Re: [tsvwg] plan for L4S issue #29

Pete Heist <pete@heistp.net> Thu, 01 October 2020 13:35 UTC

Return-Path: <pete@heistp.net>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87BED3A1059 for <tsvwg@ietfa.amsl.com>; Thu, 1 Oct 2020 06:35:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=heistp.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ibExPqli50hO for <tsvwg@ietfa.amsl.com>; Thu, 1 Oct 2020 06:35:44 -0700 (PDT)
Received: from mail-wr1-x42c.google.com (mail-wr1-x42c.google.com [IPv6:2a00:1450:4864:20::42c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D8A053A1056 for <tsvwg@ietf.org>; Thu, 1 Oct 2020 06:35:43 -0700 (PDT)
Received: by mail-wr1-x42c.google.com with SMTP id z1so5799663wrt.3 for <tsvwg@ietf.org>; Thu, 01 Oct 2020 06:35:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=heistp.net; s=google; h=message-id:subject:from:to:cc:date:in-reply-to:references :user-agent:mime-version:content-transfer-encoding; bh=eykaAjxrJDpqsV8mTg+6zGjpjwhY2GRLD7yOQB7RiBk=; b=YyyrP/KEVUKZAZt+z5OzFhRjiyrBLb/3rnHlaDZHUDgKXuEzhPMmtTms83DwMMbVKM bzV75wZmfmQVTqqv+lcNZJ3riuQHKoKaqIymGEMo7nB5pZZTnPjRbmiZ+etRupXDISTk MoEFXJMWYfBRDcHG6Re1fl23PFpdW1irMVY+4lhQ//XkJdN0VrZ0+1TGJeQYphLMmG0J sr6PGiWGJkK1VXY3NFISKIsNwdRnMIPUJDRNNbOmtSdJ+/+zPtDz9y2BXZAwsJhsI+9Z OsiaGj+zaCiSmwwHLi/dfs7xkMAWiQm1z/Wjnsp7B2eRg3be447mEiRSu/LvKs4E2Vs+ NynA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:message-id:subject:from:to:cc:date:in-reply-to :references:user-agent:mime-version:content-transfer-encoding; bh=eykaAjxrJDpqsV8mTg+6zGjpjwhY2GRLD7yOQB7RiBk=; b=k8SEBsmTK5XbpjN+71y1FfwupRPxVrpV/w5VKHJ+BTEhaOOcspa6VsQLIXh6w6H1G9 PR1pxBQPTF6P2yTTeYKqiqvIfe4VI+KKFVDISrgW/Yp+PaeRUB21HwafkieH3LdYrvAi 7kTIhw7CNCgW9FHcOMGe9+JrIlsi2XvBPiHZ5kKAVMRHJ1EJQxZDg550V5MjK3mUyilX SsG1EHn/iWRQ+JxxJuT9HjJ3LPZXlfB+0RsgO9dkIZOm6JNhg3c7PjctVepLhv90yp6N QTtEC5S2iTzuJ7bd3SHXWKSnayA8B8uMkluB7VcG+143BEwcbkqeQD6nrh/OrbgNnPPO 46BA==
X-Gm-Message-State: AOAM531xKMtqm0v3iEfVcxu2iUF5sFhX8IaF0tjCpuEyJeuYHEraDNF6 CfD1o7WsSGCcMgkWPfWJHpHhe1yWhg4nAQ==
X-Google-Smtp-Source: ABdhPJy0EzXlpR6P50NEWkXV9D0ZYU7vi6VcP62+ic/XZQZ5E+cXt8+y8erTdNhw/aaczRAOtkfg9Q==
X-Received: by 2002:a05:6000:151:: with SMTP id r17mr8913519wrx.311.1601559342087; Thu, 01 Oct 2020 06:35:42 -0700 (PDT)
Received: from sova.luk.heistp.net (h-1169.lbcfree.net. [185.193.85.130]) by smtp.gmail.com with ESMTPSA id l5sm4558018wrv.24.2020.10.01.06.35.41 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 01 Oct 2020 06:35:41 -0700 (PDT)
Message-ID: <5c6bdeea1e3b288971005179c8df8443c5d08ff9.camel@heistp.net>
From: Pete Heist <pete@heistp.net>
To: Gorry Fairhurst <gorry@erg.abdn.ac.uk>, Greg White <g.white@CableLabs.com>
Cc: "tsvwg@ietf.org" <tsvwg@ietf.org>
Date: Thu, 01 Oct 2020 15:35:40 +0200
In-Reply-To: <28cd9795-5b04-4ecb-6e8c-2e12e476f034@erg.abdn.ac.uk>
References: <202009291549.08TFnvFV068509@gndrsh.dnsmgr.net> <c7080365-233c-5f1e-ef5c-1f42c969042a@erg.abdn.ac.uk> <73562E45-3EE7-43D4-B26B-76478AE19AF8@cablelabs.com> <ae5eb008118ab1b88d65e7712a5e3c54b4207e52.camel@heistp.net> <28cd9795-5b04-4ecb-6e8c-2e12e476f034@erg.abdn.ac.uk>
Content-Type: text/plain; charset="UTF-8"
User-Agent: Evolution 3.36.5
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/7AUaMreYDvOjyzvvZhpQe7IklEM>
Subject: Re: [tsvwg] plan for L4S issue #29
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Oct 2020 13:35:46 -0000

On Thu, 2020-10-01 at 13:29 +0100, Gorry Fairhurst wrote:
> On 01/10/2020 13:13, Pete Heist wrote:
> > On Tue, 2020-09-29 at 22:48 +0000, Greg White wrote:
> > > In my opinion, Issue 29 can be closed. RFC3168 detection should
> > > continue to evolve and should be referenced in the Operational
> > > Guidance draft, but fallback should not be required in the
> > > experimental protocol drafts for the reasons outlined in Issue
> > > 29,
> > > and on the mailing list.
> > In my opinion, the issues with bottleneck detection and fallback
> > should
> > be fixed, since this was the proposed way to provide safety for the
> > alternate meaning of CE being introduced.
> > 
> > The question of whether or not to proceed with these issues still
> > open
> > sounds like a separate one, but it seems like closing issues
> > without
> > fixing them would make it hard for someone who wanted to review and
> > understand what issues are still open.
> > 
> > Pete
> > 
> To be clear, is there a "safety" concern with respect to congestion 
> collapse from overload, or is it an issue concerning relative
> fairness 
> between flows?

False detection (this issue #29) is by itself less serious directly
than missed detection, because the failure mode is safe interaction
with RFC 3168 flows. However, false detection events become an
incentive to disable detection, so this issue is still part of a chain,
unless detection and fallback is required.

There's a plot over in issue #16 of one example of what happens when
RFC 3168 flows and L4S flows wind up in the same Codel queue (however
that happens) either without detection and fallback enabled, or if a
missed detection occurs:

https://trac.ietf.org/trac/tsvwg/ticket/16

Steady state throughput in that case appears to be about 44Mbps for the
L4S flow and 4Mbps for the RFC 3168 flows. Someone could do more
testing or predictions on how things change under different network
conditions, but a ratio of at least 16:1 is probably possible somehow,
since that was shown in some earlier slides.

In my opinion, approximate fairness is ideal, a result of 2-3x under
some conditions may still be tolerable, and anything beyond that isn't
acceptable. I remember one definition of "starvation" as "you know it
when you see it". Personally, a 10:1 throughput ratio already meets
that definition for me, so qualifies as "unsafe".

Pete