Re: [Detnet] Role of the transport layer in the DetNet Architecture

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Fri, 29 July 2022 16:37 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 13F9EC157B40; Fri, 29 Jul 2022 09:37:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.908
X-Spam-Level:
X-Spam-Status: No, score=-11.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=JN00j0hp; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=JqweUxUJ
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GUwBsYW8Fidc; Fri, 29 Jul 2022 09:37:25 -0700 (PDT)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7FCE4C157B36; Fri, 29 Jul 2022 09:37:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=13810; q=dns/txt; s=iport; t=1659112645; x=1660322245; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=+qmRunmh1toyGBLpsPTCImGcbNw5jPZwN2eTjN0Hcqc=; b=JN00j0hpjXrThQHCdFrShOASySvqcIva7bO45z3AGZQuQH5bKMukWqj/ xME8NAsns0hSUkqPH8ZLKUpSZbX0ejT0h0d+pmII/2byt27K02+mqdkHs op7+W+3qONCJe7TEfWkaf2II66IVxzhhqcTD4wGS9y7kV5HxLN72LolTA c=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:JDTlfhXJsUBIRQxSi8/JNT9k70DV8K36AWYlg6HPw5pCcaWmqpLlO kGXpfBgl0TAUoiT7fVYw/HXvKbtVS1lg96BvXkOfYYKW0oDjsMbzAAlCdSOXEv8KvOiZicmH cNEAVli+XzzMUVcFMvkIVPIpXjn5j8JERK5Pg1wdYzI
IronPort-Data: A9a23:k7Leaay97yaBHt/S37h6t+fuxirEfRIJ4+MujC+fZmUNrF6WrkVUy WBLW2+Hb/zcN2H3eIsiatuy8xlU7ZTTnYdkTVFt+VhgHilAwSbn6Xt1DatR0we6dJCroJdPt p1GAjX4BJloCCea/H9BC5C5xZVG/fngqoHUVaiVYUideSc+EH170U05yrZj6mJVqYHR7z2l6 IuaT/L3YDdJ6xYsWo7Dw/vewP/HlK2aVAIw5jTSV9gS1LPtvyV94KYkGE2EByCQrr+4sQKNb 72rILmRpgs19vq2Yz+vuu6TnkYiGtY+MeUS45Zbc/DKv/RMmsA9+qE0E8MHYhcIsBrXje5e0 9lO9qGdZBh8a8UgmMxFO/VZOyh6OasD87jdLD3j98eS1EbBNXDrxp2CDmlvYtZeobgxWDoIr KdHQNwORkjra+ae2K67V+NhnNgLJ8jwN4RZsXZlpd3cJaZ2EcueHfWTtLe02h8UquFKH66PP vEiKhVBNx3lSB4VY2o+XcdWcOCA3ymjLGIwREiujbA+/EDSwRB/lr/3P7L9dtGWQ8hJtkeVu myA+H72ajkCKNyCwzef7ifw3uTOhij8HokVEZW08/dwixuSy3AdThoMWjOTjfCni0L4cdZWI E9BpnIioKw2skesS/HxWhSiqziFswISHd1KHIUHBBqlw67Q5UOSAXIJC2IHY909v8hwTjsvv rOUoz/3LTtgl4SOQiLCzZjKvw2dIiQWblIvSDBRGGPp/OLfiI00ixvOSPNqH6i0ksD5FFnML 9ai8XNWa1I70JBj6kmrwbzUq2n3/8GWEGbZ8i2SDzz7sVIgDGKwT9bwgWU3+8qsO2pworOpl XwAls72AAsmUszVzXflrAng4NiUCxutOTnYhxtkGIMssmjr8H+4docW6zZ7TKuIDirmUWK5C KMwkVoMjHO2AJdMRfQsC25WI59xpZUM7fy/CpjpgiNmO/CdjjOv8iB0flK31GvwikUqmqxXE c7FLJf0Vi1CUv49nGveqwIhPVkDm3BWKYT7GMCT8vhb+eH2iIO9EO1cawLeMojVEovd+FSNm zqgCyd640wPDLKhCsUm2YUSNlsNZWMqHoz7rtc/SwJwClQOJY3VMNeImelJU9U8x8x9z76Ul lngCh4w4Aeu3hXvdFTVAlg9M+mHdcgk8hoG0dkEYAzAN44LO9j/tc/ytvIfINEayQCU5aQoF qBVI57cX5yiiF3volwgUHU0l6Q6HDzDuO5EF3PNjOQXF3K4ezH0xw==
IronPort-HdrOrdr: A9a23:OveekqGm7yMVzFWVpLqFSpHXdLJyesId70hD6qkvc3Jom52j+P xGws526fatskdvZJkh8erwXJVoMkmsi6KdhrNhc4tKPTOW91dASbsC0WKM+UyZJ8VxnNQtrp uIH5IOauEYSGIK8foSgzPIUurIouP3ipxA7N22pxwGIGEaCJ2IrT0JdzpzeXcGIzWucKBJba Z0kfA3wQZIF05nC/iTNz0gZazuttfLnJXpbVotHBg88jSDijuu9frTDwWY9g12aUIO/Z4StU z+1yDp7KSqtP+2jjXG0XXI0phQkNz9jvNeGc23jNQPIDmEsHfqWG0hYczBgNkGmpDq1L8Yqq iKn/7mBbU015rlRBDxnfIq4Xi47N9h0Q679bbSuwqTnSWwfkNLNyMGv/MDTvMcgHBQ4e2VF8 lwrjikXtNsfGH9dCiR3am6azh60kWzunYsiugVkjhWVpYfcqZYqcgF8FpSC4poJlOx1GkLKp gnMCjn3occTXqKK3TC+mV/yt2lWXo+Wh+AX0gZo8SQlzxbhmpwwUcUzNEW2i5ozuNwd7BUo+ Dfdqh4nrBHScEbKap7GecaWMOyTmjAWwjFPm6eKUnuUKsHJ3XOoZjq56hd3pDmRLUYiJ8p3J jRWlJRsmA/P0roFM2VxZVOtgvARW2sNA6dg/22J6IJzIEUaICbRRFrEmpe5vdIi89vdfHmZw ==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.93,201,1654560000"; d="scan'208";a="888356819"
