Re: [Detnet] consolidated response: IP Data Plane draft comments

Lou Berger <lberger@labn.net> Sat, 12 October 2019 22:20 UTC

Return-Path: <lberger@labn.net>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 91D8D120089 for <detnet@ietfa.amsl.com>; Sat, 12 Oct 2019 15:20:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (768-bit key) header.d=labn.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xKGVRgUlRjnM for <detnet@ietfa.amsl.com>; Sat, 12 Oct 2019 15:20:18 -0700 (PDT)
Received: from gproxy6-pub.mail.unifiedlayer.com (outbound-ss-348.hostmonster.com [74.220.202.212]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A536012002E for <detnet@ietf.org>; Sat, 12 Oct 2019 15:20:18 -0700 (PDT)
Received: from cmgw14.unifiedlayer.com (unknown [10.9.0.14]) by gproxy6.mail.unifiedlayer.com (Postfix) with ESMTP id 1D7281E0723 for <detnet@ietf.org>; Sat, 12 Oct 2019 16:20:18 -0600 (MDT)
Received: from box313.bluehost.com ([69.89.31.113]) by cmsmtp with ESMTP id JPkHi98SOhwcbJPkHiLA8A; Sat, 12 Oct 2019 16:20:18 -0600
X-Authority-Reason: nr=8
X-Authority-Analysis: v=2.3 cv=PtG9kTE3 c=1 sm=1 tr=0 a=h1BC+oY+fLhyFmnTBx92Jg==:117 a=h1BC+oY+fLhyFmnTBx92Jg==:17 a=dLZJa+xiwSxG16/P+YVxDGlgEgI=:19 a=jpOVt7BSZ2e4Z31A5e1TngXxSK0=:19 a=IkcTkHD0fZMA:10:nop_charset_1 a=xqWC_Br6kY4A:10:nop_ipv6 a=XobE76Q3jBoA:10:nop_rcvd_month_year a=Vy_oeq2dmq0A:10:endurance_base64_authed_username_1 a=174xjjHKAAAA:20 a=wU2YTnxGAAAA:8 a=48vgC7mUAAAA:8 a=iLNU1ar6AAAA:8 a=bt8Zh30PAAAA:8 a=92DrXOnLmvpaVwB82E4A:9 a=7Zwj6sZBwVKJAoWSPKxL6X1jA+E=:19 a=fQJtZYPh3szLv_gk:21 a=899wwQdSGXYUFDcd:21 a=QEXdDO2ut3YA:10:nop_charset_2 a=Yz9wTY_ffGCQnEDHKrcv:22 a=w1C3t2QeGrPiZgrLijVG:22
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=labn.net; s=default; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:MIME-Version :Date:Message-ID:From:References:Cc:To:Subject:Sender:Reply-To:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=SaE+JGKwEeGbutcKA+mHXsiKULAjg6BdNeOlxj4odPA=; b=AkYJiMnqUSFWFSuLPcUUeieuTY l70T6MVNsPjzWrMyFeZhwV3dQpJmxEkwwN07Zeykilkm73zdo/q2jQai/68nMi1uIh+Pf6+Or3P7K v1dzJJ/fdJD3PsKtIwb9g7S68;
Received: from [127.0.0.1] (port=44551 helo=[IPv6:::1]) by box313.bluehost.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.92) (envelope-from <lberger@labn.net>) id 1iJPkH-0044DK-Ho; Sat, 12 Oct 2019 16:20:17 -0600
To: "Black, David" <David.Black@dell.com>
Cc: "detnet@ietf.org" <detnet@ietf.org>
References: <0b0f78a3-b0c2-06a3-1d1a-9205f612a13f@labn.net> <CE03DB3D7B45C245BCA0D2432779493630765393@MX307CL04.corp.emc.com> <27583e1a-e43b-1c30-251a-e655c88e541c@labn.net> <CE03DB3D7B45C245BCA0D243277949363076BB70@MX307CL04.corp.emc.com> <16dba799bf8.277b.9b4188e636579690ba6c69f2c8a0f1fd@labn.net> <CE03DB3D7B45C245BCA0D2432779493630770351@MX307CL04.corp.emc.com>
From: Lou Berger <lberger@labn.net>
Message-ID: <f647d62a-775a-b924-da33-c4d2cea37813@labn.net>
Date: Sat, 12 Oct 2019 18:20:16 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.3.1
MIME-Version: 1.0
In-Reply-To: <CE03DB3D7B45C245BCA0D2432779493630770351@MX307CL04.corp.emc.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - box313.bluehost.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - labn.net
X-BWhitelist: no
X-Source-IP: 127.0.0.1
X-Source-L: Yes
X-Exim-ID: 1iJPkH-0044DK-Ho
X-Source:
X-Source-Args:
X-Source-Dir:
X-Source-Sender: ([IPv6:::1]) [127.0.0.1]:44551
X-Source-Auth: lberger@labn.net
X-Email-Count: 2
X-Source-Cap: bGFibm1vYmk7bGFibm1vYmk7Ym94MzEzLmJsdWVob3N0LmNvbQ==
X-Local-Domain: yes
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/bWWdE1pl_a-bAr-WUHl86PgoROI>
Subject: Re: [Detnet] consolidated response: IP Data Plane draft comments
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Oct 2019 22:20:23 -0000

