Re: [tsvwg] NQB: Use of DSCP 45

Greg White <g.white@CableLabs.com> Fri, 11 February 2022 21:51 UTC

Return-Path: <g.white@CableLabs.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 76D783A0D9D for <tsvwg@ietfa.amsl.com>; Fri, 11 Feb 2022 13:51:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cablelabs.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k8J8DIVfCK0N for <tsvwg@ietfa.amsl.com>; Fri, 11 Feb 2022 13:51:27 -0800 (PST)
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on20706.outbound.protection.outlook.com [IPv6:2a01:111:f400:7eab::706]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4C4823A0D9A for <tsvwg@ietf.org>; Fri, 11 Feb 2022 13:51:27 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=TgPRqqueNcXLqAHPpKH7UlL9fGtp/Coka548DQa8Fzl2k/Y1kGO4yJPFnlmvtZ3IX455LwmrhBS4JC54Ta7zuLh4zUqG8g6s9dZYcKlMbUeLsvAtWa4Q0DFPNUxsBZZ9bJ5YczsCZGiOV2TWJI0ySLP8dlXu+c+0yo/+n8ZLCJPKSCxX3rHkuf42HYnNOfaO/efxta9iq/rIRMLqEDq3ibHtRhFUDdyVByfwt4KwZiKiCN4Kwtvg4P1gj+BnshLbRe/umdM3TvO70oKfrM5xvSg4/7MMufztNT21jjqCU01x+kp5FrBCrWytik0VryQRrJFfCwFLjYdhgH21G9YW2Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=DtLUOMvYDURuJVJChlZs3Uz7YDQ5fmdRIJeVi2TC+Fg=; b=Rn3CBFkt4GM85MjI84jCJLsRcY7l8/kwoRdONevA2MKo6kGh8iUjJ5Hp483EhOh08LB9FPf8LpqItEhS2AoJO0aKzIYiXjFoRWhXoAArGtsSUZTld1ka7LUCsrDHkI6GE1OYut94UuGBcOg/WHO9aYU4ncSasLidc+SdD5DVxKr1sQaQjV2NGefmj/HAf4/Iwn1NfcVQaMl7lWxAUi+T9nwZwPBdGFSJdm+6s2bvNniCRN0eBa73ZeBIFPmZybcd0p1mw+PmVBseqFCsU/0pIMkc/dLmFPz+ncMcNdlzRytkVo/HI8SwWELJPzwT4aeg1Vvr76K4JZrvsElWSq6Oww==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cablelabs.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DtLUOMvYDURuJVJChlZs3Uz7YDQ5fmdRIJeVi2TC+Fg=; b=SQXxH/2ZkL6UxOxiySYPpNP4rLZyfcqoxnaHV6//WRAaAc4Ddnk7LA1b1BggUVAu6ZlUWq94hT5DjO/SJYYbai5Ra830xIkXAKTfJIrNhfnzKzBk33zWzeDqJ/Mep0K9timaCEuaOLY04eM7XH+CD/tWXKcT09izngWYzdZu7+A85zXyld7pNL+Y6zPGe7ERhL6JIONfREr3j6c/mRg6LslQqDyiWCsgsGzg6X4jlpuRD+Okk3A0R0Ebwh/EvQzqXK+Tt3uhxubSvdobJExS1Rik29U7IiQQUvDqSpVoDDUZigTNrgFgYMgu7bOpFDPHkcNiXwJKPHNol3xZyFNmog==
Received: from SJ0PR06MB7861.namprd06.prod.outlook.com (2603:10b6:a03:38c::19) by BL0PR06MB4308.namprd06.prod.outlook.com (2603:10b6:208:4f::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4951.18; Fri, 11 Feb 2022 21:51:19 +0000
Received: from SJ0PR06MB7861.namprd06.prod.outlook.com ([fe80::11db:a40f:e627:f1b2]) by SJ0PR06MB7861.namprd06.prod.outlook.com ([fe80::11db:a40f:e627:f1b2%6]) with mapi id 15.20.4975.014; Fri, 11 Feb 2022 21:51:19 +0000
