Re: [Raw] New Version Notification for draft-ietf-raw-oam-support-01.txt

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Fri, 04 June 2021 08:48 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: raw@ietfa.amsl.com
Delivered-To: raw@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 124643A2F75 for <raw@ietfa.amsl.com>; Fri, 4 Jun 2021 01:48:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.596
X-Spam-Level:
X-Spam-Status: No, score=-9.596 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=jayS8RNM; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=f01FmAKa
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2Rv_LAP8dtoW for <raw@ietfa.amsl.com>; Fri, 4 Jun 2021 01:48:21 -0700 (PDT)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 883C53A2F74 for <raw@ietf.org>; Fri, 4 Jun 2021 01:48:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=62282; q=dns/txt; s=iport; t=1622796501; x=1624006101; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=MnyPYsb6pHSkAbK+WV8IVNvheSJQofe8Ttqnwb/JxjA=; b=jayS8RNMGKHdF44RVwy8NZPa5uT308fnjwIj6tHQ8lSitIBEo1GTIAWS ywgRRMb6+1Rqv2oVnaYP3r5Tfwgjcf+GxeMT7oS4kBDqzDlGT0pXTed2O Z9sT5WuDmTbB4/VIaG7Q+792Ld7S0F5poX5t1Ha3x83tzH6fdVGGjBPOF Y=;
X-IronPort-AV: E=Sophos;i="5.83,247,1616457600"; d="scan'208";a="874330216"
Received: from alln-core-11.cisco.com ([173.36.13.133]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 04 Jun 2021 08:47:54 +0000
Received: from mail.cisco.com (xbe-aln-002.cisco.com [173.36.7.17]) by alln-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id 1548lsUK004507 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 4 Jun 2021 08:47:54 GMT
Received: from xfe-rcd-004.cisco.com (173.37.227.252) by xbe-aln-002.cisco.com (173.36.7.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Fri, 4 Jun 2021 03:47:54 -0500
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by xfe-rcd-004.cisco.com (173.37.227.252) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.2.792.15; Fri, 4 Jun 2021 03:47:54 -0500
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1497.18 via Frontend Transport; Fri, 4 Jun 2021 04:47:53 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Q50qgmHTSqh/kW4rtx2KcW9XvxwAn9r8tvizQOGRDuMEueVuk0zPKSlqXykIcmEpvwp7Wu3tdsa9loSPy7/XyVRKWxYZjRB9qG8d5IklHI88gxSGHRAXhLJ2AUbZRelcog3f63mH8qCBg2xDWh2IYNUPJ7AonA6GfX8iss6I4qtBLOc8T74lF/RmI9/27YnhUnXNHNbkDF6e17DLquII7L80RDetZtZl7cvoHlEFRKKv6jpq0PYWaVpa2nejl8wYu+UyLcs9pWy7e/c6rg5OQAdczy8mACFvyFjeKDd3J9K0VmeOE9EEyXtWcj4rpHEbJH8sX3lvBfWZlTglcnYc5Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MnyPYsb6pHSkAbK+WV8IVNvheSJQofe8Ttqnwb/JxjA=; b=lXWOENH1dGYENJQ2Cln88TYbkw9kcEbHCTsD6pIH1xiqhB9/ori9SdZAkwUrxdfNO4AwBWLcqkcH00xXPc5Ei+JJdB3TMYU17qADc9U2U0fBZHyyG1gXKzxfYbtr4E86HHrFbmEAWZbtfzd8TYBacj6JM0+AFMwmAxR8lYeY0EAxAn73l4i2BFqFVxN3plLH5u77WmOYMenvtijXSz4LWO4fPq8kl2zu65LqQkPDweTeXTIbQOuZ+AO5UCKVSROrNsO6C+3ohqJIyRbZ2p5wl/Ndb2HskFn2hrk1rHF6/iqCZz765bW5k4g/Ijy+2dzeC3myBkWWW64rA/BoYVxmHA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MnyPYsb6pHSkAbK+WV8IVNvheSJQofe8Ttqnwb/JxjA=; b=f01FmAKaultIQ908vuHhXvjnmFazdLgYvvXYMyibprl5vb/KU36VDNUOb5D7GXmrtFrs75rBa2l9xLr1GKvrevGVfVX/VOUZ2VI65033AcjtHzkfzJ6OdhRGPjCY7as8wqYMZRxoZdKZLAeqyOcuuuspasSIC4WEK85m2+gqdBw=
Received: from SJ0PR11MB4896.namprd11.prod.outlook.com (2603:10b6:a03:2dd::20) by BY5PR11MB4308.namprd11.prod.outlook.com (2603:10b6:a03:1b9::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4173.20; Fri, 4 Jun 2021 08:47:50 +0000
Received: from SJ0PR11MB4896.namprd11.prod.outlook.com ([fe80::71ec:217b:98c4:4dd7]) by SJ0PR11MB4896.namprd11.prod.outlook.com ([fe80::71ec:217b:98c4:4dd7%6]) with mapi id 15.20.4195.023; Fri, 4 Jun 2021 08:47:50 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: "gregory.mirsky@ztetx.com" <gregory.mirsky@ztetx.com>
CC: "gpapadopoulos.ietf@gmail.com" <gpapadopoulos.ietf@gmail.com>, "cjbc@it.uc3m.es" <cjbc@it.uc3m.es>, "theoleyre@unistra.fr" <theoleyre@unistra.fr>, "raw@ietf.org" <raw@ietf.org>, "xvilajosana@uoc.edu" <xvilajosana@uoc.edu>
Thread-Topic: Re:[Raw] New Version Notification for draft-ietf-raw-oam-support-01.txt
Thread-Index: AQHXUtbiqi4PA13KN0+agL5lXJcK16r3EzGAgAr6yoCAAClAAIAApE+AgACzrBA=
Date: Fri, 04 Jun 2021 08:47:34 +0000
Deferred-Delivery: Fri, 4 Jun 2021 08:46:25 +0000
Message-ID: <SJ0PR11MB4896BB7F3023C87D3EB4991FD83B9@SJ0PR11MB4896.namprd11.prod.outlook.com>
References: 162184867086.18539.8853247953120893576@ietfa.amsl.com, 73BEAC00-470A-4A28-B0EE-6296DC81AE6F@unistra.fr, CAC9+vPgUNRLBCPR3xHBpe=yzKEAwMZSynwwK_sJshHPYQCy1CQ@mail.gmail.com, 31C8D82F-10D0-471B-96C2-6C34677AE03A@unistra.fr, CALypLp9p2_2X7n2iOnt+cvJ4b3_sbN1C_xmT758CMwyVDXkkug@mail.gmail.com, 2FDC8B12-548A-4B39-8A4E-20B57AEBBB75@gmail.com, CO1PR11MB48817C421A69BDDA529653DFD83C9@CO1PR11MB4881.namprd11.prod.outlook.com <202106040537114738861@zte.com.cn>
In-Reply-To: <202106040537114738861@zte.com.cn>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: ztetx.com; dkim=none (message not signed) header.d=none;ztetx.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [2a01:cb1d:4ec:2200:a155:7c5a:735e:2d3]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6206ab32-506d-42b6-e63f-08d927356f72
x-ms-traffictypediagnostic: BY5PR11MB4308:
x-microsoft-antispam-prvs: <BY5PR11MB4308E8A5253199EB37DA2E7DD83B9@BY5PR11MB4308.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:6430;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR11MB4896.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(346002)(366004)(376002)(136003)(39860400002)(396003)(5660300002)(64756008)(66556008)(8676002)(30864003)(52536014)(66476007)(66446008)(6916009)(7696005)(9686003)(55016002)(76116006)(38100700002)(4326008)(6506007)(316002)(478600001)(66946007)(86362001)(33656002)(122000001)(83380400001)(966005)(15650500001)(71200400001)(6666004)(8936002)(66574015)(186003)(15974865002)(2906002)(53546011)(54906003)(559001)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR11MB4896.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6206ab32-506d-42b6-e63f-08d927356f72
