Re: [tsvwg] Update to Position Statement on ECT(1)

"Black, David" <David.Black@dell.com> Tue, 19 May 2020 13:20 UTC

Return-Path: <David.Black@dell.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 050C83A0AF3 for <tsvwg@ietfa.amsl.com>; Tue, 19 May 2020 06:20:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.189
X-Spam-Level:
X-Spam-Status: No, score=-0.189 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com header.b=myJUcuuf; dkim=pass (1024-bit key) header.d=dell.onmicrosoft.com header.b=Mkevt3MV
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n4sBViY85MKK for <tsvwg@ietfa.amsl.com>; Tue, 19 May 2020 06:20:31 -0700 (PDT)
Received: from mx0b-00154904.pphosted.com (mx0b-00154904.pphosted.com [148.163.137.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5AE973A041A for <tsvwg@ietf.org>; Tue, 19 May 2020 06:20:31 -0700 (PDT)
Received: from pps.filterd (m0170395.ppops.net [127.0.0.1]) by mx0b-00154904.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 04JDDSC4006518; Tue, 19 May 2020 09:19:46 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=smtpout1; bh=9lU6a01wAEVh4pXkaLTJiakz4/OXwFcAbBazwCcTQhA=; b=myJUcuufUEVLXr3TnQpkBU0HL8Ya0yOU46DGALXjJ0IR1l46LhlabfPqpKyG7HnnOdv7 3fyMEJlpctBh2V5+HGc2kxwf3gxKE4dRaHU81m+8W+/WryvhzNW7Cd/YAB2fTjcQ6n6s fo5q6Ber997S3zucXiYOjOPaGdtVJcphfc3Wl/1Wf6xoPhL+ToRcZKKqNbwdA1E9+8B1 4bfM/GfqVu63N+ZALLhKSg8ARmwgGVolfRb+GJTakoKKTSWLH/4qwkORSixJzTgXSh8p /IGKKWpLy78Dw70ifh3rNmKCtX/E+0wkIQREexFtF6DxD5jtPNP9xHAdtXn+gs+uqSiX cw==
Received: from mx0b-00154901.pphosted.com (mx0a-00154901.pphosted.com [67.231.149.39]) by mx0b-00154904.pphosted.com with ESMTP id 312cupfkk4-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 19 May 2020 09:19:45 -0400
Received: from pps.filterd (m0090350.ppops.net [127.0.0.1]) by mx0b-00154901.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 04JDBJ5e021370; Tue, 19 May 2020 09:19:44 -0400
Received: from nam10-dm6-obe.outbound.protection.outlook.com (mail-dm6nam10lp2109.outbound.protection.outlook.com [104.47.58.109]) by mx0b-00154901.pphosted.com with ESMTP id 314fprrhaq-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 19 May 2020 09:19:43 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HtGJeUWq0xOV9tezx+VcEOQVgzu90s3UuS9oL+PGn1IAcF4Vc6srFZ0PF4jgJwExbMSjfU1LgECZxnH1TPdlzCMayWBxct99/gUB7k08qBsEnoFZlOWzlUcQX7by1AvUeBIMxk/ZRc8kvYVt6IVUrYVlNR+E+nScSJZtoQz+8WAy7uYilqFLl23Pu/SbpB8QEFt5+aV2rESlScZEYn4qXb5+wJITtke9gInjIhPgTTUBlsHi50p+755CvR31aZvq0j3OIPXQ0FuKVGS28OapOvL8LzbYDidjKNFWvtkgOC9LTvSyYBj267YOCHu4yzBGD4MoR7YIZPp/uh34+PZFKA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9lU6a01wAEVh4pXkaLTJiakz4/OXwFcAbBazwCcTQhA=; b=EEX0DCey7Nwv3LA7LYAyfkSXwSndpy+yMxF1KAxvg4uzI8rxV+Ab7T/ch6MDvD+TBKSli3o4zn5b/Vd1A15M/2nnrvNRhrI/Na9SThkBBnOJfigj8uKFVMSqDSXs+nlG8m1qFZPYA59HBmXwwOAronXeCT57zYoiSRsYb2GrLg5Z0Gi8jmqbf1UBjmu6G6GzYXOi1OSZIkVWOlcdrXB/thwSsuQ+OVHLc6O3+MJ3ZMLMPp+0RToYry67LF+ZcbTyABpZBBWwxUIiFBxCdBgv0yxE1V0KMTOElHdMP9bsF24yZ0QEh7P+TEg1tpALsBfyrzv4+fhBZVCjr4baGjSH9A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=dell.com; dmarc=pass action=none header.from=dell.com; dkim=pass header.d=dell.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Dell.onmicrosoft.com; s=selector1-Dell-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9lU6a01wAEVh4pXkaLTJiakz4/OXwFcAbBazwCcTQhA=; b=Mkevt3MVsrd3iRUbD1QPZJlvjdEtyYE9pbmmkcx3P3rc5SGXIa0ekQJ1tlPLudWevVrHuUC5VCw1HTN8cjn/SAKR7Wyye9s/J6p1QhPyL5ZYDJ/rXmUWxhM3v0ot/NHwgsxuYXTGKLgdLOcYn52gE1TwEnX7kex1+/WNVGbkhTE=
Received: from MN2PR19MB4045.namprd19.prod.outlook.com (2603:10b6:208:1e4::9) by MN2PR19MB3503.namprd19.prod.outlook.com (2603:10b6:208:192::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3000.27; Tue, 19 May 2020 13:19:41 +0000
Received: from MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::3574:5511:eec9:567]) by MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::3574:5511:eec9:567%9]) with mapi id 15.20.3000.034; Tue, 19 May 2020 13:19:40 +0000
From: "Black, David" <David.Black@dell.com>
To: Bob Briscoe <ietf@bobbriscoe.net>, Martin Duke <martin.h.duke@gmail.com>, "Holland, Jake" <jholland=40akamai.com@dmarc.ietf.org>
CC: TSVWG <tsvwg@ietf.org>, "Black, David" <David.Black@dell.com>
Thread-Topic: [tsvwg] Update to Position Statement on ECT(1)
