Re: [Detnet] [6tisch] comments on draft-finn-detnet-architecture-00
anand@ece.iisc.ernet.in Mon, 13 April 2015 12:00 UTC
Return-Path: <anand@ece.iisc.ernet.in>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 622561ABC75; Mon, 13 Apr 2015 05:00:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: YES
X-Spam-Score: 24.683
X-Spam-Level: ************************
X-Spam-Status: Yes, score=24.683 tagged_above=-999 required=5 tests=[BAYES_99=3.5, BAYES_999=0.2, RELAY_IS_203=0.994, SPF_HELO_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLACK=20] autolearn=spam
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tPiGv85qcKfQ; Mon, 13 Apr 2015 04:59:53 -0700 (PDT)
Received: from relay.iisc.ernet.in (relay.iisc.ernet.in [203.200.35.66]) by ietfa.amsl.com (Postfix) with ESMTP id B57F81A9308; Mon, 13 Apr 2015 04:59:51 -0700 (PDT)
Received: from ece.iisc.ernet.in (mail.ece.iisc.ernet.in [10.32.1.10]) by relay.iisc.ernet.in (8.13.1/8.13.1) with ESMTP id t3DBxEtB021828; Mon, 13 Apr 2015 17:29:14 +0530
Received: from ece.iisc.ernet.in (localhost [127.0.0.1]) by ece.iisc.ernet.in (8.14.7/8.14.7) with ESMTP id t3DBx5Zn026871; Mon, 13 Apr 2015 17:29:05 +0530
Received: (from apache@localhost) by ece.iisc.ernet.in (8.14.7/8.14.7/Submit) id t3DBx2Mf026861; Mon, 13 Apr 2015 17:29:02 +0530
X-Authentication-Warning: ece.iisc.ernet.in: apache set sender to anand@ece.iisc.ernet.in using -f
Received: from 10.16.40.11 (SquirrelMail authenticated user anand) by www.ece.iisc.ernet.in with HTTP; Mon, 13 Apr 2015 17:29:02 +0530
Message-ID: <a59f84e3ae8ed28816abf3cd2628da75.squirrel@www.ece.iisc.ernet.in>
In-Reply-To: <E045AECD98228444A58C61C200AE1BD849DC982C@xmb-rcd-x01.cisco.com>
References: <D14C0BB5.52A8D%pwetterw@cisco.com> <D14C331F.3B0C2%nfinn@cisco.com> <74740DF4C7C9474BA336469CA93FBBF6228CA6E1@ServerB.intranet.b-plus.com> <OF35E64531.E3B79D48-ON86257E23.004AF9CD-86257E23.004D1059@ni.com> <79b8aa766408db02946637b5293bb24e.squirrel@www.ece.iisc.ernet.in> <E045AECD98228444A58C61C200AE1BD849DC982C@xmb-rcd-x01.cisco.com>
Date: Mon, 13 Apr 2015 17:29:02 +0530
From: anand@ece.iisc.ernet.in
To: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
User-Agent: SquirrelMail/1.4.22
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
X-IISc-MailScanner-Information: Please contact the ISP for more information
X-IISc-MailScanner: Found to be clean
X-IISc-MailScanner-SpamCheck: not spam, SpamAssassin (not cached, score=-2.399, required 6.5, ALL_TRUSTED -1.00, BAYES_00 -1.90, FSL_RCVD_USER 0.00, URIBL_BLACK 0.50)
X-IISc-MailScanner-From: anand@ece.iisc.ernet.in
Archived-At: <http://mailarchive.ietf.org/arch/msg/detnet/H-MUxr-Aow8cwdy43Ri967wVV9M>
X-Mailman-Approved-At: Tue, 14 Apr 2015 05:53:28 -0700
Cc: Rodney Cummings <rodney.cummings@ni.com>, Thomas Watteyne <watteyne@eecs.berkeley.edu>, "Patrick Wetterwald (pwetterw)" <pwetterw@cisco.com>, "Eric Levy- Abegnoli (elevyabe)" <elevyabe@cisco.com>, "Norman Finn (nfinn)" <nfinn@cisco.com>, "6tisch@ietf.org" <6tisch@ietf.org>, "detnet@ietf.org" <detnet@ietf.org>, Christian Boiger <christian.boiger@b-plus.com>
Subject: Re: [Detnet] [6tisch] comments on draft-finn-detnet-architecture-00
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussions on Deterministic Networking, characterized by 1\) resource reservation; 2\) 0 congestion loss and guaranteed latency; 3\) over L2-only and mixed L2 and L3 networks; and 5\) 1+1 replication/deletion." <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Apr 2015 12:00:03 -0000
Pascal, I agree. As you noted, network elements along the path can certainly help the cause. Anand > Yes, > > But we can absorb that difference of latency at staging points along the > path, which do not have to be at the egress, so the requirement on buffer > capacity that is classically required at the egress could be lowered. > > Cheers, > > Pascal > > >> -----Original Message----- >> From: 6tisch [mailto:6tisch-bounces@ietf.org] On Behalf Of >> anand@ece.iisc.ernet.in >> Sent: lundi 13 avril 2015 12:04 >> To: Rodney Cummings >> Cc: Thomas Watteyne; Patrick Wetterwald (pwetterw); Norman Finn (nfinn); >> 6tisch@ietf.org; detnet@ietf.org; Christian Boiger >> Subject: Re: [6tisch] [Detnet] comments on >> draft-finn-detnet-architecture-00 >> >> Hi, >> >> The math for Option 1 can really get interesting if we combine zero >> jitter >> pursuit with seamless redundancy to improve the message reliability. >> Different paths can present dissimilar jitter to the "virtual" end-point >> which is expected to give jitter-free stream to the listener, apart from >> removing duplicates. With more path diversity comes more complexity in >> smoothening the stream. >> >> Anand >> >> >> >> > I agree with Norm's conclusion, but you are correct that this is a >> > tradeoff in complexity (and therefore to some degree cost). >> > >> > As a baseline assumption, I take it as a given that every host is >> synced >> > in time (e.g. IEEE 1588). Power does this, industrial does this, and >> > automotive is doing it. >> > >> > Let's also assume that the application requires zero jitter. Both >> Option 1 >> > and 2 meet that requirement. >> > >> > Option 1 is simply what Norm says... use the packet at the point when >> your >> > application's jitter is zero in synced time. In the host >> (end-station), >> > this requires a buffer per DetNet (zero-jitter) flow, and the ability >> to >> > identify each flow. That is not rocket science, even for an FPGA. For >> > large topologies, the tradeoff is that there is some complex math to >> > figure out the worst-case latency, but let's be clear... that's just >> > math... not higher cost hardware. There are ways to mitigate this math >> > using certain techniques in the network... in the same direction as >> you go >> > with Option 2, but not "full blown" (not zero jitter at every hop). >> > >> > Option 2 sounds appealing at first, but it implies identification and >> > buffering of each DetNet flow at every hop. You are essentially moving >> a >> > minor requirement for the host to every switch/router in the network, >> > which greatly expands the overall complexity. You also don't avoid the >> > math problem, because now there is a complex calculation to figure out >> the >> > schedule for every flow at every hop. >> > >> > The main difference is that Option 2 is more complex to implement, >> > probably by order(s) of magnitude. I agree with Norm. If you are >> designing >> > a new application for zero jitter, Option 1 is the way to go. >> > >> > All of this being said, 802.1 TSN is providing hooks to enable either >> > option. Option 1 is the baseline assumption for most applications, but >> > Option 2 is certainly do-able. Hopefully IETF DetNet will move in the >> same >> > direction. >> > >> > >> > >> > From: Christian Boiger <christian.boiger@b-plus.com> >> > To: "Norman Finn (nfinn)" <nfinn@cisco.com>, Qin Wang >> > <qinwang6top@yahoo.com>, "Patrick Wetterwald (pwetterw)" >> > <pwetterw@cisco.com>, Thomas Watteyne <watteyne@eecs.berkeley.edu>, >> > "detnet@ietf.org" <detnet@ietf.org>, "6tisch@ietf.org" >> <6tisch@ietf.org>, >> > Date: 04/10/2015 06:32 AM >> > Subject: Re: [Detnet] [6tisch] comments on >> > draft-finn-detnet-architecture-00 >> > Sent by: "detnet" <detnet-bounces@ietf.org> >> > >> > >> > >> > Actually the packet delay variation is not only important for the >> > applications, it is also an important factor to a achieve really low >> > deterministic latency. In networks where the packet delay variation >> for a >> > packet grows at each hop it gets very hard to guarantee a very low >> > latency. AVB is working that way and this has its limitations, >> especially >> > in arbitrary big and complex networks (and the goal of AVB was only >> 2ms >> > over 7 hops). In order to get much smaller latencies and simpler ways >> to >> > calculate the worst case latency in a network, a small and bounded >> (not >> > only bounded by the worst case latency) packet delay variation is very >> > important. >> > >> > Regards >> > Christian >> > >> > >> > Von: detnet [mailto:detnet-bounces@ietf.org] Im Auftrag von Norman >> Finn >> > (nfinn) >> > Gesendet: Donnerstag, 9. April 2015 22:53 >> > An: Qin Wang; Patrick Wetterwald (pwetterw); Thomas Watteyne; >> > detnet@ietf.org; 6tisch@ietf.org >> > Betreff: Re: [Detnet] [6tisch] comments on >> > draft-finn-detnet-architecture-00 >> > >> > There are (at least!) two basic models in use, today, for running real >> > time applications over ethernet: >> > >> > 1. Do what the packet says to do when you get the packet. >> > That allows a maximally-stupid end node, but constrains the >> network to >> > have near-0 jitter, or things can happen at the wrong time. This is >> not >> > trivial for the network to do, can require considerable buffering >> > capability, especially applied to multicasts, and VERY quickly ceases >> to >> > scale. >> > 2. Synchronize your clock with everyone else's, then do what the >> packet >> > says to do when the packet says to do it. >> > That requires a somewhat smarter end node, but means that the >> network >> > only has to guarantee a worst-case maximum latency, not a worst-case >> > minimum latency. >> > >> > If I were designing a new application, I would lean towards the second >> > scheme. But, one size definitely doesnââ¬â¢t fit all. >> > >> > ââ¬â Norm >> > >> > From: Qin Wang <qinwang6top@yahoo.com> >> > Reply-To: Qin Wang <qinwang6top@yahoo.com> >> > Date: Thursday, April 9, 2015 at 08:09 AM >> > To: "Patrick Wetterwald (pwetterw)" <pwetterw@cisco.com>, Thomas >> Watteyne >> > <watteyne@eecs.berkeley.edu>, "detnet@ietf.org" <detnet@ietf.org>, " >> > 6tisch@ietf.org" <6tisch@ietf.org> >> > Subject: Re: [Detnet] [6tisch] comments on >> > draft-finn-detnet-architecture-00 >> > >> > Hi Patrick, >> > >> > I don't understand why communication jitter = 0 is so important. >> Assume >> > DetNet can guarantee the maximum end-to-end latency, and there is a >> well >> > designed buffer in the Listener device, then I think the Listener can >> > consume data just on time, in another word, from application point of >> > view, jitter =0. Please point out if I'm wrong. >> > >> > Thanks >> > Qin >> > >> > >> > On Thursday, April 9, 2015 5:03 PM, Patrick Wetterwald (pwetterw) < >> > pwetterw@cisco.com> wrote: >> > >> > Norm, Pascal, >> > >> > Some other comments: >> > >> > If you look at >> > https://tools.ietf.org/html/draft-wetterwald-detnet-utilities-reqs you >> > will see that for some important use cases, the jitter should very >> close >> > to zero. In the architecture draft, you are mainly focussing on the >> > maximum value of the latency and the packet loss (at least in the >> text). >> > This is not sufficient for power automation and tele protection use >> case. >> > We need to be able to deploy deterministic network with Jitter = 0. >> > Second: may be good to reference the requirement drafts in the doc. >> :-) >> > Thanks, >> > >> > Patrick >> > >> > >> > From: Thomas Watteyne <watteyne@eecs.berkeley.edu> >> > Date: Monday 23 March 2015 18:44 >> > To: "detnet@ietf.org" <detnet@ietf.org>, "6tisch@ietf.org" < >> > 6tisch@ietf.org> >> > Subject: [Detnet] comments on draft-finn-detnet-architecture-00 >> > >> > Norm, Pascal, >> > >> > Please find below a number of comment on >> > draft-finn-detnet-architecture-00. >> > >> > Overall, the draft is very well written and highlights important >> points >> > for deterministic networking. >> > >> > My general comments are: >> > - in the context of a low-power wireless network (e.g. 6TiSCH), I >> wonder >> > what you thoughts are on reserving a fixed path. Maybe some extra text >> on >> > redundancy is needed? >> > - would it make sense to discuss the difference between hard and soft >> > real-time, also wrt wireless systems? >> > >> > Thomas >> > >> > --- >> > >> > >> > DetNet N. >> Finn >> > Internet-Draft P. >> Thubert >> > Intended status: Standards Track >> Cisco >> > Expires: September 10, 2015 March 9, >> 2015 >> > >> > >> > Deterministic Networking Architecture >> > draft-finn-detnet-architecture-00 >> > >> > Abstract >> > >> > Deterministic Networking (DetNet) provides a capability to carry >> > specified unicast or multicast data streams for real-time >> > applications with extremely low data loss rates and maximum >> latency. >> > TW> it looks like you aim for maximum latency :) >> > Techniques used include: 1) reserving data plane resources for >> > individual (or aggregated) DetNet streams in some or all of the >> relay >> > systems (bridges or routers) along the path of the stream; 2) >> > providing fixed paths for DetNet streams that do not rapidly change >> > with the network topology; and 3) sequentializing, replicating, and >> > eliminating duplicate packets at various points to ensure the >> > availability of at least one path. The capabilities can be managed >> > by configuration, or by manual or automatic network management. >> > >> > Status of This Memo >> > >> > This Internet-Draft is submitted in full conformance with the >> > provisions of BCP 78 and BCP 79. >> > >> > Internet-Drafts are working documents of the Internet Engineering >> > Task Force (IETF). Note that other groups may also distribute >> > working documents as Internet-Drafts. The list of current >> Internet- >> > Drafts is at http://datatracker.ietf.org/drafts/current/. >> > >> > Internet-Drafts are draft documents valid for a maximum of six >> months >> > and may be updated, replaced, or obsoleted by other documents at >> any >> > time. It is inappropriate to use Internet-Drafts as reference >> > material or to cite them other than as "work in progress." >> > >> > This Internet-Draft will expire on September 10, 2015. >> > >> > Copyright Notice >> > >> > Copyright (c) 2015 IETF Trust and the persons identified as the >> > document authors. All rights reserved. >> > >> > This document is subject to BCP 78 and the IETF Trust's Legal >> > Provisions Relating to IETF Documents >> > (http://trustee.ietf.org/license-info) in effect on the date of >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 1] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > publication of this document. Please review these documents >> > carefully, as they describe your rights and restrictions with >> respect >> > to this document. Code Components extracted from this document >> must >> > include Simplified BSD License text as described in Section 4.e of >> > the Trust Legal Provisions and are provided without warranty as >> > described in the Simplified BSD License. >> > >> > Table of Contents >> > >> > 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . >> 2 >> > 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . >> 4 >> > 3. Providing the DetNet Quality of Service . . . . . . . . . . . >> 5 >> > 3.1. Zero Congestion Loss . . . . . . . . . . . . . . . . . . >> 6 >> > 3.2. Pinned-down paths . . . . . . . . . . . . . . . . . . . . >> 7 >> > 3.3. Seamless Redundancy . . . . . . . . . . . . . . . . . . . >> 7 >> > 4. DetNet Architecture . . . . . . . . . . . . . . . . . . . . . >> 8 >> > 4.1. The Application Plane . . . . . . . . . . . . . . . . . . >> 11 >> > 4.2. The Controller Plane . . . . . . . . . . . . . . . . . . >> 11 >> > 4.3. The Network Plane . . . . . . . . . . . . . . . . . . . . >> 12 >> > 4.4. Elements of DetNet Architecture . . . . . . . . . . . . . >> 13 >> > 4.5. DetNet streams . . . . . . . . . . . . . . . . . . . . . >> 14 >> > 4.5.1. Talker guarantees . . . . . . . . . . . . . . . . . . >> 14 >> > 4.5.2. Incomplete Networks . . . . . . . . . . . . . . . . . >> 15 >> > 4.6. Data Flow Model through Systems . . . . . . . . . . . . . >> 16 >> > 4.7. Queuing, Shaping, Scheduling, and Preemption . . . . . . >> 16 >> > 4.8. Coexistence with normal traffic . . . . . . . . . . . . . >> 16 >> > 4.9. Fault Mitigation . . . . . . . . . . . . . . . . . . . . >> 16 >> > 4.10. Protocol Stack Model . . . . . . . . . . . . . . . . . . >> 17 >> > 4.11. Advertising resources, capabilities and adjacencies . . . >> 17 >> > 4.12. Provisioning model . . . . . . . . . . . . . . . . . . . >> 17 >> > 4.12.1. Centralized Path Computation and Installation . . . >> 17 >> > 4.12.2. Distributed Path Setup . . . . . . . . . . . . . . . >> 17 >> > 5. Related IETF work . . . . . . . . . . . . . . . . . . . . . . >> 18 >> > 5.1. Deterministic PHB . . . . . . . . . . . . . . . . . . . . >> 18 >> > 5.2. 