Re: [Detnet] Martin Duke's Discuss on draft-ietf-detnet-pof-08: (with DISCUSS and COMMENT)

John Scudder <jgs@juniper.net> Fri, 12 January 2024 16:04 UTC

Return-Path: <jgs@juniper.net>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DEC31C14F6F0; Fri, 12 Jan 2024 08:04:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.806
X-Spam-Level:
X-Spam-Status: No, score=-2.806 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b="ENvKqnTa"; dkim=pass (1024-bit key) header.d=juniper.net header.b="VlLSot+f"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F4vn89wxBh7r; Fri, 12 Jan 2024 08:04:56 -0800 (PST)
Received: from mx0a-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3EC76C14F6EF; Fri, 12 Jan 2024 08:04:56 -0800 (PST)
Received: from pps.filterd (m0108159.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.17.1.24/8.17.1.24) with ESMTP id 40CF1Ler026448; Fri, 12 Jan 2024 08:04:55 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h= from:to:cc:subject:date:message-id:references:in-reply-to :content-type:content-id:content-transfer-encoding:mime-version; s=PPS1017; bh=36e27skteBbaNbrBghyF6DfYam7/7X+Z9k+CV1T+BrU=; b=E NvKqnTaom+uZP7tPi6Ffmd6d8zmiIilbjqsX7raABW/A9q2fmlk/zCRtilx6r0Do 0tZOph0fyR3JEy+Yn5uJk92Wkzem6ej7KzttQ7oVeghxE29Vhwc5LrFNkirbvtMp d331+kSB4Z3k/QDy6OvORbudMGcztrNh8e0/kAPhbMnBnSiBE5nfAMrEPVIgnca3 Jttb2oHHpx7O34FWetA/IeL5NAVVK6QtvfVRX1rfeEqrVzBh0+q1iYZnPIW0dcNu 6dYAocJ6PCWWHGZIntLAgF3T066QmeEfclLPiSx/XAwOrrPqT4++6RFMV8KYIZLB ++YfxjwJHD8MwJeMsgYAg==
Received: from mw2pr02cu001.outbound.protection.outlook.com (mail-westus2azlp17012028.outbound.protection.outlook.com [40.93.10.28]) by mx0a-00273201.pphosted.com (PPS) with ESMTPS id 3vjtwvhc5f-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 12 Jan 2024 08:04:54 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=et8vU2HVAzl8NuWt0AFVQU16nojmeDDeG8P6pI80kLgU10MGfRdgrNvjNeZg86FbrpIV5NV/g8Q39EOeR1h8q5c3oQndLLPZlzmXX2aLRbeCFurcGb7Dt96RJTwHT3qbEgQvAgrqYG8uCL/Mpz1oIrg1lsk8xPLACekXd+ickrASjl6D5PcDqhUL5kihU50dPIkE8/Zxzwc3n4YC8iU6u7lQS29VhZkQawvKNLT6HVWLPAerFC6QHJaPuh1dX9SK728MCzjS/xzhHHF8CLHRL1A+IQ3kG84Lfm11rPCRACFI6tl2gjeeuqs7ITPv8+zHFc8BU853sX6MVC+7Ido0Xg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=36e27skteBbaNbrBghyF6DfYam7/7X+Z9k+CV1T+BrU=; b=iHoqnRCvnUzQdg2xOSauBxFE+6ZMPdft6i5sb+3Q/M7mhhkUKhS6YCRuru2P+a9B2Nyt2eTdFIgZOCaveAPoJvpSZP77+SEsXS9+MpI5Xb7jGAB8qEB4fp2yo3jFNcbXhJRgCkjEkqYm0YpWmpeeZam07mnsNApWExYujxJWtJ5ht3HWWDbw/xoxDROh9enh0uGZULJQ5SORnQhAwal4x99k9hNOgEOLxTp8Vc/9cAw3ZwkcSKU/Qm06Rh98BWm0o3hR3bvkyyreRnpktzV2yoAOa5EV7O3FLAK92sWSTCZPY1qSyKbnLGGu6ec50cfH6BRC6PSdwJ10JcxrLoUYOQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=36e27skteBbaNbrBghyF6DfYam7/7X+Z9k+CV1T+BrU=; b=VlLSot+fKHfYblJRh/V8aj7WBcVdA3THfbUFSX8GNFBFsGGoYJQzG4ud55ln7FIOZUi3J3ykJ7dXpLG9wB5gzGhcUY8lf96r2pZVxe+b+d/3XoS+W4yLtii4oFbc5065We2yL1hGdaRcRYl0Wha8g1/13f4TZjwPyIUIzOqwgmQ=
Received: from DS0PR05MB9198.namprd05.prod.outlook.com (2603:10b6:8:c2::22) by PH0PR05MB7559.namprd05.prod.outlook.com (2603:10b6:510:21::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7181.17; Fri, 12 Jan 2024 16:04:52 +0000
Received: from DS0PR05MB9198.namprd05.prod.outlook.com ([fe80::a912:2044:5a4a:33e5]) by DS0PR05MB9198.namprd05.prod.outlook.com ([fe80::a912:2044:5a4a:33e5%5]) with mapi id 15.20.7159.020; Fri, 12 Jan 2024 16:04:52 +0000
