Re: [Tsv-art] [Detnet] Tsvart last call review of draft-ietf-detnet-architecture-08

"Scharf, Michael" <Michael.Scharf@hs-esslingen.de> Tue, 20 November 2018 21:39 UTC

Return-Path: <Michael.Scharf@hs-esslingen.de>
X-Original-To: tsv-art@ietfa.amsl.com
Delivered-To: tsv-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EEA7C130DD3; Tue, 20 Nov 2018 13:39:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=hs-esslingen.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sNjn-43zPmqC; Tue, 20 Nov 2018 13:39:19 -0800 (PST)
Received: from mail.hs-esslingen.de (mail.hs-esslingen.de [134.108.32.78]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4D49E130E9B; Tue, 20 Nov 2018 13:39:19 -0800 (PST)
Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.hs-esslingen.de (Postfix) with ESMTP id 508C325A29; Tue, 20 Nov 2018 22:39:17 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hs-esslingen.de; s=mail; t=1542749957; bh=NTABzIbWofuIg02lh1Z5xJdhYqGy3/1t/xMaSmAaQQ4=; h=From:To:CC:Subject:Date:References:In-Reply-To:From; b=SSQeQVUwg4aMfkdOkWp6dCrODKGNBg2JkXGt5TLuVZLnCC/x6h3PKGsx/KqkmMy9m gfjAdXzCg7+gTBHTnoo13laU+NwKZ8zocL17s0Yq9yz96K52DIqvQlncCqe7FgK6UY pxzMQ7nUqps1NHN++jA/0v5X4qGYcPUr/KZLqmlU=
X-Virus-Scanned: by amavisd-new-2.7.1 (20120429) (Debian) at hs-esslingen.de
Received: from mail.hs-esslingen.de ([127.0.0.1]) by localhost (hs-esslingen.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K5TC60TpiDzV; Tue, 20 Nov 2018 22:39:17 +0100 (CET)
Received: from rznt8102.rznt.rzdir.fht-esslingen.de (rznt8102.hs-esslingen.de [134.108.29.102]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by mail.hs-esslingen.de (Postfix) with ESMTPS; Tue, 20 Nov 2018 22:39:17 +0100 (CET)
Received: from RZNT8114.rznt.rzdir.fht-esslingen.de ([169.254.3.98]) by rznt8102.rznt.rzdir.fht-esslingen.de ([fe80::f977:d5e6:6b09:56ac%10]) with mapi id 14.03.0415.000; Tue, 20 Nov 2018 22:39:16 +0100
From: "Scharf, Michael" <Michael.Scharf@hs-esslingen.de>
To: Lou Berger <lberger@labn.net>
CC: "tsv-art@ietf.org" <tsv-art@ietf.org>, "detnet@ietf.org" <detnet@ietf.org>, "draft-ietf-detnet-architecture.all@ietf.org" <draft-ietf-detnet-architecture.all@ietf.org>
Thread-Topic: [Tsv-art] [Detnet] Tsvart last call review of draft-ietf-detnet-architecture-08
Thread-Index: AQHUgB1y5LtWcAVh50yat0D4Ke6LC6VXhkBAgAD9AACAABmYoIAASf2AgAA7QUA=
Date: Tue, 20 Nov 2018 21:39:16 +0000
Message-ID: <6EC6417807D9754DA64F3087E2E2E03E2D16C6D0@rznt8114.rznt.rzdir.fht-esslingen.de>
References: <153817345967.27205.135001179751151278@ietfa.amsl.com> <fdf872d6-08a6-2c33-de21-9dd1506c1d21@labn.net> <6EC6417807D9754DA64F3087E2E2E03E2D16A4D3@rznt8114.rznt.rzdir.fht-esslingen.de> <e38ab4d6-0924-ab60-b1dc-4ac26600044c@labn.net> <6EC6417807D9754DA64F3087E2E2E03E2D16C02A@rznt8114.rznt.rzdir.fht-esslingen.de> <505e7a95-05bd-5dcb-628f-460790fc1b12@labn.net>
In-Reply-To: <505e7a95-05bd-5dcb-628f-460790fc1b12@labn.net>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [134.108.29.249]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsv-art/Oq5bf40A1uRNbFyG9rtier4u96k>
Subject: Re: [Tsv-art] [Detnet] Tsvart last call review of draft-ietf-detnet-architecture-08
X-BeenThere: tsv-art@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Review Team <tsv-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsv-art/>
List-Post: <mailto:tsv-art@ietf.org>
List-Help: <mailto:tsv-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Nov 2018 21:39:29 -0000

Just to add some additional references. I have made my point already and I will not further follow-up.

