Re: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!

Greg White <g.white@CableLabs.com> Thu, 12 September 2019 05:21 UTC

Return-Path: <g.white@CableLabs.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0153B1200BA for <tsvwg@ietfa.amsl.com>; Wed, 11 Sep 2019 22:21:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cablelabs.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wvHSVOgukBPC for <tsvwg@ietfa.amsl.com>; Wed, 11 Sep 2019 22:21:06 -0700 (PDT)
Received: from NAM05-CO1-obe.outbound.protection.outlook.com (mail-eopbgr720136.outbound.protection.outlook.com [40.107.72.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2E24712004D for <tsvwg@ietf.org>; Wed, 11 Sep 2019 22:21:06 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NvTE762QEFLG3/shy/q2pFUZ3ghIlXtS+snud+VfimUlwqGoja5Rj5pnimq+qzrxtJ9Jh9BshGQAb2sHG8DPWLt7okSqLsGd9NsZucDBUD02fbQ5XmaQaMghEHsgFLq3UuScozJuvTief2FQN0PB6sBQB1RKlkN3sq1cra0bnL5PQ8pM3EOqudIm3XIQF1fmgd9CZpgnAA7dSNsag4UhhdAguDqK2fgGITISTMr6WiGHN7IV9gYJPusXi0PVtIgicLbdL4TkQisgOcr3AiNXyshwFzOLv1RYnxtBCO6RDbqYo36ZGb1LepIDq/W1sXLe2agAcX8aDkhzHj7k/KHjvw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=WF/i6CMCWe4vzFJWyq9JTS2FPe3q6RZulJ4CdKEf3yE=; b=iOYCyWcXyG4yCx84gChVfbEbr4crwaxlnndsD5hs2PVutEz/4MI/7HQuPMVY6ytwI9OfZS9k57qgrTMFeDE0wy3/yTRBN6LL7kEOIOY2yLzFcqS1y6aRQPRG9cT1kpmi5rwoBMJ7UT8lRPM64TT9uEFDa6p/QgNiVjzvwjnKb5yGy/8d/VSUZ8QFlN3wO7rq23T6Fa1YGGKEph8J433aRTATftu3OeatPVAUGIPVQR2L6OYIrkvfVZSfulVY8rp/k7QCwroqy4puXjtH13BY87E515J+thpVKWyhp8SGke6C+L8crzWmFwuzARu11QQMPnhJkyGBCu4EO+SP2EjLWw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cablelabs.com; dmarc=pass action=none header.from=cablelabs.com; dkim=pass header.d=cablelabs.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cablelabs.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=WF/i6CMCWe4vzFJWyq9JTS2FPe3q6RZulJ4CdKEf3yE=; b=IkuZM9v2J00ZEGGjj7sv9bGG3wCGathN+gxcNUydzGnWv6+t97lu9MGEGPwpfjD+Q7+0xEvfX5vA+6MR9K++pOGXGLAZqAdwWOeYRlXrZHZEW2i4EH921QE8exXpa4e9z0MTgwE3sclCWGsvGxlA4P+Qm1bCLmGTeK/O7pxkHJc=
Received: from SN6PR06MB4655.namprd06.prod.outlook.com (52.135.117.85) by SN6PR06MB4174.namprd06.prod.outlook.com (52.135.119.83) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2241.15; Thu, 12 Sep 2019 05:21:04 +0000
Received: from SN6PR06MB4655.namprd06.prod.outlook.com ([fe80::cc2f:14c9:624d:4e74]) by SN6PR06MB4655.namprd06.prod.outlook.com ([fe80::cc2f:14c9:624d:4e74%6]) with mapi id 15.20.2220.024; Thu, 12 Sep 2019 05:21:04 +0000
From: Greg White <g.white@CableLabs.com>
To: Sebastian Moeller <moeller0@gmx.de>
CC: "Ruediger.Geib@telekom.de" <Ruediger.Geib@telekom.de>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!
Thread-Index: AdVfSTsXh/eMA9Y2RLeop2cZ3ij2ZAD+TSWAAB2l37AAOvCoAACNW7egAD5LIIAADnNdgP//vlsAgAFTpoCAAMLCgA==
Date: Thu, 12 Sep 2019 05:21:04 +0000
Message-ID: <E437444E-B896-4BD8-BC3B-01A535A6858D@cablelabs.com>
