Re: [tsvwg] CC/bleaching thoughts for draft-ietf-tsvwg-le-phb-04

<Ruediger.Geib@telekom.de> Mon, 09 April 2018 07:13 UTC

Return-Path: <prvs=630201589=Ruediger.Geib@telekom.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4BF0A127333; Mon, 9 Apr 2018 00:13:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.31
X-Spam-Level:
X-Spam-Status: No, score=-4.31 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=telekom.de header.b=U/0W+2hY; dkim=pass (1024-bit key) header.d=telekom.onmicrosoft.de header.b=SS07kn7N
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Fog2-cxRYhsl; Mon, 9 Apr 2018 00:13:21 -0700 (PDT)
Received: from mailout23.telekom.de (MAILOUT23.telekom.de [80.149.113.253]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE4C012D87F; Mon, 9 Apr 2018 00:13:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telekom.de; i=@telekom.de; q=dns/txt; s=dtag1; t=1523258001; x=1554794001; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=ko0zctkzTuVTG3ilJCluVGNDDAMoMfIpRe6u/UoWMKg=; b=U/0W+2hYc7k/KrEjupGAM/mLl/GNlKmzz2+HHXTJJlKyGDw1RIF5/Z9I tbPwVgYv0fh/eFDuHU+fBhEYad1zmH+gsH/kcNws4gbmbP1BMD8a3lIPW IpjSbT6jTsD3vBlmZ071tX6o4SwGz0Bd4QB5iP2uZWdx5sJpeowVcbZev lBQUP1+CzNh54rOBOeGu3QCYOv/FVU2DbvuXlVp/+7okq2N2MdqAr/Q3l XF1Sy/iVCBMvpNGfzxtkYbtf3eqeAfn0LtNoI3vfo2UCKDkGub+sVLHuF JrvmivTM7MczybncmqFvJasENI3tNbaDcGPnjsvFgti2RkOqnrA808pI2 Q==;
Received: from q4de8psa04t.blf.telekom.de ([10.151.13.130]) by MAILOUT21.telekom.de with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 09 Apr 2018 09:13:17 +0200
X-IronPort-AV: E=Sophos;i="5.48,405,1517871600"; d="scan'208";a="850867534"
Received: from he105849.emea1.cds.t-internal.com ([10.169.118.23]) by Q4DE8PSA04V.blf.telekom.de with ESMTP/TLS/AES256-SHA; 09 Apr 2018 09:13:16 +0200
Received: from HE106162.EMEA1.cds.t-internal.com (10.169.118.73) by HE105849.emea1.cds.t-internal.com (10.169.118.23) with Microsoft SMTP Server (TLS) id 15.0.1365.1; Mon, 9 Apr 2018 09:13:16 +0200
Received: from HE106564.emea1.cds.t-internal.com (10.171.40.16) by HE106162.EMEA1.cds.t-internal.com (10.169.118.73) with Microsoft SMTP Server (TLS) id 15.0.1365.1 via Frontend Transport; Mon, 9 Apr 2018 09:13:16 +0200
Received: from GER01-LEJ-obe.outbound.protection.outlook.de (51.5.80.24) by O365mail01.telekom.de (172.30.0.234) with Microsoft SMTP Server (TLS) id 15.0.1365.1; Mon, 9 Apr 2018 09:12:41 +0200
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telekom.onmicrosoft.de; s=selector1-telekom-onmicrosoft-de; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=ko0zctkzTuVTG3ilJCluVGNDDAMoMfIpRe6u/UoWMKg=; b=SS07kn7NIqTghmQmrMOLP9CfG6eOiK39QwNXcNyZ5B+0ejNA8cn7jIMxFaSg0RFNBXUARhxIZYb4CGiONBuy6EifAUA+0Av9O4gobMJnAadVAKA6Ng3b7iw0yENC95GVhuVPLXCSBJFMAjpCCj/EBFhceGUGOoHLtte5qaXJxZA=
Received: from LEJPR01MB1033.DEUPRD01.PROD.OUTLOOK.DE (10.158.147.8) by LEJPR01MB1034.DEUPRD01.PROD.OUTLOOK.DE (10.158.147.9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.653.11; Mon, 9 Apr 2018 07:13:15 +0000
Received: from LEJPR01MB1033.DEUPRD01.PROD.OUTLOOK.DE ([fe80::65b5:5acc:7745:2243]) by LEJPR01MB1033.DEUPRD01.PROD.OUTLOOK.DE ([fe80::65b5:5acc:7745:2243%14]) with mapi id 15.20.0653.015; Mon, 9 Apr 2018 07:13:15 +0000
From: Ruediger.Geib@telekom.de
To: tte@cs.fau.de
CC: draft-ietf-tsvwg-le-phb@ietf.org, tsvwg@ietf.org
Thread-Topic: [tsvwg] CC/bleaching thoughts for draft-ietf-tsvwg-le-phb-04
Thread-Index: AQHTzcEFZJ06J0/Z90S+8eydkkqQ1aP3/rcw
