Re: [Detnet] Traffic description in DetNet flow info model

Balázs Varga A <balazs.a.varga@ericsson.com> Tue, 25 April 2017 08:24 UTC

Return-Path: <balazs.a.varga@ericsson.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4AA68131A97 for <detnet@ietfa.amsl.com>; Tue, 25 Apr 2017 01:24:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.219
X-Spam-Level:
X-Spam-Status: No, score=-4.219 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3TIwiYWCWs8e for <detnet@ietfa.amsl.com>; Tue, 25 Apr 2017 01:23:59 -0700 (PDT)
Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 71517131AA7 for <detnet@ietf.org>; Tue, 25 Apr 2017 01:23:46 -0700 (PDT)
X-AuditID: c1b4fb25-2b64e98000004efc-31-58ff07906b1c
Received: from ESESSHC007.ericsson.se (Unknown_Domain [153.88.183.39]) by (Symantec Mail Security) with SMTP id 2D.91.20220.0970FF85; Tue, 25 Apr 2017 10:23:44 +0200 (CEST)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (153.88.183.145) by oa.msg.ericsson.com (153.88.183.39) with Microsoft SMTP Server (TLS) id 14.3.339.0; Tue, 25 Apr 2017 10:20:58 +0200
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.onmicrosoft.com; s=selector1-ericsson-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=acavIU9N7og80jRjZ1xtcebIQvGi0mlviMyP3UyrhsQ=; b=YxR0rqvyQjFAR6NIfrTlEyO09p0/dAaid63PoxOh5Qp9UeT8Bhhz4rj4FAXILeE3RuNjYV1E/70WMfpNMMlCQi/OwPMg/rCBbDJW/GsTyTJVvys20eDysWR/ioejUSY+PwXwnxobKMy+nBrHYft+WdNNAKS0XBdfCtEsmBDudzo=
Received: from DBXPR07MB128.eurprd07.prod.outlook.com (10.242.138.156) by DBXPR07MB125.eurprd07.prod.outlook.com (10.242.138.151) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1061.6; Tue, 25 Apr 2017 08:20:59 +0000
Received: from DBXPR07MB128.eurprd07.prod.outlook.com ([169.254.3.178]) by DBXPR07MB128.eurprd07.prod.outlook.com ([169.254.3.178]) with mapi id 15.01.1061.010; Tue, 25 Apr 2017 08:20:57 +0000
From: Balázs Varga A <balazs.a.varga@ericsson.com>
To: John Grant <j@ninetiles.com>, DetNet WG <detnet@ietf.org>
Thread-Topic: [Detnet] Traffic description in DetNet flow info model
Thread-Index: AdK5qSSYqSHwGD/BTl6GOqTnuhSZHwADx6cAAC54fgAADhBrAAC8F69A
Date: Tue, 25 Apr 2017 08:20:57 +0000
Message-ID: <DBXPR07MB128D53355B533A8B2EE651AAC1E0@DBXPR07MB128.eurprd07.prod.outlook.com>
References: <E78F7186ADD5404AB48E27F02660CA07806C9BDC@dggemm508-mbs.china.huawei.com> <3B18D368-5822-4007-88F8-A02C875D7BAE@ninetiles.com> <E78F7186ADD5404AB48E27F02660CA07806C9D61@dggemm508-mbs.china.huawei.com> <FBD34893-B24C-4EAF-B805-D5E10F8B9618@ninetiles.com>
In-Reply-To: <FBD34893-B24C-4EAF-B805-D5E10F8B9618@ninetiles.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: ninetiles.com; dkim=none (message not signed) header.d=none; ninetiles.com; dmarc=none action=none header.from=ericsson.com;
x-originating-ip: [195.50.183.210]
x-microsoft-exchange-diagnostics: 1; DBXPR07MB125; 7:+NCLb843bad62faS+nOyteK/hz6XeblX47G2IE8pzfGkY1nEr1NYuzE/rhvBAmsmWUlkk5mnuBExKX5iLnmUTT4YlCRcb1cFRbMSzgS951dBndLPmUZFmMXLeZ+nabX7BEubm5CWlAjQtXhvbTSP5f8dcC4VnTC1mEa4g31yYcb/nJBQDa17gOd9Ee7ndpmw6zi7aBrV3t7QQUQZGUkD0naB5goge94QMr9BitO8HSS0y2Rar5m1g0jIxfMAuTqOJbdDcgJ/UXh5748MWDLDG9nCGm7ptLxx3B7/gZweNbU8p/+Id+Ez+InehQPE+M/Hz3AH4x9H0NFOJGq/RzWL3w==
