< draft-irtf-panrg-questions-11.txt   draft-irtf-panrg-questions-12.txt >
Path Aware Networking RG B. Trammell Path Aware Networking RG B. Trammell
Internet-Draft Google Switzerland GmbH Internet-Draft Google Switzerland GmbH
Intended status: Informational 11 November 2021 Intended status: Informational 25 January 2022
Expires: 15 May 2022 Expires: 29 July 2022
Current Open Questions in Path Aware Networking Current Open Questions in Path Aware Networking
draft-irtf-panrg-questions-11 draft-irtf-panrg-questions-12
Abstract Abstract
In contrast to the present Internet architecture, a path-aware In contrast to the present Internet architecture, a path-aware
internetworking architecture has two important properties: it exposes internetworking architecture has two important properties: it exposes
the properties of available Internet paths to endpoints, and provides the properties of available Internet paths to endpoints, and provides
for endpoints and applications to use these properties to select for endpoints and applications to use these properties to select
paths through the Internet for their traffic. While this property of paths through the Internet for their traffic. While this property of
"path awareness" already exists in many Internet-connected networks "path awareness" already exists in many Internet-connected networks
within single domains and via administrative interfaces to the within single domains and via administrative interfaces to the
skipping to change at page 2, line 10 skipping to change at page 2, line 10
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/. Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on 15 May 2022. This Internet-Draft will expire on 29 July 2022.
Copyright Notice Copyright Notice
Copyright (c) 2021 IETF Trust and the persons identified as the Copyright (c) 2022 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/ Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document. license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components and restrictions with respect to this document. Code Components
extracted from this document must include Simplified BSD License text extracted from this document must include Revised BSD License text as
as described in Section 4.e of the Trust Legal Provisions and are described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Simplified BSD License. provided without warranty as described in the Revised BSD License.
Table of Contents Table of Contents
1. Introduction to Path-Aware Networking . . . . . . . . . . . . 2 1. Introduction to Path-Aware Networking . . . . . . . . . . . . 2
1.1. Definition . . . . . . . . . . . . . . . . . . . . . . . 4 1.1. Definitions . . . . . . . . . . . . . . . . . . . . . . . 4
2. Questions . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2. Questions . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1. A Vocabulary of Path Properties . . . . . . . . . . . . . 5 2.1. A Vocabulary of Path Properties . . . . . . . . . . . . . 5
2.2. Discovery, Distribution, and Trustworthiness of Path 2.2. Discovery, Distribution, and Trustworthiness of Path
Properties . . . . . . . . . . . . . . . . . . . . . . . 5 Properties . . . . . . . . . . . . . . . . . . . . . . . 5
2.3. Supporting Path Selection . . . . . . . . . . . . . . . . 6 2.3. Supporting Path Selection . . . . . . . . . . . . . . . . 6
2.4. Interfaces for Path Awareness . . . . . . . . . . . . . . 6 2.4. Interfaces for Path Awareness . . . . . . . . . . . . . . 6
2.5. Implications of Path Awareness for the Transport and 2.5. Implications of Path Awareness for the Transport and
Application Layers . . . . . . . . . . . . . . . . . . . 7 Application Layers . . . . . . . . . . . . . . . . . . . 7
2.6. What is an Endpoint? . . . . . . . . . . . . . . . . . . 7 2.6. What is an Endpoint? . . . . . . . . . . . . . . . . . . 7
2.7. Operating a Path Aware Network . . . . . . . . . . . . . 8 2.7. Operating a Path Aware Network . . . . . . . . . . . . . 8
2.8. Deploying a Path Aware Network . . . . . . . . . . . . . 9 2.8. Deploying a Path Aware Network . . . . . . . . . . . . . 8
3. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 10 3. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 9
4. Informative References . . . . . . . . . . . . . . . . . . . 10 4. Informative References . . . . . . . . . . . . . . . . . . . 10
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 11 Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 10
1. Introduction to Path-Aware Networking 1. Introduction to Path-Aware Networking
In the current Internet architecture, the network layer provides an In the current Internet architecture, the network layer provides a
unverifiable, best-effort service to the endpoints using it. While best-effort service to the endpoints using it, without verifiability
there are technologies that attempt better-than-best-effort delivery, of the properties of the path between tne endpoints. While there are
the interfaces to these are generally administrative as opposed to network layer technologies that attempt better-than-best-effort
endpoint-exposed (e.g. Path Computation Element (PCE) [RFC4655] and delivery, the interfaces to these are generally administrative as
Software-Defined Wide Area Network (SD-WAN) approaches), and they are opposed to endpoint-exposed (e.g. Path Computation Element (PCE)
often restricted to single administrative domains. In this
environment, an application can assume that a packet with a given [RFC4655] and Software-Defined Wide Area Network (SD-WAN)
destination address will eventually be forwarded toward that approaches), and they are often restricted to single administrative
destination, but little else. domains. In this architecture, an application can assume that a
packet with a given destination address will eventually be forwarded
toward that destination, but little else.
