Re: [6tisch] Fwd: I-D Action: draft-ietf-6tisch-6top-protocol-02.txt

Xavier Vilajosana <xvilajosana@eecs.berkeley.edu> Fri, 05 August 2016 07:00 UTC

Return-Path: <xvilajosana@gmail.com>
X-Original-To: 6tisch@ietfa.amsl.com
Delivered-To: 6tisch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0CDB212D12B for <6tisch@ietfa.amsl.com>; Fri, 5 Aug 2016 00:00:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.597
X-Spam-Level:
X-Spam-Status: No, score=-2.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.001, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g9S622xPT55r for <6tisch@ietfa.amsl.com>; Fri, 5 Aug 2016 00:00:45 -0700 (PDT)
Received: from mail-lf0-x231.google.com (mail-lf0-x231.google.com [IPv6:2a00:1450:4010:c07::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3CBC612B029 for <6tisch@ietf.org>; Fri, 5 Aug 2016 00:00:45 -0700 (PDT)
Received: by mail-lf0-x231.google.com with SMTP id l69so197234845lfg.1 for <6tisch@ietf.org>; Fri, 05 Aug 2016 00:00:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=tuM5YMh7vhWhDriVb+5sy/NmO63w/KblrUaXONXdiRo=; b=dHUIY9vjBGn83vLrqZOSO2uSCdBC0Yc6dvdRod8DTTYDxhvt3R23Rz+MONJkSxH9eO VAHPZFjV0EAJAo0P/B/3Su29F1vyYzK7A9q4LagItoXRHTvqG/RpwZGW8p1uWbNX0/18 8mRcM7kCfRwObswmXdOxn1a1iVh4VK4UdhdynA2Er2BSCrmMkXCSe7IpzoJ0svsg2CnR Kc8lTWP3JWA10xg+0R8cW8x7xrMZK+DyG7s0Nos7QYzDICFTJW4oqrY+wEYAt7cDdSSZ z0ORrcbU6MXars8++kTrZvPDOi+QjPOW6ePsFLDGvInXHI+4chPAX/Tg7mZOtAbl2lUV jp4A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=tuM5YMh7vhWhDriVb+5sy/NmO63w/KblrUaXONXdiRo=; b=lNToWVVPPaCK/4wfXZcybPhO6ukOkZDSHJnmW7NZHYfI+yQULxbC6b21mAv3igluzK LB0Nc3lxegCvJUnZCcAMMrIY+emRZH4ddQl1/7lmtKIJnshvrFFvZAzSb6XS0HwuLkOK E02e0pbDlRtgqovf9+uny52qN8smj7Du2OAbMY0eY+FFHC2AEJ6sF06FXmsFPXQPcaSZ 5fifwe3Sn9/RhyzpkVelUaAKDzsupAfXFaRr28gOkXSwWBNTkKmQ0dhzR78bUyX7Jh+J oogEmGz/fnJhCWzknnPZdo23h+M7+y96t+uZDCjdJ/7UMhN3pQmhR/PSk7jXqnQCl9Rs OFMg==
X-Gm-Message-State: AEkoousJ8uJpKn5Jma8KZFL2xa6pjzB2DNJat8Fqa1GNxrI3xsv4tqLiuX3FhGQiBnNgv0lvXZdcEm2An8E7OQ==
X-Received: by 10.25.1.133 with SMTP id 127mr26958427lfb.54.1470380443211; Fri, 05 Aug 2016 00:00:43 -0700 (PDT)
MIME-Version: 1.0
Sender: xvilajosana@gmail.com
Received: by 10.25.1.196 with HTTP; Fri, 5 Aug 2016 00:00:42 -0700 (PDT)
In-Reply-To: <22432.37908.885838.449611@fireball.acr.fi>
References: <20160726063035.11416.82424.idtracker@ietfa.amsl.com> <CAMsDxWRQ1+zbhuCypNS2aHsTtXCtu+MnMu6ig89vLrk2_FxaEg@mail.gmail.com> <1283033447.423092.1469520332086.JavaMail.root@llavaneres.uoc.es> <CAC9+vPjqLfs4xoq3mkDMp9pxnc24iMPT31+1WYwuG_zSNQzVgA@mail.gmail.com> <CAC=zv2M1DXZTa-siHieOpbjdCEqwz=+bRt-gmSFm_qYZ_MZ=8g@mail.gmail.com> <CAMsDxWT12L4bdX2_WQ04vdt5B4g4Vk2zY7gULw+10Kgm28=Abg@mail.gmail.com> <22432.37908.885838.449611@fireball.acr.fi>
From: Xavier Vilajosana <xvilajosana@eecs.berkeley.edu>
Date: Fri, 05 Aug 2016 09:00:42 +0200
X-Google-Sender-Auth: NJ6BYEKwJKYPWpHAnxhtpc2IDcU
Message-ID: <CAMsDxWSq6LHaBmrprO_=veOvnVbVbq8XGGGQ=pZ30VX+Xrk6hA@mail.gmail.com>
To: Tero Kivinen <kivinen@iki.fi>
Content-Type: multipart/alternative; boundary="001a113b0220009e6705394da0bb"
Archived-At: <https://mailarchive.ietf.org/arch/msg/6tisch/MWSMdSWJptIPBfiUqTSedK-Ixn0>
Cc: "6tisch@ietf.org" <6tisch@ietf.org>, Jiliang Wang <jiliangwang99@gmail.com>, Xavi Vilajosana Guillén <xvilajosana@uoc.edu>
Subject: Re: [6tisch] Fwd: I-D Action: draft-ietf-6tisch-6top-protocol-02.txt
X-BeenThere: 6tisch@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Discuss link layer model for Deterministic IPv6 over the TSCH mode of IEEE 802.15.4e, and impacts on RPL and 6LoWPAN such as resource allocation" <6tisch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tisch>, <mailto:6tisch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6tisch/>
List-Post: <mailto:6tisch@ietf.org>
List-Help: <mailto:6tisch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tisch>, <mailto:6tisch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Aug 2016 07:00:48 -0000

