Re: [6lo] working group last call (wg lc) on https://datatracker.ietf.org/doc/draft-ietf-6lo-deadline-time/

"Georgios Z. Papadopoulos" <georgios.papadopoulos@imt-atlantique.fr> Tue, 24 July 2018 09:40 UTC

Return-Path: <georgios.papadopoulos@imt-atlantique.fr>
X-Original-To: 6lo@ietfa.amsl.com
Delivered-To: 6lo@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F0DC913106A; Tue, 24 Jul 2018 02:40:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=imt-atlantique.fr
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zfc3zAcs33iH; Tue, 24 Jul 2018 02:40:02 -0700 (PDT)
Received: from zproxy110.enst.fr (zproxy110.enst.fr [137.194.2.192]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E925D131065; Tue, 24 Jul 2018 02:40:01 -0700 (PDT)
Received: from localhost (localhost [IPv6:::1]) by zproxy110.enst.fr (Postfix) with ESMTP id 4E85182292; Tue, 24 Jul 2018 11:40:00 +0200 (CEST)
Received: from zproxy110.enst.fr ([IPv6:::1]) by localhost (zproxy110.enst.fr [IPv6:::1]) (amavisd-new, port 10032) with ESMTP id 5OGqWaInZ_DJ; Tue, 24 Jul 2018 11:39:56 +0200 (CEST)
Received: from localhost (localhost [IPv6:::1]) by zproxy110.enst.fr (Postfix) with ESMTP id 76661822D1; Tue, 24 Jul 2018 11:39:56 +0200 (CEST)
DKIM-Filter: OpenDKIM Filter v2.10.3 zproxy110.enst.fr 76661822D1
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=imt-atlantique.fr; s=50EA75E8-DE22-11E6-A6DE-0662BA474D24; t=1532425196; bh=2WG7sL8BkxOuXWppLrjPniT1F5GW5EY7yDnBiMh65tw=; h=Mime-Version:From:Date:Message-Id:To; b=Ioy3SiAcKF7nA0xBPhyHAY/IEry/M5IX7l4Su3CCZy7HX62MmMjg7nkZ+eSP8dJK/ eGAyfCbywBIJ0s4dWsgHqkyML6frc3JjUJ2Spcx9kawEQGOJGJ32Dn3J/1G4NNRxoI vERw74dywTLUlin7OO7RWMFqU+/XS6mIFFWV7Hns=
X-Virus-Scanned: amavisd-new at zproxy110.enst.fr
Received: from zproxy110.enst.fr ([IPv6:::1]) by localhost (zproxy110.enst.fr [IPv6:::1]) (amavisd-new, port 10026) with ESMTP id Cd6GV1BzylL7; Tue, 24 Jul 2018 11:39:56 +0200 (CEST)
Received: from [192.168.43.206] (unknown [37.168.77.107]) by zproxy110.enst.fr (Postfix) with ESMTPSA id 68D3E82043; Tue, 24 Jul 2018 11:39:54 +0200 (CEST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_AFE11D39-3B9B-4773-A2FD-6594BBAC89CE"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: "Georgios Z. Papadopoulos" <georgios.papadopoulos@imt-atlantique.fr>
In-Reply-To: <002701d4232d$68fb7f00$3af27d00$@cdac.in>
Date: Tue, 24 Jul 2018 12:39:52 +0300
Cc: draft-ietf-6lo-deadline-time@ietf.org, anand@ece.iisc.ernet.in, Malati Hegde <malati@ece.iisc.ernet.in>, Samita Chakrabarti <samitac.ietf@gmail.com>, Gabriel Montenegro <Gabriel.Montenegro@microsoft.com>, lo <6lo@ietf.org>, Charlie Perkins <charles.perkins@earthlink.net>, satishnaidu80@gmail.com
Message-Id: <6875C8FA-C2F5-4E66-87DB-A3E0AB6BF2B2@imt-atlantique.fr>
References: <SN4PR2101MB07342E73E66510570E7D306495B60@SN4PR2101MB0734.namprd21.prod.outlook.com> <13FBBD0C-CCF0-4315-B497-E40DEBF4A867@imt-atlantique.fr> <006301d42318$fd3a2320$f7ae6960$@cdac.in> <CC8DB2AB-EBA8-4FED-A667-277E1639313B@imt-atlantique.fr> <002701d4232d$68fb7f00$3af27d00$@cdac.in>
To: Lijo Thomas <lijo@cdac.in>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/6lo/91Z4ihyhBRqaBgrv3Hx6Jfc8kZ8>
Subject: Re: [6lo] working group last call (wg lc) on https://datatracker.ietf.org/doc/draft-ietf-6lo-deadline-time/
X-BeenThere: 6lo@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: "Mailing list for the 6lo WG for Internet Area issues in IPv6 over constrained node networks." <6lo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6lo>, <mailto:6lo-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6lo/>
List-Post: <mailto:6lo@ietf.org>
List-Help: <mailto:6lo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lo>, <mailto:6lo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Jul 2018 09:40:06 -0000

