Re: [tsvwg] Draft diffuser to QCI v04 posted

"Jerome Henry (jerhenry)" <jerhenry@cisco.com> Mon, 27 April 2020 17:55 UTC

Return-Path: <jerhenry@cisco.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C6F993A12F7 for <tsvwg@ietfa.amsl.com>; Mon, 27 Apr 2020 10:55:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.489
X-Spam-Level:
X-Spam-Status: No, score=-9.489 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=BmFCOYih; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=CKyUhEdq
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JsoY6Ba3Jafg for <tsvwg@ietfa.amsl.com>; Mon, 27 Apr 2020 10:55:38 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE4013A13D5 for <tsvwg@ietf.org>; Mon, 27 Apr 2020 10:55:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=83199; q=dns/txt; s=iport; t=1588010123; x=1589219723; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=RxIZ+ItAO+QLJwOnJHtVHOGtEp5xmeSbgZlN5Zbt+RI=; b=BmFCOYihs5oahagQ8q23VxG7iPZA/sathirig6OfNKMc25UJXVVaKSx9 ih8X+CT7nyxhZbvDKDD7Qa6NFSGVIFWrnI8bNyA+m6PxvAjfZlyAIlwjl SYvw1JugRsohymh7jsTstaJYn7T1R0VSRtlmvedL495ZTIZ1Rxg9apLRz o=;
IronPort-PHdr: 9a23:Z1GqZBDFdWvWVQ89kXNPUyQJPHJ1sqjoPgMT9pssgq5PdaLm5Zn5IUjD/qs03kTRU9Dd7PRJw6rNvqbsVHZIwK7JsWtKMfkuHwQAld1QmgUhBMCfDkiuLvPwbyE8BtVqX15+9Hb9Ok9QS47z
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AeBgBNHKde/4UNJK1mHAEBAQEBBwEBEQEEBAEBggOBJS8kBSgFbFggBAsqCoQVgV2BaQOKc4JfgQGXLoFCgRADVAMIAQEBDAEBIgcEAgQBAYREAheCESQ4EwIDAQELAQEFAQEBAgEFBG2FKgYmAQuFcQEBAQEDEggBCB0BASUEDgEPAgEGAhEBAgECIQEGAwICAjAUAwYIAgQOBRsHgwQBgX5NAy4BDpdRkGcCgTmIYXaBMoMAAQEFgUZBQYJiGIIOAwaBOIJjhjWDFg8agUE/gREnHIFPSQcuPoJnAgIBARiBCwQRARALLQ0Jglwygi2OFAY+DoIUQYYUJJk3fAqCRYgPjSSCTR2CW4hXjF+Eao96gVaHcpM+AgQCBAUCDgEBBYFpIoFWcBU7KgGCPlAYDYE7j1UkDAUSgQMBC4JAhRSFQnQCARMfAgMDAQcBAQMJfItbASeBDQEwXwEB
X-IronPort-AV: E=Sophos;i="5.73,325,1583193600"; d="scan'208,217";a="479507131"
Received: from alln-core-11.cisco.com ([173.36.13.133]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 27 Apr 2020 17:54:59 +0000
Received: from XCH-RCD-001.cisco.com (xch-rcd-001.cisco.com [173.37.102.11]) by alln-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id 03RHsxJn015475 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 27 Apr 2020 17:54:59 GMT
Received: from xhs-aln-001.cisco.com (173.37.135.118) by XCH-RCD-001.cisco.com (173.37.102.11) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 27 Apr 2020 12:54:59 -0500
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 27 Apr 2020 12:54:58 -0500
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Mon, 27 Apr 2020 12:54:58 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NaS5CJtB2A9vl04DsFmFbRRpeqYpyJPvL8Cx3ErU4HVvqlUptbi2+nqseL0bjj28hA6BXz0Q/CxJKdUFC8/Yc8P91zVXhSRzjW5imn5b9jC3S/UT94jzbTF9/18+NhBC+Rtws/z9VMzHMU2d1FiKE48dtX18triHgPvJpi1q9iQCXZ8+Csg2CnA91W9ufDuxfH+VlD7RdqopAj318KVI6TQVsVvgUSwcCZ1D0jfykWybfgF+v5QxVs2Dt/+TcEWEEB505Vh9I+hOLmWO/RJTkwW9FF5qTXKuqqpoqSjXb/7WvUTbcoCYnONtQzrMvxoAUP3PBQzkVLHVsckT2U11iQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RxIZ+ItAO+QLJwOnJHtVHOGtEp5xmeSbgZlN5Zbt+RI=; b=mdcSZEjTEyhpGhcH0NqsHpTksYMqlagkHLTPzJowUZGZ4M2EzcAZ3W1NJhZkPi+wY5dzCM5+f36hu2IpjUD1RGj9Gn7zSk1erRM5jmSkzlJQ4EnEWw9BQKWlW9KSwClhz4u/7o06pNGTscSsyt2hqrKH5bauNtaYQa8q+kDkE1LJa3momZ73mAuidUP/B76jnxRHvnyaTwIOh5Xqd+8RyDK/gBbyotcdLlMdO3QnMXxWWrzTGbowGcoC6tp0trGmw4AY24cnXhl2gxCAqpcfgefcgcqJGVKIa+BmGBAjtKf1Zu7DZqinRxVG9nkKboqdxTEUyALCMmkBLfLTbXB2xQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RxIZ+ItAO+QLJwOnJHtVHOGtEp5xmeSbgZlN5Zbt+RI=; b=CKyUhEdqrTJhrYsuxQ/6W1cXb0tINLGAPGCe7JvgNpcrbZViV93vZ222VJGvoBmqaev7uUD0PAkdWIzAzqAYtLLMfgoHv6ewAU0FM8KGff7CXYL+NLLpZYLK0vYqDG2j2uVVzdSBd6VvzqgGfo2ZRZIqnfxpd/bDN1yZdj+7bok=
