Re: [tsvwg] WGLC: draft-ietf-tsvwg-nqb-14, closes 21 November 2022

Ruediger.Geib@telekom.de Tue, 29 November 2022 08:52 UTC

Return-Path: <Ruediger.Geib@telekom.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F40EBC14CE34 for <tsvwg@ietfa.amsl.com>; Tue, 29 Nov 2022 00:52:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.396
X-Spam-Level:
X-Spam-Status: No, score=-4.396 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=telekom.de
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kRjwFv3BVmc2 for <tsvwg@ietfa.amsl.com>; Tue, 29 Nov 2022 00:51:59 -0800 (PST)
Received: from mailout41.telekom.de (mailout41.telekom.de [194.25.225.151]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CC6A7C14CE29 for <tsvwg@ietf.org>; Tue, 29 Nov 2022 00:51:57 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telekom.de; i=@telekom.de; q=dns/txt; s=dtag1; t=1669711918; x=1701247918; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=7wkK7aHCaK0rSR6u8hw31XLl0lI8p96UjeK7L7IEDr4=; b=eXujajEbBsfFgdB+R9AfQzyC0OofaMh2XQjvJdd4DCZqOjWzbYkxYUPQ ywZR/wSuI6VihuLNI+vwu8OPG9xfKGYhTZaBymBEiitVLz85L31OuiOgU 7xx14Hipydu3kl5jINhTane72wjfMIS8y2eqvsndlz2W/3nazDkT9PaJB blIcxsRFt+I/fHFaWAXqGavUzSyslki1BXoXB7H62oa//uTbJ6kpv2xqN WplGtvUTWdTIgvX1fGpMBLwj/kmQ1oz+P1rYS+H9pnEgI2KeFcZA+BnD5 cqx+vmr+b8Q3pgSPMfyP9wci8qOLjSxoO8BnL7GB+R+vZkVyXUNGbj1MV g==;
Received: from qdefcs.de.t-internal.com ([10.171.254.41]) by mailout41.dmznet.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 29 Nov 2022 09:51:55 +0100
IronPort-SDR: ph2Q5tDHFW7lemZIosw5CuoHo3BtdyuOblO2QICLeqAPP1jSI8Gt/vy1WX1138KP//wZpk0RQz OvChn5JFyDAP0jVuMxDdd+5dyvMsVWhx8=
X-IronPort-AV: E=Sophos;i="5.96,202,1665439200"; d="scan'208,217";a="630444250"
X-MGA-submission: MDH8FGPT+Aj+8vIcVGb/tPbOpbEuGGQIzCiwDAtCUri2W6tCj8vVNFPM9m4tK1FsKYgf3Hz9GU/uu4AYE7dE7FW1kzyi/p5hKyQoskZTYfIpXHBLJvEF3hw/UCPD1RvPoEs6+9An1L0DoCqF2luxRc8xYTp7DcYfPxj5wUTHeEaz1Q==
Received: from he105717.emea1.cds.t-internal.com ([10.169.118.53]) by QDEFCV.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-SHA256; 29 Nov 2022 09:51:55 +0100
Received: from HE105716.EMEA1.cds.t-internal.com (10.169.118.52) by HE105717.emea1.cds.t-internal.com (10.169.118.53) with Microsoft SMTP Server (TLS) id 15.0.1497.42; Tue, 29 Nov 2022 09:51:45 +0100
Received: from HE104160.emea1.cds.t-internal.com (10.171.40.36) by HE105716.EMEA1.cds.t-internal.com (10.169.118.52) with Microsoft SMTP Server (TLS) id 15.0.1497.42 via Frontend Transport; Tue, 29 Nov 2022 09:51:45 +0100
Received: from DEU01-BE0-obe.outbound.protection.outlook.com (104.47.7.174) by O365mail03.telekom.de (172.30.0.232) with Microsoft SMTP Server (TLS) id 15.0.1497.42; Tue, 29 Nov 2022 09:51:45 +0100
