Re: [tsvwg] NQB - which DSCP to recommend?

<Ruediger.Geib@telekom.de> Mon, 18 November 2019 07:52 UTC

Return-Path: <Ruediger.Geib@telekom.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8849B12007C for <tsvwg@ietfa.amsl.com>; Sun, 17 Nov 2019 23:52:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.299
X-Spam-Level:
X-Spam-Status: No, score=-4.299 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=telekom.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gKXD3F2Vn32l for <tsvwg@ietfa.amsl.com>; Sun, 17 Nov 2019 23:51:44 -0800 (PST)
Received: from mailout11.telekom.de (mailout11.telekom.de [194.25.225.207]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0DF2D1208E5 for <tsvwg@ietf.org>; Sun, 17 Nov 2019 23:51:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telekom.de; i=@telekom.de; q=dns/txt; s=dtag1; t=1574063480; x=1605599480; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=YsHzRExV9jBxOr0hJaqzcG7FoTtmMtbg0JuEXoqTs78=; b=6jOSRwwH/KFxH2IHvHv8Aln+TnHI68uhxrlklOOz30UvMfl/pbrJVKtF 8l185K/zFewo4Xr1ks1WdWa9JWlONQXBHK/e9MF2WLbOxgqHXCQsJ63Wx X9+D0AaLVjkuDcqvgt9AgQ0vPJhAuop6I7LtWoXDxBzJrFLMyUNqaHta2 L1uu6Pogg772P5QKFtOXbDnUUNIeiJXiZ5UYcXDGNkpEBGMW0auWQsIh2 JPkjXQS03b0PftBkuLDDsLe51ra19N6OKV6eO3PNovj3pTZDFH38ZO3sr xWNtVsgwZcMUXDA7xNYOhKova43poF99g9q2bCaf7xY0fSkprh3gGPaxa w==;
Received: from qde8e4.de.t-internal.com ([10.171.255.33]) by MAILOUT11.dmznet.de.t-internal.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 18 Nov 2019 08:51:18 +0100
IronPort-SDR: hKMG8fb5lgZb6Hc0b0IB0ydsQs2x5/SwczoOrrG7kBYusAp4aEF6nfI+5Vla/P5U9Q2jif+WqO Bd5RVwaPAHm9zXg/bwJo/93lyemi0/G+E=
X-IronPort-AV: E=Sophos;i="5.68,319,1569276000"; d="scan'208";a="672256379"
X-MGA-submission: MDGLL/EApndpJisIPHeby4tiLY4ryLFs9bABpFr9PUAzqpr3P42+c6sloNbE8x0jGMqMVG9M/GrDebA5GlTsYlnDnFgtOTjGmIS0weQW0xf0thlwXHadi2w4s+/3DyptzIqcpGsEygf36hDsf7+j+wdHKPU4vICUmPamh3UCf7c0TA==
Received: from he105716.emea1.cds.t-internal.com ([10.169.118.52]) by QDE8PP.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES256-SHA384; 18 Nov 2019 08:51:41 +0100
Received: from HE105715.EMEA1.cds.t-internal.com (10.169.118.51) by HE105716.emea1.cds.t-internal.com (10.169.118.52) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 18 Nov 2019 08:51:41 +0100
Received: from HE104160.emea1.cds.t-internal.com (10.171.40.36) by HE105715.EMEA1.cds.t-internal.com (10.169.118.51) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Mon, 18 Nov 2019 08:51:41 +0100
Received: from GER01-FRA-obe.outbound.protection.outlook.de (51.4.80.15) by O365mail03.telekom.de (172.30.0.232) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 18 Nov 2019 08:51:39 +0100
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=fNoO/xYvQj+1NMDSt166pnkh+oFerdYb6v1d31l3Qx7XL6QAZzYIT/qmLE1LKT8qrNiUjnCniW7WuJTd3hM4fDXfdMN7rOaJWTn4BJZRMUbcECbjLgBCplO9nMWG8UTxx0mduxsIQ6Eqy3GfCZGaPt8GKgCGAfwJ5JNh0XDQtxlZw0qAdKemUKYHPKFCMt4JzRHOVLJ+ZlDOq0L2gMctk5qZwr6yRtxZ4agDRUq50rck7DCfuIq2OF0B6qf3C0My9aqzg2obRDH4WaF6gZHmGCrNCfgUSF4JgMKat9sap17PQtSu9nVppsJpN9PDEMnutyggwI+xxqVqzWuftzy5jQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YsHzRExV9jBxOr0hJaqzcG7FoTtmMtbg0JuEXoqTs78=; b=KtiFB+9wi38P35TOCvTiuZWwOdo39sUXTAnwkHqc91D9ErqjcOrFHfhU2Jtz4C8yj1q2u22tQLRSF8X8b0BCcyzDNAwFEhYeMSeAp/aARbTEHn7h3YJCWhPnV1eZS5T3GKsI+kCftGDBb9J0IUa6fcxvQyPcdmv+u5lnKmMny2dUzmB8654CSebvxCeFIh30sR+G7s5hoyWNsWnqCSQbHnaW9g+/PE5Sk+fPGw0UKVq1gUg8SWjB7cnX3dbFSnAt87bMjkGRJutn9l5JWkokfycOhBiWx5Ajog03D3G7KHDai4Dt1V0RuYmbsQOGIpuF4vmVYvzQh3YuwkbErKqqqw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telekom.de; dmarc=pass action=none header.from=telekom.de; dkim=pass header.d=telekom.de; arc=none
