Re: [Detnet] Benjamin Kaduk's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)

János Farkas <janos.farkas@ericsson.com> Sat, 02 March 2019 20:12 UTC

Return-Path: <Janos.Farkas@ericsson.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B743130E13 for <detnet@ietfa.amsl.com>; Sat, 2 Mar 2019 12:12:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.301
X-Spam-Level:
X-Spam-Status: No, score=-4.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qbsSwQM_5z6g for <detnet@ietfa.amsl.com>; Sat, 2 Mar 2019 12:12:31 -0800 (PST)
Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F36C3130E27 for <detnet@ietf.org>; Sat, 2 Mar 2019 12:12:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/relaxed; q=dns/txt; i=@ericsson.com; t=1551557544; x=1554149544; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=h0+XPxh9/vl7RitIsfFGNcFde1MfjfeEvfXhCaTdaJg=; b=XrAet8+yAEdONm9DAB7BhoHYPaIZDsHu7QzznT5tmnQQUfOpuTD7WziIGYY/YmPN rAuUPE/DY/g64J2HUxCXxt0IsCO9aKjMPyG53Xa3uKF35l7nQISMM1Gc0CdAb0Sm q6hSoYxZGQ3bnmMfgJ8epQoRGuMZA/dppby2ysX6ybo=;
X-AuditID: c1b4fb25-d89ff70000005ff7-6b-5c7ae3a8f7c4
Received: from ESESSMB504.ericsson.se (Unknown_Domain [153.88.183.122]) by sesbmg23.ericsson.net (Symantec Mail Security) with SMTP id C4.C9.24567.8A3EA7C5; Sat, 2 Mar 2019 21:12:24 +0100 (CET)
Received: from ESESSMR504.ericsson.se (153.88.183.126) by ESESSMB504.ericsson.se (153.88.183.122) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Sat, 2 Mar 2019 21:12:24 +0100
Received: from ESESSMB504.ericsson.se (153.88.183.165) by ESESSMR504.ericsson.se (153.88.183.126) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Sat, 2 Mar 2019 21:12:24 +0100
Received: from [100.94.35.103] (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.192) with Microsoft SMTP Server id 15.1.1466.3 via Frontend Transport; Sat, 2 Mar 2019 21:12:23 +0100
References: <155063426136.20704.6779201119170972943.idtracker@ietfa.amsl.com>
From: János Farkas <janos.farkas@ericsson.com>
To: Benjamin Kaduk <kaduk@mit.edu>
CC: The IESG <iesg@ietf.org>, draft-ietf-detnet-architecture@ietf.org, Lou Berger <lberger@labn.net>, detnet-chairs@ietf.org, DetNet WG <detnet@ietf.org>
Message-ID: <1cd55c7d-6d1c-b56f-38d3-d6bd78b004e2@ericsson.com>
Date: Sat, 02 Mar 2019 21:12:23 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.2.1
MIME-Version: 1.0
In-Reply-To: <155063426136.20704.6779201119170972943.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrLLMWRmVeSWpSXmKPExsUyM2J7le6Kx1UxBvPmaFhc6//BYvH702wW iw/fZrJYzPgzkdli+caZTBYdzW9ZHNg8liz5yeTxYVMzm0fTmaPMAcxRXDYpqTmZZalF+nYJ XBlHjt5kLLgZW3Fs/Vn2Bsbz7l2MnBwSAiYS7Uv2s3QxcnEICRxhlLjb8pgdJCEk8JVRYvFE OTi7Y74ThH2YUeLOkZQuRg4OYYEMiVPTyyHCvhLnm56wgthsAvYSdy9tYAaxRQSUJBafbWED mc8ssJhR4sPbk2wgCV6goucHe8EaWARUJA6cesgCYosKxEp8urKYGaJGUOLkzCdgcU4BP4kj vw8zgtjMAhYSM+efh7LlJZq3zmaGsMUlbj2ZzwRxkJrE+4Y7jBMYhWchGTULSfssJO2zkLQv YGRZxShanFqclJtuZKyXWpSZXFycn6eXl1qyiREYKQe3/FbdwXj5jeMhRgEORiUe3j/XqmKE WBPLiitzDzFKcDArifCWPgAK8aYkVlalFuXHF5XmpBYfYpTmYFES5/0jJBgjJJCeWJKanZpa kFoEk2Xi4JRqYOR+mcxcvExifwSX1IFf07MYAwXuzOBb/4Xn5hb/usSVivkx/WkvQ1apNDnM PLf8vLj8u7iwuklGJ3W6pxrWh1yem8boKWbXtXrh/7tCDNPOqG/4McddPeI7x9lbhx99mid9 tUSJtT3/UJL96cJVslESrV5SFvfXCImLKX+7XbMoq7RPYlFNvRJLcUaioRZzUXEiANaTF9eQ AgAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/E2JRv6xyQOyW0EQ8Tu_Y7oGNJu4>
Subject: Re: [Detnet] Benjamin Kaduk's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 02 Mar 2019 20:12:34 -0000

