Re: [tsvwg] path forward on L4S issue #16

Ruediger.Geib@telekom.de Mon, 22 June 2020 06:11 UTC

Return-Path: <Ruediger.Geib@telekom.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 85E363A095C for <tsvwg@ietfa.amsl.com>; Sun, 21 Jun 2020 23:11:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=telekom.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s6GmHlbXrxUm for <tsvwg@ietfa.amsl.com>; Sun, 21 Jun 2020 23:11:16 -0700 (PDT)
Received: from mailout41.telekom.de (mailout41.telekom.de [194.25.225.151]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C3E523A0959 for <tsvwg@ietf.org>; Sun, 21 Jun 2020 23:11:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telekom.de; i=@telekom.de; q=dns/txt; s=dtag1; t=1592806276; x=1624342276; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=jPc/rh0wfqqHfrry0uLLYAB6yWR9E458xF1ovh32K6Q=; b=CnB9zekjzCeLl6ETK0trMz8NLDPvfkG7dZTlOZ/Y6V5WFUARno4y3KZN bh6t/dGSoXHrdxNkAqiwlE5DNT+c8I+UfG/u8ma+GhZHzCGIVCTOvj27o /NjiydVfA+8oU1HKELdvd4NPu90X+p4fDvVzGTXkB/kr+bNAGYWbfmNrY KcoaLXU74aXVJYKKTlAk/MHpNwi4njkYZwGn3vS0r2IDr1659eaEH+wby l+tdPVslcSgXnZ+kw1SHIUVWdbxcQEDBlRLxlnS8Agoym8FmW0VjcPN1a XwOoQxQIPLosn3Gv3TYevbtbLE1a75oToJvlZwHeU5CNNEaFT+HOIYJYW w==;
IronPort-SDR: 8cR1S60zZIfJaJ15Wt+1QK0EzWgKS8rgw1RhuuUzy5KtGsaM/ka/mm+gDgke5ucEaEUHgp9Cpj Av+WRl8r/MAg==
Received: from qdefcs.de.t-internal.com ([10.171.254.41]) by MAILOUT41.dmznet.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Jun 2020 08:11:13 +0200
IronPort-SDR: 1IUJLYsLoIgAaVh+WSquHVpr5kBbQ0VTti/cA9M+5uH44x/VP541ZGwqURKKs4pGnIE+xbVkd8 Be2EqMe1gdOQ==
X-IronPort-AV: E=Sophos;i="5.69,256,1571695200"; d="scan'208";a="140906075"
X-MGA-submission: MDF5xP2OQylDc+ZqQ363rvhYgbIFlhx0knfq/4gDBL8fPPJtqbBvYIGvBuIiNAUlsSiTWAyPVSlv6TjOGALOZdBfiYA9/n74h2ZhhIdqFgShseQsowQHxWWKAPUCWJQYNKAB9Fcu388PfLOZPtGPwv2StKNbhxvVFML/aJSI66gQmw==
Received: from he105715.emea1.cds.t-internal.com ([10.169.118.51]) by QDEFCV.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES256-SHA384; 22 Jun 2020 08:11:12 +0200
Received: from HE105712.EMEA1.cds.t-internal.com (10.169.118.43) by HE105715.emea1.cds.t-internal.com (10.169.118.51) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 22 Jun 2020 08:11:12 +0200
Received: from HE106564.emea1.cds.t-internal.com (10.171.40.16) by HE105712.EMEA1.cds.t-internal.com (10.169.118.43) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Mon, 22 Jun 2020 08:11:12 +0200
Received: from GER01-LEJ-obe.outbound.protection.outlook.de (51.5.80.22) by O365mail01.telekom.de (172.30.0.234) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 22 Jun 2020 08:11:09 +0200
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BAL5jWxKifH3shnnFk1humgpG4LVhrAl8SdXFvmEa23BLGxzJ9aNtxTiPa3fzbCEOdddkvjlhbQ5iAkekDS9zME9H8DZ0scAlUYnm3qulSQD6EBcP+/ArrYGLkl5GLy+IslPkDljt/d2UocZEpZOns+NoW2L4dmlzwVtXDYki0je5lUUJDPC9d2p7S9jvGXvmhP/6VoBhoZ2Mz3PNFhtsN9mHBTpTcsYIdM608MpvYPC2Eh1ztVhSIItGdMcTZBeYfkASUMV2k/tMTCE+TXKDtvllK8oV7ykwDvHemRasGMETH29NZ/ms+ApaJjEvKOVIaSnEGbZPKRbQWrE3oosgw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jPc/rh0wfqqHfrry0uLLYAB6yWR9E458xF1ovh32K6Q=; b=Pe2mVVWW13J8g+Et1G6SM24NYx2+QFPXTwLTkrclScAwWOi3E/JBV5x0ebN1EIFTIkwHfs5++L+mFYOnk+loUxGg3b9kMsqwJHD2FbEttbOpIfPIcmYflIPhOw3inucDSo4OLLkTWSjopSFG+YzruAmG+Ob/d+VncHvGnsX6EAA5NSKvOU3WT20P9wVfZpGu3jmNCPP1Z0AeeBAFnV87qKW7Ep7rSTB/LIFDu7rQ5PzNj0A4SLWUWZjMjsIUmUF0NqKoj9g1UqAyzE6Q+/4tV3Rc6lXM6cQLoatLH+TYoGhzNhRU/wJmNXteduCb5Gaxq2YWb6hTHN8y8XBGJZrfVQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telekom.de; dmarc=pass action=none header.from=telekom.de; dkim=pass header.d=telekom.de; arc=none
