Hi Yvonne-Anne,

Let me first say that the problem is actually very complex than what I anticipated. My
suggestion of extending OTF to create RSVP flows is to treated as a starting
point that can be used to address at least part of the problem, and it is far
from a complete solution.

As per yours and Senju's mails, it is evident that one requires rapid creation of flows that satisfy bandwidth and delay constraints of the application. Since these flows also need to persist till the emergency condition goes away, RSVP
can be used to create, maintain, tear down these flows. Let me add to what I
hinted in my previous mail.

If the nodes in the network happen to initiate such flows before application
comes into the picture with its own resource provisioning, then RSVP operation can be triggered by using OTF scheduling approach, but giving it an additional
functionality of propagating the reservation request all the way to the
destination, which could be the host running the end application. In this
process, the intermediate nodes that have already provisioned cells to carry
normal traffic may have to be re-allocated/deleted to support this request. Let me add that the use of OTF to support flows of this kind serves the purpose of
sending sudden traffic surge in a deterministic manner end-to-end, perhaps,
as an immediate reaction before application takes over.

The questions of scalability, control message overheads, call admission control
need to be addressed too.

How the application takes over by interacting with PCE is another story. If the emergency condition also brings in new sensor nodes into the network, the join process and the related delays can only add to the complication! There are layers
of complexity as one can see.

I will be very happy to hear from others on this challenging problem.


