Re: [Tvr] First draft of problem statement

Joel Halpern <jmh@joelhalpern.com> Mon, 31 October 2022 14:55 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: tvr@ietfa.amsl.com
Delivered-To: tvr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0C852C15256A for <tvr@ietfa.amsl.com>; Mon, 31 Oct 2022 07:55:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.004
X-Spam-Level:
X-Spam-Status: No, score=-2.004 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Yk1mnlgNAhHQ for <tvr@ietfa.amsl.com>; Mon, 31 Oct 2022 07:55:05 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 47D78C152569 for <tvr@ietf.org>; Mon, 31 Oct 2022 07:55:05 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 4N1GQx171Dz1pZ3d; Mon, 31 Oct 2022 07:55:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1667228105; bh=M2SRsUPPNHzRLgcC7G1l6GMhkwo4b4QTJcjao5naqmY=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=EEnkKWAXKkhDYzmsqo3qidaUORHAES4W5o0EznQpHbCVNzJIxPn9kk0OGsvEAjYul diiKssp9EGr+BLqnw5ebsE7CpKALr/UO0rubE4hhsj1IoFAeRiZD1pNLf8fxi0XeAH G9GkTTjuBhcnonCiTOJJRdz+xcZ++MLf1u5SSWrg=
X-Quarantine-ID: <0KwtvvTAm2O2>
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from [192.168.23.73] (unknown [50.233.136.230]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 4N1GQt45s5z1nvQk; Mon, 31 Oct 2022 07:54:58 -0700 (PDT)
Content-Type: multipart/alternative; boundary="------------p6RIKEjDyL8PI2Cfz0zBxWHw"
Message-ID: <3d97e0a7-9616-fd05-e615-55ba29ae4940@joelhalpern.com>
Date: Mon, 31 Oct 2022 10:54:58 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.4.1
Content-Language: en-US
To: Dirk Trossen <dirk.trossen@huawei.com>, "Beck, Micah" <mbeck@utk.edu>
Cc: "tvr@ietf.org" <tvr@ietf.org>
References: <a5ba762f-fa4f-13d3-f3d7-1738fbdc3d05@tropicalstormsoftware.com> <66612D70-33F4-40F2-B4FF-5D2C89442659@tony.li> <38A5475DE83986499AEACD2CFAFC3F98025B64B607@tss-server1.home.tropicalstormsoftware.com> <44656C4C-8C28-44D9-8A2E-5BFCB11B65C3@tony.li> <b719d1f4-d5c1-4eff-960e-f0ddbb61ab49@email.android.com> <45906509-BC8C-479B-A15D-2FEA62E4CC03@tony.li> <CAMzo+1ZMWb0sy-7rgcuhUDa0zS=k4dJ41LiF8bf4+7um_+eGiw@mail.gmail.com> <E13F57FF-192B-4EE6-9150-39D7327B94CD@utk.edu> <CAAFtm_WEba+kABzEUr+=_NkMzs_F-RkzfBrMt0GF-KO5g0oFdQ@mail.gmail.com> <38C83EBD-7AA7-4C0E-A2E4-70D49CE66C67@utk.edu> <069d01d8ea7e$5326cbe0$f97463a0$@gmail.com> <ab090fcf-df3e-5220-6d66-60dd4bbc2433@joelhalpern.com> <078701d8eada$ef95c650$cec152f0$@gmail.com> <9B705512-9C9B-4F11-950F-B2F588C6755E@utk.edu> <c585d202-295f-e5de-f038-5d873336bb67@joelhalpern.com> <f663804890f348da88624175484a84b7@huawei.com>
From: Joel Halpern <jmh@joelhalpern.com>
In-Reply-To: <f663804890f348da88624175484a84b7@huawei.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tvr/4ZHkzDVfnOjtbvMQd41ts_9G8rk>
Subject: Re: [Tvr] First draft of problem statement
X-BeenThere: tvr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Time-Variant Routing <tvr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tvr>, <mailto:tvr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tvr/>
List-Post: <mailto:tvr@ietf.org>
List-Help: <mailto:tvr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tvr>, <mailto:tvr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 31 Oct 2022 14:55:09 -0000

Generally working groups do better with narrow focus.

