Re: [tsvwg] path forward on L4S issue #16
Ruediger.Geib@telekom.de Mon, 22 June 2020 06:11 UTC
Return-Path: <Ruediger.Geib@telekom.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 85E363A095C for <tsvwg@ietfa.amsl.com>; Sun, 21 Jun 2020 23:11:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=telekom.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s6GmHlbXrxUm for <tsvwg@ietfa.amsl.com>; Sun, 21 Jun 2020 23:11:16 -0700 (PDT)
Received: from mailout41.telekom.de (mailout41.telekom.de [194.25.225.151]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C3E523A0959 for <tsvwg@ietf.org>; Sun, 21 Jun 2020 23:11:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telekom.de; i=@telekom.de; q=dns/txt; s=dtag1; t=1592806276; x=1624342276; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=jPc/rh0wfqqHfrry0uLLYAB6yWR9E458xF1ovh32K6Q=; b=CnB9zekjzCeLl6ETK0trMz8NLDPvfkG7dZTlOZ/Y6V5WFUARno4y3KZN bh6t/dGSoXHrdxNkAqiwlE5DNT+c8I+UfG/u8ma+GhZHzCGIVCTOvj27o /NjiydVfA+8oU1HKELdvd4NPu90X+p4fDvVzGTXkB/kr+bNAGYWbfmNrY KcoaLXU74aXVJYKKTlAk/MHpNwi4njkYZwGn3vS0r2IDr1659eaEH+wby l+tdPVslcSgXnZ+kw1SHIUVWdbxcQEDBlRLxlnS8Agoym8FmW0VjcPN1a XwOoQxQIPLosn3Gv3TYevbtbLE1a75oToJvlZwHeU5CNNEaFT+HOIYJYW w==;
IronPort-SDR: 8cR1S60zZIfJaJ15Wt+1QK0EzWgKS8rgw1RhuuUzy5KtGsaM/ka/mm+gDgke5ucEaEUHgp9Cpj Av+WRl8r/MAg==
Received: from qdefcs.de.t-internal.com ([10.171.254.41]) by MAILOUT41.dmznet.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Jun 2020 08:11:13 +0200
IronPort-SDR: 1IUJLYsLoIgAaVh+WSquHVpr5kBbQ0VTti/cA9M+5uH44x/VP541ZGwqURKKs4pGnIE+xbVkd8 Be2EqMe1gdOQ==
X-IronPort-AV: E=Sophos;i="5.69,256,1571695200"; d="scan'208";a="140906075"
X-MGA-submission: MDF5xP2OQylDc+ZqQ363rvhYgbIFlhx0knfq/4gDBL8fPPJtqbBvYIGvBuIiNAUlsSiTWAyPVSlv6TjOGALOZdBfiYA9/n74h2ZhhIdqFgShseQsowQHxWWKAPUCWJQYNKAB9Fcu388PfLOZPtGPwv2StKNbhxvVFML/aJSI66gQmw==
Received: from he105715.emea1.cds.t-internal.com ([10.169.118.51]) by QDEFCV.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES256-SHA384; 22 Jun 2020 08:11:12 +0200
Received: from HE105712.EMEA1.cds.t-internal.com (10.169.118.43) by HE105715.emea1.cds.t-internal.com (10.169.118.51) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 22 Jun 2020 08:11:12 +0200
Received: from HE106564.emea1.cds.t-internal.com (10.171.40.16) by HE105712.EMEA1.cds.t-internal.com (10.169.118.43) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Mon, 22 Jun 2020 08:11:12 +0200
Received: from GER01-LEJ-obe.outbound.protection.outlook.de (51.5.80.22) by O365mail01.telekom.de (172.30.0.234) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 22 Jun 2020 08:11:09 +0200
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BAL5jWxKifH3shnnFk1humgpG4LVhrAl8SdXFvmEa23BLGxzJ9aNtxTiPa3fzbCEOdddkvjlhbQ5iAkekDS9zME9H8DZ0scAlUYnm3qulSQD6EBcP+/ArrYGLkl5GLy+IslPkDljt/d2UocZEpZOns+NoW2L4dmlzwVtXDYki0je5lUUJDPC9d2p7S9jvGXvmhP/6VoBhoZ2Mz3PNFhtsN9mHBTpTcsYIdM608MpvYPC2Eh1ztVhSIItGdMcTZBeYfkASUMV2k/tMTCE+TXKDtvllK8oV7ykwDvHemRasGMETH29NZ/ms+ApaJjEvKOVIaSnEGbZPKRbQWrE3oosgw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jPc/rh0wfqqHfrry0uLLYAB6yWR9E458xF1ovh32K6Q=; b=Pe2mVVWW13J8g+Et1G6SM24NYx2+QFPXTwLTkrclScAwWOi3E/JBV5x0ebN1EIFTIkwHfs5++L+mFYOnk+loUxGg3b9kMsqwJHD2FbEttbOpIfPIcmYflIPhOw3inucDSo4OLLkTWSjopSFG+YzruAmG+Ob/d+VncHvGnsX6EAA5NSKvOU3WT20P9wVfZpGu3jmNCPP1Z0AeeBAFnV87qKW7Ep7rSTB/LIFDu7rQ5PzNj0A4SLWUWZjMjsIUmUF0NqKoj9g1UqAyzE6Q+/4tV3Rc6lXM6cQLoatLH+TYoGhzNhRU/wJmNXteduCb5Gaxq2YWb6hTHN8y8XBGJZrfVQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telekom.de; dmarc=pass action=none header.from=telekom.de; dkim=pass header.d=telekom.de; arc=none
Received: from LEXPR01MB1040.DEUPRD01.PROD.OUTLOOK.DE (2a01:4180:c013:10::18) by LEXPR01MB0095.DEUPRD01.PROD.OUTLOOK.DE (2a01:4180:c013:5::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3109.25; Mon, 22 Jun 2020 06:11:11 +0000
Received: from LEXPR01MB1040.DEUPRD01.PROD.OUTLOOK.DE ([fe80::9570:5376:d64e:6584]) by LEXPR01MB1040.DEUPRD01.PROD.OUTLOOK.DE ([fe80::9570:5376:d64e:6584%8]) with mapi id 15.20.3109.027; Mon, 22 Jun 2020 06:11:11 +0000
From: Ruediger.Geib@telekom.de
