Re: [Detnet] WG Last Call: draft-ietf-detnet-architecture-05

János Farkas <janos.farkas@ericsson.com> Fri, 29 June 2018 01:08 UTC

Return-Path: <Janos.Farkas@ericsson.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AADA8130DEF for <detnet@ietfa.amsl.com>; Thu, 28 Jun 2018 18:08:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.3
X-Spam-Level:
X-Spam-Status: No, score=-4.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xTUPtbZTXkME for <detnet@ietfa.amsl.com>; Thu, 28 Jun 2018 18:08:52 -0700 (PDT)
Received: from sesbmg22.ericsson.net (sesbmg22.ericsson.net [193.180.251.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7D9CA130DDF for <detnet@ietf.org>; Thu, 28 Jun 2018 18:08:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/simple; q=dns/txt; i=@ericsson.com; t=1530234529; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=bWFs5o7W5nwwUsspBz98bkyuoHLgC1OblkX2i6RDxuA=; b=EGMi6LMRta72hYcKbDFS3wxv0Qn8XLbGyLLzn7jIN4r3lRjNHgy2C1vSeRdC9ptG vUDAocPqKYGg9ryIz0E/bRdjQOG+rrktYzuyIgPaVvuxZ+DXWa0AOF7wJgWxrP9N kzDmaIcPNea3bTMDQTAysnAuzq1FtbQQwQM/daa//pI=;
X-AuditID: c1b4fb30-93dff70000000a77-fe-5b3586a1ea20
Received: from ESESSMB505.ericsson.se (Unknown_Domain [153.88.183.123]) by sesbmg22.ericsson.net (Symantec Mail Security) with SMTP id C3.65.02679.1A6853B5; Fri, 29 Jun 2018 03:08:49 +0200 (CEST)
Received: from ESESSMR502.ericsson.se (153.88.183.110) by ESESSMB505.ericsson.se (153.88.183.166) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Fri, 29 Jun 2018 03:08:49 +0200
Received: from ESESBMB502.ericsson.se (153.88.183.169) by ESESSMR502.ericsson.se (153.88.183.110) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Fri, 29 Jun 2018 03:08:48 +0200
Received: from [100.94.37.128] (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.185) with Microsoft SMTP Server id 15.1.1466.3 via Frontend Transport; Fri, 29 Jun 2018 03:08:47 +0200
References: <99657d22-f9e4-8a1a-27de-6997900f727e@labn.net> <7cc44e35-cbd0-fbdb-95b7-c93ab38ec5d7@gmail.com> <AM3PR07MB4021D464E3E2C4CCAA0883EAC7F0@AM3PR07MB402.eurprd07.prod.outlook.com> <fee5178f-a1da-53e7-1684-e09ec2bfcb42@gmail.com>
From: János Farkas <janos.farkas@ericsson.com>
To: Lou Berger <lberger@labn.net>, Stewart Bryant <stewart.bryant@gmail.com>, "detnet@ietf.org >> DetNet WG" <detnet@ietf.org>
Message-ID: <ab532cc6-0552-ecb1-fe3f-09ebce5f6ba9@ericsson.com>
Date: Fri, 29 Jun 2018 03:08:47 +0200
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.2.0
MIME-Version: 1.0
In-Reply-To: <fee5178f-a1da-53e7-1684-e09ec2bfcb42@gmail.com>
Content-Type: multipart/alternative; boundary="------------3054F43C2209A2377166F562"
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrCLMWRmVeSWpSXmKPExsUyM2J7te7CNtNog+7L6ha/P81msehofsti cepBogOzx85Zd9k9liz5yeTxYVMzWwBzFJdNSmpOZllqkb5dAlfGrUN3WAue/2Kq+PiMv4Fx +mymLkYODgkBE4kVc/m7GLk4hASOMkr8/XmPBcL5xiix7nQDgtPzZSkjhHOEUWLbnJXsXYyc HMICrhKLmxazgdhCAp8YJT7NEwex2QTsJe5e2sAM0iAi0MAo8eD5Q7AGXqDEpcfbwWwWAVWJ 9jX/2EDuEBWIkVjflwBRIihxcuYTFhCbU8BWon37e1YQm1kgTOLzuq9Qu9Qk3jfcYZzAKDAL ScssJGUQtoXEzPnnGSFseYnmrbOZIWwNidY5c9mRxRcwsq1iFC1OLU7KTTcy0kstykwuLs7P 08tLLdnECAz7g1t+G+xgfPnc8RCjAAejEg/viiLTaCHWxLLiytxDjBIczEoivEKcQCHelMTK qtSi/Pii0pzU4kOM0hwsSuK8Fn6bo4QE0hNLUrNTUwtSi2CyTBycUg2MFnPW9yxe51jlPX/P Be4Vfs+n8txYcmH2tfN5639s77X+uOJ42pGrF/xn3yt9ljdFYr7s8gQ++7fP/joGbeW91Pj6 qUjpjVPsi25q5ru7HxBOfXLuzpY96wKstqwUX7Ck4u7xptzChgLjZzvZv5Q2BXxcJyb93etW DuNfkR3Vz5IWNf29lltc80+JpTgj0VCLuag4EQALG1utdwIAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/tgVcwDdjC4VbUTkZUIBC4ILlGmg>
Subject: Re: [Detnet] WG Last Call: draft-ietf-detnet-architecture-05
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jun 2018 01:08:57 -0000

