Re: [Detnet] Congestion Protection name change

John E Drake <jdrake@juniper.net> Thu, 13 December 2018 20:43 UTC

Return-Path: <jdrake@juniper.net>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3EB1130E93; Thu, 13 Dec 2018 12:43:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.171
X-Spam-Level:
X-Spam-Status: No, score=-2.171 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.46, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6J0as-uX6JQT; Thu, 13 Dec 2018 12:43:52 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A3FD9130E86; Thu, 13 Dec 2018 12:43:51 -0800 (PST)
Received: from pps.filterd (m0108161.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id wBDKcnwn000715; Thu, 13 Dec 2018 12:43:39 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=PPS1017; bh=8oMrENFfBpfVG/DsgfO3ekJ9SZl/bThndJpUqhOl8/Q=; b=pSRTbeeNnZv64lfZNwBIohkOx2D8l98ZMnGcokc4oZ/yZWddv8cl2TBS5R+ws2PI2xRe maYe+HT6dieiWHM04ouFfIFljxgEaEpFBam+P3YTHYcXYJz4I42iGHA+JrIhnd8+B3aw Tkf6NaBop+vUZ0qBpPmeecAh4KrV5sazqPZmdX5q0Vz8mNTR9To6VoIty6eKO6MI63sN boEAyO+b8dzgNlOvccMuqxku1hVpEeLDM4GR1ZOsrOpIeRQR+VI8Iejd5zCKcKO1HMw2 XT7kaWCaGhFQCvoB4PlxvtFvgxO6wGMuyhhlzQ3K/8bdTH38DH0T3hRpVxo7TnB1Vl0r aQ==
Received: from nam04-bn3-obe.outbound.protection.outlook.com (mail-bn3nam04lp2056.outbound.protection.outlook.com [104.47.46.56]) by mx0b-00273201.pphosted.com with ESMTP id 2pbrmx0t85-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 13 Dec 2018 12:43:38 -0800
Received: from BYAPR05MB5029.namprd05.prod.outlook.com (20.177.230.211) by BYAPR05MB4359.namprd05.prod.outlook.com (52.135.202.140) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1425.10; Thu, 13 Dec 2018 20:43:34 +0000
Received: from BYAPR05MB5029.namprd05.prod.outlook.com ([fe80::79a9:fae7:8d61:ff3e]) by BYAPR05MB5029.namprd05.prod.outlook.com ([fe80::79a9:fae7:8d61:ff3e%3]) with mapi id 15.20.1425.016; Thu, 13 Dec 2018 20:43:34 +0000
From: John E Drake <jdrake@juniper.net>
To: "Andrew G. Malis" <agmalis@gmail.com>, Lou Berger <lberger@labn.net>
CC: "draft-ietf-detnet-architecture.all@ietf.org" <draft-ietf-detnet-architecture.all@ietf.org>, detnet WG <detnet@ietf.org>, János Farkas <janos.farkas@ericsson.com>, "Michael.Scharf@hs-esslingen.de" <Michael.Scharf@hs-esslingen.de>
Thread-Topic: [Detnet] Congestion Protection name change
Thread-Index: AQHUkxDs8mKez4p840Wy2YW9ElJ6MKV9IOiAgAAB6RA=
Date: Thu, 13 Dec 2018 20:43:34 +0000
Message-ID: <BYAPR05MB502956514436B84A2537D6BBC7A00@BYAPR05MB5029.namprd05.prod.outlook.com>
References: <153817345967.27205.135001179751151278@ietfa.amsl.com> <fdf872d6-08a6-2c33-de21-9dd1506c1d21@labn.net> <6EC6417807D9754DA64F3087E2E2E03E2D16A4D3@rznt8114.rznt.rzdir.fht-esslingen.de> <e38ab4d6-0924-ab60-b1dc-4ac26600044c@labn.net> <090ae5ba-e44c-f8fa-7259-5ab1b01fb23c@ericsson.com> <ebcbe7ae-a16e-bd33-8841-24554f6c1c82@labn.net> <CAA=duU3PBMgpjjgnyiqs58+pFNrZ8u==9ZssHy70haJyDVkxMg@mail.gmail.com>
In-Reply-To: <CAA=duU3PBMgpjjgnyiqs58+pFNrZ8u==9ZssHy70haJyDVkxMg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.1.0.61
dlp-reaction: no-action
