[Detnet] Fwd: Re: Last Call Review for ietf-detnet architecture

János Farkas <janos.farkas@ericsson.com> Fri, 19 October 2018 19:20 UTC

Return-Path: <Janos.Farkas@ericsson.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C58091310F0 for <detnet@ietfa.amsl.com>; Fri, 19 Oct 2018 12:20:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.364
X-Spam-Level:
X-Spam-Status: No, score=-4.364 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.064, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0vUKzAGGhlVM for <detnet@ietfa.amsl.com>; Fri, 19 Oct 2018 12:20:13 -0700 (PDT)
Received: from sesbmg22.ericsson.net (sesbmg22.ericsson.net [193.180.251.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E30511310D6 for <detnet@ietf.org>; Fri, 19 Oct 2018 12:19:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/simple; q=dns/txt; i=@ericsson.com; t=1539976789; x=1542568789; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=izZdGBdcmpsetz3sO08wNcb9lqe6lYJ0sEhznWpM/20=; b=bq+j3GoLDs/kkSizB3O63W8XECF0KXsFTkTEbrOJlhasy9hYqT8zNvysAS+Zm+yA IPYqu92NKIjjQCWcphkVdP7mpox8LWAAZ/tIXHZiTeGT0qIsEinjVHcOr43CWQKb +9BVBmlFzb6x/d+BmWrLFhGsuM0QkPBn/k1+FvynU+0=;
X-AuditID: c1b4fb30-2d3ff700000047d2-8e-5bca2e552ece
Received: from ESESSMB502.ericsson.se (Unknown_Domain [153.88.183.120]) by sesbmg22.ericsson.net (Symantec Mail Security) with SMTP id 5F.CE.18386.55E2ACB5; Fri, 19 Oct 2018 21:19:49 +0200 (CEST)
Received: from ESESSMR503.ericsson.se (153.88.183.112) by ESESSMB502.ericsson.se (153.88.183.190) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Fri, 19 Oct 2018 21:19:48 +0200
Received: from ESESBMB501.ericsson.se (153.88.183.168) by ESESSMR503.ericsson.se (153.88.183.112) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Fri, 19 Oct 2018 21:19:48 +0200
Received: from [100.94.32.88] (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.184) with Microsoft SMTP Server id 15.1.1466.3 via Frontend Transport; Fri, 19 Oct 2018 21:19:46 +0200
References: <b9f952d6-581e-495c-8d85-325d6af7b73e@ericsson.com>
From: János Farkas <janos.farkas@ericsson.com>
To: Henning Rogge <hrogge@gmail.com>
CC: detnet@ietf.org, norman.finn@mail01.huawei.com, "Pascal Thubert (pthubert)" <pthubert@cisco.com>, Balázs Varga A <balazs.a.varga@ericsson.com>
X-Forwarded-Message-Id: <b9f952d6-581e-495c-8d85-325d6af7b73e@ericsson.com>
Message-ID: <023e158d-3e5c-048d-8df5-6ac6d1836262@ericsson.com>
Date: Fri, 19 Oct 2018 21:19:45 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.2.1
MIME-Version: 1.0
In-Reply-To: <b9f952d6-581e-495c-8d85-325d6af7b73e@ericsson.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Content-Language: en-US
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFmplkeLIzCtJLcpLzFFi42KZGbG9QjdU71S0wZr5fBa/P81msZi+YD2r xbKjp5ksZkx5x+jA4jHl90ZWj52z7rJ7LFnyk8ljx+YHrAEsUVw2Kak5mWWpRfp2CVwZu7af ZC1YpFKx6fQjxgbGlbJdjJwcEgImEtfvrGQGsYUEjjJKfDrMCmF/Y5TYdNq3i5ELwr7dNZMF wjnMKLHxzhp2kCphAXuJmQebobrtJbavmMwIYrMB2XcvbQCLiwioSHQdXswI0swssJpRYsWU V4wQq70lfv+cy9bFyMHBC9Rw/WYcSJhFQFVi94EvYL2iArESn64sBrN5BQQlTs58wgJicwo4 SDw4+o8JxGYWsJCYOf88I4QtL7H97RxmCFtc4taT+UwQt6lJvG+4wziBUWQWklGzkLTPQtI+ C0n7AkaWVYyixanFSbnpRkZ6qUWZycXF+Xl6eaklmxiBkXNwy2+DHYwvnzseYhTgYFTi4eXh PhUtxJpYVlyZe4hRgoNZSYRXsfRktBBvSmJlVWpRfnxRaU5q8SFGaQ4WJXFeC7/NUUIC6Ykl qdmpqQWpRTBZJg5OqQbGHskbW+2PKXWzfLQ4kWJQ9aLu67HTH2SYak1P7tt/UPnKhProGAm/ 9wdP/jncMCVH7trSjkhXuwBFuY0+34rLM5h05qo7flD6IXvw0tWkGaK/2v26fit68827FqyX cFKt7VNfPLvY0d6lQvpJNfevSXp3fXZep6l73f/eo2Pt9ucWKG3qaC9TYinOSDTUYi4qTgQA 3MstWJgCAAA=
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/a6KDecrU51ETVSOMQ7_Ph6Gog0Y>
Subject: [Detnet] Fwd: Re: Last Call Review for ietf-detnet architecture
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Oct 2018 19:20:20 -0000

Hi Henning,

Thank you very much for your review!

