#36: Last call comments: MCR comments

Comment (by [email protected]):

 Replying to [ticket:36 shwethab@…]:
 >  If it is going to proceed in volumes (I suggest "editions" is the
 correct term), then I think that most things which are speculation should
 either be removed to a later edition, or something specific should be
 said, with the understanding that it might change later. Presciption
 rather than speculation should be the goal.
 >
 > 1) I find it odd that there is so much emphasis of the backbone router
 function... IN THE ABSTRACT. I suggest that the last sentence: Backbone
 Routers perform proxy Neighbor Discovery operations over the backbone on
 behalf of the wireless devices, so they can share a same subnet and appear
 to be connect= ed to the same backbone as classical devices. be removed
 from the abstract. Probably by the end of this review that I'll suggest a
 different thing that could be included.
 >
 > 2) end of section 1, what does it mean: "in the round of this
 document."?
 >
 > 3) I don't think that [I-D.ietf-roll-rpl-industrial-applicability] will
 ever get published. If there is terminology there that we still need, I
 think it should be extracted into the 6tisch-terminology document. While
 it is an informative reference, the fewer references to IDs the better in
 my opinion.
 >
 > 4) section 4, seems to ignore the possibility to simply run RPL across
 the subnet backbone. I understand why the ND mechanism are nice, because
 they permit the backbone to just be ethernet, but the case where the
 backbone is really dedicated (and given VLANs, it's hard to know why you'd
 do anything else), one can just run RPL across it. I think that this
 ultimately matters to any of the later architecture, but I wouldn't want
 to later argue with someone who might claim that the newer ND mechanisms
 are REQUIRED.
 >
 > 5) the security words include: "will be studied in the next round of
 this document." and I'm not sure what a reader should make of this.
 Perhaps it should simply summarize section 13 in one sentence and say that
 PANA is a possibility, but that the choice of protocol is out of scope for
 this document. (well, 5.0 then explains about volumes. So perhaps the
 explanation about volumes should go much earlier, most probably into the
 abstract as well. Also, will the volumes build on the previous work, or
 will they replace it? if they will replace it, then I think correct word
 is "edition")
 >
 > 6) I don't think that the Note: about DETNET really still belongs in a
 document that might be read in 5-10 years. Maybe a reference to the
 charter for DETNET would make more sense.
 >
 > 7) I don't understand why PANA lives above ACE in figure 3. I think that
 ACE lives above CoAP/DICE (DTLS is missing, but perhaps understood by
 DICE). I think that while technically PANA lives on top of UDP, there is
 of course a layer of EAP, and TLS above it, and perhaps a layer of ACE as
 well. So I'm not saying that this picture needs to be changed, just to
 observe this.
 >
 > 8) I think remove: "COMI and the dependent specifications are still work
 in progress, but getting stable enough at the time of this writing."
 >
 > 9) I am happy with the paragraph on join security in section 5.
 >
 > 10) I think that this is confused (bottom of page 9, section 6):
 >
 >     This architecture expects that a 6LoWPAN node can connect as a leaf
 to a RPL network, where the leaf support is the minimal functionality to
 connect as a host to a RPL network without the need to participate to the
 full routing protocol. The support of leaf can be implemented as a minor
 increment to 6LoWPAN ND, with the additional capability to carry a
 sequence number that is used to track the movements of the device, and
 optionally some information about the RPL topology that this device will
 join.
 >
 > I think that either a minimal RPL permits leaf attachment OR the EARO
 6lowPAN ND. I don't think that both are needed?
 >
 > I'm also think that some may confuse this with the join process
 requirements, which maybe this started out describing, but I don't think
 that does that. It might describe how nodes which have already joined
 (been imprinted upon the newtork) can form a network.
 >
 > Figure 4 seems to do it all without RPL, even though RPL is mentioned,
 and I don't understand that.
 >
 > 11) Reading section 6.1/6.2, I wonder if this just too much detail for
 an architecture. I also don't see how VLANID is involved (we are talking
 802.1q here, right?). I am not saying that the TID and EARO aren't good
 things; I'm just finding that they just JUMP out here, and I'm not sure a
 reader has any idea why they are here yet. I think that 6.3 should be far
 more specific: proxy-ND? LISP? or MIPv6? which is going to be used... I
 think that reviewers will push back here a lot.
 >
 > 12) I think that 6.4 needs be prescriptive, not speculative/suggestive.
 6.5 needs to say, "the 6LBR and RPL root functionality are to be co-
 located in order that the address of the 6LBR be indicated by RPL DIO
 messages"
 >
 > 13) I think that 6.6 is saying that SEND can not be applied. I think it
 should be clearer in saying something like: "The threats against IPv6 ND
 as described in RFC3971 apply as well, but the solution can not work as
 the route over network does not permit direct peer to peer communication.
 As can be seen in Figure 4..."
 >
 > 14) I think that the relevant parts of [I-D.ietf-roll-rpl-industrial-
 applicability] need to imported into this document, since this sure looks
 like a normative reference to me.
 >
 > 15) section 8 seems to be really the key aspects of the architecture. I
 think that rather than say, "if the scheduling entity explicitely..." =3D>
 "hard". I think that it should instead say that there are hard cells and
 soft cells, and say that 6top can not move hard cells. (but, how would the
 PCE set them up, if 6top can't move them?)
 >
 > "6top contains a monitoring process which monitors the performance of
 cells, and can move a cell in the TSCH schedule when it performs bad."
 >
 > this seems pretty important an architectural thing, and I think it at
 least deserves it's own section number.
 >
 > 16) 8.2, insert something to the effect: Most RPL Objective Functions
 require metrics about reachability, such as the ETX. 6top creates and
 maintains an abstract neighbor table, and this may be leveraged. ... This
 information ...
 >
 > " 6top also enables the RPL OF to influence the MAC behaviour, for
 instance by configuring the periodicity of IEEE802.15.4e Extended Beacons
 (EB's). By augmenting the EB periodicity, it is possible to change the
 network dynamics so as to improve the support of devices that may change
 their point of attachment in the 6TiSCH network. "
 >
 > But, we aren't using the Enhanced Beacons (they are enhanced, not
 extended, aren't they? or did I get that backwards again?) for production
 network use...
 >
 > I would write: Consideration was given towards finding a way to embed
 the Route Advertisements and the RPL DIO messages (both of which are
 multicast) into the IEEE802.15.4e Enhanced Beacons. It was determined that
 this produced undue timer coupling among layers, that the resulting packet
 size was potentially too large, and required it is not yet clear that
 there is any need for Enhanced Beacons in a production network.
 >
 > [and then go on to explain how to configure the LinkType, however, I
 think that this is too much detail for the architecture, and it needs to
 say something like: The 6TISCH adaptation document will explain the
 details of confuring a broadcast channel that can accomodate EB, RPL DIOs
 and Router Advertisements ]
 >
 > but, maybe I mis-understand the entire section.
 >
 > 17) I think that 8.3 should actually say how the TSGI should be created,
 and also how the various layers can be synchronized such that the RPL
 management traffic can provide for the needed frame-based synchronization.
 I expect that this simply means that 6top needs to be able to
 trigger(override) the trickle timer if no other traffic has occured in
 "too long" a time.
 >
 > "After consultation with IEEE authors, it was asserted that 6TiSCH can
 make a full use of the octet to carry an integer value up to 0xFF."
 >
 > -> does this need some kind of clear liason statement?
 >
 > I think that the concepts introduced in section 6.4 and 6.5 should
 perhaps be more clearly. While not trying to duplicate the terminology
 document, I found the way that the CDU concept is introduced was awkward.
 Perhaps this isn't very important. Maybe moving figure 5 earlier?
 >
 > 18) I think that the 4 scheduling paradigms should be mentioned in the
 introduction as well! To first order, I think that is perhaps the most
 important thing in the document.
 >
 > " If the size of a bundle is configured to fit an average amount of
 bandwidth, peak emissions will be destroyed."
 >
 > (I don't think the word you want is "destroyed". I think that it means
 that packets will be dropped, but I don't think that describing the
 dropped packets as destroyed is the correct IETF idiom here, even though
 it might be grammatically correct)
 >
 > 19) 6TiSCH supports three different forwarding model, G-MPLS Track
 Forwarding (TF), 6LoWPAN Fragment Forwarding (FF) and IPv6 Forwarding
 (6F).
 >
 > also should be mentioned in the introduction...
 >
 > 20) last comment on section 13. (the bullet (*) has become an ASCII "A",
 the high bit was likely removed)
 >
 > Device Authentication: The JN and the JA mutually authenticate each
 other and establish a shared key, so as to ensure on-going authenticated
 communications. This may involve a server as a third party.
 >
 > I again say that this is incorrect, the JA will never be able to
 authenticate itself to the JN. It may be able to present some
 authorization from the network owner, that the JA is authorized to act on
 behalf of the network owner.
 >
 > Unless you consider un-authenticated DH exchange "authentication", or
 you decide that it's okay for the JA to just not accept any public (some
 kind of leap of faith), the JA will not have an identity that a JN will
 accept.
 >
 > I have also repeatedly complained that figure 10 is inaccurate, because
 it fails to depict that authorization begins before authentication
 finishes. Perhaps the second two unidirectional arrows are part of the
 authentication phase, I don't know.
 >
 > I suggest that the sentence:
 >
 > "The join protocol consists of three phases:"
 >
 > be replaced with:
 >
 > "The join protocol has three major activities:" ("phases" implies some
 ordering such that one phase might finish before the next begins, while
 activities implies no such ordering)
 >
 > I suggest that figure 10 be omitted.

