Re: [Detnet] Traffic description in DetNet flow info model

Lou Berger <lberger@labn.net> Sat, 15 July 2017 13:21 UTC

Return-Path: <lberger@labn.net>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A01212EC3F for <detnet@ietfa.amsl.com>; Sat, 15 Jul 2017 06:21:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-2.8, RCVD_IN_SORBS_SPAM=0.5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (768-bit key) header.d=labn.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SxPudeV7D5no for <detnet@ietfa.amsl.com>; Sat, 15 Jul 2017 06:21:29 -0700 (PDT)
Received: from gproxy7.mail.unifiedlayer.com (gproxy7-pub.mail.unifiedlayer.com [70.40.196.235]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 33880127977 for <detnet@ietf.org>; Sat, 15 Jul 2017 06:21:29 -0700 (PDT)
Received: from cmgw3 (unknown [10.0.90.84]) by gproxy7.mail.unifiedlayer.com (Postfix) with ESMTP id 72795216EC3 for <detnet@ietf.org>; Sat, 15 Jul 2017 07:04:38 -0600 (MDT)
Received: from box313.bluehost.com ([69.89.31.113]) by cmgw3 with id l14a1v0122SSUrH0114dfT; Sat, 15 Jul 2017 07:04:38 -0600
X-Authority-Analysis: v=2.2 cv=UM2tJGXy c=1 sm=1 tr=0 a=h1BC+oY+fLhyFmnTBx92Jg==:117 a=h1BC+oY+fLhyFmnTBx92Jg==:17 a=N659UExz7-8A:10 a=G3gG6ho9WtcA:10 a=jsLqV8V3AAAA:8 a=i0EeH86SAAAA:8 a=0FD05c-RAAAA:8 a=le6d79QuAAAA:8 a=48vgC7mUAAAA:8 a=RpNjiQI2AAAA:8 a=-O5YPv7yAAAA:8 a=67YdEk7mAIfWrNiiPMkA:9 a=jpIH26JlB8aEU1M81S3jpgcb7nU=:19 a=8qWULVT3mPUyjgcb:21 a=xMryo7hXfx4mcWll:21 a=pILNOxqGKmIA:10 a=ugk2N6kDtXxT1k6o-wp-:22 a=l1rpMCqCXRGZwUSuRcM3:22 a=QbAMNLWdp4a7deKPGBBn:22 a=w1C3t2QeGrPiZgrLijVG:22 a=vJuR_VyAocOa-HWBgGQO:22 a=TLqBRRHTddABEfEY9lce:22
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=labn.net; s=default; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:MIME-Version :Date:Message-ID:From:References:To:Subject:Sender:Reply-To:Cc:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=RCXLT9CyHfvIEOmRgjQTKyct+iHmI4zRoJ+7JklYEO8=; b=baDuC23uY5W9sDPtz8vRUuyCpd jH6ShhePVr4SxGJgKn892Kji+Ai28MCnuCx0DFgSmIk/SusaXCl8pJWwJV5tzBP7paW6G54zy0Std MZJpLmr9y6JNU46qcQsD4EgUE;
Received: from pool-100-15-84-20.washdc.fios.verizon.net ([100.15.84.20]:58022 helo=fs2.dc.labn.net) by box313.bluehost.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.87) (envelope-from <lberger@labn.net>) id 1dWMkM-0006sg-H1; Sat, 15 Jul 2017 07:04:34 -0600
To: Norman Finn <norman.finn@mail01.huawei.com>, "Grossman, Ethan A." <eagros@dolby.com>, Balázs Varga A <balazs.a.varga@ericsson.com>, John Grant <j@ninetiles.com>, DetNet WG <detnet@ietf.org>
References: <E78F7186ADD5404AB48E27F02660CA07806C9BDC@dggemm508-mbs.china.huawei.com> <3B18D368-5822-4007-88F8-A02C875D7BAE@ninetiles.com> <E78F7186ADD5404AB48E27F02660CA07806C9D61@dggemm508-mbs.china.huawei.com> <FBD34893-B24C-4EAF-B805-D5E10F8B9618@ninetiles.com> <DBXPR07MB128D53355B533A8B2EE651AAC1E0@DBXPR07MB128.eurprd07.prod.outlook.com> <3DF0466E9510274382F5B74499ACD6F8C9FF52@dfwpml702-chm.exmail.huawei.com> <13a0886cd5ce450ea8432bcc7446d282@DLB-XCHPW05.dolby.net> <3DF0466E9510274382F5B74499ACD6F8CA0253@dfwpml702-chm.exmail.huawei.com> <20829735e68841eea5af2b02a4ac5798@DLB-XCHPW05.dolby.net> <3DF0466E9510274382F5B74499ACD6F8CA0551@dfwpml702-chm.exmail.huawei.com>