From: Greg White <g.white@CableLabs.com>
To: Sebastian Moeller <moeller0@gmx.de>
CC: "Black, David" <David.Black@dell.com>, "tsvwg@ietf.org" <tsvwg@ietf.org>, "Jerome Henry (jerhenry)" <jerhenry@cisco.com>
Thread-Topic: [tsvwg] NQB: Use of DSCP 45
Thread-Index: AQHYBoVVtJEDEOUa5kSbTv3gkI6DS6yIUxAggAHV/ACAAOG/gIADldAA
Date: Fri, 11 Feb 2022 21:51:19 +0000
Message-ID: <B27558BC-96DD-4EAD-AD17-1ED1264A883A@cablelabs.com>
References: <A2053069-1408-4693-AB3F-43776C85F155@cablelabs.com> <MN2PR19MB404525E4B857E5B3EC338C12832C9@MN2PR19MB4045.namprd19.prod.outlook.com> <59E5EC68-5B38-477C-A524-C60A43EB46BF@cablelabs.com> <288537E4-2354-4396-8F5F-C369E1A2570A@gmx.de>
In-Reply-To: <288537E4-2354-4396-8F5F-C369E1A2570A@gmx.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.44.20121301
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=CableLabs.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e861a05f-d114-4c51-9bc2-08d9eda8a2ea
x-ms-traffictypediagnostic: BL0PR06MB4308:EE_
x-microsoft-antispam-prvs: <BL0PR06MB43084FB1090EFEB81E4FAE49EE309@BL0PR06MB4308.namprd06.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR06MB7861.namprd06.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(83380400001)(508600001)(64756008)(8936002)(6486002)(53546011)(36756003)(6512007)(6506007)(966005)(2906002)(71200400001)(2616005)(186003)(26005)(122000001)(6916009)(316002)(38100700002)(66574015)(66476007)(66556008)(66446008)(40140700001)(38070700005)(91956017)(30864003)(33656002)(66946007)(4326008)(76116006)(8676002)(54906003)(86362001)(5660300002)(45980500001)(85282002)(579004); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <AA5AEA48A90EC34B869B8F8A91723633@namprd06.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: cablelabs.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR06MB7861.namprd06.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e861a05f-d114-4c51-9bc2-08d9eda8a2ea
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Feb 2022 21:51:19.2115 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: ce4fbcd1-1d81-4af0-ad0b-2998c441e160
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: OJEorAOrMaUfdsxjgqoOwyR7xPc06iT/XYvTDqto85EquLjtIMAw3C8oNsd2dySlvyw1TsamgVdbBJj25ZT8dA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR06MB4308
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/fBcm6eUfv9egmlo-TX8N3OAFM_A>
Subject: Re: [tsvwg] NQB: Use of DSCP 45
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Feb 2022 21:51:33 -0000