x-originating-ip: [66.129.241.13]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BYAPR05MB4359; 6:agxoR8XTad+2jrOY39nS5qWJpORoLKU5xYcxA41YX3ImjujUhSLYcvrHrkA8amoErAKFE7kCs+1n+9GueqWuL+pCVajLOQEhSpe2Y4YzaZrDgbbMg2+GtSgrArkE1ZpkHrcYSUZvSoyXJ1ZJEAkQnbCQidvj4u+HMaKiKxTgB2oikzvVgfy76biNkRMJOpaYpChRdxj1yU/iTW0K6cA9GzGXXefea/hc61bY9tkLpUW+YwSL/M7a5Cj9Zmu9kiPRGryQEabrj/8QGBfiq7LMBMypxHHc3LEEdDEFsfxRqt3tjkLUQmbvO/FdsQvoCLGYR32xzAEWmqx3+rH0DZctrBgKg3TFyOMWo1qCwGS4YVnLkM2WWe64cYaDYS7DFKYbCiF0EzREFNPHIFSNuO8PNluVoqgijgc387BcGASoOD+joQkxF9inK/WXLAH76D4IsgBIHMzcL86IN0CmanVAoQ==; 5:uLw7GOr7KWGhNA1gsL7cB+Ip3oqd8A4JJANUX1Z0GfKzW8Tw8lb3d6ABdOPOn6pt/+EQAnGdUb/2cY7/hV9QuuD8WalIqugX+xhja0JanT17xE3LLqApXbkZrt23BH8V2WaUIAI727eHBXaj/JLcKRezsDRm/mPUkdDXjmanXQI=; 7:NiO2+2wTQBG1aAfawh8rcJA6wEqmovFfhULjeO2dqQHZfprycfu9AHebzAKLA4OeP27TcvloLA2FV7OtTiWUU4CjHuw34jnzAzbetadilEkd24RgBbz29Si28AEXncLt//xi+KpX50XJAC5IRvzygw==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: f207cd67-24e9-4078-3c8f-08d6613ba695
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390098)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:BYAPR05MB4359;
x-ms-traffictypediagnostic: BYAPR05MB4359:
x-microsoft-antispam-prvs: <BYAPR05MB4359E5E881D158CAFB6C3ABFC7A00@BYAPR05MB4359.namprd05.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(3230021)(999002)(6040522)(2401047)(5005006)(8121501046)(3231475)(944501520)(52105112)(93006095)(93001095)(10201501046)(3002001)(6055026)(148016)(149066)(150057)(6041310)(20161123564045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123558120)(201708071742011)(7699051)(76991095); SRVR:BYAPR05MB4359; BCL:0; PCL:0; RULEID:; SRVR:BYAPR05MB4359;
x-forefront-prvs: 088552DE73
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(366004)(39860400002)(396003)(376002)(136003)(346002)(189003)(199004)(54094003)(4326008)(11346002)(6436002)(39060400002)(7736002)(486006)(966005)(561944003)(478600001)(7696005)(53546011)(6506007)(476003)(68736007)(186003)(102836004)(33656002)(76176011)(26005)(14454004)(446003)(316002)(106356001)(2906002)(110136005)(54906003)(74316002)(105586002)(229853002)(54896002)(6306002)(55016002)(9686003)(236005)(53936002)(6116002)(53946003)(8676002)(790700001)(3846002)(6246003)(5660300001)(9326002)(25786009)(606006)(93886005)(81156014)(14444005)(8936002)(86362001)(99286004)(97736004)(81166006)(71200400001)(256004)(4744004)(71190400001)(66066001)(66574011)(579004); DIR:OUT; SFP:1102; SCL:1; SRVR:BYAPR05MB4359; H:BYAPR05MB5029.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 2ckQpXbpOkJH8q5nizI0k69sF3QWzb1pNFsbAqTiWNwjDhBgzNemXlalISAqJO3cl+z1LSUqgxUhRi3ZNkWAmKRmVav19tH77IvUAZM0CheNWxHiv4AhJofgaL8S6mRYl6XJknMu7jfJKQIHMstGCVVFLnbL1QCvhQou1aXsGN+aiiflMYJAHe52Jxz0HwjbQYG6vUl2G9km033sperdhdkE9geobbkMQ0kTiZQ+eZQKjS8H9SPCvDSpwdXxBVzX/h54hYGEz9LptABKDF/jaNjAa+5wfrlyt6MQn3qiPI1BE8fbgtvRkAw/2ThQNejq
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_BYAPR05MB502956514436B84A2537D6BBC7A00BYAPR05MB5029namp_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: f207cd67-24e9-4078-3c8f-08d6613ba695
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Dec 2018 20:43:34.3715 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR05MB4359
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-12-13_03:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1812130177
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/7CS9HlAqQQVWI10X_07uOHStjrY>
Subject: Re: [Detnet] Congestion Protection name change
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Dec 2018 20:43:58 -0000

Hi,

I think Andy’s right.

