[v6ops] Fwd: New Version Notification for draft-lencse-v6ops-transition-scalability-05.txt

Gábor LENCSE <lencse@hit.bme.hu> Sat, 14 October 2023 17:39 UTC

Return-Path: <lencse@hit.bme.hu>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B4875C15152F for <v6ops@ietfa.amsl.com>; Sat, 14 Oct 2023 10:39:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.907
X-Spam-Level:
X-Spam-Status: No, score=-6.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yElT-q3vPAgy for <v6ops@ietfa.amsl.com>; Sat, 14 Oct 2023 10:39:50 -0700 (PDT)
Received: from frogstar.hit.bme.hu (frogstar.hit.bme.hu [IPv6:2001:738:2001:4020::2c]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E902FC137362 for <v6ops@ietf.org>; Sat, 14 Oct 2023 10:39:49 -0700 (PDT)
Received: from [192.168.0.103] (host-79-121-40-135.kabelnet.hu [79.121.40.135]) (authenticated bits=0) by frogstar.hit.bme.hu (8.17.1/8.17.1) with ESMTPSA id 39EHdVbZ045417 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO) for <v6ops@ietf.org>; Sat, 14 Oct 2023 19:39:36 +0200 (CEST) (envelope-from lencse@hit.bme.hu)
X-Authentication-Warning: frogstar.hit.bme.hu: Host host-79-121-40-135.kabelnet.hu [79.121.40.135] claimed to be [192.168.0.103]
Content-Type: multipart/alternative; boundary="------------fPySdPstnVBF4bFf0ynhX3az"
Message-ID: <67ea4384-ef73-4a1d-b02e-bc950666436f@hit.bme.hu>
Date: Sat, 14 Oct 2023 19:39:29 +0200
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
References: <169730462028.18299.14700495742922464749@ietfa.amsl.com>
Content-Language: en-US
To: "v6ops@ietf.org list" <v6ops@ietf.org>
From: Gábor LENCSE <lencse@hit.bme.hu>
In-Reply-To: <169730462028.18299.14700495742922464749@ietfa.amsl.com>
X-Forwarded-Message-Id: <169730462028.18299.14700495742922464749@ietfa.amsl.com>
X-Virus-Scanned: clamav-milter 0.103.8 at frogstar.hit.bme.hu
X-Virus-Status: Clean
Received-SPF: pass (frogstar.hit.bme.hu: authenticated connection) receiver=frogstar.hit.bme.hu; client-ip=79.121.40.135; helo=[192.168.0.103]; envelope-from=lencse@hit.bme.hu; x-software=spfmilter 2.001 http://www.acme.com/software/spfmilter/ with libspf2-1.2.11;
X-DCC-debian-Metrics: frogstar.hit.bme.hu; whitelist
X-Scanned-By: MIMEDefang 2.86 on 152.66.248.44
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/cgKYCNitYtHFp2b8-3HJuToNFdk>
Subject: [v6ops] Fwd: New Version Notification for draft-lencse-v6ops-transition-scalability-05.txt
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 14 Oct 2023 17:39:54 -0000

Dear All,

I have added my scalability measurement results of the OpenBSD PF NAT64 
implementation to my I-D: 
https://datatracker.ietf.org/doc/html/draft-lencse-v6ops-transition-scalability 


The new results are in Section 4: 
https://datatracker.ietf.org/doc/html/draft-lencse-v6ops-transition-scalability#name-scalability-of-openbsd-pf

All your comments are welcome!

If there is interest, I would be happy to present the new results at 
IETF 118.

I plan to be there in person -- fist time in my life. See many of you in 
Prague! :-)

Best regards,

Gábor

-------- Továbbított üzenet --------
Tárgy: 	New Version Notification for 
draft-lencse-v6ops-transition-scalability-05.txt
Dátum: 	Sat, 14 Oct 2023 10:30:20 -0700
Feladó: 	internet-drafts@ietf.org
Címzett: 	Gábor Lencse <lencse@sze.hu>, Gabor Lencse <lencse@sze.hu>



A new version of Internet-Draft
draft-lencse-v6ops-transition-scalability-05.txt has been successfully
submitted by Gábor Lencse and posted to the
IETF repository.

Name: draft-lencse-v6ops-transition-scalability
Revision: 05
Title: Scalability of IPv6 Transition Technologies for IPv4aaS
Date: 2023-10-14
Group: Individual Submission
Pages: 23
URL: 
https://www.ietf.org/archive/id/draft-lencse-v6ops-transition-scalability-05.txt
Status: 
https://datatracker.ietf.org/doc/draft-lencse-v6ops-transition-scalability/
HTMLized: 
https://datatracker.ietf.org/doc/html/draft-lencse-v6ops-transition-scalability
Diff: 
https://author-tools.ietf.org/iddiff?url2=draft-lencse-v6ops-transition-scalability-05

Abstract:

Several IPv6 transition technologies have been developed to provide
customers with IPv4-as-a-Service (IPv4aaS) for ISPs with an IPv6-only
access and/or core network. All these technologies have their
advantages and disadvantages, and depending on existing topology,
skills, strategy and other preferences, one of these technologies may
be the most appropriate solution for a network operator.

This document examines the scalability of the five most prominent
IPv4aaS technologies (464XLAT, Dual Stack Lite, Lightweight 4over6,
MAP-E, MAP-T) considering two aspects: (1) how their performance
scales up with the number of CPU cores, (2) how their performance
degrades, when the number of concurrent sessions is increased until
hardware limit is reached.



The IETF Secretariat