Hi Benjamin,

Coming to your detailed comments.
Please see in-line.

Thank you,
Janos


On 2/20/2019 4:44 AM, Benjamin Kaduk wrote:
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
>
>
> Abstract
>
>                                   DetNet operates at the IP layer and
>     delivers service over sub-network technologies such as MPLS and IEEE
>     802.1 Time-Sensitive Networking (TSN).
>
> I don't know what "sub-network technologies" means.  (Should I?  Is it
> defined somewhere we can reference?)
>
> More generally, is DetNet supposed to be a "sub-layer" and/or "sub-network"
> that lies between specific layers or classes of layer?  Does DetNet
> itself have component "sub-layers" that provide distinct DetNet
> functionality?  These are good questions to address early on in the
> document so the reader is familiar with the concepts as they progress
> through the document.
Please note that the WG has reached consensus on introducing the term 
"sub-layer", in particular using the terms "DetNet Service sub-layer" 
and DetNet Forwarding sub-layer", see: 
https://mailarchive.ietf.org/arch/msg/detnet/TR6oXu7IMWhelrH_I-tOuHGfDqo.
These are explained in detail in Section 4. DetNet Architecture. I do 
not see how to bring it earlier in the document.

Section 4. DetNet Architecture also explains what is meant by 
sub-network. Figure 3 shows it and the text above Figure 3 explains.
I don't see how could be this explanation earlier in the document.

As for the abstract, would it help to replace?:

OLD:
DetNet operates at the IP layer and
    delivers service over sub-network technologies such as MPLS and IEEE
    802.1 Time-Sensitive Networking (TSN).

with

NEW:
DetNet operates at the IP layer and
    delivers service over lower layer technologies such as MPLS and IEEE
    802.1 Time-Sensitive Networking (TSN).

Similar replacement could be done in the introduction:

OLD:
    DetNet operates at the IP layer and delivers service over sub-network
    technologies such as MPLS and IEEE 802.1 Time-Sensitive Networking
    (TSN).

NEW:
    DetNet operates at the IP layer and delivers service over lower layer
    technologies such as MPLS and IEEE 802.1 Time-Sensitive Networking
    (TSN).


The next occurrence of sub-network is with a cross-reference to the 
section with Figure 3 and description. I think it is fine this way as 
the reader can jump there and check the details.


