Re: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!

"Jerome Henry (jerhenry)" <jerhenry@cisco.com> Tue, 10 September 2019 23:34 UTC

Return-Path: <jerhenry@cisco.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B346512006B for <tsvwg@ietfa.amsl.com>; Tue, 10 Sep 2019 16:34:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=aQqEcavy; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=hyqzCt7N
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OJR2m9W19lC3 for <tsvwg@ietfa.amsl.com>; Tue, 10 Sep 2019 16:34:01 -0700 (PDT)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3994A120013 for <tsvwg@ietf.org>; Tue, 10 Sep 2019 16:34:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=26204; q=dns/txt; s=iport; t=1568158441; x=1569368041; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=Y37Qh4d9gPzrZUBgwtTqvRRgA4sseZwakyCU/oDLl+8=; b=aQqEcavyB4qqvDev3l2n8ngbkagnkWfYIJNvNhgKPeCdxLHxDp95Z/gR t8z/cXtLjqRBlnmWmg63VaG/CXFMKFnsGWQI9AYRtiW+TV7KGf2NCftFd 16Vqrv7yXxkvFOAMlH43W6H6Cc28bpzNaBqhDpyiK/+DaHgntQexbz5Ny I=;
IronPort-PHdr: 9a23:CFs3hBWH4Fub3KytbU/0mxfURnbV8LGuZFwc94YnhrRSc6+q45XlOgnF6O5wiEPSA9yJ8OpK3uzRta2oGXcN55qMqjgjSNRNTFdE7KdehAk8GIiAAEz/IuTtank4Ed5CWVl/7lmwMFNeH4D1YFiB6nA=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0D3AAC5Mnhd/51dJa1bBwMaAQEBAQECAQEBAQcCAQEBAYFnAoFDJCwDbVYgBAsqCoQXg0cDinuCNyV+lnKCUgNUCQEBAQwBASMKAgEBhD8CF4IyIzgTAgMJAQEEAQEBAgEGBG2FLgxCAQwBhHoBAQEBAgESCwYRDAEBNwEPAgEIDgMDAQIBAgImAgICMBUICAIEDgUigwABgWoDDg8BAgydPgKBOIhhc4Eygn0BAQWBRkFAgkQYghYDBoEMKAGLaA8YgUA/gRABJwwTgWA3NT6CGkcCAwGBMgQRLQoFFA2CRDKCJokmgxYHCw4BAyAPgjGFRZZYbgqCIYcBhQ2EFYIdgjcbgjSLYYZKhCuNQYF2hkyQagIEAgQFAg4BAQWBaSGBWHAVOyoBgkGCQgwXgkiBB4UUhT9zMneBCYsiAiQHgQQBgSIBAQ
X-IronPort-AV: E=Sophos;i="5.64,491,1559520000"; d="scan'208";a="323806848"
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 10 Sep 2019 23:33:46 +0000
Received: from XCH-RCD-012.cisco.com (xch-rcd-012.cisco.com [173.37.102.22]) by rcdn-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id x8ANXk5f006195 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 10 Sep 2019 23:33:46 GMT
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by XCH-RCD-012.cisco.com (173.37.102.22) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 10 Sep 2019 18:33:45 -0500
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 10 Sep 2019 19:33:44 -0400