Yours Irrespectively,

John

From: detnet <detnet-bounces@ietf.org> On Behalf Of Andrew G. Malis
Sent: Thursday, December 13, 2018 3:36 PM
To: Lou Berger <lberger@labn.net>
Cc: draft-ietf-detnet-architecture.all@ietf.org; detnet WG <detnet@ietf.org>; János Farkas <janos.farkas@ericsson.com>; Michael.Scharf@hs-esslingen.de
Subject: Re: [Detnet] Congestion Protection name change

Lou,

I think of "Resource management" as a superset of "Resource allocation", and so prefer "Resource management". That said, I can live with "Resource allocation" if that comes out as the consensus.

Cheers,
Andy


On Thu, Dec 13, 2018 at 1:23 PM Lou Berger <lberger@labn.net<mailto:lberger@labn.net>> wrote:
All,

     I met with the authors of detnet-architecture to see if we could
come up with a a single proposal.  The discussion led to three
candidates (see below for ordered list).  In the interest of closing on
this topic, I'd like to ask if there are *objections* to changing the
term "Congestion protection" to "Resource allocation".  Looking at the
related, first use, text in Section 3.2.1 this change would read
something like:

    Three techniques are used by DetNet to provide these qualities of
    service:
    o  Resource allocation (Section 3.2.1).
    o  Service protection (Section 3.2.2).
    o  Explicit routes (Section 3.2.3).

    Resource allocation operates by assigning resources, e.g.., buffer
    space or link bandwidth, to a DetNet flow (or flow aggregate) along
    its path.  Resource allocation greatly reduces, or even eliminates
    entirely, packet loss due to output packet contention within the
    network, but it can only be supplied to a DetNet flow that is limited
    at the source to a maximum packet size and transmission rate. Note
    that congestion control provided via congestion detection and
    notification [RFC3168] is explicitly excluded from consideration in
    DetNet, as it serves a different set of applications.

    Resource allocation addresses two of the DetNet QoS requirements:
    latency and packet loss.  Given that DetNet nodes have a finite
    amount of buffer space, Resource allocation necessarily results in
    a maximum end-to-end latency.  It also addresses contention related
    packet loss.

    Other important contribution to packet loss are random media errors
    and equipment failures...

Please respond, if you think this change (to 'resource allocation') is:
     (a) acceptable/something you can live with
     (b) unacceptable/something you think should not be part of the
DetNet architecture

(Note: please wait for the author to revise the actual text above based
on the outcome of this thread before providing edits.)

Thank you,
Lou
(as co-chair and shepherd)

The top three alternatives at the end of the meeting, in order were:
     1. Resource allocation
     2. Resource management
     3. Contention management

