Re: [Detnet] Fwd: review DetNet OAM framework draft

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Tue, 11 May 2021 16:47 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 731DE3A1DF7; Tue, 11 May 2021 09:47:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.895
X-Spam-Level:
X-Spam-Status: No, score=-6.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, GB_SUMOF=5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=hrFFWsOK; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=l6GtvvY/
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2RhpkJUk8aX9; Tue, 11 May 2021 09:47:29 -0700 (PDT)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CD30C3A1DF6; Tue, 11 May 2021 09:47:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=95720; q=dns/txt; s=iport; t=1620751648; x=1621961248; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=zf/swtl/Ch5ZV8sm/Je4iQTTGh3/WKM6DsjziBZ2hoA=; b=hrFFWsOKBHKEIUMYgfFtURn0YRm8x1/drXDmcPI9mVe7DtXc726T+mu5 zCOh63Tuy3p989fqtIBAOw7hMKPBZnzi3i5yWtBz3OFx5azGeKXuVEtRv xpO/g1wUdn4JClTb/u0IN3syTvQAbG1Wjx1HWHWwmjW/2UAgr+PxnEywH Y=;
IronPort-PHdr: A9a23:jLarQBVC5H9urXfRgIRKfcXVqHXV8K3gAWYlg6HPw5pBd62i+9LpO0mMrflujVqcW4Ld5roEjufNqKnvVCQG5orJq3ENdpFAFnpnwcUblgAtGoiJXEv8KvO5YCkzHcAEX1hgrDm3NEFPE5P4YFvf6nS58T8VHED5Mgx4buT4E4LflYK5zee3rpbSeA5PwjG6ZOAaEQ==
IronPort-HdrOrdr: A9a23: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
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: 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
X-IronPort-AV: E=Sophos;i="5.82,291,1613433600"; d="scan'208,217";a="891717594"
Received: from alln-core-6.cisco.com ([173.36.13.139]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 11 May 2021 16:47:26 +0000
Received: from mail.cisco.com (xbe-rcd-007.cisco.com [173.37.102.22]) by alln-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id 14BGlQsZ003275 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Tue, 11 May 2021 16:47:26 GMT
Received: from xfe-rcd-003.cisco.com (173.37.227.251) by xbe-rcd-007.cisco.com (173.37.102.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3; Tue, 11 May 2021 11:47:26 -0500
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by xfe-rcd-003.cisco.com (173.37.227.251) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.2.792.3; Tue, 11 May 2021 11:47:25 -0500
