Re: [Teas] FW: I-D Action: draft-ietf-teas-rfc3272bis-25.txt

Adrian Farrel <adrian@olddog.co.uk> Fri, 04 August 2023 09:46 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 41D72C151980; Fri, 4 Aug 2023 02:46:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.104
X-Spam-Level:
X-Spam-Status: No, score=-7.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=olddog.co.uk
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KzIs0UPkWTFK; Fri, 4 Aug 2023 02:46:08 -0700 (PDT)
Received: from mta6.iomartmail.com (mta6.iomartmail.com [62.128.193.156]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4803FC15155A; Fri, 4 Aug 2023 02:46:07 -0700 (PDT)
Received: from vs1.iomartmail.com (vs1.iomartmail.com [10.12.10.121]) by mta6.iomartmail.com (8.14.7/8.14.7) with ESMTP id 3749jMvv030891; Fri, 4 Aug 2023 10:45:22 +0100
Received: from vs1.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 414E14604D; Fri, 4 Aug 2023 10:45:22 +0100 (BST)
Received: from vs1.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 2B21F4604B; Fri, 4 Aug 2023 10:45:22 +0100 (BST)
Received: from asmtp1.iomartmail.com (unknown [10.12.10.248]) by vs1.iomartmail.com (Postfix) with ESMTPS; Fri, 4 Aug 2023 10:45:22 +0100 (BST)
Received: from LAPTOPK7AS653V (82-69-109-75.dsl.in-addr.zen.co.uk [82.69.109.75]) (authenticated bits=0) by asmtp1.iomartmail.com (8.14.7/8.14.7) with ESMTP id 3749jKn7014268 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 4 Aug 2023 10:45:20 +0100
Reply-To: adrian@olddog.co.uk
From: Adrian Farrel <adrian@olddog.co.uk>
To: 'Bob Briscoe' <ietf@bobbriscoe.net>, teas@ietf.org
Cc: draft-ietf-teas-rfc3272bis.all@ietf.org
References: <169050460433.2965.8027373376840307661@ietfa.amsl.com> <027601d9c0ec$35359860$9fa0c920$@olddog.co.uk> <a5310571-6751-276c-8a2d-ced643d374de@bobbriscoe.net>
In-Reply-To: <a5310571-6751-276c-8a2d-ced643d374de@bobbriscoe.net>
Date: Fri, 04 Aug 2023 10:45:20 +0100
Organization: Old Dog Consulting
Message-ID: <064301d9c6b8$6256d440$27047cc0$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0644_01D9C6C0.C41D1100"
X-Mailer: Microsoft Outlook 16.0
Content-Language: en-gb
Thread-Index: AQK1SApjABuNeVF80MkE/wrtaixY9wJwW/tSAftPlL+t/29DYA==
X-Originating-IP: 82.69.109.75
X-Thinkmail-Auth: adrian@olddog.co.uk
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed; d=olddog.co.uk; h=reply-to :from:to:cc:references:in-reply-to:subject:date:message-id :mime-version:content-type; s=20221128; bh=jgV7T9k5YDVE6lPwsPi/p LnF874TKiPlLOj14zM7szI=; b=utA9F37ocdFGXAbAXPUiEpTJdupx0oK5l54LU BrTa281pzDPZqCOpYdIHnzMZi9GgearIwsrLxxLrYVh+eK6iWM7gq5IKt0UVcaox pw7+iPRlGDLNAHsLIyLbn3xMDZkw1mHETgnJOlrsHzMdqf3HlLOncMk25exuuO+2 HnMEpOEa+ShY+XaBNTSccCA37TcuwF9ls1A1/yQG3EO1cv42sHEc3dBDChL+brFR cCK8kwQBGAftQ6q0vIDlx5V2nxqz8Q39gv7ACNJ7wxABPrhgGls3+Tj5DjEEsZ3i Cjh+KEykqvtiICfp+fqU63mEnKOggZn3MOjYZKxNmMH7t2IdA==
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.1.0.2090-9.0.0.1002-27792.006
X-TM-AS-Result: No--34.239-10.0-31-10
X-imss-scan-details: No--34.239-10.0-31-10
X-TMASE-Version: IMSVA-9.1.0.2090-9.0.1002-27792.006
X-TMASE-Result: 10--34.239200-10.000000
X-TMASE-MatchedRID: 5sWOJcKEa0o/9d9Rtcc0Q1cgCgDL49aa82SgwNf6SK5T1guYHClQrxh1 IN4u9DX2BNyCmIook0cBg0xi4TawH2yvOm0Fj7UhYy6AtAy7YZcR5c83KIxTTj+B/tp8itBT1Ie ckOrbKExWVbVXdJVIVPJY0k4H2zxQT/Djs1VF+lQdZEkR8Y/meTOthRe7884YnNpuTt7nXHQmTq ESOfXrKcK9k8E2N2bumUxNSqZzA02HYRTS/Mi7b/d23bssfyGclt9cdu1PUGJWyM8vjJZ/KPh5g T8kXkoMtpV6YT62sy9JgQ29vKZLe9H/KYwOmDxhh3ZN+5lFR7fUoMiU4Mi75S+ro18cVFERZvo+ mFW19mDQQrmyZJI4aePaGGwUl2YVGLfMLzDH98xB9I5g6XEpi5hqxsBO7lrLY2xV4Z4rC7eJOqG cVXbFjOBwaB7ooZ84eFFwc9/frT7eyYs3+FVYBXtpzPuHdtTCkKAa/khZ3iSkfxc014YHJwTxtx Ba0qLvzpY+pjowtOgLqnhHvipS5y5mwucJPCpVOIQ9GP2P2u8z0SQBTPKW4WbcDfLpOErtcsxFL HbqBOID/N+idW26j/0E8pYYeenc/ayzaxBypN7cgUVP3Cp+vbk9fY/2t1bByPRAwD/3abbcwQcr 6n3zAaOUSZomqyYt6gJpq60c2x/t47q0E6/mh0VOF9zLtdyMp/YxNkZPmnJmmwIgzTcGCy05N7S vnuemOI6fXS7bw1eybL96Otf0DdZPXjgjznq/71Wx2uUbPLdDr8MVm6DK3Vti/oq364XY9Tvadh XG9g3gPqVbzYllURvzEjY4Pdnt7IPLxXyVNZRANB89sV0bJ30tCKdnhB58r10pknZXGJqy5/tFZ u9S3HWvwUFsXQjmU6baA36eiaw+Mqg+CyrtwA==
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/P-zSpG4pGL-5JaOa9NU9XM6I-qk>
Subject: Re: [Teas] FW: I-D Action: draft-ietf-teas-rfc3272bis-25.txt
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Aug 2023 09:46:13 -0000