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Ag7GlTKGmCpMI9stGUJZjV5BVt0Cwfb2ORMGCsyF2DMPJPmxQn0yTIr4aOOdCDOkSwazT7bhUILuTnhFiebcedmxEK2Rc/0N7VNKiCvx8YBYd7fZd+0uJlbfHZG/578zTX8YXQILqq4PdljRHJXHLw6/8NnpxPIvVvliRnAu4jWGz4GIx0HuWtzU+eBI6VbfLnxkcok9NyYKF/5BG8CoAfRCOm5Z69ogdkv3dp1kjPOba+XHLTzmpKixoIPCnVIcvKtQmgx0bVvKO3Hugcjuh75tlcYEFCplf2hCJkT66jTS4JXBzhwzNrdjXOfCgGqVQ9+9fGKrM8SmIHitNg/TQg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=7wkK7aHCaK0rSR6u8hw31XLl0lI8p96UjeK7L7IEDr4=; b=KML4UuQoMNwzyAi1OyNvL5l8fyecwn6sU/76dEH0dB64HpYDkIDSz8zAMaqcXy+sF5AswJy96A/G9CTptSo02m7xtQn73L3BSieWjzyDvvZ4cK2gW1le0sM3eiH+Hth5NKuPSRgZhxXEkXFBonwYZ8/v5W+VzMtizyW9OrIkEEhT45FujPwAbbYK3q1oMV/eDv4UHsiKM1VS+yIeEW59j6cW5tohAuQk8lumvfhz7VdiGbT5bW5ochB+FfuJJ2r4FWpaema3i4WRbotvEEXm1D7nOikyTG4SADVHEAltGGzRQL5uptycytJZT0IV1FqO38Ql4UpcPtIfBG4cNBg19Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telekom.de; dmarc=pass action=none header.from=telekom.de; dkim=pass header.d=telekom.de; arc=none
Received: from FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:8b::11) by FR3P281MB1488.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:7f::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5857.23; Tue, 29 Nov 2022 08:51:43 +0000
Received: from FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM ([fe80::95be:cb1:5926:1af9]) by FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM ([fe80::95be:cb1:5926:1af9%9]) with mapi id 15.20.5857.023; Tue, 29 Nov 2022 08:51:43 +0000
From: Ruediger.Geib@telekom.de
To: g.white@cablelabs.com
CC: tsvwg@ietf.org, David.Black=40dell.com@dmarc.ietf.org
Thread-Topic: [tsvwg] WGLC: draft-ietf-tsvwg-nqb-14, closes 21 November 2022
Thread-Index: AdjubW6zcmZ3oq8pT/i4jOt9zeflrQMBvSXAANmnqwAAKRHQgACKHLbQALg5AQAAD53psA==
Date: Tue, 29 Nov 2022 08:51:43 +0000
Message-ID: <FR2P281MB1527748C330AA109CF6B7C709C129@FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM>
References: <MN2PR19MB4045EDEFA651818318904ABA83399@MN2PR19MB4045.namprd19.prod.outlook.com> <FR2P281MB1527F17C4B542113A984B5DE9C069@FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM> <32782fcc-2f9f-7977-4d80-aa1482445617@kit.edu> <9670205A-995C-4B94-9213-F837F6465872@cablelabs.com> <FR2P281MB1527E7DDAC6CB754610806D29C0E9@FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM> <9AD25EB1-27D2-4260-AAD0-97C8C41C71A9@cablelabs.com>
In-Reply-To: <9AD25EB1-27D2-4260-AAD0-97C8C41C71A9@cablelabs.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=telekom.de;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: FR2P281MB1527:EE_|FR3P281MB1488:EE_
x-ms-office365-filtering-correlation-id: 4db9fb23-f8a9-4f48-d2a9-08dad1e6f059
