One document matched: draft-sarolahti-tsvwg-crosslayer-01.txt
Differences from draft-sarolahti-tsvwg-crosslayer-00.txt
Internet Engineering Task Force P. Sarolahti
INTERNET-DRAFT Nokia Research Center
Intended status: Informational S. Floyd
Expires: September 2007 ICIR
M. Kojo
University of Helsinki
5 March 2007
Transport-layer Considerations for Explicit Cross-layer Indications
draft-sarolahti-tsvwg-crosslayer-01.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on September 2007.
Abstract
Several types of explicit cross-layer communication schemes have
been proposed to enhance the transport protocol performance.
However, various challenges with such schemes have been identified,
Sarolahti/Floyd/Kojo [Page 1]
INTERNET-DRAFT Expires: September 2007 March 2007
for example concerning the interactions with the middleboxes and
tunnels in the network. This document discusses different types of
explicit cross-layer notification mechanisms that have been proposed
to enhance end-to-end transport performance. We analyze the
different mechanisms using a taxonomy based on what kind of network
interactions they require, and discuss the benefits and
disadvantages different approaches have. The objective is to get a
common understanding of the possibilities and challenges with these
mechanisms, with pointers to past discussions on this topic, and to
describe the possible next steps towards removing barriers from
explicit cross-layer communication in future protocols.
Sarolahti/Floyd/Kojo [Page 2]
INTERNET-DRAFT Expires: September 2007 March 2007
Table of Contents
1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Conventions and Terminology. . . . . . . . . . . . . . . 5
2. Definitions and Scope . . . . . . . . . . . . . . . . . . . . 5
2.1. Definitions. . . . . . . . . . . . . . . . . . . . . . . 5
2.2. Roles of different protocol layers . . . . . . . . . . . 6
2.3. Scope. . . . . . . . . . . . . . . . . . . . . . . . . . 7
3. Possible Benefits of Explicit Signaling . . . . . . . . . . . 7
4. Classification of Explicit Notification Mecha-
nisms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.1. In-band and out-of-band notifications. . . . . . . . . . 9
4.2. Involvement of routers on the path . . . . . . . . . . . 9
4.3. On-path and off-path mechanisms. . . . . . . . . . . . . 10
4.4. Top-down, bottom-up and mixed
notifications . . . . . . . . . . . . . . . . . . . . . . . . 11
5. Current, Proposed, and Past Explicit Cross-layer
Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
5.1. Determining the packet size. . . . . . . . . . . . . . . 11
5.2. Congestion and rate control. . . . . . . . . . . . . . . 12
5.3. Quality of Service . . . . . . . . . . . . . . . . . . . 14
6. Past IETF Activities. . . . . . . . . . . . . . . . . . . . . 15
7. Challenges with Explicit Cross-layer Mechanisms . . . . . . . 17
7.1. Security Issues. . . . . . . . . . . . . . . . . . . . . 17
7.2. IP Tunnels . . . . . . . . . . . . . . . . . . . . . . . 18
7.3. Non-conformant routers and middleboxes . . . . . . . . . 20
7.4. Processing efficiency. . . . . . . . . . . . . . . . . . 21
8. Proposals for Future Actions. . . . . . . . . . . . . . . . . 21
A. List of Changes . . . . . . . . . . . . . . . . . . . . . . . 22
Normative References . . . . . . . . . . . . . . . . . . . . . . 23
Informative References . . . . . . . . . . . . . . . . . . . . . 23
Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 27
AUTHORS' ADDRESSES . . . . . . . . . . . . . . . . . . . . . . . 27
Full Copyright Statement . . . . . . . . . . . . . . . . . . . . 29
Intellectual Property. . . . . . . . . . . . . . . . . . . . . . 29
1. Introduction
Recent research argues that the traditional interface between the
transport layer and the network layer may not be sufficient for the
present day needs [EE06]. For example, the traditional TCP
congestion control algorithms are slow to converge to sudden path
changes where the throughput and round-trip times may change by
orders of magnitude. Therefore, it has been proposed that in
addition to the "implicit" observations about the path
characteristics, such as measured round-trip times and the available
bandwidth probed by usual congestion control mechanisms, enhancing
the transport protocols by "explicit" information would be useful.
Sarolahti/Floyd/Kojo Section 1. [Page 3]
INTERNET-DRAFT Expires: September 2007 March 2007
In the past there have been different proposals on enhancing
transport protocol (usually TCP) performance by means of providing
explicit information and notifications from different protocol
layers above or below transport. The cross-layer notifications can
be local notifications from the lower or upper protocol layers of
the host device, or it can be explicit communication between the
transport peers and the network between them. The mechanisms for
cross-layer signaling inside a host implementation are largely
dependent on the operating system architecture, and therefore not of
interest for the IETF. However, explicit signaling between the
network and the end-hosts involves several considerations on the
network behavior that we try to capture in this document.
Cross-layer signaling could be used, for example, for delivering
hints to a transport sender about the characteristics of the network
path, to allow the sender to adjust its sending rate more
efficiently than what would be possible using the traditional TCP
probing mechanisms. While designing the possible uses of such
signaling, a careful consideration needs to be made of what can be
done within the limits of the congestion control principles
[RFC2914, RFC2581], without endangering the network stability and
fairness towards other flows. Often this determines whether end-
hosts can negotiate directly without network support, or whether
some or all of the routers along the network path need to support
the signaling mechanism.
One of the guiding architectural principles of the Internet has been
that the network should be stateless, with the transmission state
and intelligence residing at the end hosts [Cla88]. Although today
this principle has been ignored more than once by the different
types of Network Address Translators (NATs) and stateful firewalls,
it is an important consideration when evaluating the cross-layer
notification methods. While many of the notification mechanisms
discussed in this document conform to this principle, some
mechanisms do require some additional state in the network. Adding
new bits of state in the network is not necessarily a bad thing, but
the design should be such that loss of the state would not cause
serious fate-sharing problems that might prevent the network's
packet forwarding function from working.
While the benefits of applying cross-layer notifications to improve
the transport protocol performance has been evaluated in number of
studies [SAF06, SEE+06, KSE+04], several problems have also been
identified with regard to conformance to congestion control
principles, interactions with middleboxes in the network, or
interoperation with IP tunnels and lower layer bridges. An
important design principle would also be to maintain the layer-
abstraction that isolates the transport layer from any particular
Sarolahti/Floyd/Kojo Section 1. [Page 4]
INTERNET-DRAFT Expires: September 2007 March 2007
link technology, which is forgotten in some proposals on enhancing
the transport performance by cross-layer interactions. This
document casts an overview on different types of explicit cross-
layer notifications, and discusses their possibilities and
challenges.
The objective of the final document is to build a common
understanding of the issues related to explicit communication
between the transport layer and the network. This is intended to
help the various proposals to enhance protocol performance using
cross-layer information. Such enhancements have been discussed both
in the TSV and INT areas. Because many IETF participants are
focused on following only a selection of areas, it is possible that
work conducted in one IETF area does not get a thorough review from
participants focusing in other areas (before the IESG review).