Received: from LEXPR01MB1040.DEUPRD01.PROD.OUTLOOK.DE (2a01:4180:c013:10::18) by LEXPR01MB0095.DEUPRD01.PROD.OUTLOOK.DE (2a01:4180:c013:5::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3109.25; Mon, 22 Jun 2020 06:11:11 +0000
Received: from LEXPR01MB1040.DEUPRD01.PROD.OUTLOOK.DE ([fe80::9570:5376:d64e:6584]) by LEXPR01MB1040.DEUPRD01.PROD.OUTLOOK.DE ([fe80::9570:5376:d64e:6584%8]) with mapi id 15.20.3109.027; Mon, 22 Jun 2020 06:11:11 +0000
From: Ruediger.Geib@telekom.de
To: jholland=40akamai.com@dmarc.ietf.org
CC: tsvwg@ietf.org
Thread-Topic: [tsvwg] path forward on L4S issue #16
Thread-Index: AQHWRqLCyOK2wGIJB0aB6/XgSAV9JqjkJ4ig
Date: Mon, 22 Jun 2020 06:11:11 +0000
Message-ID: <LEXPR01MB1040256CB204EB5149D5EE5B9C970@LEXPR01MB1040.DEUPRD01.PROD.OUTLOOK.DE>
References: <8a8947e1-f852-c489-c85a-be874039f132@mti-systems.com> <CCF60E29-276F-45AA-8045-D14DFE44CDBE@akamai.com>
In-Reply-To: <CCF60E29-276F-45AA-8045-D14DFE44CDBE@akamai.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dmarc.ietf.org; dkim=none (message not signed) header.d=none;dmarc.ietf.org; dmarc=none action=none header.from=telekom.de;
x-originating-ip: [164.19.3.109]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6acdf15a-c5ad-4a83-2cb7-08d816730fa5
x-ms-traffictypediagnostic: LEXPR01MB0095:
x-microsoft-antispam-prvs: <LEXPR01MB0095BD79EC1C677758813A1F9C970@LEXPR01MB0095.DEUPRD01.PROD.OUTLOOK.DE>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0442E569BC
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: pXra1iFKq5wE90uj33xo8Oxb9IQlB8BNPG1VWVxjKA0cU98nxd1y2zuwAaVPr0G/3IY7ufluHVL/BTTgmb2SUamMP9vJUPgHV6du4z8bXFbglCHAPcjopDHdMJGENBa+EOZJ9dqLxf+7LpXDw+iDjPF6d6FPvxdD0BbW838ziu5JKvvRAdBF+cTKKz7Rym7ch0z5+Q/SaJY8ACNrVVAGT+5Wnu+RvKlmEj9scMlqcopiIlCHxEm5AWU4DUTyT37xl2ncH9Bv4grXI7ADPgMNEHH9Pa8OBIPTJS+zGL8AxOE1IXzfFnTVZ8TB3AjYeCerGKwFLqrdE4CsV1DQ30ceHfgoPiiPV+nmAi4lHjLSLXZXFz3uh3L8aXbJIEWkQYb9Dkfxp/k0rj/gdOzsaFHwlSvPwmzLeXMpVDnebmpJeJg=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:LEXPR01MB1040.DEUPRD01.PROD.OUTLOOK.DE; PTR:; CAT:NONE; SFTY:; SFS:(366004)(346002)(136003)(376002)(39860400002)(396003)(86362001)(33656002)(85202003)(66574015)(55016002)(83380400001)(9686003)(186003)(5660300002)(26005)(316002)(966005)(8936002)(85182001)(30864003)(53546011)(7696005)(66946007)(4326008)(76116006)(71200400001)(2906002)(8676002)(66446008)(64756008)(66556008)(66476007)(478600001)(777600001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: DxrR8frt7JbAs7sy9lwvkntDozPxfJlxqOdwe82KzmJWnj5ibhyiDtZSCwCXwAYgZXksSl9nMfWR2LN5BX+Dzcc+Du0wvyxBM96QPuNF028BryzYFm7wJf5+eyXrILZtMERW+TfTpjh2BdtEzgt1bKgzuD9wE8LPZu+tH3HV0l6Dqf/VUz2hft8XOM8oWt03XR8Runau3nfiXiH0Hva4DtTMQnoGvEMHdw1Z92FLYlAlwGnl3783KujBCDG3M7Zd+34KwelV0kwvQO11+rfJiRuQDTBzy7lQHM1toEyIvYmjWDpuiXG51WEbZ/r+AEmuVAN3+zq/V9Wixo0DO/KUDykDm9/3NvTjis1aS/IveH1xv+iXxfMlW7Nth0cOnQvfXAkTPtP7IFsV9UzyvhnbrYt7wlpoW54aHrKmRtsZ5ZBlXauaqcdspvSJcc3geoaxZ2D8++sEL/gOVIJ1LOuhFR5h9thX0CszWScgBje6aD8=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 6acdf15a-c5ad-4a83-2cb7-08d816730fa5
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jun 2020 06:11:11.1388 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bde4dffc-4b60-4cf6-8b04-a5eeb25f5c4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: m2rDhvsfCD+BPJgEsC+vX6V0u0lGxUEQnVuF6P0BXBgnpfWr9cgBkHxRzynEvKwSV9ZaEVl+hAjQZ5kr4uBrCkcjhP73kJPXAvYnRkHPs5k=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: LEXPR01MB0095
X-TM-SNTS-SMTP: B48EE741725148EFD2846A2070B6373AA592FEBF3A6ED663894B56956229C9BB2000:8
X-OriginatorOrg: telekom.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/7-ucCrH6G2cm5xFgmem5-RGLSWk>
Subject: Re: [tsvwg] path forward on L4S issue #16
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Jun 2020 06:11:19 -0000