6TiSCH . . . . . . . . . . . . . . . . . . . . . . . . . >> 18 >> > 6. Security Considerations . . . . . . . . . . . . . . . . . . . >> 19 >> > 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . >> 19 >> > 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . >> 19 >> > 9. Informative References . . . . . . . . . . . . . . . . . . . >> 19 >> > Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . >> 23 >> > >> > 1. Introduction >> > >> > Operational Technology (OT) refers to industrial networks that are >> > typically used for monitoring systems and supporting control loops, >> > as well as movement detection systems for use in process control >> > (i.e., process manufacturing) and factory automation (i.e., >> discrete >> > manufacturing). Due to its different goals, OT has evolved in >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 2] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > parallel but in a manner that is radically different from IT/ICT, >> > TW> define IT and ICT at first use >> > focusing on highly secure, reliable and deterministic networks, >> with >> > limited scalability over a bounded area. >> > >> > The convergence of IT and OT technologies, also called the >> Industrial >> > Internet, represents a major evolution for both sides. The work >> has >> > already started; in particular, the industrial automation space has >> > been developing a number of Ethernet-based replacements for >> existing >> > digital control systems, often not packet-based (fieldbus >> > technologies). >> > >> > These replacements are meant to provide similar behavior as the >> > incumbent protocols, and their common focus is to transport >> > TW> "on transporting"? >> > a fully >> > characterized flow over a well-controlled environment (i.e., a >> > factory floor), with a bounded latency, extraordinarily low frame >> > loss, and a very narrow jitter. Examples of such protocols include >> > PROFINET, ODVA Ethernet/IP, and EtherCAT. >> > TW> It might be good to quantify the target latency, packet loss and >> > jitter. >> > TW> I appreciate this is not easy, but one representatve example might >> > help >> > In parallel, the need for determinism in professional and home >> audio/ >> > video markets drove the formation of the Audio/Video Bridging (AVB) >> > standards effort of IEEE 802.1. With the explosion of demand for >> > connectivity and multimedia in transportation in general, the >> > Ethernet AVB technology has become one of the hottest topics, in >> > particular in the automotive connectivity. It is finding >> application >> > in all elements of the vehicle >> > TW> ":" >> > from head units, to rear seat >> > entertainment modules, to amplifiers and camera modules. While >> aimed >> > at less critical applications than some industrial networks, AVB >> > networks share the requirement for extremely low packet loss rates >> > and ensured finite latency and jitter. >> > TW> ensure -> guarantee? >> > >> > Other instances of in-vehicle deterministic networks have arisen as >> > well for control networks in cars, trains and buses, as well as >> > avionics, with, for instance, the mission-critical "Avionics Full- >> > Duplex Switched Ethernet" (AFDX) that was designed as part of the >> > ARINC 664 standards. Existing automotive control networks such as >> > the LIN, CAN and >> > TW> would TTP/C fit in this list? >> > FlexRay standards were not designed to cover these >> > increasing demands in terms of bandwidth and scalability that we >> see >> > with various kinds of Driver Assistance Systems (DAS) and new >> > multiplexing technologies based on Ethernet are now getting >> traction. >> > >> > The generalization of the needs for more deterministic networks >> have >> > led to the IEEE 802.1 AVB Task Group becoming the Time-Sensitive >> > Networking (TSN) Task Group (TG), with a much-expanded constituency >> > from the industrial and vehicular markets. Along with this >> > expansion, the networks in consideration are becoming larger and >> > structured, requiring deterministic forwarding beyond the LAN >> > boundaries. For instance, Industrial Automation segregates the >> > network along the broad lines of the Purdue Enterprise Reference >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 3] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > Architecture (PERA), using different technologies at each level, >> and >> > public infrastructures such as Electricity Automation require >> > deterministic properties over the Wide Area. The realization is >> now >> > coming that the convergence of IT and OT networks requires Layer-3, >> > as well as Layer-2, capabilities. >> > >> > The present architecture is the result of a collaboration of the >> IETF >> > and the IEEE and implements an abstract model that can be >> applicable >> > both at Layer-2 and Layer-3, and along segments of different >> > technologie. >> > TW> typo >> > With this new work, a path may span, for instance, >> > across a (limited) number of 802.1 bridges and then a (limited) >> > number of IP routers. >> > TW> add somethind like "possibly wireless" somewhere? >> > In that example, the IEEE 802.1 bridges may be >> > operating at Layer-2 over Ethernet whereas the IP routers may be >> > 6TiSCH nodes operating at Layer-2 and/or Layer-3 over the IEEE >> > 802.15.4e MAC. >> > >> > Many applications of interest to Deterministic Networking require >> the >> > ability to synchronize the clocks in end systems to a >> sub-microsecond >> > accuracy. >> > TW> why this accuracy? >> > Some of the queue control techniques defined in >> > Section 4.7 also require time synchronization among relay systems. >> > The means used to achieve time synchronization are not addressed in >> > this document. >> > >> > 2. Terminology >> > >> > The follwing >> > TW> typo >> > special terms are used in this document in order to >> > avoid the assumption that a given element in the archetecture >> > TW> typo >> > does or >> > does not have Internet Protocol stack, functions as a router or a >> > bridge, or otherwise plays a particular role at Layer-3 or higher: >> > TW> I don't get the sentence above >> > >> > bridge >> > A Customer Bridge as defined by IEEE 802.1Q >> > [IEEE802.1Q-2011]. >> > >> > circuit >> > A trail of configuration from talker to listener(s) >> > TW> sender and receiver might be more common at the IETF? >> > through >> > relay systems associated with a DetNet stream, required to >> > deliver the benefits of DetNet. >> > >> > end system >> > Commonly called a "host" in IETF documents, and an "end >> > station" is IEEE 802 documents. End systems of interest to >> > this document are talkers and listeners. >> > >> > listener >> > An end system capable of sinking a DetNet stream. >> > >> > relay system >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 4] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > A router or a bridge. >> > >> > TW> maybe add "layer 2 bridge" and "layer 3 router" for clarity? >> > >> > >> > stream >> > A DetNet stream is a sequence of packets from a single >> > talker, through some number of relay systems to one or more >> > listeners, that is limited by the talker in its maximum >> > packet size and transmission rate, and can thus be ensured >> > the DetNet Quality of Service (QoS) from the network. >> > >> > talker >> > An end system capable of sourcing a DetNet stream. >> > >> > 3. Providing the DetNet Quality of Service >> > >> > DetNet Quality of Service is expressed in terms of: >> > >> > o Minimum and maximum end-to-end latency from talker to listener; >> > >> > o Probability of loss of a packet, assuming the normal operation >> of >> > the relay systems and links; >> > >> > o Probability of loss of a packet in the event of the failure of a >> > relay system or link. >> > >> > It is a distinction of DetNet that it is concerned solely with >> worst- >> > case values for all of the above parameters. Average, mean, or >> > typical values are of no interest, because they do not affect the >> > ability of a real-time system to perform its tasks. >> > TW> Would it make sense to discuss hard and soft real-time here, in >> > TW> particular in the context of a wireless system? >> > >> > >> > Three techniques are employed by DetNet to achieve these QoS >> > parameters: >> > >> > a. Zero congestion loss (Section 3.1). Network resources such as >> > link bandwidth, buffers, queues, shapers, and scheduled input/ >> > TW> add 6TiSCH cells? >> > output slots are assigned in each relay system to the use of a >> > specific DetNet stream or group of streams. Note that, given a >> > finite amount of buffer space) >> > TW> extra ")" >> > , zero congestion loss necessarily >> > ensures a maximum end-to-end latency. Depending on the method >> > employed, a minimum latency can also be achieved. >> > >> > b. Pinned-down paths (Section 3.2). Point-to-point paths or >> point- >> > to-multipoint trees through the network