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Tue, 11 May 2021 12:47:25 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=mDOzbd+rZqzW+cyMZHVxo46sgn7LqqX7D6L7KO0Z2VGfCddd0DhiV5s0l6adzSz8mx86C18Kc3tr7v5Rj9WJrXmiSh+67Me5gmuuA+ptayh6xEs+PavBoS0ENZTXUDsLlPQdbBHeLpTZHQioKQjGImRb+v3GKnSiDNlIAEQZzWbBulOS1P8bDNZXaRia8OjobmK+8AquNuB7h/XFzhU2WVZbhlC5kvm4rYw6GlEY6HkDpH1/vwfloPIWshDv21/WhXef1OatEuJl4dNT1WCxUP6h9iU6LBOfnMnD6jIBiL8MPr6gm17N8U7i3kb62SlHW/YAoERs6jsKvYq9GW8uRw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zf/swtl/Ch5ZV8sm/Je4iQTTGh3/WKM6DsjziBZ2hoA=; b=ML9JrcMdsUuRfBnsvj6wTvvovt3g/T5l8ZoDM8Iyk2n77AWijoOnBFBvUf4RrWjYe5iMxoznMAKkk+TQYql5hGB44dhHebMdUN3g7o9yo2lYTeIYAPugWxDCF5L7u6Uj0x36R1CRv3CxbmKf7fnaBWSmVuwMJKIHgsBf+Wu6VGgroXgyX7sjOdssL+gDg53mOpoy+nW+PAehTQebDpC/lgwz03PU8WrODd7/FHwwDY+NhFIMlUKxei/WWf0CxOF4XL4j4WqrSGKvjsMbECYQK615fR+P3scGVRe8xHLLvnE5Po0k9pSOr+0fru0yWDaKIp0KzCtEYiDyARWI5JmOcA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zf/swtl/Ch5ZV8sm/Je4iQTTGh3/WKM6DsjziBZ2hoA=; b=l6GtvvY/kNX29WiPS6QT6a1G/UnT+uRqwmRmsn61DEOwkC3B6ZjSRW3QI7o2tCbyjnwaHDa23DyEitjvcjls8jb7C+bqZuF/nZ+CFIuEqQ4dB0XM/k0W2/N6fZFfrteX3n9TZcHDtl4Y5uEMaUEufsF3doQ03HUK+c52fwOk454=
Received: from CO1PR11MB4881.namprd11.prod.outlook.com (2603:10b6:303:91::20) by MWHPR11MB1776.namprd11.prod.outlook.com (2603:10b6:300:110::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4108.27; Tue, 11 May 2021 16:47:23 +0000
Received: from CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::cd01:ffc9:6592:b1d5]) by CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::cd01:ffc9:6592:b1d5%6]) with mapi id 15.20.4108.031; Tue, 11 May 2021 16:47:23 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>, DetNet WG <detnet@ietf.org>, DetNet Chairs <detnet-chairs@ietf.org>
Thread-Topic: [Detnet] Fwd: review DetNet OAM framework draft
Thread-Index: Adc8fXs1emXJ6R6aQlWuJ6hcKk0iFAASE9GgAmhXXFcABoAeIA==
Date: Tue, 11 May 2021 16:46:56 +0000
Deferred-Delivery: Tue, 11 May 2021 16:46:35 +0000
Message-ID: <CO1PR11MB4881E9A0CD5E2D3B5EAFC560D8539@CO1PR11MB4881.namprd11.prod.outlook.com>
References: <AM9PR07MB7204DF42315052CE9C620692F2409@AM9PR07MB7204.eurprd07.prod.outlook.com> <CO1PR11MB488199682C35E517C0E2A444D85F9@CO1PR11MB4881.namprd11.prod.outlook.com> <CA+RyBmUsO3Qr9SwJELyd7JnkwWPnhCaji2X8WVHgVoD=JYuoNA@mail.gmail.com> <CA+RyBmUVq8KyL4gC+v_U9YKgx+vawueYukj2D0StD1eXWoUTGQ@mail.gmail.com>
In-Reply-To: <CA+RyBmUVq8KyL4gC+v_U9YKgx+vawueYukj2D0StD1eXWoUTGQ@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [2a01:cb1d:4ec:2200:e88d:478b:a71a:da93]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: d8e741c0-d108-4e78-a77a-08d9149c73bd
x-ms-traffictypediagnostic: MWHPR11MB1776:
x-microsoft-antispam-prvs: <MWHPR11MB1776798A50EBB364E5AE73ABD8539@MWHPR11MB1776.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB4881.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(346002)(39860400002)(136003)(376002)(396003)(366004)(53546011)(8936002)(6666004)(9686003)(55016002)(122000001)(8676002)(76116006)(64756008)(66446008)(66476007)(166002)(966005)(66946007)(52536014)(83380400001)(86362001)(33656002)(66556008)(30864003)(71200400001)(186003)(7696005)(2906002)(5660300002)(66574015)(316002)(38100700002)(110136005)(478600001)(16799955002)(6506007)(579004)(559001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: fZ1Oqnj0xhp2ULiydjMeFhORWHG9yuISAhIS89GP5833nhrSUvgk83Hd0TfMsfCGz+BhhwgXR+aVa8DgTMngs4yQZf361HoxvQ7su7rlr2EnTb5/ZGxM1EZgDnw7ndupv3Fl5XWWkrfimI4KBQz4Avua+dVabm/CWlgK7yzAhuZU5X3ZEo5Dh7Yrw5uS6hh9ZpjpNuWHzfoYX64OFqXCpTdSI33smB8uiQiMXfgdeEXUboHIuz7VyEV45TRCeo5fa8LxFjb4Bx1fACNV8b1cxfAwy4+S6ejwJb9PJREm8/cPYkrFcfNZDCjDEgCVbdoUoxGA4vFHUg/GdXaIg/zAVjORZqdlubtayKXYuNCGGZ+nb1FKTKGUKs372zV4SJcAu78fAfOZZd2KtfFdJD6sJ8E3XnxfKqCL6RPLRwqXxZR4IjUkQ1wYdCJTYer8FHA+lajwGDSGgsvlyAftSP5OK/VtjHIjfNifQ32h+nhHlkNUNtoPwR8V6zcsZibdqRluAk0DDvCkc5RWhyyaTS1b+eDg/V5zG5fTVFqkOABSJAjqcBJ5fkBG7du717erayWcSujt+cvj8YxdyZPKofAsc91pz2HybQYbp3hGXQPxZUfcfPj+AMwNvsM6cRAOiQUgchmnwrYXb217fdCFLYP9RrQsLbX1J1urLWJiATXzXMx6Z5DC+3tu/KK6o4RT0J5bCOIapag+iqL3K2unrH90Kvqvc8uYdRS1dkJ25OAt+visaOTfa+D2FEF3wWD0bTE3d0zy9eK+aeLU7t+y4PyBY3s5ugvK7vzQJfVwHL8gq+a+l+PkX9N6HRyKV0gTGkEtOtfVg/gFvzoEsrSS6+/rqy4yjrkoqz8Wv98/pR1Ryporf6tubBPkN1gzJaU7Hy0F4ANXG4lGPmRYtAOWsRA+u2Wput2YcsKRsWuzdZrs0zK0YKC+sb278/bjmyCS5sLs4xkO0DnGGiQPo2/nMdhmWqdQ+c6JSlrvZF6Y6ZT4saZE//9XobT+syFtlLjDm4jDk/KoLdL6DM/sTGKZaEJTHzkK+dm4IrUab9E78UCCKWFKbpLU1TyMNmXsO6i0cwY49dAlYPSsyWp668UVX/IJhuD3GrDLuiPN/JnjoQje+kY/jPBTS7WohQBlPhvRb7/4QddmwFGXb9HaS4PzXmhbzIMWHM/TlwsI32obeceBEY1LFwve0u2qNACWCPcQP6yVUhieiH/A2Vp5hwCn0La8SHS27Bn16aqBcetlyEZVhWsoGh6sIde1HMqWGoboxDbccEieAjX/NuimMI2euLCoy/7kU00Rcv1mCvdeS7hpfLuDjLsgcJxZolWBY3nwR01R70SxPLXFEqtnkZJtW/xQAdCRYRFT+elMDspyV9t/THko0FJ52XBq4nztBZO7yczL
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_CO1PR11MB4881E9A0CD5E2D3B5EAFC560D8539CO1PR11MB4881namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4881.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d8e741c0-d108-4e78-a77a-08d9149c73bd
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 May 2021 16:47:23.7474 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: VbHUWpyZnUl0z7Y7mpDk4zPIPsFR2TR2y3P20V3yWiws0QeVv3TF3tAp2huXXwmGy5DDiF0p9IyvGdjrUv1JZA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR11MB1776
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.22, xbe-rcd-007.cisco.com
X-Outbound-Node: alln-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/3Rjtv1z4_Id506FILti8rV4rUa8>
Subject: Re: [Detnet] Fwd: review DetNet OAM framework draft
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 May 2021 16:47:34 -0000