Because the cross-layer enhancements potentially touch different
IETF areas and may be progressed in different IETF working groups,
it could be helpful to have transport layer guidelines that would
hopefully be useful in the design process of possible new cross-
layer notification schemes. An additional goal for this document is
to propose possible next steps towards solving the identified
challenges related to explicit cross-layer communication.
1.1. Conventions and Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
2. Definitions and Scope
This section defines some terms and concepts used in the rest of
this document.
2.1. Definitions
router: Network node that forwards the IP packet to the next link
towards its destination based on the information in the IP header.
A router may modify the contents of the IP header, for example by
decrementing the IPv4 TTL or IPv6 hop count fields.
middlebox: A network device along the transport path that performs
operations that are beyond the normal IP packet forwarding done by
the routers. Often this involves investigating the transport
protocol header of the packet. Firewalls and Network Address
Sarolahti/Floyd/Kojo Section 2.1. [Page 5]
INTERNET-DRAFT Expires: September 2007 March 2007
Translators (NATs) are the most common types of middlebox.
bridge: A network node that forwards the data frames based on layer
2 information. A bridge does not process the IP header.
on-path: A message that has the same sender and receiver as the
normal protrocol traffic, and that follows exactly the same sequence
of routers as the normal traffic, is called an on-path message.
off-path: A message that has a different sender or receiver, or that
is forwarded via a different sequence of routers than the normal
protocol traffic, is called an off-path message.
in-band: A message carried in the same IP packet with the normal
protocol traffic is called an in-band message. Implicitly, an in-
band message is also an on-path message.
out-of-band: A message that is not carried in a same packet with the
normal protocol traffic, but as a separate packet, is called out-of-
band message.
notification: Although notification is a rather generic term, in
this document notification is a message that carries explicit cross-
layer information.
2.2. Roles of different protocol layers
It is difficult to find a course book on computer networking that
would not begin with a description of the different protocol layers,
usually according to the ISO reference model. For example, [Hal96,
Figure 1.11] summarizes the different protocol layers as follows:
* Physical layer (1): Mechanical and electrical network interface
definitions.
* Link layer (2): Data link control (framing, data transparency,
error control).
* Network layer (3): Network routing, addressing, call set-up, and
clearing.
* Transport layer (4): End-to-end message transfer (connection
management, error control, fragmentation, flow control).
* Session layer (5): Dialog and synchronization control for
application entities.
Sarolahti/Floyd/Kojo Section 2.2. [Page 6]
INTERNET-DRAFT Expires: September 2007 March 2007
* Presentation layer (6): Transfer syntax negotiation, data
representation transformations.
* Application layer (7): File transfer, access and management,
document and message interchange, job transfer and manipulation.
Although ISO reference model layering is not explicitly visible in
many of the IETF protocols, and some protocols might do tasks of
more than one layer, it is possible to find places of different
IETF protocols in this model. Usually the proposed cross-layer
enhancements concern interactions between the link layer, network
layer, and transport layer.
2.3. Scope
This document discusses the cross-layer mechanisms that take place
between the end-hosts and the network. Local triggers inside a
protocol stack are out of the scope of the IETF, and this document
does not discuss such schemes in detail. We focus on cross-layer
notifications that are used by the transport layer to enhance the
end-to-end communication. Therefore, for example the cross-layer
information used for routing or packet forwarding inside specific
network clouds is out-of-scope. We give somewhat less attention to
off-path notification mechanisms, to make the discussion more
focused. Also, we focus on unicast traffic and do not discuss
multi-cast communication.
3. Possible Benefits of Explicit Signaling
The past proposals to add new explicit signaling mechanisms have
been motivated in the following ways.
* Mobility: One of the key design principles of the IP mobility
protocols has been to isolate the mobility from the upper protocol
layers. While this makes sense architecturally, it has been
observed that hiding the mobility event from upper layer protocols
can lead to suboptimal performance. A significant amount of
research has been conducted to investigate and optimize the
performance of the upper layers after a mobile hand-off occurs
(e.g., [SKDK06, SEE+06, DK06]). It has been observed that with
better awareness of mobility, benefits on transport protocol
performance can be achieved.
There is ongoing work in the IEEE 802.21 group to develop Media
Independent Handover services [IEEE21]. As part of this effort,
Sarolahti/Floyd/Kojo Section 3. [Page 7]
INTERNET-DRAFT Expires: September 2007 March 2007
the IEEE specifies link-layer triggers to optimize the hand-off
performance of a mobile host. The IETF is also doing the related
work in the MIPSHOP working group, and in the MOBOPTS IRTF group
[TGM+06]. While this work is targeted to optimize mobility, the
information from the specified link-layer triggers could also be
useful to transport protocols.
* High delay-bandwidth networks: TCP slow-start is known to be
inefficient when used over a very high-speed network path, or over
a network path with large propagation delay. The TCP startup
performance could be improved with explicit information about the
current available capacity of the connection path [SAF06, KHR02].
* Non-congestion losses: a traditional research topic on TCP
performance has been detection and response to packet reordering
and to packet losses that are not caused by congestion. Possible
performance benefits for being able to detect non-congestion
losses have been evaluated in a number of documents [KSE+04].
* Quality of Service: In addition to DiffServ and RSVP QoS
signaling, there have been other proposals for smaller
enhancements regarding real-time transmission of packets. For
example, Packet Lifetime Discard [GL03] assigns a lifetime for IP
packets to allow routers to drop packets that have exceeded their
lifetime, thereby saving network resources. An earlier work
proposed adjusting the link-layer reliability mode in GSM networks
based on the transport protocol in use [LR99], to allow more
timely handling of UDP packets.
4. Classification of Explicit Notification Mechanisms
We classify the explicit notification mechanisms based on their
different characteristics. First, the notifications can be
transmitted in-band in the same packets with data, or out-of-band as
separate packets from the data. Second, the notifications may need
participation from some or all routers along the connection path, or
they can be processed at the end-hosts only. Third, notifications
may be transfered on the data path or off-path, following a
different network route than the data traffic. Finally,
notifications can be top-down (originating from the transport layer
to lower layers), bottom-up (originating from lower layers and
carrying information to the transport layer), and part of an
extended conversation with a mixture of the two.
Sarolahti/Floyd/Kojo Section 4. [Page 8]
INTERNET-DRAFT Expires: September 2007 March 2007
4.1. In-band and out-of-band notifications
In-band signaling goes with the normal protocol traffic, that is,
with a protocol control message or data. The benefit is that in-band
messages are known to share the same path as the normal protocol
traffic, and generally use less header overhead than a separate
message. In addition, with in-band messages the sender is often able
to learn about a loss event via the transport protocol's normal
acknowledgment mechanisms. The disadvantage of in-band signaling is
that if some routers or middleboxes drop a packet because of unknown
protocol information (for example, a notification transfered in an
IP option), the accompanying data also gets lost, causing a
performance penalty for the data transfer. In-band notifications can
also cause additional header and processing overhead for the data
packets, especially if routers need to process additional
notification information in the packets.
