Re: [Detnet] Role of the transport layer in the DetNet Architecture

"Black, David" <David.Black@dell.com> Fri, 29 July 2022 15:59 UTC

Return-Path: <David.Black@dell.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9C4A2C14F6EB; Fri, 29 Jul 2022 08:59:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.688
X-Spam-Level:
X-Spam-Status: No, score=-7.688 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.582, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tEehEC3v53mJ; Fri, 29 Jul 2022 08:59:42 -0700 (PDT)
Received: from mx0a-00154904.pphosted.com (mx0a-00154904.pphosted.com [148.163.133.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E32A9C14F75F; Fri, 29 Jul 2022 08:59:41 -0700 (PDT)
Received: from pps.filterd (m0170390.ppops.net [127.0.0.1]) by mx0a-00154904.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 26TDFqnD027253; Fri, 29 Jul 2022 11:59:40 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=smtpout1; bh=d/YD2hA6BoH8Vz/NWEHTVOOGbnFidH3WlVmZ+YRcTx8=; b=O/kZsn1oEMAwJaWvuoERjWxuqa0FYyrcElMYdzxbhr27XAoHN49UZHXjcSaJc4yf/6LC QqRomZtNZ7mrFsV3ClHQ5xgdpVU79kBg3ofSo5i7Jpyv01ry3xrAS4KCb+tcY20/ps2y kyYzrBGg1ymHefsJWmzzBV4O1x+2CIeOMH/nU9o/xYQeKWkkLGmZ5Ps2wIRE9rO8IwOo lKv37zQHyeBFrkeaiCbmQDeu+IYT7DgoNfAOa8MqkOYTzAD4yuVfae0i6pd16692p+T7 3XbMXePGgNQrczc/QC6XK6F9xyDkhaXu3lAphvyFHLvl1le740sxrRVwL+NZfr5tIRf3 9g==
Received: from mx0a-00154901.pphosted.com (mx0a-00154901.pphosted.com [67.231.149.39]) by mx0a-00154904.pphosted.com (PPS) with ESMTPS id 3hgc23jrja-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 29 Jul 2022 11:59:40 -0400
Received: from pps.filterd (m0090351.ppops.net [127.0.0.1]) by mx0b-00154901.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 26TFefcM004414; Fri, 29 Jul 2022 11:59:40 -0400
Received: from nam02-dm3-obe.outbound.protection.outlook.com (mail-dm3nam02lp2047.outbound.protection.outlook.com [104.47.56.47]) by mx0b-00154901.pphosted.com (PPS) with ESMTPS id 3hm1kc68sj-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 29 Jul 2022 11:59:40 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QIFT4XBqduYr8luUQ46dWEqEYihGcMSMZbR3Q+EwkkQ4jesg9VNjU0HUyi15XbvaOZqtMyYaBbmILgUlnXJCFf6jsE9RRKEUCwPTbU9yNppUkwiLRlPC/r3SPe02OYCoUK4W7/QuYDNFrQUJo3I3Uw9lOC/l3afWcYVb9sbVDyOtkzZEznav7w1ldCQZpP4rIw+fO4l/XdGixtFyaRRMzmDR1rUf7bk5YkoyJtYfG2kKDt2+vd9NdjceBWyKz3/27hqiBWJ9Bb7rtNKW6OdnMFCOIsCL+LfRfeQL4bjiy4+Tyr467Qf5xW73UeQIDMVe7A10IFTzGE7YWW5hbBHU7A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=d/YD2hA6BoH8Vz/NWEHTVOOGbnFidH3WlVmZ+YRcTx8=; b=mU6VH9L1BdFKiA2GAAhae0SIpecCO4NdQGVGBdQZlPgE2HNzHqiWEp8UKxb0+w+/02RXNO2EYQUiA75hr0pUE46glVC5TOzqA2LRf8/12N1Rh5IU8p7WJ8DNJX6WUAgfK25wJYrsRoy8sgTTO22uNatIeMe/ieCpzHw8bD3jh69hGjZ0Nnif9Gvvu64CVKbqGVHIn21eU272tPUzE09OgevfS9gr+XASuu2X0CIaxZ1YswCWzG8iAIkeLGYPWqjzRs/ANBofNgbbwSeJcsL38mD9SZfUhwuHgwPtH+i6OdnRRTfvX27/0MRYXN8kgpaHCUgJNDfKErQU5A0t/C1AFw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=dell.com; dmarc=pass action=none header.from=dell.com; dkim=pass header.d=dell.com; arc=none
Received: from MN2PR19MB4045.namprd19.prod.outlook.com (2603:10b6:208:1e4::9) by MW4PR19MB6601.namprd19.prod.outlook.com (2603:10b6:303:1e3::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5482.10; Fri, 29 Jul 2022 15:59:35 +0000
Received: from MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::f5c4:c449:dc5b:a0ec]) by MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::f5c4:c449:dc5b:a0ec%7]) with mapi id 15.20.5482.012; Fri, 29 Jul 2022 15:59:35 +0000
From: "Black, David" <David.Black@dell.com>
To: "Pascal Thubert (pthubert)" <pthubert=40cisco.com@dmarc.ietf.org>, DetNet WG <detnet@ietf.org>, "raw@ietf.org" <raw@ietf.org>
CC: Balázs Varga A <balazs.a.varga@ericsson.com>, "Black, David" <David.Black@dell.com>
Thread-Topic: Role of the transport layer in the DetNet Architecture
Thread-Index: AdibP4EOEYL7M004T7WXrlEYlrxaZwAMZiyQAV7qBAAAnBFukA==
Date: Fri, 29 Jul 2022 15:59:35 +0000
Message-ID: <MN2PR19MB404577B4EDBB0BF8AAD16C6A83999@MN2PR19MB4045.namprd19.prod.outlook.com>