Sebastian,

We've discussed this multiple times in the past, but I will try again.

The goal of writing this draft is develop a technology that will be successfully deployed.  In order to do that, we need to consider the state of the Internet today, and understand the parties that would be involved in NQB being a success, as well as what their motivations & incentives are.   It is easy to develop a new networking technology that can be demonstrated to have significant benefits, but if the path to deployment is unclear, for example, if it depends on multiple independent decision makers all making the same decision in lockstep (i.e. a flag-day), or if interim stages on the path to deployment result in degraded performance, then success can be difficult.  Some refer to this as the "you can't get there from here" problem.  Whereas if each party that needs to implement a component of the technology can do so on their own timeline and they realize a benefit in doing so (or at least no degradation), then barriers to deployment fall away, and the technology has the potential to succeed.  Some refer to this as having a good "incremental deployment" strategy.

In this case, the parties involved are:  application developers, operating system developers, network equipment developers, & network operators.  Among these groups, the ones that probably think about networking the least are application developers. 

In the residential context, application developers don't (in general) build custom applications for specific networks.  Nor is there an API for an application or operating system to query the network to find out which DSCPs/PHBs are supported and which aren't.   There are many applications that are compatible with the definition of NQB that today send their traffic in the WMM voice or video access category, and in most cases they DSCP mark that traffic as CS5, EF, or CS7. If we were to select DSCP 5 as the end-to-end recommended value for NQB with the goal that the traffic is sent in AC_BE everwhere, then these application developers would be faced with a dilemma. Perhaps they understand the benefit offered by NQB (a protected low-latency queue), and would like to take advantage of it, but if today there are no (or very few) WiFi networks that support it, and marking their traffic as DSCP 5 (instead of CS5, EF or CS7) results in degraded performance on ALL of the other networks out there, why would they take the step to adopt NQB marking?  They might choose to wait until at least 50% of networks support it before changing.  On the network equipment side, if no applications mark their packets as NQB, then what incentive is there to implement the PHB?  

On the other hand, if we select the DSCP 45 (which maps into AC_VI by default in a lot of consumer WiFi gear) then the application developer isn't faced with that dilemma. They can switch to using NQB marking, and see *zero* difference in behavior (assuming they were using CS5 or EF previously) on networks that are NQB-unaware, and they will give up EDCA priority in exchange for a protected low latency queue in networks that are NQB-aware. Certainly not all CS5 or EF marked applications would make that decision, perhaps they're not interested in low latency alone, and instead think that they deserve higher-priority in the network. That's fine.  But the applications that were selecting VI simply because the BE queue causes too much latency and latency variation, would have a nice alternative. 

For NQB-unaware ISPs, as we've discussed, most (if not all) residential ISPs *do* understand that they bear some responsibility in managing the DSCP marks on traffic that they send into their customers' networks. The vast majority of residential ISPs currently bleach ALL DSCPs to zero. There may be some ISPs somewhere that do not understand this (and thus don't perform any policing or bleaching), but the choice of DSCP 45 for NQB does NOT increase the attack surface created by those ISPs.  

For ISPs that are NQB-aware, I think the draft provides the right level of guidance.  Do not send traffic marked 45 across network interconnects, re-mark to 5 at those interconnects, allow traffic marked 5 into your core network without bleaching it (and don't give it priority over default traffic), bleach NQB to zero prior to an unmanaged network, unless suitable safeguards are in place. 

So, in my view the current draft creates NO additional risk, and has a good incremental deployment strategy, whereas the approach you've suggested creates a "can't get there from here" situation and would be doomed to failure.

-Greg






On 2/9/22, 1:06 AM, "Sebastian Moeller" <moeller0@gmx.de> wrote:

    Dear Greg,



    > On Feb 9, 2022, at 02:38, Greg White <g.white@CableLabs.com> wrote:
    > 
    > Hi David,
    >  
    > Thanks for the response (and you aren’t the only one guilty of an occasional delay on this topic, unfortunately I’ve had more than my fair share).
    >  
    > I agree with your suggestion to add a note in 8.3.1 about the presumed limited applicability of that *safeguard*.   I can go ahead and make that change. 
    >  
    > I don’t see this as limiting the scope of applicability for the value 45 itself. There has not been a view that there are issues needing remedying for local traffic (e.g. generated by WiFi devices in the network) since the priority conveyed by 45 in legacy/unmanaged networks (including WiFi and IPP) isn’t unique to 45, and the guidance on appropriate use of 45 is not inconsistent with existing guidance for the other DSCPs in that category.

    	[SM] Greg, one of the more recent RFCs of the IETF on that matter https://datatracker.ietf.org/doc/html/rfc8325 explicitly recommends under "8.2.  Security Recommendations for WLAN QoS":
    "Therefore, to mitigate such an attack, it is RECOMMENDED that all
       packets marked to Diffserv Codepoints not authorized or explicitly
       provisioned for use over the wireless network by the network
       administrator be mapped to UP 0; this recommendation applies both at
       the AP (in the downstream direction) and within the operating system
       of the wireless endpoint device (in the upstream direction)."