x-ms-office365-filtering-correlation-id: a229aae9-292c-4ee1-4dee-08d48bb3ffc9
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254075)(201703131423075)(201703031133081); SRVR:DBXPR07MB125;
x-microsoft-antispam-prvs: <DBXPR07MB12581EDE9C09FE9F6CF2A46AC1E0@DBXPR07MB125.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(278428928389397)(21748063052155);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(8121501046)(5005006)(93006095)(93001095)(3002001)(10201501046)(6041248)(20161123562025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123558100)(20161123564025)(20161123555025)(20161123560025)(6072148); SRVR:DBXPR07MB125; BCL:0; PCL:0; RULEID:; SRVR:DBXPR07MB125;
x-forefront-prvs: 0288CD37D9
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(39450400003)(39840400002)(39850400002)(39400400002)(39410400002)(377454003)(24454002)(85664002)(57704003)(53754006)(3280700002)(3846002)(102836003)(790700001)(6116002)(7736002)(38730400002)(53386004)(2906002)(3660700001)(7906003)(8936002)(9326002)(7696004)(74316002)(229853002)(8676002)(81166006)(2900100001)(19609705001)(345774005)(5660300001)(2950100002)(53936002)(6246003)(966004)(99286003)(93886004)(9686003)(33656002)(6306002)(54896002)(236005)(189998001)(76176999)(50986999)(25786009)(54356999)(66066001)(53546009)(122556002)(86362001)(606005)(55016002)(6506006)(6436002)(781001); DIR:OUT; SFP:1101; SCL:1; SRVR:DBXPR07MB125; H:DBXPR07MB128.eurprd07.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_DBXPR07MB128D53355B533A8B2EE651AAC1E0DBXPR07MB128eurprd_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Apr 2017 08:20:57.1262 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBXPR07MB125
X-OriginatorOrg: ericsson.com
X-Brightmail-Tracker: H4sIAAAAAAAAA02SfUhTYRTGee+9266jwdvUPNgMG6ikucpKDDQaZUgZKUgsIXLqRZdz2u4c WUSrjHSlTXOShjlT+zJQwtLADxoKOqUkS9IsKif5FaZ9WCoz766B//3O85xzOM/LS5PSeoEv rdEZGL1OrZULxVS5qjko1CJaVm0fd2yNWJy7TUVUmR6S+4iY2tq/RIwlv5uKIxLFkamMVmNk 9Nv2JonTawqLRNnPBtAZc0myCd1tRmbkQQPeBQN1y4QZiWkpbkDg+HhFxBfdCP48fSDgCgoX kjBb1bbqlBHgXJoU8kUngmbbZYJbJsTR8CP/s5BjLxwFeT1Nbt0T74exkSGC1w/A1fwy0ozo FT4IvyYTOJnCAVBfZBFxLMGJUDjTRfL7bxAw1phHcYYHVsLbFqu7CeENMO947N5JYh8YdlYR fCAMta2vSJ69YWLU5Y6AsBVBk21htUkOjRYr4gzA10joqZxfnTgCHb/7RTyfhzlnPsVdClgD M8WxvHwYml46SH72OwG2ZpOQN2QwPPtllZcEUGe/wKf3hQ9vChDPMhgfaRPwV2dBV0crsqCg ijUhKtZYFe7XWA895U6K1xXwzloq5DkE7lVPkTyHwi2XnVqr25DoEfJmGTY5My1sp4LRa1JY Nkun0DGGJ2jlC71oWgxoQQPTSjvCNJKvk3yiXCqpQG1kczPtCGhS7iV5zUmSVHXuWUafdVKf o2VYO9pIU3IfibK9XyXFaWoDk8Ew2Yz+v0vQHr4mpDzkb3if02CZi8oL7DX6x7aaRoyb4vwm /IaXCnTHhpKifsrjsxmj51TpiWKZwdh3s1NWHl+dEbKnN/pr16k4r8H7/heLBiNLyoLL0MLx LUGuyIijlapzPiljs/39xWE1TufuuKiE03faM6RTztFpySVFd3ggFV6pfS6s7vt2fbOcYtPV O4JJPav+B6AQneU+AwAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/6Un21ql3w5RHJZZoUj1DXvDAtDY>
Subject: Re: [Detnet] Traffic description in DetNet flow info model
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Apr 2017 08:24:07 -0000

