Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-experimentation-07.txt
Bob Briscoe <B.Briscoe-contractor@cablelabs.com> Thu, 02 November 2017 17:36 UTC
Return-Path: <B.Briscoe-contractor@cablelabs.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3387713F70A for <tsvwg@ietfa.amsl.com>; Thu, 2 Nov 2017 10:36:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.02
X-Spam-Level:
X-Spam-Status: No, score=-2.02 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cablelabs.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ER-ghs6jQfNU for <tsvwg@ietfa.amsl.com>; Thu, 2 Nov 2017 10:36:42 -0700 (PDT)
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (mail-sn1nam02on0139.outbound.protection.outlook.com [104.47.36.139]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9392213F6ED for <tsvwg@ietf.org>; Thu, 2 Nov 2017 10:36:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cablelabs.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=Il/k791r4osaMYq6S11oy8ywoXSKlh7AxcULVp/Dc4U=; b=lIMrnoeG3Dt1wqzGkt3T+xibImPixoBDbSmVgqlKdko5e37ERB9/988IEpjo05uaqC8h0jha2+8dyMEJsaEjeAuP7p823uy2hhg4ZPlDLXA5Tspz+Kpq7sOLCN6jqNPR1E+mRt+fzDyTxFlm15RLQTtTy94A4TS0lxSRhKZIfA4=
Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=B.Briscoe-contractor@cablelabs.com;
Received: from [192.168.0.9] (87.112.63.152) by MWHPR0601MB3627.namprd06.prod.outlook.com (2603:10b6:301:7c::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.197.13; Thu, 2 Nov 2017 17:36:36 +0000
To: "Black, David" <David.Black@dell.com>
References: <150853593958.15506.14902169829184940262@ietfa.amsl.com> <CE03DB3D7B45C245BCA0D243277949362FCF9CBA@MX307CL04.corp.emc.com> <CAKKJt-fST+WaG8aiX9yLqrQuMRz23Ke4p8gVvUNxYa85YvCj=g@mail.gmail.com> <CE03DB3D7B45C245BCA0D243277949362FD281CD@MX307CL04.corp.emc.com>
From: Bob Briscoe <B.Briscoe-contractor@cablelabs.com>
Cc: tsvwg IETF list <tsvwg@ietf.org>
Message-ID: <6602c71b-c41f-0d88-d026-357b41cdb80e@cablelabs.com>
Date: Thu, 02 Nov 2017 17:36:25 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.4.0
MIME-Version: 1.0
In-Reply-To: <CE03DB3D7B45C245BCA0D243277949362FD281CD@MX307CL04.corp.emc.com>
Content-Type: multipart/alternative; boundary="------------6F3792D4EC0D048A9CE8012E"
Content-Language: en-GB
X-Originating-IP: [87.112.63.152]
X-ClientProxiedBy: VI1PR0101CA0061.eurprd01.prod.exchangelabs.com (2603:10a6:800:1f::29) To MWHPR0601MB3627.namprd06.prod.outlook.com (2603:10b6:301:7c::17)
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0526b4f1-e07e-4692-3abf-08d52218454b
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(4534020)(4602075)(4627115)(201703031133081)(201702281549075)(2017052603199); SRVR:MWHPR0601MB3627;
X-Microsoft-Exchange-Diagnostics: 1; MWHPR0601MB3627; 3:oxawC7LSk3QTozqDjyUmeyx5rwDztgjf/WkywFT4erOXxPognJI+PjEwKcM3YYRXMwJ32oUyc4zydoFJUBt3yvYXfL1Gr5YWH/Havoq3KxP+RXVIfxfRJUZ8Ue4ZDCtq14pogUbOpFjjk2Xw52SmJoYBPGGg/QGHjANivPe4jEZrlqGbjVkGmXgYAXVw1g07y1T1VJVoKgwDa2SMfkRKha5iQM62jpLhlQX/EaGU48hD4ad3p8Kgt1eio9Uz3BmD; 25:BDdTUPlH7C7AITSEtkCoV+A2U1d1QUhgGjsnA0pyDXEpZ6Otnqsaag0bkWf1xHe+Zds0MORNjuFT8x/UBmVvPgtt8h9YoNpDBA/oEyuPmN4q83BHsWjnbaxd+D+fXOjkF01bsXyEOWUA+Jbo0psBSMOXT+LLYTe/+pJ9u78fhGPYMn+Bu+3IpHmAMOjuZ4daFzwvT071GxEQ1g9fA6MPzN51Y+Z3dpxpjVdaoLM6OkudFefNYHVo6rMNy00UST1wz8C5bKPcVBo/iYPA/OjzV7pJHg/LWPzeXTALX5nK9lKBgqhjHrDubSMDmKri29rOf5sGyMaZIY1m0yvyQ9RmYA==; 31:KoLxJGC9n9w8BWyaRKJJWqeHzHR9PHKdyRjY5a+v3JqLH+VtXORMGLOv5f8GLu/Hi5LsrPyJbNOmOVSI9p0ybxYNZ5b1xMS8dXxhOvDjA1QEX3BH+JsDyV3PCdNUKigxCkQTj6OV8rnw8We9l1X0i3gQjxZTovIqN2lyQxzpb7KiUDWW5wrKIh1VNgWTksMZdiU/L3GOIlCUneOz1MMtjl+dIRou8DyKK2lDtwO2cJ0=
X-MS-TrafficTypeDiagnostic: MWHPR0601MB3627:
