Re: [tsvwg] explanation of option 3 choice

Ingemar Johansson S <ingemar.s.johansson@ericsson.com> Mon, 18 May 2020 08:02 UTC

Return-Path: <ingemar.s.johansson@ericsson.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F6983A094B for <tsvwg@ietfa.amsl.com>; Mon, 18 May 2020 01:02:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.192
X-Spam-Level:
X-Spam-Status: No, score=-0.192 tagged_above=-999 required=5 tests=[DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_MIME_MALF=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lP99MVzenNQh for <tsvwg@ietfa.amsl.com>; Mon, 18 May 2020 01:02:08 -0700 (PDT)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2063.outbound.protection.outlook.com [40.107.22.63]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DD97F3A094D for <tsvwg@ietf.org>; Mon, 18 May 2020 01:02:07 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=LJVuzgIcFspQXLac1RV3/AWD89FDJW+wB44aLxQUHXUd1n+YPC80Au5vEzFbOh8Rs1eWNniyHo6q8jeN/HVdVJY3wuUJ0anb+b/Yl0x56CdKDjTgE0oHZdf2gWKCYEWYYkDuGXOm6+oQZRM8gTLCN+iqsuqf1ARDd4q3BPaPgEfX0PmoXgiuBFCYlVrwb7pEgDkMy4OYPK8+eSkMS0ftyl7vYX2QAWGnU4l4CPi3wq6Ouu2QnpMebqUveM1A6z6V43/ei6FexsKTMFXSHvyME2lXxzsfWt5kqYeEzqpT1XZ+k3rqr6AbTMcKBWT1uUNMAqdMlFReWrL5tKBBdBCC0A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=CWMcTOWQCahWqDvkF91oD8jWDAEtSO8OPTf1kvrm7mU=; b=Oxbze5MyNktHYOshyeu5QeM/jglVTRz5Pc2gZ57KrirscQvkvPUBPFIJ0R5uVUfWctBXhMg3YmJJkww5gu9zst990O4o5siS0YzpmxqwQ41Qbpck/Aw5ZoemwYrHD/+2PrrSHBOo/JgflGRJUEgHAGsr+l9KFKsWeMZ+KZBGsKYwtlYcfbvAQdVU8VilyNP9HyCn9cMLsjIck2RnnxJ/GimLCiz6NUKKOZY3++AiOlozq0uYnjs64zbgNWtCPE6VW0AHefaeEYhH7t+LIO6DbUY5Yj51zWsKM41dNww9HwNuoqN+2rGwXPsEg3dxlE2LpC131frKjEXCaIXhsDJuZg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=CWMcTOWQCahWqDvkF91oD8jWDAEtSO8OPTf1kvrm7mU=; b=mB/4U+rwlwJ1HyG8upzmtK5xyj72udGKrZOlZtfcfq5QOHBVCnBcUoH/f80UC2kIgXfV2SHVvvFdmp82G4ahfk+5OgjfaEAulUjwBCNbmP0Cb47vxV1nZLpct2mEvlzrZWkA0qI4KslQzRJItwDA92RLPXYoPO3OiibKgqmv06E=
Received: from HE1PR07MB3131.eurprd07.prod.outlook.com (2603:10a6:7:31::17) by HE1PR07MB4268.eurprd07.prod.outlook.com (2603:10a6:7:9b::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3021.11; Mon, 18 May 2020 08:01:58 +0000
Received: from HE1PR07MB3131.eurprd07.prod.outlook.com ([fe80::ac4b:eb8a:4f53:1d7f]) by HE1PR07MB3131.eurprd07.prod.outlook.com ([fe80::ac4b:eb8a:4f53:1d7f%3]) with mapi id 15.20.3021.013; Mon, 18 May 2020 08:01:58 +0000
From: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
To: "tsvwg@ietf.org" <tsvwg@ietf.org>
CC: "tomh@tomh.org" <tomh@tomh.org>, Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
Thread-Topic: [tsvwg] explanation of option 3 choice
Thread-Index: AdYs5z3GMNcEuUbEQgaIWxQhmjdRaw==
Date: Mon, 18 May 2020 08:01:58 +0000
Message-ID: <HE1PR07MB313114FB0882DCA98C0AB6AAC2B80@HE1PR07MB3131.eurprd07.prod.outlook.com>
Accept-Language: sv-SE, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=ericsson.com;
x-originating-ip: [192.176.1.80]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b35c05bd-3e25-4929-91c0-08d7fb01bd43
x-ms-traffictypediagnostic: HE1PR07MB4268:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <HE1PR07MB426875118E85C09935F2B40CC2B80@HE1PR07MB4268.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 04073E895A
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: r2zZ+PRGBWYAww0h3Jrz34HoetUrtkLHd3qgM15ljcJGtwnRs+lgPeOrTln3I1XdFqZG1TLbZslvRCb78EyuUJx5Pp5RutoEpLi4Yjc+ggOeCbqQttAxjgUiyHjiclUhAUYbM6JA31ZulYP9Ah0Sbxm6qS8xVA/qmucnMTdWeTL2yczI1nw9KadFNuWFyfBNJ8nm0XCDj1YSamfBsTmu1mCfa38kCo3EOAySVNhFCIi7SIeskN6BDc2cMrT03pw7HOjtV+7EwAaVa0rdvhXDWHEYznSFuXSe8NjbVhVey/pbVhU+MiV678lieZCPPupSZ8Qtr6lwMWhkQdsFrcHkHQ==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:HE1PR07MB3131.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(376002)(366004)(39860400002)(136003)(396003)(346002)(9686003)(6506007)(54906003)(99936003)(2906002)(66574014)(76116006)(66556008)(66946007)(66476007)(64756008)(316002)(4326008)(66616009)(66446008)(5660300002)(8936002)(71200400001)(186003)(26005)(52536014)(86362001)(30864003)(53546011)(7696005)(6916009)(478600001)(55016002)(8676002)(107886003)(33656002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: CW5ucweVbwMMZcOBXve3vo8XpglW7qSDOI7GoursuVUqbpCbljC6G/pn5KwFPEC/R/XnEln793FLfgOd6Z8rJ2RGUO8CMa94WRmEH4GzidMs7ZfFo+rcBkpryC88Wh5A6C/PI+dLL9ml4aqcKvmbp3/cGQuadGXQd7OSKTKmmCTzIFP8gXQRlfcrlD4pzLKtuHKbY4/wkc2mHr4xHDIZj4IlAKM5ITUR7SnP3Z5tBJIRJ9KyCSwaPqtD6PKuClZOxBb4W2Odx5uxeownyeDllVLmAVukby1Osmj69s3Ip8F1Bg5h8A/Uwf4hzvvrFemuSgEiDK7D8uwA1vticpDq2XdYAIZITmsGm6m2c6qh0Q7jY20pVq+zTxVb4iGVoQ33N+VZXw+dr7jVgJO6VsSblnlDDvogKxkWJSN1rqGfR+O7bhFdwNWTVcF5zvGPwl8fdsgJ2SUNjq3MqJ+qzvlHsSC49QTQRsnhOm68R0tI6oU=
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg="SHA1"; boundary="----=_NextPart_000_03E9_01D62CFB.5B1F7510"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b35c05bd-3e25-4929-91c0-08d7fb01bd43
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 May 2020 08:01:58.3686 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: FA4qKvhPpdauZ51E7oOETcSxIy24E3uWpYzXN46yZrqGTvNrEDJ68Cx2jhJvV31QcayHMN+3H36mOwC+urQbhbhkbTfh8GB3YXLH/UNBJ3mxS/4nqd2B0zLuoIErW8mt
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB4268
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/asa48A54wiVzwksBjc_3dPKynFY>
Subject: Re: [tsvwg] explanation of option 3 choice
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 May 2020 08:02:10 -0000

