[Tsvwg] ECN support when tunneling user packets in CAPWAP

Magnus Westerlund <magnus.westerlund@ericsson.com> Wed, 15 October 2008 09:38 UTC

Return-Path: <tsvwg-bounces@ietf.org>
X-Original-To: tsvwg-archive@optimus.ietf.org
Delivered-To: ietfarch-tsvwg-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C10643A6914; Wed, 15 Oct 2008 02:38:57 -0700 (PDT)
X-Original-To: tsvwg@core3.amsl.com
Delivered-To: tsvwg@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 53E403A68B5 for <tsvwg@core3.amsl.com>; Wed, 15 Oct 2008 02:38:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.195
X-Spam-Level:
X-Spam-Status: No, score=-6.195 tagged_above=-999 required=5 tests=[AWL=0.054, BAYES_00=-2.599, HELO_EQ_SE=0.35, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ET+KvFSezqHI for <tsvwg@core3.amsl.com>; Wed, 15 Oct 2008 02:38:55 -0700 (PDT)
Received: from mailgw4.ericsson.se (mailgw4.ericsson.se [193.180.251.62]) by core3.amsl.com (Postfix) with ESMTP id 1D9D63A691D for <tsvwg@ietf.org>; Wed, 15 Oct 2008 02:38:55 -0700 (PDT)
Received: from mailgw4.ericsson.se (unknown [127.0.0.1]) by mailgw4.ericsson.se (Symantec Mail Security) with ESMTP id 3CC67201FF; Wed, 15 Oct 2008 11:36:36 +0200 (CEST)
X-AuditID: c1b4fb3e-a8684bb000007a96-8d-48f5b9a4d95b
Received: from esealmw129.eemea.ericsson.se (unknown [153.88.254.124]) by mailgw4.ericsson.se (Symantec Mail Security) with ESMTP id 20A142225E; Wed, 15 Oct 2008 11:36:36 +0200 (CEST)
Received: from esealmw127.eemea.ericsson.se ([153.88.254.171]) by esealmw129.eemea.ericsson.se with Microsoft SMTPSVC(6.0.3790.1830); Wed, 15 Oct 2008 11:36:35 +0200
Received: from [147.214.183.48] ([147.214.183.48]) by esealmw127.eemea.ericsson.se with Microsoft SMTPSVC(6.0.3790.1830); Wed, 15 Oct 2008 11:36:35 +0200
Message-ID: <48F5B9A3.1040502@ericsson.com>
Date: Wed, 15 Oct 2008 11:36:35 +0200
From: Magnus Westerlund <magnus.westerlund@ericsson.com>
User-Agent: Thunderbird 2.0.0.17 (Windows/20080914)
MIME-Version: 1.0
To: capwap <capwap@frascone.com>
X-Enigmail-Version: 0.95.7
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 8bit
X-OriginalArrivalTime: 15 Oct 2008 09:36:35.0255 (UTC) FILETIME=[83CFBC70:01C92EA9]
X-Brightmail-Tracker: AAAAAA==
Cc: tsvwg <tsvwg@ietf.org>
Subject: [Tsvwg] ECN support when tunneling user packets in CAPWAP
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/tsvwg>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
Sender: tsvwg-bounces@ietf.org
Errors-To: tsvwg-bounces@ietf.org

Hi CAPWAP and TSVWG,

This email is to start off a public discussion about what support for
ECN that the CAPWAP protocol
(http://tools.ietf.org/wg/capwap/draft-ietf-capwap-protocol-specification/)
should have. This is to resolve my Discuss.

For the TSVWG people, the CAPWAP protocol is a control protocol of
wireless termination point (WTP), like 802.11 access points, from access
control (AC). The capwap protocol also have an option to tunnel the
wireless frames within the protocol. It is in this context that the
usage of ECN is relevant. The wireless frames will commonly carry IP
packets. Thus CAPWAP is among other things an IP in IP tunneling
protocol, although with some extra layers in between the two IP.

So the issue here is what support of ECN should exist in the tunneling
mechanism. ECN (RFC 3168) specifies two options for how tunnels can
handle ECN, the full functionality option where ECN is enabled on the
outer IP header and the relevant state at the tunnel egress is copied to
the inner packet. The limited option where the outer header is set as
ECN incapable. With the limited option what could have been a mark if
the inner packet is ECN enabled becomes a packet drop thus lowering the
utility of the ECN function. The ECN specification have the following
wording in section 9.1.1:

   All IP tunnels MUST implement the limited-functionality option, and
   SHOULD support the full-functionality option.

>From my perspective I haven't seen any strong arguments why the protocol
should only support the limited option. CAPWAP is intended to be used in
access networks, that is a common location for congestion. Thus, the
usage of ECN within this network can have real positive impact on the
user applications. Also ECN has been a part of IP at standard track
level since 2001 and continue to ignore this part of the IP for easy of
implementation does not help improve the Internet. Therefore I really
think CAPWAP SHOULD support full ECN. And with SHOULD I see it as there
need to be real good reasons why this shouldn't be supported.

The complications with introducing the full ECN support option at this
stage is two. One, there already exist implementations that uses this
protocol as so far specified (although some updates will be required to
cover other modifications found during the IETF last call and IESG
review). These are likely to operate with limited option as the
specification hasn't discussed ECN at all.

Secondly, there is the interoperability issue between the tunnel ingress
and egress if one is going to have this being configurable. The tunnel
ingress needs to know the support for ECN handling at the tunnel egress.
Thus the capwap protocol would need an extension to carry that
information in each direction. The problem with a full functionality
ingress and limited functionality egress is that packets that should
have been marked or dropped comes through without indication of congestion.

Thus, the best option to take the current implementations into account
and allow for deployment of full functionality where possible would be
to add additional signaling to the CAPWAP protocol to indicate the
capability of the egress to the ingress and configure the ingress
correctly. If this can be introduced in a manner that doesn't make
current implementations barf, then a nice incremental deployment story
exist.

A second way to introduce full ECN functionality is simply to mandate it
and live through a period with functionality failure towards any non
specification compliant device.

So the questions are:

- Does they exist arguments that motivates support of limited ECN
functionality only?

- Further arguments why CAPWAP really should support ECN?

- Am I over interpreting the requirement for supporting ECN?

Regards

Magnus Westerlund

IETF Transport Area Director & TSVWG Chair
----------------------------------------------------------------------
Multimedia Technologies, Ericsson Research EAB/TVM
----------------------------------------------------------------------
Ericsson AB                | Phone +46 8 4048287
Färögatan 6                | Fax   +46 8 7575550
S-164 80 Stockholm, Sweden | mailto: magnus.westerlund@ericsson.com
----------------------------------------------------------------------