Re: [Detnet] WG Last Call: draft-ietf-detnet-architecture-05

János Farkas <janos.farkas@ericsson.com> Sun, 15 July 2018 23:24 UTC

Return-Path: <Janos.Farkas@ericsson.com>
X-Original-To: detnet@ietfa.amsl.com
Delivered-To: detnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 74ECA130E84 for <detnet@ietfa.amsl.com>; Sun, 15 Jul 2018 16:24:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.3
X-Spam-Level:
X-Spam-Status: No, score=-4.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J34Dviv8tDTj for <detnet@ietfa.amsl.com>; Sun, 15 Jul 2018 16:24:42 -0700 (PDT)
Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 68957130E7D for <detnet@ietf.org>; Sun, 15 Jul 2018 16:24:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/simple; q=dns/txt; i=@ericsson.com; t=1531697079; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=pKwfW2uFqWBz3aT5c8FdAVCg0vqgCnxgvQhDptjQQQ4=; b=N0bcbT4pYjfWrGJaQFpQiiLwtaTleNENJSVATCxusb/VFdD2fbDF6lh1qiqZxi4s EMSpf6pexUHY6Gdxyi7HJEJG8CkHhjCRpAxvqPhclln9hDiv9qZic0tlwkrsUvNq MyO6rPAEZ0Ddyw0CSQmUgrqklN552cNit6MTGHXs4Uc=;
X-AuditID: c1b4fb25-e3bff70000006310-0d-5b4bd7b725f9
Received: from ESESSMB501.ericsson.se (Unknown_Domain [153.88.183.119]) by sesbmg23.ericsson.net (Symantec Mail Security) with SMTP id EF.E5.25360.7B7DB4B5; Mon, 16 Jul 2018 01:24:39 +0200 (CEST)
Received: from ESESBMB501.ericsson.se (153.88.183.168) by ESESSMB501.ericsson.se (153.88.183.162) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Mon, 16 Jul 2018 01:24:38 +0200
Received: from [100.94.48.225] (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.184) with Microsoft SMTP Server id 15.1.1466.3 via Frontend Transport; Mon, 16 Jul 2018 01:24:38 +0200
To: "Black, David" <David.Black@dell.com>
References: <99657d22-f9e4-8a1a-27de-6997900f727e@labn.net> <7cc44e35-cbd0-fbdb-95b7-c93ab38ec5d7@gmail.com> <AM3PR07MB4021D464E3E2C4CCAA0883EAC7F0@AM3PR07MB402.eurprd07.prod.outlook.com> <fee5178f-a1da-53e7-1684-e09ec2bfcb42@gmail.com> <ab532cc6-0552-ecb1-fe3f-09ebce5f6ba9@ericsson.com> <CE03DB3D7B45C245BCA0D243277949363019498B@MX307CL04.corp.emc.com> <4900e61d-8399-8765-0ecb-181dc3c9ff5a@ericsson.com> <CE03DB3D7B45C245BCA0D24327794936301A79DE@MX307CL04.corp.emc.com>
CC: DetNet WG <detnet@ietf.org>
From: János Farkas <janos.farkas@ericsson.com>
Message-ID: <ba0c0b74-8d2e-c332-18c6-02a2649cddf0@ericsson.com>
Date: Mon, 16 Jul 2018 01:24:37 +0200
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.2.0
MIME-Version: 1.0
In-Reply-To: <CE03DB3D7B45C245BCA0D24327794936301A79DE@MX307CL04.corp.emc.com>
Content-Type: multipart/alternative; boundary="------------5BBFB6B919702593E5BF7A21"
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFrrJLMWRmVeSWpSXmKPExsUyM2J7ue72697RBo++Klt8nLWYxeL3p9ks Dkwek2bOYPZYsuQnUwBTFJdNSmpOZllqkb5dAlfGu/+/2QpuNrBXrFm8nrmBceYDli5GTg4J AROJO91fmboYuTiEBI4ySnSeXswI4XwDcj50Q2WOMEocWH+MEaRFWMBVYnHTYrYuRg4OEQFN iYdzXSBqnjFLnG+aywxSwywgL/F69V8wm03AXuLupQ1gNi+QveLiVzYQm0VAVeL/5snsIHNE BWIk1vclQJQISpyc+QTsOk4BP4nbzzaxgJQwC4RJ/HjgDhIWElCT+PT2IfsERoFZSDpmIVTN ArvBQmLm/POMs6Duad46mxnC1pBonTOXHVl8ASPbKkbR4tTipNx0I2O91KLM5OLi/Dy9vNSS TYzAAD+45bfqDsbLbxwPMQpwMCrx8D476h0txJpYVlyZe4hRgoNZSYR3lbhXtBBvSmJlVWpR fnxRaU5q8SFGaQ4WJXHeh+abo4QE0hNLUrNTUwtSi2CyTBycUg2MWu2LdeXOBFzN97mrI8TX uuBUwr6U7WeKvht5zP2y5Grzi41VH4Wmx/Ix3ZE1nVcy+dbhtToVHqdnROadLb/23zRuiXXH x6e6zf1TLdwvXr17qeRRcbdl5c4/M7/kpP8y2Xzd9+CCh4sFPkrtOKbhNEno2ITgIw+jWZbY 66m9s3b7ERFRYNfTp8RSnJFoqMVcVJwIACxbIE1sAgAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/detnet/wNnuqOmQxFsrfMSDlCfcTfSyudQ>