References: <CO1PR11MB488196C69858352D34AFB860D88F9@CO1PR11MB4881.namprd11.prod.outlook.com> <MN2PR19MB4045CDD12BC82689E1485312838F9@MN2PR19MB4045.namprd19.prod.outlook.com> <VI1PR07MB5358F5D9B5629D47379E060AAC949@VI1PR07MB5358.eurprd07.prod.outlook.com>
In-Reply-To: <VI1PR07MB5358F5D9B5629D47379E060AAC949@VI1PR07MB5358.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Enabled=true; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SetDate=2022-07-19T13:11:53Z; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Method=Privileged; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Name=Public No Visual Label; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ActionId=3c7cf831-4d14-4ba7-ad60-8cc937ca1b7c; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ContentBits=0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 96abbf2a-af96-44ea-c0d3-08da717b5533
x-ms-traffictypediagnostic: MW4PR19MB6601:EE_
x-exotenant: 2khUwGVqB6N9v58KS13ncyUmMJd8q4
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 8Ct1jvTNtw3N7HfHXdF8onhGmdVHHmPjIridZFWbrSqKnU172a4Y2lYb57P0xYvpc1WbWY5g7scy87sf90SnzG7Is+Bfq8UB97VB0Bj7AAOFR1Z1niXPVtmhjABV3h7nBGQcELcYBl4CG9T3rt55xl4v9ONH6+9DamjDh0djU4Yqr7qkx1rXtU87XxtiprVGzz7cV+x+KWTYEX20cNnSXo+UPzA9K051x9JMNR/ejzhFIVW/cKyCc9wStzSFKzyiKpxFGipnFBD3LR0iE2A8+BBQKOnDvvcHj1l6/jSonDm+yQXAXqIMQkvL2P8OSWxsKJOk0/1URwFIftWx18nstZPA+56Sxo+v2p7Ay8kV7yeoNEM15Q4DdiRU47VHIGC+R24u7QTdbiBR+aLLDZ0tRq7jl2swozcSOmnBc1ch5pDeVA4Y58RlvSd6df99KuXeKWtqO6oyRK2QdOVwRVh1c9rAovEPPVm7sXKSdNWxz4RkFPZYQgs0pU+xaO0l0/odci3/BzwAsXDUGgU1kajIqgY5Gkb6z7p/rxRhMGHzkAO29LUbqUY29F+dhhDYGpUMytMfbSNlbkztTDB0aj2u/H3pgwUbI5XHc6AB9ZjpGXChaq1VsOlsUrA/Z2TUAvezP/Qw3UOC4O5b60l0s0zxb/XzaZpfAMC26rmzklkAgCCgBzYOrpX/D41zKcNc/ylmid6/A0aCf1LfH6ZVe0/w99kv/AG4vnbg33stVv+CvINjBA4DMtY5tWsWJ1iLztIXeY+/XsN8Ye+8CZeHo0XEm32gEWgykWyYjhen2+aj7rzvsyw6YyoTHwu4QL8mOUp/tvDMuoft8ukWkEQbjPVqjNovlajuMpDZOzHOu03O89qOjhzjl7f1VLZTc+y7foG8
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR19MB4045.namprd19.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230016)(4636009)(396003)(366004)(39860400002)(346002)(136003)(376002)(107886003)(186003)(83380400001)(110136005)(54906003)(41300700001)(53546011)(26005)(7696005)(6506007)(9686003)(66574015)(2906002)(38100700002)(82960400001)(38070700005)(33656002)(55016003)(86362001)(4326008)(786003)(8936002)(478600001)(71200400001)(8676002)(66476007)(66556008)(966005)(5660300002)(52536014)(316002)(122000001)(66446008)(64756008)(66946007)(76116006); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: Dell.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR19MB4045.namprd19.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 96abbf2a-af96-44ea-c0d3-08da717b5533
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Jul 2022 15:59:35.0550 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 945c199a-83a2-4e80-9f8c-5a91be5752dd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: bcsxvdZ4ykXfkhv/Cd/MvENbRhtQyG8PXUqwhlZ/+G8/+bosm1qnT/wThVpJ0EbjrbuHIX2AT/mbQ60LD54VEA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW4PR19MB6601
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.883,Hydra:6.0.517,FMLib:17.11.122.1 definitions=2022-07-29_17,2022-07-28_02,2022-06-22_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 clxscore=1015 mlxlogscore=999 bulkscore=0 mlxscore=0 malwarescore=0 adultscore=0 lowpriorityscore=0 suspectscore=0 impostorscore=0 spamscore=0 priorityscore=1501 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2206140000 definitions=main-2207290071
X-Proofpoint-ORIG-GUID: nvv8b-nFUT6FT-GWaqz0jLffOayqmZ2v
X-Proofpoint-GUID: nvv8b-nFUT6FT-GWaqz0jLffOayqmZ2v
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 mlxlogscore=999 phishscore=0 spamscore=0 malwarescore=0 mlxscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2206140000 definitions=main-2207290071
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/iGs-w8smj2actF4gX1m4I7zUVQU>
Subject: Re: [Detnet] Role of the transport layer in the DetNet Architecture
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jul 2022 15:59:47 -0000

