[Raw] How do tracks differ from TE protection paths? was: Some comments/questions on RAW Architecture

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Fri, 22 April 2022 15:09 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: raw@ietfa.amsl.com
Delivered-To: raw@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C7BAB3A1709; Fri, 22 Apr 2022 08:09:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.607
X-Spam-Level:
X-Spam-Status: No, score=-4.607 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, GB_SUMOF=5, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=ZzeL/D5n; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=t64TZcz7
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yWbwJ8xVAhjy; Fri, 22 Apr 2022 08:09:35 -0700 (PDT)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D59C33A1705; Fri, 22 Apr 2022 08:09:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=10876; q=dns/txt; s=iport; t=1650640174; x=1651849774; h=from:to:cc:subject:date:message-id: content-transfer-encoding:mime-version; bh=cDepN3K6gtiAHE8bYo8Mmzjj5Vn7INCeu2NM/rO/0cw=; b=ZzeL/D5niuh0rwHne6/3OYaQ8zXciawDEz98rSs4nYlzylVF8jlsU8QW BxIc2I2IVauQpRrGsIxPwY8hobWyzuTfNbsbVOa8heVwpkpRAhTHWO6+w HMJCRxdC67c0wV5Agh8gj22JTc8HADeqa5vUWAkQRvQVhfMAHOaLlZbC8 8=;
X-IPAS-Result: A0BgAQB0xGJimIUNJK1agQmBVoFSKAYofFo5Q4RUg0oDhTmFD4MCA5s9gUKBEQNUCwEBAQ0BAUIEAQGFAwIWhHYCJTcGDgECBAEBAQEDAgMBAQEBAQEDAQEFAQEBAgEHBBQBAQEBAQEBAQkUBwYMBQ4QJ4VoDYZCAQEBARURBA0MAQEuCQELBgEZAQMBAQMCJgIEMBUCBgkBBAENBQgTB4JjgmYDMQGiAwGBPgKKH3p/MoEBgggBAQYEBIUNGII4CYERLIMRhCmHRByBSUSBFUN5gT5uhAsRASqDVDeCLpxABjIMJgQyGVUCARYVHTkGAwVSCS4Pkh2DTJdykncKg0oFjluHX4liFYN0kxiRR5ZfIKFGhQoCBAIEBQIOAQEGgXeBf3AVgyRRGQ+OLA0JFW8BBIJHil0BdTsCBgEKAQEDCYp3ASeCIAEB
IronPort-PHdr: A9a23:77q+GB0AgA0BZRwEsmDPr1BlVkEcU/3cMg0U788hjLRDOuSm8o/5N UPSrfNqkBfSXIrd5v4F7oies63pVWEap5rUtncEfc9AUhYfgpAQmAotSMeOFUz8KqvsaCo3V MRPXVNo5Te1K09QTc3/fFbV5Ha16G16Jw==
IronPort-Data: A9a23:OTNzCa3cHPLIqEWohfbD5exxkn2cJEfYwER7XKvMYLTBsI5bpz1Rn 2NLDG6FPfaPMzb2fNlyYIzn8EICvZ7dzIJiSANl3Hw8FHgiRegpqji6wuYcGwvIc6UvmWo+t 512huHodZxyFjmGzvuUGuCJQUNUjclkfZKhTr+cUsxNbVU8En151Ug5w7RRbrNA2LBVPSvc4 bsenOWHULOV82Yc3rU8sv/rRLtH5ZweiRtA1rAMTakjUGz2yxH5OKkiyZSZdBMUdGX78tmSH I4vxJnhlo/QEoxE5tmNyt4XeWVSKlLe0JTnZnd+A8CfbhZ+SiMa/oUkKsc2QkdrkXaSs8tW1 9d0m9+2VlJ8VkHMsLx1vxhwGiV6O+hN/6XKZCHm98eS1EbBNXDrxp2CDmlvYtZeobgxWDoIr KdDQNwORkjra+ae2K67V+NhnNgLJ8jwN4RZsXZlpd3cJaZ6G8iTE/qQtLe02h89hO1nEcr1T PMTNxdSNUzgZxpuOk8+XcdWcOCA3ymjLGIwREiujbA+/EDSwRB/lr/3P7L9dsaDS9kQn0uEq Cfc9nu8CwsRNN2DxDGZ72ihru7CgS29X5gdfJW8/PNwj1CJ7mgaAhtQU1anycRVkWa3X9ZZb kcT4Cdr9PF0/02wRd67VBq9yJKZgvICc/ZzDPMHwiqN9rCX+CqCIXcGdxACbsNz4afaWgcW/ lOOmtroAxlmv7uUVW+R+9+oQdWaZHV9wYgqOHNscOcV3zXwiNpo10uQEL6PBIbw34OrRmCpq 9yfhHJm74j/m/LnwElSEbrvqjaoq56houUduViPBznNAu+UmOeYi2GA4Fzf67NLK5yUCwDY+ nMFgMOZqusJCPlhdRBhos1QQtlFBN7cbVUwZGKD+bF6qVxBHFb4JuhtDMlWfhsBDyr9UWaBj LXvkQ1Q/oRPG3ChcLV6ZYm8Y+xzk/W4SIS7CaqFP4sSCnSUSONh1HwxDaJ39z2y+HXAbYljU XtmWZ/2VC1DWfgPIMSeHrpCj9fHORzSNUuKFcykkHxLIJKVZWWeTv8eIUCSY+UihJ5oUy2Lm +uzw/Cikk0FOMWnO3G/2ddKcTgicChqbbir+pc/XrPSfWJORjp7Y9ePmuxJRmCQt/kP/gs+1 ivjChYwJZuWrSCvFDhmnVg+NuOyBcov8SNT0O5FFQ/A5kXPqL2HtM83H6bbt5F+nAC/5ZaYl 8U4Rvg=
IronPort-HdrOrdr: A9a23:EyJynq8SFNfSBlekwLNuk+Ftdb1zdoMgy1knxilNoENuHPBwxv rAoB1E73PJYW4qKQwdcdDpAtjlfZquz+8I3WB3B8bvYOCGghrkEGgG1+rfKlLbalXDHmA279 YaT0ETMqyTMbEYt7e03ODbKadb/DDvysnB7o2yrwYPcegAUdAG0+4NMHfjLqQAfnghOXNWLu v42uN34x6bPVgHZMWyAXcIG8LZocfQqZ7gaRkaQzY69Qinl1qTmfDHOind+i1bfyJEwL8k/2 SAuRf+/L+fv/ayzQKZ/3PP7q5RhMDqxrJ4dY2xY4kuW3XRYzSTFcZcso65zXUISSaUmRIXee z30lQd1gJImjTsly+O0F3QMkLboUkTAjfZuCGlaD3Y0JXErPZQMbsbuWqfGSGps3bI9esMoZ 5jziaXsYFaAgjHmzm479/UVwtynk7xunY6l/UP5kYvGbf2RYUh27D3xnklWavo3RiKnbwPAa 1rFoXR9fxWeVSVYzTQuXRu2sWlWjA2Eg2dSkYPt8SJ23wO9UoJhXcw1YgahDMN5Zg9Q55L66 DNNblpjqhHSosTYbhmDOkMTMOrAijGQA7KMmiVPVP7fZt3cE7lutry+vE49euqcJsHwN87n4 nASkpRsSood0fnGaS1rep2G9D2MRGAtBjWu7JjDsJCy83BrZLQQF++dGw=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.90,282,1643673600"; d="scan'208";a="842088729"
Received: from alln-core-11.cisco.com ([173.36.13.133]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 22 Apr 2022 15:09:33 +0000
Received: from mail.cisco.com (xfe-rtp-002.cisco.com [64.101.210.232]) by alln-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id 23MF9WVk021148 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Fri, 22 Apr 2022 15:09:33 GMT
Received: from xfe-aln-002.cisco.com (173.37.135.122) by xfe-rtp-002.cisco.com (64.101.210.232) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Fri, 22 Apr 2022 11:09:31 -0400
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-002.cisco.com (173.37.135.122) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Fri, 22 Apr 2022 10:09:31 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=bFuI0mBSghhvFPhBTdcOzgGrGjW/jfp8FfdUinwE6Pj3ynbrlQoTFPB94jtvjYas1OgwUPwW+VDok/H3dTIBbDB/94xkCKkETKSoMKvPNx/RbHi5DsXxkjUfD2MMXZPYgJShjJXvp+uOsnd0v1F657xffOAEXZpbdeo9xCzJsr4QpeA6pu+KsJgJJVfL1lJQksKUYGWdEjIZm2CEcke5zI8UqVzteLl/lnB77r5VOfC89MRWOoP5TAHZNAg5a1zXCHSWuQ9FS8dQxWVc6f2nJc5hIAb1Zcy5Nnv8JZdca8VA3+zEwOgf5M8K6XBH1FgjJiFxKJtftp9MAd4aRVj9Lw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=cDepN3K6gtiAHE8bYo8Mmzjj5Vn7INCeu2NM/rO/0cw=; b=KuGCAuGWVR+kVo7qI3xXGvfCPyG4XVxBy8