Re: [Detnet] IPv6 encapsulation in dataplane doc

Balázs Varga A <balazs.a.varga@ericsson.com> Tue, 13 February 2018 09:01 UTC

Return-Path: <balazs.a.varga@ericsson.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 24E9D12E897 for <detnet@ietfa.amsl.com>; Tue, 13 Feb 2018 01:01:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.32
X-Spam-Level:
X-Spam-Status: No, score=-4.32 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com header.b=WfqviNG6; dkim=pass (1024-bit key) header.d=ericsson.com header.b=VkXt/xzn
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0gldNIBXqcrk for <detnet@ietfa.amsl.com>; Tue, 13 Feb 2018 01:01:49 -0800 (PST)
Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6F45A124BE8 for <detnet@ietf.org>; Tue, 13 Feb 2018 01:01:48 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/simple; q=dns/txt; i=@ericsson.com; t=1518512506; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=8w89/HbCJdhLkZdRZtO4aQyRpSmjLg5tV8auOma7tN0=; b=WfqviNG6tbaeWDlkaITxHfOpDbsawt+NprFjHcvuOmR3fm5gVhLPIP1CJU0GRolB 65To6lV2qRfCebm0WsUzo6U1Hnz4aTrT5rgSw0UE1LZcHWnyYn+0ZbpIYbKTBGql 0wVekBEQLUKijgDEe4iJQ8o3uaVgZBivirYSCyaF0sU=;
X-AuditID: c1b4fb25-859119c00000341b-54-5a82a979c36c
Received: from ESESSHC010.ericsson.se (Unknown_Domain [153.88.183.48]) by sesbmg23.ericsson.net (Symantec Mail Security) with SMTP id F7.12.13339.979A28A5; Tue, 13 Feb 2018 10:01:46 +0100 (CET)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (153.88.183.145) by oa.msg.ericsson.com (153.88.183.48) with Microsoft SMTP Server (TLS) id 14.3.352.0; Tue, 13 Feb 2018 10:01:43 +0100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=vF2OJi+GUXB0wdQZo/blEe/q2knaQaSySj2yLMEChcE=; b=VkXt/xznPtQbH8zNqEP6EeLnaranLnXwVv6L6fOfLZKIoeq21v30nWn63amQKlfkJfxkBdxoEaJG45G2Zp662xiO7SuQkLHQnOzPdNjVWHLrBrkD9LzPAP0fGtL5eTfAzGB+GUVEGudOejtFVuRFnVkX6W/SXf14ZeEMw9BnuVM=
Received: from VI1PR07MB1005.eurprd07.prod.outlook.com (10.161.110.21) by VI1PR07MB1358.eurprd07.prod.outlook.com (10.164.92.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.506.7; Tue, 13 Feb 2018 09:01:41 +0000
Received: from VI1PR07MB1005.eurprd07.prod.outlook.com ([fe80::f8bc:9e5b:947:26fd]) by VI1PR07MB1005.eurprd07.prod.outlook.com ([fe80::f8bc:9e5b:947:26fd%17]) with mapi id 15.20.0506.013; Tue, 13 Feb 2018 09:01:41 +0000
From: Balázs Varga A <balazs.a.varga@ericsson.com>
To: "Pascal Thubert (pthubert)" <pthubert@cisco.com>, Jouni <jouni.nospam@gmail.com>, Lou Berger <lberger@labn.net>
CC: "detnet@ietf.org" <detnet@ietf.org>
Thread-Topic: [Detnet] IPv6 encapsulation in dataplane doc
Thread-Index: AdOgFyOl9vKMd7+3Skyj/a0jCzTraQADSTgAACYDgYAAQYLPAABsVu8AAALSj4AAAI9ZgAAayo8AAAu86TAABytJAAAcPs4Q
Date: Tue, 13 Feb 2018 09:01:41 +0000
Message-ID: <VI1PR07MB1005B1810527696D40CB8CFAACF60@VI1PR07MB1005.eurprd07.prod.outlook.com>
References: <cff50c52d2f945cfa8eff149f5242fb0@XCH-RCD-001.cisco.com> <16170c78f30.27d3.9b4188e636579690ba6c69f2c8a0f1fd@labn.net> <22c101d3a0bc$5795b080$06c11180$@gmail.com> <b17a1c79-010d-b4a0-aa07-8182b72f2577@labn.net> <00A9AB24-830A-46C7-B3DB-5C17D2AC91EC@gmail.com> <b9c9fe85-fbd9-9859-51ca-27c9bda061a5@labn.net> <7CF3359D-204E-46E9-B7C6-B6134120502E@gmail.com> <d879c877a1a04760920c9c9c3edbe6e0@XCH-RCD-001.cisco.com> <VI1PR07MB1005CDF8E6918345D861D312ACF70@VI1PR07MB1005.eurprd07.prod.outlook.com> <9c47e882b66d4f95ad540c36c4e3e883@XCH-RCD-001.cisco.com>
In-Reply-To: <9c47e882b66d4f95ad540c36c4e3e883@XCH-RCD-001.cisco.com>
