Posting again…

From: Chakrabarti, Samita
Sent: Tuesday, July 31, 2018 6:32 PM
To: 'Lijo Thomas' <l...@cdac.in>; 'Georgios Z. Papadopoulos' 
<georgios.papadopou...@imt-atlantique.fr>
Cc: draft-ietf-6lo-deadline-t...@ietf.org; an...@ece.iisc.ernet.in; 'Malati 
Hegde' <mal...@ece.iisc.ernet.in>; 'Samita Chakrabarti' 
<samitac.i...@gmail.com>; 'Gabriel Montenegro' 
<gabriel.montene...@microsoft.com>; 'lo' <6lo@ietf.org>; 'Charlie Perkins' 
<charles.perk...@earthlink.net>; satishnaid...@gmail.com
Subject: RE: [E] Re: [6lo] working group last call (wg lc) on 
https://datatracker.ietf.org/doc/draft-ietf-6lo-deadline-time/

Hi Lijo and co-authors:

Here are some more comments on the 6lo-deadline draft:


1.       The abstract of this document says :
   “The deadline time enables forwarding and scheduling decisions for time 
critical
   IoT M2M applications that need deterministic delay guarantees over
   constrained networks and operate within time-synchronized networks.”

However, the document body seems to indicate that the solution works for 6tisch 
networks.
Could this document clarify  where this scenario be applicable?  Only 6tisch or 
any other Low-power networks with multiple hops?
6loRH is a requirement here – so please clarify a typical deployment network 
where this solution will work [ for example, a Low power network running RPL 
with 6loRH support on 6lo nodes that create the mesh networks.]


2.       Section 3 – Drop this section and refer to RFC8138 section 4.1

3.       Always provide Normative reference to 6rLoRHE as 6LoRHE[RFC8138] when 
you refer to it

4.       Section 4 : the calculation is not clear to me as to how it relates 
the new network clock difference (delta) and the delay in the previous network 
( at the entry point of the new network). Please draw a time line diagram and 
explain  each point what this value is for and how the delay experienced is 
calculated.  If your reference time for first network is T1, and the second 
network clock is T1+d  and the dealy in T1 is D1, then at T1+D1 time, when the 
packet enters the 2nd network, it will read T1+D1+d1 as the 2nd network entry 
time or origination time in 2nd network. Second network may add some delay in 
processing the packet. So, I am not clear what is the purpose of this section. 
Please clarify.

5.       Section 6.2 refers to ietf-ippm-ioam-data – does it have dependency on 
this draft? What if the border router does not support the ippm draft?  Not 
sure if I understand the assumption that “It encodes the deadline time (and, if 
available, the origination time) into the In-band OAM header extension and 
passes the datagram to the IPv6 layer for further routing…”   Please clarify or 
drop this scenario.

6.       Section 6.3 again refers to ietf-roll-useofrplinfo draft – is this a 
dependency?  Can you show a simple scenario where there is no dependency on 
active draft on another WG?

Thanks,
-Samita






From: 6lo [mailto:6lo-boun...@ietf.org] On Behalf Of Lijo Thomas
Sent: Tuesday, July 24, 2018 5:05 AM
To: 'Georgios Z. Papadopoulos' 
<georgios.papadopou...@imt-atlantique.fr<mailto:georgios.papadopou...@imt-atlantique.fr>>
Cc: 
draft-ietf-6lo-deadline-t...@ietf.org<mailto:draft-ietf-6lo-deadline-t...@ietf.org>;
 an...@ece.iisc.ernet.in<mailto:an...@ece.iisc.ernet.in>; 'Malati Hegde' 
<mal...@ece.iisc.ernet.in<mailto:mal...@ece.iisc.ernet.in>>; 'Samita 
Chakrabarti' <samitac.i...@gmail.com<mailto:samitac.i...@gmail.com>>; 'Gabriel 
Montenegro' 
<gabriel.montene...@microsoft.com<mailto:gabriel.montene...@microsoft.com>>; 
'lo' <6lo@ietf.org<mailto:6lo@ietf.org>>; 'Charlie Perkins' 
<charles.perk...@earthlink.net<mailto:charles.perk...@earthlink.net>>; 
satishnaid...@gmail.com<mailto:satishnaid...@gmail.com>
Subject: [E] Re: [6lo] working group last call (wg lc) on 
https://datatracker.ietf.org/doc/draft-ietf-6lo-deadline-time/

Dear Georgios,

Thanks for the feedback, responding to your query :

Deadline Time (DT) by itself does not guarantee deterministic behaviour, but 
its information enables intermediate nodes to implement delay sensitive 
scheduling and routing algorithms towards achieving deterministic behaviour.