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230022)(4636009)(346002)(136003)(376002)(396003)(366004)(39860400002)(1590799012)(451199015)(1580799009)(2906002)(30864003)(66899015)(66946007)(85182001)(9686003)(4326008)(41300700001)(66476007)(6916009)(66556008)(54906003)(186003)(8676002)(64756008)(316002)(52536014)(8936002)(76116006)(71200400001)(5660300002)(85202003)(33656002)(26005)(86362001)(966005)(7696005)(66446008)(478600001)(6506007)(53546011)(83380400001)(66574015)(122000001)(38100700002)(82960400001)(55016003)(166002)(38070700005)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 2hLg2c/ALc3AE9lXCIyAqjVzcIY/qBDe6QnHrENV2D9/kQILU6AuNt71vCMkL97tG1flkYs2y3ypxFltnuSQZGeQXxEzRJmC7EnWIkwsxUR+uLRHXa9Wx51FD+eR62p0N9ZFsWVT8iFZn3gqmVr34n9BljW9nogoYqr5sbNZHwC4YiBafGe66JvY0oLaTE0R6bkWoud0dd21WG2czUY2h3zVUax6NwKaIfoGRVrJex0gbF+LYAdyeTgk17bEZgAba18DkfWqZMuOYXm8ok7GL+0pEmSYrTDaWlQpC4lg/p06SMSQTXPecVe3L2bN7m8ZU/dGvbz6WGTLZwuwVMsNw5Q2NUoSAY/7nDyKDEdOtCp2cshtoGkj4e2JKUpO3vJDTgKnhBfIBJbM96V5hQKF+w7tQU0VIJVjZBxfQj/aKMKQ5N1lJKdh/8T2gqXwYgS1aMBQTefhR+ry11XGoSxOpaDmVBhhPUF/dNokegmMotoaRxFPbMBRaQPpiTeIrcihYxH4Ui98BLMEAruc/9ThLmBJXhaI/SrCWJhDFSRNN0pDS2jfWmAqRdnv4yucfd/z3L1dXk4+VG/tlykkm7KOSFyjr1EUbJO6mWQVn+qel6VOXoYBYTr+pSAocHwqg93utxyRq6cbZHSmroLHhG3RO/gswdnn9YQujyn0azLDLJGq0mExWqmStEWo8uzT1pjBMovcznMDqz+KvwK+eu2TwTp+MA4YVZ0/XwfjwVfP8EKp6mj1QgAo1rUaKfsoNqT5DRnooaHgjdNy+H32ybXUbuPO3PZQd2xSrV+GkpCxejOK7U5GpFNQHSwU6zfZYq0nWrHfI0ajLaXKPGq/xcV0hvqMNrIz7Ct8/XscMJDsCUGDzr94lS36Q/0w+MPLsx4ogfJCJ20ZVIMu6I0q1v0b6EVVrhP8w8dNCLcmVIlFra+h/0iAW6N1gnCDLmZZcTrvtt4uyDRhHFOF926TyldzGBVY3evhjCM0A0+d7c9Zaf8GPe1UARuwWz8AwRrgfB2jzkEFOFdZR91gZi4V+QpZVo1kchz/deLS9bq1SL7WDpV/WScRexLMiA5DLuCy3Zl3N3VdYkEojWdHxW/z0VA1Eii4WOuj3tqwqn1bP+0QtHlEjpZR6uT2SAdonkk8SGzJTR789pIkwVgAxCyRvO+6OVyR2GekcNqacEkS7tWyZ3IomoktWi9OdRxPWo8DCBzhx5R032omCtZcwUoYGRxVpTIRrJOF1TqoRAf9SkzDY8UQsEKUXwK0De7DevKsrczj3V8jxO/9aWENEOUV8GLCs3Xz7u0WYtfUl0nltSdHT8sK4jTwaZjcz5odkRTooy5yyzpwPeUZnSy4HR+90UboL4k7X/e244zf2ncMbcZAxT7sWKT/z8/Cyb/UOmpS6R+Fqq6gNDI2FELeChwBKcIIf/z+wb9xJ+W/uffsMyguM3UJDqNhMoaazMLtIs+GXaIg1Ipno6nvFFqB0HBobA9O1NEewek1lw8TYckR1DBiN7nLyH08a+2olC/dPvPqDb5jyKPYX4T+TGYGsO26Dq/ekHJnB3CvZ3ItL/R/6GbHN4+tg/uKeRV0pRR4JnHUlnsE
Content-Type: multipart/alternative; boundary="_000_FR2P281MB1527748C330AA109CF6B7C709C129FR2P281MB1527DEUP_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 4db9fb23-f8a9-4f48-d2a9-08dad1e6f059
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Nov 2022 08:51:43.0980 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bde4dffc-4b60-4cf6-8b04-a5eeb25f5c4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 8XivrRDAHjiNJjVqCEE54tH2aDg2vdEx4LL7A9aXSzSRTffIcBo5scaTOtTGbv0zdTqtd6RVZamotWTDq/8/7sQEFDqwcc7KcAC6IgCNVKk=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: FR3P281MB1488
X-OriginatorOrg: telekom.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/-4tz0Ad-8tyh_GszzlNhq3TlR8Q>
Subject: Re: [tsvwg] WGLC: draft-ietf-tsvwg-nqb-14, closes 21 November 2022
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Nov 2022 08:52:03 -0000