Subject: Re: [Detnet] WG Last Call: draft-ietf-detnet-architecture-05
X-BeenThere: detnet@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Discussions on Deterministic Networking BoF and Proposed WG <detnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/detnet>, <mailto:detnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/detnet/>
List-Post: <mailto:detnet@ietf.org>
List-Help: <mailto:detnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/detnet>, <mailto:detnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 15 Jul 2018 23:24:50 -0000

Hi David,

Please see in-line.

Thank you!
Janos


On 7/6/2018 11:50 PM, Black, David wrote:
>
> -- Bridged path definition
>
> >  Or should we do something else?
>
> > There is only one occurrence of "bridged path" in the text in brackets.
>
> That sounds like a better suggestion – change that occurrence and 
> remove the definition of “bridged path” from the draft. That 
> occurrence is in Section 4.1.1:
>
>    Congestion protection
>
>            The DetNet transport layer provides congestion protection.
>
>            See Section 4.5.  The actual queuing and shaping mechanisms
>
>            are typically provided by underlying subnet layers, these can
>
>            be closely associated with the means of providing paths for
>
>           DetNet flows (e.g., MPLS LSPs or bridged paths), the path and
>
>            the congestion protection are conflated in this figure.
>
> Perhaps: (e.g., MPLS LSPs or bridged paths) -> (MPLS LSPs or other 
> network paths)
>
> or just delete the entire parenthetical example.
>
OK. Let's just delete the entire parenthetical example.

> -- Section 4
>
> > We could add some introductory text to 4.1 or 4.1.1, for instance:
> > The functionality needed for DetNet (Section 3) are implemented in 
> the DetNet layer which comprises the DetNet service layer and the 
> DetNet transport layer.
>
> > The DetNet service layer functions rely on flow identification and 
> sequencing. The DetNet transport layer function may rely on flow 
> identification.
> >
> > What do you think?
>
> I prefer functional (what it does) characterization to mechanistic 
> (how it works) characterization in an overview, e.g., excerpting from 
> what I originally wrote:
>
> ·The DetNet Service layer provides timely reliable in-order DetNet 
> flow delivery to applications that use DetNet.
>
> ·The DetNet Transport layer insulates DetNet flows from interference 
> by network mechanisms, primarily queuing and routing
>
I understand the principle.

What about just copying the two definitions here:
DetNet service layer is the layer at which A DetNet Service, such as 
congestion or service protection is provided.
DetNet transport layer optionally provides congestion protection for 
DetNet flows over paths provided by the underlying network.


>
> > Should we also rearrange, e.g., indent the text after Figure 2 such that
> > Packet sequencing, Duplicate elimination, Flow replication, Flow 
> merging, Packet encoding, and Packet decoding get under Service layer
> > and
> > Congestion protection and Explicit routes get under Transport layer?