X-Microsoft-Exchange-Diagnostics: 1; MWHPR0601MB3627; 20:NQIZmJc0WXB3kSU87A6XpObYXvouhSilLon+UPvLRVvdxC+dvca+86Ody/WmqJs/YNsYhhBbKiGReAGSO5FIGdQfkiKU5qQmBVZiCJjqFtsNDmw5y7t7tZcTaoIhlcjp2WnyTkK4D5pNvYmMLXO1SDBhRotXd9yVvWOPYmttE9bPHrazm2jx9mAuEo2C+sxh2YWcl4pnAyva2WfzGsoBgkJJ/tS+T0OsDparObvD3FwIbZBymupFlyLwSSfQBSBwZJacluxnGUvenuRoRc3ogNmTbQvMPHGfioiO/wZlRG+MeuCPqloy8yCWJYM39K/qFEFLHAngn/k+NTIhGgh6HRDZLHy19//XEwrkCCPNHs3aBqm7+AoP8qOoPvM/cXvw7T3jjB/DQ7wrVPdDH6LgAVRy181XsiMRC7pYu13sxskjlst4t+8jWYXCuV0KJ3/kWqSmmS7qLfcgO0wd+gGO7Jcbgf1rwQbRdfRvmkvpbKyDFoNQvTO2Sa+gCw0+Fjvv; 4:kEJ9qgtqZU4aXj/cbY1XOuu7ZAyIdTx1qZ/30VeIgEJ5CwrkHGrYgOrHQxCvqWEcT+rqribOOUB3z2y6bhuUFxtAMUDMf7aBD1NecGhH5VxTmbwsg5t6g8w+lJB1QRTTI94N/k/LJltSeH6lp/FJ1xnZ+669E+AeFyn3TpRFGoSrDRkrLhD9fBgWoj0UKZywn1Sxc5VaQS5GELen8DViY1Ff/TjYhN5jAlHctDCcmfAcn7WhV1rHZ/BYzGtjkWsdFQaYK2C2JgY1hoQoDaghNHbBjaqlkJgB4ZlA94LKlRBUOV4iYQLCkEFL2A8zErZO2o0hgQ/bziiTDi23jE3Z+ZTJbXEs0YNtgDi4gIHe98o=
X-Exchange-Antispam-Report-Test: UriScan:(120809045254105)(56004941905204);
X-Microsoft-Antispam-PRVS: <MWHPR0601MB36276303F65847DDBC96ED2ACD5C0@MWHPR0601MB3627.namprd06.prod.outlook.com>
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(2401047)(5005006)(8121501046)(93006095)(93001095)(10201501046)(100000703101)(100105400095)(3231020)(3002001)(6041248)(20161123564025)(20161123562025)(20161123558100)(20161123560025)(20161123555025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:MWHPR0601MB3627; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:MWHPR0601MB3627;
X-Forefront-PRVS: 047999FF16
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(6049001)(376002)(346002)(377424004)(13464003)(24454002)(45984002)(189002)(199003)(229853002)(4326008)(5660300001)(37036004)(16586007)(316002)(58126008)(7736002)(790700001)(31686004)(6116002)(3846002)(53936002)(93886005)(8666007)(6306002)(65956001)(65806001)(66066001)(6916009)(2950100002)(54896002)(53946003)(236005)(6486002)(65826007)(53386004)(16576012)(68736007)(77096006)(606006)(2906002)(84326002)(33646002)(6246003)(72206003)(189998001)(117156002)(561944003)(83506002)(25786009)(6666003)(4001150100001)(54356999)(76176999)(50986999)(36756003)(478600001)(101416001)(966005)(81166006)(105586002)(8936002)(53546010)(16297215004)(14971765001)(106356001)(81156014)(31696002)(8676002)(86362001)(64126003)(97736004)(16526018)(230783001)(579004); DIR:OUT; SFP:1102; SCL:1; SRVR:MWHPR0601MB3627; H:[192.168.0.9]; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
Received-SPF: None (protection.outlook.com: cablelabs.com does not designate permitted sender hosts)
X-Microsoft-Exchange-Diagnostics: 1; MWHPR0601MB3627; 23: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
X-Microsoft-Exchange-Diagnostics: 1; MWHPR0601MB3627; 6:xJxYb9o+gOLSiVbe2l8br++7NDzYixnLK7r9dORH4gPOFMUtIEBSpqdmhcUwZ09aH3qdimzp4fwTz75poflRrqxI+dOmYdhDdJICq7eT6V9+d0SVPjR55/hV7Q8L7IcnM8DfjsE/i8PkQlUOTx74aNn0gpgwfF0X3GG/WNxe2ZDYyuNLWUJGe8HvboOb6AJJ8nGhN3SSQOcgeqRbmc8UxxMTxqogbIjth6x9+eWl1mSdSa+55Rc60Y/xTjZtSALR1pfWUR2a2CZ9AIAoS8W3PptUK8qFaqOSAmKyuFPBsbawdPJoIi5GAGbEd1pkz2RabGDR+zHn8FQARk0pYmMbJxiVtT/uC/foes/Cyll0nyk=; 5:cpLm7Cts1lnel/cLaMc/58CGfwB3jZA4QbGmyhKP5TxcAcanVsq7yT2e7r84Qxkt6ycJGhzzV4z7egFdYgxU9lbdmr4xjg2yCjrs0dlct0ly7p3Qzw0p7AtA95RvSVyjiaZMwSWYMMC5/C6IqD5LSFYF6G0Mz30odWPQmD1zyuk=; 24:OXJGbFwezhgEAq9aAKMoezLYkCuM3rKMjoQ7Dk+A3KPgRU1T3yoJ8uI0TamirZ/wKygvUa89voETwi7LI6WlijcOo6XreMzBdB3AOUSrw0U=; 7:0eIEhFahHaZHM/X4jgMOVh+KUoPM3rw4q9S4zkBkLDZZS0wz0dpZKHKPgjaCtyPue+vxtZxZrKJPRRKdABbLO778FpyW1NYp284IiFdp41/iptCmFgIR5DsWQN+1d49EQTGw8fWYcDreXg3clJqBra8g+bNyGJuBwZ5RJ7ljen45K1Hn7iNfKTEsNtGTDxGollsRm+HzwHmksUKGwGRRe4PE1u0mymkjiuoiwDC/uC4Tf56J7UDmSIe+dERT0sPq
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: cablelabs.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Nov 2017 17:36:36.9910 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 0526b4f1-e07e-4692-3abf-08d52218454b
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: ce4fbcd1-1d81-4af0-ad0b-2998c441e160
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR0601MB3627
