Re: [Detnet] draft-ietf-detnet-architecture-10

Toerless Eckert <tte@cs.fau.de> Sat, 26 January 2019 20:45 UTC

Return-Path: <eckert@i4.informatik.uni-erlangen.de>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE8DF130FFE for <detnet@ietfa.amsl.com>; Sat, 26 Jan 2019 12:45:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level:
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iP3I84E2AwqM for <detnet@ietfa.amsl.com>; Sat, 26 Jan 2019 12:45:01 -0800 (PST)
Received: from faui40.informatik.uni-erlangen.de (faui40.informatik.uni-erlangen.de [131.188.34.40]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 79BDA130FFA for <detnet@ietf.org>; Sat, 26 Jan 2019 12:45:01 -0800 (PST)
Received: from faui48f.informatik.uni-erlangen.de (faui48f.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:52]) by faui40.informatik.uni-erlangen.de (Postfix) with ESMTP id 121A2548341; Sat, 26 Jan 2019 21:44:55 +0100 (CET)
Received: by faui48f.informatik.uni-erlangen.de (Postfix, from userid 10463) id EFCBC440210; Sat, 26 Jan 2019 21:44:54 +0100 (CET)
Date: Sat, 26 Jan 2019 21:44:54 +0100
From: Toerless Eckert <tte@cs.fau.de>
To: Bal?zs Varga A <balazs.a.varga@ericsson.com>
Cc: "Andrew G. Malis" <agmalis@gmail.com>, DetNet WG <detnet@ietf.org>, "Black, David" <David.Black@dell.com>, Janos Farkas <Janos.Farkas@ericsson.com>, Lou Berger <lberger@labn.net>
Message-ID: <20190126204454.356wkgtkfubavzid@faui48f.informatik.uni-erlangen.de>
References: <31151608-0a6b-1aee-3f86-d3727b77d5d5@labn.net> <CE03DB3D7B45C245BCA0D24327794936303AD8FA@MX307CL04.corp.emc.com> <90f0d465-4ec7-3ec6-7040-b67bd7afd108@labn.net> <CE03DB3D7B45C245BCA0D24327794936303BE85B@MX307CL04.corp.emc.com> <c21873db-63fb-de42-2f78-3e9aa54118bb@labn.net> <CE03DB3D7B45C245BCA0D24327794936303C098E@MX307CL04.corp.emc.com> <AM5PR0701MB2292951E7D66A83A6292E222AC850@AM5PR0701MB2292.eurprd07.prod.outlook.com> <20190111181619.fz7dosbqbgyt55uj@faui48f.informatik.uni-erlangen.de> <CAA=duU3uo-S3HMvth3R0JbDV7N72ebKvcRNog8=U6qbUAEG8LA@mail.gmail.com> <AM5PR0701MB229243977255EA5DF23CDF9EAC800@AM5PR0701MB2292.eurprd07.prod.outlook.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <AM5PR0701MB229243977255EA5DF23CDF9EAC800@AM5PR0701MB2292.eurprd07.prod.outlook.com>
User-Agent: NeoMutt/20170113 (1.7.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/BjZLJ9_uH_vbvCCA61zOa3thiew>
Subject: Re: [Detnet] draft-ietf-detnet-architecture-10
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 26 Jan 2019 20:45:07 -0000

Sure, but there is no useful technical explanation in the DetNet
documents why those are out of scope, and even less so text to make
readers understand what actually is in scope.

This was the type of text i was suggesting in my first email:

"The more operators are involved in the end-to-end path, the more
 difficult it will be to guarantee well-coordinated hop-by-hop
 guarantee of DetNet properties" - That would be an explanation
 of calling multi-operator networks to be out of scope.

But what is a "private WAN" ? If i would guess then every reader
would interpret this differently. I for once think that DetNet
should be possible to offer by SPs as an extension of L3VPN services.
But most readers likely think thats not a private WAN. So instead
they would build DetNet on top of ethernet pseudowire services they
buy from some ISP. Of course: ROTFL, there is no fundamental difference
except that in the ethernet case, the enterprise might be lucky and
find an actual TSN enabled metro-ethernet service. Whereas the
enterprise wanting to use DetNet and the ISP wanting to offer it
as part of L3VPN read the DetNet RFCs and wonder what it means.

