Re: [Detnet] WG Last Call: draft-ietf-detnet-architecture-05

Balázs Varga A <balazs.a.varga@ericsson.com> Tue, 12 June 2018 09:34 UTC

Return-Path: <balazs.a.varga@ericsson.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A178513112B for <detnet@ietfa.amsl.com>; Tue, 12 Jun 2018 02:34:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.32
X-Spam-Level:
X-Spam-Status: No, score=-3.32 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FROM_EXCESS_BASE64=0.979, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com header.b=Pv31+yN4; dkim=pass (1024-bit key) header.d=ericsson.com header.b=LEQ0PuK0
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xuBJbulIimW6 for <detnet@ietfa.amsl.com>; Tue, 12 Jun 2018 02:34:02 -0700 (PDT)
Received: from sessmg22.ericsson.net (sessmg22.ericsson.net [193.180.251.58]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C200E13112E for <detnet@ietf.org>; Tue, 12 Jun 2018 02:34:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/simple; q=dns/txt; i=@ericsson.com; t=1528796039; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=4k6OPYx2/jRPTH0SU8ft5rd4xdGUADxjExy2coDFzrA=; b=Pv31+yN4mdQz8Suiy7BPikKRXN5OlJaAi0eo78LUN7bUE85XpVlB9xdm8Iv1jRrf p79VeFOkw76r0pl1/Qv5aeoJzYKe9WCZU5/QIAt/+3aeJvObX0tJgbMDUjwDNJDM P5mttvEHGUXC/xnuWvYZCTrud3fioMy9ymn2K6kYbJQ=;
X-AuditID: c1b4fb3a-323229c000005fee-0a-5b1f93872150
Received: from ESESSHC006.ericsson.se (Unknown_Domain [153.88.183.36]) by sessmg22.ericsson.net (Symantec Mail Security) with SMTP id AF.56.24558.7839F1B5; Tue, 12 Jun 2018 11:33:59 +0200 (CEST)
Received: from ESESSMB501.ericsson.se (153.88.183.162) by ESESSHC006.ericsson.se (153.88.183.36) with Microsoft SMTP Server (TLS) id 14.3.382.0; Tue, 12 Jun 2018 11:33:58 +0200
Received: from ESESSMB505.ericsson.se (153.88.183.166) by ESESSMB501.ericsson.se (153.88.183.162) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Tue, 12 Jun 2018 11:33:58 +0200
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (153.88.183.157) by ESESSMB505.ericsson.se (153.88.183.166) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3 via Frontend Transport; Tue, 12 Jun 2018 11:33:59 +0200
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=4k6OPYx2/jRPTH0SU8ft5rd4xdGUADxjExy2coDFzrA=; b=LEQ0PuK09jYTr7vJqNx1KZcEZ3nMyLKvPzXzY9NC0nuYMJdiD34IyeueF7QZNqe4ysV2QLrpWmUkPfQFPbdCSzBLyk0uOZdow8UKnzzIA0Uwqwvd+Rvq57JtpZfbRsQJ5rfEnfFmgQL+igK71eytfAjW2d8g+XnnJmaGkh0e1uY=
Received: from AM3PR07MB402.eurprd07.prod.outlook.com (10.242.111.14) by AM3PR07MB388.eurprd07.prod.outlook.com (10.242.111.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.863.6; Tue, 12 Jun 2018 09:33:57 +0000
Received: from AM3PR07MB402.eurprd07.prod.outlook.com ([fe80::952b:f7b4:6f7d:549]) by AM3PR07MB402.eurprd07.prod.outlook.com ([fe80::952b:f7b4:6f7d:549%10]) with mapi id 15.20.0863.010; Tue, 12 Jun 2018 09:33:56 +0000
From: Balázs Varga A <balazs.a.varga@ericsson.com>
To: Stewart Bryant <stewart.bryant@gmail.com>, Lou Berger <lberger@labn.net>, DetNet WG <detnet@ietf.org>
CC: DetNet Chairs <detnet-chairs@ietf.org>
Thread-Topic: [Detnet] WG Last Call: draft-ietf-detnet-architecture-05
Thread-Index: AQHT6XGu5Bog5bhhq0Wg099r3Ejql6Q9i+aAgB7qvVA=
Date: Tue, 12 Jun 2018 09:33:56 +0000
Message-ID: <AM3PR07MB4021D464E3E2C4CCAA0883EAC7F0@AM3PR07MB402.eurprd07.prod.outlook.com>
References: <99657d22-f9e4-8a1a-27de-6997900f727e@labn.net> <7cc44e35-cbd0-fbdb-95b7-c93ab38ec5d7@gmail.com>
In-Reply-To: <7cc44e35-cbd0-fbdb-95b7-c93ab38ec5d7@gmail.com>
Accept-Language: hu-HU, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=balazs.a.varga@ericsson.com;