On 12/10/2018 9:29 AM, János Farkas wrote:
> Hi,
>
> As I understand, there is confusion around two DetNet terms.
> We are removing "transport".
>
> The other one is "congestion" and "congestion protection".
>
> Brief description of congestion protection in Section 3.1:
>
>      Congestion protection operates by allocating resources along the path
>      of a DetNet flow, e.g., buffer space or link bandwidth. Congestion
>      protection greatly reduces, or even eliminates entirely, packet loss
>      due to output packet congestion within the network, but it can only
>      be supplied to a DetNet flow that is limited at the source to a
>      maximum packet size and transmission rate.  Note that congestion
>      protection provided via congestion detection and notification is
>      explicitly excluded from consideration in DetNet, as it serves a
>      different set of applications.
>
>      Congestion protection addresses two of the DetNet QoS requirements:
>      latency and packet loss.  Given that DetNet nodes have a finite
>      amount of buffer space, congestion protection necessarily results in
>      a maximum end-to-end latency.  It also addresses the largest
>      contribution to packet loss, which is buffer congestion.
>
> Detailed description is in Section 3.2.1.
>
> We wanted to have a brief collective term for the mechanisms used to
> avoid queuing related packet loss (including buffer overflow etc.).
>
> Based on the discussions, we should have a term that does not include
> "congestion".
> ("Service Protection" is another DetNet term, hence we may consider a
> term without "protection" to minimize confusion.)
>
> I suggest to replace "congestion protection" with "queuing loss avoidance".
>
> After agreeing in the terminology cahnge (if any), the text has to be
> updated accordingly.
>
> What do you think?
>
> Best regards,
> Janos
>
>
> On 11/20/2018 1:11 PM, Lou Berger wrote:
>> Michael,
>>
>> I think we're getting somewhere and identifying where we have
>> disconnects and what may (and what may not) need to change in the
>> document.  My takeaways are:
>>
>> - The document needs a good 'scrub' of the congestion related
>> references to ensure that the document only makes statements on what
>> is actually done within a DetNet and the relationship with transport
>> protocols that use detnet (which are in fact outside the scope of the
>> DetNet WG).  I'll work with the authors and WG on this -- I see this
>> change as important, but editorial in nature.
>>
>> - We have a perception issue with at least one member of the TSV area
>> on the meaning and more importantly, implication, of the term "DetNet
>> *Transport* sub-layer".  While I don't disagree that a good portion of
>> the IETF thinks transport protocol (UDP/TCP) when they hear
>> "transport" there are plenty others, particularly in the routing area,
>> who understand that "transport" can refer to Transport Networks.  And
>> Transport Network is a well understood general industry term. The IETF
>> even has a bunch of RFCs that relate to Transport networks.  This
>> said, I think it reasonable to go back to the DetNet WG and discuss
>> changing the name of the "DetNet Transport sub-layer"  to avoid the
>> word "transport".  -- BTW we made a parallel change in the TEAS WG
>> when producing RFC8453.
>>
>> See below for detail response in-line.
>>
>> On 11/19/2018 5:15 PM, Scharf, Michael wrote:
>>> Lou,
>>>
>>>> --
>>>> I wanted to take a step back from the multiple discussions that were
>>>> spawned by your review -- from a doc shepherd perspective, and see
>>>> where
>>>> we are.   I know that the authors have sent a -09 version that
>>>> addresses
>>>> some, but not all issues.
>>>>
>>>>    From the exchanges I've seen, I think the key remaining issues are
>>>> related to:
>>>>
>>>> (a) possibly introduction of congestion in the general internet if
>>>> packets were somehow to escape a detnet domain.  The source of this
>>>> congestion would be inelastic traffic using DetNet or due to congestion
>>>> loss that is masked by PREOF.
>>> These are two major issues that need to be addressed. Note that it
>>> may not be sufficient just to add a section on operational and
>>> deployment considerations. Also the existing text in the document
>>> will need to get aligned to normative guidance on how to avoid a
>>> congestion collapse.
>>>
>>> In -09, one example would be Section 3.1. "Primary goals defining the
>>> DetNet QoS"
>>>
>>>      Congestion protection operates by allocating resources along the
>>> path
>>>      of a DetNet flow, e.g., buffer space or link bandwidth. Congestion
>>>      protection greatly reduces, or even eliminates entirely, packet loss
>>>      due to output packet congestion within the network, but it can only
>>>      be supplied to a DetNet flow that is limited at the source to a
>>>      maximum packet size and transmission rate.  Note that congestion
>>>      protection provided via congestion detection and notification is
>>>      explicitly excluded from consideration in DetNet, as it serves a
