Re: [CCWG] [tsvwg] [iccrg] New Internet Draft: Congestion Signaling (CSIG)

Sebastian Moeller <moeller0@gmx.de> Tue, 20 February 2024 07:59 UTC

Return-Path: <moeller0@gmx.de>
X-Original-To: ccwg@ietfa.amsl.com
Delivered-To: ccwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE78DC14F5E3; Mon, 19 Feb 2024 23:59:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.856
X-Spam-Level:
X-Spam-Status: No, score=-6.856 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmx.de
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fqkoDYlC3ed4; Mon, 19 Feb 2024 23:59:37 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EE8A2C14F5E9; Mon, 19 Feb 2024 23:59:36 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.de; s=s31663417; t=1708415973; x=1709020773; i=moeller0@gmx.de; bh=XpefGLa9tnFoaknHMsEegho7DgWbUDAY87981Pt1aG0=; h=X-UI-Sender-Class:Subject:From:In-Reply-To:Date:Cc:References: To; b=XE9ApEFn2i04LQAoRawhVV09q6d7oCinPfW5go12+U/8P3Ba3aDxe1b2RjolV59B Z5ZAvr+SzK4x39wIId86vclv+X93Nwojs8JNYYtTbFISKDW46+6pW2t6T+DxoEJPJ /E06uuA780FXYhG5xKgfbbQIsD9R95DctamYQHjk75lYuW1EFb10QTJTw4i5U6n9X iwu/tqLE4WY61/V0LOFZTHwLGdHOefnRHROBgljKmKL03/u9znScBRNcuxl9jMabn lVa10Lg3e7mCYlUgQ6X5HFSeDQg1/rXo6kjuxtGdvOJArpuxxqlpJqdrz8+OZcXad hOFAdgAdWOAKoNJSnQ==
X-UI-Sender-Class: 724b4f7f-cbec-4199-ad4e-598c01a50d3a
Received: from smtpclient.apple ([134.76.241.253]) by mail.gmx.net (mrgmx105 [212.227.17.168]) with ESMTPSA (Nemesis) id 1MCsUC-1rlAiz1f6G-008sAY; Tue, 20 Feb 2024 08:59:33 +0100
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.400.31\))
From: Sebastian Moeller <moeller0@gmx.de>
In-Reply-To: <CALx6S37zGrNMai+9khwG2_rpsiQuTd8bSiWbxZK-oiVEB0aimQ@mail.gmail.com>
Date: Tue, 20 Feb 2024 08:59:22 +0100
Cc: Sebastian Moeller <moeller0=40gmx.de@dmarc.ietf.org>, tsvwg <tsvwg@ietf.org>, Jai Kumar <jai.kumar@broadcom.com>, IETF IPPM WG <ippm@ietf.org>, Nandita Dukkipati <nanditad@google.com>, iccrg@irtf.org, Naoshad Mehta <naoshad@google.com>, ccwg@ietf.org, Abhiram Ravi <abhiramr@google.com>
Content-Transfer-Encoding: quoted-printable
Message-Id: <A68A0319-7942-482D-A395-BB72901B2EA7@gmx.de>
