Re: [Detnet] Suresh Krishnan's No Objection on draft-ietf-detnet-architecture-11: (with COMMENT)

János Farkas <janos.farkas@ericsson.com> Sat, 09 March 2019 22:36 UTC

Return-Path: <Janos.Farkas@ericsson.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B696E130E64 for <detnet@ietfa.amsl.com>; Sat, 9 Mar 2019 14:36:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.3
X-Spam-Level:
X-Spam-Status: No, score=-4.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DkijXibfUdBW for <detnet@ietfa.amsl.com>; Sat, 9 Mar 2019 14:36:45 -0800 (PST)
Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6DCB212958B for <detnet@ietf.org>; Sat, 9 Mar 2019 14:36:44 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/relaxed; q=dns/txt; i=@ericsson.com; t=1552171002; x=1554763002; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=iZ106a/oNfpqJGHTPoLBmOG8qAf7B426CtvlhkQqchc=; b=IQzg2u0xqnsytqhJzBKO76Hv42jSPdgZrlI5guU7viobTT9B+aSHOyNsUDaTOdrA 8D5qSXI8dHZ79fK2WVXE8O9Y11sLh4Cf+G4ISDhc4RzLVgXJiCAi1tMS3FsLFUIq U1oBSYsBiTi2hHMih+wMldiA4EHJyCnZ0HRFlVJHtTg=;
X-AuditID: c1b4fb25-d89ff70000005ff7-d3-5c843ffa446f
Received: from ESESSMB501.ericsson.se (Unknown_Domain [153.88.183.119]) by sesbmg23.ericsson.net (Symantec Mail Security) with SMTP id 80.2C.24567.AFF348C5; Sat, 9 Mar 2019 23:36:42 +0100 (CET)
Received: from ESESBMB502.ericsson.se (153.88.183.169) by ESESSMB501.ericsson.se (153.88.183.162) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Sat, 9 Mar 2019 23:36:41 +0100
Received: from [100.94.203.43] (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.185) with Microsoft SMTP Server id 15.1.1466.3 via Frontend Transport; Sat, 9 Mar 2019 23:36:39 +0100
To: Suresh Krishnan <Suresh@kaloom.com>
CC: The IESG <iesg@ietf.org>, "draft-ietf-detnet-architecture@ietf.org" <draft-ietf-detnet-architecture@ietf.org>, Lou Berger <lberger@labn.net>, "detnet-chairs@ietf.org" <detnet-chairs@ietf.org>, "detnet@ietf.org" <detnet@ietf.org>
References: <155075828359.8615.9538259641487527490.idtracker@ietfa.amsl.com> <d89ff310-0805-3bc2-6a67-fa2b87136ce4@ericsson.com> <5BB134C0-1C9C-4DC0-84E7-68F58EEEF053@kaloom.com>
From: János Farkas <janos.farkas@ericsson.com>
Message-ID: <b6392e14-87fd-ddfd-1c8b-b98d800ad272@ericsson.com>
Date: Sat, 09 Mar 2019 23:36:39 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.2.1
MIME-Version: 1.0
In-Reply-To: <5BB134C0-1C9C-4DC0-84E7-68F58EEEF053@kaloom.com>
Content-Type: multipart/alternative; boundary="------------8F2FAF035C961A17EA50F740"
Content-Language: en-US
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFupjkeLIzCtJLcpLzFFi42KZGbG9XPeXfUuMwZNrkhbX+n+wWPz+NJvF 4sO3mSwWM/5MZLboaH7LYrGt6xSLA5vHkiU/mTzOX5nB7vFhUzNbAHMUl01Kak5mWWqRvl0C V8aJd/9YClY8Zq6Y+XMZSwNj8wmmLkZODgkBE4kTF/+xdjFycQgJHGGUmNC4mwXC+coocWfJ DXYI5zCjxKtFsxhBWoQFkiQ+/98L1MLBISKgLvFwiQJIDbPAO0aJF79nM0E0bGOUeH7hCVgD m4C9xN1LG5hBbF4ge+rGt2wgNouAisTOGavA7hAViJX4dGUxVI2gxMmZT1hAbE4BO4nNfdfZ QWxmgTCJKfu6mSBscYlbT+aD2UICahKf3j5kn8AoOAtJ+ywkLbOQtEDYFhIz559nhLDlJZq3 zmaGsDUkWufMZUcWX8DIvopRtDi1OCk33chYL7UoM7m4OD9PLy+1ZBMjMJYObvmtuoPx8hvH Q4wCHIxKPLzfzVpihFgTy4orcw8xSnAwK4nwbvjQHCPEm5JYWZValB9fVJqTWnyIUZqDRUmc 94+QYIyQQHpiSWp2ampBahFMlomDU6qBcaJXhyu/8tL6+pzv4X4dWas4Finde/Pkgu+f3i4Z R5eKg9NW/e1ms7n1wKz3+d+Vf0oWyHTvsGXzNtkruFYkw9bvYOXFRb6LQjbzTFOTdvW0fPPz 1l/Bxr7w3acKX99auPmqiFa4i1HThq+ljr9NwgMl5MOPP+Tb43/zbMX1TRO+PLn449htPSWW 4oxEQy3mouJEAPZNqI2hAgAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/SxOHWdE87Q9GT_iI8igrfOwPaSM>
