Fred,
Rethinking about the following example of yours. Do we need to
consider
the
asymmetric paths between A and B ? I guess, the problem can be
seen
with even
symmetric path. Let say the network is
like
A <---
1gig ---> C <--- 56 kbps --> D <--- 1 gig --->
B
Now A
starts sending some packets and B generates ICMPv6 error
messages.
If B is using bandwidth-based function for limiting the
rate,
it would
calculate the percentage using 1 gig link's bandwidth and will
overload
the thin link between C & D.
Am I
missing something ?
Regards
Mukesh
-----Original Message-----
From: ext Fred Templin [mailto:[EMAIL PROTECTED]
Sent: Wednesday, January 07, 2004 5:32 AM
To: Margaret Wasserman; Gupta Mukesh (Nokia-NET/MtView)
Cc: [EMAIL PROTECTED]
Subject: Re: draft-ietf-ipngwg-icmp-v3-02.txt: Rate Limiting MethodsMargaret,On further consideration, I think the bandwidth-based method might actuallybe dangerous in some situations. Suppose there were asymmetric pathsbetween nodes A and B; the path A->B consisting of all 1Gbps links andthe path B->A consisting of at least one long, thin link (56Kb modem, 3GPPwireless, etc.) Even if B is able to authenticate the source addresses inpackets it receives from A, if the bandwidth-based method is used basedon a percentage of the bandwith of B's outgoing 1Gbps interface the queueon a router at the head of a long thin link on the path B->A will overflow. Inother words, B might cause harmful denial-of-service if it blindly uses abandwidth-based estimate, since it has no way of knowing whether long,thin links will occur on the return path.As to timer-based, I think Mukesh has already given a good reason as towhy it is suboptimal; I think an arguement could also be constructed thatshows it to cause interoperability problems in some cases. So, I findmyself in the rare position of agreeing with Pekka on this subject.Fred