>>>      different set of applications.
>>> At least the last sentence would contradict a better discussion of
>>> congestion in the document. For instance, it could just be removed.
>>> In any case, the current wording in the last sentence is not correct,
>>> as the IETF term for what is described in the last sentence is
>>> "congestion control".
>>>
>>> Another example would be  Section 3.2.1.1. "Eliminate congestion loss"
>>>        The primary means by which DetNet achieves its QoS assurances
>>> is to
>>>      reduce, or even completely eliminate, congestion within a DetNet
>>> node
>>>      as a cause of packet loss.  This can be achieved only by the
>>>      provision of sufficient buffer storage at each node through the
>>>      network to ensure that no packets are dropped due to a lack of
>>> buffer
>>>      storage.  Note that a DetNet flow cannot be throttled, i.e., its
>>>      transmission rate cannot be reduced via explicit congestion
>>>      notification.
>>>
>>> This section IMHO has to include a discussion of what happens in the
>>> (not expected) case that packets get dropped or that ECN marks are
>>> received. It is understood that this would not happen in normal
>>> operation of a DetNet network, but I believe just considering the
>>> error-free operation of a DetNet network is not sufficient for this
>>> document. At least for the risk of traffic that may escape from a
>>> DetNet network is inherently not sufficient to assume that the DetNet
>>> network is always error-free.
>> I think these are examples of text that needs to be cleanup up and to
>> delineate what is done with a DetNet.
>>
>>
>>> As a result, addressing my concerns will most likely require editing
>>> several parts of the document.
>>>
>>> In addition, I'd like to emphasize that my review comment "It is
>>> surprising that there is hardly any discussion on network robustness
>>> and safety"
>> I have no idea what you mean by safety here.  Can you elaborate.
>>
>>
>>> covers more than just inelastic traffic that escapes from a DetNet
>>> network and masking of packet loss. Given that DetNet traffic may be
>>> extremely critical traffic, I really wonder why the document doesn't
>>> emphasize more the required robustness against failures *inside* the
>>> DetNet network as well as counter-measures. But this is something the
>>> WG needs to decide. As TSV-ART reviewer, I will be fine if the
>>> document clearly describes how the impact of failures will be
>>> isolated inside the DetNet network and will not put the general
>>> Internet at risk.
>> I agree - I think, the document should be clear on it's scope and
>> relationship to general internet usage.
>>
>>
>>>> (b) The use of the term 'transport' in DetNet to refer to what is
>>>> basically a Traffic Engineered sub-network layer, such as is provided
>>>> with MPLS-TE or Optical Transport Networks.
>>> In the Internet architecture, the term 'transport' refers to Internet
>>> transport protocols. I doubt that the document can avoid discussing
>>> the implications of and interactions with Internet transport
>>> protocols such as UDP or TCP. As a result, I disagree that the
>>> document can use the term 'transport' to refer to traffic engineered
>>> sub-network layers.
>> I think this is covered by my comment above.
>>
>>
>>>   From a TSV-ART point of view, the document can either only use the
>>> term "transport" for Internet transport protocols and use another
>>> term for sub-network layers (as handled in the *routing* area of the
>>> IETF), or the document has to clearly distinguish between the
>>> Internet transport layer and other uses of the term "transport" and
>>> explain the overlap. I believe the former would be less confusing,
>>> but I will leave it up to the TSV ADs to discuss terminology overlap
>>> in the IESG. As TSV-ART reviewer I insist that the document uses the
>>> terms "transport layer" and "transport protocol" only when referring
>>> to the Internet transport layer.
>> I'm personally okay with a name change and even willing to push this
>> discussion within the WG, but as said above, "Transport Network" is a
>> generally understood industry term that is also used in RFCs -- so
>> we'll have to see what where WG consensus ends up.
>>
>>>> Do you have any other issues that that are critical to be addressed
>>>> before this work moves forward?  If so which?
>>> Regarding Section 4.4 I have already deferred the discussion to the
>>> IESG. The TSV-ART review comment is that the IESG needs to carefully
>>> look at the concepts, terminology, and references in section 4..4.
>>>
>>> Regarding my other comments, I acknowledge that -09 is a step
>>> forward. But given the cross-dependencies e.g. regarding terminology
>>> and definitions, I will need to read the text completely once there
>>> is a proposal how to address my review. As noted in my review, I
>>> believe the document must use terminology clearly and consistently.
>>> As example, a statement in -09 such as "Network nodes supporting
>>> DetNet flows have to implement some of the DetNet capabilities (not
