Wes,

On Aug 17, 2010, at 09:53 MDT, George, Wes E [NTK] wrote:
> -----Original Message-----
> From: ipv6-boun...@ietf.org [mailto:ipv6-boun...@ietf.org] On Behalf Of Shane 
> Amante
> Sent: Tuesday, August 03, 2010 1:20 PM
> Subject: Re: Flow Label: 12 bits mutable and 8 bits immutable
> 
> 
> Because of your last two bullets I have to ask the following.  How would a 
> receiving host deterministically distinguish (1) flow-labels that were 
> created by network devices (just a 5-tuple was put into a flow-label) vs. (2) 
> flow-labels that were created by a source-host w/ a pseudo-random number + 
> 5-tuple[1]?  (Please read on before answering :-)

> [[WEG]] Perhaps I'm oversimplifying, but wouldn't it be possible to use one 
> bit to flag who set it? 0 for end-host 1 for network or vice versa? Yes, that 
> requires us to define who falls into what category, but that's manageable.

IMHO, this would likely be the start of a slippery slope.  Specifically, a few 
points to bear in mind:
1)  Once you "steal" one bit to note who set the flow-label, who's the say that 
requests to steal more bits don't surface?  For example, perhaps someone wants 
another bit to indicate if the remaining bits are mutable (i.e.: changeable by 
other downstream network elements) or immutable?  Or, perhaps, a third (or, 
fourth) bit to indicate if the flow-label is: a) 'locally-defined'; b) a 
"normal" hash of the IPv6 header's 3- or 5-tuple; or, c) some other 
well-defined application (e.g.: ROLL's request for a "InstanceID" to be 
inserted into the FL field).  Granted, some applications could get compressed 
together and one might be able to overload one-bit position to mean multiple 
things ... but, in general, this is just asking for trouble and, inevitably, 
people would want to leave 1 or 2 bits unused/reserved so that if/when you 
needed to define yet more interpretations of the FL you had bits to do so ...
2)  We have to get router vendors to build the logic to pay attention to and/or 
ignore the appropriate combination of "flags" bits in order that, for example, 
intermediate routers would be able to identify *when* to use the left-over FL 
bits as an input key for LAG and/or ECMP.  (Likewise, host vendors, etc. would 
have to implement similar logic to know when they should pay attention and 
parse incoming FL's).

Instead of all that complexity, I'd really prefer a very simple approach that 
just clarified the semantics of the flow-label in RFC 3697, preferably along 
the the lines that FL's must be constructed in a way that uniquely identifies a 
"flow" to intermediate routers (or, L2/L2.5 switches) in the network ... in 
order that a FL could always "safely" be used as an input-key to LAG or ECMP 
load-balancing.  Assuming that general design philosophy is agreed upon, then 
it's likely a variety of "application"-type drafts can safely be built upon a 
RFC 3967bis, e.g.: draft-blake, draft-donley, etc., assuming they don't 
conflict with the underlying semantics of the FL.

-shane
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to