Received: from MN2PR11MB3904.namprd11.prod.outlook.com (2603:10b6:208:13c::16) by MN2PR11MB4016.namprd11.prod.outlook.com (2603:10b6:208:155::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2937.22; Mon, 27 Apr 2020 17:54:57 +0000
Received: from MN2PR11MB3904.namprd11.prod.outlook.com ([fe80::9503:8dfc:ce31:ff38]) by MN2PR11MB3904.namprd11.prod.outlook.com ([fe80::9503:8dfc:ce31:ff38%7]) with mapi id 15.20.2937.023; Mon, 27 Apr 2020 17:54:57 +0000
From: "Jerome Henry (jerhenry)" <jerhenry@cisco.com>
To: "Ruediger.Geib@telekom.de" <Ruediger.Geib@telekom.de>
CC: "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: [tsvwg] Draft diffuser to QCI v04 posted
Thread-Index: AQHWEoNqe/kEXabRhEaw+W3E1C0XrKiBxJDwgABXAICAARWNYIACCdqAgAGYi+CABQbdgIAAt3CAgACABwA=
Date: Mon, 27 Apr 2020 17:54:57 +0000
Message-ID: <2F44BA0C-2EC2-4E97-9FF8-405D2C06A6EE@cisco.com>
References: <A3DECAE1-8FB1-4F56-BF72-C92E5024D620@akamai.com> <FRAPR01MB0130EC4555CDE92C9DC28C1B9CD40@FRAPR01MB0130.DEUPRD01.PROD.OUTLOOK.DE> <0E0BB1F2-C22F-43B9-9579-9FE025AD7A6F@cisco.com> <FRAPR01MB0130BD24AFC19E63F454B28A9CD50@FRAPR01MB0130.DEUPRD01.PROD.OUTLOOK.DE> <326E883B-F0B5-4F64-9867-8CAF473F9DD4@cisco.com> <FRAPR01MB0130B9BD6727D5727B453E979CD30@FRAPR01MB0130.DEUPRD01.PROD.OUTLOOK.DE> <9BAE848D-F1DE-4ED7-AB62-07AFB955F11C@cisco.com> <FRAPR01MB013040837AB05836ECF6D58D9CAF0@FRAPR01MB0130.DEUPRD01.PROD.OUTLOOK.DE>
In-Reply-To: <FRAPR01MB013040837AB05836ECF6D58D9CAF0@FRAPR01MB0130.DEUPRD01.PROD.OUTLOOK.DE>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.36.20041300
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jerhenry@cisco.com;
x-originating-ip: [173.38.117.83]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b0b87db7-d5c7-4b31-b6b1-08d7ead41923
x-ms-traffictypediagnostic: MN2PR11MB4016:
x-microsoft-antispam-prvs: <MN2PR11MB4016D4676CC2CFF2472E5C51D5AF0@MN2PR11MB4016.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0386B406AA
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR11MB3904.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(346002)(136003)(376002)(366004)(39860400002)(396003)(6486002)(2906002)(6916009)(8936002)(8676002)(26005)(81156014)(4326008)(33656002)(66476007)(64756008)(66946007)(66446008)(478600001)(76116006)(71200400001)(66556008)(186003)(53546011)(6512007)(5660300002)(6506007)(86362001)(30864003)(2616005)(316002)(36756003)(66574012)(579004); DIR:OUT; SFP:1101;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_2F44BA0C2EC24E979FF8405D2C06A6EEciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: b0b87db7-d5c7-4b31-b6b1-08d7ead41923
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Apr 2020 17:54:57.0672 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: iwYPrOauSHAEfs789qH+zJaxTtcF7rz8B5bpXZH5zLhvhKiRbA6XcriCI2BSwKOx7pGx1Qp37yoUXLTVaKooMg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4016
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.11, xch-rcd-001.cisco.com
X-Outbound-Node: alln-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/69SkkU1WxAkpyWdHxatdVxeaUu4>
Subject: Re: [tsvwg] Draft diffuser to QCI v04 posted
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Apr 2020 17:55:47 -0000

