Skip to main content

2017-07-15: Minutes
slides-interim-2021-ietfieee-06-sessa-2017-07-15-minutes-00

Meeting Slides IETF-IEEE (ietfieee) IAB ASG
Date and time 2021-12-31 22:00
Title 2017-07-15: Minutes
State Active
Other versions plain text
Last updated 2022-06-10

slides-interim-2021-ietfieee-06-sessa-2017-07-15-minutes-00
IAB, IESG and IEEE 802 Executive Committee
Minutes of the 15 July 2017 Meeting, Prague

Reported by: Cindy Morgan (IAB Executive Administrative Manager)

ATTENDEES
-------------------
 Jari Arkko
 Alia Atlas
 Ignas Bagdonas
 Deborah Brungard
 Ben Campbell
 Benoit Claise
 Joe Clarke
 Subir Das
 Donald Eastlake
 János Farkas
 Norman Finn
 Eric Gray
 Jodi Haasz
 Ted Hardie
 Bob Heile
 Russ Housley
 Mahesh Jethanandani
 Suresh Krishnan
 Warren Kumari
 Cindy Morgan
 Erik Nordmark
 Glenn Parsons
 Alvaro Retana
 Dan Romascanu
 Jon Rosdahl
 Dorothy Stanley
 Jeff Tantsura
 Pat Thaler
 Pascal Thubert
 Yan Zhuang

MINUTES
-------------------

1. YANG Catalog

  Benoit Claise described the work on the YANG catalog <https://
  yangcatalog.org/>. There are more than 2000 modules in the catalog,
  but they still need tooling for the operators, as well as the
  metadata. Joe Clarke added that the goal is to provide a tool chain.
  All of the code that has been contributed is open source. Improvements
  to the metadata are still in progress.

  Dorothy Stanley asked what the process is for tracking changes over
  time. Joe Clarke replied that vendors or standards developers can see
  the maturity level at any time, as well as when it was ratified.
  Rather than serving local copies of the modules, they will have
  pointers to the canonical places from where to download the modules.
  There is a draft in NETMOD that defines the catalog schema.

  Benoit Claise said that the next steps include working with the IEEE
  to add their YANG models to the catalog. Benoit and Glenn Parsons will
  coordinate offline about how to best handle this; IEEE 802 recently
  formed a YANG coordination group to coordinate internally on their
  YANG modules.

2. 48-bit and 64-bit MAC Addresses Interworking

  Bob Heile reported that he is investigating interworking between 48-
  bit and 64-bit MAC addresses  and whether that is something that
  should be worked on.

  Norman Finn noted that there have been joint meetings in 802.1 and
  802.15 that have discussed various aspects of this and concluded that
  bridging here does not actually solve the problems.

  Pascal Thubert added that IPv6 unicast connectivity over a multilink
  subnet is now done, and the documents are close to Last Call in 6LO.
  The registration mechanism enables us to proxy the IPv6 neighbor
  discovery mechanism. This is the Layer 3 equivalent of the Layer 2
  association. As far as IETF is concerned this piece is solved.

  Pat Thaler said it is solved enough that they do not want to pursue a
  pure Layer 2 solution. With the ability to use the local address
  space, the problem is now the differences in behavior that break the
  expectations of protocols.

  Bob Heile concluded that it sounds like there is consensus to take
  this item off the work list.

3. Network Slicing

  Deborah Brungard reported that the NETSLICING BOF will be held on
  Monday during IETF 99, adding that the topic is also being discussed
  from a network point of view in the TEAS and DETNET WGs.

  Russ Housley asked what the overlap between the IETF and IEEE is for
  this work. Pat Thaler replied that there are three technologies
  dividing up use of the network for different clients.

  Janos Farkas added that network slicing also comes up in 3GPP. Ted
  Hardie noted that some folks from 3GPP will be talking about 5G in
  general during a Tuesday lunchtime session at IETF 99.

4.  Breakout: Where is collaboration needed for Security?

  Russ Housley said that the network inside automotive is becoming a hot
  topic. Security is an important requirement within that, but so far no
  new requirements have been identified. Pat Thaler said that the topic
  has been discussed in 802.1 as well. Russ noted that opportunistic
  wireless encryption was published as an RFC and is being widely
  deployed, TLS 1.3 is close to wrapping up, and EAP TLS is being
  widely used in many places. Dan Harkins will review the new TLS
  versions to make sure that they don't mean any changes to the EAP
  methods.