Received: from NAM01-BN3-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Tue, 10 Sep 2019 18:33:44 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BECDTPvMxHjAKKCAlvCzcPItcdzK2hVQnK3WuPF3fA+atmDLxOhIm6EyMLF7bDDhNPv9XHdnMMtIY5p/Rch2rSoExtes6I/kt0x2dAHjOtkDd6ICmlyhjpFDX/K2xBXtR3LxK5cnDBpC3d7ri7dyywEho5Gxo5i37eaN5HrVEFrxJ/IB52s/kiYGAoecxGuSvhxb7LOmBnrtZj3Nj7P63+eh3k7CH6pQYC2jcmiih0thsRgcxXg4mwdjnt04mWDDAmrgjjP9q+UdgLpsX8TdsrCWCeczWrXohd2yIkF58YJdF6uO9Id9nQYt4Q5hsfLkfXTRwN5jLLXh37c0gyjyuw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Y37Qh4d9gPzrZUBgwtTqvRRgA4sseZwakyCU/oDLl+8=; b=iWHmGyQ8wnSLZs8zkDNpuU+O0ifRgGIg3q/3Us1net/hOfVHCenfGv1joiWt5XZtfHkRTBLvH1DKtw6wP4UHG9ryhSPcmWQ8LGYj2Kdtt9IlZ8i52JF3YdPFsDeqcKel3rwwT8JnFVpkMc5vt+nZr4SVhDM1se0XRewZP/awpd5QL9FnKG8xxj/OWFQxIzaigyFfhIMNzDo+jEafP+4kRahR/364XiszG411Omi9LrVxEnin3Kvw12wVpT2/lSojcYxyOrbDu/jWdyfY/W6jB+fkZMi48pnk1Y62YBqroktB4Ixfjb+1sVqnHTXr00SWZD0n6kHJf5ISCpc9u1oTzw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Y37Qh4d9gPzrZUBgwtTqvRRgA4sseZwakyCU/oDLl+8=; b=hyqzCt7NH4XkbQ0XNpPJCT0eAb2PDCy+9TvKhA4RC3TENPM0RhG49eKHrdhODyOfW2zGzXZRVy6EM5i6qqf++Xnt/H7Gt6+UtP3520iMoAERAJFtMdfoKOhj1GQeYRjIwYQleLErnOULVnkWVs8hhtD7cCYhBdjKJeDxsIKISKY=
Received: from BN8PR11MB3745.namprd11.prod.outlook.com (20.178.220.30) by BN8PR11MB3748.namprd11.prod.outlook.com (20.178.219.149) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2241.18; Tue, 10 Sep 2019 23:33:43 +0000
Received: from BN8PR11MB3745.namprd11.prod.outlook.com ([fe80::9d6c:7c4b:1b1f:1c8b]) by BN8PR11MB3745.namprd11.prod.outlook.com ([fe80::9d6c:7c4b:1b1f:1c8b%6]) with mapi id 15.20.2241.018; Tue, 10 Sep 2019 23:33:42 +0000
From: "Jerome Henry (jerhenry)" <jerhenry@cisco.com>
To: Greg White <g.white@CableLabs.com>
CC: "tsvwg@ietf.org" <tsvwg@ietf.org>, Sebastian Moeller <moeller0@gmx.de>
Thread-Topic: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!
Thread-Index: AdVfSTsXh/eMA9Y2RLeop2cZ3ij2ZAD+TSWAAB2l37AAOvCoAACNW7egAD5LIIAADnNdgP//vlsAgABEjgA=
Date: Tue, 10 Sep 2019 23:33:42 +0000
Message-ID: <B1847129-EDA2-4057-9CDB-28A7F5D59BE1@cisco.com>
References: <CE03DB3D7B45C245BCA0D24327794936306BBE54@MX307CL04.corp.emc.com> <AA4DBFC5-8D8F-4F43-80E4-BB9BA7F53486@cablelabs.com> <LEJPR01MB1178B6C102455F1F9886D49A9CBB0@LEJPR01MB1178.DEUPRD01.PROD.OUTLOOK.DE> <F351D86E-DCE4-45CD-9B08-2E0C11090BF1@cablelabs.com> <LEJPR01MB11789EE6D8B7C732393BD1439CB70@LEJPR01MB1178.DEUPRD01.PROD.OUTLOOK.DE> <B11AB47E-7E35-4599-A85B-DB0EF883E2B2@cablelabs.com> <BDF260C9-881C-4ACC-AF92-8E99C1CB07E0@gmx.de> <4B5C14EE-B3CF-455B-86C9-67D6E9BAEF4C@cablelabs.com>