>>> necessarily all) in order to treat DetNet flows such that their QoS
>>> requirements are met" is IMHO too vague. But in such cases it depends
>>> whether there is precise normative guidance elsewhere. And this
>>> requires looking at the text as a whole.
>> I think the next steps lie with me and the WG.  We'll let you know
>> once there is a new version.  Of course, you can also contribute to
>> the WG discussion on the topic.
>>
>> Thanks,
>>
>> Lou
>>
>>> Best regards
>>>
>>> Michael
>>>
>>>
>>>
>>>> Thank you,
>>>>
>>>> Lou
>>>>
>>>> On 9/28/2018 6:24 PM, Michael Scharf wrote:
>>>>> Reviewer: Michael Scharf
>>>>> Review result: Ready with Issues
>>>>>
>>>>> The document "Deterministic Networking Architecture"
>>>>> (draft-ietf-detnet-architecture-08) defines an overall framework for
>>>>> Deterministic Networking.
>>>>>
>>>>> As TSV-ART reviewer, I believe that this document has issues as
>>>> detailed below.
>>>>> Michael
>>>>>
>>>>> Major issues:
>>>>>
>>>>> * It seems that DetNet cannot easily be deployed in the Internet
>>>> without
>>>>> additional means. Thus, for a baseline document, one could expect
>>>> some
>>>>> explanation on the requirements of deploying DetNet in a network.
>>>> DetNet
>>>>> basically requires support in (almost) all network devices
>>>> transporting DetNet
>>>>> traffic. That assumption should be explicitly spelt out early in the
>>>> document,
>>>>> e.g., in the introduction. There also needs to be an explicit
>>>> discussion of the
>>>>> implications if not the whole network is aware of or supports DetNet.
>>>> There is
>>>>> some text in Section 4.2.2 and Section 4.3.3, but I believe
>>>> additional explicit
>>>>> discussion is needed at a prominant place. For instance, can use of
>>>> DetNet do
>>>>> harm to parts of a network not supporting DetNet? As a side note,
>>>> when TCPM
>>>>> published RFC 8257, the following disclaimer was added: "DCTCP, as
>>>> described in
>>>>> this specification, is applicable to deployments in controlled
>>>> environments
>>>>> like data centers, but it must not be deployed over the public
>>>> Internet without
>>>>> additional measures." I wonder if a similar disclaimer is needed for
>>>> DetNet. If
>>>>> there is an implicit assumption that DetNet will  be used in
>>>> homogenous
>>>>> environments with mostly DetNet-aware devices within the same
>>>> organization,
>>>>> such an assumption should be made explicit.
>>>>>
>>>>> * It is surprising that there is hardly any discussion on network
>>>> robustness
>>>>> and safety; this probably also relates to security. For instance,
>>>>> misconfiguration or errors of functions performing packet replication
>>>> could
>>>>> severely and permantly congest a network and cause harm. How does the
>>>> DetNet
>>>>> architecture ensure that a network stays fully operational e.g. if
>>>> the topology
>>>>> changes or there are equipment failures? Probably this can be solved
>>>> by
>>>>> implementations (e.g., dynamic control plane), but why are
>>>> corresponding
>>>>> requirements not spelt out? Section 3.3.2 speculates that filters and
>>>> policers
>>>>> can help, and that may be true, but that probably still assumes
>>>> consistently
>>>>> and correctly configured (and well-behaving) devices. And Section
>>>> 3.3.2 is
>>>>> vague and mentions a "infinite variety of possible failures" without
>>>> stating
>>>>> any requirements or recommendations. There may be further solutions,
>>>> such as
>>>>> circuit breakers and the like. Why are such topics not discussed?
>>>>>
>>>>> * Somewhat related, the document only looks at impact of failures to
>>>> the QoS of
>>>>> DetNet traffic. What is missing is a discussion how to protect non-
>>>> DetNet parts
>>>>> of a network from any harm caused by DetNet mechanisms.. Solutions to
>>>> this
>>>>> probably exist. But why is the impact on non-DetNet traffic (e.g., in
>>>> case of
>>>>> topology changes or failures of DetNet functions) not discussed at
>>>> all in the
>>>>> document?
>>>>>
>>>>> * Regarding security, an architecture like DetNet probably requires
>>>> that only
>>>>> authenticated and authorized end systems have access to the data
>>>> plane. The
>>>>> security considerations only briefly mention the control aspect ("the
>>>>> authentication and authorization of the controlling systems").
>>>>>
>>>>> * For an architecture document, the lack of clarity and consistency
>>>> regarding
>>>>> terminology is concerning. This specifically applies to the case of
>>>> incomplete
>>>>> networks (as per Section 4.2.2 and 4.3.3) that include "DetNet-
>>>> unaware nodes".
>>>>> The document introduces terms such as "DetNet intermediate nodes" but
>>>> then
>>>>> repeatedly uses generic terms such as "node" or "hop" that may
>>>> include
>>>>> DetNet-unaware nodes. For instance, for incomplete networks, a
>>>> sentence such as
>>>>> "The primary means by which DetNet achieves its QoS assurances is to
>>>> reduce, or
>>>>> even completely eliminate, congestion within a node as a cause of
>>>> packet loss"
>>>>> seems to only apply to "DetNet transit nodes" but not "DetNet-unaware