Dear all,

Off-line discussions among Lou, Stewart, and authors followed the 
discussions to properly address the WGLC comments, including the 
detailed comments.

A new revision of the draft has been uploaded: 
draft-ietf-detnet-architecture-06.

In addition to the changes already described in this thread, the 
following bigger changes have been made to the draft:


*Section 2.1 Terms used in this document*

Some definitions refined as suggested by the detailed comments

New definitions have been added:

    "allocation
            Resources are dedicated to support a DetNet flow. Depending
            on an implementation, the resource may be reused by non-
            DetNet flows when it is not used by the DetNet flow.


    PEF     A Packet Elimination Function (PEF) eliminates duplicate
            copies of packets to prevent excess packets flooding the
            network or duplicate packets being sent out of the DetNet
            domain.  PEF can be implemented by an edge node, a relay
            node, or an end system.

   PRF     A Packet Replication Function (PRF) replicates DetNet flow
            packets and forwards them to one or more next hops in the
            DetNet domain.  The number of packet copies sent to each next
            hop is a DetNet flow specific parameter at the node doing the
            replication.  PRF can be implemented by an edge node, a relay
            node, or an end system.

    PREOF   Collective name for Packet Replication, Elimination, and
            Ordering Functions.

    POF     A Packet Ordering Function (POF) re-orders packets within a
            DetNet flow that are received out of order.  This function
            can be implemented by an edge node, a relay node, or an end
            system.

   DetNet service proxy
            Maps between App-flows and DetNet flows.

    bridged path
            A VLAN bridge uses the VLAN ID and the destination MAC
            address to select the outbound port hence the path for a
            frame."


*Section 3.1 Primary goals defining the DetNet QoS*

A new QoS aspect has been added:
    "o  An upper bound on out-of-order packet delivery.  It is worth
       noting that some DetNet applications are unable to tolerate any
       out-of-order delivery."


The 3rd paragraph on loss on page 8 after the bullet list has been 
extended to:
    "After congestion, the most important contributions to packet loss are
    typically from random media errors and equipment failures. Service
    protection is the name for the mechanisms used by DetNet to address
    these losses.  The mechanisms employed are constrained by the
    requirement to meet the users' latency requirements.  Packet
    replication and elimination (Section 3.2.2) and packet encoding
    (Section 3.2.2.3) are described in this document to provide service
    protection; others may be found.  For instance, packet encoding can
    be used to provide service protection against random media errors,
    packet replication and elimination can be used to provide service
    protection against equipment failures.  This mechanism distributes
    the contents of DetNet flows over multiple paths in time and/or
    space, so that the loss of some of the paths does need not cause the
    loss of any packets."