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Jun 2021 08:47:50.3588 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: MwF7aaGEYVNydDrWcl0XjwBKC1sb9NRQlbLTHyTU9HgVHlmgKAEwXc6BJzkuI4imdGt3hTjLWxWtcBa95Dmgtw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR11MB4308
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.17, xbe-aln-002.cisco.com
X-Outbound-Node: alln-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/raw/JIsyClQlRz7rvexQtTVL5UaUhSc>
Subject: Re: [Raw] New Version Notification for draft-ietf-raw-oam-support-01.txt
X-BeenThere: raw@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: reliable and available wireless <raw.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/raw>, <mailto:raw-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/raw/>
List-Post: <mailto:raw@ietf.org>
List-Help: <mailto:raw-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/raw>, <mailto:raw-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Jun 2021 08:48:28 -0000

Hello Greg;

RAW forms a graph, e.g. a DODAG from a source to a destination, which ROLL and 6TiSCH refer to as a Track. More generally https://www.ietf.org/archive/id/draft-ietf-roll-dao-projection-17.html builds a Track from a Track Ingress to a Track Egress that can be used as a tunnel.

A you point out, the Track can be observe in the IPPM fashion, with value in observing the real-time behavior of actual packets, e.g., per hop latencies, instantaneous queue sizes as experienced by this packet, etc... A side effect is that the OAM does not need to be tagged to follow the same path and processing as the deterministic packets since it is carried by them.

Then we have variations of the two-step draft where the data is collected separately from the gathering. Note that there can be both cases, where the metadata is collected with the packet processing and aggregated / gathered later, or the case where the metadata is collected continuously or asynchronously to the packets, and may then be collected by the packets that pass by later. This may be of use to provide an aggregate view of the radio spectrum or an average queue size.

You'll note that the traditional collection is either along the forward datapath like your HTS packet does, or streamed to a form of network management entity. I'll be happy to present all these cases and provide references including the ones you mentioned.

But then, I'd wish to add a discussion on the reverse path collection, which is probably the most useful for the RAW PSE, since every node can get an instant view of the rest of the way. Note that there's IPR I'm aware of that covers that operation and adding text in the architecture will come with an IPR declaration from Cisco. Which can be a good thing because the IPR will be exposed and given some form of RAND terms.

How that works: A DODAG from one node to another node is reversible into another DODAG from destination to source by turning all links. The data collection (e.g., your HTS) packets would fly along that reverse path and gather the metrics that was aggregated since either the trigger or implicitly the previous collection. E.g., information reported by DLEP and the likes. A centralized PSE at the ingress, or a distributed PSE in intermediate nodes, can use that information to decide which path to take, how to best do load balancing and/or PREOF or PAREO.

Makes sense?

Pascal

> -----Original Message-----
> From: gregory.mirsky@ztetx.com <gregory.mirsky@ztetx.com>
> Sent: jeudi 3 juin 2021 23:37
> To: Pascal Thubert (pthubert) <pthubert@cisco.com>
> Cc: gpapadopoulos.ietf@gmail.com; cjbc@it.uc3m.es; theoleyre@unistra.fr;
> raw@ietf.org; xvilajosana@uoc.edu
> Subject: Re:[Raw] New Version Notification for draft-ietf-raw-oam-
> support-01.txt
> 
> Hi Pascal,
> thank you for your comments and questions. We've been addressing comments
> on OAM Framework for DetNet and it might be that one of the updates in
> the latest version be of use in addressing your question on the teleemtry
> collection:
> How we observe is not discussed yet. I’d like to wrote text about data
> collection packets (bees) that travel the reverse path and gather the
> latest metrics (e.g. DLEP) at each hop. Also I’d like to see text on
> IPPM, and whatever you guys think is best suited. The goal of the
> architecture is to give a blueprint/skeleton/direction for the solution
> drafts later.
> 
> Below is the quote from draft-ietf-detnet-oam-framework:
>   Also, we can characterize methods of transporting OAM information
> relative to the path of data.  For instance, OAM information may be
> transported in-band or out-of-band with the data flow.  In case of   the
> former, the telemetry information uses resources allocated for   the
> monitored DetNet flow.  If an in-band method of transporting   telemetry
> is used, the amount of generated information needs to be   carefully
> analyzed, and additional resources must be reserved.   [I-D.ietf-ippm-
> ioam-data] defines the in-band transport mechanism   where telemetry
> information is collected in the data packet on which   information is
> generated.  Two tracing methods are described - end-   to-end, i.e., from
> the ingress and egress nodes, and hop-by-hop,   i.e., like end-to-end
> with additional information from transit nodes.   [I-D.ietf-ippm-ioam-
> direct-export] and   [I-D.mirsky-ippm-hybrid-two-step] are examples of
> out-of-band telemetry transport.  In the former case, information is tra
>  nsported   by each node traversed by the data packet of the monitored
> DetNet   flow in a specially constructed packet.  In the latter,
> information   is collected in a sequence of follow-up packets that
> traverse the   same path as the data packet of the monitored DetNet flow.