CryEb0rtMKDlyMJpfAjAbxc1QbDwtMzNJAoWPIIpVJmD8dng+eUCuM+5Eu0uYu95nwK7jYV+1Xd7ILy1dZTgPMocRMSRo2YCBlGvsZQe/NQTWpyi84KffP3T/dUlcJO3cCWrAmgDm7G4tMNO9Lq9Yy1TtcJAmAmtFcs9aV0GBtzJZhkEE6aoNwo9LbASwi2eQsWnChVFqtj8/vhjFFggPpA05EPjoO3/wGo3Ld/jqg9P83/7mQ9RluYVpGCaIHDMxGzAO7gmCTTv9+O8zXeTOEm7wXS7qyKqCEg50da2Gzr0y5kxK4pg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=cDepN3K6gtiAHE8bYo8Mmzjj5Vn7INCeu2NM/rO/0cw=; b=t64TZcz7p8ZYGPbVr4/OxQJoVDv9thcTIsbOPrBc1TGgmZ3AxxtmX0shaH1SvidORVdca3c58TxDJETZioIFGwn2kJ/bxSn7KsE08bZ0rqS3CvdesfapDZbxOOArywlvBty+h8UrAv4XBc069KSh9qisDgyu93regb/ryH45Fww=
Received: from CO1PR11MB4881.namprd11.prod.outlook.com (2603:10b6:303:91::20) by SJ0PR11MB5006.namprd11.prod.outlook.com (2603:10b6:a03:2db::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5186.15; Fri, 22 Apr 2022 15:09:30 +0000
Received: from CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::d168:bb8c:2e0d:2ed6]) by CO1PR11MB4881.namprd11.prod.outlook.com ([fe80::d168:bb8c:2e0d:2ed6%5]) with mapi id 15.20.5186.015; Fri, 22 Apr 2022 15:09:30 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: "Lou Berger (lberger@labn.net)" <lberger@labn.net>, "draft-ietf-raw-architecture@ietf.org" <draft-ietf-raw-architecture@ietf.org>
CC: "raw@ietf.org" <raw@ietf.org>
Thread-Topic: How do tracks differ from TE protection paths? was: Some comments/questions on RAW Architecture
Thread-Index: AdhWTVUHCLihH39xSXCVSXqDOrmfGg==
Date: Fri, 22 Apr 2022 15:09:13 +0000
Deferred-Delivery: Fri, 22 Apr 2022 15:08:04 +0000
Message-ID: <CO1PR11MB48818597A1A0DC9298296077D8F79@CO1PR11MB4881.namprd11.prod.outlook.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 9c30e38b-968a-44db-92cc-08da247219af
x-ms-traffictypediagnostic: SJ0PR11MB5006:EE_
x-microsoft-antispam-prvs: <SJ0PR11MB5006C6A608C8D1E6C7506B2FD8F79@SJ0PR11MB5006.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB4881.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(8936002)(110136005)(508600001)(52536014)(53546011)(33656002)(2906002)(316002)(55016003)(86362001)(186003)(6506007)(64756008)(83380400001)(66446008)(66476007)(5660300002)(66556008)(7696005)(76116006)(71200400001)(66946007)(8676002)(4326008)(6666004)(9686003)(26005)(38100700002)(38070700005)(122000001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: ai5zsOpc4UZGIzPrCPUWrFvdv8Et3WTo8CTkyubfEKl9GLVdjSkEGW+BBhoh+A1M6MdNSD1fcD/olB8co8LfWZPWfPr1wUB6epIQfawJ/xeGqpx38BERRr1YMGspITqJn7RbaubDaivJXV0pVgGgtyaJRYSViyKaYpdTyYojo2X08hlq+V5cQWScc8n1X1W0HfqtEYfgMoUU+NXJcY3lGJyRqRGzBJAQHEefxu91L4a6jjLA7x6QrR39en8SJX+SnCwRT9aY3Ec6HScnDnLTtZPY0tpW4k1FajrX0PCZRq8fUy143Y5FJ0ZBnSuwVchWxFyTq8q8J5cLIgh4lZdNa3Dk8i425KVW5U3n5ywUxYUwfnoCOtSFx5PWBFnhyMkvfcgitN198AtiCW/2lbTGB1fmHMR51FSNSQlJt0SBCrUDOYsCz/JkXCcHSMzU4uUxle9hnLPULVNmhw2gJ6SNqXkOcyToHVxSia0E4RsW2CmnPbzWhXREvUDSTILMjf6EsKHM6Hh8pV9hbNUMU1zdw8q1oJEkBAvGqOLL3KrmX4pt8BJVeoi4JnZk9s/cTXDVnWHglGn9eBFWnFONAULlMEKCWjYiAcDh/50uygFF/JSsbGbY4rJh/+2kl7/+sgjKpyrPr5Gei+BXToAeL8fHnoTBuxDU+GYJkPeCxw6ydPUkWQChESDwpjAWYQXTmvoqqezKIoANTWPW0k3AID1W7bMnWD2o0qRCaDmJsyjOfxpngUBGajRkzv+pBFkr8fhkXpAidJm8YQkP3FipFQmuwjhBxG7u+LzmgArOmuBuan4sjlte1K5C2I62gQmfbQu5XBOjb1/RLVPnT2gVk771JRdZOuN25qqo6d6aTEZ4qXWUJRGywJD7vNvko8DMrC6Qm9zy2BHxFDkV/9OGQNZOwSSSYH+K/o0HYT+ESdIaf70NiJbplBxpB2IDHuVLun1ZDgbGLubA8/JK1PKnfsy0MmaINuzNJt1QxUKzqbci7+ojvTIi6PH8VyHg2EWIJhG4kKHO7z/GLMSUgpFxhhkXePvCFZVlFdI/xQKW43Tp5soFgg0PBeN2ipTTmwnHs+gLweXsPLrvdsBzG6dQ6i0CjshxJYCGAli2XpduXcIsRyBom9RGxbesHvsjSaY7ZkyszpAULG/Lc7LSJTHCvCeV/aRY21Nl85jcfsZcMncW4BWMyIzLdLTMUHI/cAipw5sgdzUIFz2pdnb1DRskF+8QGhWbrCn2thbqsEPyNLrzyx1Vr8x5OIPA264nfbVwfdfM4EOMgn9kpEvG3GWcahxTs+fXkAp5t9mLrNuXvL/BSaub+8k7ConljfLlO67Mbjh0UALO7Z8D9D0jODAs+7Vc/qMP7CutZF2WaQEiWXtir9r9S3GJvFgAYekp3D5WYAzXoHEsQpqTvEskzz8rGsR1+Ll+kOZANo0ODwPiq/f3GyPQCEQZXph0Bv6Pba698mFeABCVZtnLVy2TdySnD4o/e8I36y3KEjrq/kEOl80BS8EkDO+YyI6TPJdRANSU8V42Hp4/2Zi3j/SS6+m81AXp/waHeHu7O0SOF5nFuB/CDT0e72fWUMdeR07wPn4Qyh0EihS+f8pvpaYPRxYkRdSNMjdHNrH4qdtJeL7w7W60PuPm00rlstt8ohnFdLDhBbWkxL23gWTNG112stnm1RuLPkdLSD/8u/2fqDXZAD0cfe0rkqAcH7ZMJXidqrew+YfdAExHH4yWce/ssDOvgvLxuA==
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB4881.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9c30e38b-968a-44db-92cc-08da247219af
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Apr 2022 15:09:30.1998 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: SyBvrKZ+w6ZF3OtIMAc4F+lpTXNbmnwHj4qDMwglTF2oJjlSM9FpiG6V2BTD09l/KgwnAX3OBSZs/px6sDsFZA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB5006
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 64.101.210.232, xfe-rtp-002.cisco.com
X-Outbound-Node: alln-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/raw/v5RyagitmgJfZQiDq_0IVFg7BQM>
Subject: [Raw] How do tracks differ from TE protection paths? was: Some comments/questions on RAW Architecture
X-BeenThere: raw@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: reliable and available wireless <raw.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/raw>, <mailto:raw-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/raw/>
List-Post: <mailto:raw@ietf.org>
List-Help: <mailto:raw-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/raw>, <mailto:raw-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Apr 2022 15:09:40 -0000