>
> No, I don’t think that’s necessary – Figure 2 provides sufficient 
> structure.
>
OK.

> Plus a few more minor comments inline …
>
> Thanks, --David
>
> *From:*János Farkas [mailto:janos.farkas@ericsson.com]
> *Sent:* Wednesday, July 4, 2018 2:15 PM
> *To:* Black, David
> *Cc:* DetNet WG
> *Subject:* Re: [Detnet] WG Last Call: draft-ietf-detnet-architecture-05
>
> Hi David,
>
> Thank you very much for your review and comments!
>
> Please see in-line.
>
> On 6/29/2018 4:10 PM, Black, David wrote:
>
>     The -06 version of this draft is much improved over the -05
>     version – lots of diligent work by the authors is evident and
>     appreciated.
>
>     I have two minor content concerns and some smaller editorial items.
>
>     ** Content
>
>     -- Section 2.2
>
>     The definition of “bridged path” looks like a definition of
>     “bridged forwarding” – the definition needs to encompass the
>     notion of a path that involves more than one bridge.
>
>        bridged path
>
>                A VLAN bridge uses the VLAN ID and the destination MAC
>
>                address to select the outbound port hence the path for a
>
>                frame.
>
> You are right, it looks like the emphasis is on bridge forwarding 
> rather than path.
> However, the superposition of the outbound ports provides a path, 
> which was tried to be captured by "hence the path".
> The idea was to keep it simple not dive into the details, which are 
> not necessary in this document.
>
> Would it be good to update to:
>
>    bridged path
>            A VLAN bridge uses the VLAN ID and the destination MAC
>            address to select the outbound port. The superposition
>            of the outbound ports is the path for a frame.
>
> ?
>
> Or should we do something else?
> There is only one occurrence of "bridged path" in the text in brackets.
>
>
>     -- Section 4
>
>     Figure 2 in Section 4.1.1 introduces the Detnet service and
>     transport layers.   The associated text quickly dives into
>     explaining the functionality in those layers, but it would be
>     helpful to start with an initial high level description of each of
>     those layers that helps motivate their separation.  It appears that:
>
>     - The DetNet Service layer provides timely reliable in-order
>     DetNet flow delivery to applications that use DetNet.   A DetNet
>     flow at the top of the DetNet Service layer may or may not be a
>     compound flow at the bottom of that layer.
>
>     - The DetNet Transport layer insulates DetNet flows (at the bottom
>     of the DetNet Service layer) from interference by network
>     mechanisms, primarily queuing and routing, where congestion is an
>     indication of queueing interference.  A DetNet flow at the top of
>     the DetNet Transport layer may or may not be a member flow that is
>     part of a compound flow, depending on what is done in the DetNet
>     Service layer.
>
>
> You are right, section 4 jumps into the details without much of an 
> introduction. I guess we had a kind of chicken and egg problem here. 
> Figure 4 provides a higher level view than Figure 2. However, Figure 4 
> captures different aspects, dives into the details of data plane 
> options. So, it seems better to keep the order.
>
> We could add some introductory text to 4.1 or 4.1.1, for instance:
> The functionality needed for DetNet (Section 3) are implemented in the 
> DetNet layer which comprises the DetNet service layer and the DetNet 
> transport layer. The DetNet service layer functions rely on flow 
> identification and sequencing. The DetNet transport layer function may 
> rely on flow identification.
>
> What do you think?
>
> Should we also rearrange, e.g., indent the text after Figure 2 such that
> Packet sequencing, Duplicate elimination, Flow replication, Flow 
> merging, Packet encoding, and Packet decoding get under Service layer
> and
> Congestion protection and Explicit routes get under Transport layer?
>
>
>
>     There’s a related paragraph of text between Figures 3 and 4 in
>     Section 4.1.2, but it doesn’t provide useful intuition about which
>     functionality belongs in which layer.
>
>     ** Editorial
>
>
>     -- Section 2.1
>
>     “expected” seems off in the definition of reservation:
>
>        reservation
>
>                The set of resources allocated between a source and one or
>
>                more destinations through transit nodes and subnets
>
>                associated with a DetNet flow, to provide the expected
>     DetNet
>
>                Service.