> In both   methods, transport of the telemetry can avoid using resources
> allocated for the DetNet domain.
> 
> We always welcome comments and greatly appreciate your suggestions.
> 
> Regards,
> Greg Mirsky
> Sr. Standardization Expert
> 预研标准部/有线研究院/有线产品经营部  Standard Preresearch Dept./Wireline
> Product R&D Institute/Wireline Product Operation Division
> 
> E: gregory.mirsky@ztetx.com
> www.zte.com.cn
> ------------------Original Mail------------------
> Sender: PascalThubert(pthubert)
> To: Georgios PAPADOPOULOS;CARLOS JESUS BERNARDOS CANO;
> CC: Fabrice Theoleyre;raw@ietf.org;Xavi Vilajosana Guillen;
> Date: 2021/06/03 05:01
> Subject: Re: [Raw] New Version Notification for draft-ietf-raw-oam-
> support-01.txt
> --
> RAW mailing list
> RAW@ietf.org
> https://www.ietf.org/mailman/listinfo/raw
> 
> Hello All:
> 
> I’d be happy to add text in the raw architecture document (section 4.3)
> on the high level solution space that we want to consider.
> Right now we say what we observe, all segments (in a mesh) or just the
> wireless access (that’s supposed to be the lossy part and that pays for
> the rest of the path anyway).
> 
> We also have a discussion on how we tag the packets (with a HbH with is
> consistent with 6TiSCH and the current directions at 6MAN,
> https://datatracker.ietf.org/doc/draft-hinden-6man-hbh-processing/, or
> SRv6 SRH) to identify the flows. In any fashion, this allows to use the
> same identification  for the OAM packets and the flow itself.
> 
> How we observe is not discussed yet. I’d like to wrote text about data
> collection packets (bees) that travel the reverse path and gather the
> latest metrics (e.g. DLEP) at each  hop. Also I’d like to see text on
> IPPM, and whatever you guys think is best suited. The goal of the
> architecture is to give a blueprint/skeleton/direction for the solution
> drafts later.
> 
> Any suggestions?
> 
> Pascal
> 
> From: RAW <raw-bounces@ietf.org> On Behalf Of Georgios PAPADOPOULOS
> Sent: jeudi 3 juin 2021 11:21
> To: CARLOS JESUS BERNARDOS CANO <cjbc@it.uc3m.es>
> Cc: Fabrice Theoleyre <theoleyre@unistra.fr>; raw@ietf.org; Xavi
> Vilajosana Guillen <xvilajosana@uoc.edu>
> Subject: Re: [Raw] New Version Notification for draft-ietf-raw-oam-
> support-01.txt
> 
> Hello all,
> 
> 
> 
> On 27 May 2021, at 11:41, CARLOS JESUS BERNARDOS CANO <cjbc@it.uc3m.es>
> wrote:
> 
> Hi Xavi, Fabrice, all,
> 
> Thanks Xavi for all the comments and Fabrice for taking care of them.
> 
> On the requirements/solutions point, my personal opinion is that
> solutions should be addressed in a different draft, when charter allows
> so (not sure we can work on solutions  now).
> 
> +1,
> Georgios
> 
> 
> 
> Thanks!
> 
> Carlos
> 
> On Thu, May 27, 2021 at 11:00 AM Fabrice Theoleyre <theoleyre@unistra.fr>
> wrote:
> Dear Xavi,
> 
> Thank you for your comments!
> I will try to reply inline.
> 
> 
> RAW                                                         F. Theoleyre
> Internet-Draft                                                      CNRS
> Updates: draft-ietf-raw-oam-support-00                   G. Papadopoulos
> (if approved)                                    IMT Atlantique
> Intended status: Informational                                 G. Mirsky
> Expires: November 25, 2021                                     ZTE Corp.
> CJ. Bernardos
> UC3M
> May 24, 2021
> 
> 
> Operations, Administration and Maintenance (OAM) features for RAW
> draft-ietf-raw-oam-support-01
> 
> Abstract
> 
> Some critical applications may use a wireless infrastructure.
> However, wireless networks exhibit a bandwidth of several orders of
> magnitude lower than wired networks.  Besides, wireless transmissions are
> lossy by nature; the probability that a packet cannot be decoded
> correctly by the receiver may be quite high.
> XV>> the phrase that follows is vague. I would stress what the challenges
> are.
> In these conditions,
> guaranteeing that the network infrastructure works properly is
> particularly challenging, since we need to address some issues specific
> to wireless networks.
> FT> Thank you, I updated this part: "In these conditions, providing high
> reliability and a low delay is challenging."
> 
> This document lists the requirements
> of the Operation, Administration, and Maintenance (OAM) features
> recommended to construct a predictable communication infrastructure on
> top of a collection of wireless segments.
> XV>> Only requirements? are we going to propose a model/mechanism?
> 
> FT> to my mind, providing mechanisms seem out of scope for this draft (up
> to now). I will create a separated thread to discuss this problem, since
> I guess it deserves a discussion  with the WG.
> 
> 
> 
> This document describes
> the benefits, problems, and trade-offs for using OAM in wireless networks
> to achieve Service Level Objectives (SLO).
> 
> Status of This Memo
> 
> This Internet-Draft is submitted in full conformance with the provisions
> of BCP 78 and BCP 79.
> 
> Internet-Drafts are working documents of the Internet Engineering Task
> Force (IETF).  Note that other groups may also distribute working
> documents as Internet-Drafts.  The list of current Internet- Drafts is at
> https://datatracker.ietf.org/drafts/current/.
> 
> Internet-Drafts are draft documents valid for a maximum of six months and
> may be updated, replaced, or obsoleted by other documents at any time.
> It is inappropriate to use Internet-Drafts as reference material or to
> cite them other than as "work in progress."