A transport layer protocol such as TCP can provide reliability over A transport layer protocol such as TCP can provide reliability over
this best-effort service, and a protocol above the network layer such this best-effort service, and a protocol above the network layer,
as IPsec Authentication Header (AH) [RFC4302] or Transport Layer such as Transport Layer Security (TLS) [RFC8446] can authenticate the
Security (TLS) [RFC8446] can authenticate the remote endpoint. remote endpoint. However, little, if any, explicit information about
However, little, if any, explicit information about the path is the path is available to the endpoints, and any assumptions made
available to the endpoint, and assumptions about that path often do about that path often do not hold. These sometimes have serious
not hold, sometimes with serious impacts on the application, as in impacts on the application, as in the case with BGP hijacking
the case with BGP hijacking attacks. attacks.
By contrast, in a path-aware internetworking architecture, endpoints By contrast, in a path-aware internetworking architecture, endpoints
have the ability to select or influence the path through the network can select or influence the path(s) through the network used by any
used by any given packet or flow. The network and transport layers given packet or flow. The network and transport layers explicitly
explicitly expose information about the path or paths available from expose information about the path or paths available to the endpoints
one endpoint to another, and to those endpoints and the applications and to the applications running on them, so that they can make this
running on them, so that they can make this selection. The selection. The Application Layer Traffic Optimization (ALTO)
Application Layer Traffic Optimization (ALTO) protocol [RFC7285] can protocol [RFC7285] can be seen as an example of a path-awareness
be seen as an example of a path-awareness approach implemented in approach implemented in transport-layer terms on the present Internet
transport-layer terms on the present Internet protocol stack. protocol stack.
Path selection provides explicit visibility and control of network Path selection provides explicit visibility and control of network
treatment to applications and users of the network. This selection treatment to applications and users of the network. This selection
is available to the application, transport, and/or network layer is available to the application, transport, and/or network layer
entities at each endpoint. Path control at the flow and subflow entities at each endpoint. Path control at the flow and subflow
level enables the design of new transport protocols that can leverage level enables the design of new transport protocols that can leverage
multipath connectivity across disjoint paths through the Internet, multipath connectivity across disjoint paths through the Internet,
even over a single physical interface. When exposed to applications, even over a single physical interface. When exposed to applications,
or to end-users through a system configuration interface, path or to end-users through a system configuration interface, path
control allows the specification of constraints on the paths that control allows the specification of constraints on the paths that
skipping to change at page 4, line 11 skipping to change at page 4, line 11
internetworking seeks to extend this awareness across domain internetworking seeks to extend this awareness across domain
boundaries without resorting to overlays, except as a transition boundaries without resorting to overlays, except as a transition
technology. technology.
This document presents a snapshot of open questions in this space This document presents a snapshot of open questions in this space
that will need to be answered in order to realize a path-aware that will need to be answered in order to realize a path-aware
internetworking architecture; it is published to further frame internetworking architecture; it is published to further frame
discussions within and outside the Path Aware Networking Research discussions within and outside the Path Aware Networking Research
Group, and is published with the rough consensus of that group. Group, and is published with the rough consensus of that group.
1.1. Definition 1.1. Definitions
For purposes of this document, "path aware networking" describes For purposes of this document, "path aware networking" describes
endpoint discovery of the properties of paths they use for endpoint discovery of the properties of paths they use for
communication across an internetwork, and endpoint reaction to these communication across an internetwork, and endpoint reaction to these
properties that affects routing and/or data transfer. Note that this properties that affects routing and/or data transfer. Note that this
can and already does happen to some extent in the current Internet can and already does happen to some extent in the current Internet
architecture; this definition expands current techniques of path architecture; this definition expands current techniques of path
discovery and manipulation to cross administrative domain boundaries discovery and manipulation to cross administrative domain boundaries
and up to the transport and application layers at the endpoints. and up to the transport and application layers at the endpoints.
skipping to change at page 4, line 36 skipping to change at page 4, line 36
which enable this discovery and selection. which enable this discovery and selection.
