think the trill WG needs to decide on how to slice this. If the
> MTU-negotiation only targets the explicit targets in the current draft and goes
> forward now. Or if they want to meet trill-over-ip's goals which will require
> restructuring.
>
> 2. Another issue, is that I think the algorithm is a bit short on
> transmission scheduling recommendations:
>
>     1) If RB1 successfully receives the MTU-ack from RB2 to the probe of
>        the value of link-wide Lz within k tries (where k is a
>        configurable parameter whose default is 3), link MTU size is set
>        to the size of link-wide Lz and stop.
>
> If I do this test with all three packets back to back at line rate, I could
> potentially get all probes lost in the same burst loss in router queue or
> switch fabric. What I think is needed here is a specification on how these
> probes are transmitted. Spaced in a particular way, or at least minimal
> distance, and are the additional probes only sent after the previous has been
> judged to have been lost, which makes it interact with the next issue.
>
> 3. This is also unclear on what the criteria is for determining that something
> is lost:
>
>       a) If RB1 fails to receive an MTU-ack from RB2 after k tries, RB1
>           sets the "failed minimum MTU test" flag for RB2 in RB1's Hello
>           and stop.
>
> I fail to see any specification for the criteria when an MTU-ack should be
> considered to have failed to reach the probing entity. So this appear to
> require a timeout, and thus a timeout interval. Is the RTT known so that one
> can define something as lost after N*RTT? Are there possible delays in sending
> the MTU-ack that are considered okay that can affect this?
>
> 4. Section 3, the algorithm in Step 1 is unable to reach the first termination
> condition (3) "If lowerBound >= upperBound" in some cases.
>
>   Step 1: RB1 tries to send an MTU-probe padded to the size x.
>
>    1) If RB1 fails to receive an MTU-ack from RB2 after k tries:
>
>          upperBound is set to x and x is set to [(lowerBound +
>          upperBound)/2], rounded up to the nearest integer.
>
>    2) If RB1 receives an MTU-ack to a probe of size x from RB2:
>
>          link MTU size is set to x, lowerBound is set to x and x is set
>          to [(lowerBound + upperBound)/2], rounded up to the nearest
>          integer.
>
>    3) If lowerBound >= upperBound or Step 1 has been repeated n times
>       (where n is a configurable parameter whose default value is 5),
>       stop.
>
>    4) Repeat Step 1.
>
> I run this on the input data: Lower bound = 1470, Upper bound = 9216 and with
> an MTU of 7935 and gets the following sequence:
>
> Lower   Upper   X
> 1470    9216    5343
> 5343    9216    7280
> 7280    9216    8248
> 7280    8248    7764
> 7764    8248    8006
> 7764    8006    7885
> 7885    8006    7946
> 7885    7946    7916
> 7916    7946    7931
> 7931    7946    7939
> 7931    7939    7935
> 7935    7939    7937
> 7935    7937    7936
> 7935    7936    7936
> 7935    7936    7936
>
> Thus, the termination condition needs to change. The second I notice is that
> having a limitation on number of steps as 5, results in quite a large gap
> between upper and lower bound in which the MTU exists in.
>
> 5. I frankly gets confused by the application of the binary search. First it
> will in many case not be run to termination where the actual MTU is determined.
> Then the result of the upper and lower bound are just used to confirm the Sz
> value. There are no discussion about using the MTU search to determine a new
> possible value for Sz. The text is not even explicit that lower bound is the
> highest known to work Transmission unit size at the time of testing. I think
> section 3, should conclude in determine some TU value, and if that is Sz or
> something other appears quite relevant for what to do in the later sections.
>
>



-- 
I don't think the execution is relevant when it was obviously a bad
idea in the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair
of pants.
   ---maf