[tsvwg] Explaining my ect(1) as input to network position

"De Schepper, Koen (Nokia - BE/Antwerp)" <koen.de_schepper@nokia-bell-labs.com> Tue, 12 May 2020 11:18 UTC

Return-Path: <koen.de_schepper@nokia-bell-labs.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 098F73A0D92 for <tsvwg@ietfa.amsl.com>; Tue, 12 May 2020 04:18:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.074
X-Spam-Level:
X-Spam-Status: No, score=-2.074 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.173, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N8RKJjaiF52a for <tsvwg@ietfa.amsl.com>; Tue, 12 May 2020 04:18:46 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80123.outbound.protection.outlook.com [40.107.8.123]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A9E3D3A0D91 for <tsvwg@ietf.org>; Tue, 12 May 2020 04:18:45 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=M2vrjZgZARN3pUPAUdhQ+Eyve3Fe8tiLsew4iBF2Zqqjjp5HKWzsHPCd1caz19EWez6AKdns+8F3kky6Fm3N5wq1X8i4A1vZcAyaBewTSVIHrBMvgk20NUEj/0QnPyhF6Oi8NrQMLebxA+ZsdqUsIaFajts7rWo+EpCE3bjoqrKH1RDf3SYqOhEfLaC3wfGHbASi4G6yzh7coD+5FAqO3B3fPnNlzo6gqFwH4IShlRvp+AYH/ZXq1croWWv6rQmd3d3ruwjQLWVJfQUu08CpGtM/2nEd32X6ltQaYADu5zB9ZSensmcrrjQrJwZRWcoyD8fW0o3zFta9KX9OaQh9sg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YbQYxpvx/wt+Y3pmON9I+pW/PnaC4xf4p/p7zdGgZMw=; b=h9lBBkmukE+vYyac91qBLcCUiCkrYpFXMX9V1+HlmUqMgMWS92dQETw+gXhumPHkXnvPnstKmap+jZEZr8+0xutTag5un4+HPg3Ov9Fi3XZ99+HSxA7h4dv/byrZHFpXhdlxe4WKDP6s6eRDe1Juury5VjuJ8eUwv29FHqStVxhYfuK7dnX1u4hW4kN6AZl4JhOd7KnCGpSCsTQ5tMwhg3NodAeHaf5WPtcvAETwSb8+lXwuyvGmCv9BZbaRN4JqVvcavwnFCF2GfIAL9dGmmjSIeWsXNVeSGqUWQ8BqqDFRDtqt/5mre+MhhjDcD1a6R96cfSkEem/JIQ568iSyMA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia-bell-labs.com; dmarc=pass action=none header.from=nokia-bell-labs.com; dkim=pass header.d=nokia-bell-labs.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YbQYxpvx/wt+Y3pmON9I+pW/PnaC4xf4p/p7zdGgZMw=; b=B3QFPylQSvlCXUjRLNC2YAfcd9NiYFtIKaqAi4Vl/cNLk1U0K2O0hfG/vezCCNfBxY+J4+AACGJ5SOFEQxTuL09e0xNOTLxunNMK2ZO+WMJ6ztB89rcgX5q7XJMze4fxr7I6xoOF6/44dNOPbUHsH8hGdwzQmQdynw5sqpqNYOA=
Received: from AM4PR07MB3490.eurprd07.prod.outlook.com (2603:10a6:205:11::32) by AM4PR07MB3137.eurprd07.prod.outlook.com (2603:10a6:205:b::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3000.14; Tue, 12 May 2020 11:18:43 +0000
Received: from AM4PR07MB3490.eurprd07.prod.outlook.com ([fe80::a941:a99:33cf:198]) by AM4PR07MB3490.eurprd07.prod.outlook.com ([fe80::a941:a99:33cf:198%7]) with mapi id 15.20.3000.016; Tue, 12 May 2020 11:18:43 +0000
From: "De Schepper, Koen (Nokia - BE/Antwerp)" <koen.de_schepper@nokia-bell-labs.com>
To: "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: Explaining my ect(1) as input to network position
Thread-Index: AdYoQKfeQTu5xojxSAiP9ydRbk0pKQ==
Date: Tue, 12 May 2020 11:18:43 +0000
Message-ID: <AM4PR07MB3490F956F0DDD670EDED93F6B9BE0@AM4PR07MB3490.eurprd07.prod.outlook.com>
Accept-Language: nl-BE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=nokia-bell-labs.com;
x-originating-ip: [2a02:1810:1e00:cb00:d1f6:1b47:5bc2:52bb]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 4f53c6e5-083c-4ed3-a771-08d7f6663b0f
x-ms-traffictypediagnostic: AM4PR07MB3137:
x-microsoft-antispam-prvs: <AM4PR07MB3137A2DC58B8BA131252C406B9BE0@AM4PR07MB3137.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0401647B7F
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM4PR07MB3490.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(136003)(376002)(39860400002)(366004)(396003)(346002)(33430700001)(9686003)(71200400001)(316002)(6506007)(186003)(7696005)(8676002)(2906002)(86362001)(52536014)(6916009)(66574014)(33440700001)(66446008)(66476007)(64756008)(5660300002)(33656002)(66556008)(76116006)(8936002)(55016002)(478600001)(66946007); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_AM4PR07MB3490F956F0DDD670EDED93F6B9BE0AM4PR07MB3490eurp_"
MIME-Version: 1.0
X-OriginatorOrg: nokia-bell-labs.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4f53c6e5-083c-4ed3-a771-08d7f6663b0f
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 May 2020 11:18:43.3283 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: hbrM0xpDWJsaI+oO/SDS+t+iXC+xGQLHjw5/r+4MLznmQeP0rtW2AGlOdxETFhykQfg+N3uPGXd9sXMhRWoBcREgHLKNm9m3dDsHK4NIkOuPJFwwYrs0VXUH4JTKtw6b
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR07MB3137
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/f3lhZO56YhmzjAkYwFvjVwfyU70>
Subject: [tsvwg] Explaining my ect(1) as input to network position
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 May 2020 11:18:48 -0000

