Re: [tsvwg] draft-ietf-tsvwg-nqb-15.txt - Section 5.2. Traffic Protection (text as is) - MUST fail gracefully

Ruediger.Geib@telekom.de Fri, 17 March 2023 09:05 UTC

Return-Path: <Ruediger.Geib@telekom.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9642AC14CE5F for <tsvwg@ietfa.amsl.com>; Fri, 17 Mar 2023 02:05:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=telekom.de
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KhPdWfTmmK9t for <tsvwg@ietfa.amsl.com>; Fri, 17 Mar 2023 02:05:17 -0700 (PDT)
Received: from mailout11.telekom.de (mailout11.telekom.de [194.25.225.207]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DB143C14CE46 for <tsvwg@ietf.org>; Fri, 17 Mar 2023 02:05:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telekom.de; i=@telekom.de; q=dns/txt; s=dtag1; t=1679043917; x=1710579917; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=m8Na1wTO74MEF7tiDM7rp5p6f8C7GXbiZQthu7+3zEc=; b=Nq0Ch3vLv7bs1yDgrC0FCyQmdHKxAnht165V9ss/9SJXbDKInFpwVNLJ 8OQTjk9pIM/Uys+hXjUOiGeNhKLCkrJMaaapKLOT2dGKSddKgZaK74XTA aYa2ssvUS4wGJfMtlmBTG7HWYHmaP2NGxSl4Iqxa7yvfoP0srmtT5UKaA ugromwCv2LEzId+5EV5hoQriZgsKxd6N5LMwDuHdLAO8XsEuj1knNJMJ6 b5aiFpcPxe42PDwWMhc7s1bs6BKftRveZacAMWLqOH2UUK6Gqy2g2wIsB +MwKbg0iESr8lFk8laeqtXSCVIwABgwzZauqCEJTbCuC2V0gc/6eQTdf0 A==;
Received: from qdefcs.de.t-internal.com ([10.171.254.41]) by MAILOUT11.dmznet.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 17 Mar 2023 10:05:13 +0100
IronPort-SDR: 6YRNa7iynnxCiowVDzcR7p8nv7hYSy7LZ4wRZJBgZCh7BObUVXLwp7U2wItaIOubce4Le/KF50 4H34lOj6IhNSgsYSKZZf0mFpkEO+HoseE=
X-IronPort-AV: E=Sophos;i="5.98,268,1673910000"; d="scan'208";a="683126813"
X-MGA-submission: MDEca03T1/KxxJNmNbdguZRepBEPX2mo5VuA/qb1DxGKahWD2MqMmpvG7SyDXtAkDs1SGZQKyF4D+ffroxK9t3mJDRlbmjPZ5YcKay5k3TcZWLYiZiszbacM9Rza/ZW+InVexc/M1Ff7fG9YOMteWElysVPkk2G9d6kILFUQ6YQb9w==
Received: from he104281.emea1.cds.t-internal.com ([10.169.119.195]) by QDEFCV.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 17 Mar 2023 10:04:56 +0100
Received: from HE101190.emea1.cds.t-internal.com (10.169.119.196) by HE104281.emea1.cds.t-internal.com (10.169.119.195) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.25; Fri, 17 Mar 2023 10:04:54 +0100
Received: from HE102772.emea1.cds.t-internal.com (10.171.40.44) by HE101190.emea1.cds.t-internal.com (10.169.119.196) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.25 via Frontend Transport; Fri, 17 Mar 2023 10:04:54 +0100
Received: from DEU01-BE0-obe.outbound.protection.outlook.com (104.47.7.168) by O365mail09.telekom.de (172.30.0.241) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.25; Fri, 17 Mar 2023 10:04:53 +0100
