home *** CD-ROM | disk | FTP | other *** search
-
-
- CURRENT_MEETING_REPORT_
-
-
- Reported by Jeffrey Mogul/DEC
-
- Meeting of 12 December 1989
- Held at the Digital Equipment Corporation Western Research Laboratory
- Palo Alto, California
-
- AGENDA
-
-
- 1. Discuss proposed MTU Discovery protocols
- 2. Attempt a consensus protocol
- 3. Find a victim to write up a draft
- 4. Set next meeting date
-
-
- MINUTES
-
- This was the first meeting of the MTU Discovery Working Group. We had
- already made and discussed a number of proposals for a protocol design,
- and had also discussed (over the mailing list) a number of technical and
- non-technical constraints on such a protocol.
-
- The most important non-technical constraint was that we wanted to devise
- a protocol that would work fairly well, or at least no worse than ``no
- protocol at all'', in the presence of large numbers of unconverted hosts
- and routers.
-
- Technical constraints include issues such as the cost of processing
- options; the possible use of the reserved bit in the IP header [probably
- not available to us]; the layers in which the MTU discovery protocol is
- implemented; the need to support TOS, security, and asymmetric paths;
- deciding when to send IP options; the problem of LANs with more than one
- MTU [a possible consequence of the use of bridges between Ethernets and
- FDDI]; the delays in propagation of information through the network; the
- realization that the path MTU is first known at the wrong end of the
- path;
-
- The proposals made before the meeting basically fell into two
- categories: those that probed the network to find out the path MTU (the
- minimum MTU over a path), essentially by asking the routers along the
- path to report the MTU, and those that asked the receiving host to
- report fragmentation when it occurs, with the understanding that the
- size of first fragment of a packet received probably reflects the path
- MTU. In the latter case, the sender must send large packets occasionally
- in order to discover if they will be fragmented.
-
- The ``Report Fragmentation'' approach would be cleanest if we could have
- used the reserved bit in the IP header as a flag to tell the receiver
- that the sender is willing to receive and utilize a (new) ICMP
-
- 1
-
-
- Fragmentation Occured message. However, we were told that this bit is
- unlikely to be released for this purpose. ``Report Fragmentation''
- (R-F) can also be done using an IP header option, again ``allowing'' the
- receiver to send the ICMP report.
-
- R-F has the advantage that it requires no changes in the routers, but
- the disadvantage that it requires changes in most end-hosts before it
- does much good. (If the receiving host does not implement it, the
- sending host could obliviously continue to send packets that are being
- fragmented and perhaps lost.) During the meeting, we discussed how to
- decide when and how often to send the ICMP Fragmentation Occurred
- message, and which layer should send it.
-
- Since option-processing is expensive for routers, we believe that the RF
- option cannot be sent on every packet. Thus, the receiving host should
- remember that a sender has specified Report Fragmentation, and if
- fragmentation does occur later on, the ICMP should be sent even if the
- fragmented packet did not carry the option.
-
- Since some protocols on the sending host (e.g., NFS) might not be able
- to use the MTU information even thought others (e.g., TCP) might have
- requested it, some felt that it was necessary to send fragmentation
- reports in response only to those host+protocol+port tuples that had
- sent the RF option; this means that the receiving host must keep a table
- keyed in this way, and probably that it has to be maintained by the
- transport protocols (TCP, UDP, etc.) At the same time, it was felt to
- be unfortunate that the transport protocols would be burdened with this
- chore; we consider it an ``implementation suggestion'' rather than a
- protocol specification.
-
- One approach might be to insist that a host not send the RF option
- unless all of its protocols are willing to abide by MTU change reports.
- We know that it is possible to make NFS obey certain MTUs, and perhaps
- it is worth making this rule rather than complicating the discovery
- protocol implementation.
-
- Talk then turned to the ``MTU Probe Option'' approach. In this approach
- (as it evolved from RFC1063 before the meeting), the sender would
- (occasionally) send this option on packets flowing on the connection.
- The option would have three fields: a ``next hop IP address field'', an
- ``OK'' field, and an ``minimum MTU'' field. The initial values would be
- the first hop router address, ``true'', and the MTU of the first-hop
- link. Each router along the path would set the MTU to the min of the
- current value and the MTUs of the incoming and outgoing paths. If its
- own address was NOT the same as the ``next hop'' field, it would set the
- OK field to ``false''; otherwise, it would change the next-hop field.
- In any case, the option is forwarded (but not copied on fragmentation).
-
- The last-hop router (it should be able tell that it is such; we'll
- address the FDDI-Ethernet bridge issue somehow) does the same thing to
- the option as the previous routers, but if the OK field is still
- ``true'', it now knows the path MTU. It therefore sends a (new) ICMP
-
-
- 2
-
-
-
- Path MTU message back to the sender, including the usual IP header info
- for matching at the sender. In any case, the option continues to the
- receiving host.
-
- Note that the sender will not get a Path MTU message unless every router
- along the way understands this protocol. This is because we could
- otherwise be misled by a low-MTU link bordered by two unconverted
- routers. However, we believe that routers will be converted much sooner
- than most end hosts.
-
- Since the option is also received by the ultimate receiving host, that
- host can also interpret this option as ``Report Fragmentation'' flag (as
- above). This is a backup mechanism; if the Path MTU message is not
- generated, or if the MTU then decreases enough to cause fragmentation,
- the sender will still find out. Of course, the sender cannot know that
- the receiver is doing this. One partial solution is that if the
- receiver gets a MTU Probe option with the OK field = false, then it
- should send an Path MTU message to the sender with a code indicating
- ``unknown''; this tells the sender that it is OK to use the ``Report
- Fragmentation'' approach. If the sender receives neither kind of Path
- MTU message, then it must assume that it will not receive Fragmentation
- Occurred reports, and it should stick to the current ``no more than 576
- bytes if non-local'' rule.
-
- This hybrid approach seems (to the attendees, at least) to combine the
- best of both methods: it gives accurate, early results (i.e., before a
- connection has to start sending big datagrams) without incurring
- fragmentation if the routers cooperate, it detects fragmentation if the
- receiver cooperates, and it causes conservative behavior otherwise.
-
- There are still several issues to nail down, including how often to send
- the MTU Probe option, how many times to send the Fragmentation Occurred
- ICMP message, etc.
-
- Keith McCloghrie and Rich Fox were volunteered to write up a draft RFC,
- which we hope to circulate several weeks before the next IETF meeting.
-
- We expect to meet again at the February IETF meeting.
-
- ATTENDEES
-
- Art Berggreen art@salt.acc.com
- Noel Chiappa jnc@PTT.LCS.MIT.EDU
- Farokh Deboo sun!iruucp!ntrlink!fjd
- Steve Deering deering@pescadero.stanford.edu
- Rich Fox sytek!rfox@sun.com
- Ivan Liu iliu@orville.nas.nasa.gov
- Keith Mc Cloghrie sytek!kzm@hplabs.HP.COM
- Jeff Mogul mogul@decwrl.dec.com
- Nuggehalli Pradeep pradeep@orville.nas.nasa.gov
- Stephanie Price cmcvax!price@hub.ucsb.edu
-
- [Noel Chiappa participated via telephone]
-
-
- 4
-