Hi,

Good discussion.

As a general comment I think applications requiring DetNet transport should be UDP
based and not TCP (as retransmission would violate the transport parameters the
DetNet flow requires).

I think what Yiyong is looking for whether we can make better resource reservation
for DetNet flow being VBR than reserving for peak rate? With CBR we are on the safe
side, no doubt. However for example not all TSN queuing method (e.g., time gated
queues, etc.) can ensure that unused resources can be used by non-DetNet traffic.

Additionally, would be good to have feedback on how much applications would "like"
the shaping of DetNet flows. Shaping could help for better resource utilization,
but is it a good idea for DetNet?

I would like to ask the authors of the use-cases to comment what type of traffic is
used in their use-cases (CBR, VBR, something else). Maybe that would help to sort
this out.

Cheers
Bala'zs

From: detnet [mailto:detnet-bounces@ietf.org] On Behalf Of John Grant
Sent: 2017. április 21. 16:20
To: DetNet WG <detnet@ietf.org>
Subject: Re: [Detnet] Traffic description in DetNet flow info model

TCP isn't really intended for use with the kind of flows that would use CBR or VBR.

The main facilities provided by TCP are rate control and retransmission of lost packets. When transferring a block of data (such as, say, an image or a pre-recorded video or a PDF) over a best-effort service, these allow the transfer to make best use of what the network provides. But if the network service guarantees a particular data rate you don't need the kind of rate control that TCP does, and if the network hardly ever loses a packet you don't need frequent acknowledgements.

For instance, if you are sending live audio with a sampling rate of 48k samples per second, and packing 12 samples in a packet, you need to send a packet every 250 microseconds, so you need CBR with a rate of 4000 packets (of a certain size) per second.

The VBR service that was defined for ATM was intended for sending compressed video at constant quality, so that "busy" content needs more bits per frame than content with less detail. The peak rate is the bit rate for the "busiest" content, and the average bit rate was also signalled. I think the idea was that you could "overbook" a link by routing flows whose peak rates add up to more than the link capacity, in the expectation that they wouldn't all be demanding the peak rate at the same time. I think something similar is done with digital television multiplexes.

Note that with CBR (and VBR) the rate is determined by the application's requirements, whereas with TCP it is determined by what the best-effort service delivers.

John Grant
Nine Tiles, Cambridge, England
+44 1223 862599 and +44 1223 511455
http://www.ninetiles.com

On 21 Apr 2017, at 08:37, zhayiyong wrote:


Hi John,

Thank you for the reply. I agree that make reservation on peak rate is a simple solution. But the "peak rate" here depends on the observation interval times max packets per interval, which means for same flow, different interval leads to different peak rate. Below is a little testbed we built to test the burstness feature of TCP flow.
For the same 25Mbps TCP flow with no shaping:

<image007.jpg>
1s observation interval, peak rate 450Mbps.

<image008.jpg>
100ms observation interval, peak rate 900Mbps.

<image009.jpg>
10ms observation interval, peak rate 1Gbps, which is the link speed/physical port speed.

And further test shows that, 8 of these TCP flows to a 1Gbps port cause packet loss. So my question is how can we make reservation based on "peak rate"? E.g., for the same flow, if we take 1s observation interval, we can serve 2 flows. But for 10ms observation interval, only 1 flow, which does not make sense. And it is hard to say long observation interval can guarantee delay and loss, since buffer in router is only milliseconds level.

Another thing is how to guarantee the source with max packets within the interval. If shaping is necessary, what kind of parameters are needed.

Cheers,
Yiyong
From: detnet [mailto:detnet-bounces@ietf.org] On Behalf Of John Grant
Sent: Thursday, April 20, 2017 5:27 PM
To: DetNet WG
Subject: Re: [Detnet] Traffic description in DetNet flow info model

As pointed out in 4.1.2, for a VBR flow you have to make a reservation for the peak rate, and there isn't any reason to do anything other than use the service that is already defined for CBR. With circuit-switched systems any part of the reservation that wasn't used was wasted, but in packet-based systems it can be used for best-effort traffic, as stated in 4.3.2.

Regarding synchronous flows, the first paragraph of 4.3.2 explains that if the reservations on incoming and outgoing links are time-aligned then the latency, and hence the amount of buffer space required, can be minimised. The details mechanism for achieving that would, I think, be out of scope for an architecture document.

For a description of a system that implements synchronous flows, see clause 5 of ETSI GR NGP 003, available from the "specifications" tab at http://www.etsi.org/technologies-clusters/technologies/next-generation-protocols

John Grant
Nine Tiles, Cambridge, England
+44 1223 862599 and +44 1223 511455
http://www.ninetiles.com<http://www.ninetiles.com/>
On 20 Apr 2017, at 08:38, zhayiyong wrote:



Hi All,

Recently we have some discussion among authors of the two flow info model draft. The DetNet flow info model should provide some common concepts and description of the flow. One part is traffic specification of the flow. Here is something not clear, is DetNet dealing with VBR flows and what attributes are needed? And how to deal with VBR flow, for source guarantee purpose, do we need to define shaping parameters?

In architecture draft, section 4.1.2, "The traffic characteristics of an App-flow can be CBR (constant bit rate) or VBR (variable bit rate)". In section 4.3.2, mentions synchronous flow and asynchronous flow, but no details of that.
In use case draft, for some cases such as industrial and BAS, it can assumes that the traffic is periodic with constant rate. For cases such as Cellular Radio and M2M, there is usually no assumption on the traffic. E.g., CoMP traffic is between two eNBs, it is hard to say the flow is constant rate.

Cheers,
Yiyong