Re: More context on ATSSS use case

Christoph Paasch <cpaasch@apple.com> Tue, 27 October 2020 04:56 UTC

Return-Path: <cpaasch@apple.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB3C13A157A for <quic@ietfa.amsl.com>; Mon, 26 Oct 2020 21:56:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2p0Ga0U0BgsS for <quic@ietfa.amsl.com>; Mon, 26 Oct 2020 21:56:34 -0700 (PDT)
Received: from nwk-aaemail-lapp01.apple.com (nwk-aaemail-lapp01.apple.com [17.151.62.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A0173A1573 for <quic@ietf.org>; Mon, 26 Oct 2020 21:56:34 -0700 (PDT)
Received: from pps.filterd (nwk-aaemail-lapp01.apple.com [127.0.0.1]) by nwk-aaemail-lapp01.apple.com (8.16.0.43/8.16.0.42) with SMTP id 09R4tGrp048554; Mon, 26 Oct 2020 21:56:32 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=content-type : content-transfer-encoding : from : mime-version : subject : date : message-id : references : cc : in-reply-to : to; s=20180706; bh=KLZ11Ko8vf7g+Vw3e8+kVkgqIT6XBW7t13RFYwvzHxA=; b=A5VA6k9GROzYb54/TKYaWMEh0NmKbShJFWdEpr+a9cYY0f2LlAFoizWJXatDn0nLe/Z3 ewWf5gIFHqPdPA+ERcfGcwkIyu97qsadP0Z6N1VZN2HvHVAtKi/FdkrpBxoajXfXIHb0 6w5flHtHH9IJNmRWZlXj2r4djFADQt2HgjldhRlHD1zXJ0CNua2whAWsPDFBv145KNXM 4mGVTjYo8CBKcHLTsP+b2bShov8rt0CkF6/FJVjdZSErnEF7dOa0TBO0WpeWjQbwbJ49 +zFiG3ps0/dTEId4GmU9QDuB5dOv6WR5Lh+pYGL977JppjIQiCf8RXcF6peIyMveYML9 iw==
Received: from rn-mailsvcp-mta-lapp04.rno.apple.com (rn-mailsvcp-mta-lapp04.rno.apple.com [10.225.203.152]) by nwk-aaemail-lapp01.apple.com with ESMTP id 34ck6y42fx-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Mon, 26 Oct 2020 21:56:32 -0700
Received: from rn-mailsvcp-mmp-lapp04.rno.apple.com (rn-mailsvcp-mmp-lapp04.rno.apple.com [17.179.253.17]) by rn-mailsvcp-mta-lapp04.rno.apple.com (Oracle Communications Messaging Server 8.1.0.6.20200729 64bit (built Jul 29 2020)) with ESMTPS id <0QIU00H83GE7AV00@rn-mailsvcp-mta-lapp04.rno.apple.com>; Mon, 26 Oct 2020 21:56:31 -0700 (PDT)
Received: from process_milters-daemon.rn-mailsvcp-mmp-lapp04.rno.apple.com by rn-mailsvcp-mmp-lapp04.rno.apple.com (Oracle Communications Messaging Server 8.1.0.6.20200729 64bit (built Jul 29 2020)) id <0QIU00X00GCFXE00@rn-mailsvcp-mmp-lapp04.rno.apple.com>; Mon, 26 Oct 2020 21:56:31 -0700 (PDT)
X-Va-A:
X-Va-T-CD: cdaa14cfcfc144345f8b3130a3d22b5b
X-Va-E-CD: ec2d4a9f149a487a06d796c8f359c06e
X-Va-R-CD: 40c04158db3a8174079206adafca1103
X-Va-CD: 0
X-Va-ID: 03d7ea11-2bb5-4517-be79-b0a6bcc4eb94
X-V-A:
X-V-T-CD: cdaa14cfcfc144345f8b3130a3d22b5b
X-V-E-CD: ec2d4a9f149a487a06d796c8f359c06e
X-V-R-CD: 40c04158db3a8174079206adafca1103
X-V-CD: 0
X-V-ID: 0ef6650b-4056-4809-aa26-304021d04f32
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.235, 18.0.737 definitions=2020-10-27_01:2020-10-26, 2020-10-27 signatures=0
Received: from [10.105.113.43] (unknown [10.105.113.43]) by rn-mailsvcp-mmp-lapp04.rno.apple.com (Oracle Communications Messaging Server 8.1.0.6.20200729 64bit (built Jul 29 2020)) with ESMTPSA id <0QIU00DG5GE76S00@rn-mailsvcp-mmp-lapp04.rno.apple.com>; Mon, 26 Oct 2020 21:56:31 -0700 (PDT)
Content-type: multipart/alternative; boundary="Apple-Mail-6091105C-54FC-49C0-8B63-CE8786B0A980"
Content-transfer-encoding: 7bit
From: Christoph Paasch <cpaasch@apple.com>
MIME-version: 1.0 (1.0)
Subject: Re: More context on ATSSS use case
Date: Mon, 26 Oct 2020 21:56:30 -0700
Message-id: <0CC11F96-A4D4-4D7D-A913-F218892303A2@apple.com>
References: <CAPDSy+5Rfy77=iNNeg--YinfKvhmSThDJ98sN6WNyNvhX-d9MQ@mail.gmail.com>
Cc: Florin Baboescu <florin.baboescu@broadcom.com>, QUIC <quic@ietf.org>
In-reply-to: <CAPDSy+5Rfy77=iNNeg--YinfKvhmSThDJ98sN6WNyNvhX-d9MQ@mail.gmail.com>
To: David Schinazi <dschinazi.ietf@gmail.com>
X-Mailer: iPhone Mail (18E93)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.235, 18.0.737 definitions=2020-10-27_01:2020-10-26, 2020-10-27 signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/l-yxSd_3YB1GysjcbEu_1tZ4jFY>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Oct 2020 04:56:38 -0000

