Re: [6tisch] Intdir early review of draft-ietf-6tisch-architecture-19

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Fri, 01 March 2019 18:30 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: 6tisch@ietfa.amsl.com
Delivered-To: 6tisch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C03FA130EF3; Fri, 1 Mar 2019 10:30:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.502
X-Spam-Level:
X-Spam-Status: No, score=-14.502 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=hfh4wapa; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=jJYoICqA
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8XNSKZQ3-ZvD; Fri, 1 Mar 2019 10:30:43 -0800 (PST)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AEA54130EA5; Fri, 1 Mar 2019 10:30:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=18310; q=dns/txt; s=iport; t=1551465042; x=1552674642; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=HFyt9ff6bDEj0BxhAQllTwvw4ymBhutbJFs1kaGhs/o=; b=hfh4wapaTOeyNAXlRTTuTIFYrWB+xiz/tKf6eI8Ko+z/+cdgnHsuG/bf 19VlZeoq28kK+MOLrdTYPvO2GU6ZOrwW//qI/pOPDHPAxnytlZJSGyaf9 3sqja9iti4rg8lcEQclpHZt7dyVgWzTTFvIGFxtHxLF9RPgGSRt8XjHbA I=;
IronPort-PHdr: 9a23:w2M0/B8ky+1B+f9uRHGN82YQeigqvan1NQcJ650hzqhDabmn44+8ZR7E/fs4iljPUM2b8P9Ch+fM+4HYEW0bqdfk0jgZdYBUERoMiMEYhQslVdaZCVDxIeT2Ryc7B89FElRi+iLzPA==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AEAADSeXlc/5hdJa1lGgEBAQEBAgEBAQEHAgEBAQGBUQUBAQEBCwGBMSknA2h0BAsnhAiDRwOEUIsAgld8lyQUgRADVAsBASMJhEACF4QKIjQJDQEDAQEDAQMCbRwMhUoBAQEDASMRDAEBLgkBBAcEAgEIEQEDAQEDAiYCAgIwFQIGCAIEAQ0FCBODCIFdAw0IAQIMoDsCihRxgS+CeAEBBYUGGIILAwWBC4tAF4FAP4ERRoIXNYMeAQEDgSYRCx6DCDGCJolvEjKCD5ZdXQkCh0GLRYF0hWGDSIgEimCBEoRIjEUCBAIEBQINAQEFgUc4gVZwFRqCWQEzghwMF4EAAQeCQ4UUhT9ygSiMVYJNAQE
X-IronPort-AV: E=Sophos;i="5.58,428,1544486400"; d="scan'208";a="527016498"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 01 Mar 2019 18:30:40 +0000
Received: from XCH-ALN-008.cisco.com (xch-aln-008.cisco.com [173.36.7.18]) by rcdn-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id x21IUerA021365 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 1 Mar 2019 18:30:40 GMT
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by XCH-ALN-008.cisco.com (173.36.7.18) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Fri, 1 Mar 2019 12:30:39 -0600
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 1 Mar 2019 12:30:22 -0600
Received: from NAM05-DM3-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Fri, 1 Mar 2019 13:30:22 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector1-cisco-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HFyt9ff6bDEj0BxhAQllTwvw4ymBhutbJFs1kaGhs/o=; b=jJYoICqA7GO8N86KeMmS8iQDc75Nec0xHssMib9M5QmRCu5pyW1nsPBGqe+PwlgbLu2EoQw2129jbncpGeW1l39PNqAJNFh3VX2GmX9gkinUInfMkVIe0AFOUwpJkoH6/U7DsdhRXRWMKIJy4l5FmC3hmpPro8JDFpwA9SDnE6k=
Received: from BYAPR11MB3558.namprd11.prod.outlook.com (20.178.206.75) by BYAPR11MB2709.namprd11.prod.outlook.com (52.135.227.151) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1643.18; Fri, 1 Mar 2019 18:30:20 +0000
Received: from BYAPR11MB3558.namprd11.prod.outlook.com ([fe80::a07b:c022:56cf:60fb]) by BYAPR11MB3558.namprd11.prod.outlook.com ([fe80::a07b:c022:56cf:60fb%5]) with mapi id 15.20.1665.015; Fri, 1 Mar 2019 18:30:20 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>, "int-dir@ietf.org" <int-dir@ietf.org>
CC: "6tisch@ietf.org" <6tisch@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>, "draft-ietf-6tisch-architecture.all@ietf.org" <draft-ietf-6tisch-architecture.all@ietf.org>
