Re: [Detnet] draft-varga-detnet-ip-preof

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Wed, 04 August 2021 13:27 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D1BCB3A1AC5 for <detnet@ietfa.amsl.com>; Wed, 4 Aug 2021 06:27:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.888
X-Spam-Level:
X-Spam-Status: No, score=-11.888 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001, SPF_NONE=0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=QwFW7Vq0; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=b8Wl6X1S
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wsQ2fdkQkbXD for <detnet@ietfa.amsl.com>; Wed, 4 Aug 2021 06:27:35 -0700 (PDT)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 172C33A1ADE for <detnet@ietf.org>; Wed, 4 Aug 2021 06:27:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=64170; q=dns/txt; s=iport; t=1628083655; x=1629293255; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=+k3SNLrsjpgImnnk0UVmImx+moiM6UJkJgyRxdhMvfk=; b=QwFW7Vq0e59Lv9dO3fjjlkQhShZeh9PQMLKy0KbgxRvftjyv01lkruaD NFmJRynarn4SJpODLSzr/z/OBrhUt0N/aPOrKADxGdqDQFrOmhKVhuVd9 QR2a9gDtuut5Nlydv+O0RYAPjMCKrTx2LAzOjyu19wKFR8AbrhWiOGmaL M=;
X-IPAS-Result: A0ANAwDFlAphl4sNJK1agmKBIzBRflo3MYRHg0gDhTmIYAOKWY9bglMDTwULAQEBDQEBKgEKDAQBAYFCAYJQRQIXgmgCJTcGDgIEAQEBAQMCAwEBAQEFAQEFAQEBAgEGBBQBAQEBAQEBAYEIhWgNhkIBAQEBAwEBEBEEBhMBASwLAQsEAgEIEQEDAQEhAQYDAgICHwYLFAMGCAIEDgUIEweCTwGBflcDLwEOnxsBgToCih96fzKBAYIHAQEGBASBOgIOQYMtDQuCNAMGgTqCfIJyU0gBAYEYhUwHIByBSUSBFUOCYj6CIEIBAQIBgV8FBwkWCQKCXzaCLoIhbAcQV1ECRggNCxUKEy0IDQQBHgY6K5FHBwKDOYg/jTyRPVwKgyiKOIc8hnGFfBKDY4tghkKQYqJHgzSQHwSBeoMJAgQCBAUCDgEBBoF2I4FbcBU7gmlQGQ6OOINYhRSFSnMCAQE0AgYBCgEBAwmKUAEB
IronPort-PHdr: A9a23:mwqhchChcSEvsqBuekgzUyQViBdPi9zP1kY95p8ukbkIc6m/8dLlJ kOMrflujVqcW4Ld5roEjufNqKnvVCQG5orJq3ENdpFAFnpnwcUblgAtGoiJXEv8KvO5YykzB s8EVVJ58Te8K0cGUMr7bkfZ93u16zNaEx7jNA1zc+LyHIOaj8m+2+2ovZPJZAAdjzumarQ0J xKz/m3s
IronPort-HdrOrdr: A9a23:Fv6kqqG5EVUKRQjApLqFsZLXdLJyesId70hD6qkvc31om52j+f xGws516fatskduZJkh8erwX5VoMkmshKKdgLNhfYtKOTOHhILGFvAY0WNtqQeQYREWmtQtsJ uINpIOd+EYbmIKzvoSgjPIburIqePvmMvD6IuurAYOcegpUdAd0+4TMHf8LqQCfng/OXNPLu vk2iMonUvFRV0nKuCAQlUVVenKoNPG0Lj8ZwQdOhIh4A6SyRu19b/TCXGjr1UjegIK5Y1n3X nOkgT/6Knmmeq80AXg22ja6IkTsMf9y+FEGNeHhqEuW3DRY0eTFcBcso+5zXYISdKUmQ8XeR 730k8d1vFImjTsl6eO0EDQMkfboWwTAjTZuC+laDPY0L/ErXQBepd8bUYzSGqH16Lm1+sMjJ 6jlljpxaZ/HFfOmj/w6MPPUAwvnk2ooWA6mepWlHBHV5ACAYUh4bD30XklWqvoJhiKpbzP0d Meev309bJTaxeXfnrZtm5gzJilWWkyBA6PRgwHttaO2zZbkXhlxw9ArfZv0Eso5dY4Ud1J9u 7EOqNnmPVHSdIXd7t0AKMETdGsAmLATBrQOCaZIEjhFqsAJ3XRwqSHr4kd9aWvYtgF3ZEykJ POXBdRsnMzYVvnDYmU0JhC4nn2MS6AtPTWu4ljDr1Cy/zBrZbQQFm+oWEV4oKdSq8kc7jmst 6ISeVrP8M=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.84,294,1620691200"; d="scan'208,217";a="724946365"
Received: from alln-core-6.cisco.com ([173.36.13.139]) by alln-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 04 Aug 2021 13:27:33 +0000
Received: from mail.cisco.com (xbe-rcd-001.cisco.com [173.37.102.16]) by alln-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id 174DRXN0016810 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Wed, 4 Aug 2021 13:27:33 GMT
Received: from xfe-rtp-003.cisco.com (64.101.210.233) by xbe-rcd-001.cisco.com (173.37.102.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Wed, 4 Aug 2021 08:27:33 -0500
Received: from xfe-rcd-002.cisco.com (173.37.227.250) by xfe-rtp-003.cisco.com (64.101.210.233) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Wed, 4 Aug 2021 09:27:32 -0400