x-originating-ip: [94.21.179.238]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM3PR07MB388; 7:WzJNXpMuMrgYZDpJbG4sJSaQThh1esFbGzc7CN2bTbG0pQy7t8Pe3HHZuqVH6U2xtTHeICifmO5k86OJmelXA0aXI3bkoG9NEdTzT0ukGIsIUfjfzWL0tnvFqcB42mAK9RrpK7b1HueoEjXhohzD0Gs4Dt3P96RZzgIIhVdnzvk3vVHYlnOuhRvZThpIEbFmNjQe1EQsTIJJ4T8ZRTGclhyMUTHXqy5/kNjS30zCAF91pIT06klUwUEev8DXrLEa
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(5600026)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:AM3PR07MB388;
x-ms-traffictypediagnostic: AM3PR07MB388:
x-microsoft-antispam-prvs: <AM3PR07MB388A656D11C39908EB2BC54AC7F0@AM3PR07MB388.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(278428928389397)(192374486261705)(21748063052155)(170963831197625)(21532816269658)(17755550239193);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3231254)(944501410)(52105095)(93006095)(93001095)(10201501046)(3002001)(149027)(150027)(6041310)(20161123562045)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123560045)(6072148)(201708071742011)(7699016); SRVR:AM3PR07MB388; BCL:0; PCL:0; RULEID:; SRVR:AM3PR07MB388;
x-forefront-prvs: 07013D7479
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(346002)(396003)(366004)(39380400002)(39860400002)(13464003)(37854004)(199004)(189003)(51444003)(51914003)(81156014)(26005)(446003)(11346002)(476003)(486006)(6116002)(790700001)(3660700001)(99286004)(3280700002)(59450400001)(53546011)(86362001)(76176011)(7696005)(6506007)(102836004)(3846002)(606006)(33656002)(7736002)(68736007)(74316002)(5660300001)(8676002)(81166006)(186003)(9326002)(66066001)(8936002)(85182001)(229853002)(55016002)(236005)(53946003)(6306002)(54896002)(9686003)(6436002)(2900100001)(966005)(14454004)(316002)(110136005)(6246003)(39060400002)(53936002)(25786009)(478600001)(4326008)(97736004)(2906002)(5250100002)(106356001)(105586002)(85202003)(579004); DIR:OUT; SFP:1101; SCL:1; SRVR:AM3PR07MB388; H:AM3PR07MB402.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: dCf+0y203+J+xnRdy0B4qOFLuDF2EyP0fNwMcqWxlC9R6cmz6R1WGfTl6MHXy/n2kDrDCQNurtNkCChk35bcRfcg1ZqtumpZPPGWTJ4IYQrv62xopiKDP5IutyjZvONTGk2hDgJzSbdE9gctqK/1N6eiu5Sd4j9Zb91SRNRsQa/qDVVDx3vRUySnac9qFMV8
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_AM3PR07MB4021D464E3E2C4CCAA0883EAC7F0AM3PR07MB402eurprd_"
MIME-Version: 1.0
X-MS-Office365-Filtering-Correlation-Id: 5687cb5f-4b5f-4dad-1779-08d5d0479ee2
X-MS-Exchange-CrossTenant-Network-Message-Id: 5687cb5f-4b5f-4dad-1779-08d5d0479ee2
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Jun 2018 09:33:56.8805 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM3PR07MB388
X-OriginatorOrg: ericsson.com
X-Brightmail-Tracker: H4sIAAAAAAAAA02Sa0hTYRjHe3fOtuN08DYVHy0Th0KZlxSjIRYZFutD0KeISenIk87LlB2V lCB1hKGUVlu2OW80rJYmLp1zCeUQ0UpFkaRAvOQFxbtgilptOwv89nue//99brwUIbJyAyiF Mo9WKeVZYp6A1N3sDIkoex6UdKakO1byvXKHlOxt1pCSR+oVUvJlSn6RlHbpJ/hSo3GXI103 q3nXCZkgPpXOUhTQqqgLKYL0pclbuZ+/cu9pFsXFqLiLW448KMCx8GZgBpUjASXCvQh6RzYI NmhHsPa+1OUS4W0EH7eDWMHIAcuqnuMMSFxFwMb4IpdVKjkwqivhs8EkghbbDuF8z8OJYDUb XLV8cCa8HrSTTiZwGIxp/vKd7I0vQ3/9Cw7ruQL7Bi2P5TiwTRldHhKHwtpvDXKyEMugbaSO z86nhI5v465eHvg8lGoaHHmKQjgQplskbCs/+Dlbz2GXxmDsHiZY9oXFX39coyF8G/Y+Fbvz wVBn1iOWA2G0vsJ1JMAfOKBrWSBZIQLWtVqCFToQHGin3Wc9BW8Xlt3dFKCb2nebahH0Wzbd phNgejxNVqFo/aEJWc6BlYllnt616FEY0M2SesdChKNuqy2KtQSDpmKaz/JJeGio5R/ONyC+ CfkyNMNkp8XERNIqxR2GyVFGKuk8M3L8p572vTgr6llIsCNMIbGXcP1JUJKIKy9gCrPtCChC 7CPMDnekhKnywiJalZOsys+iGTs6RpFiP+GluxKZCKfJ8+hMms6lVf9VDuURUIy0sf6vmlar m7kZic/mukNK7h+fm4uyNC82ai3jW+qnXUzQzI+tszKDtebakabGB0WTJu8Z6fyBmsgvCx8a Gng5YVC88z9dNdzXFtJn6dSZIvIyPFvPZeZeTUrk19qwV0Iwt1qQfGPCc2lX2uCbMhYq1u1V e1ODOZWpPfHC7nkxyaTLo8MIFSP/B0G+awhLAwAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/kEGtujl8LC044gYE_2us2bwIkR0>
Subject: Re: [Detnet] WG Last Call: draft-ietf-detnet-architecture-05
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Jun 2018 09:34:11 -0000