References: <CE03DB3D7B45C245BCA0D24327794936306BBE54@MX307CL04.corp.emc.com> <AA4DBFC5-8D8F-4F43-80E4-BB9BA7F53486@cablelabs.com> <LEJPR01MB1178B6C102455F1F9886D49A9CBB0@LEJPR01MB1178.DEUPRD01.PROD.OUTLOOK.DE> <F351D86E-DCE4-45CD-9B08-2E0C11090BF1@cablelabs.com> <LEJPR01MB11789EE6D8B7C732393BD1439CB70@LEJPR01MB1178.DEUPRD01.PROD.OUTLOOK.DE> <B11AB47E-7E35-4599-A85B-DB0EF883E2B2@cablelabs.com> <BDF260C9-881C-4ACC-AF92-8E99C1CB07E0@gmx.de> <4B5C14EE-B3CF-455B-86C9-67D6E9BAEF4C@cablelabs.com> <40417573-1036-4238-A451-BFA6D8310B20@gmx.de>
In-Reply-To: <40417573-1036-4238-A451-BFA6D8310B20@gmx.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.1c.0.190812
authentication-results: spf=none (sender IP is ) smtp.mailfrom=g.white@CableLabs.com;
x-originating-ip: [73.14.190.183]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e6cd3687-e6c0-4e99-03fc-08d737410207
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600166)(711020)(4605104)(1401327)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:SN6PR06MB4174;
x-ms-traffictypediagnostic: SN6PR06MB4174:
x-microsoft-antispam-prvs: <SN6PR06MB417445CD454C5E78509AB622EEB00@SN6PR06MB4174.namprd06.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 01583E185C
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(376002)(396003)(346002)(136003)(366004)(39850400004)(189003)(199004)(316002)(26005)(66574012)(81166006)(81156014)(6246003)(25786009)(86362001)(305945005)(6436002)(6116002)(478600001)(99286004)(3846002)(8676002)(14444005)(229853002)(36756003)(256004)(33656002)(486006)(64756008)(7736002)(66556008)(66446008)(6506007)(53936002)(446003)(14454004)(66476007)(5660300002)(102836004)(76176011)(476003)(2616005)(2906002)(11346002)(54906003)(66066001)(6486002)(4326008)(71190400001)(71200400001)(6916009)(66946007)(8936002)(6512007)(76116006)(186003)(91956017)(58126008)(85282002); DIR:OUT; SFP:1102; SCL:1; SRVR:SN6PR06MB4174; H:SN6PR06MB4655.namprd06.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: CableLabs.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: GZD6Hp2nvUJ0Kil6IgN1suohTuTTiS96gb2nhKjFdmhMGnum5DS640zsuMVtEPVsCROA+0csD56uVDRJSkY6EbQu05I0R0xd9gG/DB6Xmnf3zr5vfGu5S+NyKSsgOo4UPlgoRJ+uLavVI3Mb5RHAxxjO43b23j/HXFIDhqIS0AzTU6CpH43OUjTaeYzqmG4HR5gQaUzocJhCx8mF2q/Be4FcMf3TSwqZ736YujHb7XoH+bcUOgMX05sH7mbquhJNXduhxKf/+os8eC70DIVmHNQVEXfByRIKHlCG3U3HrBgubKeoSqGVVx/VQoJzsdsRNv+G4fARMldKjY//iqST7HgVO1C9LoahHUCaErQ6Hn5NPx6yS/TO2Y89Rp3VSSsxmYAy+vGMMVG/DflHDFOuRahbZssjtc59F9PnfzhP+w4=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <8C4FDEABEDE4E24DADDAB9C08E5F342C@namprd06.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: cablelabs.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e6cd3687-e6c0-4e99-03fc-08d737410207
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Sep 2019 05:21:04.1331 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: ce4fbcd1-1d81-4af0-ad0b-2998c441e160
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: YDfb2HCDQjm+9b427Hn2WklqYjA2SUZfalCWyUD4/UZAKryDtg0KwW8OVpIWwcaXsR5ByERmb8J3wtnbdN2Q5Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR06MB4174
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/Xk-hF_dn3V-AIS9M3yiA67BGM0w>
Subject: Re: [tsvwg] TSVWG: WG adoption of draft-white-tsvwg-nqb!
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Sep 2019 05:21:10 -0000