Dear all:

Lou said:
"
In reading the definition of the tracks, the term seems quite aligned/similar to TE protection paths and segments.  Keep in mind that DetNet PREOF is just one form of service restoration supported in IETF TE, i.e., the 1+1 form.  A track reads to me to be something that can be composed or combine 1:1, 1:N and even 1+N, and have interesting
(uncoordinated) protection switching based on actual network/link
(channel) state.  I suspect we can accomplish the same objectives as Tracks and stay consistent with existing DetNet and TE(AS) terminology.
"

My short answer: 
There's too much preconception with the term path as an experience and too much slight overload of the term path in different WGs, sometimes without a clear terminology but rather an intuition that means confusion. We need a term that reflects the statistical expectation and overloading path will entertain / augment the existing confusion. Defining Track allows us to point explicitly on what happens at DetNet and RAW that is really new.

Longer answer:
My view is that the concept of path in the art of IETF is incompatible with that of Track because a path has the classical IP expectation of 1 packet in, the same packet along, and then out. In TE, even in the 1+N case, the packet is replicated first, and then each copy follows a path where the assumption above stands. A  copy is an atom that remains in its integrity along the path. The path can thus be defined after the fact as the experience of the (copy of the) packet. And we can define a protection path as a set of such paths for multiple copies, either sent at the same time or deferred.

I believe that in RAW, and even in DetNet, the capability to replicate inside the network already defeats that definition. When a packet is replicated inside the network, which one is the original that follows the path? What is the path for the copy? If a relay fragments a packet into N frags, uses network coding N->P, P>N between the fragments as redundancy technique, and then distributes the fragments across the feasible next-segments within the Track, the packet is not more an atom, and there's no "path" that the packet experiences. The packet is literally disseminated (as opposed to flooded as an atom) and reconstituted at arrival. 

If I'm unclear, maybe a quantic analogy will help. The path is the observation/measurement of how an atomic packet traversed the network (which hole the photon passed through). In the case of network coded fragments, there are superimposed "path" states, each with its own probability. The Track describes the superimposition, not the measurement. It is expressed as the set of statistical possibilities for a future packet, not the experience of one. 

Note: The sum of probabilities is typically more than 1 due to redundancy methods, and the PSE dynamically DECIDEs the new values for those statistics to place them on segments that appear to work at this time based on ORIENTation by the PCE (D and O in OODA).

