Internet Engineering Task Force J. Hadi Salim Internet-Draft Mojatatu Networks Intended status: Informational July 05, 2013 Expires: January 06, 2014 ForCES Protocol Extensions draft-jhs-forces-protoextenstion-01 Abstract Experience in implementing and deploying ForCES architecture has demonstrated need for a few small extensions both to ease programmability and to improve wire efficiency of some transactions. This document describes a few extensions to the ForCES Protocol Specification [RFC5810] semantics to achieve that end goal. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on January 06, 2014. Copyright Notice Copyright (c) 2013 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Hadi Salim Expires January 06, 2014 [Page 1] Internet-Draft ForCES Protocol Extensions July 2013 Table of Contents 1. Terminology and Conventions . . . . . . . . . . . . . . . . . 2 1.1. Requirements Language . . . . . . . . . . . . . . . . . . 2 1.2. Definitions . . . . . . . . . . . . . . . . . . . . . . . 2 2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 4 3. Problem Overview . . . . . . . . . . . . . . . . . . . . . . 4 3.1. Table Ranges . . . . . . . . . . . . . . . . . . . . . . 4 3.2. Table Append . . . . . . . . . . . . . . . . . . . . . . 5 3.3. Error codes . . . . . . . . . . . . . . . . . . . . . . . 6 3.4. Bitmap Datatype . . . . . . . . . . . . . . . . . . . . . 6 4. Protocol Update Proposal . . . . . . . . . . . . . . . . . . 6 4.1. Table Ranges . . . . . . . . . . . . . . . . . . . . . . 6 4.2. Table Append . . . . . . . . . . . . . . . . . . . . . . 7 4.3. Error Codes . . . . . . . . . . . . . . . . . . . . . . . 8 4.4. Bitmap Datatype . . . . . . . . . . . . . . . . . . . . . 9 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9 6. Security Considerations . . . . . . . . . . . . . . . . . . . 9 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 9 7.1. Normative References . . . . . . . . . . . . . . . . . . 9 7.2. Informative References . . . . . . . . . . . . . . . . . 10 Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 10 1. Terminology and Conventions 1.1. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. 1.2. Definitions This document reiterates the terminology defined by the ForCES architecture in various documents for the sake of clarity. FE Model - The FE model is designed to model the logical processing functions of an FE. The FE model proposed in this document includes three components; the LFB modeling of individual Logical Functional Block (LFB model), the logical interconnection between LFBs (LFB topology), and the FE-level attributes, including FE capabilities. The FE model provides the basis to define the information elements exchanged between the CE and the FE in the ForCES protocol [RFC5810]. Hadi Salim Expires January 06, 2014 [Page 2] Internet-Draft ForCES Protocol Extensions July 2013 LFB (Logical Functional Block) Class (or type) - A template that represents a fine-grained, logically separable aspect of FE processing. Most LFBs relate to packet processing in the data path. LFB classes are the basic building blocks of the FE model. LFB Instance - As a packet flows through an FE along a data path, it flows through one or multiple LFB instances, where each LFB is an instance of a specific LFB class. Multiple instances of the same LFB class can be present in an FE's data path. Note that we often refer to LFBs without distinguishing between an LFB class and LFB instance when we believe the implied reference is obvious for the given context. LFB Model - The LFB model describes the content and structures in an LFB, plus the associated data definition. XML is used to provide a formal definition of the necessary structures for the modeling. Four types of information are defined in the LFB model. The core part of the LFB model is the LFB class definitions; the other three types of information define constructs associated with and used by the class definition. These are reusable data types, supported frame (packet) formats, and metadata. LFB Metadata - Metadata is used to communicate per-packet state from one LFB to another, but is not sent across the network. The FE model defines how such metadata is identified, produced, and consumed by the LFBs, but not how the per-packet state is implemented within actual hardware. Metadata is sent between the FE and the CE on redirect packets. ForCES Component - A ForCES Component is a well-defined, uniquely identifiable and addressable ForCES model building block. A component has a 32-bit ID, name, type, and an optional synopsis description. These are often referred to simply as components. LFB Component - An LFB component is a ForCES component that defines the Operational parameters of the LFBs that must be visible to the CEs. ForCES Protocol - Protocol that runs in the Fp reference points in the ForCES Framework [RFC3746]. ForCES Protocol Layer (ForCES PL) - A layer in the ForCES protocol architecture that defines the ForCES protocol messages, the protocol state transfer scheme, and the ForCES protocol architecture itself as defined in the ForCES Protocol Specification [RFC5810]. Hadi Salim Expires January 06, 2014 [Page 3] Internet-Draft ForCES Protocol Extensions July 2013 ForCES Protocol Transport Mapping Layer (ForCES TML) - A layer in ForCES protocol architecture that uses the capabilities of existing transport protocols to specifically address protocol message transportation issues, such as how the protocol messages are mapped to different transport media (like TCP, IP, ATM, Ethernet, etc.), and how to achieve and implement reliability, ordering, etc. the ForCES SCTP TML [RFC5811] describes a TML that is mandated for ForCES. 