Re: [tsvwg] Neal Cardwell's rationale for supporting ECT(1) as an input/L4S signal

"Holland, Jake" <jholland@akamai.com> Fri, 08 May 2020 22:02 UTC

Return-Path: <jholland@akamai.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F15253A0FA5 for <tsvwg@ietfa.amsl.com>; Fri, 8 May 2020 15:02:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=akamai.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G0dm_Dt06j9R for <tsvwg@ietfa.amsl.com>; Fri, 8 May 2020 15:02:26 -0700 (PDT)
Received: from mx0a-00190b01.pphosted.com (mx0a-00190b01.pphosted.com [IPv6:2620:100:9001:583::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AB84B3A0FA4 for <tsvwg@ietf.org>; Fri, 8 May 2020 15:02:26 -0700 (PDT)
Received: from pps.filterd (m0122333.ppops.net [127.0.0.1]) by mx0a-00190b01.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 048M2DKp016849; Fri, 8 May 2020 23:02:25 +0100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; h=from : to : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=jan2016.eng; bh=NfpBjz0cTaWkFvrrq84yPERlt/h2mLuOjejQpZTyqik=; b=ammxMI7l3tY12vGOleUy+BnInUnyVodtlVE0R0vrpe2rRJFeTNiaGms1tOVNIX4HarsQ HTWDXEoYSH14XvEg6mjRXf4Cr18F+nZeukNAlkzKiRn8KtjTGHgwoo3tVYQCZ/ITRnhn 8HgBvS/xKq4YBpEgtywmE7vC2H9TrX2pE2jonKer66x3yyWB20SzJU+SW0EKPGet/fEj E3afFIkgeDEVNvoOPl8OARWWeGD+hAsQ34UcNMXIVj7v2RTn488HcrFvEVI8x7qrhCTW Eg5vXEM2O9ytf7hrOhRvKcgHLqh+1RQu/Zpm0tNj6rbRZzDYhI68Pix36uLHA2ldsMbU mg==
Received: from prod-mail-ppoint8 (a72-247-45-34.deploy.static.akamaitechnologies.com [72.247.45.34] (may be forged)) by mx0a-00190b01.pphosted.com with ESMTP id 30vtf8njf5-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 08 May 2020 23:02:25 +0100
Received: from pps.filterd (prod-mail-ppoint8.akamai.com [127.0.0.1]) by prod-mail-ppoint8.akamai.com (8.16.0.27/8.16.0.27) with SMTP id 048LW1Bi030166; Fri, 8 May 2020 18:02:24 -0400
Received: from email.msg.corp.akamai.com ([172.27.123.57]) by prod-mail-ppoint8.akamai.com with ESMTP id 30wc55hph4-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Fri, 08 May 2020 18:02:23 -0400
Received: from usma1ex-dag1mb6.msg.corp.akamai.com (172.27.123.65) by usma1ex-dag1mb1.msg.corp.akamai.com (172.27.123.101) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Fri, 8 May 2020 18:02:22 -0400
Received: from usma1ex-dag1mb6.msg.corp.akamai.com ([172.27.123.65]) by usma1ex-dag1mb6.msg.corp.akamai.com ([172.27.123.65]) with mapi id 15.00.1497.006; Fri, 8 May 2020 18:02:22 -0400
From: "Holland, Jake" <jholland@akamai.com>
To: Neal Cardwell <ncardwell=40google.com@dmarc.ietf.org>, tsvwg IETF list <tsvwg@ietf.org>
Thread-Topic: [tsvwg] Neal Cardwell's rationale for supporting ECT(1) as an input/L4S signal
Thread-Index: AQHWJUxIcCajnIV5gk+TOCWCdAWIaqiei86A
Date: Fri, 08 May 2020 22:02:22 +0000
Message-ID: <A4B43F47-9050-403D-B739-BF12C8F873EB@akamai.com>
References: <CADVnQy=7f79Mj_GQBU-UsodTRORjB2U6rCPPQ+1Zck_gxr-rww@mail.gmail.com>
In-Reply-To: <CADVnQy=7f79Mj_GQBU-UsodTRORjB2U6rCPPQ+1Zck_gxr-rww@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.36.20041300
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [172.19.89.130]
Content-Type: text/plain; charset="utf-8"
Content-ID: <1DC9905AD2E1234D8A3B22BE999B951F@akamai.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.216, 18.0.676 definitions=2020-05-08_19:2020-05-08, 2020-05-08 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-2002250000 definitions=main-2005080183
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.216, 18.0.676 definitions=2020-05-08_19:2020-05-08, 2020-05-08 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 clxscore=1011 impostorscore=0 suspectscore=0 lowpriorityscore=0 priorityscore=1501 malwarescore=0 bulkscore=0 phishscore=0 mlxlogscore=999 mlxscore=0 adultscore=0 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2003020000 definitions=main-2005080187
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/fj2fkWzATX94623pWnXw1L4ikPA>
Subject: Re: [tsvwg] Neal Cardwell's rationale for supporting ECT(1) as an input/L4S signal
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 May 2020 22:02:29 -0000

Hi Neal,

Thanks for posting this, it’s a helpful explanation.

A couple of points I wanted to respond to:

From: Neal Cardwell <ncardwell=40google.com@dmarc.ietf.org>
> - Much of the installed base of switch hardware around the world can already be configured to signal shallow-threshold congestion with DCTCP/L4S-style CE marks. Many have CE-marking mechanisms baked into hardware, and would need to be replaced in order to deploy SCE.

I wanted to check to make sure I understand:
To what extent do you think it's an L4S goal to accommodate the
existing installed base of switch hardware that’s currently in use
for DCTCP in datacenters?

I thought the existing deployments generally wouldn’t be compliant
L4S-compatible dualq devices suitable for general internet traffic
anyway, and would continue to need traffic isolation the way they do
now.  Is that different from your understanding?

> - More generally, if there is any problem discovered with the L4S experiment, either the algorithm or particular implementations, bottlenecks can easily identify L4S traffic and bleach it into Not-ECT, and treat it like Reno/CUBIC traffic.

To repeat in what's maybe a better thread for it:

I agree that bleaching is an option where there’s RFC 3168 trouble,
that’s a good point and thanks for mentioning it.

I’d consider it a poor choice to land there if there's other options,
because it works against the success of existing or under-way
deployments of RFC 3168 queues by imposing a new bleaching requirement
that may not be trivial for all networks with marking queues

It would also be an unfortunate choice to endorse bleaching because it
would lose much of the potential value in the code point, as David
recently mentioned.

But I do agree it would work, and that it’s a worthwhile mitigation
that should be mentioned in the L4S docs if we end up not finding a
way to support robust 3168 compatibility.

> - Encapsulation/decapsulation is a widely prevalent and important technology today in production networks. With the installed base of encap/decap mechanisms, it is likely that for many implementations any SCE marking applied to packets would just get stripped off with the outer header when decapsulated.

I'd be interested in more information about this.  Is there anything
publicly known about the deployment footprint of different tunnel
implementations in the places likely to deploy L4S dualqs, and
whether they're managed by the same entities who control the queues?

I'm not sure it changes my position much, but it seems at least
useful to know how big a lift it would be to do a tunnel
decapsulation change, if that's a necessary piece of a safe
approach to L4S that can achieve low latency effectively.

(I know Bob gave a long list of tunneling protocols not long ago, but
it seems like only some of them are likely to be relevant to the L4S
question, and probably only in a reasonably specific set of
implementations for at least the early stages...)

Thanks and regards,
Jake