Re: [Detnet] Mirja Kühlewind's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)

János Farkas <janos.farkas@ericsson.com> Tue, 26 February 2019 12:45 UTC

Return-Path: <Janos.Farkas@ericsson.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9E4571200B3 for <detnet@ietfa.amsl.com>; Tue, 26 Feb 2019 04:45:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.301
X-Spam-Level:
X-Spam-Status: No, score=-4.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FzNv_CTeF2vH for <detnet@ietfa.amsl.com>; Tue, 26 Feb 2019 04:45:28 -0800 (PST)
Received: from sessmg22.ericsson.net (sessmg22.ericsson.net [193.180.251.58]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 50FB412F1AC for <detnet@ietf.org>; Tue, 26 Feb 2019 04:45:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/relaxed; q=dns/txt; i=@ericsson.com; t=1551185122; x=1553777122; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=Cnbz36NbvS7OZVGOT6bTHu2WqxXFc0knPDh5Yg7be30=; b=KsV4h3OVfEA35xx1agQg/jzyRE4t0rsf4N+nJgqmB3eGWdT3ED8b69kHgWJIMVAJ 26HClnTSLAdERkmuN4L9vvqYH/+pB7aaq/9oVt1ePJ5pbRUUcPamxSxwfVlwbr8R +OPdkhJnjTFAOWbWfj6pS07GxKGAdov4DdHyeBbXNpM=;
X-AuditID: c1b4fb3a-5c9c29e00000672c-b4-5c7534e2a712
Received: from ESESSMB504.ericsson.se (Unknown_Domain [153.88.183.122]) by sessmg22.ericsson.net (Symantec Mail Security) with SMTP id DE.5E.26412.2E4357C5; Tue, 26 Feb 2019 13:45:22 +0100 (CET)
Received: from ESESBMR501.ericsson.se (153.88.183.129) by ESESSMB504.ericsson.se (153.88.183.122) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Tue, 26 Feb 2019 13:45:22 +0100
Received: from ESESBMB504.ericsson.se (153.88.183.171) by ESESBMR501.ericsson.se (153.88.183.129) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Tue, 26 Feb 2019 13:45:21 +0100
Received: from [131.160.183.210] (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.187) with Microsoft SMTP Server id 15.1.1466.3 via Frontend Transport; Tue, 26 Feb 2019 13:45:21 +0100
To: "Mirja Kuehlewind (IETF)" <ietf@kuehlewind.net>
CC: Lou Berger <lberger@labn.net>, The IESG <iesg@ietf.org>, draft-ietf-detnet-architecture@ietf.org, detnet@ietf.org, detnet-chairs@ietf.org
References: <155066795164.31466.275999283339131275.idtracker@ietfa.amsl.com> <77e87eca-07df-99eb-9edb-7f6f18913dfd@labn.net> <5AF7514B-B8C9-48E5-B1F4-BF2139EB128A@kuehlewind.net> <8b47372c-210a-5ecb-f563-788d84535279@labn.net>
From: János Farkas <janos.farkas@ericsson.com>
Message-ID: <5a998fcf-0572-82f6-8bee-2cac21635117@ericsson.com>
Date: Tue, 26 Feb 2019 13:45:21 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.2.1
MIME-Version: 1.0
In-Reply-To: <8b47372c-210a-5ecb-f563-788d84535279@labn.net>
Content-Type: multipart/alternative; boundary="------------087B3AA5468A747AF71CABE8"
Content-Language: en-US
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprDIsWRmVeSWpSXmKPExsUyM2J7le4jk9IYgzlnRSyu9f9gsfj9aTaL xYdvM1ksZvyZyGzx4vpHZouO5rcsDmweS5b8ZPJo+biQ1ePDpma2AOYoLpuU1JzMstQifbsE royX+xvYC85PZ6ro2X2BrYHx/HHGLkYODgkBE4kb2/27GLk4hASOMErcmXaMCcL5xiix4dl3 djhnxftuFgjnGKPEhOsLwRxhgXmMEnMW7wLq4eQQETCWODz5OytIgllgOqPE+fkv2CBaXjBK vJ5+gBGkik3AXuLupQ3MIDYvkP3ryXSwbhYBVYldDefAakQFYiU+XVkMVSMocXLmExYQm1PA RmLNhU6wOLNAmMSWZX/ZIWxxiVtP5oPNERJQk3jfcIdxAqPQLCTts5C0zELSAmFbSMycf54R wpaXaN46mxnC1pBonTOXHVl8ASP7KkbR4tTi4tx0IyO91KLM5OLi/Dy9vNSSTYzAODu45bfV DsaDzx0PMQpwMCrx8BpplsYIsSaWFVfmHmKU4GBWEuG9oQoU4k1JrKxKLcqPLyrNSS0+xCjN waIkzvtHSDBGSCA9sSQ1OzW1ILUIJsvEwSnVwOi0WeV8CNsj/5nHLecdl/WvWG6w3zLgfPLz Iwm70qu9/vytj/2x4Rv/h83VKYunmHMpz2i8uOSzuzzv9susCyZc3R5ddqUhlmXT5S8+l3Uu htevXhchzMy9KXbN4ohp1d9sl1ixvpSS+npiT+rJpLD7didsrt69LtBf3dy7KYrrZObE7wKm 7R+VWIozEg21mIuKEwHATTHsrwIAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/l4bnbb-Ge9HiTv3QXoIztILLvfI>
Subject: Re: [Detnet] Mirja Kühlewind's Discuss on draft-ietf-detnet-architecture-11: (with DISCUSS and COMMENT)
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Feb 2019 12:45:32 -0000