References: <CAF0+TDD+44TAHf7y05GzmCgbau66ey7AU2RaVroim_Tukf=7nQ@mail.gmail.com> <CALx6S35V8xyDBkN0m8kDEcNk0N734Fqq0Ne8ZJ284ZnSSUwV9w@mail.gmail.com> <CALx6S35XNyBe5=gh7JpaCKEkiXaEwPGHrDZe=E-EPkiF5mUCLA@mail.gmail.com> <CAB_+Fg5McYXt=M5MNkuxHrKrXQgZMS6PLRoVeUKiSUe5Qb7LjA@mail.gmail.com> <CALx6S35OHyhWjmkV2jiOqO-sB9Csugx0umB_yF_ann9rB8Tgbw@mail.gmail.com> <CAEsRLK9_bHrhyvFqCz3do=Ax3mKZor4EtqXY2chdfL7fzi1UMw@mail.gmail.com> <500388A6-50D3-4535-84CB-E6EF454960DD@gmx.de> <CALx6S37gOatLC_DZiM4M=e8qrzyE9y1D1i+UqOYXatd7Y6Nauw@mail.gmail.com> <918C1325-EC13-48CF-9B29-50EEB3A0FF1C@gmx.de> <CALx6S37zGrNMai+9khwG2_rpsiQuTd8bSiWbxZK-oiVEB0aimQ@mail.gmail.com>
To: Tom Herbert <tom=40herbertland.com@dmarc.ietf.org>
X-Mailer: Apple Mail (2.3774.400.31)
X-Provags-ID: V03:K1:u2qT+kDmmuZp6k4QIaYeoOLiFs7bOZ0po6wsHCHBizYiJz+7oNn NiZP2ZrsiW3uTmo3W0vTx7xTeUoouLZ9srnXuu6FM0y/KJwI/UPgEzGIsD0HYfYrp1fN0ZZ G1syfjCSjMS/+/VqOMViuPvekDk/6LqeLrVe2RN91MxdJItwv8AIPMawCeveB0E21a1QjdO TQQ0nHkJh96WGDQI6oO7w==
UI-OutboundReport: notjunk:1;M01:P0:zIjce09R760=;Xf6ZuXQU3W7XTKd5QfJSwvUbFV/ ErNR0ij+Aj5zpixnBG+GcYHwuVxy1dnHWLfgu1mCS7wZYi0nuBsrBmWXjOp1jwgYgpFdu8tMc nS//gZX/tCYrJ1pGEYr36QlYyccgkYizSK7vGB4nS5XHS7CCpq8b7UqdtkaMpk9l2fFd4PWx4 nyEPf70Z5PjDVoFLBVPfsJJin12HG1mQHM6eEOLb2k2owZdvZKUWoazTozy4TNiK4IV908Yq0 8D1MXghcYfbHqHDQxyIx+tgE9tZDBkNsaBmguoRDyLvvK9RLuEWEUnJDDzXMaR/wiZlQOvfuR YRaYsi3ZCysG6heI/ytClmXw10zLDGatk7hc5ak1YMuNaZJxTbVZre0SStByPZCEK3g6bUsE/ jeg7tWi447pi8GvZRHS02AKY7rLm/aFS3tw2pRlzw++gtkuyBaEelVzni/2NluKAsNbtyqrHi PeE1Xws6B6NzXKzhfVEXNrybNvrSncxYXK7GBeL4eTmUL+TLkjFKlaXaUO1WaCfoAgFjjixUh Ez5r4qU7idKBo7rHcXqIbOC73g+t1JhlBQnmTXRhgXIjKy9gD+lEpFnhiZkxe3i1StQpUT4DM eehLz3wjbouQhX3RsBK3U2gk+wO8FEB4IEcM91WXDWDka8FCy6/9t32Vkv7cIjODyHQphpVGZ Gg167w9CqK11yNcN9hwxtolj7x8Pojlqqu6sbsIshLASjvmwA+0FAW6UOCOMcjF3muIjMdwow Y0OPyPI6gMhfVlaB+dM1DeiIXnbjtP9vYJ54LANCMhfdDMnCbvib/SRT9tMd1vi4vWo2wvO/c sdqjbFrJy1pum8eNtgzP7F41U5aIwDKRCgOS96k94k0eM=
Archived-At: <https://mailarchive.ietf.org/arch/msg/ccwg/QUKfKJUK3L_KarDXAeNogoVa50I>
Subject: Re: [CCWG] [tsvwg] [iccrg] New Internet Draft: Congestion Signaling (CSIG)
X-BeenThere: ccwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Congestion Control Working Group <ccwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ccwg>, <mailto:ccwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ccwg/>
List-Post: <mailto:ccwg@ietf.org>
List-Help: <mailto:ccwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ccwg>, <mailto:ccwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Feb 2024 07:59:41 -0000

