Re: [Raw] FW: How do tracks differ from TE protection paths? was: Some comments/questions on RAW Architecture

Lou Berger <lberger@labn.net> Sat, 22 October 2022 15:16 UTC

Return-Path: <lberger@labn.net>
X-Original-To: raw@ietfa.amsl.com
Delivered-To: raw@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ECA7EC1524CB for <raw@ietfa.amsl.com>; Sat, 22 Oct 2022 08:16:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 3.09
X-Spam-Level: ***
X-Spam-Status: No, score=3.09 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, GB_SUMOF=5, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=labn.onmicrosoft.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x-4qaMen-SyE for <raw@ietfa.amsl.com>; Sat, 22 Oct 2022 08:16:46 -0700 (PDT)
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on2104.outbound.protection.outlook.com [40.107.93.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F3C1BC1522BF for <raw@ietf.org>; Sat, 22 Oct 2022 08:16:45 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DhRT4crVPzPKQjDAcWVnUNqZXrtaCMuu+oq/kDvWO93paHfuVqzaCuzOytMok6seyniO/ja7IGTGU7rpgA2zaXtxIaun1rMnBWv2n/UtvWqgApyGcjSj/vRse7OrsrtP2qnUFTQW+LyNMmPB+4tcFuV4a+VedkePVZ2wygFNh3vefHncx5CH2IyWFRsjAY/X8h8M3rh5ITGZfaOc7eNACgKwbUosYxoRnI3tOfZRiSd5UdLfiOhx10XWPZn5Aex+dPJPbTd57QoDauC2Rm2kh3DloEDCG+a1cvQMsRnIULpcHvAWrSVV/hKscJ1JpjWC6Kf39nB4WmeMCqY4uiAyoA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=UILiDsyt7EjMBQi19UbE+bKnki7n41/5n55AqPlH7Ec=; b=dQUM1rF7r+Zf7x1jukWhKaDdfmoeDBpYkXWQUjG5Fq6WGe4kmY532lcnTwx0v3u/JEKcs8CjA8QlxcIhTnOZx0NiFCuhTRlOa3gw7uv37Mk1KH3wjeKuBkmqQqquC1jBIY5ll/fzHm3w7S9gLE35tTZj23eez2p1BItxEO7pSBFGkTcMlj9CQzZeNq13FoAvrWOlpUF2ObK+f6Q1pveUWRMg8QJjohsQw3tPCskw7PznU2by5JxaC3i0cCgEa+tmFRtUojuZtGr5FoT2hj3C90+FgRWXSr9anZ3ZZuSc1zxd72AraaZjdGztgD0dnVezzZYqhN2Bdr1xXcMlZV6z5w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=labn.net; dmarc=pass action=none header.from=labn.net; dkim=pass header.d=labn.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=labn.onmicrosoft.com; s=selector2-labn-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UILiDsyt7EjMBQi19UbE+bKnki7n41/5n55AqPlH7Ec=; b=rs0BVB25mIkT2MYm5v/Ne8SubKI0ZqMXgXjHukitAv4YMWbasWrCrvdJUUop/EKAnhJ/Z773CtU5Izcw1xniOZCthISxFWT6knKFeQ2yrwJV5jCmChM5l1SaZRwAUKAhkJPpw4bvojt5VTiFGeSC+6SFLWiX6VAYCha207z5EfI=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=labn.net;
Received: from SJ0PR14MB4792.namprd14.prod.outlook.com (2603:10b6:a03:379::24) by SJ0PR14MB4616.namprd14.prod.outlook.com (2603:10b6:a03:371::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5723.37; Sat, 22 Oct 2022 15:16:41 +0000
Received: from SJ0PR14MB4792.namprd14.prod.outlook.com ([fe80::bc3e:efa5:ee99:d62f]) by SJ0PR14MB4792.namprd14.prod.outlook.com ([fe80::bc3e:efa5:ee99:d62f%6]) with mapi id 15.20.5746.021; Sat, 22 Oct 2022 15:16:41 +0000
Message-ID: <b2e6f622-c446-541d-55bc-ba853ad1c4c9@labn.net>
Date: Sat, 22 Oct 2022 11:16:36 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.4.0
From: Lou Berger <lberger@labn.net>
To: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
Cc: "raw@ietf.org" <raw@ietf.org>
References: <CO1PR11MB48818597A1A0DC9298296077D8F79@CO1PR11MB4881.namprd11.prod.outlook.com> <CO1PR11MB488192870611FA459824DF3AD8999@CO1PR11MB4881.namprd11.prod.outlook.com> <9ca88f4d-02b5-3446-d7ae-ecfe78f354c8@labn.net> <CO1PR11MB48811ACDA4B6AA79FBF324EED8999@CO1PR11MB4881.namprd11.prod.outlook.com> <CO1PR11MB48813E7C03ABA632E702D988D8489@CO1PR11MB4881.namprd11.prod.outlook.com> <b67879f6-2deb-9d20-dd0d-a163ba465d54@labn.net> <CO1PR11MB48811B83EE50F19A713AD610D82B9@CO1PR11MB4881.namprd11.prod.outlook.com>
Content-Language: en-US
In-Reply-To: <CO1PR11MB48811B83EE50F19A713AD610D82B9@CO1PR11MB4881.namprd11.prod.outlook.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: BL1P223CA0025.NAMP223.PROD.OUTLOOK.COM (2603:10b6:208:2c4::30) To SJ0PR14MB4792.namprd14.prod.outlook.com (2603:10b6:a03:379::24)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: SJ0PR14MB4792:EE_|SJ0PR14MB4616:EE_
X-MS-Office365-Filtering-Correlation-Id: fa91beaa-6049-4d5d-1614-08dab4406c0c
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR14MB4792.namprd14.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(136003)(376002)(39830400003)(346002)(396003)(366004)(451199015)(31686004)(36756003)(66899015)(38100700002)(8936002)(5660300002)(6862004)(83380400001)(66476007)(86362001)(31696002)(26005)(6512007)(186003)(6666004)(2616005)(478600001)(66556008)(966005)(6486002)(316002)(2906002)(41300700001)(4326008)(8676002)(66946007)(30864003)(6506007)(53546011)(43740500002)(45980500001); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-OriginatorOrg: labn.net
X-MS-Exchange-CrossTenant-Network-Message-Id: fa91beaa-6049-4d5d-1614-08dab4406c0c
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR14MB4792.namprd14.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Oct 2022 15:16:41.1078 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: eb60ac54-2184-4344-9b60-40c8b2b72561
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 5YHNYfNP04vIFOq3yv1bh4AhvyAZ2/my6wDu530EPzZWh5XPcUnL2bcJzbP03NchAic7r4aVE5UdWeOE2gFbjw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR14MB4616
Archived-At: <https://mailarchive.ietf.org/arch/msg/raw/fAKdOlr0l0Otqz-My0fmVMc4yr4>
Subject: Re: [Raw] FW: How do tracks differ from TE protection paths? was: Some comments/questions on RAW Architecture
X-BeenThere: raw@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: reliable and available wireless <raw.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/raw>, <mailto:raw-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/raw/>
List-Post: <mailto:raw@ietf.org>
List-Help: <mailto:raw-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/raw>, <mailto:raw-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Oct 2022 15:16:50 -0000