*3.2.2.  Service Protection*

Service protection is used as a more generic term. Introductory text added:
    "Service protection aims to mitigate or eliminate packet loss due to
    equipment failures, random media and/or memory faults.  These types
    of packet loss can be greatly reduced by spreading the data over
    multiple disjoint forwarding paths.  Various service protection
    methods are described in [RFC6372], e.g., 1+1 linear protection.
    This section describes the functional details of an additional method
    in Section 3.2.2.2, which can be implemented as described in
    Section 3.2.2.3 or as specified in [I-D.ietf-detnet-dp-sol-mpls] in
    order to provide 1+n hitless protection.  The appropriate service
    protection mechanism depends on the scenario and the requirements."


New sub-section added:

"3.2.2.1.  In-Order Delivery

    Out-of-order packet delivery can be a side effect of service
    protection.  Packets delivered out-of-order impact the amount of
    buffering needed at the destination to properly process the received
    data.  Such packets also influence the jitter of a flow.  The DetNet
    service includes maximum allowed misordering as a constraint. Zero
    misordering would be a valid service constraint to reflect that the
    end system(s) of the flow cannot tolerate any out-of-order delivery.
    Service protection may provide a mechanism to support in-order
    delivery."


*3.2.2.2. Packet Replication and Elimination*

New bullet added as the last one:
    "o  The Packet Ordering Function (POF) uses the sequencing information
       to re-order a DetNet flow's packets that are received out of
       order."

New sentence added after the bullet list:
"The order in which a node applies the PEF and the PRF to a DetNet
flow is implementation specific."

2nd paragraph after the bullet list has been updated to:
"Some service protection mechanisms rely on switching from one flow to
    another when a failure of a flow is detected.  Contrarily, packet
    replication and elimination combines the DetNet member flows sent
    along multiple different paths, and performs a packet-by-packet
    selection of which to discard, e.g., based on sequencing information."


*3.2.3.  Explicit routes*

Out-of-order aspect added to the first paragraph, which is about 
distributed routing:
"Furthermore, out-of-order
packet delivery can be a side effect of route changes."

New sentence added to the 3rd paragraph:
"Explicit routes can be established various
ways, e.g., with RSVP-TE [RFC3209], with Segment Routing (SR)
[I-D.ietf-spring-segment-routing], via a Software Defined Networking
approach [RFC7426], with IS-IS [RFC7813], etc."

New paragraph added:
    "Out-of-order packet delivery can be a side effect of distributing a
    single flow over multiple paths especially when there is a change
    from one path to another when combining the flow.  This is
    irrespective of the distribution method used, also applies to service
    protection over explicit routes.  As described in Section 3.2.2.1,
    out-of-order packets influence the jitter of a flow and impact the
    amount of buffering needed to process the data; therefore, DetNet
    service includes maximum allowed misordering as a constraint. The
    use of explicit routes helps to provide in-order delivery because
    there is no immediate route change with the network topology, but the
    changes are plannable as they are between the different explicit
    routes."

*
**4.1.1. Representative Protocol Stack Model*

"Explicit routes" have been added to Figure 2 with the corresponding 
explanation:
  "Explicit routes
            The DetNet transport layer provides mechanisms to ensure that
            fixed paths are provided for DetNet flows.  These explicit
            paths avoid the impact of network convergence."


Section 4.11 Connected islands vs. networks of v05 has been deleted 
because it was just a leftover from early drafts on what DetNet WG 
should do; which are covered by the charter anyways.


References have been cleaned up and brought up-to-date.


Refinements have been implemented in the draft according to Lou's 
detailed comments. They are not listed here because they are minor changes.