See [GW2]

On 9/11/19, 5:44 AM, "Sebastian Moeller" <moeller0@gmx.de> wrote:
    > [GW] What validation is done today for applications that mark their packets as AC_VO or AC_VI?    
    	[SM] As far as I know almost no validation, but do to the traditional DSCP bleaching over the internet and the reluctance of most applications to twiddle with DSCP bits, most traffic will be in the AC_BE, but admittedly rather by chance than by design. In addition the IEEE's default DSCP to AC mappings are quite conservative (like mapping EF to AC_VI not AC_VO) making high volume traffic in the higher ACs relatively unlikely with such DSCPs that might survive internet passage. But with NQB's desirable approach to be transmitted e2e, that is going to change.
 

[GW2] According to one recent study, roughly 50% of ASes bleach DSCP, so yes a decent percentage of traffic that traverses an interconnect before reaching the WiFi link will end up in AC_BE, but other traffic will not.  None of the traffic generated by local devices on the WiFi network gets bleached.   All OSes that I'm aware of provide open APIs for applications to select their desired DSCP.  In the case of Windows, applications (unless they are privileged) are limited to selecting from a set of 4 DSCPs that map to the 4 WMM Access Categories.  Applications do use these, without validation or policing (at least in residential environments, in enterprise WiFi systems it may be a different story).  In my experience approximately 10% of packets are sent as non-AC_BE (~4% BK, ~1% VI, ~5% VO) in current WiFi networks, though I'm sure there is wide variability depending on the applications in use.  Moreover, I would find it hard to believe that either RFC8325 or the default mappings were defined under the assumption that ALL traffic arriving at a WiFi AP on its WAN port would be guaranteed to be default DSCP.  Given this, I see no justifiable reason for NQB to map to AC_BE in traditional WiFi gear.  The traffic expected to be labeled NQB is sparse unresponsive traffic or smooth low-data rate flows, which is compatible with AC_VO.   We've proposed a DSCP that, conservatively, aligns with the mapping of CS4, AF41, AF42, AF43, CS5, VA and EF to AC_VI in default mapping equipment, and aligns with the mapping of VA, EF and CS6 to AC_VO in RFC8325 equipment.  As I said previously, I don't have a strong view on VI vs VO for RFC8325, but since RFC8325 (unfortunately) maps some capacity-seeking bulk data traffic to AC_VI, I believe that it is more appropriate that NQB sparse traffic be VO in those systems.  The draft has a recommendation that all devices supporting NQB implement a queue protection mechanism for NQB traffic, which for RFC8325 devices supplements all of the detailed recommendations* on protecting QoS in section 8 of RFC8325, which still remain intact.  So, my view is that AC_VI for NQB in RFC8325 equipment is defensible.  

*Note that RFC8325 makes all of these protections RECOMMENDED, not REQUIRED, in alignment with the NQB draft's handling of queue protection.

[GW2]  A point to be repeated here is that this proposed mapping of DSCP to WMM was not driven by the goal of giving priority (either bandwidth priority or latency priority) to NQB traffic, but rather to have it queued separately from QB traffic.  In existing WiFi gear, that isn't possible without using different ACs and we have to work within the limitations of the equipment.   Perhaps the NQB draft should make this more clear.  In other words, the draft should clearly require that WiFi APs that claim compliance with the NQB PHB definition have a separate queue for NQB traffic.  If that separate queue is then scheduled alongside a QB queue, both using AC_BE, that would be compliant.