Thank you Ruediger,

And apologies, you did mention private QCIs last year in your feedback of 04/20, I did not appreciate their importance back then, I’ll definitely mention them in the next version.

Take care

Jerome

From: "Ruediger.Geib@telekom.de" <Ruediger.Geib@telekom.de>
Date: Monday, April 27, 2020 at 2:27 AM
To: "Jerome Henry (jerhenry)" <jerhenry@cisco.com>
Cc: "tsvwg@ietf.org" <tsvwg@ietf.org>
Subject: AW: [tsvwg] Draft diffuser to QCI v04 posted

Hi Jerome,

Thanks and you are right, we discuss this time and again.

I’d definitely appreciate mentioning private QCIs (and later types of private QoS identifiers) and put them out of scope.

With regard to our different approaches of course, if we knew the future, our actual decisions were made appropriate.

Regards,

Ruediger



Von: Jerome Henry (jerhenry) <jerhenry@cisco.com>
Gesendet: Montag, 27. April 2020 01:20
An: Geib, Rüdiger <Ruediger.Geib@telekom.de>
Cc: tsvwg@ietf.org
Betreff: Re: [tsvwg] Draft diffuser to QCI v04 posted

Hi Ruediger,

Thank you for this exchange. It is not without reminding me a similar exchange we have about  a year ago on very similar lines.
A few more thoughts inline (greyed out the rest to limit noise).

Take care

Jerome

From: "Ruediger.Geib@telekom.de<mailto:Ruediger.Geib@telekom.de>" <Ruediger.Geib@telekom.de<mailto:Ruediger.Geib@telekom.de>>
Date: Thursday, April 23, 2020 at 11:07 AM
To: "Jerome Henry (jerhenry)" <jerhenry@cisco.com<mailto:jerhenry@cisco.com>>
Cc: "tsvwg@ietf.org<mailto:tsvwg@ietf.org>" <tsvwg@ietf.org<mailto:tsvwg@ietf.org>>
Subject: AW: [tsvwg] Draft diffuser to QCI v04 posted

Hi Jerome,

My replies in-line [RG], deleted uncommented and “in agreement” text.

Regards, Ruediger

From: Jerome Henry (jerhenry) <jerhenry@cisco.com<mailto:jerhenry@cisco.com>>



From: "Ruediger.Geib@telekom.de<mailto:Ruediger.Geib@telekom.de>" <Ruediger.Geib@telekom.de<mailto:Ruediger.Geib@telekom.de>>



Some points which should be discussed or at least be put in/out scope of your draft:

  *   if not all standard LCIs are deployed, is there a real need for one fixed DSCP per standard LCI mapping – or might generic guidance be a reasonable alternative?
[Jerome] If we could know which traffic types combinations are never encountered together on any network, then we could bet on using the same DSCP for both. But I am not sure that we can make this determination, and also it may be possible that a transport network may honor DSCP and carry traffic from multiple entities. This led me to the conclusion that it was preferable to establish a complete list (what maybe Jake calls ‘a library’), with expression of intent for each and possible label, avoiding label overlap as frequently as possible.
[RG] We follow different philosophies here, I think. I prefer to aggregate traffic and consume as little codepoint and mapping space to keep configuration and operation simple. Neither are DSCPs binding, nor is QCI deployment or assignment to applications binding. For me, these are too many “may” to base activity upon.
[Jerome] It seems that 3GPP also follows the ‘race to more’ route, defining more QCIs over the years.  I am not supporting the idea that each application should have its own label, this seems overkill to me. But I do recognize that 3GPP now has defined applications that do not fit in our model (RFC4594 or another). One first step in my view is to defining a working map we can rely on when addressing these traffic categories.