To: jholland=40akamai.com@dmarc.ietf.org
CC: tsvwg@ietf.org
Thread-Topic: [tsvwg] path forward on L4S issue #16
Thread-Index: AQHWRqLCyOK2wGIJB0aB6/XgSAV9JqjkJ4ig
Date: Mon, 22 Jun 2020 06:11:11 +0000
Message-ID: <LEXPR01MB1040256CB204EB5149D5EE5B9C970@LEXPR01MB1040.DEUPRD01.PROD.OUTLOOK.DE>
References: <8a8947e1-f852-c489-c85a-be874039f132@mti-systems.com> <CCF60E29-276F-45AA-8045-D14DFE44CDBE@akamai.com>
In-Reply-To: <CCF60E29-276F-45AA-8045-D14DFE44CDBE@akamai.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dmarc.ietf.org; dkim=none (message not signed) header.d=none;dmarc.ietf.org; dmarc=none action=none header.from=telekom.de;
x-originating-ip: [164.19.3.109]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6acdf15a-c5ad-4a83-2cb7-08d816730fa5
x-ms-traffictypediagnostic: LEXPR01MB0095:
x-microsoft-antispam-prvs: <LEXPR01MB0095BD79EC1C677758813A1F9C970@LEXPR01MB0095.DEUPRD01.PROD.OUTLOOK.DE>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0442E569BC
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: pXra1iFKq5wE90uj33xo8Oxb9IQlB8BNPG1VWVxjKA0cU98nxd1y2zuwAaVPr0G/3IY7ufluHVL/BTTgmb2SUamMP9vJUPgHV6du4z8bXFbglCHAPcjopDHdMJGENBa+EOZJ9dqLxf+7LpXDw+iDjPF6d6FPvxdD0BbW838ziu5JKvvRAdBF+cTKKz7Rym7ch0z5+Q/SaJY8ACNrVVAGT+5Wnu+RvKlmEj9scMlqcopiIlCHxEm5AWU4DUTyT37xl2ncH9Bv4grXI7ADPgMNEHH9Pa8OBIPTJS+zGL8AxOE1IXzfFnTVZ8TB3AjYeCerGKwFLqrdE4CsV1DQ30ceHfgoPiiPV+nmAi4lHjLSLXZXFz3uh3L8aXbJIEWkQYb9Dkfxp/k0rj/gdOzsaFHwlSvPwmzLeXMpVDnebmpJeJg=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:LEXPR01MB1040.DEUPRD01.PROD.OUTLOOK.DE; PTR:; CAT:NONE; SFTY:; SFS:(366004)(346002)(136003)(376002)(39860400002)(396003)(86362001)(33656002)(85202003)(66574015)(55016002)(83380400001)(9686003)(186003)(5660300002)(26005)(316002)(966005)(8936002)(85182001)(30864003)(53546011)(7696005)(66946007)(4326008)(76116006)(71200400001)(2906002)(8676002)(66446008)(64756008)(66556008)(66476007)(478600001)(777600001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: DxrR8frt7JbAs7sy9lwvkntDozPxfJlxqOdwe82KzmJWnj5ibhyiDtZSCwCXwAYgZXksSl9nMfWR2LN5BX+Dzcc+Du0wvyxBM96QPuNF028BryzYFm7wJf5+eyXrILZtMERW+TfTpjh2BdtEzgt1bKgzuD9wE8LPZu+tH3HV0l6Dqf/VUz2hft8XOM8oWt03XR8Runau3nfiXiH0Hva4DtTMQnoGvEMHdw1Z92FLYlAlwGnl3783KujBCDG3M7Zd+34KwelV0kwvQO11+rfJiRuQDTBzy7lQHM1toEyIvYmjWDpuiXG51WEbZ/r+AEmuVAN3+zq/V9Wixo0DO/KUDykDm9/3NvTjis1aS/IveH1xv+iXxfMlW7Nth0cOnQvfXAkTPtP7IFsV9UzyvhnbrYt7wlpoW54aHrKmRtsZ5ZBlXauaqcdspvSJcc3geoaxZ2D8++sEL/gOVIJ1LOuhFR5h9thX0CszWScgBje6aD8=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 6acdf15a-c5ad-4a83-2cb7-08d816730fa5
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jun 2020 06:11:11.1388 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bde4dffc-4b60-4cf6-8b04-a5eeb25f5c4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: m2rDhvsfCD+BPJgEsC+vX6V0u0lGxUEQnVuF6P0BXBgnpfWr9cgBkHxRzynEvKwSV9ZaEVl+hAjQZ5kr4uBrCkcjhP73kJPXAvYnRkHPs5k=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: LEXPR01MB0095
X-TM-SNTS-SMTP: B48EE741725148EFD2846A2070B6373AA592FEBF3A6ED663894B56956229C9BB2000:8
X-OriginatorOrg: telekom.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/7-ucCrH6G2cm5xFgmem5-RGLSWk>
Subject: Re: [tsvwg] path forward on L4S issue #16
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Jun 2020 06:11:19 -0000
Hi Jake, thanks for your ongoing, constructive and to me big effort on ECN deployment. Professionally, I'm not involved in access and application related queue- and congestion management. So it's hard for me to contribute. As an individual, I like your address proposal though. That sounds as if one could also use "alto" mechanisms (you mention an API and I only have a very rough idea, what alto does, so I may be wrong). Regards, Ruediger -----Ursprüngliche Nachricht----- Von: tsvwg <tsvwg-bounces@ietf.org> Im Auftrag von Holland, Jake Gesendet: Samstag, 20. Juni 2020 03:33 An: wes@mti-systems.com; tsvwg@ietf.org Betreff: Re: [tsvwg] path forward on L4S issue #16 Hi Wes and tsvwg, On 6/4/20, 1:54 PM, "Wesley Eddy" <wes@mti-systems.com> wrote: > I think we should discuss the path forward on L4S issue #16 and what > people are working on, planning to do, or expecting to see in this regard. > > This is the issue on interaction with RFC 3168 ECN AQMs in the network. > > I think this is one of the more important ones in many recent > discussions, so would like to make sure we're agreeing on what it will > take to complete or what success will look like. > > The classic bottleneck detection work is a key part of this. ...