In terms of IETF inheritance, the term Track is already defined in the art of a deterministic wireless RFC (RFC 9030) and a method to program Tracks in a wireless network is being defined at ROLL (draft-ietf-roll-dao-projection). The definition of Track at RAW, ROLL, and 6TiSCH are consistent, though ROLL can only build Tracks that are DODAGs (it cannot build bidir North/South segments).

I hope this helps,

Pascal


-----Original Message-----
From: Lou Berger <lberger@labn.net> 
Sent: lundi 21 mars 2022 2:25
To: draft-ietf-raw-architecture@ietf.org
Cc: RAW WG <raw@ietf.org>
Subject: Some comments/questions on RAW Architecture

Pascal, Georgios,

In looking to provide input on the framework document I realized I had some basic questions on the architecture document. While I also have more detailed comments/questions on the Architecture document, I'll stick to the high level comments/questions here. Also, my apologies for not getting them out sooner, but I figured it was still better to document here than just "at the mic" in tomorrow's session.

1) What does the term "RAW" refer to in the context of the architecture? 
Is it a new/standalone set of mechanisms or is it an addition or an extension, or a usage of IETF defined technologies?

I find that reading the architecture, I'm really  unsure.  The current working is a bit mixed, e.g.,

    Reliable and Available Wireless (RAW) provides for high reliability
    and availability for IP connectivity over a wireless medium.

this sounds like something new/independent

    It builds on the DetNet Architecture and
    discusses specific challenges and technology considerations needed to
    deliver DetNet service utilizing scheduled wireless segments and
    other media, e.g., frequency/time-sharing physical media resources
    with stochastic traffic.

this sounds evolutionary.

I was expecting the RAW WG to build on DetNet and other IETF Traffic Engineering (TE)  bodies of work. In other works something along the lines of:

     The RAW Architecture builds on the DetNet Architecture and
     standard IETF Traffic Engineering concepts and mechanisms to
    deliver service across any combination of wired and wireless
    network segments. ...

I think the document and the used terminology must be clear even we're
(understandably) loose in the usage of the "RAW" term in our discussions.

2) Are RAW solutions limited to IPv6 and a limited set of wireless technologies?  I think the framework says/implies no, but the architecture is less inclusive. e.g.,
    RAW provides DetNet elements that are specialized for IPv6 flows
    [IPv6] over selected deterministic radios technologies [RAW-TECHNOS].

I would expect that at least at the Architecture level that there would be no exclusion of IETF networking technologies (including v4 and MPLS) and any SDO-defined wireless technology.  I certainly understand needing to focus and prioritize work on specific technologies, but that is practical choice not a limitation that should be codified in the architecture.

Somewhat related, but of less importance, it's probably worth mentioning that RAW forwards/switches at the IP, not link layer.

3) How do tracks differ from TE protection paths?

In reading the definition of the tracks, the term seems quite aligned/similar to TE protection paths and segments.  Keep in mind that DetNet PREOF is just one form of service restoration supported in IETF TE, i.e., the 1+1 form.  A track reads to me to be something that can be composed or combine 1:1, 1:N and even 1+N, and have interesting
(uncoordinated) protection switching based on actual network/link
(channel) state.  I suspect we can accomplish the same objectives as Tracks and stay consistent with existing DetNet and TE(AS) terminology.

4) Is RAW limited to PCE-based centralized solutions?

DetNet introduced the term Controller Plane to cover all types of control supported by the IETF TE architecture, i.e., fully centralized, fully distributed, or any hybrid combination of centralized/distributed control.  The Architecture reads as supporting only one combination of - PCE for paths, PSEs for tracks (aka protection segments) .   PSEs read as also doing the actual protection switching, but this is outside the scope of this comment.

Hereto, I see no reason for the architecture to limit the scope of the Controller Plan solutions that could be standardized as part of RAW. (Yes PCE-based approaches are likely the first to be standardized, but that's not an architecture level decision.)


Those are my top comments.  While substantive, I suspect addressing these comments will result in some refactoring and rewording -- but not a major change to the document.

Thank you, and speak to you soon. (Unfortunately, just virtually this
meeting...)

Lou