  *   If private QCIs are part of 5G, are they used by large enterprises too? I know that private QCIs saw fair deployment at the start of LTE. The draft doesn’t mention them. I suggest to put them out of scope if you don’t want to deal with them and recommend to check, whether they are still in use and whether their use is standardized and expected for 5G.
[Jerome] We can definitely make that mention, although it seemed to me that, as we state that we use TS 23.203 (and TS 23.501 for 5G) as a reference, the implication was there that we did not address private QCIs (as these docs specify that they define standard QCIs/5Qis to ensure interoperability and void non-translatable private QCIs), nor do we address experimental/local DSCPs or private performance characteristics (but making this mention is trivial, I’ll make it).
[RG] It took me some time until I learned about the existence and the deployment of the private QCIs. We should try to avoid that frustration for others, that’s my intent.


  *   The abstract of your draft reads (excerpt): “application traffic transits .. between enterprise networks, the Internet, and cellular telecommunication networks….it is crucial that quality of service be aligned between these  different environments….This document specifies a set of QCI to DSCP mappings so as to maintain a consistent QoS treatment between cellular networks and the Internet.  This mapping can be used by enterprises or implementers  expecting traffic to flow through both types of network, and wishing to align the QoS treatment applied to one network under their control with the QoS treatment applied to the other network.”
In your scenario below the sentence “enterprise has a series of assets of various types, and they leverage a dual connection (MPTCP, QUIC etc) between cellular and unlicensed (..WiFi). In addition, an application server is introduced.  In my mind
- leaving the enterprise and interconnecting to a 3rd party application server – is that a direct interconnection or is an upstream carrier involved (the Internet)? In my mind the draft should respect the state-of-the art at the relevant interconnection interfaces. From my experience, DiffServ requires an SLA between interconnected parties. Application servers operating with Diffserv belong to one of them.
The other case is communication of a single VPN across a carrier backbone. In many cases, MPLS is deployed by the backbone. It is a task of the enterprise VPN operators map his DSCP scheme to the offered carrier classes then. As mentioned above, a carrier could offer some pre-defined DSCPs / classes for enterprise VPNs too.
In any case, I’m not sure that I understand which of the above scenarios your draft addresses mainly. That should be clearly expressed by the abstract. I understand you draft aiming mainly at enterprise DSCP to QCI mapping with one end enterprise and other end any part of the Internet by now. If that isn’t correct, please reword the abstract.
[Jerome] I am trying different words to express the content of the draft abstract in case it would be useful. I am not trying to change the scope 😊.  The enterprise is on one end at the UE side, which traffic goes through one 3GPP leg for which an SLA and associated QCIs are likely known, and another leg going through a Diffserv-based leg (which I call Wi-Fi for simplicity). Then the enterprise is on the other end, where traffic re-enters the AS, ie. the domain the enterprise has marking control over. At this point (which may be anywhere beyond the 3GPP boundary), the enterprise will want look at the traffic going through both legs, and make sure it gets the same treatment. The draft can help them think about QCIs, coming from Diffserv, and also, understanding the SLA and the QCIs they agreed upon with the 3GPP carrier, design a Diffserv scheme that would minimize the treatment differences between packets going through these 2 (paths. Hope this helps clarify. Please tell me if you think that the abstract does not convey this intent clearly enough. I am of course open to alternate wording.
[RG] The only way to reliably conserve DSCPs between sites of an enterprise interconnected by a single (or more) other domains is to use a VPN or a tunnel. A domain supporting Diffserv will not honour or preserve any codepoint scheme apart from its own, I think. It is standard conformant to rewrite many incoming DSCP to a single one, as I far as I recall discussion around RFC8100. The abstract should clarify, whether it is especially tunnel or VPN of deployment, which is addressed. This would also allow to assign a simple backbone mapping at carrier interfaces (there’s default, there may be up to a dozen more bulk transport QoS classes, maybe).
If you expect a third party carrier to offer a public WiFi service upon which an enterprise domain follows to honour your draft standard and carry the DSCPs unchanged, it’s beyond my imagination. I didn’t check whether your draft is compatible with draft-ietf-tsvwg-rtcweb-qos-18<https://datatracker.ietf.org/doc/draft-ietf-tsvwg-rtcweb-qos/>, RFC 4594<https://datatracker.ietf.org/doc/rfc4594/> (you mentioned that in your draft, I think), and RFC 5127<https://datatracker.ietf.org/doc/rfc5127/>, which likely all may be expected to be honoured by the domain operating that WiFi access.
[Jerome] I am not sure if we are using different words for the same thing or if there is something deeper. Our goal is not to address the domains boundaries, how traffic enters domains etc. It is obvious than any third party B between entity A (maybe a carrier) and an entity C (maybe an enterprise) would have an effect on the traffic carried between A and C through B, in particular QoS. Quite obviously as well, entity B may have a contractual link with either A or C (or both) to determine a particular treatment for traffic going to C. In backbones where Layer 2 or Layer 2.5 technologies, like MPLS, are deployed, a VPN can carry traffic with treatment consistency. But our goal is not define the architecture of an enterprise whose traffic goes through both links, where they interconnect, which third party is there, what kind of tunnel they use etc. Our goal is to create a map, whereby if a device sends traffic that matches QCI 85, we have a way to express what that could be in the Diffserv domain. Similarly, we need a way, for example, for a utility company sending high voltage automation messages, and deciding to use both paths, to know that such traffic is described as QCI 85, and find an equivalent in DIffserv.
As for the above RFCs, we do not address WebRTC specifically, so I am not sure that the draft above applies. However, the draft is compatible with RFC5127, although we do not address this network location. As for RFC4594, we qupote it 46 times, and it is foundational for our work.

