Re: [Detnet] Draft DetNet Charter
Thomas Watteyne <watteyne@eecs.berkeley.edu> Wed, 02 September 2015 17:52 UTC
Return-Path: <twatteyne@gmail.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 75F781B4C61 for <detnet@ietfa.amsl.com>; Wed, 2 Sep 2015 10:52:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.277
X-Spam-Level:
X-Spam-Status: No, score=-1.277 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jMeqqKoAREVe for <detnet@ietfa.amsl.com>; Wed, 2 Sep 2015 10:52:16 -0700 (PDT)
Received: from mail-io0-x22c.google.com (mail-io0-x22c.google.com [IPv6:2607:f8b0:4001:c06::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0EC7E1B4C20 for <detnet@ietf.org>; Wed, 2 Sep 2015 10:52:16 -0700 (PDT)
Received: by iofh134 with SMTP id h134so29461396iof.0 for <detnet@ietf.org>; Wed, 02 Sep 2015 10:52:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=UFjD6ZduEqKLctSKAH5XPaufDH7Va99N+XBHnWYa8d0=; b=EhhEPBfBzXNSGzLXMiC1fpnwObi8aj0bR2sWzw4vrZkrT6lzlKyNg7eDgDsflWVBf7 C9XzfHdPfBu8JeNrKYmnvxsiQ0v7+yvnXLF6UcaL9EKbiv7dgLTI1BJkH2hgVnzoOPYN osQaf3of/oIG/xWCadW6feCHQDzYIYWYGkAKjRO7bjwahpj+I0s8TJTFb83OHDDbIaMr SWA8AkGv6rYliG5UzeSdvdBSLPdFUgMS/jV7cONeUIYKOh/4c0VCd8r25oV2BdgRQIXs 3mNibqgWfPEH9o8oey5SEgRE/UiUDkInnNg3xOMgMQNZzN+97KpCvcZEAhrFHtZ4W7Rc z4Xg==
X-Received: by 10.107.128.79 with SMTP id b76mr18220398iod.64.1441216335374; Wed, 02 Sep 2015 10:52:15 -0700 (PDT)
MIME-Version: 1.0
Sender: twatteyne@gmail.com
Received: by 10.79.118.81 with HTTP; Wed, 2 Sep 2015 10:51:55 -0700 (PDT)
In-Reply-To: <CAH7SZV8Pp=po6AMVL=CpRFvg-5GWe-RC5qGU7YG8B-vj2jeS9Q@mail.gmail.com>
References: <6CE1AE4935C63549B80243EE77A7246E0109CEBB1C@DLB-XCHPW02.dolby.net> <C8CB9CA7-121D-48C1-846A-53ACC32C4834@ninetiles.com> <24DD07B7-239B-4A00-B19D-627447B656E1@cisco.com> <3002A87EA61E0A4DB56546AC16A0D5171EDB9805@ESESSMB103.ericsson.se> <OFA586E3F4.CE063DC8-ON86257EB2.0053C6DB-86257EB2.0054F48A@ni.com> <EB9B93801780FD4CA165E0FBCB3C3E672B3B375A@SJEXCHMB09.corp.ad.broadcom.com> <OFE51E94FE.5A60E89E-ON86257EB3.005AC2DD-86257EB3.005C07DC@ni.com> <55E6F8D0.1010203@ece.iisc.ernet.in> <CAH7SZV8Pu+yxWvB9ga1YuKedd+Pd-C1tAJuayOyJDjBAzRyWZA@mail.gmail.com> <55E72392.4080906@ece.iisc.ernet.in> <CAH7SZV8Pp=po6AMVL=CpRFvg-5GWe-RC5qGU7YG8B-vj2jeS9Q@mail.gmail.com>
From: Thomas Watteyne <watteyne@eecs.berkeley.edu>
Date: Wed, 02 Sep 2015 19:51:55 +0200
X-Google-Sender-Auth: niOt8U5MED6PVyKZPVmjX_3-TTA
Message-ID: <CADJ9OA9cgqL9Zzqa0-RvodS8YXnvNp8vcyuf+rCf22hvQoA0aA@mail.gmail.com>
To: "Prof. Diego Dujovne" <diego.dujovne@mail.udp.cl>
Content-Type: multipart/alternative; boundary="001a113de63eb71145051ec75312"
Archived-At: <http://mailarchive.ietf.org/arch/msg/detnet/3FEsD-q6WBeiAed81ohmFlB5DlY>
Cc: "detnet@ietf.org" <detnet@ietf.org>, "S.V.R.Anand" <anand@ece.iisc.ernet.in>
Subject: Re: [Detnet] Draft DetNet Charter
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussions on Deterministic Networking, characterized by 1\) resource reservation; 2\) 0 congestion loss and guaranteed latency; 3\) over L2-only and mixed L2 and L3 networks; and 5\) 1+1 replication/deletion." <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Sep 2015 17:52:20 -0000
I strongly agree that a distributed approach in the low-power wireless networks will get you what you are looking for. At 6TiSCH, we work on technique "on The Fly" scheduling [1] which does just that. Thomas [1] https://tools.ietf.org/html/draft-dujovne-6tisch-on-the-fly-06 On Wed, Sep 2, 2015 at 7:47 PM, Prof. Diego Dujovne < diego.dujovne@mail.udp.cl> wrote: > Anand, > I see your concern. I think this kind of functionality can be > achieved in today's systems as long as the (possibly incremental) > updates on network knowledge are shared between the redundant > controllers. > In a second step, a distributed resource allocation > system (allowing every network element to negotiate resources) > is possible as a complement to a centralized approach. > Furthermore, from my point of view, a fully distributed > resource allocation is feasible for small networks, where scalability > is not a problem. > What do you think? > Regards, > > Diego > > > > > 