In-Reply-To: <4B5C14EE-B3CF-455B-86C9-67D6E9BAEF4C@cablelabs.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jerhenry@cisco.com;
x-originating-ip: [173.38.117.68]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 69feeb2a-6b7f-4c0f-52f3-08d73647513f
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600166)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:BN8PR11MB3748;
x-ms-traffictypediagnostic: BN8PR11MB3748:
x-ms-exchange-purlcount: 1
x-microsoft-antispam-prvs: <BN8PR11MB374876167256D33DE76DF0B3D5B60@BN8PR11MB3748.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 01565FED4C
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(366004)(346002)(376002)(39860400002)(136003)(396003)(199004)(189003)(51444003)(486006)(478600001)(186003)(26005)(25786009)(2616005)(476003)(66066001)(6512007)(53936002)(6306002)(11346002)(71200400001)(71190400001)(54906003)(316002)(66946007)(66556008)(53546011)(2906002)(53946003)(446003)(66446008)(66476007)(86362001)(81166006)(91956017)(76116006)(256004)(14444005)(229853002)(66574012)(76176011)(33656002)(6486002)(4326008)(102836004)(81156014)(64756008)(5660300002)(8936002)(305945005)(6246003)(6506007)(8676002)(6116002)(36756003)(7736002)(99286004)(14454004)(30864003)(3846002)(6436002)(6916009)(21314003); DIR:OUT; SFP:1101; SCL:1; SRVR:BN8PR11MB3748; H:BN8PR11MB3745.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: 3L1YSZRzlN7cfHT5ZmRMfXUhIaDPyWcH2kY2oeDBrbPKUPb/qp2DFvzC20WFvksWghZmgLBqMS65xrwSD0IfqEc4M8UGe/IGDO7boVfTyXLBnjzT8w3l+Fz3gVB0ktz416vBWM00ztVS2GJO/8pYbrkj/tIb6v5tJ2M/5A/YUOAMH7ICYdZ7Ga0ZZua+hh1lqL4q8BIklPReI5QQgB71hDcFKHvhghZL4AXU1uSd/sq7luuXL3SrB4PSqCCX5nl1n56vmZsV7O9i3h/48NsVRekM5t/uOwSOY0RIgXzttAvrQmpaIcT99GK27MhGZcK1+BRfoUlMGdsR2xmxVKE6nJL0nad/E3XDVxtTG8zcaMjmUsxaRCDAgBlInHpEQysVhBcQcur3HFqby9edj1RrTwGgqkcpBcEIXcpkaGdUOF8=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <5740E1F14F23D04DB2C00297439D9732@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 69feeb2a-6b7f-4c0f-52f3-08d73647513f
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Sep 2019 23:33:42.7658 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: wMrQfXbxskm5mJN5mADCg18STDIdmQUM7+ATBiwg5PUuoohRoDm4DDYXeg1UMjnJVrr5GkT70HF9DWNm3Pi6NQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR11MB3748
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.22, xch-rcd-012.cisco.com
X-Outbound-Node: rcdn-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/E55SoxU26GrSQ28LVyFcvuEKe5s>
Subject: Re: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Sep 2019 23:34:05 -0000