Hello,

> On Oct 25, 2020, at 12:18 PM, David Schinazi <dschinazi.ietf@gmail.com> wrote:
> 
> 
> Hi Florin,
> 
> Thank you for your response, please see comments inline.
> 
> David
> 
>> On Fri, Oct 23, 2020 at 7:54 PM Florin Baboescu <florin.baboescu@broadcom.com> wrote:
>> Hi David,
>> 
>>  
>> 
>> I see that you are repeating a statement with which I definitely can not agree “I'm noticing a pattern where no one is able to explain how this will improve the end-user experience though, so I'm going to assume that this is beneficial for carriers and not end-users.” So I’ll try to give it a try. First I thought it was not necessary as there were already some great presentations by Christoph, Olivier and the guys from Alibaba which should have provided you with a very good reasoning on benefits for the end user. I am not going to go again through what they presented.
>> 
> 
> The Apple and Alibaba presentations were great - but they were about end-to-end multipath, not about ATSSS. My statement about user experience is very specific to ATSSS.

the benefits Apple’s users are getting out of an end-to-end use of multipath would be the same for an ATSSS based multipath.
It is unimportant where the transport layer session is terminated, as long as the diverse paths are between the two endpoints that are terminating the multipath session.

If ATSSS can provide multipath capabilities to end users even when servers are not multipath capable or do not have sufficient control or information to efficiently use the path diversity, then it is a win for the user’s experience.


