Re: [tsvwg] Default PHB (was Re: Some comments on NQB (part 2))

Brian E Carpenter <brian.e.carpenter@gmail.com> Thu, 05 May 2022 20:49 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8DFDDC157B4D for <tsvwg@ietfa.amsl.com>; Thu, 5 May 2022 13:49:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.955
X-Spam-Level:
X-Spam-Status: No, score=-3.955 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-1.857, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8M3yw9pO1QTL for <tsvwg@ietfa.amsl.com>; Thu, 5 May 2022 13:49:15 -0700 (PDT)
Received: from mail-pj1-x102b.google.com (mail-pj1-x102b.google.com [IPv6:2607:f8b0:4864:20::102b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 985CFC15952A for <tsvwg@ietf.org>; Thu, 5 May 2022 13:49:15 -0700 (PDT)
Received: by mail-pj1-x102b.google.com with SMTP id w17-20020a17090a529100b001db302efed6so5125403pjh.4 for <tsvwg@ietf.org>; Thu, 05 May 2022 13:49:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=3a1f/mPINaBmo9lojMwbOdo8ID8FiUEvMnTak96FvSI=; b=EtYA/WmAnURFwjqIVB4J84xhS35uKoucNnLOSswKQ9kQFBTAydMrjud7HnYIq1pJEW 6MetbiQd/GoybjDxnwbC3wQu1/TJSUnkyAVZtIL/onp7HlL8egaDLEUeWuioFzsnXBwn KDlIoakt0nO6Wq7sef3PTpujKI5tYu196+4FCXDSryg9CNkp6KDQIiGlUasnnddi7Or6 BnItmbG0Qg2ZMfXBHPsf1qY7S49qSVhmR1qunylN+d7Cxji6Dp5IhbBp8drRLDmIkyjs ortLMJvalMLL8rLGovZFqhBXPf0Qpznh7qKzGTRArx5rwdwSjryGmbUcm5uYC214fmld dliQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=3a1f/mPINaBmo9lojMwbOdo8ID8FiUEvMnTak96FvSI=; b=Hr3haVZxPLgWJqhnyb74l6lG0eur3k++uoojgDsX4EsFagoymzOuA9NdKpOQcFo+v4 MZl0r97tZTx1HGX2AzLuHZUxktkjV3KnYtG0rizSA3CTsdlupMzVoxEzyDfL+o7ufojr 7MnIXmTsu6Px5cZdqBykiVO6ySbal6toXYbGlljmoF5fNSjFj1VASQTjf1X7tFMAHR5/ veUbRLoULS+m8FG/w/eehM634stcjgELFwUAGo+fid+g11oAPYstPkF0PHFXSI9U1OKp d4sG1EQUIxILDgYDNcrwXGCBzBhHkWsWRdLkyApkDQO9gu4ncePt0VnSFyb4dMYKOUxB 1f8g==
X-Gm-Message-State: AOAM533iKR5/BiupNxDPtkOaTncS9ROLrkbqdCBqWyWyfazugyvjABQO NcSJ/ttDElHh9sojQAjfcxACTeBY5W34Sw==
X-Google-Smtp-Source: ABdhPJxovkTko7vQUoBORp0LhEhQtBZF4kQT/HT8IMqsfkGRCeVj6EVsazp0QWqTBFrZFEfByREISg==
X-Received: by 2002:a17:90b:17c1:b0:1dc:a6e6:ef26 with SMTP id me1-20020a17090b17c100b001dca6e6ef26mr8474421pjb.22.1651783754425; Thu, 05 May 2022 13:49:14 -0700 (PDT)
Received: from ?IPv6:2406:e003:1005:b501:80b2:5c79:2266:e431? ([2406:e003:1005:b501:80b2:5c79:2266:e431]) by smtp.gmail.com with ESMTPSA id 16-20020a056a00071000b0050dc76281efsm1774970pfl.201.2022.05.05.13.49.11 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 05 May 2022 13:49:13 -0700 (PDT)
To: Ruediger.Geib@telekom.de, moeller0@gmx.de
Cc: tsvwg@ietf.org
References: <FRYSPRMB0001E75682B3EFA05E09C6779CC29@FRYSPRMB0001.DEUP281.PROD.OUTLOOK.COM>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Message-ID: <04553e34-b85d-1114-85a8-bb0e669aee9e@gmail.com>
Date: Fri, 06 May 2022 08:49:09 +1200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.10.0
MIME-Version: 1.0
In-Reply-To: <FRYSPRMB0001E75682B3EFA05E09C6779CC29@FRYSPRMB0001.DEUP281.PROD.OUTLOOK.COM>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/J9e7bN0H_8_ifhHNZVhlKJ-umH4>
Subject: Re: [tsvwg] Default PHB (was Re: Some comments on NQB (part 2))
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 May 2022 20:49:19 -0000