From: John Scudder <jgs@juniper.net>
To: Balázs Varga A <balazs.a.varga=40ericsson.com@dmarc.ietf.org>
CC: Martin Duke <martin.h.duke@gmail.com>, The IESG <iesg@ietf.org>, "draft-ietf-detnet-pof@ietf.org" <draft-ietf-detnet-pof@ietf.org>, "detnet-chairs@ietf.org" <detnet-chairs@ietf.org>, "detnet@ietf.org" <detnet@ietf.org>, "lberger@labn.net" <lberger@labn.net>
Thread-Topic: Martin Duke's Discuss on draft-ietf-detnet-pof-08: (with DISCUSS and COMMENT)
Thread-Index: AQHaQxQ/W4l/rnw3j0yd5oMQUXX5T7DWW/2A
Date: Fri, 12 Jan 2024 16:04:52 +0000
Message-ID: <BB1BBAE8-6828-432C-B1C5-C37194189675@juniper.net>
References: <170423216554.32458.15020828942077789896@ietfa.amsl.com> <AM0PR07MB534720E827C873D4733264DEAC602@AM0PR07MB5347.eurprd07.prod.outlook.com> <CAM4esxSHzs6j7NKJjsf1R7XqCkJMPb8vwFhsRQTSLbpU5u-AnQ@mail.gmail.com> <AM0PR07MB53477272CB3D4763682D968FAC672@AM0PR07MB5347.eurprd07.prod.outlook.com> <CAM4esxSWbkOAmZmhmASN7e-Gfgp+bak6e1oax0UHFA=O2rSEyQ@mail.gmail.com> <AM0PR07MB5347800E2444470915B45A85AC6A2@AM0PR07MB5347.eurprd07.prod.outlook.com>
In-Reply-To: <AM0PR07MB5347800E2444470915B45A85AC6A2@AM0PR07MB5347.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3696.120.41.1.4)
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DS0PR05MB9198:EE_|PH0PR05MB7559:EE_
x-ms-office365-filtering-correlation-id: c132c7b7-f3c0-471a-a74d-08dc1388360b
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: jQg2JEE+kw/JVh1+aSBLEF+SbDxwhE8qgvUbJ3ifEtBgneESPeaBtyYGmivZG7YKBV4a1P1VQoyCuZ/gusKm4rcMxEpvvSLR/AkCgLI/65UBiuMz/vJ5GCd1QzhWAb31J80xBZdPRemKKX6sxIu99Zz15vmw9VK1YAlIcrMUCk7hz1v6gWht95b6qU8/40sTtbCkYRxLCq9oookMkADYce/qnin/U8aUR0Xwk0tsuUSm50kEH00xUlZNaYueOJ3zZgLGsaC0oJrVjorUaApa9ZWHH9ODA5+oHdOcHAoTmY6odOlezIxuU93Qk+bc3n9I98Rt8QNOc94VqQw3r1begDXsdcQ6EUFqksN5+/bY0G2sMNRbT+qtpcb1ijsufkRaUR0IumdplhoPea0/sVAOZYmWQF0izQe72qZa996XwTsNgQMJfkMcOMx7tP2Z92Bzxeetymfr+yAMhrU0X4riL6JOJ6PeDySNEwDiKWLtWXp3+MoYBMGXX4RfMx9zfeA+fP7CHdh3g3mQuvGlZpfMFK6MDgaj5EV7w5+TLBCB5OPBjc037qXr+EFKg4iU1eUw55ihFZ0yLkPX4A+IRS6WtDBRAYWitFhp5bhCV5gUpALVdOmPZ0JdqWrhpYIZlM4XI+kq+2K0J3vUAHJCmKn2RA==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DS0PR05MB9198.namprd05.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(136003)(346002)(396003)(376002)(39860400002)(366004)(230922051799003)(64100799003)(186009)(451199024)(1800799012)(2906002)(478600001)(30864003)(966005)(5660300002)(6506007)(53546011)(38070700009)(4326008)(91956017)(76116006)(54906003)(66446008)(33656002)(316002)(66556008)(64756008)(86362001)(36756003)(8936002)(66476007)(71200400001)(6486002)(2616005)(41300700001)(26005)(83380400001)(66946007)(8676002)(122000001)(66574015)(38100700002)(6512007)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <6A96B9B3A9B17A4FA99DC0EDF738F638@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DS0PR05MB9198.namprd05.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c132c7b7-f3c0-471a-a74d-08dc1388360b
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Jan 2024 16:04:52.2484 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: wYTE5omiCuOTqRmPFI7DKjGOfX4svwKHLMC+tv5JGZ2TnbBJKrW9Ily1LFlNl34V