Regards,

Ruediger




Von: tsvwg <tsvwg-bounces@ietf.org<mailto:tsvwg-bounces@ietf.org>> Im Auftrag von Jerome Henry (jerhenry)
Gesendet: Montag, 20. April 2020 20:31
An: jholland=40akamai.com@dmarc.ietf.org<mailto:jholland=40akamai.com@dmarc.ietf.org>
Cc: jerhenry=40cisco.com@dmarc.ietf.org<mailto:jerhenry=40cisco.com@dmarc.ietf.org>; tsvwg@ietf.org<mailto:tsvwg@ietf.org>
Betreff: Re: [tsvwg] Draft diffuser to QCI v04 posted

Hi Jake,

This is very useful feedback. In this effort, it seems that we want to arbitrate between different needs. In the scenario we envision, an enterprise has a series of assets of various types, and they leverage a dual connection (MPTCP, QUIC etc) between cellular and unlicensed (let’s call it Wi-FI, although it can be something else). As traffic reaches the other side (application server with at least a Diffserv path to the asset), the hope is that both sides would have treated the packets in an approximatively comparable fashion.

Would you mind exploring your idea a bit further? In all cases, the actor is likely an enterprise IT. They can negotiate an SLA with the carrier(s) they work with. This could result in a series of QCIs attached to the various traffic they would send. Now, their goal is to attempt to get the same intent on both legs. They may not be LTE experts.
In your proposal, how would the choreography work? Would the enterprise create their own mapping between the LCIs their carrier suggested and some DSCP, chosen from unaffected values? (Would they need any guidance on what these QCIs represent? Do we assume that they are comfortable or familiar with the various IETF QoS RFCs?) Would they then use the service.domain logic below to ask the carrier to mark the matching traffic at the interconnect? Or would the host/asset mark the DIffserv side, based on putting in a library somewhere, that the host can access, a service/socket to DSCP table?

Take care

Jerome



Von: tsvwg <tsvwg-bounces@ietf.org<mailto:tsvwg-bounces@ietf.org>> Im Auftrag von Holland, Jake
Gesendet: Dienstag, 14. April 2020 19:38
An: Jerome Henry (jerhenry) <jerhenry=40cisco.com@dmarc.ietf.org<mailto:jerhenry=40cisco.com@dmarc.ietf.org>>; tsvwg <tsvwg@ietf.org<mailto:tsvwg@ietf.org>>
Betreff: Re: [tsvwg] Draft diffuser to QCI v04 posted

Hi Jerome,

Thanks for the update.  To me, cataloging the classes of service for 3gpp seems like useful work for an informational doc, and thanks.

But with regard to the proposed mapping sections, I think there’s a problem:

My current belief is that a static mapping for these classes that can get wide adoption is probably not possible, and it would be a mistake for the IETF to spend substantial effort trying to define one.  And without wide adoption, the use case for things like mobile apps won’t work, except in the most limited and tightly controlled and network-specific ways, because the mobile apps won’t be portable across networks, so the networks will be forced to continue just bleaching markings from IP hosts.  (I’m willing to be convinced otherwise, but it would take some good evidence that all the parties who would need to adopt it are going to be willing to adopt such a thing.)

