Re: [Raw] FW: How do tracks differ from TE protection paths? was: Some comments/questions on RAW Architecture

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Sun, 23 October 2022 08:20 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: raw@ietfa.amsl.com
Delivered-To: raw@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2515DC14F747 for <raw@ietfa.amsl.com>; Sun, 23 Oct 2022 01:20:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.608
X-Spam-Level:
X-Spam-Status: No, score=-9.608 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, GB_SUMOF=5, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=JLvRK5i/; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=P4bCpaFY
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jzGdZp-l2dqQ for <raw@ietfa.amsl.com>; Sun, 23 Oct 2022 01:20:16 -0700 (PDT)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B5C18C14F740 for <raw@ietf.org>; Sun, 23 Oct 2022 01:20:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=27982; q=dns/txt; s=iport; t=1666513216; x=1667722816; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=8eYOPac8lpNBhWdYrlvDbp45JlgJuM3GC2E+tYRoErw=; b=JLvRK5i/JmbWdLfLxUnv2LTBgg+Z37JlLiucEbxM4Fj52fzUM5s+/BUk PUlKZa1Vpdyi72PoFGdvbX7D/WxqGFRwG7s/knCWBuAt/7jMixGVpxiPk hGAaFRsY+aw43NBUz+1+1Bve95kEzzsT4CcYrpxo0xEFD0nyoU3Bmu2bz o=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:29KCjBAKE/IN6hN+Bp1/UyQVaBdPi9zP1kY95pkmjudIdaKut9TnM VfE7PpgxFnOQc3A6v1ChuaX1sKoWWEJ7Zub9nxXdptKWkwJjMwMlFkmB8iIQUTwMP/taXk8G 8JPHF9o9n22Kw5bAsH7MlbTuXa1qzUVH0aXCA==
IronPort-Data: A9a23:ZGQQv69BjSfCn2LRVeLxDrUDhX6TJUtcMsCJ2f8bNWPcYEJGY0x3m mZMW2iHbPqCNDPzLttzPYy+oE9U68OBxoJrQQttqy5EQiMRo6IpJzg2wmQcns+2BpeeJK6yx 5xGMrEsFOhtEjmE4E3F3oHJ9RGQ74nQLlbHILOCa30ZqTNMEn9700s7wbRh2eaEvPDga++zk YKqyyHgEAfNNw5cagr4PIra9XuDFNyr0N8plgRWicJj5TcypFFJZH4rHpxdGlOjKmVi8kFWc M6YpF2x1juxEx7AkbpJmJ6jGqEBaua60QRjFhO6VoD66iWuqBDe3Y43PadMN1pG0A6Env9e2 fAcp7uvdyQma/ikdOQ1C3G0Egl3OalAvbTAO3X64IqYzlbNdD3nxPAG4EMeZNJDvL0pRzgVs 6VCeVjhbTjb7w6y6KqnSvRmi94/BMLqJ4gY/HpnyFk1CN57GcyTHPSXjTNe9G0XqeISRtbMW 9YEQmRVPCnnTjJTI1hCXfrSm8/x1iWgLFW0smm9oaA6+Wfe1iR12bLrdtzYZrSiX8xKtkeVu myA+H72aiz2L/SWzT6Dt3mrnOKKzGXwWZkZE/uz8fsCbECvKnI7BBRLBQWmsKKCh0+RdMN6e l4z5RQNov1nnKC0deXVUxq9qX+CmxcTXdtMDuE3gD1hLIKJvm514UBZEFZ8hMwaWNweHmdzj wDX9z/9LXk+7uPKGCv1GqK892vaBMQDEYMVicbopyMs593upunfZTqQE446S8ZZYjAJcAwcL hiDqCw4wr4Ul8NOhuOw/EvMhHSnoZ2hou8JCuf/ADvNAuBRPdHNi2mUBb7ztq8owGGxFQPpg ZT8s5LChN3i9LnU/MB3fM0DHauy+9GOOyDGjFhkEvEJrmrzpSL9JtwKsWAvdS+F1/ronxe0P yc/XisMtPdu0IeCNsebnqroUZ1xlPi8fTgbfqGPMrKinaSdhCferH0xOiZ8LkjmkVMnlukkK IyHfMO3ZUv2+ow5pAdas9w1iOdxrghnnDu7bcmik3yPj+HEDFbLEuhtDbd7Rr1jhE9yiF+Lo 4832grj40g3bdASlQGNoNVLfAhbdCRmbX00wuQOHtO+zsNdMDlJI5fsLXkJIuSJQ4w9ej/0w 0yA