Hi Mirja,

Thank you for your review!

Please see in-line changes suggested to address your comments.


On 2/20/2019 5:24 PM, Lou Berger wrote:
> Hi Mirja,
>
>     See below.
>
> On 2/20/2019 11:06 AM, Mirja Kuehlewind (IETF) wrote:
>> Hi Lou,
>>
>> I’m happy to see that my concerns seem to be cover. So maybe this is 
>> mostly a point about wording. Please see below.
>>
>>> Am 20.02.2019 um 15:46 schrieb Lou Berger <lberger@labn.net>:
>>>
>>> Hi Mirja,
>>>
>>> I'm responding as doc shepherd (and chair). Thank you for your 
>>> comments.  Please see below for specific responses.
>>>
>>> On 2/20/2019 8:05 AM, Mirja Kühlewind wrote:
>>>> Mirja Kühlewind has entered the following ballot position for
>>>> draft-ietf-detnet-architecture-11: Discuss
>>>>
>>>> When responding, please keep the subject line intact and reply to all
>>>> email addresses included in the To and CC lines. (Feel free to cut 
>>>> this
>>>> introductory paragraph, however.)
>>>>
>>>>
>>>> Please refer to 
>>>> https://www.ietf.org/iesg/statement/discuss-criteria.html
>>>> for more information about IESG DISCUSS and COMMENT positions.
>>>>
>>>>
>>>> The document, along with other ballot positions, can be found here:
>>>> https://datatracker.ietf.org/doc/draft-ietf-detnet-architecture/
>>>>
>>>>
>>>>
>>>> ----------------------------------------------------------------------
>>>> DISCUSS:
>>>> ----------------------------------------------------------------------
>>>>
>>>> Thanks for addressing the tsv-art review comments  (and big thanks 
>>>> to Michael
>>>> and David!) and all the work done so far! I think the document is 
>>>> in good shape
>>>> and I only have one minor comment that I would like to see 
>>>> addressed/more
>>>> explicitly spelled out. However, this should be done quickly with 
>>>> potentially
>>>> 2-3 small changes in the draft. See below.
>>> The input from Michael and David certainly led to a much improved 
>>> document.  If you can help the authors with some specific text 
>>> suggestions that would be most helpful.
>>>
>>>
>>>> Given that DetNet traffic is often assumed to be not congestion 
>>>> controlled, it
>>>> is important that there is also some network function that makes 
>>>> sure the
>>>> source traffic stays within the requested bandwidth limit in-order 
>>>> to protect
>>>> non-Detnet traffic. This is to some extended discussed in section 
>>>> 3.3.2 but I
>>>> think it should be more clearly spelled out that this would require 
>>>> a rate
>>>> limiting function at each DetNet source/relay (tunnel ingress). 
>>>> Currently sec
>>>> 3.3.2 says:
>>>>
>>>> "Filters and policers should be used in a DetNet network to
>>>>     detect if DetNet packets are received on the wrong interface, 
>>>> or at
>>>>     the wrong time, or in too great a volume."
>>>>
>>>> However, maybe this case of limiting non-congestion controlled 
>>>> traffic (in case
>>>> the source in not keeping to the limits on purpose/in order to 
>>>> cheat, because
>>>> it couldn't estimate the needed bandwidth requirement an better, or 
>>>> due to
>>>> timely fluctuations) could be explained more clearing and the 
>>>> respective
>>>> requirement to implement rate limiting could be state separately 
>>>> and more
>>>> strongly...?
>>> Section 3.2.1.1 days:
>>>
>>>    Ensuring adequate buffering requires, in turn, that the source, and
>>>    every DetNet node along the path to the destination (or nearly every
>>>    node, see Section 4.3.3) be careful to regulate its output to not
>>>    exceed the data rate for any DetNet flow, except for brief periods
>>>    when making up for interfering traffic.  Any packet sent ahead of 
>>> its
>>>    time potentially adds to the number of buffers required by the next
>>>    hop DetNet node and may thus exceed the resources allocated for a
>>>    particular DetNet flow.
>>>
>>> Section 3.3.1 also says:
>>>
>>>    Starvation of non-DetNet traffic must be avoided, e.g., by traffic
>>>    policing functions (e.g., [RFC2475]).  Thus, the net effect of the
>>>    presence of DetNet flows in a network on the non-DetNet flows is
>>>    primarily a reduction in the available bandwidth.
>>>
>>> Is this not sufficient?  If not, can you suggest some additional 
>>> language?
>> My question is mostly if you only need to protect _complete_ 
>> starvation or any over-use by DetNet flows and how you would do that. 
>> If the answer is to rate limit the DetNet flows at ingress to the 
>> allocated bandwidth, that would completely address my concern. 
>> However note that buffer dimensioning and rate limiting is not the 
>> same. Rate limiting is usually a scheduling question, e.g. using a 
>> token bucket scheme or a fixed non-work conserving scheduler. 
>> Therefore it would be nice to add one additional sentence in section 
>> 3.2 that spells that out directly. e.g. something like:
>>
>> „In order to protect non-DetNet traffic from potentially misbehaving 
>> DetNet-Traffic sources, rate limiting, e.g. using a token bucket 
>> scheme, at each tunnel ingress must be applied.“
>
>> I’m sure you can adapt the wording to make it more DetNet-like 
>> language and maybe you also want to add another sentence explaining 
>> the problem, please feel free to do so but that’s more or less what 
>> I’m looking for.
>
> I do agree that we seem to be having a terminology issue here - and 
> that we are on the same page with what should happen.  The terminology 
> I've used/seen in past RFCs has usually used the terms 'shaping' and 
> 'policing' - and these are what we've been using within the WG.  For 
> example, both of these terms are used in RFC2475 but 'rate limiting' 
> is not. Would it work for you for the draft to use/adapt the rest of 
> your language, but keep 'by traffic policing functions (e.g., 
> [RFC2475])' rather than 'rate limiting, e.g. using a token bucket 
> scheme,' ?