>>>> nodes".
>>>>> Similar ambiguity exist for other use of the terms "hop" and "node",
>>>> which may
>>>>> or may not include DetNet-unaware nodes. It is unclear why the
>>>> document does
>>>>> not consistently use the terminology introduced in Section 2.1 in all
>>>> sections
>>>>> and clearly distinguishes cases with and without DetNet support.
>>>>>
>>>>> * Section 4.4 refers to RFC 7426, which is an informational RFC on
>>>> IRTF stream,
>>>>> and the document uses the concepts introduced there (e..g., "planes").
>>>> This is
>>>>> very confusing. First, an IETF Proposed Standard should probably
>>>> refer to
>>>>> documents having IETF consensus. An example would be RFC 7491, albeit
>>>> there is
>>>>> other related work as well, e.g., in the TEAS WG. Second, Section 4.4
>>>> is by and
>>>>> large decoupled from the rest of the document and not specific to
>>>> DetNet.
>>>>> Neither do other sections of the document refer to the concepts
>>>> introduced in
>>>>> Section 4.4, nor does Section 4.4 use the DetNet terminology or
>>>> discuss
>>>>> applicability to DetNet. Section 4.4 even mentions explicitly at the
>>>> end that
>>>>> it discusses aspects that are orthogonal to the DetNet architecture.
>>>> It is not
>>>>> at all clear why Section 4.4 is in this document. Section 4.4 could
>>>> be removed
>>>>> from the document without impacting the rest of the document.
>>>>>
>>>>> Minor issues:
>>>>>
>>>>> * Terminology "DetNet transport layer"
>>>>>
>>>>>      The term "transport layer" has a well-defined meaning in the IETF,
>>>> e.g.
>>>>>      originating from RFC 1122. While "transport" and e.g. "transport
>>>> network" is
>>>>>      used in the IETF for different technologies in different areas, I
>>>> think the
>>>>>      term "transport layer" is typically understood to refer to
>>>> transport
>>>>>      protocols such as TCP and UDP.. As such, I personally find the term
>>>> "DetNet
>>>>>      transport layer" misleading and confusing. The confusion is easy
>>>> to see e.g.
>>>>>      in Figure 4, where UDP (which is a transport protocol as per RFC
>>>> 1122) sits
>>>>>      on top of "transport".
>>>>>
>>>>>      Based on the document it also may be solution/implementation
>>>> specific whether
>>>>>      the "DetNet transport layer" is actually a separate protocol layer
>>>> compared
>>>>>      to the "DetNet service layer". Thus it is not clear to me why the
>>>> word
>>>>>      "layer" has to be used, specifically in combination "transport
>>>> layer".
>>>>>      To me as, the word "transport layer" (and "transport protocol")
>>>> should be
>>>>>      used for protocols defined in TSV area, consistent with RFC 1122.
>>>> But this is
>>>>>      probably a question to be sorted out by the IESG.
>>>>>
>>>>> * Page 9
>>>>>
>>>>>       A DetNet node may have other resources requiring allocation
>>>> and/or
>>>>>       scheduling,
>>>>>
>>>>>      This is just one of several examples for inconsistent use of
>>>> terminology.
>>>>>      What is a "DetNet node"? That term is not introduced in Section
>>>> 2.1
>>>>> * Page 14
>>>>>
>>>>>       A DetNet network supports the dedication of a high proportion
>>>> (e.g.
>>>>>       75%) of the network bandwidth to DetNet flows.
>>>>>
>>>>>      The 75% value is not reasoned.. What prevents using 99% of the
>>>> bandwidth for
>>>>>      DetNet traffic?
>>>>>
>>>>> * Page 15: Figure 2
>>>>>
>>>>>      If the term "transport layer" cannot be avoided, the labels in
>>>> this figure
>>>>>      should at least be expanded to "DetNet transport layer".
>>>>>
>>>>> * Page 18: Figure 4
>>>>>
>>>>>      As already mentioned earlier, Figure 4 is confusing. UDP is a
>>>> transport
>>>>>      protocol. If the term "transport" cannot be avoided, the labels in
>>>> this
>>>>>      figure should at least be expanded to "DetNet transport".
>>>>>
>>>>> * Page 23
>>>>>
>>>>>       If the source transmits less data than this limit
>>>>>       allows, the unused resource such as link bandwidth can be made
>>>>>       available by the system to non-DetNet packets.
>>>>>
>>>>>      Could there be additional requirements on the use of unused
>>>> resources by
>>>>>      non-DetNet packets, e.g., regarding preemption? I am just
>>>> wondering... If
>>>>>      that was possible, a statement like "... can be made available by
>>>> the system
>>>>>      to non-DetNet packets as long as all guarantees are fulfilled"
>>>> would be on
>>>>>      the safe side, no?
>>>>>
>>>>> * Page 27:
>>>>>
>>>>>       DetNet achieves congestion protection and bounded delivery
>>>> latency by
>>>>>       reserving bandwidth and buffer resources at every hop along the
>>>> path
>>>>>       of the DetNet flow.
>>>>>
>>>>>      Why does this sentence use the word "hop"? As far as I understand,
>>>> in DetNet
>>>>>      bandwidth and buffer resources are reserved in each DetNet
>>>> intermediate node.
>>>>>      If there were hops over IP routers not being DetNet intermediate
>>>> nodes, no
>>>>>      resources would be reserved there. As per Section 4.3.3, it is
>>>> possible to