Hi David,

On 10/11/2019 4:26 PM, Black, David wrote:
> Lou,
>
> Rather than continue the nested inline, I'll try to write a high-level commentary starting from this helpful goal summary:
>
>> And I believe we are trying to ensure that the that the DetNet data plane
>> can be supported on the widest variety of existing and future hardware.
>> Which to me means not introducing any restrictions that don't exist today
>> or overly specify behaviors not required by detnet.
> In my view, that also means not departing significantly from the network architecture on which that hardware is based.  The underlying network architecture aspect that matters here is that both DSCP and ECN are intended to provide multiple markings within individual flows, not subdivide flows into sub-flows.  In more detail ...
>
> -- DSCP --

...

> Overall, this DSCP topic still feels like it merits "SHOULD/SHOULD NOT" requirements, not "MUST/MUST NOT" requirements (reminder: what I'm looking for is roughly - SHOULD NOT mix DetNet and non-DetNet traffic within a single 5-tuple).

Okay, how about adding the following to the end of section 4.1:

           DetNet aware applications and end systems SHOULD NOT mix
           DetNet and non-DetNet traffic within a single 5-tuple.


> OTOH ...
>
> -- ECN --
>
> ECN values are used to label packets in a single transport protocol session, not to multiplex transport protocol sessions, period.   The proposal to use ECN for path selection is fundamentally inconsistent with RFC 3168 (The Addition of Explicit Congestion Notification (ECN) to IP), a long-time Proposed Standard.  Taking up the example mentioned below:
>
>> Although, if a system is smart enough to route ecn enabled packets over ecn
>> supporting routers I'm not sure why this would be a bad thing. But if the
>> restriction already exists, it exists...
> It would definitely be a bad thing if it is based on the value of the ECN field in the IP header.  One problem arises from the requirement (in Section 6.1.5 of RFC 3168) that when a TCP session uses ECN, all retransmitted packets have to be marked with Not-ECT, i.e., as not using ECN.   As a result, sending ECN and non-ECN traffic on different network paths invites reordering of packets in a TCP session, which is known to be problematic, e.g., if retransmitted packets are subject to more delay than non-retransmitted packets.

This is certainly problematic!

> There's much more where this explanation came from (please do read RFC 3168).  The upshot is that DetNet needs to prohibit use of ECN for path selection, i.e., "MUST NOT" language that cites RFC 3168.

My reservation in putting in this restriction in the data plane is that 
I think this will be the first/only RFC document to have this 
restriction on the IP forwarding layer.  Furthermore I think what you're 
really saying is not about traffic classification but rather path 
selection.  It is a *very* valid point and I think is worth adding to 
the document even though  path selection is out of scope.   What do you 
think about adding a new forwarding sublayer section along the lines of:

4.3.3.  Path Selection

    While path selection algorithms and mechanisms are out of scope of
    the DetNet data plane definition, it is important to highlight the
    implications of DetNet IP flow identification on path selection and
    next hops.  As mentioned above, the DetNet IP data plane identifies
    flows using "6-tuple" header information as well as two additional
    optional header fields.  DetNet generally allows for both flow-
    specific traffic treatment and flow-specific next-hops.