Hello Greg

Please see below

On Thu, Apr 29, 2021 at 6:07 AM Pascal Thubert (pthubert) <pthubert@cisco.com<mailto:pthubert@cisco.com>> wrote:
Dear authors and all

I do support this document but do not see that in its present shape it is ready for WGLC. Please find some review comments below.

- Sadly RFC 8655 does not define either “latency” or “delay”. Reading this draft, I now see it as an oversight. I’d suggest that we define them in the terminology section. it is my sense that RFC 8655 uses “delay”  with the meaning of incremental flight duration, and uses “latency” for the total time end-to-end time across the network, IOW, minimal_latency + delay <= bounded_latency.
GIM>> Thank you, Pascal, for bringing this to the discussion. I agree with you and I strongly believe that it is utterly important to set the dictionary so that we can discuss technology and use cases based on the common understanding of terms. I like your suggestion to provide definitions of "latency" and "delay" in the Terminology section. Before going into definitions, I'd like us to define the scope of these terms. Would it be for the draft and all DetNet OAM documents or it can serve as the clarification of the terminology used in DetNet in general since RFC 8655?
About the definitions. Do you think that the interpretation of "delay" is close to the definition of the residence time (RFC 8169):
   Residence time is the sum of the difference between
   the time of receipt at an ingress interface and the time of
   transmission from an egress interface for each node along the network
   path from an ingress node to an egress node.
Also, in RFC 8169 we've assumed that the e2e delay, i.e., e2e latency consists of two parts - fixed propagation delay determined by the link speed and variable portion, i.e., residence time. In your opinion, could this model be applied to DetNet?


PT> Well the residence time seems like the latency of the network transit, and I see the delay as the difference between the best possible latency and the actual latency experienced by a packet. Like when I say, I’ve been delayed by 30mn in a trip that takes 5 hours when all the lights are green so the residence time in my car (aka latency) is 5H30mn. The DetNet architecture seems consistent with that interpretation, at least as far as I intended to write and can read the language.







- “It is critical for the

      quality of information obtained using an active method that

      generated test packets are in-band with the monitored data flow.

”. this duplicates text in 3.3 and does not belong in a terminology. Remove?
GIM>> I agree with you. Text in Section 3.3 is stronger but seems out of place in that section. I think moving it up into Section 3 might be appropriate. What do you think?





PT> Cool





- “                                                                                                         OAM represents the

   essential elements of the network operation and necessary for OAM

   resources that need to be accounted for to maintain the network

   operational.

” does not parse too well
GIM>> I propose the following update:
 OLD TEXT:
   OAM represents the
   essential elements of the network operation and necessary for OAM
   resources that need to be accounted for to maintain the network
   operational.
NEW TEXT:
   Because OAM is an
   essential element of the network operation,  resources, necessary for
   OAM, need to be accounted for in addition to DetNet flows.

PT> great




- “information about the state of the network being

   collected

” is being? Maybe remove that text ? it seems to repeat the first sentence of the paragraph.
GIM>> The purpose of the sentence is in the final part "... and sent to the controller".Would the following update make it better:
OLD TEXT:
   In either way, information about the state of the network being
   collected and sent to the controller.
NEW TEXT:
   In either way, information is collected and sent to the controller.

PT> I see now





- “   Also, we can characterize methods of transporting OAM information

   relative to the path of data.  For instance, OAM information may be

   transported out-of-band or in-band with the data flow.

” this deserves its own subsection with some more explanation and possibly some references to relevant IETF work
GIM>>  Thank you for highlighting this question. I propose adding references to work at the IPPM WG. Here's the updated text:
NEW TEXT:
   Also, we can characterize methods of transporting OAM information
   relative to the path of data.  For instance, OAM information may be
   transported in-band or out-of-band with the data flow.  In case of
   the former, the telemetry information uses resources allocated for
   the monitored DetNet flow.  If an in-band method of transporting
   telemetry is used, the amount of generated information needs to be
   carefully analyzed, and additional resources must be reserved.
   [I-D.ietf-ippm-ioam-data] defines the in-band transport mechanism
   where telemetry information is collected in the data packet on which
   information is generated.  Two tracing methods are described - end-
   to-end, i.e., from the ingress and egress nodes, and hop-by-hop,
   i.e., like end-to-end with additional information from transit nodes.
   [I-D.ietf-ippm-ioam-direct-export] and
   [I-D.mirsky-ippm-hybrid-two-step] are examples of out-of-band
   telemetry transport.  In the former case, information is transported
   by each node traversed by the data packet of the monitored DetNet
   flow in a specially constructed packet.  In the latter, information
   is collected in a sequence of follow-up packets that traverse the
   same path as the data packet of the monitored DetNet flow.  In both
   methods, transport of the telemetry can avoid using resources
   allocated for the DetNet domain.

PT> This is where RAW needs a third method, similar to the latter but that collects the information on the reverse path to help the PSE at ingress make its decision




“   Similarly, the destination does not receive packets from different

   flows through its interface.