Hi Pascal,

Lou's setting a fine example as a WG chair - he nudged me to provide a more productive response to your note, and after further discussion between us, some interesting "where to dig" ideas emerged.

So, starting from your transport layer goals:

> Bottom line, we'd want the application to have to support the minimum and let the transport layer pack the data
> to fit the DetNet SLA and send it at the appropriate time, which could effectively be signaled over the UNI.
> The stream behavior of TCP is appropriate, but the dynamic windowing and the retries and undesirable.
> TCP has reordering but does not do PREOF along the path.

I see four pieces here that ought to be teased apart:
   1) Transmission timing ("pack the data to fit the DetNet SLA")
   2) TCP (and the like) dynamic windowing
   3) Loss and retries
   4) PREOF interaction

Quick summary of what could be done:
1) Transmission timing: Don't ask the transport protocol to do this.
        - Disable sender pacing so the transport protocol (e.g., TCP) sends immediately (subject to its window, see item 2)
        - At the sender, use a DetNet shaper below the transport protocol to align sent traffic to the DetNet SLA.
2) Dynamic Windowing: Use a scalable congestion control with ECN congestion marking algorithms customized to DetNet (more below).
3) Loss and retry behavior. Defer this, and target a lossless DetNet data plane for now to make initial progress on item 2.
        - In initial work, treat any loss as a "cry for help" from the DetNet data plane, e.g., indicating a DetNet SLA violation.
        - Deal with DetNet data planes that exhibit non-congestive losses later (e.g., starting from a transport protocol that doesn't do retries, such as DCCP [RFC 4340] or Datagram QUIC [RFC 9221]).
4) PREOF in the network should "just work".