Please find below in-line responses and how we will update the draft to 
resolve your comments.

Best regards,
Janos


On 10/10/2018 3:13 PM, Henning Rogge wrote:
> Hi,
>
> I was asked to do a last-call review for the detnet architecture 08
> draft... sorry for the delay.
>
> I think the draft provides a good overview what detnet wants to do.
> When read in order, some chapters seem to skip a few points that get
> included in later chapters (in a different context), but I think this
> should be easy to fix.
>
> Here are some comments to the draft that came to my mind during reading it:
>
>
>
> Detnet Relay Node (Page 5)
>
> can be bridge (which should be layer2), but Detnet operates on IP layer?
bridge is removed based on last call comments: 
https://www.ietf.org/mail-archive/web/detnet/current/msg01790.html

>
> Congestion Protection (Page 8)
>
> Does Detnet differenciate between limited network capabilities because
> of media access and datarate? In some networks you might hit a "packet
> per time" limit before you hit the "byte per time" limit, which is
> mostly solved by aggregating multiple packets.
>
>
> Explicit Routes (Page 8)
>
> Does this mean DetNet normally uses a "frozen" state of a route, e.g.
> a snapshot of a routing protocol? What happens if the route does not
> apply anymore (maybe this is out-of-scope for DetNet)?
These issues are solved by explicit routing techniques.
For instance, explicit routes are used with PREOF. If one of the routes 
go down, then the other one remains. The broken route is then 
changed/updated by explicit routing techniques, e.g., by a central 
network controller.
DetNet only refers to explicit routing techniques specified by other 
IETF WGs, DetNet does not specify explicit routing details; it is out of 
scope for DetNet.

>
> Sufficient buffer (Page 10)
>
> "Sufficient buffer" also can give you a higher amount of latency. If
> for whatever reason a packet arrives "too late", it might be better to
> drop it to recover the realtime behavior of the following packets
> (assuming more allocated bandwidth than necessary). This is explained
> in page 15 (3.3.2. Fault Mitigation) I think.

The next paragraph in 3.2.1.1 explains that the buffers have to be 
adequately designed, which keeps under control the delay and jitter that 
can be caused by buffering:

"Ensuring adequate buffering requires, in turn, that the source, and
every DetNet node along the path to the destination (or nearly every
node, see Section 4.3.3) be careful to regulate its output to not
exceed the data rate for any DetNet flow, except for brief periods
when making up for interfering traffic. Any packet sent ahead of its
time potentially adds to the number of buffers required by the next
hop DetNet node and may thus exceed the resources allocated for a
particular DetNet flow."

>
> Extra Buffering for different-length paths (Page 13)
>
> This sounds like another point where additional latency might appear.
It is additional latency, but it is deterministic latency.

>
> Reduction of available bandwidth for non-DetNet packets (Page 15)
>
> ... and increased latency.
> (Mixing DetNet and non-DetNet packets sounds quite difficult if you
> want to keep all guarantees of DetNet)
Correct.
Updates will be made to clarify along last call comments:
https://www.ietf.org/mail-archive/web/detnet/current/msg01791.html

>
> DetNet data plane protocol stack (Page 18)
>
> How does this diagram mesh with the standard stack layers? Are IP/MAC
> all "lower Layers" ?
>
Updates will be made to clarify along last call comments:
https://www.ietf.org/mail-archive/web/detnet/current/msg01791.html

> DetNet adaptation to data plane (Page 19)
>
> Figure 4 reads like the combination of UDP and IP (with static routes
> set) would be okay for DetNet under certain circumstances... no
> "hop-by-hop" userspace (DetNet)-processing required?
The data plane forwarding avoids user space processing.
The details are in the data plane documents:
https://datatracker.ietf.org/doc/draft-ietf-detnet-dp-sol-mpls/
https://datatracker.ietf.org/doc/draft-ietf-detnet-dp-sol-ip/

>
> Synchronous DetNet (Page 24)
>
> I feel that the most important advantage of this would be the
> collision-free usage of the shared links between the DetNet nodes,
> which helps to keep the Latency to a lower limit.
Yes, if synchronization is available, then more can be done, e.g., 
time-based scheduling techniques can be used.

>
> Henning Rogge