Hi Greg,

To, a standards track document should indeed be precise, especially if it is standardizing a forwarding path including an unlimited priority scheduler (AC_VI). This is a clear purpose of draft NQB.

Further responses [RG2] below.

Von: Greg White <g.white@cablelabs.com>
Gesendet: Dienstag, 29. November 2022 01:22
An: Geib, Rüdiger <Ruediger.Geib@telekom.de>; roland.bless@kit.edu; koen.de_schepper@nokia-bell-labs.com
Cc: tsvwg@ietf.org; David.Black=40dell.com@dmarc.ietf.org
Betreff: Re: [tsvwg] WGLC: draft-ietf-tsvwg-nqb-14, closes 21 November 2022

See below [GW2].

From: "Ruediger.Geib@telekom.de<mailto:Ruediger.Geib@telekom.de>" <Ruediger.Geib@telekom.de<mailto:Ruediger.Geib@telekom.de>>
Date: Friday, November 25, 2022 at 2:15 AM
To: Greg White <g.white@CableLabs.com<mailto:g.white@CableLabs.com>>, "roland.bless@kit.edu<mailto:roland.bless@kit.edu>" <roland.bless@kit.edu<mailto:roland.bless@kit.edu>>, "koen.de_schepper@nokia-bell-labs.com<mailto:koen.de_schepper@nokia-bell-labs.com>" <koen.de_schepper@nokia-bell-labs.com<mailto:koen.de_schepper@nokia-bell-labs.com>>
Cc: "tsvwg@ietf.org<mailto:tsvwg@ietf.org>" <tsvwg@ietf.org<mailto:tsvwg@ietf.org>>, "David.Black=40dell.com@dmarc.ietf.org<mailto:David.Black=40dell.com@dmarc.ietf.org>" <David.Black=40dell.com@dmarc.ietf.org<mailto:David.Black=40dell.com@dmarc.ietf.org>>
Subject: AW: [tsvwg] WGLC: draft-ietf-tsvwg-nqb-14, closes 21 November 2022

Greg,

see [RG].

Von: Greg White <g.white@CableLabs.com<mailto:g.white@CableLabs.com>>
Gesendet: Dienstag, 22. November 2022 22:33
An: Bless, Roland (TM) <roland.bless@kit.edu<mailto:roland.bless@kit.edu>>; Geib, Rüdiger <Ruediger.Geib@telekom.de<mailto:Ruediger.Geib@telekom.de>>; koen.de_schepper@nokia-bell-labs.com<mailto:koen.de_schepper@nokia-bell-labs.com>
Cc: tsvwg@ietf.org<mailto:tsvwg@ietf.org>; David.Black=40dell.com@dmarc.ietf.org<mailto:David.Black=40dell.com@dmarc.ietf.org>
Betreff: Re: [tsvwg] WGLC: draft-ietf-tsvwg-nqb-14, closes 21 November 2022

See below, marked [GW].


From: tsvwg <tsvwg-bounces@ietf.org<mailto:tsvwg-bounces@ietf.org>> on behalf of "Bless, Roland (TM)" <roland.bless@kit.edu<mailto:roland.bless@kit.edu>>
Organization: Institute of Telematics, Karlsruhe Institute of Technology (KIT)
Date: Monday, November 21, 2022 at 11:57 AM
To: "Ruediger.Geib@telekom.de<mailto:Ruediger.Geib@telekom.de>" <Ruediger.Geib@telekom.de<mailto:Ruediger.Geib@telekom.de>>, "koen.de_schepper@nokia-bell-labs.com<mailto:koen.de_schepper@nokia-bell-labs.com>" <koen.de_schepper@nokia-bell-labs.com<mailto:koen.de_schepper@nokia-bell-labs.com>>
Cc: "tsvwg@ietf.org<mailto:tsvwg@ietf.org>" <tsvwg@ietf.org<mailto:tsvwg@ietf.org>>, "David.Black=40dell.com@dmarc.ietf.org<mailto:David.Black=40dell.com@dmarc.ietf.org>" <David.Black=40dell.com@dmarc.ietf.org<mailto:David.Black=40dell.com@dmarc.ietf.org>>
Subject: Re: [tsvwg] WGLC: draft-ietf-tsvwg-nqb-14, closes 21 November 2022

Hi Rüdiger,

sorry for the delayed reply, I'm currently on a business trip. Please see inline.