>
> Section 1
>
>                            DetNet is for networks that are under a single
>     administrative control or within a closed group of administrative
>     control; these include campus-wide networks and private WANs.  DetNet
>     is not for large groups of domains such as the Internet.
>
> side note: Campus-wide networks at educational institutions are basically
> guaranteed to have untrusted entities participating in them, just as a
> backdrop for security considerations.
>
> Section 3.1
>
>                          This mechanism distributes the contents of
>     DetNet flows over multiple paths in time and/or space, so that the
>     loss of some of the paths does need not cause the loss of any
>
> The failure models for which this statement is absolutely true as opposed
> to probabilistically true seem rather unrealistic models of real physical
> systems.
>
> Section 3.2.1.1
>
>     The primary means by which DetNet achieves its QoS assurances is to
>     reduce, or even completely eliminate packet loss due to output packet
>     contention within a DetNet node as a cause of packet loss.  [...]
>
> editing error?
>
>                                       Note that App-flows are generally
>     not expected to be responsive to implicit [RFC2914] or explicit
>     congestion notification [RFC3168].
>
> I note that the word "implicit" does not appear in RFC 2914; it may be
> worth a bit more detailed of a mapping from concept to reference.
> (This text/reference also appears in Section 4.3.2.)
Would it help to change the text?:

OLD:
    There is no expectation in DetNet for App-flows to be responsive to
    implicit [RFC2914] or explicit congestion notification [RFC3168].

NEW:
    There is no expectation in DetNet for App-flows to be responsive to
    congestion control [RFC2914] or explicit congestion notification 
[RFC3168].


>
> Section 3.2.1.2
>
>                                                                     In
>     general, users are encouraged to use, instead of, "do this when you
>     get the packet," a combination of:
>
> It seems that an architecture would be within its rights to *mandate* such
> application design, rather than just encourage it.  What sorts of
> exceptions would cause us to not want to mandate this design?
This is not mandatory.
For instance, it is not mandatory to use time synchronization. There may 
be DetNet services that do not require time synchronization.


>
> Section 3.2.2.2
>
> Please expand SRLG (it is only used once, so the abbreviation itself may
> not be needed at all).
Replace "SRLG" with "Shared Risk Link Group (SRLG)"

>
> Section 3.2.3
>
>     Out-of-order packet delivery can be a side effect of distributing a
>     single flow over multiple paths especially when there is a change
>     from one path to another when combining the flow.  [...]
>
> nit: comma before "especially".
Add comma.

>
>     Resource allocation
>             The DetNet forwarding sub-layer provides resource allocation.
>             See Section 4.5.  The actual queuing and shaping mechanisms
>             are typically provided by underlying subnet, these can be
>
> nit: is this usage of "subnet" common?
Figure 3 shows it and the text above Figure 3 explains sub-net.

> Also, this comma looks to be a comma splice.
Make it two sentences.

>
>             closely associated with the means of providing paths for
>             DetNet flows, the path and the resource allocation are
>             conflated in this figure.
>
> nit: Hmm, actually, is this comma *also* a comma splice?
Make it two sentences.

>
>     Operations, Administration, and Maintenance (OAM) leverages in-band
>     and out-of-band signaling that validates whether the service is
>     effectively obtained within QoS constraints.  [...]
>
> nit: is there a singular/plural mismatch here ("the service"/"service" vs.
> "effectively within"/"effectively obtained within")?
Seems good to me.

>
> Section 4.1.1
>
> This figure would have helped me a lot several sections earlier.
>
> Section 4.1.2
>
>     A "Deterministic Network" will be composed of DetNet enabled end
>     systems, DetNet edge nodes, DetNet relay nodes and collectively
>     deliver DetNet services.  DetNet relay and edge nodes are
>
> Nit: I think this is intended to be:
> A "Deterministic Network" will be composed of DetNet-enabled end
> systems, DetNet edge nodes, and DetNet relay nodes, which collectively
> deliver DetNet services.  DetNet relay and edge nodes are
Fine by me to make the cahnge.

>
>                                                               Examples of
>     sub-networks include MPLS TE, IEEE 802.1 TSN and OTN.  [...]
>
> nit: are these sub-networks or protocols used by sub-networks?
These are sub-network technologies. They may include/use multiple protocols.


