On 4/8/15 8:11 PM, Lizhong Jin wrote:
[Lizhong] If the NVE and tenant is integrated into one device, then the issue
could
be solved by implementation. Because tenant know the entropy value of the first
segment, and use the same value to the subsequent segment. So different
implementation model could provide different entropy value. Or do we need other
mechanism to mitigate this issue, e.g., fragment on NVE in
draft-herbert-gue-fragmentation.
Lizhong,
My point was more fundamental. Today on the Internet there are routers
which do hashing for LAG or ECMP purposes. They have the same issues
with fragmented packets.
For section 18.1.1, I suggest RFS should be analyzed. E.g., if NIC
want to do flow steering based on the inner header information, then
it could use entropy value instead of the inner header information.
Did you mean Receive Side Scaling (RSS)? That is mentioned in the document -
section 18.1.1 . Perhaps the RSS text can be improved.
Receive Flow Scaling is the name of a Linux software technique to take into
account the CPU on which the application is running, which is different.
[Lizhong] I am referring to hardware based flow steering, similar with
Accelerated
RFS (Receive Flow Steering). In the NIC I/O virtualization, the NIC will
directly trigger
interrupt to the CPU where application is running by looking up a flow table.
We will
use the inner header to do the flow table lookup, if hardware could not parse
the
inner header, then entropy value in the encapsulation is required. Any design of
hiding inner header information should consider above implementation.
I thought the purpose of RFS was to send the packet (and associated
interrupt) to the CPU where the application process is running. That
implies an exact flow lookup. Some hash value, whether computed by the
receiving NIC or whether in some entropy field in the packet (computed
by the sender or encapsulator) would not suffice for that purpose.
Of course, a hash value (e.g., from the entropy field) is useful for RSS.
Regards,
Erik
_______________________________________________
nvo3 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nvo3