2. Introduction Experience in implementing and deploying ForCES architecture has demonstrated need for a few small extensions both to ease programmability and to improve wire efficiency of some transactions. This document describes a few extensions to the ForCES Protocol Specification [RFC5810] semantics to achieve that end goal. This document describes and justifies the need for 4 small extensions which are backward compatible. 1. A table range operation to allow a controller or control application to request or delete an arbitrary range of table rows. 2. A table append operation to allow a controller to add a new table row using the next available table index. 3. Improved Error codes returned to the controller (or control application) to improve granularity of existing defined error codes. 4. Optimization to packing and addressing commonly used bitmap structure. 3. Problem Overview In this section we present sample use cases to illustrate the challenge being addressed. 3.1. Table Ranges Consider, for the sake of illustration, an FE table with 1 million reasonably sized table rows which are sparsely populated. ForCES GET requests sent from a controller (or control app) are prepended with a path to a component and sent to the FE. In the case of indexed tables, the component path can either be to a table or a table row index. A control application attempting to retrieve the Hadi Salim Expires January 06, 2014 [Page 4] Internet-Draft ForCES Protocol Extensions July 2013 first 2000 table rows appearing between row indices 23 and 10023 can achieve its goal in one of: o Dump the whole table and filter for the needed 2000 table rows. o Send upto 10000 ForCES PL requests with monotonically incrementing indices and stop when the needed 2000 entries are retrieved. o Use ForCES batching to send fewer large messages (several path requests at a time with incrementing indices until you hit the require number of entries). All of these approaches are programmatically (from an application point of view) unfriendly, tedious, and are seen as abuse of both compute and bandwidth resources. 3.2. Table Append For the sake of illustration, assume that a newly spawned controller application wishes to install a table row but it has no apriori knowledge of which table index to use. ForCES allows a controller/control app to request for the next available table index as demonstrated in (Figure 1) (refer to [RFC5810] section 4.8.2 for details of table properties). CE/App FE | | | | |GETproperty firstUnusedSubscript of table X | 1 |------------------------------------------->| | | | Table X firstUnusedSubscript is 1234 | 2 |<-------------------------------------------| | | | Table update using index 1234 | 3 |<------------------------------------------>| | | Figure 1: ForCES table property request The problem with the above setup is the application requires one roundtrip time to figure out the index to insert into. Moreover, depending on implementation (and in presence of multiple control applications): Hadi Salim Expires January 06, 2014 [Page 5] Internet-Draft ForCES Protocol Extensions July 2013 1. there is no guarantee that the next available subscript in the above example would stay at 1234 at the moment an application chooses to do the update; this will entirely depend on implementation at the FE and/or available holes in the table. 2. In case of multiple apps wishing to insert rows to the same table concurently, all contending apps will be returned the same value for unused subscript; however, if all the contending apps try to insert at the same time, only the first one to reach the FE row will succeed. A solution involving a reservation mechanism to ask for an index will contribute complexity. We conclude that even in the best case scenario, if the application wishes to insert more than one entry, it will have to incur the roundtrip time for every to-be-inserted table row. This greatly affects table add latencies and update rates. 3.3. Error codes [RFC5810] has defined a generic set of error codes that are to be returned to the CE from an FE. Deployment experience has shown that it would be useful to have more fine grained error codes. As an example, the error code E_NOT_SUPPORTED could be mapped to many FE error source possibilities that need to be then interpreted by the caller based on some understanding of the nature of the sent request. This makes debugging more time consuming. 