Out-of-band mechanisms require a dedicated protocol for signaling.
While the out-of-band mechanisms save the normal protocol traffic
from additional overhead, the transmission of separate messages may
be prevented by middleboxes on the connection path. If the message
is lost in the network for some reason, there may not be any way for
either end of the connection path to know about it. If the out-of-
band notification needs to be matched with a particular flow, the
notification message would need to include the IP source and
destination address, transport protocol, and source and destination
transport protocol ports. Getting and using this information may not
be possible in all cases, for example when the transport protocol
header is encrypted by IPsec ESP [RFC2401]. If the notification
needs to be in synchrony with the data flow, a separate out-of-band
message may be problematic, because the message may be lost or
delayed relative to the data traffic.
4.2. Involvement of routers on the path
The possible notification mechanisms can differ in how much they
need assistance from the routers on the connection path. Some
notification mechanisms can be useful even if they are supported by
only a few of the routers on the path, whereas other notification
mechanisms require that every router on the path supports the
notification scheme. To help further discussion, we assign short
names for each category.
* "NoRouters": Mechanisms that do not require support from routers
on the connection path are easiest to deploy. For example, such
an in-band notification scheme could use a TCP option to carry the
required information. Because this class of mechanisms can use the
Sarolahti/Floyd/Kojo Section 4.2. [Page 9]
INTERNET-DRAFT Expires: September 2007 March 2007
normal unmodified IP header, there usually should not be
additional problems with legacy routers, tunnels, or middleboxes
processing these notifications. An additional benefit is that
IPsec can be used to protect the notification content.
* "SomeRouters": If some of the routers are intended to process the
notification, it needs to be placed in the packet so that the
routers are able to see it. For example, the notification needs to
be an IP option (or IPv6 hop-by-hop option), or there needs to a
Router Alert option [RFC2113, RFC2711] that signals the router to
process the packet more thoroughly. There may be some deployment
problems with this class of mechanisms. For example, some
misbehaving routers or middleboxes in the network are known to
drop IP packets based in the ECN bits in the TCP header. It is
also known that many routers or middleboxes drop packets
containing unknown IP options [MAF04].
* "AllRouters": In some cases all routers on the connection path
need to process a notification. This is a hard requirement,
because the deployment of such mechanisms can take time. The above
mentioned deployment problems with misbehaving routers and
middleboxes applies also to this class of mechanisms. Requiring
all routers to process a notification is challenging also because
the packet forwarding logic in routers is often highly optimized
and the fast path algorithms can not be expected to conduct very
complicated additional processing on the IP packets. Verifying
that all routers have indeed processed the notification can
sometimes be difficult. A common verification mechanism is to use
a separate TTL counter that is adjusted at the same time with IP
TTL or hop count fields. However, different types of IP tunnels
can hide the notification data inside the outer IP header. In
this case, if the tunnel encrypts the data inside the outer
header, there is no way for routers to operate on the notification
data. In some cases the TTL-based verification mechanisms may not
be able to detect such tunnel. It is also possible that the TTL
fields are manipulated by a malicious node on the connection path
that has enough information to make educated guesses about the
expected TTL values.
4.3. On-path and off-path mechanisms
As mentioned in the beginning, we focus on on-path mechanisms, but
there is an important and common application of off-path signaling
that deserves to be mentioned. Most ICMP messages [RFC792, RFC2463]
are off-path notifications, because they are often sent by an
intermediate router on the connection path in the reverse direction,
towards the sender of the packet that triggered the ICMP condition;
Sarolahti/Floyd/Kojo Section 4.3. [Page 10]
INTERNET-DRAFT Expires: September 2007 March 2007
an example is the ICMP "host unreachable" error. Some ICMP messages
are triggered by the connection receiver, such as the "Protocol
unreachable" error. We consider such ICMP notification also as an
off-path notification, because it traverses the reverse direction,
and in case of asymmetric routing the ICMP message can traverse a
different set of routers than the original message.
One of the problems with off-path mechanisms is that it may be
difficult to authenticate an off-path notification that originates
from the network. In many ICMP messages the beginning of the IP
payload, i.e., the transport protocol header, is copied to the ICMP
message. This information can be used to identify the flow that has
triggered the ICMP message. There is a work-in-progress Internet-
Draft on analyzing the security of ICMP messages [G06].
4.4. Top-down, bottom-up and mixed notifications
Some cross-layer notifications involve extended conversations
between the transport layer and lower layers. For example, the ECN
field in the IP header is used to carry ECN-capable information from
the transport protocol to routers, and to carry Congestion
Experienced information from routers back to the transport protocol.
However, other proposed cross-layer notifications are more clearly
unidirectional, carrying information only from the transport layer
to lower layers, or vice versa. As an example of a proposed top-
down notification, a transport protocol such as UDP-Lite would
communicate to lower layers about the desired checksum coverage for
a packet [RFC3828]. An example of a proposed bottom-up notification
would be a link-layer trigger designed to optimize the hand-off
performance of a mobile host. Unidirectional top-down or bottom-up
notifications are best designed to serve only as hints, to be used
by the recipient only as is deemed appropriate.
5. Current, Proposed, and Past Explicit Cross-layer Mechanisms
In this section we discuss some of the explicit cross-layer
signaling mechanisms that have been proposed in the past.
5.1. Determining the packet size
TCP uses an option to negotiate the Maximum Segment Size (MSS)
during the TCP connection establishment, where each TCP end point
may send a TCP MSS option to the other end point indicating the MSS
it is able to receive. In general, the MSS information is local link
Sarolahti/Floyd/Kojo Section 5.1. [Page 11]
INTERNET-DRAFT Expires: September 2007 March 2007
information, the link MTU size, learned via the IP layer and
translated to the transport layer MSS. This mechanism would be
classified as an in-band "NoRouters" notification.
In order to determine the maximum segment size allowed on the whole
connection path between the sender and receiver, Path MTU discovery
needs to be applied. The traditional Path MTU discovery is not
strictly an explicit on-path mechanism, because it is based on the
use of an ICMP "packet too big" error message that a router sends
when an incoming packet is too large to be sent on the router's next
hop. However, an in-band IP option has been proposed as an
alternative Path MTU mechanism [Wel03]. All routers would be
required to process the IP option, so this would be a rather
challenging scheme to deploy.
5.2. Congestion and rate control
Because TCP congestion control adjustments are a popular application
for explicit notifications, some general guidelines on using the
above categories are required:
* A sender MAY reduce the sending rate in response to a "NoRouters"
or "SomeRouters" notification.
* In order to increase the sending rate more than would be allowed
by the normal congestion control principles, a sender MUST use an
"AllRouters" notification to verify that the rate increase does
not cause congestion in the network.
We call a mechanism that does not conform to these principles an
"invalid mechanism". It can be debated whether "AllRouters"
mechanisms are truly valid because of problems the "AllRouters"
mechanisms have with IP tunnels, that may cause false positives with
the "AllRouters" mechanisms. We discuss this issue more thoroughly
in Section 7.2.