IronPort-HdrOrdr: A9a23:AmKI3KPFRad2hMBcT3X155DYdb4zR+YMi2TDiHoedfUFSKOlfp 6V8MjzjSWE9Ar4WBkb6LS90dq7MAzhHPlOkMUs1NaZLUTbUQ6TTb2KgrGSuwEIdxeOlNK1kJ 0QDpSWa+eAQmSS7/yKmzVQeuxIqLLsncDY5ts2jU0dNz2CAJsQiDuRfzzra3GeMzM2Y6bReq Dsg/Zvln6FQzA6f867Dn4KU6zovNvQjq/rZhYAGloO9BSOpSnA0s+1LzGomjMlFx9fy7Yr9m bI1ybj4L+4jv29whjAk0fO8pVtnsf7wNcrPr3MtiFVEESttu+bXvUiZ1SwhkFxnAhp0idvrD D4mWZiAy200QKXQoj6m2qq5+Cq6kdR15ar8y7ovZKkm72heNr/YPAx3r6wtXDimhIdVZhHod J29nPcuJxNARzamiPho9DOShFxj0Kx5WEviOgJkhVkIMMjgZJq3PoiFXluYd49NTO/7JpiHP hlDcna6voTeVSGb2rBtm0qxNC3RHw8EhqPX0BH46WuonJrtWE8y1FdyN0Un38G+p54Q55Y5/ 7cOqAtkL1VVMcZYa90Ge9ES8qqDW7GRw7KLQupUB/aPbBCP2iIp4/84b0z6u3vcJsUzIEqkJ CES19cvX5aQTOYNSRP5uw+zvngehTJYd228LAs23FQgMyPeIbW
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.95,206,1661817600"; d="scan'208";a="5048795"
Received: from alln-core-9.cisco.com ([173.36.13.129]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 23 Oct 2022 08:20:14 +0000
Received: from mail.cisco.com (xfe-rcd-003.cisco.com [173.37.227.251]) by alln-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 29N8KEP3010033 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Sun, 23 Oct 2022 08:20:14 GMT
Received: from xfe-aln-003.cisco.com (173.37.135.123) by xfe-rcd-003.cisco.com (173.37.227.251) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9; Sun, 23 Oct 2022 03:20:13 -0500
Received: from NAM04-BN8-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-003.cisco.com (173.37.135.123) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9 via Frontend Transport; Sun, 23 Oct 2022 03:20:13 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NvjQeAmeZlJeeUcH5V+wHEDDWNaXHpCvEHppszb0coTHYy9mMwa2zZ0zzy053HhucMPmDUJfz/uaf1eXocP+M54sS6eQ+RRy57fR4nipDipdCeyYLvehsefc86dqb8MvD8U5IsjK9+k0bSA34B58gX1Gg+FqagfMMd6NN98nGNBHuCvfk84ocoTuQUKOeBpnxXx8rReJkUcdGxRDrvCj3LPDBqHJxnyvTTUWuzOJm1G/IIXKEYtd/K1mlZWIcBzT+LvdgboYDYBSMm9UrXSHoIb0lEPAufBYV4AUNm4LAwC/9mmHPayZqgrcuv882Abog0kYwmGRTEtOS63yynDFIQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=8eYOPac8lpNBhWdYrlvDbp45JlgJuM3GC2E+tYRoErw=; b=blyZaC4+8PykqdsAAwXO1s4iVNYfw/shvnH77THFBx63HIrBuMgBrbnh5r/fkuqK0f2w4nUMQ9Y3krkV5RW5oxYX3Jd4eYomzyReHTEBt03p/c9560u/QkBl2z3ezByfjNXWluMwQKcRGo7jyrtpDyDAjNb0KRg4+CpCvmu4nCDX0dMyEhFt1UFDPDjqgZhBwjVvPSXWxAjJI6AHR5azHF9A8GPlTUwW3mVe8q3x4Hy3BVThs+z8/g3FwlxRuNNH+pv990HDZiTQgaoE67LJI2UizORV3udTam/VnJ6tHY8O/B5o5f8NUpeI6tI13QkXNM8EReKwAu/IqySl/o/9kg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8eYOPac8lpNBhWdYrlvDbp45JlgJuM3GC2E+tYRoErw=; b=P4bCpaFY2mlv6iHCWNuImlD7bIughdkDx/Pkn5L5Ya7ZIXfzprtQVqNjPhu7SRIC/QMQr32uO9vcxFs4iF9PQ2b7zj9QNjHKnmFyQPd2z+1gZkVLhBnaPEcbvrnMyzp4WttyU+k82uLzhKMh5O8nRhfyMontfmp+CcT4uPWbwfA=
Received: from SJ0PR11MB4896.namprd11.prod.outlook.com (2603:10b6:a03:2dd::20) by CY5PR11MB6509.namprd11.prod.outlook.com (2603:10b6:930:43::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5723.32; Sun, 23 Oct 2022 08:20:11 +0000
Received: from SJ0PR11MB4896.namprd11.prod.outlook.com ([fe80::44c6:a32:14d5:8386]) by SJ0PR11MB4896.namprd11.prod.outlook.com ([fe80::44c6:a32:14d5:8386%9]) with mapi id 15.20.5746.023; Sun, 23 Oct 2022 08:20:11 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Lou Berger <lberger@labn.net>
