Re: [ippm] New Version Notification for draft-mhmcsfh-ippm-pam-03.txt

Alexander L Clemm <ludwig@clemm.org> Wed, 30 November 2022 01:51 UTC

Return-Path: <ludwig@clemm.org>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 04757C14CEFC for <ippm@ietfa.amsl.com>; Tue, 29 Nov 2022 17:51:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SdJK8Ewj1_Hp for <ippm@ietfa.amsl.com>; Tue, 29 Nov 2022 17:51:42 -0800 (PST)
Received: from mout.perfora.net (mout.perfora.net [74.208.4.196]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F41CC14F75F for <ippm@ietf.org>; Tue, 29 Nov 2022 17:51:41 -0800 (PST)
Received: from [172.16.0.44] ([73.189.160.186]) by mrelay.perfora.net (mreueus002 [74.208.5.2]) with ESMTPSA (Nemesis) id 0MDiGW-1pDtdS44x4-00HAji for <ippm@ietf.org>; Wed, 30 Nov 2022 02:51:41 +0100
Message-ID: <c980ab12-47fc-dea5-8b60-7621aa70040a@clemm.org>
Date: Tue, 29 Nov 2022 17:51:41 -0800
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.4.2
Content-Language: en-US
To: ippm@ietf.org
References: <mailman.8030.1667824945.15745.ippm@ietf.org> <6C621BD9-E20F-4D6A-AF6F-44AC38A84A2A@pnsol.com>
From: Alexander L Clemm <ludwig@clemm.org>
In-Reply-To: <6C621BD9-E20F-4D6A-AF6F-44AC38A84A2A@pnsol.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Provags-ID: V03:K1:ga7P/fSjqm1p0B/5jaweT10s2ooB3J2h+fQ8WVfsFzIIs5aacKh phNgDQMIcsLyBJa86pJj5mfIauu9Q5pe42oLeG+1zruCQuvlheWnfIjJaL7KsX25Zikys55 fLTfv+U1urWIFGcw6EZd6Qq7yB5o3Ar5ZtpVqwM6eBwS0a5W2cic5rujhRmisiNIrAbuVlr JWEzX96kUy1uPwVcEsi0Q==
X-UI-Out-Filterresults: notjunk:1;V03:K0:cfcmmuKIRH0=:xB8DGSAYFQWY3QX5z/XyRE 6zGxmrnflF5HwnxKJjXKLtnWQRPm24tnrrC6vckR6hVYPfg2mKytY/BIh7NqKVI4qPmaUEPTo eBQMfV3Aa1Lu7eIOp3aPIoiUqhBAGO+489PbT9vsxRQNBRoeFadpdzedhr2wZgwUaa+qpju1A US7jMVFMfC9RU4kfQC9C0JZKOUgpLV23MX1mhuaJVzSYyDAh9+3KaFr44N7Qj4mvlaTHIKkjb L8TDRoHG01nPaFtLqOfiel49uc5NXzJiKG9tptZw2ZjrC6SmNTaNOXxaH9xeO8QUP0rjufuC4 vUt6JtYYYt1dL/y7R/fQWhWqqVdCrQVJmrnaiVW3UbGzpepDNzPcg2XVyVEZ7lx+ecdQE03B7 D0IJ7i9131wWuhOYN0tJgRDjUckoNpISMTlWris//D6c9qPTGyykCDEkDyhIFuzm7mDP8eFGr LqDOKkRZJi06J7GynjIpoiospZtS6zTrEiEQ2Q6WdqtigkDrfuWacfJduprFdbsjOQ93XFlaC 1IdV4hDtxAd21GPKmdmMx3rHqFBY67PiPyUcJwP/EwxRs8jWX9GC4pwM0hFX8nLNC5STBXoV3 ZTwgUC/VXcwSXTra+fyoumqER5R+pr4cMwo8nvnVUvY/GUSDJHUmfaMAOVK5rZQ1TEsq4cS37 M6x7OdWgL/Lw7nzn3xOSYEn0Ij07Lunhat7X0OeMq5yeLL900TBAZCMNUJ15JFL10etyKySAL ci3GznCYNrtQNuYQmvlt+zyLswcXlLmPo9dWNVNmhUq0kFarNMbzix30+8aF4TEVVZQxV5ucR Ncs2DkZ
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/4T2Kqrbjzn6_eWpSprBJYw3i5MI>
Subject: Re: [ippm] New Version Notification for draft-mhmcsfh-ippm-pam-03.txt
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Nov 2022 01:51:46 -0000

Hello Peter,

thank you for your feedback and your interest in this work!