Some proposals use information about the change of last-hop link
characteristics, for example in adjusting the congestion control
state [DK06, SEE+06]. This can be an attractive application for
mobile terminals that are able to detect mobility, and the change of
the wireless last-hop link, and make appropriate changes in the
congestion control state under the assumption that in many cases the
wireless last-hop link is the bottleneck on the connection path. In
some cases the indication of the last-hop link change can be
sufficient information for reducing the transmission rate, or
restarting the TCP slow-start to evaluate the capacity of new path.
However, following the principle given above, such a link indication
Sarolahti/Floyd/Kojo Section 5.2. [Page 12]
INTERNET-DRAFT Expires: September 2007 March 2007
MUST NOT be used alone to rapidly increase the data transmission
rate. The only way to increase the transmission rate is through the
normal congestion control mechanisms, or by using an "AllRouters"
notification mechanism.
The above principle should also apply to non-congestion-controlled
protocols, for example transmission of audio/video streams over RTP
and UDP. For example, using an explicit notification about changing
from a low-bandwidth first-hop link to a high-bandwidth first-hop
link as a trigger to suddenly increase the transmission rate is
against the congestion control fairness principles [RFC2914] and
therefore would be an invalid mechanism.
A notification has been suggested to allow faster adaptation to
changes in the end-to-end path properties. TCP's response to
connectivity change indications such as mobility have been discussed
in an Internet-Draft [SEE+06]. The draft describes a "connectivity-
change indication" TCP option, and the response to a connectivity-
change event, when detected either from the TCP option, or from the
local stack. The TCP option could be used by a mobile host to
indicate to the other end that it has moved and path characteristics
may have changed. Depending on the current state of a connection, a
host receiving a connectivity-change indication may decide to re-
evaluate congestion control parameters of a path and/or make a quick
retransmission to resume data transmission earlier after a temporary
connectivity disruption instead of waiting for the retransmission
timer to expire again. This is an in-band "NoRouters" notification.
Explicit Congestion Notification (ECN) [RFC3168] uses a two-bit ECN
field in the IP header to allow routers to indicate congestion in
the network before they have to start dropping packets due to buffer
overflow. ECN can be useful even if only a subset of routers
implement it on the connection path. There were initial deployment
problems with ECN because some routers in the network dropped
packets with a non-zero ECN field in the TCP header, but we believe
that today most of these routers have been fixed. ECN is an in-band
"SomeRouters" mechanism.
The use of the ECN field is taken further in an alternative protocol
to use the field, called Re-ECN [BJSK06]. The protocol aims "to
provide sufficient information in each IP datagram to be able to
hold senders and whole networks accountable for the congestion they
cause downstream, before they cause it."
In Quick-Start [RFC4782], the sender uses an IP option to request
permission from routers to send at a higher rate than the normal
congestion control would allow. [RFC4782] specifies the use of
Quick-Start for TCP and discusses the challenges such a mechanism
Sarolahti/Floyd/Kojo Section 5.2. [Page 13]
INTERNET-DRAFT Expires: September 2007 March 2007
needs to address. Quick-Start router algorithms and their
configuration are analyzed further in [SAF06], and [SKDK06] gives an
initial analysis of Quick-Start in wireless environments with
vertical hand-offs between different wireless link technologies.
Quick-Start is an in-band "AllRouters" mechanism.
Variable-structure congestion Control Protocol (VCP) is another
proposed congestion control proposal using explicit feedback from
routers. VCP leverages the ECN field to let routers indicate their
load information [XSSK05]. Based on the VCP bits, a TCP sender could
apply either Multiplicative Increase, Additive Increase, or
Multiplicative Decrease of the congestion window. VCP is an in-band
mechanism, and it is intended to be a "AllRouters" mechanism, but it
does not provide a mechanism for checking that all routers have
understood and processed the notification. It is possible than VCP
allows Multiplicative Increase even if there are fairly loaded
routers on the connection path that do not support the mechanism.
Therefore VCP is an invalid mechanism to be deployed in the
Internet.
Explicit Control Protocol (XCP) [KHR02, FPK06] is a proposal for a
full-fledged congestion control protocol involving the interaction
of routers and the end-hosts. Although XCP can be considered to be
more than just a cross-layer signaling mechanism, it also needs to
consider the above-mentioned challenges. XCP uses a separate
congestion header between IP and the transport protocols, i.e., it
is an in-band protocol. XCP is an "AllRouters" scheme, but it is not
currently specified how it is checked that all routers have
processed the congestion control header.
Different forms of in-band signaling have also been proposed for
dealing with corruption-based packet loss in wireless and satellite
networks [KSE+04]. The paper on Explicit Transport Error
Notification (ETEN) gives a taxonomy of different notification
types, depending on the granularity of the notification, the
direction of notification, the location of notification, and so on.
The efficiency of cumulative error notification is investigated by
simulation experiments. However, no specific packet format is
proposed in the paper.
5.3. Quality of Service
The Resource ReSerVation Protocol (RSVP) uses separate out-of-band
messages on top of IPv4 or IPv6 to make Quality-of-Service signaling
[RFC2205]. The data sender sends a RSVP "Path" message to the data
receiver that includes a Router Alert IP option telling the routers
on the path to investigate the RSVP message contents closer. Each
Sarolahti/Floyd/Kojo Section 5.3. [Page 14]
INTERNET-DRAFT Expires: September 2007 March 2007
router adds its IP address to the message to enable routing of the
Reservation (Resv) messages sent in the reverse direction to visit
exactly the same routers on the reverse path to the data sender. The
Resv message does not use the Router Alert option, but is rather
explicitly routed on a hop-by-hop basis between the network routers
using the state established earlier. In addition to the Path and
Resv messages, RSVP has a few other message types delivered on a
hop-by-hop basis. RSVP is an out-of-band "AllRouters" mechanism. We
also call it an on-path mechanism because it takes measures to
ensure that the resource reservation signaling follows the forward
path from sender to receiver.
Recently the IETF has specified a NSIS (Next Steps in Signaling)
framework to handle signaling in the Internet. The Generic Internet
Signaling Transport (GIST) protocol has been specified to transport
the application-specific signaling messages over the Internet
[SH06]. GIST messages are transfered using TCP or UDP as the
transport protocol, depending on whether a reliable connection-
oriented service or a connectionless service is desired. The use of
SCTP to carry GIST messages is also under investigation. GIST has
some common characteristics with RSVP: it uses a Router Alert option
to wake up the GIST-aware routers along the path, and for further
signaling, explicit hop-by-hop routing can be applied using the
state established at routers. Like RSVP, also GIST is an out-of-band
"AllRouters" scheme.
6. Past IETF Activities
This section discusses the past history of the IETF in considering
link-layer triggers and other types of cross-layer communication.