Date: Mon, 09 Apr 2018 07:13:15 +0000
Message-ID: <LEJPR01MB1033F43509F08701B2B5EA1D9CBF0@LEJPR01MB1033.DEUPRD01.PROD.OUTLOOK.DE>
References: <20180406160344.xwfqgzhzfto56jhq@faui48f.informatik.uni-erlangen.de>
In-Reply-To: <20180406160344.xwfqgzhzfto56jhq@faui48f.informatik.uni-erlangen.de>
Accept-Language: en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Ruediger.Geib@telekom.de;
x-originating-ip: [164.19.3.99]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; LEJPR01MB1034; 7:h1x3HjoP1cIJR84s2QYZ+zReGAI0I2UfSNEtSjT4JSqITJSYxxxr1LwBBGUrTqZIsAKA7Y7a1RwlWsnSzQK0gdABoADPy1ZCKNnfdNaGjH9KY0noj+XYJYYNRksVTqVCWrrNWt0HQNzZ96TnLuhAIkJJTkRileAE6OWsgmEUyQ/2cm0C6vHg0QSfx+DRMi0W8heo2OUOFO8XPU13+hfmhPW27noejyF/DfyVdGts0mLkslZy/ElkTIfHWgjzXGmh
x-ms-exchange-antispam-srfa-diagnostics: SOS;
X-MS-Office365-Filtering-Correlation-Id: 054d9ae1-5129-4a2b-0142-08d59de95cd0
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(4534165)(4627221)(201703031133081)(201702281549075)(5600026)(4604075)(3008032)(2017052603328)(7153060)(7193020); SRVR:LEJPR01MB1034;
x-ms-traffictypediagnostic: LEJPR01MB1034:
x-microsoft-antispam-prvs: <LEJPR01MB1034CBEEFF8675F65961F1D09CBF0@LEJPR01MB1034.DEUPRD01.PROD.OUTLOOK.DE>
x-exchange-antispam-report-test: UriScan:(211171220733660);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(93006095)(93001095)(3231221)(944501327)(52105095)(10201501046)(3002001)(6041310)(20161123562045)(20161123558120)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(6072148)(201708071742011); SRVR:LEJPR01MB1034; BCL:0; PCL:0; RULEID:; SRVR:LEJPR01MB1034;
x-forefront-prvs: 0637FCE711
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(376002)(346002)(39380400002)(396003)(39860400002)(199004)(189003)(8936002)(14454004)(3660700001)(33656002)(4326008)(74482002)(52396003)(2906002)(2900100001)(6116002)(66066001)(7696005)(3846002)(75402003)(478600001)(105586002)(72206003)(316002)(9686003)(55016002)(6916009)(3280700002)(76176011)(53936002)(59450400001)(81156014)(305945005)(68736007)(86362001)(8676002)(7736002)(97736004)(106356001)(54906003)(476003)(446003)(5660300001)(102836004)(5250100002)(26005)(81166006)(186003)(486006)(11346002); DIR:OUT; SFP:1101; SCL:1; SRVR:LEJPR01MB1034; H:LEJPR01MB1033.DEUPRD01.PROD.OUTLOOK.DE; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: telekom.de does not designate permitted sender hosts)
x-microsoft-antispam-message-info: O8ulN2YIfybuZKkG7pbwUJwTamO2ZHO+gOLnyzo5iZ4FQkBoLm0j/gY6vewcqEOsdWxUAQ9qdu7rCuEBjDv0O3YvPWE/1KSsOZravu2wXFxNyUnoSKLpWoIp34Hni+C16d7swuzNtrLq5/hEz+IEz9tJXMOiiwtxr6fBmHLxJ4gyvk1glUl+Qlr0JlGL6U0NwDplwVnrE0hjANIEtvDbVE/rqkYcm5cjkYzNp3oO2Y6fG7v8wF3LftAi/ueYF24L0a9ij5rC1FIl9H1G+MdTZuaBAvixUBWPY3S5RTkivB2T26PmkepodF2S7Qq0p3afhZMXLQ+f2okkg1ocvCkbas5vQ7BetvRv7goOA6B2u/xQQRLoZhxdimZKWSWryNOovA0D28ua7FRpn6n4U6m+7tnvX48uKXe8e4qOU1JEQVo=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 054d9ae1-5129-4a2b-0142-08d59de95cd0
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Apr 2018 07:13:15.2088 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bde4dffc-4b60-4cf6-8b04-a5eeb25f5c4f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: LEJPR01MB1034
X-OriginatorOrg: telekom.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/F1SSyrdikFSsaKIeeO2c8PyIlGo>
Subject: Re: [tsvwg] CC/bleaching thoughts for draft-ietf-tsvwg-le-phb-04
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Apr 2018 07:13:25 -0000

