Re: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!

<> Thu, 05 September 2019 08:03 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id D2F291200C4 for <>; Thu, 5 Sep 2019 01:03:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -4.297
X-Spam-Status: No, score=-4.297 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (2048-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id llPGooodyRzH for <>; Thu, 5 Sep 2019 01:03:16 -0700 (PDT)
Received: from ( []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 8AF98120090 for <>; Thu, 5 Sep 2019 01:03:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;;; q=dns/txt; s=dtag1; t=1567670583; x=1599206583; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=k1SuZGqJxC34o0FwXPXIIKEDf+HsK0etjvfFCgu7q8E=; b=aRRWgzIp/LgmcsTT9ACkJIBZJgImaxpTi8WL4CSYGYPQnlFMvZqkbdQU tF62pIfwz/bqP1s9df4tNjWeDi37UdWi+EV63UHTEpSEPtHv8gIeEmsrL HY9gZI4nKcp8wBGOhyL7g3SvvldG6bQSk1LsxoB9wkc5PvbHvdSSzQa3M ag1QISy4z9d5r1JrID1/ZVRQktzP269K5Xu6cpBRXDS2VXvwtWwVzyXrW daZHUhkLyGwidE0tRTqqvtDqQYxtlOmiRo9bVTOtUBilJMXomy9k9uw+l HAgfzRxjBhnRtHsXXmKQ7x27uQiaEraTv1s9m35HZsLNIVmfJPOic718m Q==;
Received: from ([]) by with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 05 Sep 2019 10:03:00 +0200
X-IronPort-AV: E=Sophos;i="5.64,469,1559512800"; d="scan'208,217";a="494112908"
X-MGA-submission: =?us-ascii?q?MDEm0xfSoTiaLO3WdrnAUl0Ueqs4Gf1kEQqGIF?= =?us-ascii?q?J06YDlN4Ut8eUy8NqagDO/9BIlnh74NWhLSxSlZhQlhJWoSgZoJwyMPK?= =?us-ascii?q?Kad2HpR4Td8SlttUvPT2TRKFQBY65qkEAYRV27zPDTJm1I6RAh+1Ctgc?= =?us-ascii?q?1ylvhG9ewQhM/QY8FpzzwYIw=3D=3D?=
Received: from ([]) by with ESMTP/TLS/AES256-SHA; 05 Sep 2019 10:02:53 +0200
Received: from ( by ( with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 5 Sep 2019 10:02:51 +0200
Received: from ( by ( with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Thu, 5 Sep 2019 10:02:52 +0200
Received: from ( by ( with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 5 Sep 2019 10:02:51 +0200
Received: from LEJPR01MB1178.DEUPRD01.PROD.OUTLOOK.DE ( by LEJPR01MB0201.DEUPRD01.PROD.OUTLOOK.DE ( with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2220.20; Thu, 5 Sep 2019 08:02:51 +0000
Received: from LEJPR01MB1178.DEUPRD01.PROD.OUTLOOK.DE ([fe80::987d:70fa:4d72:d6da]) by LEJPR01MB1178.DEUPRD01.PROD.OUTLOOK.DE ([fe80::987d:70fa:4d72:d6da%5]) with mapi id 15.20.2220.022; Thu, 5 Sep 2019 08:02:51 +0000
From: <>
To: <>
CC: <>
Thread-Topic: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!
Thread-Index: AdVfSTsXh/eMA9Y2RLeop2cZ3ij2ZAD+TSWAAB2l37A=
Date: Thu, 5 Sep 2019 08:02:51 +0000
Message-ID: <LEJPR01MB1178B6C102455F1F9886D49A9CBB0@LEJPR01MB1178.DEUPRD01.PROD.OUTLOOK.DE>
References: <> <>
In-Reply-To: <>
Accept-Language: de-DE, en-US
Content-Language: de-DE
authentication-results: spf=none (sender IP is );
x-originating-ip: []
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6245d12d-b95f-4326-c4b8-08d731d772e1
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600166)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:LEJPR01MB0201;
x-ms-traffictypediagnostic: LEJPR01MB0201:
x-ms-exchange-purlcount: 1
x-microsoft-antispam-prvs: <LEJPR01MB0201BF4886A4C3F1E84129B49CBB0@LEJPR01MB0201.DEUPRD01.PROD.OUTLOOK.DE>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 015114592F
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(376002)(396003)(136003)(39860400002)(366004)(189003)(199004)(86362001)(53936002)(606006)(66066001)(14444005)(52396003)(19627235002)(256004)(66446008)(76116006)(3846002)(236005)(6116002)(11346002)(9686003)(7736002)(486006)(476003)(446003)(54896002)(6306002)(790700001)(85202003)(66476007)(8936002)(64756008)(66556008)(66946007)(71190400001)(81166006)(33656002)(478600001)(8676002)(14454004)(81156014)(5660300002)(6916009)(76176011)(102836004)(53546011)(26005)(316002)(2906002)(4326008)(186003)(7696005)(85182001)(55016002)(71200400001)(777600001)(21314003); DIR:OUT; SFP:1101; SCL:1; SRVR:LEJPR01MB0201; H:LEJPR01MB1178.DEUPRD01.PROD.OUTLOOK.DE; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None ( does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: WtuVDjRKjSJpX7nqR6sKuZOZvA9vKJBd/LY00e9uoqCvhhQilOB0JDy4rfSDCenzMY3FAUaXGn36NL9hmZ3e9bvEBpwLpDLXS8GPBtXykFfta5uzhTVMvbDHL2rVYgv8U8oH816cZxOhGc3Pl/LA8+W1IVMNFY4QBMYIV1EVVxVIbpLeNeAwWr+YcWrM/2bX+GfgpTuB+w2cPakVuB6cJLHV/S+piLgHULKWgtJjvd1espDHzYkkWgB+T2ghAny4/eqwU6ZwIgkVEUA3zjUkEzgwAiNRa3dcnsuJcDePBkNuoPAwMI0hLKWWi1iC9gvGm6vPtMeJPKBjcopaRfJtrTBQPF8Z2CmvD22Zh43Xf/DqueB6KUbqa9/Kx9Jk/eZhU8YgiBEmob/PSOKkYA8Suaop8WRKmteqX0sDpzxDKIs=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_LEJPR01MB1178B6C102455F1F9886D49A9CBB0LEJPR01MB1178DEUP_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 6245d12d-b95f-4326-c4b8-08d731d772e1
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Sep 2019 08:02:51.0473 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bde4dffc-4b60-4cf6-8b04-a5eeb25f5c4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Vot/SyuRNp7GKQOMIMcPLqurf4u82/dm9KDWdeiITnVlrz3I2rKV0MYTyXJDfnnT3SNj8bSu/6oxZMVmL3uiIifD57xhBkGOK20NYZFJjsg=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: LEJPR01MB0201
Archived-At: <>
Subject: Re: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Thu, 05 Sep 2019 08:03:20 -0000