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-002.cisco.com (173.37.227.250) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15 via Frontend Transport; Wed, 4 Aug 2021 08:27:32 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=LoB0n+PpMCTBeUGlWb52xdj4eRreSEzWuCC9P+Sbtf5DtwNZuCxZ1y3Sa5AiHLjtJwO1QVT6e8IW2cR3QXwXSy+7YYR3bql0Ob5BlqWe9n3JgW5GCuYkJdjrSoer15TPptnN3glk29/Or60OJPcxp5aS7ywrYU7LzUKsbZdmG3NA2m0G4pBo8JVow7FaqNEP6VrPYw/YGyZp76qZkV65to4msUI0zqR8Q1aWaVYICxGmj9wlKVwCg9ocYfhHp0hsvVcR9CZzejywIAx3P1PaodppznFYpkuV7a1Z7+Snaamd4zAXDL+4MsSKleLNGS6i/8gm34OZrNAONKo0KIrcOw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+k3SNLrsjpgImnnk0UVmImx+moiM6UJkJgyRxdhMvfk=; b=JgszpTTnzxQEWKOOQr2z2gzW9EDbhrHbWS+Gld4JkKwkYHk4LdDmv94GJ4GG394n8j2mNeYRlnNX5gWWKxkZK3uiR6KWDAgbe+TtFx8AIkFqxcZ1vhX848Df5NOXfIsZgPYAbpRFao/J0om1fi8lzsXxOa8Htt+snCWkh/wWO+7Pxv1ZJXxw8fCBMPgR4PGY+pkLWod94HeomsuUbp1tl/JBVooOaYAzvkwxlG3Lng4OmnU8yn8/O2mhgb6QXmHXC4IibuDJarjXySiumTm0rI6e44HxYnWfHPDPIz2gsLDVnkT3I7yLNtY3EN/A6LJ7CxDAi4Ol1sHGZSl2Wtk5JA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+k3SNLrsjpgImnnk0UVmImx+moiM6UJkJgyRxdhMvfk=; b=b8Wl6X1S4igr2QQVrxg/dNkvXxYBFNPoChH2Adr/8S8tHBq0h7xC/ezXqqnfUIU8ncfVIyVkQfke2QI18W023KpGKnDOcC9yn0AQhBidINVDlTzIFHSwPjxscw/JPetJM2dpEnQckBb81h+4C3NdcHQ7onR5nEWRTUopmzifZ0k=
Received: from CO1PR11MB4881.namprd11.prod.outlook.com (2603:10b6:303:91::20) by CO1PR11MB4962.namprd11.prod.outlook.com (2603:10b6:303:99::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4373.18; Wed, 4 Aug 2021 13:27:31 +0000
Received: from CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::1c75:fcc9:2c53:3af6]) by CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::1c75:fcc9:2c53:3af6%6]) with mapi id 15.20.4373.027; Wed, 4 Aug 2021 13:27:31 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Balázs Varga A <balazs.a.varga=40ericsson.com@dmarc.ietf.org>
CC: "detnet@ietf.org" <detnet@ietf.org>
Thread-Topic: [Detnet] draft-varga-detnet-ip-preof
Thread-Index: AdeCJhL5qclO3ipmQnOhnkjJnCiKCAAE+ubAAAYMvuAAA3HbcAAA8i7vAaxgKjAABOigkA==
Date: Wed, 04 Aug 2021 13:27:05 +0000
Deferred-Delivery: Wed, 4 Aug 2021 13:26:56 +0000
Message-ID: <CO1PR11MB48819BCDE2D902FF3D77417ED8F19@CO1PR11MB4881.namprd11.prod.outlook.com>
References: <CO1PR11MB4881E860FF54BFB6CF04BF39D8E89@CO1PR11MB4881.namprd11.prod.outlook.com> <AM0PR07MB534784B537193F4F88241045ACE89@AM0PR07MB5347.eurprd07.prod.outlook.com> <AS8PR07MB8298836F25EE12742C278B44F2E89@AS8PR07MB8298.eurprd07.prod.outlook.com>, <AM0PR07MB53475FF5EC7C92D8285A27F0ACE89@AM0PR07MB5347.eurprd07.prod.outlook.com> <6E1BB2CC-FDCE-4F97-9036-894B7C30B904@cisco.com> <AM0PR07MB5347A00815E7D75D19F8A19BACF19@AM0PR07MB5347.eurprd07.prod.outlook.com>
In-Reply-To: <AM0PR07MB5347A00815E7D75D19F8A19BACF19@AM0PR07MB5347.eurprd07.prod.outlook.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dmarc.ietf.org; dkim=none (message not signed) header.d=none;dmarc.ietf.org; dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6a474684-6370-4b95-6130-08d9574b9cf5
x-ms-traffictypediagnostic: CO1PR11MB4962:
x-microsoft-antispam-prvs: <CO1PR11MB4962D0430DB6F69DCC57263AD8F19@CO1PR11MB4962.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB4881.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(376002)(346002)(366004)(39860400002)(396003)(136003)(83380400001)(166002)(9686003)(966005)(76116006)(55016002)(66946007)(2906002)(71200400001)(66556008)(478600001)(4326008)(6666004)(52536014)(64756008)(33656002)(316002)(5660300002)(86362001)(66446008)(53546011)(186003)(8936002)(8676002)(66476007)(26005)(6506007)(38100700002)(122000001)(7696005)(66574015)(38070700005); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_CO1PR11MB48819BCDE2D902FF3D77417ED8F19CO1PR11MB4881namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4881.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6a474684-6370-4b95-6130-08d9574b9cf5
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Aug 2021 13:27:31.6777 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: aBQjBJ5ljqRB7bYZRScMNwb0u5VUr9egyfbuQWK8oIENCvrZGeKiUJV1lIpFWVg2LBKjIpzQbxuu/ea6ttW9Zg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR11MB4962
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.16, xbe-rcd-001.cisco.com
X-Outbound-Node: alln-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/ZH5Zq6Pt_JmJO8Zv9sKTxR-Eqps>
Subject: Re: [Detnet] draft-varga-detnet-ip-preof
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Aug 2021 13:27:40 -0000