> 
> This Internet-Draft will expire on November 25, 2021.
> 
> 
> 
> 
> 
> Theoleyre, et al.       Expires November 25, 2021               [Page 1]
> 
> Internet-Draft            OAM features for RAW                  May 2021
> 
> 
> Copyright Notice
> 
> Copyright (c) 2021 IETF Trust and the persons identified as the document
> authors.  All rights reserved.
> 
> This document is subject to BCP 78 and the IETF Trust's Legal Provisions
> Relating to IETF Documents
> (https://trustee.ietf.org/license-info) in effect on the date of
> publication of this document.  Please review these documents carefully,
> as they describe your rights and restrictions with respect to this
> document.  Code Components extracted from this document must include
> Simplified BSD License text as described in Section 4.e of the Trust
> Legal Provisions and are provided without warranty as described in the
> Simplified BSD License.
> 
> Table of Contents
> 
> 1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
> 1.1.  Terminology . . . . . . . . . . . . . . . . . . . . . . .   4
> 1.2.  Acronyms  . . . . . . . . . . . . . . . . . . . . . . . .   5
> 1.3.  Requirements Language . . . . . . . . . . . . . . . . . .   6
> 2.  Role of OAM in RAW  . . . . . . . . . . . . . . . . . . . . .   6
> 2.1.  Link concept and quality  . . . . . . . . . . . . . . . .   7
> 2.2.  Broadcast Transmissions . . . . . . . . . . . . . . . . .   7
> 2.3.  Complex Layer 2 Forwarding  . . . . . . . . . . . . . . .   8
> 2.4.  End-to-end delay  . . . . . . . . . . . . . . . . . . . .   8
> 3.  Operation . . . . . . . . . . . . . . . . . . . . . . . . . .   8
> 3.1.  Information Collection  . . . . . . . . . . . . . . . . .   8
> 3.2.  Continuity Check  . . . . . . . . . . . . . . . . . . . .   9
> 3.3.  Connectivity Verification . . . . . . . . . . . . . . . .   9
> 3.4.  Route Tracing . . . . . . . . . . . . . . . . . . . . . .   9
> 3.5.  Fault Verification/detection  . . . . . . . . . . . . . .   9
> 3.6.  Fault Isolation/identification  . . . . . . . . . . . . .  10 4.
> Administration  . . . . . . . . . . . . . . . . . . . . . . .  10 4.1.
> Worst-case metrics  . . . . . . . . . . . . . . . . . . .  11 4.2.
> Efficient data retrieval  . . . . . . . . . . . . . . . .  11 4.3.
> Reporting OAM packets to the source . . . . . . . . . . .  12 5.
> Maintenance . . . . . . . . . . . . . . . . . . . . . . . . .  12 5.1.
> Soft transition after reconfiguration . . . . . . . . . .  12 5.2.
> Predictive maintenance  . . . . . . . . . . . . . . . . .  12 6.  IANA
> Considerations . . . . . . . . . . . . . . . . . . . . .  13 7.  Security
> Considerations . . . . . . . . . . . . . . . . . . .  13 8.
> Acknowledgments . . . . . . . . . . . . . . . . . . . . . . .  13 9.
> Informative References  . . . . . . . . . . . . . . . . . . .  13
> Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  14
> 
> 
> 
> 
> 
> 
> Theoleyre, et al.       Expires November 25, 2021               [Page 2]
> 
> Internet-Draft            OAM features for RAW                  May 2021
> 
> 
> 1.  Introduction
> 
> Reliable and Available Wireless (RAW) is an effort that extends DetNet to
> approach end-to-end deterministic performances over a network that
> includes
> XV>> Only scheduled? can we generalize to non-scheduled? e.g WiFi is not
> scheduled.
> scheduled wireless segments.  In wired
> networks, many approaches try to enable Quality of Service (QoS) by
> implementing traffic differentiation so that routers handle each type of
> packets differently.  However, this differentiated treatment was
> expensive for most applications.
> 
> Deterministic Networking (DetNet) [RFC8655] has proposed to provide a
> bounded end-to-end latency on top of the network infrastructure,
> comprising both Layer 2 bridged and Layer 3 routed segments.  Their work
> encompasses the data plane, OAM, time synchronization, management,
> control, and security aspects.
> 
> However, wireless networks create specific challenges.  First of all,
> radio bandwidth is significantly lower than for wired networks.  In these
> conditions, the volume of signaling messages has to be very limited.
> Even worse, wireless links are lossy: a Layer 2 transmission may or may
> not be decoded correctly by the receiver, depending on a broad set of
> parameters.  Thus, providing high reliability through wireless segments
> is particularly challenging.
> 
> Wired networks rely on the concept of _links_. All the devices attached
> to a link receive any transmission.  The concept of a link in wireless
> networks is somewhat different from what many are used to in wireline
> networks.  A receiver may or may not receive a transmission, depending on
> the presence of a colliding transmission, the radio channel's quality,
> and the external interference.  Besides, a wireless transmission is
> broadcast by nature: any _neighboring_ device may be able to decode it.
> XV>> This document instead of The document?
> FT> thank you!
> 
> 
> 
> The document includes detailed
> information on what the implications for the OAM features are.
> 
> Last but not least, radio links present volatile characteristics.  If the
> wireless networks use an unlicensed band, packet losses are not anymore
> temporally and spatially independent.  Typically, links may exhibit a
> very bursty characteristic, where several consecutive packets may be
> dropped.  Thus, providing availability and reliability on top of the
> wireless infrastructure requires specific Layer 3 mechanisms to
> counteract these
> XV>> unpredictable instead of bursty?
> bursty losses.
> 
> FT> I make here a distinction: i) unpredictable=we don’t know, ii)
> bursty=the radio channel changes for a small duration (e.g., a few
> packets), for instance because of external  interference.
> FT> I guess that both problems are of interest but are dissimilar. I
> reformulated into: "Typically, links may exhibit a very bursty
> characteristic, where several consecutive packets  may be dropped,
> because of e.g. temporary external interference.”
> 
> 
> 
> 
> Operations, Administration, and Maintenance (OAM) Tools are of primary
> importance for IP networks [RFC7276].
> XV>> They define
> It defines a toolset
> for fault detection, isolation, and performance measurement.
> FT> thank you!
