Re: [Detnet] draft-ietf-detnet-architecture-10

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Thu, 20 December 2018 07:56 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D6CDA1310BB for <detnet@ietfa.amsl.com>; Wed, 19 Dec 2018 23:56:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zx8Kj_wKbYVx for <detnet@ietfa.amsl.com>; Wed, 19 Dec 2018 23:56:19 -0800 (PST)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0DC4C130E23 for <detnet@ietf.org>; Wed, 19 Dec 2018 23:56:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=37008; q=dns/txt; s=iport; t=1545292579; x=1546502179; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=PWteazVCM+SJ+uqpSWibcvahxl1N9OL2wiVBolIVyO4=; b=CTHC2owCszkXldicIHmZcvbPa58r61LbIP0AvSsGSffgu2TbW6J+QoWx O/xiUzA/ELOrdmBWrbhUKhSAfoVEKRaubN99i9CoKdks0j3hk2VM8abso Zsdb1F1KWB5o7sXB3/tDTnxPhGv7ycOOEA76aXgt7zT7UR0Hp/b9DzYpV M=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0ADAADbShtc/40NJK1jGQEBAQEBAQEBAQEBAQcBAQEBAQGBUQQBAQEBAQsBgQ1IBSlmgQInCoNziBmLfIINiRWOSBSBZwsBARgBCoQDRgIXglQiNAkNAQMBAQIBAQJtHAyFPAEBAQECAQEBIQpBCwUHBAIBCBEBAwEBIQcDAgICHwYLFAMGCAIEAQ0FCBODCIEdTAMNCA+nLoEvhDECg1ANghgFjD8XgUA/gRGCFH6CV0cBAQEBAYErAQsGAgElBwkfglKCVwKPRJEfJzMJAocPg0WDXYMqIIFfhR+KXolMhHuBEooLAhEUgScfOGVxcBU7gmyDPQEJgTqGG4U/QTEBjBmBLoEfAQE
X-IronPort-AV: E=Sophos;i="5.56,376,1539648000"; d="scan'208,217";a="497557573"
Received: from alln-core-8.cisco.com ([173.36.13.141]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 20 Dec 2018 07:55:54 +0000
Received: from XCH-RCD-003.cisco.com (xch-rcd-003.cisco.com [173.37.102.13]) by alln-core-8.cisco.com (8.15.2/8.15.2) with ESMTPS id wBK7tsPw008461 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 20 Dec 2018 07:55:54 GMT
Received: from xch-rcd-001.cisco.com (173.37.102.11) by XCH-RCD-003.cisco.com (173.37.102.13) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Thu, 20 Dec 2018 01:55:53 -0600
Received: from xch-rcd-001.cisco.com ([173.37.102.11]) by XCH-RCD-001.cisco.com ([173.37.102.11]) with mapi id 15.00.1395.000; Thu, 20 Dec 2018 01:55:53 -0600
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: "Black, David" <David.Black@dell.com>, "Andrew G. Malis" <agmalis@gmail.com>
CC: detnet WG <detnet@ietf.org>, János Farkas <janos.farkas@ericsson.com>
Thread-Topic: [Detnet] draft-ietf-detnet-architecture-10
Thread-Index: AQHUl7MS2a5F1EenOkimumZNuZjfBqWGuEMAgAAJggCAACKmgIAAXGVg
Date: Thu, 20 Dec 2018 07:55:35 +0000
Deferred-Delivery: Thu, 20 Dec 2018 07:54:52 +0000
Message-ID: <65a38b73b40b4259ab4b22c4d5faa4ba@XCH-RCD-001.cisco.com>
References: <fecff19f-c3a5-0b45-43e9-16b27e1321af@ericsson.com> <CE03DB3D7B45C245BCA0D24327794936303A3E1D@MX307CL04.corp.emc.com> <CAA=duU0fSHo3=yuBpPnuqC_uFysXtQkifFFbozsqgx1aK2zbOQ@mail.gmail.com> <CE03DB3D7B45C245BCA0D24327794936303A450F@MX307CL04.corp.emc.com>
In-Reply-To: <CE03DB3D7B45C245BCA0D24327794936303A450F@MX307CL04.corp.emc.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.61.252.67]
Content-Type: multipart/alternative; boundary="_000_65a38b73b40b4259ab4b22c4d5faa4baXCHRCD001ciscocom_"
MIME-Version: 1.0
X-Outbound-SMTP-Client: 173.37.102.13, xch-rcd-003.cisco.com
X-Outbound-Node: alln-core-8.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/kV8HxAg2mGkzZtKTNCGUTUGvl6k>
Subject: Re: [Detnet] draft-ietf-detnet-architecture-10
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Dec 2018 07:56:23 -0000