Hi Tom,


> On 19. Feb 2024, at 21:09, Tom Herbert <tom=40herbertland.com@dmarc.ietf.org> wrote:
> 
> On Mon, Feb 19, 2024 at 11:31 AM Sebastian Moeller
> <moeller0=40gmx.de@dmarc.ietf.org> wrote:
>> 
>> Hi Tom,
>> 
>> 
>>> On 19. Feb 2024, at 18:53, Tom Herbert <tom=40herbertland.com@dmarc.ietf.org> wrote:
>>> 
>>> On Sun, Feb 18, 2024 at 11:34 PM Sebastian Moeller
>>> <moeller0=40gmx.de@dmarc.ietf.org> wrote:
>>>> 
>>>> Hi Matt,
>>>> 
>>>>> On 17. Feb 2024, at 20:17, Matt Mathis <mattmathis@measurementlab.net> wrote:
>>>>> 
>>>>> I think the L2/L4 split is brilliant.
>>>> 
>>>> [SM] Respectfully, the brilliance depends very much on the goal/gamer plan. Is this purely aimed at data center traffic this looks like a sweet solution that is 'organically' confined to the domain with appropriately capable L2 elements? Or is the end-game here an (overdue) improvement of end-to-end loads/congestion information? In the former case L2/L4 seems a decent solution, in the latter case less so (not that getting a common L3 solution would be guaranteed or easy).
>>>> 
>>>> 
>>>>> Putting the forward instrumentation as low as possible in the stack permits easy processing in HW w/o parsing any L3.
>>>> 
>>>> [SM] Sweet, but that really means that this solution is unlikely to survive over a full internet path.
>>>> 
>>>>> Putting the replies in L4 only requires a handful of implementations to cover all possible paths,
>>>> 
>>>> [SM] Mmmh, that might be but partly because the L2 solution noticeably restricts the set of possible paths, no?
>>>> 
>>>>> and piggybacks on existing solutions to session layer issues, such as authentication and authorization.
>>>> 
>>>> [SM] What is the threat model here? I would guess an attacker that knows the full path might just as well probe the congestion level and an attacker that does not know the path might not be able to do much with the congestion information? (Any attacker that can modify the congestion information might as well drop the packet directly).
>>>> 
>>>>> 
>>>>> I would consider mentioning but then temporarily excluding alternet placements: either as a shim at the top of L2, sort of like VLAN tags, or within an L3 option.   Both of these have their own challenges, but might be extremely valuable in some environments.
>>>> 
>>>> [SM] Some environments, like the internet? I know that the I in IETF is not a strict limiter of scope, but still it would be nice if drafts would have a viable path of being implemented over the internet... That said, well possible that the current state does not merit use-over-the-internet yet and so maybe starting with an L2/L4 solution might be considered a safety back-stop?
>>> 
>>> Sebastian,
>>> 
>>> There's no reason to believe that Congestion Signaling isn't of
>>> interest to use on an internet (lower case 'i' is explicit here).
>> 
>> [SM] Well, in my mind that still would keep this out of scope for the capital I ETCopy of Copy of Enfabrica-SiPandaF,

[SM2] Not sure how that 'Copy of Copy of Enfabrica-SiPanda' string ended up in that paragraph, I do not recall writing that... either autocompletion run wild or some other issue.