> 
> 
> 
> The primary purpose of this document is to detail the specific
> requirements of the OAM features recommended to construct a
> 
> 
> 
> Theoleyre, et al.       Expires November 25, 2021               [Page 3]
> 
> Internet-Draft            OAM features for RAW                  May 2021
> 
> 
> predictable communication infrastructure on top of a collection of
> wireless segments.  This document describes the benefits, problems, and
> trade-offs for using OAM in wireless networks to provide availability and
> predictability.
> 
> 1.1.  Terminology
> 
> In this document, the term OAM will be used according to its definition
> specified in [RFC6291].  We expect to implement an OAM framework in RAW
> networks to maintain a real-time view of the network infrastructure, and
> its ability to respect the Service Level Objectives (SLO), such as delay
> and reliability, assigned to each data flow.
> 
> We re-use here the same terminology as [detnet-oam]:
> 
> o  OAM entity: a data flow to be monitored for defects and/or its
> performance metrics measured.;  XV>> remove the '.'
> 
> o  Maintenance End Point (MEP): OAM devices crossed when entering/
> exiting the network.  In RAW, it corresponds mostly to the source or
> destination of a data flow.  OAM message can be exchanged between two
> MEPs;
> 
> o  Maintenance Intermediate endPoint (MIP): an OAM system along the flow;
> a MIP MAY respond to an OAM message generated by the MEP;
> 
> o  control/management/data plane: the control and management planes are
> used to configure and control the network (long-term).  The data plane
> takes the individual decision.  Relative to a data flow, the control
> and/or management plane can be out-of-band;
> 
> o  Active measurement methods (as defined in [RFC7799]) modify a normal
> data flow by inserting novel fields, injecting specially constructed test
> packets [RFC2544]).  It is critical for the quality of information
> obtained using an active method that generated test packets are in-band
> with the monitored data flow.
> In other words, a test packet is required to cross the same network nodes
> and links and receive the same Quality of Service
> (QoS) treatment as a data packet.  Active methods may implement one of
> these two strategies:
> 
> *  In-band: control information follows the same path as the data
> packets.  In other words, a failure in the data plane may prevent the
> control information to reach the destination (e.g., end-device or
> controller).
> 
> 
> 
> 
> 
> Theoleyre, et al.       Expires November 25, 2021               [Page 4]
> 
> Internet-Draft            OAM features for RAW                  May 2021
> 
> 
> *  out-of-band: control information is sent separately from the data
> packets.  Thus, the behavior of control vs. data packets may differ;
> 
> o  Passive measurement methods [RFC7799] infer information by observing
> unmodified existing flows.
> 
> We also adopt the following terminology, which is particularly relevant
> for RAW segments.
> 
> o  piggybacking vs. dedicated control packets: control information may be
> encapsulated in specific (dedicated) control packets.
> Alternatively, it may be piggybacked in existing data packets, when the
> MTU is larger than the actual packet length.
> Piggybacking makes specifically sense in wireless networks, as the cost
> (bandwidth and energy) is not linear with the packet size.
> 
> o  router-over vs. mesh under: a control packet is either forwarded
> directly to the layer-3 next hop (mesh under) or handled hop-by- hop by
> each router.  While the latter option consumes more resources, it allows
> to collect additionnal intermediary information, particularly relevant in
> wireless networks.
> 
> o  Defect: a temporary change in the network (e.g., a radio link which is
> broken due to a mobile obstacle);
> 
> o  Fault: a definite change which may affect the network performance,
> e.g., a node runs out of energy.
> 
> o  End-to-end delay: the time between the packet generation and its
> reception by the destination.
> 
> 1.2.  Acronyms
> 
> OAM Operations, Administration, and Maintenance
> 
> DetNet Deterministic Networking
> 
> PSE Path Selection Engine [I-D.pthubert-raw-architecture]
> 
> QoS Quality of Service
> 
> RAW Reliable and Available Wireless
> 
> SLO Service Level Objective
> 
> SNMP Simple Network Management Protocol
> 
> 
> 
> 
> Theoleyre, et al.       Expires November 25, 2021               [Page 5]
> 
> Internet-Draft            OAM features for RAW                  May 2021
> 
> 
> SDN Software-Defined Network
> 
> 1.3.  Requirements Language
> 
> The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
> "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
> "OPTIONAL" in this document are to be interpreted as described in BCP
> 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals,
> as shown here.
> 
> 2.  Role of OAM in RAW
> 
> RAW networks expect to make the communications reliable and predictable
> on top of a wireless network infrastructure.  Most critical applications
> will define an SLO to be required for the data flows it generates.  RAW
> considers network plane protocol elements such as OAM to improve the RAW
> operation at the service and the forwarding sub-layers.
> 
> To respect strict guarantees, RAW relies on the Path Selection Engine
> (PSE) (as defined in [I-D.pthubert-raw-architecture] to monitor and
> maintain the network.
> XV>> To me, the example is not clear. We need to differentiate between
> the L2 scheduler or any other access mechanisms (Can be CSMA/CA?) to the
> PSE mechanism, which runs at L3 and cannot change the operation of the L2
> scheduler but react according to the  path characteristics by introducing
> redundancy or selecting other routes to mitigate the effect of an
> underperforming path.
> As an example, a Software-Defined Network
> (SDN) controller may be used to schedule the transmissions in the
> deployed network, based on the radio link characteristics, SLO of the
> flows, the number of packets to forward.  Thus, resources have to be
> provisioned a priori to handle any defect.
> 
> FT> thank you. I reformulate the whole paragraph to make a distinction
> FT> between L2 and L3: "To respect strict guarantees, RAW relies on the
> FT> Path Selection Engine (PSE) (as
> defined in <xref target="I-D.pthubert-raw-architecture" /> to monitor and
> maintain the L3 network. A L2 scheduler may be used to allocate
> transmission opportunities, based on the radio link characteristics, SLO
> of the flows, the number of packets to forward.
> The PSE exploits the L2 ressources reserved by the scheduler, and
> organizes the L3 paths to introduce redundancy, fault tolerance, and
> create backup paths."
> 
> XV>> OAM, should be monitoring that and provision alternate routes or
> request to the underlying layer to provision support to more capacity to
> create an overprovisioning effect.
> OAM represents the core
> of the pre-provisioning process and maintains the network operational by
> updating the schedule dynamically.