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/-XNQe3-WLXL0jE76kEq2C-IR5G0>
Subject: Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-experimentation-07.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Nov 2017 17:36:47 -0000
David, Thank you very much for continuing to jump all the hurdles necessary to get this through the IESG. As Spencer suggests, there have been sufficient text changes that this needs another sanity review. I have checked through the diff and noticed the following. Outside the new section 2.2, all the changes are editorial nits. Within S.2.2, I've suggested some more significant changes, but they are still not changing the intent of what you typed. *2. ECN Experimentation: Overview** * *Congestion Response Differences:** *CURRENT the proposal in the latter draft couples the sender congestion response change to Congestion Marking Differences changes SUGGESTED: the proposal in the latter draft couples the difference in congestion response at the sender to different congestion marking in the network RATIONALE: I believe "...Differences changes..." was what the IESG found hard parse because it is a tautology resulting from quoting a heading verbatim. Current: This is at variance with RFC 3168's requirement SUGGESTED: These are at variance with RFC 3168's requirement Rationale: There are 2 changes. *Congestion Marking Differences:** *CURRENT: is required for any sender congestion response used in this area of experimentation SUGGESTED: is required for any differences in congestion marking or response used in this area of experimentation *2.2. Considerations for Other Protocols** * This new section is /very/ useful. The heading could be clearer though, perhaps: "Considerations for Nodes Not Involved in ECN Experiments" The context of the first 3 bullets is the opposite of the context of the rest of the doc. So I suggest that each bullet reminds the reader that the subject is "implementations not involved in experiments". Also some bullets are in the passive without a clear statement of what type of node the bullet applies to, which makes this problem worse. Items #2 & #3 are troubling for three further reasons: a) Congestion Response Differences experiments will not cause ECN and drop to no longer be equivalent. b) The sender can still rely on this equivalence if it uses ECT(0). c) Item #3 reads like nothing at all MUST originate ECT(1). Any simple attempt to focus item #2 only on ECT(1), contradicts item #3. So I've suggested you reverse the order and edit as follows: CURRENT: 2. The ECN CE codepoint SHOULD NOT be assumed to indicate that the packet would have been dropped if ECN were not in use, as that is not the case for either Congestion Response Differences experiments (seeSection 4.1 <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#section-4.1> below) or Congestion Marking Differences experiments (seeSection 4.2 <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#section-4.2> below). 3. Traffic marked with ECT(1) MUST NOT be originated, as specified inSection 4.2 <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#section-4.2> below. SUGGESTED: 2. A host not involved in experiments MUST NOT originate traffic marked with ECT(1), as specified in Section 4.2 below. 