Re: [tsvwg] L4S and the detection of RFC3168 AQMs

Martin Duke <martin.h.duke@gmail.com> Fri, 11 December 2020 19:50 UTC

Return-Path: <martin.h.duke@gmail.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A1ED3A0E99 for <tsvwg@ietfa.amsl.com>; Fri, 11 Dec 2020 11:50:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, WEIRD_QUOTING=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n6t1vghvfcEN for <tsvwg@ietfa.amsl.com>; Fri, 11 Dec 2020 11:50:54 -0800 (PST)
Received: from mail-io1-xd2f.google.com (mail-io1-xd2f.google.com [IPv6:2607:f8b0:4864:20::d2f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F35013A0E95 for <tsvwg@ietf.org>; Fri, 11 Dec 2020 11:50:53 -0800 (PST)
Received: by mail-io1-xd2f.google.com with SMTP id t8so10670922iov.8 for <tsvwg@ietf.org>; Fri, 11 Dec 2020 11:50:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=QXArA98ENagnuW/WUXzNba9xjC1WegXgy8N4JUwe+cU=; b=UtJrk/O1sBYMhAT+fnukSO1bT0K51yZGLLgSWh+hGOj3x2gSCeq0rL2BHGBawLs6r4 vLlLcRAO0wIJ0jN2JdrMnuipThwhi7jKJK2QmhQIYVk1eZCzf3R5TH3CkBCID++UlqvN B61As2ElnefYSfI+S9z5emsb3XYeCFGPfIHGWfJMcYjJOs/WKWGla0P98GlO93z1xawR O5//ifedJu5T3nmIprHzXr2gnPmis5l3hjmBAy9cjfx9gC4V1c6YfMCFn3uQvXZ1/Q5/ u9CKDyqBl5Kkg/tukYN6a5VpW4STaGzjKYv4HUQHXtB1O9gppXmR/vjQoGeF5UXxxvww +UZA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=QXArA98ENagnuW/WUXzNba9xjC1WegXgy8N4JUwe+cU=; b=a7qHeSwxYIaDBKg+tUKIvUhW3CbWabNB38+uGV4HvGrPy0bkEJdN+lTA4P8OiBCLY+ 3xaFtc2XYaunBDAOXMrbTN3Ec0JeuqnYrMwYcBMdoTQqM/ZTYwUnH88Ct1Wzwj/Xcp6x OfoQgWY1kNEWy4ATngD1XK4xwpp+gG52MuqFMNKIqm0L3000QG2UAL0J8IQYoM/jfDS2 C2WztPM5vXTUcoL35OEy68DwU3SkBD/zgHdwnrwJUmK10QYPPQYyzXQaZbA9rod8EBqz bnIRXYXRdOnax4udYcd/1CHu2e10buVn/jjvr98WQdlyxrG/CO3spW9SiiwF7WqJq8oo 24Uw==
X-Gm-Message-State: AOAM531kSdzalVJY2D0t9+FE/Ff2tB/c6eoX8/8yv6H8GvLN4N3hJW36 XXsuVwKtzY1A4gLF8TNQT18X42AZAWcUdBVSEzY=
X-Google-Smtp-Source: ABdhPJy0g0Vy/qWbhz2RzaAbMRyO5GzB9itck1D3A6e40tu0vsHKgQzchDlEXZjC7Yf9J75f39/kI2OgK6sC1gxw3/U=
X-Received: by 2002:a5d:9a03:: with SMTP id s3mr17250041iol.20.1607716253081; Fri, 11 Dec 2020 11:50:53 -0800 (PST)
MIME-Version: 1.0
References: <125328289.3455959.1607381048136.ref@mail.yahoo.com> <125328289.3455959.1607381048136@mail.yahoo.com> <3F562A25-F4F2-4335-9ED7-54299500B8F6@cablelabs.com> <a35cf206-2fc7-c60e-c713-c4f916106bde@bobbriscoe.net>
In-Reply-To: <a35cf206-2fc7-c60e-c713-c4f916106bde@bobbriscoe.net>
From: Martin Duke <martin.h.duke@gmail.com>
Date: Fri, 11 Dec 2020 11:50:42 -0800
Message-ID: <CAM4esxQQe4MJsU3ZvdVWVeSC6z+YWCytDd3i2im27qhnss1_og@mail.gmail.com>
To: Bob Briscoe <ietf@bobbriscoe.net>
Cc: "alex.burr@ealdwulf.org.uk" <alex.burr@ealdwulf.org.uk>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000002a256f05b6359cb3"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/J5UQCRawWWW4TIjKomWQ3-YoheA>
Subject: Re: [tsvwg] L4S and the detection of RFC3168 AQMs
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Dec 2020 19:50:57 -0000

