Re: [dtn] [Tsv-art] [EXT] Tsvart last call review of draft-ietf-dtn-dtnma-08

"touch@strayalpha.com" <touch@strayalpha.com> Mon, 29 January 2024 16:25 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: dtn@ietfa.amsl.com
Delivered-To: dtn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C568C14CE30; Mon, 29 Jan 2024 08:25:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.087
X-Spam-Level:
X-Spam-Status: No, score=-2.087 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_HELO_TEMPERROR=0.01, T_SPF_TEMPERROR=0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jK8mNDmWPdns; Mon, 29 Jan 2024 08:25:46 -0800 (PST)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 89C6AC14CEED; Mon, 29 Jan 2024 08:25:46 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id:Cc:Date:In-Reply-To: From:Subject:Mime-Version:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=oIEk3Ltt6cVgiaHfTHK3UmTxmfo3r7D7E53BW3kcAF8=; b=WGlIb/CZ+pNGrgb8IUbi4nP7jb wE3YqgZ+O+G5jnvkKMN3DT9PLtJPuxl+VQ9Yl5ISyz+kjEzg+OXbsmFD/AKD28XeaVOHRPg977Jpc UiIVtr8w4r1vw5oBfI+QzaIKEtLKBahTBOPD9OC5evO02/yvOf20u9Rk94v4chM8MYRWZLHVJ8yKF +TTBhG2z2G1XRH3quYnxLelIAaYkbQ85YhveiBwVK8+Pfj455iJ45cIlBSnL4kaiZlrVmv+6tadIl YBRy7smagpAEgPA72SzG66eQpOpd6qTL9+IAQkKqu5/Q2c+TRuaFHII+kFGGiH1TBG/L/sNU/JH8N DHBCubbA==;
Received: from [172.58.209.79] (port=11386 helo=smtpclient.apple) by server217.web-hosting.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.96.2) (envelope-from <touch@strayalpha.com>) id 1rUUS1-002hoW-06; Mon, 29 Jan 2024 11:25:44 -0500
Content-Type: multipart/alternative; boundary="Apple-Mail=_319C67CD-FFA8-48C9-8B92-E4001DF6BEF6"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.400.31\))
From: "touch@strayalpha.com" <touch@strayalpha.com>
In-Reply-To: <1acc1de948644973baac9b8b36460306@jhuapl.edu>
Date: Mon, 29 Jan 2024 08:25:24 -0800
Cc: Zaheduzzaman Sarker <zahed.sarker.ietf@gmail.com>, "tsv-art@ietf.org" <tsv-art@ietf.org>, "draft-ietf-dtn-dtnma.all@ietf.org" <draft-ietf-dtn-dtnma.all@ietf.org>, "dtn@ietf.org" <dtn@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>
Message-Id: <949B46A3-12D9-4CFC-A802-49144D6A62AB@strayalpha.com>
References: <170511743396.29205.7361219212467742875@ietfa.amsl.com> <9bdc9be28829415ca892e6230cabcb7c@jhuapl.edu> <6E7554E2-F2D7-4732-8ABD-109FFEBEA70F@strayalpha.com> <107a11b6c562485bb196df3336c13fdb@jhuapl.edu> <CAEh=tccMwVkTXbPLrxorhQLZZzrBAnNnPx+adgRRuS62LvUbNw@mail.gmail.com> <1acc1de948644973baac9b8b36460306@jhuapl.edu>
To: "Birrane, Edward J." <Edward.Birrane@jhuapl.edu>
X-Mailer: Apple Mail (2.3774.400.31)
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn/49NOFJxEdF_cNOm73ljgCTctFkk>
Subject: Re: [dtn] [Tsv-art] [EXT] Tsvart last call review of draft-ietf-dtn-dtnma-08
X-BeenThere: dtn@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Delay Tolerant Networking \(DTN\) discussion list at the IETF." <dtn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtn>, <mailto:dtn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn/>
List-Post: <mailto:dtn@ietf.org>
List-Help: <mailto:dtn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtn>, <mailto:dtn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Jan 2024 16:25:55 -0000

Hi Ed,

Please see my note where I raised the issue of architecture. Although you’ve used the definition I provided, I also noted that the doc doesn’t qualify under that definition.