3. If a host does send packets as ECT(1), it SHOULD NOT assume that the ECN CE codepoint indicates that the packet would have been dropped if ECN were not in use, as that is not the case for Congestion Marking Differences experiments (seeSection 4.2 <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#section-4.2> below). Next, the subject of item #4 switches to nodes running experiments, but without saying so... CURRENT: 4. ECN may now be used on packets where it has not been used previously, specifically TCP control packets and retransmissions, seeSection 4.3 <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#section-4.3> below, and in particular its new requirements for middlebox behavior. In general, any system or protocol that inspects or monitors network traffic SHOULD be prepared to encounter ECN usage on packets and traffic that currently do not use ECN. SUGGESTED: 4. ECN experiments may use ECN on packets where it has not been used previously, specifically TCP control packets and retransmissions, seeSection 4.3 <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#section-4.3> below, and in particular its new requirements for middlebox behavior. In general, any system or protocol that inspects or monitors network traffic SHOULD be prepared to encounter ECN usage on packets that currently do not use ECN. Item #5 doesn't say what the experiments might change (or not) about tunnelling. CURRENT: 5. Requirements for handling of the ECN field by tunnel encapsulation and decapsulation are specified in [RFC6040 <https://tools.ietf.org/html/rfc6040>]. Additional related guidance can be found in [I-D.ietf-tsvwg-ecn-encap-guidelines <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#ref-I-D.ietf-tsvwg-ecn-encap-guidelines>] and [I-D.ietf-tsvwg-rfc6040update-shim <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#ref-I-D.ietf-tsvwg-rfc6040update-shim>]. SUGGESTED: 5. Requirements for handling of the ECN field by nodes encapsulatng or decapsulating outer IP headers are specified in [RFC6040 <https://tools.ietf.org/html/rfc6040>], which is in the process of being updated by [I-D.ietf-tsvwg-rfc6040update-shim <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#ref-I-D.ietf-tsvwg-rfc6040update-shim>]. Related guidance for encapsulations with non-IP outer headers can be found in [RFC5129], [I-D.ietf.trill-ecn-support], [I-D.ietf-tsvwg-ecn-encap-guidelines <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#ref-I-D.ietf-tsvwg-ecn-encap-guidelines>]. It is intended that ECN experiments will have to to work without changing these existing encapsulation behaviors. *2.3. Operational and Management Considerations** * I like this a lot too. But a nit: CURRENT: the questions inAppendix A <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#appendix-A> SUGGESTED: the questions inAppendix A <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#appendix-A> of RFC 5706 2.4 CURRENT: The second codepoint, ECT(1), is used to support ECN nonce functionality that discourages receivers from exploiting ECN to SUGGESTED: RFC 3168 assigns the second codepoint, ECT(1), to support ECN nonce functionality to discourage receivers from exploiting ECN to RATIONALE: Next sentence says the nonce isn't used, so it's confusing here to say it is used. CURRENT: 4. Remove the first two paragraphs ofSection 20.2 <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#section-20.2>, which discuss the ECN nonce and alternatives. No changes are made to the rest ofSection 20.2 <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#section-20.2>, which discusses alternate uses for the fourth ECN codepoint. SUGGESTED: 4. Remove the first paragraph ofSection 20.2 <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#section-20.2>, which discuss the ECN nonce and alternatives. No changes are made to the rest ofSection 20.2 <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#section-20.2>, which discusses alternative uses for the fourth ECN codepoint. RATIONALE: Pls don't remove the 2nd para of S.20.2, which is a good alternative to the ECN nonce. In fact, we need this 2nd para, so we can refer to it from Appendix C.1 of draft-ietf-tsvwg-ecn-l4s-id instead of using the expired individual draft draft-moncaster-tcpm-rcv-cheat (Also note the nit: alternate means alternating). *4.1 Congestion Response Differences** * CURRENT: Hence an ECN congestion