> 
> FT> I also reformulated this part: "OAM represents the core of the pre-
> provisioning process by supervising the network.
> It maintains maintains a global view of the network resources, to detect
> defects, faults, over-provisionning, anomalies.
> 
> 
> "
> Fault-tolerance also assumes that multiple paths have to be provisioned
> so that an end-to-end circuit keeps on existing whatever the conditions.
> The Packet Replication and Elimination Function
> ([PREF-draft]) on a node is typically controlled by the PSE.  OAM
> mechanisms can be used to monitor that PREOF is working correctly on a
> node and within the domain.
> 
> To be energy-efficient, reserving some dedicated out-of-band resources
> for OAM seems idealistic, and only in-band solutions are considered here.
> 
> RAW supports both proactive and on-demand troubleshooting.
> 
> XV>> Should we extend this concept? I guess this is key.
> FT> thank you. I developed this part. I hope the novel version is more
> precise: "RAW supports both proactive and on-demand troubleshooting.
> Proactively, it is necessary to detect anomalies, to report defects, or
> to reduce over-provisionning if it is not required.
> However, on-demand may also be required to identify the cause of a
> specific defect.
> Indeed, some specific faults may only be detected with a global, detailed
> view of the network, which is too expensive to acquire in the normal
> operating mode."
> 
> FT> for the specific solutions to apply, I guess that they should fit in
> another draft.
> 
> 
> 
> The specific characteristics of RAW are discussed below.
> 
> 
> 
> 
> 
> 
> 
> 
> Theoleyre, et al.       Expires November 25, 2021               [Page 6]
> 
> Internet-Draft            OAM features for RAW                  May 2021
> 
> 
> 2.1.  Link concept and quality
> 
> In wireless networks, a _link_ does not exist physically.  A device has a
> set of *neighbors* that correspond to all the devices that have a non
> null probability of receiving correctly its packets.  We make a
> distinction between:
> 
> o  point-to-point (p2p) link with one transmitter and one receiver.
> These links are used to transmit unicast packets.
> 
> o  point-to-multipoint (p2m) link associates one transmitter and a
> collection of receivers.  For instance, broadcast packets assume the
> existence of p2m links to avoid duplicating a broadcast packet to reach
> each possible radio neighbor.
> XV>> maybe we need to clarify the concept of scheduled radio link. Would
> that also work for WiFi?
> 
> FT> to my mind, yes. For instance WiFi6 uses the TWT concept (target
> wake-up time). And it has been extended in version 6 (compared with ah)
> typically to include the p2m case  (broadcast actually).
> FT> isn’t it the role of the technology draft?
> FT> BTW, I also reformulated the sentence: "In scheduled radio networks,
> p2m and p2p links are commonly not scheduled simultaneously to save
> energy, and/or to reduce the number  of collisions."
> 
> 
> 
> In scheduled radio networks, p2m and p2p links are commonly not scheduled
> simultaneously to save energy.  More precisely, only one part of the
> neighbors may wake-up at a given instant.
> 
> Anycast are used in p2m links to improve the reliability.  A collection
> of receivers are scheduled to wake-up simutaneously, so that the
> transmission fails only if none of the receivers is able to decode the
> packet.
> 
> Each wireless link is associated with a link quality, often measured as
> the Packet Delivery Ratio (PDR), i.e., the probability that the receiver
> can decode the packet correctly.  It is worth noting that this link
> quality depends on many criteria, such as the level of external
> interference, the presence of concurrent transmissions, or the radio
> channel state.  This link quality is even time-variant.
> For p2m links, we have consequently a collection of PDR (one value per
> receiver).  Other more sophisticated, aggregated metrics exist for these
> p2m links, such as [anycast-property]
> 
> 2.2.  Broadcast Transmissions
> 
> In modern switching networks, the unicast transmission is delivered
> uniquely to the destination.  Wireless networks are much closer to the
> ancient *shared access* networks.  Practically, unicast and broadcast
> frames are handled similarly at the physical layer.  The link layer is
> just in charge of filtering the frames to discard irrelevant receptions
> (e.g., different unicast MAC address).
> 
> However, contrary to wired networks, we cannot be sure that a packet is
> received by *all* the devices attached to the Layer 2 segment.  It
> depends on the radio channel state between the transmitter(s) and the
> receiver(s).  In particular, concurrent transmissions may be possible or
> not, depending on the radio conditions (e.g., do the different
> 
> 
> 
> Theoleyre, et al.       Expires November 25, 2021               [Page 7]
> 
> Internet-Draft            OAM features for RAW                  May 2021
> 
> 
> transmitters use a different radio channel or are they sufficiently
> spatially separated?)
> 
> 2.3.  Complex Layer 2 Forwarding
> 
> Multiple neighbors may receive a transmission.  Thus, anycast Layer 2
> forwarding helps to maximize the reliability by assigning multiple
> receivers to a single transmission.  That way, the packet is lost only if
> *none* of the receivers decode it.  Practically, it has been proven that
> different neighbors may exhibit very different radio conditions, and that
> reception independency may hold for some of them [anycast-property].
> 
> 2.4.  End-to-end delay
> 
> In a wireless network, additionnal transmissions opportunities are
> provisionned to accomodate packet losses.  Thus, the end-to-end delay
> consists of:
> 
> o  Transmission delay, which is fixed and depends mainly on the data
> rate, and the presence or absence of an acknowledgement.
> 
> o  Residence time, corresponds to the buffering delay and depends on the
> schedule.  To account for retransmisisons, the residence time is equal to
> the difference between the time of last reception from the previous hop
> (among all the retransmisions) and the time of emission of the last
> retransmission.
> 
> 3.  Operation
> 
> OAM features will enable RAW with robust operation both for forwarding
> and routing purposes.
> 
> 3.1.  Information Collection
> 
> The model to exchange information should be the same as for DetNet
> network, for the sake of inter-operability.  YANG may typically fulfill
> this objective.
> 
> However, RAW networks imply specific constraints (e.g., low bandwidth,
> packet losses, cost of medium access) that may require to minimize the
> volume of information to collect.  Thus, we discuss in Section 4.2
> different ways to collect information, i.e., transfer physically the OAM
> information from the emitter to the receiver.
