Re: [Detnet] Suresh Krishnan's No Objection on draft-ietf-detnet-architecture-11: (with COMMENT)

János Farkas <janos.farkas@ericsson.com> Sat, 02 March 2019 21:03 UTC

Return-Path: <Janos.Farkas@ericsson.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16CD2130DEF for <detnet@ietfa.amsl.com>; Sat, 2 Mar 2019 13:03:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.301
X-Spam-Level:
X-Spam-Status: No, score=-4.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1pN5faOCZi1E for <detnet@ietfa.amsl.com>; Sat, 2 Mar 2019 13:03:52 -0800 (PST)
Received: from sesbmg22.ericsson.net (sesbmg22.ericsson.net [193.180.251.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E3370130EA2 for <detnet@ietf.org>; Sat, 2 Mar 2019 13:03:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/relaxed; q=dns/txt; i=@ericsson.com; t=1551560629; x=1554152629; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=dPZH3gAoQkLEAIMZB2rYk9AKMWkpj5eSWOU+rlDVWyw=; b=eBYSaijXLZcuisBRxg7EE9qYJQ9o8lddhTVLyMygUhE5clTaCDL2WMsqoQbLLGNk ETShkQo8GTxFM30mookX90bDSEAGxX33YPRidf6xIB3PZ5Jsl0tuiidYWvF16KZR 3szwW3Dfet9tOPdoudTxtO3EGH60EnWSsFwD2corcp8=;
X-AuditID: c1b4fb30-fabff7000000355c-c4-5c7aefb54a1f
Received: from ESESBMB503.ericsson.se (Unknown_Domain [153.88.183.116]) by sesbmg22.ericsson.net (Symantec Mail Security) with SMTP id 52.E2.13660.5BFEA7C5; Sat, 2 Mar 2019 22:03:49 +0100 (CET)
Received: from ESESBMB503.ericsson.se (153.88.183.170) by ESESBMB503.ericsson.se (153.88.183.170) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Sat, 2 Mar 2019 22:03:49 +0100
Received: from [100.94.35.103] (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.186) with Microsoft SMTP Server id 15.1.1466.3 via Frontend Transport; Sat, 2 Mar 2019 22:03:48 +0100
To: Suresh Krishnan <suresh@kaloom.com>
CC: The IESG <iesg@ietf.org>, draft-ietf-detnet-architecture@ietf.org, Lou Berger <lberger@labn.net>, detnet-chairs@ietf.org, detnet@ietf.org
References: <155075828359.8615.9538259641487527490.idtracker@ietfa.amsl.com>
From: János Farkas <janos.farkas@ericsson.com>
Message-ID: <d89ff310-0805-3bc2-6a67-fa2b87136ce4@ericsson.com>
Date: Sat, 02 Mar 2019 22:03:48 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.2.1
MIME-Version: 1.0
In-Reply-To: <155075828359.8615.9538259641487527490.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrMLMWRmVeSWpSXmKPExsUyM2J7ie7W91UxBs+va1hc6//BYvH702wW iw/fZrJYzPgzkdmio/kti8W2rlMsDmweS5b8ZPI4f2UGu8eHTc1sAcxRXDYpqTmZZalF+nYJ XBkHrv5iLdikX/HvZBdzA+M31S5GDg4JAROJexv1uxi5OIQEjjBK3DuxiBXC+coo8bhrHQuE c5hRYsP0zUxdjJwcwgJJEp//72UFsUUE1CUWNV4E62AWmMoose3jOTaQhJCAj8TrM9/ZQWw2 AXuJu5c2MIPYvED2wid/GUFsFgEViU0rfoANFRWIlfh0ZTFUjaDEyZlPWEBsTgFfibY/D8Dm MAtYSMycf54RwpaXaN46mxnCFpe49WQ+E8ReNYlPbx+yT2AUmoVk1Cwk7bOQtM9C0r6AkWUV o2hxanFSbrqRkV5qUWZycXF+nl5easkmRmBUHNzy22AH48vnjocYBTgYlXh4n9+oihFiTSwr rsw9xCjBwawkwlv6ACjEm5JYWZValB9fVJqTWnyIUZqDRUmc94+QYIyQQHpiSWp2ampBahFM lomDU6qBUXrFvbsTPxnJbXutcl6WMcEtZpa/RMfDm4seGa9S61xrsu5cXazipZuaOl4ND57V bWpPO3FMeBWj6nlrozUXp1959G2jytJAE9a8NmWDK4/ChWb/FePpZ/Tv1Krr/JwTvyD/67Vz r7WmvOG+vGBj5NnoI/a+OWcfTj9Xp3JzBvv1LtbFa9OfZSixFGckGmoxFxUnAgCIiQDihgIA AA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/eTlUleK0JyqNkUiU8VSFZfwcL8g>
Subject: Re: [Detnet] Suresh Krishnan's No Objection on draft-ietf-detnet-architecture-11: (with COMMENT)
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 02 Mar 2019 21:03:55 -0000

Hi Suresh,

Thank you for your review!

