[ippm] Discussion of unusual policy in draft-ietf-ippm-capacity-metric-method-01

"MORTON, ALFRED C (AL)" <acm@research.att.com> Mon, 01 June 2020 18:27 UTC

Return-Path: <acm@research.att.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B6CCB3A13FD for <ippm@ietfa.amsl.com>; Mon, 1 Jun 2020 11:27:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i5AtqUxwoLVh for <ippm@ietfa.amsl.com>; Mon, 1 Jun 2020 11:27:50 -0700 (PDT)
Received: from mx0a-00191d01.pphosted.com (mx0b-00191d01.pphosted.com [67.231.157.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 948F43A13EF for <ippm@ietf.org>; Mon, 1 Jun 2020 11:27:50 -0700 (PDT)
Received: from pps.filterd (m0083689.ppops.net [127.0.0.1]) by m0083689.ppops.net-00191d01. (8.16.0.42/8.16.0.42) with SMTP id 051ICtAs030625 for <ippm@ietf.org>; Mon, 1 Jun 2020 14:27:49 -0400
Received: from tlpd255.enaf.dadc.sbc.com (sbcsmtp3.sbc.com [144.160.112.28]) by m0083689.ppops.net-00191d01. with ESMTP id 31d43xv7db-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for <ippm@ietf.org>; Mon, 01 Jun 2020 14:27:49 -0400
Received: from enaf.dadc.sbc.com (localhost [127.0.0.1]) by tlpd255.enaf.dadc.sbc.com (8.14.5/8.14.5) with ESMTP id 051IRnP6039396 for <ippm@ietf.org>; Mon, 1 Jun 2020 13:27:49 -0500
Received: from zlp30493.vci.att.com (zlp30493.vci.att.com [135.46.181.176]) by tlpd255.enaf.dadc.sbc.com (8.14.5/8.14.5) with ESMTP id 051IRhsB039248 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for <ippm@ietf.org>; Mon, 1 Jun 2020 13:27:43 -0500
Received: from zlp30493.vci.att.com (zlp30493.vci.att.com [127.0.0.1]) by zlp30493.vci.att.com (Service) with ESMTP id 120C44009E9B for <ippm@ietf.org>; Mon, 1 Jun 2020 18:27:43 +0000 (GMT)
Received: from clph811.sldc.sbc.com (unknown [135.41.107.12]) by zlp30493.vci.att.com (Service) with ESMTP id E75724009E96 for <ippm@ietf.org>; Mon, 1 Jun 2020 18:27:42 +0000 (GMT)
Received: from sldc.sbc.com (localhost [127.0.0.1]) by clph811.sldc.sbc.com (8.14.5/8.14.5) with ESMTP id 051IRgSA033791 for <ippm@ietf.org>; Mon, 1 Jun 2020 13:27:42 -0500
Received: from mail-green.research.att.com (mail-green.research.att.com [135.207.255.15]) by clph811.sldc.sbc.com (8.14.5/8.14.5) with ESMTP id 051IRf71033696 for <ippm@ietf.org>; Mon, 1 Jun 2020 13:27:41 -0500
Received: from exchange.research.att.com (njmtcas1.research.att.com [135.207.255.86]) by mail-green.research.att.com (Postfix) with ESMTPS id 7596B10A301A for <ippm@ietf.org>; Mon, 1 Jun 2020 14:27:40 -0400 (EDT)
Received: from njmtexg5.research.att.com ([fe80::b09c:ff13:4487:78b6]) by njmtcas1.research.att.com ([fe80::e881:676b:51b6:905d%12]) with mapi id 14.03.0487.000; Mon, 1 Jun 2020 14:27:40 -0400
From: "MORTON, ALFRED C (AL)" <acm@research.att.com>
To: "ippm@ietf.org" <ippm@ietf.org>
Thread-Topic: Discussion of unusual policy in draft-ietf-ippm-capacity-metric-method-01
Thread-Index: AdY4QhrL4H3oaFeVSxeK4wADCpcRgg==
Date: Mon, 01 Jun 2020 18:27:39 +0000
Message-ID: <4D7F4AD313D3FC43A053B309F97543CF0108A5E823@njmtexg5.research.att.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [69.141.203.172]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.216, 18.0.687 definitions=2020-06-01_12:2020-06-01, 2020-06-01 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 adultscore=0 bulkscore=0 priorityscore=1501 lowpriorityscore=0 spamscore=0 mlxlogscore=999 cotscore=-2147483648 clxscore=1015 mlxscore=0 impostorscore=0 phishscore=0 suspectscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2004280000 definitions=main-2006010137
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/5dXFMvX2tiuePpludADyu79-1E0>
Subject: [ippm] Discussion of unusual policy in draft-ietf-ippm-capacity-metric-method-01
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Jun 2020 18:27:53 -0000

Hi IPPM,

In https://tools.ietf.org/html/draft-ietf-ippm-capacity-metric-method-01,
the authors proposed straightforward methods that measure at the IP-layer 
and depend on the presence of the simple UDP transport layer to make the
measurements possible. 

OTOH, we also understand the points at the end of Section 8.3, 
Measurement Considerations, quoted below:

   In general, results depend on the sending stream characteristics; the
   measurement community has known this for a long time, and needs to
   keep it front of mind.  Although the default is a single flow (F=1)
   for testing, use of multiple flows may be advantageous for the
   following reasons:

   1.  the test hosts may be able to create higher load than with a
       single flow, or parallel test hosts may be used to generate 1
       flow each.

   2.  there may be link aggregation present (flow-based load balancing)
       and multiple flows are needed to occupy each member of the
       aggregate.

   Each flow would be controlled using its own implementation of the
   Load Adjustment (Search) Algorithm.

   As testing continues, implementers should expect some evolution in
   the methods.

So, what if the Internet access policy is somewhat unusual/complex depending
on the stream (Type-P)?

We might see IP-layer Capacity limits for individual users in the
same household, or we might see limits based on the packet markings, packet
transport layer, or higher layer protocols imposed on packets from all users.
We could see policies and queues dedicated to elastic traffic and low-latency 
traffic, and the total IP-Layer Capacity includes some of both traffic types.	

How would we treat such Internet access service specifications/policies when
the goal is to measure the Maximum IP-Layer Capacity?

We could scan for such dependencies and report them, or consult the Service 
agreement for policies that might indicate multiple flows are needed. The 
authors have not encountered much of this; only one policy instance in practice.

It seems prudent to add a third item to the list at the end of Section 8.3 
to add reason where multiple flows may be needed, something like:

  3. access policies may limit the IP-Layer Capacity depending on the Type-P
     of packets, possibly reserving capacity for various stream types.

Do others have opinions on how prevalent these unusual policies are, or will be, 
and ideas on how to handle this point in the WG draft?

Thanks for reading/thinking about it,
Al