Accept-Language: hu-HU, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [89.135.192.225]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR07MB1358; 7:xbyz3FQXa3117icL+bxx33/KyPHn4K8jCv5MfymrUDNw++o0cD9EeEXAMq2YS5eYEF0L3qiRNZpfdEwOb/ZKAD39qclVTA95mKTQl7elWcrTgAw0QJpQuW2rWs4bBxTa/+hVbr00Lh4LXOgpi2QRhRwpfWX6X+XgrHmvQOqAwhWu6SOQDFsXytZkJjZfCPYNZFSA3WYykhmJTT5TSOoio1k7gMYmBkXitJt5/F2NxCIDgh45f6D0nn0zkdJKAGLG
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-correlation-id: 629154ad-7035-4d4c-198e-08d572c065f5
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(4534165)(4627221)(201703031133081)(201702281549075)(5600026)(4604075)(3008032)(2017052603307)(7153060)(7193020); SRVR:VI1PR07MB1358;
x-ms-traffictypediagnostic: VI1PR07MB1358:
x-microsoft-antispam-prvs: <VI1PR07MB135862CE4765D306DEC81086ACF60@VI1PR07MB1358.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(37575265505322)(278428928389397)(85827821059158)(95692535739014)(21532816269658);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040501)(2401047)(5005006)(8121501046)(3002001)(3231101)(2400082)(944501161)(10201501046)(93006095)(93001095)(6041288)(20161123562045)(20161123564045)(20161123560045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011); SRVR:VI1PR07MB1358; BCL:0; PCL:0; RULEID:; SRVR:VI1PR07MB1358;
x-forefront-prvs: 0582641F53
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(346002)(396003)(366004)(39860400002)(39380400002)(13464003)(189003)(199004)(43544003)(33656002)(3846002)(102836004)(3660700001)(6346003)(2906002)(6306002)(7736002)(316002)(106356001)(8936002)(6116002)(53946003)(66066001)(6506007)(53936002)(8676002)(93886005)(76176011)(561944003)(81156014)(478600001)(14454004)(68736007)(5660300001)(26005)(305945005)(55016002)(59450400001)(9686003)(7696005)(3280700002)(53546011)(74316002)(99286004)(229853002)(966005)(81166006)(186003)(86362001)(39060400002)(105586002)(6246003)(5250100002)(6436002)(2900100001)(25786009)(2950100002)(5890100001)(4326008)(110136005)(97736004); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR07MB1358; H:VI1PR07MB1005.eurprd07.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=balazs.a.varga@ericsson.com;
x-microsoft-antispam-message-info: hy+s4tVU3pbV8fJWzDH2z1hu49Av2idhfqYLbtmzpl98vvSyZkPQWe4NQ9bW/u9ohseIiQAsKzFT2mJyv6quNQ==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 629154ad-7035-4d4c-198e-08d572c065f5
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Feb 2018 09:01:41.0923 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB1358
X-OriginatorOrg: ericsson.com
X-Brightmail-Tracker: H4sIAAAAAAAAA02SfUhTURjGO/fezetodFpO3yyNRiJYTc2KKVFGhAuKCgrKIp15U5tO2aap gYmFqUFYWk2bXzEzLS3F8Ds/EnJkGBb5mamTQFMLV6assl2PQf/93ud5OO8Hh6UlBoErG6XR c1qNKlomFDF5p+p8tieXpwX7zPUhhW3uPqNorUqlFBlXZxiFIXcWBTLKXFu1QNmQ/9FBaTIt UspvNVeFx5hg0Z5wLjoqgdN67w0VRVpuG+m4/AcoceGRlUpFU7FZyJEFvBOGzIUoC4lYCX6J wDhfICRFF4LJ4TSGLxg8R0Fxd+aKc5eCvOv1DCnGEExU36P4x4T4IFgzxuwplnXC8dA9K+Fl GnvCQHElzfM67A8tb+qW4044AIYsUzSJa8BousTLDPaAgrZWIc9ifBZms1+stOpkIKfgrYDP O9pbdT07xyPCbjBWqSCdXGBwoogim2EwNffQhKUwafkjICwDw9TgCrtBb9GN5e0B11LQNPCZ IYYcnt+aQYSPQLmpRUhC9qsUlRU6EMMLyix1y/MDVkOlRU3ky9BknnYgeQMNM0t9DiSzEUYW A4heKoSK1gYmG3nn/zc4YTn038kVEt4KD0u+0PnLt1gL5rwJphgxFUiq43RhMRE7/OScNuq8 TherkWs4fQ2y/5f2WptHPXo3vb8DYRbJVotHnNOCJQJVgi4ppgMBS8ucxGyJXRKHq5KSOW1s iDY+mtN1oA0sI3MRmw+JgyU4QqXn1BwXx2n/uRTr6JqKAle1fA/IGBd4VqhfJ1wx7+ssrJIJ rvWkNIVuCUH92TYXd7/JZIT9PUvSl5IOSL8GlbY1b1s/Fpfyoerm09TNbkdTes807s6xWp+4 Pw5q9ND/FJ12Xhj9lHny4ry7W1iE68Cm9lfDxlHT8Srz+K5f0vTD2h8nqmnvmPfi3xfWuCT6 yhhdpMrXi9bqVH8BK5Xy4SsDAAA=
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/Ke4U3OoMVG1U2rn9NFfDGpqflO8>
Subject: Re: [Detnet] IPv6 encapsulation in dataplane doc
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Feb 2018 09:01:53 -0000