Hi,

"part of a default PHB group specification"

As you know, the phrase "PHB group" is formally defined in RFC2474 and I am not sure you are using it in that precise sense:

    Per-hop Behavior Group: a set of one or more PHBs that can only be
    meaningfully specified and implemented simultaneously, due to a
    common constraint applying to all PHBs in the set such as a queue
    servicing or queue management policy.  Also PHB Group.

The idea was (as for the AF groups) that a single queueing discipline would apply to the group but with something (such as drop priority) parameterised within the group.

I think you are describing something a little different here.

Regards
    Brian Carpenter

On 05-May-22 21:29, Ruediger.Geib@telekom.de wrote:
> Hi Sebastian,
> 
> A recommendation to forward and remark CS1 traffic received at an interconnection point is a valid point, and that may become part of a default PHB group specification. Relation to other PHBs, and here the aspect of re-marking at interconnection, is another aspect, which requires attention. Careful thought will be required when specifying such a default PHB group.
> 
> Regards,
> 
> Ruediger
> 
> (changed subject, to disambiguate discussion)
> 
> -----Ursprüngliche Nachricht-----
> Von: Sebastian Moeller <moeller0@gmx.de>
> Gesendet: Donnerstag, 5. Mai 2022 10:31
> An: Geib, Rüdiger <Ruediger.Geib@telekom.de>
> Cc: Black, David <David.Black@dell.com>; tsvwg@ietf.org
> Betreff: Re: [tsvwg] Some comments on NQB (part 2)
> 
> Hi Ruediger,
> 
> 
> I would like to offer an opinion on the default PHB group (top-posted, because it seems related, but not directly addressing any of your points below). These 8 DSCPs seem to have a higher probability to survive end-to-end and hence could be use to signal "intent" from source to destination. But if an intermediate node receives a packet with such a potential e2e DSCP it should be encouraged to adjust its own DSCP marking if it is prepared to give special treatment based on "intent". For an easy example the LE PHB comes to mind if an endpoint marks decDSCP1 but a diffserv domain uses the top 3 bits of "CS1" for that PHB, the network should be encouraged to set the appropriate TOS bit and treat such packets appropriately. Not sure whether other intent-DSCPs will have similar properties where 
automatically translating makes sense, but at least for LE all "players" along the path have more or less aligned motivations, no?
> 
> Best Regards
> 	Sebastian
> 
> 
>> On May 5, 2022, at 10:16, <Ruediger.Geib@telekom.de> <Ruediger.Geib@telekom.de> wrote:
>>
>> David,
>>
>> Thanks, I share your view.
>>
>> I've read into the DiffServ standards a little, and I propose to specify a new PHB group "Default". It should apply the same DSCP assignment philosophy as the AF specification which specifies 4 PHB groups. Each of the four AF PHB groups can easily classified using DSCP ranges (and each PHB group has 3 assigned 3 DSCPs).
>>
>> The commonality I see for PHBs belonging to the Default PHB group is that they all SHOULD be classified for and forwarded by default PHB at interconnection nodes and within the backbone. If received by suitable DSCPs 
in range 0-7 (as an example, could be a subset too), re-marking SHOULD NOT apply at interconnection gateways.
>>
>> Rules for the resources configured of PHBs of the Default PHB group need to be defined (but currently available drafts do so quite well, I think). Apart from using the same capacity as default PHB, I think, these PHBs further all have in common, that resources provided may be overbooked at bottlenecks.
>>
>> Specifying a new Default PHB group shouldn't become part of the NQB spec, but NQB should be made part of the latter PHB group.
>>
>> Regards,
>>
>> Ruediger
>>
>> -----Ursprüngliche Nachricht-----
>> Von: tsvwg <tsvwg-bounces@ietf.org> Im Auftrag von Black, David
>> Gesendet: Mittwoch, 4. Mai 2022 22:08
>> An: Greg White <g.white@CableLabs.com>