[this may be a resend, if so please ignore it...]

Hi Pascal

I think it would be helpful to delineate the routing (control-centric) 
aspects and forwarding
(data-plane) aspects of the topic.

I think your message/response below is focused on the forwarding 
(data-plane)perspective -- see below for in line response.

 From the routing (control-centric)  perspective -

The draft-09 says:

   ... The Track is preestablished and installed
    by means outside of the scope of RAW; it may be strict or loose
    depending on whether each or just a subset of the hops are observed
    and controlled by RAW.

To me this is no different from protection segments and or paths 
(including FRR) that already exist for DetNet or even in the broader 
TEAS WG context.  Those paths can be created by any control(ler)-plane 
mechanisms, may contain strict or loos hops and may be per-established 
or established as needed.

Where do you see uniqueness / differentiation with "tracks" from the 
routing (control-centric)  perspective?

On 10/19/2022 12:52 PM, Pascal Thubert (pthubert) wrote:
> Hello Lou:
>
> I'm using Quantum physics as an image. For me, a Track is to a TE path what an atomic orbital is to a planetary orbit.
>
> The orbit is a predictable fact, and a path is observable after the fact.
>
> A Track cannot be observed; it only represents the aggregate of the possible places that the packet may traverse. But due to PSE activities we do not know in advance (before PSE computes it) which places a packet will attempt to traverse. And because of wireless loss, even after the PSE decision we are not sure that the packet will traverse those places.