Anand


On Thursday 09 July 2015 01:23 PM, Yvonne-Anne Pignolet wrote:
Dear Senju
>
> Thanks for describing this use case. It matches exactly the kind of scenarios I had in mind.
>
> In his email on the 1st of July Anand mentioned that "combining OTF with RSVP to create emergency flows on-the-fly" might be a way to handle these situations. Anand, can you elaborate a bit more on that? Or can someone else give feedback if this or another mechanism could help to achieve this goal?
>
> Regards
> Yvonne-Anne
> ____________________
> From: 6tisch [mailto:[email protected]] On Behalf Of Senju Panicker
> Sent: Dienstag, 7. Juli 2015 15:14
> To: [email protected]
> Subject: Re: [6tisch] 6tisch architecture and time-critical events
>
> Hi,
>
> I am glad that time critical events during emergency/alarm conditions is being > discussed in the mailing list as it is extremely important for my work. Thanks
> to Yvonne-Anne for bringing up this important topic.
>
> We are working towards deploying a complete 6tisch based network for monitoring
> and control for an industrial application. This industry currently uses
> combination of wired and wireless infrastructure. The wireless part is used for > not-so-critical and routing monitoring activities, whereas wired infrastructure
> is used to perform time critical parameter monitoring and control loop
> operations. One of the main requirements when we completely migrate to 6tisch > network is timely handling of emergency conditions so that system trip and
> shutdown are avoided.
>
> I would like to emphasise that there is a need for urgent and additional network > resource provisioning due to several inter-related sensors getting actuated and > the increased monitoring rate during emergency situations. If it were to be > monitored at the normal sampling rate, the parameter could very well exceed its
> safe level in few updates and could very well lead to a system trip.
>
> Below is one such condition that occurs in a thermal power plant where we had
> worked earlier.
>
> When pulverized coal outlet temperature limit crosses certain limit for safe
> operation of the coal mill, it could be due to several reasons such as
> deviation in primary air temperature, primary air flow, mill inlet temperature > or cold air inflow. The deviation in primary air temperature itself could be
> due to problems associated with pre-heating and the deviation in cold air
> inflow could be due to malfunctioning of hot air damper valve.
>
> It will be very helpful if we have mechanisms built into 6tisch which enables > end application/controller, and nodes in the network to set up emergency flows through > network bandwidth reservations in a timely manner that guarantees end-to-end
> QoS till the emergency condition lasts.
>
> Thanks & Regards
>
> Senju Thomas Panicker
> Senior Engineer
> Control & Instrumentation Group
>
>
>
>
> -----Original Message-----
> From: 6tisch [mailto:[email protected]] On Behalf Of Yvonne-Anne Pignolet
> Sent: 29 June 2015 15:00
> To: [email protected]
> Subject: Re: [6tisch] 6tisch architecture and time-critical events
>
> Dear all
>
> Taking up some remarks by Anand and Pascal, has there been any recent activity with respect to the topic of handling resources in emergency scenarios? > In case there hasn't, it would like to stress that from an industrial perspective such scenarios are very important.
>
> In particular, this concerns resources such as flows that follow certain routes, and bandwidth allocation. Depending on the traffic demands during alarm/emergency conditions, applications may decide to pre-empt or stall some of the ongoing traffic flows to accommodate new flows or to assign appropriate resources to existing flows. Is there a concept of priorities of flows envisioned in the architecture?
>
> Note that if there are cascading errors this often leads to an increase in traffic (messages to trigger logging of abnormal conditions, alarms for operators, &). Certain protocols (e.g. GOOOSE) send bursts of messages in such situations (e.g., three messages with a very short time interval in between, while normally one message every few seconds is sent) One could also envision applications having tighter control over network resources. For instance, an application might want to (i) increase the sensing rate (ii) activate additional sensors (iii) create special routing paths, ... In current implementations the applications are not designed to trigger such actions. However, the examples your point out can clearly be beneficial. As an easy and crucial part I see priorities and bandwidths.
>
> I'm very interested in any feedback to these points!
>
> Best Regards
> Yvonne-Anne
>
> Yvonne-Anne Pignolet
> Dr. Sc. ETH Zürich
> ABB Corporate Research
> Segelhofstrasse 1K
> 5400 Baden-Dättwil, Switzerland
> Phone: +41 58 586 86 56
> Mobile: +41 79 766 10 54
> email: [email protected]
>
>
> On Mon, Feb 16, 2015 at 6:39 PM, Pascal Thubert (pthubert) <pthubert at cisco.com> wrote:
>>
>> A great thought, Anand,
>>
>>
>> which has to do external control of 6top, establishing on demand path
>> (tracks) etc.
>>
>> I think that the next round to charter will have some deterministic/PCE in it, that should address this scenario.
>>
>> What's interesting in your suggestion is that it is midway between OTF and classical tracks for control loops, being urgent and dynamic.
>>
>> Do you have a documented use case?
>>
>>
>> Pascal
>>
>>
>>
>> From: 6tisch [mailto:6tisch-bounces at ietf.org] On Behalf Of
>> S.V.R.Anand
>> Sent: lundi 16 février 2015 15:00
>> To: 6tisch at ietf.org
>> Subject: Re: [6tisch] Last call for draft-ietf-6tisch-architecture-05
>>
>>
>>
>> Dear All,
>>
>> I found that the architecture draft captured most of the general requirements.
>>
>> There is just one observation which I could not resist mentioning. It
>> has to do with the coupling of real-time application demands with the
>> rest of the architecture. There could be application specific "time critical and sudden" events that might call for on-demand resource allocation.
>> While we can delegate such an event handling to NME and PCE, perhaps,
>> bringing in an application awareness to the overall architecture might be useful so that we are not leaving out this possible scenario.
>>
>> Just a thought.
>>
>> Regards
>> Anand
>
> _______________________________________________
> 6tisch mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/6tisch
>
> -------------------------------------------------------------------------------------------------------------------------------
> [ C-DAC is on Social-Media too. Kindly follow us at:
> Facebook: https://www.facebook.com/CDACINDIA & Twitter: @cdacindia ]
>
> This e-mail is for the sole use of the intended recipient(s) and may
> contain confidential and privileged information. If you are not the
> intended recipient, please contact the sender by reply e-mail and destroy
> all copies and the original message. Any unauthorized review, use,
> disclosure, dissemination, forwarding, printing or copying of this email
> is strictly prohibited and appropriate legal action will be taken.
> -------------------------------------------------------------------------------------------------------------------------------
>
> _______________________________________________
> 6tisch mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/6tisch
>



--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

_______________________________________________
6tisch mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6tisch

Reply via email to