    I would argue that this explicitly tackles the issue you raised, but comes to a somewhat different conclusion. Personally, I consider the re-map to something harmless a much better policy than saying that we have ignored these side-effects in the past so should continue ignoring them into the future. If we recommend well-managed WiFi networks to re-map to harmless, can we at the same time still argue that DSCPs with known WiFi-priority-side-effects are a non-issue?




    > So in regards to recommendations for end-hosts on the internet, I think 45 is appropriate.  
    >  
    > I think the concern rather was around situations where a network operator could (and maybe even does) police DSCP usage today, and what recommendations should be made for managing/marking NQB traffic, particularly in cases where legacy equipment could be present.  In the residential ISP case, the ISP appears to bear some de facto responsibility to manage the DSCPs that it sends into user networks, because consumer-grade routers generally do not provide DSCP manipulation features.

    	[SM] I think we all agree on that point, good.


    >  Historically this “management” has been implemented as bleaching (AFAIK, although exceptions could certainly exist).

    > Consistent with this, the draft mandates that ISP equipment (effectively) bleach the NQB marking by default.   

    	[SM] The safe by default alternative to this active "neutering" required approach would be the reverse, where a NQB-aware ISP would actively re-map a safe-by-default DSCP value to something else if the ISP is confident that the leaf network can/should handle that (see below for alternatives to DSCP re-marking).

    > We’d like for the draft to chart a path forward where ISPs can enable NQB support for downstream traffic in their customers’ networks if they choose to.  Here, multiple options are included (though it re-reading it, they are a bit scattered in the document).  
    >  
    > In my view, the best option would be for the home router equipment to support NQB.

    	[SM] What does that entail? Do you envision something like a rate-limiter here that assures that NQB's "sparseness" requirement is policed, or what exactly would the home router need to do to make NQB supported?


    >  Fallback options include configuring the EDCA parameters as discussed, or implementing a policing function on NQB-marked traffic (details left for the ISP, but an example given). That first option and the first fallback option are mainly applicable in the case that the ISP provides the home router (though certainly an end-user wouldn’t be precluded from purchasing a router that could implement either of those options) because it would be challenging for the ISP to know whether or not customer-owned equipment supported either option. The second fallback option (while probably not perfect) could be implemented regardless of whether the ISP or the end-user provides the home router.  I think it is important that support for NQB can be offered even to end-users that choose to purchase their own router,

    	[SM] Yeah, but that essentially is already the case independent of the chosen DSCP, most home APs and routers will not touch DSCPs at all, so even in this situations applications using NQB can/will signal their intent to the rest of the network-path, which IMHO is the most important part of NQB.


    > though I realize that this is where most of the concern has been raised, and where ISPs will need to tread more carefully. 

    	[SM] So looking at IEEE 802.11u seems to imply that as part of interworking/hotspot2.0 there are methods to affect AP and client DSCP to AC mapping (called QoS mapping, see e.g. https://www.commscope.com/globalassets/digizuite/1528-1358-wp-how-interworking-works.pdf for a high-level description). With these techniques an NQB-aware ISP can simply configure APs under its control to treat DSCP decimal 5 to any desired AC (and potentially also change the EDCA parameters, but I have not looked into that). The consequence of that is IMHO obvious, participating ISPs already have the tools available to give any DSCP the desired AC treatment (for APs and stations) so why even bother to deploy something with known undesired side-effects in unaware networks like DSCP decimal 45, given that all the safety mechanisms described in the NQB draft require active intervention by a NQB-aware party along the path, so will fail if no such party exists?


    > So, to be clear, I think 45 is still applicable for endpoint applications, and it is applicable for ISPs to deliver traffic so marked into their customers’ networks as long as they deploy home network equipment that supports NQB and/or they implement one of the safeguards listed in the draft.

