I little while ago Alex Clemm and I published a draft called "Token Cell 
Routing Data Plane Concepts” 
https://datatracker.ietf.org/doc/draft-bcx-rtgwg-tcr 
<https://datatracker.ietf.org/doc/draft-bcx-rtgwg-tcr> which I hope we can 
explain to the the RTG WG at IETF 111.

Currently the fundamental basis of packet design is linear parsing (linear as 
in the media use of the term), and our observation is that a move away from 
this introduces a powerful set of opportunities to the network layer, just as 
the media industry found when they enabled non-linear access to content.

Normally a network layer packet is designed on the assumption that the parser 
starts at the first byte of the header and looks at all of it regardless of 
whether all of it is intended for processing by this node. That is what make 
option parsing particularly difficult since there is no easy way of knowing if 
the packet contains an option that is of interest to a node without that node 
first looking at all preceding options and making a decision for itself as to 
the applicability of the option to its packet processing actions. It seems 
strange to me that we wish to specify at source which nodes a packet will pass 
through, but require the node to determine which options, and importantly which 
instance of an option applies to it.

We know BTW that just the formal network layer is in itself insufficient to 
describe the required actions on the packet. Routers cheat and look outside the 
network layer to glean more information of which the use of the five tuple for 
ECMP is the most well known example. It is also an example where this cheating 
sometimes trips them up.

In this concept proposal we looked at what we can do if we introduce pointers 
to the network layer packet structure and were quite surprised at the power 
that such mechanisms unleashed. This was particularly the case with latency 
based forwarding, FRR, OAM, and packet disposition.

The essence of the proposal is action, parameter, pointer to next action. This 
is a type of active networking, but one which is constrained since, like MPLS 
the only actions are ones that were previously enabled by the operator at the 
node. In other words this is the MPLS security model which we know works, but 
one applied in a generalised way.

A characteristic of the design is that it is easily made address family 
independent, and thus is able to support any address family provided or course 
that the FIB is set up accordingly. This has some interesting advantages in 
constrained networks that hopefully we can explore in more depth at a later 
time.

Although we have written this up as a network layer in its own right, the 
concept can be used as structure to provide meta or auxiliary data for an 
existing network layer. I hope to provide more details on that in the future.

Comments on the draft are welcome, and hopefully the chairs will find time on 
the agenda to explore with the WG some of the concepts so as to make future 
email discussions productive.

Best regards

Stewart
_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg

Reply via email to