Hi Jake,

thanks for your ongoing, constructive and to me big effort on ECN deployment.

Professionally, I'm not involved in access and application related queue- and congestion management. So it's hard for me to contribute. As an individual, I like your address proposal though. That sounds as if one could also use "alto" mechanisms (you mention an API and I only have a very rough idea, what alto does, so I may be wrong).

Regards,

Ruediger


-----Ursprüngliche Nachricht-----
Von: tsvwg <tsvwg-bounces@ietf.org> Im Auftrag von Holland, Jake
Gesendet: Samstag, 20. Juni 2020 03:33
An: wes@mti-systems.com; tsvwg@ietf.org
Betreff: Re: [tsvwg] path forward on L4S issue #16

Hi Wes and tsvwg,

On 6/4/20, 1:54 PM, "Wesley Eddy" <wes@mti-systems.com> wrote:
> I think we should discuss the path forward on L4S issue #16 and what 
> people are working on, planning to do, or expecting to see in this regard.
>
> This is the issue on interaction with RFC 3168 ECN AQMs in the network.
> 
> I think this is one of the more important ones in many recent 
> discussions, so would like to make sure we're agreeing on what it will 
> take to complete or what success will look like.
>
> The classic bottleneck detection work is a key part of this.
...(snip)...

I think a few other ideas have also been floated, so I'd ask to include those proposals as invited parts of the discussion as well.

This thread seemed like it had a lot of branches and was kind of hard to follow in places, so I thought I'd compile a list of the proposed paths forward that I've seen.  I'm not sure I got everything (please respond if anybody knows another suggestion that was left out).

So in hopes it's useful, here's my list (in no particular order):

1. a robust classic bottleneck detection mechanism

2. Changing L4S to use a 2-signal approach, using ECT(1)->ECT(0) for
   the 1/p signal and ECT(1|0)->CE as a 1/sqrt(p) signal.

3. a flag day to deprecate ECT(1)->CE marking by classic queues (instead
   treating ECT(1) as NECT if no non-3168 meaning is implemented).

4. operational considerations to recommend changing ECT(1) to NECT at
   ingress to networks that have marking classic queues deployed

5. operational considerations to recommend policing strategies that can
   solve the general case of non-compliant traffic that does not respond
   with the expected backoff to AQM congestion signaling.