    	[SM] As shown above the only use-case for 45 is basically leaf networks that are not willingly participating/NQB-aware (others can simply get the desired WiFi treatment for any arbitrary DSCP value), my reading of rfc8325 seems to imply that in such situations we should not use DSCPs with known side effects.

    > Admittedly, my mindset is fairly entrenched in the residential ISP use-case, so I might be missing concerns that apply to other use-cases, but let me know if you think there are gaps that still need to be filled.   

    	[SM] I would argue that the current recommendations might work OK in the case of an NQB-aware residential ISP, but it will be considerably less self-contained in what I consider to be the more likely/relevant case of NQB-unaware leaf networks (at least initially essentially all leaf networks will be NQB-unaware). And as I implied for some time WiFI standards already have all the tools (for over a decade) that allow to combine both giving NQB-aware WiFi networks a way to give NQB the desired special treatment as well as keeping NQB side-effect free in NQB-unaware WiFi networks. Could you please take the time to explain, why these standards are not applicable for NQB's use-case?


    Regards
    	Sebastian

    P.S.: @Jerome, if I misrepresented what 802.11u allows or if that approach (while apparently standard-conform) is impractical for different reasons, I would appreciate if you could set the record straight on these technical details. 



    >  
    > Greg
    >  
    >  
    > From: David Black <David.Black@dell.com>
    > Date: Monday, February 7, 2022 at 7:49 AM
    > To: Greg White <g.white@CableLabs.com>, "tsvwg@ietf.org" <tsvwg@ietf.org>
    > Cc: David Black <David.Black@dell.com>
    > Subject: RE: [tsvwg] NQB: Use of DSCP 45
    >  
    > Hi Greg,
    >  
    > Sorry for the delayed response – somehow this NQB topic got classified into a very-high-latency queue … yes … that was a lousy joke of an excuse ;-) … snarky ripostes, dead cats, and rotten tomatoes should be sent to /dev/null, please.
    >  
    > Seriously, I think this sentence on WiFi AP EDCA parameters from your response is a good point of focus towards finding a way forward:
    >  
    > > [GW] I agree that most consumer-purchased Wi-Fi APs do not expose interfaces for this (and even if they did,
    > > not many users are likely to read the draft/RFC and change their configuration).  So, this recommendation is
    > > primarily for network operators (i.e. ISPs) that provide a Wi-Fi gateway to their customers, and thus could
    > > specify that this setting be used by default and/or that an appropriate management interface be provided.
    >  
    > Please revise Section 8.3.1 of the draft to explicitly state this limited scope of applicability of DSCP 45, i.e., it only applies to operators who choose to configure an NQB service in operator-controlled and managed WiFi equipment.
    >  
    > I think that scope of applicability has a couple of consequences:
    > ·         It may well make the EDCA configuration recommendation viable within that limited scope of applicability.
    > ·         It raises concerns about whether the entire Internet ought to use DSCP 45 to indicate NQB at endpoints, when that DSCP has a limited scope of applicability.
    >  
    > Thanks, --David
    >  
    > From: Greg White <g.white@CableLabs.com> 
    > Sent: Monday, January 10, 2022 7:51 PM
    > To: Black, David; tsvwg@ietf.org
    > Subject: Re: [tsvwg] NQB: Use of DSCP 45
    >  
    > [EXTERNAL EMAIL] 
    > 
    > Hi David,
    >  
    > Responding to points 2 & 3 below.
    >  
    > -Greg
    >  
    >  
    > From: tsvwg <tsvwg-bounces@ietf.org> on behalf of David Black <David.Black@dell.com>
    > Date: Tuesday, January 4, 2022 at 9:15 AM
    > To: "tsvwg@ietf.org" <tsvwg@ietf.org>
    > Subject: [tsvwg] NQB: Use of DSCP 45
    >  
    > In catching up on emails, I've reviewed the discussion of NQB usage of DSCP 45 (0x2D), mostly between Greg and Sebastian.  Writing as draft shepherd, I think that there are several issues in that discussion that deserve broader WG attention, one of which I think I understand and two that I definitely do not fully understand.