2015-09-02 13:28 GMT-03:00 S.V.R.Anand <anand@ece.iisc.ernet.in>: > >> Diego, >> >> Yes, indeed. The distributed management helps for the reasons you stated. >> >> I have a one concern though. If you imply that the distributed management >> is >> performed by the network elements, then these need to have an up-to-date >> knowledge about the global network usage, and the necessary logic that >> usually >> runs on a dedicated central controller. Can we expect this functionality >> in >> today's systems ? >> >> Anand >> >> >> >> >> On Wednesday 02 September 2015 08:28 PM, Prof. Diego Dujovne wrote: >> > There is also the possibility of a distributed management, mainly to add >> > redundancy and increase reliability of the system in case the >> centralized >> > management is not available. >> > >> > Do you agree? >> > >> > Diego >> > >> > >> > >> > 2015-09-02 10:25 GMT-03:00 S.V.R.Anand <anand@ece.iisc.ernet.in> >> <anand@ece.iisc.ernet.in>: >> > >> > Hi All, >> > >> > Related to this ongoing discussion on flow management, I am >> wondering if there are application scenarios where we may have to tightly >> bound the delay in setting up a new application flow, during run-time, >> before data for that flow starts coming in. >> > >> > If there are indeed use cases, this question can be mostly >> addressed by a central manager that is expected to have an up-to-date >> knowledge about the resource usage. But if the network state exhibits >> temporal behaviour, as in wireless, then we may have to figure out ways of >> minimising the delay in terms of setting up route and bandwidth resources. >> > >> > Am I making sense ? >> > >> > Anand >> > >> > >> > On Tuesday 01 September 2015 10:15 PM, Rodney Cummings wrote: >> >> Hi Pat, >> >> >> >> > The text applies equally to management or the bandwidth consumer >> explicitly releasing bandwidth as well as to cases where automatic release >> occurs. >> >> >> >> I agree. That's what I meant when I said that management supports >> hard-state or soft-state. I am fine with the charter text as is. >> >> >> >> When I say hard-state, I mean explicit release. Management writes >> variables, but there is no periodic confirmation of resource use. This will >> be common in automotive, and in some smaller-scale industrial applications. >> I don't think we should limit these applications to layer-2. >> >> >> >> When I say soft-state, I mean that the central manager uses a >> protocol to periodically confirm resource usage. This could be MSRP, RSVP, >> IS-IS, PCEP... whatever we decide to enhance. This will be common in >> larger-scale applications including factory automation. >> >> >> >> We can also support technologies that do not require management at >> all. I was discussing management mainly in the context of scheduled traffic. >> >> >> >> Rodney >> >> >> >> >> >> >> >> From: "Pat (Patricia) Thaler" <pthaler@broadcom.com> >> <pthaler@broadcom.com> >> >> To: "rodney.cummings@ni.com" <rodney.cummings@ni.com> >> <rodney.cummings@ni.com> <rodney.cummings@ni.com>, "detnet@ietf.org" >> <detnet@ietf.org> <detnet@ietf.org> <detnet@ietf.org>, >> >> Date: 08/31/2015 09:18 PM >> >> Subject: Re: [Detnet] Draft DetNet Charter >> >> Sent by: "detnet" <detnet-bounces@ietf.org> >> <detnet-bounces@ietf.org> >> >> >> >> >> >> >> >> Hi Rodney, >> >> >> >> The charter text says: >> >> "...and 2) release/reuse the resources when they are no more >> required..." >> >> which says nothing about automatic release of resources. When >> reservations are set up by management, management would also have a way to >> release the resource. The text applies equally to management or the >> bandwidth consumer explicitly releasing bandwidth as well as to cases where >> automatic release occurs. >> >> >> >> It is more likely that an in car control path would be layer 2 and >> covered by the work IEEE 802.1 is doing. The building monitoring and >> control use case is an example where Layer 3 with some of the configuration >> relatively static (security monitoring systems, environmental control, >> etc.). Or control on a manufacturing line. >> >> >> >> Regards, >> >> Pat >> >> >> >> From: detnet [mailto:detnet-bounces@ietf.org >> <detnet-bounces@ietf.org>] On Behalf Of Rodney Cummings >> >> Sent: Monday, August 31, 2015 8:28 AM >> >> To: detnet@ietf.org >> >> Subject: Re: [Detnet] Draft DetNet Charter >> >> >> >> Hello, >> >> >> >> I agree that we should address applications that need soft-state >> (i.e. automatic release of resources when no longer used), but I do not >> think that the DetNet work should prohibit applications from using >> hard-state. >> >> >> >> As a specific example, consider a network within a car that is >> used for cyber-physical control (e.g. engine, transmission). The devices >> for this application never change, and the network cabling and routing >> never changes, and therefore the DetNet traffic is never expected to >> change. Traffic for other purposes (e.g. Internet browsing) may be >> desirable, but it is definitely not as critical. For this application, >> locking down the resources for DetNet traffic is desired. >> >> >> >> In the TSN work thus far, the mechanism for configuring 802.1Qbv >> schedules is management. The general assumption is that management of >> 802.1Qbv can be handled in either a hard-state or soft-state manner, >> depending on the application. If 802.1Qbv is used in an IT network, I would >> expect soft-state to be used. >> >> >> >> The existing AVB standards in the field (802.1Qav and 802.1Qat, >> aka SRP) are entirely soft-state, with SRP using bandwidth for AVB traffic >> only when AVB packets exist, and SRP freeing all resources on timeout >> (soft-state). Nevertheless, in the amendment to SRP (802.1Qcc), we are >> adding the capability to configure AVB resources using management, which >> will enable hard-state applications. Automotive applications of AVB are >> using a hard-state approach already. >> >> >> >> Rodney >> >> >> >> >> >> >> >> From: Balázs Varga A <balazs.a.varga@ericsson.com> >> <balazs.a.varga@ericsson.com> >> >> To: "detnet@ietf.org" <detnet@ietf.org> <detnet@ietf.org> >> <detnet@ietf.org>, >> >> Date: 08/31/2015 07:28 AM >> >> Subject: Re: [Detnet] Draft DetNet Charter >> >> Sent by: "detnet" <detnet-bounces@ietf.org> >> <detnet-bounces@ietf.org> >> >> >> >> >> >> >> >> >> >> Hi, >> >> >> >> I agree, release of unused resources is an important task to be >> solved by the WG. >> >> >> >> The situation with some TSN tools can be even worst than what you >> have described below. >> >> E.g. using 802.1Qbv Enhancements for Scheduled Traffic in some >> cases no other traffic (including best-effort) can use the reserved >> bandwidth. >> >> So if You have reserved all the bandwidth but all high priority >> flows are terminated no traffic can cross your link. >> >> Cheers >> >> Bala zs >> >> >> >> From: detnet [mailto:detnet-bounces@ietf.org >> <detnet-bounces@ietf.org>] On Behalf Of Pascal Thubert (pthubert) >> >> Sent: Saturday, August 29, 2015 12:24 PM >> >> To: John Grant >> >> Cc: detnet@ietf.org >> >> Subject: Re: [Detnet] Draft DetNet Charter >> >> >> >> Yes, It is Kind of Easy to reuse bandwidth outgoing the switch if >> there was no incoming packet; what's harder is to discover that the flow is >> terminated. >> >> >> >> This will impact the flow description and or the protocols (e.g. >> Associating a lifetime and a continuous renewal process to the registration) >> >> >> >> Point taken! I agree that this does not impact the charter, though. >> >> >> >> Cheers, >> >> >> >> Pascal >> >> >> >> >> >> Pascal >> >> >> >> Le 29 août 2015 à 12:11, John Grant <j@ninetiles.com> >> <j@ninetiles.com> a écrit : >> >> >> >> On 28 Aug 2015, at 23:15, Grossman, Ethan A. wrote: >> >> >> >> >> >> Hi Folks, >> >> I think the draft charter looks really good, and hits the right >> points. I have a question about this phrase: >> >> >> >> "...and 2) release/reuse the resources when they are no more >> required..." >> >> >> >> One of the concerns about AVB/TSN (and "reserved bandwidth" >> schemes in general) that I heard from our IT guys, in the context of a >> corporate network, was that "once users reserved bandwidth for the streams >> they wanted, when they were "done" they would never get around to tearing >> the streams down, and so that bandwidth would remain unusable by others on >> the network". >> >> >> >> [snip] >> >> >> >> >> >> I suppose such "stale" reserved bandwidth would prevent others >> from reserving that bandwidth, >> >> >> >> Exactly -- I think that's what they're referring to; you could >> finish up with a link on which all the bandwidth is reserved but none is >> used, in which case 100% of the link is available for best-effort traffic >> but no new time-sensitive flows can use it. >> >> >> >> There's always a problem that folks may reserve resources they >> aren't using, which could involve actual traffic as well as reservations, >> e.g. sending video to a screen when no-one's watching it. >> >> >> >> John Grant >> >> Nine Tiles, Cambridge, England >> >> +44 1223 862599 and +44 1223 511455 >> >> http://www.ninetiles.com >> >> >> >> _______________________________________________ >> >> detnet mailing list >> >> detnet@ietf.org >> >> >> https://www.ietf.org/mailman/listinfo/detnet_______________________________________________ >> >> detnet mailing list >> >> detnet@ietf.org >> >> >> https://www.ietf.org/mailman/listinfo/detnet_______________________________________________ >> >> detnet mailing list >> >> detnet@ietf.org >> >> https://www.ietf.org/mailman/listinfo/detnet >> >> >> >> >> >> -- >> >> This message has been scanned for viruses and >> >> dangerous content by MailScanner, and is >> >> believed to be clean. >> >> >> >> _______________________________________________ >> >> detnet mailing list >> >> detnet@ietf.org >> >> https://www.ietf.org/mailman/listinfo/detnet >> > >> > >> > -- >> > This message has been scanned for viruses and >> > dangerous content by MailScanner, and is >> > believed to be clean. >> > _______________________________________________ >> > detnet mailing list >> > detnet@ietf.org >> > https://www.ietf.org/mailman/listinfo/detnet >> > >> > >> > >> > >> > -- >> > DIEGO DUJOVNE >> > Académico Escuela de Ingeniería en Informática y Telecomunicaciones >> > Facultad de Ingeniería UDP >> > www.ingenieria.udp.cl >> > (56 2) 676 8125 >> > >> > -- >> > This message has been scanned for viruses and >> > dangerous content by MailScanner, and is >> > believed to be clean. >> > >> > _______________________________________________ >> > detnet mailing list >> > detnet@ietf.org >> > https://www.ietf.org/mailman/listinfo/detnet >> >> >> >> >> -- >> This message has been scanned for viruses and >> dangerous content by *MailScanner* <http://www.mailscanner.info/>, and >> is >> believed to be clean. >> > > > > -- > DIEGO DUJOVNE > Académico Escuela de Ingeniería en Informática y Telecomunicaciones > Facultad de Ingeniería UDP > www.ingenieria.udp.cl > (56 2) 676 8125 > > _______________________________________________ > detnet mailing list > detnet@ietf.org > https://www.ietf.org/mailman/listinfo/detnet > >
- [Detnet] Draft DetNet Charter Grossman, Ethan A.
- Re: [Detnet] Draft DetNet Charter Lou Berger
- Re: [Detnet] Draft DetNet Charter John Grant
- Re: [Detnet] Draft DetNet Charter Pascal Thubert (pthubert)
- Re: [Detnet] Draft DetNet Charter Balázs Varga A
- Re: [Detnet] Draft DetNet Charter Rodney Cummings
- Re: [Detnet] Draft DetNet Charter Pat (Patricia) Thaler
- Re: [Detnet] Draft DetNet Charter Pat (Patricia) Thaler
- Re: [Detnet] Draft DetNet Charter Rodney Cummings
- Re: [Detnet] Draft DetNet Charter S.V.R.Anand
- Re: [Detnet] Draft DetNet Charter Prof. Diego Dujovne
- Re: [Detnet] Draft DetNet Charter S.V.R.Anand
- Re: [Detnet] Draft DetNet Charter Prof. Diego Dujovne
- Re: [Detnet] Draft DetNet Charter Thomas Watteyne
- Re: [Detnet] Draft DetNet Charter S.V.R.Anand
- Re: [Detnet] Draft DetNet Charter Pat (Patricia) Thaler
- Re: [Detnet] Draft DetNet Charter Pascal Thubert (pthubert)
- [Detnet] Discussing WG topics (Was Re: Draft DetN… Lou Berger
- Re: [Detnet] Draft DetNet Charter Norman Finn (nfinn)
- Re: [Detnet] Draft DetNet Charter Norman Finn (nfinn)
- Re: [Detnet] Discussing WG topics (Was Re: Draft … Pat (Patricia) Thaler