Thread-Index: AQHWJXDCMj0HjdV7wk+M4pcr+ovB2aihZgcAgACf+ICADHHAAIAA99CAgAABnkA=
Date: Tue, 19 May 2020 13:19:40 +0000
Message-ID: <MN2PR19MB4045568B4A794F1DCE6974BB83B90@MN2PR19MB4045.namprd19.prod.outlook.com>
References: <BE44EAE9-5CFB-4F5D-85B8-05AFA516C151@akamai.com> <CACL_3VEbUHB-Omwp1-g5Tq3G3J-kKj9N3jPZLcfruicw3X=AsA@mail.gmail.com> <2CBBD8CD-2088-4E41-B113-EED665853D3C@akamai.com> <CAM4esxSFCBcxXjz5JJJg1z6+wwfN3mTrtJ8bKiBsj2TeOmmFSw@mail.gmail.com> <93331803-e7db-95dc-a4ae-052c347c3c86@bobbriscoe.net>
In-Reply-To: <93331803-e7db-95dc-a4ae-052c347c3c86@bobbriscoe.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Enabled=True; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Owner=david.black@emc.com; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_SetDate=2020-05-19T13:15:53.8673607Z; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Name=External Public; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Application=Microsoft Azure Information Protection; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_ActionId=df3bcd29-ceda-4179-a8d6-3638bf6930d3; MSIP_Label_17cb76b2-10b8-4fe1-93d4-2202842406cd_Extended_MSFT_Method=Manual
authentication-results: bobbriscoe.net; dkim=none (message not signed) header.d=none;bobbriscoe.net; dmarc=none action=none header.from=dell.com;
x-originating-ip: [72.74.71.221]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 59b35bde-cc21-4715-68b6-08d7fbf749ce
x-ms-traffictypediagnostic: MN2PR19MB3503:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <MN2PR19MB350390737DD69B5484AF6A9583B90@MN2PR19MB3503.namprd19.prod.outlook.com>
x-exotenant: 2khUwGVqB6N9v58KS13ncyUmMJd8q4
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 040866B734
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR19MB4045.namprd19.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(366004)(346002)(396003)(136003)(376002)(39860400002)(66446008)(8936002)(66476007)(8676002)(66556008)(64756008)(66946007)(76116006)(52536014)(4326008)(786003)(6506007)(186003)(316002)(33656002)(55016002)(53546011)(26005)(15650500001)(107886003)(5660300002)(30864003)(2906002)(86362001)(478600001)(110136005)(71200400001)(7696005)(54906003)(966005)(166002)(9686003); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: cGBD7/cz1GIcRBa48Va27YardJ0XJll74gW2kjS8PU6zmmMDkJyyThVwSfzuzRBZKB2hfBLZOoxVvaw0GFEcKd2uASuS+T67FHhAakCbIlguBPZ9LC5GuUW7JF8h8k34jdSVI0d7iz0+ROjN+cRpEZAOkYRRJDNC1RDK7w58jvrRAM6PkqNscohdxpcNWz7VxNQG9NtBfZCq/svCY6HdnYb/oIu2Fsh2d/sPcdECSgmIzCwcmSaerZQQ+zCRbdFtGNqu5CWGjjZO5N/RCrND0VB6pHlkE5nzfzdJBH9Z0A6rVydh+ozB5ZuE3QqaVTxPKZz0L+bzQGy19fvxay252AqvKTa1hhVU9EelUry/u9UNVUo6+77KyR1sZX3VOCwhUa9bTyatdpfVlYEe0SkNE8i1Q5Z26QLZtXvc9D2QVnKPNbsb/PC65FWk6K9Eslji+Jj6u2iXSbWvTKDXgxFxX1S3zm1MCz0Emr8fZNmV7XE=
Content-Type: multipart/alternative; boundary="_000_MN2PR19MB4045568B4A794F1DCE6974BB83B90MN2PR19MB4045namp_"
MIME-Version: 1.0
X-OriginatorOrg: Dell.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 59b35bde-cc21-4715-68b6-08d7fbf749ce
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 May 2020 13:19:40.7483 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 945c199a-83a2-4e80-9f8c-5a91be5752dd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: sKS7fC/jdKy5vdQcoJukj/thlbJtteRcGtvCJ4qXh943kAaPdOCXDXIIOSkpD5XyejkABBdgZxj2XfXQzefiEA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR19MB3503
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.216, 18.0.676 definitions=2020-05-19_04:2020-05-19, 2020-05-19 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 lowpriorityscore=0 malwarescore=0 bulkscore=0 clxscore=1011 mlxscore=0 mlxlogscore=999 priorityscore=1501 phishscore=0 cotscore=-2147483648 suspectscore=0 impostorscore=0 spamscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2004280000 definitions=main-2005190118
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=999 phishscore=0 mlxscore=0 bulkscore=0 suspectscore=0 malwarescore=0 spamscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2004280000 definitions=main-2005190118
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/f8kdiKklSaBC-IG-ewavzOW_oQ8>
Subject: Re: [tsvwg] Update to Position Statement on ECT(1)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 May 2020 13:20:48 -0000