Hello all

I think the quoted text was meant to protect against excess/wrong traffic to enter the DetNet stream and using resources beyond what was allocated as the risk of congestion loss.
Clearly we also need protection to prevent from traffic leaving the stream. But then what if the adjacent node is not A DetNet node, the spec does not mention filtering by non dDetNet nodes. Best we can do is filter what is going out from the DetNet node. Which means adding an egress filter in addition to the ingress filter.


   Robust real-time systems require to reduce the number of possible
   failures.  Filters and policers SHOULD be used in a DetNet network to
   detect if DetNet packets are received or transmitted on the wrong interface, or at
   the wrong time, or in too great a volume.  Furthermore, filters and
   policers can take actions to discard the offending packets or flows,
   or trigger shutting down the offending flow or the offending
   interface.


Do I make sense?

Pascal

From: detnet <detnet-bounces@ietf.org> On Behalf Of Black, David
Sent: mercredi 19 décembre 2018 21:16
To: Andrew G. Malis <agmalis@gmail.com>
Cc: detnet WG <detnet@ietf.org>; János Farkas <janos.farkas@ericsson.com>
Subject: Re: [Detnet] draft-ietf-detnet-architecture-10

Andy,

> I agree with you regarding the SHOULD.

Thanks, I hope you also agree with the MUST when Packet Replication and Elimination is supported.

I likewise agree with the overall point that misdirected MPLS traffic tends to die quickly, and hence the primary concern is “limited to DetNet packets over an IP infrastructure.”

If the architecture draft goes in this overall direction of making this escape prevention the responsibility of the solution (IP or MPLS) draft, then the “filters and policers” wording in 3.3.2 ought to be generalized to include solution-specific functional equivalents of filters and policers.  That would enable the MPLS solution draft to explain why traffic misdirected in the middle of an MPLS LSP usually winds up in the bit-bucket in short order, and what to do if MPLS paths are somehow joined via an IP forwarding node (if that’s even supported in the initial MPLS solution).

OTOH, I’ve definitely heard contrary opinions on use of DetNet-specific DSCPs, so I don’t share the assumption that they will be used.

Thanks, --David

From: Andrew G. Malis [mailto:agmalis@gmail.com]
Sent: Wednesday, December 19, 2018 1:12 PM
To: Black, David
Cc: János Farkas; detnet WG
Subject: Re: [Detnet] draft-ietf-detnet-architecture-10


[EXTERNAL EMAIL]
David,

I agree with you regarding the SHOULD.

I also think it might help the text if we had a better understanding of how DetNet flows can "escape" a DetNet network.

For example, for an MPLS-based DetNet flow, random MPLS packets arriving at an ingress MPLS interface to a router that don't have a corresponding LIB entry for the top-most label will be dropped. They'll also be dropped if they arrive at an interface that isn't configured to expect MPLS packets.

So I think any concept of "escaping" would be limited to DetNet packets over an IP infrastructure. In that case, the DetNet flows would most probably be a using DetNet-specific DSCP, and if the ingress interface isn't properly provisioned to know how to process packets with that DSCP, they'll at least be reduced to best-effort treatment. We can also recommend that packets with DetNet-specific DSCPs be dropped if they arrive at an ingress interface that isn't otherwise provisioned to expect such packets.