Having said that, my concern was combining the problem of routing 
adapting to planned changes with the problem of turning routing into a 
store and forward network (DTN does an interesting job there.)

Yours,

Joel

On 10/31/2022 4:28 AM, Dirk Trossen wrote:
>
> Dear all,
>
> Addressing by anything but an IP address does not need to lead to ICN 
> like ephemeral storage architectures, though. Having the capability to 
> deal with time-variant routing decision would greatly support ideas 
> like ‘routing on service addresses’ (ROSA) 
> (https://www.ietf.org/id/draft-trossen-rtgwg-rosa-00.html), which has 
> been submitted to the RTG WG as discussion in the next IETF (scheduled 
> now for the Thursday slot of the RTG WG).
>
> Here, ROSA carries service information in IPv6 EHs for a shim overlay 
> to make routing and forwarding decisions on that information. The 
> selection of the appropriate IPv6 destination (called a service 
> instance in ROSA) may be based on dynamic, down to request-level, 
> decisions (we developed a simple round robin that can operate linked 
> to computing information, as an example), but a time-variant decision 
> may equally be useful.
>
> The statement that “/The larger value of TVR (IMO) is that a planned 
> loss (or gain) of an adjacency can avoid tripping into recovery or 
> rediscovery mechanisms/.” is crucial and captures my understanding of 
> TVR very well. But when thinking of routing on service addresses as an 
> approach, the recovery/rediscovery mechanism may well look quite 
> different when, well, routing on service addresses but network locators.
>
> Best,
>
> Dirk
>
> *From:*Tvr <tvr-bounces@ietf.org> *On Behalf Of *Joel Halpern
> *Sent:* 28 October 2022 20:06
> *To:* Beck, Micah <mbeck@utk.edu>
> *Cc:* tvr@ietf.org
> *Subject:* Re: [Tvr] First draft of problem statement
>
> If the network holds packets for any significant length of time, this 
> produces results which affect and disrupt the application behavior.  
> if you want a long term store network, look at the DTN work.  The 
> applications themselves behave differently because they know that the 
> network has different properties.  (One could even argue that the 
> bufferbloat work shows that even the delays we have currently in the 
> routing / forwarding network when we buffer for congestion cause 
> application difficulties.)
>
> This work is being considered in the context of IP routing. And IP 
> Forwarding.  The packets are addressed by IP.  The DNS or other 
> resolution behaviors are driven by the applications at the end systems.
>
> My understanding is that the goal of this work is to allow the routing 
> and forwarding system to be aware of expected changes in the 
> topology.  Changing the forwrading paradigm would be a different task.
>
> Yours,
>
> Joel
>
> On 10/28/2022 2:00 PM, Beck, Micah wrote:
>
>         As I see it, the basis for route computation in DTN and IP is
>         the known source and destination of the data, while the basis
>         for route computation in ICN is the nature of the data.
>
>     Today, it is unusual for an Internet service request to be
>     addressed directly by IP address - we use domain names (e.g. in
>     URLs). A domain may indeed correspond to an IP address that names
>     a unique network interface. However it is common for a domain to
>     resolve to a set of IP addresses or perhaps to a single IP address
>     that is routed to one of a set of network interfaces via BGP
>     anycast. In either case, the network interface that is the target
>     of the request is determined with reference to the network
>     topology. If the topology changes, the target may become
>     inaccessible or it may no longer be an appropriate one or the best
>     choice.
>
>     As you point out, ICN copes with this kind of situation through
>     content-based addressing. In contrast, requests that are resolved
>     to an IP address can either be rerouted or they can fail. In the
>     current environment, the resolution of a domain to an IP address
>     is generally performed immediately before making a service
>     request, so there is a limited window for serious changes to
>     topology. If the target becomes unavailable, the request fails and
>     domain resolution may be repeated before retrying.