Hi Greg,

the policy of the company I work for is: EF marked traffic received on a peering interface is remarked. DiffServ traffic destined to a retail access is subject to admission control, if that traffic is not expected to experience congestion.

The latter might change with high-speed access links. If the users and the above traffic have a hard time congesting these access links, the admission control requirement may not be strictly required.

If NQB traffic is supposed to be sent to third parties without an SLA at peering links being in place, proper selection of the DSCP matters. Without a deeper thought, a DSCP 000xx1 may be a proper choice in that case. Without an SLA being in place, the forwarding to be expected is default forwarding. If NQB is supposed to define a default-like behavior for a serious traffic share, it should be marked by a DSCP in the range 000 xxx at interconnection.

If an SLA is expected to be in place at peerings, any traffic without admission control should face a higher packet drop probability if destined to a retail access, than admission controlled traffic. If I assume the admission controlled traffic to be marked AFx1, NQB traffic in the same queue should be marked AFx2 (or AFx3). I’m open to discuss queue depths and expected traffic properties for a suitable AF class. RFC 8100 proposes to specify DSCPs only at interconnection. That may be a starting point, should SLAs on NQB at peerings be within commercial scope (that’s a non-technical issue, of course).

The choice of a DSCP for traffic which is created and terminated within a single domain doesn’t need to specified – here the PHB specification is important and the behavior of that traffic in the presence of traffic from other PHBs. I’d again opt for AFx2 or AFx3 (hoping that the NQB PHB specification allows for a useful implementation suiting AFx1 and NQB traffic in the same queue, expecting both to expect no congestion, AFx1 traffic to be admission controlled if present and NQB having features to reduce bandwidth if congestion is imminent).