So I would like to suggest that dynamic negotiation might be worthwhile to define for hosts, as well as at the carrier interconnects.

One key missing piece to make that possible is a signaling system that would be capable of advertising to hosts a mapping between diffserv codepoints and classes of service offered by the network and available to that host.  I believe such a system could be defined in the IETF with a reasonable effort, and that it seems to me it would be a valuable contribution. (*see below for a proposed outline).

Although such an approach might seem technically complicated and harder to deploy compared to a static mapping, it has the advantages that it could scale to many classes of service, it could be extended with new classes of service in the future, classes of service that are not useful within a network can be ignored without cost, and it avoids consuming the scarce and already-overloaded resource represented by diffserv codepoints.

So I’ll suggest that a dynamic mapping at hosts might be an easier path to a deployable solution that actually might be able to address the given use case of being usable by mobile apps, even though it might not be easy.

By contrast with a static mapping, I’d greet a dynamic mapping proposal for hosts with open arms.  More so if the need is urgent enough that it might get some adoption.

On top of the existing needs you’ve outlined, I suspect it’s hard to overstate the future value from enabling incremental deployment for experimental classes.  (And if it drives any knock-on effects encouraging support for mapping of the most useful traffic classes at interconnects, so much the better.)

I hope that’s a helpful comment.

Best regards,
Jake

* As a starting point at a possibly-viable approach, I’ll suggest: 1. define a new service that provides a mapping within a network (with a name added to the iana service names registry), 2. use the domain-name DHCP option to provide the domain name of the local network to hosts acting as DHCP clients, and 3. use DNS-SD to discover the mapping service by combining the network’s domain name with the service name.

Then write a library for use on hosts (or the eNodeB, tho that might have other options), where the API supports requesting a service class for a socket. Make that API discover and query the new mapping service, and on successful discovery of a mapping for that service to a meaningful codepoint for the network, set the target socket to use the discovered codepoint.


From: "Jerome Henry (jerhenry)" <jerhenry=40cisco.com@dmarc.ietf.org<mailto:jerhenry=40cisco.com@dmarc.ietf.org>>
Date: Monday, April 13, 2020 at 11:01 AM
To: tsvwg <tsvwg@ietf.org<mailto:tsvwg@ietf.org>>
Subject: [tsvwg] Draft diffuser to QCI v04 posted

Dear tsvwg,

Following our interim meeting last week, we posted an updated version of draft-diffserv-to-qci (https://datatracker.ietf.org/doc/draft-henry-tsvwg-diffserv-to-qci/<https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dhenry-2Dtsvwg-2Ddiffserv-2Dto-2Dqci_&d=DwMGaQ&c=96ZbZZcaMF4w0F4jpN6LZg&r=bqnFROivDo_4iF8Z3R4DyNWKbbMeXr0LOgLnElT1Ook&m=I0IngIMAy12l9uKMSUXtKPGuTTUZ8uFGgVoSwz2Bs3s&s=HAteQJ46NmpJurRRonWbQ1r5AJbs0gYGVFABCN77MkM&e=>).
This version integrates the feedback that was shared during the interim meeting (formatting error on one table, clarification that no IANA action was mandated).

We discussed extensively on thoughts that were shared during the interim meeting. We had also noticed that several groups had proposed DSCP values for QCI labels. ATIS was named specifically, but other organizations (e.g. NGMN) have proposed such maps. However, we found that the maps available were reflective of a specific point in time, and specific focus. As such, most mapping proposals only consider a small subset of the possible QCIs defined today, and also solely focus on a specific context (which, in the examples above, is typically Carrier to Carrier interconnect). We do not think that these actors need an IETF proposal to decide on how they should mark traffic that they exchange, and such interconnect is better defined in professional settings between Carriers.
By contrast, enterprises that implement dual path (Diffserv on one side, 3GPP on the other) for their UEs are in need of wanting to align their Diffserv markings and treatment to those they have agreed upon with their Carrier, thus creating a requirement different from the above. It seems to us that this draft can help propose such map. Dynamic negotiation (e.g. a-la-RFC 8100) and exchanges (a-la- draft-knoll-idr-qos-attribute-24) are undoubtedly very promising ways of implementing a QoS marking dialog at the interconnection point, but in a world where 3GPP has defined close to 30 traffic types, it seems that there is still a need for us (IETF) to propose a way to express these intents into Diffserv.

We are looking forward to receiving additional feedback on this version.

Best

Jerome