Re: [tsvwg] [iccrg] IETF104 ICCRG TCP Prague presentation

Sebastian Moeller <moeller0@gmx.de> Thu, 04 April 2019 17:49 UTC

Return-Path: <moeller0@gmx.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA760120119; Thu, 4 Apr 2019 10:49:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.349
X-Spam-Level:
X-Spam-Status: No, score=-2.349 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=gmx.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WDb2cgWxIIdr; Thu, 4 Apr 2019 10:49:01 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7D5D912011E; Thu, 4 Apr 2019 10:48:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1554400089; bh=4t+vMlpwUciD/a1buZQFYtv8t6bIqGkFB365cWxb9j0=; h=X-UI-Sender-Class:Subject:From:In-Reply-To:Date:Cc:References:To; b=hkOoET2205RCCufXZ3RD0aIGy4/5GHOZ8egSYX4iq4NGtSRfnSNJTlEF1Wme2JBHL uzJug1dZinG76/d+xSjSzfQuKgN4gbFFrGm+w3oKNDj1Sar/8w+VKRASR07Ex8YPl7 0M46HEKx3i6GMcw7CdXlfQmtGs+iDNqVTG6P0PSU=
X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c
Received: from [192.168.42.222] ([77.189.99.139]) by mail.gmx.com (mrgmx101 [212.227.17.168]) with ESMTPSA (Nemesis) id 0MYbFe-1hOjVa3xhq-00VTKh; Thu, 04 Apr 2019 19:48:09 +0200
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: Sebastian Moeller <moeller0@gmx.de>
In-Reply-To: <AD99A4E5-B7F9-49CC-BFAC-E33DDD97BCCC@cablelabs.com>
Date: Thu, 04 Apr 2019 19:48:05 +0200
Cc: Jonathan Morton <chromatix99@gmail.com>, Bob Briscoe <in@bobbriscoe.net>, "iccrg@irtf.org" <iccrg@irtf.org>, tsvwg IETF list <tsvwg@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <E7D3B8AD-E2C3-446D-9838-746651E6592E@gmx.de>
References: <623CA1C6-3425-46E6-AFD9-6FD7D0DBE422@gmx.de> <a7bf3c8d-bb9e-e7e8-3343-ccdbac795591@bobbriscoe.net> <82B40A22-F2C2-4D56-868A-F53D7AEA37D7@gmail.com> <4507BFFD-A68A-4E8A-8FFB-347F95E3F2E8@cablelabs.com> <59D6B58C-C966-493C-B3B9-CAD3AD7AD5F9@gmx.de> <AD99A4E5-B7F9-49CC-BFAC-E33DDD97BCCC@cablelabs.com>
To: Greg White <g.white@CableLabs.com>
X-Mailer: Apple Mail (2.3445.9.1)
X-Provags-ID: V03:K1:0i2kj44l+cZj6zzB20ja+sfYRukMgtZJ/p7tF+MxPcvCU//Eq4B js/lB2NBTHls2+iEfWkXCfE+gZjtfcByzhBfK+Zbbbhjp1liDFSmLrLTlUiyqBJ6NLuV+Um vqmZ6uMzQWM17baHu1vGIMukEXKOEAOafaOfwq4lGRwK3lZuJN0O8TkLuNrad0f4+XdSnCp h97pGBpB2wIFVgANCMxDw==
X-UI-Out-Filterresults: notjunk:1;V03:K0:Gf8pzzNaP4s=:NmBTIiwTEZItVM91/2BLaS BNXevr+hiwwCEJXASFtBYWbgftLjH7Qo+JeLn70/rLk9eWBNEA3AFHOOAwIIAyOqvUG2YfV9V 03BobGzHFZU5HkoHr5YGt4UwO5Ov3k0mhF5TpeVTwpZi6br/8IFicdB8S2hiqG1eKmDofBz7Y EiludxjmtjQ2DeWgxV9DHLZV1mGVs9FvE3VeLtTpOQSMFHRgew+0qzgLUZ4U1ziBxSg8HAgwj 7RJe4pTMCfNjk0elX4e2+NfNI3y7o1p7gqxHhzyrrV2BN6vt9vB6BF9bYrCpqgZqXlGa9IA6J 21QjdDey3CSyozOP1wij8T9Vfo2RgdhMvkpy5aZ4FjmaTG43NSDRaw+dAfqIbGXz45CPYnI1V LK3JL0ODaIZ5t062dis2whm92DogfvLk7ghceFflK6U2ioJAoQFAXourzUzWM/j6+7TghclWd zwyo5s4LevbQuVINmqkcFugU9X6mIB6Rnvaxb4nGIP5m7a3dyzIK45bhAy3/DQu47GQJAIbxy Ymmd/a53BLDcnsz+yXqOOanmYFeZ01NPsU5tgD+VGOJUynNpLxOUkQrmFxaFVcdJkotVjSJCe n6F1esKSnMmei0gPuP4bVhvj2MjBzNZAuoXeAISNRh7o60r17hmNIi2Y8T8rGeeV3CJz0DXz9 eGTl6JNFf4LJVLPeBRc3sxscAYcWWwkhKAC09Lgvsh7o284vb7L13stZByxpyXCui/BTpqC6B cqYMg+r3Z5/alMdPVKTDWGUSOxUrtb0YgQ2Lz40MlIE3PxSAclY46qHp7+jrn+n55jCWjd979 2eTuYtOgAQJhXjyPEP10h/+erQ1bqkJQYjvErb1VRb+DDqn9etNp+RJq5q3khEnGk7121gyy0 AM0JhugtfRD9e+wjFTpF+qeL5ZP63vis8YvBNvMfmkCWVNEw0cyySS5lh6pbUVJSyAM7+ik3r NWdNfyUWWWg==
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/8lBzccJ3y6s7pZlT7dyCK2VvLqk>
Subject: Re: [tsvwg] [iccrg] IETF104 ICCRG TCP Prague presentation
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Apr 2019 17:49:04 -0000