Subject: Re: [Detnet] Suresh Krishnan's No Objection on draft-ietf-detnet-architecture-11: (with COMMENT)
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Mar 2019 22:36:48 -0000

Thank you Suresh,
Janos

On 3/7/2019 5:41 PM, Suresh Krishnan wrote:
> Thanks for the text changes János. They look good to me.
>
> Regards
> Suresh
>
>> On Mar 2, 2019, at 4:03 PM, János Farkas <janos.farkas@ericsson.com 
>> <mailto:janos.farkas@ericsson.com>> wrote:
>>
>> Hi Suresh,
>>
>> Thank you for your review!
>>
>> Please see in-line:
>>
>> On 2/21/2019 3:11 PM, Suresh Krishnan wrote:
>>> Suresh Krishnan has entered the following ballot position for
>>> draft-ietf-detnet-architecture-11: No Objection
>>>
>>> When responding, please keep the subject line intact and reply to all
>>> email addresses included in the To and CC lines. (Feel free to cut this
>>> introductory paragraph, however.)
>>>
>>>
>>> Please refer to 
>>> https://www.ietf.org/iesg/statement/discuss-criteria.html
>>> for more information about IESG DISCUSS and COMMENT positions.
>>>
>>>
>>> The document, along with other ballot positions, can be found here:
>>> https://datatracker.ietf.org/doc/draft-ietf-detnet-architecture/
>>>
>>>
>>>
>>> ----------------------------------------------------------------------
>>> COMMENT:
>>> ----------------------------------------------------------------------
>>>
>>> * Section 3.2.1.1.
>>>
>>> Given that we also know some of the downsides as well of large 
>>> buffers, I think
>>> a pointer to some background might be warranted here. I would 
>>> recommend a basic
>>> reference to something like
>>>
>>> Bufferbloat: Dark Buffers in the Internet, Communications of the 
>>> ACM, January
>>> 2012,
>> Add reference with new sentence at the end of the paragraph: "Note 
>> that large buffers have some issues, see, e.g., [BUFFERBLOAT]."
>>
>>>
>>> * Section 3.2.2.2.
>>>
>>> It is not obvious to me how the POF cannot be the last operation at the
>>> receiver. Can you clarify? Also, do intermediate nodes apply the 
>>> POF? I can see
>>> the need for them to do PRF and PEFs but I am not sure applying the 
>>> POF at
>>> intermediate nodes can necessarily help the low latency and low 
>>> jitter goals.
>>>
>>>    The order in which a DetNet node applies PEF, POF, and PRF to a
>>>    DetNet flow is implementation specific.
>> The intention here is not to bound any specific order of the PREOF 
>> functions within a device, or not even bound which device implements 
>> which function. There can be complex network set-ups created. 
>> Furthermore, different implementations may have different pros and 
>> cons with respect to the order of PREOF functions. As pointed out, 
>> this is mainly valid for PRF and PEF; however, the same leave it open 
>> approach can be carried on all of the PREOF functions including POF.