Thread-Topic: Intdir early review of draft-ietf-6tisch-architecture-19
Thread-Index: AQHUyY4LRBL+Ij1ct0679Sdfs7u3I6X1SqnQ
Date: Fri, 01 Mar 2019 18:29:18 +0000
Deferred-Delivery: Fri, 1 Mar 2019 18:29:09 +0000
Message-ID: <BYAPR11MB3558777FC286CC869FF120A6D8760@BYAPR11MB3558.namprd11.prod.outlook.com>
References: <155071649357.20269.3113753571607539612@ietfa.amsl.com>
In-Reply-To: <155071649357.20269.3113753571607539612@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pthubert@cisco.com;
x-originating-ip: [2001:420:44f3:1300:552f:ff32:b86:aad7]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 39e6fab1-e531-441a-61be-08d69e73f607
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600127)(711020)(4605104)(2017052603328)(7153060)(7193020); SRVR:BYAPR11MB2709;
x-ms-traffictypediagnostic: BYAPR11MB2709:
x-ms-exchange-purlcount: 1
x-ld-processed: 5ae1af62-9505-4097-a69a-c1553ef7840e,ExtAddr
x-microsoft-exchange-diagnostics: 1;BYAPR11MB2709;23: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
x-microsoft-antispam-prvs: <BYAPR11MB2709C31E6EA3B2C615139067D8760@BYAPR11MB2709.namprd11.prod.outlook.com>
x-forefront-prvs: 09634B1196
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(136003)(396003)(376002)(39860400002)(366004)(13464003)(189003)(199004)(33656002)(6306002)(9686003)(66574012)(81166006)(102836004)(71190400001)(74316002)(7736002)(478600001)(966005)(14454004)(55016002)(8936002)(229853002)(305945005)(2906002)(6436002)(81156014)(4326008)(97736004)(71200400001)(6116002)(6246003)(8676002)(106356001)(25786009)(2501003)(86362001)(53936002)(105586002)(450100002)(186003)(53546011)(30864003)(46003)(7696005)(316002)(110136005)(76176011)(256004)(68736007)(54906003)(446003)(476003)(99286004)(52536013)(486006)(14444005)(6506007)(11346002)(5660300002); DIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR11MB2709; H:BYAPR11MB3558.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: +l91rUpkX43ioKOUZOUcOE5+0J1VvVpTbK46o0amofJ/9dAskOObDucWph7MAuV8s8UEyXDbHN27wci0UTq/ouf1fRvXrV4IrruSQJsvRkfyZbVnBlb/7bvoMn/pNAajUTyyHY0gpIkUKbG0br8Q79k8Gr50k0xK27HZQcIQYvSHRTUUncsQDutGiiCNpqsH123NbAEWk/fSYo11gc4eKWsW7qegQ/eW8de3bvUUOylbyL9f8QfO2Kcp6qXMLwpYqhz/1rSc5lPVyTs99Z85HW7GVWFRyU+QZ9xLq3qp1sAGZnVOI6tJ7ZhSwWTizP85v2/hPrULS+1vL2E9mDp4ArGDsRfwnb5+wbBsKuRyRnLNZqV/mUMdfRG8N9ttMKn9Bj/l6DgNDHN72FA99RIoid0XuBosJY/S89qBNbVATZs=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 39e6fab1-e531-441a-61be-08d69e73f607
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Mar 2019 18:30:20.3518 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB2709
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.18, xch-aln-008.cisco.com
X-Outbound-Node: rcdn-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/6tisch/95eX1V2uSEhKn4OVYHTXVCTV-FI>
Subject: Re: [6tisch] Intdir early review of draft-ietf-6tisch-architecture-19
X-BeenThere: 6tisch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discuss link layer model for Deterministic IPv6 over the TSCH mode of IEEE 802.15.4e, and impacts on RPL and 6LoWPAN such as resource allocation" <6tisch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tisch>, <mailto:6tisch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6tisch/>
List-Post: <mailto:6tisch@ietf.org>
List-Help: <mailto:6tisch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tisch>, <mailto:6tisch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Mar 2019 18:30:57 -0000

Dear Carlos:

Many thanks for your early review!