Hi Stewart,



Thanks for the detailed review and the great comments.

My answers inline. Update of the document in progress.



@Norm: do you have a reference for network calculus?

@Co-authors: what to do with the HSR-PRP, ISA95 references?



Cheers

Bala'zs



-----Original Message-----
From: detnet <detnet-bounces@ietf.org> On Behalf Of Stewart Bryant
Sent: 2018. május 23. 18:02
To: Lou Berger <lberger@labn.net>; DetNet WG <detnet@ietf.org>
Cc: DetNet Chairs <detnet-chairs@ietf.org>
Subject: Re: [Detnet] WG Last Call: draft-ietf-detnet-architecture-05



Some WG last call comments on draft-ietf-detnet-architecture



Best Regards



Stewart



=============



Abstract



   The capabilities can be managed by

   configuration, or by manual or automatic network management.



SB> I am not sure that network management (at least in the IETF is quite

SB> the right term. Most people think of what is described here as

SB> automatic network management as a routing protocol.



[Balázs Varga A] OK. I have deleted this sentence. Do not add to the abstract.

It is rather confusing.



===============



1.  Introduction



   Deterministic Networking (DetNet) is a service that can be offered by

   a network to DetNet flows.  DetNet provides these flows extremely low s/flows/flows with/ =========



   Many applications of interest to Deterministic Networking

SB> That is surely the wrong way round - the applications are interested

SB> in DN rather than DN being interested in the Apps?



[Balázs Varga A] OK. Fixed.



==========



   source

           An end system capable of sourcing a DetNet flow.



SB> Shouldn't that be a DetNet source, since you can have both DetNet

SB> and non-DetNet sources in a DetNet enabled network.



[Balázs Varga A] OK. Fixed



===========



    DetNet transit node

           A node operating at the DetNet transport layer, that utilizes

           link layer and/or network layer switching across multiple

           links and/or sub-networks to provide paths for DetNet service

           layer functions.  Optionally provides congestion protection

           over those paths.  An MPLS LSR is an example of a DetNet

           transit node.

SB> In that example it would have to be a DetNet enable/aware LSR. An

SB> ordinary LSR would not know anything about DetNet.



[Balázs Varga A] No, A DetNet aware LSR would be a relay node (S-PE).



=============



2.2.  IEEE 802 TSN to DetNet dictionary



   This section also serves as a dictionary for translating from the

   terms used by the IEEE 802 Time-Sensitive Networking (TSN) Task Group

   to those of the DetNet WG.