Christoph 


>  
>>                We also had one slide in our presentation, which may have been overlooked, detailing at least three elements through which a multipath access solution may improve the overall Quality of Experience for the end user:
>> 
>> 1)      Increased capacity, 2) increased coverage and 3) increased reliability.
>> 
>>  
>> 
>> Let’s assume for simplicity an user which would be charged for the amount of data he/she would use over a cellular network using licensed spectrum while for all the data exchanged over the WiFi. While the user is under a good WiFi coverage all his traffic is going to be routed over the WiFi, no data traffic is going over the cellular. However, when the user is in an area of limited coverage or the level of interference reaches a certain threshold the quality of the communication over the WiFi access degrades. As a result the achievable throughput over the WiFi may get below a certain threshold. At this moment the WiFi access may not be able to sustain the throughput the user may require. The user may either switch over to the cellular (paying a higher penalty) or use both accesses, WiFi and cellular. When both accesses are used,  all the traffic below a maximum threshold will go over the WiFi access, while all the leftover traffic will go over the cellular access.
>> 
> 
> Thank you - this is exactly the kind of user benefit I was asking for. In other words: the user can save on monetary costs when watching a high quality video in this very precise scenario of functional but slow Wi-Fi while in range of high speed but expensive cellular. We can debate how common this scenario is and how impactful the solution would be, but I agree that this is an actual end-user benefit.
>  
>> In total for this example there are the following cases:
>> 
>> -          User entirely under the WiFi coverage
>> 
>> -          User entirely under the cellular coverage (no WiFi coverage)
>> 
>> -          User under both WiFi and cellular coverage
>> 
>>  
>> 
>> This solution essentially increases the coverage area for the user complementing the use WiFi with cellular in zones of poor coverage or no coverage.  Without it the user would have been left without data access in areas of no WiFi coverage, or with a high rate of error and limited throughput access in the areas of poor WiFi coverage or high interference. The solution increases the reliability, allowing the user to backup the primary access(in this case WiFi) with a secondary access (cellular).
>> 
> 
> I don't understand how this increases coverage, can you elaborate? Coverage is determined by the cellular antennas and Wi-Fi access points available to me. I can use all of them with QUIC connection migration end-to-end today, or even plain-old TCP that creates a new connection on IP change - ATSSS doesn't change the network coverage I have.
> 
> Similarly, I agree that in some circumstances this can increase overall throughput, but I don't understand how it improves reliability, if anything I think it'll reduce reliability by adding a new single point of failure in the network - the ATSSS proxy.
>  
>> On a side note I would also try to answer a different question. Is the bandwidth aggregation solution always useful? Based on various companies contributions in 3GPP it was noticed that there is no benefit for the user to do bandwidth aggregation when the throughput ratio between the two accesses exceeds somewhere between (3-5):1.
>> 
> 
> That's a useful datapoint, thanks! So it is restricting the use benefit scenario above to only when Wi-Fi and cellular have comparable throughput.
>  
>> Another interesting use case addresses one of the limitations of WiFi ( before WiFi6, which uses an OFDMA based access). As many of you know, in WiFi an user can transmit only after it detects that there is no one else transmitting at the same time. Because of this when the number of users served by the same access point increases the quality of the access decreases, as all the users compete for the same access. In this case the end user may use the WiFi access for all the downlink traffic while for the uplink traffic may use the cellular access. This use case improves for the end user both the capacity for both downlink and uplink as well as the reliability.
>> 
> 
> I wouldn't call carrier sense a limitation of Wi-Fi, it's a very reasonable design choice that's worked incredibly well for us so far. Sending the uplink and downlink packets on different paths sounds like an interesting research topic, has this been tried in practice?
>  
>> These are just few examples which try to show the benefits of bringing a multipath solution in the toolbox for both end user as well as network elements/functions. I hope I brought some more clarity to you.
>> 
>> Regards,
>> 
>> -Florin
>> 
>>  
>> 
>>  
>> 
>>  
>> 
>> From: QUIC [mailto:quic-bounces@ietf.org] On Behalf Of David Schinazi
>> Sent: Friday, October 23, 2020 6:12 PM
>> To: Mirja Kuehlewind <mirja.kuehlewind@ericsson.com>
>> Cc: quic@ietf.org
>> Subject: Re: More context on ATSSS use case
>> 
>>  
>> 
>> Hi Mirja,
>> 
>>  
>> 
>> I understand how in some scenarios this could increase throughput.
>> 
>> However, can you clarify how this could improve latency?
>> 
>>  
>> 
>> I'm noticing a pattern where no one is able to explain how this will
>> 
>> improve the end-user experience though, so I'm going to assume
>> 
>> that this is beneficial for carriers and not end-users. Unfortunately
>> 
>> I don't have the time to go to 3GPP and do this research myself.
>> 
>>  
>> 
>> David
>> 
>>  
>> 
>> On Fri, Oct 23, 2020 at 6:07 PM Mirja Kuehlewind <mirja.kuehlewind@ericsson.com> wrote:
>> 
>> Hi David,
>> 
>>  
>> 
>> this depends on the actual use case. Using multipath in a masque-like proxy setup covers multiple scenarios; in the hybrid access scenario it’s throughput, in other cases it can be latency, or a cheaper data subscription. That’s what I tried to explain below.
>> 
>>  
>> 
>> However, the whole point of ATSSS, as well as other use cases, is to provide the (mobile) operator’s costumer/the user better performance that what you have right now when using only a single path by actually making use of currently unused resources. We can argue what’s the best way to achieve that but you probably need to go to 3GPP and have that this discussion there. I was mainly trying to explain what ATSSS is, what the motivation is, and what the requirements are.