>
>     However in the case of TVR, if data were to be held for a longer
>     period at any point after domain resolution occurred, the topology
>     could change quite dramatically. In this case it may be preferable
>     for the service request to fail then to continue to try and reach
>     the IP address originally targeted. It depends on many factors
>     that may be difficult or impossible for the Network layer to take
>     account of,
>
>         “/The larger value of TVR (IMO) is that a planned loss (or
>         gain) of an adjacency can avoid tripping into recovery or
>         rediscovery mechanisms/.“  I think this is an especially
>         eloquent expression of what we are after.
>
>     Please forgive my ignorance on this topic, but how significant a
>     cost is "/tripping into recovery or rediscovery mechanisms”//?
>     /Especially given the above analysis that such mechanisms are in
>     some common and important cases used as an alternative to
>     content-based routing as a way to find a target that is
>     topologically well matched to a particular request.
>
>     There is an argument that use of topologically-informed domain
>     resolution is now a means of service request routing. This has
>     moved responding to major changes in topology out of the domain
>     that the IP-address Network layer can deal with “completely and
>     correctly”. That would mean it should be left to a higher layer.
>     At least according to this argument.
>
>     /micah
>
>
>
>         On Oct 28, 2022, at 10:38 AM, sburleig.sb@gmail.com wrote:
>
>         One direction I would like to try to steer us away from is
>         conflating TVR with ICN.  As I see it, the basis for route
>         computation in DTN and IP is the known source and destination
>         of the data, while the basis for route computation in ICN is
>         the nature of the data.  What I think distinguishes TVR (and
>         DTN) from more familiar IP is (a) the way in which the route
>         is computed, given the source and destination, in light of
>         known future variations in adjacency and (b) how to enable the
>         transmitted data to survive those changes in adjacency as it
>         makes its way through the network.  The latter involves
>         storage, as does ICN, but the operational context of the
>         storage is different.
>
>         Scott Burleigh
>
>         *From:*Joel Halpern <jmh@joelhalpern.com>
>         *Sent:*Thursday, October 27, 2022 9:40 PM
>         *To:*sburleig.sb@gmail.com
>         *Cc:*tvr@ietf.org
>         *Subject:*Re: [Tvr] First draft of problem statement
>
>         I would suggest being very careful about the path described
>         below.  Not because it is wrong.  But because it seems to be a
>         different problem.  The DTN and ICN work deals with networks
>         of devices which store things for later transmission.  To the
>         degree that we are describing an IP Routing problem of
>         reacting to changes in topology, that is not a storage and
>         later transmission problem.  If we mix the two, I for one will
>         find it quite confusing.
>
>         Yours,
>
>         Joel
>
>         On 10/27/2022 11:35 PM,sburleig.sb@gmail.comwrote:
>
>             Hi, Micah.  As you’ve reminded me (off-list
>             communication), we have been talking about this sort of
>             thing for many years.  One way of looking at it is to say
>             that there is actually a fine line between “communication”
>             and “storage”.  Communication, in essence, is the copying
>             – to some location – of data currently stored at a
>             different location; in order to do this we usually first
>             copy it to some other (notional) location, which we term a
>             communication “medium”.  Interplanetary networking is a
>             good example: the length of time the data resides in the
>             medium (which we no longer call “the ether”) is the
>             communication latency.  More prosaically, if I want to
>             store a locker combination very securely for two or three
>             days then maybe I write it on a piece of paper and mail it
>             to myself.
>
>             From this perspective, we might look at TVR as more
>             explicitly the selection of a sequence of locations to
>             which we want data to be copied; that sequence is a
>             “route” and by acknowledging the storage nature of the
>             operation we tolerate variance in the timeline of the copy
>             operations.
>
>             Scott
>
>             *From:*Tvr<tvr-bounces@ietf.org>
>             <mailto:tvr-bounces@ietf.org>*On Behalf Of*Beck, Micah
>             *Sent:*Thursday, October 27, 2022 2:19 PM
>             *To:*vinton cerf<vgcerf@gmail.com> <mailto:vgcerf@gmail.com>
>             *Cc:*Beck, Micah<mbeck=40utk.edu@dmarc.ietf.org>
>             <mailto:mbeck=40utk.edu@dmarc.ietf.org>;tvr@ietf.org; Tony
>             Li<tony.li@tony.li> <mailto:tony.li@tony.li>; Rick
>             Taylor<rick@tropicalstormsoftware.com>
>             <mailto:rick@tropicalstormsoftware.com>; Jorge
>             Amodio<jmamodio@gmail.com> <mailto:jmamodio@gmail.com>
>             *Subject:*Re: [Tvr] First draft of problem statement
>
>             Here are some thoughts about how the Transport and
>             Application layers might work in a TVR-based network
>             environment.