Hello Bala’zs

I understand the value of reusing building MPLS blocks when the end-to-end path may use a mix of IP and MPLS, so yes, I see the value in your approach. This way a single method is used end-to-end. My first question below was then, why not describe how to use RFC 7510 for DetNet; this would seem an even faster path to build converged DetNet (IP + MPLS) networks. I have not seen in your answer the value of not simply doing simply that. The point within the point being that in the case of a pure IPv6 network, it would be sad to have to live with the MPLS limitations.

I listed the limitations that I’d rather live without in my questions, that are found appended below.
In summary:
- The format of labels that is not self-describing, so finding and processing errors can be harder. Anything can reach a node over UDP.
- The format of the labels does not support a number of functions like, say, network coding where the same sequence is split in multiple sub packets that can be received in any order and must not be eliminated unless identical
- The UDP encapsulation that forces the hardware to dig deep in the packet, which comes at a cost for the ASIC.
- The forwarding decision is based on the flow using the 5/6 tuple. The flow is the application view, saying what the packet is, when what we need is routing information, that is the network view, saying what to do with this packet. This is confusing the water with the pipe and causes all the hassle we see with OAM, but also aggregation downstream in the network
- Then there’s the cost of that aggregation, which has to  end up UDP in UDP, since “flows” are merged in a bigger “flow”.