> 
> 
> 
> 
> 
> 
> 
> Theoleyre, et al.       Expires November 25, 2021               [Page 8]
> 
> Internet-Draft            OAM features for RAW                  May 2021
> 
> 
> 3.2.  Continuity Check
> 
> Similarly to DetNet, we need to verify that the source and the
> destination are connected (at least one valid path exists)
> 
> 3.3.  Connectivity Verification
> 
> As in DetNet, we have to verify the absence of misconnection.  We focus
> here on the RAW specificities.
> 
> Because of radio transmissions' broadcast nature, several receivers may
> be active at the same time to enable anycast Layer 2 forwarding.
> Thus, the connectivity verification must test any combination.  We also
> consider priority-based mechanisms for anycast forwarding, i.e., all the
> receivers have different probabilities of forwarding a packet.  To verify
> a delay SLO for a given flow, we must also consider all the possible
> combinations, leading to a probability distribution function for end-to-
> end transmissions.  If this verification is implemented naively, the
> number of combinations to test may be exponential and too costly for
> wireless networks with low bandwidth.
> 
> 3.4.  Route Tracing
> 
> XV>> the following statement is not completely true. There are some
> XV>> networks that are meshed. but most of wireless are point to point
> XV>> or hub and spoke. (e.g wifi, ble, lorawan, lte, etc...)
> 
> FT> even in WiFi, we may have inter-BSS transmissions. Similarly, we may
> have several AP that desserve a STA. But I agree, it has to be clarified,
> and ”meshed” is probably not  the right term. "Wireless networks are
> broadcast by nature: a radio transmission can be decoded by any radio
> neighbor.
> In multihop wireless networks, several paths exist between two endpoints.
> In hub networks, a device may be covered by several Access Points.
> We should choose the most efficient path or AP, concerning specifically
> the reliability, and the delay.”
> 
> 
> 
> Wireless networks are meshed by nature: we have many redundant radio
> links.  These meshed networks are both an asset and a drawback: while
> several paths exist between two endpoints, and we should choose the most
> efficient one(s), concerning specifically the reliability, and the delay.
> XV>> Note that the statements in the previous paragraph also apply to
> non-meshed networks, in a WiFi deployment you can have multiple APs so
> there can be potentially multiple receivers for an emitting node.
> 
> FT> exactly what I had in mind :-) I reformulated also this paragraph:
> "Thus, multipath routing / multi-attachment can be considered to make the
> network fault-tolerant.
> Even better, we can exploit the broadcast nature of wireless networks to
> exploit: we may have multiple Maintenance Intermediate Endpoints (MIP)
> for each of this kind  of hop.
> While it may be reasonable in the multi-attachment case, the complexity
> quickly increases with the path length.
> Indeed, each Maintenance Intermediate Endpoint has several possible next
> hops in the forwarding plane.
> Thus, all the possible paths between two maintenance endpoints should be
> retrieved, which may quickly become intractable if we apply a naive
> approach.
> 
> 
> 
> 
> Thus, multipath routing can be considered to make the network fault-
> tolerant.  Even better, we can exploit the broadcast nature of wireless
> networks to exploit meshed multipath routing: we may have multiple
> Maintenance Intermediate Endpoints (MIP) for each hop in the path.  In
> that way, each Maintenance Intermediate Endpoint has several possible
> next hops in the forwarding plane.  Thus, all the possible paths between
> two maintenance endpoints should be retrieved, which may quickly become
> untractable if we apply a naive approach.
> 
> XV>> Same here, IMHO this can be generalized beyond mesh networks. In
> XV>> 1-hop networks we can still apply OAM methods and exploit physical
> XV>> redundacy (e.g, dual radio, multiple APs or base stations, etc..)
> 
> FT> I use now the term multi-attachment, but I agree; that’s the same
> concept.  Thank you for raising this distinction.
> 
> 
> 
> 
> 3.5.  Fault Verification/detection
> 
> Wired networks tend to present stable performances.  On the contrary,
> wireless networks are time-variant.  We must consequently make a
> distinction between _normal_ evolutions and malfunction.
> 
> 
> 
> 
> 
> 
> 
> Theoleyre, et al.       Expires November 25, 2021               [Page 9]
> 
> Internet-Draft            OAM features for RAW                  May 2021
> 
> 
> 3.6.  Fault Isolation/identification
> 
> The network has isolated and identified the cause of the fault.
> While DetNet already expects to identify malfunctions, some problems are
> specific to wireless networks.  We must consequently collect metrics and
> implement algorithms tailored for wireless networking.
> 
> For instance, the decrease in the link quality may be caused by several
> factors: external interference, obstacles, multipath fading, mobility.
> It it fundamental to be able to discriminate the different causes to make
> the right decision.
> 
> 4.  Administration
> 
> The RAW network has to expose a collection of metrics to support an
> operator making proper decisions, including:
> 
> o  Packet losses: the time-window average and maximum values of the
> number of packet losses have to be measured.  Many critical applications
> stop to work if a few consecutive packets are dropped;
> 
> o  Received Signal Strength Indicator (RSSI) is a very common metric in
> wireless to denote the link quality.  The radio chipset is in charge of
> translating a received signal strength into a normalized quality
> indicator;
> 
> o  Delay: the time elapsed between a packet generation / enqueuing and
> its reception by the next hop;
> 
> o  Buffer occupancy: the number of packets present in the buffer, for
> each of the existing flows.
> 
> o  Battery lifetime: the expected remaining battery lifetime of the
> device.  Since many RAW devices might be battery powered, this is an
> important metric for an operator to take proper decisions.
> 
> o  Mobility: if a device is known to be mobile, this might be considered
> by an operator to take proper decisions.
> 
> These metrics should be collected per device, virtual circuit, and path,
> as detnet already does.  However, we have to face in RAW to a finer
> granularity:
> 
> XV>> I would add also per physical interface. We may have more than one
> physical radio technology operating on different bands, etc.
> 
> FT> you’re entirely right! I updated this part.
> 
> 
> 
> o  per radio channel to measure, e.g., the level of external
> interference, and to be able to apply counter-measures (e.g.,
> blacklisting).
> 
> 
> 
> 
> Theoleyre, et al.       Expires November 25, 2021              [Page 10]
> 
> Internet-Draft            OAM features for RAW                  May 2021
> 
> 
> o  per link to detect misbehaving link (assymetrical link, fluctuating
> quality).