Received: from alln-core-4.cisco.com ([173.36.13.137]) by alln-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 29 Jul 2022 16:37:24 +0000
Received: from mail.cisco.com (xfe-rtp-004.cisco.com [64.101.210.234]) by alln-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id 26TGbNb7018490 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Fri, 29 Jul 2022 16:37:24 GMT
Received: from xfe-rtp-003.cisco.com (64.101.210.233) by xfe-rtp-004.cisco.com (64.101.210.234) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Fri, 29 Jul 2022 12:37:23 -0400
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (64.101.32.56) by xfe-rtp-003.cisco.com (64.101.210.233) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Fri, 29 Jul 2022 12:37:22 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=RSXTQPbXyM44Jc8IBi8or8HbVk7TgEls+rAPEMMi4Mod/va6FJqA1U+6IWtNdUSGJ/v4ZEstRBTa5kK9erAvVQCaTI1mlxEhXBaM1lSkHlhdCTNYfj+Q3n2SJFvax85+3cD9JGHKvNZpfNGmz1WSOBFLi8Laqh9QcJXlIUCxBBtOnrbAQ+5wypuxxsBhYLgqV1CmN6eNogzQJqcLV+MhbLb+xBXF8yudBPesKolkRLr/AdfaouWUECvLljybcP1qplwdyoIllkA2ButzsCOPAGtAYNbTkZxgNBOtsPDM176Jh8kbGEyNMrzbvXhe3H7/5nmuav0DDB3OazuIpoBUmQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=YkG7CZrUFUmPMDTN+PeuyMTrko6vTgYVA9w+Iub1JgM=; b=V49MV+0bqq4KBx61iAdQKeTm8ZFCdHJPtkMfIFmQzDSUupN18b/d46yQqdAhde7FWFbr9PmD8e1BmoI7c2+v8pHhOMntYRKPqYaHD+guOvrvQf0kSCGNlzT/LJfqMwyTzyjcADc/9iYYV9XbYGAkSwSUrpLGAU0VAcnwXRaILYLkrqZt4M7l3/THcwes1oAEYDfRkTbPc/6U6fyUjWgfwomhmroggmWX47qmkkikzuVpYKilDWDW6ljJjFycz4gJSzkcFIgw1Z0dMcm1Fu0HQowTmnbSr984jDMFo9IT8sTlmIf4I46VWCWtHztYdIIlkMxZNOOtEkx5paPigJU8Ow==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YkG7CZrUFUmPMDTN+PeuyMTrko6vTgYVA9w+Iub1JgM=; b=JqweUxUJSq4qh6Lbc3eawaNK+fpvdEMr1XAc6GIXC3O1TpM41RyKQYKtvR7kjaARmQIXwiatChVEu9j6H+v37cABI2+H0vVcv0huxejg93dqsFtpqS4qz0pgC6Y4BA3EJx2+JevYrg0M0TyVstj+PueZptwX1xJYnxiNIpWSwZQ=
Received: from CO1PR11MB4881.namprd11.prod.outlook.com (2603:10b6:303:91::20) by MWHPR11MB2064.namprd11.prod.outlook.com (2603:10b6:300:27::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5458.19; Fri, 29 Jul 2022 16:37:21 +0000
Received: from CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::ecc3:1b8d:4d31:ff3c]) by CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::ecc3:1b8d:4d31:ff3c%3]) with mapi id 15.20.5482.012; Fri, 29 Jul 2022 16:37:21 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: "Black, David" <David.Black=40dell.com@dmarc.ietf.org>, "Pascal Thubert (pthubert)" <pthubert=40cisco.com@dmarc.ietf.org>, DetNet WG <detnet@ietf.org>, "raw@ietf.org" <raw@ietf.org>
CC: Balázs Varga A <balazs.a.varga@ericsson.com>, "Black, David" <David.Black@dell.com>
Thread-Topic: Role of the transport layer in the DetNet Architecture
Thread-Index: AdibP4EOEYL7M004T7WXrlEYlrxaZwAMZiyQAV7qBAAAnBFukAAB6beQ
Date: Fri, 29 Jul 2022 16:37:18 +0000
Deferred-Delivery: Fri, 29 Jul 2022 16:37:00 +0000
Message-ID: <CO1PR11MB48810C41B67D2149C1771D8AD8999@CO1PR11MB4881.namprd11.prod.outlook.com>