    > [GW] Perhaps we've left it too ambiguous in the draft, so that needs some review.  It was not the intent that capacity-seeking flows (even L4S) mark their packets as NQB.
    	[SM] Great, maybe this can be made more explicit?
    
[GW2] Yes, I have this on my to do list.   I was modeling the NQB draft on some of the PHB RFCs that were very explicit about PHB requirements, but fairly vague on what applications should use it. 


    >  [GW] The target flows would be ones where the sender has a degree of confidence that it will not exceed the available capacity of the path.  
    	[SM] With a variable bandwidth/rate path like wifi, the sender's confidence might not be the best measure? I would guess the hops operating the RF link would be in a better position to predict the path capacity in the immediate future?
   
[GW2]  There are many applications that can a) be very confident in their belief that they will not exceed the available capacity of the path, and b) that would benefit from not being grouped with capacity-seeking traffic that is causing latency and loss in the network.   Keep in mind that the concept of segregating QB & NQB traffic isn't so that we can guarantee deterministic latency for NQB traffic.  This isn't DETNET.  The goal is to allow NQB applications to have statistically much better latency characteristics than they do today. 


    >  [GW] Other links (including WiFi) could implement it as well.   
    	[SM] I fear I am less optimistic, and would argue that without this implemented wifi should be very careful to prioritize NQB (unless we can agree on NQB qualifying behavior that makes harm very unlikely).

[GW2] I'm confident that we come up with language to more clearly describe NQB traffic in a manner that is compatible with the descriptions of other DSCPs that share an AC with it.  I assume this (perhaps in addition to something like I mentioned above about segregation being the only requirement for the PHB) would satisfy you, no? 


    > [GW] For example, WiFi APs or Stations could monitor queue depth or queue latency for the AC_VI (or AC_VO, whichever NQB maps to) queue and re-direct NQB traffic to AC_BE, either in a flow-aware way (probably preferred) or possibly even in a flow-blind way.  In other situations it may not be necessary (e.g. in controlled environments or on links that support FQ), or it may not be feasible.  
    	[SM] All good ideas; the question to me is more in light of the lack of such mechanisms would it not be safer to default to AC_BE and only selectively elevate NQB traffic if the radio controller/AP is NQB aware? 
    	I ask because I just did a flent rrul_CS8 (that is bi-directional greedy TCP traffic with one flow dscp-marked for each CS) test-run on my home net, and saw my macbook's sent CS6 and CS7 flows almost starve all other traffic, including CS6/CS7 marked traffic from the AP; I am not confident, that the hardware out there is ready for significant traffic volumes on AC_VO/AC_VI yet... (happy to share the flent data file on request).
    	Now, I realize that NQB is not intended for bulk flows, but as long as the marking is not actively verified (and maybe even bleached on detected mis-marking) the intention does not matter that much, NQB-mismarking will give a considerable bandwidth and latency improvement. With access links getting faster and faster, wifi is becoming more and more a (transient) bottleneck making this issue sensitive.
    
[GW2]  I hope we're past this in the discussion now, but just in case we're not:   I don't think that NQB materially changes this situation.  Today (effectively) no traffic has its WMM selection policed.  It is totally up to the application to decide if it wants to mark its packets CS7 or not, and no one is mandated by the IETF to stop them.  Don't get me wrong, I am not opposed to WiFi devices implementing queue protection (or the QoS protection features in RFC8325), in fact they SHOULD do so (if they want to comply with the draft anyway).  But as long as the traffic types that are recommended to be marked NQB (i.e. sparse/smooth relatively low data rate flows) are compatible with the types of traffic that are recommended to be marked EF, CS6, etc. then I think we're covered.  

[GW2] I really don’t follow your insistence on the IETF mandating that implementers build in safeguards like this.  Recommendations are great, and I support them. 

[GW2] I know you are a fan of fq_codel.  What do you implement in your router that detects and prevents an application from sharding its traffic across multiple queues?  If you aren't preventing this simple and powerful exploit, then maybe your router should be banned from the internet!  (this is a joke, in case anyone misunderstands)