>> I am interested in improving end to end congestion signalling over the Internet so I desire these signals to sink and source at my endpoints... Again, I understand that my position is in the rough regarding what the IETF should care about.
>> 
>>> This is almost certainly beneficial for 6G for instance which is an
>>> internet composed for various link layer technologies.
>>> Neither is this
>>> the only protocol of this nature there are and will be others-- from
>>> an IETF POV I believe we want a extensible protocol solution that
>>> benefits multiple use cases and works in different environments.
>> 
>> [SM] That way lies madness IMHO. Getting enough routers/switches support one signal and hence make it useful is already almost a Sisyphus task expecting them to support multiple signals selected individually per packet seems like a recipe of never getting this to work end to end (which is my motivator here). If we do not know which single signal to use here, I guess keeping this private and do more research seems like a productive way forward.
> 
> Sebastian,
> 
> I would agree with that if this was the first protocol ever trying to
> do something like this, but it's not. IOAM is already a published RFC.

[SM2] There are a number of points that are against IOAM being a suitable encapsulation here:

https://datatracker.ietf.org/doc/html/rfc9378 :
"IOAM is focused on "limited domains", as defined in [RFC8799]. IOAM is not targeted for a deployment on the global Internet."

IMHO that already disqualifies IOAM here as the goal needs to be a fully end to end method having the Internet as its scope.

Sure one will be able to define a specific type of message that will only be added/removed by end points (aka Edge-to-Edge (E2E)), but now our intermediate nodes will need to check for a specific IOAM record type (not sure whether that is the proper IOAM nomenclature, but you get my idea, I hope). Except as currently defined E2E does not allow intermediate nodes to modify the information... so E2E is out and we are down to IOAM Proof of Transit Type 0... this is pretty complicated and obscure already.

But let's run with it, OK, IOAM Proof of Transit Type 0 it is:
4.5.1. IOAM Proof of Transit Type 0
IOAM Proof of Transit Option of IOAM POT-Type 0:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Namespace-ID |IOAM POT-Type=0|R R R R R R R R|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+<-+
| PktID | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ P
| PktID (contd) | O
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ T
| Cumulative | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| Cumulative (contd) | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+<-+

Namespace-ID:16-bit identifier of an IOAM-Namespace (see Section 4.3 above).IOAM POT-Type:8-bit identifier of a particular POT variant that specifies the POT data that is included (see Section 4.5 above). For this case here, IOAM POT-Type is set to the value 0.Bit 0-7:Undefined (see Section 4.5 above).PktID:64-bit packet identifier.Cumulative:64-bit Cumulative that is updated at specific nodes by processing per packet PktID field and configured parameters.Note: Larger or smaller sizes of "PktID" and "Cumulative" data are feasible and could be required for certain deployments, e.g., in case of space constraints in the encapsulation protocols used. Future documents could introduce different sizes of data for "Proof of Transit".


That comes in at a hefty 5 * 4 = 20 octets/bytes already, 12/20  of which carry no useful information for the congestion use case...
Sure it argues, one could define a smaller version, maybe getting rid of the PktID completely and reducing the Cumulative data to something smaller, but then we already likely down to 8 bytes out of which only 4 carry the relevant information (assuming we can dump PktID completely)

I also ignore that we still need a way to actually add this 20bytes to our data packets, which in turn will result in even more overhead. E.g. IPv6 Hop-byHop adds 2 bytes, but comes with an 8 byte granularity, so we need to add 4. But now we are at 16/24 or 2/3s pure overhead already...*


If we look how to fill the Cumulative information we get e.g.:

4.4.2.12. Buffer Occupancy
The "buffer occupancy" field is a 4-octet unsigned integer field. This field indicates the current status of the occupancy of the common buffer pool used by a set of queues. The units of this field are implementation specific. Hence, the units are interpreted within the context of an IOAM-Namespace and/or node identifier if used. The authors acknowledge that, in some operational cases, there is a need for the units to be consistent across a packet path through the network; hence, it is recommended for implementations to use standard units, such as bytes.
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| buffer occupancy |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Which in turn states its own unsuitability in its current form explicitly "r pool used by a set of queues. The units of this field are implementation specific. Hence, the units are interpreted within the context of an IOAM-Namespace and/or node identifier if used. The authors acknowledge that, in some operational cases, there is a need for the units to be consistent across a packet path through the network; hence, it is recommended for implementations to use standard units, such as bytes." Indeed, but a spec needs to make this clear and define that standard unit to use....