The IAB has an internet-draft on "Architectural Implications of Link
Indications" that summarizes current proposals, describes the
architectural issues and provides examples of appropriate and
inappropriate uses of link layer indications [Abo07]. The document
also gives a history of the integration of link indications within
the Internet architecture.
The "Performance Implications of Link Characteristics (pilc)"
working group produced seven RFCs concerning different types of
links and their effects on transport protocols. The PILC working
group did not explicitly consider cross-layer interactions; however,
the Performance Enhancing Proxies document [RFC3135] gives
guidelines for designing proxies that could also be useful
considerations for network devices with cross-layer functionality.
The Triggers for Transport BOF in November 2002 [TrigTranBof]
Sarolahti/Floyd/Kojo Section 6. [Page 15]
INTERNET-DRAFT Expires: September 2007 March 2007
discussed triggers such as "Link Up", "Link Down", and "Packet
Discarded". The necessity of a focused and narrow problem statement
was discussed, with a need to define the semantics and uses of
triggers in an exact way. It was questioned whether different
wireless link technologies would be able to reliably produce the
required information for the trigger, and what kind of responses
would be appropriate at the transport protocol. The consensus was
that the "Link Up" trigger might be viable, but that a "Link Down"
trigger would be more difficult to be implement in a way that would
be useful to the transport protocol. The BOF did not result in the
creation of a working group.
The Transport Service at the Intermediary BOF (intersec)
[IntersecBof] in March 2003 proposed to work on an architecture that
helps performance enhancing middleboxes interoperate better with
end-to-end transport protocols, especially with end-to-end security.
No working group was established.
BOFs on "Access Link Intermediaries Assisting Services (alias)"
[AliasBof1, AliasBof2] were held in two consecutive IETF meetings in
2003, continuing from the trigtran and intersec BOFs. ALIAS
extended the discussion to middle-boxes that explicitly signal their
existence and capabilities to the transport end-points (and vice-
versa). ALIAS included an extensive discussion of security issues,
along with a discussion of whether the possible benefits of such
intermediaries would be clear enough to make the work worthwhile. No
working group was created.
Recently there was a BOF proposal for IETF-66 in July 2006 called
"Transport-Enhancing Refinements to the Network Layer Interface
(ternli)". This didn't get as far as the above mentioned related
BOFs, because the BOF was canceled before the IETF meeting. Instead,
a group of people were gathered in an ad-hoc meeting in Montreal
discussing the problem space. TERNLI was motivated in part by the
research conducted in the MOBOPTS IRTF group about the effects of
mobility to transport protocols. While there was an agreement that
an explicit signaling mechanism between the transport and network
layers should not be limited to mobility, there was a discussion of
how the responsibilities should be divided between the Transport and
Internet Areas. It was discussed that the work in these two areas is
rather disconnected, and it is not always known what related work is
being done in the other area. It was agreed that it is worthwhile
to continue the discussion on the related research at least
informally on a mailing list established under the IETF servers.
The Jabber log of the meeting can be found at
[http://www.ietf.org/meetings/ietf-logs/tsvwg/2006-07-11.html].
Sarolahti/Floyd/Kojo Section 6. [Page 16]
INTERNET-DRAFT Expires: September 2007 March 2007
7. Challenges with Explicit Cross-layer Mechanisms
Today the Internet contains a wide variety of different types of
middleboxes, tunnels, and advanced packet handling technologies that
could cause problems for protocols that assume a simple architecture
of interconnected routers with simple packet forwarding algorithms.
In addition, the layer-two technologies have become more complex and
difficult to model and understand correctly. In this section we list
some common challenges to cross-layer mechanisms.
7.1. Security Issues
A cross-layer signaling protocol needs protective measures that are
strong enough to make attacks on the protocol difficult and
reasonably unprofitable. At the same time, if an otherwise light-
weight protocol has heavy-weight security mechanisms, the cost of
the security procedures may outweigh the possible benefits of the
protocol. It may be possible also to mitigate the potential attacks
from misleading hints by designing robust response mechanisms, and
considering the offered data as advisory information, while still
monitoring that other sources do not provide conflicting information
[EE06]. For example, if the sender has increased the transmission
rate based on a recent notification, followed by an increased number
of congestion-based packet losses, there is a clear conflict in the
received information.
For in-band mechanisms that use reserved header bits or IP options,
the receiver of the packet can be expected to check that the IP
addresses and transport ports match the existing connection, and
that the sequence numbers in the packet belong to the currently
valid window. Therefore, blind attacks generated outside the packet
transmission path have a reasonably low probability of succeeding.
For example, most TCP connections survive comfortably in the
Internet, although security of the basic TCP has been discovered to
be insufficient in certain mission-critical long-term connections
[SD06,Tou06]. However, an attacker on a connection path that is able
to read the transport and IP headers has a good chance of causing
harm to a connection, particularly if the packet contains additional
explicit information about the connection, for example in an IP
option. IPsec can protect the transport header, but does not protect
a mutable IP option that can be modified by routers along the path.
Out-of-band messages do not necessarily include the additional
context from the transport protocol, so they can be an easier target
for blind attackers. If a transport protocol context exists, for
example when the message is triggered by a data packet, the sender
of the out-of-band signaling message can include the transport
Sarolahti/Floyd/Kojo Section 7.1. [Page 17]
INTERNET-DRAFT Expires: September 2007 March 2007
header from a recent data packet with the message to authorize the
message based on the "proof" that the message has come from the
right source. In principle it cannot be assured that an out-of-band
message uses the same path as the data traffic, although it can be
assumed to be a common case.
For off-path signaling, for example sent by an intermediate router,
including transport protocol context is not necessarily possible
when IPsec is used to encrypt the data traffic. To more securely
authenticate the sender of a signaling message a more elaborate
security framework is needed. It is possible that the complexity of
such a security framework causes the costs of the mechanism to
defeat the possible benefits.
The routers on the connection path can also try to cheat a cross-
layer signaling mechanism. A first-hop router that is located in the
same administrative domain with the transport end-host may have an
incentive to game the protocol to the end-host's benefit. For
example, in the case of Explicit Congestion Notification, a router
could try to erase the Congestion Experienced bit on the packet, or
a Quick-Start-aware router could try to game a better transmission
rate for the transport sender. ECN and Quick-Start both use random
content in the header fields called Nonces to make it more difficult
for routers and receivers to misuse the protocol. Nonces usually do
not provide full protection against misuse, but rather make cheating
difficult enough to be unprofitable.
7.2. IP Tunnels
IP tunnels are a challenge for an explicit cross-layer notification
protocol that requires participation of the routers, because the
tunnel isolates the original IP header inside an outer header. A
tunnel protocol could copy the important cross-layer notification
data to the outer header at the tunnel ingress so that the routers
along the tunnel path can process the information, and then at the
tunnel egress copy the possibly changed cross-layer data back to the
inner header. For IPsec tunnels there is a special consideration
whether exposing the cross-layer data in the outer header is a
violation of the security policy. It is possible that some
additional cross-layer information on the outer header makes it
possible for an intruder to make additional conclusions about the
nature of the data that is being transfered inside the IPsec tunnel.