This doc currently appears to be a set of architectural principles and describes some possible components, but it isn’t an architecture because it doesn’t satisfy the criteria in the definition below. It’s not clear this is a compete set, that all components are strictly required as presented, or how they would (even in a broad sense) interact, IMO.

Maybe say that “an architecture … “ (from the definition below), but add “This is a set of architectural principles. It is not implied to be complete or to define interfaces between components.”


Joe

—
Dr. Joe Touch, temporal epistemologist
www.strayalpha.com

> On Jan 28, 2024, at 6:15 PM, Birrane, Edward J. <Edward.Birrane@jhuapl.edu> wrote:
> 
> Zahed, Joe,
>  
>   I would suggest something like the following:
>  
> Replace:
>  
> This document describes a DTN Management Architecture (DTNMA) providing configuration, monitoring, and local control of both application and network services on a managed device. The DTNMA is designed to provide for the management of devices operating either within or across a challenged network.
>  
> With:
>  
> This document describes a logical DTN Management Architecture (DTNMA) providing configuration, monitoring, and local control of both application and network services on a managed device. The DTNMA is designed to provide for the management of devices operating either within or across a challenged network.
>  
> NOTE: A logical architecture describes the concepts and principles that support the logical operation of a system. This includes identifying elements of the system (such as in a reference model), the behaviors they  enable, and use cases describing how those behaviors result in the desired operation of the system. Logical architectures are not functional architectures. As such, this document does not specify a particular functional design for achieving desired behaviors
>  
> Let me know if this helps address the comments and I will release a -10.
>  
> -Ed
>  
> ---
> Edward J. Birrane, III, Ph.D. (he/him/his)
> Chief Engineer, Space Constellation Networking
> Supervisor, Embedded Applications Group
> Space Exploration Sector
> Johns Hopkins Applied Physics Laboratory
> (W) 443-778-7423 / (F) 443-228-3839
>  
>  
> From: Zaheduzzaman Sarker <zahed.sarker.ietf@gmail.com <mailto:zahed.sarker.ietf@gmail.com>>
> Sent: Saturday, January 27, 2024 11:18 AM
> To: Birrane, Edward J. <Edward.Birrane@jhuapl.edu <mailto:Edward.Birrane@jhuapl.edu>>
> Cc: touch@strayalpha.com <mailto:touch@strayalpha.com>; tsv-art@ietf.org <mailto:tsv-art@ietf.org>; draft-ietf-dtn-dtnma.all@ietf.org <mailto:draft-ietf-dtn-dtnma.all@ietf.org>; dtn@ietf.org <mailto:dtn@ietf.org>; last-call@ietf.org <mailto:last-call@ietf.org>
> Subject: Re: [Tsv-art] [EXT] [dtn] Tsvart last call review of draft-ietf-dtn-dtnma-08
>  
> APL external email warning: Verify sender zahed.sarker.ietf@gmail.com <mailto:zahed.sarker.ietf@gmail.com> before clicking links or attachments
>  
> 
> Hi Ed.,
>  
> Being explicit about "logical" architecture would help. Please propose text and later update the draft accordingly.
>  
> //Zahed
>  
> On Fri, Jan 26, 2024 at 6:53 PM Birrane, Edward J. <Edward.Birrane@jhuapl.edu <mailto:Edward.Birrane@jhuapl.edu>> wrote:
> Joe,
>  
>   Thank you for your comments on our responses (and please note I just posted a -09).  While I appreciate that we should not significantly hold up the doc, we could clarify what we mean when we say “architecture”.
>   Very much agree that this is not a functional architecture. And we did not intend for it to be that.
>  
>   Would it help to add a paragraph up front that talks about the value of a *logical* architecture, what a logical architecture addresses, and then map those pieces to the sections of the document? I understand there are still opinions on the level of detail around logical flows, but I think what we have qualifies as a logical architecture and that it does have value as an informational document.