Received: from LEJPR01MB0508.DEUPRD01.PROD.OUTLOOK.DE (10.158.143.17) by LEJPR01MB0460.DEUPRD01.PROD.OUTLOOK.DE (10.158.142.153) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2451.29; Mon, 18 Nov 2019 07:51:40 +0000
Received: from LEJPR01MB0508.DEUPRD01.PROD.OUTLOOK.DE ([fe80::c409:34d4:cbb0:1882]) by LEJPR01MB0508.DEUPRD01.PROD.OUTLOOK.DE ([fe80::c409:34d4:cbb0:1882%6]) with mapi id 15.20.2451.029; Mon, 18 Nov 2019 07:51:40 +0000
From: Ruediger.Geib@telekom.de
To: g.white@CableLabs.com
CC: tsvwg@ietf.org
Thread-Topic: [tsvwg] NQB - which DSCP to recommend?
Thread-Index: AdWbT7q4ff1pYakkSdOAEfQFvOmn0wAP+BAAAAGSpZAAH5yCAABzFing
Date: Mon, 18 Nov 2019 07:51:40 +0000
Message-ID: <LEJPR01MB0508381B70CF12E88A9429D19C4D0@LEJPR01MB0508.DEUPRD01.PROD.OUTLOOK.DE>
References: <MN2PR19MB404507EBF1C41E72A7930F0F83700@MN2PR19MB4045.namprd19.prod.outlook.com> <F1E4C0CC-EBA1-48B4-AA57-01D179521AEF@gmx.de> <LEXPR01MB118358214565EA8E73B929539C700@LEXPR01MB1183.DEUPRD01.PROD.OUTLOOK.DE> <A9E69EC8-1F4C-4A75-A0AF-7E51545703F9@cablelabs.com>
In-Reply-To: <A9E69EC8-1F4C-4A75-A0AF-7E51545703F9@cablelabs.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Ruediger.Geib@telekom.de;
x-originating-ip: [164.19.3.241]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7e1046ae-0387-4c62-97b9-08d76bfc25c1
x-ms-traffictypediagnostic: LEJPR01MB0460:
x-microsoft-antispam-prvs: <LEJPR01MB0460AF506857558E9301157C9C4D0@LEJPR01MB0460.DEUPRD01.PROD.OUTLOOK.DE>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0225B0D5BC
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(376002)(396003)(346002)(136003)(39860400002)(52314003)(199004)(189003)(186003)(66476007)(476003)(446003)(8936002)(14454004)(6116002)(71200400001)(71190400001)(85202003)(561944003)(7736002)(305945005)(6916009)(33656002)(9686003)(316002)(85182001)(5660300002)(966005)(6306002)(7696005)(4326008)(26005)(86362001)(11346002)(66574012)(102836004)(53546011)(478600001)(2906002)(66446008)(76176011)(55016002)(66556008)(64756008)(66946007)(14444005)(81156014)(81166006)(76116006)(256004)(8676002)(486006)(66066001)(3846002)(777600001); DIR:OUT; SFP:1101; SCL:1; SRVR:LEJPR01MB0460; H:LEJPR01MB0508.DEUPRD01.PROD.OUTLOOK.DE; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: telekom.de does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: HuovGBz3/EZMkQYFCuGebJW9NJfhXr8IOiYK4bFkYa+LEJi4BxRnjr+Y4X8mGOcR65Y5u4MffwzdvwEtYKi81Sj6AF295PsRoN4ChBOhr2w5nEnbusXlz2Fb1rKble0zRdq6XR66/lVPCFTVoLhdvwk/8Z6BTjPcGP4JlPvwgMhQRilrnYXMpOhf476kQbtONqLLKhx7+I6Ccz/eZOiCj+LVY8jIehYyP32bXlzzel7bb+NmAQhMK2lIbHh67vvKHISBOUHmTODyokK02pLetPCiqHf/98S/imK0DuDxQXnJ754iJOQKN8CT22QEItM3wViJkbZSh290Du5v7bMR/5U1gpATkrli5Pbz/R+MY4qtxBVxealteZNbFBj5NX/QQyeClXYnYIeTh4hV/stYd3tmOUJVJx1rJ9Gl305ynSSd2DlNnV5tlqIZdsq5ZQsm
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 7e1046ae-0387-4c62-97b9-08d76bfc25c1
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Nov 2019 07:51:40.4509 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bde4dffc-4b60-4cf6-8b04-a5eeb25f5c4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: J1UE+Rv62uMQyoyzYGI+3aLaUoUOypX0f+mRJfBKoAkWRjZmoUIDEfpOrHcDjLOr4vJanq/HiXZTZ2SAw9BKyol3XoKLFlQ3Kp0R+Bffpfg=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: LEJPR01MB0460
X-OriginatorOrg: telekom.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/UzeTVAj3h2IQl0dKy_ECTtAfLco>
Subject: Re: [tsvwg] NQB - which DSCP to recommend?
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Nov 2019 07:52:01 -0000