Because the interaction of congestion control and mobility has been
one of the key motivations for advanced cross-layer interactions, it
is worth noting that one of the most common mobility mechanisms,
Mobile IPv4, is based on the use of IP tunneling [RFC3344]. When a
Sarolahti/Floyd/Kojo Section 7.2. [Page 18]
INTERNET-DRAFT Expires: September 2007 March 2007
mobile host is not at its home location, the Mobile IPv4 home agent
receives the packets on behalf of the mobile host, and forwards them
to the care-of-address of the mobile host in an IP tunnel. There can
also be deployments with several layers of tunneling, for example
when IPsec is used together with Mobile IPv4.
IP tunnels are a particular challenge for "AllRouters" mechanisms,
because currently there is no known guaranteed way to check that an
"AllRouters" notification has indeed been processed by all routers
when there is an IP tunnel on the connection path. The Quick-Start
specification includes a thorough discussion of problems with IP
tunnels [RFC4782]. The key points of that discussion are summarized
below.
As described in Section 4.2, a typical way for an "AllRouters"
mechanism to check that all of the routers have processed the
notification mechanism is to use a special TTL or hop-count field
with the notification data. Assuming that all routers decrease the
IP TTL field as specified, the difference between the IP TTL and the
special TTL field should tell if all routers have processed the
notification. If the difference does not match, the end-host knows
that there were routers along the path that did not support the
notification. However, a problem arises because some tunnels do not
necessarily decrease the IP TTL at the tunnel ingress. Therefore the
presence of the tunnel and all the routers along the tunnel path may
go undetected. This is harmful for the cross-layer notification
mechanism that may take actions based on the false assumption that
all routers processed the notification.
The Quick-Start specification defines two main categorizes for
tunnels: "simple tunnels" simply discard the outer header at the
tunnel egress, and "non-simple tunnels" that save and use
information from the outer header before discarding it. The
specification further divides tunnels into (i) tunnels that support
Quick-Start, (ii) tunnels that do not support Quick-Start, but are
compatible with Quick-Start, and (iii) tunnels that are not
compatible with Quick-Start. A tunnel that supports Quick-Start
processes the IP TTL and the special TTL fields appropriately and
copies the Quick-Start Request to the outer header. A tunnel that
does not support Quick-Start does not copy the Quick-Start Request
to outer header, but decreases the IP TTL appropriately so that the
end-hosts are able to detect that the whole network path did not
support Quick-Start. A tunnel that is not compatible may allow
false positives, i.e., false approvals of Quick-Start request in
situations where all routers did not process the Quick-Start
Request. Because an approved Quick-Start Request allows the sender
to transmit at a higher rate than the congestion control rules would
usually allow, in the worst case this could cause severe congestion
Sarolahti/Floyd/Kojo Section 7.2. [Page 19]
INTERNET-DRAFT Expires: September 2007 March 2007
in the network. Although the above classification was given in the
context of Quick-Start, the same principles hold in general for an
"AllRouters" cross-layer notification mechanism.
Multiprotocol Label Switching can be considered a special case of an
IP tunnel, where the IP header can be encapsulated in a small MPLS
shim header [RFC3031]. When a packet is transmitted through an MPLS
region, the IP header is not processed, but the MPLS specification
strongly recommends that the IP TTL field is decremented
appropriately at the edge of an MPLS region according to the number
of hops is traversed inside the MPLS region. If this recommendation
is followed, the above-described problem of false positives due to
unadjusted IP TTL cannot occur. However, because it seems unlikely
that a cross-layer notification mechanism is supported by MPLS, the
"AllRouters" schemes are not likely to work over MPLS regions,
depending on the purpose of the cross-layer mechanism.
7.3. Non-conformant routers and middleboxes
[MAF04] observes that for 70% of the destinations tested, TCP SYN
packets with unknown IP options were either lost in the network or
ignored by the receiving web server. ([MAF04] was not able to
determine further why these connections failed when unknown IP
options were added to the TCP SYN packets.) The presence of routers
or middleboxes that drop packets containing unknown IP options would
be a major obstacle to any cross-layer mechanisms that depended on
the use of IP options. With in-band mechanisms this would also
prevent delivery of the data in the packets, while with out-of-band
mechanisms the data transfer would not be directly affected. This is
particularly a problem in "SomeRouters" and "AllRouters" schemes,
that typically need to modify the IP header.
Employing the Destination Options or Hop-by-hop Options header in
IPv6 would avoid this problem. The IPv6 Destination Options header
is not subject to intermediary router inspection and would be
suitable in delivering signaling information when in-band signaling
is used without network involvement. The Hop-by-hop Options header
with IPv6 can be used when in-band signaling with support from some
routers is needed. The two highest-order bits of the Option Type
specifies the action that must be taken if the processing IPv6 node
does not recognize the option type, including the possibility to
skip over the option.
Traffic normalizers are one type of middleboxes that can be used
together with the Intrusion Detection Systems [HKP01]. Because
traffic normalizers can modify the contents of an IP header,
particularly the IP TTL field, they may interfere with the operation
Sarolahti/Floyd/Kojo Section 7.3. [Page 20]
INTERNET-DRAFT Expires: September 2007 March 2007
of "AllRouters" mechanisms that typically use the IP TTL to check
that all routers have processed the notification. In the worst case
such traffic normalizers might result in false positives by causing
the IP TTL and special TTL to match even if some routers did not
process the notification.
7.4. Processing efficiency
Packets with IP options are assumed to take the slow-path processing
path in most routers, as opposed to the optimized fast-path. If the
use of IP options or other mechanisms requiring router attention
gained in popularity, the impact on the processing efficiency of
routers would have to be considered. This problem concerns the
"SomeRouters" and "AllRouters" mechanisms. In the Quick-Start
proposal, it is assumed that Quick-Start-capable routers would rate-
limit the number of Quick-Start requests that are processed, to
preserve router efficiency and to protect against possible attacks
on the routers themselves.
8. Proposals for Future Actions
We have described different possibilities for utilizing cross-layer
indications on transport layer, as well as several challenges there
might be in deployment and use of such mechanisms, depending on the
level of network support a mechanism requires. The "AllRouters"
notifications are the most challenging class of cross-layer
mechanisms, because they not only require support from every router
along the connection path, but also need a reliable mechanism to
verify that each router has indeed processed the notification.
If there is interest in developing cross-layer indications further
to improve transport protocol performance, it would be useful to
solve the problems below, depending on the required level of network
support.
* "AllRouters" notifications: There should be a common, well-
specified mechanism to ensure that all routers have indeed
processed an explicit notification that is required to be
processed by every router, so that false positives would not be
possible. To help solving this problem, there would need to be a
common, well-specified way for tunnel ingress and egress nodes to
process explicit indications that require some level of support
from routers along the path. A possible approach could be to aim
for a common framework for transmitting light-weight explicit
notifications.