>> 
>>  
>> 
>> Mirja
>> 
>>  
>> 
>>  
>> 
>>  
>> 
>> From: David Schinazi <dschinazi.ietf@gmail.com>
>> Date: Friday, 23. October 2020 at 23:08
>> To: Mirja Kuehlewind <mirja.kuehlewind@ericsson.com>
>> Cc: "quic@ietf.org" <quic@ietf.org>
>> Subject: Re: More context on ATSSS use case
>> 
>>  
>> 
>> Hi Mirja,
>> 
>>  
>> 
>> Can you clarify what you mean by "optimize resource usage and
>> 
>> therefore also the performance for the user"?
>> 
>> 1) What does it mean in networking terms (latency, throughput, etc.)?
>> 
>> 2) What does it mean in end-user terms (video loads faster, etc.)?
>> 
>>  
>> 
>> Thanks,
>> 
>> David
>> 
>>  
>> 
>> On Fri, Oct 23, 2020 at 12:45 PM Mirja Kuehlewind <mirja.kuehlewind=40ericsson.com@dmarc.ietf.org> wrote:
>> 
>> Hi all,
>> 
>> based on the discussion yesterday I would like to provide some more context for the ATSSS use case and some notes that probably also applies to other proxy based-use cases.
>> 
>> First of all, I would like to clearly note that it's the client (UE) that has to request ATSSS support (a Multi-Access (MA)-PDU session) when connecting to the mobile network and it's also the client that starts the QUIC connection to the proxy (hosted in the UPF). Further for each connection that the client starts to some target content server, it can again decide to use the ATSSS setup or not (by otherwise connecting to the server over a single PDU mobile-network-only session). That means the endpoint can locally decide if it wants to only use the mobile link for certain connections instead of any kind of ATSSS service. However, that decision will likely not only depend on the application characteristics but also on e.g. the data subscription, user preferences, or device status.
>> 
>> And that brings me to another point: The right scheduling for the use of multiple paths does not only depend on the application characteristics. It's also the network conditions of each link, which to some extend can be measured in the transport if traffic is sent on both/all links, as well as other factors such as user tariff, remaining data volume, or battery status. Yes, this doesn't make the problem easier but we also don't need to solve this problem in a general way. For each of the proxy-based use cases presented yesterday there is a specific network setup with specific characteristics and goals. And often the two links do have quite different but known characteristics which does make the decision easier.
>> 
>> For the hybrid access case, you have one DSL and one mobile link and multipath is used for bandwidth aggregation. This setup is usually deployed when the physical line that is serving the DSL doesn't provide sufficient bandwidth and in certain areas upgrading those links would be very costly. In this case the scheduling is clear: you always fill up the DSL first and only use the mobile link when the DSL capacity is exhausted; this can happen for e.g. high quality video streaming. In that case the mobile link usually has a higher latency and you might need to wait a few more seconds before your video starts but I guess that's better than watching the video in low quality.
>> 
>> For ATSSS you always have one mobile 3GPP link and one non-3GPP link, usually wifi. And as I said in the chat yesterday, for ATSSS this will probably get first deployed with managed wifi networks, such that are often available today already by mobile operators in certain countries. ATSSS also provides a small number of so called "steering modes" which impacts the scheduling used, as presented by Spencer yesterday. These modes are provided by the network to the client (on the UE) as well as the proxy (hosted in the UPF) and these both tunnel endpoints decide independently which scheduling to use. 
>> 
>> There are different scenarios for these different steering modes, however, it's rather a small set of options. When selecting these modes the network is able to take additional factors into account such as subscriber data, operator configuration, or also application server provided info, e.g. for cases where there is actually an SLA between the content provider and network operator in place.
>> 
>> By default the scheduling could always prefer one link and only switch over when the performance is not sufficient anymore, e.g. the selected network gets loaded. While you can measure the network characteristics, and ATSSS will also rely on measured characteristics when deciding which path to use, the operator of the mobile and wifi networks might actually have some additional knowledge about the current network load (number of connected user, total traffic volume). Further both the UE as well as the UPF in the mobile network might actually have a better view about what's happening on the local link than the far end where the content server sits, e.g. knowing that a user is moving out of coverage. As such the network could for example provide a priority for one path when signaling the steering mode and may also indicate certain threshold values that could be used to make a switching decision. However, for most flows it might be even simpler than that and probably some kind of default mode will be used, e.g. based on lowest delay assuming that delay increases when one link gets congested.
>> 
>> Another scenario is that a user might choose a cheaper tariff where as much as possible of the downlink traffic is off-loaded to wifi. This needs to be implemented based on the scheduling in the UPF sitting in the mobile network. Further, as the steering modes are provided on a per flow level, another example scenarios is that bandwidth aggregation is requested for certain traffic flow based on an existing SLA. 
>> 
>> Please note that in any of these setups there are multiple e2e connection that use the same QUIC tunnel and as just noted each flow can have a different steering mode assigned. This is why simultaneous use of both paths is especially important for proxy-based use cases.
>> 
>> All these scenarios benefit from knowledge about the local network conditions to optimize resource usage and therefore also the performance for the user.
>> 
>> Hope that helps,
>> Mirja