from a talker to one or >> > more listeners can be established, and DetNet streams assigned >> to >> > follow a particular path or tree. >> > TW> Using a single path in a wireless system will fail, I would >> recommend >> > TW> discussing here path redundancy, for example through DAGs >> > >> > c. Packet replication and deletion (Section 3.3). End systems >> and/ >> > or relay systems can sequence number, replicate, and eliminate >> > replicated packets at multiple points in the network in order >> to >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 5] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > ensure that one (or more) equipment failure events still leave >> at >> > least one path intact for a DetNet stream. >> > >> > These three techniques can be applied independently, giving eight >> > possible combinations, including none (no DetNet), although some >> > combinations are of wider utility than others. This separation >> keeps >> > the protocol stack coherent and maximizes interoperability with >> > existing and developing standards in this (IETF) and other >> Standards >> > Development Organizations. Some examples of typical expected >> > combinations: >> > >> > o Pinned-down paths (a) plus packet replication (b) are exactly >> the >> > techniques employed by [HSR-PRP]. Pinned-down paths are achieve >> > by limiting the physical topology of the network, and the >> > sequentialization, replication, and duplicate elimination >> > facilitated by packet tags added at the front or the end of >> > Ethernet frames. >> > >> > o Zero congestion loss (a) alone is is offered by IEEE 802.1 Audio >> > Video bridging [IEEE802.1BA-2011]. As long as the network >> suffers >> > no failures, near-zero (at best, zero) congestion loss can be >> > achieved through the use of a reservation protocol (MSRP) and >> > shapers in every relay system (bridge). >> > >> > o Using all three together gives maximum protection. >> > >> > There are, of course, simpler methods available (and employed, >> today) >> > to achieve levels of latency and packet loss that are satisfactory >> > for many applications. However, these methods generally work best >> in >> > the absence of any significant amount of non-critical traffic in >> the >> > network (if, indeed, such traffic is supported at all), or work >> only >> > if the critical traffic constitutes only a small portion of the >> > network's theoretical capacity, or work only if all systems are >> > functioning properly, or in the absence of actions by end systems >> > that disrupt the network's operations. >> > >> > There are any number of methods in use, defined, or in progress for >> > accomplishing each of the above techniques. It is expected that >> this >> > DetNet Architecture will assist various vendors, users, and/or >> > "vertical" Standards Development Organizations (dedicated to a >> single >> > industry) to make selections among the available means of >> > implementing DetNet networks. >> > >> > 3.1. Zero Congestion Loss >> > >> > The primary means by which DetNet achieves its QoS assurances is to >> > completely eliminate congestion at an output port as a cause of >> > packet loss. Given that a DetNet stream cannot be throttled, this >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 6] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > can be achieved only by the provision of sufficient buffer storage >> at >> > each hop through the network to ensure that no packets are dropped >> > due to a lack of buffer storage. >> > TW> and the provision the sufficient link bandwidth? >> > >> > Ensuring adequate buffering requires, in turn, that the talker, and >> > every relay system along the path to the listener (or nearly every >> > relay system -- see Section 4.5.2) be careful to regulate its >> output >> > to not exceed the data rate for any stream, except for brief perios >> > TW> typo >> > when making up for interfering traffic. Any packet sent ahead of >> its >> > time potentially adds to the number of buffers required by the next >> > hop, and may thus exceed the resources allocated for a particular >> > stream. >> > >> > The low-level mechanisms described in Section 4.7 provide the >> > necessary regulation of transmissions by an edge system or relay >> > system to ensure zero congestion loss. Of course, the reservation >> of >> > the bandwidth and buffers for a stream requires the provisioning >> > described in Section 4.12. >> > >> > 3.2. Pinned-down paths >> > >> > In networks controlled by typical peer-to-peer protocols such as >> IEEE >> > 802.1 ISIS bridged networks or ETF OSPF routed networks, a network >> > topology event in one part of the network can impact, at least >> > briefly, the delivery of data in parts of the network remote from >> the >> > failure or recovery event. Thus, even redundant paths through a >> > network, if controlled by the typical peer-to-peer protocols, do >> not >> > eliminate the chances of brief losses of contact. For this reason, >> > many real-time networks rely on physical rings of two-port devices, >> > with a relatively simple ring control protocol. This both >> minimizes >> > recovery time and easily supports redundant paths. Of course, this >> > comes at the cost of increased hop count, and thus latency, for the >> > typical path. >> > >> > In order to get the advantages of low hop count and still ensure >> > against even brief losses of connectivity, DetNet employs >> pinned-down >> > paths, where the path taken by a given DetNet stream does not >> change, >> > at least immediately, and likely not at all, in response to network >> > topology events. When combined with seamless redundancy >> > (Section 3.3), this results in a high likelihood of continuous >> > connectivity. >> > >> > 3.3. Seamless Redundancy >> > >> > After congestion loss has been eliminated, the most important >> causes >> > of packet loss are random media and/or memory faults and equipment >> > failures. >> > >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 7] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > Seamless redundancy involves three capabilities: >> > >> > o Adding sequence numbers to the packets of a DetNet stream. >> > >> > o Replicating these packets and, typically, sending them along at >> > least two different paths to the listener(s). >> > >> > o Discarding duplicated packets. >> > >> > In the simplest case, this amounts to replicating each packet in a >> > talker that has two interfaces, and conveying them through the >> > network, along separate paths, to the similarly dual-homed >> listeners, >> > that discard the extras. This ensures that one path (with zero >> > congestion loss) remains, even if some relay system fails. >> > TW> this has some energy cost associated? >> > >> > Alternatively, relay systems in the network can provide replication >> > and elimination facilities at various points in the network, so >> that >> > multiple failures can be accommodated. >> > >> > This is shown in the following figure, where the two relay systems >> > each replicate (R) the DetNet stream on input, sending the stream >> to >> > both the other relay system and to the end system, and eliminated >> > duplicates (E) on the output interface to the right-hand end >> system. >> > Any one links >> > TW> typo >> > in the network can fail, and the Detnet stream can >> > still get through. Furthermore, two links can fail, as long as >> they >> > are in different segments of the network. >> > >> > > > > > > > > > relay > > > > > > > > >> > > /------------+ R system E +------------\ > >> > > / v + ^ \ > >> > end R + v | ^ + E end >> > system + v | ^ + system >> > > \ v + ^ / > >> > > \------------+ R relay E +------------/ > >> > > > > > > > > > system > > > > > > > > >> > >> > Figure 1 >> > TW> I don't understand what R and E means >> > >> > 4. DetNet Architecture >> > >> > Traffic Engineering Architecture and Signaling (TEAS) [TEAS] >> defines >> > traffic-engineering architectures for generic applicability across >> > packet and non-packet networks. From TEAS perspective, Traffic >> > Engineering (TE) refers to techniques that enable operators to >> > control how specific traffic flows are treated within their >> networks. >> > >> > Because if its very nature of establishing pinned-down optimized >> > paths, Deterministic Networking can be seen as a new, specialized >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 8] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > branch of Traffic Engineering, and inherits its architecture with a >> > separation into planes. >> > >> > The Deterministic Networking architecture is thus composed of three >> > planes, a (User) Application Plane, a Controller Plane, and a >> Network >> > Plane, which echoes that of Software-Defined Networking (SDN): >> > TW> double ":" >> > Layers >> > and Architecture Terminology [RFC7426] which is represented below: >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 9] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > SDN Layers and Architecture Terminology per RFC 7426 >> > >> > o--------------------------------o >> > | | >> > | +-------------+ +----------+ | >> > | | Application | | Service | | >> > | +-------------+ +----------+ | >> > | Application Plane | >> > o---------------Y----------------o >> > | >> > *-----------------------------Y---------------------------------* >> > | Network Services Abstraction Layer (NSAL) >> | >> > *------Y------------------------------------------------Y-------* >> > | | >> > | Service Interface | >> > | | >> > o------Y------------------o >> o---------------------Y------o >> > | | Control Plane | | Management Plane | >> | >> > | +----Y----+ +-----+ | | +-----+ +----Y----+ >> | >> > | | Service | | App | | | | App | | Service | >> | >> > | +----Y----+ +--Y--+ | | +--Y--+ +----Y----+ >> | >> > | | | | | | | >> | >> > | *----Y-----------Y----* | | *---Y---------------Y----* >> | >> > | | Control Abstraction | | | | Management Abstraction | >> | >> > | | Layer (CAL) | | | | Layer (MAL) | >> | >> > | *----------Y----------* | | *----------Y-------------* >> | >> > | | | | | >> | >> > o------------|------------o >> o------------|---------------o >> > | | >> > | CP | MP >> > | Southbound | Southbound >> > | Interface | Interface >> > | | >> > *------------Y---------------------------------Y----------------* >> > | Device and resource Abstraction Layer (DAL) >> | >> > *------------Y---------------------------------Y----------------* >> > | | | >> | >> > | o-------Y----------o +-----+ o--------Y----------o >> | >> > | | Forwarding Plane | | App | | Operational Plane | >> | >> > | o------------------o +-----+ o-------------------o >> | >> > | Network Device >> | >> > +---------------------------------------------------------------+ >> > >> > Figure 2 >> > >> > >> > >> > >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 10] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > 4.1. The Application Plane >> > >> > Per [RFC7426], the Application Plane includes both applications and >> > services. In particular, the Application Plane incorporates the >> User >> > Agent, a specialized application that interacts with the end user / >> > operator and performs requests for Deterministic Networking >> services >> > via an abstract Stream Management Entity, (SME) which may or may >> not >> > be collocated with (one of) the end systems. >> > >> > At the Application Plane, a management interface enables the >> > negotiation of streams between end systems. An abstraction of the >> > stream called a Traffic Specification (TSpec) provides the >> > representation. This abstraction is used to place a reservation >> over >> > the (Northbound) Service Interface and within the Application >> plane. >> > It is associated with an abstraction of location, such as IP >> > addresses and DNS names, to identify the end systems and eventually >> > specify intermediate relay systems. >> > >> > 4.2. The Controller Plane >> > >> > The Controller Plane corresponds to the aggregation of the Control >> > and Management Planes in [RFC7426], though Common Control and >> > Measurement Plane (CCAMP) [CCAMP] makes an additional distinction >> > between management and measurement. When the logical separation of >> > the Control, Measurement and other Management entities is not >> > relevant, the term Controller Plane is used for simplicity to >> > represent them all, and the term controller refers to any device >> > operating in that plane, whether is it a Path Computation entity or >> a >> > Network Management entity (NME). The Path Computation Element >> (PCE) >> > [PCE] is a core element of a controller, in charge of computing >> > Deterministic paths to be applied in the Network Plane. >> > >> > A (Northbound) Service Interface enables applications in the >> > Application Plane to communicate with the entities in the >> Controller >> > Plane. >> > >> > >> > TW> could you define NME, SME and PCE in the terminology? >> > >> > One or more PCE(s) collaborate to implement the requests from the >> SME >> > as Per-Stream Per-Hop Behaviors installed in the relay systems for >> > each individual streams. The PCEs place each stream along a >> > deterministic sequence of relay systems so as to respect per-stream >> > constraints such as security and latency, and optimize the overall >> > result for metrics such as an abstract aggregated cost. The >> > deterministic sequence can typically be more complex than a direct >> > sequence and include redundancy path, with one or more packet >> > replication and elimination points. >> > >> > >> > >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 11] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > 4.3. The Network Plane >> > >> > The Network Plane represents the network devices and protocols as a >> > whole, regardless of the Layer at which the network devices >> operate. >> > >> > The network Plane comprises the Network Interface Cards (NIC) in >> the >> > end systems, which are typically IP hosts, and relay systems, which >> > are typically IP routers and switches. Network-to-Network >> Interfaces >> > such as used for Traffic Engineering path reservation in [RFC3209], >> > as well as User-to-Network Interfaces (UNI) such as provided by the >> > Local Management Interface (LMI) between network and end systems, >> are >> > all part of the Network Plane. >> > >> > A Southbound (Network) Interface enables the entities in the >> > Controller Plane to communicate with devices in the Network Plane. >> > This interface leverages and extends TEAS to describe the physical >> > topology and resources in the Network Plane. >> > >> > Stream Management Entity >> > >> > End End >> > System System >> > >> > -+-+-+-+-+-+-+ Northbound -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- >> > >> > PCE PCE PCE PCE >> > >> > -+-+-+-+-+-+-+ Southbound -+-+-+-+-+-+-+-+-+-+--+-+-+-+-+-+- >> > >> > Relay Relay Relay Relay >> > System System System System >> > NIC NIC >> > Relay Relay Relay Relay >> > System System System System >> > >> > Figure 3 >> > >> > The relay systems (and eventually the end systems NIC) expose their >> > capabilities and physical resources to the controller (the PCE), >> and >> > update the PCE with their dynamic perception of the topology, >> across >> > the Southbound Interface. In return, the PCE(s) set the per-stream >> > paths up, providing a Stream Characterization that is more tightly >> > coupled to the relay system Operation than a TSpec. >> > >> > At the Network plane, relay systems exchange information regarding >> > the state of the paths, between adjacent systems and eventually >> with >> > the end systems, and forward packets within constraints associated >> to >> > >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 12] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > each stream, or, when unable to do so, perform a last resort >> > operation such as drop or declassify. >> > >> > This specification focuses on the Southbound interface and the >> > operation of the Network Plane. >> > >> > 4.4. Elements of DetNet Architecture >> > >> > The DetNet architecture has a number of elements, discussed in the >> > following sections: >> > >> > a. A model for the definition, identification, and operation of >> > DetNet streams (Section 4.5), for use by relay systems to >> > classify and process individual packets following per-stream >> > rules. >> > TW> how is a packet "labeled" as part of stream? >> > >> > b. A model for the flow of data from an end system or through a >> > relay system that can be used to predict the bounds for that >> > system's impact on the QoS of a DetNet stream, without >> > significantly constraining the method of implementing that >> > system, for use by the Controllers to configure policing and >> > shaping engines in Network Systems over the Southbound >> interface. >> > The model includes: >> > >> > 1. A model for queuing, transmission selection, shaping, >> > preemption, and timing resources that can be used by an end >> > system or relay system to control the selection of packets >> > output on an interface. These models must have >> sufficiently >> > well-defined characteristics, both individually and in the >> > aggregate, to give predictable results for the QoS for >> DetNet >> > packets (Section 4.7). >> > >> > 2. A model for identifying misbehaving DetNet streams and >> > mitigating their impact on properly functioning streams >> > (Section 4.9). >> > >> > c. A model for the relay system to inform the controller(s) of the >> > information it needs for adequate path computations including: >> > >> > 1. Systems' individual capabilities (e.g. can do replication, >> > can do precise time). >> > >> > 2. Link capabilities and resources (e.g. bandwidth, 0 delays, >> > hardware deterministic support to the physical layer, ...) >> > >> > 3. hysical >> > TW> typo >> > resources (total and available buffers, timers, >> > queues, etc) >> > >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 13] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > 4. Network Adjacencies (neighbors) >> > >> > d. A model for the provision of a service, by end systems, or >> relay >> > systems, to forward a DetNet stream over a simple or redundant >> > path. The model includes: >> > >> > 1. A model for an abstract relaying operation of either >> Routing >> > or forwarding packets of a DetNet stream to a next-hop >> relay >> > system, across Layer boundaries. >> > >> > 2. A model of next-hop(s) information for replicating the >> > packets of a DetNet stream, typically at or near the >> talker, >> > merging and/or re-replicating those packets at other points >> > in the network, and finally eliminating the duplicates, >> > typically at or near the listener(s), in order to provide >> > high availability (Section 3.3). >> > >> > e. The protocol stack model for an end system and/or a relay >> system >> > should support the above elements in a manner that maximizes >> the >> > applicability of existing standards and protocols to the DetNet >> > problem, allows for the creation of new protocols where needed, >> > thus making DetNet an add-on feature to existing networks, >> rather >> > than a new way to do networking. In particular this protocol >> > stack supports networks in which the path from talker to >> > listener(s) includes bridges and/or routers in any order >> > (Section 4.10). >> > >> > f. A variety of models for the provisioning of DetNet streams can >> be >> > envisioned, including orchestration by a central controller or >> by >> > a federation of controllers, provisioning by relay systems and >> > end systems sharing peer-to-peer protocols, by off-line >> > configuration, or by a combination of these methods. The >> > provisioning models are similar to existing Layer-2 and Layer-3 >> > models, in order to minimize the amount of innovation required >> in >> > this area (Section 4.12). >> > >> > 4.5. DetNet streams >> > >> > 4.5.1. Talker guarantees >> > >> > DetNet streams can by synchronous or asynchronous. The >> transmission >> > of packets in synchronous DetNet streams uses time synchronization >> > among the end and relay systems to control the flow of packets. >> > Asynchronous DetNet streams are characterized by: >> > >> > o A maximum packet size; >> > >> > o An observation interval; and >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 14] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > o A maximum number of transmissions during that observation >> > interval. >> > >> > These parameters, together with knowledge of the protocol stack >> used >> > (and thus the size of the various headers added to a packet), limit >> > the number of bit times per observation interval that the DetNet >> > stream can occupy the physical medium. >> > >> > The talker promises that these limits will not be exceeded. If the >> > talker transmits less data than this limit allows, the unused >> > resources such as link bandwidth can be made available by the >> system >> > to non-DetNet packets. However, making those resources available >> to >> > DetNet packets in other streams would serve no purpose. Those >> other >> > streams have their own dedicated resources, on the assumption that >> > all DetNet streams can use all of their resources over a long >> period >> > of time. >> > >> > Note that there is no provision in DetNet for throttling streams; >> the >> > assumption is that a DetNet stream, to be useful, must be delivered >> > in its entirety. That is, while any useful application is written >> to >> > expect a certain number of lost packets, the real-time applications >> > of interest to DetNet demand that the loss of data due to the >> network >> > is extraordinarily infrequent. >> > >> > Although DetNet strives to minimize the changes required of an >> > application to allow it to shift from a special-purpose digital >> > network to an Internet Protocol network, one fundamental shift in >> the >> > behavior of network applications that is impossible to avoid--the >> > reservation of resources before the application starts. In the >> first >> > place, a network cannot deliver finite latency and practically zero >> > packet loss to an arbitrarily high offered load. Secondly, >> achieving >> > practically zero packet loss for unthrottled (though bandwidth >> > limited) streams means that bridges and routers have to dedicate >> > buffer resources to specific streams or to classes of streams. The >> > requirements of each reservation have to be translated into the >> > parameters that control each system's queuing, shaping, and >> > scheduling functions and delivered to the hosts, bridges, and >> > routers. >> > >> > 4.5.2. Incomplete Networks >> > >> > The presence in the network of relay systems that are not fully >> > capable of offering DetNet services complicates the ability of the >> > relay systems and/or controller to allocate resources, as extra >> > buffering, and thus extra latency, must be allocated at each point >> > that is downstream from the non-DetNet relay system for some DetNet >> > stream. >> > >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 15] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > 4.6. Data Flow Model through Systems >> > >> > 4.7. Queuing, Shaping, Scheduling, and Preemption >> > >> > For this reason, the IEEE 802.1 Time-Sensitive Networking Task >> Group >> > has defined a set of queuing, shaping, and scheduling algorithms >> that >> > enable each bridge or router to compute the exact number of buffers >> > to be allocated for each stream or class of streams. >> > >> > 4.8. Coexistence with normal traffic >> > >> > A DetNet network supports the dedication of at least 75% of the >> > network bandwidth to DetNet streams. But, no matter how much is >> > dedicated for DetNet streams, It is z >> > TW> typo >> > goal of DetNet to not interfere >> > excessively with existing QoS schemes. It is also important that >> > non-DetNet traffic not disrupt the DetNet stream, of course (see >> > Section 4.9 and Section 6). For these reasons: >> > >> > o Bandwidth (transmission opportunities) not utilized by a DetNet >> > stream are available to non-DetNet packets (though not to other >> > DetNet streams). >> > >> > o DetNet streams can be shaped, in order to ensure that the >> highest- >> > priority non-DetNet packet also is ensured a maximum latency. >> > >> > o When transmission opportunities for DetNet streams are scheduled >> > in detail, then the algorithm constructing the schedule should >> > leave sufficient opportunities for non-DetNet packets to satisfy >> > the needs of the uses of the network. >> > >> > Ideally, the net effect of the presence of DetNet streams in a >> > network on the non-DetNet packets is primarily a reductoin >> > TW> typo >> > in the >> > available bandwidth. >> > >> > 4.9. Fault Mitigation >> > >> > One key to building robust real-time systems is to reduce the >> > infinite variety of possible failures to a number that can be >> > analyzed with reasonable confidence. DetNet aids in the process by >> > providing filters and policers to detect DetNet packets received on >> > the wrong interface, or at the wrong time, or in too great a >> volume, >> > and to then take actions such as disabling the offending