Re: [tsvwg] NQB: Use of DSCP 45

Greg White <g.white@CableLabs.com> Wed, 09 February 2022 01:38 UTC

Return-Path: <g.white@CableLabs.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8D9AB3A10A1 for <tsvwg@ietfa.amsl.com>; Tue, 8 Feb 2022 17:38:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cablelabs.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rp3uJJHtvbID for <tsvwg@ietfa.amsl.com>; Tue, 8 Feb 2022 17:38:27 -0800 (PST)
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (mail-sn1anam02on20701.outbound.protection.outlook.com [IPv6:2a01:111:f400:7ea9::701]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1D9F93A103E for <tsvwg@ietf.org>; Tue, 8 Feb 2022 17:38:27 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=RMuF4Sjgqn4dyVV6R9G5jywSoer9dAQ7KmxWfM4OS/1PceSGtztLohXo9GFkuWUxZtmBcoZDNAiHtOYKl9pdX227XNQY0zHpZRrR4RMonKkmarrhqtfLtaXpjitnGlyIdBH0WReZlFkAY2vCMxl9bBjLAjXG/Q7Lgq3x8yAALQ8d4Y/AwAxJ1mUyaqibHWKEs63rUueAmgKU4oYgUjMhP8Dif1xTMx/dSeRzuxTZZRtgI06dfn8oC1JTGzuUP2Hwe6aWjlyTaVkP/75RWBPsONF+8kexlKK8Za1wWKjhqeat0mlkVouV0YY6a7VVK+/MsUw0p42i0+NvaQ3pmB1oSw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=BLiWanr3xgvsAZ4V2G+BeCihQfYdhoLTRZAvaEQnhgI=; b=bvDk1bYvOi5ywHcLGs+0p+vtdfIr54/UIcMIuhPlEQYY0p9MAAcDDjOY6W3/ksyQFA6wwV8r/Lxo+4Zhu8cSL6q1NEUQh7wfndWpcs7UM7hjHpnAOBjCCSGJJDUb9vEVjA59ED2dMsc7MsNyaJ7bFogXCmjP+MJtDVSqZzcswTroiwDFOeH9EGVK42YBFDr6w4A9GOQMW4H0glxrebBVFg5kXprCGhPqoZOtqoXua+K1cuXHQPCAPL4ENXMla1csqt8og2n7hnXjrLOiaFclDm+y69GfdV8yaSLur3ooBrqH6bKOlD4UU9ZWmV2VO2BcHcKSpztZptBZ3BMRzlUJkQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cablelabs.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BLiWanr3xgvsAZ4V2G+BeCihQfYdhoLTRZAvaEQnhgI=; b=NcJprEZiuIMyxVRDFjOPjsS4C2WZ32bylZSv++1gsFL+8VTEv1j3bJmrvEI30jhqERkAN7oBTBSMexYYcVZmreTAWD7rLYQKBkp3F7T20kG+NCFRCEdrJFfFNLxpXtQIhm5WrqXuGxHTIDs9s9jnWdKveCkVtI/XCpWt5FDk2+VYTthPd1u1JI+ArPQTlNq+GqI0Lr2RtSncKcMx9WA84osxNUlOmZki3yGAvf4OhRI8/HFQT0mQUUspR3zezduHaRAfupptdt/NY34i3M/R0Xt+zfED1IQ9Ojw3XcvPDXn4gqFeZHM4mXK0HE41vZ4ELGsu8cD4I5Rj8/laOGLxqg==
Received: from SJ0PR06MB7861.namprd06.prod.outlook.com (2603:10b6:a03:38c::19) by PH0PR06MB7109.namprd06.prod.outlook.com (2603:10b6:510:24::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4951.12; Wed, 9 Feb 2022 01:38:21 +0000
Received: from SJ0PR06MB7861.namprd06.prod.outlook.com ([fe80::11db:a40f:e627:f1b2]) by SJ0PR06MB7861.namprd06.prod.outlook.com ([fe80::11db:a40f:e627:f1b2%6]) with mapi id 15.20.4975.011; Wed, 9 Feb 2022 01:38:20 +0000
From: Greg White <g.white@CableLabs.com>
To: "Black, David" <David.Black@dell.com>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: [tsvwg] NQB: Use of DSCP 45