Hello Pascal,
Thanks, that was great clarification and now I see your valid points much better.
Cheers
Bala'zs

-----Original Message-----
From: Pascal Thubert (pthubert) [mailto:pthubert@cisco.com] 
Sent: 2018. február 12. 20:31
To: Balázs Varga A <balazs.a.varga@ericsson.com>; Jouni <jouni.nospam@gmail.com>; Lou Berger <lberger@labn.net>
Cc: detnet@ietf.org
Subject: RE: [Detnet] IPv6 encapsulation in dataplane doc

Hello Balázs

- Why no seq.num in IP? That would mean no PREF, no IOD function within DetNet domain Which is an IP PSN.

> Sorry, I was unclear and I agree with you. There would not be one provided the source, but then the ingress edge would need to encapsulate the packet. In which case it would set the next  as destination and insert a DestOpt before the routing header if any. 

> Note that if have not (Yet? Should we???) looked at a way to express the ladder as a routing header. Till then, the most sensible thing is to send the packet unicast to the next Relay node (next relays if this node is a replicator). We still may indicate intermediate transit nodes as a routing header though. The DestOpt would then be after the routing header, not before.

--------------------

- What would be the gain from a "L4 transport designed to provide PREF, IOD, FEC, ... "?
I mean that would be a duplicate, as in the DetNet network You would have the same function.

> I would say that these functions are closely related to traditional capabilities of a L4 transport. TCP reorders the bytes in the stream and provides ARQ which is an alternate to FEC. MP TCP distributes packets over different paths. Doing those functions at L4 allows real end to end service even if there is no specialized NIC. It keeps the IP layer intact which seemed to be a goal in that discussion. It allows features like Network Coding which are certainly easier to do high in the stack of a host system than in a line card or a fast path in a router.