Aka: I can easily see that its easier to build a larger scale
TSN than DetNet service if i was trying to interpret the applicability
statements in DetNet.

So, i continue to claim that the current text rather has the opportunity
to stop DetNet in its tracks and can only serve to attempt to fend of
solving any issues that might be brough up. There is not even a
statement that DetNet should be supported in at least those scenarios
where TSN would be feasible, if not for the need to support L3 or
MPLS.

Cheers
    Toerless

On Mon, Jan 14, 2019 at 06:12:01AM +0000, Bal?zs Varga A wrote:
> Hi,
> Yes we can, as it was stated in the charter:
> ???
> The Working Group will initially focus on solutions for networks that
> are under a single administrative control or within a closed group of
> administrative control; these include not only campus-wide networks but
> also can include private WANs. The DetNet WG will not spend energy on
> solutions for large groups of domains such as the Internet.
> ???
> Cheers
> Bala???zs
> 
> From: Andrew G. Malis <agmalis@gmail.com>
> Sent: Friday, January 11, 2019 10:44 PM
> To: Toerless Eckert <tte@cs.fau.de>
> Cc: Balázs Varga A <balazs.a.varga@ericsson.com>; DetNet WG <detnet@ietf.org>; Black, David <David.Black@dell.com>; Janos Farkas <Janos.Farkas@ericsson.com>; Lou Berger <lberger@labn.net>
> Subject: Re: [Detnet] draft-ietf-detnet-architecture-10
> 
> Toerless,
> 
> We could certainly truthfully say that it's not intended for the multidomain best-effort public Internet infrastructure.
> 
> Cheers,
> Andy
> 
> 
> On Fri, Jan 11, 2019 at 1:16 PM Toerless Eckert <tte@cs.fau.de<mailto:tte@cs.fau.de>> wrote:
> I really don't know what the benefit of this text would be. IMHO it is
> mostly IESG code language but not really helpfull IMHO.
> 
> Something like Googles worldwide network could support DetNet if Google
> wanted to ?! Its a private WAN, right ? Aka: there is no physcial scale
> limitation, right ? Why don't we say that ?
> 
> What is a "large number of domains" ? How about a nationwide research
> network such as Internet 2 with hundreds of attached organizations. If
> Internet2 introduced DetNet services and allowed interested Internet2
> participants to participate in it, extending DetNet services into their
> couses ? How about a nationwide service provider and its customers ?
> We do want DetNet service, right ?
> 
> The only real requirement for DetNet between A and B is that all transit
> domains between A and B support DetNet. This is fundamentally not
> different from the requirement to make ECN work. As soon as i have a
> single hop along a path not supporting ECN, my ECN based congestion
> control will have to fall back to delay-variation or loss-based. And ECN is
> defined to be an Internet technology. So why would DetNet not be ?
> 
> "When we finally get to DetNet Control Plane, we don't want to bother
> with all the complexity of multi-operator control plane because its
> hard enough to figure out how to make one DetNet SDN controller work"
> 
> Thats one possible honest exlanation, but given how i think we can not
> precdit what type of multi-opeator environments control plane the
> community will have interest to work on over time, it might be more
> appropriate to say that and not to come up with an underspecified binary
> distinction of what is and what is not DetNet.
> 
> Cheers
>     Toerless
> 
> On Fri, Jan 11, 2019 at 09:18:37AM +0000, Bal?zs Varga A wrote:
> > Great. I am fine to add these explicit statements to make text more clear.
> >
> > New text is inline with the general statement in the introduction of the draft:
> > "  DetNet is for networks that are under a single
> >    administrative control or within a closed group of administrative
> >    control; these include campus-wide networks and private WANs.  DetNet
> >    is not for large groups of domains such as the Internet.  "
> >