Cheers,
Andy


On Wed, Dec 19, 2018 at 12:38 PM Black, David <David.Black@dell.com<mailto:David.Black@dell.com>> wrote:
Janos,

The terminology is definitely improved - the resulting draft is much
clearer - many thanks to you and the authors for doing that.

Where do we stand on the concern about protecting external
non-DetNet networks from DetNet flows that escape a DetNet
network, e.g., due to an erroneous network configuration change?

My current views are ...

There's no throttling in DetNet, e.g., this text in 4.3.2:

   There is no provision in DetNet for throttling DetNet flows, i.e.,
   the transmission rate cannot be reduced via explicit congestion
   notification [RFC3168].  The assumption is that a DetNet flow, to be
   useful, must be delivered in its entirety.

and no assurance that all DetNet-using applications will cease and desist
in the face of packet drops that indicate congestion.

Packet Replication and Elimination makes this worse via its ability to hide
network packet drops and congestion indications from endpoints, e.g.,
of those drops and/or congestion indications occur on only one of
the paths used by replicated packets.

The first paragraph in section 3.3.2 is a good start, but I think its lower
case "should" is too weak:

   Robust real-time systems require to reduce the number of possible
   failures.  Filters and policers should be used in a DetNet network to
   detect if DetNet packets are received on the wrong interface, or at
   the wrong time, or in too great a volume.  Furthermore, filters and
   policers can take actions to discard the offending packets or flows,
   or trigger shutting down the offending flow or the offending
   interface.

At a minimum, I think that the requirement to discard DetNet traffic
that would otherwise escape a DetNet network has to be stated as
a "MUST" requirement for any DetNet network that supports Packet
Replication and Elimination due to the ability of that functionality
to hide congestion from endpoints, making it impossible for higher
layers of the protocol stack to respond.

Beyond this, I think a "SHOULD" requirement to discard DetNet traffic
that would otherwise escape is needed, and the statement of that
requirement ought to be connected to the explanation of how to
implement that requirement.  The text in Section 3.3.2 has a lot of
the content needed - for a worked example of such "SHOULD" text,
see Section 5 of RFC 7510, in particular the itemized list at the end of
that section and the paragraph that introduces that list:
   https://tools.ietf.org/html/rfc7510#section-5

Thanks, --David

> -----Original Message-----
> From: detnet [mailto:detnet-bounces@ietf.org<mailto:detnet-bounces@ietf.org>] On Behalf Of János Farkas
> Sent: Wednesday, December 19, 2018 10:54 AM
> To: DetNet WG
> Subject: [Detnet] draft-ietf-detnet-architecture-10
>
>
> [EXTERNAL EMAIL]
>
> Hi,
>
> The DetNet architecture document has been updated to address the
> comments. The new revision (v10) is available at
> https://tools.ietf.org/html/draft-ietf-detnet-architecture-10.
>
> There have been a number of discussion items emails on the list. The
> updates are along the major discussion items, which also cover the
> derivative discussions, address the comments.
>
> The major items have been summarized in:
> https://www.ietf.org/mail-archive/web/detnet/current/msg01968.html.
> Follow up discussions implied terminology changes summarized in:
> https://www.ietf.org/mail-archive/web/detnet/current/msg02036.html:
> replace "transport sub-layer" with "forwarding sub-layer"
> https://www.ietf.org/mail-archive/web/detnet/current/msg02038.html:
> replace "congestion protection" with "resource" allocation"
> Consequently, the document had a good 'scurb".
>
> In addition, outstanding comments have been addressed along
> https://www.ietf.org/mail-archive/web/detnet/current/msg01943.html.
>
> Please let us know if any comment happened to be remained open.
>
> Best regards,
> Janos
>
> _______________________________________________
> detnet mailing list
> detnet@ietf.org<mailto:detnet@ietf.org>
> https://www.ietf.org/mailman/listinfo/detnet

_______________________________________________
detnet mailing list
detnet@ietf.org<mailto:detnet@ietf.org>
https://www.ietf.org/mailman/listinfo/detnet