Hi Tero,

thanks for your comments. They are valuable. See inline.

2016-08-02 14:37 GMT+02:00 Tero Kivinen <kivinen@iki.fi>:

> Xavier Vilajosana writes:
> > A node knows the bytes it can fit in a packet. This gives an indication
> to the
> > node of what is the number of items that can be requested. When a node
> issues
> > a LIST it starts by offset 0, this returns the first N scheduled cells.
> Then
> > it seems reasonable that the node will indicate offset N and request N
> more
> > cells ...
> > If the number of requested cells does not fit in the packet an error is
> > returned and the node retries again with a smaller value of N.
> > I do not see a big complexity on that. What issues do you see?
>
> Note, that in 15.4 network some othe frames might also include other
> information elements, which might consume some of the space available
> for the actual data. I.e., even the upperlayer of the sending device
> might not know how many bytes it can send at given moment, as MAC
> layer might add some extra overhead without telling that to the upper
> layer.
>
> I think it would be better to make protocol so that sender will send
> as many items it can fit, and indicates whether there is more and
> responder will just give offset where the next request starts. Or just
> use the numCells as a max size, but make it so that sender can also
> send less if it cannot fit that many in response. This would require
> some way to tell how many cells there are so requested will know when
> to stop.
>
> XV> I will study your proposal (also the example you point in the next
email you had sent). it seems more flexible but still simple.


> >             2.       Will the clear command result in inconsistency in
> current
> >             design? For example, a clear command is sent from A to B and
> the
> >             response from B to A is lost.
> >
> >         The CLEAR is not executed until the response is received. B side
> >         executes the CLEAR after receiving the L2 ACK of the response
> >         message.
> >
> >     It there any problem when the L2 ACK is lost in which A clears while
> B
> >     does not?
> >
> > In a TSCH network the probability of losing the ACK is very low. As the
> packet
> > has already been sent the ACK has extremely high chances to pass as well
> (it
> > is shorter in length which still favours the transmission success). Of
> course
> > this can remotely happen and if this happens the system should recover
> from
> > that inconsistency. To do so the generation counters will enable the
> detection
> > of the inconsistency and both nodes schedule will be cleared (only cells
> > between them).
>
> Loosing ACK might be low probability and that does not usually even
> cause issues, as L2 will simply retransmit the frame. The bigger issue
> is that L2 ACK just indicates that FCS check was correct and frame was
> received by the other end, it DOES NOT mean that frame will be
> delivered to the upper layer.
>
> It is completely possible that MAC runs out of buffer space after
> receiving the frame and sending ACK, but before sending the received
> frame to upper layer.
>
> I.e. L2 ACK only means that I got the frame, no need to do
> retransmission anymore. It does not mean that frame will be delivered
> to the upper layer, or that upper layer will be able to parse and
> process the frame.
>
> So using L2 ACK for any kind of application level acknowledgement is
> bad idea.
>
> Also with 6tisch L2 ACK is alreayd quite large (frame control (2
> octets), seq number (1), addressing fields (0-20), auxiliary security
> header (1-10), Time correction IE (2), MIC (4-16), FSC (2-4)).
>
> XV: so you suggest 3 way (request-response-confirmation) for all cmds.. It
is energy-wise costly. What others think?


> > The alternative is to use a 3 step transaction, which requires 33% more
> > packets over the air at every transaction. We decided to avoid that.
> Maybe a
> > research question is to evaluate in a real deployment the energy
> overhead of
> > using 3 way transactions vs eventually recovering from a lost ACK during
> a
> > CLEAR. Given the chances of losing an ACK I would bet for the later.
>
> I think using protocol defined on the 6top layer is better. It is bad
> idea to rely on L2 ACKs for anything else than information that there
> no need to retransmit this frame again...
>
XV: idem as before, doable but consumes more energy. let's reach consensus
so we can progress.


> --
>


> kivinen@iki.fi
>