   Listener

           The IEEE 802 term for a destination of a DetNet flow.



   relay system

           The IEEE 802 term for a DetNet intermediate node.



   Stream

           The IEEE 802 term for a DetNet flow.



   Talker

           The IEEE 802 term for the source of a DetNet flow.



SB> Whilst I cannot comment on IEEE definitions, I am suprised that in

SB> our text a Listener is not called an 802 TSN Listener etc



[Balázs Varga A] We have used the TSN end-system. TSN end-system can be both

(Listener and Talker).



=============



   The paths are typically (but not necessarily) explicit

   routes, so that they cannot suffer temporary interruptions caused by

   the reconvergence of routing or bridging protocols.



SB> I think cannot is too strong. I think the best that you can say is

SB> "do not normally".

SB>



[Balázs Varga A] OK, Fixed.



============





   These three techniques can be applied independently, giving eight

   possible combinations, including none (no DetNet), although some

   combinations are of wider utility than others.  This separation keeps

   the protocol stack coherent and maximizes interoperability with

   existing and developing standards in this (IETF) and other Standards

   Development Organizations.  Some examples of typical expected

   combinations:



   o  Explicit routes plus service protection are exactly the techniques

      employed by [HSR-PRP].  Explicit routes are achieved by limiting

      the physical topology of the network, and the sequentialization,

      replication, and duplicate elimination are facilitated by packet

      tags added at the front or the end of Ethernet frames.



SB> ER can be done virtually as well as physically. RSVP is a type of

SB> ER, as is Adj-SID based SR, and we can design other types.



[Balázs Varga A] Agree, but these are examples. Statement is for HSR-PRP.



   o  Congestion protection alone is is offered by IEEE 802.1 Audio

      Video bridging [IEEE802.1BA-2011].  As long as the network suffers

      no failures, zero congestion loss can be achieved through the use

      of a reservation protocol (MSRP), shapers in every bridge, and a

      bit of network calculus.



SB> Network calculus needs a reference. It is not well known outside detnet.



[Balázs Varga A] Agree. Asked Norm for a reference.



================









3.2.3.  Jitter Reduction



   A core objective of DetNet is to enable the convergence of Non-IP

   networks onto a common network infrastructure.



SB> I think that  this needs to be clarified that it is the convergence

SB> of sensitive Non-IP. PW has been doing this convergence since

SB> inception, and can handle what some would expect to be sensitive

SB> applications such as TDM telephony quite well.



[Balázs Varga A] OK. Fixed.



   This requires the

   accurate emulation of currently deployed mission-specific networks,

   which typically rely on point-to-point analog (e.g. 4-20mA

   modulation) and serial-digital cables (or buses) for highly reliable,

   synchronized and jitter-free communications.  While the latency of

   analog transmissions is basically the speed of light, legacy serial

   links are usually slow (in the order of Kbps) compared to, say, GigE,

   and some latency is usually acceptable.  What is not acceptable is

   the introduction of excessive jitter, which may, for instance, affect

   the stability of control systems.

SB> See above, I think this needs a few caveats.



[Balázs Varga A] OK. Fixed.



===============





   Packet replication and elimination, also known as seamless redundancy

   [HSR-PRP], or 1+1 hitless protection, is a function of the DetNet

   service layer.  It involves three capabilities:



SB> I am concerned at the prominence of the HSR-PRP reference. As far as

SB> I can tell this is only available for fee of 300 Euro.



[Balázs Varga A] OK. Let's discuss this with the co-authors.



============



   In the simplest case, this amounts to replicating each packet in a

   source that has two interfaces, and conveying them through the

   network, along separate paths, to the similarly dual-homed

   destinations, that discard the extras.  This ensures that one path

   (with zero congestion loss) remains, even if some intermediate node

   fails.  The sequence numbers can also be used for loss detection and

   for re-ordering.



SB> Sure, but of course you need to do SRLG risk analysis, and even then

SB> two failures are not unknowm.



[Balázs Varga A] OK. Fixed.



===========







                    Packet replication and elimination



                > > > > > > > > > relay > > > > > > > >

               > /------------+ R node E +------------\ >

              > /                  v + ^               \ >

      end    R +                   v | ^                + E end

      system   +                   v | ^                +   system

              > \                  v + ^               / >

               > \------------+ R relay E +-----------/ >

                > > > > > > > > >  node > > > > > > > >



                                 Figure 1



   Packet replication and elimination does not react to and correct

   failures; it is entirely passive.  Thus, intermittent failures,



SB> I think it copes with intermittent failures OK.