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jMj3GUCIvYXja03iD+9Ut/3Rw2MFWRBQPnOOhMH40XRJcKIwmtfezkip8Li/iUql843fFlhnYwMgomIGoqsCWZq9vlvCcGsWgAn0W79lYEXFJrGoLt/N+zj7U9AGQj4JLtds7odys68huz4kKEnN9B/MgNvWIsZVQ0+pqahOVeV2Dzqs/Tb0xldNUUH+zT4Zu6UHVZUnIvZs5aTUhusjmNPFWB3N3vntr3uONOQo1q+tRuAp/HwnblEKspRkiF4SiU1KgZfvh/g/vv+/t0uxUKTby+YDxqBKmZ9b24giEDOwDxYHu4k4hrPW9dlMTWM3p1TN52HNkEbxYe4Jr9aXZg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=m8Na1wTO74MEF7tiDM7rp5p6f8C7GXbiZQthu7+3zEc=; b=VJOHZb9cUN4Y09yM8fGIZgwS4nDQOJiIphde7mZQ2MfUE9xTGDbCIl7hWepJW4fwxJpuT808pUCBNJPiR92BJkR3B9stvSswOnfXriYUqNbI6IANkRwvOOIcadNb7lY0p2ph6PojfPNAYev4Q29vskkZcA5WJ6BDfm/tcNeqzV9k8FRnZ088hOC8Lte1HbsTn6MzT/WOEYD7ipn3e4B4x6eGIRseR13xKrBmtDN4FWm8ZMVvtXN6Uj4ZNqBN6V4qQPYmBBKexfF1bCiQQytI8/Am+QHR43bpYlZs3xNH+rhriWsVHNoyuEMa26S8KWCqMlygZu9prkAdKPdmkNbr3Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telekom.de; dmarc=pass action=none header.from=telekom.de; dkim=pass header.d=telekom.de; arc=none
Received: from FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:8b::11) by BE1P281MB1524.DEUP281.PROD.OUTLOOK.COM (2603:10a6:b10:18::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.31; Fri, 17 Mar 2023 09:04:52 +0000
Received: from FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM ([fe80::e721:9a37:e9ff:f015]) by FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM ([fe80::e721:9a37:e9ff:f015%6]) with mapi id 15.20.6178.035; Fri, 17 Mar 2023 09:04:52 +0000
From: Ruediger.Geib@telekom.de
To: moeller0@gmx.de
CC: g.white@cablelabs.com, tsvwg@ietf.org
Thread-Topic: [tsvwg] draft-ietf-tsvwg-nqb-15.txt - Section 5.2. Traffic Protection (text as is) - MUST fail gracefully
Thread-Index: AQHZV+289RmJZpdx9UeRR64AnXVGpq7+pnwQ
Date: Fri, 17 Mar 2023 09:04:52 +0000
Message-ID: <FR2P281MB15273F758F1EA4B12734A7BF9CBD9@FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM>
References: <167348364734.15098.9183646444272144529@ietfa.amsl.com> <FR2P281MB152729FCB5F6206A3926F57B9CD79@FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM> <EDED2A65-DE02-428B-99F9-1CB20FFFB139@cablelabs.com> <FR2P281MB1527C72CA2A07D2C48ACA45E9CBF9@FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM> <8A5EFCC0-B258-4F01-8C99-D9CAF273403F@cablelabs.com> <FR2P281MB1527E72252D86B4BA4F448279CBC9@FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM> <CBF25EA1-02F1-4B77-807C-015F76DA185B@gmx.de>
In-Reply-To: <CBF25EA1-02F1-4B77-807C-015F76DA185B@gmx.de>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=telekom.de;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: FR2P281MB1527:EE_|BE1P281MB1524:EE_
x-ms-office365-filtering-correlation-id: 5d5fb2fb-4266-4afd-04e6-08db26c6ab7c
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230025)(4636009)(396003)(376002)(39860400002)(346002)(136003)(366004)(1590799015)(451199018)(85202003)(9686003)(186003)(66574015)(83380400001)(86362001)(38100700002)(82960400001)(85182001)(122000001)(2906002)(4326008)(6916009)(38070700005)(55016003)(66476007)(64756008)(8676002)(66556008)(52536014)(66446008)(76116006)(66946007)(41300700001)(8936002)(5660300002)(30864003)(53546011)(33656002)(26005)(6506007)(478600001)(71200400001)(54906003)(316002)(7696005)(966005)(1580799012)(66899018); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: T+oTGtMLDRYE/6zVT1EUy1VAcEcipJL4sHGSZPADrAwuFcWE7Jd2cMHSMCltqN7nxyalp6GfBPmA+Tk+7O/fEO6y1u19hIGg1BnunfvVuNH5bp4tjsSD0hcoAKzr8fxR2LWaa4+MqFk30se3S8e0sCFVY9BbIeIPqiinG9nIidE9gCXjbJVp+fRmy3oS6nSMzQk818R14J7Y1ISu7ZL1PeCojv4jzlqys0+6RQyKsBBTcnRX4dveMWE58cj2u1tjRzTK5OyHaFtvPX924TOC2VmFWaqCda18ADzWn6DSCirkoJQUInTvYJg416ESLeAM7AFbRKPQADkg99e/yBFocTF+5G/L6rN7/FpRko5pb5SE/fcrBfnUgxfePvDVjBEmCDAG6jvMJiX2o0Bm6lBlZ17g885w//CL+6YdKej+HZU2UFjrcO/uYJQVneXCIHQIV+2H7IzLLBRI+pIKtTaB9hF2psIqTqcbT9Ys1gMjQsZYf5qO5y7nZuK+kHn2kb44JyhW4oCsxK/8zIKSCymauK49USJwJ3ws3lx8kI9O8n4PCP6Il3mZ8COWyCFgLx4B7Ehk28lIo2E5/9VKdGbRWxl2KMmE+ktfB5jFj4TRhuHTh1fatnVRrCm1PZH1WZHP25SK+0NvtCLOC00OAvwz7yVPVlEsGnuSsOQvswbg5yLcFiqyfG2vppd8Z6yarXTy7vlN2IJ8mibg5zTcOBp1mBZ9zx2jV7RZMlm7wQmAwLHUMqkj1VHnFoyseNemWaqbiOtEi7HvjdXj9/GbOch6e+g+ZFEPjcBsa9gqna+5iRJ9mBm535qLBz3NAcvsN8xqXjZTW9+xP5CPUsiwNMXdEIRtTpEJ8y4beJ6iExPUlPlXUbNgAIuTWojvrSmVA1b8ve9Alfy+1msWkop2OGAzaO3+tE+kJ5HLbcw8I0JP/9W3mN0R5x2dWJJnTzBvvwfpmq+Qvv8VEXTy5Mag303+gCHnn3Az9rPncg4tgvByPWxWBaglWKWzlJU3zXRc618eH46M0Z6xbI7t+I9ONYH4X8M9cjo6PuVcBEw9osmLglA/Xo7kaDMk9ADFVGySlbVy+Wf0GNP1/QWQsxpCgLBOP/JFuyhQV0QxHaz4M2o93a6ARcOKTGq+mVPFoVvzX5jjJnczxI3k+X69f532FKXwM7tUQUVCcXNl4+7GUbdsXeuyRMzyqEi5YBz30YMbu+J3Qsl1NZO6/0ec+zxeKN9fSLIxgdIwnMpZAMnMzhmnuTwepcmkGf2oSDpX7B378dVXS6A0LZh8zl2NOo5Hc8ZSuhCciFJJIpfyAjvOhmETo2T5Gp3YietmtzzhnTeCL9KuvhJwlAfk7qlR3jHFPpuDcFM/gtmYHqv9luX+H5xQndk9h0qjweNLmwzYCgUF5fQv+GKN6ARzuHUXa3rF+WfLd7bV1uwha/C3VWLsBUNGlRCkJBx9E7qPuPYvweR9AeJxfQvs1TU7shVeeh+IBkPTxXjm2k3+MG/E9/k3WZ0S6DjJZqQX+Lob/EmdwzbumvdxcSbyBrB8sNw3HczhhmaL5dMJ7ff6aHQv3a7Pm6LQV+8Wkd7eZZ7i8UfIqtloKe1a
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 5d5fb2fb-4266-4afd-04e6-08db26c6ab7c
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Mar 2023 09:04:52.5000 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bde4dffc-4b60-4cf6-8b04-a5eeb25f5c4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 15lvROUhuSzh3Mc/2EtZv+UUZHQp7RlEnGZtndjEb3jEd+LwwBk91nvVNmEqnNWygrlqHmDGs4YoW24fch9bQQSIT2JgkvAa23yfEpKQ0ns=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BE1P281MB1524
X-OriginatorOrg: telekom.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/LfQ7p51UDuZc8mfRe59bBmM-i04>
Subject: Re: [tsvwg] draft-ietf-tsvwg-nqb-15.txt - Section 5.2. Traffic Protection (text as is) - MUST fail gracefully
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Mar 2023 09:05:22 -0000

Hi Sebastian,

my understanding is (I'm not an author and may have to be corrected), that the draft
- addresses applications which aren't using a flow-control mechanism
- at the same time allows for flow-controlled applications being marked as NQB
- suggests a 1% access bandwidth and 1 Mbps per flow bandwidth bound (neither of these is a requirement, it's guidance)
- is designed for access to AC_VI on WiFi
- and will, in the case of congestion at the access, re-mark and re-schedule offending flows.

If I was to mark app traffic at a sender, I likely evaluate the risk I take marking app traffic NQB as compared to the gain. By now, the only particular behaviour to protect the overall ecosystem access & WiFi was to reclassify and schedule offending traffic as LE (which then REQUIRES an LE queue). I'd suggest the NQB authors to provide a more through analysis of undesired usage of NQB, where I'd be happy, if the access scheduler (QB/NQB schedulers and load scenarios), all WiFi scheduling options and transport properties were covered. So far, they didn't expose any interest and text given mainly describes the "all behave well" scenario. 

The DiffServ link design validations I do are based on one/all senders misbehave. I have a clear, standards and standard-design based understanding what has to happen then and based on that I am and was in the past able to solve all issues with vendors if results weren't as expected. I don't look at NQB with standard text as it is by now to allow for resolving issues with vendors. I think I'd have to put many things into writing to define a test (like specifying flow, specifying objectives to verify and so on), likely need to communicate all that to my vendors, expect them to implement the DT taste of NQB, all in a compatible way - I stop here. I regard this as unlikely. I, and I'd think implementers too, expect a standard to define all or most of that.







-----Ursprüngliche Nachricht-----
Von: Sebastian Moeller <moeller0@gmx.de> 
Gesendet: Donnerstag, 16. März 2023 10:57
An: Geib, Rüdiger <Ruediger.Geib@telekom.de>
Cc: Greg White <g.white@cablelabs.com>; tsvwg@ietf.org
Betreff: Re: [tsvwg] draft-ietf-tsvwg-nqb-15.txt - Section 5.2. Traffic Protection (text as is) - MUST fail gracefully

Hi Ruediger

I have a related question to one of your enumerated conditions below. I hope it is OK to ask in this thread

> On Mar 16, 2023, at 10:01, <Ruediger.Geib@telekom.de> <Ruediger.Geib@telekom.de> wrote:
> 
> Hi Greg,
> 
> that's a first step. The draft still doesn't specify, what that means in terms of traffic conditioning and scheduling. As "traffic protection fails gracefully" isn't defined any closer, I must do assumptions in the following. If you pursue different aims, please add text, but don't argue with me for my assumptions.
> 
> I assume traffic protection stops operating (i.e. doesn't do anything). As it operated prior to that, there's neither an NQB rate policer nor an NQB rate shaper. 
> 
> The following situations may occur:
> - QB/NQB traffic present, no congestion - cool, should just continue to operate
> - QB/NQB traffic present, congestion and NQB below NQB rate - NQB should just continue to operate
> - QB/NQB traffic present, congestion and NQB above NQB rate - ? The draft doesn't specify how an NQB conformant scheduler works under this operational condition. Traffic protection now doesn't reclassify traffic, does it? If it still does, how does it pick NQB packets to be reclassified, remarked and re-scheduled?

	[SM] So the guidance on what traffic rates are acceptable to label NQB are really weak, a prudent sender hence would try to watch for unambiguous signs of congestion and reduce the sending rate accordingly. E.g. the draft gives 1 Mbps as acceptable per NQB application sending rate* which for quite a number of links even in a developed country like Germany is well above the 1% limit as according to Ookla in February 2023 the _average_ rate for german speedtests was  Download
83.20 Mbps Upload 28.75 Mbps..., so one percent only give 0.8/0.3 Mbps (the assumed 100/100 Mbps symmetric access link seems optimistic).
	As an application developer when faced with such uncertainty, I would try to estimate somehow whether my current sending rate** is within the actual network path's capacity. To do so I would need unambiguous feed-back of the acceptable rate being exceeded. I now argue that EF's strict rate limiter is one predictable way to give such feedback, while the proposed NQB system does not. For the following reaons:
a) NQB traffic will get 100% of capacity if there is no QB traffic (so any capacity estimate during such a period would be wrong for the acceptable NQB share under load)
b) the proposed option to "re-sort offending packets/flows" to QB will make it essentially impossible to reliably and quickly figure out whether my flow exceeded its "welcome". (Having to monitor drops, per-packet delay and potential re-orderings to deduce "capacity share exceeded" conditions might be theoretically possible but that looks neither fast nor reliable).

So from a perspective of responsible NQB senders that actually want to do he right thing during run-time, the proposed soft-limited NQB/QB sharing behavior seems sub-optimal. A strict capacity limit as in EF is considerably easier to reason about for an application as it gives much tighter feed-back (the acceptable capacity share still depends on dynamic variables like how much other NQB packets hit the queue, but at least there now is a theoretical upper limit that is useful and a feed-back path if even the dynamic capacity share is exceeded).

So how are NQB using applications supposed to figure out which rate is acceptable? The current guidance in the draft is quite general and seems aimed at figuring out whether an application is at all eligible to use NQB (e.g. a 600Kbps CBR rate video stream might, a 25Mbps 4K HD VBR video stream probably does not), but says little on what to do at run-time.

Regards
	Sebastian


*) This is a rate that already allows for non-HD video conferencing according to the listed rate requirements for e.g. zoom or skype. Given that the draft should add explicit guidance whether such streams are considered NQB eligible or not.
**) Even a fixed rate sending application has the option, a) informing the user that it exceeds capacity and hence needs to stop, or b) stop marking itself as NQB and accept the highe potential jitter for QB c) switch back to a lower data rate even if that reduces the application fidelity/utility***. These might not be attractive option, but options they are.
***) E.g. it might still be better for a temperature measurement device t give updates every X ideal sampling periods than "never".