As a use case application of our draft,  we implemented a basic EDF policy in 
OpenWSN 6tisch stack.

Please find the link for our openwsn implementation

https://github.com/openwsn-berkeley/openwsn-fw/tree/develop/openapps/uexpiration<https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_openwsn-2Dberkeley_openwsn-2Dfw_tree_develop_openapps_uexpiration&d=DwMFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=pWMzx7FsqijEJPyfMBfn-HJss-wVVTf0K5y-cxCTXL8&m=7e5GkJIcbIxuUVNca7qMqtU6Wk2lwaz89_SQAfJoyPY&s=nQLGDo_AziW1rJsCvm6vG_oKYbP2VwaFiQPYA9NnaR4&e=>


Thanks & Regards,
Lijo Thomas

From: 6lo [mailto:6lo-boun...@ietf.org] On Behalf Of Georgios Z. Papadopoulos
Sent: 24 July 2018 13:49
To: Lijo Thomas
Cc: 
draft-ietf-6lo-deadline-t...@ietf.org<mailto:draft-ietf-6lo-deadline-t...@ietf.org>;
 an...@ece.iisc.ernet.in<mailto:an...@ece.iisc.ernet.in>; Malati Hegde; Samita 
Chakrabarti; Gabriel Montenegro; lo; Charlie Perkins; 
satishnaid...@gmail.com<mailto:satishnaid...@gmail.com>
Subject: Re: [6lo] working group last call (wg lc) on 
https://datatracker.ietf.org/doc/draft-ietf-6lo-deadline-time/<https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dietf-2D6lo-2Ddeadline-2Dtime_&d=DwQFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=pWMzx7FsqijEJPyfMBfn-HJss-wVVTf0K5y-cxCTXL8&m=7e5GkJIcbIxuUVNca7qMqtU6Wk2lwaz89_SQAfJoyPY&s=5HI37bAJ2WXeO55wDC3VhtutrxRLoXJ_sn64hp3EF3M&e=>

Hello Lijo,

Thank you so much for your detailed comments. I appreciate it very much.
I am happy with your response, I just have one last clarification point, see 
below:


On Jul 24, 2018, at 09:38, Lijo Thomas <l...@cdac.in<mailto:l...@cdac.in>> 
wrote:

Dear Georgios,

Thanks for your valuable suggestions and we really appreciate for taking your 
valuable time for the review .

Please find our comments inline below marked as (*** [LT])

We will be happy to receive your further inputs !!!


Thanks & Regards,
Lijo Thomas

From: 6lo [mailto:6lo-boun...@ietf.org] On Behalf Of Georgios Z. Papadopoulos
Sent: 17 July 2018 21:40
To: l...@cdac.in<mailto:l...@cdac.in>
Cc: 
draft-ietf-6lo-deadline-t...@ietf.org<mailto:draft-ietf-6lo-deadline-t...@ietf.org>;
 an...@ece.iisc.ernet.in<mailto:an...@ece.iisc.ernet.in>; Malati Hegde; Samita 
Chakrabarti; Gabriel Montenegro; lo; Charlie Perkins; 
satishnaid...@gmail.com<mailto:satishnaid...@gmail.com>
Subject: Re: [6lo] working group last call (wg lc) on 
https://datatracker.ietf.org/doc/draft-ietf-6lo-deadline-time/<https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dietf-2D6lo-2Ddeadline-2Dtime_&d=DwMFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=pWMzx7FsqijEJPyfMBfn-HJss-wVVTf0K5y-cxCTXL8&m=7e5GkJIcbIxuUVNca7qMqtU6Wk2lwaz89_SQAfJoyPY&s=5HI37bAJ2WXeO55wDC3VhtutrxRLoXJ_sn64hp3EF3M&e=>

Dear Lijo and co-authors,

I went through the draft, please find my comments below:
— —

High level comments:
*/ [GP] The draft defines the Deadline Time (DT), but it is not clear to me how 
the arrival of the datagram within this pre-defined DT period is guaranteed?
Indeed, the draft provides the necessary DT information, however, the only 
action I could observe is the delay-sensitive datagram to be dropped if the 
indicated DT is elapsed.