[Balázs Varga A] Yes, PRF and PEF can eliminate the effect of such failures. But text

intends to say that it is passive. It is not reacting to such failures. No change in text.



    mistakenly created packet filters, or misrouted data is handled just

   the same as the equipment failures that are detected handled by

   typical routing and bridging protocols.



================



   Transit nodes see DetNet nodes as end points.  All

   DetNet enabled nodes are connect to sub-networks, where a point-to-

SB> s/connect/connected/



[Balázs Varga A] OK. Fixed.



===========





   o  DetNet t-aware: An extant TSN system.  It knows about some TSN

      functions (e.g., reservation), but not about replication/

      elimination.

SB> Generic TSN is OK, but I would be cautious of requiring IEEE TSN.



[Balázs Varga A] OK.



===========



 o  DetNet s-aware: An extant IEC 62439-3 system.  It supplies

      sequence numbers, but doesn't know about zero congestion loss.



SB> IEC62439 should surely be clarified as just an example.



[Balázs Varga A] OK. All items are examples " Note some known use cases for end systems: "



===========



4.3.1.  DetNet flow types



   A DetNet flow can have different formats during while it is

SB> s/during while/as/



[Balázs Varga A] OK. Fixed.



===========



   transported between the peer end systems.  Therefore, the following

   possible types / formats of a DetNet flow are distinguished in this

   document:



   o  App-flow: native format of a DetNet flow.  It does not contain any

      DetNet related attributes.



   o  DetNet-t-flow: specific format of a DetNet flow.  Only requires

      the congestion / latency features provided by the Detnet transport

      layer.



   o  DetNet-s-flow: specific format of a DetNet flow.  Only requires

      the replication/elimination feature ensured by the DetNet service

      layer.



   o  DetNet-st-flow: specific format of a DetNet flow.  It requires

      both DetNet service layer and DetNet transport layer functions

      during forwarding.

SB> I find the relisting of these types confusing. Wheren't they defined

SB> in the section above?



[Balázs Varga A] This is inline with the previous section " Grouping of end systems ".



===========



4.3.2.  Source guarantees



   For the purposes of congestion protection, DetNet flows can be

   synchronous or asynchronous.  In synchronous DetNet flows, at least

   the intermediate nodes (and possibly the end systems) are closely

   time synchronized, typically to better than 1 microsecond.



SB> Are you talking about the flows being sync, or the network handling

of the

SB> the flows here. We have carried synchronous traffic over MPLS in the

past

SB> so I think this is a topic that requires quite careful handling to

make sure that

SB> we do not set up an over-engineered solution.



[Balázs Varga A] "Sync as a service" is assumed for some use-case.

It is not needed for some others.



==========







   The source promises that these limits will not be exceeded.  If the

   source transmits less data than this limit allows, the unused

   resources such as link bandwidth can be made available by the system

SB> s/can be made/to be made/



[Balázs Varga A] OK. Fixed.



==========



4.4.  Traffic Engineering for DetNet



   Traffic Engineering Architecture and Signaling (TEAS) [TEAS] defines

   traffic-engineering architectures for generic applicability across

   packet and non-packet networks.  From TEAS perspective, Traffic

SB> s/from/from a/



[Balázs Varga A] OK Fixed.



==========



   ..... to translate from a flow

   specification to a set of values for the managed objects that control

   each relay or end system.  The IEEE 802 has specified (and is

SB> Should that be IEEE 802 Standards Group or some such?



[Balázs Varga A] OK. Fixed.



=============





   The DetNet network reference model is shown in Figure 8 for a DetNet-

   Service scenario (i.e. between two DetNet-UNIs).  In this figure, the

   end systems ("A" and "B") are connected directly to the edge nodes of

   the IP/MPLS network ("PE1" and "PE2").



SB> I am confused as to when we should use the terms "relay node", "edge

node"

SB> and "PE". There seem.s to be inconsistency in the project on the use

SB> of these terms



[Balázs Varga A] OK. See separate mailing started by Lou. "PEx" here refers

to the nodes on the figure.



===========



   The tunnel between the service instances may have some special

   characteristics.  For example, in case of a "packet PW" based tunnel,



SB> I don't think we should use the term "packet PW" since that points

SB> to a specific PW technology and that is not the direction we are

SB> going in the data-plane part of the project.

