Re: [tsvwg] Implementation and experimentation of TCP Prague/L4S hackaton at IETF104

Greg White <g.white@CableLabs.com> Tue, 19 March 2019 18:02 UTC

Return-Path: <g.white@CableLabs.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E8C7F1312F5 for <tsvwg@ietfa.amsl.com>; Tue, 19 Mar 2019 11:02:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cablelabs.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X21YbA9dfIZR for <tsvwg@ietfa.amsl.com>; Tue, 19 Mar 2019 11:02:53 -0700 (PDT)
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (mail-eopbgr760102.outbound.protection.outlook.com [40.107.76.102]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1258D13111F for <tsvwg@ietf.org>; Tue, 19 Mar 2019 11:02:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cablelabs.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2sRL5NqNbhrpK2iY1TfxbA9QMSf9xmsPrAaOkaKsbrM=; b=oKN+J/81zMdNMutSdLg6WytkYffABmI7B18jq/9BDkGiI1/RNuTPKpXTDfa0Qt+8xJwT05F/wVN/15+x8mUJ1euK1YlXZldvHVtms40uH7tIlo8cvqFhcTAd14R02phUzVkFOfFXWRpM6fxsUBBQPtKZBZSEXqk4juBWqMOKcnw=
Received: from SN6PR06MB4655.namprd06.prod.outlook.com (52.135.117.85) by SN6PR06MB6397.namprd06.prod.outlook.com (20.177.254.204) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1709.13; Tue, 19 Mar 2019 18:02:50 +0000
Received: from SN6PR06MB4655.namprd06.prod.outlook.com ([fe80::75ce:14bc:e5e2:573c]) by SN6PR06MB4655.namprd06.prod.outlook.com ([fe80::75ce:14bc:e5e2:573c%5]) with mapi id 15.20.1709.015; Tue, 19 Mar 2019 18:02:49 +0000
From: Greg White <g.white@CableLabs.com>
To: Jonathan Morton <chromatix99@gmail.com>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: [tsvwg] Implementation and experimentation of TCP Prague/L4S hackaton at IETF104
Thread-Index: AQHU3n33yRMFZ0euOECPynlWQJNlKQ==
Date: Tue, 19 Mar 2019 18:02:49 +0000
Message-ID: <F8E7FAC5-D91F-4DC4-8FBF-BE14B89C1B59@cablelabs.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.14.0.181208
authentication-results: spf=none (sender IP is ) smtp.mailfrom=g.white@CableLabs.com;
x-originating-ip: [2620:0:2b10:23:d1ea:7740:a3e2:fc3f]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 9d326413-2133-42d7-e09f-08d6ac9519a6
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600127)(711020)(4605104)(2017052603328)(7153060)(7193020); SRVR:SN6PR06MB6397;
x-ms-traffictypediagnostic: SN6PR06MB6397:
x-ms-exchange-purlcount: 1
x-microsoft-antispam-prvs: <SN6PR06MB6397F098AE34A3434D904A60EE400@SN6PR06MB6397.namprd06.prod.outlook.com>
x-forefront-prvs: 0981815F2F
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(376002)(396003)(366004)(346002)(39850400004)(136003)(199004)(189003)(2616005)(6436002)(478600001)(6486002)(229853002)(6506007)(97736004)(186003)(53546011)(25786009)(33656002)(102836004)(316002)(53936002)(71200400001)(6306002)(476003)(99286004)(6246003)(82746002)(966005)(6512007)(71190400001)(14454004)(58126008)(14444005)(6116002)(256004)(2906002)(486006)(46003)(110136005)(81156014)(5660300002)(68736007)(106356001)(7736002)(36756003)(86362001)(8936002)(66574012)(305945005)(8676002)(2501003)(105586002)(83716004)(81166006)(85282002); DIR:OUT; SFP:1102; SCL:1; SRVR:SN6PR06MB6397; H:SN6PR06MB4655.namprd06.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: CableLabs.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: Mqv3dFoTc5++ONW71D73mxowNTFyUqF7PyKIfjKJIdi7O9sr9Fx4ZMzb/KvLIntPiuF3SM5UhAQ6qL/MFaFNS0cY/so3v3ITvRNnqO3TC+ScF/XIyUhuMGa8gEoeokD+Zpg5EW2/ziq/Qu2npmoBGsICxVPTadAWNH4bk0HFtHLFKEUSvx2Y2oni9EWT9kqwLJ39Sn9itJXpbLy8A8byDqz+5Lkrr0TxcVSunSPp6ArSiBWQ8YRFohD1MkOjWx6i+/TYXIrjn9sbuIZtZXnY3DkyXYmTVm2ccN35LjWvlhvqAQ59Jb0PlHVmdJEvFqa7QKYSHiZ7+GGxw/1zdPRWR32OixEi5YHJbUURwgIHY0duNFPZDe2BKGL171U7+WEqDRQwDGBGhv5z2YqNUR+ysT0QXkVxllByS4DoCEn9P80=
Content-Type: text/plain; charset="utf-8"
Content-ID: <FB5E7EC10F56574BBC8D24E453DCEB42@namprd06.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: cablelabs.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9d326413-2133-42d7-e09f-08d6ac9519a6
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Mar 2019 18:02:49.8974 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: ce4fbcd1-1d81-4af0-ad0b-2998c441e160
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR06MB6397
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/gIzkoG3gsUjjkKN40yrxdYDcqsc>
Subject: Re: [tsvwg] Implementation and experimentation of TCP Prague/L4S hackaton at IETF104
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Mar 2019 18:02:57 -0000