Hi Greg,

I must say that Sebastien's argument also resonate with me (and I may be old school). The traffic types listed in the draft as NQB (interactive voice and video, gaming, machine to machine applications, then further also voice chat and DNS lookup) are all defined in various other RFCs (RFC8325 for 802.11 of course, but also RFC 4594 for most of them), with their associated recommended DSCP value. One element that they have in common is that they may individually be innocuous, but a large amount of them would obviously generate congestion. In the case of Wi-Fi, there may be several queues (usually 4 to 5 or 8 to 9), but in the end, there is only one radio, and any traffic will compete for this limited resource. Maybe what stops us (at least me) is a poor understanding of what exactly would be these NQB flows. I am debating with myself to decide if they are flows that have not been classified or categorized before, of if they are flows that are already classified, and that the NQB draft suggest should be classified differently (thus requiring an update of several other documents).
The case of 'interactive voice' or 'voice chat' is case in point. As I understand these flows (again, I may be old school), they would require a very different treatment from DNS requests. And at the same time, I am lost as to why delaying a DNS lookup (to a reasonable extend) would be damaging to the user experience or the DNS service on the client or server. Would you help me understand these NQB traffic flows more in details?
Also, I read in the thread what appears to me as a contradiction, that we are required to work with the current state of implementations where there is a default mapping of the first 3 bits of DSCP to UP (I would suggest trying other brands, I can give you quite a few names __), and that we are therefore stuck with this mapping and logic, but yet these same products should implement a new queue structure. Why would we be stuck with mapping and not with the queue structure?

Best regards,
Jerome 


On 9/10/19, 5:29 PM, "tsvwg on behalf of Greg White" <tsvwg-bounces@ietf.org on behalf of g.white@CableLabs.com> wrote:

    Hi Sebastian, 
    
    See below marked [GW].
    
    
    
    On 9/10/19, 1:23 PM, "Sebastian Moeller" <moeller0@gmx.de> wrote:
        Hi Greg,
        > On Sep 10, 2019, at 20:29, Greg White <g.white@CableLabs.com> wrote:
        > Yes, my focus (both from the perspective of the systems that I work on, and from the perspective of where I think NQB differentiation is most valuable) is on last mile and WiFi.       
        	[SM] Except with the current very loose definition of which flows qualify for NQB marking, NQB seems to only merit AC_BE, which is already the default, so is NQB actually going to be valuable for wifi?
        > In terms of interconnection, there could be multiple ways to handle this.  My view is that the endpoint application has the best a priori knowledge of its sending behavior, so it is good to leverage that (and either validate it or not, depending on what is most appropriate for the situation).  
        	[SM] not validating the behavior but giving special powers (like the originally proposed AC-VI/AC_VO on wifi) seems like a genuinely optimistic ideas. 
        
    
    [GW] What validation is done today for applications that mark their packets as AC_VO or AC_VI?  I think that WMM is another one of those cases where the tragedy of the commons seems imminently possible, yet it largely hasn't occurred.  But, I hear you about being more clear about which flows are intended to be marked NQB. We certainly don't want to recommend something that creates the tragedy. Perhaps we've left it too ambiguous in the draft, so that needs some review.  It was not the intent that capacity-seeking flows (even L4S) mark their packets as NQB.  The target flows would be ones where the sender has a degree of confidence that it will not exceed the available capacity of the path.  Also, I think validation of NQB behavior is a very useful tool, and it is in fact mandatory to implement for DOCSIS links.  Other links (including WiFi) could implement it as well.  For example, WiFi APs or Stations could monitor queue depth or queue latency for the AC_VI (or AC_VO, whichever NQB maps to) queue and re-direct NQB traffic to AC_BE, either in a flow-aware way (probably preferred) or possibly even in a flow-blind way.  In other situations it may not be necessary (e.g. in controlled environments or on links that support FQ), or it may not be feasible.  
    
    
    
        > This would argue for networks to adopt a policy of not bleaching the NQB value on traffic arriving from interconnections, and utilizing queue protection if necessary to validate NQB behavior.   That said, there are other ways that network operators can identify NQB traffic without solely relying on endpoint marking (and DSCP preservation across interconnects).  I know some operators are investigating such techniques.      
        	[SM] if the name has any relevance, one could treat each flow as non-queue-building until there is enough evidence to change that classification (like fq_codel treats all new flows as sparse initially until their observed bahavior merits a different classification).
      