References: <CO1PR11MB488196C69858352D34AFB860D88F9@CO1PR11MB4881.namprd11.prod.outlook.com> <MN2PR19MB4045CDD12BC82689E1485312838F9@MN2PR19MB4045.namprd19.prod.outlook.com> <VI1PR07MB5358F5D9B5629D47379E060AAC949@VI1PR07MB5358.eurprd07.prod.outlook.com> <MN2PR19MB404577B4EDBB0BF8AAD16C6A83999@MN2PR19MB4045.namprd19.prod.outlook.com>
In-Reply-To: <MN2PR19MB404577B4EDBB0BF8AAD16C6A83999@MN2PR19MB4045.namprd19.prod.outlook.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Enabled=true; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SetDate=2022-07-19T13:11:53Z; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Method=Privileged; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Name=Public No Visual Label; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ActionId=3c7cf831-4d14-4ba7-ad60-8cc937ca1b7c; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ContentBits=0
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 95e1339c-01dc-432a-434a-08da71809bda
x-ms-traffictypediagnostic: MWHPR11MB2064:EE_
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: ik9NBnebLi2eLpo3Pj0Acc+ocs1/sEd6F6+D9ff6fJpu+qjyViK4wjJOLZJHbGDi1L+3S0otvLCJtdb1eMk3zlGhkC3V9m+dz3zxiHrG/viNsuFIsQy5OSqdzyL1DIf1KAzT09wZgU9k3FDb5bPQxDDJ3BmqPYRF9AxEneDUYwn4YXlbVQVuBIyR/GKd/nHJk7GsDlpBo3QqjzeW7LBCdxxfHXInGtOO6zBm02NGu0bDBgzMWyY8vCa+4anWrv71Z5XDLa0WqR6AmAd4/K8rpn7Eyzi2fQFeYbxAwUKa+h2q83GRv/SbCTfRiUtKAv0YUPHCSJRnUplClPETsaM65t2knpqqnBVBs9YMRi19ogrjFCEsxFrSLkm5+LACezOgLYh8eRQ2XGXM3EuFz0XeADACHy2RDTrzovr1dB/kyHYiFfXTtOWBu1dvTt1uCjfsnO6RsdZe6yFPNOwUUrvYctpSMJ3t4pTmzed1bmPZzFZPrpN7kjF8BKykq0nO0Ttb5aYdO3Ms9CociYV8frr1s3N5JX7o85bovtz0yE6GqWxHuwrQPH0HM27LE0phhTBJ8A0dKVZD4ZQFTSlUxOuCN7SRtgwuUlpjknizHp9R2NcO80Q2811CB4hlUvd49WIQb2a5hI9HCF5306Qo08W1zgOipf3fsQApEPWLQGmI2dau1/mdXkdXzGuj+0DuCzV/Axjk6mrQqSYEsZ9ua8hvsVV3s1/r8qS2LtmkwsoEJolCIi38x4jPpF289+FJXtVEtz9bwvGADG4igLYDO8EUQ2wjYLnZzc2YlI0hpEEkkqvW2ghup2rg6pquI8K01hcHOJjgWfesAnF/5ShYlM/Cr5CpniarJyGNhlfOgJwmTCz20oM5T6e1Rx33FDiSzNA9hlqxqLLHANUPG6DLf4rYkg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB4881.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230016)(4636009)(366004)(136003)(346002)(39860400002)(396003)(376002)(52536014)(30864003)(5660300002)(8676002)(4326008)(66556008)(76116006)(66476007)(66946007)(66446008)(64756008)(55016003)(8936002)(2906002)(38100700002)(122000001)(38070700005)(33656002)(478600001)(86362001)(966005)(26005)(6666004)(7696005)(9686003)(41300700001)(71200400001)(6506007)(54906003)(110136005)(316002)(19627235002)(83380400001)(53546011)(107886003)(66574015)(186003)(309714004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4881.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 95e1339c-01dc-432a-434a-08da71809bda
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Jul 2022 16:37:21.0402 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: DImObeYRkkwwSblBzcr9KD3eHgT7Lpedo0V7cgBkf1Fyg/cLjevBW5Pb7Z6fksJDktXIDXvIR4cQfhl/FVrSaQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR11MB2064
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 64.101.210.234, xfe-rtp-004.cisco.com
X-Outbound-Node: alln-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/f66EbJjxxqrLcwZUzbeajyDQJHE>
Subject: Re: [Detnet] Role of the transport layer in the DetNet Architecture
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jul 2022 16:37:30 -0000