>  
> -Ed
>  
> Edward J. Birrane, III, Ph.D. (he/him/his)
> Chief Engineer, Space Networking
> Space Exploration Sector
> Johns Hopkins Applied Physics Laboratory
> (W) 443-778-7423 / (C) 443-690-8272
>  
> From: touch@strayalpha.com <mailto:touch@strayalpha.com> <touch@strayalpha.com <mailto:touch@strayalpha.com>>
> Sent: Friday, January 26, 2024 11:32 AM
> To: Birrane, Edward J. <Edward.Birrane@jhuapl.edu <mailto:Edward.Birrane@jhuapl.edu>>
> Cc: tsv-art@ietf.org <mailto:tsv-art@ietf.org>; draft-ietf-dtn-dtnma.all@ietf.org <mailto:draft-ietf-dtn-dtnma.all@ietf.org>; dtn@ietf.org <mailto:dtn@ietf.org>; last-call@ietf.org <mailto:last-call@ietf.org>
> Subject: Re: [Tsv-art] [EXT] [dtn] Tsvart last call review of draft-ietf-dtn-dtnma-08
>  
> APL external email warning: Verify sender touch@strayalpha.com <mailto:touch@strayalpha.com> before clicking links or attachments
>  
> 
> Hi, Ed,
>  
> Notes below.
>  
> Overall, I still feel this is more a doc about issues such an architecture might address than an architecture itself. If that’s the case, then changing the doc perspective might be appropriate. 
>  
> However, that’s more my individual opinion than something that should hold the doc.
>  
> Joe
>  
> —
> Dr. Joe Touch, temporal epistemologist
> www.strayalpha.com <http://www.strayalpha.com/>
>  
> 
> On Jan 19, 2024, at 10:08 AM, Birrane, Edward J. <Edward.Birrane@jhuapl.edu <mailto:Edward.Birrane@jhuapl.edu>> wrote:
>  
> Joe, TSVART,
> 
>  Thank you for taking the time to review this informational document and to provide comments on where we can clarify or improve the work.
> 
>  My replies are in-line below. To help with discussion, I tried to enumerate comments so replies are prefaced with "EJB_#" where # is the comment I am responding to.
> 
>  To summarize, we would propose 3 changes to the existing document, to clarify intent:
> 
> 1. Clarify this informational document does not imply an implementation OR an implementation architecture (EJB_4)
> 2. Remove unused terms from the terminology section (EJB_5)
> 3. Define the term "timely" based on its use in the document (EJB_6) and use the term to clarify end-to-end where appropriate (EJB_8).
> 
> 
> -----
> 
> 
> First, it claims to focus on operating devices in challenged environments, but
> does not specifically rely on DTN protocols. That seems to imply that DTN
> protocols would not be sufficient, which begs some questions – if DTN is not
> useful here (the very case for which it seems to have been designed), why
> not?
> 
> EJB_1: The document does not mean to imply that DTN protocols (namely BP) are insufficient and we try to address this in the document. For example, the abstract states: "This document describes a DTN management architecture (DTNMA) suitable for managing devices in any challenged environment but, in particular, those communicating using the DTN Bundle Protocol (BP)" and the introduction states: "The DTNMA is designed to leverage any transport, network, and security solutions designed for challenged networks. However, the DTNMA should operate in any environment in which the Bundle Protocol (BPv7) [RFC9171] is deployed."
> 
> EJB_1: Would it help clarify this if we make a statement such as we would expect there to be a BP transport binding?
>  
> Wouldn’t that binding be (with BP) a DTN protocol?
>  
> It would help to understand an example case where devices are operated in challenged environments but would not need DTN protocols, as indicated.
>  
> If not DTN, then what transport would work?
> 
> EJB_2: Reference implementations have used bundle (BPv6 and BPv7) and also UDP, TCP, and others. There was a proposal to use RMAP for transport in a very particular circumstance. BPv7 should be used in the cases where BPv7 is helpful. But locking the DTNMA architecture to BPv7 is unnecessary.
>  
> If a TCP or UDP can be used, why would we consider these devices operating in challenged environments?
>  
> Or are these devices intended to be used to support devices in OTHER challenged environments, but this management architecture might not itself be in a challenged environment? (e.g., within devices of a single enclave).
>  
> 
> Second, the implication that this system is useful in the presence of
> unidirectional links alone or that it never relies on query/response strains
> credibility. If there is never a return path, then commands might never be
> received or executed, at which point there’s not much utility here.
> 
> EJB_3: We may not be using the term "link" in the same way. This document uses the term link to imply a single-hop. As such, a uni-directional link does not imply there is no return path.  For example, the topology A->B->C->A is a series of uni-directional links which allow bi-directional communications between A and C. Similarly the time-variant topology A->C...time passes...C->A is also a series of uni-directional links which allow bi-directional communication.
