Re: [Tsv-art] [Detnet] Tsvart last call review of draft-ietf-detnet-architecture-08

Lou Berger <lberger@labn.net> Tue, 20 November 2018 18:25 UTC

Return-Path: <lberger@labn.net>
X-Original-To: tsv-art@ietfa.amsl.com
Delivered-To: tsv-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 97F7E130DE1 for <tsv-art@ietfa.amsl.com>; Tue, 20 Nov 2018 10:25:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (768-bit key) header.d=labn.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id doRqQuVFLJPL for <tsv-art@ietfa.amsl.com>; Tue, 20 Nov 2018 10:25:03 -0800 (PST)
Received: from gproxy4-pub.mail.unifiedlayer.com (gproxy4-pub.mail.unifiedlayer.com [69.89.23.142]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E749D130DD8 for <tsv-art@ietf.org>; Tue, 20 Nov 2018 10:25:02 -0800 (PST)
Received: from cmgw15.unifiedlayer.com (unknown [10.9.0.15]) by gproxy4.mail.unifiedlayer.com (Postfix) with ESMTP id EA76A179755 for <tsv-art@ietf.org>; Tue, 20 Nov 2018 11:07:36 -0700 (MST)
Received: from box313.bluehost.com ([69.89.31.113]) by cmsmtp with ESMTP id PAQygToyRj0soPAQygyLVM; Tue, 20 Nov 2018 11:07:36 -0700
X-Authority-Reason: nr=8
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=labn.net; s=default; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:MIME-Version :Date:Message-ID:From:References:Cc:To:Subject:Sender:Reply-To:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=ZqGs2T3HX7dOFzbZbywznoFWnlupbpW17w/2S/rh9mo=; b=cX7CS1mxdSHz0N1OALAmiYApPh C6PFRB+lFP9TCDjdHz42aedZqJTABAkpUBxSfLelhIzdQW84CzM2xV7VWywP/D0v4kecCj7BYDNOi zAILByidbqjVW6dHy6yHxrdCl;
Received: from pool-100-15-106-211.washdc.fios.verizon.net ([100.15.106.211]:48308 helo=[IPv6:::1]) by box313.bluehost.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.91) (envelope-from <lberger@labn.net>) id 1gPAQy-003NX5-N9; Tue, 20 Nov 2018 11:07:36 -0700
To: "Scharf, Michael" <Michael.Scharf@hs-esslingen.de>
Cc: "tsv-art@ietf.org" <tsv-art@ietf.org>, "detnet@ietf.org" <detnet@ietf.org>, "draft-ietf-detnet-architecture.all@ietf.org" <draft-ietf-detnet-architecture.all@ietf.org>
References: <153817345967.27205.135001179751151278@ietfa.amsl.com> <fdf872d6-08a6-2c33-de21-9dd1506c1d21@labn.net> <6EC6417807D9754DA64F3087E2E2E03E2D16A4D3@rznt8114.rznt.rzdir.fht-esslingen.de> <e38ab4d6-0924-ab60-b1dc-4ac26600044c@labn.net> <6EC6417807D9754DA64F3087E2E2E03E2D16C02A@rznt8114.rznt.rzdir.fht-esslingen.de>
From: Lou Berger <lberger@labn.net>
Message-ID: <505e7a95-05bd-5dcb-628f-460790fc1b12@labn.net>
Date: Tue, 20 Nov 2018 13:07:35 -0500
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.2.1
MIME-Version: 1.0
In-Reply-To: <6EC6417807D9754DA64F3087E2E2E03E2D16C02A@rznt8114.rznt.rzdir.fht-esslingen.de>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - box313.bluehost.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - labn.net
X-BWhitelist: no
X-Source-IP: 100.15.106.211
X-Source-L: No
X-Exim-ID: 1gPAQy-003NX5-N9
X-Source:
X-Source-Args:
X-Source-Dir:
X-Source-Sender: pool-100-15-106-211.washdc.fios.verizon.net ([IPv6:::1]) [100.15.106.211]:48308
X-Source-Auth: lberger@labn.net
X-Email-Count: 2
X-Source-Cap: bGFibm1vYmk7bGFibm1vYmk7Ym94MzEzLmJsdWVob3N0LmNvbQ==
X-Local-Domain: yes
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsv-art/9PfaB-QoToY1SkK1523GVFLTJDg>
Subject: Re: [Tsv-art] [Detnet] Tsvart last call review of draft-ietf-detnet-architecture-08
X-BeenThere: tsv-art@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Review Team <tsv-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsv-art/>
List-Post: <mailto:tsv-art@ietf.org>
List-Help: <mailto:tsv-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Nov 2018 18:25:04 -0000

Michael,

Thanks for the clarification.