CC: "raw@ietf.org" <raw@ietf.org>
Thread-Topic: [Raw] FW: How do tracks differ from TE protection paths? was: Some comments/questions on RAW Architecture
Thread-Index: AdhWTVUHCLihH39xSXCVSXqDOrmfGhM/6BHwAAUItwAAAGmuoAmZiLpAAW3yK4AFFevy0ACUOxcAACO/h3I=
Date: Sun, 23 Oct 2022 08:20:11 +0000
Message-ID: <324DEBAC-FB6F-4DB2-A2D8-4342752D79AD@cisco.com>
References: <CO1PR11MB48818597A1A0DC9298296077D8F79@CO1PR11MB4881.namprd11.prod.outlook.com> <CO1PR11MB488192870611FA459824DF3AD8999@CO1PR11MB4881.namprd11.prod.outlook.com> <9ca88f4d-02b5-3446-d7ae-ecfe78f354c8@labn.net> <CO1PR11MB48811ACDA4B6AA79FBF324EED8999@CO1PR11MB4881.namprd11.prod.outlook.com> <CO1PR11MB48813E7C03ABA632E702D988D8489@CO1PR11MB4881.namprd11.prod.outlook.com> <b67879f6-2deb-9d20-dd0d-a163ba465d54@labn.net> <CO1PR11MB48811B83EE50F19A713AD610D82B9@CO1PR11MB4881.namprd11.prod.outlook.com> <b2e6f622-c446-541d-55bc-ba853ad1c4c9@labn.net>
In-Reply-To: <b2e6f622-c446-541d-55bc-ba853ad1c4c9@labn.net>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: SJ0PR11MB4896:EE_|CY5PR11MB6509:EE_
x-ms-office365-filtering-correlation-id: 5087682f-22f4-4ecb-bad8-08dab4cf674f
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR11MB4896.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(39860400002)(136003)(396003)(366004)(376002)(346002)(451199015)(38070700005)(36756003)(66446008)(41300700001)(6506007)(8936002)(6512007)(91956017)(66574015)(186003)(4326008)(76116006)(66556008)(5660300002)(53546011)(8676002)(66946007)(33656002)(83380400001)(2906002)(66476007)(66899015)(71200400001)(478600001)(38100700002)(30864003)(2616005)(122000001)(6486002)(966005)(86362001)(64756008)(6916009)(316002)(45980500001)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR11MB4896.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5087682f-22f4-4ecb-bad8-08dab4cf674f
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Oct 2022 08:20:11.0386 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: accuDyepSASv/hpefH9E3lr/YE6r3JW81NvZi2UPXLrnK1pAkX3PurdBLyZintquwoMYzwcNQyJHBxbgCJTkyg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY5PR11MB6509
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.227.251, xfe-rcd-003.cisco.com
X-Outbound-Node: alln-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/raw/xon0cUDUaQkPU0wSjjxBiMJf7PA>
Subject: Re: [Raw] FW: How do tracks differ from TE protection paths? was: Some comments/questions on RAW Architecture
X-BeenThere: raw@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: reliable and available wireless <raw.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/raw>, <mailto:raw-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/raw/>
List-Post: <mailto:raw@ietf.org>
List-Help: <mailto:raw-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/raw>, <mailto:raw-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 23 Oct 2022 08:20:22 -0000

Works for me, Lou. 