- Checking L4 within the DetNet domain would require DPI, what I guess we do not want.

> Architecturally speaking, the L4 transport implements a detnet service layer though it would not be done at DetNet WG. When that L4 transport is enabled, some service layer functions provided by the network would not be used, or would rely on their own sequencing. I'm not excluding that vendors could propose some DPI for very specific applications, e.g. recognizing a particular industrial protocol and routing it differently, say over a DetNet path. But this is an implementation game and I do not see what's there for us to standardize.

------------------------

- I am also somewhat confused by your WiFi example. I mean in TSN/DetNet scenarios end-systems are always assumed to be in sync with their controller(s). So I do not agree with this statement: "Existing industrial devices can claim a rough need for a given rate but were not necessarily designed to provide guarantees for burstiness in DetNet terms." 

> I mean that an application on a device that was designed before TSN and that does not connect to the controller and that may not participate to PTP may still benefit from DetNet. But even if the application needs are roughly known, the granularity of the TSPEC may not be the one TSN expects. There is a need for an adaptation to absorb the burst that a strict ingress filtering may treat too violently. Reference here is to CIR in frame relay networks serving TCP and SNA flows. Disserving would be a more proper term, I have a long history on implementing that, and I would like to avoid going through that pain again.

What I meant with Wi-Fi is different; I showed that in some cases we really need the PREF from the source node if it is a wireless node. Because the losses mostly happen on the radio hop. I had in mind that with a form of multicast, the source STA could send a single packet to 2 or more Ingress Routers connected to different APs, and then all the received copies would follow their own DetNet path.

Take care,

Pascal



-----Original Message-----
From: detnet [mailto:detnet-bounces@ietf.org] On Behalf Of Balázs Varga A
Sent: lundi 12 février 2018 17:37
To: Pascal Thubert (pthubert) <pthubert@cisco.com>; Jouni <jouni.nospam@gmail.com>; Lou Berger <lberger@labn.net>
Cc: detnet@ietf.org
Subject: Re: [Detnet] IPv6 encapsulation in dataplane doc

Hi Pascal,

I have a lot of sympathy on your view.
- OK: "DetNet would provide its own sequencing based on reception order at ingress edge."
- OK: "ingress edge may be a NIC card"
- OK: "avoid DPI"

However I have some questions for clarification on your final conclusions:
- Why no seq.num in IP? That would mean no PREF, no IOD function within the DetNet domain Which is an IP PSN.
- What would be the gain from a "L4 transport designed to provide PREF, IOD, FEC, ... "?
I mean that would be a duplicate, as in the DetNet network You would have the same function.
Checking L4 within the DetNet domain would require DPI, what I guess we do not want.
- I am also somewhat confused by your WiFi example. I mean in TSN/DetNet scenarios end-systems are always assumed to be in sync with their controller(s). So I do not agree with this statement: "Existing industrial devices can claim a rough need for a given rate but were not necessarily designed to provide guarantees for burstiness in DetNet terms." 

Thanks & Cheers
Bala'zs

-----Original Message-----
From: detnet [mailto:detnet-bounces@ietf.org] On Behalf Of Pascal Thubert (pthubert)
Sent: 2018. február 12. 11:30
To: Jouni <jouni.nospam@gmail.com>; Lou Berger <lberger@labn.net>
Cc: detnet@ietf.org
Subject: Re: [Detnet] IPv6 encapsulation in dataplane doc

Hello Jouni and Lou:

Just to make sure we are on the same line:

- IPvX (==v4/v6) would signal the flow implicitly - derived from the tuples- but not the source sequencing. No need to change IP.

- DetNet may provide PREF/IOD from the edge ingress. DetNet would provide its own sequencing based on reception order at ingress edge.

- The  ingress edge may be a NIC card in the originating node. It would be operating below IPvX and possibly equipped with 2 Ethernet ports and capable of PREF.

- Anything above IP is beyond charter. A upper layer sequence may be visible in the L4-transport or at the application layer but DetNet will not look for it. A snooping edge device doing DPI may dig in the packet and find information for packet identification and ordering, for a particular application, and that is beyond the interests of the WG.

