Intdir early review of draft-ietf-6tisch-architecture-19

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Reviewer: Carlos Pignataro
Review result: On the Right Track

Reviewer: Carlos Pignataro
Review result: On the Right Track -- Has (Minor) Issues

I am an assigned INT directorate reviewer for
<draft-ietf-6tisch-architecture-19>. These comments were written primarily for
the benefit of the Internet Area Directors. Document editors and shepherd(s)
should treat these comments just like they would treat comments from any other
IETF contributors and resolve them along with any other Last Call comments that
have been received. For more details on the INT Directorate, see
https://datatracker.ietf.org/group/intdir/about/

This is a fairly thick document to read and hard to digest.

The architectural descriptions are sensible, useful, and distilled to a
meaningful and minimal set of building blocks. The fact that some blocks are
scattered through various sources and his architecture acts as the confluence
point adds in the difficulty in parsing.

This amounts, in my humble opinion, to an opportunity to improve the document
in a couple of areas: 1. There are specific depictions that would immensely
improve clarity. 2. THere is an opportunity to rearrange a bit the structure of
the doc, slightly.

Specifically:

The Introduction is very useful. However, the first Figure in the document is a
protocol stack -- instead, a reference topo, model, or architecture might help
make it real.

The Terminology section is very fragmented. If terms are used within an
architecture, does it matter where they come from in such a harshly demarcated
way? Why many subsections of terminology?

An Architecture is more than a stack. However, Section 3 "HL Arch" starts with
Section 3.1, "Stack". Before a protocol, a System view and block interaction
can flow into a protocol spec -- but the other way around seems inverse.

Section 3.4 (and Section 3.3) specifically would greatly benefit from
depictions of the different Forwarding + Routing models, with PCE, with RPL,
etc. A view of the neighbor-to-neighbor versus a Cenrtalized model would help,
in my visual-person opinion.

Section 3.7 onwards does not seem to belong in a "High Level Architecture" with
detailed protocol flows and interactions.

4.7.  Distributed vs. Centralized Routing

This seems to be a High-Level architectural distinction. SHould be in Section
3.something?

4.7.3.  Differentiated Services Per-Hop-Behavior

Is there a need to include and explain ECN for Tunneling?

Appendix A.  Dependencies on Work In Progress

What is the plan for this Appendix, as it seems appropriate for an I-D but less
so for a forever inmutable RFC.

Minor and Nits:

2.1.  BCP 14

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in BCP
   14 [RFC2119][RFC8174] when, and only when, they appear in all
   capitals, as shown here.

The document contains this boilerplate text and citations / references to RFC
2119 and RFC 8174. However, it does not use any RFC 2119 keywords.

The non-use of RFC 2119 keywords is appropriate given the type of architectural
document this is, and thus suggest removing Section 2.1 and included /
associated References.

2.3.  References

   The draft uses domain-specific terminology defined or referenced in:

I would re-title Section 2.3. It is not "References". Something like
"Terminology from other Documents".

Super Editorials for Consideration:

Abstract

   This document describes a network architecture that provides low-
   latency, low-jitter and high-reliability packet delivery.  It
   combines a high speed powered backbone and subnetworks using IEEE

s/high speed/high-speed/

   TSCH:       A medium access mode of the IEEE Std 802.15.4
               [IEEE802154] standard which uses time synchronization to
               achieve ultra low-power operation, and channel hopping to

s/ultra low-power/ultra-low-power/

   An overview of the the initial steps of a device in a network can be
   found in Section 3.7; the security aspects of the join process are
   further detailed in Section 6.

s/the the/the/

   slotframes that repeat over and over.  Slotframes may collide and
   require a device to wake up at a same time, in which case a the
   slotframe with the highest priority is actually activated.

s/a the/the/

      [I-D.ietf-6tisch-msf] influence the operation of the MAC layer to
      add, update and remove cells in its own, and its peers schedules

s/peers schedules/peers' schedules/

   Within that subnet, neighbor devices are discovered with extended
   6LoWPAN Neighbor Discovery [RFC8505] (6LoWPAN ND), whereas RPL
   [RFC6550] enables routing in the so called Route Over fashion, either

s/so called/so-called/

   wired or wireless.  The backbone can be a classical IPv6 network,
   with Neighbor Discovery operating as defined in [RFC4861] and
   [RFC4862].  This architecture requires work to standardize the the

s/the the/the/

   As detailed in Section 4.1 the 6LoWPAN ND 6LBR and the root of the
   RPL network need to share information about the devices that are
   learned through either protocol but not both.  One way af achieving

s/af achieving/of achieving/

   window of time is defined around the scheduled transmission where the
   medium must, as much as practcally feasible, be free of contending
   energy.

s/practcally/practically/

   whereby a RPL parent discovers a chunk that is not used in its
   interference domain (e.g lack of energy detected in reference cells

s/e\.g /e.g.,/

   With respect to Centralized routing and scheduling, it is envisionned
   that the related component of the 6TiSCH Architecture would be an

s/envisionned/envisioned/

   The architecture introduces the concept of a Track, which is a
   directed path from a source 6TiSCH node to oe or more destination(s)

s/to oe or/to one or/

   6TiSCH enables a mixed model of centralized routes and distributed
   routes.  Centralized routes can for example be computed by a entity

s/a entity/an entity/

   In the minimal setting defined in [I-D.ietf-6tisch-minimal-security],
   the authentication is requires a pre-shared key, based on which a

s/is requires/requires/

3.5.  A Non-Broadcast Multi-Access Radio Mesh Network

   A 6TiSCH network is an IPv6 [RFC8200] subnet which, in its basic
   configuration, is a single Low Power Lossy Network (LLN) operating
   over a synchronized TSCH-based mesh.

s/Low Power/Low-Power and/

Figure 10 does not have a Label/Title.

4.5.  On Tracks

What are "Tracks"?

4.6.1.3.  Tunnel Metadata

The term "Metadata" appears only 4 times in this long document, but it is
really not adequatedly defined.

   At the egress 6TiSCH router, the reverse operation occurs.  Based on
   metadata associated to the Track, the frame is passed to the
   appropriate Link-Layer with the destination MAC restored.

So there is a demux function using Metadata -- what kind?

Best,

Carlos Pignataro




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux