[Scone] Re: Discussion on TRAIN and SCONE

Ted Hardie <ted.ietf@gmail.com> Wed, 11 December 2024 10:07 UTC

Return-Path: <ted.ietf@gmail.com>
X-Original-To: scone@ietfa.amsl.com
Delivered-To: scone@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F3BAFC1519AD for <scone@ietfa.amsl.com>; Wed, 11 Dec 2024 02:07:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.108
X-Spam-Level:
X-Spam-Status: No, score=-2.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R36elaf6WXSU for <scone@ietfa.amsl.com>; Wed, 11 Dec 2024 02:07:09 -0800 (PST)
Received: from mail-ej1-x634.google.com (mail-ej1-x634.google.com [IPv6:2a00:1450:4864:20::634]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 380DFC14F689 for <scone@ietf.org>; Wed, 11 Dec 2024 02:07:09 -0800 (PST)
Received: by mail-ej1-x634.google.com with SMTP id a640c23a62f3a-aa66c1345caso280630266b.3 for <scone@ietf.org>; Wed, 11 Dec 2024 02:07:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1733911628; x=1734516428; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=GA00xpsogG6TFccrZT0gbXq9BrFoVnWoGT8HLgOe7lA=; b=WEE6ix5OSp9tLdBYj7UNc9D4KUmekvDS4vgx5d5Tt2ZYP2t4xHi/Jt3GXAHwpdLJ3D SZ4OTlJ7XiPO05DNSK3hLvmEVx6D6/mZODth386WANsONtZNDyO6PXcOI1Koux9MynTZ 8cLYnl3b82wsgsVxfodWAB2ochlS9l8UneDrbJGTmbCjppMATpfsaowUgMLd1rdvuvmB MVvyugpgQFiVzFgfqa0kFX3fK9X/MC51JWwRBiugkWMH7KgXkqUecYFhLyd38FfDNhV8 Lu0JTuvuM+Ss5bVcM88YMZ1ok7AMkugzOYEXjkBXBcokv6nrNJNN+kHZAjqyU6dhBgPN ZT0Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1733911628; x=1734516428; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=GA00xpsogG6TFccrZT0gbXq9BrFoVnWoGT8HLgOe7lA=; b=KfKlB0RIcM2YNymtd6YUofz5ubbgRCKuPf1WCmXD3of3SbCxqfibi7fkjuS29byHUY LDXJp1O54Wg96SoqjOzVchoW5BKvtJHOKswp6Lbwk65BNhB8Ej5Eceq9rW0SoQuZ2/qE W44O3PIQ/esoArI2o4x7FFX2PxED/qbO/SY3LpGJg8xY7OZhhuhmgcFn/vDwlR/VlbJ9 dHhQRvNxvMwIvwTdwun2yQstRkFQFkJxh2eQNsHy+W4r4JbumHOfedLb56cLKyEvq7Vg R50p5b4hNDBeU+AyoUGM+1QIjDD+c1lsCMpeBqxxVA+ZkhSW1/E3xw/VtSypRs+7Bdm7 C2bw==
X-Forwarded-Encrypted: i=1; AJvYcCXOiBU6II9ec1yk0AcOJ6v5yiWDbhG845kiLRPzWPQfkl/69iI19Exabtyd1ZBkVwQf+SU8Dw==@ietf.org
X-Gm-Message-State: AOJu0YyTZsDqm1M3kYcT+TjQFjew6eLExDsZeIzbDcM3FllPUBgcbImD s0vm42aXZPej1OzN4JvIC5M9t84BUO9msjOcpeh7/QjaMKD0tqLQQqDsRbBaMQUxxaVuSdDWuQI ZG403gnmF7EE+r7UJne5OGwVu8Pk=
X-Gm-Gg: ASbGncuOiUwhxnnkRnEGiwuKPiGFBm/2qN6ie6daJsHbVPja1CQi3/tKG+5jYpEY2lb vu+NrZujd54mM/xFEoiNG1dbyhgyOg3s4lhZ4
X-Google-Smtp-Source: AGHT+IGqF16yQF9aeGVtgWIxmx1q9NE3qAw9UQgi+9KCQwcqYX9WtUPvrUyd/Dy+rCqH+t/Sn7gksNI7FEeo+3Svuus=
X-Received: by 2002:a17:906:30d1:b0:aa6:6e41:ea55 with SMTP id a640c23a62f3a-aa6b112c3c6mr211051866b.7.1733911627461; Wed, 11 Dec 2024 02:07:07 -0800 (PST)
MIME-Version: 1.0
References: <AS2PR07MB89789811EBE1658EC0B54F97E2312@AS2PR07MB8978.eurprd07.prod.outlook.com> <CA+9kkMD+OognVfLUgzA6FxBm3BLaqQj_f-fL8sNf6u4fMpWpoQ@mail.gmail.com> <CADdTf+h=jsm2rFaXoWJ9ZYs1fa4j=G1rG7D55TG9sSmFu9EmFw@mail.gmail.com>
In-Reply-To: <CADdTf+h=jsm2rFaXoWJ9ZYs1fa4j=G1rG7D55TG9sSmFu9EmFw@mail.gmail.com>
From: Ted Hardie <ted.ietf@gmail.com>
Date: Wed, 11 Dec 2024 10:06:41 +0000
Message-ID: <CA+9kkMDWNS2zddSf0gUE7zoi9T5Db0=w2kQEMSORPsqux9mKkg@mail.gmail.com>
To: Matt Joras <matt.joras@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000a07b0e0628fbc24b"
Message-ID-Hash: VMOLTTEVJZTBIR7HB73LMC456RSR2TWZ
X-Message-ID-Hash: VMOLTTEVJZTBIR7HB73LMC456RSR2TWZ
X-MailFrom: ted.ietf@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Marcus Ihlar <marcus.ihlar=40ericsson.com@dmarc.ietf.org>, "scone@ietf.org" <scone@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Scone] Re: Discussion on TRAIN and SCONE
List-Id: Standard Communication with Network Elements WG <scone.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/scone/JXXAUlCwDxVayjG5IxbWzTYtDqY>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scone>
List-Help: <mailto:scone-request@ietf.org?subject=help>
List-Owner: <mailto:scone-owner@ietf.org>
List-Post: <mailto:scone@ietf.org>
List-Subscribe: <mailto:scone-join@ietf.org>
List-Unsubscribe: <mailto:scone-leave@ietf.org>