3.4. Bitmap Datatype TBA 4. Protocol Update Proposal This section describes proposals to update the protocol for issues discussed in Section 3 4.1. Table Ranges We propose to add a Table-range TLV (type ID 0x117) that will be associated with the PATH-DATA TLV in the same manner the KEYINFO-TLV is. OPER = GET PATH-DATA: flags = F_SELTABRANGE, IDCount = 2, IDs = {1,6} TABLERANGE-TLV = {11,23} Figure 2: ForCES table range request Hadi Salim Expires January 06, 2014 [Page 6] Internet-Draft ForCES Protocol Extensions July 2013 Figure 2 illustrates a GET request for a a table range for rows 11 to 23 of a table with component path of 1/6. Path flag of F_SELTABRANGE (0x2 i.e bit 1, where bit 0 is F_SELKEY as defined in RFC 5810) is set to indicate the presence of the Table- range TLV. The pathflag bit F_SELTABRANGE can only be used in a GET and is mutually exclusive with F_SELKEY. The FE MUST enforce those constraints and reject a request with an error code of E_INVALID_FLAGS with an english description of what the problem is (refer to Section 4.3). The Table-range TLV contents constitute: o A 32 bit start index. An index of 0 implies the beggining of the table row. o A 32 bit end index. A value of 0xFFFFFFFFFFFFFFFF implies the last entry. XXX: Do we need to define the "end wildcard"? The response for a table range query will either be: o The requested table data returned (when at least one referenced row is available); in such a case, a response with a path pointing to the table and whose data content contain the row(s) will be sent to the CE. The data content MUST be encapsulated in sparsedata TLV. The sparse data TLV content will have the "I" (in ILV) for each table row indicating the table indices. o A result TLV when: * data is absent where the result code of E_NOT_SUPPORTED (typically returned in current implementations when accessing an empty table entry) with an english message describing the nature of the error (refer to Section 4.3). * When both a path key and path table range are reflected on the the pathflags, an error code of E_INVALID_FLAGS with an english message describing the nature of the erro (refer to Section 4.3). * other standard ForCES errors (such as ACL constraints trying to retrieve contents of an unreadable table), accessing unknown components etc. 4.2. Table Append We propose using a path flag, F_TABAPPEND(0x4, bit 2) to achieve this goal. Hadi Salim Expires January 06, 2014 [Page 7] Internet-Draft ForCES Protocol Extensions July 2013 When a CE application wishes to append to the table, it will set the path to a desired table index and set the path flag to F_TABAPPEND. The FE will first attempt to use the specified index and when unsuccessful will use an available table row index. On success or failure to insert the table row, a result TLV will be returned with the appropriate code. Alternatively a the new EXTENDED-RESULT-TLV (refer to Section 4.3) maybe returned. The path of the response will contain the table row index where the table row was inserted (which the application can then learn). When successful, an E_SUCCESS return code is sent back to the CE. Upon failure to append the table row, an appropriate error code is sent back to the CE. 4.3. Error Codes We propose a new TLV, EXTENDED-RESULT-TLV (0x118) that will carry both a result code as currently specified but also a string[N] cause. This is illustrated in Figure 3. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type = EXTENDED-RESULT-TLV | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Result Value | Reserved | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Cause string | . . | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 3: Extended Result TLV o Like all other ForCES TLVs, the Extended Result TLV is expected to be 32 bit aligned. o The Result Value is derived from the same current namespace as specified in RFC 5810, section 7.1.7. o It is recommended that the maximum size of the cause string should not exceed 32 bytes. We do not propose the cause string be standardized. Hadi Salim Expires January 06, 2014 [Page 8] Internet-Draft ForCES Protocol Extensions July 2013 XXX: Backward compatibility may require that we add a FEPO capability to advertise ability to do extended results so that the CE is able to interpret the results. 4.4. Bitmap Datatype TBA 5. IANA Considerations This document registers two new top Level TLVs and two new path flags. The following new TLVs are defined: o Table-range TLV (type ID 0x117) o EXTENDED-RESULT-TLV (type ID 0x118) The following new path flags are defined: o F_SELTABRANGE (value 0x2 i.e bit 1) o F_TABAPPEND (value 0x4 i.e bit 2) 6. Security Considerations TBD 7. References 7.1. Normative References [RFC3746] Yang, L., Dantu, R., Anderson, T., and R. Gopal, "Forwarding and Control Element Separation (ForCES) Framework", RFC 3746, April 2004. [RFC5810] Doria, A., Hadi Salim, J., Haas, R., Khosravi, H., Wang, W., Dong, L., Gopal, R., and J. Halpern, "Forwarding and Control Element Separation (ForCES) Protocol Specification", RFC 5810, March 2010. [RFC5811] Hadi Salim, J. and K. Ogawa, "SCTP-Based Transport Mapping Layer (TML) for the Forwarding and Control Element Separation (ForCES) Protocol", RFC 5811, March 2010. Hadi Salim Expires January 06, 2014 [Page 9] Internet-Draft ForCES Protocol Extensions July 2013 [RFC5812] Halpern, J. and J. Hadi Salim, "Forwarding and Control Element Separation (ForCES) Forwarding Element Model", RFC 5812, March 2010. 7.2. Informative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. Author's Address Jamal Hadi Salim Mojatatu Networks Suite 400, 303 Moodie Dr. Ottawa, Ontario K2H 9R4 Canada Email: hadi@mojatatu.com Hadi Salim Expires January 06, 2014 [Page 10]