Hi Greg,



> On Apr 4, 2019, at 19:06, Greg White <g.white@CableLabs.com> wrote:
> 
> On 4/4/19, 11:29 AM, "Sebastian Moeller" <moeller0@gmx.de> wrote:
> 
>    Hi Greg,
> 
>    [SM]: I happen to believe that head-end AQM will ameliorate the need for an ingress AQM for a lot of casual users, but all those that are constantly running against capacity limits (think ADSL) typically desire a more fine-grained prioritization than a head-end AQM is going to offer, includsing restricting bandwidth to certain proiorety classes to say keep latency increas for game traffic tightly bound. I believe in that case the guarantees L4S offers are not sufficient, as the gaming case requires "guaranteed bandwidth at a certain latency level" as compared to the low_queueung latency guarantee L4S offers (which basically moves the que back into the sending end-host, which is fine, but all it does not help if I need to send @ X Hz).
> 
> [GW]  In an L4S world,

	But we are not living in an L4S world, so it would behoove L4S to play nicely with the existing world, no?

> there is nothing that prevents a user running an "ingress AQM" of their choice with whatever traffic controls they like (as long as the ECT(1) implementation lines up with the L4S definition, which is totally doable in fq_codel and CAKE).    

	So "my way or the highway", eh?


> The issue we have been discussing is where the user is running an old version of fq_codel/CAKE that hasn't been updated to the L4S version of ECT(1).  In that case, the L4S traffic would see worse queuing latency than classic TCP.

	In the case of ingress Shaping this is simply not true and L4S flows have the potential to aggressively use more than their fair share in a way that fq post-bottleneck can only react to too slowly. This is a use case that exists in the real world right now, and I dislike the idea that this will only continue to be possible under the assumption that I need to upgrade my AQM.

> 
> 
> [...]
>> [GW] Alternatively, if fq_codel/CAKE were to treat ECT(1) as non-ECT (or implement the L4S style ECN) this would again not be an issue, I believe.  
> 
>    [SM] I believe this to be just as viable as having L4S AQMs interpret ECT(1) as pulse-modulated continuous congestion information. [...]
> 
> [GW] How?  That seems impossible to me.  What is the classifier that directs traffic to the LL queue vs Classic?  

Well, my point is, 1 single code-point does not make a robust classifier, as seen in the fact that the ECT(1) flow identity does not survive a CE-marking, Really the L4S RFCs are quite verbose in showing why ECT(1) can not serve as a reliable identifier of L4S-flows, only to then turn around and argue why this does not matter. I would propose to simply use a new protocol and you have a perfect identifier in the IP header that can unambiguously identify your flows, problem solved. And once you done that you do not need to overlay two different meanings on the CE mark anymore, just teach your AQM to set a field in the new protocol's header and you are set (for bonus you could use 8 bits and directly encode a graded load signal which would allow even more fidelity and temporal precision than essentially doing PCM, no). That wat CE can keep its meaning and L4S and the TCP-friendly world stay nicely separated. Now, you might bring tunneling as an example, to which I say let's cross that bridge once we get there.
That seems like a clean implementation for a new protocol, IMHO. Is that easy to roll out, hell no, but it is not unique in that regard.


Best Regards
	Sebastian