All the best,

Pascal

>   -----Original Message-----
>   From: Carlos Pignataro <cpignata@cisco.com>
>   Sent: jeudi 21 février 2019 03:35
>   To: int-dir@ietf.org
>   Cc: 6tisch@ietf.org; ietf@ietf.org; draft-ietf-6tisch-architecture.all@ietf.org
>   Subject: Intdir early review of draft-ietf-6tisch-architecture-19
>   
>   Reviewer: Carlos Pignataro
>   Review result: On the Right Track
>   
>   Reviewer: Carlos Pignataro
>   Review result: On the Right Track -- Has (Minor) Issues
>   
>   I am an assigned INT directorate reviewer for <draft-ietf-6tisch-architecture-
>   19>. These comments were written primarily for the benefit of the Internet
>   Area Directors. Document editors and shepherd(s) should treat these
>   comments just like they would treat comments from any other IETF
>   contributors and resolve them along with any other Last Call comments that
>   have been received. For more details on the INT Directorate, see
>   https://datatracker.ietf.org/group/intdir/about/
>   
>   This is a fairly thick document to read and hard to digest.

Ack. This is one of the major products of the 6TISCH WG and covers 5+ years of existence. 
This work reflects rounds of design, open source implementation and ETSI-backed plugtests.
The original intent was t ship it in phased volumes but we were discouraged to do so when we 
tried.  The bright side is an all-in-one documentation : )

>   
>   The architectural descriptions are sensible, useful, and distilled to a
>   meaningful and minimal set of building blocks. The fact that some blocks are
>   scattered through various sources and his architecture acts as the confluence
>   point adds in the difficulty in parsing.
>   
>   This amounts, in my humble opinion, to an opportunity to improve the
>   document in a couple of areas: 1. There are specific depictions that would
>   immensely improve clarity. 2. THere is an opportunity to rearrange a bit the
>   structure of the doc, slightly.

Let's go!

>   
>   Specifically:
>   
>   The Introduction is very useful. However, the first Figure in the document is a
>   protocol stack -- instead, a reference topo, model, or architecture might help
>   make it real.

Hum... we could move sections 3.5 and 3.6 up; I'm afraid we are undoing a move I did for an early review (was that Ralph?) but I'm like you, I prefer the other way.

The Toc Would look like this:

3.  High Level Architecture . . . . . . . . . . . . . . . . . . .  12
     3.1.  A Non-Broadcast Multi-Access Radio Mesh Network . . . . .  12
     3.2.  A Multi-Link Subnet Model . . . . . . . . . . . . . . . .  13
     3.3.  TSCH: A Deterministic MAC Layer . . . . . . . . . . . . .  15
     3.4.  6TiSCH Stack  . . . . . . . . . . . . . . . . . . . . . .  15
     3.5.  Scheduling TSCH . . . . . . . . . . . . . . . . . . . . .  17
     3.6.  Routing and Forwarding Over TSCH  . . . . . . . . . . . .  19


>   
>   The Terminology section is very fragmented. If terms are used within an
>   architecture, does it matter where they come from in such a harshly
>   demarcated way? Why many subsections of terminology?
>   

Probably because:
- section 2 was mis named. I renamed to " Terms and References  "
- we merged the full draft of 6TiSCH terminology in this to save IESG cycles. There are pros and cons obviously.

After the rename, the result is as follows (after removing BCP 14 text as you an Eliot recommend).

2.  Terms and References  . . . . . . . . . . . . . . . . . . . .   4
     2.1.  Terminology . . . . . . . . . . . . . . . . . . . . . . .   4
     2.2.  Abbreviations . . . . . . . . . . . . . . . . . . . . . .  10
     2.3.  References  . . . . . . . . . . . . . . . . . . . . . . .  11

>   An Architecture is more than a stack. However, Section 3 "HL Arch" starts
>   with Section 3.1, "Stack". Before a protocol, a System view and block
>   interaction can flow into a protocol spec -- but the other way around seems
>   inverse.
>   

Yes this is now 3.4

>   Section 3.4 (and Section 3.3) specifically would greatly benefit from
>   depictions of the different Forwarding + Routing models, with PCE, with RPL,
>   etc. A view of the neighbor-to-neighbor versus a Centralized model would
>   help, in my visual-person opinion.