Best regards,
Janos


On 6/12/2018 2:48 PM, Lou Berger wrote:
>
> Balázs,
>
> Thanks for the response -- please see below.
>
> ----------
> On June 12, 2018 4:07:35 AM Balázs Varga A 
> <balazs.a.varga@ericsson.com> wrote:
>
>> Hi Lou, Thanks for the comments. See reactions inline. Document 
>> update in progress. Cheers Bala'zs
>>
>> -----Original Message-----
>> From: detnet <detnet-bounces@ietf.org> On Behalf Of Lou Berger
>> Sent: 2018. június 1. 22:42
>> To: DetNet WG <detnet@ietf.org>; draft-ietf-detnet-architecture@ietf.org
>> Subject: [Detnet] Promised comments on draft-ietf-detnet-architecture
>>
>> Hi,
>>
>>      I have a number of high level comments on the document that I'd 
>> like to  raise below.  I also have a number of more 
>> editorial/specific comments that  I'd like to review directly with 
>> the authors and then have them report back  on changes -- if any turn 
>> out to be more substantive discussions from the  author's 
>> perspective, I'll raise these on the list separately.
>>
> ...
>>
>> - WRT Section 4.4.3, I think the inclusion of a distributed control 
>> plane in the "Network Plane" is inconsistent with other functional 
>> definitions and conflates where a function resides from the actual 
>> function and that whether control is implemented in a fully 
>> centralized, fully distributed or some hybrid form doesn't 
>> fundamentally change  the control function's role -- therefore I 
>> think the sections 4.4.2 and .3 should be revised accordingly
>> [Balázs Varga A] Agree in principal. Let's discuss the details.
>>
> Okay - I'll work with you off line and we can report back the 
> results/proposed changes.
>
>> - In several places it's not clear that DetNet service is always a L3 
>> service which is controlled using L3 identifiers, i.e., IP addresses 
>> -- this is true even in the MPLS service case and the TSN over MPLS 
>> case. I think this is an important point to be clear on in the document.
>> [Balázs Varga A] I am not sure. DetNet service is always provided 
>> over a L3 network (IP or MPLS), that is fine. However the service 
>> itself can be L2 or L3. In case of TSN Ethernet frames are 
>> transported, so it is a L2 service. In case of IP end systems IP 
>> packets are transported so it is a L3 service.
>>
>
> Humm - While I agree that DetNet is providing an (enhanced) L2VPN 
> service, it is not itself providing control or service of L2 devices 
> -- this is TSN's job.  The fact that DetNet is all about behavior of 
> L3 nodes (i.e., IP and PW/MPLS) and not L2 nodes (i.e., TSN bridges) 
> is something the architecture should make unambiguous.
>
> Thanks,
> Lou
>
>> Please let me know what you think.
>>
>> Cheers,
>>
>> Lou
>>
>>
>> _______________________________________________
>> detnet mailing list
>> detnet@ietf.org
>> https://www.ietf.org/mailman/listinfo/detnet
>> _______________________________________________
>> detnet mailing list
>> detnet@ietf.org
>> https://www.ietf.org/mailman/listinfo/detnet
>