Hello David,

Now it's getting really interesting (thanks Lou!, and thanks you too!).

Please note that I listed TCP not as the protocol I'd suggest to modify but to illustrate the do's and don'ts that DetNet would need. I have no idea if there is a bets match that would be changed or if a thin layer above UDP (e.g. to aggregate into DetNet expected block size), in combination with lower layers (e.g., to pull at DetNet expected times) could do the trick. Or else. IOW, I'm not in solution space yet. I'm trying to figure conceptually what belongs where since we have all those nice layers at IETF and those other nice layers at DetNet.

> So, starting from your transport layer goals:

I did not mean to be exhaustive but to steer the WG into writing those requirements. I do not mean to propose a solution either, or to work on one inside the DetNet group, but maybe to steer enough interest in TSV area to get something running.


> 
> > Bottom line, we'd want the application to have to support the minimum
> > and let the transport layer pack the data to fit the DetNet SLA and send
> it at the appropriate time, which could effectively be signaled over the
> UNI.
> > The stream behavior of TCP is appropriate, but the dynamic windowing and
> the retries and undesirable.
> > TCP has reordering but does not do PREOF along the path.
> 
> I see four pieces here that ought to be teased apart:
>    1) Transmission timing ("pack the data to fit the DetNet SLA")
>    2) TCP (and the like) dynamic windowing
>    3) Loss and retries
>    4) PREOF interaction
> 
> Quick summary of what could be done:
> 1) Transmission timing: Don't ask the transport protocol to do this.
>         - Disable sender pacing so the transport protocol (e.g., TCP) sends
> immediately (subject to its window, see item 2)

>From what I understand, a typical SLA will be a periodic block with a fixed period and a fixed block size. Compared with frame relay CIR (committed and excess rate, burst size), DetNet is a lot less "elastic" and no over-subscription. 