>
>     Suggest either “to provide the provisioned DetNet Service to that
>     flow”
>
> I like this one, will update to this one.
>
>
>     or “to provide the specified DetNet Service to that flow.”
>
>     -- Section 3.1
>
>        o  An upper bound on out-of-order packet delivery.  It is worth
>
>           noting that some DetNet applications are unable to tolerate any
>
>           out-of-order delivery.
>
>     Is that a sequence bound or a time bound or both?   I suspect that
>     a sequence bound (maximum degree of reordering in a flow,
>     independent of flow rate) was intended.  An analogous
>     clarification would be helpful in section 3.2.2.1 .
>
> It is intentionally kept high level in the architecture draft. Details 
> are to be provided by the flow information model draft. Please see my 
> previous mail: 
> https://mailarchive.ietf.org/arch/msg/detnet/AWG2eemg_AWsvF2FwtREyd_xtC8.
>
> */[David>] /*OK.
>
>     -- Section 3.2.3
>
>     I don’t understand “defined” in:
>
>        Even the use of
>
>        redundant paths through a network defined, e.g., by [RFC6372]
>     do not
>
>        eliminate the chances of packet loss.
>
>     Was “e.g., as defined by [RFC6372],” intended?
>
> Yes, this was the intention, will update to this one.
>
>        Many real-time networks rely on physical rings or chains of
>     two-port
>
>        devices, with a relatively simple ring control protocol.
>
>     How does a “ring control protocol” control “chains”? Suggest:
>     “ring control protocol” -> “control protocol”
>
>     Also, are paired chains between common endpoints intended, or a
>     more general notion of chains?
>
> This text refers to typical factory deployment, which is chain or ring.
> It seems better to keep “ring control protocol” because they are often 
> very different from generic control protocols applicable to mesh networks.
>
> Would flipping chain and ring resolve your concern?
>
>    Many real-time networks rely on physical chains or rings of two-port
>    devices, with a relatively simple ring control protocol.
>
>     */[David>] /*It feels like “ring control protocol” is an important
>     phrase to retain.   In the original text, would it be reasonable
>     to add “(applies to both rings and chains)” to the end of the
>     sentence?
>
Well, I guess the point is that there are many specific ring protocols, 
but we are looking for a generic solution.
What about deleting "chains" from the sentence?

>        Explicit routes can be established various ways,
>
>     established various -> established in various
>
> OK.
>
>
>        This is
>
>        irrespective of the distribution method used, also applies to
>     service
>
>        protection over explicit routes.
>
>     used, also -> used, and also
>
> OK.
>
>
>     -- Figure 5 (Section 4.1.3)
>
>     The UNI acronym is introduced without expansion or definition –
>     please correct that, e.g., by defining UNI in Section 2.1.
>
> DetNet-UNI is there among the definitions. It seems enough to me.
>
> */[David>] /*That’s fine – I overlooked that definition, sorry.
>
>     -- Figure 9 (Section 4.7.2)
>
>     I think I understand what’s going on, but the use of “add/remove”
>     in the figure should be explained in associated text.
>
> What about updating the sentence above Figure 9 to:
> A packet with corresponding Flow-IDs is illustrated in Figure 9, which 
> also indicates where Flow-ID can be added or removed.
>
> */[David>] /*Sure, with one minor edit: “where Flow-ID” -> “where each 
> Flow-ID”
>
OK.

>     Thanks, --David
>
>
> Thank you!
> Janos
>
>
>
>     *From:*detnet [mailto:detnet-bounces@ietf.org] *On Behalf Of
>     *János Farkas
>     *Sent:* Thursday, June 28, 2018 9:09 PM
>     *To:* Lou Berger; Stewart Bryant; detnet@ietf.org
>     <mailto:detnet@ietf.org> >> DetNet WG
>     *Subject:* Re: [Detnet] WG Last Call:
>     draft-ietf-detnet-architecture-05
>
>     Dear all,
>
>     Off-line discussions among Lou, Stewart, and authors followed the
>     discussions to properly address the WGLC comments, including the
>     detailed comments.
>
>     A new revision of the draft has been uploaded:
>     draft-ietf-detnet-architecture-06.