    In non-DetNet IP forwarding, it is generally assumed that the same
    series of next hops, i.e., the same path, will be used for a
    particular 5-tuple or, in some cases, e.g., [RFC5120], for a
    particular 6-tuple.  This assumption is reflected in higher protocol
    levels, e.g., see [RFC3168].  Using different next hops for different
    5-tuples does not take any special consideration within a DetNet
    domain.  Care should be taken when using different next hops for the
    same 5-tuple.  Understanding of the application and transport
    protocol impact of using different next hops for the same 6-tuple is
    required.  Again, this impacts path selection for DetNet flows and
    this document only indirectly.

>
> For completeness, I should not that there is experimental work in progress to support ECN for retransmitted packets, e.g., see RFC 8311 (Relaxing Restrictions on Explicit Congestion Notification (ECN) Experimentation), but there is also plenty of "running code" that does not use ECN for retransmitted packets in traffic that otherwise uses ECN.

Allowing future experimentation/evolution of usage of the detnet 
forwarding plane is exactly the motivation for not restricting detnet 
more than general IP.

Thanks and talk to you on Monday.

Lou

PS Diff is on github: 
https://github.com/detnet-wg/data-plane-drafts/commit/ee5d5f71f4e52d402223e4ad4dd88e6c93465f64

> Thanks, --David (co-author of RFCs 2475, 3168, 7657 & 8311)
>
>> -----Original Message-----
>> From: Lou Berger <lberger@labn.net>
>> Sent: Friday, October 11, 2019 7:00 AM
>> To: Black, David
>> Cc: detnet@ietf.org
>> Subject: RE: [Detnet] consolidated response: IP Data Plane draft comments
>>
>>
>> [EXTERNAL EMAIL]
>>
>> David,
>>
>>
>> ----------
>> On October 10, 2019 11:13:54 AM "Black, David" <David.Black@dell.com>
>> wrote:
>>
>>> Lou,
>>>
>>>> I think there's some cross usage of the term flow here.   DetNet flow
>>>> identification is the traffic classification function that enables
>>>> DetNet to deliver different service, including paths through a network
>>>> to different flows.  ECN markings already impact how packets are handled
>>>> in ECN enabled routers (DROP for 00 for DE packets).
>>> I'm drawing a bright-line distinction between different service in network
>>> nodes (both DSCP and ECN are used for this purpose) and selection of
>> paths.
>> And I believe we are trying to ensure that the that the DetNet data plane
>> can be supported on the widest variety of existing and future hardware.
>> Which to me means not introducing any restrictions that don't exist today
>> or overly specify behaviors not required by detnet.
>>
>>> In other words, if "including paths through the network" were removed
>> from
>>> the above text snippet, I would strongly agree.
>>>
>>>> Also, I don't see
>>>> anything in the RFCs that would preclude path selection based on
>>>> different DSCPs or different ECN field values
>>> I firmly disagree on those two:
>>> DSCP:- Selection of different paths based on DSCP is problematic for
>>> network operations and management tools.
>> I don't disagree, but we don't prevent  operators to 'play with scissors'.
>> Sometimes such flexibility even results in new capabilities.
>>
>> Adding text that points this out seems completely reasonable.
>>
>>> ECN: I believe that different path selection based on ECN values is
>>> effectively prohibited by RFC 3168, and is completely inconsistent with
>>> prior and ongoing Transport Area work.
>>>
>> Where is this prohibition stated? Referencing existing specification
>> certainly makes sense.
>>
>> Although, if a system is smart enough to route ecn enabled packets over ecn
>> supporting routers I'm not sure why this would be a bad thing. But if the