    >  
    > [1] Use of DSCP 45 (0x2D) for NQB at network interconnections (the one that I understand).
    >  
    > There are a number of things that could go wrong if DSCP 45 is used for NQB traffic at network interconnections because DSCP 45 results in better forwarding treatment than DSCP 0 for Default (best effort) traffic in many networks.
    >  
    > The draft currently says that DSCP 45 SHOULD NOT be used at network interconnects via SHOULD requirements to remap it to DSCP 5.  I don't think that's sufficient, and hence suggest strengthening that text based on the Diffserv Architecture (RFC 2475):
    > ·         Define DSCP 45 for NQB as a "local use" codepoint, based on the definition of "local use" in RFC 2474 and RFC 2475.
    > ·         Explicitly prohibit use of DSCP 45 at network interconnects unless that usage is explicitly documented in the TCA (Traffic Conditioning Agreement, see RFC 2475) for that interconnection.
    > o   The change here would be from the current "SHOULD remap for interconnection" to "MUST NOT use for interconnection unless explicitly allowed by the TCA for that interconnection."
    > This would also help clarify the IANA considerations for NQB DSCPs– DSCP 5 would be the single default DSCP for NQB, with a note added to the IANA registry that DSCP 45 is available for local use under the conditions specified in the NQB PHB RFC.
    >  
    > Overall, I don't think this proposed approach departs significantly from the intended usage (mostly non-usage) of DSCP 45 for network interconnection, and I think it results in significantly clearer text in both the draft and the IANA registry.
    >  
    > [2] Interaction of DSCP 45 with standards-compliant vs. legacy WiFi equipment.
    >  
    > The crucial rationale for use of DSCP 45 for NQB is this sentence in Section 8.3.1 of the NQB draft:
    >  
    >    In order to increase the likelihood that NQB traffic is provided a
    >    separate queue from QB traffic in existing WiFi equipment that uses
    >    the default mapping, the 45 code point is recommended for NQB. 
    >  
    > I don't understand the long-term intent here.  Is it that DSCP 45 will be used for WiFi for the foreseeable future or that DSCP 45 will be supplanted by DSCP 5 as WiFi gear gets upgraded?  If the latter, there are a plethora of problems in figuring out whether or not the WiFi gear is upgraded or not.  What's the intent here?
    >  
    > [GW] The intent is that endpoints would use DSCP 45 for the foreseeable future. I agree that the other alternative you mention would be problematic.
    >  
    > On a related note, I agree with Sebastian that this paragraph in Section 8.3.1 is unrealistic:
    >  
    >    Furthermore, in their default configuration, existing WiFi devices
    >    utilize EDCA parameters that result in statistical prioritization of
    >    the "Video" Access Category above the "Best Effort" Access Category.
    >    If left unchanged, this would violate the NQB PHB requirement for
    >    equal prioritization, and could erode the principle of alignment of
    >    incentives.  In order to preserve the incentives principle for NQB,
    >    WiFi systems SHOULD configure the EDCA parameters for the Video
    >    Access Category to match those of the Best Effort Access Category.
    >  
    > I'm not even sure that IETF ought to be standardizing requirements on WiFi EDCA parameters, as those would seem to be for IEEE 802 to prescribe, not IETF.
    >  
    > [GW] This is recommending a configuration, rather than standardizing requirements on equipment.  Would it read better as: “… WiFi systems SHOULD be configured such that the EDCA parameters ….”?  Or, otherwise written as guidance?
    >  
    > FWIW, I have a worked example of that paragraph being unrealistic, as I recently bought a couple of basic WiFi APs off of eBay to solve some local problems (e.g., wife's tablet was not reliably connecting to WiFi from the other end of the house), and those APs don't have a consumer-accessible interface for configuring EDCA parameters.
    >  