From: Lou Berger <lberger@labn.net>
Message-ID: <d5dd9fa6-2651-f459-f40c-df2aaba43a85@labn.net>
Date: Sat, 15 Jul 2017 09:04:33 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.1.1
MIME-Version: 1.0
In-Reply-To: <3DF0466E9510274382F5B74499ACD6F8CA0551@dfwpml702-chm.exmail.huawei.com>
Content-Type: text/plain; charset="windows-1252"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - box313.bluehost.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - labn.net
X-BWhitelist: no
X-Source-IP: 100.15.84.20
X-Exim-ID: 1dWMkM-0006sg-H1
X-Source:
X-Source-Args:
X-Source-Dir:
X-Source-Sender: pool-100-15-84-20.washdc.fios.verizon.net (fs2.dc.labn.net) [100.15.84.20]:58022
X-Source-Auth: lberger@labn.net
X-Email-Count: 5
X-Source-Cap: bGFibm1vYmk7bGFibm1vYmk7Ym94MzEzLmJsdWVob3N0LmNvbQ==
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/VgxvuYvCOBhzG8c9F3bb5mClrUw>
Subject: Re: [Detnet] Traffic description in DetNet flow info model
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 15 Jul 2017 13:21:31 -0000

We certainly will need to coexist with existing IETF technologies.

(as contributor) I've been assuming that when using TE infrastructure,
that DetNet would co-exist with, and build on, existing service
definitions for LSPs (or equivalent).  This includes, for example,
DiffServ, controlled load (RFC 2211), Guaranteed Service (RFC2212) and,
perhaps, MEF10.1 (RFC6003).

Lou

On 07/15/2017 04:47 AM, Norman Finn wrote:
> You got it, Ethan.  No support for VBR.  I think that's clear in the
> architecture, but let's look at it.
> 
> -- Norm
> 
> ------------------------------------------------------------------------
> *From:* Grossman, Ethan A. [eagros@dolby.com]
> *Sent:* Thursday, July 13, 2017 11:05 AM
> *To:* Norman Finn; Balázs Varga A; John Grant; DetNet WG
> *Subject:* RE: [Detnet] Traffic description in DetNet flow info model
> 
> Hi Norm,
> 
> Thanks for the offer :- ) The original question from Yiyong was:
> 
>  
> 
> The DetNet flow info model should provide some common concepts and
> description of the flow. One part is traffic specification of the flow.
> Here is something not clear, is DetNet dealing with VBR flows and what
> attributes are needed? And how to deal with VBR flow, for source
> guarantee purpose, do we need to define shaping parameters?
> 
> …
> 
> In architecture draft, section 4.1.2, “The traffic characteristics of an
> App-flow can be CBR (constant bit rate) or VBR (variable bit rate)”. In
> section 4.3.2, mentions synchronous flow and asynchronous flow, but no
> details of that.
> 
>  
> 
> So it sounds to me like this should be addressed in that section of the
> Arch draft (e.g. some statement that DetNet itself does not explicitly
> support VBR flow, however this could be implemented e.g. using a CBR
> tunnel + TCP) and thence in the traffic spec (again, DetNet doesn’t do
> VBR). AFAIK there isn’t any specific request for VBR support in the
> existing Use Cases, so no harm no foul? Does that sound right?
> 
>  
> 
> Ethan.