>> restriction already exists, it exists...
>>
>>> To summarize what I think ought to be done:
>>> - Path selection based on DSCP ought to be a "SHOULD NOT" requirement.
>> RFC
>>> 7657 is relevant to this.
>>
>>> - Path selection based on ECN has to be a "MUST NOT" requirement - see
>> RFC
>>> 3168.
>>>
>>>> As a possible example, I could see ECT and non-ect
>>>> traffic routed over different paths and am not sure where this is
>>>> precluded by the reference RFCs.
>>> Please read RFC 3168 to better understand why that is a seriously bad idea.
>>>
>> Perhaps this is a good discussion point for Monday's call.
>>
>>>>> Is it at least possible to prohibit (or at least
>>>>> strongly discourage, i.e., "SHOULD NOT") use of the same 5-tuple for
>> DetNet
>>>>> and non-DetNet traffic?  That would at least contain the resulting
>> network
>>>>> management and operational effects to DetNet?
>>>> I'm not sure how we can preclude what operators choose to do.  Vendors
>>>> on the other hand...
>>> I'm not looking for "preclude" which would be expressed as "MUST NOT."
>>> What I'm looking for is a strong "here be dragons" "SHOULD NOT" warning
>>> about mixing DetNet and non-DetNet traffic on the same 5-tuple (e.g., that
>>> sure looks like an opportunity to misdirect DetNet OAM traffic into
>>> non-DetNet paths and forwarding planes).  Then operators who choose to
>> do
>>> otherwise have only themselves to credit for the consequences.
>>>
>> Okay. I'll work on some language for this and send it to the list before
>> Monday's call.
>>
>>>>> Also, be aware that if two DetNet flows differ only in DSCP, most
>> existing
>>>>> network transport protocols will have problems dealing with that
>> situation
>>>>> - see RFC 7657 for details.
>>>> sure.  but then it should be using different DSCP values.
>>> I'm not sure what "it" refers to, but if that was meant to imply that
>>> existing network transport protocols are not or never appropriate for use
>>> with DetNet, then I would strongly disagree.
>>>
>>> The rest of the context is that in end systems, DSCP is not used to choose
>>> the "socket" or equivalent - traffic is muxed/demuxed to/from transport
>>> protocol sessions/instances based on 5-tuple (not including DSCP) with
>>> DSCPs being used to label flows, but not to subdivide any 5-tuple flow into
>>> multiple 6-tuple sub-flows.   If splitting a 5-tuple flow into multiple
>>> sub-flows is what's wanted, then the WebRTC example ought to be
>> followed
>>> where header info above the IP header (and above the UDP header) is
>> used to
>>> do the mux/demux so that multiple WebRTC sub-flows can use the same 5-
>> tuple.
>> I hear you and agree you certainly wouldn't expect this to happen for a
>> single 5-tuple.  This said,  I have seen some real networks, and suspect
>> there are more, that route traffic differently based on their dscps - and
>> this is nothing more than we are allowing for in detnet.
>>
>> I look forward to talking to you on Monday
>>
>> Lou
>>> Thanks, --David
>>>
>>>> -----Original Message-----
>>>> From: detnet <detnet-bounces@ietf.org> On Behalf Of Lou Berger
>>>> Sent: Wednesday, October 9, 2019 10:42 PM
>>>> To: Black, David
>>>> Cc: detnet@ietf.org
>>>> Subject: Re: [Detnet] consolidated response: IP Data Plane draft
>> comments
>>>>
>>>> [EXTERNAL EMAIL]
>>>>
>>>> Hi David,
>>>>
>>>> Thanks for the response, see below.
>>>>
>>>>
>>>> ----------
>>>> On October 8, 2019 10:04:00 AM "Black, David" <David.Black@dell.com>
>>>> wrote:
>>>>
>>>>> Lou,
>>>>>
>>>>>> Please let me know if this addresses all your comments in an
>> acceptable
>>>>>> fashion or if you'd like to discuss further.
>>>>> The proposed text does not address the comments.