[still posting as an individual, not WG chair]

Bob,

> [BB] I don't know how you get to one codepoint in ACE being enough for CE. The whole idea of AccECN is to be robust to ACK loss and thinning.
> If it was as simple as you make out, we could have sorted out this problem snip-snap and all be home in time for tea.

I think you may have missed the point.  The topic under discussion is a 2-level marking system that retains the semantics of CE as calling for an RFC3168-style Multiplicative Decrease (MD), and uses ECT(0) [remarked from ECT(1)] as the queue occupancy mark for 1/p congestion control.  With two signals (CE and ECT(0)) arriving at the receiver, there need to be ways to reflect both to the sender.

The MD signal (CE) overrides the queue occupancy signal, as it calls for a much larger backoff.  ACK thinning should be less of a concern for MD because any arrival of CE (or detection of a drop) at the receiver is supposed to cause MD at the sender, and that sender MD reaction is limited to once per RTT.

The underlying reasons why a single codepoint may suffice to signal MD support via the AccECN field are two-fold:

  *   The MD signal (CE) overrides the queue occupancy signal (ECT(0)), as it calls for much more sender backoff, so there’s no point in AccECN for queue occupancy if a CE has been received.
  *   The MD signal does not require the gradations of AccECN – it’s an undifferentiated “Oh sh*t!” signal calling for MD backoff (and reversion to RFC3168 sender behavior).
That would still leave the rest of the AccECN codepoints to reflect the queue occupancy signal in the absence of CE arriving or a drop being detected.