Hi Tom

I limit my comments to the part around jitter and the viability of an L4S
solution and stick to the access that I understand reasonably well in my
reasoning (4G/5G access). I write here L4S as I am personally in favor of
L4S and see in the poll that option 1 has strong support.

3GPP systems have continuously reduced the delay jitter from 100s of
milliseconds in 2G (GPRS-EDGE) down to low 10s of milliseconds in 5G (NR)
with potential to go down to sub milliseconds jitter. 
So from that perspective I don't see network jitter as a show stopper for
L4S, network vendors will continuously work to reduce network jitter in 3GPP
systems with optimized power control, adjusted RLC timers etc, shorter
TTIs, URLLC... 
This work should however be done in parallel with L4S, L4S is an important
tool to reduce the network queue delay, besides queue delay there are other
sources of delay such as retransmission on MAC and (possibly RLC layer),
handover that is solved with other configuration work.

With regards to burstiness, my observation is that packet pacing is becoming
a more and more a best current practice, BBR implements it, can also mention
that SCReAM does it too. Packet pacing is IMHO a good too to reduce
burstiness in networks.

So, given the above reasoning. I don't see the reason why concerns over
network jitter should be an argument for option 3 (more testing).

Also.. L4S can actually be helpful in the cases where non-congestion related
jitter may obscure the queue delay. 
To take one example: SCReAM (FC8298) is designed to cope with the natural
delay jitter in LTE systems, up to quite high load levels, this is achieved
with an acceptance to this delay jitter in the delay sensitive part of the
algorithm. The downside is that one need to trade the sensitivity to
increased queue delay against robustness to delay jitter to get a high
throughput. The delay jitter in turn depends on the configuration of the
LTE/5G system which means that SCReAM had to be designed with something of a
worst case jitter. 
L4S is helpful here because the congested nodes can clearly indicate that
they are congested, after all, they know when queues are about to increase,
therefore endpoints do not need to infer congestion from implicit metrics
like delay and packet loss.
  
/Ingemar

 