I continue to think / see nothing truly different here.

in 1:N protection - a set of "possible" paths can support packet delivery.

in 1+N protection - there is no way for an observer outside the 
protection domain to know which of the protection paths actually was 
used to transport delivered information/packets.

> If the packet is split and network coded, codes will be at different places at each point of time, so the packet will effectively be in multiple states at the same time, and not necessarily precisely somewhere at a specific time.

Sure, network coding does NOT fit into the existing protection DetNet/TE 
mechanisms, but it does fit in the larger DetNet architecture, so 
whatever is defined WRT coding should be applicable to any (wired and 
wireless) technology.

> My concern is that if we keep overloading the term path, we are losing the capability to describe anything precisely, we forget what we talk about. A track is the aggragtion of feasible path, not a path, and it is used statistically, not definitely.

So there may be difference in the protection selection function than 
exists on the transmit side of 'tracks' (aka paths)  where in the 
forwarding plane, the active track/path is selected at packet 
transmission time.  I think this is closer/but not exactly the same as 
1:N, may be the same as fast reroute protection (It's been a while since 
I've done anything with FRR, but maybe someone else on the list can 
chime in), and different from 1+1 where the section is on done per 
packet at the MP/protection termination point.  If there is something 
new, we can limit the new terminology to what is actually new (a perhaps 
1&N protection with new PLR behavior.)


> A bit more inline below 😊
>
> All the best,
>
> Pascal
>
>> -----Original Message-----
>> From: Lou Berger<lberger@labn.net>
>> Sent: vendredi 23 septembre 2022 21:14
>> To: Pascal Thubert (pthubert)<pthubert@cisco.com>
>> Cc:raw@ietf.org
>> Subject: Re: FW: How do tracks differ from TE protection paths? was: Some
>> comments/questions on RAW Architecture
>>
>> Hi Pascal,
>>
>> On 9/16/2022 9:02 AM, Pascal Thubert (pthubert) wrote:
>>> Dear Lou:
>>>
>>> I'm trying to figure out what's left to be added to the RAW
>> architecture. So I'm going again through our collection of old emails.
>>> I went through RFC 4426 and RFC 4427 as you suggested. Consistent with
>> my earlier understanding, 1+1 only does the R in PREOF, and only at the
>> ingress.
>>
>> GMPLS Segment Recovery, RFC4873, and Fast reroute RFC4090 are two examples
>> of RE performed in the middle of the network.
> Fast reroute is a path update. The orbit has changed but it is still not an orbital.

I'm sorry, I'm not following. Once the path/track is established, FRR 
can effectively use a primary or backup path as the PLR chooses.

>
>>>    RFC 6372 also deals with linear (not graph) protection and P2MP is
>> just a collection of that where the property of each link is essentially
>> the same as above.
>>> Since it does not have E and O, there needs to be an active switch over
>> at the egress. The consequence is that for a packet there is effectively a
>> path that is selected by the receiver and that all packets will follow
>> till the receiver end switches.
>> I agree, that the above do not include sequence numbers to support O.
>> But O is not a strict requirement at the IP layer in the general IP case
>> at the network layer, as I'm sure you know.
>>> RAW has PAREO active all along the Track, with dynamic decision-making
>> either at egress or even deep in the graph. The graph is not a series of
>> parallel oriented paths. The graph is the sum of all potential and
>> overlapping paths that packets of the flow may experience, and there is no
>> decision at egress on which path is selected. I guess that the first
>> packet that is received for a sequence and is retained and reordered.
>>
>> 1:1 and 1:n (and I think) FRR basically upstream selects on which path
>> to use, only 1+1 (like PREOFF) and 1+n have downstream/receiver selects
>> (of data to use).
> I do not see that. The path is updated, but is still definitely something not an aggregate of statistical chances.
FRR doesn't require a path update to forward along either the backup or 
primary paths. (It does signal for information purposes, but forwarding 
takes place independent of any signaling)