> 
> EJB_3: Since such topologies do exist in deployed systems it was important for us to mention that we can run over uni-directional links.
>  
> Ahh - it might be useful to similarly highlight the need for bidirectional paths, even if time-discontinuous. 
>  
> 
> Sec 1.2
> -       The definition of Reference Model might be more explicit that it does
> not imply an implementation architecture.
> 
> EJB_4: Since this is an informational document we felt this would be understood. In section 1.3  we describe the reference model as follows: "a reference model that can be used to reason about the DTNMA independent of an implementation".
> 
> EJB_4: Would it be clarifying to correct this to say "independent of an implementation or implementation architecture.”?
>  
> It might be useful to add that briefly in the abstract or earlier in Sec 1.
>  
> 
> Sec 2
> -       if TBR is a simplification of SBR, does that imply that the rule
> stimulus is exclusively relative or absolute time (and thus not dependent on
> other state?) -       If TBR is a simplification of SBR, it would be useful to
> include time, which is not obviously included in the internal state of a DA
> 
> EJB_5: Good catch. The discussion around the terms TBR and SBR were moved from this document to a subsequent document (from WG review) but the terms erroneously remained here in the terminology section.  Generally, any terms in the terminology section that are not used in the document should be removed.
>  
> OK. It might be useful to check that in the other doc then.
>  
> 
> Sec 3.1
> -       Does the lack of round trip communications within a given time imply
> that there might never be a time when this could complete? It would be
> useful to be specific either way (either eventually available or nor eventually
> available).
> 
> EJB_6: In any network a node may cease to function, of course. The "given time" referred to here (and when we say "timely" in the document) refers to timelines needed to support synchronous request-response architectures - such as mentioned in Section 6 when discussing open-loop control. 
> 
> EJB_6: We can add a definition of the term "timely" in the terminology section to help clarify.
>  
> That would be useful, IMO.
>  
> 
> This section should address whether there are any assumptions about
> message reordering, loss, or duplication. 
> 
> EJB_7: We felt that (while important) these are characteristics of implementation architectures and transport mechanism (both out of scope for this document, from the scope section). However, we can add a sentence/bullet to this section to emphasize the importance of considering the impact of message transport on any future implementation architecture.
>  
> That would be useful as well, IMO.
>  
> End-to-end paths are described as whether they
> exist at a given time; this implies something equivalent to a horizontal line in
> a space-time diagram, where the paths may exist in a way useful to
> conventional protocols as long as they follow end-to-end diagonals along a
> light-cone; this description should be tightened-up, especially given such
> cases are common in cases where DTN is intended to be used
> (interplanetary)
> 
> EJB_8: I agree that causally-connected events in a space-time diagram can be used to clarify constraints related to signal propagation. But relatively-close (pun intended?) nodes within a light-cone may fail to meet performance requirements as a function of configuration. Heartily agree that there is good reasoning to be done here, but an informational network management architecture is not likely the appropriate vehicle for that.
> 
> EJB_8: Suggest we tighten the language here to use the term "timely" (which I suggested adding in EJB_6) and discuss "timely end-to-end".
>  
> That would be useful, IMO.
>  
> 
> Sec 3.2
> -       The topological aspects appear to imply each link is point-to-point,
> rather than (potentially) multipoint bidirectional or asymmetric (multipoint in
> one direction; unicast in the other).
> 
> EJB_9: We did not intend this, and do not believe any wording here prevents something other than point-to-point.
>  
> It might be useful to point that out in a couple of places, just to avoid assumptions to the contrary.
>  
> Sec 3.2.1
> -       This section should discuss the potential need for idempotency, i.e.,
> operations that can be executed multiple times with the same result as being
> executed exactly once. These can include state-dependent operations as
> well as
> inherently indempotent operations. -       That issue should be carried into
> section 9.5 on command execution.
> 
> EJB_10: Understand and agree that idempotency is important in an implementing architecture - and that there are multiple ways of achieving this. We felt it was better to address this in the context of implementing architecture (e.g. *not* in this document). Currently other work being discussed in the DTNWG does, for example, include language on idempotency.
>  
> Idempotency is as much an aspect of the archecture as ‘eventually synchronous’, IMO. I.e., from an architecture viewpoint, noting that not everything needs a confirmation or explicit duplicate rejection to allow retries ‘in the blind’. It might help if it could be mentioned as affecting the final design.