> > Cheers
> > Bala'zs
> >
> > Ps: Also, note that "DetNet flows" are unidirectional ... :---))))
> >
> > -----Original Message-----
> > From: detnet <detnet-bounces@ietf.org<mailto:detnet-bounces@ietf.org>> On Behalf Of Black, David
> > Sent: Tuesday, January 8, 2019 6:46 PM
> > To: Lou Berger <lberger@labn.net<mailto:lberger@labn.net>>; Janos Farkas <Janos.Farkas@ericsson.com<mailto:Janos.Farkas@ericsson.com>>; DetNet WG <detnet@ietf.org<mailto:detnet@ietf.org>>
> > Subject: Re: [Detnet] draft-ietf-detnet-architecture-10
> >
> > That's fine and what was intended.
> >
> > Thanks, --David
> >
> > > -----Original Message-----
> > > From: Lou Berger [mailto:lberger@labn.net<mailto:lberger@labn.net>]
> > > Sent: Monday, January 7, 2019 4:49 PM
> > > To: Black, David; János Farkas; DetNet WG
> > > Subject: Re: [Detnet] draft-ietf-detnet-architecture-10
> > >
> > >
> > > [EXTERNAL EMAIL]
> > >
> > > David,
> > >
> > >      This looks good/right to me.  The only specific change I'd add is
> > > to clarify that we're talking PEROF traffic when saying "DetNet
> > > replicated traffic".
> > >
> > > Thanks!
> > >
> > > Lou
> > >
> > > On 1/7/2019 10:44 AM, Black, David wrote:
> > > > Lou,
> > > >
> > > > Attempting to summarize what needs to be stated without using
> > > MUST/SHOULD/MAY:
> > > >
> > > > [1] Sending DetNet traffic into networks that have not been
> > > > provisioned in
> > > advance to handle that DetNet traffic has to be treated as a fault.
> > > Egress traffic filters to prevent this from happening are strongly
> > > recommended at the edges of DetNet networks and DetNet supporting
> > > networks.  In this context, the term 'provisioned' has a broad
> > > meaning, e.g., provisioning could be performed via an administrative
> > > decision that the downstream network has the available capacity to carry the DetNet traffic that is being sent into it.
> > > >
> > > > [2] Sending non-congestion-controlled DetNet traffic (i.e., DetNet
> > > > traffic that
> > > does not comply with BCP 41/RFC 2914) into a network that is not
> > > provisioned to handle that traffic has to be prevented in addition to being treated as a fault.
> > > DetNet traffic that is not known to be congestion controlled has to be
> > > treated as non-congestion-controlled DetNet traffic for this
> > > requirement.  DetNet replicated traffic is always
> > > non-congestion-controlled even if the original DetNet flow is
> > > congestion-controlled because DetNet packet elimination can hide
> > > congestion indications (e.g., drops, ECN CE marks, increased latency)
> > > from endpoints.  The responsibility for dealing with these
> > > requirements in general, and replicated traffic in particular, is
> > > solution-specific, as there are MPLS mechanisms that cannot be applied to the IP solution, and moreover, the current IP solution doesn't support DetNet traffic replication.
> > > >
> > > > Thanks, --David
> > > >
> > > >> -----Original Message-----
> > > >> From: Lou Berger [mailto:lberger@labn.net<mailto:lberger@labn.net>]
> > > >> Sent: Tuesday, December 25, 2018 11:45 AM
> > > >> To: Black, David; János Farkas; DetNet WG
> > > >> Subject: Re: [Detnet] draft-ietf-detnet-architecture-10
> > > >>
> > > >>
> > > >> [EXTERNAL EMAIL]
> > > >>
> > > >> Hi David,
> > > >>
> > > >> On 12/24/2018 8:29 PM, Black, David wrote:
> > > >>> Hi Lou,
> > > >>>
> > > >>> Excerpting key paragraphs ...
> > > >>>
> > > >>>> To me clear, you are suggesting that text be added to say that
> > > >>>> sending detnet traffic out a non-detnet interfaces must be treated as a fault.
> > > >>>> Is this correct?
> > > >>> Not exactly ...
> > > >>>
> > > >>>> If so, I think this is too broad considering that there are
> > > >>>> networks that can provided the required detnet forwarding
> > > >>>> sub-layer service that are not detnet service aware as is
> > > >>>> mentioned at the end of section 4.3.2. (I'll refer to such as