Thanks,

Lou

>
>>> OTOH the art of TEAS seems consistent with the rest of IETF literature
>> that describes the path as the experience of a packet (see refs in the
>> draft), whereby it is known at a each point of time which path packets of
>> the flow will experience. A Track is the quantum physics of that, all
>> probabilistic, and the path is only known when the packet is received.
>> Please be sensitive to the difference in nature of those 2 objects.
>>
>> I don't understand your comment about at the physics level.  RAW isn't
>> about defining wave forms (in ITU speak, media channels) but rather
>> about using such for IP.  If you're alluding to the "overhearing" that
>> is possible in wireless - how is it so different than sending an IP
>> packet (unicast or multicast) over a ethernet multicast and letting
>> multiple receivers process/forward the packet.
>>
>>> In my book that's enough difference to call it differently, and to
>> differentiate the measurable path from the potential Track.
>>> Do I (finally) manage to make sense?
>> I suspect we're still talking past each other.
>>
>> Thanks!
>>
>> Lou
>>
>>> Pascal
>>>
>>>
>>>
>>>
>>>
>>>> -----Original Message-----
>>>> From: RAW<raw-bounces@ietf.org>  On Behalf Of Pascal Thubert (pthubert)
>>>> Sent: vendredi 29 juillet 2022 17:58
>>>> To: Lou Berger<lberger@labn.net>
>>>> Cc:raw@ietf.org
>>>> Subject: Re: [Raw] FW: How do tracks differ from TE protection paths?
>> was:
>>>> Some comments/questions on RAW Architecture
>>>>
>>>> Thank you, Lou, I'll look at it, though probably not today.
>>>>
>>>> Compared to 1:N, a Track has replication + elimination + overhearing
>> inside
>>>> the graph east-west and north/south synchronization. It also enables
>>>> spreading coded fragments. It can be seen as the aggregation of all the
>>>> possible and partially congruent paths that you can use for a packet.
>> That's
>>>> not what I'm used to figure for N:1. I'd like to find words that relate
>> the
>>>> concepts and yet carry the difference to place in the definition.
>>>>
>>>> I've already been working on edition to indicate that the controller
>> plane is
>>>> not necessarily centralized, and that the PAREO function may be
>> controlled
>>>> from the detnet service layer but actuated in the lower layers, which
>> is the
>>>> case of other things already. I hope I can push the github for the
>> proposed
>>>> diff for at least this before I disappear for 2 weeks.
>>>>
>>>>
>>>>
>>>> Enjoy summer!
>>>>
>>>> Pascal
>>>>
>>>>
>>>>
>>>>> -----Original Message-----
>>>>> From: Lou Berger<lberger@labn.net>
>>>>> Sent: vendredi 29 juillet 2022 17:37
>>>>> To: Pascal Thubert (pthubert)<pthubert@cisco.com>
>>>>> Cc:raw@ietf.org
>>>>> Subject: Re: FW: How do tracks differ from TE protection paths? was:
>>>>> Some comments/questions on RAW Architecture
>>>>>
>>>>> Hi Pascal,
>>>>>
>>>>> On 7/29/2022 9:19 AM, Pascal Thubert (pthubert) wrote:
>>>>>> Dear RAWers:
>>>>>>
>>>>>> Resending with additions:
>>>>>>
>>>>>> -----Original Message-----
>>>>>> From: Pascal Thubert (pthubert)
>>>>>> Sent: vendredi 22 avril 2022 17:09
>>>>>>
>>>>>> Lou said:
>>>>>> "
>>>>>>> In reading the definition of the tracks, the term seems quite
>>>>> aligned/similar to TE protection paths and segments.
>>>>>>> Keep in mind that DetNet PREOF is just one form of service
>>>>>>> restoration
>>>>> supported in IETF TE, i.e., the 1+1 form.
>>>>>>> A track reads to me to be something that can be composed or combine
>>>>>>> 1:1,
>>>>> 1:N and even 1+N, and have interesting (uncoordinated) protection
>>>>> switching based on actual network/link (channel) state.  I suspect we
>>>>> can accomplish the same objectives as Tracks and stay consistent with
>>>>> existing DetNet and
>>>>> TE(AS) terminology.
>>>>>> "
>>>>>>
>>>>>> My short answer:
>>>>>> There's too much preconception with the term path as an experience
>>>>>> and
>>>>> too much slight overload of the term path in different WGs, sometimes
>>>>> without a clear terminology but rather an intuition that means
>> confusion.
>>>>> We need a term that reflects the statistical expectation and
>>>>> overloading path will entertain / augment the existing confusion.
>>>>> Defining Track allows us to point explicitly on what happens at DetNet
>>>>> and RAW that is really new.
>>>>>> The difference between a path and a Track is subtle. A path is an
>>>>> experience, a Track is a collection of potential experiences. Worse: a