>         - At the sender, use a DetNet shaper below the transport protocol
> to align sent traffic to the DetNet SLA.

You mean packing multiple L4 packets into one? Doable, but segment size is usually L4 isn't it? A thin layer above UDP can pack the blocks and save header space.. 


> 2) Dynamic Windowing: Use a scalable congestion control with ECN congestion
> marking algorithms customized to DetNet (more below).

Yes, I can figure that having implemented FR switches and dynamic CIR based on FECN and BECN. But we do not have congestion issues in DetNet. The only thing we can get is bloat or discard at the detnet ingress where the first shaper is. So the signaling we want is between the DetNet shaper and the transport and or application. The problem I'm concerned with is when the application becomes too enthusiastic and transmits excessive amounts of data vs what the first shaper is willing to let I the DetNet network. We need either to tell the app to calm down if it can, or to control it by not pulling more from the socket than the shaper will accept just in time. 

> 3) Loss and retry behavior. Defer this, and target a lossless DetNet data
> plane for now to make initial progress on item 2.

Not in plan. We cannot afford end to end ARQ. We want FEC and PREOF instead. My question to you is whether you call those things L3, because that would change my maybe naïve view of what L3 and L4 do. Note that it's mostly an academic question anyway so we can name the boxes in the architecture; the function remains. I think Norm already blurred L2 and L3 is many of his speeches since many things could be implemented in either but the abstract behaviour remains.


>         - In initial work, treat any loss as a "cry for help" from the
> DetNet data plane, e.g., indicating a DetNet SLA violation.

That could be useful

>         - Deal with DetNet data planes that exhibit non-congestive losses
> later (e.g., starting from a transport protocol that doesn't do retries,
> such as DCCP [RFC 4340] or Datagram QUIC [RFC 9221]).

That's the idea, yes. 

> 4) PREOF in the network should "just work".

Someone has to do it. Then again do assign these functions to a layer? Traditional unicast L3 is one packet in, same packet out, either up or down the stack, or across the router. With IPv6 we even removed fragmentation from inside the network. PREOF is a very different beast.


> So, focusing on 2) Dynamic Windowing, there's an opportunity presented by
> changes in congestion control technology.

No desire for that; missing the bounded latency can be worse than loss. So we want simple: it's like a bus that will periodically leave the station. Fill it or lose the space. Excess passengers wait for the next, which probably means they'll walk or stays home. 

> 
> Transport protocols (e.g., TCP) that use classic congestion controls (e.g.,
> Reno, CUBIC) tend to fill buffers at bottleneck nodes when there's more
> traffic to send than the network can accommodate.  That's not desirable

No such thing in DetNet. There's no congestion inside the network. The only congestion would be at the ingress shaper, if we do not do right what's between the app and that shaper. That is my discussion.


> behavior for DetNet, particularly as there will be a sender buffer between
> the transport protocol and the DetNet shaper (item 1) that ought not to be
> overstuffed.  Starting with Datacenter TCP (DCTCP) a new class of scalable
> congestion controls has emerged that tends to empty buffers at bottleneck
> nodes under the same conditions.  These scalable congestion controls use
> ECN feedback to manage the sender's dynamic window, and do so in a very
> different fashion than classic drop-equivalent ECN.  The most visible
> current activities in this area are L4S, TCP Prague, and Prague for QUIC
> (all discussed briefly in yesterday's ICCRG meeting).  Details of what a
> "scalable congestion control" means are to be found in Section 4 and
> Appendix A of draft-ietf-tsvwg-ecn-l4s-id
> (https://datatracker.ietf.org/doc/draft-ietf-tsvwg-ecn-l4s-id/), but be
> aware that this is not a light read.
> 
> So, an opportunity to make a TCP-like transport protocol useful for DetNet
> would be to figure out what sort of active queue management (AQM) ought to
> be used to mark ECN congestion indications for the various possible DetNet
> queuing mechanisms (e.g., CQF, ATS) where the goal of the ECN congestion
> indications is to cause the "right thing" (whatever that is) to happen with
> the sender's transmission window so that the sender's DetNet shaper has
> "enough" traffic to do its "right thing."  Hacking together a running
> prototype is strongly suggested as a next step, because the interactions
> between transport protocols, DetNet's queuing mechanisms, and congestion
> marking algorithms are subtle, to put it mildly ... and there's a bunch of
> effort to be invested in figuring out what the two "right thing"s and one
> "enough" in this paragraph might mean in practice ...
> 