(snip)... I think a few other ideas have also been floated, so I'd ask to include those proposals as invited parts of the discussion as well. This thread seemed like it had a lot of branches and was kind of hard to follow in places, so I thought I'd compile a list of the proposed paths forward that I've seen. I'm not sure I got everything (please respond if anybody knows another suggestion that was left out). So in hopes it's useful, here's my list (in no particular order): 1. a robust classic bottleneck detection mechanism 2. Changing L4S to use a 2-signal approach, using ECT(1)->ECT(0) for the 1/p signal and ECT(1|0)->CE as a 1/sqrt(p) signal. 3. a flag day to deprecate ECT(1)->CE marking by classic queues (instead treating ECT(1) as NECT if no non-3168 meaning is implemented). 4. operational considerations to recommend changing ECT(1) to NECT at ingress to networks that have marking classic queues deployed 5. operational considerations to recommend policing strategies that can solve the general case of non-compliant traffic that does not respond with the expected backoff to AQM congestion signaling. I'll make another new suggestion now: 6. An experiment-linked public whitelist of participant-registered IP ranges that have a L4S compatible dualq in their reachability path at the likely bottleneck, which would be checked by endpoints before negotiating L4S. To add some of my own color commentary on these: 1. a robust classic bottleneck detection mechanism a. AFAICT this is still the method preferred by the L4S authors. b. There's been some discussion about how technically feasible this goal is, and also what level of "robust" is necessary. c. I'll respectfully suggest that we as a WG should ideally have at least one solid backup plan, in case this approach proves hard to reach consensus. 2. Changing L4S to use a 2-signal approach, using ECT(1)->ECT(0) for the 1/p signal and ECT(1|0)->CE as a 1/sqrt(p) signal. a. a few people seemed interested in considering this, but several objections were raised, chiefly (IIRC): i. late out of order packets from chained loaded dualqs, and the corresponding spurious retransmissions (with a side note that this problem worsens as dualq deployment increases) ii. loss of the 1/p signal with RFC 6040 tunnel decapsulation, and a corresponding limited scope initially, with a long slow path (including standards actions) to get to ubiquitous deployment iii. discards the long-term L4S goal of reclaiming ECT(0) for other purposes iv. doesn't match the desired timeline for experimental deployment by those who have engaged with the L4S work. (I'm not sure any of the proposed paths forward will satisfy this objection, but IIRC this one was specifically raised in response to the 2-signal proposal.) 3. a flag day to deprecate ECT(1)->CE marking by classic queues (instead treating ECT(1) as NECT if no non-3168 meaning is implemented). a. Interestingly, the scope of this approach seems to track on the same questions as the "how important is a robust classic queue detection" question in #1.b, because they both depend on the current and in-flight deployment footprint for CE-marking classic queues. If robustness is not very important, then it's because classic queue deployment is low, so a flag day would be a low-touch event. And if a flag day would be a major lift with a lot of work for operators, then good robustness would likewise be very important if not doing a flag day. b. However, this presumably requires an update to RFC 3168, and I'm not sure whether there's a well-established process for organizing an event like this. Obviously the outreach effort is much higher than if e.g. option #1 or 2 turned out to be feasible to get working well enough to satisfy rough consensus. 