>>>>> Track may be flooded with network coded fragments of the datagram, so
>>>>> there's no such a thing as the path that the datagram followed. Still
>>>>> I see the need to position Track and Protection Path (which in most
>>>>> findings in google reads as path B when path A fails). Could you
>>>>> please provide a pointer to the TE terminology?
>>>>> I really think this work can be informed by the prior protection work
>>>>> done for TE in the IETF.  I wish it was nicely summarized in
>>>>> draft-ietf-teas- rfc3272bis-20, but it isn't.  Probably the best
>>>>> references are: rfc4426, rfc4427, and rfc6372.
>>>>>
>>>>> I think what you are describing with tracks and PSEs are 1:N span
>>>>> protection with Unidirectional (recovery) switching over DetNet member
>>>>> flows (which use paths).
>>>>>
>>>>> Can you take a look at the references and see what you think?
>>>>>
>>>>> Thanks,
>>>>>
>>>>> Lou
>>>>>
>>>>>> Longer answer:
>>>>>>
>>>>>> My view is that the concept of path in the art of IETF is
>>>>>> incompatible
>>>>> with that of Track because a path has the classical IP expectation of
>>>>> 1 packet in, the same packet along, and then out. In TE, even in the
>>>>> 1+N case, the packet is replicated first, and then each copy follows a
>>>>> path where the assumption above stands. A  copy is an atom that
>>>>> remains in its integrity along the path. The path can thus be defined
>>>>> after the fact as the experience of the (copy of the) packet. And we
>>>>> can define a protection path as a set of such paths for multiple
>>>>> copies, either sent at the same time or deferred.
>>>>>> I believe that in RAW, and even in DetNet, the capability to
>>>>>> replicate
>>>>> inside the network already defeats that definition. When a packet is
>>>>> replicated inside the network, which one is the original that follows
>>>>> the path? What is the path for the copy? If a relay fragments a packet
>>>>> into N frags, uses network coding N->P, P>N between the fragments as
>>>>> redundancy technique, and then distributes the fragments across the
>>>>> feasible next- segments within the Track, the packet is not more an
>>>>> atom, and there's no "path" that the packet experiences. The packet is
>>>>> literally disseminated (as opposed to flooded as an atom) and
>> reconstituted
>>>> at arrival.
>>>>>> If I'm unclear, maybe a quantic analogy will help. The path is the
>>>>> observation/measurement of how an atomic packet traversed the network
>>>>> (which hole the photon passed through). In the case of network coded
>>>>> fragments, there are superimposed "path" states, each with its own
>>>>> probability. The Track describes the superimposition, not the
>> measurement.
>>>>> It is expressed as the set of statistical possibilities for a future
>>>>> packet, not the experience of one.
>>>>>> Note: The sum of probabilities is typically more than 1 due to
>>>>>> redundancy
>>>>> methods, and the PSE dynamically DECIDEs the new values for those
>>>>> statistics to place them on segments that appear to work at this time
>>>>> based on ORIENTation by the PCE (D and O in OODA).
>>>>>> In terms of IETF inheritance, the term Track is already defined in
>>>>>> the
>>>>> art of a deterministic wireless RFC (RFC 9030) and a method to program
>>>>> Tracks in a wireless network is being defined at ROLL
>>>>> (draft-ietf-roll-dao- projection). The definition of Track at RAW,
>>>>> ROLL, and 6TiSCH are consistent, though ROLL can only build Tracks
>>>>> that are DODAGs (it cannot build bidir North/South segments).
>>>>>> I hope this helps,
>>>>>>
>>>>>> Pascal
>>>>>>
>>>>>>
>>>>>> -----Original Message-----
>>>>>> From: Lou Berger<lberger@labn.net>
>>>>>> Sent: lundi 21 mars 2022 2:25
>>>>>> To:draft-ietf-raw-architecture@ietf.org
>>>>>> Cc: RAW WG<raw@ietf.org>
>>>>>> Subject: Some comments/questions on RAW Architecture
>>>>>>
>>>>>> Pascal, Georgios,
>>>>>>
>>>>>> In looking to provide input on the framework document I realized I
>>>>>> had
>>>>> some basic questions on the architecture document. While I also have
>>>>> more detailed comments/questions on the Architecture document, I'll
>>>>> stick to the high level comments/questions here. Also, my apologies
>>>>> for not getting them out sooner, but I figured it was still better to
>>>>> document here than just "at the mic" in tomorrow's session.
>>>>>> 1) What does the term "RAW" refer to in the context of the