I’d like to see the minimum addition to RFC 7510 and then a real IPv6-native proposal. To Lou’s point, an MPLS stack will be a hard sell to RAW, and that’s not only RAW. It’s unclear to me whether MPLS would be needed and successful in other DetNet use cases such as factory Automation, Pro Audio, or cloud. I think both need to progress, one MPLS-friendly for SP networks, and one more generic and IPv6-native one for new use cases.

Makes sense?

Pascal


From: Balázs Varga A <balazs.a.varga=40ericsson.com@dmarc.ietf.org>
Sent: mercredi 4 août 2021 12:11
To: Pascal Thubert (pthubert) <pthubert@cisco.com>
Cc: detnet@ietf.org
Subject: RE: [Detnet] draft-varga-detnet-ip-preof

Hi Pascal,

Many thanks for the new comments.

Yes, forwarding between relay nodes (doing service sub-layer) is based on the 6-tuple.
Aggregated flows use the same UDP tunnel as defined in Section “4.4. Flow Aggregation”.

Regarding your concerns using UDP: It is the same for all UDP encapsulations. We have
not changed the rules of RFC9025, this draft reuses existing DetNet data plane building
blocks. :--)) It provides DetNet service sub-layer for IP with minimal effort (i.e., minimal
standardization and implementation effort). No new header fields are specified. It is a
generic IP solution, already available both for IPv6 and IPv4. And it does not require any
additional processing on transit nodes.

Thanks & Cheers
Bala’zs

From: Pascal Thubert (pthubert) <pthubert=40cisco.com@dmarc.ietf.org<mailto:pthubert=40cisco.com@dmarc.ietf.org>>
Sent: Monday, July 26, 2021 11:18 PM
To: Balázs Varga A <balazs.a.varga@ericsson.com<mailto:balazs.a.varga@ericsson.com>>
Cc: detnet@ietf.org<mailto:detnet@ietf.org>
Subject: Re: [Detnet] draft-varga-detnet-ip-preof

Hello Bala’zs

Many thanks for the clarification; I expected that the aggregation label would signal a common path but from your response it seems the draft still relies on the flow to find the path, based on the 5/6 tuple, correct ?
<BV> Yes, forwarding between relay nodes (doing service sub-layer) is based on the 6-tuple. Aggregated flows use the same UDP tunnel.


My bottom line stands though. Aggregation and PREOF may happen inside the network. And it means encapsulation. Going all the way to UDP will make the header to insert and read bigger.
<BV> Yes, this is the same for all UDP encapsulations.

 I understand now that you place only service layer information in there, but that still needs to happen at wire speed, and bigger headers can be counter productive for DetNet tput and latency, and be more complicated to implement in hardware.
<BV> We have not changed the rules of RFC9025, this draft reuses existing DetNet data plane building blocks. :--)) Scalability and aggregation


Do I miss anything ?

Pascal

Le 26 juil. 2021 à 23:00, Balázs Varga A <balazs.a.varga=40ericsson.com@dmarc.ietf.org<mailto:balazs.a.varga=40ericsson.com@dmarc.ietf.org>> a écrit :


Hi Pascal,

Many thanks for the clarification questions.

Please see my comments inline.

Cheers

Bala'zs





-----Original Message-----
From: Pascal Thubert (pthubert) <pthubert@cisco.com<mailto:pthubert@cisco.com>>
Sent: Monday, July 26, 2021 4:00 PM
To: Janos Farkas <Janos.Farkas@ericsson.com<mailto:Janos.Farkas@ericsson.com>>; Balázs Varga A <balazs.a.varga@ericsson.com<mailto:balazs.a.varga@ericsson.com>>; agmalis@gmail.com<mailto:agmalis@gmail.com>
Cc: detnet@ietf.org<mailto:detnet@ietf.org>
Subject: draft-varga-detnet-ip-preof



Hello Balázs, János, and Andy:



In prep for next Friday meeting I went through https://datatracker.ietf.org/doc/html/draft-varga-detnet-ip-preof-00. I have a few questions that might be too much for the mike, and considering the short time we have, I thought we should start here.



- At first glance the draft seems to be placing the DetNet MPLS dataplane within UDP. If that is the intention, what are the benefits vs. using RFC 7510?

<BV> No, this draft is not about putting the MPLS data plane into UDP.