Thanks, --David

From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of Bob Briscoe
Sent: Tuesday, May 19, 2020 8:59 AM
To: Martin Duke; Holland, Jake
Cc: TSVWG
Subject: Re: [tsvwg] Update to Position Statement on ECT(1)


[EXTERNAL EMAIL]
Martin,
On 18/05/2020 23:11, Martin Duke wrote:
Jake,

I'm intrigued by this discussion of the ECT(1)->ECT(0) proposal, as something that could definitively solve the safety concerns. I'll make two unrelated points:
1) If the current L4S proposal is in need of an MD signal, there's always dropping the packet.  Although packet loss is bad, maybe some drops at the end of slow start is the tradeoff we have to make to get low latency. Implementations really concerned about loss can be less aggressive during slow start.
2) Clearly, there is no AccECN signaling problem for ECT(1)->ECT(0) for QUIC, and for TCP paths where the option gets through. It this is an issue of the three ACe bits, I think one codepoint in ACE would be sufficient to indicate that a CE mark was received, which IMO would trump whatever other feedback is in that header.. Unless there's some sort of performance cliff in not being able to encode 7 ECT(0) marks, this seems like a non-problem

[BB] I don't know how you get to one codepoint in ACE being enough for CE. The whole idea of AccECN is to be robust to ACK loss and thinning. If it was as simple as you make out, we could have sorted out this problem snip-snap and all be home in time for tea.

As we all try to remove more and more latency, we are all going to find that the problems get harder and harder - little details matter a lot. Without really solid feedback precision, you lose the consistent latency of L4S.

Richard Scheffenegger and I designed a 4-3-1 codepoint scheme for ACE at one point (4 for CE, 3 for ECT(1) and one for Not-ECT). See https://tools.ietf.org/html/draft-kuehlewind-tcpm-accurate-ecn-03#section-3.2.1 Table 3. However, it was removed because it was "jack of all trades, master of none." By trying to cover all the codepoints, it didn't give sufficient robustness to any.

Even using all 8 values of the 3-bit counter for feeding back just one codepoint is on the edge of what is needed today. I sometime liken the ACE part of AccECN to a "stalking horse" - i.e. a vehicle that works for today, while also acting as a platform to get the larger AccECN Option deployed for the longer term - when the ACE field might have become too small for the possible future level of ACK thinning on some paths.

In fact, over the years {1} that we've been trying to get AccECN standardized, you will find all sorts of weird and wonderful compressed encodings, but in the end, as well as inadequate robustness, arguments for simplicity took precedence. Not just because complexity breeds bugs (which is not an insignificant consideration for TCP), but also because the semantics of ACE also have to be supported by segmentation offload hardware.

When, I highlighted the problems with tunnelling that the ECT1->0 scheme has, I only hinted at these problems with TCP, because I thought incompatibility with tunnelling should be a sufficient argument.

In summary, if you think deploying a change to IP is easy, you've probably not absorbed the full breadth of the problem.


Regards



Bob

{1} Since Oct 2005: https://tools.ietf.org/html/draft-briscoe-tsvwg-re-ecn-tcp-00#section-4.1



Martin (as an individual)

On Sun, May 10, 2020 at 5:09 PM Holland, Jake <jholland=40akamai.com@dmarc.ietf.org<mailto:40akamai.com@dmarc.ietf.org>> wrote:
Hi Mike,

From: "C. M. Heard" <heard@pobox.com<mailto:heard@pobox.com>>
> Yes, combinations marked (**) below would have to changed from RFC 6040:
....
> Similar changes would be needed for draft-ietf-tsvwg-rfc6040update-shim and draft-ietf-tsvwg-ecn-encap-guidelines.
>
> Clearly, the need to get such changes deployed would be a barrier to barrier to adoption.

Yes.  I think in a recent thread I heard it confirmed that current tunnel
handling of these is kind of spotty today, specifically:

  > as an endpoint we'll be dealing with weird inconsistencies that basically
  > never fully understood anything beyond "don't lose CE marks" and maybe
  > "loss is acceptable in confusing cases", if we're lucky.

  [BB] See reply to Dave Taht just now, which pretty much confirms what
  you've just said.

that's from here:
https://mailarchive.ietf.org/arch/msg/tsvwg/QudqLu1RTQZCVnS4HNf8jnZ_kIY/

(I think the Dave Taht reply he was referencing was this one:
https://mailarchive.ietf.org/arch/msg/tsvwg/2ElPK72IiFg2gHJZ_rLMUKTDfCI/ )

I'm beginning to think the reason I've come down differently than the
L4S team on the judgement call for this approach being better, in light
of the state of tunneling encapsulation deployments, might boil down to
a disagreement over the answer to a question like:
  Which is better:
  - losing the safety response of MD from a loaded classic queue, or
  - losing some of the reliability on the low-latency response when there
    is a dualq on-path?