>> Cc: tsvwg@ietf.org
>> Betreff: Re: [tsvwg] Some comments on NQB (part 2)
>>
>> <WG_Chair_Hat=OFF>
>> With apologies for resurrecting some topics that have been more or less settled in the past, I am still bothered by the recommendation of two default DSCPs for NQB.
>>
>> The question that I can't satisfactorily answer is: If NQB traffic is supposed to be carried as a peer to Default traffic, why are we instructing end systems to use DSCP 45 for originated NQB traffic on all networks?
>>
>> The answers to that question seem to boil down to (with apologies for the crass bluntness) necessity of allowing the Legacy WiFi "tail" to wag the Internet QoS "dog".
>>
>> Would someone (Greg?) provide a reminder of what is it about legacy WiFi that requires this approach, please ...
>> </WG_Chair_Hat>
>>
>> Thanks, --David
>>
>> -----Original Message-----
>> From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of Greg White
>> Sent: Friday, April 29, 2022 3:34 PM
>> To: Ruediger.Geib@telekom.de
>> Cc: tsvwg@ietf.org
>> Subject: Re: [tsvwg] Some comments on NQB (part 2)
>>
>>
>> [EXTERNAL EMAIL]
>>
>> Thanks Ruediger.
>>
>> Glad to hear that we are converging, though it wasn't clear to me which version of the new text you preferred.  For now, I'll stick with the version that I'd sent on April 4, but let me know if I've misunderstood you.
>> Hopefully others find this text change acceptable.
>>
>> N.B. I don't have any issue with your bigger picture idea, but it is beyond the scope of the NQB draft.   So, if you want to pursue documenting 
it in an RFC, it probably should be proposed separately.
>>
>> So, for the NQB draft, are folks ok with replacing:
>>
>> To support NQB, networks MUST preserve a DSCP marking distinction between NQB traffic and Default traffic when forwarding via an interconnect from or to another network.
>> To facilitate the default treatment of NQB traffic in backbones and core networks discussed in the previous section (where IP Precedence may be 
deployed), networks that support NQB SHOULD NOT use the value 45 for NQB at network interconnects unless that usage is explicitly documented in the TCA (Traffic Conditioning Agreement, see [RFC2475]) for that interconnection.
>> Rather, networks SHOULD remap NQB traffic to DSCP 5 prior to interconnection, unless agreed otherwise between the interconnecting partners.
>> To be clear, interconnecting networks are not precluded from negotiating (via an SLA, TCA, or some other agreement) a different DSCP to use to signal NQB across an interconnect.
>> Additionally, the fact that this PHB is intended for end-to-end usage does not preclude networks from mapping the NQB DSCP to a value other than 45 or 5 for internal usage, as long as the appropriate NQB DSCP is restored when forwarding to another network.
>>
>>
>> With [notes in square brackets added to help those trying to compare against the above]:
>>
>> To support NQB, networks MUST preserve a DSCP marking distinction between NQB traffic and Default traffic when forwarding via an interconnect from or to another network.    [no change]
>> Networks that support NQB SHOULD support the ability to re-mark NQB traffic prior to such an interconnection.    [new recommendation]
>> It is RECOMMENDED that interconnecting networks negotiate the use of the DSCP value 45 to indicate NQB traffic across their interconnections (thus avoiding the need to re-mark traffic), however, local DSCP usage by either network could require the use of a different value.   [new recommendation]
>> To be clear, interconnecting networks are not precluded from negotiating (via an SLA, TCA, or some other agreement) a different DSCP than 45 to 
use to mark NQB traffic across an interconnect.  [only editorial change] In situations where negotiation of a DSCP between interconnection partners is infeasible, networks that support NQB SHOULD NOT use the value 45 for NQB at network interconnects, but rather SHOULD re-mark NQB traffic to DSCP 5 prior to interconnection.  [limited the applicability of this recommendation] This is intended to facilitate the default treatment of NQB traffic in backbones and core networks discussed in the previous section (where it is possible that IP Precedence may still be deployed).  [only editorial change] Additionally, the fact that this PHB is intended for end-to-end usage does not preclude networks from mapping the NQB DSCP to a value other than 45 or 5 for internal usage, as long as the appropriate NQB 
DSCP is restored when forwarding to another network.  [no change]
>>
>>
>> In addition to Ruediger, I'd like to specifically hear from David Black and Gorry, since two of the original sentences came from David, and Gorry was the OP raising a concern about those sentences.
>>
>>
>> -Greg
>>
>>
>>
>> On 4/29/22, 3:27 AM, "Ruediger.Geib@telekom.de" <Ruediger.Geib@telekom.de> wrote:
>>
>>     Hi Greg,
>>
>>     Thanks. My bigger picture: RFC 8100 is intended to support interconnection policies like:
>>
>>     If DSCP in range <0-7>      # with a negotiated SLA, different ranges may apply for different backbone PHBs and Codepoint rewrites...
>>         then PHB=default
>>
>>     To me, no SLA negotiation is necessary if forwarding expected by a 
backbone is "default". In addition, I prefer the interconnection QoS policy to be as simple as possible, if no QoS SLA is negotiated:
>>
>>     (PHB=default)
>>     If DSCP in range <8-63>
>>         set DSCP=000 000
>>
>>     I appreciate your suggested text which allows that; no DSCP 45 traffic should be received at interconnections without negotiated QoS SLA, if the above is deployed. If DiffServ Standards were changed to support the above, 8 DSCP are available for PHBs whose differentiating support is most useful and can be decided upon at the access. I think that would be beneficial for
>>     - Lower Effort PHB
>>     - L4S / NQB (I think, any DSCP can be rewritten at access and may be at a home gateway, and if a standard proposes a value like 45, the better).
>>
>>     What I suggest to avoid at interconnection (and will not deploy, where I'm in charge) is (e.g.):
>>
>>     If <InterconnectionPartnerX> then
>>         If DSCP <a>
>>             then PHB=default
>>         If DSCP <b>
>>             then PHB=default AND set DSCP=000 001
>>         If DSCP <c>
>>             then PHB=EF
>>         If DSCP <d>
>>             then PHB=AF4 AND set DSCP=001 010
>>         If DSCP <e>
>>             then PHB=AF4 AND set DSCP=001 100
>>         If DSCP <f>
>>             then PHB=default AND set DSCP=000 101
>>           ....
>>         If <no match>
>>             then PHB=default AND set DSCP=000 000
>>
>>     Rather than individual per interconnection partner combined with per DSCP policies at interconnection, I'm looking for simplistic, easily comprehensible and to the extent possible generic Behaviour Aggregate classification. That holds for (range based DSCP) remarking at interconnection too.
>>
>>     Regards,
>>
>>     Ruediger
>>
>>
>>
>>
>>
>>     -----Ursprüngliche Nachricht-----
>>     Von: Greg White <g.white@CableLabs.com>
>>     Gesendet: Freitag, 29. April 2022 01:12
>>     An: Geib, Rüdiger <Ruediger.Geib@telekom.de>
>>     Cc: tsvwg@ietf.org
>>     Betreff: Re: [tsvwg] Some comments on NQB (part 2)
>>
>>     Hi Ruediger,
>>
>>     Thanks for responding.   See my responses [GW] below.
>>
>>     -Greg
>>
>>
>>     On 4/26/22, 8:14 AM, "Ruediger.Geib@telekom.de" <Ruediger.Geib@telekom.de> wrote:
>>
>>         Greg,
>>
>>         Sorry for the late response.
>>
>>         <snip>
>>
>>         You wrote:
>>         What I offered for consideration below was that the [DSCP] value 45 be recommended across interconnections in cases where the two interconnecting partners are NQB-aware and they negotiate DSCP markings.
>>