- A L4 transport may be designed to provide PREF, IOD, FEC (network coding) and whatever else needed. This would be done in TSV Area with DetNet's blessing.

Do we agree?

Pascal

-----Original Message-----
From: Jouni [mailto:jouni.nospam@gmail.com]
Sent: dimanche 11 février 2018 22:43
To: Lou Berger <lberger@labn.net>
Cc: Pascal Thubert (pthubert) <pthubert@cisco.com>; detnet@ietf.org
Subject: Re: [Detnet] IPv6 encapsulation in dataplane doc



>>>> * End systems cannot participate to DetNet service layer packet 
>>>> elimination & duplication business. If they still do e.g. using 
>>>> DetNet DstOpt that is separate from subnet/transport layer provided service.
>>> 
>>> True, end station participation in PREF wouldn't be possible in this 
>>> simplified approach for IP, but the end stations *could* still 
>>> participate in the equivalent function provided by a sub-net layer 
>>> such as TSN. So end to end detnet traffic protection is not 
>>> possible, but it doesn't mean it can't be provided by lower network 
>>> layers.  The gain here is a simplified and unified IP solution and 
>>> simplified host processing/support, albeit with a loss of one of the 
>>> three end to end detnet service attributes.
>> 
>> Yes, that's true (as I already clarified in my latest mail to Pascal).
>> 
> 
> yes.  It's good for all to remember that DetNet is just as much (if 
> not
> more) about supporting explicit routes with congestion protection and 
> latency control....

Indeed..

>>>> * Different subnet/transport layer segments in the DetNet domain 
>>>> are likely to use their own sequencing and duplication & 
>>>> elimination solutions. I am not sure how independent those will be 
>>>> e.g., is the sequence numbering unified across or only per segment.
>>>> The former is not IMO easy and the latter easily reduces to single 
>>>> points between segments to handle number book keeping properly.
>>> 
>>> Agreed.  The question for the WG is this a reasonable compromise in 
>>> order to in our *initial* solution defined by the WG.  -- Nothing 
>>> says we can't come back and improve on this in the future, but it 
>>> will allow us to get *something* useful defined with less complexity.
>> 
>> I would first specify the required steps that make IP as-is work within one subnet/transport layer segment. That should be an achievable goal with a limitation of e.g. a single interconnection point between subnet/transport layer segments of different types/solutions. 
>> 
> 
> sure. as long as one of the 'attached stations' can be a router.

Yes. That's the plan at least from my side.