> 
> Message: 4
> Date: Sun, 17 May 2020 10:06:46 -0700
> From: Tom Henderson <tomh@tomh.org>
> To: tsvwg IETF list <tsvwg@ietf.org>
> Subject: [tsvwg] explanation of option 3 choice
> Message-ID: <c6cda07a-6e93-a2f2-407a-ba1e40e17feb@tomh.org>
> Content-Type: text/plain; charset=utf-8; format=flowed
> 
> I support the L4S goals to deploy scalable congestion controls and achieve
low
> latency while maintaining high throughput when possible.  I believe that a
clear
> input signal to the network will be needed, so I lean towards ECT(1)
because it is
> the most likely to survive tunnel encapsulation and avoid bleaching.
However,
> the discussion has raised several performance and architectural concerns
that I
> believe that the WG should address, so I believe that option 3 best aligns
with
> my current view.
> 
> Selecting between L4S and SCE involves tradeoffs, but the decision seems
to be
> clouded by skepticism about the viability of deploying a low-latency
service even
> if we had enough bits to support two clear input signals and two output
signals,
> and space to carry these different signals back to the sender.  How robust
will
> the congestion controls be with a shallow threshold in the presence of
jitter or
> burstiness, which is likely for multiple access wireless networks?  How
low can
> the marking threshold be configured, and what are the tradeoffs (and how
does
> the performance degrade when assumptions are violated)?  For a given
latency
> threshold, what limits on RTT, burstiness, or bottleneck link rate may
exist, and
> should the congestion controllers try to detect those conditions with
heuristics?
> If one were to try to design policers to prevent abuse, what would be the
> conformant flow behavior to police, and what if flows cannot be
distinguished
> due to tunneling, or if in-network aggregation makes the flow
non-conformant?
> 
> Assuming that the long-term issues inherent with a low-threshold ECN mark
can
> be worked out even in the presence of enough signaling bits, then both the
L4S
> and SCE proposals present further questions.  For L4S, aside from RFC 3168
> detection, how does the lack of an overload signal (other than packet
loss)
> inhibit the design of a congestion controller, and how does slow start to
> congestion avoidance transition occur?  For SCE, the reliance on
DSCP-based
> classification will cause legacy/classic and low latency flows to end up
more
> often in the same queue, and SCE-enabled flows could end up with worse
> performance than legacy/classic flows.  Can SCE results be presented that
show
> the performance of competing flows (legacy/classic and SCE) in shared
queues,
> but with the SCE classification disabled?
> 
> My suggestion to move forward is for the WG to better define the desired
> properties, behavior, and scope of low-latency ECN semantics assuming (in
the
> long run) two inputs and two outputs, and to expand the evaluation
framework
> to take into account the suggestions that others have made to include
short
> flows, bidirectional traffic, asymmetry, jitter and network aggregation,
and
> tunnels.  Constraints introduced by SCE and L4S could also be evaluated in
the
> same framework.  If the WG were to reach consensus that, with enough bits,
> the objective design works well enough, but the constraints do not, then
> perhaps more effort could be devoted to finding more bits.  Jake Holland
made
> one such proposal (ECT(1) to ECT(0), plus existing CE).  If low latency
service is
> within reach but is blocked by some existing decapsulation rules that
could be
> revised, why shouldn?t the WG try for that?  Appendix B of the AccECN
draft
> hypothesizes that there may be creative ways to send both a low-level
> congestion and overload signal back to the sender.
> 
> - Tom
> 
> 
> 
> ------------------------------
> 
> Message: 5
> Date: Sun, 17 May 2020 10:52:19 -0700
> From: Dave Taht <dave.taht@gmail.com>
> Cc: "tsvwg@ietf.org" <tsvwg@ietf.org>
> Subject: Re: [tsvwg] Consensus call on ECT(1)
> Message-ID:
> 	<CAA93jw7BEkZuSSaU90nT7AizUc-
> vsC1Fp=C0DBZTr2d7CNdzwA@mail.gmail.com>
> Content-Type: text/plain; charset="UTF-8"
> 
> If I had to make a choice, today, I would vote for option 2.
> ECT(1) as a network output. The present conception of SCE "fails safe"
> in far more circumstances than the present conception of L4S appears to.
> 
> The internet as a whole needs to retain and improve upon, the existing
strong
> signal of congestion that the RFC3168 compliant CE indicator brings to it,
and
> furthermore, more fully deploy the existing IETF AQMs in more places where
it
> matters.
> 
> However, I vote for option 3, with a rationale to follow. (The chair's