We could extend the 2nd paragraph in 3.2.1.1 
(https://tools.ietf.org/html/draft-ietf-detnet-architecture-11#section-3.2.1.1) 
to capture this comment:

OLD:
             Ensuring adequate buffering requires, in turn, that the 
source, and every DetNet
             node along the path to the destination (or nearly every 
node, see
             <xref target="Incomplete"/>) be careful to regulate its 
output to not exceed the
             data rate for any DetNet flow, except for brief periods 
when making up for
             interfering traffic.  Any packet sent ahead of its time 
potentially adds to the
             number of buffers required by the next hop DetNet node and 
may thus exceed the resources
             allocated for a particular DetNet flow.

NEW:

             Ensuring adequate buffering requires, in turn, that the 
source, and every DetNet
             node along the path to the destination (or nearly every 
node, see
             <xref target="Incomplete"/>) be careful to regulate its 
output to not exceed the
             data rate for any DetNet flow, except for brief periods 
when making up for
             interfering traffic.  Any packet sent ahead of its time 
potentially adds to the
             number of buffers required by the next hop DetNet node and 
may thus exceed the resources
             allocated for a particular DetNet flow. Furthermore, rate 
limiting, e.g., using traffic
             policing and shaping functions, e.g., <xref 
target="RFC2475"/>, at the ingress of the
             DetNet domain must be applied. This is needed for meeting 
the requirements of DetNet
             flows as well as for protecting non-DetNet traffic from 
potentially misbehaving DetNet
             traffic sources.


Furthermore, replace the two occurrences of "policing" with "policing 
and shaping":

OLD:
    Starvation of non-DetNet traffic must be avoided, e.g., by traffic
    policing functions (e.g., [RFC2475]).

NEW:
    Starvation of non-DetNet traffic must be avoided, e.g., by traffic
    policing and shaping functions (e.g., [RFC2475]).


OLD:
    Examples of such techniques include traffic policing
    functions (e.g., [RFC2475]) and separating flows into per-flow rate-
    limited queues.

NEW:
    Examples of such techniques include traffic policing and shaping
    functions (e.g., [RFC2475]) and separating flows into per-flow rate-
    limited queues.