    
    [GW] Exactly.  That is one mechanism that has been discussed.  A possible downside to that approach is that once the flow has demonstrated that it is QB (by building a queue in the NQB buffer) and subsequent packets are classified to the QB buffer, it is possible that the QB buffer was empty when those packets arrived, and they end up being transmitted before the tail packets in the NQB buffer, i.e. out of order delivery.   Flow startup for traditional TCP flows (even those that support RACK) can be sensitive to out of order delivery, so if this happens frequently it could be an issue.
    
    
    
    
        Best Regards
        	Sebastian
        
        
        >  
        > -Greg
        >  
        > From: "Ruediger.Geib@telekom.de" <Ruediger.Geib@telekom.de>
        > Date: Monday, September 9, 2019 at 12:57 AM
        > To: Greg White <g.white@CableLabs.com>
        > Cc: "tsvwg@ietf.org" <tsvwg@ietf.org>
        > Subject: AW: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!
        >  
        > Hi Greg,
        >  
        > to me that reads as if you are mainly interested in a specified NQB DSCP for the last mile. A packet received at interconnection with a DSCP which hasn’t been agreed between sending and receiving domain will be re-written (speaking for the part of the network I work with). 
        >  
        > That’s ok, as DiffServ involves policy management anyway.
        >  
        > Regards,
        >  
        > Ruediger
        >  
        > Von: Greg White <g.white@CableLabs.com> 
        > Gesendet: Freitag, 6. September 2019 19:18
        > An: Geib, Rüdiger <Ruediger.Geib@telekom.de>
        > Cc: tsvwg@ietf.org
        > Betreff: Re: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!
        >  
        > Hi Ruediger,
        >  
        > Many networks can (and do) configure the DSCP to PHB mappings and policies in accordance with their own intended usage.  In particular, DOCSIS links and LTE links (likely others as well) can be configured in a manner that complies with the PHB definition.  In other cases, it may be either necessary or sufficient (or both) to support NQB traffic without fully complying with the PHB (of course this isn’t new with NQB).
        >  
        > One of the high level goals is to ensure that the benefits of differentiating NQB traffic are not lost when that traffic traverses a WiFi link (since in many of the target use cases it does).  WiFi gear will likely not support all of the aspects of the PHB definition (at least current equipment will not).  We are essentially limited to 4 queues (BK, BE, VI, VO) and their associated CSMA parameters.  An additional constraint that we’re faced with is that in many cases the mapping from DSCP to AC is essentially fixed – it is either operationally hard or impossible to change.
        >  
        > Of the WiFi APs that we’ve tested (a sample of current generation .11ac devices, covering several chipsets) 100% of them use the “default mapping” of DSCP to AC as follows.
        >  
        > DSCP
        > WMM Access Category
        > 001xxx, 010xxx
        > Background (AC_BK)
        > 000xxx, 011xxx
        > Best Effort (AC_BE)
        > 10xxxx
        > Video (AC_VI)
        > 11xxxx
        > Voice (AC_VO)
        >  
        > Living within this constraint, and trying to make the best of it, we’ve selected as a default DSCP the 0b101010 value, which would get mapped into the Video Access Category (along with CS4, AF41, AF42, AF43, CS5, VA, EF).  This would ensure that, in large part, NQB traffic is handled in a separate queue from the queue-building bulk data traffic (the vast majority of which uses AC_BE or AC_BK).
        >  
        > I would not expect that it would be important for NQB marked traffic to be differentiated in core network switches or routers, which in many cases do not provide deep (10’s to 100’s of ms) buffers.  So, in these switches NQB would likely be treated the same as Default (or whichever local use codepoint is used for best effort).
        >  
        > A characteristic of the NQB PHB as implemented in DOCSIS is that it provides low latency, low latency variation, and low loss for an NQB marked flow as long as the flow is “well behaved”.  If an NQB-marked flow is not well behaved then it experiences greater latency variation, greater loss, and potential re-ordering.   A well behaved flow is one that does not materially cause queue build-up in the network, i.e. its instantaneous rate does not materially exceed the instantaneous available bandwidth of the path.