On 17.11.22 at 12:48 Ruediger.Geib@telekom.de<mailto:Ruediger.Geib@telekom.de> wrote:

you aren’t editor or author of the NQB draft. I still like to address you, as you are working or at least have been working with WiFi scheduling.
Actually, I haven't been working with WiFi scheduling, so I'm not the desired expert here.

To me, the idea of NQB reads similar to the EF PHB.  As NQB as of yet picks it’s DSCP to deliberately enable prioritized forwarding by WiFi, I think, traffic management as specified by EF applies. I’m referring to the deprecated text of EF here, which doesn’t carry quantitative requirements, but nevertheless seems helpful.

[GW] To be clear, the NQB DSCP was deliberately chosen to enable separate queuing from default traffic in legacy WiFi networks.  As the draft indicates (and as has been discussed extensively on this mailing list), the fact that (by default) that also gives priority in those networks is an unfortunate side effect which results in some challenges.

https://datatracker.ietf.org/doc/html/rfc2598#section-2

The following are my thoughts ( I don’t specify NQB or L4S, I hope not be wrong on L4S ):


1.       What I think applies to NQB too: the NQB scheduler departure rate MUST at all time intervals be above NQB arrival rate – and to me, a policer MUST ensure that.

[RB]So, in general you are right that for the NQB queue to be empty in average and provide low loss,
low delay, low jitter service for the flows, the departure rate must be strictly larger than the aggregate's
arrival rate. I'm actually missing a hint in the draft stating what happens if too many NQB flows enter
the queue causing overload. So this can only be prevented or enforced by policing (and admission
control). However, the way I read the draft, it is probably assumed that the traffic load and traffic usage pattern
is probably known by the provider at this part of the access network, so that there is the assumption that
this will not happen.

[GW] NQB is not a guaranteed low latency service, so I don’t think that the MUST statements above are appropriate. The draft currently recommends implementing a “traffic protection” method rather than a traditional rate policer, and the section where it is discussed (5.2) only talks about issues caused by individual flows.  I agree that we can (and probably should) say more around aggregate traffic management in certain cases.

[RG] A settable bandwidth limitation is obligatory if a scheduler allows to preempt resources. As you confirm, “the NQB DSCP was deliberately chosen to enable separate queuing from default traffic in legacy WiFi networks”. This isn’t just separate scheduling, it’s prioritized scheduling (see https://datatracker.ietf.org/doc/html/rfc8325#section-6.2.3 and 6.2.4). As consumers can’t be expected to do that, and I’m not sure whether WiFi APs offer such a capability in general, to me this must be part of the PHB specification, if the NQB remains on standards track.

[GW2] I may be misunderstanding your comments here, but to be clear, defining the PHB as a priority scheduler is not something that I’m interested in doing. I hope you are not suggesting it. That is fundamentally not what we are trying to achieve here.  As has been discussed previously, the draft covers “interoperability” with network gear that doesn’t support the PHB but instead implements a set of priority queues (legacy W-Fi is an important example).   As has become apparent to me in this exchange, we’ve not specified the management of that interoperability as completely as you would like.  That can be addressed, and I’ve suggested some of the necessary text in my original response below.

[RG2] I may be misunderstanding your draft text here, which to me reads as defining the PHB including a priority scheduler as something that is a fundamental part of the NQB draft which you are interested in doing. I note you are suggesting that:

   Applications that align with the description of NQB behavior in the

   preceding paragraphs SHOULD identify themselves to the network using

   a Diffserv Code Point (DSCP) of 45 (decimal) so that their packets

   can be queued separately from QB flows.  The choice of the value 45

   is motivated in part by the desire to achieve separate queuing in

   existing WiFi networks (see Section 8.3<https://datatracker.ietf.org/doc/html/draft-ietf-tsvwg-nqb-14#section-8.3>)
…

   In order to increase the likelihood that NQB traffic is provided a

   separate queue from QB traffic in existing WiFi equipment that uses

   the default mapping, the 45 codepoint is recommended for NQB.  This

   maps NQB to UP_5, which is in the "Video" Access Category.