So, focusing on 2) Dynamic Windowing, there's an opportunity presented by changes in congestion control technology.

Transport protocols (e.g., TCP) that use classic congestion controls (e.g., Reno, CUBIC) tend to fill buffers at bottleneck nodes when there's more traffic to send than the network can accommodate.  That's not desirable behavior for DetNet, particularly as there will be a sender buffer between the transport protocol and the DetNet shaper (item 1) that ought not to be overstuffed.  Starting with Datacenter TCP (DCTCP) a new class of scalable congestion controls has emerged that tends to empty buffers at bottleneck nodes under the same conditions.  These scalable congestion controls use ECN feedback to manage the sender's dynamic window, and do so in a very different fashion than classic drop-equivalent ECN.  The most visible current activities in this area are L4S, TCP Prague, and Prague for QUIC (all discussed briefly in yesterday's ICCRG meeting).  Details of what a "scalable congestion control" means are to be found in Section 4 and Appendix A of draft-ietf-tsvwg-ecn-l4s-id (https://datatracker.ietf.org/doc/draft-ietf-tsvwg-ecn-l4s-id/), but be aware that this is not a light read.

So, an opportunity to make a TCP-like transport protocol useful for DetNet would be to figure out what sort of active queue management (AQM) ought to be used to mark ECN congestion indications for the various possible DetNet queuing mechanisms (e.g., CQF, ATS) where the goal of the ECN congestion indications is to cause the "right thing" (whatever that is) to happen with the sender's transmission window so that the sender's DetNet shaper has "enough" traffic to do its "right thing."  Hacking together a running prototype is strongly suggested as a next step, because the interactions between transport protocols, DetNet's queuing mechanisms, and congestion marking algorithms are subtle, to put it mildly ... and there's a bunch of effort to be invested in figuring out what the two "right thing"s and one "enough" in this paragraph might mean in practice ...

Thanks, --David

-----Original Message-----
From: Balázs Varga A <balazs.a.varga@ericsson.com> 
Sent: Tuesday, July 26, 2022 8:45 AM
To: Black, David; Pascal Thubert (pthubert); DetNet WG; raw@ietf.org
Cc: Black, David
Subject: RE: Role of the transport layer in the DetNet Architecture


[EXTERNAL EMAIL] 

Hi,

Agree with David. Adding just one more aspect: DetNet MPLS never 
touch L4 during the MPLS based forwarding.

Cheers
Bala'zs

-----Original Message-----
From: detnet <detnet-bounces@ietf.org> On Behalf Of Black, David
Sent: Tuesday, July 19, 2022 3:20 PM
To: Pascal Thubert (pthubert) <pthubert=40cisco.com@dmarc.ietf.org>; DetNet WG <detnet@ietf.org>; raw@ietf.org
Cc: Black, David <David.Black@dell.com>
Subject: Re: [Detnet] Role of the transport layer in the DetNet Architecture

Hi Pascal,

> So my question is: should we spin off work in TSVWG?
How long an explanation of the word "no" would you like ... how many years ... :-)?

Seriously, a new L4 transport protocol for DetNet seems rather unlikely to be adopted, and the mention of TCP in the email below looks like an exercise in "strawman demolition," e.g., as RFC 8655 does not mention TCP.

I would suggest looking at RTP and perhaps the multi-stream support in QUIC (uses UDP) or SCTP (via SCTP/UDP)  to understand what sort of adaptations to DetNet would be both plausible and useful.

Thanks, --David

-----Original Message-----
From: detnet <detnet-bounces@ietf.org> On Behalf Of Pascal Thubert (pthubert)
Sent: Tuesday, July 19, 2022 3:18 AM
To: DetNet WG; raw@ietf.org
Subject: [Detnet] Role of the transport layer in the DetNet Architecture


[EXTERNAL EMAIL] 

Dear all, 

At the RAW interim we discussed again the role of UNI and Transport layer, see in the architecture https://urldefense.com/v3/__https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-2b0c3973f1cab171&q=1&e=14c922c0-2015-4d1d-b68f-cb029ff5417a&u=https*3A*2F*2Fwww.rfc-editor.org*2Frfc*2Frfc8655.html*2Afig_DetNetservice__;JSUlJSUl!!LpKI!mLX9vm8aqPY8KibxgO1XK4yIyPC-FgoEzzgUzLqKOw5oFZGMHkk5WEV3h_PArs-rK5G5ZqsQwObAEeQFVKsOz7VR2S8$ [protect2[.]fireeye[.]com].	
RAW typically operates within the DetNet Service subLayer. 