>>>>>
>>>>> [A] ECN
>>>>>
>>>>> The proposed text effectively ignores the comments, and fails to
>> address
>>>>> the problem.
>>>>>
>>>>> The ECN field MUST NOT be used for flow identification, period (e.g.,
>> see
>>>>> RFC 3290, which does not include ECN in the 6-tuple).  In particular, it
>>>>> would be wrong for two DetNet flows to differ solely on the values used
>> in
>>>>> the ECN field.  If there's a disagreement, please cite text from RFC 3168
>>>>> that justifies this proposed ECN field usage.
>>>>>
>>>> I think there's some cross usage of the term flow here.   DetNet flow
>>>> identification is the traffic classification function that enables
>>>> DetNet to deliver different service, including paths through a network
>>>> to different flows.  ECN markings already impact how packets are handled
>>>> in ECN enabled routers (DROP for 00 for DE packets).  Also, I don't see
>>>> anything in the RFCs that would preclude path selection based on
>>>> different DSCPs or different ECN field values -- It is even covered
>>>> under 'split paths' albeit from the perspective of a broken
>>>> implementation.  As a possible example, I could see ECT and non-ect
>>>> traffic routed over different paths and am not sure where this is
>>>> precluded by the reference RFCs.
>>>>
>>>>
>>>>> [B] 5-tuples and 6-tuples
>>>>>
>>>>> As I noted in one of the referenced messages in response to a question:
>>>>>
>>>>>>> Are you okay with dropping "While 5-tuples suffice to identify
>> DetNet
>>>> flows,"
>>>>>> Not by itself - if that text is dropped, I'd want to add a couple of
>>>> sentences
>>>>>> (perhaps not in Section 3) to explain how DetNet flows differ from
>>>> Diffserv
>>>>>> flows,
>>>>>> i.e., "microflows" in defined in RFC 2475 (Diffserv Architecture).
>>>>> The heads up for everyone is that if multiple DetNet flows differ only in
>>>>> DSCP (i.e., IP addresses, transport protocol and ports are the same),
>> then
>>>>> non-DetNet network management tools that deal with traffic flows will
>>>> lump
>>>>> those flows together.  Is it at least possible to prohibit (or at least
>>>>> strongly discourage, i.e., "SHOULD NOT") use of the same 5-tuple for
>>>> DetNet
>>>>> and non-DetNet traffic?  That would at least contain the resulting
>> network
>>>>> management and operational effects to DetNet?
>>>> I'm not sure how we can preclude what operators choose to do.  Vendors
>>>> on the other hand...
>>>>
>>>> How about adding:
>>>>
>>>> It is important to note that the DSCP values used within a DetNet domain
>>>> may not be meaningful outside of that DetNet domain as the values may
>>>> have no relationship to standard PHB and DSCP values.  It is REQUIRED
>>>> that routers that operate in both DetNet and non-DetNet domains
>> support
>>>> remapping or setting the DSCP value of any flow originating in a DetNet
>>>> domain.
>>>>
>>>>
>>>>> The use of DSCP for flow identification makes the OAM problem much
>>>> harder
>>>>> for the IP data plane by dramatically increasing the difficulty of getting
>>>>> DetNet IP OAM traffic to fate-share with the DetNet traffic for which
>> the
>>>>> OAM functionality is intended (it may be necessary to resort to shoving
>> an
>>>>> MPLS label in there to identify OAM traffic and requiring nodes that
>>>>> originate or terminate DetNet OAM packets to understand enough of
>>>> MPLS to
>>>>> deal with this).
>>>> For the MPLS data plane, I suspect this will be required.  For IP, given
>>>> the complexities of ECMP, I don't see how this behavior notably
>>>> complicates OAM, but also agree it will need to be considered.
>>>>
>>>>> Also, be aware that if two DetNet flows differ only in DSCP, most
>> existing