Dear Lijo,

Many thanks for the clarification.
I am good now.

Best,
Georgios

____________________________________

Georgios Z. Papadopoulos, Ph.D.
Associate Professor, IMT Atlantique, Rennes

web: 	 www.georgiospapadopoulos.com <http://www.georgiospapadopoulos.com/>
twitter: 	@gzpapadopoulos <https://twitter.com/gzpapadopoulos?ref_src=twsrc%5Etfw&ref_url=http://georgiospapadopoulos.com/>
____________________________________

> On Jul 24, 2018, at 12:04, Lijo Thomas <lijo@cdac.in> wrote:
> 
> Dear Georgios,
>  
> Thanks for the feedback, responding to your query : 
>  
> Deadline Time (DT) by itself does not guarantee deterministic behaviour, but its information enables intermediate nodes to implement delay sensitive scheduling and routing algorithms towards achieving deterministic behaviour.
>  
> As a use case application of our draft,  we implemented a basic EDF policy in OpenWSN 6tisch stack. 
>  
> Please find the link for our openwsn implementation
>  
> https://github.com/openwsn-berkeley/openwsn-fw/tree/develop/openapps/uexpiration <https://github.com/openwsn-berkeley/openwsn-fw/tree/develop/openapps/uexpiration>
>  
>  
> Thanks & Regards,
> 
> Lijo Thomas 
> 
>  
> From: 6lo [mailto:6lo-bounces@ietf.org] On Behalf Of Georgios Z. Papadopoulos
> Sent: 24 July 2018 13:49
> To: Lijo Thomas
> Cc: draft-ietf-6lo-deadline-time@ietf.org; anand@ece.iisc.ernet.in; Malati Hegde; Samita Chakrabarti; Gabriel Montenegro; lo; Charlie Perkins; satishnaidu80@gmail.com
> Subject: Re: [6lo] working group last call (wg lc) on https://datatracker.ietf.org/doc/draft-ietf-6lo-deadline-time/
>  
> Hello Lijo,
>  
> Thank you so much for your detailed comments. I appreciate it very much.
> I am happy with your response, I just have one last clarification point, see below:
>  
>  
>> On Jul 24, 2018, at 09:38, Lijo Thomas <lijo@cdac.in <mailto:lijo@cdac.in>> wrote:
>>  
>> Dear Georgios,
>>  
>> Thanks for your valuable suggestions and we really appreciate for taking your valuable time for the review .
>>  
>> Please find our comments inline below marked as (*** [LT]) 
>>  
>> We will be happy to receive your further inputs !!!
>>  
>>  
>> Thanks & Regards,
>> 
>> Lijo Thomas 
>> 
>>  
>> From: 6lo [mailto:6lo-bounces@ietf.org <mailto:6lo-bounces@ietf.org>] On Behalf Of Georgios Z. Papadopoulos
>> Sent: 17 July 2018 21:40
>> To: lijo@cdac.in <mailto:lijo@cdac.in>
>> Cc: draft-ietf-6lo-deadline-time@ietf.org <mailto:draft-ietf-6lo-deadline-time@ietf.org>; anand@ece.iisc.ernet.in <mailto:anand@ece.iisc.ernet.in>; Malati Hegde; Samita Chakrabarti; Gabriel Montenegro; lo; Charlie Perkins; satishnaidu80@gmail.com <mailto:satishnaidu80@gmail.com>
>> Subject: Re: [6lo] working group last call (wg lc) on https://datatracker.ietf.org/doc/draft-ietf-6lo-deadline-time/ <https://datatracker.ietf.org/doc/draft-ietf-6lo-deadline-time/>
>>  
>> Dear Lijo and co-authors,
>>  
>> I went through the draft, please find my comments below:
>> — — 
>>  
>> High level comments:
>> */ [GP] The draft defines the Deadline Time (DT), but it is not clear to me how the arrival of the datagram within this pre-defined DT period is guaranteed?
>> Indeed, the draft provides the necessary DT information, however, the only action I could observe is the delay-sensitive datagram to be dropped if the indicated DT is elapsed.
>>  
>>  
>> *** [LT] Yes, the Deadline Time (DT) specifies the maximum allowable delay
>> before which the packet should be delivered to the destination. The proposed
>> draft provides a mechanism for transporting the DT information. By incorporating
>> deadline based scheduling/routing mechanisms within the intermediate nodes
>> using DT, one could guarantee deterministic behavior in terms of delay. 
>  
>  
> [GP] Would you agree that this draft do not guarantees deterministic behavior in terms of delay, but it provides
> the information of maximum allowable delay for a packet to be delivered to the destination?
>  
> To be more precise, for instance, lets us consider the following multi-hop network A—> B —> C.
> According this draft, it will required 2 timeslots (or 20ms) for a packet to be delivered at the DODAG Root C.
> However, if there is an external interference from A to B, then A may need to retransmit multiple times
> in order the datagram to be received by B. Then there are two options according to the draft:
> a) the datagram is dropped, to reduce the traffic, energy consumption.
> b) the datagram is delivered even if the deadline time is crossed, i.e., as you said in your e-mail “in some scenarios where the intention is also to know the total delay experienced by the packets in a network”
>  
> In both bases, a and b, there is no guarantee that the datagram will be delivered in predefined time, i.e., in deterministic behavior. 
>  
> — — 
> Thank you so much,
> Georgios
>  
> ____________________________________
>  
> Georgios Z. Papadopoulos, Ph.D.
> Associate Professor, IMT Atlantique, Rennes
>  
> web:     www.georgiospapadopoulos.com <http://www.georgiospapadopoulos.com/>
> twitter:            @gzpapadopoulos <https://twitter.com/gzpapadopoulos?ref_src=twsrc%5Etfw&ref_url=http://georgiospapadopoulos.com/>
> ____________________________________
>  
>  
>  
> 
> ------------------------------------------------------------------------------------------------------------------------------- 
> [ C-DAC is on Social-Media too. Kindly follow us at: 
> Facebook: https://www.facebook.com/CDACINDIA <https://www.facebook.com/CDACINDIA> & Twitter: @cdacindia ] 
> 
> This e-mail is for the sole use of the intended recipient(s) and may 
> contain confidential and privileged information. If you are not the 
> intended recipient, please contact the sender by reply e-mail and destroy 
> all copies and the original message. Any unauthorized review, use, 
> disclosure, dissemination, forwarding, printing or copying of this email 
> is strictly prohibited and appropriate legal action will be taken. 
> -------------------------------------------------------------------------------------------------------------------------------