> 
> Regards,
> 
> Ruediger
> 
> 
> 
> 
> -----Ursprüngliche Nachricht-----
> Von: Greg White <g.white@cablelabs.com> 
> Gesendet: Donnerstag, 16. März 2023 00:20
> An: Geib, Rüdiger <Ruediger.Geib@telekom.de>
> Cc: tsvwg@ietf.org
> Betreff: Re: [tsvwg] draft-ietf-tsvwg-nqb-15.txt - Section 5.2. Traffic Protection (text as is) - MUST fail gracefully
> 
> Hi Ruediger,
> 
> I notice that RFC2475 has a statement: 
> 
>   Robustness concerns dictate that the
>   arrival of packets with unacceptable DS codepoints must not cause the
>   failure (e.g., crash) of network nodes.
> 
> Would you agree with changing the requirement in NQB to say:
> 
> "The traffic protection function MUST be designed such that the node implementing the NQB PHB does not fail (e.g. crash) in the case that the flow state is exhausted."
> 
> 
> -Greg
> 
> 
> 
> 
> On 3/15/23, 4:02 AM, "Ruediger.Geib@telekom.de <mailto:Ruediger.Geib@telekom.de>" <Ruediger.Geib@telekom.de <mailto:Ruediger.Geib@telekom.de>> wrote:
> 
> [RG] I suggest that you as the editor of draft NQB provide text specifying how an NQB traffic protection fails gracefully, if flow state exhausts, so that I as a reader interested in implementation can put verifiable requirements on this part of NQB functionality when I ask a vendor for implementation.
> 
> 
> -----Ursprüngliche Nachricht-----
> Von: Greg White <g.white@cablelabs.com <mailto:g.white@cablelabs.com>> 
> Gesendet: Sonntag, 12. März 2023 01:05
> An: Geib, Rüdiger <Ruediger.Geib@telekom.de <mailto:Ruediger.Geib@telekom.de>>
> Cc: tsvwg@ietf.org <mailto:tsvwg@ietf.org>
> Betreff: Re: [tsvwg] draft-ietf-tsvwg-nqb-15.txt - Section 5.2. Traffic Protection (text as is)
> 
> 
> See [GW].
> 
> 
> On 2/3/23, 1:17 AM, "Ruediger.Geib@telekom.de <mailto:Ruediger.Geib@telekom.de> <mailto:Ruediger.Geib@telekom.de <mailto:Ruediger.Geib@telekom.de>>" <Ruediger.Geib@telekom.de <mailto:Ruediger.Geib@telekom.de> <mailto:Ruediger.Geib@telekom.de <mailto:Ruediger.Geib@telekom.de>>> wrote:
> 
> 
> <snip>
> 
> 
> - draft: The traffic protection function MUST be designed to fail gracefully in the case that the flow state is exhausted.
> 
> 
> 
> 
> I’m surprised to find a MUST here, while the major part of the queue protection mechanism isn’t specified. But to me, this requirement is vague too, as the draft doesn’t specify what is meant by “failing gracefully, if flow state is exhausted”.
> 
> 
> [GW] What would you suggest?
> 
> 
> 
> 
> Regards,
> 
> 
> 
> 
> Ruediger
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> -----Ursprüngliche Nachricht-----
> Von: tsvwg <tsvwg-bounces@ietf.org <mailto:tsvwg-bounces@ietf.org> <mailto:tsvwg-bounces@ietf.org <mailto:tsvwg-bounces@ietf.org>>> Im Auftrag von internet-drafts@ietf.org <mailto:internet-drafts@ietf.org> <mailto:internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>
> Gesendet: Donnerstag, 12. Januar 2023 01:34
> An: i-d-announce@ietf.org <mailto:i-d-announce@ietf.org> <mailto:i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>>
> Cc: tsvwg@ietf.org <mailto:tsvwg@ietf.org> <mailto:tsvwg@ietf.org <mailto:tsvwg@ietf.org>>
> Betreff: [tsvwg] I-D Action: draft-ietf-tsvwg-nqb-15.txt
> 
> 
> 
> 
> 
> 
> 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the Transport Area Working Group WG of the IETF.
> 
> 
> 
> 
> Title : A Non-Queue-Building Per-Hop Behavior (NQB PHB) for Differentiated Services Authors : Greg White Thomas Fossati Filename : draft-ietf-tsvwg-nqb-15.txt Pages : 25 Date : 2023-01-11
> 
> 
> 
> 
> Abstract:
> This document specifies properties and characteristics of a Non- Queue-Building Per-Hop Behavior (NQB PHB). The purpose of this NQB PHB is to provide a separate queue that enables smooth, low-data- rate, application-limited traffic flows, which would ordinarily share a queue with bursty and capacity-seeking traffic, to avoid the latency, latency variation and loss caused by such traffic. This PHB is implemented without prioritization and can be implemented without rate policing, making it suitable for environments where the use of these features is restricted. The NQB PHB has been developed primarily for use by access network segments, where queuing delays and queuing loss caused by Queue-Building protocols are manifested, but its use is not limited to such segments. In particular, applications to cable broadband links, Wi-Fi links, and mobile network radio and core segments are discussed. This document recommends a specific Differentiated Services Code Point (DSCP) to identify Non-Queue-Building flows.
> 
> 
> 
> 
> 
> 
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-tsvwg-nqb/ <https://datatracker.ietf.org/doc/draft-ietf-tsvwg-nqb/> <https://datatracker.ietf.org/doc/draft-ietf-tsvwg-nqb/> <https://datatracker.ietf.org/doc/draft-ietf-tsvwg-nqb/&gt;>
> 
> 
> 
> 
> There is also an HTML version available at:
> https://www.ietf.org/archive/id/draft-ietf-tsvwg-nqb-15.html <https://www.ietf.org/archive/id/draft-ietf-tsvwg-nqb-15.html> <https://www.ietf.org/archive/id/draft-ietf-tsvwg-nqb-15.html> <https://www.ietf.org/archive/id/draft-ietf-tsvwg-nqb-15.html&gt;>
> 
> 
> 
> 
> A diff from the previous version is available at:
> https://author-tools.ietf.org/iddiff?url2=draft-ietf-tsvwg-nqb-15 <https://author-tools.ietf.org/iddiff?url2=draft-ietf-tsvwg-nqb-15> <https://author-tools.ietf.org/iddiff?url2=draft-ietf-tsvwg-nqb-15> <https://author-tools.ietf.org/iddiff?url2=draft-ietf-tsvwg-nqb-15&gt;>
> 
> 
> 
> 
> 
> 
> 
> 
> Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
>