>
>     Distinguishing the function of two DetNet data plane sub-layers, the
>     DetNet service sub-layer and the DetNet forwarding sub-layer, helps
>     to explore and evaluate various combinations of the data plane
>     solutions available, some are illustrated in Figure 4.  This
>
> nit: this last comma is a comma splice.
Suggest to replace with:
"DetNet data plane is divided into two sub-layers: the
DetNet service sub-layer and the DetNet forwarding sub-layer.
This helps to explore and evaluate various combinations of the data plane
solutions available. Some of them are illustrated in Figure 4."
(https://mailarchive.ietf.org/arch/msg/detnet/JvPTAFVTJwxjhzZYEF9uCnUTFBA)

>
>     There are many valid options to create a data plane solution for
>     DetNet traffic by selecting a technology approach for the DetNet
>     service sub-layer and also selecting a technology approach for the
>     DetNet forwarding sub-layer.  There are a high number of valid
>     combinations.
>
> nit: I think "large number" is more conventional prose.
Replace "high number" with "large number".

>
> Section 4.3.1
>
> I think I'm confused about how, for these flows that "require the <foo>
> feature", whether that means that the DetNet implementation must provide
> <foo>, or that it is required for the application to have implemented the
> <foo> feature.  A mapping (if it makes sense) to the categorization of end
> systems in Section 4.2.1 would be a big help.
The notation is crafted such that to provide mapping.


>
> Section 4.3.2
>
>     Asynchronous DetNet flows are characterized by:
>
>     o  A maximum packet size;
>
>     o  An observation interval; and
>
>     o  A maximum number of transmissions during that observation
>        interval.
>
> Is there necessarily only a single tier of observation interval/rate?
> (E.g., could there be a burst cap in a small interval and then a lower
> overall baseline rate over large intervals?)
We intentionally have a simple model here.


>
>                       That is, while any useful application is written to
>     expect a certain number of lost packets, the real-time applications
>     of interest to DetNet demand that the loss of data due to the network
>     is a rare event.
>
> (I might even go with "vanishingly rare".)
Yes, there are extremely low loss requirements in certain use cases. 
That's why we have PREOF.

>
> Section 4.4.1
>
> (Is there a standard reference for "Northbound"?  I know we're all used to
> it, but it's probably best to have a reference if we can.)
RFC7426 is a reference. It is cited at the very beginning of the section.

>
> Section 4.4.2
>
>                                           The deterministic sequence can
>     typically be more complex than a direct sequence and include
>     redundancy path, with one or more packet replication and elimination
>     points.  [...]
>
> nit: "redundancy paths", plural?

Replace "redundancy paths", "redundant paths".


>
> Section 4.8
>
> How does *provisioning* require knowledge of *dynamic* state?
I guess the idea was that the resource may change dynamically.

Would it help to delete "dynamic"?
Thus get: "The state of a DetNet node's DetNet resources."

>
> Section 4.9
>
> Does aggregation like this pose a risk of all the aggregatees getting
> affected when one exceeds their allocation substantially (so as to also
> cause the aggregate to exceed the aggregate's allocation)?
One way could be to apply rate limitation for each member flow being 
aggregated at the input of the aggregate flow. The need to apply rate 
limitation is explained at multiple places in the document.

>
> Section 6
>
> The ability for an attacker to use QoS markings as part of traffic
> correlation/inspection is not new with DetNet, but is probably still worth
> mentioning explicitly.
Do you mean mention it in Section 5 Security Considerations?

The text in my previous mail 
(https://mailarchive.ietf.org/arch/msg/detnet/mOzgdXOJ5lGr4gLBGAapYt6Azl8) 
has a paragraph starting:
"To provide uninterrupted availability of the DetNet quality of service, 
provisions must be made against DOS attacks and delay attacks."

Would it be good to extend that paragraph with a sentence, e.g.,?: 
"Malicious QoS marking should be also considered".