Would the chairs like to lead that discussion ? 

Pascal

> Le 22 oct. 2022 à 17:17, Lou Berger <lberger@labn.net> a écrit :
> 
> [this may be a resend, if so please ignore it...]
> 
> Hi Pascal
> 
> I think it would be helpful to delineate the routing (control-centric) aspects and forwarding
> (data-plane) aspects of the topic.
> 
> I think your message/response below is focused on the forwarding (data-plane)perspective -- see below for in line response.
> 
> From the routing (control-centric)  perspective -
> 
> The draft-09 says:
> 
>   ... The Track is preestablished and installed
>    by means outside of the scope of RAW; it may be strict or loose
>    depending on whether each or just a subset of the hops are observed
>    and controlled by RAW.
> 
> To me this is no different from protection segments and or paths (including FRR) that already exist for DetNet or even in the broader TEAS WG context.  Those paths can be created by any control(ler)-plane mechanisms, may contain strict or loos hops and may be per-established or established as needed.
> 
> Where do you see uniqueness / differentiation with "tracks" from the routing (control-centric)  perspective?
> 
>> On 10/19/2022 12:52 PM, Pascal Thubert (pthubert) wrote:
>> Hello Lou:
>> 
>> I'm using Quantum physics as an image. For me, a Track is to a TE path what an atomic orbital is to a planetary orbit.
>> 
>> The orbit is a predictable fact, and a path is observable after the fact.
>> 
>> A Track cannot be observed; it only represents the aggregate of the possible places that the packet may traverse. But due to PSE activities we do not know in advance (before PSE computes it) which places a packet will attempt to traverse. And because of wireless loss, even after the PSE decision we are not sure that the packet will traverse those places.
> 
> I continue to think / see nothing truly different here.
> 
> in 1:N protection - a set of "possible" paths can support packet delivery.
> 
> in 1+N protection - there is no way for an observer outside the protection domain to know which of the protection paths actually was used to transport delivered information/packets.
> 
>> If the packet is split and network coded, codes will be at different places at each point of time, so the packet will effectively be in multiple states at the same time, and not necessarily precisely somewhere at a specific time.
> 
> Sure, network coding does NOT fit into the existing protection DetNet/TE mechanisms, but it does fit in the larger DetNet architecture, so whatever is defined WRT coding should be applicable to any (wired and wireless) technology.
> 
>> My concern is that if we keep overloading the term path, we are losing the capability to describe anything precisely, we forget what we talk about. A track is the aggragtion of feasible path, not a path, and it is used statistically, not definitely.
> 
> So there may be difference in the protection selection function than exists on the transmit side of 'tracks' (aka paths)  where in the forwarding plane, the active track/path is selected at packet transmission time.  I think this is closer/but not exactly the same as 1:N, may be the same as fast reroute protection (It's been a while since I've done anything with FRR, but maybe someone else on the list can chime in), and different from 1+1 where the section is on done per packet at the MP/protection termination point.  If there is something new, we can limit the new terminology to what is actually new (a perhaps 1&N protection with new PLR behavior.)
> 
> 
>> A bit more inline below 😊
>> 
>> All the best,
>> 
>> Pascal
>> 
>>> -----Original Message-----
>>> From: Lou Berger<lberger@labn.net>
>>> Sent: vendredi 23 septembre 2022 21:14
>>> To: Pascal Thubert (pthubert)<pthubert@cisco.com>
>>> Cc:raw@ietf.org
>>> Subject: Re: FW: How do tracks differ from TE protection paths? was: Some
>>> comments/questions on RAW Architecture
>>> 
>>> Hi Pascal,
>>> 
>>> On 9/16/2022 9:02 AM, Pascal Thubert (pthubert) wrote:
>>>> Dear Lou:
>>>> 
>>>> I'm trying to figure out what's left to be added to the RAW
>>> architecture. So I'm going again through our collection of old emails.
>>>> I went through RFC 4426 and RFC 4427 as you suggested. Consistent with
>>> my earlier understanding, 1+1 only does the R in PREOF, and only at the
>>> ingress.
>>> 
>>> GMPLS Segment Recovery, RFC4873, and Fast reroute RFC4090 are two examples
>>> of RE performed in the middle of the network.
>> Fast reroute is a path update. The orbit has changed but it is still not an orbital.
> 
> I'm sorry, I'm not following. Once the path/track is established, FRR can effectively use a primary or backup path as the PLR chooses.
> 
>> 
>>>>   RFC 6372 also deals with linear (not graph) protection and P2MP is
>>> just a collection of that where the property of each link is essentially
>>> the same as above.
>>>> Since it does not have E and O, there needs to be an active switch over
>>> at the egress. The consequence is that for a packet there is effectively a
>>> path that is selected by the receiver and that all packets will follow
>>> till the receiver end switches.
>>> I agree, that the above do not include sequence numbers to support O.
>>> But O is not a strict requirement at the IP layer in the general IP case
>>> at the network layer, as I'm sure you know.
>>>> RAW has PAREO active all along the Track, with dynamic decision-making
>>> either at egress or even deep in the graph. The graph is not a series of
>>> parallel oriented paths. The graph is the sum of all potential and
>>> overlapping paths that packets of the flow may experience, and there is no
>>> decision at egress on which path is selected. I guess that the first
>>> packet that is received for a sequence and is retained and reordered.
>>> 
>>> 1:1 and 1:n (and I think) FRR basically upstream selects on which path
>>> to use, only 1+1 (like PREOFF) and 1+n have downstream/receiver selects
>>> (of data to use).
>> I do not see that. The path is updated, but is still definitely something not an aggregate of statistical chances.
> FRR doesn't require a path update to forward along either the backup or primary paths. (It does signal for information purposes, but forwarding takes place independent of any signaling)
> 
> Thanks,
> 
> Lou
> 
>> 
>>>> OTOH the art of TEAS seems consistent with the rest of IETF literature
>>> that describes the path as the experience of a packet (see refs in the
>>> draft), whereby it is known at a each point of time which path packets of
>>> the flow will experience. A Track is the quantum physics of that, all
>>> probabilistic, and the path is only known when the packet is received.
>>> Please be sensitive to the difference in nature of those 2 objects.
>>> 
>>> I don't understand your comment about at the physics level.  RAW isn't
>>> about defining wave forms (in ITU speak, media channels) but rather
>>> about using such for IP.  If you're alluding to the "overhearing" that
>>> is possible in wireless - how is it so different than sending an IP
>>> packet (unicast or multicast) over a ethernet multicast and letting
>>> multiple receivers process/forward the packet.
>>> 
>>>> In my book that's enough difference to call it differently, and to
>>> differentiate the measurable path from the potential Track.
>>>> Do I (finally) manage to make sense?
>>> I suspect we're still talking past each other.
>>> 
>>> Thanks!
>>> 
>>> Lou
>>> 
>>>> Pascal
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>>> -----Original Message-----
>>>>> From: RAW<raw-bounces@ietf.org>  On Behalf Of Pascal Thubert (pthubert)
>>>>> Sent: vendredi 29 juillet 2022 17:58
>>>>> To: Lou Berger<lberger@labn.net>
>>>>> Cc:raw@ietf.org
>>>>> Subject: Re: [Raw] FW: How do tracks differ from TE protection paths?
>>> was:
>>>>> Some comments/questions on RAW Architecture
>>>>> 
>>>>> Thank you, Lou, I'll look at it, though probably not today.
>>>>> 
>>>>> Compared to 1:N, a Track has replication + elimination + overhearing
>>> inside
>>>>> the graph east-west and north/south synchronization. It also enables
>>>>> spreading coded fragments. It can be seen as the aggregation of all the
>>>>> possible and partially congruent paths that you can use for a packet.
>>> That's
>>>>> not what I'm used to figure for N:1. I'd like to find words that relate
>>> the
>>>>> concepts and yet carry the difference to place in the definition.