On 3/19/19, 3:07 AM, "tsvwg on behalf of Jonathan Morton" <tsvwg-bounces@ietf.org on behalf of chromatix99@gmail.com> wrote:    
    > On 19 Mar, 2019, at 7:52 am, Greg White <g.white@CableLabs.com> wrote:
    > L4S utilizes TCP Prague, which falls back to traditional congestion control if the bottleneck link doesn't provide isolation.  
    
    You see, this is the part I find difficult to believe that it will operate reliably.  For a start, I have seen no detailed public description of TCP Prague, even though it has supposedly been in "open" development for so long.  My most recent information is that it's essentially a slightly modified DCTCP.
    
    I did find this, which reads like a requirements spec rather than a working algorithm:
    
    " It would take time for endpoints to distinguish classic and L4S ECN
      marking.  An increase in queuing delay or in delay variation would be
      a tell-tale sign, but it is not yet clear where a line would be drawn
      between the two behaviours.  "

[GW] Yes, you've found the public description of the requirements for an L4S TCP (Appendix A of https://datatracker.ietf.org/doc/draft-ietf-tsvwg-ecn-l4s-id).  I think Bob is giving an update on the implementation status at NetDev this week.  But, in any case, this is only a concern on single-queue bottleneck links that implement an AQM with classic ECN marking.   I am aware of fq_codel/cake deployments that support classic ECN (which would not cause a starvation issue), but I'm not aware of others.
    
    
    SCE explicitly does not rely on specific changes in behaviour by endpoints.  It just provides a conduit of information from the network to the receiver, in addition to standard ECN behaviour.  The receiver is free to ignore that information, without harming the network, and will naturally behave normally and safely when that information is absent.  We have a proof-of-concept implementation (a trivial mod of sch_codel and sch_fq_codel) which successfully passes this information across the Internet and works with (is transparently ignored by) existing endpoints and middleboxes.
    
    In short, SCE is incrementally deployable by design.

[GW] The main problem with SCE is that it only provides a benefit when the bottleneck link supports fq.  That is a show-stopper for millions of bottleneck links around the world.   L4S on the other hand, can be very easily implemented in fq, but also it can be implemented in a dual-queue device.  So, from my viewpoint L4S is far more incrementally deployable than SCE.

    
    The broader system of feedback and modified congestion control, which I call ELR (Explicit Load Regulation) as an umbrella term, offers benefits which, yes, have not yet been proved - but which are straightforward in concept and should be amenable to analysis.  It seems likely that some work from L4S can be used in this context.
    
    - Jonathan Morton