All of this then points to IOAM's high complexity, surely warranted for IOAM's intended use-cases but for a full end/network to end signal this complexity is not required.



*) According to Arslan, Serhat, and Nick McKeown. “Switches Know the Exact Amount of Congestion.” In Proceedings of the 2019 Workshop on Buffer Sizing, 1–6, 2019. 4 bits might already be enough to meaningfully encode buffer occupancy, so if we aim for 16 to 32 bits of actual information we should have plenty of bits...


> The problem with IOAM, according to the draft, is "they all commonly
> stack up multiple per-switch telemetry data per-hop in the path of a
> packet". I don't see why IOAM can't be adapted to contain fixed
> length CSIG data without requiring be packets.

[SM2] This is already handled in the ' IOAM Proof of Transit Type 0' field, the facrt that you did not notice that supports my argument that IOAM is too complicated an RFC for this simple use-case, no?


> If that constraint is
> removed then the only remaining argument against IOAM seems to be that
> it's easier for hardware to handle L3 rather than L2 in hardware.

[SM2] No, it is still way to complicated (offering options all intermediary nodes will need to check before setting values) and way way to overheady...

> I don't believe there is currently consensus that that is generally
> true.

[SM2] Unclear what the consensus is. IMHO is is not really a question of consensus, if we want this to be a first class end 2 end signal, L2 is simply not an option independent of our wishes.

> And, if this is why IOAM "has such a sparse (or no) support from
> switch vendors" as Jai claims then it seems like this is maybe
> something that should be discussed instead of just arbitrarily
> dismissing IOAM. Why exactly is IOAM in HW such a problem and can it
> be fixed? (a quick look at ippm archives didn't reveal any
> discussions).

[SM2] As shown above IOAM seems to be one of these everything and the kitchensink solution, probably great for its intended use cases, but efficient end/network to end signalling IM;HO is not one of these use cases. Sure it could be bent into shape to support that use case, but I would rather see a meaner and leaner signal design for the congestion information aggregation along a path use case. If I had control, I would propose a new IPv6 header type (with a new next header number) mutually exclusive with hop by hop (so that confirming the next header number is the only check required before updating data at a known offset). There is value in simplicity... (I guess this scheme will fail due to firewalls only permitting a limited set of next header values...)