I’m not sure what is expected from a backbone network supporting NQB (and other DiffServ PHBs). MPLS supports 8 traffic classes or codepoints, respectively. This coding space includes the codepoints required for ECN (codepoints, not bits).

I appreciate more standard DSCPs based on a clear and consented definition of the corresponding PHBs. Default marking, LE, EF and Network Management are good examples.

My take – sorry if I misunderstood some of your design aims, should that be the case.



Von: tsvwg <> Im Auftrag von Greg White
Gesendet: Donnerstag, 5. September 2019 01:02
An: Black, David <>om>;
Betreff: Re: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!

Thanks David.

On your item 3, could you clarify what you mean?   RFC 8325 does not discuss a “non queue building” service class, and so I don’t see a technical inconsistency between the NQB draft and RFC8325.  There has been some discussion on the list as to whether IETF should recommend that NQB be mapped to UP_6/AC_VO or UP_5/AC_VI, but in at least one of those cases where it was suggested to change the draft, the rationale for doing so was based on an incorrect assumption that NQB-marked traffic would by definition include capacity-seeking flows (e.g. L4S).  As I stated on list, I don’t have a problem with changing it to UP_5/AC_VI if that is the consensus.  But, the reason for mapping NQB to UP_6/AC_VO is so that both RFC8325 and “default mapping” 802.11 devices map EF, VA and NQB together to the same UP/AC, and so that both types of devices map these traffic types one AC level “higher” than elastic traffic sources (e.g. AF3x).  I’d like to see a more reasoned argument as to why NQB should be grouped with AF3x traffic as opposed to EF & VA before making a change.


From: tsvwg <<>> on behalf of David Black <<>>
Date: Friday, August 30, 2019 at 9:41 AM
To: "<>" <<>>
Subject: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!

In the Montreal TSVWG meeting, there was a strong sense of the room that the TSVWG WG should adopt draft-white-tsvwg-nqb as a starting point for work on an NQB PHB.   The WG call for adoption on this list has been open for over a week, since August 21, and having seen only one objection on the list to adoption of the draft (from Dave Taht), the WG chairs (Gorry, Wes and David) have concluded that the WG rough consensus is to adopt this draft.  It’s important to emphasize that the draft is adopted as a *starting point* for TSVWG work, i.e., the current draft content does not represent the rough consensus of the WG.  Significant work will be required to produce an actual PHB spec that is suitable for implementation – see the recent RFC 8622 on the LE PHB ( for an example of what a PHB spec looks like.

There are a few items that will need attention before the initial -00 WG version of the NQB draft is submitted – these are to avoid confusion about what the WG intends to do:

1)      The draft needs to be clear that the use of the 0x2A DSCP value as the default for this PHB is a *suggestion by the authors that is subject to change*.  Whether to use that DSCP or a different one is a WG decision; the plan is to discuss and select the default DSCP value starting (and hopefully concluding) in September.

2)      The criticisms on this list of the “queue protection” requirement in the draft are largely accurate.   The draft needs at least an Editor’s Note that this material will be revised, as while the DOCSIS mechanism is an example of how to do queue protection, it is not appropriate to require implementation of that mechanism.   A plausible plan that I have discussed with the authors is to write a set of functional/behavioral requirements for NQB “traffic protection” that can be satisfied by a “queue protection” mechanism such as the DOCSIS mechanism, or by a suitably configured FQ AQM implementation.

3)      RFC 8325 reflects the IETF consensus on how to map between Diffserv and WiFi QoS, hence the 8.3 section of the NQB draft needs to be modified to be consistent with RFC 8325.

4)      Similarly, the 8.2 section of the NQB draft needs to be modified to reflect the conclusion of discussion on this topic in Montreal.
Those 4 changes are necessary in the -00 WG version of the NQB draft.

In addition, related to item 2), my expectation (which is open to further discussion) that “traffic protection” will be a “MUST” requirement, perhaps with some well-specified exceptions (including explanations of why the exceptions are ok).   This is because “traffic protection” (e.g., “queue protection” or a suitably configured FQ AQM) appears to be necessary in general to keep queue-building traffic out of the NQB traffic aggregate, as allowing such traffic degrades the properties of the NQB PHB.

Thanks, --David (TSVWG co-chair, will be shepherd for NQB draft).
David L. Black, Senior Distinguished Engineer
Dell EMC, 176 South St., Hopkinton, MA  01748
+1 (774) 350-9323 New    Mobile: +1 (978) 394-7754<>