> 
>  
> 
> *From:*Norman Finn [mailto:norman.finn@mail01.huawei.com]
> *Sent:* Thursday, July 13, 2017 1:08 AM
> *To:* Grossman, Ethan A. <eagros@dolby.com>; Balázs Varga A
> <balazs.a.varga@ericsson.com>; John Grant <j@ninetiles.com>; DetNet WG
> <detnet@ietf.org>
> *Subject:* RE: [Detnet] Traffic description in DetNet flow info model
> 
>  
> 
> Thanks for the clarification, Ethan.  Yes, I was absolutely talking
> about a "CBR tunnel" service, though which a customer would be running
> any mix of traffic of any kind.  Either the customer or the provider
> could operate the "tunnel entrance" that does most all of the packet
> dropping.  But, assuming that the dropping is done properly, there would
> be 0 congestion loss through the provider network.
> 
> I also think that this kind of service could be offered by an SP,
> offered by the IT department in an enterprise, or offered to the
> customers of a multi-tenant data center.  I agree with you, that this is
> the only use case I've seen for running TCP over DetNet.
> 
> Maybe I should offer some text for the use cases draft?
> 
> -- Norm
> 
> ------------------------------------------------------------------------
> 
> *From:*Grossman, Ethan A. [eagros@dolby.com]
> *Sent:* Wednesday, July 12, 2017 11:25 AM
> *To:* Norman Finn; Balázs Varga A; John Grant; DetNet WG
> *Subject:* RE: [Detnet] Traffic description in DetNet flow info model
> 
> 1)      In the pro audio and video space it seems to me that constant
> bitrate is the norm; variable rate stream formats exist however they
> aren’t used that much in pro. One indication of that is that the
> (pre-packet-based A/V) industry is accustomed to point-to-point
> per-stream connections (in both analog and digital forms) for both audio
> and video.
> 
> 2)      To me the spirit of DetNet (and AVB/TSN) has been the notion of
> guaranteeing a fixed amount of bandwidth per flow, and I don’t exactly
> see how VBR would fit into the core of DetNet. Norm’s suggestion that a
> user could lease a fixed amount of DetNet-enabled bandwidth then use
> that to transmit multiple TCP streams (which are essentially VBR, and in
> aggregate might be advantageous for multi-stream VBR traffic) makes
> about as much sense as I can see right now. If I’m missing something
> please let me know.
> 
> Ethan.
> 
>  
> 
> *From:*detnet [mailto:detnet-bounces@ietf.org] *On Behalf Of *Norman Finn
> *Sent:* Wednesday, July 12, 2017 12:34 AM
> *To:* Balázs Varga A <balazs.a.varga@ericsson.com
> <mailto:balazs.a.varga@ericsson.com>>; John Grant <j@ninetiles.com
> <mailto:j@ninetiles.com>>; DetNet WG <detnet@ietf.org
> <mailto:detnet@ietf.org>>
> *Subject:* Re: [Detnet] Traffic description in DetNet flow info model
> 
>  
> 
> Certainlly UDP is typical for applications in the industrial space.
> 
> But, given that DetNet can defend itself against misbehaving
> transmitters (by dropping packets), one could certainly supply an
> application with a CBR-like service over which one runs TCP.
> 
> In one sense, you might be better off using some technique like WFQ, so
> that you can get more bandwidth if it's available.  But, if the cost
> parameters are favorable, you can certainly imagine an SP using DetNet
> to offer CBR-over-best-effort services, over which TCP can certainly be
> run.  The downside compared to the usual techniques for this is that
> oversubscription of reservations is not allowed.  The upside is that the
> user gets every last bit of his contracted bandwidth, without random
> variations due to other customers' activity.
> 
> -- Norm
> 
> ------------------------------------------------------------------------
> 
> *From:*detnet [detnet-bounces@ietf.org] on behalf of Balázs Varga A
> [balazs.a.varga@ericsson.com]
> *Sent:* Tuesday, April 25, 2017 1:20 AM
> *To:* John Grant; DetNet WG
> *Subject:* Re: [Detnet] Traffic description in DetNet flow info model
> 
> Hi,
> 
>  
> 
> Good discussion.
> 
>  
> 
> As a general comment I think applications requiring DetNet transport
> should be UDP
> 
> based and not TCP (as retransmission would violate the transport
> parameters the
> 
> DetNet flow requires).