Greg,

the situation I'm in is:
- DiffServ is deployed since more than a decade and multiple DSCP are used
- DiffServ compliant interconnection works with re-marking as an operational commodity. RFC 8100 is deployed.
- The Layer 2 and Layer 3 access Wholesale market over here is regulated and that partially includes specification 
  of access network DSCPs and corresponding Ethernet priorities. 
- I suggest to use a 000xxx DSCP, if a DSCP identifying a specified PHB not requiring an SLA at interconnection 
  should arrive a customer access with an unchanged DSCP. 

At an Interconnection point of the backbone that I'm working with, a DSCP 101xxx is interpreted as Telephony traffic. If there's an SLA in place, the EF PHB is honored and suitable charges apply. If there's no SLA in place, this traffic continues being transported by the default PHB and will be marked appropriately.

Standardised E2E PHBs are a good idea, but DiffServ isn't greenfield. To me, changes in the DiffServ architecture (like standard E2E DSCPs) must respect operational deployments at interconnection. I don't think that's simple, but it may be possible, if all parties involved can agree on a joint way forward.

Regards,

Ruediger

-----Ursprüngliche Nachricht-----
Von: Greg White <g.white@CableLabs.com> 
Gesendet: Samstag, 16. November 2019 08:25
An: Geib, Rüdiger <Ruediger.Geib@telekom.de>; moeller0@gmx.de; David.Black@dell.com
Cc: tsvwg@ietf.org
Betreff: Re: [tsvwg] NQB - which DSCP to recommend?

TSVWG-ers,

We are proposing this PHB and a standardized DSCP that maps to AC_VI because we believe that it will provide a real benefit to residential broadband end-users worldwide (and our experimental usage to date has shown this to be true).   I believe the risk of unsuspecting users suffering as a result is entirely overblown.  I think the only thing that we agree on in that regard is that if the WiFi link is the bottleneck and if massive amounts of NQB marked traffic are delivered to the home network, it is possible to impact Default traffic.  But to have this occur in practice assumes that ISPs don't care about their customers, and are perfectly happy creating situations that result in trouble calls and/or truck rolls.  No ISP that I am aware of is interested in making their customers angry and adding to their operations costs.

Regardless of which DSCP the IETF selects, an ISP uninterested in providing the benefits of NQB to their customers (or one that is oblivious to NQB) can simply leave existing bleaching in place. 

If Sebastian's proposal is adopted, let's examine how this might play out.

An ISP interested in providing the benefits of NQB to their customers would presumably want to map 0x06 to AC_VI or AC_VO, so that the benefits are not lost when the traffic crosses a WiFi link. They could do this in ISP-provided gateways (either implementing a DSCP remapping, or using QOS_MAP), the upshot being that users of non-ISP-provided gateways fail to get the benefit of NQB.  Yes, they would be protected from the remote possibility of harm, but at a cost.   Another possible outcome is that an ISP remaps all NQB traffic to (e.g.) 0x2A in their core network, and this 0x06 value is only used across interconnects.  Since work would be needed on PE routers to turn off ingress bleaching of the NQB codepoint anyway, that seems like it might be the easiest place to map it to 0x2A.  Another possible outcome is that NQB applications ignore the IETF DSCP recommendation, and end up using a de facto DSCP in its place (possibly 0x2A), one that gets the benefit of segregated queuing provided by AC_VI (or AC_VO) across a broader user base, without creating remapping requirements for ISPs.  This would almost certainly be the case for uplink NQB traffic.