[RG2] Any DSCP different from DSCP default allows separate queuing by a DiffServ compliant access- or home-network scheduler. Draft NQB requires a DSCP with the intention to access a priority scheduler in WiFi networks with technology prevalent today and within the years to come.


2.       As long as NQB isn’t clearly delineated from L4S, to me it shouldn’t cause L4S ECT 11 marks – i.e., NQB MUST ensure random collisions only with L4S by appropriate sending behaviour and policing too.

3.       Then my take is, that the NQB rate-limit should be between 30% and 50% of the L4S scheduler bandwidth, if I apply EF dimension suggestions for NQB and look at the L4S queue as what’s termed “line rate” by the EF draft.

4.       Traffic above that rate to me should be marked for default forwarding (and I suggest to set ECT 11 in addition, without prior investigation of the ECT value – to deal with the yet unspecified co-scheduling of NQB with L4S).

[GW] IIRC it would not be compliant with RFC3168, RFC8311 or ECN-L4S-ID to CE mark Not-ECT packets.

[RG] Yes, likely. In that case, please provide text on scheduling requirements if NQB traffic shares the same queue with L4S and is marked ECT 1 in addition to a set NQB DSCP, if the NQB draft remains on standards track. I’m also fine with text stating if DSCP NQB is set, a packet MUST NOT be marked ECT 1. Please also add guidelines what to do technically, if traffic is marked with an unexpected combination of DSCP and ECT. Again, I expect requirements and guidance on safe operation from a standards track doc.

[GW2] Yes, this has already been noted, and it is on my list of items to address in the post-WGLC update.


Assuming L4S to receive 50% of the bandwidth available for all default traffic, then NQB would be policed to  [0,3 … 0,5] * 0,5 = 15% to 25% of the overall default traffic.

My questions to you:

5.       would a traffic share of 15% (to 25%) of AC_VI downlink traffic as compared to traffic scheduled for default enable somewhat fair and useful WiFi operation at least under many or most operational conditions? Meaning single up to half a dozen terminals on a single WLAN which operates with almost full spectrum.

6.       Looking at https://datatracker.ietf.org/doc/html/rfc8325#section-6.2.3 , AC_BE seems to have around 10% chance of getting access to WiFi scheduling as compared to AC_VI, that’s why I’d prefer 15% as an NQB/Default traffic share guidance. Is that making sense?

[GW] FYI, all else being equal, the AC_VI:AC_BE scheduling ratio is more like 4.5:1. That said, I would think the concern is mainly around the case where the ISP could police NQB traffic somewhere in their network (e.g. a CMTS or BRAS) and doesn’t have visibility into the WiFi network bandwidth. So, we’d be mainly worried about situations where the WiFi bandwidth is significantly less than the access network rate.   As a result, 15% seems sort of high to me. Maybe 5% would be better?
[RG] Greg, also 5% is ok with me. You are the author of the draft, please provide text informing an operator which configuration enable safe deployment of the PHB, at least under prevailing operational cases (and please add information, which operational conditions of a WiFi network would not recommend activation of NQB).

[GW2] Ok.

7.       Are there operational conditions of WiFi, when NQB deployment isn’t recommended (as a non expert, I thought about multi-terminal WiFi, like a hot-spot, or locations, where the spectrum of many unmanaged WLANs overlap).

8.       As I’m not an expert on WiFi, please add important aspects that I’m not aware of.

I’m asking you these questions since this is a standards track RFC and I feel uncomfortable with the level of guidance offered by it so far for secure and reliable operation. I don’t expect things to be watertight, I’m interested in an operation which wouldn’t cause the network provider hotlines to experience a massive increase in calls, once NQB is enabled.

I agree that the draft could give more operational guidance in this respect.

[GW] For the case that you are concerned about here (downlink traffic from an ISP entering a network containing WiFi gear) I am open to providing more guidance than we currently have.  The current guidance is the following:
1)      The WiFi gear SHOULD carry NQB traffic in a separate queue in AC_BE
2)      If the above isn’t possible in certain equipment, then the WiFi network SHOULD be configured such that AC_VI is equal in priority to AC_BE.
3)      If the above aren’t possible or the conditions are unknown, then:
a.       ISP SHOULD take precautions to prevent issues caused by prioritization of excessive and/or mismarked NQB traffic
b.       ISP equipment SHOULD bleach NQB by default (so that any pass through of NQB is intentional)
c.       As an alternative to bleaching, ISP could deploy traffic protection or policing, for example policing NQB traffic to a set fraction of the interconnection data rate, with excess traffic either being dropped or sent as default.