>>>>> 
>>>>> I've already been working on edition to indicate that the controller
>>> plane is
>>>>> not necessarily centralized, and that the PAREO function may be
>>> controlled
>>>>> from the detnet service layer but actuated in the lower layers, which
>>> is the
>>>>> case of other things already. I hope I can push the github for the
>>> proposed
>>>>> diff for at least this before I disappear for 2 weeks.
>>>>> 
>>>>> 
>>>>> 
>>>>> Enjoy summer!
>>>>> 
>>>>> Pascal
>>>>> 
>>>>> 
>>>>> 
>>>>>> -----Original Message-----
>>>>>> From: Lou Berger<lberger@labn.net>
>>>>>> Sent: vendredi 29 juillet 2022 17:37
>>>>>> To: Pascal Thubert (pthubert)<pthubert@cisco.com>
>>>>>> Cc:raw@ietf.org
>>>>>> Subject: Re: FW: How do tracks differ from TE protection paths? was:
>>>>>> Some comments/questions on RAW Architecture
>>>>>> 
>>>>>> Hi Pascal,
>>>>>> 
>>>>>> On 7/29/2022 9:19 AM, Pascal Thubert (pthubert) wrote:
>>>>>>> Dear RAWers:
>>>>>>> 
>>>>>>> Resending with additions:
>>>>>>> 
>>>>>>> -----Original Message-----
>>>>>>> From: Pascal Thubert (pthubert)
>>>>>>> Sent: vendredi 22 avril 2022 17:09
>>>>>>> 
>>>>>>> Lou said:
>>>>>>> "
>>>>>>>> In reading the definition of the tracks, the term seems quite
>>>>>> aligned/similar to TE protection paths and segments.
>>>>>>>> Keep in mind that DetNet PREOF is just one form of service
>>>>>>>> restoration
>>>>>> supported in IETF TE, i.e., the 1+1 form.
>>>>>>>> A track reads to me to be something that can be composed or combine
>>>>>>>> 1:1,
>>>>>> 1:N and even 1+N, and have interesting (uncoordinated) protection
>>>>>> switching based on actual network/link (channel) state.  I suspect we
>>>>>> can accomplish the same objectives as Tracks and stay consistent with
>>>>>> existing DetNet and
>>>>>> TE(AS) terminology.
>>>>>>> "
>>>>>>> 
>>>>>>> My short answer:
>>>>>>> There's too much preconception with the term path as an experience
>>>>>>> and
>>>>>> too much slight overload of the term path in different WGs, sometimes
>>>>>> without a clear terminology but rather an intuition that means
>>> confusion.
>>>>>> We need a term that reflects the statistical expectation and
>>>>>> overloading path will entertain / augment the existing confusion.
>>>>>> Defining Track allows us to point explicitly on what happens at DetNet
>>>>>> and RAW that is really new.
>>>>>>> The difference between a path and a Track is subtle. A path is an
>>>>>> experience, a Track is a collection of potential experiences. Worse: a
>>>>>> Track may be flooded with network coded fragments of the datagram, so
>>>>>> there's no such a thing as the path that the datagram followed. Still
>>>>>> I see the need to position Track and Protection Path (which in most
>>>>>> findings in google reads as path B when path A fails). Could you
>>>>>> please provide a pointer to the TE terminology?
>>>>>> I really think this work can be informed by the prior protection work
>>>>>> done for TE in the IETF.  I wish it was nicely summarized in
>>>>>> draft-ietf-teas- rfc3272bis-20, but it isn't.  Probably the best
>>>>>> references are: rfc4426, rfc4427, and rfc6372.
>>>>>> 
>>>>>> I think what you are describing with tracks and PSEs are 1:N span
>>>>>> protection with Unidirectional (recovery) switching over DetNet member
>>>>>> flows (which use paths).
>>>>>> 
>>>>>> Can you take a look at the references and see what you think?