On 6/12/2018 6:27 PM, Stewart Bryant wrote:
>
> Dear Bala'zs
>
> Thank you your for your consideration of these points. I will just 
> pick up a few that need some further thought:
>
>
>>     DetNet transit node
>>
>>            A node operating at the DetNet transport layer, that utilizes
>>
>>            link layer and/or network layer switching across multiple
>>
>>            links and/or sub-networks to provide paths for DetNet service
>>
>>            layer functions. Optionally provides congestion protection
>>
>>            over those paths.  An MPLS LSR is an example of a DetNet
>>
>>            transit node.
>>
>> SB> In that example it would have to be a DetNet enable/aware LSR. An
>>
>> SB> ordinary LSR would not know anything about DetNet.
>>
>> [Balázs Varga A] No, A DetNet aware LSR would be a relay node (S-PE).
>>
>
> I think the confusion is what "DetNet Transport Layer" means. This
> technology touches on Transport Layer in  the L4 sense, and the
> Transport Network Layer as in the packet network that carries
> L3 packets.
>
> So I think that we need to clarify whether a DetNet transit node
> is an S-PE (i.e. a a transit node in the DetNet layer), or a P node
> (i.e. a transit node that is carrying DetNet packets but could be
> carrying any sort of MPLS packet)
>
>> ============
>>
>>    These three techniques can be applied independently, giving eight
>>
>>    possible combinations, including none (no DetNet), although some
>>
>>    combinations are of wider utility than others.  This separation keeps
>>
>>    the protocol stack coherent and maximizes interoperability with
>>
>>    existing and developing standards in this (IETF) and other Standards
>>
>>    Development Organizations.  Some examples of typical expected
>>
>>    combinations:
>>
>>    o  Explicit routes plus service protection are exactly the techniques
>>
>>       employed by [HSR-PRP].  Explicit routes are achieved by limiting
>>
>>       the physical topology of the network, and the sequentialization,
>>
>>       replication, and duplicate elimination are facilitated by packet
>>
>>       tags added at the front or the end of Ethernet frames.
>>
>> SB> ER can be done virtually as well as physically. RSVP is a type of
>>
>> SB> ER, as is Adj-SID based SR, and we can design other types.
>>
>> [Balázs Varga A] Agree, but these are examples. Statement is for HSR-PRP.
>>
> So the question is whether we should expand the set of examples, 
> particularly
> to more accessible ones.
>
> ============
>>
>>                     Packet replication and elimination
>>
>>                 > > > > > > > > > relay > > > > > > > >
>>
>>                > /------------+ R node E +------------\ >
>>
>>               > / v + ^               \ >
>>
>>       end    R +                   v | ^                + E end
>>
>>       system   +                   v | ^                +   system
>>
>>               > \ v + ^               / >
>>
>>                > \------------+ R relay E +-----------/ >
>>
>>                 > > > > > > > > >  node > > > > > > > >
>>
>> Figure 1
>>
>>    Packet replication and elimination does not react to and correct
>>
>>    failures; it is entirely passive. Thus, intermittent failures,
>>
>> SB> I think it copes with intermittent failures OK.
>>
>> [Balázs Varga A] Yes, PRF and PEF can eliminate the effect of such 
>> failures. But text
>>
>> intends to say that it is passive. It is not reacting to such 
>> failures. No change in text.
>>
>
> You say that PREF does not correct failures. I would contend that is 
> exactly
> what it does. Sure it does not react but it does correct, and it does
> address intermittent failures.
>>
>> ===========
>>
>>    transported between the peer end systems.  Therefore, the following
>>
>>    possible types / formats of a DetNet flow are distinguished in this
>>
>>    document:
>>
>>    o  App-flow: native format of a DetNet flow.  It does not contain any
>>
>>       DetNet related attributes.
>>
>>    o  DetNet-t-flow: specific format of a DetNet flow.  Only requires
>>
>>       the congestion / latency features provided by the Detnet transport
>>
>>       layer.
>>
>>    o  DetNet-s-flow: specific format of a DetNet flow.  Only requires
>>
>>       the replication/elimination feature ensured by the DetNet service
>>
>>       layer.
>>
>>    o  DetNet-st-flow: specific format of a DetNet flow.  It requires
>>
>>       both DetNet service layer and DetNet transport layer functions
>>
>>       during forwarding.
>>
>> SB> I find the relisting of these types confusing. Wheren't they defined
>>
>> SB> in the section above?
>>
>> [Balázs Varga A] This is inline with the previous section " Grouping 
>> of end systems ".
>>
> Surely if we have defined them we never need to do anything but name 
> them in
> later sections. Redefinition is never a good idea because it often 
> leads to
> conflicting definitions.
>
>>
>> ============
>>
>>    [HSR-PRP]  IEC, "High availability seamless redundancy (HSR) is a
>>
>>               further development of the PRP approach, although HSR
>>
>>               functions primarily as a protocol for creating media
>>
>>               redundancy while PRP, as described in the previous
>>
>>               section, creates network redundancy.  PRP and HSR are both
>>
>>               described in the IEC 62439 3 standard.",
>>
>>               <http://webstore.iec.ch/webstore/webstore.nsf/
>>
>> artnum/046615!opendocument>.
>>
>> SB> Not available at the time of this review, but my recollection is
>>
>> SB> that this is not readily available without paying a large fee.
>>
>
> If we decide that this is essential as a key reference, there needs to be
> some suitable text, as this will get raised a number of times between
> here an publication as first the directorates and then the ADs run
> into this.
>
>> ===========
>>
>>    [ISA95]    ANSI/ISA, "Enterprise-Control System Integration Part 1:
>>
>>               Models and Terminology", 2000,
>>
>>               <https://www.isa.org/isa95/>.
>>
>> SB> Should that be 2000, or 2010.
>>
>> SB> Note that this seems to be a very expensive document to access.
>>
> You did not comment on the correctness of the reference.
>>
>>
>
> Best Regards
>
> Stewart