>>
>> Would it help to replace the sentence with?:
>>   The order in which a DetNet node applies PEF, POF, and PRF to a
>>    DetNet flow is left open for implementations.
>>
>>
>>> * Section 3.2.3.
>>>
>>> RFC7426 does not contain much specific information about explicit 
>>> route setup.
>>> Is there a particular section you want to point to. If not, I don't 
>>> think this
>>> reference is of much use. RFC8453 is listed twice.
>> Delete RFC7426 and one of the RFC8453s.
>>
>>>
>>> * Section 3.3.1.
>>>
>>> Not sure why this is a requirement but I do wish to note that there 
>>> are no such
>>> worst-case latency guarantees for best effort traffic (aka 
>>> non-Detnet) in
>>> current networks. Can you clarify?
>>>
>>>    o  DetNet flows can be shaped or scheduled, in order to ensure that
>>>       the highest-priority non-DetNet packet is also ensured a worst-
>>>       case latency.
>> This is to protect the QoS of non-DetNet flows if needed.DetNet flows 
>> have stringent QoS requirements. There may be non-DetNet flows that 
>> are not best-effort, but have some QoS requirements, although, less 
>> stringent than that of the DetNet flows.
>>
>>
>>>
>>> * Section 4.1.1.
>>>
>>> This text "Peers with Duplicate elimination." seems to be completely 
>>> out of
>>> place under the "Packet sequencing" heading below Figure 2. Copy and 
>>> paste
>>> error?
>> Packet sequencing peers with duplicate elimination. It is explained 
>> under duplicate elimination as well, and they are leveled in the 
>> figure. Would merging the two sentences help?:
>>            As part of DetNet service protection, supplies the sequence
>>            number for packet replication and elimination (Section 3.4),
>>            thus peers with Duplicate elimination.
>>
>>>
>>> * Section 4.3.2.
>>>
>>> I found the expression "number of bit times" confusing. I have 
>>> understood "bit
>>> time" to mean the amount of time taken to emit a bit from a network 
>>> interface.
>>> Based on that definition, this expression does not make sense. Is 
>>> there a
>>> better reference/definition of what you mean?
>> Would it help to rewrite?:
>>
>> OLD:
>>    These parameters, together with knowledge of the protocol stack used
>>    (and thus the size of the various headers added to a packet), limit
>>    the number of bit times per observation interval that the DetNet flow
>>    can occupy the physical medium.
>>
>> NEW:
>>    These parameters, together with knowledge of the protocol stack used
>>    (and thus the size of the various headers added to a packet), 
>> provide the
>>    bandwidth that is needed for the the DetNet flow.
>>
>>
>>>
>>> * Section 4.5.
>>>
>>> There might be some other recent IETF defined mechanisms that might 
>>> be relevant
>>> to mention here as well. e.g. RFC8289 (Codel), RFC8033 (PIE) etc.
>>
>> Add RFC8289 and RFC8033 with a new sentence as the penultimate 
>> sentence of the section:
>> "Further techniques are defined by the IETF, e.g., [RFC8289] and 
>> [RFC8033]."
>>
>>
>>>
>>> * Section 4.7.2.
>>>
>>> While IPv6 does offer a mechanism to add/remove a flow id (flow 
>>> label) not sure
>>> what kind of mapping you were thinking for IPv4. If this is not 
>>> possible, I
>>> think a note to that effect might be useful here.
>> Flow identification details for IP data plane are described in 
>> draft-ietf-detnet-dp-sol-ip. Would it help to add the following 
>> introductory text to Section 4.7?:
>> "This section discusses what needs to be done at technology borders 
>> including Ethernet as one of the technologies. Flow identification 
>> details for MPLS and IP data planes are described in 
>> [I-D.ietf-detnet-dp-sol-mpls] and [I-D.ietf-detnet-dp-sol-ip], 
>> respectively."
>>
>>>
>>> * Sections 5 and 6
>>>
>>> I also support Alissa and Benjamin's DISCUSSes (on privacy and 
>>> security) and
>>> would like to see them addressed.
>>>
>>>
>>
>> Thank you,
>> Janos
>