> -----Original Message-----
> From: Lou Berger [mailto:lberger@labn.net]
> Sent: Tuesday, November 20, 2018 7:08 PM
> To: Scharf, Michael
> Cc: tsv-art@ietf.org; detnet@ietf.org; draft-ietf-detnet-
> architecture.all@ietf.org
> Subject: Re: [Tsv-art] [Detnet] Tsvart last call review of draft-ietf-
> detnet-architecture-08
> 
> Michael,
> 
> Thanks for the clarification.
> 
> On 11/20/2018 10:02 AM, Scharf, Michael wrote:
> > Lou,
> >
> > Just regarding my comment that seems unclear...
> >
> > [snip]
> >
> >>> In addition, I'd like to emphasize that my review comment "It is
> surprising that there is hardly any discussion on network robustness
> and safety"
> >> I have no idea what you mean by safety here.  Can you elaborate.
> > As far as I understand, DetNet introduces network functions that at
> least partly novel, such as PREOF.  And as PREOF explicitly allows
> solutions beyond 1+1 protection ("network coding" is mentioned as
> example).
> 
> at the network layer, protection and restoration is not new. There is
> LFAs. FRR, 1+1, 1:n, shared mesh etc all defined in RFCs - mostly, but
> not solely for MPLS.  It's also not new transport protocol layer either
> as there is work (have to check if RFCs) on network coding and 1+1 --
> but this is outside the scope of Detnet.

From draft-ietf-detnet-architecture-09:

  3.2.2.3.  Packet encoding for service protection

   There are methods for using multiple paths to provide service
   protection that involve encoding the information in a packet
   belonging to a DetNet flow into multiple transmission units,
   combining information from multiple packets into any given
   transmission unit.  Such techniques, also known as "network coding",
   can be used as a DetNet service protection technique.

So, "network coding" is explicitly *in scope* of draft-ietf-detnet-architecture-09. 

And my comments are about the architectural impact of that section.

It is not clear to me why one would need an IRTF research group (NWCRG) if "network coding" was just a straightforward extension of existing MPLS or OTN protection and restoration schemes.

> > I believe that any new function typically raises operational issues.
> >
> > Out-of-my-head, here are some examples of potential challenges that
> seem not well addressed in -09:
> >
> > - PREOF (and specifically) PEF as a single point of failure: Is there
> any need to worry about that? As far as I can see, the document
> discusses failures of paths between POF and PEF, but not failures of
> the functions themselves. Wouldn't it make sense to discuss basic
> requirements such as implementing these functions redundantly etc.? And
> if they are implemented redundantly, does this impact the architecture,
> e.g., result in additional interfaces that may need standardization?
> 
> No more so than exists in the current  RFCs related to the topic.
>
> > - Overload of DetNet components: As another example for PREOF, how
> would a DetNet deployment ensure that PEF never gets overloaded?
> 
> Umm, how does an RFC ever dictate that a router/node/host isn't
> overloaded?  In the normal internet case, I think this is way outside
> the scope of an RFC.  For TE networks, this is what
> configuration/management/control is all about - and sure we can add a
> sentence on that.

See RFCs 5390, 6357, 7068, 7339, 7683, etc. for examples where overload control is standardized. These are typical solutions in environments where five-nine availability is needed. I won't argue that these RFCs directly relate to DetNet, as these RFCs are not about routing technology. But, nonetheless, it is surprising that the working group does not worry at all about overload of newly defined functions such as PREOF, while the working group at the same time allows possibly compute-intensive solutions for that. That comes down to the assumption that compute power is never a bottleneck...

But I'll not follow-up further on that. I assume that is also a topic where other IETF areas have better expertise.

Michael


 
> > Buffering and resequencing of packets requires processing. Techniques
> to allocate buffer space alone may not be enough to ensure that PEF
> never gets overloaded. Is this a problem or not? And even if this
> problem may perhaps not really exist for 1+1, is there no need to worry
> about other, possibly more complex PREOF schemes that may require
> complex packet processing (or even coding)? Are there scaling issues in
> PREOF? And could this impact signaling, e.g., require control plane
> protocol extensions?
> 
> yes, there is configuration/management/control-- this can be mentioned.
> 
> 
> >
> > More generally, if the intention of DetNet is to carry mission-
> critical or safety-critical traffic that cannot tolerate any packet
> loss, let alone any downtime, wouldn't words such as "reliability",
> "dependability", "redundancy", "high availability", etc. be relevant in
> a description of the architecture? (Some of these terms are actually
> used in this document, mostly in references to non-IETF work.)
> 
> The IETF generally just defines the behavior on the wire in standards
> track RFCs and let others define requirement system performance
> levels.
> I don't think we should be changing this in DetNet.
> 
> > And this may not only matter for the data plane. Assuming that a lot
> of DetNet traffic requires extremely high reliability, are there
> architectural requirements on components outside the data plane, e.g.,
> regarding redundancy? Obviously, control plane and management plane
> functions are often built today already as high availability solutions,
> but if the intention is to _never_ fail, isn't there a risk that DetNet
> may require solutions "better-than-current-IP" outside the data plane
> as well?
> 
> There are plenty of high availability (and different level of
> availability) implementations of systems out there.  The only think the
> IETF gets involved with specifying are those aspects that impact
> interoperability between systems.  (E.g., all the graceful restart
> related extensions in control plane protocols). Again, I don't think
> it's for DetNet to move beyond this.
> 
> 
> > This list of topics may not be comprehensive. I just want to
> illustrate some examples for what could also matter when running a
> network _really_ deterministically, beyond the well-known congestion
> issue.
> >
> > However, just to be precise: I don't ask for additional text to
> address what is written in this e-mail.
> 
> Thanks - it sounds like we're ending at the same place even if we
> didn't
> follow the same path to get here.
> 
> Thanks again for comments/review.  I do think we'll have a better
> document once the other points are addressed.
> 
> Lou
> 
> > Michael