>
>             While some applications can work with the weak guarantees
>             of a best-effort network, providing a more robust model
>             seems to be key to adoption and growth. For this reason
>             TCP does its best to ensure data integrity, in-order
>             delivery and to maintain connection state and continuity
>             in the face of interruption. TCP trades off these
>             desirable characteristics for increased latency.
>
>             In the case of TVR, service interruptions may be more
>             severe than are widely acceptable to applications that use
>             TCP. A TCP connection may time out, or an application may
>             simply fail to function adequately in the face of a long
>             enough pause in data transfer. For some applications it is
>             better to make weaker assumptions about network
>             availability than to make strong assumptions which are not
>             satisfied (resulting in error conditions).
>
>             Is it possible for a Transport layer service to help
>             overcome long pauses in data transfer? The answer is yes,
>             if that Transport layer is willing to manage enough
>             transfer state to enable some applications to continue
>             functioning during such pauses.
>
>             A minimal example of an application that is “always
>             available during disconnection” is text messaging. Because
>             the application buffers messages until they can be sent,
>             the end user experience is not changed by a lack of
>             connectivity. Interactive conversations experience delays,
>             but depending on end user expectation that may be acceptable.
>
>             The amount of state that would have to be managed depends
>             on the application. An audio streaming service might want
>             the end system to store enough music to get through a
>             pause uninterrupted. A map application might want it to
>             store enough maps and instructions to get to a
>             destination. Applications that use larger data types
>             (videos, satellite imagery, executable images) might
>             require substantially more storage to enable continued
>             operation during pauses in connectivity.
>
>             All Internet Transport layers other than UDP manage state.
>             TCP manages send and receive queues. SCTP manages multiple
>             queues. What I am suggesting is more extreme, but enabling
>             applications to work well in an environment that does not
>             provide continuous connectivity is a major challenge.
>
>             If it sounds like I am suggesting that some applications
>             might require multiple gigabytes of storage to enable
>             continuous operations, that is correct. However it is not
>             necessary that the burden be located entirely at a single
>             end node. A large connection state could be directed to a
>             specialized storage appliance in the LAN.
>
>             The intention of this proposal is not simply to enable
>             asynchronous data transfer in a sometimes disconnected
>             environment, but to enable as rich an interaction as
>             possible using the Transport layer as a stateful surrogate
>             for a remote node. This might include enabling some
>             behaviors specified by the remote node. These would have
>             to be limited in scope for reasons of security and
>             stability (not wanting to recreate Java applets!)
>
>             It is worth noting that the strategy of using edge storage
>             and processing to overcome connectivity issues is
>             currently being pursued by industry players, including
>             Apple, Google and Amazon. However in those cases the edge
>             devices are closed and the resources are usable only
>             within the ecosystems of each company.
>
>             The management of transfer state is part of the network
>             stack. Generalizing the Network layer without considering
>             how this increases the burden of responsibility on the
>             Transport layer is leaving part of the problem out of the
>             picture.
>
>             Best regards,
>
>             /micah
>
>
>
>
>
>                 On Oct 26, 2022, at 10:02 PM, vinton cerf
>                 <vgcerf@gmail.com> wrote:
>
>
>                 	
>
>                 You don't often get email fromvgcerf@gmail.com.Learn
>                 why this is important
>                 <https://aka.ms/LearnAboutSenderIdentification>
>
>                 	
>
>                 see delay and disruption tolerant networks (DTN)
>
>                 v
>
>                 On Tue, Oct 25, 2022 at 12:28 PM Beck, Micah
>                 <mbeck=40utk.edu@dmarc.ietf.org> wrote:
>
>                     Hi all TVRers!
