Path Aware Networking Flashcards

1
Q

What are some of the goals of the Path Aware Networking RG?

A

They think that best- effort is not good enough for many applications and that we therefore need:

  • Discovery of paths and path properties
  • Dissemination of paths to endpoints
  • Path selection at endpoints
  • Network signalling to endpoints
  • Endpoints signalling to network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some of the mechanisms reviewed in RFC9049- “Path Aware Networking: Obstacles to deployment”

A
  • Stream Transport 2 (ST-2)
  • Integrated Services (IntServ)
  • QuickStart TCP
  • ICMP Source Quench message
  • Triggers for Transport (TRIGTRAN)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does ST2 work?

A

ST2 used a control plane layered over IP to select routes and reserve capacity for real- time streams across a network path, based on a flow specification communicated by a separate protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What did ST2 offer?

A

ST2 allowed ST2 routers along a path to offer end- to- end guarantees, primarily to satisfy the QoS requirements for real- time service over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why was ST2 not deployed?

A

ST2 was implemented in a range of equipment but was not widely used after experiments.
It did not offer desired scalability and fate- sharing properties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the lessons that the Path Aware Networking RG learned from ST2?

A
  • As time passed the trade- off between router processing and link capacity changed. Links became faster and the cost of router processing became more expensive.
  • ST2 control protocol used “hard state”, once a route was established and resources reserved, they existed until explicitly released via signalling.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does IntServ work?

A

Architecture that specifies the elements to guarantee QoS on networks.

Every router in the system implements IntServ.

Every application that requires some kind of QoS guarantee has to make an individual reservation.

“Flow spec” describe what the reservation is for.

“RSVP” is the underlying mechanism to signal it across the network and reserve capacity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why does every router that participates in IntServ maintain per- flow soft state?

A

a. Perform call admission control

b. Deliver guaranteed service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why was IntServ not deployed?

A

Because of cost:

  • IntServ must be deployed on every router that is on path where IntServ is to be used. (can include non- participating routers, but they’ll become bottlenecks)
  • IntServ maintained per- flow state.(RAM- expensive)

During IntServ discussion the following happened:

  • For many uses, it became easier to solve QoS problem by adding bandwidth.
  • DiffServ offered more cost- effective though a less fine- grained solution to the QoS problem.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the lessons that the Path Aware Networking RG learned from IntServ?

A
  • Any mechanism that requires every participating on- path router to maintain per- flow state is unlikely to succeed.
  • Any mechanism that requires an operator to upgrade all of its routers is not likely to succeed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does QuickStart TCP work?

A

It is a TCP extension that leverages support from the routers on the path to determine an allowed initial sending rate for a path through the Internet, either at start of data transfer or after idle periods.

Connections are allowed to used a higher initial cwnd if there is significant unused bandwidth along the path and if the sender and all the routers along the path approve the request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the motivation behind QuickStart TCP?

A

Without information about the path, it is difficult to determine an appropriate initial sending rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can a sender determine if routers on the path have approved the QuickStart request?

A

By examining the Time To Live (TTL) field in QuickStart packets, a sender can determine if routers on the path have approved the QuickStart request.
However the method is unable to take into account routers hidden by tunnels or other invisible network nodes at the IP layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why was QuickStart TCP not deplyed?

A

Experiments revealed challenges:

  • Difficult to detect unused bandwidth. The data visible at IP layer may be imprecise or outdated when it reaches the sender.
  • Challenging to enable parallel processing of packets.
  • Only some types of application can really benefit from QuickStart.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some lessons the Path Aware Networking RG learned from QuickStart TCP?

A

QuickStart suffers from poor incremental deployment properties regarding:

a. Required modifications in network infrastructure.
b. Interactions with applications.

Later, initial window size was increased to 10 anyway, which is much easier to change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does ICMP Source Quench message work?

A

It allowed on- path routers to request the source of a flow to reduce its sending rate. (allowing a router to provide an early indication of impending congestion)
The IP header plus the first 8 bytes of the original datagram’s data is returned to the sender. (so one message for one flow)

17
Q

Why was ICMP Source Quench not deployed?

A
  • The simple signal does not scale with link speed or with number of flows sharing a link.
  • The approach was overtaken by the evolution of congestion methods in other IETF transport. These were evolved easier since only using measurement of end- to- end path.
18
Q

What are some lessons the Path Aware Networking RG learned from ICMP Source Quench message?

A
  • RFC0792 did not sufficiently specify how the sender should react to signal, leading to unfairness depending on how they chose to respond.
  • ECN could provide a more robust and informative signal.
  • Was vulnerable to DoS attacks since it did not verify that the message originated from an on- path node.
19
Q

How does TRIGTRAN(Triggers for Transport) work?

A

It tries let TCP know when packet loss was due to a dead link so that TCP does not have to assume congestion by using some sort of signal.

20
Q

Why was TRIGTRAN not deployed?

A
  • Based on assumption that TRIGTRAN triggers would be unauthenticated which lead to shrink the scope to “the first- hop link is down”.
  • Since it would only provide “first- hop link is down”, triggers could not replace normal TCP retransmit. so added complexity.
  • Did not send the signal in response to a specific host but rather anyone using the link.
  • Intermediated forwarding nodes required modification to provide TRIGTRAN, but operators could not charge for it, so no way to recover cost.
21
Q

What lessons did the Path Aware Networking RG learn from TRIGTRAN?

A
  • Networking realities forced reductions in scope and benefits without corresponding reductions in costs and complexity.
  • Reductions in scope were result of inability for hosts to trust or authenticate TRIGTRAN signals the received from the network.
  • Operators could not charge for TRIGTRAN, meaning little incentive to purchase and deploy TRIGTRAN- capable network equipment.
22
Q

What requirements for incentives has the RG identified based on past experience?

A
  • Justify deployment: Must have great benefit.
  • Benefits for early adopters: If everyone must deploy it to get benefits it’s difficult to get early adopters.
  • Benefits during Partial Deployment:
  • Paying for Path Aware Techniques: If operators can’t charge for it, it must have huge benefits. If users are forced to pay, it should have huge benefits.
  • Impact on Operational Practices:
  • Outperforming End- to- End Protocol Mechanisms:
23
Q

What requirements for routing has the RG identified based on past experience?

A
  • Keeping traffic on Fast Paths: High- end routers are designed with hardware that can make simple per- packet forwarding but not in- band mechanisms.
  • per- connection state: per- connection state adds cost and complexity.
24
Q

What requirements for trust has the RG identified based on past experience?

A
  • Endpoints Trusting Intermediate Nodes: if intermediate nodes along path can’t be trusted, endpoints are unlikely to rely on signals to drive changes to endpoint behavior.(e.g. ICMP source quench message and TRIGTRAN)
  • Intermediate Nodes Trusting Endpoints: If the endpoints do not have any trust realtionship with intermediate nodes along path, operators are reluctant to deploy mechanisms that rely on endpoints sending control signals to routers. (e.g. Intserv)
25
Q

What requirements for usage has the RG identified based on past experience?

A
  • Reacting to Distant Signals: Informations gets outdated if travel distance is too large.
  • Support in Endpoint Protocol Stacks: There must be ways for applications to use the mechanism if information is needed from the application for it to work properly.
26
Q

What requirements for failure has the RG identified based on past experience?

A
  • Planning for failure: Having early implementers re- enable features might take long time. Also copnsider fallback mechanisms and also only implementing for subset of users first.