>  
> 
> Sec 3.2
> -       There should be far more management implications noted here,
> including
> the potential need for idempotency if commands need to be re-issued
> before a confirmation is received. That has implications on the command
> structure as
> well as its execution. -       This section appears to imply eventual
> bidirectional communication, again this is not consistent with some of the
> front-matter.
> 
> EJB_11: As an informational document we tried to limit this to the set of implications that do not otherwise imply an implementation (the importance of which is noted in a prior comment).  
>  
> See above; AFAICT, it’s useful to note.
> 
> 
> EJB_11: Also the discussion on bi-directional communication is, I think, resolved from comment EJB_3.
>  
> Agreed.
>  
> 
> Sec 3.3
> -       Again, the notion of one-way management is not useful if exactly as
> presented; there appears to be the need for eventual confirmation, which
> should be noted
> 
> EJB_11: I think we addressed the concept of "one-way" management in comment EJB_3. Discussions of related questions such as command timing, command coordination across large numbers of nodes, etc... are considered to be functions of an implementation and implementation architecture. 
>  
> Agreed; fixed above.
>  
> 
> Sec 7
> -       Although this is the core, it is more of a list of useful properties
> than a true architecture. -       A architecture should describe the
> components, the interfaces between them, and their individual function,
> describing how they combine to provide a capability.  That does not appear
> to be the case here; this is more like a survey of the possible components,
> but there doesn’t appear to be enough information here to design a system.
> 
> EJB_12: We felt this was the appropriate level of detail for an informational document.  
>  
> As an architecture, IMO this doc needs to explain the necessary aspects of each interface, even if it doesn’t detail the design or implementation of that interface.
>  
> I.e., something that makes this an architecture, not “aspects of an architecture that another doc might describe”.
>  
> Sec 8
> -       The capability appears to be described in sec 8, which seems like it
> should come before the decomposition in this section.
> 
> Sec 9
> -       This model appears to be the core of the architecture, more so than the
> component list in Sec 7; it might be useful to move this earlier.
> Sec 10
> -       Use cases define the model’s aggregate intended behavior, i.e., the
> target. As such, this might be useful to explain before Sec 9, before Sec 7,
> and before Sec 8.
> 
> EJB_13: Regarding the ordering of sections 8,9,10 - we feel the ordering from less-to-more specific is preferred, but could also add cross-citation if that would make the material clearer to understand.
>  
> That would help. Agreed this might have multiple possible organizations.
>  
> Sec 12
> -       This section seems far too brief; the earlier sections that discuss
> security issues should be cross-cited in extended discussions here.
> 
> EJB_14: We feel this is the appropriate depth as this is an informational document. Subsequent material built from this would require significantly more detail.
>  
> See two answers above; again, IMO, more info is needed to make this an architecture discussion, not a discussion about what a future architecture document might consider.
>  
> 
> Sec 13
> -       If this architecture truly has only one notable reviewer, it might be
> useful to distribute it more widely and obtain more feedback. The fact that all
> authors and the only notable reviewer are all from the same organization
> also begs the question “who is this for”? Has no other party or organization
> contributed to it at all?
> 
> EJB_15: This work has been briefed in the DTNWG, with members outside of the DTNWG, with members outside of the IETF, and there exist reference implementations to this architecture in multiple organizations. We do not see that information as important content of this informational document. 
>  
> It would be useful to add that, esp. in the intro. Examples from some of these implementations might be the way to address some of my concerns about this not being an architecture.
>  
> Or, if this is really “discussions about possible such architectures”, shift the doc to have that perspective…
>  
> Joe
>  
> 
> 
> -Ed
> 
> ---
> Edward J. Birrane, III, Ph.D. (he/him/his)
> Chief Engineer, Space Constellation Networking
> Supervisor, Embedded Applications Group
> Space Exploration Sector
> Johns Hopkins Applied Physics Laboratory
> (W) 443-778-7423 / (F) 443-228-3839
> _______________________________________________
> Tsv-art mailing list
> Tsv-art@ietf.org <mailto:Tsv-art@ietf.org>
> https://www.ietf.org/mailman/listinfo/tsv-art
>  
> _______________________________________________
> Tsv-art mailing list
> Tsv-art@ietf.org <mailto:Tsv-art@ietf.org>
> https://www.ietf.org/mailman/listinfo/tsv-art