I'll make another new suggestion now:

6. An experiment-linked public whitelist of participant-registered IP
   ranges that have a L4S compatible dualq in their reachability path at
   the likely bottleneck, which would be checked by endpoints before
   negotiating L4S.


To add some of my own color commentary on these:

1. a robust classic bottleneck detection mechanism a. AFAICT this is still the method preferred by the L4S authors.
b. There's been some discussion about how technically feasible this
   goal is, and also what level of "robust" is necessary.
c. I'll respectfully suggest that we as a WG should ideally have at least
   one solid backup plan, in case this approach proves hard to reach
   consensus.

2. Changing L4S to use a 2-signal approach, using ECT(1)->ECT(0) for
   the 1/p signal and ECT(1|0)->CE as a 1/sqrt(p) signal.
a. a few people seemed interested in considering this, but several
   objections were raised, chiefly (IIRC):
   i.   late out of order packets from chained loaded dualqs, and the
        corresponding spurious retransmissions (with a side note that
        this problem worsens as dualq deployment increases)
   ii.  loss of the 1/p signal with RFC 6040 tunnel decapsulation, and
        a corresponding limited scope initially, with a long slow path
        (including standards actions) to get to ubiquitous deployment
   iii. discards the long-term L4S goal of reclaiming ECT(0) for other
        purposes
   iv.  doesn't match the desired timeline for experimental deployment
        by those who have engaged with the L4S work.  (I'm not sure any
        of the proposed paths forward will satisfy this objection, but
        IIRC this one was specifically raised in response to the 2-signal
        proposal.)

3. a flag day to deprecate ECT(1)->CE marking by classic queues (instead
   treating ECT(1) as NECT if no non-3168 meaning is implemented).
a. Interestingly, the scope of this approach seems to track on the same
   questions as the "how important is a robust classic queue detection"
   question in #1.b, because they both depend on the current and in-flight
   deployment footprint for CE-marking classic queues.  If robustness is
   not very important, then it's because classic queue deployment is low,
   so a flag day would be a low-touch event.  And if a flag day would be
   a major lift with a lot of work for operators, then good robustness
   would likewise be very important if not doing a flag day.
b. However, this presumably requires an update to RFC 3168, and I'm not
   sure whether there's a well-established process for organizing an
   event like this.  Obviously the outreach effort is much higher than
   if e.g. option #1 or 2 turned out to be feasible to get working well
   enough to satisfy rough consensus.

4. operational considerations to recommend changing ECT(1) to NECT at
   ingress to networks that have marking classic queues deployed.
a. Note that these considerations are for networks NOT participating in the
   L4S experiment, so they can't easily be folded into L4S-specific
   operational considerations.
b. This seems to me most appropriate as an add-on of a fallback position
   during the #3 (flag day), where classic queues can't be reconfigured to
   treat ECT(1) as NECT.  But I left it as a separate point because it was
   proposed independently, and maybe there's an argument that only networks
   that experience a problem would need to do this and could do it as a
   post-hoc fix when problems are encountered, rather than pre-arranging
   it with a flag day and the associated proactive outreach it would need.
   (to be clear: I am currently against that position, but I acknowledge I
   might be in the rough when consensus is checked)

5. operational considerations to recommend policing strategies that can
   solve the general case of non-compliant traffic that does not respond
   with the expected backoff to AQM congestion signaling.
a. Arguably this should be done regardless of L4S, because it seems like
   an underdeveloped piece of the puzzle for the general problem of active
   queue management in network devices.  However, solving this well and
   getting solutions widely deployed or at least available (or somehow
   deployed in conjunction with L4S endpoint enablement) could also
   potentially address issue 16.
b. There are many possible strategies here, so outlining some of the
   known ones maybe seems worthwhile.  A few examples that spring to
   mind:
   i.   FQ
   ii.  PPV (http://ppv.elte.hu/), as we saw in ICCRG 104 from Szilveszter
        Nadas, seems to have a lot of promise here
   iii. Likewise the work trying to solve a similar problem written up in
        "Fair Resource Sharing for Stateless-Core Packet-Switched Networks
        With Prioritization" by Michael Menth and Nikolas Zeitler
        (https://ieeexplore.ieee.org/document/8419697)
   iv.  There's also some good insights along these lines in the "Rationale"
        section of the docsis queue protection scheme doc:
https://tools.ietf.org/html/draft-briscoe-docsis-q-protection-00#section-5
        It says the same approach could be used in scenarios beyond dualq,
        and I think there's some applicability to codel or pie, with or
        without ECN.
   v.   Perhaps some generic guidelines that captures what many of these
        have in common--in general a policing response could be based on
        sampled monitoring (not necessarily integrated closely with the
        queues) that maintains stats on the top current and recent senders,
        and blacklists or downgrades their traffic for some time in response
        to a large enough standing queue, or overflow of an AQM.  (On the
        grounds that someone here is non-compliant since it exceeded
        expected operational bounds, and thus at least the highest volume
        recent senders have presumably failed to back off appropriately.)
   A BCP that lists these (and maybe other options) and captures a more
   generalized version of the advice from docsis-q-protection seems likely
   helpful here.
c. Also worth noting: the need for some kind of isolation for non-compliant
   senders is not inherently an ECN-related (nor L4S-related) problem--there's
   no forced reason that a sender necessarily has to respond to loss either...