Hi again,

 

This is the other thread to complete answering your responses to my updates after your review.

 

> You've dealt with my first main point about how parts of networks are

> designed to be congested by capacity-seeking endpoints. But I noticed

> you've often preceded congestion by 'network'. I don't see what the

> intention of that is. Is some other form of congestion possible in a

> network?

 

We have partly covered this in the other thread.

There is a definition included in the document, and the term “network congestion” makes a distinction from “demand-side congestion” or “input congestion”.


> My second main point was about the definition of congestion. I don't

> think it's been grocked. When input exceeds capacity there is certainly

> (very serious) congestion. But very heavy congestion usually occurs

> when input is lower than capacity (or matches it). I.e. sustained input

> in excess of capacity is not a necessary condition for congestion. As

> proof, consider two cases:

> 

> • Consider normal slightly bursty traffic (perhaps just sawtoothing, or

>    varying in some other way). At the top of the bursts there are losses,

>    so superficially it seems (input - loss = capacity), which implies

>    input > capacity. But, the bottom of the bursts are typically below

>    capacity, causing a link to be underutilized on average by traffic

>    responsive to the losses. The under-utilization can easily exceed

>    the loss fraction, such that (input < capacity) still leads to losses

>    and congestion

 

So, as with everything in life, it depends on the time interval over which you are measuring. It is no comfort to the user to say “Measured over 24 hours, there was no congestion (input was less than capacity), so suck it up.” The user cares about periods when input exceeds capacity to such an extent that there is unacceptable delay or packet loss.

 

> • In extremis, consider a link and traffic that support explicit congestion

>    notification. Here, there are not even any losses so (input <= capacity).

>    But there will still be congestion marking, and it can be heavy, implying

>    heavy congestion.

 

If congestion is defined as something that triggers ECN, but which does not negatively impact the traffic flow, then calling it congestion or heavy congestion is just confusing.