That's the thing, we do not need any of that. If the blocking function (e.g., in that shim above UDP) is not synchronized to send just in time, the simplest is that the shaper pulls the data just before that time. This is what my draft attempts to explain.

Thank you for all this, I hope we do more...

Pascal



> Thanks, --David
> 
> -----Original Message-----
> From: Balázs Varga A <balazs.a.varga@ericsson.com>
> Sent: Tuesday, July 26, 2022 8:45 AM
> To: Black, David; Pascal Thubert (pthubert); DetNet WG; raw@ietf.org
> Cc: Black, David
> Subject: RE: Role of the transport layer in the DetNet Architecture
> 
> 
> [EXTERNAL EMAIL]
> 
> Hi,
> 
> Agree with David. Adding just one more aspect: DetNet MPLS never
> touch L4 during the MPLS based forwarding.
> 
> Cheers
> Bala'zs
> 
> -----Original Message-----
> From: detnet <detnet-bounces@ietf.org> On Behalf Of Black, David
> Sent: Tuesday, July 19, 2022 3:20 PM
> To: Pascal Thubert (pthubert) <pthubert=40cisco.com@dmarc.ietf.org>; DetNet
> WG <detnet@ietf.org>; raw@ietf.org
> Cc: Black, David <David.Black@dell.com>
> Subject: Re: [Detnet] Role of the transport layer in the DetNet
> Architecture
> 
> Hi Pascal,
> 
> > So my question is: should we spin off work in TSVWG?
> How long an explanation of the word "no" would you like ... how many years
> ... :-)?
> 
> Seriously, a new L4 transport protocol for DetNet seems rather unlikely to
> be adopted, and the mention of TCP in the email below looks like an
> exercise in "strawman demolition," e.g., as RFC 8655 does not mention TCP.
> 
> I would suggest looking at RTP and perhaps the multi-stream support in QUIC
> (uses UDP) or SCTP (via SCTP/UDP)  to understand what sort of adaptations
> to DetNet would be both plausible and useful.
> 
> Thanks, --David
> 
> -----Original Message-----
> From: detnet <detnet-bounces@ietf.org> On Behalf Of Pascal Thubert
> (pthubert)
> Sent: Tuesday, July 19, 2022 3:18 AM
> To: DetNet WG; raw@ietf.org
> Subject: [Detnet] Role of the transport layer in the DetNet Architecture
> 
> 
> [EXTERNAL EMAIL]
> 
> Dear all,
> 
> At the RAW interim we discussed again the role of UNI and Transport layer,
> see in the architecture
> https://urldefense.com/v3/__https://protect2.fireeye.com/v1/url?k=31323334-
> 501d5122-313273af-454445555731-2b0c3973f1cab171&q=1&e=14c922c0-2015-4d1d-
> b68f-cb029ff5417a&u=https*3A*2F*2Fwww.rfc-
> editor.org*2Frfc*2Frfc8655.html*2Afig_DetNetservice__;JSUlJSUl!!LpKI!mLX9vm
> 8aqPY8KibxgO1XK4yIyPC-FgoEzzgUzLqKOw5oFZGMHkk5WEV3h_PArs-
> rK5G5ZqsQwObAEeQFVKsOz7VR2S8$ [protect2[.]fireeye[.]com].
> RAW typically operates within the DetNet Service subLayer.
> 
> The question is whether the DetNet Service sublayer is fully a L3 operation
> or if some of it is really L4. E.g., L3 unicast processing in a router is
> typically one packet in, same packet out. PREOF is certainly beyond that.
> 
> Also, a DetNet End System may not have TSN and/or Time Sync handy all the
> way to the app layer for the app to send the right volume of data at the