Hi all,

A short version of the points I want to make related to the safety issues:

  *   Classic RFC3168 unfairness can be easily mitigated/fixed in the network if it would cause problems, preferably by reusing and reconfiguring exactly the RFC3168 functionality some people think L4S will make useless. It will become on the contrary a driver for better support for L4S.
  *   Vulnerability to non-responsiveness flows exists today in SingleQ AQMs and this is accepted. DualQ behaves exactly the same without benefitting L4S. Like other AQMs, it provides no solution to "save" responsive flows from non-responsive ones, as this is not a requirement for an AQM. So it can't be claimed this is a safety issue of L4S/DualQ.

The big advantage of ECT(1) as the input to the network is that the new traffic can be identified very easily by the network (IP-header only). This is also a big advantage for potential safety issues wrt Classic RFC3168 ECN bottlenecks. A network operator can indeed bleach ECT(1) to prevent the new behavior on its Classic ECN RFC3168 nodes if it would be needed, but even better, an operator can make use of these Classic ECN nodes to support L4S. The identification can be used to separate the 2 traffic types in different queues (or even links/paths), with each its dedicated Classic ECN configuration (a larger target with smoothed response for Classic and a shallow immediate threshold for L4S). The queues can be scheduled with WRR of for example 50/50 for each traffic type. This has been described in early papers for DCTCP deployments in DataCenters. It is actually a NON-Coupled DualQ. This config can be easily configured on existing equipment. It won't have all Coupled features, but is a good starting point, and preserves the low latency for L4S.

I noticed that there are quite some "safety due to non-responsive TCP"-concerns raised again which were solved already. We have shown in the past that the Coupled DualQ responds to non-responsive traffic as a normal Single Q Classic bottleneck (with or without ECN). No fast-lane for L4S non-responsive traffic, only lower latency. Try sending 3 non-responsive UDP/CBR flows using each one of the non-ECT, ECT(0) and ECT(1) with each a sending rate of 100% link capacity into a DualQ. They will each get 33% of the link capacity, while pushing away all TCP traffic (no matter which ECT they are). Note that cumulative, L4S gets even only 33%, while Classic gets 66% capacity in this case! It shows again that the coupled AQM disables the scheduling and fully overrules its claimed "priority"-behavior. This is a very unintuitive concept of DualQ, that seems to be easily overlooked. Depending on the overload strategy, the Classic flows can experience 15ms extra latency compared to the ECT(1), but there won't be throughput benefit. Do the same experiment on a correctly designed Classic ECN bottleneck and the behavior will be exactly the same (except for the latency benefit for ECT(1)). This sensitivity to non-responsiveness has been always the case, even now on the Internet you all are using. It is typically constrained within a single subscriber/user by per user scheduling.

So concluding again, related to the safety-issues:

  *   Classic RFC3168 unfairness can be easily mitigated/fixed in the network if it would cause problems, preferably by reusing and reconfiguring exactly the RFC3168 functionality some people think L4S will make useless. It will become on the contrary a driver for better support for L4S.
  *   Vulnerability to non-responsiveness flows exists today in SingleQ AQMs and this is accepted. DualQ behaves exactly the same without benefitting L4S. Like other AQMs, it provides no solution to "save" responsive flows from non-responsive ones, as this is not a requirement for an AQM. So it can't be claimed this is a safety issue of L4S/DualQ.

So let's go for the forward looking solution with the best opportunity for success...

Koen.