5. Breakout: Where is collaboration needed for IoT?

  Pat Thaler asked how much of the work on IoT needs coordination
  between the IETF and IEEE 802. The IETF has an IoT directorate, and
  IEEE-SA has an IoT steering committee to look at things on a high
  level. Suresh Krishnan and Jon Rosdahl will coordinate from their
  respective sides, with Jodi Haasz sending an introductory email. IETF
  and IEEE 802 are already collaborating in some IoT-related areas (e.g.
  DetNet, TSN, 802E privacy).

  Pat Thaler asked whether the link layer in MUD should include
  encryption; Ted Hardie replied that he would talk to Eliot Lear about
  that. Pat noted that there should be some work on the tension between
  providing a secure identity and protecting privacy

6. Time-sensitive Networking/DETNET

  Norm Finn updated the group on IETF DetNet and IEEE 802.1 Time-
  Sensitive Networking.

  Slides:
  https://www.iab.org/wp-content/IAB-uploads/2013/01/slides-99-ieeeietfcoord-detnet-tsn-update-01.pptx

  Janos Farkas noted that there will be a tutorial on IEEE 802.1 Time-
  Sensitive Networking on Sunday during IETF 99.

7. 5G

  Glenn Parsons updated the group on the IEEE 802 EC 5G / IMT-2020
  Standing Committee.

  Slides:
  https://www.iab.org/wp-content/IAB-uploads/2013/01/ec-16-0119-01-5GSG-report-ieee-802-ec-5g-imt-2020-sc.pptx

  Dorothy Stanley noted that IEEE 802 has requests for specific metrics
  to support the work they are doing to integrate 802.11. The goal is
  that in a 5G system, the radio tech is another peering technology.

  Jeff Tantsura said that the IETF NETSLICING BOF has a number of use
  cases identified, and hopes that 3GPP will be able to help with this.
  The new use cases are using EAP for authentication. There has been a
  lot of work in the Routing Area on the data model. They are also
  looking into SDN and using a packet network for transport. IETF also
  has related work in I2RS, NETMOD, NETCONF, and TEAS.

  There is also a lot of work happening in the SPRING WG around 5G
  concepts, on how to provide a set of resources. None of this has been
  explicitly asked for by 3GPP, but it is work the IETF assumed they
  would need. It has also been discussed in DETNET, TEAS, ACTN, and
  QUIC.

  Glenn Parsons noted that there has been no formal request from 3GPP,
  but the latest release had a lot of IETF dependencies, and asked if
  that was expected to happen again. Russ Housley replied that the
  communications with 3GPP started out informally and got more formal as
  they were closer to shipping; it may happen that way again with 5G.
  Suresh Krishnan added that 3GPP has changed how they track
  dependencies with the IETF. Georg Mayer is the current contact from
  3GPP.

8. FlexE

  Deborah Brungard updated the group on FlexE (Flexible Ethernet), a
  protocol published by the OIF.

  Slides: https://www.iab.org/wp-content/IAB-uploads/2013/01/FlexE-at-IETF.pdf

  Per the OIF Flex Ethernet Implementation Agreement
  <http://www.oiforum.com/wp-content/uploads/OIF-FLEXE-01.0.pdf>:

  "The Flex Ethernet (FlexE) implementation agreement provides a generic
  mechanism for supporting a variety of Ethernet MAC rates that may or
  may not correspond to any existing Ethernet PHY rate. This includes
  MAC rates that are both greater than (through bonding) and less than
  (through sub0rate and channelization) the Ethernet PHY rates used to
  carry FlexE. This can be viewed as a generalization of the Multi-Link
  Gearbox implementation agreements, removing the restrictions on the
  number of bonded PHYs (MLG2.0, for example, supports one or two
  100GBASE-R PHYs) and the constraint that the FlexE clients correspond
  to Ethernet rates (MLG2.0 supports only 10G and 40G clients)."

