Re: [tsvwg] plan for L4S issue #29

Gorry Fairhurst <gorry@erg.abdn.ac.uk> Wed, 23 September 2020 16:17 UTC

Return-Path: <gorry@erg.abdn.ac.uk>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16B483A129E for <tsvwg@ietfa.amsl.com>; Wed, 23 Sep 2020 09:17:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0Afm2ud9Road for <tsvwg@ietfa.amsl.com>; Wed, 23 Sep 2020 09:17:17 -0700 (PDT)
Received: from pegasus.erg.abdn.ac.uk (pegasus.erg.abdn.ac.uk [137.50.19.135]) by ietfa.amsl.com (Postfix) with ESMTP id 0D67E3A12B3 for <tsvwg@ietf.org>; Wed, 23 Sep 2020 09:17:16 -0700 (PDT)
Received: from GF-MacBook-Pro.lan (fgrpf.plus.com [212.159.18.54]) by pegasus.erg.abdn.ac.uk (Postfix) with ESMTPSA id 395851B0015C; Wed, 23 Sep 2020 17:17:11 +0100 (BST)
To: "Rodney W. Grimes" <ietf@gndrsh.dnsmgr.net>, "De Schepper, Koen (Nokia - BE/Antwerp)" <koen.de_schepper@nokia-bell-labs.com>
Cc: "tsvwg@ietf.org" <tsvwg@ietf.org>
References: <202009231608.08NG8eGa042615@gndrsh.dnsmgr.net>
From: Gorry Fairhurst <gorry@erg.abdn.ac.uk>
Message-ID: <0824818b-c060-e8d4-23d5-9b92b97cdca1@erg.abdn.ac.uk>
Date: Wed, 23 Sep 2020 17:17:10 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:78.0) Gecko/20100101 Thunderbird/78.2.2
MIME-Version: 1.0
In-Reply-To: <202009231608.08NG8eGa042615@gndrsh.dnsmgr.net>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Content-Language: en-GB
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/CzvQLw-4Xb--PgwhwIv5XuGeChA>
Subject: Re: [tsvwg] plan for L4S issue #29
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Sep 2020 16:17:22 -0000

On 23/09/2020 17:08, Rodney W. Grimes wrote:
>> Hi Pete,
>>
>> I don't think the goal is to wait for a perfect RFC3168 detection solution and we already have an implementation that works well under a wide variety of conditions without additional configuration. This also means that it can still be improved, which I think can be done more appropriate when facing real world issues. The goal of the operational guidelines is to provide a larger set of tools for solving problems with classic ECN bottlenecks, exactly to avoid the need to rely on perfect end-host detection mechanism only.
>>
>> Related to the "false negatives" and "false positives" naming, I agree that it is very confusing. As the goal is to detect Classic ECN network AQM behavior, maybe better and shorter names could be "false-detect" and "false-non-detect"?
> Though I like these terms better, can we go one further and make it plain english "failure to detect" and "incorrectly detected"?
> My issue is mostly with the double negative construct of combining "false" and "non" in the same term, which is most likely the same reason people have proplems with the original terms as in the case of "false negatives".
>
> Regards,
> Rod

Why can't we just say "does not detect"?