- Juoni


> 
>> After that look into solving multiple interconnection points.. and there the L4 path that Pascal mentioned or that IPv6 DetNet DstOpt of mine could be way forward.
>> 
> 
> yes, this would be good follow on work...
> 
> Cheers,
> Lou
>> - Jouni
>> 
>> 
>>> 
>>> 
>>>> 
>>>> Regardless the above I am keen to explore this alternative approach..
>>>> 
>>> 
>>> Great - look forward to hear the results!
>>> Lou
>>> 
>>>> 
>>>> -          Jouni
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> *From:* detnet [mailto:detnet-bounces@ietf.org] *On Behalf Of *Lou 
>>>> Berger
>>>> *Sent:* Wednesday, February 7, 2018 17:00 PM
>>>> *To:* Pascal Thubert (pthubert) <pthubert@cisco.com>; 
>>>> detnet@ietf.org
>>>> *Subject:* Re: [Detnet] IPv6 encapsulation in dataplane doc
>>>> 
>>>> 
>>>> 
>>>> Pascal/all,
>>>> 
>>>> At the last interim a proposal was made to simplify IP processing, 
>>>> at least for the initial detnet solution, by leaving PREF to the 
>>>> subnet/transport layers (i.e., TSN and MPLS) and providing DetNet 
>>>> flow identification based on typical IP 5-tuple perhaps + dscp.
>>>> This approach has several benefits beyond simplification, notably 
>>>> it will work for both ipv4 and IPv6, and doesn't require any 
>>>> modification to encapsulation / formats.
>>>> 
>>>> It would be really valuable to get feedback from the whole working 
>>>> group if this simplification is acceptable or has unacceptable limitations.
>>>> 
>>>> Lou
>>>> 
>>>> On February 7, 2018 8:28:02 AM "Pascal Thubert (pthubert)"
>>>> <pthubert@cisco.com <mailto:pthubert@cisco.com>> wrote:
>>>> 
>>>>   Dear all
>>>> 
>>>> 
>>>> 
>>>>   This is about the IPv6 encapsulation and more precisely
>>>> 
>>>> 
>>>> 
>>>>                           Therefore, if a DetNet-aware end system 
>>>> only
>>>> 
>>>>      inserted the DetNet Destination Option into the IPv6 but e.g., 
>>>> a
>>>> 
>>>>      DetNet Edge node is configured to enforce an explicit route 
>>>> for the
>>>> 
>>>>      IPv6 packet using a source routing header, then it has no 
>>>> other
>>>> 
>>>>      possibility than add an outer tunneling IPv6 header with 
>>>> required
>>>> 
>>>>      extension headers in it.  The processing of IPv6 packets in a 
>>>> DetNet
>>>> 
>>>>      Edge node is discussed further in Section 6.4.1
>>>>   <https://tools.ietf.org/html/draft-ietf-detnet-dp-sol-01#section-6.4.1>.
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>>   With the current spec, a source sends a DetNet packet as
>>>> 
>>>> 
>>>> 
>>>>                       +---------------------------------+
>>>> 
>>>>                       |                                 |
>>>> 
>>>>                       |           DetNet Flow           |
>>>> 
>>>>                       |             Payload             |
>>>> 
>>>>                       |                                 |
>>>> 
>>>>                       /---------------------------------\
>>>> 
>>>>                       H   Optional DetNet DstOpt Hdr    H
>>>> 
>>>>                       \---------------------------------/
>>>> 
>>>>                       |          IPv6 header            |
>>>> 
>>>>                       |     (with set Flow label)       |
>>>> 
>>>>                       +---------------------------------+
>>>> 
>>>> 
>>>> 
>>>>   And then the ingress node needs to re-encapsulate as
>>>> 
>>>> 
>>>> 
>>>>                       +---------------------------------+
>>>> 
>>>>                       |                                 |
>>>> 
>>>>                       |           DetNet Flow           |
>>>> 
>>>>                       |             Payload             |
>>>> 
>>>>                      |                                 |
>>>> 
>>>>                       /---------------------------------\
>>>> 
>>>>                       H        DetNet DstOpt Hdr        H
>>>> 
>>>>                       \---------------------------------/
>>>> 
>>>>                       |          IPv6 header            |
>>>> 
>>>>                       |     (with set Flow label)       |
>>>> 
>>>>                       +=================================+
>>>> 
>>>>                       |          Routing header         |
>>>> 
>>>>                       /---------------------------------\
>>>> 
>>>>                       H        DetNet DstOpt Hdr        H
>>>> 
>>>>                       \---------------------------------/
>>>> 
>>>>                       |          IPv6 header            |
>>>> 
>>>>                       |     (with set Flow label)       |
>>>> 
>>>>                       +---------------------------------+
>>>> 
>>>> 
>>>> 
>>>>   This creates a duplication of the DetNet Destination Option.
>>>> 
>>>> 
>>>> 
>>>>   There are alternatives
>>>> 
>>>> 
>>>> 
>>>>   a)  whereby the packet is tunneled from the source to the detnet
>>>>   ingress, and based on its state the DetNet ingress accepts the
>>>>   packet, processes it and then resends it. The tunneled version of
>>>>   this could be:
>>>> 
>>>> 
>>>> 
>>>>                       +---------------------------------+
>>>> 
>>>>                       |                                 |