question
> also wanted a list of tests, but that got too long for this vote, so I am
moving
> that to the
> rationale)
> 
> --
> "For a successful technology, reality must take precedence over public
relations,
> for Mother Nature cannot be fooled" - Richard Feynman
> 
> dave@taht.net <Dave T?ht> CTO, TekLibre, LLC Tel: 1-831-435-0729
> 
> 
> 
> ------------------------------
> 
> Message: 6
> Date: Sun, 17 May 2020 11:14:42 -0700
> From: Dave Taht <dave.taht@gmail.com>
> To: tsvwg IETF list <tsvwg@ietf.org>
> Subject: [tsvwg] dave taht's rationale for option 3 on ect(1) (more
> 	testing)
> Message-ID:
> 	<CAA93jw5HHY6xA1NOxrqad-
> crY4mmhmiB7Gyga8RBEaz4ShGj8w@mail.gmail.com>
> Content-Type: text/plain; charset="UTF-8"
> 
> The codebases, simulations, etc, for the l4s and SCE approaches are still
in a very
> raw state. With these early implementations, many problems have been
> identified, and only a few resolved. The internet drafts and codebases are
out of
> alignment, with new bugs landing in the codebases and operating systems
every
> time someone takes them out for a spin.
> 
> Nearly all the tests bufferbloat.net considered basic in the development
of the
> original pie, codel, and fq_codel aqms in the aqm working group as of 2004
have
> yet to be run.
> 
> Participants may weight the results differently, but adversarial tests of
all kinds
> need to be run, regularly, in response to every change to the
specification and
> code, in order to retain an accurate picture of the problems found, fixed,
or
> ignored.
> 
> (I confess that much of my interest in lossless congestion control comes
from
> longer  RTT near earth orbit, geo, and gto - and even more distant
space-born
> applications,  which is a from-orbit viewpoint I suspect few here share)
> 
> To the greatest extent possible, tests to be performed in simulation AND
on a
> variety of real hardware, AND in virtualized environments.
> 
> The recent bugs found in encapsulations need to be evaluated against more
> tunnel types and operating systems. More shipping switches and hardware
> based need to be tested and configured using ect(1) -> CE transitions, in
> particular, to see what happens.
> 
> Problems with legacy uses of the IP stack, for private and industrial and
> embedded r/t control use, have not been explored either. Examples include
> 6lowpan, and other relatively unknown services in the ietf you can find in
all the
> other ethernet packet types known to man.
> 
> The potential side effects on classic traffic, have been barely explored,
if at all.
> The impact on conventional udp and classic gaming, voice, and DNS traffic
of
> the pie side of the l4s solution, (with the initial exploration of the
rrul_be test
> showing up bugs galore), is largely unknown.
> 
> The true effects on the internet of senders such as the increasingly
available
> BBRv1 with RFC3168 ecn accidentally enabled deployment needs analysis, as
do
> the effects of a modestly or truly lying senders.
> 
> The costs and methods required to mitigate ECN-enabled DDOS attacks, also
is
> absent from analysis.
> 
> The side effects of essentially deprioritizing classic routing protocols
and other
> essential oam and maintenance packet types (such as rip v2 (used on
cable),
> ospf, Babel, ISIS, RA, ND and ARP), needs to be explored.
> 
> The effects on existing deployed RFC3168 compliant multicast file
transports
> such as uftp[1], needs to be tested.
> 
> Recognising ?loss and mark? as an even stronger signal than either, not
thought
> about.
> There's a long list of other more trivial things - dynamically reducing
mss size at
> cwnd 2 or less, improving packet pacing to cope with sub cwnds, more fully
> exploring l4s-style behaviors on unreliable, jittery networks such as wifi
and lte,
> and chirping.
> 
> In short:
> 
> I see no reason for the IVTF to allocate the ECT(1) codepoint at this time
without
> a ton more simulation and testing.
> 
> With a lot more robust, repeatable testing, good software engineering
> practices, complete with regression tests, and continuous integration, and
> source code that matches the internet drafts (and vice versa), perhaps we
can all
> find a way forward closer to the goals of low latency and high throughput
and
> the most viable, safest, use for this last half a bit in the IP header.
> 
> 
> --
> "For a successful technology, reality must take precedence over public
relations,
> for Mother Nature cannot be fooled" - Richard Feynman
> 
> dave@taht.net <Dave T?ht> CTO, TekLibre, LLC Tel: 1-831-435-0729
> 
> 
> 
> End of tsvwg Digest, Vol 193, Issue 15
> **************************************