indication communicates a higher likelihood that a shorter queue exists at the network bottleneck node by comparison to a packet drop that indicates congestion [I-D.ietf-tcpm-alternativebackoff-ecn <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#ref-I-D.ietf-tcpm-alternativebackoff-ecn>]. SUGGESTED: Hence an ECN congestion indication communicates that there will not be an excessively long queue at the network bottleneck node, [I-D.ietf-tcpm-alternativebackoff-ecn <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#ref-I-D.ietf-tcpm-alternativebackoff-ecn>] whereas a packet drop communicates nothing about the length of a queue. RATIONALE: A drop could be from: * an AQM that does not support ECN (for instance DOCSIS AQMs do not define ECN support). Then the queue would be the same length as if a CE mark had been emitted (ABE works with equivalence of CE and drop). * a rate policer that has no queue at all. *4.2 Congestion Marking Differences** * CURRENT: Use of different ECN codepoints is a promising means of identifying these two classes of traffic to network nodes, and hence this area of experimentation is based on the use of the ECT(1) codepoint to request ECN congestion marking behavior in the network that differs from ECT(0) counterbalanced by use of a different IETF- approved congestion response to CE marks at the sender, e.g., as proposed in [I-D.ietf-tsvwg-ecn-l4s-id <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#ref-I-D.ietf-tsvwg-ecn-l4s-id>]. SUGGESTED: Use of different ECN codepoints is a promising means of identifying these two classes of traffic to network nodes, and hence this area of experimentation is based on the use of the ECT(1) codepoint to request ECN congestion marking behavior in the network that differs from ECT(0). This would need to be counterbalanced by use of a different IETF-approved congestion response to CE marks at the sender, e.g., as proposed in [I-D.ietf-tsvwg-ecn-l4s-id <https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07#ref-I-D.ietf-tsvwg-ecn-l4s-id>]. RATIONALE: Splits v long sentence. Bob On 01/11/17 18:08, Black, David wrote: > > Hi Spencer, > > Well, I’m pleasantly surprised that Benoit cleared his Discuss with a > simple note of thanks and no further text change requests. > > I’ve checked the -07 vs. -06 diff, and it looks good to me, and I > concur with your assumption that the RFC Editor will fix the “primary” > -> “primarily” problem. > > I believe that Gorry (as shepherd) is also fine with this -07 version, > but I suggest giving him an opportunity to double-check before pushing > the approve-for-publication button. > > And yes … I’m definitely pleased to have reached this stage in the > process. > > Thanks, --David > > *From:*Spencer Dawkins at IETF [mailto:spencerdawkins.ietf@gmail.com] > *Sent:* Tuesday, October 31, 2017 5:11 PM > *To:* Black, David <david.black@emc.com> > *Cc:* tsvwg@ietf.org > *Subject:* Re: [tsvwg] I-D Action: > draft-ietf-tsvwg-ecn-experimentation-07.txt > > Hi, David, > > On Sat, Oct 21, 2017 at 12:37 PM, Black, David <David.Black@dell.com > <mailto:David.Black@dell.com>> wrote: > > This draft contains changes resulting from IESG Evaluation. > > See the change history for a summary of what's been done, > including the addition of sections 2.2 and 2.3 and movement of > section 4.4 on the requirement for effective congestion control to > section 2.1 > > Thanks, --David > > Hi, David, > > I see that Benoit has cleared his Discuss based on -07, but remember > that you mentioned kinda expecting that a -08 might be required, just > based on the amount of new text that was added in -07. > > Does it still seem that way to you (and, of course, to your document > shepherd)? > > I did see one typo in the new text, > > "transition from current ECN functionality falls primary