Regards
	Sebastian


> 
> Tom
> 
>> 
>> Regards
>>        Sebastian
>> 
>> 
>>> 
>>> Tom
>>> 
>>>> 
>>>> Regards
>>>>       Sebastian
>>>> 
>>>>> 
>>>>> On Sat, Feb 10, 2024 at 7:42 AM Tom Herbert <tom=40herbertland.com@dmarc.ietf.org> wrote:
>>>>> On Fri, Feb 9, 2024 at 10:53 PM Nandita Dukkipati <nanditad@google.com> wrote:
>>>>>> 
>>>>>> Hi Tom,
>>>>>> 
>>>>>> We updated the draft, correcting some nit errata, and to not let the draft expire. It's not discussed in any other mailing lists.
>>>>> 
>>>>> Thanks Nandita.
>>>>> 
>>>>> I still have fundamental concerns about the protocol layering in this
>>>>> draft, please see my previous comments on that. The draft defines a
>>>>> protocol for end-to-end network to host signaling and IMO, such a
>>>>> protocol belongs in the network layer but the draft puts the protocol
>>>>> in L2 and L4 and seems to avoid L3 without explanation. IOAM defines a
>>>>> very similar method of signaling and RFC9486 is a good model for
>>>>> network layer protocol that provides network to host signaling.
>>>>> 
>>>>> Tom
>>>>> 
>>>>>> 
>>>>>> Nandita
>>>>>> 
>>>>>> On Thu, Feb 8, 2024 at 3:53 PM Tom Herbert <tom@herbertland.com> wrote:
>>>>>>> 
>>>>>>> Hi,
>>>>>>> 
>>>>>>> I noticed there is now an -01 version of the draft posted on Feb. 2.
>>>>>>> Is this draft being discussed on some other list?
>>>>>>> 
>>>>>>> Thanks,
>>>>>>> Tom
>>>>>>> 
>>>>>>> On Sat, Sep 9, 2023 at 9:09 AM Tom Herbert <tom@herbertland.com> wrote:
>>>>>>>> 
>>>>>>>> Hi, thanks for draft!
>>>>>>>> 
>>>>>>>> The first thing that stands out to me is the carrier of the new packet headers. In the forward path it would be in L2 and in reflection it would be L4. As the draft describes, this would entail having to support the protocol in multiple L2 and multiple L4 protocols-- that's going to be a pretty big lift! Also, L2 is not really an end-to-end protocol (would legacy switches in the path also forward the header)l?).
>>>>>>>> 
>>>>>>>> The signaling being described in the draft is network layer information, and hence IMO should be conveyed in network layer headers. That's is L3 which conveniently is the average of L2+L4 :-)
>>>>>>>> 
>>>>>>>> IMO, the proper carrier of the signal data is Hop-by-Hop Options. This is end-to-end and allows modification of data in-flight. The typical concern with Hop-by-Hop Options is high drop rates on the Internet, however in this case the protocol is explicitly confined to a limited domain so I don't see that as a blocking issue for this use case.
>>>>>>>> 
>>>>>>>> The information being carried seems very similar to that of IOAM (IOAM uses Hop-by-Hop Options and supports reflection). I suppose the differences are that this protocol is meant to be consumed by the transport Layer and the data is a condensed summary of path characteristics. IOAM seems pretty extensible, so maybe it could be adapted to carry the signals of this draft?
>>>>>>>> 
>>>>>>>> A related proposal might be FAST draft-herbert-fast. Where the CSIG is network to host signaling, FAST is host to network signaling for the purposes of requesting network services. These might be complementary and options for both may be in the same packet. FAST also uses reflection, so we might be able to leverage some common implementation at a destination.
>>>>>>>> 
>>>>>>>> Tom
>>>>>>>> 
>>>>>>>> On Fri, Sep 8, 2023, 7:43 PM Abhiram Ravi <abhiramr=40google.com@dmarc.ietf.org> wrote:
>>>>>>>>> 
>>>>>>>>> Hi IPPM folks,
>>>>>>>>> 
>>>>>>>>> I am pleased to announce the publication of a new internet draft, Congestion Signaling (CSIG): https://datatracker.ietf.org/doc/draft-ravi-ippm-csig/
>>>>>>>>> 
>>>>>>>>> CSIG is a new end-to-end packet header mechanism for in-band signaling that is simple, efficient, deployable, and grounded in concrete use cases of congestion control, traffic management, and network debuggability. We believe that CSIG is an important new protocol that builds on top of existing in-band network telemetry protocols.
>>>>>>>>> 
>>>>>>>>> We encourage you to read the CSIG draft and provide your feedback and comments. We have also cc'd the TSVWG, CCWG, and ICCRG mailing lists, as we believe that this work may be of interest to their members as well.
>>>>>>>>> 
>>>>>>>>> Thank you for your time and consideration.
>>>>>>>>> 
>>>>>>>>> Sincerely,
>>>>>>>>> Abhiram Ravi
>>>>>>>>> On behalf of the CSIG authors
>>>>> 
>>>>> _______________________________________________
>>>>> iccrg mailing list
>>>>> iccrg@irtf.org
>>>>> https://mailman.irtf.org/mailman/listinfo/iccrg
>>>>> 
>>>>> 
>>>>> --
>>>>> Thanks,
>>>>> --MM--
>>>>> Evil is defined by mortals who think they know "The Truth" and use force to apply it to others.