> > > >>>> "DetNet supporting networks" in the next paragraph.)
> > > >>> I agree with where this is headed - sending DetNet traffic into a
> > > >>> network that has not been provisioned to provide the required
> > > >>> detnet forwarding service to that traffic has to be treated as a
> > > >>> fault.  In this statement, "provisioned" should be read broadly,
> > > >>> e.g., it could be realized via an administrative decision that the
> > > >>> DetNet supporting network has the available capacity to carry the DetNet traffic that is being sent into it.
> > > >> agreed.
> > > >>>> This said, I think it would be reasonable to make it a
> > > >>>> requirement that DetNet nodes must not forward traffic that
> > > >>>> doesn't conform with BCP41 over a network that is neither a
> > > >>>> Detnet network or a DetNet supporting network.  Although this
> > > >>>> would require a change to the DetNet service model, i.e.,  to know which traffic was conformant/non-conformant.
> > > >>> That's fine with one important twist:
> > > >>>
> > > >>> Any traffic that has been replicated by DetNet packet replication
> > > >>> has to be treated as not conforming with BCP41 because DetNet
> > > >>> packet elimination (of replicated packets) may hide congestion
> > > >>> indications (e.g., delay, ECN CE marks, drops) from the endpoints
> > > >>> - a scenario of particular concern involves the other flow of
> > > >>> replicated packets following a DetNet network path along which nothing goes wrong.
> > > >>> BCP41 is about end-to-end-congestion control, which does not do
> > > >>> anything if DetNet packet elimination hides congestion indications
> > > >>> from the endpoints.
> > > >> This seems reasonable to me.
> > > >>
> > > >>
> > > >>>>> Beyond this, I think a "SHOULD" requirement to discard DetNet
> > > >>>>> traffic that would otherwise escape is needed, and the statement
> > > >>>>> of that requirement ought to be connected to the explanation of
> > > >>>>> how to implement that requirement.
> > > >>>> I think adding a statement on output filters (and policers) to
> > > >>>> this section is reasonable.
> > > >>> Let's start with the inclusion of output filters (and policers) in
> > > >>> the 3.3.2 text with the use of upper-case "SHOULD" as suggested by
> > > >>> Pascal - I will look this over and suggest any additional text
> > > >>> that I think ought to be included.
> > > >> As an architecture document, the authors/WG made the call to not
> > > >> use conformance capitalization or reference 2119/8174.  I think
> > > >> this translates to the conformance language needing to be added to
> > > >> the data plane solution documents.
> > > >>
> > > >> Cheers,
> > > >>
> > > >> Lou
> > > >>
> > > >>
> > > >>> Thanks, --David
> > > >>>
> > > >>>> -----Original Message-----
> > > >>>> From: Lou Berger [mailto:lberger@labn.net<mailto:lberger@labn.net>]
> > > >>>> Sent: Monday, December 24, 2018 3:18 PM
> > > >>>> To: Black, David; János Farkas; DetNet WG
> > > >>>> Subject: Re: [Detnet] draft-ietf-detnet-architecture-10
> > > >>>>
> > > >>>>
> > > >>>> [EXTERNAL EMAIL]
> > > >>>>
> > > >>>> Hi David,
> > > >>>>
> > > >>>> On 12/19/2018 12:37 PM, Black, David wrote:
> > > >>>>> Janos,
> > > >>>>>
> > > >>>>> The terminology is definitely improved - the resulting draft is
> > > >>>>> much clearer - many thanks to you and the authors for doing that.
> > > >>>> Happy to hear that.
> > > >>>>
> > > >>>>
> > > >>>>> Where do we stand on the concern about protecting external
> > > >>>>> non-DetNet networks from DetNet flows that escape a DetNet
> > > >>>>> network, e.g., due to an erroneous network configuration change?
> > > >>>> I'm not sure we have general solutions in the internet
> > > >>>> architecture for miss-configured/buggy systems other than
> > > >>>> dropping the packets on the floor (e.g., due to no route, no
> > > >>>> label, or ttl expiry).  What type of protection are you looking