” sorry I do not get the intended meaning
GIM>> We're pointing to the distinction between the Continuity Check (CC) and Connectivity Verification (CV). The former only verifies that a path between two systems exists, while the latter, in addition to that path, verifies that the system does not receive packets from any flow other than one being monitored. Associated with the CV, is a misconnection error state and conditions of raising and clearing it. I propose removing the paragraph with that sentence and update the first paragraph as follows:
OLD TEXT:
   In addition to the Continuity Check, DetNet solutions have to verify
   the connectivity.  This verification considers additional
   constraints, i.e., the absence of misconnection.
NEW TEXT:
   In addition to the Continuity Check, DetNet solutions have to verify
   the connectivity.  This verification considers additional
   constraints, i.e., the absence of misconnection.  The misconnection
   error state is entered after several consecutive test packets from
   other DetNet flows received.  The definition of the conditions of
   entry and exit for misconnection error state is outside the scope of
   this document.

PT> WFM




- section 3.3 –“It is worth noting that the test and data packets MUST follow the

   same path, i.e., the connectivity verification has to be conducted

   in-band without impacting the data traffic.”

 there appears to be a tension between the bandwidth that is reserved for the flow and the extra bandwidth that the OAM needs .

Do we need to know in advance how much OAM there will be? Must that be included in the reservation?
GIM>> Yes, the impact of OAM, whether active or hybrid, must be evaluated and accounted for when reserving resources in the DetNet domain. The update above is intended to clarify that:
   Because OAM is an
   essential element of the network operation,  resources, necessary for
   OAM, need to be accounted for in addition to DetNet flows.

PT> I hoped you would clarify that the DetNet controller must be aware of the amount of resources that OAM needs, and would reserve those resources together with those needed for the flow







- section 3.4. What do we do for PREOF?
GIM>> Excellent question, thank you! I think of two updates:

  *   in Section 3.4:
   Also, tracing can be used for the discovery of the Path
   Maximum Transmission Unit or location of elements of
   PREOF for the particular route in the DetNet domain.

  *   in Section 6:
   DetNet OAM MUST support the discovery of PREOF along a route in
   the given DetNet domain.



PT> Cool. Do you intend to flood the OAM along the PREOF graph? Can you do local assurance, like, whether an individual node that is supposed to replicate effectively does so, without impacting the end to end flow?





- “The network has isolated and identified the cause of the fault.”

Again I fail to understand the intention.
GIM>> Indeed. How about we change this text as the following:
OLD TEXT:
   The network has isolated and identified the cause of the fault.  For
   instance, the replication process behaves not as expected to a
   specific intermediary router.
NEW TEXT:
   An ability to localize the network defect and provide its
   characterization are necessary elements of network operation.

* Fault localization, a process of deducing the location of a network failure
   from a set of observed failure indications, might be achieved, for
   example, by tracing the route of the DetNet flow in which the network
   failure was detected.  Another method of fault localization can
   correlate reports of failures from a set of interleaving sessions
   monitoring path continuity.
* Fault characterization is a process of identifying the root cause
  of the problem.  For instance, misconfiguration or malfunction of
  PREOF elements can be the cause of erroneous packet replication or
  extra packets being flooded in the DetNet domain.


PT> Much clearer and more informative to me, thanks you!





-“                                  One of the advantages of the use of

   AMM in a DetNet domain with the IP data plane is that the marking is

   applied to a data flow, thus ensuring that measured metrics are

   directly applicable to the DetNet flow.

” isn’t this the case for IPPM in general? Isn’t the benefit of AMM more related to conciseness?
GIM>> You are right.  Do you think that the update below makes the text better:
OLD TEXT:
   One of the advantages of the use of   AMM in a DetNet domain with
   the IP data plane is that the marking is   applied to a data flow, thus
   ensuring that measured metrics are   directly applicable to the DetNet
   flow.
NEW TEXT:
   As with all on-path telemetry methods,
   AMM in a DetNet domain with the IP data plane is natively in-band in
   respect to the monitored DetNet flow.  Because the marking is applied
   to a data flow, measured metrics are directly applicable to the
   DetNet flow.  AMM minimizes the additional load on the DetNet domain
   by using nodal collection and computation of performance metrics in
   combination with optionally using out-of-band telemetry collection
   for further network analysis.