4. operational considerations to recommend changing ECT(1) to NECT at ingress to networks that have marking classic queues deployed. a. Note that these considerations are for networks NOT participating in the L4S experiment, so they can't easily be folded into L4S-specific operational considerations. b. This seems to me most appropriate as an add-on of a fallback position during the #3 (flag day), where classic queues can't be reconfigured to treat ECT(1) as NECT. But I left it as a separate point because it was proposed independently, and maybe there's an argument that only networks that experience a problem would need to do this and could do it as a post-hoc fix when problems are encountered, rather than pre-arranging it with a flag day and the associated proactive outreach it would need. (to be clear: I am currently against that position, but I acknowledge I might be in the rough when consensus is checked) 5. operational considerations to recommend policing strategies that can solve the general case of non-compliant traffic that does not respond with the expected backoff to AQM congestion signaling. a. Arguably this should be done regardless of L4S, because it seems like an underdeveloped piece of the puzzle for the general problem of active queue management in network devices. However, solving this well and getting solutions widely deployed or at least available (or somehow deployed in conjunction with L4S endpoint enablement) could also potentially address issue 16. b. There are many possible strategies here, so outlining some of the known ones maybe seems worthwhile. A few examples that spring to mind: i. FQ ii. PPV (http://ppv.elte.hu/), as we saw in ICCRG 104 from Szilveszter Nadas, seems to have a lot of promise here iii. Likewise the work trying to solve a similar problem written up in "Fair Resource Sharing for Stateless-Core Packet-Switched Networks With Prioritization" by Michael Menth and Nikolas Zeitler (https://ieeexplore.ieee.org/document/8419697) iv. There's also some good insights along these lines in the "Rationale" section of the docsis queue protection scheme doc: https://tools.ietf.org/html/draft-briscoe-docsis-q-protection-00#section-5 It says the same approach could be used in scenarios beyond dualq, and I think there's some applicability to codel or pie, with or without ECN. v. Perhaps some generic guidelines that captures what many of these have in common--in general a policing response could be based on sampled monitoring (not necessarily integrated closely with the queues) that maintains stats on the top current and recent senders, and blacklists or downgrades their traffic for some time in response to a large enough standing queue, or overflow of an AQM. (On the grounds that someone here is non-compliant since it exceeded expected operational bounds, and thus at least the highest volume recent senders have presumably failed to back off appropriately.) A BCP that lists these (and maybe other options) and captures a more generalized version of the advice from docsis-q-protection seems likely helpful here. c. Also worth noting: the need for some kind of isolation for non-compliant senders is not inherently an ECN-related (nor L4S-related) problem--there's no forced reason that a sender necessarily has to respond to loss either... 6. An experiment-linked public whitelist of participant-registered IP ranges that have a L4S compatible dualq in their reachability path at the likely bottleneck, which would be checked by endpoints before negotiating L4S. a. to flesh the idea out a bit, I'm imagining this as a web API with a known URL and a database attached, which is documented and maintained as part of the L4S experiment, where experiment participants who have deployed and enabled dualq-capable devices register the applicable IP ranges, and L4S-capable endpoints query the web API before opening connections, so that they avoid negotiating L4S support