This part 3c it seems is where more specific guidance is wanted.

[RG] Please clarify to the reader, which of scenarios 1) – 3) is the one likely prevailing in home network for the next decade. It should also be clear to the reader, what is a safe deployment, if WiFi gear is not under control of the network operator. I also wonder, whether informative on an opt-out for customers on NQB would make sense (causing operator DSCP 0 marking of NQB as a result; such advice stays informative of course, but that may help operators designing an NQB offer).

[GW2]  Hmm. I am not sure that I want to try to predict the evolution of technology over the next 10 years (much less document that prediction in an RFC), and I frankly don’t see the need to. AFAIK some current Wi-Fi 6 AP silicon can support scenario 1 (with appropriate software).  AFAIK all current Wi-Fi 5 & 6 AP silicon can support scenario 2 (with appropriate software). For WiFi 6, WFA currently recommends (requires?) support for RFC8325, which NQB updates to match scenario 1. Several companies recently proposed that the IEEE 802.11 committee adopt support for L4S and NQB in WiFi 8. How will this play out over the next 10 years? I don’t know. Is there likely to still be some gear 10 years from now that falls into scenario 3?  Probably. Will it be prevalent? Hard to say.

[RG2] If this is no concern to you, please reword the draft to require a DSCP which will most likely not cause an unlimited priority scheduler to be on an end-to-end path in the Internet in general.

Here is a proposal for consideration:
As an alternative to re-marking, the operator could deploy a traffic protection (see Section 5.2<https://www.ietf.org/archive/id/draft-ietf-tsvwg-nqb-14.html#traffic_protection>) or a shaping/policing function on NQB-marked traffic that minimizes the potential for negative impacts on Default traffic.  In the case that a traffic policing function or a rate shaping function is applied to the aggregate of NQB traffic destined to such a downstream domain, the policer/shaper rate SHOULD be set to either 5% of the interconnection data rate, or 5% of the typical rate for such interconnections, whichever is greater, with excess traffic being either dropped or re-marked and classified for Default forwarding.  A traffic policing function SHOULD allow approximately 100 ms of burst tolerance (e.g. a token bucket depth equal to 100 ms multiplied by the policer rate). A traffic shaping function SHOULD allow approximately 10 ms of burst tolerance, and approximately 50 ms of buffering.

[RG] An operator supporting NQB still needs to ensure safe operation. If this should only be done, if the network operator als operates the WiFi AP, the NQB draft needs to be clear on that. If an operator not controling customer premises WiFi AP config is foreseen to operate NQB too, guidance with requirements on likely safe operation should be part of the draft. To then the operator SHOULD deploy. The remaining text is ok.
[GW2] Ok.

[RG] I note that the “queue protection” is designed to protect the BRAS/CMTS NQB or L4S scheduler. Its task is not to limit traffic in order to prevent unfair advantage for the NQB traffic when getting prioritized access to WiFi spectrum. Please clarify that.
[GW2] You are correct. Nonetheless, in cases where the access network is the bottleneck, protecting the access network queue provides some protection against unfairness in the legacy WiFi network.

[RG2] Please be clear on that in your draft and provide text clearly stating the NQB queue protection is only working on the access node’s NQB scheduler, but not on any other scheduler apart from that. I kindly ask you to add a figure explaining that to the reader. A sketch:

[RG2] ---->----Access-Node NQB scheduler & its own Queue protection----->-----WiFi-AP AC_VI scheduler (strict priority, unlimited)-------

[RG2] ---->----Access-Node QB scheduler -------------------------------------------->-----WiFi-AP AC_BE scheduler (low priority)-------

[RG2] It must be clear to the reader, that draft NQB contains requirements putting the AC_VI priority scheduler on path (no wording obfuscating this by talk limited to “interoperability” or “separate queuing”).


[RG] If the above text is linked to an expectation of 50% access capacity NQB (or L4S), 50% of the access capacity BE, the text should say so. Different configurations may apply, if additional PHBs are deployed  on an access link. Roughly, the burst passing the policer should’n t be bigger, that the NQB schedulers Queue. I’m waiting for a response of the L4S authors on whether it’s ok if non responsive NQB traffic is causing congestion in the NQB queue (if it e.g. completely fills the L4S queue by a single burst). There’s no explicit text to that in your draft and I’d like to understand, whether L4S drops caused by and L4S queue overflowing due to an NQB burst is regarded as “non queue building”.