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR05MB7559
X-Proofpoint-GUID: uN2hZseS-QbzmUCtB9lviXV3hA9yoSbt
X-Proofpoint-ORIG-GUID: uN2hZseS-QbzmUCtB9lviXV3hA9yoSbt
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.997,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2023-12-09_02,2023-12-07_01,2023-05-22_02
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 phishscore=0 lowpriorityscore=0 malwarescore=0 mlxscore=0 impostorscore=0 bulkscore=0 spamscore=0 suspectscore=0 mlxlogscore=999 clxscore=1011 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.19.0-2311290000 definitions=main-2401120125
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/j_nppki4HHWBjmuBV4WplvQh3rk>
Subject: Re: [Detnet] Martin Duke's Discuss on draft-ietf-detnet-pof-08: (with DISCUSS and COMMENT)
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Jan 2024 16:05:00 -0000

For what it’s worth, it also seems to me like a weird design choice to forward out-of-order packets, when the option exists to not do so (by dropping instead). But, I accept that the authors and working group are well aware of this and have made an informed choice to insist that the POF function as the document specifies. Also, I acknowledge that the considerations may not be as obvious as they appear at first blush — I can see that if the latency bound is respected, it shouldn’t be possible for an out-of-order packet to slip through… so a change to the algorithm as written would require a non-trivial analysis of the revised algorithm. 

In short, IMO it’s OK to let this characteristic stand, while also adding more descriptive text to make it clear what the design limitations are.

Thanks,

—John

> On Jan 9, 2024, at 10:55 AM, Balázs Varga A <balazs.a.varga=40ericsson.com@dmarc.ietf.org> wrote:
> 
> 
> Hi Martin,
>  
> I think we are somewhat misaligned regarding the “guarantee of in-order delivery”.
> POF described in the draft considers the latency bound (!), when the out-of-order
> packets are re-ordered. This latency bound is an essential requirement for DetNet
> flows. As per your concern I have added new text (in the introduction section) in
> the latest versions to clarify that:
> NEW TEXT
>   POF ensures in-order delivery for packets being within
>   the latency bound of the (DetNet) flow. POF does not correct
>   errors in the packet flow e.g., duplicate packets, too
>   late packets.
> END
>  
> Does this clarified the concern?
>  
> In my understanding all concerns are now fixed with the latest draft version.
> If anything missed please let it know.
>  
> Thanks
> Bala’zs
>  
>  
> From: Martin Duke <martin.h.duke@gmail.com> 
> Sent: Thursday, January 4, 2024 7:53 PM
> To: Balázs Varga A <balazs.a.varga@ericsson.com>
> Cc: The IESG <iesg@ietf.org>; draft-ietf-detnet-pof@ietf.org; detnet-chairs@ietf.org; detnet@ietf.org; lberger@labn.net
> Subject: Re: Martin Duke's Discuss on draft-ietf-detnet-pof-08: (with DISCUSS and COMMENT)
>  
> The changes mostly look good.
>  
> I gather the other ADs would like to think about this guarantee of in-order delivery bit. If we end up sticking with the current design, I would insist that the document be clearer that the POF is not actually ensuring in-order delivery, in order to reduce packet loss.