>
>     In addition to the changes already described in this thread, the
>     following bigger changes have been made to the draft:
>
>
>     *Section 2.1 Terms used in this document*
>
>     Some definitions refined as suggested by the detailed comments
>
>     New definitions have been added:
>
>        "allocation
>                Resources are dedicated to support a DetNet flow. 
>     Depending
>                on an implementation, the resource may be reused by non-
>                DetNet flows when it is not used by the DetNet flow.
>
>
>        PEF     A Packet Elimination Function (PEF) eliminates duplicate
>                copies of packets to prevent excess packets flooding the
>                network or duplicate packets being sent out of the DetNet
>                domain.  PEF can be implemented by an edge node, a relay
>                node, or an end system.
>
>       PRF     A Packet Replication Function (PRF) replicates DetNet flow
>                packets and forwards them to one or more next hops in the
>                DetNet domain.  The number of packet copies sent to
>     each next
>                hop is a DetNet flow specific parameter at the node
>     doing the
>                replication.  PRF can be implemented by an edge node, a
>     relay
>                node, or an end system.
>
>        PREOF   Collective name for Packet Replication, Elimination, and
>                Ordering Functions.
>
>        POF     A Packet Ordering Function (POF) re-orders packets within a
>                DetNet flow that are received out of order. This function
>                can be implemented by an edge node, a relay node, or an end
>                system.
>
>       DetNet service proxy
>                Maps between App-flows and DetNet flows.
>
>        bridged path
>                A VLAN bridge uses the VLAN ID and the destination MAC
>                address to select the outbound port hence the path for a
>                frame."
>
>
>     *Section 3.1 Primary goals defining the DetNet QoS*
>
>     A new QoS aspect has been added:
>        "o  An upper bound on out-of-order packet delivery. It is worth
>           noting that some DetNet applications are unable to tolerate any
>           out-of-order delivery."
>
>
>     The 3rd paragraph on loss on page 8 after the bullet list has been
>     extended to:
>        "After congestion, the most important contributions to packet
>     loss are
>        typically from random media errors and equipment failures.  Service
>        protection is the name for the mechanisms used by DetNet to address
>        these losses.  The mechanisms employed are constrained by the
>        requirement to meet the users' latency requirements. Packet
>        replication and elimination (Section 3.2.2) and packet encoding
>        (Section 3.2.2.3) are described in this document to provide service
>        protection; others may be found.  For instance, packet encoding can
>        be used to provide service protection against random media errors,
>        packet replication and elimination can be used to provide service
>        protection against equipment failures.  This mechanism distributes
>        the contents of DetNet flows over multiple paths in time and/or
>        space, so that the loss of some of the paths does need not
>     cause the
>        loss of any packets."
>
>
>     *3.2.2.  Service Protection*
>
>     Service protection is used as a more generic term. Introductory
>     text added:
>        "Service protection aims to mitigate or eliminate packet loss
>     due to
>        equipment failures, random media and/or memory faults.  These types
>        of packet loss can be greatly reduced by spreading the data over
>        multiple disjoint forwarding paths.  Various service protection
>        methods are described in [RFC6372], e.g., 1+1 linear protection.
>        This section describes the functional details of an additional
>     method
>        in Section 3.2.2.2, which can be implemented as described in
>        Section 3.2.2.3 or as specified in [I-D.ietf-detnet-dp-sol-mpls] in
>        order to provide 1+n hitless protection.  The appropriate service
>        protection mechanism depends on the scenario and the requirements."
>
>
>     New sub-section added:
>
>     "3.2.2.1.  In-Order Delivery
>
>        Out-of-order packet delivery can be a side effect of service
>        protection.  Packets delivered out-of-order impact the amount of
>        buffering needed at the destination to properly process the
>     received
>        data.  Such packets also influence the jitter of a flow.  The
>     DetNet
>        service includes maximum allowed misordering as a constraint.  Zero
>        misordering would be a valid service constraint to reflect that the
>        end system(s) of the flow cannot tolerate any out-of-order
>     delivery.
>        Service protection may provide a mechanism to support in-order
>        delivery."
>
>
>     *3.2.2.2. Packet Replication and Elimination*
>
>     New bullet added as the last one:
>        "o  The Packet Ordering Function (POF) uses the sequencing
>     information
>           to re-order a DetNet flow's packets that are received out of
>           order."
>
>     New sentence added after the bullet list:
>     "The order in which a node applies the PEF and the PRF to a DetNet
>     flow is implementation specific."
>
>     2nd paragraph after the bullet list has been updated to:
>     "Some service protection mechanisms rely on switching from one flow to
>        another when a failure of a flow is detected. Contrarily, packet
>        replication and elimination combines the DetNet member flows sent
>        along multiple different paths, and performs a packet-by-packet
>        selection of which to discard, e.g., based on sequencing
>     information."
>
>
>     *3.2.3.  Explicit routes*
>
>     Out-of-order aspect added to the first paragraph, which is about
>     distributed routing:
>     "Furthermore, out-of-order
>     packet delivery can be a side effect of route changes."
>
>     New sentence added to the 3rd paragraph:
>     "Explicit routes can be established various
>     ways, e.g., with RSVP-TE [RFC3209], with Segment Routing (SR)
>     [I-D.ietf-spring-segment-routing], via a Software Defined Networking
>     approach [RFC7426], with IS-IS [RFC7813], etc."
>
>     New paragraph added:
>        "Out-of-order packet delivery can be a side effect of
>     distributing a
>        single flow over multiple paths especially when there is a change
>        from one path to another when combining the flow. This is
>        irrespective of the distribution method used, also applies to
>     service
>        protection over explicit routes.  As described in Section 3.2.2.1,
>        out-of-order packets influence the jitter of a flow and impact the
>        amount of buffering needed to process the data; therefore, DetNet
>        service includes maximum allowed misordering as a constraint.  The
>        use of explicit routes helps to provide in-order delivery because
>        there is no immediate route change with the network topology,
>     but the
>        changes are plannable as they are between the different explicit
>        routes."
>
>     *
>     4.1.1. Representative Protocol Stack Model*
>
>     "Explicit routes" have been added to Figure 2 with the
>     corresponding explanation:
>      "Explicit routes
>                The DetNet transport layer provides mechanisms to
>     ensure that
>                fixed paths are provided for DetNet flows. These explicit
>                paths avoid the impact of network convergence."
>
>
>     Section 4.11 Connected islands vs. networks of v05 has been
>     deleted because it was just a leftover from early drafts on what
>     DetNet WG should do; which are covered by the charter anyways.
>
>
>     References have been cleaned up and brought up-to-date.
>
>
>     Refinements have been implemented in the draft according to Lou's
>     detailed comments. They are not listed here because they are minor
>     changes.
>
>
>     Best regards,
>     Janos
>
>
>     On 6/12/2018 2:48 PM, Lou Berger wrote:
>
>
>         Balázs,
>
>         Thanks for the response -- please see below.
>
>         ----------
>         On June 12, 2018 4:07:35 AM Balázs Varga A
>         <balazs.a.varga@ericsson.com>
>         <mailto:balazs.a.varga@ericsson.com> wrote:
>
>
>
>             Hi Lou, Thanks for the comments. See reactions inline.
>             Document update in progress. Cheers Bala'zs
>
>             -----Original Message-----
>             From: detnet <detnet-bounces@ietf.org>
>             <mailto:detnet-bounces@ietf.org> On Behalf Of Lou Berger
>             Sent: 2018. június 1. 22:42
>             To: DetNet WG <detnet@ietf.org> <mailto:detnet@ietf.org>;
>             draft-ietf-detnet-architecture@ietf.org
>             <mailto:draft-ietf-detnet-architecture@ietf.org>
>             Subject: [Detnet] Promised comments on
>             draft-ietf-detnet-architecture
>
>             Hi,
>
>                  I have a number of high level comments on the
>             document that I'd like to  raise below.  I also have a
>             number of more editorial/specific comments that  I'd like
>             to review directly with the authors and then have them
>             report back  on changes -- if any turn out to be more
>             substantive discussions from the  author's perspective,
>             I'll raise these on the list separately.
>
>         ...