[GW2] I was not basing this on 50% NQB (or L4S) and 50% Default on the Access Network. See what I wrote below.  I could include some text that describes the derivation of the 5% number.

[RG2]: Yes please, engineering guidance which allows for deduction of parameters under other circumstances than those assumed by a draft is a requirement for a standards track doc to me. Further, I miss an NQB draft text section specifying the typical access bandwidth for which deployment of NQB is recommended. From your response I take the access bandwidth for which you recommend NQB deployment to as a minimum to be “typically on the order of 100 Mbps”.

[GW] In addition to this text, I think that the text around appropriate sender behavior should indicate that the 1 Mbps limit is given in the context of today’s networks “where access network data rates are typically on the order of 100 Mbps” i.e. the upper limit is approximately 1% of “typical” access network speeds.  Thus, the shaper/policer rates above work out to ~5 simultaneous maximum-rate NQB streams on access network segments that are less than the “typical” rate, and more such streams on higher rate access network segments.

[RG] this latter text addresses burstiness of NQB traffic. This discussion is within another thread. I so far failed to have understood your ideas on burstiness. As I think, this topic is very important, if an application  traffic flow must be designed to avoid queue build up, we need to take the time to agree on text helping implentors to understand what’s expected (and operators to understand how they are supposed to configure NQB).

[GW2] In terms of an individual application, the draft says the data rate should not exceed “a small fraction of the expected path capacity on an instantaneous (e.g., inter-packet, or a suitably short time interval) basis”.  I had previously argued that this guidance was reasonable, even if it was imprecise (https://mailarchive.ietf.org/arch/msg/tsvwg/46k1oWi7xt_7OslKt8PIlAYjn8w/). But, I understand that you are not comfortable with the imprecision.  While the term “inter-packet” is precise and well understood, it can be too strict. The terms “small fraction of the expected path capacity” and “suitably short time interval” are not precise. The L4S dual-queue-coupled-AQM implementations in DOCSIS gear set the minimum CE-marking threshold at 4000 bytes, whereas the pseudocode in the dualQ draft defaults this to 1 MTU instead.  Perhaps we could limit the burstiness of NQB senders to 1500 bytes.

[RG2] All of these latter statements are irrelevant for readers of draft NQB, as long as the draft text doesn’t contain specifications and requirements expressing these recommendation. How should operators or app implementers learn that? Please add suitable text to the draft. I thought we had agreed on the definition of “non-queue-building” as provided by EF / Van Jacobsen version: the rate of the NQB access network scheduler MUST be above the rate of the incoming NQB traffic at any timescale. Please confirm that or indicate disagreement (or discuss, if required).





Thoughts?

Greg





Regards,

 Roland





Von: tsvwg <tsvwg-bounces@ietf.org><mailto:tsvwg-bounces@ietf.org> Im Auftrag von Black, David
Gesendet: Mittwoch, 2. November 2022 04:47
An: tsvwg IETF list <tsvwg@ietf.org><mailto:tsvwg@ietf.org>
Betreff: [tsvwg] WGLC: draft-ietf-tsvwg-nqb-14, closes 21 November 2022


This email announces a TSVWG Working Group Last Call (WGLC) on:



A Non-Queue-Building Per-Hop Behavior (NQB PHB) for Differentiated Services

draft-ietf-tsvwg-nqb-14

https://datatracker.ietf.org/doc/draft-ietf-tsvwg-nqb/



This draft is intended to become a Proposed Standard RFC.



This WGLC will run through the end of the day on Monday, November 21.

The WG will meet in London on Monday, November 7, while this WGLC

is in progress.



Comments should be sent to the tsvwg@ietf.org<mailto:tsvwg@ietf.org> list, although purely

editorial comments may be sent directly to the authors. Please cc: the

WG chairs at tsvwg-chairs@ietf.org<mailto:tsvwg-chairs@ietf.org> if you would like the chairs to

track such editorial comments as part of the WGLC process.



No IPR disclosures have been submitted directly on this draft.



Thanks,

David, Gorry and Marten

(TSVWG Co-Chairs)