The question is whether the DetNet Service sublayer is fully a L3 operation or if some of it is really L4. E.g., L3 unicast processing in a router is typically one packet in, same packet out. PREOF is certainly beyond that.

Also, a DetNet End System may not have TSN and/or Time Sync handy all the way to the app layer for the app to send the right volume of data at the right time. A transport that is not adapted may delay the transmission and interfere with the application process desires. Bottom line, we'd want the application to have to support the minimum and let the transport layer pack the data to fit the DetNet SLA and send it at the appropriate time, which could effectively be signaled over the UNI. The stream behavior of TCP is appropriate, but the dynamic windowing and the retries and undesirable. TCP has reordering but does not do PREOF along the path. 

So we see the ideal transport is not available off the shelf. We could make it look like UDP to the network, but there's still a need for a particular functionality to suit DetNet. And if we agree to place PREOF at L4, then the packet should emerge to L4 at the relay nodes (see https://urldefense.com/v3/__https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-78e6c37e3d3533b3&q=1&e=14c922c0-2015-4d1d-b68f-cb029ff5417a&u=https*3A*2F*2Fwww.rfc-editor.org*2Frfc*2Frfc8655.html*2Afig_detnet__;JSUlJSUl!!LpKI!mLX9vm8aqPY8KibxgO1XK4yIyPC-FgoEzzgUzLqKOw5oFZGMHkk5WEV3h_PArs-rK5G5ZqsQwObAEeQFVKsO8e_qJV8$ [protect2[.]fireeye[.]com]) and plunge again in L3. Which is fine, that's what L4 proxies do, remember DLSW anyone?

I wrote some basic of this in https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/draft-thubert-tsvwg-detnet-transport-01__;!!LpKI!mLX9vm8aqPY8KibxgO1XK4yIyPC-FgoEzzgUzLqKOw5oFZGMHkk5WEV3h_PArs-rK5G5ZqsQwObAEeQFVKsOOh98TzQ$ [datatracker[.]ietf[.]org]. The document was intended to introduce the need for next steps as DetNet becomes real, which is now on us. There was great feedback (e.g., Xuesong and Mach) but the focus was elsewhere.

So my question is: should we spin off work in TSVWG? If so, could we prepare a problem statement, e.g., with the doc above as starting point?

I will not be in person at IETF 114, sorry for that. But it would be nice that the topic shows on the agendas for open discussions.

Keep safe;

Pascal 

_______________________________________________
detnet mailing list
detnet@ietf.org
https://urldefense.com/v3/__https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-6a55b9dd3f9aedbf&q=1&e=14c922c0-2015-4d1d-b68f-cb029ff5417a&u=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fwww.ietf.org*2Fmailman*2Flistinfo*2Fdetnet__*3B*21*21LpKI*21hG_2Ga7PoRVYUsVHjqhyX3pHQWG3nvwEu2xPrtdF95Yv_aq_c7VE43Y747tcgpwb9kjLhxTeRRwP1GJnog_3mYZqXxC9GR2D*24__;JSUlJSUlJSUlJSUlJSUlJQ!!LpKI!mLX9vm8aqPY8KibxgO1XK4yIyPC-FgoEzzgUzLqKOw5oFZGMHkk5WEV3h_PArs-rK5G5ZqsQwObAEeQFVKsOiKC_Z8M$ [protect2[.]fireeye[.]com] [ietf[.]org]

_______________________________________________
detnet mailing list
detnet@ietf.org
https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/detnet__;!!LpKI!mLX9vm8aqPY8KibxgO1XK4yIyPC-FgoEzzgUzLqKOw5oFZGMHkk5WEV3h_PArs-rK5G5ZqsQwObAEeQFVKsO-PzkXeY$ [ietf[.]org]