>
>
>
>             - WRT Section 4.4.3, I think the inclusion of a
>             distributed control plane in the "Network Plane" is
>             inconsistent with other functional definitions and
>             conflates where a function resides from the actual
>             function and that whether control is implemented in a
>             fully centralized, fully distributed or some hybrid form
>             doesn't fundamentally change  the control function's role
>             -- therefore I think the sections 4.4.2 and .3 should be
>             revised accordingly
>             [Balázs Varga A] Agree in principal. Let's discuss the
>             details.
>
>         Okay - I'll work with you off line and we can report back the
>         results/proposed changes.
>
>
>
>             - In several places it's not clear that DetNet service is
>             always a L3 service which is controlled using L3
>             identifiers, i.e., IP addresses -- this is true even in
>             the MPLS service case and the TSN over MPLS case. I think
>             this is an important point to be clear on in the document.
>             [Balázs Varga A] I am not sure. DetNet service is always
>             provided over a L3 network (IP or MPLS), that is fine.
>             However the service itself can be L2 or L3. In case of TSN
>             Ethernet frames are transported, so it is a L2 service. In
>             case of IP end systems IP packets are transported so it is
>             a L3 service.
>
>
>         Humm - While I agree that DetNet is providing an (enhanced)
>         L2VPN service, it is not itself providing control or service
>         of L2 devices -- this is TSN's job.  The fact that DetNet is
>         all about behavior of L3 nodes (i.e., IP and PW/MPLS) and not
>         L2 nodes (i.e., TSN bridges) is something the architecture
>         should make unambiguous.
>
>         Thanks,
>         Lou
>
>
>
>             Please let me know what you think.
>
>             Cheers,
>
>             Lou
>
>
>             _______________________________________________
>             detnet mailing list
>             detnet@ietf.org <mailto:detnet@ietf.org>
>             https://www.ietf.org/mailman/listinfo/detnet
>             _______________________________________________
>             detnet mailing list
>             detnet@ietf.org <mailto:detnet@ietf.org>
>             https://www.ietf.org/mailman/listinfo/detnet
>
>
>
>
>
>     On 6/12/2018 6:27 PM, Stewart Bryant wrote:
>
>         Dear Bala'zs
>
>         Thank you your for your consideration of these points. I will
>         just pick up a few that need some further thought:
>
>
>
>
>                 DetNet transit node
>
>                        A node operating at the DetNet transport layer,
>             that utilizes
>
>                        link layer and/or network layer switching
>             across multiple
>
>                        links and/or sub-networks to provide paths for
>             DetNet service
>
>                        layer functions. Optionally provides congestion
>             protection
>
>                        over those paths.  An MPLS LSR is an example of
>             a DetNet
>
>                        transit node.
>
>             SB> In that example it would have to be a DetNet
>             enable/aware LSR. An
>
>             SB> ordinary LSR would not know anything about DetNet.
>
>             [Balázs Varga A] No, A DetNet aware LSR would be a relay
>             node (S-PE).
>
>
>         I think the confusion is what "DetNet Transport Layer" means.
>         This
>         technology touches on Transport Layer in  the L4 sense, and the
>         Transport Network Layer as in the packet network that carries
>         L3 packets.
>
>         So I think that we need to clarify whether a DetNet transit node
>         is an S-PE (i.e. a a transit node in the DetNet layer), or a P
>         node
>         (i.e. a transit node that is carrying DetNet packets but could be
>         carrying any sort of MPLS packet)
>
>
>
>             ============
>
>                These three techniques can be applied independently,
>             giving eight
>
>                possible combinations, including none (no DetNet),
>             although some
>
>                combinations are of wider utility than others.  This
>             separation keeps
>
>                the protocol stack coherent and maximizes
>             interoperability with
>
>                existing and developing standards in this (IETF) and
>             other Standards
>
>                Development Organizations.  Some examples of typical
>             expected
>
>                combinations:
>
>                o  Explicit routes plus service protection are exactly
>             the techniques
>
>                   employed by [HSR-PRP].  Explicit routes are achieved
>             by limiting
>
>                   the physical topology of the network, and the
>             sequentialization,
>
>                   replication, and duplicate elimination are
>             facilitated by packet
>
>                   tags added at the front or the end of Ethernet frames.