PT> cool




- Maybe we should discuss the tension between RFC 8939 and the capability to use separate packets for OAM, since the flow is routed on the 5/6 tuple. Does that mean that only in-situ is feasible with RFC 8939 (ref draft-ietf-ippm-ioam-ipv6-options)?
GIM>> I agree, that the definition of the DetNet IP flow is an important aspect when considering the applicability of IOAM in a DetNet domain. That may be discussed in this document, though, as I think of it, that discussion seems also in place in draft-ietf-detnet-ip-oam <https://datatracker.ietf.org/doc/draft-ietf-detnet-ip-oam/> . What do you think?

PT> I’d like to see some text explaining the problem and the requirement here. It does not hurt to copy paste a bit in the IP OAM draft if that helps the reader of either doc.




Section 4. This section needs more thoughts. For instance there are packets like PTP packets for which it is important to know the transit duration in each hop. Isn’t that true for DetNet as well?
GIM>> We can discuss if and how RFC 8169<https://datatracker.ietf.org/doc/rfc8169/> may be applicable. Perhaps in a new discussion thread.

let’s do that. I wish this doc to be high level but holistic, showing all the aspects and angles and not constrained by the drafts we already have. It is the framework for the present capabilities, but also for the future ones.


Radio links have numerous metrics that can be reported (think RFC 8175), we need to know that information per hop as opposed to per path/circuit. We need to know if the hop does store-and-forward or passthrough – e.g., in the former case using smaller frames / packets / segments / fragments and/or network coding may improve the latency. Maybe we could dump the WG collective mind with a dedicated thread?
GIM>> I agree, a new discussion thread will certainly help. I've been thinking of per node metrics too. I think that to be useful, per node metrics might as well be for the given ordered pair of ingress-egress interfaces. I understand that blows the amount of information we generate and collect, but by doing on-node PM calculations exported will be median, percentiles values. Definetely needs discussion.

PT> we’re in sync




- section 5.2: Is it the intention to include the repair action in OAM work?
GIM>> Thank you for the question. Thinking of it, OAM role is the detection of a performance metric degradation. Restorative actions, in my opinion, are taken by the control or management plane. Since the detection of performance monitoring and SLO are discussed in other sections, the value of Section 5.2 may be not sufficient to keep it in the document. What do you think?

PT> confirming what we said at the call, I think it does not belong. There’s a spectrum of things that can be done based on the OAM information, from simple dashboard and assurance to network automation (ala MPLS TP) to, at the extreme, the  RAW Path selection. In the extreme cases, there’s an SLO for the reaction, so the OAM flow that feeds the PSE becomes time-sensitive as well.



- I’m not sure about requirement 5, 6, 10, 11, and of the use of “excellent” in 16.
GIM>> Let's remove the "excellent" :)
GIM>> The intention of listing OAM functionality in that particular manner as requirements is to provide the check list for the gap analysis and defining extensions. Are you concerned wth the described OAM functions or the manner requirements are expressed?

PT> Yes, items 5, 6, 10, 11 need more discussion. Maybe we can discuss that in yet another thread?

Take care,

Pascal


From: detnet <detnet-bounces@ietf.org<mailto:detnet-bounces@ietf.org>> On Behalf Of Janos Farkas
Sent: jeudi 29 avril 2021 0:28
To: detnet@ietf.org<mailto:detnet@ietf.org>
Subject: [Detnet] review DetNet OAM framework draft

WG,

Please review the DetNet OAM framework draft: https://datatracker.ietf.org/doc/draft-ietf-detnet-oam-framework/.

The authors consider the draft in a pretty good shape, do not see any major piece missing.

WG review and comments would be great in order to develop the draft towards WG Last Call.

Please send your comments to the list before the next informal OAM discussion on May 11 or bring it to the informal meeting: https://ietf.webex.com/ietf/j.php?MTID=m27bb8ee31f025670e4071bfdfcd47432. (More details on the OAM informal meetings: https://mailarchive.ietf.org/arch/msg/detnet/4ik3tI-E3uhOFNaKhpkZiWwyiZc/.)

Regards,
Janos