> 
> o  per resource block: a collision in the schedule is particularly
> challenging to identify in radio networks with spectrum reuse.  In
> particular, a collision may not be systematic (depending on the radio
> characteristics and the traffic profile)
> 
> 4.1.  Worst-case metrics
> 
> RAW inherits the same requirements as DetNet: we need to know the
> distribution of a collection of metrics.  However, wireless networks are
> known to be highly variable.  Changes may be frequent, and may exhibit a
> periodical pattern.  Collecting and analyzing this amount of measurements
> is challenging.
> 
> Wireless networks are known to be lossy, and RAW has to implement
> strategies to improve reliability on top of unreliable links.
> XV>> to me the following sentence needs more context. It is hard to
> XV>> understand why you introduce here Hybrid ARQ
> Hybrid
> Automatic Repeat reQuest (ARQ) has typically to enable retransmissions
> based on the end-to-end reliability and latency requirements.
> FT> Thank you, I reformulated this part ton give more detailed
> explanations: "Wireless networks are known to be lossy, and RAW has to
> implement strategies to improve reliability  on top of unreliable links.
> Reliability is typically achieved through Automatic Repeat Request (ARQ),
> and Forward Error Correction (FEC).
> Since the different flows have not the same SLO, RAW must adjust the ARQ
> and FEC based on the link and path characteristics. "
> 
> 
> 
> 4.2.  Efficient data retrieval
> 
> We have to minimize the number of statistics / measurements to
> exchange:
> 
> o  energy efficiency: low-power devices have to limit the volume of
> monitoring information since every bit consumes energy.
> 
> o  bandwidth: wireless networks exhibit a bandwidth significantly lower
> than wired, best-effort networks.
> 
> o  per-packet cost: it is often more expensive to send several packets
> instead of combining them in a single link-layer frame.
> 
> 
> In conclusion, we have to take care of power and bandwidth consumption.
> The following techniques aim to reduce the cost of such
> maintenance:
> 
> on-path collection: some control information is inserted in the data
> packets if they do not fragment the packet (i.e., the MTU is not
> exceeded).  Information Elements represent a standardized way to handle
> such information;
> 
> XV>> Should we consider the IP hop by hop extension headers?
> FT> good idea: "IP hop by hop extension headers may help to collect
> metrics all along the path;"
> 
> 
> 
> flags/fields: we have to set-up flags in the packets to monitor to be
> able to monitor the forwarding process accurately.  A sequence number
> field may help to detect packet losses.  Similarly, path
> 
> 
> 
> Theoleyre, et al.       Expires November 25, 2021              [Page 11]
> 
> Internet-Draft            OAM features for RAW                  May 2021
> 
> 
> inference tools such as [ipath] insert additional information in the
> headers to identify the path followed by a packet a posteriori.
> 
> hierarchical monitoring; localized and centralized mechanisms have to be
> combined together.  Typically, a local mechanism should contiuously
> monitor a set of metrics and trigger distant OAM exchances only when a
> fault is detected (but possibly not identified).  For instance, local
> temporary defects must not trigger expensive OAM transmissions.
> 
> XV>> This is very relevant. The end-to-end reliability, etc.. can also be
> a representation of the wireless link performance in an end-to-end path
> with wired and last mile wireles hop. This is because usually the weaker
> hop is the wireless one. So having  different levels of monitoring can be
> a way to go.
> 
> FT> yes, I agree. I updated the draft to integrate this remark "Besides,
> the wireless segments represent often the weakest parts of a path: the
> volume of control information they  produce has to be fixed accordingly.
> "
> 
> 
> 
> 4.3.  Reporting OAM packets to the source
> 
> TODO: statistics are collected when a packet goes from the source to the
> destination.  However, it has to be also reported by the source.
> Problem: resource may not be reserved bidirectionnaly.  Even worse:
> the inverse path may not exist.
> 
> XV>> To me, having this heirarchical monitoring can be helpful. Devices
> may take local decisions when possible and receive end-to-end information
> when possible.
> 
> FT>> thank you: "Reporting everything exhaustively to the source may in
> most cases too exensive.
> Thus, devices may take local decisions when possible, and receive end-to-
> end information when possible.”
> 
> 
> 
> 5.  Maintenance
> 
> Maintenance needs to facilitate the maintenance (repairs and upgrades).
> In wireless networks, repairs are expected to occur much more frequently,
> since the link quality may be highly time-variant.
> Thus, maintenance represents a key feature for RAW.
> 
> 5.1.  Soft transition after reconfiguration
> 
> Because of the wireless medium, the link quality may fluctuate, and the
> network needs to reconfigure itself continuously.  During this transient
> state, flows may begin to be gradually re-forwarded, consuming resources
> in different parts of the network.  OAM has to make a distinction between
> a metric that changed because of a legal network change (e.g., flow
> redirection) and an unexpected event (e.g., a fault).
> 
> 5.2.  Predictive maintenance
> 
> RAW needs to implement self-optimization features.  While the network is
> configured to be fault-tolerant, a reconfiguration may be required to
> keep on respecting long-term objectives. Obviously, the network keeps on
> respecting the SLO after a node's crash, but a reconfiguration is
> required to handle the future faults. In other words, the reconfiguration
> delay MUST be strictly smaller than the inter-fault time.
> 
> The network must continuously retrieve the state of the network, to judge
> about the relevance of a reconfiguration, quantifying:
> 
> 
> 
> 
> Theoleyre, et al.       Expires November 25, 2021              [Page 12]
> 
> Internet-Draft            OAM features for RAW                  May 2021
> 
> 
> the cost of the sub-optimality: resources may not be used optimally
> (e.g., a better path exists);
> 
> the reconfiguration cost: the controller needs to trigger some
> reconfigurations.  For this transient period, resources may be twice
> reserved, and control packets have to be transmitted.
> 
> Thus, reconfiguration may only be triggered if the gain is significant.
> 
> 
> Many thanks for all your very constructive comments Xavi!
> 
> Cheers,
> Fabrice
> 
> 
> --
> RAW mailing list
> RAW@ietf.org
> https://www.ietf.org/mailman/listinfo/raw
> --
> RAW mailing list
> RAW@ietf.org
> https://www.ietf.org/mailman/listinfo/raw