>>>> 
>>>>                       |           DetNet Flow           |
>>>> 
>>>>                       |             Payload             |
>>>> 
>>>>                       |                                 |
>>>> 
>>>>                       +---------------------------------+
>>>> 
>>>>                       |          IPv6 header            |
>>>> 
>>>>                       |   (dest = final destination)    |
>>>> 
>>>>                       /=================================\
>>>> 
>>>>                       H   Optional DetNet DstOpt Hdr    H
>>>> 
>>>>                       \---------------------------------/
>>>> 
>>>>                       |          IPv6 header            |
>>>> 
>>>>                       |   (dest = DetNet ingress edge)  |
>>>> 
>>>>                       |     (with set Flow label)       |
>>>> 
>>>>                       +---------------------------------+
>>>> 
>>>> 
>>>> 
>>>>   Which allows the ingress to tunnel to the egress as follows:
>>>> 
>>>>                       +---------------------------------+
>>>> 
>>>>                       |                                 |
>>>> 
>>>>                       |           DetNet Flow           |
>>>> 
>>>>                       |             Payload             |
>>>> 
>>>>                       |                                 |
>>>> 
>>>>                       +---------------------------------+
>>>> 
>>>>                       |          IPv6 header            |
>>>> 
>>>>                       |      (to final destination)     |
>>>> 
>>>>                       +=================================+
>>>> 
>>>>                       |          Routing header         |
>>>> 
>>>>                       /---------------------------------\
>>>> 
>>>>                       H   Optional DetNet DstOpt Hdr    H
>>>> 
>>>>                       \---------------------------------/
>>>> 
>>>>                       |          IPv6 header            |
>>>> 
>>>>                       |   (dest = DetNet egress edge)   |
>>>> 
>>>>                       |     (with set Flow label)       |
>>>> 
>>>>                       +---------------------------------+
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>>   b)  whereby the PREF is done by the end nodes and the tunnel is
>>>>   transport only, meaning that there are 2 tunnels A and B and that
>>>>   the source sends twice a packet like this:
>>>> 
>>>> 
>>>> 
>>>>                       +---------------------------------+
>>>> 
>>>>                       |                                 |
>>>> 
>>>>                       |           DetNet Flow           |
>>>> 
>>>>                       |             Payload             |
>>>> 
>>>>                       |                                 |
>>>> 
>>>>                       /---------------------------------\
>>>> 
>>>>                       H   Optional DetNet DstOpt Hdr    H
>>>> 
>>>>                       \---------------------------------/
>>>> 
>>>>                       |          IPv6 header            |
>>>> 
>>>>                       |   (dest = DetNet ingress edge X)|
>>>> 
>>>>                       |     (with set Flow label)       |
>>>> 
>>>>                       +---------------------------------+
>>>> 
>>>> 
>>>> 
>>>>   And then the ingress node needs to re-encapsulate as
>>>> 
>>>> 
>>>> 
>>>>                       +---------------------------------+
>>>> 
>>>>                       |                                 |
>>>> 
>>>>                       |           DetNet Flow           |
>>>> 
>>>>                       |             Payload             |
>>>> 
>>>>                      |                                 |
>>>> 
>>>>                       /---------------------------------\
>>>> 
>>>>                       H        DetNet DstOpt Hdr        H
>>>> 
>>>>                       \---------------------------------/
>>>> 
>>>>                       |          IPv6 header            |
>>>> 
>>>>                       |   (dest = final destination)    |
>>>> 
>>>>                       |     (with set Flow label)       |
>>>> 
>>>>                       +=================================+
>>>> 
>>>>                       |          Routing header         |
>>>> 
>>>>                       +---------------------------------+
>>>> 
>>>>                       |          IPv6 header            |
>>>> 
>>>>                       |   (dest = DetNet egress edge X) |
>>>> 
>>>>                       |     (with set Flow label)       |
>>>> 
>>>>                       +---------------------------------+
>>>> 
>>>> 
>>>> 
>>>>   Cheers,
>>>> 
>>>> 
>>>> 
>>>>   Pascal
>>>> 
>>>>   _______________________________________________
>>>>   detnet mailing list
>>>>   detnet@ietf.org <mailto:detnet%40ietf.org>
>>>>   https://www.ietf.org/mailman/listinfo/detnet
>>>> 
>>> 
>> 
>> 
> 

_______________________________________________
detnet mailing list
detnet@ietf.org
https://www.ietf.org/mailman/listinfo/detnet

_______________________________________________
detnet mailing list
detnet@ietf.org
https://www.ietf.org/mailman/listinfo/detnet