Sarolahti/Floyd/Kojo Section 8. [Page 21]
INTERNET-DRAFT Expires: September 2007 March 2007
* "SomeRouters" and "AllRouters" notifications: There should be a
way to discourage routers and middleboxes from dropping packets
with unknown IP option header content. These nodes should rather
forward the packet without processing the unsupported option. As
the first step, there should be a better understanding of which
nodes drop the unknown options, and what is the reason for
dropping the packet.
* It would be useful for a designer of an cross-layer mechanism to
get input from the router designers to better understand the
performance limitations of a modern router, to help in designing
realistic cross-layer schemes. The router requirements can vary
much depending on the exact usage of the router: a local WLAN
access point may be able to employ more complex algorithms than a
high-performance backbone router.
The above listed challenges may be technically difficult to solve in
the current Internet. However, the above discussion hopefully sheds
some light on the amount of work required to design a cross-layer
mechanism that is usable in the Internet.
A. List of Changes
Changes from draft-sarolahti-tsvwg-crosslayer-00:
* Added a paragraph about MSS and its relation to link MTU.
* Added a paragraph about possibilities of IPv6 to Section 6.3.
* Description of terminology and the scope of this document added,
from the proposal from Scott Brim. Also the document title and
introduction were updated slightly.
* Re-organized the taxonomy and description of different proposed
schemes, after proposal from Gregory Woodhouse.
* Some updates to introduction and security issues referring to a
related paper on rethinking the transport layer interfaces [EE06].
* Changed the document title
* Added more discussion on IP tunnels and MPLS (from a
recommendation by Wesley Eddy)
* Moved discussion about path vs. link indications to the congestion
Sarolahti/Floyd/Kojo Section A. [Page 22]
INTERNET-DRAFT Expires: September 2007 March 2007
control subsection.
* Added a paragraph about traffic normalizers to middleboxes
section.
* Added a paragraph about Mobile IPv4 to the IP tunnels section,
from suggestion by Wesley Eddy.
* Added text to the "Proposals for Future Actions" section at the
end of the document
* Added a short paragraph about IEEE 802.21 and MIPSHOP & MOBOPTS
work at the IETF, from proposal of Qiaobing Xie.
* Added a section on top-down and bottom-up indications.
* Modified the Connectivity-change option description based on the
feedback from Simon Schuetz.
Normative References
[RFC793] J. Postel. Transmission Control Protocol. RFC 793,
September 1981.
[RFC2119] S. Bradner. Key words for use in RFCs to Indicate
Requirement Levels. BCP 14, RFC 2119, March 1997.
[RFC2460] S. Deering and R. Hinden. Internet Protocol, Version 6
(IPv6) Specification. RFC 2460, December 1998.
[RFC2581] M. Allman, V. Paxson, and W. Stevens. TCP Congestion
Control. RFC 2581. April 1999.
[RFC2914] S. Floyd. Congestion Control Principles. RFC 1914,
September 2000.
[RFC3168] K.K. Ramakrishnan, S. Floyd, and D. Black. The Addition
of Explicit Congestion Notification (ECN) to IP. RFC 3168, Proposed
Standard, September 2001.
Informative References
[AliasBof1] Access Link Intermediaries Assisting Services (alias)
Bof minutes from IETF-57, Vienna, Austria, July 2003. Available at
http://www3.ietf.org/proceedings/03jul/250.htm
Sarolahti/Floyd/Kojo [Page 23]
INTERNET-DRAFT Expires: September 2007 March 2007
[AliasBof2] Access Link Intermediaries Assisting Services (alias)
Bof minutes from IETF-58, Minneapolis, MN, USA, November 2003.
Available at http://www3.ietf.org/proceedings/03nov/248.htm
[RFC792] J. Postel. Internet Control Message Protocol. RFC 792,
September 1981.
[RFC1191] J. Mogul and S. Deering. Path MTU Discovery. RFC 1191,
November 1990.
[RFC2113] D. Katz. IP Router Alert Option. RFC 2113, February 1997.
[RFC2205] R. Braden (ed.). Resource ReSerVation Protocol (RSVP) --
Version 1 Functional Specification. RFC 2205, September 1997.
[RFC2207] R. Berger and T. O'Malley. RSVP Extensions for IPSEC Data
Flows. RFC 2207, September 1997.
[RFC2401] S. Kent and R. Atkinson. Security Architecture for the
Internet Protocol. RFC 2401, November 1998.
[RFC2463] A. Conta and S. Deering. Internet Control Message
Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6)
Specification. RFC 2463, December 1998.
[RFC2711] C. Partridge and A. Jackson. IPv6 Router Alert Option. RFC
2711, October 1999.
[RFC3031] E. Rosen, A. Viswanathan, and R. Callon. Multiprotocol
Label Switching Architecture. RFC 3031, January 2001.
[RFC3135] J. Border, M. Kojo, J. Griner, G. Montenegro, and Z.
Shelby. Performance Enhancing Proxies Intended to Mitigate Link-
Related Degradations. RFC 3135, June 2001.
[RFC3234] B. Carpenter and S. Brim, Middleboxes: Taxonomy and
Issues, RFC 3234, February 2002.
[RFC3344] C. Perkins (ed.). IP Mobility Support for IPv4. RFC 3344,
August 2002.
[RFC3828] L-A. Larzon, M. Degermark, S. Pink, L-E. Jonsonn, and G.
Fairhurst, The Lightweight User Datagram Protocol (UDP-Lite), RFC
3828, July 2004.
[RFC4782] S. Floyd, M. Allman, A. Jain, and P. Sarolahti. Quick-
Start for TCP and IP. RFC 4782, January 2007.
Sarolahti/Floyd/Kojo [Page 24]
INTERNET-DRAFT Expires: September 2007 March 2007
[Abo07] B. Aboba (ed.). Architectural Implications of Link
Indications, Internet-Draft "draft-iab-link-indications-07.txt",
February 2007. Work in progress.
[BJSK06] B. Briscoe, A. Jacquet, A. Salvatori, and M. Koyabe. Re-
ECN: Adding Accountability for Causing Congestion to TCP/IP.
Internet-Draft "draft-briscoe-tsvwg-re-ecn-tcp-02", June 2006. Work
in progress.
[Cla88] D. D. Clark. The Design Philosophy of the DARPA Internet
Protocols. In Proceedings of ACM SIGCOMM '88, pages 106--114,
Stanford, CA, USA.
[DK06] L. Daniel and M. Kojo. Adapting TCP for Vertical Handoffs in
Wireless Networks. In Proc. 31st IEEE Conference on Local Computer
Networks (LCN), Tampa, FL, USA, November 2006.
[EE06] L. Eggert and W. Eddy. Towards More Expressive Transport-
Layer Interfaces. In Proceedings of ACM MOBIARCH '06, San Francisco,
CA, USA, November 2006.
[FPK06] A. Falk, Y. Pryadkin, and D. Katabi. Specification for the
Explicit Control Protocol (XCP). Internet-Draft "draft-falk-xcp-
spec-02.txt", November 2006. Work in progress.