  IETF's CCAMP WG has done some work on this; Pat Thaler noted that
  there have been inquiries to 802 about whether they care if the IETF
  does this work. 802.3 has chosen not to take an official position on
  FlexE.

9. Breakout: Privacy--What is being done? What more should we do?

  Suresh Krishnan reported that both IETF and IEEE 802 are doing work on
  the privacy front, and that the work is mostly synced already.

10. Breakout: Multicast and Wireless

  Donald Eastlake reported that the group discussing multicast and
  wireless concluded that the people who are interested in this topic
  from the routing and radio sides need to get together and come up with
  a global problem statement. They should also investigate whether
  existing solutions can be more widely applicable, or if new solutions
  are needed.

11. Ethertype Definition

  Mahesh Jethanandani noted that there is not a consistent set of
  definitions for YANG ethertypes. One possible solution is to describe
  it in YANG with a base type of ethertype base, which is good if you
  want to make the ethertype extensible. Since the ethertype allocation
  is centralized with the IEEE RAC, it is up to IEEE as to whether they
  are willing to take up the work.

  Pat Thaler replied that this was discussed at the recent RAC meeting.
  Ethertypes are distributed based on requests received, which allows
  for the possibility of private ethertypes where the requestor does not
  publish what protocol it will be used for. Norman Finn added that it
  would be very unlikely that all ethertypes would have names.

  Dan Romascanu observed that the IETF uses registries maintained in a
  MIB module, with a process that is similar to the IANA registries
  (i.e. expert review).

  Glenn Parsons replied that the IEEE RAC has a registration for
  ethertypes, where the requestor fills out a form that asks why it is
  being requested. The applications are vetted and reviewed by a
  consultant. If an application passes the review, then the registration
  authority will assign an ethertype, which is then listed on a page
  with a protocol field that the assignee provides. In some cases, no
  protocol is is indicated, or what is listed is different from what it
  currently being used for. He said it is unclear what the IETF is
  asking for: a completely automated process where the registration
  authority of ethertypes is translated into a YANG module, and the
  requestor is assigned a name based on what is available (no requests
  for "pretty" names), or a "well-known" list of curated ethertypes?

  Mahesh Jethanandani replied that IEYF would like the well-known list
  of curated ethertypes, so that they could be consistent across
  vendors.

  Pat Thaler said that it is always public when an ethertype is assigned
  even if the assignment itself is private. She added that it is not
  clear to her that there is a way to come up with a definitive base for
  more than a fraction of the ethertypes when there are some where all
  you know is the number.

  Norman Finn said that only the owner of the ethertype has any business
  picking a name for it, but they would need to make sure that people
  outside the IETF couldn't allocate themselves an ethertype that was in
  that curated list.

  Dorothy Stanley suggested that it could be in an IEEE RAC YANG module.
  Glenn Parsons replied that he did not think they would do a curated
  one.

12. Low Latency

  Mirja Kuehlewind updated the group on low latency networking in the
  IETF.

  Slides:
  https://www.iab.org/wp-content/IAB-uploads/2013/01/ietf99-low-latency.pdf

  Pat Thaler noted that there are two kinds of latency reduction: going
  for the lowest maximum latency (as in DetNet), and going for
  efficiency on throughput.

  Russ Housley asked if the CDN work in the IETF brought up any
  additional places where the IETF should be coordinating with IEEE 802.
  Pat Thaler replied that there is currently not much work going on in
  802 about congestion control.

  Pascal Thubert said that they have asked for low latency in transport,
  a multi-operator mesh. They have ended up doing a fragment; there are
  no controls so all the fragments are pushed, causing congestion loss
  until time-out, blocking the buffers. In 6LO they have started new
  work about fragmentation that boils down to doing a form of transport
  at the 6LoWPAN sublayer. There is always a one-hop recovery mechanism
  but no end to end over the multi-hop mesh. Wireless is lossy by
  nature. The goal is to be able to recover and avoid buffer bloat
  within the network.

  Mirja Kuehlewind noted that there is a draft in TSVWG <draft-ietf-
  tsvwg-ecn-encap-guidelines> on using ECN in tunnels; there was a lot
  of coordination with IEEE on ECN uses.