Please see in-line:

On 2/21/2019 3:11 PM, Suresh Krishnan wrote:
> Suresh Krishnan has entered the following ballot position for
> draft-ietf-detnet-architecture-11: No Objection
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-detnet-architecture/
>
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> * Section 3.2.1.1.
>
> Given that we also know some of the downsides as well of large buffers, I think
> a pointer to some background might be warranted here. I would recommend a basic
> reference to something like
>
> Bufferbloat: Dark Buffers in the Internet, Communications of the ACM, January
> 2012,
Add reference with new sentence at the end of the paragraph: "Note that 
large buffers have some issues, see, e.g., [BUFFERBLOAT]."

>
> * Section 3.2.2.2.
>
> It is not obvious to me how the POF cannot be the last operation at the
> receiver. Can you clarify? Also, do intermediate nodes apply the POF? I can see
> the need for them to do PRF and PEFs but I am not sure applying the POF at
> intermediate nodes can necessarily help the low latency and low jitter goals.
>
>     The order in which a DetNet node applies PEF, POF, and PRF to a
>     DetNet flow is implementation specific.
The intention here is not to bound any specific order of the PREOF 
functions within a device, or not even bound which device implements 
which function. There can be complex network set-ups created. 
Furthermore, different implementations may have different pros and cons 
with respect to the order of PREOF functions. As pointed out, this is 
mainly valid for PRF and PEF; however, the same leave it open approach 
can be carried on all of the PREOF functions including POF.

Would it help to replace the sentence with?:
   The order in which a DetNet node applies PEF, POF, and PRF to a
    DetNet flow is left open for implementations.


> * Section 3.2.3.
>
> RFC7426 does not contain much specific information about explicit route setup.
> Is there a particular section you want to point to. If not, I don't think this
> reference is of much use. RFC8453 is listed twice.
Delete RFC7426 and one of the RFC8453s.

>
> * Section 3.3.1.
>
> Not sure why this is a requirement but I do wish to note that there are no such
> worst-case latency guarantees for best effort traffic (aka non-Detnet) in
> current networks. Can you clarify?
>
>     o  DetNet flows can be shaped or scheduled, in order to ensure that
>        the highest-priority non-DetNet packet is also ensured a worst-
>        case latency.
This is to protect the QoS of non-DetNet flows if needed.DetNet flows 
have stringent QoS requirements. There may be non-DetNet flows that are 
not best-effort, but have some QoS requirements, although, less 
stringent than that of the DetNet flows.


>
> * Section 4.1.1.
>
> This text "Peers with Duplicate elimination." seems to be completely out of
> place under the "Packet sequencing" heading below Figure 2. Copy and paste
> error?
Packet sequencing peers with duplicate elimination. It is explained 
under duplicate elimination as well, and they are leveled in the figure. 
Would merging the two sentences help?:
            As part of DetNet service protection, supplies the sequence
            number for packet replication and elimination (Section 3.4),
            thus peers with Duplicate elimination.

>
> * Section 4.3.2.
>
> I found the expression "number of bit times" confusing. I have understood "bit
> time" to mean the amount of time taken to emit a bit from a network interface.
> Based on that definition, this expression does not make sense. Is there a
> better reference/definition of what you mean?
Would it help to rewrite?:

OLD:
    These parameters, together with knowledge of the protocol stack used
    (and thus the size of the various headers added to a packet), limit
    the number of bit times per observation interval that the DetNet flow
    can occupy the physical medium.

NEW:
    These parameters, together with knowledge of the protocol stack used
    (and thus the size of the various headers added to a packet), 
provide the
    bandwidth that is needed for the the DetNet flow.


>
> * Section 4.5.
>
> There might be some other recent IETF defined mechanisms that might be relevant
> to mention here as well. e.g. RFC8289 (Codel), RFC8033 (PIE) etc.

Add RFC8289 and RFC8033 with a new sentence as the penultimate sentence 
of the section:
"Further techniques are defined by the IETF, e.g., [RFC8289] and 
[RFC8033]."


>
> * Section 4.7.2.
>
> While IPv6 does offer a mechanism to add/remove a flow id (flow label) not sure
> what kind of mapping you were thinking for IPv4. If this is not possible, I
> think a note to that effect might be useful here.
Flow identification details for IP data plane are described in 
draft-ietf-detnet-dp-sol-ip. Would it help to add the following 
introductory text to Section 4.7?:
"This section discusses what needs to be done at technology borders 
including Ethernet as one of the technologies. Flow identification 
details for MPLS and IP data planes are described in 
[I-D.ietf-detnet-dp-sol-mpls] and [I-D.ietf-detnet-dp-sol-ip], 
respectively."

>
> * Sections 5 and 6
>
> I also support Alissa and Benjamin's DISCUSSes (on privacy and security) and
> would like to see them addressed.
>
>

Thank you,
Janos