except when either inside a network with a registered dualq, or when connecting to a remote endpoint that's inside such a network, caching the answers for ~10-30 minutes (or according to http headers in the web api or something) b. This would let innocent bystander 3168 traffic operate unmolested at access bottlenecks while gaining live operational experience with L4S. c. If the rapid ubiquitous rollout goes as planned according to the L4S project intent, once the dualq devices are far more prevalent than classic ECN queues and widely available on all the bandwidth-shaping access technologies and the non-experiment participants are predominantly not doing any classic marking, the whitelist could be gradually retired, or turned into a blacklist of L4S on IPs that are known to have problems with legacy systems that haven't been upgraded (which can be discovered by gradually enabling L4S on non-participant paths, perhaps with A/B tests, and following up with those networks to ask afterward whether it caused problems) d. This approach is of course operationally awkward and not a good long-term solution, and also comes with potential privacy concerns as the deployment grows, but would allow for forward progress on L4S without fixing the underlying incompatibility problem with the CE ambiguity, so that time and an ongoing outreach effort could have a chance to resolve the classic ECN deployment footprint questions. This also allows for some amount of targeted experimentation with the classic queue detection work. (Of these, it's maybe interesting to note that only 1, 2, and 6 do not seem to require a standards or BCP action, which IIRC was originally meant to be out of scope for the L4S work, outside of 8311.) As far as the original "working on, planning to do, or expecting to see" question: I guess I'm expecting to see at some point the results from what the L4S team is doing on the detection mechanisms. But I remain not very hopeful they will address all the concerns that have been raised, so I'm hoping it'll be coupled with a credible outreach effort that seems likely to reach all the networks that have deployed or are in-process of deploying shared classic queues, at the very least. I'm not sure about "expecting", but I'd also be very much in favor of seeing some sort of approval-style poll conducted (maybe with a preference weighting or rank ordering or something) of what the WG members think of the technical viability of the different proposed approaches, so that people can have a better idea of what others think sound like promising directions. Outside that, I'd personally love to see further discussion on these or other ideas, but maybe forking the thread into different threads for the different proposals, to better avoid the confusion I've been feeling trying to find the prior links to the preceding messages on this monster (I eventually gave up). I regret that I don't currently have much to offer on the "working on" or "planning to do" front, being rather busy right now with a few other challenging problems. But I am supportive of efforts to improve internet latency. Especially those aimed at increasing the deployment (and enablement) of the currently available 3168 AQMs and the increased default use of 3168 ECN by more endpoint stacks, since that would have a useful impact on application level latency in TCP connections right away. When I see good opportunities and I'm able, I'll aim to make minor contributions to latency-related efforts or do things like minor testing support when possible. So anyone engaging in that kind of thing, please do keep the wg (or at least me) posted on progress and any opportunities to provide useful low-effort support. I can spend a day on this kind of thing every once in a while (tho sadly, not necessarily every time it might be useful), but I can't spend weeks at a time. That's probably true for the near forseeable future. Best regards, Jake
- [tsvwg] path forward on L4S issue #16 Wesley Eddy
- Re: [tsvwg] path forward on L4S issue #16 Black, David