>
>             SB> ER can be done virtually as well as physically. RSVP
>             is a type of
>
>             SB> ER, as is Adj-SID based SR, and we can design other types.
>
>             [Balázs Varga A] Agree, but these are examples. Statement
>             is for HSR-PRP.
>
>         So the question is whether we should expand the set of
>         examples, particularly
>         to more accessible ones.
>
>         ============
>
>
>                                 Packet replication and elimination
>
>                             > > > > > > > > > relay > > > > > > > >
>
>                            > /------------+ R node E +------------\ >
>
>                           > /                  v + ^               \ >
>
>                   end    R +                   v | ^                +
>             E end
>
>                   system +                   v | ^                + system
>
>                           > \                  v + ^               / >
>
>                            > \------------+ R relay E +-----------/ >
>
>                             > > > > > > > > >  node > > > > > > > >
>
>             Figure 1
>
>                Packet replication and elimination does not react to
>             and correct
>
>                failures; it is entirely passive.  Thus, intermittent
>             failures,
>
>             SB> I think it copes with intermittent failures OK.
>
>             [Balázs Varga A] Yes, PRF and PEF can eliminate the effect
>             of such failures. But text
>
>             intends to say that it is passive. It is not reacting to
>             such failures. No change in text.
>
>
>         You say that PREF does not correct failures. I would contend
>         that is exactly
>         what it does. Sure it does not react but it does correct, and
>         it does
>         address intermittent failures.
>
>
>             ===========
>
>                transported between the peer end systems.  Therefore,
>             the following
>
>                possible types / formats of a DetNet flow are
>             distinguished in this
>
>                document:
>
>                o  App-flow: native format of a DetNet flow.  It does
>             not contain any
>
>                   DetNet related attributes.
>
>                o  DetNet-t-flow: specific format of a DetNet flow. 
>             Only requires
>
>                   the congestion / latency features provided by the
>             Detnet transport
>
>                   layer.
>
>                o  DetNet-s-flow: specific format of a DetNet flow. 
>             Only requires
>
>                   the replication/elimination feature ensured by the
>             DetNet service
>
>                   layer.
>
>                o  DetNet-st-flow: specific format of a DetNet flow. 
>             It requires
>
>                   both DetNet service layer and DetNet transport layer
>             functions
>
>                   during forwarding.
>
>             SB> I find the relisting of these types confusing.
>             Wheren't they defined
>
>             SB> in the section above?
>
>             [Balázs Varga A] This is inline with the previous section
>             " Grouping of end systems ".
>
>         Surely if we have defined them we never need to do anything
>         but name them in
>         later sections. Redefinition is never a good idea because it
>         often leads to
>         conflicting definitions.
>
>
>
>             ============
>
>                [HSR-PRP]  IEC, "High availability seamless redundancy
>             (HSR) is a
>
>                           further development of the PRP approach,
>             although HSR
>
>                           functions primarily as a protocol for
>             creating media
>
>                           redundancy while PRP, as described in the
>             previous
>
>                           section, creates network redundancy.  PRP
>             and HSR are both
>
>                           described in the IEC 62439 3 standard.",
>
>                           <http://webstore.iec.ch/webstore/webstore.nsf/
>
>             artnum/046615!opendocument>.
>
>             SB> Not available at the time of this review, but my
>             recollection is
>
>             SB> that this is not readily available without paying a
>             large fee.
>
>
>         If we decide that this is essential as a key reference, there
>         needs to be
>         some suitable text, as this will get raised a number of times
>         between
>         here an publication as first the directorates and then the ADs run
>         into this.
>
>
>
>             ===========
>
>                [ISA95]    ANSI/ISA, "Enterprise-Control System
>             Integration Part 1:
>
>                           Models and Terminology", 2000,
>
>                           <https://www.isa.org/isa95/>.
>
>             SB> Should that be 2000, or 2010.
>
>             SB> Note that this seems to be a very expensive document
>             to access.
>
>         You did not comment on the correctness of the reference.
>
>
>
>         Best Regards
>
>         Stewart
>