>  
> On Thu, Jan 4, 2024 at 5:25 AM Balázs Varga A <balazs.a.varga@ericsson.com> wrote:
> Hi Martin, further replies inline [BV]. Thanks Bala’zs
>  
> From: Martin Duke <martin.h.duke@gmail.com> 
> Sent: Wednesday, January 3, 2024 8:14 PM
> To: Balázs Varga A <balazs.a.varga@ericsson.com>
> Cc: The IESG <iesg@ietf.org>; draft-ietf-detnet-pof@ietf.org; detnet-chairs@ietf.org; detnet@ietf.org; lberger@labn.net
> Subject: Re: Martin Duke's Discuss on draft-ietf-detnet-pof-08: (with DISCUSS and COMMENT)
>  
> HI Balazs,
>  
> Replies inline.
>  
> On Wed, Jan 3, 2024 at 6:57 AM Balázs Varga A <balazs.a.varga@ericsson.com> wrote:
> Hi Martin,
> 
> Thanks for your review. Please find clarifications below:
> 
> 1. Sequencing of PRF, PEF, and POF functions.
> <Reply> Implementation of PRF and PEF are not defied in details in IETF. A possible implementation 
> of an Elimination (PEF) functionality is described in the IEEE 802.1CB-2017 standard. PEF has its own 
> internal states and various elimination algorithms (e.g., vector recovery, match recovery) can be 
> used. If PRF and PEF are not designed and configured correctly, then PEF may result in duplicate 
> packet delivery (e.g., match recovery is used for bulk flows). 
> In section 4.1 the intention was to highlight, that POF cannot repair such scenarios.
> 
> POF is usually the last thing before egress, but not always. It may be located within the DetNet 
> network if PREOF is designed so.
>  
> [MD] Fair enough. Perhaps you could make this change:
> OLD
> Error cases in which the POF is presented duplicate packets can lead to out of
> order delivery of duplicate packets as well as to increased delays.
>  
> NEW
> Error cases in which the PRF or PEF implementation errors present duplicate packets to the POF can lead to out of
> order delivery of duplicate packets as well as to increased delays.
>  
> [BV] Not only implementation errors can lead to duplicate packets,
> so a somewhat finetuned change as per your comment:
> OLD
> Error cases in which the POF is presented duplicate packets can lead to out of
> order delivery of duplicate packets as well as to increased delays.
>  
> NEW
> Error cases in which duplicate packets are presented to the POF can lead to out of
> order delivery of duplicate packets as well as to increased delays.
>  
>  
> 
> 2. Requirements for ordering vs loss
> <Reply> These POF algorithms are designed for DetNet networks as part of the DetNet service sub-layer 
> (PREOF) functionalities. POF never drops any packet. Only the PEF has the task to drop duplicates. 
> The only task for POF is to correct the order of packets (if it is possible with its configuration). 
> Just again, if PRF and PEF are not designed and configured correctly, then POF may not re-order 
> the packets in some scenarios. If POF parameters are not designed and configured correctly,
> it may not re-order the packets.
>  
> [MD] I'm not going to hold indefinitely on this point, because it's not my design or use case.  If you and the AD *really* think this is how it should work, I'll relent.
>  
> But ISTM that by forwarding out of order packets you are undermining the POF function in the service of avoiding packet loss, which is not the POF's job.
>  
> Forwarding a packet below pof_last_sent is by definition out of order. I would think a POF would focus on guaranteeing order delivery, and rely on the reliabilty
> functions to provide reliability.
>  
> [BV] Ack.
>  
> 
> 3. Strange assumptions in the advanced algorithm.
> 3a. Is there an assumption that there is no PRF beyond the POF?
> <Reply> There is no such an assumption. It is design specific and depends on the topology, flow 
> parameters, etc., how the PREOF functions are located in the network. A POF function (and its 
> parameters) has to be designed based on the delay budget upto the point of the POF function. 
> If there are further PRF/PEF stages behind the POF, then You may need a further POF function 
> after them.
>  
> [MD] If a POF is not accounting for downstream delay, it would appear that limiting the timeout isn't actually ensuring that traffic falls within the delay guarantees.
>  
> [BV] POF parameters are configured to fulfill the delay bound.
> This is shown e.g., in Figure3. + text above it:
> “ … the
>    remaining delay budget of a flow at the POF point is larger than
>   "POFMaxDelay" time.”
>  
> 
> 3b. The introduction suggests that out-of-order delivery is a result of the PRF 
> rather than some sort of link-layer pathology.
> <Reply> The out-of-order delivery is a result of PEF (and not the PRF). 
> 
> 3b. ... So it's sufficient for the timeout to be the limited by the
> remaining time budget for the longest path.