Alex,

Thanks for thinking outside the box like this -- it may be this sort of
creativity that gets out of the box we're in.

This falls under the "much easier to do in other transports" category,
where I could just send a PING or HEARTBEAT marked ECT(0) to test the queue
in mid-connection, without affecting the latency of anything that matters.
But in the TCP case, I'm not sure how to resolve Bob's second objection
(running ECT(0) for a long time would be unacceptable).

On Wed, Dec 9, 2020 at 3:23 PM Bob Briscoe <ietf@bobbriscoe.net> wrote:

> Alex,
>
> An interesting idea.
>
> You've given some pro points.
> Here are a few con points:
>
> 1) Requires L4S FQ AQMs to actively remove Classic ECN support.
> Many FQ AQMs already support Classic ECN. By this proposal, if they wanted
> to add L4S ECN support (which is pretty simple to do), they would have to
> remove Classic ECN support, dropping instead of marking ECT(0) packets. It
> is possible (likely?) that a number of FQ AQM implementers would vote with
> their feet and not remove Classic ECN support, even if the IETF published
> an RFC adopting your proposal. Then the certainty that your proposal is
> designed to create would be lost. Then we would be worse off in two
> directions: still no way to be certain about ECT(0) markings, while at the
> same time having reduced what little Classic ECN deployment there is.
>
> 2) For in-band Classic ECN AQM detection, the proposal requires L4S not to
> be used for a long time in order to detect whether L4S can be used.
> L4S hosts are the ones that need to check for Classic ECN AQMs. But they
> don't send ECT(0). So to take advantage of your proposal, they would have
> to send ECT(1) packets then, if they see one CE marking, they would have to
> switch to sending ECT(0) packets, and actively send enough ECT(0) to be
> sure that /lack/ of CE marking was not just lack of congestion. Given CE
> marking is currently very rare, how long without CE marking do they have to
> send ECT(0) packets until they can assume it's an L4S AQM? They don't want
> to alternate ECT0 & ECT1, cos if it is an L4S bottleneck, that will lead to
> reordering.
>
> So, lack of CE marking would be ambiguous. Would it mean the bottleneck is
> L4S? Would it mean the capacity has increased and the flow needs to
> increase its rate more to find the limit? If there was a loss or losses,
> that would also be ambiguous. Are they congestion losses?
>
> All the time that the L4S source is sending ECT(0) packets, the flow is
> losing the benefit of the low delay it could have been getting if the
> original CE mark was emitted from an L4S queue. This is a similar problem
> to an algorithm that gives false positives (like the v2 Classic ECN AQM
> detection that Asad & I published). It sometimes detected an L4S AQM as
> Classic. So it was argued that this would probably prevent people from
> using it. The same would surely be true of an algorithm that requires L4S
> not to be used in order to detect whether L4S can be used.
>
> 3) Could be used for Out-of-band Classic AQM detection, but...:
> The proposal would help server operators who wanted to run
> pre-L4S-deployment tests to check for the presence of Classic ECN AQMs.
> Then ehy could run saturating ECT(0) flows for long enough to be sure that
> lack of CE meant absence of Classic ECN bottlenecks. But only if all L4S
> implementers complied (see item #1). The fact that this proposal is only
> really useful for pre-deployment testing would surely make FQ implementers
> even less keen on removing Classic ECN support.
>
>
> Perhaps this conversation will spark a variant of your idea. However, in
> its present form, unless I'm missing something, it doesn't seem to stand up
> to scrutiny.
>
> Cheers
>
>
> Bob
>
> On 08/12/2020 19:37, Greg White wrote:
>
> Hi Alex,
>