- [tsvwg] FW: path forward on L4S issue #16 Black, David
- Re: [tsvwg] FW: path forward on L4S issue #16 Jonathan Morton
- Re: [tsvwg] path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] FW: path forward on L4S issue #16 Steven Blake
- [tsvwg] Options for improving L4S safety alex.burr@ealdwulf.org.uk
- Re: [tsvwg] Options for improving L4S safety Jonathan Morton
- Re: [tsvwg] FW: path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] path forward on L4S issue #16 Jonathan Morton
- Re: [tsvwg] path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] path forward on L4S issue #16 Sebastian Moeller
- Re: [tsvwg] path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] path forward on L4S issue #16 Sebastian Moeller
- Re: [tsvwg] path forward on L4S issue #16 Jonathan Morton
- Re: [tsvwg] path forward on L4S issue #16 Rodney W. Grimes
- Re: [tsvwg] path forward on L4S issue #16 Sebastian Moeller
- Re: [tsvwg] path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] path forward on L4S issue #16 Sebastian Moeller
- Re: [tsvwg] path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] path forward on L4S issue #16 Sebastian Moeller
- Re: [tsvwg] path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] path forward on L4S issue #16 Jonathan Morton
- Re: [tsvwg] path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] path forward on L4S issue #16 Sebastian Moeller
- Re: [tsvwg] path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] path forward on L4S issue #16 Rodney W. Grimes
- Re: [tsvwg] path forward on L4S issue #16 Sebastian Moeller
- Re: [tsvwg] path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] path forward on L4S issue #16 Sebastian Moeller
- Re: [tsvwg] path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] path forward on L4S issue #16 Sebastian Moeller
- Re: [tsvwg] path forward on L4S issue #16 Jonathan Morton
- Re: [tsvwg] path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] path forward on L4S issue #16 Spencer Dawkins at IETF
- Re: [tsvwg] path forward on L4S issue #16 Holland, Jake
- Re: [tsvwg] path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] path forward on L4S issue #16 Sebastian Moeller
- Re: [tsvwg] path forward on L4S issue #16 Jonathan Morton
- Re: [tsvwg] path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] path forward on L4S issue #16 Sebastian Moeller
- Re: [tsvwg] path forward on L4S issue #16 Rodney W. Grimes
- Re: [tsvwg] path forward on L4S issue #16 Wesley Eddy
- Re: [tsvwg] path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] path forward on L4S issue #16 Jonathan Morton
- Re: [tsvwg] path forward on L4S issue #16 Sebastian Moeller
- Re: [tsvwg] path forward on L4S issue #16 Black, David
- Re: [tsvwg] path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] path forward on L4S issue #16 Sebastian Moeller
- Re: [tsvwg] path forward on L4S issue #16 Sebastian Moeller
- Re: [tsvwg] path forward on L4S issue #16 Wesley Eddy
- Re: [tsvwg] path forward on L4S issue #16 Paul Vixie
- Re: [tsvwg] path forward on L4S issue #16 Wesley Eddy
- Re: [tsvwg] path forward on L4S issue #16 Holland, Jake
- Re: [tsvwg] path forward on L4S issue #16 Ingemar Johansson S
- Re: [tsvwg] path forward on L4S issue #16 Sebastian Moeller
- Re: [tsvwg] path forward on L4S issue #16 Sebastian Moeller
- Re: [tsvwg] path forward on L4S issue #16 Jonathan Morton
- Re: [tsvwg] path forward on L4S issue #16 Sebastian Moeller
- Re: [tsvwg] path forward on L4S issue #16 Holland, Jake
- Re: [tsvwg] path forward on L4S issue #16 Rodney W. Grimes
- Re: [tsvwg] path forward on L4S issue #16 Ruediger.Geib
- Re: [tsvwg] path forward on L4S issue #16 Scharf, Michael
- Re: [tsvwg] path forward on L4S issue #16 Wesley Eddy
- Re: [tsvwg] path forward on L4S issue #16 Wesley Eddy
- Re: [tsvwg] path forward on L4S issue #16 Martin Duke
- Re: [tsvwg] path forward on L4S issue #16 Holland, Jake
- Re: [tsvwg] path forward on L4S issue #16 Rodney W. Grimes
- Re: [tsvwg] path forward on L4S issue #16 Wesley Eddy
- Re: [tsvwg] path forward on L4S issue #16 Sebastian Moeller