 

Hence, the definition of Congestion we are using is general and wide to encompass the varying concept you have described, but the definition of Network Congestion explicitly states: “Congestion within the network at a specific node or a specific link that is sufficiently extreme that it results in unacceptable queuing delay or packet loss.” Thus we distinguish between the general concept and the type of congestion that TE seeks to circumvent.

 

> So a better definition of congestion due to responsive traffic is the degree

> at which it 'beats at the door'.
>

> ==COMMENTS==
> I know I said you can choose not to address the items I highlighted as

> comments, but I feel the following do need some attention...
>
> §1 
> "...a preponderance of Internet traffic tends to originate in one autonomous system

> and terminate in another,"
> Seriously, where's the evidence for this assertion? If there is none, it's dangerous to

> say things like this in an RFC, that could be cited as the source of what might be a myth.



I think this is covered in the other thread.


> "Examples of resources are bandwidth, buffers, and queues"
> A queue really is not a resource. A queue is the level of usage of a buffer,

> which is the resource.

 

This is covered in the other thread.

Queues are instantiated. Buffers are placed on queues. Both are resources.


> ==MORE NITS:==
> (Just introduced)
>
> while reacting statistical measures -> while reacting to statistical measures



Ack

 

> "RED provides congestion avoidance which is better than or equivalent

> to traditional Tail-Drop"
> Nah. RED's never as bad as Tail-Drop. Always better.



Surely, as packet arrival exceeds RED’s drop rate, the buffers approach depleted until there are no more buffers and RED’s drop probability is 1. At this point, RED equates to Tail-Drop.

 

> such as capacity management (such as routing control)
> (Used to be 'including routing control', but 'such as' is now clunkily repeated.

> My original concern with this sentence was that it said "other TE capabilities

> are also /required/ to deliver acceptable service quality" [my emphasis], but

> making routing an optional example misses this point. Better:
> "are also required in order to deliver acceptable service quality" -> "can also

> be used to deliver better service quality")



Agree about the clunky. Fixed.

You misquoted originally, although quoted correctly in the proposed change.

“…are required to…” would mean that the other TE capabilities MUST deliver acceptable service quality. But it doesn’t say that.

“…can also be used…” means that Diffserv can deliver acceptable service quality. Which is not the case.

“…are also required in order to…” means that if you want acceptable service quality then you will need other TE capabilities. Which is what we intended.

But there is a suite of tools which can be picked from to reach the acceptable service quality.

 

> short and medium time scales / long- and medium-time scales

 

Yes


> Inconsistent hyphenation. And isn't timescale one word?



Oh, yes. Widespread change.

 

> BIER-TE. These includes ->  BIER-TE. This includes



Hah! >>> These include  (the implications)

 

> >External control interfaces (stray '>')



Ack

 

> When I said "The order of some of the sub-sections seems odd" in §6, I meant

> subsections, not the itemized paragraphs at the start.

 

Understood. I’ve looked again, but the ordering seems good to me.


> Quoting the new para on multipath in the inter-domain section:
>    "Layer 4 multipath transport protocols are designed to move traffic    
>     between domains and to allow control of the selection of the paths.    
>     To be truly effective, these protocols would require visibility of    
>     paths and network conditions in other domains, and that information    
>     may not be available, might not be complete, and is not necessarily    
>     trustworthy."

> 

> • OK, I know "Layer 4 multipath transport protocols were designed

>    to move traffic between domains" were my words, but I should

>    have said that was one of the use-cases. In general, L4 mutipath

>    is designed to move traffic from more to less congested paths,

>    which can move traffic between domains, particularly if the

>    endpoint connects to multiple domains.

> 

> • Multipath isn't in general designed to allow control of the selection

>    of paths, which is hard for an endpoint - an endpoint can generally

>    only select the interfaces at each end in order to influence the likely

>    path.

 

In the first bullet you say move traffic from one path to another. But then you say no control of which path is used. That’s a contradiction.

 

I think that the text as written scopes:

*	Not just designed for moving traffic between domains
*	Allowing some choice of which path is chosen

 

> • The 'To be truly effective...' sentence is unproven criticism; L4 multipath

>    just blindly uses whatever paths it is given and moves traffic away from

>    congestion. So, better utilization balance is an emergent property

>    without any need for path visibility.

 

So L4 multipath is reactive and “blindly” moves traffic around until it hits a non-congested path (or, indeed, thrashes between a set of congested paths).

So, to be more effective, you would want to be able to see the conditions within networks and be able to select paths more wisely (less blindly).


Cheers,

Adrian