>>>>> network transport protocols will have problems dealing with that
>> situation
>>>>> - see RFC 7657 for details.
>>>> sure.  but then it should be using different DSCP values.
>>>>
>>>> Lou
>>>>
>>>> PS WRT your offer to join one of the data plane calls, that would be great!
>>>>
>>>>> Thanks, --David
>>>>>
>>>>>> -----Original Message-----
>>>>>> From: Lou Berger <lberger@labn.net>
>>>>>> Sent: Sunday, October 6, 2019 4:47 PM
>>>>>> To: Black, David
>>>>>> Cc: detnet@ietf.org
>>>>>> Subject: consolidated response: IP Data Plane draft comments
>>>>>>
>>>>>>
>>>>>> [EXTERNAL EMAIL]
>>>>>>
>>>>>> David,
>>>>>>
>>>>>>       My apologies on the time to get back to this topic.  Before the
>>>>>> last IETF you raised a number of points on the IP data plane document.
>>>>>> For context, I believe the threads are found in:
>>>>>>
>> https://mailarchive.ietf.org/arch/msg/detnet/ykpI6gbH2L705BBjmHbnsZraxi
>>>> g
>> https://mailarchive.ietf.org/arch/msg/detnet/phi4OBWijlp7T4_HML2YvWfoa
>>>> as
>> https://mailarchive.ietf.org/arch/msg/detnet/th2Yj5Z4_8VtBsEOF1UfLejMh
>>>> pM
>>>>>> https://mailarchive.ietf.org/arch/msg/detnet/qvs-
>>>> S0Nrm1B8w8JYO7zDLFwpTFQ
>>>>>> In re reviewing the discussions, I think we missed the ECN field. Based
>>>>>> on this and a general reread, I have put together a proposed set of
>>>>>> changes to the published draft.  The changes are  available at
>>>>>>
>>>>>> https://github.com/detnet-wg/data-plane-
>>>>>> drafts/commit/d3a733556804f11abbedbd128e3c62786418ddc8
>>>>>>
>>>>>> (text format can be received at
>>>>>> https://xml2rfc.tools.ietf.org/cgi-
>>>>>> bin/xml2rfc.cgi?url=https://raw.githubusercontent.com/detnet-
>> wg/data-
>>>>>> plane-drafts/working/lb/ip-tos-update/ip/draft-ietf-detnet-ip.xml)
>>>>>>
>>>>>> the following changes are proposed:
>>>>>> OLD183,195c185,202
>>>>>> <    The DetNet IP data plane uses "6-tuple" based flow identification,
>>>>>> <    where 6-tuple refers to information carried in IP and higher layer
>>>>>> <    protocol headers.  The 6-tuple referred to in this document is the
>>>>>> <    same as that defined in [RFC3290].  Specifically 6-tuple is
>>>>>> <    (destination address, source address, IP protocol, source port,
>>>>>> <    destination port, and differentiated services (DiffServ) code point
>>>>>> <    (DSCP).  General background on the use of IP headers, and 5-
>> tuples,
>>>>>> <    to identify flows and support Quality of Service (QoS) can be found
>>>>>> <    in [RFC3670].  [RFC7657] also provides useful background on the
>>>>>> <    delivery of DiffServ and "tuple" based flow identification.
>>>>>> <    Referring to a 6-tuple allows DetNet nodes to forward packets with
>>>>>> <    the 6-tuple as is or remap the DSCP where required by the DetNet
>>>>>> <    service.
>>>>>> NEW
>>>>>>   >    The DetNet IP data plane primarily uses "6-tuple" based flow
>>>>>>   >    identification, where 6-tuple refers to information carried in IP and
>>>>>>   >    higher layer protocol headers.  The 6-tuple referred to in this
>>>>>>   >    document is the same as that defined in [RFC3290]. Specifically
>>>>>>   >    6-tuple is (destination address, source address, IP protocol, source
>>>>>>   >    port, destination port, and differentiated services (DiffServ) code
>>>>>>   >    point (DSCP).  General background on the use of IP headers, and
>>>>>>   >    5-tuples, to identify flows and support Quality of Service (QoS) can
>>>>>>   >    be found in [RFC3670].  [RFC7657] also provides useful background
>> on
>>>>>>   >    the delivery of DiffServ and "tuple" based flow identification.
>>>>>>   >
>>>>>>   >    The DetNet IP data plane also allows for optional matching on two
>>>>>>   >    additional data fields.  The optional fields are the ECN Field, as in