*** [LT] Yes, the Deadline Time (DT) specifies the maximum allowable delay
before which the packet should be delivered to the destination. The proposed
draft provides a mechanism for transporting the DT information. By incorporating
deadline based scheduling/routing mechanisms within the intermediate nodes
using DT, one could guarantee deterministic behavior in terms of delay.


[GP] Would you agree that this draft do not guarantees deterministic behavior 
in terms of delay, but it provides
the information of maximum allowable delay for a packet to be delivered to the 
destination?

To be more precise, for instance, lets us consider the following multi-hop 
network A—> B —> C.
According this draft, it will required 2 timeslots (or 20ms) for a packet to be 
delivered at the DODAG Root C.
However, if there is an external interference from A to B, then A may need to 
retransmit multiple times
in order the datagram to be received by B. Then there are two options according 
to the draft:
a) the datagram is dropped, to reduce the traffic, energy consumption.
b) the datagram is delivered even if the deadline time is crossed, i.e., as you 
said in your e-mail “in some scenarios where the intention is also to know the 
total delay experienced by the packets in a network”

In both bases, a and b, there is no guarantee that the datagram will be 
delivered in predefined time, i.e., in deterministic behavior.

— —
Thank you so much,
Georgios

____________________________________

Georgios Z. Papadopoulos, Ph.D.
Associate Professor, IMT Atlantique, Rennes

web:     
www.georgiospapadopoulos.com<https://urldefense.proofpoint.com/v2/url?u=http-3A__www.georgiospapadopoulos.com&d=DwMFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=pWMzx7FsqijEJPyfMBfn-HJss-wVVTf0K5y-cxCTXL8&m=7e5GkJIcbIxuUVNca7qMqtU6Wk2lwaz89_SQAfJoyPY&s=_1Xvis_IS2XJLj901j7We2qqeGomCqtC6KCdIizcBsQ&e=>
twitter:            
@gzpapadopoulos<https://urldefense.proofpoint.com/v2/url?u=https-3A__twitter.com_gzpapadopoulos-3Fref-5Fsrc-3Dtwsrc-255Etfw-26ref-5Furl-3Dhttp-3A__georgiospapadopoulos.com_&d=DwMFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=pWMzx7FsqijEJPyfMBfn-HJss-wVVTf0K5y-cxCTXL8&m=7e5GkJIcbIxuUVNca7qMqtU6Wk2lwaz89_SQAfJoyPY&s=jpu1BQDn6eUhHwMQ_kX4LwHwL_qtu9wlDc-YwyqE6Ig&e=>
____________________________________




-------------------------------------------------------------------------------------------------------------------------------
[ C-DAC is on Social-Media too. Kindly follow us at:
Facebook: 
https://www.facebook.com/CDACINDIA<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.facebook.com_CDACINDIA&d=DwQFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=pWMzx7FsqijEJPyfMBfn-HJss-wVVTf0K5y-cxCTXL8&m=7e5GkJIcbIxuUVNca7qMqtU6Wk2lwaz89_SQAfJoyPY&s=qAVDzBnrxBMh4W5vZkkX3lGHT3D8czZnJSW7Z5t93R4&e=>
 & Twitter: @cdacindia ]

This e-mail is for the sole use of the intended recipient(s) and may
contain confidential and privileged information. If you are not the
intended recipient, please contact the sender by reply e-mail and destroy
all copies and the original message. Any unauthorized review, use,
disclosure, dissemination, forwarding, printing or copying of this email
is strictly prohibited and appropriate legal action will be taken.
-------------------------------------------------------------------------------------------------------------------------------
_______________________________________________
6lo mailing list
6lo@ietf.org
https://www.ietf.org/mailman/listinfo/6lo

Reply via email to