A "path", for the purposes of these definitions, is abstractly A "path", for the purposes of these definitions, is abstractly
defined as a sequence of adjacent path elements over which a packet defined as a sequence of adjacent path elements over which a packet
can be transmitted, where the definition of "path element" is can be transmitted, where the definition of "path element" is
technology-dependent. As this document is intended to pose questions technology-dependent. As this document is intended to pose questions
rather than answer them, it assumes that this definition will be rather than answer them, it assumes that this definition will be
refined as part of the answer the first two questions it poses, about refined as part of the answer the first two questions it poses, about
the vocabulary of path properties and how they are disseminated. the vocabulary of path properties and how they are disseminated.
Research into path aware networking covers any and all aspects of Research into path aware internetworking covers any and all aspects
designing, building, and operating path aware internetworks or the of designing, building, and operating path aware internetworks or the
networks and endpoints attached to them. This document presents a networks and endpoints attached to them. This document presents a
collection of research questions to address in order to make a path collection of research questions to address in order to make a path
aware Internet a reality. aware Internet a reality.
2. Questions 2. Questions
Realizing path-aware networking requires answers to a set of open Realizing path-aware networking requires answers to a set of open
research questions. This document poses these questions, as a research questions. This document poses these questions, as a
starting point for discussions about how to realize path awareness in starting point for discussions about how to realize path awareness in
the Internet, and to direct future research efforts within the Path the Internet, and to direct future research efforts within the Path
skipping to change at page 5, line 21 skipping to change at page 5, line 21
and for the endpoint to make use of that information, it is necessary and for the endpoint to make use of that information, it is necessary
to define a common vocabulary for paths through an internetwork, and to define a common vocabulary for paths through an internetwork, and
properties of those paths. The elements of this vocabulary could properties of those paths. The elements of this vocabulary could
include terminology for components of a path and properties defined include terminology for components of a path and properties defined
for these components, for the entire path, or for subpaths of a path. for these components, for the entire path, or for subpaths of a path.
These properties may be relatively static, such as the presence of a These properties may be relatively static, such as the presence of a
given node or service function on the path; as well as relatively given node or service function on the path; as well as relatively
dynamic, such as the current values of metrics such as loss and dynamic, such as the current values of metrics such as loss and
latency. latency.
This vocabulary must be defined carefully, as its design will have This vocabulary and its representation must be defined carefully, as
impacts on the expressiveness of a given path-aware internetworking its design will have impacts on the properties (e.g., expressiveness,
architecture. This expressiveness also exhibits tradeoffs. For scalability, security) of a given path-aware internetworking
example, a system that exposes node-level information for the architecture. For example, a system that exposes node-level
topology through each network would maximize information about the information for the topology through each network would maximize
individual components of the path at the endpoints, at the expense of information about the individual components of the path at the
making internal network topology universally public, which may be in endpoints, at the expense of making internal network topology
conflict with the business goals of each network's operator. universally public, which may be in conflict with the business goals
Furthermore, properties related to individual components of the path of each network's operator. Furthermore, properties related to
may change frequently and may quickly become outdated. However, individual components of the path may change frequently and may
aggregating the properties of individual components to distill end- quickly become outdated. However, aggregating the properties of
to-end properties for the entire path is not trivial. individual components to distill end-to-end properties for the entire
path is not trivial.
2.2. Discovery, Distribution, and Trustworthiness of Path Properties 2.2. Discovery, Distribution, and Trustworthiness of Path Properties
The second question: how do endpoints and applications get access to The second question: how do endpoints and applications get access to
accurate, useful, and trustworthy path properties? accurate, useful, and trustworthy path properties?
Once endpoints and networks have a shared vocabulary for expressing Once endpoints and networks have a shared vocabulary for expressing
path properties, the network must have some method for distributing path properties, the network must have some method for distributing
those path properties to the endpoint. Regardless of how path those path properties to the endpoints. Regardless of how path
property information is distributed to the endpoints, the endpoints property information is distributed, the endpoints require a method
require a method to authenticate the properties -- to determine that to authenticate the properties -- to determine that they originated
they originated from and pertain to the path that they purport to. from and pertain to the path that they purport to.