> > > >>>> for here, and can you provide a reference to the type of router
> > > >>>> behavior you would like to see?  I have a suggestion that might
> > > >>>> address your concern below elated to non-BCP41 conformant traffic, but am unsure if this is what you are concerned about.
> > > >>>>
> > > >>>>> My current views are ...
> > > >>>>>
> > > >>>>> There's no throttling in DetNet, e.g., this text in 4.3.2:
> > > >>>>>
> > > >>>>>       There is no provision in DetNet for throttling DetNet flows, i.e.,
> > > >>>>>       the transmission rate cannot be reduced via explicit congestion
> > > >>>>>       notification [RFC3168].  The assumption is that a DetNet flow, to be
> > > >>>>>       useful, must be delivered in its entirety.
> > > >>>> Well looking at it this way, there is no throttling in any IP
> > > >>>> network as the routers generate the CN and only drop when their
> > > >>>> queues are full or implementing some sort of RED.
> > > >>>>
> > > >>>> In DetNet there is an expectation that intermediate nodes do more
> > > >>>> than this.  Specifically, see section 4.5: "Queuing, Shaping,
> > > >>>> Scheduling, and Preemption" and policing, which is mentioned as
> > > >>>> requirement in section 3.3.1.
> > > >>>>
> > > >>>>> and no assurance that all DetNet-using applications will cease
> > > >>>>> and desist in the face of packet drops that indicate congestion.
> > > >>>> I think this is correct.
> > > >>>>
> > > >>>>
> > > >>>>> Packet Replication and Elimination makes this worse via its
> > > >>>>> ability to
> > > hide
> > > >>>>> network packet drops and congestion indications from endpoints,
> > > >>>>> e.g., of those drops and/or congestion indications occur on only
> > > >>>>> one of the paths used by replicated packets.
> > > >>>>>
> > > >>>>> The first paragraph in section 3.3.2 is a good start, but I
> > > >>>>> think its lower case "should" is too weak:
> > > >>>>>
> > > >>>>>       Robust real-time systems require to reduce the number of possible
> > > >>>>>       failures.  Filters and policers should be used in a DetNet network to
> > > >>>>>       detect if DetNet packets are received on the wrong interface, or at
> > > >>>>>       the wrong time, or in too great a volume.  Furthermore, filters and
> > > >>>>>       policers can take actions to discard the offending packets or flows,
> > > >>>>>       or trigger shutting down the offending flow or the offending
> > > >>>>>       interface.
> > > >>>>>
> > > >>>>> At a minimum, I think that the requirement to discard DetNet
> > > >>>>> traffic that would otherwise escape a DetNet network has to be
> > > >>>>> stated as a "MUST" requirement for any DetNet network that
> > > >>>>> supports Packet Replication and Elimination due to the ability
> > > >>>>> of that functionality to hide congestion from endpoints, making
> > > >>>>> it impossible for higher layers of the protocol stack to respond.
> > > >>>> To me clear, your are suggesting that text be added to say that
> > > >>>> sending detnet traffic out a non-detnet interfaces must be treated as a fault.
> > > >>>> Is this correct?  If so, I think this is too broad considering
> > > >>>> that there are networks that can provided the required detnet
> > > >>>> forwarding sub-layer service that are not detnet service aware as
> > > >>>> is mentioned at the end of section 4.3.2. (I'll refer to such as
> > > >>>> "DetNet supporting networks" in the next paragraph.)
> > > >>>>
> > > >>>> This said, I think it would be reasonable to make it a
> > > >>>> requirement that DetNet nodes must not forward traffic that
> > > >>>> doesn't conform with BCP41 over a network that is neither a
> > > >>>> Detnet network or a DetNet supporting network.  Although this
> > > >>>> would require a change to the DetNet service model, i.e.,  to know which traffic was conformant/non-conformant.
> > > >>>>
> > > >>>>