>
>                     I am interested in using IP without latency bounds
>                     or minimum connectivity requirements to provide
>                     digital connnectivity to locations where broadband
>                     as currently defined by the telecommunications
>                     industry will not reach soon, or perhaps ever. I
>                     am seeking feedback on whether this category of
>                     use cases fits in with the intended scope of the
>                     TVR working group.
>
>                     In such cases, applications may use edge storage
>                     and processing resources to hide or overcome high
>                     latency and disconnection. An edge resource may
>                     have several possible “last mile” links, and their
>                     endpoints may be predictable, but the timing and
>                     availability may vary greatly even if there is a
>                     nominal schedule. Thus, the topology is not as
>                     unpredictable as MANET, but it has a great need
>                     for fault tolerance through the use of multiple
>                     alternative last-mile links. It is similar in some
>                     ways to cases handled by DTN, but I believe the
>                     timing predictability assumptions are weaker.
>
>                     Some examples include:
>
>                     1. Connection through an aerial vehicle such as a
>                     blimp or LEO satellite.
>
>                     2. Storage carried on a ground or aerial vehicle
>                     that is used as data transfer by moving it between
>                     a wired or wireless point of connectivity to the
>                     backbone and the edge network. Amazon’s
>                     Snow{Flake,Ball,Mobile} line of products are
>                     proprietary Cloud versions of this “data ferrying”
>                     approach. It has also been used in many
>                     specialized scenarios including Wildfire
>                     Management scenarios and for email connectivity to
>                     remote villages in India. Other examples that
>                     might take advantage of scheduled ground vehicles
>                     include disaster response (where National Guard
>                     vehicles could be organized to move data in a
>                     predictable manner while also moving physical good
>                     or people) or remote education (where school buses
>                     run on predictable schedules reaching remote rural
>                     homes).
>
>                     3. Use of links that are highly intermittent,
>                     noisy or have highly variable transmission
>                     characteristics (e.g. error rate).  Various forms
>                     of underinvested community networking may fall
>                     into this category.
>
>                     In terms of how these cases may differ from what
>                     has been considered in scope for TVR up to this point:
>
>                     A. It may be necessary to utilize periods of
>                     connectivity of very short duration, or which have
>                     characteristics that are weaker than is generally
>                     assumed (high error rate for example). This may
>                     require different transport or application layer
>                     algorithms in order to take advantage of bandwidth
>                     which is available (and which might be quite high
>                     in some cases). This is not just a
>                     scheduling/routing problem but a latency-tolerance
>                     issue.
>
>                     B. If edge devices utilize a form of content-based
>                     or CDN-like subscription to determine which data
>                     to transfer across the last mile, then a routing
>                     scheme that is not based solely on destination
>                     address may be necessary. A specific content- or
>                     policy-based data movement policy might be
>                     implemented in overlay, but it would still require
>                     access to low layer topological and temporal
>                     information which may be held in routing tables in
>                     order to make informed choices.
>
>                     An example of case B arises when a large storage
>                     resource (e.g, a ground vehicle carrying storage
>                     laden with deliverable content) becomes
>                     temporarily available to an edge device (e.g.
>                     parked within connectivity reach of a WLAN) but it
>                     is not practical or desired to move the entire
>                     contents of the storage resource to the edge
>                     device. We would like the movement of data to be
>                     mediated by policy (which is not part of the TVR
>                     mechanism) but informed by topological knowledge
>                     that is available to the TVR routing algorithm.
>
>                     Without case B, the hard-to-connect edge network
>                     must rely on the same repeated unicast solution
>                     that is used in overprovisioned networks.
>
>                     My question: is this in scope for TVR, does it fit
>                     into another existing framework or working group,
>                     or is it a different category that would have to
>                     be considered separately from the current taxonomy
>                     of stable, predictable or highly dynanmic?
>
>                     Thanks for your attention,
>
>                     /micah
>
>                     Micah Beck
>
>                     Associate Professor, EECS
>
>                     University of Tennessee, Knoxville
>
>
>
>
>
>                         On Oct 25, 2022, at 9:45 AM, Jorge Amodio
>                         <jmamodio@gmail.com> wrote:
>
>
>                         	
>
>                         You don't often get email
>                         fromjmamodio@gmail.com.Learn why this is
>                         important
>                         <https://aka.ms/LearnAboutSenderIdentification>
>
>                         	
>
>                         I believe we are going to have stable,
>                         predictable/planned dynamic, and random dynamic.