> 
>  
> 
> I think what Yiyong is looking for whether we can make better resource
> reservation
> 
> for DetNet flow being VBR than reserving for peak rate? With CBR we are
> on the safe
> 
> side, no doubt. However for example not all TSN queuing method (e.g.,
> time gated
> 
> queues, etc.) can ensure that unused resources can be used by non-DetNet
> traffic.
> 
>  
> 
> Additionally, would be good to have feedback on how much applications
> would “like”
> 
> the shaping of DetNet flows. Shaping could help for better resource
> utilization,
> 
> but is it a good idea for DetNet?
> 
>  
> 
> I would like to ask the authors of the use-cases to comment what type of
> traffic is
> 
> used in their use-cases (CBR, VBR, something else). Maybe that would
> help to sort
> 
> this out.
> 
>  
> 
> Cheers
> 
> Bala’zs
> 
>  
> 
> *From:*detnet [mailto:detnet-bounces@ietf.org] *On Behalf Of *John Grant
> *Sent:* 2017. április 21. 16:20
> *To:* DetNet WG <detnet@ietf.org <mailto:detnet@ietf.org>>
> *Subject:* Re: [Detnet] Traffic description in DetNet flow info model
> 
>  
> 
> TCP isn't really intended for use with the kind of flows that would use
> CBR or VBR.
> 
>  
> 
> The main facilities provided by TCP are rate control and retransmission
> of lost packets. When transferring a block of data (such as, say, an
> image or a pre-recorded video or a PDF) over a best-effort service,
> these allow the transfer to make best use of what the network provides.
> But if the network service guarantees a particular data rate you don't
> need the kind of rate control that TCP does, and if the network hardly
> ever loses a packet you don't need frequent acknowledgements.
> 
>  
> 
> For instance, if you are sending live audio with a sampling rate of 48k
> samples per second, and packing 12 samples in a packet, you need to send
> a packet every 250 microseconds, so you need CBR with a rate of 4000
> packets (of a certain size) per second.
> 
>  
> 
> The VBR service that was defined for ATM was intended for sending
> compressed video at constant quality, so that "busy" content needs more
> bits per frame than content with less detail. The peak rate is the bit
> rate for the "busiest" content, and the average bit rate was also
> signalled. I think the idea was that you could "overbook" a link by
> routing flows whose peak rates add up to more than the link capacity, in
> the expectation that they wouldn't all be demanding the peak rate at the
> same time. I think something similar is done with digital television
> multiplexes.
> 
>  
> 
> Note that with CBR (and VBR) the rate is determined by the application's
> requirements, whereas with TCP it is determined by what the best-effort
> service delivers.
> 
>  
> 
> John Grant
> Nine Tiles, Cambridge, England
> +44 1223 862599 and +44 1223 511455
> http://www.ninetiles.com
> <https://urldefense.proofpoint.com/v2/url?u=http-3A__www.ninetiles.com&d=DwMF-g&c=lI8Zb6TzM3d1tX4iEu7bpg&r=ZcHC6wX_gDwPDcfMaFNZiQ&m=tS5EY8SXaTQuzywNz5HT0Jrgxk9GSRF2WhaHXBOAl4k&s=RmSC6BBktJC1J2slxfA-haYqlf34eB0oLtUd-Z-oSHY&e=>
> 
>  
> 
> On 21 Apr 2017, at 08:37, zhayiyong wrote:
> 
>  
> 
>     Hi John,
> 
>      
> 
>     Thank you for the reply. I agree that make reservation on peak rate
>     is a simple solution. But the “peak rate” here depends on the
>     observation interval times max packets per interval, which means for
>     same flow, different interval leads to different peak rate. Below is
>     a little testbed we built to test the burstness feature of TCP flow.
> 
>     For the same 25Mbps TCP flow with no shaping:
> 
>      
> 
>     <image007.jpg>
> 
>     1s observation interval, peak rate 450Mbps.
> 
>      
> 
>     <image008.jpg>
> 
>     100ms observation interval, peak rate 900Mbps.
> 
>      
> 
>     <image009.jpg>
> 
>     10ms observation interval, peak rate 1Gbps, which is the link
>     speed/physical port speed.