The latter two possibilities would result in NQB traffic arriving in all of the ISP's customers' home WiFi networks such that it maps to AC_VI or AC_VO anyway.  In cable access equipment, per-user bleaching of NQB traffic is straightforward, whereas per-user per-DSCP re-mapping isn't, so this approach would allow the ISP the ability to selectively enable/disable NQB marking on a per-user basis if need be.

The first option strikes me as being less likely anyway, since it involves new feature development on home routers.  Many ISPs do not write their own home router implementations.  

In all cases the ISP needs to ensure that supporting NQB on downlink traffic benefits their customers in the end.  This involves some type of control/policing of the NQB marking. This could be via traffic protection implemented on PHB compliant links, or it could be via other policies implemented in other network elements.

It seems to me that Sebastian's proposal simply creates a barrier to deployment and/or a degradation of the relevance of the IETF recommended DSCP, but no real protections.   

In my view, the sought after protections come instead from giving ISPs guidance on avoiding the potential for harm in WiFi networks that use existing equipment, as well as recommendations for upgrades to WiFi equipment to enable full PHB support (including traffic protection).  I am comfortable with David's suggestion to mandate that NQB PHB equipment that provides residential broadband service be capable of bleaching NQB to Default.  

I stand by the original proposal to assign 0x2A.

Greg



On 11/15/19, 2:27 AM, "tsvwg on behalf of Ruediger.Geib@telekom.de" <tsvwg-bounces@ietf.org on behalf of Ruediger.Geib@telekom.de> wrote:

    Hi Sebastian, hi David
    
    I agree with your analysis. I don't object your proposed DSCP. Should there be a desire to circumvent the situation you describe, 000111 (or another spare 000dd1 DSCP) might be an option. As said, proposed only for the case that your suggestion doesn't reach consensus.
    
    Regards,
    
    Ruediger
    
    -----Ursprüngliche Nachricht-----
    Von: tsvwg <tsvwg-bounces@ietf.org> Im Auftrag von Sebastian Moeller
    Gesendet: Freitag, 15. November 2019 09:35
    An: Black, David <David.Black@dell.com>
    Cc: tsvwg@ietf.org
    Betreff: Re: [tsvwg] NQB - which DSCP to recommend?
    
    Hi David,
    
    
    > On Nov 15, 2019, at 01:58, Black, David <David.Black@dell.com> wrote:
    > 
    > Lurking in the lengthy discussion about NQB and existing WiFi is a topic that needs broader WG attention, please.   Sebastian wrote:
    >  
    > > IMHO the upshot of this should be to
    > > 
    > > a)  propose a DSCP for the NQB PHB that maps into AC_BE
    >  
    > The general topic is which DSCP should be the recommended DSCP for the  NQB PHB.  The NQB draft proposes 0x2A, but the WG may choose to select a different DSCP for this purpose.
    >  
    > Ok, please discuss …
    
    	[SM] I propose to use 0x6 (000110) as DSCP for the NQB PHB on un-charcaterized networks, and to use 0x6A (101110) if the receiving network is known to contain NQB compatible wifi elements (or that network operator requested the re-mapping) as re-mapping to 0x6A (101110) will by default get packets into the desired AC_VI. 
    
    	According to https://datatracker.ietf.org/meeting/99/materials/slides-99-tsvwg-sessb-31measurements-concerning-the-dscp-for-a-le-phb-00 partial bleaching can re-map a few common PHBs into the same DSCP (occurrence of partial bleach reported ~10%). But out of the "common" DSCPs only AF13, AF23, AF33, AF43, and EF carry 110 in their low three bits, and since all of the denote high priority (which partially indicates a request for low latency) this re-mapping does not see catastrophic and it certainly does carry the same cause priority inversion concerns that were relevant in selecting the LE PHB DSCP (https://tools.ietf.org/html/rfc8622). 
    
    	I believe this to be a viable path forward that a) protects unsuspecting wifi networks from unintended side-effects of inceasing the use of AC_VI, yet b) allows ISPs to roll-out APs/wifi-routers equipped to handle NQB in the desired fashion. (By using a construct like hostapd's qos_map NQB-aware APs should even be able to instruct stations to map 0x6 into AC_VI if that should be desired).
    
    
    Best Regards
    	Sebastian
    
    
    >  
    > Thanks, --David
    > ----------------------------------------------------------------
    > David L. Black, Senior Distinguished Engineer Dell EMC, 176 South St., 
    > Hopkinton, MA  01748
    > +1 (774) 350-9323 New    Mobile: +1 (978) 394-7754
    > David.Black@dell.com
    > ----------------------------------------------------------------