>
>                         Jorge
>
>                         On Tue, Oct 25, 2022 at 8:24 AM Tony Li
>                         <tony.li@tony.li> wrote:
>
>                             Rick,
>
>                             If you consider the cases of vehicle
>                             networks and satellites, both are highly
>                             dynamic topologies. See the use cases
>                             document.
>
>                             Tony
>
>
>
>
>
>                                 On Oct 24, 2022, at 11:20 PM, Rick
>                                 Taylor
>                                 <rick@tropicalstormsoftware.com> wrote:
>
>                                 Hi Tony
>
>                                 I think dynamic topologies are for
>                                 Manet to fix.  Here I think we are
>                                 discussing stable topologies but with
>                                 an extra time dimension.
>
>                                 Does that make any sense?
>
>                                 Rick
>
>                                 Sent from my phone.
>
>                                 On 24 Oct 2022 21:46, Tony Li
>                                 <tony.li@tony.li> wrote:
>
>
>                                 Rick,
>
>                                 One more thought:
>
>                                 Our conventional mechanisms for
>                                 protocol scaling have always been to
>                                 create hierarchy based on a static
>                                 topology.  A dynamic topology throws
>                                 that out the window.  How do we
>                                 achieve scalabity?
>
>                                 Tony
>
>                                 > On Oct 24, 2022, at 1:31 PM, Rick
>                                 Taylor
>                                 <rick@tropicalstormsoftware.com> wrote:
>                                 >
>                                 > Hi Tony,
>                                 >
>                                 > Thank you very much - I found myself
>                                 nodding along in agreement with all
>                                 your points.
>                                 >
>                                 > I think I achieved my objective,
>                                 which was (in combination with Ed's
>                                 use-case draft) to start a
>                                 conversation to discover if there are
>                                 problems worth tackling here - and I
>                                 still think there are.
>                                 >
>                                 > Cheers,
>                                 >
>                                 > Rick
>                                 >
>                                 > P.S.  I wanted to try to avoid using
>                                 the word 'topology' so early in a
>                                 document - but I suppose this is the
>                                 IETF so I could have got away with it ;)
>                                 >
>                                 >> -----Original Message-----
>                                 >> From: Tony Li
>                                 [mailto:tony1athome@gmail.com
>                                 <mailto:tony1athome@gmail.com>] On
>                                 Behalf Of Tony Li
>                                 >> Sent: 24 October 2022 21:12
>                                 >> To: Rick Taylor
>                                 >> Cc:tvr@ietf.org
>                                 >> Subject: Re: [Tvr] First draft of
>                                 problem statement
>                                 >>
>                                 >>
>                                 >> Hi Rick,
>                                 >>
>                                 >> Thank you for your draft, it’s a
>                                 good starting point.
>                                 >>
>                                 >> Some thoughts, in no particular order:
>                                 >>
>                                 >> Conventional routing protocols are
>                                 somewhat less binary than you seem to
>                                 >> imply.  You write:
>                                 >>
>                                 >> Changes to that
>                                 >> connectivity, such as the loss of
>                                 an adjacent peer, are considered to
>                                 >>   be exceptional circumstances that
>                                 must be corrected prior to the
>                                 >> resumption of data transmission.
>                                 >>
>                                 >> In reality, of course, forwarding
>                                 continues as best it can. Alternate
>                                 routes get
>                                 >> computed as quickly as is
>                                 reasonably possible and forwarding
>                                 continues. Link
>                                 >> loss is a fault, to be sure, but is
>                                 sadly not exceptional or an error in
>                                 any way.
>                                 >> This is primarily an issue of tone.
>                                 >>
>                                 >> There has been some work done to
>                                 handle planned link (and node) outages.
>                                 >> These have been operationally
>                                 driven and to date don’t have a lot of
>                                 >> management plane automation, but
>                                 the techniques exist. Management sets
>                                 >> the metric on the link to a very
>                                 high value, effectively infinity, and
>                                 traffic is
>                                 >> diverted away from the link.