This draft is about how to provide PREOF for the DetNet IP data plane in a simple way, with no new header or data plane definition; but leveraging existing ones. That’s why it is informational.

That is, this draft leverages RFC 9025, which leverages RFC 7510. It is applicable both to IPv4 and IPv6.

Key point in this draft is that DetNet PW (S-Label + d-CW) is placed in UDP. It is very important that there is *NO* label switching along the path.



- Some of the labels in there are needed at every hop to select one or more next hop(s) along the DetNet path. Can it be a problem to find that information deep inside the packet?

<BV> No, the DetNet PW information is used only at relay nodes (as per rfc8655 those includes DetNet service sub-layer). Intermediate nodes (transit nodes) do not need service sub-layer specific information, so they do not need find anything “deep inside the packet”.



- There can be variations of the label stack, e.g., fig 3 vs fig 4. Are the labels self-describing? Else, how does the forwarding node know what shape of stack to expect?

<BV> As the DetNet PW information is used only by relay nodes, they know by configuration of the service sub-layer (e.g., PREOF) how to process the packet. From service sub-layer perspective it is the same concept used in rfc8964.



- I'm concerned about the aggregation scenario. Contrary to MPLS, an IPv6 intermediate node is not allowed to insert headers, in particular not after the UDP header. So it seems that the aggregation proposed is always done at the end points. Is that correct?

<BV> Aggregation just works fine. Any relay node can perform aggregation as UDP tunnels are span between relay nodes.



Please consider the following picture from RFC 8655:



   DetNet                                                     DetNet

   End System                                                 End System

      _                                                             _

     / \     +----DetNet-UNI (U)                                   / \

    /App\    |                                                    /App\

   /-----\   |                                                   /-----\

   | NIC |   v         ________                                  | NIC |

   +--+--+   _____    /        \             DetNet-UNI (U) --+  +--+--+

      |     /     \__/          \                             |     |

      |    / +----+    +----+    \_____                       |     |

      |   /  |    |    |    |          \_______               |     |

      +------U PE +----+ P  +----+             \          _   v     |

          |  |    |    |    |    |              |     ___/ \        |

          |  +--+-+    +----+    |       +----+ |    /      \_      |

          \     |                |       |    | |   /         \     |

           \    |   +----+    +--+-+  +--+PE  |------         U-----+

            \   |   |    |    |    |  |  |    | |   \_      _/

             \  +---+ P  +----+ P  +--+  +----+ |     \____/

              \___  |    |    |    |           /

                  \ +----+__  +----+     DetNet-1    DetNet-2

      |            \_____/  \___________/                           |

      |                                                             |

      |      |     End-to-End Service         |     |         |     |

      <------------------------------------------------------------->

      |      |     DetNet Service             |     |         |     |

      |      <------------------------------------------------>     |

      |      |                                |     |         |     |



          (RFC 8655) Figure 5: DetNet Service Reference Model (Multidomain)



You'll note that the DetNet architecture allows for endpoints that are not service-aware, in which case the service layer information is logically owned by the PEs. A PE should be able to add / remove stuff that is relevant either within its domain (e.g., PREOF using SRv6 with Xuesong's SPRING draft) and / or within the DetNet Service Domain (across domains 1 and 2 above), e.g., redundancy information, excluding the End Systems which may encrypt their payload and may not provide anything usable for redundancy anyway.



As a specific example, the aggregation should be feasible between DetNet-1 egress PE and Detnet-2 ingress PE. In IPv6 this means encapsulation, and it makes sense to minimize the incremental size. UDP in UDP seems a lot doesn't it?



My bottom line is that if we want intermediate nodes to add and remove stuff, it has to be thought in terms of matching encapsulation and decapsulation. IPv6 has EHs that are designed to fit in such encapsulation, possibly together, like an RH for replication and a HbH for path and redundancy information.



What do you think?

<BV> Again, the DetNet PW information is used only at relay nodes (doing service sub-layer). Intermediate nodes (transit nodes) do not need service sub-layer specific information and do not “add and remove stuff”. Aggregation and the DetNet service reference model just works fine with this solution, which just (re)uses existing DetNet data plane.



Pascal


_______________________________________________
detnet mailing list
detnet@ietf.org<mailto:detnet@ietf.org>
https://www.ietf.org/mailman/listinfo/detnet