>>>>>> 
>>>>>> Thanks,
>>>>>> 
>>>>>> Lou
>>>>>> 
>>>>>>> Longer answer:
>>>>>>> 
>>>>>>> My view is that the concept of path in the art of IETF is
>>>>>>> incompatible
>>>>>> with that of Track because a path has the classical IP expectation of
>>>>>> 1 packet in, the same packet along, and then out. In TE, even in the
>>>>>> 1+N case, the packet is replicated first, and then each copy follows a
>>>>>> path where the assumption above stands. A  copy is an atom that
>>>>>> remains in its integrity along the path. The path can thus be defined
>>>>>> after the fact as the experience of the (copy of the) packet. And we
>>>>>> can define a protection path as a set of such paths for multiple
>>>>>> copies, either sent at the same time or deferred.
>>>>>>> I believe that in RAW, and even in DetNet, the capability to
>>>>>>> replicate
>>>>>> inside the network already defeats that definition. When a packet is
>>>>>> replicated inside the network, which one is the original that follows
>>>>>> the path? What is the path for the copy? If a relay fragments a packet
>>>>>> into N frags, uses network coding N->P, P>N between the fragments as
>>>>>> redundancy technique, and then distributes the fragments across the
>>>>>> feasible next- segments within the Track, the packet is not more an
>>>>>> atom, and there's no "path" that the packet experiences. The packet is
>>>>>> literally disseminated (as opposed to flooded as an atom) and
>>> reconstituted
>>>>> at arrival.
>>>>>>> If I'm unclear, maybe a quantic analogy will help. The path is the
>>>>>> observation/measurement of how an atomic packet traversed the network
>>>>>> (which hole the photon passed through). In the case of network coded
>>>>>> fragments, there are superimposed "path" states, each with its own
>>>>>> probability. The Track describes the superimposition, not the
>>> measurement.
>>>>>> It is expressed as the set of statistical possibilities for a future
>>>>>> packet, not the experience of one.
>>>>>>> Note: The sum of probabilities is typically more than 1 due to
>>>>>>> redundancy
>>>>>> methods, and the PSE dynamically DECIDEs the new values for those
>>>>>> statistics to place them on segments that appear to work at this time
>>>>>> based on ORIENTation by the PCE (D and O in OODA).
>>>>>>> In terms of IETF inheritance, the term Track is already defined in
>>>>>>> the
>>>>>> art of a deterministic wireless RFC (RFC 9030) and a method to program
>>>>>> Tracks in a wireless network is being defined at ROLL
>>>>>> (draft-ietf-roll-dao- projection). The definition of Track at RAW,
>>>>>> ROLL, and 6TiSCH are consistent, though ROLL can only build Tracks
>>>>>> that are DODAGs (it cannot build bidir North/South segments).
>>>>>>> I hope this helps,
>>>>>>> 
>>>>>>> Pascal
>>>>>>> 
>>>>>>> 
>>>>>>> -----Original Message-----
>>>>>>> From: Lou Berger<lberger@labn.net>
>>>>>>> Sent: lundi 21 mars 2022 2:25
>>>>>>> To:draft-ietf-raw-architecture@ietf.org
>>>>>>> Cc: RAW WG<raw@ietf.org>
>>>>>>> Subject: Some comments/questions on RAW Architecture
>>>>>>> 
>>>>>>> Pascal, Georgios,
>>>>>>> 
>>>>>>> In looking to provide input on the framework document I realized I
>>>>>>> had
>>>>>> some basic questions on the architecture document. While I also have
>>>>>> more detailed comments/questions on the Architecture document, I'll
>>>>>> stick to the high level comments/questions here. Also, my apologies
>>>>>> for not getting them out sooner, but I figured it was still better to
>>>>>> document here than just "at the mic" in tomorrow's session.
>>>>>>> 1) What does the term "RAW" refer to in the context of the
>>> architecture?
>>>>>>> Is it a new/standalone set of mechanisms or is it an addition or an
>>>>>> extension, or a usage of IETF defined technologies?
>>>>>>> I find that reading the architecture, I'm really  unsure.  The
>>>>>>> current working is a bit mixed, e.g.,
>>>>>>> 
>>>>>>>       Reliable and Available Wireless (RAW) provides for high
>>> reliability
>>>>>>>       and availability for IP connectivity over a wireless medium.
>>>>>>> 
>>>>>>> this sounds like something new/independent
>>>>>>> 
>>>>>>>       It builds on the DetNet Architecture and
>>>>>>>       discusses specific challenges and technology considerations
>>>>>>> needed
>>>>>> to
>>>>>>>       deliver DetNet service utilizing scheduled wireless segments
>>> and
>>>>>>>       other media, e.g., frequency/time-sharing physical media
>>> resources
>>>>>>>       with stochastic traffic.