>                                 Automating this would be one possible
>                                 >> improvement that we could take on.
>                                 >>
>                                 >> You write that protocols assume:
>                                 >>
>                                 >> The individual nodes in a network
>                                 do not move around.
>                                 >>
>                                 >> I think that the physical
>                                 positioning of the nodes is not an
>                                 issue. What matters
>                                 >> is the topology. If you put a
>                                 network on a fleet of ships and you
>                                 move around
>                                 >> and the topology stays connected,
>                                 it’s not an issue.  When the topology does
>                                 >> change, then yes, that’s an issue.
>                                 Routing protocols do react to topology
>                                 >> changes and they do not expect a
>                                 topology to remain static.
>                                 >>
>                                 >> They DO make an inherent assumption
>                                 about the rate of topology changes.
>                                 >> Specifically, they are making the
>                                 assumption that the topology is
>                                 sufficiently
>                                 >> stable that it is efficient and
>                                 worthwhile to disseminate information
>                                 about the
>                                 >> topology change.  If the rate of
>                                 topology change is extreme, then the
>                                 cost of
>                                 >> flooding and distributed
>                                 computation may not be efficient.
>                                 >>
>                                 >> Moore’s law has been very kind to
>                                 us. The cost of doing path computation has
>                                 >> become almost irrelevant. True, the
>                                 algorithms are still O(n log n), so
>                                 scale is
>                                 >> an issue, but modern processors
>                                 have kept up reaonably well. Path
>                                 >> computation is not an event to be
>                                 feared.
>                                 >>
>                                 >> Modern forwarding practices have
>                                 also made path computation less
>                                 >> disruptive. When there is a link
>                                 failure, there can be precomputed fast
>                                 reroute
>                                 >> paths that will take over the paths
>                                 with little or no forwarding loss. 
>                                 The use of
>                                 >> ‘make before break’ techniques also
>                                 allow us to make new path computation
>                                 >> decisions without noticeable loss.
>                                 >>
>                                 >> One of the concerns that I have
>                                 that doesn’t seem to be addressed is about
>                                 >> link liveness and path computation
>                                 in the face of scheduled uptimes.
>                                 >> Specifically, can we be assured
>                                 that a link will appear on schedule?
>                                 Or do we
>                                 >> wait until proof of liveness before
>                                 directing traffic down the link? The
>                                 former
>                                 >> seems highly optimistic and
>                                 potentially disruptive. Section 4.2 seems
>                                 >> unnecessarily pessimistic. Our
>                                 operational experience has caused us to be
>                                 >> cautious about connectivity gains,
>                                 especially due to flapping circuits.
>                                 If those
>                                 >> can be addressed in a particular
>                                 environment, there is no reason that link
>                                 >> creation cannot be handled as
>                                 expeditiously as link failure.
>                                 >>
>                                 >> BGP does not require a global
>                                 recomputation of topology. Which is a very
>                                 >> good thing, as it has never
>                                 converged. :-)
>                                 >>
>                                 >> I agree that having an Adjacency
>                                 Schedule is a very good thing. Does it
>                                 really
>                                 >> need to be in the routing protocol?
>                                 I’m not convinced. It seems like this is
>                                 >> something that should be delivered
>                                 by the management plane. I’ll say it once
>                                 >> again: the IGP is not a dump truck.
>                                 >>
>                                 >> Regards,
>                                 >> Tony
>                                 >>
>                                 >>
>                                 >>
>                                 >>
>                                 >>> On Oct 24, 2022, at 11:17 AM, Rick
>                                 Taylor <rick@tropicalstormsoftware.com>
>                                 >> wrote:
>                                 >>>
>                                 >>> Hi All,
>                                 >>>
>                                 >>> Right up against the deadline, I
>                                 have publish a very early Problem
>                                 >>> Statement draft at:
>                                 >>>
>                                 https://datatracker.ietf.org/doc/draft-taylor-tvr-prb-stmt/
>                                 <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-taylor-tvr-prb-stmt%2F&data=05%7C01%7Cmbeck%40utk.edu%7C49d9bf78dcd44c5a706408dab8f215b9%7C515813d9717d45dd9eca9aa19c09d6f9%7C0%7C0%7C638025647161452860%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=k84xSCnC2TMuvqIJXAZada8ZLP58ojrrFojmxMRe4tg%3D&reserved=0>
>                                 >>>
>                                 >>> Please feel free to read and
>                                 comment, and I'm happy to use it as a
>                                 basis
>                                 >>> for discussion at IETF-115.