>>>>>      deploy DetNet this way. And obviously there can be resource
>>>> bottlenecks below
>>>>>      IP, on devices that are not routers... So does "hop" here refer to
>>>> IP router
>>>>>      hops or also to devices not processing IP (or IP/MPLS)?
>>>>>
>>>>> * Page 27:
>>>>>
>>>>>       Standard queuing and transmission selection algorithms allow a
>>>>>       central controller to compute the latency contribution of each
>>>>>       transit node to the end-to-end latency, ...
>>>>>
>>>>>      The text does not explain why a _central_ controller is needed for
>>>> this
>>>>>      computation. Why would a distributed control plane not be able to
>>>> realize
>>>>>      this computation. Isn't this implementation-specific?
>>>>>
>>>>> * Page 32
>>>>>
>>>>>      To somebody who is not deeply familiar with DetNet, it is
>>>> impossible to parse
>>>>>      the description of the examples in Section 4.7.3. For instance,
>>>> "VID +
>>>>>      multicast MAC address" is not introduced. I think this example
>>>> must be
>>>>>      expaned with additional context and explanation to be useful to
>>>> readers.
>>>>> * Page 34
>>>>>
>>>>>       There are three classes of information that a central controller
>>>> or
>>>>>       distributed control plane needs to know that can only be obtained
>>>>>       from the end systems and/or nodes in the network.
>>>>>
>>>>>      Wouldn't it be sufficient to state "Provisioning of DetNet
>>>> requires knowledge
>>>>>      about ...". Does it matter in this context whether the
>>>> provisioning is done
>>>>>      by a central controller or a distributed control plane? For
>>>> instance, could
>>>>>      the same paragraph also apply to a network that uses _multiple_
>>>> central
>>>>>      controllers, or hybrid combinations of central controllers and
>>>> distributed
>>>>>      control planes? In general, an architecture document should be
>>>> agnostic to
>>>>>      implementation aspects unless there is a specific need. In this
>>>> specific
>>>>>      case, I fail to see a need to discuss the realization of the
>>>> control plane of
>>>>>      a network.
>>>>>
>>>>> Editorial nits:
>>>>>
>>>>> * Page 9:
>>>>>
>>>>>       The low-level mechanisms described in Section 4.5 provide the
>>>>>       necessary regulation of transmissions by an end system or
>>>>>       intermediate node to provide congestion protection. The
>>>> allocation
>>>>>       of the bandwidth and buffers for a DetNet flow requires
>>>> provisioning
>>>>>       A DetNet node may have other resources requiring allocation
>>>> and/or
>>>>>       scheduling, that might otherwise be over-subscribed and trigger
>>>> the
>>>>>       rejection of a reservation.
>>>>>
>>>>>      Probably a full stop is missing after "provisioning".
>>>>>
>>>>> * Page 11: "... along separate (disjoint non-SRLG) paths ..."
>>>>>
>>>>>      I find this confusing. I would understand e.g. "along separate
>>>>>      (SRLG-disjoint) paths".
>>>>>
>>>>> * Page 34:
>>>>>
>>>>>       When using a peer-
>>>>>       to-peer control plane, some of this information may be required
>>>> by a
>>>>>       system's neighbors in the network.
>>>>>
>>>>>      Would "acquired" be a better term?
>>>>>
>>>>> * Page 34:
>>>>>
>>>>>       o  The identity of the system's neighbors, and the
>>>> characteristics of
>>>>>          the link(s) between the systems, including the length (in
>>>>>          nanoseconds) of the link(s).
>>>>>
>>>>>      "Latency" or "delay" would probably be a better terms if the value
>>>> is
>>>>>      measured in nanoseconds.
>>>>>
>>>>> * Page 35:
>>>>>
>>>>>       DetNet is provides a Quality of Service (QoS), and as such, does
>>>> not
>>>>>       directly raise any new privacy considerations.
>>>>>
>>>>>      Broken sentence
>>>>>
>>>>> * Please expand acronyms on first use (e.g., OTN)
>>>>>
>>>>>
>>> _______________________________________________
>>> detnet mailing list
>>> detnet@ietf.org<mailto:detnet@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/detnet<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_detnet&d=DwMFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=CRB2tJiQePk0cT-h5LGhEWH-s_xXXup3HzvBSMRj5VE&m=x-a2-FkxV9FVzoBPYqhki-d6dTr8aMoYOZvLBMQiZKI&s=CgPCouhIIjjXPe07LlcZrBdgRhKb5hckS1j78aaZztE&e=>
> _______________________________________________
> detnet mailing list
> detnet@ietf.org<mailto:detnet@ietf.org>
> https://www.ietf.org/mailman/listinfo/detnet<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_detnet&d=DwMFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=CRB2tJiQePk0cT-h5LGhEWH-s_xXXup3HzvBSMRj5VE&m=x-a2-FkxV9FVzoBPYqhki-d6dTr8aMoYOZvLBMQiZKI&s=CgPCouhIIjjXPe07LlcZrBdgRhKb5hckS1j78aaZztE&e=>

_______________________________________________
detnet mailing list
detnet@ietf.org<mailto:detnet@ietf.org>
https://www.ietf.org/mailman/listinfo/detnet<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_detnet&d=DwMFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=CRB2tJiQePk0cT-h5LGhEWH-s_xXXup3HzvBSMRj5VE&m=x-a2-FkxV9FVzoBPYqhki-d6dTr8aMoYOZvLBMQiZKI&s=CgPCouhIIjjXPe07LlcZrBdgRhKb5hckS1j78aaZztE&e=>