        >  
        > In managed networks, or in cases where SLAs are provided, it seems to me that an operator should determine whether traffic that is already in a defined service class would benefit from being further differentiated based on QB vs NQB behavior (like, as you suggested using various AF marks), or whether certain existing service classes can be grouped into QB vs NQB meta-classes, depending on the technology limitations at each hop (MPLS, Ethernet, WiFi, LTE, DOCSIS, etc).  The result of this determination could require the use of non-default (i.e. non-standard) marking of NQB traffic in some cases.
        >  
        > -Greg
        >  
        >  
        >  
        > From: "Ruediger.Geib@telekom.de" <Ruediger.Geib@telekom.de>
        > Date: Thursday, September 5, 2019 at 2:03 AM
        > To: Greg White <g.white@CableLabs.com>
        > Cc: "tsvwg@ietf.org" <tsvwg@ietf.org>
        > Subject: AW: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!
        >  
        > Hi Greg,
        >  
        > the policy of the company I work for is: EF marked traffic received on a peering interface is remarked. DiffServ traffic destined to a retail access is subject to admission control, if that traffic is not expected to experience congestion. 
        >  
        > The latter might change with high-speed access links. If the users and the above traffic have a hard time congesting these access links, the admission control requirement may not be strictly required.
        >  
        > If NQB traffic is supposed to be sent to third parties without an SLA at peering links being in place, proper selection of the DSCP matters. Without a deeper thought, a DSCP 000xx1 may be a proper choice in that case. Without an SLA being in place, the forwarding to be expected is default forwarding. If NQB is supposed to define a default-like behavior for a serious traffic share, it should be marked by a DSCP in the range 000 xxx at interconnection.
        >  
        > If an SLA is expected to be in place at peerings, any traffic without admission control should face a higher packet drop probability if destined to a retail access, than admission controlled traffic. If I assume the admission controlled traffic to be marked AFx1, NQB traffic in the same queue should be marked AFx2 (or AFx3). I’m open to discuss queue depths and expected traffic properties for a suitable AF class. RFC 8100 proposes to specify DSCPs only at interconnection. That may be a starting point, should SLAs on NQB at peerings be within commercial scope (that’s a non-technical issue, of course).
        >  
        > The choice of a DSCP for traffic which is created and terminated within a single domain doesn’t need to specified – here the PHB specification is important and the behavior of that traffic in the presence of traffic from other PHBs. I’d again opt for AFx2 or AFx3 (hoping that the NQB PHB specification allows for a useful implementation suiting AFx1 and NQB traffic in the same queue, expecting both to expect no congestion, AFx1 traffic to be admission controlled if present and NQB having features to reduce bandwidth if congestion is imminent). 
        >  
        > I’m not sure what is expected from a backbone network supporting NQB (and other DiffServ PHBs). MPLS supports 8 traffic classes or codepoints, respectively. This coding space includes the codepoints required for ECN (codepoints, not bits).
        >  
        > I appreciate more standard DSCPs based on a clear and consented definition of the corresponding PHBs. Default marking, LE, EF and Network Management are good examples.
        >  
        > My take – sorry if I misunderstood some of your design aims, should that be the case.
        >  
        > Regards,
        >  
        > Ruediger
        >  
        > Von: tsvwg <tsvwg-bounces@ietf.org> Im Auftrag von Greg White
        > Gesendet: Donnerstag, 5. September 2019 01:02
        > An: Black, David <David.Black@dell.com>; tsvwg@ietf.org
        > Betreff: Re: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!
        >  
        > Thanks David.
        >  