packet, >> > shutting down the offending DetNet stream, or shutting down the >> > offending interface. >> > >> > It is also essential that filters and service remarking >> > TW> please define "service remarking" >> > be employed >> > to prevent non-DetNet packets from impinging on the resources >> > allocated to DetNet packets. >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 16] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > There exist techniques, at present and/or in various stages of >> > standardization, that can perform these fault mitigation tasks that >> > deliver a high probability that misbehaving systemd >> > TW> typo >> > will have zero >> > impact on well-behaved DetNet streams, except of course, for the >> > receiving interface(s) immediately downstream of the misbehaving >> > device. >> > >> > 4.10. Protocol Stack Model >> > >> > This section will be further developed. See [IEEE802.1CB], Annex >> C, >> > for a description of the protocol stack. This is very much a work >> in >> > progress, not a standard. See also [IEEE802.1Qcc]. >> > >> > 4.11. Advertising resources, capabilities and adjacencies >> > >> > 4.12. Provisioning model >> > >> > 4.12.1. Centralized Path Computation and Installation >> > >> > A centralized routing model, such as provided with a PCE (RFC 4655 >> > [RFC4655]), enables global and per-stream optimizations. The model >> > is attractive but a number of issues are left to be solved. In >> > particular: >> > >> > o whether and how the path computation can be installed by 1) an >> end >> > device or 2) a Network Management entity, >> > >> > o and how the path is set up, either by installing state at each >> hop >> > with a direct interaction between the forwarding device and the >> > PCE, or along a path by injecting a source-routed request at one >> > end of the path. >> > >> > 4.12.2. Distributed Path Setup >> > >> > Whether a distributed alternative without a PCE can be valuable >> > should be studied as well. Such an alternative could for instance >> > inherit from the Resource ReSerVation Protocol [RFC5127] (RSVP) >> > flows. >> > >> > In a Layer-2 only environment, or as part of a layered approach to >> a >> > mixed environment, IEEE 802.1 also has work, either completed or in >> > progress. [IEEE802.1Q-2011] Clause 35 describes SRP, a >> peer-to-peer >> > protocol for Layer-2 roughly analogous to RSVP. Almost complete is >> > [IEEE802.1Qca], which defines how ISIS can provide multiple >> disjoint >> > paths or distribution trees. Also in progress is [IEEE802.1Qcc], >> > which expands the capabilities of SRP. >> > >> > >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 17] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > 5. Related IETF work >> > >> > 5.1. Deterministic PHB >> > >> > [I-D.svshah-tsvwg-deterministic-forwarding] defines a >> Differentiated >> > Services Per-Hop-Behavior (PHB) Group called Deterministic >> Forwarding >> > (DF). The document describes the purpose and semantics of this >> PHB. >> > It also describes creation and forwarding treatment of the service >> > class. The document also describes how the code-point can be >> mapped >> > into one of the aggregated Diffserv service classes [RFC5127]. >> > >> > 5.2. 6TiSCH >> > >> > Industrial process control already leverages deterministic wireless >> > Low power and Lossy Networks (LLNs) to interconnect critical >> > resource-constrained devices and form wireless mesh networks, with >> > standards such as [ISA100.11a] and [WirelessHART]. >> > >> > These standards rely on variations of the [IEEE802154e] timeSlotted >> > Channel Hopping (TSCH) [I-D.ietf-6tisch-tsch] Medium Access Control >> > (MAC), and a form of centralized Path Computation Element (PCE), to >> > deliver deterministic capabilities. >> > >> > The TSCH MAC benefits include high reliability against >> interference, >> > low power consumption on characterized streams, and Traffic >> > Engineering capabilities. Typical applications are open and closed >> > control loops, as well as supervisory control streams and >> management. >> > >> > The 6TiSCH Working Group focuses only on the TSCH mode of the IEEE >> > 802.15.4e standard. The WG currently defines a framework for >> > managing the TSCH schedule. Future work will standardize >> > deterministic operations over so-called tracks as described in >> > [I-D.ietf-6tisch-architecture]. Tracks are an instance of a >> > deterministic path, and the DetNet work is a prerequisite to >> specify >> > track operations and serve process control applications. >> > >> > [RFC5673] and [I-D.ietf-roll-rpl-industrial-applicability] section >> > 2.1.3. and next discusses application-layer paradigms, such as >> > Source-sink (SS) that is a Multipeer to Multipeer (MP2MP) model >> that >> > is primarily used for alarms and alerts, Publish-subscribe (PS, or >> > pub/sub) that is typically used for sensor data, as well as >> Peer-to- >> > peer (P2P) and Peer-to-multipeer (P2MP) communications. Additional >> > considerations on Duocast and its N-cast generalization are also >> > provided for improved reliability. >> > >> > >> > >> > >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 18] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > 6. Security Considerations >> > >> > Security in the context of Deterministic Networking has an added >> > dimension; the time of delivery of a packet can be just as >> important >> > as the contents of the packet, itself. A man-in-the-middle attack, >> > for example, can impose, and then systematically adjust, additional >> > delays into a link, and thus disrupt or subvert a real-time >> > application without having to crack any encryption methods >> employed. >> > See [RFC7384] for an exploration of this issue in a related >> context. >> > >> > Furthermore, in a control system where millions of dollars of >> > equipment, or even human lives, can be lost if the DetNet QoS is >> not >> > delivered, one must consider not only simple equipment failures, >> > where the box or wire instantly becomes perfectly silent, but >> bizarre >> > errors such as can be coused >> > TW> typo >> > by software failures. Because there is >> > essentiall >> > TW> typo >> > no limit to the kinds of failures that can occur, >> > protecting against realistic equipment failures is >> indistinguishable, >> > in most cases, from protecting against malicious behavior, whether >> > accidental or intentional. See also Section 4.9. >> > >> > Security must cover: >> > >> > o the protection of the signaling protocol >> > >> > o the authentication and authorization of the controlling systems >> > >> > o the identification and shaping of the streams >> > >> > 7. IANA Considerations >> > >> > This document does not require an action from IANA. >> > >> > 8. Acknowledgements >> > >> > The authors wish to thank Jouni Korhonen, Erik Nordmark, George >> > Swallow, Rudy Klecka, Anca Zamfir, David Black, Thomas Watteyne, >> > Shitanshu Shah, Craig Gunther, Rodney Cummings, Wilfried Steiner, >> > Marcel Kiessling, Karl Weber, Ethan Grossman and Pat Thaler, for >> > their various contribution with this work. >> > >> > 9. Informative References >> > >> > [AVnu] http://www.avnu.org/, "The AVnu Alliance tests and >> > certifies devices for interoperability, providing a >> simple >> > and reliable networking solution for AV network >> > implementation based on the Audio Video Bridging (AVB) >> > standards.", . >> > >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 19] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > [CCAMP] IETF, "Common Control and Measurement Plane", >> > <https://datatracker.ietf.org/doc/charter-ietf-ccamp/>. >> > >> > [HART] www.hartcomm.org, "Highway Addressable Remote >> Transducer, >> > a group of specifications for industrial process and >> > control devices administered by the HART Foundation", . >> > >> > [HSR-PRP] IEC, "High availability seamless redundancy (HSR) is a >> > further development of the PRP approach, although HSR >> > functions primarily as a protocol for creating media >> > redundancy while PRP, as described in the previous >> > section, creates network redundancy. PRP and HSR are >> both >> > described in the IEC 62439 3 standard.", >> > <http://webstore.iec.ch/webstore/webstore.nsf/ >> > artnum/046615!opendocument>. >> > >> > [I-D.finn-detnet-problem-statement] >> > Finn, N. and P. Thubert, "Deterministic Networking >> Problem >> > Statement", draft-finn-detnet-problem-statement-01 (work >> > in progress), October 2014. >> > >> > [I-D.ietf-6tisch-architecture] >> > Thubert, P., Watteyne, T., Struik, R., and M. >> Richardson, >> > "An Architecture for IPv6 over the TSCH mode of IEEE >> > 802.15.4e", draft-ietf-6tisch-architecture-05 (work in >> > progress), January 2015. >> > >> > [I-D.ietf-6tisch-tsch] >> > Watteyne, T., Palattella, M., and L. Grieco, "Using >> > IEEE802.15.4e TSCH in an IoT context: Overview, Problem >> > Statement and Goals", draft-ietf-6tisch-tsch-05 (work in >> > progress), January 2015. >> > >> > [I-D.ietf-roll-rpl-industrial-applicability] >> > Phinney, T., Thubert, P., and R. Assimiti, "RPL >> > applicability in industrial networks", draft-ietf-roll- >> > rpl-industrial-applicability-02 (work in progress), >> > October 2013. >> > >> > [I-D.svshah-tsvwg-deterministic-forwarding] >> > Shah, S. and P. Thubert, "Deterministic Forwarding PHB", >> > draft-svshah-tsvwg-deterministic-forwarding-03 (work in >> > progress), March 2015. >> > >> > [IEEE802.1AS-2011] >> > IEEE, "Timing and Synchronizations (IEEE 802.1AS-2011)", >> > 2011, <http://standards.ieee.org/getIEEE802/ >> > download/802.1AS-2011.pdf>. >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 20] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > [IEEE802.1BA-2011] >> > IEEE, "AVB Systems (IEEE 802.1BA-2011)", 2011, >> > <http://standards.ieee.org/getIEEE802/ >> > download/802.1BA-2011.pdf>. >> > >> > [IEEE802.1CB] >> > IEEE, "Seamless Redundancy (IEEE Draft P802.1CB)", 2015, >> > <http://p8021:go_wildcats@www.ieee802.org/1/files/private/ >> > cb-drafts/>. >> > >> > [IEEE802.1Q-2011] >> > IEEE, "MAC Bridges and VLANs (IEEE 802.1Q-2011", 2011, >> > <http://standards.ieee.org/getIEEE802/ >> > download/802.1Q-2011.pdf>. >> > >> > [IEEE802.1Qat-2010] >> > IEEE, "Stream Reservation Protocol (IEEE >> 802.1Qat-2010)", >> > 2010, <http://standards.ieee.org/getIEEE802/ >> > download/802.1Qat-2010.pdf>. >> > >> > [IEEE802.1Qav] >> > IEEE, "Forwarding and Queuing (IEEE 802.1Qav-2009)", >> 2009, >> > <http://standards.ieee.org/getIEEE802/ >> > download/802.1Qav-2009.pdf>. >> > >> > [IEEE802.1Qca] >> > IEEE, "Path Control and Reservation", 2015, >> > <http://p8021:go_wildcats@www.ieee802.org/1/files/private/ >> > ca-drafts/>. >> > >> > [IEEE802.1Qcc] >> > IEEE, "Stream Reservation Protocol (SRP) Enhancements >> and >> > Performance Improvements", 2015, >> > <http://p8021:go_wildcats@www.ieee802.org/1/files/private/ >> > cc-drafts/>. >> > >> > [IEEE802.1TSNTG] >> > IEEE Standards Association, "IEEE 802.1 Time-Sensitive >> > Networks Task Group", 2013, >> > <http://www.IEEE802.org/1/pages/avbridges.html>. >> > >> > [IEEE802154] >> > IEEE standard for Information Technology, "IEEE std. >> > 802.15.4, Part. 15.4: Wireless Medium Access Control >> (MAC) >> > and Physical Layer (PHY) Specifications for Low-Rate >> > Wireless Personal Area Networks", June 2011. >> > >> > >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 21] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > [IEEE802154e] >> > IEEE standard for Information Technology, "IEEE std. >> > 802.15.4e, Part. 15.4: Low-Rate Wireless Personal Area >> > Networks (LR-WPANs) Amendment 1: MAC sublayer", April >> > 2012. >> > >> > [ISA100.11a] >> > ISA/IEC, "ISA100.11a, Wireless Systems for Automation, >> > also IEC 62734", 2011, < http://www.isa100wci.org/en- >> > US/Documents/PDF/3405-ISA100-WirelessSystems-Future-broch- >> > WEB-ETSI.aspx>. >> > >> > [ODVA] http://www.odva.org/, "The organization that supports >> > network technologies built on the Common Industrial >> > Protocol (CIP) including EtherNet/IP.", . >> > >> > [PCE] IETF, "Path Computation Element", >> > <https://datatracker.ietf.org/doc/charter-ietf-pce/>. >> > >> > [Profinet] >> > http://us.profinet.com/technology/profinet/, "PROFINET >> is >> > a standard for industrial networking in automation.", >> > <http://us.profinet.com/technology/profinet/>. >> > >> > [RFC2205] Braden, B., Zhang, L., Berson, S., Herzog, S., and S. >> > Jamin, "Resource ReSerVation Protocol (RSVP) -- Version >> 1 >> > Functional Specification", RFC 2205, September 1997. >> > >> > [RFC3209] Awduche, D., Berger, L., Gan, D., Li, T., Srinivasan, >> V., >> > and G. Swallow, "RSVP-TE: Extensions to RSVP for LSP >> > Tunnels", RFC 3209, December 2001. >> > >> > [RFC4655] Farrel, A., Vasseur, J., and J. Ash, "A Path Computation >> > Element (PCE)-Based Architecture", RFC 4655, August >> 2006. >> > >> > [RFC5127] Chan, K., Babiarz, J., and F. Baker, "Aggregation of >> > Diffserv Service Classes", RFC 5127, February 2008. >> > >> > [RFC5673] Pister, K., Thubert, P., Dwars, S., and T. Phinney, >> > "Industrial Routing Requirements in Low-Power and Lossy >> > Networks", RFC 5673, October 2009. >> > >> > [RFC7384] Mizrahi, T., "Security Requirements of Time Protocols in >> > Packet Switched Networks", RFC 7384, October 2014. >> > >> > >> > >> > >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 22] >> > Internet-Draft Deterministic Networking Architecture March >> 2015 >> > >> > >> > [RFC7426] Haleplidis, E., Pentikousis, K., Denazis, S., Hadi >> Salim, >> > J., Meyer, D., and O. Koufopavlou, "Software-Defined >> > Networking (SDN): Layers and Architecture Terminology", >> > RFC 7426, January 2015. >> > >> > [TEAS] IETF, "Traffic Engineering Architecture and Signaling", >> > <https://datatracker.ietf.org/doc/charter-ietf-teas/>. >> > >> > [WirelessHART] >> > www.hartcomm.org, "Industrial Communication Networks - >> > Wireless Communication Network and Communication >> Profiles >> > - WirelessHART - IEC 62591", 2010. >> > >> > Authors' Addresses >> > >> > Norm Finn >> > Cisco Systems >> > 170 W Tasman Dr. >> > San Jose, California 95134 >> > USA >> > >> > Phone: +1 408 526 4495 >> > Email: nfinn@cisco.com >> > >> > >> > Pascal Thubert >> > Cisco Systems >> > Village d'Entreprises Green Side >> > 400, Avenue de Roumanille >> > Batiment T3 >> > Biot - Sophia Antipolis 06410 >> > FRANCE >> > >> > Phone: +33 4 97 23 26 34 >> > Email: pthubert@cisco.com >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > >> > Finn & Thubert Expires September 10, 2015 [Page >> 23] >> > >> > _______________________________________________ >> > 6tisch mailing list >> > 6tisch@ietf.org >> > https://www.ietf.org/mailman/listinfo/6tisch >> > _______________________________________________ >> > detnet mailing list >> > detnet@ietf.org >> > https://www.ietf.org/mailman/listinfo/detnet >> > >> > >> > >> > -- >> > This message has been scanned for viruses and >> > dangerous content by MailScanner, and is >> > believed to be clean. >> > >> > _______________________________________________ >> > 6tisch mailing list >> > 6tisch@ietf.org >> > https://www.ietf.org/mailman/listinfo/6tisch >> > >> >> >> -- >> This message has been scanned for viruses and >> dangerous content by MailScanner, and is >> believed to be clean. >> >> _______________________________________________ >> 6tisch mailing list >> 6tisch@ietf.org >> https://www.ietf.org/mailman/listinfo/6tisch > > -- > This message has been scanned for viruses and > dangerous content by MailScanner, and is > believed to be clean. > > -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean.
- [Detnet] comments on draft-finn-detnet-architectu… Thomas Watteyne
- Re: [Detnet] comments on draft-finn-detnet-archit… Pascal Thubert (pthubert)
- Re: [Detnet] comments on draft-finn-detnet-archit… Pascal Thubert (pthubert)
- Re: [Detnet] comments on draft-finn-detnet-archit… Norman Finn (nfinn)
- Re: [Detnet] comments on draft-finn-detnet-archit… Patrick Wetterwald (pwetterw)
- Re: [Detnet] [6tisch] comments on draft-finn-detn… Qin Wang
- Re: [Detnet] [6tisch] comments on draft-finn-detn… Norman Finn (nfinn)
- Re: [Detnet] comments on draft-finn-detnet-archit… Norman Finn (nfinn)
- Re: [Detnet] [6tisch] comments on draft-finn-detn… Christian Boiger
- Re: [Detnet] [6tisch] comments on draft-finn-detn… John Grant
- Re: [Detnet] [6tisch] comments on draft-finn-detn… Patrick Wetterwald (pwetterw)
- Re: [Detnet] [6tisch] comments on draft-finn-detn… Jeff Koftinoff
- Re: [Detnet] [6tisch] comments on draft-finn-detn… Rodney Cummings
- Re: [Detnet] [6tisch] comments on draft-finn-detn… Rodney Cummings
- Re: [Detnet] [6tisch] comments on draft-finn-detn… Pascal Thubert (pthubert)
- Re: [Detnet] [6tisch] comments on draft-finn-detn… anand
- Re: [Detnet] [6tisch] comments on draft-finn-detn… anand