>>         RG: To me, that's an additional concept. My take was, NQB doesn't require more than default transport in the backbone and at interconnection. If the later holds, negotiation of NQB is no issue to me, but an appropriately picked DSCP is important (it should unambiguously indicate "default forwarding" at interconnection).
>>         If a QoS SLA is negotiated, in principle any negotiated DSCP does (it is well known that I prefer RFC 8100 at wholesale and interconnection interfaces, as this simplifies deployment and operation).
>>
>>     [GW] It seems to me that there isn't such a thing as a DSCP (other 
than possibly 0) that unambiguously indicates default forwarding at interconnection.  I quickly re-read RFC8100 and also don't see mention of it there (it refers to DSCP=0 as being default and seems to recommend that any traffic classified into the Default / Elastic Treatment Aggregate be re-marked to 0). As I understand it, the practice of aggregating traffic based on the IPP bits (top 3 bits) is not universal. If I'm right in that, then it seems that recommending NQB-aware networks re-mark NQB traffic to 5 and not use 45 at *all* interconnections might be unnecessary (and it was apparently concerning to some).
>>     In my post on April 4: https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/tsvwg/PKTrfNdTCEXmwoovSkqec6cOJZc/__;!!LpKI!mzr4n4KDAty5Aq0a1tG2B89wGfRac3ylHv0FS_U75V-j47XXXS_4VgGjl_ncHFL_4IO4sSMU0X0akSepO1Y$ [mailarchive[.]ietf[.]org] in response to Gorry's concerns, I had suggested softening this to (paraphrasing here):
>>     - If negotiating a DSCP to use at interconnection, recommend 45, but the parties can negotiate whichever value they want.
>>     - If negotiation isn't possible, the sending network SHOULD NOT use 45, and instead SHOULD use 5.
>>     What about this do you not like?  It seems to me that you're saying that you wouldn't negotiate a DSCP for NQB.  So, based on the proposed text, your interconnection partners SHOULD use 5.
>>     Would it make you happier if the first statement were replaced with:
>>     - If negotiating a DSCP to use at interconnection, recommend the use of either 5 or 45, but the parties can negotiate whichever value they want.
>>
>>
>>
>>         You wrote:
>>         The data from Ana Custura and Gorry indicates that, unless something changes in regards to bleaching of the upper 3 bits by some networks, any future assignments of the values 13, 21, 29, 37, 53, 61 would do well to keep in mind that any traffic so marked could end up being aggregated with NQB traffic.  That said, this sort of bleaching is non-compliant with the definition of the DSCP field, and is already problematic for EF, VA, and all of the CS codepoints (which aggregate in incompatible ways), so (as was commented in the last meeting) we may want to consider identifying the routers that continue to do this, and try to work with the associated network operators to change the behavior.
>>
>>         RG: I'd appreciate a concise reference for your claim "this sort of bleaching is non-compliant with the definition of the DSCP field".
>>
>>     [GW] I probably didn't choose my words as carefully as I could have, and I made that statement (without doing the appropriate research) based on comments others had made.  RFC2474 Section 3 seems to imply to me that selectively bleaching certain bits of the field is not what was intended, but it does allow that "Nodes MAY rewrite the DS field as needed to provide a desired local or end-to-end service."  So, I don’t see any requirement statement that is violated.
>>
>>
>>         RG: If you are interested, I can sketch examples where single sided changes were made to well  negotiated EF deployments and the interesting consequences caused by that. That's not what mean by "problematic for EF", it rather shows what happens if a QoS design isn't well agreed with all parties responsible for QoS aware network sections and policy points in an operational end-to-end production chain.
>>
>>         Regards,
>>
>>         Ruediger
>>
>>
>>
>>
>>
>>
>>
>