>
>
> This does seem worth considering.  FWIW in Low Latency DOCSIS the
> implementation will be as you describe.  ECT(0) packets will not be marked
> CE.  This was done for practical reasons, since the classic AQM re-uses the
> DOCSIS-PIE AQM which is implemented in hardware in many devices, and does
> not support ECN.  For consistency, any ECT(0) traffic that were to make its
> way somehow (e.g. DSCP marked as NQB) into the LL queue, will also not be
> CE marked.
>
>
>
> -Greg
>
>
>
>
>
> *From: *"alex.burr@ealdwulf.org.uk" <alex.burr@ealdwulf.org.uk>
> <alex.burr@ealdwulf.org.uk> <alex.burr@ealdwulf.org.uk>
> *Reply-To: *"alex.burr@ealdwulf.org.uk" <alex.burr@ealdwulf.org.uk>
> <alex.burr@ealdwulf.org.uk> <alex.burr@ealdwulf.org.uk>
> *Date: *Monday, December 7, 2020 at 3:44 PM
> *To: *""koen.de_schepper@nokia.com" <koen.de_schepper@nokia.com>"
> <koen.de_schepper@nokia.com> <koen.de_schepper@nokia.com>, "
> "ietf@bobbriscoe.net" <ietf@bobbriscoe.net>" <ietf@bobbriscoe.net>
> <ietf@bobbriscoe.net>, Greg White <g.white@CableLabs.com>
> <g.white@CableLabs.com>
> *Cc: *""tsvwg@ietf.org" <tsvwg@ietf.org>" <tsvwg@ietf.org>
> <tsvwg@ietf.org>
> *Subject: *L4S and the detection of RFC3168 AQMs
>
>
>
> Hi all,
>
>
>
>  At present the DUALQ draft leaves it to implementers to decide if traffic in the classic queue (IE, ECT(0) traffic that uses currently standard congestion controllers) should be dropped or marked (except, apparently, when an ECT(0) packet for some reason turns up in the L queue?). Perhaps it would be wise to specify that during the experiment, deployments of L4S AQMs (whether DUALQ or the other alternatives mentioned in draft-ietf-tsvwg-l4s-arch) SHOULD NOT (or maybe even MUST NOT) mark ECT(0) traffic, and only drop. This would be to preserve the fact that, as currently, those RFC3168 AQMs which are unaware of L4S, can be identified by the fact that they mark ECT(0) packets with CE. If L4S AQMs are required not to mark ECT(0) as CE, then if an endpoint (or other monitoring method) sees a CE mark on an otherwise ECT(0) flow, then it knows with more or less 100% confidence that an RFC3168-only AQM is on the path.
>
>
>
> Presumably this is safe, since L4S nodes are required to be able to support Not-ECT traffic, and ECT(0) traffic is required to be able to cope with drop.
>
>
>
>  At present the only definitive way for endpoints identify an RFC3168 AQM in use, is to observe CE marks on an ECT(0) marked flow.
>
> Bob's paper [1] gives various other methods, but this seems to be a research project at present. If any of these approaches were found to be reliable, then the above requirement could be relaxed fairly easily; the reverse is not so easy.
>
>
>
> There are, as is probably obvious, a number of reasons for wanting to identify RFC3168 AQMS:
>
>  - Current efforts to gather statistics on the number of RFC3168 AQMs which might encounter problems when L4S traffic passes through them.
>
>  - The the ops draft (sec 3.1)  envisages that CDN operators should test for the presence of RFC3168 AQMs, but doesn't yet specify how this should be achieved
>
>  - Within a L4S transport protocol, in order to fall back to RFC3168 behavior
>
>
>
> All of these would presumably be assisted by being able to classify observed ECT(0)->CE transitions unambiguously being the result of an L4S-unaware node.
>
>
>
> Unless I'm missing something it seems very much worth considering to restrict L4S marking behavior of ECT(0) for the time being?
>
>
>
> I am not sure which drafts would need updating; DUALQ at least, but presumably the ops draft and maybe L4S-arch.
>
>
>
> regards,
>
>
>
> Alex
>
>
>
> [1] https://arxiv.org/pdf/1911.00710.pdf
>
>
> --
> ________________________________________________________________
> Bob Briscoe                               http://bobbriscoe.net/
>
>