Thread-Index: AQHYBoVVtJEDEOUa5kSbTv3gkI6DS6yIUxAggAHV/AA=
Date: Wed, 09 Feb 2022 01:38:20 +0000
Message-ID: <59E5EC68-5B38-477C-A524-C60A43EB46BF@cablelabs.com>
References: <A2053069-1408-4693-AB3F-43776C85F155@cablelabs.com> <MN2PR19MB404525E4B857E5B3EC338C12832C9@MN2PR19MB4045.namprd19.prod.outlook.com>
In-Reply-To: <MN2PR19MB404525E4B857E5B3EC338C12832C9@MN2PR19MB4045.namprd19.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.44.20121301
msip_labels: MSIP_Label_34759c52-a6db-4813-b00f-5ea20e29646d_Enabled=true; MSIP_Label_34759c52-a6db-4813-b00f-5ea20e29646d_SetDate=2022-01-04T15:31:22Z; MSIP_Label_34759c52-a6db-4813-b00f-5ea20e29646d_Method=Privileged; MSIP_Label_34759c52-a6db-4813-b00f-5ea20e29646d_Name=Public; MSIP_Label_34759c52-a6db-4813-b00f-5ea20e29646d_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_34759c52-a6db-4813-b00f-5ea20e29646d_ActionId=a02ac569-b1ab-44b5-a621-4f5a005378d4; MSIP_Label_34759c52-a6db-4813-b00f-5ea20e29646d_ContentBits=0
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=CableLabs.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 40a4ab76-ae30-4c0d-2420-08d9eb6cdab3
x-ms-traffictypediagnostic: PH0PR06MB7109:EE_
x-microsoft-antispam-prvs: <PH0PR06MB7109E7CF60DD2B6BB612F4FCEE2E9@PH0PR06MB7109.namprd06.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR06MB7861.namprd06.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(71200400001)(36756003)(508600001)(83380400001)(64756008)(8936002)(6486002)(26005)(38100700002)(122000001)(5660300002)(30864003)(186003)(9326002)(76116006)(66556008)(316002)(40140700001)(86362001)(66946007)(38070700005)(91956017)(66446008)(33656002)(2616005)(6512007)(6506007)(53546011)(2906002)(66574015)(66476007)(110136005)(8676002)(45980500001)(85282002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_59E5EC685B38477CA524C60A43EB46BFcablelabscom_"
MIME-Version: 1.0
X-OriginatorOrg: cablelabs.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR06MB7861.namprd06.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 40a4ab76-ae30-4c0d-2420-08d9eb6cdab3
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Feb 2022 01:38:20.6398 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: ce4fbcd1-1d81-4af0-ad0b-2998c441e160
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: IXZeSYwZ/2Ku6laOkzjWuYdDQtsgzrxBbriIM7U/4wWOSWpNBzp55yPlCmmJGtjZyHH9bQpgKxId2LNNPbxHFg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR06MB7109
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/IUJJYhXHVGW1oqksj4UjiXT1gJk>
Subject: Re: [tsvwg] NQB: Use of DSCP 45
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Feb 2022 01:38:33 -0000