>>>>>>> 
>>>>>>> this sounds evolutionary.
>>>>>>> 
>>>>>>> I was expecting the RAW WG to build on DetNet and other IETF Traffic
>>>>>> Engineering (TE)  bodies of work. In other works something along the
>>>>>> lines
>>>>>> of:
>>>>>>>        The RAW Architecture builds on the DetNet Architecture and
>>>>>>>        standard IETF Traffic Engineering concepts and mechanisms to
>>>>>>>       deliver service across any combination of wired and wireless
>>>>>>>       network segments. ...
>>>>>>> 
>>>>>>> I think the document and the used terminology must be clear even
>>>>>>> we're
>>>>>>> (understandably) loose in the usage of the "RAW" term in our
>>> discussions.
>>>>>>> 2) Are RAW solutions limited to IPv6 and a limited set of wireless
>>>>>> technologies?  I think the framework says/implies no, but the
>>>>>> architecture is less inclusive. e.g.,
>>>>>>>       RAW provides DetNet elements that are specialized for IPv6
>>> flows
>>>>>>>       [IPv6] over selected deterministic radios technologies [RAW-
>>>>>> TECHNOS].
>>>>>>> I would expect that at least at the Architecture level that there
>>>>>>> would
>>>>>> be no exclusion of IETF networking technologies (including v4 and
>>>>>> MPLS) and any SDO-defined wireless technology.  I certainly understand
>>>>>> needing to focus and prioritize work on specific technologies, but
>>>>>> that is practical choice not a limitation that should be codified in
>>> the
>>>>> architecture.
>>>>>>> Somewhat related, but of less importance, it's probably worth
>>>>>>> mentioning
>>>>>> that RAW forwards/switches at the IP, not link layer.
>>>>>>> 3) How do tracks differ from TE protection paths?
>>>>>>> 
>>>>>>> In reading the definition of the tracks, the term seems quite
>>>>>>> aligned/similar to TE protection paths and segments.  Keep in mind
>>>>>>> that DetNet PREOF is just one form of service restoration supported
>>>>>>> in IETF TE, i.e., the 1+1 form.  A track reads to me to be something
>>>>>>> that can be composed or combine 1:1, 1:N and even 1+N, and have
>>>>>>> interesting
>>>>>>> (uncoordinated) protection switching based on actual network/link
>>>>>>> (channel) state.  I suspect we can accomplish the same objectives as
>>>>>> Tracks and stay consistent with existing DetNet and TE(AS)
>>> terminology.
>>>>>>> 4) Is RAW limited to PCE-based centralized solutions?
>>>>>>> 
>>>>>>> DetNet introduced the term Controller Plane to cover all types of
>>>>>>> control
>>>>>> supported by the IETF TE architecture, i.e., fully centralized, fully
>>>>>> distributed, or any hybrid combination of centralized/distributed
>>>>>> control.  The Architecture reads as supporting only one combination of
>>>>>> - PCE for paths, PSEs for tracks (aka protection segments) .   PSEs
>>>>>> read as also doing the actual protection switching, but this is
>>>>>> outside the scope of this comment.
>>>>>>> Hereto, I see no reason for the architecture to limit the scope of
>>>>>>> the Controller Plan solutions that could be standardized as part of
>>> RAW.
>>>>>>> (Yes PCE-based approaches are likely the first to be standardized,
>>>>>>> but that's not an architecture level decision.)
>>>>>>> 
>>>>>>> 
>>>>>>> Those are my top comments.  While substantive, I suspect addressing
>>>>>>> these
>>>>>> comments will result in some refactoring and rewording -- but not a
>>>>>> major change to the document.
>>>>>>> Thank you, and speak to you soon. (Unfortunately, just virtually
>>>>>>> this
>>>>>>> meeting...)
>>>>>>> 
>>>>>>> Lou
>>>>>>> 
>>>>>>> 
>>>>> --
>>>>> RAW mailing list
>>>>> RAW@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/raw
> 
> -- 
> RAW mailing list
> RAW@ietf.org
> https://www.ietf.org/mailman/listinfo/raw