        > On your item 3, could you clarify what you mean?   RFC 8325 does not discuss a “non queue building” service class, and so I don’t see a technical inconsistency between the NQB draft and RFC8325.  There has been some discussion on the list as to whether IETF should recommend that NQB be mapped to UP_6/AC_VO or UP_5/AC_VI, but in at least one of those cases where it was suggested to change the draft, the rationale for doing so was based on an incorrect assumption that NQB-marked traffic would by definition include capacity-seeking flows (e.g. L4S).  As I stated on list, I don’t have a problem with changing it to UP_5/AC_VI if that is the consensus.  But, the reason for mapping NQB to UP_6/AC_VO is so that both RFC8325 and “default mapping” 802.11 devices map EF, VA and NQB together to the same UP/AC, and so that both types of devices map these traffic types one AC level “higher” than elastic traffic sources (e.g. AF3x).  I’d like to see a more reasoned argument as to why NQB should be grouped with AF3x traffic as opposed to EF & VA before making a change.
        >  
        > -Greg
        >  
        >  
        >  
        > From: tsvwg <tsvwg-bounces@ietf.org> on behalf of David Black <David.Black@dell.com>
        > Date: Friday, August 30, 2019 at 9:41 AM
        > To: "tsvwg@ietf.org" <tsvwg@ietf.org>
        > Subject: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!
        >  
        > In the Montreal TSVWG meeting, there was a strong sense of the room that the TSVWG WG should adopt draft-white-tsvwg-nqb as a starting point for work on an NQB PHB.   The WG call for adoption on this list has been open for over a week, since August 21, and having seen only one objection on the list to adoption of the draft (from Dave Taht), the WG chairs (Gorry, Wes and David) have concluded that the WG rough consensus is to adopt this draft.  It’s important to emphasize that the draft is adopted as a *starting point* for TSVWG work, i.e., the current draft content does not represent the rough consensus of the WG.  Significant work will be required to produce an actual PHB spec that is suitable for implementation – see the recent RFC 8622 on the LE PHB (https://datatracker.ietf.org/doc/rfc8622/) for an example of what a PHB spec looks like.
        >  
        > There are a few items that will need attention before the initial -00 WG version of the NQB draft is submitted – these are to avoid confusion about what the WG intends to do:
        > 1)      The draft needs to be clear that the use of the 0x2A DSCP value as the default for this PHB is a *suggestion by the authors that is subject to change*.  Whether to use that DSCP or a different one is a WG decision; the plan is to discuss and select the default DSCP value starting (and hopefully concluding) in September.
        > 2)      The criticisms on this list of the “queue protection” requirement in the draft are largely accurate.   The draft needs at least an Editor’s Note that this material will be revised, as while the DOCSIS mechanism is an example of how to do queue protection, it is not appropriate to require implementation of that mechanism.   A plausible plan that I have discussed with the authors is to write a set of functional/behavioral requirements for NQB “traffic protection” that can be satisfied by a “queue protection” mechanism such as the DOCSIS mechanism, or by a suitably configured FQ AQM implementation.
        > 3)      RFC 8325 reflects the IETF consensus on how to map between Diffserv and WiFi QoS, hence the 8.3 section of the NQB draft needs to be modified to be consistent with RFC 8325.
        > 4)      Similarly, the 8.2 section of the NQB draft needs to be modified to reflect the conclusion of discussion on this topic in Montreal.
        > Those 4 changes are necessary in the -00 WG version of the NQB draft.
        >  
        > In addition, related to item 2), my expectation (which is open to further discussion) that “traffic protection” will be a “MUST” requirement, perhaps with some well-specified exceptions (including explanations of why the exceptions are ok).   This is because “traffic protection” (e.g., “queue protection” or a suitably configured FQ AQM) appears to be necessary in general to keep queue-building traffic out of the NQB traffic aggregate, as allowing such traffic degrades the properties of the NQB PHB.
        >  
        > Thanks, --David (TSVWG co-chair, will be shepherd for NQB draft).
        > ----------------------------------------------------------------
        > David L. Black, Senior Distinguished Engineer
        > Dell EMC, 176 South St., Hopkinton, MA  01748
        > +1 (774) 350-9323 New    Mobile: +1 (978) 394-7754
        > David.Black@dell.com
        > ----------------------------------------------------------------