>
>
>>
>>>> One related comment on this sentence in Sec 3.1:
>>>>
>>>> "As DetNet provides allocated resources (including provisioned 
>>>> capacity)
>>>>     to DetNet flows the use of transport layer congestion control
>>>>     [RFC2914] by App-flows is explicitly not required."
>>>>
>>>> I guess congestion control should still be a requirement if the 
>>>> App-flow also
>>>> passes not-DetNet-aware segments of the path, e.g. maybe the first 
>>>> hop.
>>> This point is addressed in section 3.3.2
>>>
>>>    Note that the sending of App-flows that do not use transport layer
>>>    congestion control per [RFC2914] into a network that is not
>>>    provisioned to handle such DetNet traffic has to be treated as a
>>>    fault and prevented.
>>>
>>>> Usually
>>>> use of congestion control for application limited flows is also not 
>>>> a problem
>>>> if sufficient bandwidth is available. Also note that, as I stated 
>>>> above, the
>>>> important part for not requiring congestion control is actually not 
>>>> only that
>>>> resources are allocated but also that rate limiting is in place to 
>>>> make sure
>>>> resources usage cannot be exceeded above the reserved allocation. 
>>>> Maybe this
>>>> sentence could also be further clarified in the draft...?
>>> Is the above sufficient?  If not, can you suggest some additional 
>>> language?
>> Maybe we can just extend the above statement a bit in order to be 
>> crystal clear about this, e.g.:
>>
>> "As DetNet flow are assumed to be rate-limited and DetNet is designed 
>> to provide sufficient allocated resources (including provisioned 
>> capacity), the use of transport layer congestion control [RFC2914] 
>> for end-to-end DetNet flows is not required, however, if resources 
>> are allocated appropriately, use of congestion control should not 
>> impact transmission negatively.“
> Great!  (I'll leave it to the authors to do the final wording adaptation)

"App-flow" seems to be better than "end-to-end DetNet flow". The change 
with that would be:

OLD:
    As
    DetNet provides allocated resources (including provisioned capacity)
    to DetNet flows the use of transport layer congestion control
    [RFC2914] by App-flows is explicitly not required.

NEW:
             As
             DetNet flows are assumed to be rate-limited and DetNet is 
designed
             to provide sufficient allocated resources (including 
provisioned
             capacity), the use of transport layer congestion control 
[RFC2914]
             for App-flows is not required; however, if resources are 
allocated
             appropriately, use of congestion control should not impact
             transmission negatively.

>>
>>>> And then one more small comment that is also related. Sec 3.2.2.2 
>>>> says:
>>>>
>>>> "If packet replication and elimination is used over paths with
>>>>     resource allocation (Section 3.2.1), ..."
>>>>
>>>> My assumption was that all DetNet traffic is send over pre-allocated
>>>> resources...? If that is not true that has implication on 
>>>> congestion control
>>>> and needs some additional considerations. Can you please confirm 
>>>> that and maybe
>>>> clarify in the draft! Thanks!
>>> The intent was to cover sending over non-pre-allocated paths as a 
>>> fault case, and cover it in section 3.3.2.
>> If that is the case, maybe we can just removed the half-sentence I 
>> cited above?
>
> WFM!

The sentence after removing the text as you suggest:

OLD:
    If packet replication and elimination is used over paths with
    resource allocation (Section 3.2.1), and member flows that take
    different-length paths through the network are combined, a merge
    point may require extra buffering to equalize the delays over the
    different paths.

NEW:
    If member flows that take different-length paths through the
    network are combined, a merge point may require extra buffering
    to equalize the delays over the different paths.


Thank you!
Janos


>
> Thank you!
>
>>
>> Thanks!
>> Mirja
>>
>>> In addition to the previously quoted text, the section also says:
>>>
>>>    PRF generated DetNet member flows also need to
>>>    be treated as not using transport layer congestion control even if
>>>    the original App-flow supports transport layer congestion control
>>>    because PREOF can remove congestion indications at the PEF and
>>>    thereby hide such indications (e.g., drops, ECN markings, increased
>>>    latency) from end systems.
>>>
>>> Does this address your concern?
>>>> ----------------------------------------------------------------------
>>>> COMMENT:
>>>> ----------------------------------------------------------------------
>>>>
>>>> I agree with Alexey and Benjamin that this document should be 
>>>> informational.
>>>> Informational documents can also have IETF consensus, so that 
>>>> cannot be the
>>>> reason to go for PS. However, this document does not specify a 
>>>> protocol or any
>>>> requirements that are mandatory to implement for interoperability 
>>>> and therefore
>>>> should not be PS.
>>>>
>>> I defer to the IESG and AD on this...
>>>
>>> Thank you!
>>>
>>> Lou
>>>
>>>> _______________________________________________
>>>> detnet mailing list
>>>> detnet@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/detnet
>>>
>>