On 11/20/2018 10:02 AM, Scharf, Michael wrote:
> Lou,
>
> Just regarding my comment that seems unclear...
>
> [snip]
>
>>> In addition, I'd like to emphasize that my review comment "It is surprising that there is hardly any discussion on network robustness and safety"
>> I have no idea what you mean by safety here.  Can you elaborate.
> As far as I understand, DetNet introduces network functions that at least partly novel, such as PREOF.  And as PREOF explicitly allows solutions beyond 1+1 protection ("network coding" is mentioned as example).

at the network layer, protection and restoration is not new. There is 
LFAs. FRR, 1+1, 1:n, shared mesh etc all defined in RFCs - mostly, but 
not solely for MPLS.  It's also not new transport protocol layer either 
as there is work (have to check if RFCs) on network coding and 1+1 -- 
but this is outside the scope of Detnet.


> I believe that any new function typically raises operational issues.
>
> Out-of-my-head, here are some examples of potential challenges that seem not well addressed in -09:
>
> - PREOF (and specifically) PEF as a single point of failure: Is there any need to worry about that? As far as I can see, the document discusses failures of paths between POF and PEF, but not failures of the functions themselves. Wouldn't it make sense to discuss basic requirements such as implementing these functions redundantly etc.? And if they are implemented redundantly, does this impact the architecture, e.g., result in additional interfaces that may need standardization?

No more so than exists in the current  RFCs related to the topic.

> - Overload of DetNet components: As another example for PREOF, how would a DetNet deployment ensure that PEF never gets overloaded?

Umm, how does an RFC ever dictate that a router/node/host isn't 
overloaded?  In the normal internet case, I think this is way outside 
the scope of an RFC.  For TE networks, this is what 
configuration/management/control is all about - and sure we can add a 
sentence on that.


> Buffering and resequencing of packets requires processing. Techniques to allocate buffer space alone may not be enough to ensure that PEF never gets overloaded. Is this a problem or not? And even if this problem may perhaps not really exist for 1+1, is there no need to worry about other, possibly more complex PREOF schemes that may require complex packet processing (or even coding)? Are there scaling issues in PREOF? And could this impact signaling, e.g., require control plane protocol extensions?

yes, there is configuration/management/control-- this can be mentioned.


>
> More generally, if the intention of DetNet is to carry mission-critical or safety-critical traffic that cannot tolerate any packet loss, let alone any downtime, wouldn't words such as "reliability", "dependability", "redundancy", "high availability", etc. be relevant in a description of the architecture? (Some of these terms are actually used in this document, mostly in references to non-IETF work.)

The IETF generally just defines the behavior on the wire in standards 
track RFCs and let others define requirement system performance levels.  
I don't think we should be changing this in DetNet.


> And this may not only matter for the data plane. Assuming that a lot of DetNet traffic requires extremely high reliability, are there architectural requirements on components outside the data plane, e.g., regarding redundancy? Obviously, control plane and management plane functions are often built today already as high availability solutions, but if the intention is to _never_ fail, isn't there a risk that DetNet may require solutions "better-than-current-IP" outside the data plane as well?

There are plenty of high availability (and different level of 
availability) implementations of systems out there.  The only think the 
IETF gets involved with specifying are those aspects that impact 
interoperability between systems.  (E.g., all the graceful restart 
related extensions in control plane protocols). Again, I don't think 
it's for DetNet to move beyond this.


> This list of topics may not be comprehensive. I just want to illustrate some examples for what could also matter when running a network _really_ deterministically, beyond the well-known congestion issue.
>
> However, just to be precise: I don't ask for additional text to address what is written in this e-mail.

Thanks - it sounds like we're ending at the same place even if we didn't 
follow the same path to get here.

Thanks again for comments/review.  I do think we'll have a better 
document once the other points are addressed.

Lou

> Michael