This depiction exists in section 4.5. Let me add a forward pointer. I concerned to repeat too much in a doc that is already thick.

>   
>   Section 3.7 onwards does not seem to belong in a "High Level Architecture"
>   with detailed protocol flows and interactions.

Yes I'm moving this into section 4 as new section 4.2

>   
>   4.7.  Distributed vs. Centralized Routing
>   
>   This seems to be a High-Level architectural distinction. SHould be in Section
>   3.something?

The influence of this is spread in all subsections of section 3. I moved text that was in section 4 up.
Also added text in the introduction to position that already once and for all, expanding existing text:
"
   Centralized routing refers to a model where routes are computed and
   resources are allocated from a central controller.  This is
   particularly helpful to schedule deterministic multi-hop
   transmissions.  Distributed is a concurrent model that relies in more
   classical peer to peer protocols for TSCH resource allocation and
   routing operations.

   The architecture defines mechanisms to establish and maintain routing
   and scheduling in a centralized, distributed, or mixed fashion, for
   use in multiple OT environments.  It is applicable in particular to
   highly scalable solutions such a Advance metering that leverage
   distributed routing to address multipath over a large number of hops
   and nodes.
"
>   
>   4.7.3.  Differentiated Services Per-Hop-Behavior
>   
>   Is there a need to include and explain ECN for Tunneling?
>   
>   Appendix A.  Dependencies on Work In Progress
>   
>   What is the plan for this Appendix, as it seems appropriate for an I-D but less
>   so for a forever inmutable RFC.
>   

I understand, but then there are other places where we say 'at the time of this writing'.
Even if an RFC is immutable, it still holds a position on the flow of time and this appendix positions that.
I'm OK to remove it, It like to see what others say first.



>   Minor and Nits:
>   
>   2.1.  BCP 14
>   
>      The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
>      "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
>   "MAY", and
>      "OPTIONAL" in this document are to be interpreted as described in BCP
>      14 [RFC2119][RFC8174] when, and only when, they appear in all
>      capitals, as shown here.
>   
>   The document contains this boilerplate text and citations / references to RFC
>   2119 and RFC 8174. However, it does not use any RFC 2119 keywords.
>   
>   The non-use of RFC 2119 keywords is appropriate given the type of
>   architectural document this is, and thus suggest removing Section 2.1 and
>   included / associated References.
>   

Done. It may come back, there are id nits associated.