> > > >>>>> Beyond this, I think a "SHOULD" requirement to discard DetNet
> > > >>>>> traffic that would otherwise escape is needed, and the statement
> > > >>>>> of that requirement ought to be connected to the explanation of
> > > >>>>> how to implement that requirement.
> > > >>>> I think adding a statement on output filters (and policiers) to
> > > >>>> this section is reasonable.
> > > >>>>
> > > >>>>
> > > >>>>> The text in Section 3.3.2 has a lot of the content needed - for
> > > >>>>> a worked example of such "SHOULD" text, see Section 5 of RFC
> > > >>>>> 7510, in particular the itemized list at the end of that section
> > > >>>>> and the paragraph that introduces that list:
> > > >>>>>       https://tools.ietf.org/html/rfc7510#section-5
> > > >>>> If I'm not mistaken, such mechanisms are already included in the
> > > >>>> document and you really are just asking them to be (re)listed to
> > > >>>> ensure that this import point isn't missed.  Is this correct?
> > > >>>> Besides what is mentioned above, is there anything else missing?
> > > >>>>
> > > >>>> Thanks!
> > > >>>>
> > > >>>> Lou
> > > >>>>
> > > >>>>> Thanks, --David
> > > >>>>>
> > > >>>>>> -----Original Message-----
> > > >>>>>> From: detnet [mailto:detnet-bounces@ietf.org<mailto:detnet-bounces@ietf.org>] On Behalf Of
> > > >>>>>> János
> > > Farkas
> > > >>>>>> Sent: Wednesday, December 19, 2018 10:54 AM
> > > >>>>>> To: DetNet WG
> > > >>>>>> Subject: [Detnet] draft-ietf-detnet-architecture-10
> > > >>>>>>
> > > >>>>>>
> > > >>>>>> [EXTERNAL EMAIL]
> > > >>>>>>
> > > >>>>>> Hi,
> > > >>>>>>
> > > >>>>>> The DetNet architecture document has been updated to address
> > > >>>>>> the comments. The new revision (v10) is available at
> > > >>>>>> https://tools.ietf.org/html/draft-ietf-detnet-architecture-10.
> > > >>>>>>
> > > >>>>>> There have been a number of discussion items emails on the
> > > >>>>>> list. The updates are along the major discussion items, which
> > > >>>>>> also cover the derivative discussions, address the comments.
> > > >>>>>>
> > > >>>>>> The major items have been summarized in:
> > > >>>>>> https://www.ietf.org/mail-archive/web/detnet/current/msg01968.html.
> > > >>>>>> Follow up discussions implied terminology changes summarized in:
> > > >>>>>> https://www.ietf.org/mail-archive/web/detnet/current/msg02036.html:
> > > >>>>>> replace "transport sub-layer" with "forwarding sub-layer"
> > > >>>>>> https://www.ietf.org/mail-archive/web/detnet/current/msg02038.html:
> > > >>>>>> replace "congestion protection" with "resource" allocation"
> > > >>>>>> Consequently, the document had a good 'scurb".
> > > >>>>>>
> > > >>>>>> In addition, outstanding comments have been addressed along
> > > >>>>>> https://www.ietf.org/mail-archive/web/detnet/current/msg01943.html.
> > > >>>>>>
> > > >>>>>> Please let us know if any comment happened to be remained open.
> > > >>>>>>
> > > >>>>>> Best regards,
> > > >>>>>> Janos
> > > >>>>>>
> > > >>>>>> _______________________________________________
> > > >>>>>> detnet mailing list
> > > >>>>>> detnet@ietf.org<mailto:detnet@ietf.org>
> > > >>>>>> https://www.ietf.org/mailman/listinfo/detnet
> > > >>>>> _______________________________________________
> > > >>>>> detnet mailing list
> > > >>>>> detnet@ietf.org<mailto:detnet@ietf.org>
> > > >>>>> https://www.ietf.org/mailman/listinfo/detnet
> > > >>>>>
> > _______________________________________________
> > detnet mailing list
> > detnet@ietf.org<mailto:detnet@ietf.org>
> > https://www.ietf.org/mailman/listinfo/detnet
> > _______________________________________________
> > detnet mailing list
> > detnet@ietf.org<mailto:detnet@ietf.org>
> > https://www.ietf.org/mailman/listinfo/detnet
> 
> --
> ---
> tte@cs.fau.de<mailto:tte@cs.fau.de>
> 
> _______________________________________________
> detnet mailing list
> detnet@ietf.org<mailto:detnet@ietf.org>
> https://www.ietf.org/mailman/listinfo/detnet

-- 
---
tte@cs.fau.de