I'm beginning to think we might be stuck with one of those options for
tunneled paths until tunnel decap implementations can be widely upgraded
in deployment, however this lands.

> - the existing accecn spec would often lose non-CE signals
>
> Actually, I would go farther and say that something rather different from the existing AccECN draft would be needed. AccECN provides accurate feedback of the number of CE marks observed. Under the proposed scheme L4S would need to getting accurate feedback of the number of ECT(0)  (pre-congestion / some congestion) marks. AccECN would need to be re-worked to provide both that and, in addition, either the existing ECE/CWR handshake or something else that performs the equivalent function. The most obvious solution would be to repurpose NS and one or  more currently reserved flag bits (or use other ideas from RFC 7560 Sec 5.2) and leave ECE/CWR unchaged. I note in passing the SCE proposal would have to do something along the same lines (though AFAICT that has not yet been fully fleshed out).

Agreed, I think a different feedback than AccECN would be smarter if the
ECT(1)->ECT(0) approach goes forward, and I like the NS reflection approach
that SCE's implementation started with.  (Although it might lose fidelity
from some ack aggregation responses, I'd expect usually that the marking
rate maintains proportionality on the low-congestion signal, and where that
fails, the standard ECE response is at least reliable, so it covers the
safety considerations the same way as classic marking.)

However, I also think for anyone who disagrees, other viable approaches
for the feedback might be possible.  But in that direction, I do think
it probably would need to differ from AccECN.  This would of course need to
be nailed down in the end, though I didn't get into it in the first email.
But the potential complexity here is one of the reasons I rate the
suggestion as perhaps a major architectural change for L4S.

I tend to think that the per-ECT(0) reflection in NS is the best way,
but I don't think it would change the rest of the argument if that position
turned out wrong.

> - For paths with multiple AQMs, the classifier partially loses integrity in
>   later AQMs when earlier AQMs are loaded.  (Note also the worse downside
>   that increasing deployment of new AQMs potentially reduces the fidelity
>   further.)
>
> If I understand what is being said, this is because ECT(0) would become ambiguous, as it can appear either on an L4S packet with a pre-congestion marking, or a non-L4S packet.  Doesn't the same issue exist with the current L4S proposal for CE-marked packets?

Yes, but the L4S specs go over this and walk through the reasoning for
why they landed on classifying CE into the LL queue, and the net result
in that case is  that the ECT(1)->CE marking strategy that L4S currently
follows will keep the 1/p packet signals in the LL queue for the later
hops.

(The potential problems were mostly limited to mis-classified marked
classic traffic, which will tend to be fewer in number and also less
severe given that the flow is slated to back off anyway, plus a review of
the main implementations suggested they wouldn't be doing double-backoffs
if the CE packet was out of order, IIRC.)

It might be better to phrase this not as "loses integrity", but rather as
"might systematically increase the latency experienced" for the 1/p signal,
since when there are multiple dualqs in line, those packets (but not others
from L4S flows) will land in the classic queue on the later dualqs.  This
is arguably a worse downside than the classification failure from putting
CE-marked classic traffic in the LL queue.

> Actually, it seems to me that this approach would yield exactly the same congestion signaling capability as using ECT(1) as a  pre-congestion / some congestion mark. All that has been done is to reverse the role of ECT(1) and ECT(0) compared to what the SCE draft and RFC 6040 envisioned. In other words:
>
>      +-----+-----+
>      | ECN FIELD |
>      +-----+-----+
>         0     0        Not-ECT
>         0     1        ECT(1) - L4S/SCE Capable AND No Congestion
>         1     0        ECT(0) - Some Congestion OR RFC 3168 ECN Capable
>         1     1        CE

Yes, that's my understanding.  I think the whole proposal can reasonably be
summarized as "SCE with the bits flipped".

> Jake, you said that the three issues discussed above -- tunnels, AccECN, and multiple AQMs in the path are "a few of the known tradeoffs." What are the others?

These are all the ones I know of yet, but I think Bob and Koen might have
some others they already know.  I'm not sure I got the whole story yet.

Thanks for your comments.

Best regards,
Jake




--

________________________________________________________________

Bob Briscoe                               http://bobbriscoe.net/