upon" should > probably be > > "transition from current ECN functionality falls primarily upon" > > but that's easily fixed in an RFC Editor Note, if you don't need to > submit an updated draft. > > Just let me know! > > And thanks for horsing that through. > > Spencer > > > -----Original Message----- > > From: I-D-Announce [mailto:i-d-announce-bounces@ietf.org > <mailto:i-d-announce-bounces@ietf.org>] On Behalf Of > > internet-drafts@ietf.org <mailto:internet-drafts@ietf.org> > > Sent: Friday, October 20, 2017 5:46 PM > > To: i-d-announce@ietf.org <mailto:i-d-announce@ietf.org> > > Cc: tsvwg@ietf.org <mailto:tsvwg@ietf.org> > > Subject: I-D Action: draft-ietf-tsvwg-ecn-experimentation-07.txt > > > > > > A New Internet-Draft is available from the on-line > Internet-Drafts directories. > > This draft is a work item of the Transport Area Working Group WG > of the > > IETF. > > > > Title : Relaxing Restrictions on Explicit > Congestion Notification (ECN) > > Experimentation > > Author : David Black > > Filename : draft-ietf-tsvwg-ecn-experimentation-07.txt > > Pages : 21 > > Date : 2017-10-20 > > > > Abstract: > > This memo updates RFC 3168, which specifies Explicit Congestion > > Notification (ECN) as an alternative to packet drops for > indicating > > network congestion to endpoints. It relaxes restrictions in > RFC 3168 > > that hinder experimentation towards benefits beyond just > removal of > > loss. This memo summarizes the anticipated areas of > experimentation > > and updates RFC 3168 to enable experimentation in these > areas. An > > Experimental RFC in the IETF document stream is required to take > > advantage of any of these enabling updates. In addition, > this memo > > makes related updates to the ECN specifications for RTP in > RFC 6679 > > and for DCCP in RFC 4341, RFC 4342 and RFC 5622. This memo also > > records the conclusion of the ECN nonce experiment in RFC > 3540, and > > provides the rationale for reclassification of RFC 3540 as > Historic; > > this reclassification enables new experimental use of the ECT(1) > > codepoint. > > > > > > The IETF datatracker status page for this draft is: > > > https://datatracker.ietf.org/doc/draft-ietf-tsvwg-ecn-experimentation/ > > > > There are also htmlized versions available at: > > https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-experimentation-07 > > https://datatracker.ietf.org/doc/html/draft-ietf-tsvwg-ecn- > > experimentation-07 > > > > A diff from the previous version is available at: > > > https://www.ietf.org/rfcdiff?url2=draft-ietf-tsvwg-ecn-experimentation-07 > > > > > > Please note that it may take a couple of minutes from the time > of submission > > until the htmlized version and diff are available at > tools.ietf.org <http://tools.ietf.org>. > > > > Internet-Drafts are also available by anonymous FTP at: > > ftp://ftp.ietf.org/internet-drafts/ > > > > > _______________________________________________ > > I-D-Announce mailing list > > I-D-Announce@ietf.org <mailto:I-D-Announce@ietf.org> > > https://www.ietf.org/mailman/listinfo/i-d-announce > > Internet-Draft directories: http://www.ietf.org/shadow.html > <http://www.ietf.org/shadow.html> > > or ftp://ftp.ietf.org/ietf/1shadow-sites.txt >
- [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-experime… internet-drafts
- Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-expe… Black, David
- Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-expe… Spencer Dawkins at IETF
- Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-expe… Black, David
- Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-expe… Spencer Dawkins at IETF
- Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-expe… Bob Briscoe
- Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-expe… Black, David
- Re: [tsvwg] I-D Action: draft-ietf-tsvwg-ecn-expe… Bob Briscoe