> right time. A transport that is not adapted may delay the transmission and
> interfere with the application process desires. Bottom line, we'd want the
> application to have to support the minimum and let the transport layer pack
> the data to fit the DetNet SLA and send it at the appropriate time, which
> could effectively be signaled over the UNI. The stream behavior of TCP is
> appropriate, but the dynamic windowing and the retries and undesirable. TCP
> has reordering but does not do PREOF along the path.
> 
> So we see the ideal transport is not available off the shelf. We could make
> it look like UDP to the network, but there's still a need for a particular
> functionality to suit DetNet. And if we agree to place PREOF at L4, then
> the packet should emerge to L4 at the relay nodes (see
> https://urldefense.com/v3/__https://protect2.fireeye.com/v1/url?k=31323334-
> 501d5122-313273af-454445555731-78e6c37e3d3533b3&q=1&e=14c922c0-2015-4d1d-
> b68f-cb029ff5417a&u=https*3A*2F*2Fwww.rfc-
> editor.org*2Frfc*2Frfc8655.html*2Afig_detnet__;JSUlJSUl!!LpKI!mLX9vm8aqPY8K
> ibxgO1XK4yIyPC-FgoEzzgUzLqKOw5oFZGMHkk5WEV3h_PArs-
> rK5G5ZqsQwObAEeQFVKsO8e_qJV8$ [protect2[.]fireeye[.]com]) and plunge again
> in L3. Which is fine, that's what L4 proxies do, remember DLSW anyone?
> 
> I wrote some basic of this in
> https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/draft-
> thubert-tsvwg-detnet-transport-01__;!!LpKI!mLX9vm8aqPY8KibxgO1XK4yIyPC-
> FgoEzzgUzLqKOw5oFZGMHkk5WEV3h_PArs-rK5G5ZqsQwObAEeQFVKsOOh98TzQ$
> [datatracker[.]ietf[.]org]. The document was intended to introduce the need
> for next steps as DetNet becomes real, which is now on us. There was great
> feedback (e.g., Xuesong and Mach) but the focus was elsewhere.
> 
> So my question is: should we spin off work in TSVWG? If so, could we
> prepare a problem statement, e.g., with the doc above as starting point?
> 
> I will not be in person at IETF 114, sorry for that. But it would be nice
> that the topic shows on the agendas for open discussions.
> 
> Keep safe;
> 
> Pascal
> 
> _______________________________________________
> detnet mailing list
> detnet@ietf.org
> https://urldefense.com/v3/__https://protect2.fireeye.com/v1/url?k=31323334-
> 501d5122-313273af-454445555731-6a55b9dd3f9aedbf&q=1&e=14c922c0-2015-4d1d-
> b68f-
> cb029ff5417a&u=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fwww.ietf
> .org*2Fmailman*2Flistinfo*2Fdetnet__*3B*21*21LpKI*21hG_2Ga7PoRVYUsVHjqhyX3p
> HQWG3nvwEu2xPrtdF95Yv_aq_c7VE43Y747tcgpwb9kjLhxTeRRwP1GJnog_3mYZqXxC9GR2D*2
> 4__;JSUlJSUlJSUlJSUlJSUlJQ!!LpKI!mLX9vm8aqPY8KibxgO1XK4yIyPC-
> FgoEzzgUzLqKOw5oFZGMHkk5WEV3h_PArs-rK5G5ZqsQwObAEeQFVKsOiKC_Z8M$
> [protect2[.]fireeye[.]com] [ietf[.]org]
> 
> _______________________________________________
> detnet mailing list
> detnet@ietf.org
> https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/detnet__;
> !!LpKI!mLX9vm8aqPY8KibxgO1XK4yIyPC-FgoEzzgUzLqKOw5oFZGMHkk5WEV3h_PArs-
> rK5G5ZqsQwObAEeQFVKsO-PzkXeY$ [ietf[.]org]
> 
> --
> RAW mailing list
> RAW@ietf.org
> https://www.ietf.org/mailman/listinfo/raw