Gorry

>> Koen.
>>
>> -----Original Message-----
>> From: Pete Heist <pete@heistp.net>
>> Sent: Wednesday, September 23, 2020 2:19 PM
>> To: De Schepper, Koen (Nokia - BE/Antwerp) <koen.de_schepper@nokia-bell-labs.com>; Wesley Eddy <wes@mti-systems.com>
>> Cc: tsvwg@ietf.org
>> Subject: Re: [tsvwg] plan for L4S issue #29
>>
>> Hi Koen,
>>
>> I can definitely understand the need to turn bottleneck detection on and off for testing, or for additional knobs during development.
>>
>> Overall, I suspect that there will be more questions about potential problems if bottleneck detection is not a MUST for implementations in the draft, or not baked into the final implementation in a way that works well under a wide variety of conditions without additional configuration.
>>
>> On an easier topic, I wonder if we shouldn't change the "false negatives" and "false positives" terminology to something clearer, like "mis-identification of RFC 3168 bottlenecks as L4S", or "mis- identification of L4S bottlenecks as RFC 3168", respectively. I might have opened up a can of worms there in trying to save a few words. :)
>>
>> Pete
>>
>> On Tue, 2020-09-15 at 12:43 +0000, De Schepper, Koen (Nokia -
>> BE/Antwerp) wrote:
>>> Hi Wes, Pete,
>>>
>>> I think to make progress on avoiding both false negatives and false
>>> positives, a good view on the conditions that cause problems is
>>> needed. So we better have the means to detect the real life impact of
>>> Classic-ECN-FIFO deployments. This means we need to be able to switch
>>> off Classic ECN detection (under controlled or even known conditions).
>>>
>>> Another point is that it would be useful also to have all control
>>> variables of the existing implementation configurable for everyone
>>> willing to further experiment (without necessarily needing to change
>>> code). As I understood, the right tuning of these can bring a lot of
>>> further improvement opportunities. Also depending on a typical
>>> deployment, these parameters could be tuned for that specific targeted
>>> case.
>>>
>>> So the resolution of this issue is exactly to facilitate further
>>> improving the detection algorithm (preferably via tuning), and being
>>> able to disable it when conditions are controlled or safe to avoid
>>> these false negatives.
>>>
>>> I think these are topics that can be covered by the Operational
>>> Guidelines draft.
>>>
>>> Regards,
>>> Koen.
>>>
>>> -----Original Message-----
>>> From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of Pete Heist
>>> Sent: Friday, July 31, 2020 8:53 PM
>>> To: Wesley Eddy <wes@mti-systems.com>
>>> Cc: tsvwg@ietf.org
>>> Subject: Re: [tsvwg] plan for L4S issue #29
>>>
>>> Hi Wesley,
>>>
>>> One thing I noticed during testing was that the current implementation
>>> of TCP Prague in Linux allows disabling bottleneck detection through
>>> the prague_ecn_fallback kernel module parameter (
>>> https://github.com/L4STeam/linux/blob/0e7cf8acb318873c3f61084453f8da15
>>> b2e398be/net/ipv4/tcp_prague.c , line 158). I don?t know if that was
>>> left in only for testing.
>>>
>>> In section 6.3.3 of l4s-arch, there is discussion around classic
>>> bottleneck detection. Since I don?t see an explicit MUST that it
>>> remain enabled (although I do see the text ?an L4S sender will have to
>>> fall back to??), it?s not completely clear to me if it?s actually
>>> required to be implemented and permanently enabled in all
>>> implementations. If it is, I suppose the implementation should reflect
>>> that also.
>>>
>>> While I feel it best that detection identifies both types of queues
>>> accurately, if bottleneck detection were both an explicit MUST in the
>>> text *and* not possible to disable in any implementation, I think that
>>> would make the misidentification of L4S queues as classic ECN queues
>>> less of a safety concern, since it would be impossible to turn off. It
>>> would remain an issue for the architecture overall though.
>>>
>>> Hope that helps...
>>>
>>> Pete
>>>
>>>> On Jul 31, 2020, at 5:41 PM, Wesley Eddy <wes@mti-systems.com>
>>>> wrote:
>>>>
>>>> Hello, ticket #29 for the L4S documents is about classic bottleneck
>>>> detection misidentifying L4S queues as classic ECN queues.
>>>>
>>>> https://trac.ietf.org/trac/tsvwg/ticket/29
>>>>
>>>> In contrast to other issues, it doesn't seem like this should block
>>>> a WGLC on the L4S drafts.
>>>>
>>>> 	? It is specific to classic bottleneck detection algorithm, which
>>>> is planned to be worked on in the Prague ICCRG draft.
>>>> 	? The result is sometimes failing to achieve the best possible L4S
>>>> behavior, but doesn't seem to be an Internet safety issue.  This
>>>> resulting in people turning off classic bottleneck detection would
>>>> be a different issue, and something maybe the operator guidelines
>>>> would address.
>>>> 	? It seems like it can be worked on further in the course of L4S
>>>> experimentation, without negative effects to others.
>>>> So, I believe we should track this work in the ICCRG, and close the
>>>> ticket here.  Please let me know in the next week if I've
>>>> misunderstood any aspect of this and it should remain open.
>>>>
>>>>
>>
>>