Hi Matt,

A clarification in-lin.

On Mon, Dec 9, 2024 at 8:47 PM Matt Joras <matt.joras@gmail.com> wrote:

> Hi Ted,
>
> Couple things inline.
>
> On Sun, Dec 8, 2024 at 4:18 AM Ted Hardie <ted.ietf@gmail.com> wrote:
>
>> Hi Marcus,
>>
>> Pulling out one point:
>>
>>
>>> The TRAIN format has the obvious benefit of minimizing overhead and
>>> simplifying packet modification logic.
>>>
>>> The SCONE format, on the other hand, offers network element operators
>>> more flexibility in setting appropriate rate limits, at the expense of
>>> additional packet overhead.
>>>
>>>
>>>
>>> With my implementor hat on, I really appreciate the simplicity of the
>>> TRAIN format. However, I fear that it will be very difficult to convince
>>> operators to design their policies around a table of pre-configured values.
>>> Keeping the table of values relevant over time might also be a challenge.
>>>
>>>
>> I don't think we should focus on what the network element operators could
>> say; there's quite a lot of variability possible and there are,
>> unfortunately, vendors who would love to charge for the knobs, bells, and
>> whistles to send complicated signals.
>>
>
> We absolutely should focus on what would be usable for network operators,
> as they have a crucial role in the deployability of the working group's
> output. If the signals provided by SCONE are not useful for a network
> operator, either for operational or business reasons, it will not be
> adopted.
>

The point I was trying to make wasn't that we should ignore the network
operators in designing this, but that we should avoid defining the format
to encompass all the information a network operator might have available.
That can be a very large amount of data and interpreting it correctly can
require significant context and computation.  We want to design this so
that it elicits the behavior that the client, operator, and server all
want:  the  highest quality media stream that fits within the constraint
gets delivered.

In other words, we don't want to focus on what data is available, we want
to focus on what behavior we want to elicit.

regards,

Ted



> To that end, achieving parity with what they can currently have available
> is important. Alternative solutions currently pitched by various operators
> include out-of-band signalling that allow them to share arbitrary limits.
> Also, whether or not they want to send "complicated signals" SCONE is only
> chartered to develop a way to send one particular type of signal, so I do
> not see how that is a matter of concern.
>
>
>>
>> Instead I think we have to focus on the receiver of the signals and the
>> question of "What can the endpoint do with the information?" and, even more
>> specifically on "What can the application do with the information?"  Are
>> there really likely to be more than 64 distinct responses from the
>> application to the information that there is a shaper in the path?  For
>> video, I think the answer is probably "no", because the number of steps up
>> or down in video quality is rarely infinite.
>>
>
> This is assuming that the only actuation in response is a change in video
> quality, but this is not the case. For example, modern video playback of
> especially short-form also often involves elaborate pre-fetching schemes to
> ensure a good user experience. That is, an operator may set certain
> data-rate limits but those do not 1:1 correspond with "move the quality
> ladder up or down". It may also result in application decision making such
> as "do or do not make this prefetch". This importance is something that has
> only emerged in the past couple of years. This is exactly the kind of
> unforeseen issue that can happen if we focus on a purely minimal viable
> design for the information, as we cannot exactly anticipate what video
> applications a couple years from now will need to be able to do with this
> information. If we allow for at least a reasonable fixed size for the
> advisory information, we will not get ourselves into this trouble.
> Obviously this has to be balanced against including "the kitchen sink", but
> again, SCONE has strict charter guardrails that prevent this kind of scope
> creep.
>
>
>>
>>
>> At the cost of some round trips, I think you could get an application
>> below a network restriction with the spin bit and one extra bit.  If the
>> extra bit is set, your network consumption is too high to be supported by
>> the network, so you should lower the video resolution requested or sent.
>> If the spin bit flips and the extra bit is still set,  it has to be lowered
>> again one more step. Once the bit is unset, your network consumption fits
>> within the shaper's constriction and you should continue with that video
>> resolution (if it is unset at the beginning of the application-level
>> connection, you started within the bounds of the network constriction).
>>
>> Obviously, that's  not the perfect answer, because we do not want to
>> spend the round trips this implies it might take to get within the bounds.
>> But the actual behavior of the application in response to this signal is
>> very simple, so sending complicated information to elicit that response
>> probably isn't worth it.
>> regards,
>>
>> Ted Hardie
>> Path signal enthusiast
>>
>> _______________________________________________
>> Scone mailing list -- scone@ietf.org
>> To unsubscribe send an email to scone-leave@ietf.org
>>
>