>                                 >>>
>                                 >>> Cheers,
>                                 >>>
>                                 >>> Rick
>                                 >>>
>                                 >>> --
>                                 >>> Tvr mailing list
>                                 >>>Tvr@ietf.org
>                                 >>>
>                                 https://www.ietf.org/mailman/listinfo/tvr
>                                 <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Ftvr&data=05%7C01%7Cmbeck%40utk.edu%7C49d9bf78dcd44c5a706408dab8f215b9%7C515813d9717d45dd9eca9aa19c09d6f9%7C0%7C0%7C638025647161452860%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2BF80EPuPMeKX9hiConu%2BDSl%2BMdZ11wxdxTMIRmwroiw%3D&reserved=0>
>                                 >
>                                 > --
>                                 > Tvr mailing list
>                                 >Tvr@ietf.org
>                                 >
>                                 https://www.ietf.org/mailman/listinfo/tvr
>                                 <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Ftvr&data=05%7C01%7Cmbeck%40utk.edu%7C49d9bf78dcd44c5a706408dab8f215b9%7C515813d9717d45dd9eca9aa19c09d6f9%7C0%7C0%7C638025647161452860%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2BF80EPuPMeKX9hiConu%2BDSl%2BMdZ11wxdxTMIRmwroiw%3D&reserved=0>
>
>                             --
>                             Tvr mailing list
>                             Tvr@ietf.org
>                             https://www.ietf.org/mailman/listinfo/tvr
>                             <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Ftvr&data=05%7C01%7Cmbeck%40utk.edu%7C49d9bf78dcd44c5a706408dab8f215b9%7C515813d9717d45dd9eca9aa19c09d6f9%7C0%7C0%7C638025647161452860%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2BF80EPuPMeKX9hiConu%2BDSl%2BMdZ11wxdxTMIRmwroiw%3D&reserved=0>
>
>                         --
>                         Tvr mailing list
>                         Tvr@ietf.org
>                         https://www.ietf.org/mailman/listinfo/tvr
>                         <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Ftvr&data=05%7C01%7Cmbeck%40utk.edu%7C49d9bf78dcd44c5a706408dab8f215b9%7C515813d9717d45dd9eca9aa19c09d6f9%7C0%7C0%7C638025647161452860%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2BF80EPuPMeKX9hiConu%2BDSl%2BMdZ11wxdxTMIRmwroiw%3D&reserved=0>
>
>                     --
>                     Tvr mailing list
>                     Tvr@ietf.org
>                     https://www.ietf.org/mailman/listinfo/tvr
>                     <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Ftvr&data=05%7C01%7Cmbeck%40utk.edu%7C49d9bf78dcd44c5a706408dab8f215b9%7C515813d9717d45dd9eca9aa19c09d6f9%7C0%7C0%7C638025647161452860%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2BF80EPuPMeKX9hiConu%2BDSl%2BMdZ11wxdxTMIRmwroiw%3D&reserved=0>
>
>                 --
>                 Tvr mailing list
>                 Tvr@ietf.org
>                 https://www.ietf.org/mailman/listinfo/tvr
>                 <https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Ftvr&data=05%7C01%7Cmbeck%40utk.edu%7C49d9bf78dcd44c5a706408dab8f215b9%7C515813d9717d45dd9eca9aa19c09d6f9%7C0%7C0%7C638025647161452860%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2BF80EPuPMeKX9hiConu%2BDSl%2BMdZ11wxdxTMIRmwroiw%3D&reserved=0>
>
>
>
>
>         --
>         Tvr mailing list
>         Tvr@ietf.org
>         https://www.ietf.org/mailman/listinfo/tvr
>