Please find my responses inline, <ALEX>

--- Alex (as coauthor)

On 11/24/2022 7:01 AM, Peter Thompson wrote:
> Dear Greg at el,
>
> I think this a very interesting direction of work and I support the idea of creating metrics for service availability. I have some questions:
>
> 1) Definition of a ’service’
>
> There is an implicit identification of a ’service’ with a particular flow of packets. However, if we think of, e.g., a bearer service, this is a *capability* to deliver packets regardless of whether any packets are currently flowing. It seems odd to record a service as ‘available’ only when it is being actively used! Also, a higher-level service may have units of information exchange that are not individual packets, and the notion of whether it is ‘available’ may go beyond whether packets are being exchanged with sufficient reliability.

<ALEX>I guess the question is, if there is a service and noone uses it, 
would anyone notice the difference?

Violated Intervals are currently defined a intervals during which at 
least one of the performance parameters degraded below its pre-defined 
threshold objective.  You are correct that this could be defined to 
include time intervals during which the capability to provide the 
service per the objective would be compromised. (Or this could even be 
defined as a separate metric - violated interval vs capability-violated 
interval or such.)  One question would be how to actually measure / 
observe this, and how it would be used.  From a practical perspective, I 
am not sure if this would actually be useful, hence this was indeed 
defined with actual degradation (versus "potential degradation if it 
were to be used" in mind.  However, it is certainly debatable to include 
also the sheer capability; are there some specific scenarios that you 
are thinking of for which you believe this should be included?

</ALEX>

>
> 2) Flow being measured
>
> When we speak of a ‘violated packet’ are we thinking of measuring *all* packets in a flow or just a subset (e.g. a co-incident stream of test packets)? Using a test packet stream has advantages:
> - Packets can include transmission times and sequence numbers, making measurement of delay and loss much easier
> - measurements continue even when there is no active service flow

<ALEX> The draft here focuses just on the metrics themselves.  How to 
conduct measurements is something that is good to have in the back of 
the mind but this question is outside the scope of the draft.  As for 
active vs passive measurements, the usual tradeoffs apply.  For the 
important category of precision accounting use cases, what is of 
importance is the actual precision availability of the services actually 
delivered.  Test packets won't cut it there and the metrics will need to 
be maintained for actual production traffic.  Where high-precision 
services (with stringent requirements) are involved, accuracy will be 
very important, i.e. relying on sampling of extrapolating from test 
traffic will not be sufficient.  (Active measurements might of course be 
used to test for the availability of the sheer capability, per your 
earlier point.)

</ALEX>

>
> 3) Service availability transition
>
> A service is moved to the ‘unavailable’ state if ten consecutive SVIs are detected - shouldn’t this number be a configurable parameter? Could it be N of M in a rolling window? (If only every tenth interval was unviolated this ’10 consecutive’ test would fail but the service wouldn’t be very good!)

<ALEX> I am sure that this point will receive further discussion.  You 
are correct that anything involving thresholds is potentially 
subjective, subject to policy, preferences, configuration.   Personally, 
I consider this a somewhat "secondary" consideration, but one that 
deserves to be included in the discussion.  One tradeoff to consider is 
that the need for such configuration introduces a certain degree of 
complexity, and raises secondary considerations (for example, how to 
know which configuration parameters were actually in effect when a 
certain state was reached or how a change in configuration should affect 
an existing state that was reached per the configuration that had been 
in effect earlier).  All these things can be defined but at the same 
should not be distracting to the primary purpose of the draft.

</ALEX>

>
> Peter Thompson, Chief Technical Officer Predictable Network Solutions Ltd., +44 (0)333.340.7713 • Twitter: @PNSolLtd
>
> PS this is my first post to this list, so I apologise in advance for any infelicities of format or etiquette!
>
>
>
> _______________________________________________
> ippm mailing list
> ippm@ietf.org
> https://www.ietf.org/mailman/listinfo/ippm