>> architecture?
>>>>>> Is it a new/standalone set of mechanisms or is it an addition or an
>>>>> extension, or a usage of IETF defined technologies?
>>>>>> I find that reading the architecture, I'm really  unsure.  The
>>>>>> current working is a bit mixed, e.g.,
>>>>>>
>>>>>>        Reliable and Available Wireless (RAW) provides for high
>> reliability
>>>>>>        and availability for IP connectivity over a wireless medium.
>>>>>>
>>>>>> this sounds like something new/independent
>>>>>>
>>>>>>        It builds on the DetNet Architecture and
>>>>>>        discusses specific challenges and technology considerations
>>>>>> needed
>>>>> to
>>>>>>        deliver DetNet service utilizing scheduled wireless segments
>> and
>>>>>>        other media, e.g., frequency/time-sharing physical media
>> resources
>>>>>>        with stochastic traffic.
>>>>>>
>>>>>> this sounds evolutionary.
>>>>>>
>>>>>> I was expecting the RAW WG to build on DetNet and other IETF Traffic
>>>>> Engineering (TE)  bodies of work. In other works something along the
>>>>> lines
>>>>> of:
>>>>>>         The RAW Architecture builds on the DetNet Architecture and
>>>>>>         standard IETF Traffic Engineering concepts and mechanisms to
>>>>>>        deliver service across any combination of wired and wireless
>>>>>>        network segments. ...
>>>>>>
>>>>>> I think the document and the used terminology must be clear even
>>>>>> we're
>>>>>> (understandably) loose in the usage of the "RAW" term in our
>> discussions.
>>>>>> 2) Are RAW solutions limited to IPv6 and a limited set of wireless
>>>>> technologies?  I think the framework says/implies no, but the
>>>>> architecture is less inclusive. e.g.,
>>>>>>        RAW provides DetNet elements that are specialized for IPv6
>> flows
>>>>>>        [IPv6] over selected deterministic radios technologies [RAW-
>>>>> TECHNOS].
>>>>>> I would expect that at least at the Architecture level that there
>>>>>> would
>>>>> be no exclusion of IETF networking technologies (including v4 and
>>>>> MPLS) and any SDO-defined wireless technology.  I certainly understand
>>>>> needing to focus and prioritize work on specific technologies, but
>>>>> that is practical choice not a limitation that should be codified in
>> the
>>>> architecture.
>>>>>> Somewhat related, but of less importance, it's probably worth
>>>>>> mentioning
>>>>> that RAW forwards/switches at the IP, not link layer.
>>>>>> 3) How do tracks differ from TE protection paths?
>>>>>>
>>>>>> In reading the definition of the tracks, the term seems quite
>>>>>> aligned/similar to TE protection paths and segments.  Keep in mind
>>>>>> that DetNet PREOF is just one form of service restoration supported
>>>>>> in IETF TE, i.e., the 1+1 form.  A track reads to me to be something
>>>>>> that can be composed or combine 1:1, 1:N and even 1+N, and have
>>>>>> interesting
>>>>>> (uncoordinated) protection switching based on actual network/link
>>>>>> (channel) state.  I suspect we can accomplish the same objectives as
>>>>> Tracks and stay consistent with existing DetNet and TE(AS)
>> terminology.
>>>>>> 4) Is RAW limited to PCE-based centralized solutions?
>>>>>>
>>>>>> DetNet introduced the term Controller Plane to cover all types of
>>>>>> control
>>>>> supported by the IETF TE architecture, i.e., fully centralized, fully
>>>>> distributed, or any hybrid combination of centralized/distributed
>>>>> control.  The Architecture reads as supporting only one combination of
>>>>> - PCE for paths, PSEs for tracks (aka protection segments) .   PSEs
>>>>> read as also doing the actual protection switching, but this is
>>>>> outside the scope of this comment.
>>>>>> Hereto, I see no reason for the architecture to limit the scope of
>>>>>> the Controller Plan solutions that could be standardized as part of
>> RAW.
>>>>>> (Yes PCE-based approaches are likely the first to be standardized,
>>>>>> but that's not an architecture level decision.)
>>>>>>
>>>>>>
>>>>>> Those are my top comments.  While substantive, I suspect addressing
>>>>>> these
>>>>> comments will result in some refactoring and rewording -- but not a
>>>>> major change to the document.
>>>>>> Thank you, and speak to you soon. (Unfortunately, just virtually
>>>>>> this
>>>>>> meeting...)
>>>>>>
>>>>>> Lou
>>>>>>
>>>>>>
>>>> --
>>>> RAW mailing list
>>>> RAW@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/raw