 So far, the changes per Michael's review are as follow (from the most
 recent):
 https://bitbucket.org/6tisch/draft-ietf-6tisch-
 architecture/commits/5b7d36254d62eb4aa0f12e7b3767a2f7347e975a
 https://bitbucket.org/6tisch/draft-ietf-6tisch-
 architecture/commits/ae7ea789ac066cb6b31fcdf9e6e8fdc2f6cf667e
 https://bitbucket.org/6tisch/draft-ietf-6tisch-
 architecture/commits/62b2606b48d14cb83f4d1d87c600c3f333cc8f66
 https://bitbucket.org/6tisch/draft-ietf-6tisch-
 architecture/commits/2b296269f964eae8a7d47216ed90cf969c405a9d
 https://bitbucket.org/6tisch/draft-ietf-6tisch-
 architecture/commits/f59c94f6abd62b946f70ac6d2aa7e01d0f770298

-- 
-------------------------+-------------------------------------------------
 Reporter:               |       Owner:  draft-ietf-6tisch-
  [email protected]     |  [email protected]
     Type:  defect       |      Status:  new
 Priority:  major        |   Milestone:
Component:               |     Version:
  architecture           |  Resolution:
 Severity:  In WG Last   |
  Call                   |
 Keywords:               |
-------------------------+-------------------------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/6tisch/trac/ticket/36#comment:2>
6tisch <http://tools.ietf.org/6tisch/>

_______________________________________________
6tisch mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6tisch

Reply via email to