I have been refraining from participating in this, because when all is said and done it does not seem to tell us much. But what the heck.

Working backwards:
G says "constrain what people are allowed to do, even if they are prepared to pay. Not going to happen. F says "we give up." Well, we may. But if we are trying to get to a useful conclusion, that isn't it. E says that economic factors may help. They may. They won't change the architecture. They will not stave off the problems forever. Given that this is an economic / business issue, it is not something the IETF (or IRTF) is in a good position to influence. We tried in the past. D says that we can be more clever. And we can. It will buy us some runway. Being more clever is engineering. it takes good engineering, but it is engineering. Folks are looking at it. We sure should not say anything that tells them not to work on doing a better job for now. (The more runway they can give us, the better chance we have of getting to a good answer.)

C is geographic aggregation, if I read your document right. The solutions I have seen to that tend to fall into three very different camps, with very different problems. While I personally find all three kinds undesirable, we should be careful about how we comment on their workability. (Note, one of the strategies I have seen does line up with the description in the web page. One of the alternatives may or may not line up, as I have not been able to read an understandble description of how it would work. And the third one is opportunistic. The issue with an opportunistic approach is that it is hard to evaluate how much good we would get out of it. But that is very different from undeployablity or incomprehensibility as a concern.)

B (host based) and A (border-box based tunnels) are the primary areas we tend to focus on. While network-centric solutions using selective placement looks more tractable to deploy, there are difficulties and benefits for any of these strategies. There are also hybrids which may allow evolution driven by functionality increases. It would seem quite extreme to declare one side of this to be worth exploring, and the other side to be a bad idea. So I would hate to see either A or B declared out of bounds for this community.

Yours,
Joel M. Halpern

Brian E Carpenter wrote:
Hi Bill,


On 2008-12-30 09:35, William Herrin wrote:
On Mon, Dec 29, 2008 at 3:13 PM, Brian E Carpenter
<[email protected]> wrote:
I'm not in fact advocating a 'do nothing' strategy. On the contrary,
I advocate that the RRG makes the best recommendations that it can.
But I suggest that we should neither accept nor reject strategy F;
I think we should just set it aside. It's out of our control anyway.
Hi Brian,

My worry is that by retaining strategy F, we signal that the problem
isn't ripe yet. If plain BGP is not recommended but is still
acceptable, what's the need for working groups or a concerted
engineering effort?

My thought was that strategy D, E or both should remain as controls
while F should be discarded. D involves scaling up how BGP is
processed while E involves suppressing BGP growth.

Do you want to keep F in addition to D and E, or do D and E provide a
sufficient fallback position as methods for expanding and/or
controlling BGP?

No, because I think D and E are lost causes anyway.

I think we should just say something like:

It is not known with any scientific or engineering accuracy when
vanilla BGP4 will reach an economic or technical scaling limit (i.e.
when it becomes financially or physically impossible to continue
beefing up core BGP4 routers to cope with growth in the size or
update frequency of the BGP4 routing table). Therefore the RRG
has not considered a "do nothing" strategy, since it is essential
to be ready for this limit well befre it arrives.

         Brian
_______________________________________________
rrg mailing list
[email protected]
https://www.irtf.org/mailman/listinfo/rrg

_______________________________________________
rrg mailing list
[email protected]
https://www.irtf.org/mailman/listinfo/rrg

Reply via email to