SB> I think the text above and the text in the rest of the para is

SB> confusing for the reader.

SB> I suggest that we write something much more generic and let the DP

SB> team have a clear hand to design a good solution.



[Balázs Varga A] OK. Fixed. I have removed the " packet PW for DetNet traffic " term.

I agree that such a term is now outdated with all the data plane discussions behind us.

Text intention is to highlight the differences to rfc6658, so I have changed text to refer

"DetNet L3 service" scenario.



   there are differences in the usage of the packet PW for DetNet

   traffic compared to the network model described in [RFC6658]. In the

   DetNet scenario, the packet PW is used exclusively by the DetNet

   flow, whereas [RFC6658] states: "The packet PW appears as a single

   point-to-point link to the client layer.  Network-layer adjacency

   formation and maintenance between the client equipments will follow

   the normal practice needed to support the required relationship in

   the client layer ... This packet pseudowire is used to transport all

   of the required layer 2 and layer 3 protocols between LSR1 and LSR2".



===========







   The need for a lower-level DetNet node to be aware of individual

   higher-layer flows is not unique to DetNet.  But, given the endless

   complexity of layering and relayering over tunnels that is available

   to network designers, DetNet needs to provide a model for flow

   identification that is at least somewhat better than packet

SB> "at least somewhat better is a strange turn of phrase"



[Balázs Varga A] OK. Fixed.



===========





   Thus, rather than packet inspection, there is the option to export

   higher-layer information to the lower layer.  The requirement to

   support one or the other method for flow identification (or both) is

   the essential complexity that DetNet brings to existing control plane

   models.



SB> A very strange way of expressing the point, sounds like complexity

SB> is a virtue.



[Balázs Varga A] OK. Fixed. (essential --> necessary)



===========



Flow-IDs



   The additional (domain specific) Flow-ID can be



   o  created by a domain specific function or



   o  derived from the Flow-ID added to the App-flow,



   so that it must be unique inside the given domain.

SB> very strange English.



[Balázs Varga A] OK. Fixed (at least I hope so ...)



   Note that the

   Flow-ID added to the App-flow is still present in the packet, but

   transport nodes may lack the function to recognize it; that's why the

   additional Flow-ID is added (pushed).



SB> Again rather strange English and an unnecessary pointer to a

SB> particular implementation technique (pushed). Same comment applies

SB> to para 1 of

4.7.3


[Balázs Varga A] OK. Fixed (at least I hope so ...)



============











4.9.  Provisioning model



SB> Sections 4.9.1 and 4.9.2 seem rather tentative for an RFC that we

SB> are about to publish.



[Balázs Varga A] Agree. Historically that was a placeholder for topics we need further discussions.

I have deleted 4.9.



4.9.1.  Centralized Path Computation and Installation



4.9.2.  Distributed Path Setup



==============



5.  Security Considerations





   Furthermore, in a control system where millions of dollars of

   equipment, or even human lives, can be lost if the DetNet QoS is not

   delivered, one must consider not only simple equipment failures,

   where the box or wire instantly becomes perfectly silent, but bizarre

   errors such as can be caused by software failures.



SB> Bizare is a strange term to use. I am sure that later reviewers will

SB> ask for more text on this.

SB> I might use the term "subtle, complex, intermittent and state dependent"



[Balázs Varga A] OK. Fixed.



============







   [HSR-PRP]  IEC, "High availability seamless redundancy (HSR) is a

              further development of the PRP approach, although HSR

              functions primarily as a protocol for creating media

              redundancy while PRP, as described in the previous

              section, creates network redundancy.  PRP and HSR are both

              described in the IEC 62439 3 standard.",

              <http://webstore.iec.ch/webstore/webstore.nsf/

              artnum/046615!opendocument>.



SB> Not available at the time of this review, but my recollection is

SB> that this is not readily available without paying a large fee.



===========







   [ISA95]    ANSI/ISA, "Enterprise-Control System Integration Part 1:

              Models and Terminology", 2000,

              <https://www.isa.org/isa95/>.



SB> Should that be 2000, or 2010.

SB> Note that this seems to be a very expensive document to access.





=========



_______________________________________________

detnet mailing list

detnet@ietf.org<mailto:detnet@ietf.org>

https://www.ietf.org/mailman/listinfo/detnet