Hi Toerless,

the design of LE leading to the current draft allows for a domain
- to consume a DSCP which may pass a domain not supporting LE and this DSCP isn't bleached.
- to support LE internally without a requirement to negotiate LE support with other domains.

This works, if LE supports CC as default class traffic does. That would require the SHOULD related 
to CC in the current draft to be replaced by a MUST, if the LE traffic is sent across an 
interconnection link and there's no LE SLA in place.  I'd be rather unhappy to receive "aggressive" 
streaming traffic from a peer and be told that it is behaving correctly, 
cause it's marked LE and my domain could support an LE class to deal with it.

There's another option beside bleaching unknown DSCPs at domain boundaries, which is to drop or 
bandwidth limit traffic. Both options may be more viable, if the traffic which is limited or dropped 
is more aggressive than the kind of traffic which is covered by some SLA (like default class traffic 
assuming CC coupled with a best effort transport).

I don't favor solutions where a DSCP re-write is used for signaling. You expect an ECN like 
mechanism to be in place, where the receiver returns an information reporting a received DSCP to the 
sender. If you require an ECN like behavior, why not using ECN? In your case: combined with 
the LE DSCP. That may allow to signal "no support" for aggressive load expansion by ECN, rather 
than by DSCP rewrite.

My general view is: don't link determined end to end transport behavior to DSCP values bearing no 
end to end significance.

Regards,

Ruediger

-----Ursprüngliche Nachricht-----
Von: tsvwg [mailto:tsvwg-bounces@ietf.org] Im Auftrag von Toerless Eckert
Gesendet: Freitag, 6. April 2018 18:04
An: tsvwg@ietf.org
Cc: draft-ietf-tsvwg-le-phb@ietf.org
Betreff: [tsvwg] CC/bleaching thoughts for draft-ietf-tsvwg-le-phb-04

Some thought about CC and bleaching for LE (no multicast this time)

> LE traffic SHOULD be congestion controlled (i.e., use a congestion 
> controlled transport or implement a congestion control method 
> [RFC8085])

a) What would be the current summarized TSV IESG review requirement against a CC statement for BE ? I thought it was something like

  "MUST be CC controlled unless known to be operating across a controlled
  network, and even then it SHOULD use a circuit breaker [RFC8084]".