[G06] F. Gont. ICMP attacks against TCP. Internet-Draft "draft-ietf-
tcpm-icmp-attacks-01", October 2006. Work in progress.
[GL03] A. Gurtov and R. Ludwig. Lifetime Packet Discard for
Efficient Real-Time Transport over Cellular Links. ACM Mobile
Computing and Communications Review, 7(4):32-45, October 2003
[Hal96] F. Halsall. Data Communications, Computer Networks and Open
Systems, Fourth edition. Addison-Wesley, 1996.
[HKP01] M. Handley, C. Kreibich and V. Paxson, Network Intrusion
Detection: Evasion, Traffic Normalization, and End-to-End Protocol
Semantics, Proc. USENIX Security Symposium 2001.
[IEEE21] IEEE 802.21: Media Independent Handover Services. Available
at: http://www.ieee802.org/21/
[IntersecBof] Transport Service at the Intermediary BOF (intersec)
minutes from IETF-56, San Francisco, CA, USA, March 2003. Available
at http://www3.ietf.org/proceedings/03mar/248.htm
[KHR02] D. Katabi, M. Handley, and C. Rohrs. Congestion Control for
High Bandwidth-Delay Product Networks. In Proceedings of ACM
Sarolahti/Floyd/Kojo [Page 25]
INTERNET-DRAFT Expires: September 2007 March 2007
SIGCOMM 2002, Pittsburgh, PA, USA, August 2002.
[KSE+04] R. Krishnan, J. Sterbenz, W. Eddy, C. Partridge, and M.
Allman. Explicit Transport Error Notification (ETEN) for Error-
Prone Wireless and Satellite Networks. Computer Networks, 46(3),
October 2004
[LR99] R. Ludwig and B. Rathonyi. Link Layer Enhancements for
TCP/IP over GSM. In Proceedings of the Conference on Computer
Communications (IEEE Infocom), New York, USA, March 1999.
[MAF04] A. Medina, M. Allman, and S. Floyd. Measuring Interactions
Between Transport Protocols and Middleboxes. Internet Measurement
Conference 2004, August 2004. URL "http://www.icir.org/tbit/".
[RW03] M. Rossi and M. Welzl. On the Impact of IP Option
Processing, Preprint-Reihe des Fachbereichs Mathematik - Informatik,
No. 15, Institute of Computer Science, University of Innsbruck,
Austria, October 2003.
[RW04] M. Rossi and M. Welzl. On the Impact of IP Option Processing
- Part 2, Preprint-Reihe des Fachbereichs Mathematik - Informatik,
No. 26, Institute of Computer Science, University of Innsbruck,
Austria, July 2004.
[SAF06] P. Sarolahti, M. Allman, and S. Floyd. Determining an
Appropriate Sending Rate Over an Underutilized Network. Computer
Networks Journal, Elsevier, August 2006.
[SEE+06] S. Schuetz, L. Eggert, W. Eddy, Y. Swami, and K. Le. TCP
Response to Lower-Layer Connectivity-Change Indications. Internet-
Draft "draft-schuetz-tcpm-tcp-rlci-00", May 2006. Work in progress.
[SH06] H. Schulzrinne and R. Hancock. GIST: General Internet
Signaling Transport. Internet-Draft "draft-ietf-nsis-ntlp-10", July
2006. Work in progress.
[SKDK06] P. Sarolahti, J. Korhonen, L. Daniel, and M. Kojo. Using
Quick-Start to Improve TCP Performance with Vertical Hand-offs. In
Proc. IEEE Workshop on Wireless Local Networks (WLN) 2006, Tampa,
FL, USA, November 2006.
[SD06] R. Stewart, M. Dalal (ed.). Improving TCP's Robustness to
Blind In-Window Attacks. Internet-Draft "draft-ietf-tcpm-
tcpsecure-05.txt", June 2006. Work in progress.
[TGM+06] F. Teraoka, K. Gogo, K. Mitsuya, R. Shibui, and K. Mitani.
Unified L2 Abstractions for L3-Driven Fast Handover. Internet-Draft
Sarolahti/Floyd/Kojo [Page 26]
INTERNET-DRAFT Expires: September 2007 March 2007
"draft-irtf-mobopts-l2-abstractions-01.txt", September 2006. Work in
progress.
[Tou06] J. Touch. Defending TCP Against Spoofing Attacks. Internet-
Draft "draft-ietf-tcpm-tcp-antispoof-05.txt", October 2006. Work in
progress.
[TrigTranBof] Triggers for Transport (trigtran) Bof minutes from
IETF-56, San Francisco, CA, USA, March 2003. Available at
http://www3.ietf.org/proceedings/03mar/251.htm
[Wel03] M. Welzl, PMTU-Options: Path MTU Discovery Using Options.
Expired Internet-Draft "draft-welzl-pmtud-options-01.txt", February
2003. URL "http://www.welzl.at/research/publications/".
[XSSK05] Y. Xia, L. Subramanian, I. Stoica, and S. Kalyanaraman.
One More Bit Is Enough. In Proceedings of SIGCOMM 2005, August 2005.
[ZDPS01] Y. Zhang, N. Duffield, V. Paxson, and S. Shenker, On the
Constancy of Internet Path Properties, Proc. ACM SIGCOMM Internet
Measurement Workshop, November 2001.
Acknowledgements
The authors would like to thank Scott Brim, Bob Briscoe, Wesley
Eddy, Fernando Gont, Simon Schuetz, Gregory Woodhouse, and Qiaobing
Xie for useful comments that have helped to improve this document.
AUTHORS' ADDRESSES
Pasi Sarolahti
Nokia Research Center
P.O. Box 407
FI-00045 NOKIA GROUP
Finland
Phone: +358 50 4876607
Email: pasi.sarolahti@nokia.com
Sally Floyd
Phone: +1 (510) 666-2989
ICIR (ICSI Center for Internet Research)
Email: floyd@icir.org
URL: http://www.icir.org/floyd/
Sarolahti/Floyd/Kojo [Page 27]
INTERNET-DRAFT Expires: September 2007 March 2007
Markku Kojo
University of Helsinki
Department of Computer Science
P.O. Box 68
FIN-00014 UNIVERSITY OF HELSINKI
Finland
Phone: +358 9 191 51305
EMail: kojo@cs.helsinki.fi
Sarolahti/Floyd/Kojo [Page 28]
INTERNET-DRAFT Expires: September 2007 March 2007
Full Copyright Statement
Copyright (C) The IETF Trust (2007).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on
an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE
IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL
WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY
WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE
ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed
to pertain to the implementation or use of the technology described
in this document or the extent to which any license under such
rights might or might not be available; nor does it represent that
it has made any independent effort to identify any such rights.
Information on the procedures with respect to rights in RFC
documents can be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use
of such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository
at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at ietf-
ipr@ietf.org.
Sarolahti/Floyd/Kojo [Page 29]
| PAFTECH AB 2003-2026 | 2026-04-23 06:04:10 |