Hi David,

Thanks for the response (and you aren’t the only one guilty of an occasional delay on this topic, unfortunately I’ve had more than my fair share).

I agree with your suggestion to add a note in 8.3.1 about the presumed limited applicability of that *safeguard*.   I can go ahead and make that change.

I don’t see this as limiting the scope of applicability for the value 45 itself. There has not been a view that there are issues needing remedying for local traffic (e.g. generated by WiFi devices in the network) since the priority conveyed by 45 in legacy/unmanaged networks (including WiFi and IPP) isn’t unique to 45, and the guidance on appropriate use of 45 is not inconsistent with existing guidance for the other DSCPs in that category. So in regards to recommendations for end-hosts on the internet, I think 45 is appropriate.

I think the concern rather was around situations where a network operator could (and maybe even does) police DSCP usage today, and what recommendations should be made for managing/marking NQB traffic, particularly in cases where legacy equipment could be present.  In the residential ISP case, the ISP appears to bear some de facto responsibility to manage the DSCPs that it sends into user networks, because consumer-grade routers generally do not provide DSCP manipulation features.  Historically this “management” has been implemented as bleaching (AFAIK, although exceptions could certainly exist). Consistent with this, the draft mandates that ISP equipment (effectively) bleach the NQB marking by default.  We’d like for the draft to chart a path forward where ISPs can enable NQB support for downstream traffic in their customers’ networks if they choose to.  Here, multiple options are included (though it re-reading it, they are a bit scattered in the document).

In my view, the best option would be for the home router equipment to support NQB.  Fallback options include configuring the EDCA parameters as discussed, or implementing a policing function on NQB-marked traffic (details left for the ISP, but an example given). That first option and the first fallback option are mainly applicable in the case that the ISP provides the home router (though certainly an end-user wouldn’t be precluded from purchasing a router that could implement either of those options) because it would be challenging for the ISP to know whether or not customer-owned equipment supported either option. The second fallback option (while probably not perfect) could be implemented regardless of whether the ISP or the end-user provides the home router.  I think it is important that support for NQB can be offered even to end-users that choose to purchase their own router, though I realize that this is where most of the concern has been raised, and where ISPs will need to tread more carefully.

So, to be clear, I think 45 is still applicable for endpoint applications, and it is applicable for ISPs to deliver traffic so marked into their customers’ networks as long as they deploy home network equipment that supports NQB and/or they implement one of the safeguards listed in the draft.

Admittedly, my mindset is fairly entrenched in the residential ISP use-case, so I might be missing concerns that apply to other use-cases, but let me know if you think there are gaps that still need to be filled.

Greg


From: David Black <David.Black@dell.com>
Date: Monday, February 7, 2022 at 7:49 AM
To: Greg White <g.white@CableLabs.com>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Cc: David Black <David.Black@dell.com>
Subject: RE: [tsvwg] NQB: Use of DSCP 45

Hi Greg,

Sorry for the delayed response – somehow this NQB topic got classified into a very-high-latency queue … yes … that was a lousy joke of an excuse ;-) … snarky ripostes, dead cats, and rotten tomatoes should be sent to /dev/null, please.

Seriously, I think this sentence on WiFi AP EDCA parameters from your response is a good point of focus towards finding a way forward:

> [GW] I agree that most consumer-purchased Wi-Fi APs do not expose interfaces for this (and even if they did,
> not many users are likely to read the draft/RFC and change their configuration).  So, this recommendation is
> primarily for network operators (i.e. ISPs) that provide a Wi-Fi gateway to their customers, and thus could
> specify that this setting be used by default and/or that an appropriate management interface be provided.

Please revise Section 8.3.1 of the draft to explicitly state this limited scope of applicability of DSCP 45, i.e., it only applies to operators who choose to configure an NQB service in operator-controlled and managed WiFi equipment.

I think that scope of applicability has a couple of consequences:

·         It may well make the EDCA configuration recommendation viable within that limited scope of applicability.

·         It raises concerns about whether the entire Internet ought to use DSCP 45 to indicate NQB at endpoints, when that DSCP has a limited scope of applicability.

Thanks, --David

From: Greg White <g.white@CableLabs.com>
Sent: Monday, January 10, 2022 7:51 PM
To: Black, David; tsvwg@ietf.org
Subject: Re: [tsvwg] NQB: Use of DSCP 45


[EXTERNAL EMAIL]
Hi David,

Responding to points 2 & 3 below.