Whatever the right text is - IMHO it would be great if we knew that text, and then explained in the draft any difference in CC expectation for LE vs. these BE rules. I for once do not understand why a simple "SHOULD" would suffice. My starting point is that LE CC = BE CC, and then - see below.

b) 8085 has UDP in the title. It would be good if the CC text was amended to make it clear the requirement applies whatever the transport is. Not sure what the best magic text (or better reference) for non-UDP based transports is.

c) I couldn't figure out from rfc6297 if all the observed LE protocol
(profiles) would actually automatically receive less share of bandwidth if simply run together with "normal" TCP traffic in the same BE queue.

To me its somewhat logical that an LE transport protocol that knows it will get LE treatment could and should actually be somewhat more aggressive than a BE transport because it has to recover from more loss, or if ECN is used it needs more aggressive upspeeding to best utilize the likely a lot more fluctuating ressources in LE. 

Even if so far the researched LE CC mechanisms have not explored this "more aggressive" behavior, i think it would be great if we could define the right option for it, to make LE even more useful with future network profiles (see point f below). But of course the challenge then is how to make sure such more aggressive LE would never kill BE in the Internet:

d) The document only mentions what happens when LE traffic gets BE treatment in passing:

  [about SHOULD do LE CC]:
  "but is also essential if LE traffic is mapped to the default PHB
   in DS domains that do not support LE"

I think wrt. to CC requirements against LE traffic, we should make it front and center to define LE CC behavior in comparison to BE CC behavior - else we will get all type of unpredictable results when folks start to use various LE protocols:

I) LE CC must ensure that if operating across a congested hop that is treating LE as BE, LE CC MUST NOT give LE traffic more bandwidth share than the competing BE traffic, and it SHOULD give it less share.

So i hope thats the uncontentuous part. Here is the interesting part:

II) LE CC MAY be more aggressive than BE CC (give it more share than BE traffic if LE traffic is treated as BE) only if known to operate across a fully LE enabled path (every hop supporting LE). In this case, LE CC MUST fall back to I) when it can suspect that the path is not fully LE capable.

But how could LE CC ever meet the "MUST fall back" expectation ?

e) I don't think LE CC can ever figure out the "MUST fall back" except through bleaching (or other to be invented signaling).  But the "do not bleach" rule of the current text is really the most useful rule for the Internet to make introduction of LE into Internet nodes as attractive as possible.

II-bleach) LE CC MAY be more aggressive than BE CC (give it more share than BE flows) only if known to operate across a controlled network where the path is expected to support LE on every hop. Paths meant to support more aggressive LE CC SHOULD bleach LE to BE on hops that do not support LE. LE CC MUST fall back to be equal or less aggrssive than BE CC when receiving bleached packets (DSCP set to BE).

So, this allows more aggressive than BE, but only for controlled networks.

f) Here is an example where i think more aggressive LE will be quite
valuable: IMHO, we may see a lot more non-TCP friendly traffic in their own queues, the more inelastic and short-term bursty services start to appear on SP networks. I would think especially in 5G/6G and metro networks, DetNet style traffic or really high bitrate/bursty AR/VR traffic will want to have a lot of low-latency trafic that is little, or not congestion controlled. And this can nicely be stuffed into separate priority queues and get what it wants (Benefit of having a large SP network).

So this is then a very ragged base load on the links. Then i add BE traffic, which CCs to mid to longer term available remaining bandwidth. That leaves a lot of shorter term ragged cliffs left over which can only be grabbed by more aggressive CC than BE willing & able to deal with this highly variable leftover bandwidth.

Aka: Taking bandwidth unused in a pure BE network is simple and works with less aggressive CC than BE-CC. Scavenging remaining bits from more interesting "multi-service" network loads is the real scavenging job requiring more aggressiveness.

Cheers
    Toerless