> <Reply> No. The "remaining time budget for the longest path" shows the latest delivery time of 
> a packet that can fulfil the bounded latency requirement of the flow. The necessary buffering 
> time is determined by the latency difference of the paths. You have to be prepared for the worst
> case scenario: packet "n" received over the shortest path and packet "n-1" received over the 
> longest path. Packet "n" has to be buffered until packet "n-1" arrives (i.e., for the latency 
> difference of the paths). The advanced POF algorithm is used if the remaining delay budget of a 
> flow at the POF point is smaller than the latency difference of the paths. (Therefore, buffering for 
> "remaining time budget for the longest path" can not re-order packet "n" and "n-1".)
>  
> [MD] Yes, thank you for pointing out my analytical error. I withdraw point (3b).
>  
> [BV] Ack.
>  
> 4. Is there some reason that "Consensus Boilerplate" is set to NO on the
> datatracker page? Informational RFCs have IETF consensus!
> <Reply> I think this may be an error on the page.
>  
> [MD] Ok, this is easy to fix.
>  
> [BV] Thanks
>  
>  
> 
> I hope these have clarified your concerns.
> 
> Thanks & Cheers
> Bala'zs
> 
> -----Original Message-----
> From: Martin Duke via Datatracker <noreply@ietf.org> 
> Sent: Tuesday, January 2, 2024 10:49 PM
> To: The IESG <iesg@ietf.org>
> Cc: draft-ietf-detnet-pof@ietf.org; detnet-chairs@ietf.org; detnet@ietf.org; lberger@labn.net; lberger@labn.net
> Subject: Martin Duke's Discuss on draft-ietf-detnet-pof-08: (with DISCUSS and COMMENT)
> 
> Martin Duke has entered the following ballot position for
> draft-ietf-detnet-pof-08: Discuss
> 
> When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.)
> 
> 
> Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
> for more information about how to handle DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-detnet-pof/
> 
> 
> 
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
> 
> There are several elements here that are either poorly phrased or misconceived
> in some way.
> 
> 1. Sequencing of PRF, PEF, and POF functions.
> 
> Section 4.1 says "However, the PREOF functions run independently without any
> state exchange required between the PEF and the POF or the PRF and the POF.
> Error cases in which the POF is presented duplicate packets can lead to out of
> order delivery of duplicate packets as well as to increased delays."
> 
> but then Section 4.6 says "In DetNet scenarios there is always an Elimination
> function before the POF (therefore duplicates are not considered by the POF)."
> 
> I can't reconcile these statements. How can there be a duplicate packet error
> case if the PEF is always before the POF?
> 
> A statement that the POF is always the last thing before egress would clean up
> some logical holes, like in (3a) below.
> 
> 2. Requirements for ordering vs loss
> 
> What is the purpose of Sec 4.3 directly forwarding packets with (sequence
> number < POF Last Sent + 1)? There's an implicit requirement that delivering
> the packet in order is less important that not dropping it, but is a strange
> requirement for a *Packet Ordering Function*. If Detnet is to be decomposed
> into three functions, it is very difficult reason about if the POF guarantees
> ordering, but sometimes it ignores that if it's trying to avoid losses. Just do
> PRF/PEF if you want to avoid losses!
> 
> So I would suggest that the POF forward (sequence number == POF Last Sent + 1)
> and drop anything earlier.
> 
> 3. Strange assumptions in the advanced algorithm.
> 
> 3a. Is there an assumption that there is no PRF beyond the POF? If there is,
> it's possible that there are different path delays beyond the POF, and that has
> to be accounted for in the algorithm. My guess is that you are assuming that,
> given Figure 1. In that case it should be stated explicitly (See point #1).
> 
> 3b. The introduction suggests that out-of-order delivery is a result of the PRF
> rather than some sort of link-layer pathology. If so, I don't see why it's
> necessary for the POF timeout to be path-dependent. That is, the shorter-path
> packets will by definition be in-order[1], and the longer path will be
> out-of-order. So it's sufficient for the timeout to be the limited by the
> remaining time budget for the longest path.
> 
> [1] Unless there's a loss on that path. But in that case, there is no advantage
> to a longer delay, so my proposed algorithm holds.
> 
> Maybe I'm getting the underlying assumptions wrong?
> 
> 4. Is there some reason that "Consensus Boilerplate" is set to NO on the
> datatracker page? Informational RFCs have IETF consensus!
> 
> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> Thanks to Kyle Rose for the TSVART review.
>