> 
>      
> 
>     And further test shows that, 8 of these TCP flows to a 1Gbps port
>     cause packet loss. So my question is how can we make reservation
>     based on “peak rate”? E.g., for the same flow, if we take 1s
>     observation interval, we can serve 2 flows. But for 10ms observation
>     interval, only 1 flow, which does not make sense. And it is hard to
>     say long observation interval can guarantee delay and loss, since
>     buffer in router is only milliseconds level.
> 
>      
> 
>     Another thing is how to guarantee the source with max packets within
>     the interval. If shaping is necessary, what kind of parameters are
>     needed.
> 
>      
> 
>     Cheers,
> 
>     Yiyong
> 
>     *From:* detnet [mailto:detnet-bounces@ietf.org] *On Behalf Of *John
>     Grant
>     *Sent:* Thursday, April 20, 2017 5:27 PM
>     *To:* DetNet WG
>     *Subject:* Re: [Detnet] Traffic description in DetNet flow info model
> 
>      
> 
>     As pointed out in 4.1.2, for a VBR flow you have to make a
>     reservation for the peak rate, and there isn't any reason to do
>     anything other than use the service that is already defined for CBR.
>     With circuit-switched systems any part of the reservation that
>     wasn't used was wasted, but in packet-based systems it can be used
>     for best-effort traffic, as stated in 4.3.2.
> 
>      
> 
>     Regarding synchronous flows, the first paragraph of 4.3.2 explains
>     that if the reservations on incoming and outgoing links are
>     time-aligned then the latency, and hence the amount of buffer space
>     required, can be minimised. The details mechanism for achieving that
>     would, I think, be out of scope for an architecture document.
> 
>      
> 
>     For a description of a system that implements synchronous flows, see
>     clause 5 of ETSI GR NGP 003, available from the "specifications" tab
>     at http://www.etsi.org/technologies-clusters/technologies/next-generation-protocols
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__www.etsi.org_technologies-2Dclusters_technologies_next-2Dgeneration-2Dprotocols&d=DwMF-g&c=lI8Zb6TzM3d1tX4iEu7bpg&r=ZcHC6wX_gDwPDcfMaFNZiQ&m=tS5EY8SXaTQuzywNz5HT0Jrgxk9GSRF2WhaHXBOAl4k&s=ML38iAvI654emuUqPEQU1n8X7v3dy0G3x6FIlK2yFhA&e=>
> 
>      
> 
>     John Grant
>     Nine Tiles, Cambridge, England
>     +44 1223 862599 and +44 1223 511455
>     http://www.ninetiles.com
>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__www.ninetiles.com_&d=DwMF-g&c=lI8Zb6TzM3d1tX4iEu7bpg&r=ZcHC6wX_gDwPDcfMaFNZiQ&m=tS5EY8SXaTQuzywNz5HT0Jrgxk9GSRF2WhaHXBOAl4k&s=JAKBl0WO6WGg8P0NfwBx-dcUfmUZ9AvKKEwQKEIx_p4&e=>
> 
>     On 20 Apr 2017, at 08:38, zhayiyong wrote:
> 
>      
> 
>     Hi All,
> 
>      
> 
>     Recently we have some discussion among authors of the two flow info
>     model draft. The DetNet flow info model should provide some common
>     concepts and description of the flow. One part is traffic
>     specification of the flow. Here is something not clear, is DetNet
>     dealing with VBR flows and what attributes are needed? And how to
>     deal with VBR flow, for source guarantee purpose, do we need to
>     define shaping parameters?
> 
>      
> 
>     In architecture draft, section 4.1.2, “The traffic characteristics
>     of an App-flow can be CBR (constant bit rate) or VBR (variable bit
>     rate)”. In section 4.3.2, mentions synchronous flow and asynchronous
>     flow, but no details of that.
> 
>     In use case draft, for some cases such as industrial and BAS, it can
>     assumes that the traffic is periodic with constant rate. For cases
>     such as Cellular Radio and M2M, there is usually no assumption on
>     the traffic. E.g., CoMP traffic is between two eNBs, it is hard to
>     say the flow is constant rate.
> 
>      
> 
>     Cheers,
> 
>     Yiyong
> 
>  
> 
>  
> 
> 
> 
> _______________________________________________
> detnet mailing list
> detnet@ietf.org
> https://www.ietf.org/mailman/listinfo/detnet
>