-Greg


From: tsvwg <tsvwg-bounces@ietf.org<mailto:tsvwg-bounces@ietf.org>> on behalf of David Black <David.Black@dell.com<mailto:David.Black@dell.com>>
Date: Tuesday, January 4, 2022 at 9:15 AM
To: "tsvwg@ietf.org<mailto:tsvwg@ietf.org>" <tsvwg@ietf.org<mailto:tsvwg@ietf.org>>
Subject: [tsvwg] NQB: Use of DSCP 45

In catching up on emails, I've reviewed the discussion of NQB usage of DSCP 45 (0x2D), mostly between Greg and Sebastian.  Writing as draft shepherd, I think that there are several issues in that discussion that deserve broader WG attention, one of which I think I understand and two that I definitely do not fully understand.

[1] Use of DSCP 45 (0x2D) for NQB at network interconnections (the one that I understand).

There are a number of things that could go wrong if DSCP 45 is used for NQB traffic at network interconnections because DSCP 45 results in better forwarding treatment than DSCP 0 for Default (best effort) traffic in many networks.

The draft currently says that DSCP 45 SHOULD NOT be used at network interconnects via SHOULD requirements to remap it to DSCP 5.  I don't think that's sufficient, and hence suggest strengthening that text based on the Diffserv Architecture (RFC 2475):

·         Define DSCP 45 for NQB as a "local use" codepoint, based on the definition of "local use" in RFC 2474 and RFC 2475.

·         Explicitly prohibit use of DSCP 45 at network interconnects unless that usage is explicitly documented in the TCA (Traffic Conditioning Agreement, see RFC 2475) for that interconnection.

o   The change here would be from the current "SHOULD remap for interconnection" to "MUST NOT use for interconnection unless explicitly allowed by the TCA for that interconnection."
This would also help clarify the IANA considerations for NQB DSCPs– DSCP 5 would be the single default DSCP for NQB, with a note added to the IANA registry that DSCP 45 is available for local use under the conditions specified in the NQB PHB RFC.

Overall, I don't think this proposed approach departs significantly from the intended usage (mostly non-usage) of DSCP 45 for network interconnection, and I think it results in significantly clearer text in both the draft and the IANA registry.

[2] Interaction of DSCP 45 with standards-compliant vs. legacy WiFi equipment.

The crucial rationale for use of DSCP 45 for NQB is this sentence in Section 8.3.1 of the NQB draft:

   In order to increase the likelihood that NQB traffic is provided a
   separate queue from QB traffic in existing WiFi equipment that uses
   the default mapping, the 45 code point is recommended for NQB.

I don't understand the long-term intent here.  Is it that DSCP 45 will be used for WiFi for the foreseeable future or that DSCP 45 will be supplanted by DSCP 5 as WiFi gear gets upgraded?  If the latter, there are a plethora of problems in figuring out whether or not the WiFi gear is upgraded or not.  What's the intent here?

[GW] The intent is that endpoints would use DSCP 45 for the foreseeable future. I agree that the other alternative you mention would be problematic.

On a related note, I agree with Sebastian that this paragraph in Section 8.3.1 is unrealistic:



   Furthermore, in their default configuration, existing WiFi devices

   utilize EDCA parameters that result in statistical prioritization of

   the "Video" Access Category above the "Best Effort" Access Category.

   If left unchanged, this would violate the NQB PHB requirement for

   equal prioritization, and could erode the principle of alignment of

   incentives.  In order to preserve the incentives principle for NQB,

   WiFi systems SHOULD configure the EDCA parameters for the Video

   Access Category to match those of the Best Effort Access Category.

I'm not even sure that IETF ought to be standardizing requirements on WiFi EDCA parameters, as those would seem to be for IEEE 802 to prescribe, not IETF.

[GW] This is recommending a configuration, rather than standardizing requirements on equipment.  Would it read better as: “… WiFi systems SHOULD be configured such that the EDCA parameters ….”?  Or, otherwise written as guidance?