6. An experiment-linked public whitelist of participant-registered IP
   ranges that have a L4S compatible dualq in their reachability path at
   the likely bottleneck, which would be checked by endpoints before
   negotiating L4S.
a. to flesh the idea out a bit, I'm imagining this as a web API with a
   known URL and a database attached, which is documented and maintained
   as part of the L4S experiment, where experiment participants who have
   deployed and enabled dualq-capable devices register the applicable
   IP ranges, and L4S-capable endpoints query the web API before opening
   connections, so that they avoid negotiating L4S support except when
   either inside a network with a registered dualq, or when connecting to
   a remote endpoint that's inside such a network, caching the answers
   for ~10-30 minutes (or according to http headers in the web api or
   something)
b. This would let innocent bystander 3168 traffic operate unmolested at
   access bottlenecks while gaining live operational experience with L4S.
c. If the rapid ubiquitous rollout goes as planned according to the L4S
   project intent, once the dualq devices are far more prevalent than classic
   ECN queues and widely available on all the bandwidth-shaping access
   technologies and the non-experiment participants are predominantly not
   doing any classic marking, the whitelist could be gradually retired, or
   turned into a blacklist of L4S on IPs that are known to have problems with
   legacy systems that haven't been upgraded (which can be discovered by
   gradually enabling L4S on non-participant paths, perhaps with A/B tests,
   and following up with those networks to ask afterward whether it caused
   problems)
d. This approach is of course operationally awkward and not a good long-term
   solution, and also comes with potential privacy concerns as the deployment
   grows, but would allow for forward progress on L4S without fixing the
   underlying incompatibility problem with the CE ambiguity, so that time and
   an ongoing outreach effort could have a chance to resolve the classic ECN
   deployment footprint questions.  This also allows for some amount of
   targeted experimentation with the classic queue detection work.


(Of these, it's maybe interesting to note that only 1, 2, and 6 do not seem to require a standards or BCP action, which IIRC was originally meant to be out of scope for the L4S work, outside of 8311.)


As far as the original "working on, planning to do, or expecting to see"
question:

I guess I'm expecting to see at some point the results from what the L4S team is doing on the detection mechanisms.  But I remain not very hopeful they will address all the concerns that have been raised, so I'm hoping it'll be coupled with a credible outreach effort that seems likely to reach all the networks that have deployed or are in-process of deploying shared classic queues, at the very least.

I'm not sure about "expecting", but I'd also be very much in favor of seeing some sort of approval-style poll conducted (maybe with a preference weighting or rank ordering or something) of what the WG members think of the technical viability of the different proposed approaches, so that people can have a better idea of what others think sound like promising directions.

Outside that, I'd personally love to see further discussion on these or other ideas, but maybe forking the thread into different threads for the different proposals, to better avoid the confusion I've been feeling trying to find the prior links to the preceding messages on this monster (I eventually gave up).


I regret that I don't currently have much to offer on the "working on" or "planning to do" front, being rather busy right now with a few other challenging problems.

But I am supportive of efforts to improve internet latency.  Especially those aimed at increasing the deployment (and enablement) of the currently available 3168 AQMs and the increased default use of 3168 ECN by more endpoint stacks, since that would have a useful impact on application level latency in TCP connections right away.

When I see good opportunities and I'm able, I'll aim to make minor contributions to latency-related efforts or do things like minor testing support when possible.  So anyone engaging in that kind of thing, please do keep the wg (or at least me) posted on progress and any opportunities to provide useful low-effort support.  I can spend a day on this kind of thing every once in a while (tho sadly, not necessarily every time it might be useful), but I can't spend weeks at a time.  That's probably true for the near forseeable future.

Best regards,
Jake