Choices in distribution and authentication methods will have impacts Choices in distribution and authentication methods will have impacts
on the scalability of a path-aware architecture. Possible dimensions on the scalability of a path-aware architecture. Possible dimensions
in the space of distribution methods include in-band versus out-of- in the space of distribution methods include in-band versus out-of-
band, push versus pull versus publish-subscribe, and so on. There band, push versus pull versus publish-subscribe, and so on. There
are temporal issues with path property dissemination as well, are temporal issues with path property dissemination as well,
especially with dynamic properties, since the measurement or especially with dynamic properties, since the measurement or
elicitation of dynamic properties may be outdated by the time that elicitation of dynamic properties may be outdated by the time that
information is available at the endpoints, and interactions between information is available at the endpoints, and interactions between
the measurement and dissemination delay may exhibit pathological the measurement and dissemination delay may exhibit pathological
skipping to change at page 10, line 10 skipping to change at page 9, line 42
explicitly radiates more information about the network's deployment explicitly radiates more information about the network's deployment
and configuration, and implicitly radiates information about endpoint and configuration, and implicitly radiates information about endpoint
configuration and preference through path selection, must also be configuration and preference through path selection, must also be
addressed. addressed.
3. Acknowledgments 3. Acknowledgments
Many thanks to Adrian Perrig, Jean-Pierre Smith, Mirja Kuehlewind, Many thanks to Adrian Perrig, Jean-Pierre Smith, Mirja Kuehlewind,
Olivier Bonaventure, Martin Thomson, Shwetha Bhandari, Chris Wood, Olivier Bonaventure, Martin Thomson, Shwetha Bhandari, Chris Wood,
Lee Howard, Mohamed Boucadair, Thorben Krueger, Gorry Fairhurst, Lee Howard, Mohamed Boucadair, Thorben Krueger, Gorry Fairhurst,
Spencer Dawkins, Theresa Enghardt, Laurent Ciavaglia, and Stephen Spencer Dawkins, Reese Enghardt, Laurent Ciavaglia, Stephen Farrell,
Farrell, for discussions leading to questions in this document, and and Richard Yang, for discussions leading to questions in this
for feedback on the document itself. document, and for feedback on the document itself.
This work is partially supported by the European Commission under This work is partially supported by the European Commission under
Horizon 2020 grant agreement no. 688421 Measurement and Architecture Horizon 2020 grant agreement no. 688421 Measurement and Architecture
for a Middleboxed Internet (MAMI), and by the Swiss State Secretariat for a Middleboxed Internet (MAMI), and by the Swiss State Secretariat
for Education, Research, and Innovation under contract no. 15.0268. for Education, Research, and Innovation under contract no. 15.0268.
This support does not imply endorsement. This support does not imply endorsement.
4. Informative References 4. Informative References
[RFC4302] Kent, S., "IP Authentication Header", RFC 4302,
DOI 10.17487/RFC4302, December 2005,
<https://www.rfc-editor.org/rfc/rfc4302>.
[RFC4655] Farrel, A., Vasseur, J.-P., and J. Ash, "A Path [RFC4655] Farrel, A., Vasseur, J.-P., and J. Ash, "A Path
Computation Element (PCE)-Based Architecture", RFC 4655, Computation Element (PCE)-Based Architecture", RFC 4655,
DOI 10.17487/RFC4655, August 2006, DOI 10.17487/RFC4655, August 2006,
<https://www.rfc-editor.org/rfc/rfc4655>. <https://www.rfc-editor.org/rfc/rfc4655>.
[RFC7285] Alimi, R., Ed., Penno, R., Ed., Yang, Y., Ed., Kiesel, S., [RFC7285] Alimi, R., Ed., Penno, R., Ed., Yang, Y., Ed., Kiesel, S.,
Previdi, S., Roome, W., Shalunov, S., and R. Woundy, Previdi, S., Roome, W., Shalunov, S., and R. Woundy,
"Application-Layer Traffic Optimization (ALTO) Protocol", "Application-Layer Traffic Optimization (ALTO) Protocol",
RFC 7285, DOI 10.17487/RFC7285, September 2014, RFC 7285, DOI 10.17487/RFC7285, September 2014,
<https://www.rfc-editor.org/rfc/rfc7285>. <https://www.rfc-editor.org/rfc/rfc7285>.
 End of changes. 17 change blocks. 
63 lines changed or deleted 62 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/