FWIW, I have a worked example of that paragraph being unrealistic, as I recently bought a couple of basic WiFi APs off of eBay to solve some local problems (e.g., wife's tablet was not reliably connecting to WiFi from the other end of the house), and those APs don't have a consumer-accessible interface for configuring EDCA parameters.

[GW] I agree that most consumer-purchased Wi-Fi APs do not expose interfaces for this (and even if they did, not many users are likely to read the draft/RFC and change their configuration).  So, this recommendation is primarily for network operators (i.e. ISPs) that provide a Wi-Fi gateway to their customers, and thus could specify that this setting be used by default and/or that an appropriate management interface be provided. It is one of several options that are intended to minimize any incentive for a QB application to mark itself NQB. Note that there are two concerns that we’ve been trying to address here. One is the incentives aspect (where it’s likely that the solution doesn’t need to see 100% deployment to be effective, but the closer the better) and the other is the potential for starvation of QB traffic if uncontrolled amounts of NQB traffic is given higher priority than default.

As has been discussed, for Wi-Fi, both of these concerns are essentially moot in the upstream direction, since there are 31 other codepoints that an application could choose from that today would provide them higher priority than default without the possibility of being subjected to Traffic Protection, and furthermore the recommendations on usage of NQB are not inconsistent with recommendations for other DSCPs that map to these higher priorities.  So, the realistic concern is downstream, where an ISP is wishing to provide NQB isolation in their customers’ LANs (if they are not wishing to do so, they can leave the DSCP as 5, or bleach it to 0, one or the other of which seem also to be highly likely possibilities for an ISP that is unaware of the existence of NQB).  If such an ISP can set the EDCA parameters of their managed Wi-Fi APs, then problem solved in that case.   If they can’t – for whatever reason – then the other remedies discussed in 4.3.1 apply.  This solution isn’t perfect. For example, if a user purchases their own WiFi AP that fully supports the NQB functionality, then how is the ISP to know that they can turn off bleaching or throttling for that customer?  But, the choice of 45 at least allows users of customer-owned APs to achieve isolation of NQB traffic from the majority of QB traffic in the upstream direction.

I suspect that the above 8.3.1 paragraph needs to be bit-bucketed, but I don't understand what to do about WiFi and DSCP 45 in general.

[GW] I disagree for the reasons stated above.


[3] End-system use of DSCP 45

Section 4.1 of the draft says:



   Applications that align with the description of NQB behavior in the

   preceding paragraphs SHOULD identify themselves to the network using

   a Diffserv Code Point (DSCP) of 45 (decimal) so that their packets

   can be queued separately from QB flows.

That strikes me as just plain wrong, as it inflicts DSCP 45 on non-WiFi gear.

[GW] What’s so wrong with that?  If it NQB-aware gear, then great!   If it is NQB-unaware DiffServ gear then it would treat 45 as an unknown DSCP and give it the default PHB.  If it is IP Precedence gear, then all of the arguments above for upstream traffic over WiFi apply.


OTOH, I don't know what to do here, as this sort of simple guidance (always do <X>) is crucial to get application developers to use this sort of new functionality.

[GW] Simple, consistent guidance is key.  As is no regressions in performance.  Several of the existing applications that are NQB-compatible already mark their traffic as CS5 or EF.  Given the text of the draft currently, they can choose to migrate to NQB if they wish.  On existing Wi-Fi or IPP networks, there would be no change in performance.  On upgraded WiFi networks, they would give up EDCA priority in exchange for an isolated and protected queue (there could be regressions in some situations, but benefits in others). On upgraded BE networks (i.e. support for BE and NQB) they would gain isolation and protection.


Thanks, --David

David L. Black, Sr. Distinguished Engineer, Technology & Standards
Infrastructure Solutions Group, Dell Technologies
mobile +1 978-394-7754 David.Black@dell.com<mailto:David.Black@dell.com>