    > [GW] I agree that most consumer-purchased Wi-Fi APs do not expose interfaces for this (and even if they did, not many users are likely to read the draft/RFC and change their configuration).  So, this recommendation is primarily for network operators (i.e. ISPs) that provide a Wi-Fi gateway to their customers, and thus could specify that this setting be used by default and/or that an appropriate management interface be provided. It is one of several options that are intended to minimize any incentive for a QB application to mark itself NQB. Note that there are two concerns that we’ve been trying to address here. One is the incentives aspect (where it’s likely that the solution doesn’t need to see 100% deployment to be effective, but the closer the better) and the other is the potential for starvation of QB traffic if uncontrolled amounts of NQB traffic is given higher priority than default.
    >  
    > As has been discussed, for Wi-Fi, both of these concerns are essentially moot in the upstream direction, since there are 31 other codepoints that an application could choose from that today would provide them higher priority than default without the possibility of being subjected to Traffic Protection, and furthermore the recommendations on usage of NQB are not inconsistent with recommendations for other DSCPs that map to these higher priorities.  So, the realistic concern is downstream, where an ISP is wishing to provide NQB isolation in their customers’ LANs (if they are not wishing to do so, they can leave the DSCP as 5, or bleach it to 0, one or the other of which seem also to be highly likely possibilities for an ISP that is unaware of the existence of NQB).  If such an ISP can set the EDCA parameters of their managed Wi-Fi APs, then problem solved in that case.   If they can’t – for whatever reason – then the other remedies discussed in 4.3.1 apply.  This solution isn’t perfect. For example, if a user purchases their own WiFi AP that fully supports the NQB functionality, then how is the ISP to know that they can turn off bleaching or throttling for that customer?  But, the choice of 45 at least allows users of customer-owned APs to achieve isolation of NQB traffic from the majority of QB traffic in the upstream direction.
    >  
    > I suspect that the above 8.3.1 paragraph needs to be bit-bucketed, but I don't understand what to do about WiFi and DSCP 45 in general.
    >  
    > [GW] I disagree for the reasons stated above.
    >  
    >  
    > [3] End-system use of DSCP 45
    >  
    > Section 4.1 of the draft says:
    >  
    >    Applications that align with the description of NQB behavior in the
    >    preceding paragraphs SHOULD identify themselves to the network using
    >    a Diffserv Code Point (DSCP) of 45 (decimal) so that their packets
    >    can be queued separately from QB flows.
    >  
    > That strikes me as just plain wrong, as it inflicts DSCP 45 on non-WiFi gear.
    >  
    > [GW] What’s so wrong with that?  If it NQB-aware gear, then great!   If it is NQB-unaware DiffServ gear then it would treat 45 as an unknown DSCP and give it the default PHB.  If it is IP Precedence gear, then all of the arguments above for upstream traffic over WiFi apply.  
    >  
    >  
    > OTOH, I don't know what to do here, as this sort of simple guidance (always do <X>) is crucial to get application developers to use this sort of new functionality.
    >  
    > [GW] Simple, consistent guidance is key.  As is no regressions in performance.  Several of the existing applications that are NQB-compatible already mark their traffic as CS5 or EF.  Given the text of the draft currently, they can choose to migrate to NQB if they wish.  On existing Wi-Fi or IPP networks, there would be no change in performance.  On upgraded WiFi networks, they would give up EDCA priority in exchange for an isolated and protected queue (there could be regressions in some situations, but benefits in others). On upgraded BE networks (i.e. support for BE and NQB) they would gain isolation and protection.
    >  
    >  
    > Thanks, --David
    >  
    > David L. Black, Sr. Distinguished Engineer, Technology & Standards
    > Infrastructure Solutions Group, Dell Technologies
    > mobile +1 978-394-7754 David.Black@dell.com