>   2.3.  References
>   
>      The draft uses domain-specific terminology defined or referenced in:
>   
>   I would re-title Section 2.3. It is not "References". Something like
>   "Terminology from other Documents".
>   
>   Super Editorials for Consideration:
>   
>   Abstract
>   
>      This document describes a network architecture that provides low-
>      latency, low-jitter and high-reliability packet delivery.  It
>      combines a high speed powered backbone and subnetworks using IEEE
>   
>   s/high speed/high-speed/
>   
>      TSCH:       A medium access mode of the IEEE Std 802.15.4
>                  [IEEE802154] standard which uses time synchronization to
>                  achieve ultra low-power operation, and channel hopping to
>   
>   s/ultra low-power/ultra-low-power/
>   
>      An overview of the the initial steps of a device in a network can be
>      found in Section 3.7; the security aspects of the join process are
>      further detailed in Section 6.
>   
>   s/the the/the/
>   
>      slotframes that repeat over and over.  Slotframes may collide and
>      require a device to wake up at a same time, in which case a the
>      slotframe with the highest priority is actually activated.
>   
>   s/a the/the/
>   
>         [I-D.ietf-6tisch-msf] influence the operation of the MAC layer to
>         add, update and remove cells in its own, and its peers schedules
>   
>   s/peers schedules/peers' schedules/
>   
>      Within that subnet, neighbor devices are discovered with extended
>      6LoWPAN Neighbor Discovery [RFC8505] (6LoWPAN ND), whereas RPL
>      [RFC6550] enables routing in the so called Route Over fashion, either
>   
>   s/so called/so-called/
>   
>      wired or wireless.  The backbone can be a classical IPv6 network,
>      with Neighbor Discovery operating as defined in [RFC4861] and
>      [RFC4862].  This architecture requires work to standardize the the
>   
>   s/the the/the/
>   
>      As detailed in Section 4.1 the 6LoWPAN ND 6LBR and the root of the
>      RPL network need to share information about the devices that are
>      learned through either protocol but not both.  One way af achieving
>   
>   s/af achieving/of achieving/
>   
>      window of time is defined around the scheduled transmission where the
>      medium must, as much as practcally feasible, be free of contending
>      energy.
>   
>   s/practcally/practically/
>   
>      whereby a RPL parent discovers a chunk that is not used in its
>      interference domain (e.g lack of energy detected in reference cells
>   
>   s/e\.g /e.g.,/
>   
>      With respect to Centralized routing and scheduling, it is envisionned
>      that the related component of the 6TiSCH Architecture would be an
>   
>   s/envisionned/envisioned/
>   
>      The architecture introduces the concept of a Track, which is a
>      directed path from a source 6TiSCH node to oe or more destination(s)
>   
>   s/to oe or/to one or/
>   
>      6TiSCH enables a mixed model of centralized routes and distributed
>      routes.  Centralized routes can for example be computed by a entity
>   
>   s/a entity/an entity/
>   
>      In the minimal setting defined in [I-D.ietf-6tisch-minimal-security],
>      the authentication is requires a pre-shared key, based on which a
>   
>   s/is requires/requires/
>   
>   3.5.  A Non-Broadcast Multi-Access Radio Mesh Network
>   
>      A 6TiSCH network is an IPv6 [RFC8200] subnet which, in its basic
>      configuration, is a single Low Power Lossy Network (LLN) operating
>      over a synchronized TSCH-based mesh.
>   
>   s/Low Power/Low-Power and/
>   
>   Figure 10 does not have a Label/Title.
>   

Done all of the above, many thanks!!!

>   4.5.  On Tracks
>   
>   What are "Tracks"?
>   

Yes the definition first. 4.6 is now:

"
4.6.  On Tracks

   The architecture introduces the concept of a Track, which is a
   directed path from a source 6TiSCH node to one or more destination(s)
   6TiSCH node(s) across a 6TiSCH LLN.

   A Track is the 6TiSCH instantiation of the concept of a Deterministic
   Path as described in [I-D.ietf-detnet-architecture].  Constrained
   resources such as memory buffers are reserved for that Track in
   intermediate 6TiSCH nodes to avoid loss related to limited capacity.
   A 6TiSCH node along a Track not only knows which bundles of cells it
   should use to receive packets from a previous hop, but also knows
   which bundle(s) it should use to send packets to its next hop along
   the Track.

4.6.1.  General Behavior of Tracks

   A Track is associated with Layer-2 bundles ...
"



>   4.6.1.3.  Tunnel Metadata
>   
>   The term "Metadata" appears only 4 times in this long document, but it is
>   really not adequatedly defined.

Yes, I wonder why I used that term. Replaced with "tunneling information"
>   
>      At the egress 6TiSCH router, the reverse operation occurs.  Based on
>      metadata associated to the Track, the frame is passed to the
>      appropriate Link-Layer with the destination MAC restored.
>   
>   So there is a demux function using Metadata -- what kind?
>   

Added text, now looks like

"

   At the egress 6TiSCH router, the reverse operation occurs.  Based on
   tunneling information of the Track, which may for instance indicate
   that the tunneled datagram is an IP packet, the datagram is passed to
   the appropriate Link-Layer with the destination MAC restored.

4.7.1.3.  Tunneling Information

   Tunneling information coming with the Track configuration provides
   the destination MAC address of the egress endpoint as well as the
   tunnel mode and specific data depending on the mode, for instance a
   service access point for frame delivery at egress.


"

Many thanks Carlos! This was very dep and useful.


I'm publishing a version 20 before cut off, I hope that it solves the issues that you raised to your satisfaction. 
Please let me know...


Pascal