>>>>>>   >    [RFC3168], and the IPv6 flow label field, as defined in [RFC8200].
>>>>>>   >
>>>>>>   >    Generally the fields used in flow identification are forward
>>>>>>   >    unmodified but modification is allowed, for example to a DSCP
>> value,
>>>>>>   >    when required by the DetNet service.
>>>>>>
>>>>>> OLD
>>>>>> <    masks, prefixes and ranges.  IP tunnels may also be used to support
>>>>>> NEW
>>>>>>   >    masks, lists, prefixes and ranges.  IP tunnels may also be used to
>>>>>>
>>>>>> OLD
>>>>>> 437,438c444,446
>>>>>> <    of the 6-tuple i.e., the typical 5-tuple enhanced with the DSCP
>> code,
>>>>>> <    uniquely identifies a DetNet service flow.
>>>>>> NEW
>>>>>>   >    of the 6-tuple i.e., the typical 5-tuple enhanced with the DSCP and
>>>>>>   >    previously mentioned two optional fields, uniquely identifies a
>>>>>>   >    DetNet service flow.
>>>>>>
>>>>>> OLD
>>>>>> 590,593c598,608
>>>>>> <    MUST support bitmask based matching, where bits set to one (1) in
>>>> the
>>>>>> <    bitmask indicate which subset of the bits in the field are to be used
>>>>>> <    in determining a match.  Note that all bits set to zero (0) value as
>>>>>> <    a bitmask effectively means that these fields are ignored.
>>>>>> NEW
>>>>>>   >    MUST support list based matching of DSCP values, where the list is
>>>>>>   >    composed of possible field values that are to be considered when
>>>>>>   >    identifying a specific DetNet flow.  Implementations SHOULD allow
>> for
>>>>>>   >    this field to be ignored for a specific DetNet flow.
>>>>>>   >
>>>>>>   >    Implementations of this document MUST allow the ECN field to be
>>>>>>   >    ignored as part of DetNet flow identification. Additionally,
>>>>>>   >    implementations SHOULD support identification of DetNet flows
>>>> based
>>>>>>   >    on the value carried in the ECN field.  When this field is used to
>>>>>>   >    identify a specific DetNet flow, implementations MUST support a
>> list
>>>>>>   >    of ECN values that match a specific slow.
>>>>>>
>>>>>> OLD
>>>>>> 705c720,729
>>>>>> <    o  IPv4 Type of Service and IPv6 Traffic Class Fields.
>>>>>> <
>>>>>> <    o  IPv4 Type of Service and IPv6 Traffic Class Field Bitmask, where a
>>>>>> <       zero (0) effectively means that theses fields are ignored.
>>>>>> NEW
>>>>>>   >    o  For the IPv4 Type of Service and IPv6 Traffic Class Fields:
>>>>>>   >
>>>>>>   >       *  If the DSCP field is to be used in flow identification.
>>>>>>   >          Ignoring the DSCP filed is optional.
>>>>>>   >
>>>>>>   >       *  When the DSCP field is used in flow identification, a list of
>>>>>>   >          field values that may be used by a specific flow.
>>>>>>   >
>>>>>>   >       *  If the ECN field is to be used in flow identification.
>>>>>>   >          Matching based on ECN filed values is optional.
>>>>>>   >
>>>>>>   >       *  When ECN field is used in flow identification, a list of field
>>>>>>   >          values that may be used by a specific flow.
>>>>>>
>>>>>> Please let me know if this addresses all your comments in an
>> acceptable
>>>>>> fashion or if you'd like to discuss further.
>>>>>>
>>>>>> (BTW I think this is the sole open set of issues on the document.)
>>>>>>
>>>>>> Thank you!
>>>>>>
>>>>>> Lou
>>>>>>
>>>>> _______________________________________________
>>>>> detnet mailing list
>>>>> detnet@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/detnet
>>>> _______________________________________________
>>>> detnet mailing list
>>>> detnet@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/detnet
> _______________________________________________
> detnet mailing list
> detnet@ietf.org
> https://www.ietf.org/mailman/listinfo/detnet