Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)

"De Schepper, Koen (Nokia - BE/Antwerp)" <koen.de_schepper@nokia-bell-labs.com> Fri, 26 March 2021 17:34 UTC

Return-Path: <koen.de_schepper@nokia-bell-labs.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3A9F63A236B for <tsvwg@ietfa.amsl.com>; Fri, 26 Mar 2021 10:34:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.852
X-Spam-Level:
X-Spam-Status: No, score=-2.852 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.251, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zj24qyeFLTen for <tsvwg@ietfa.amsl.com>; Fri, 26 Mar 2021 10:34:39 -0700 (PDT)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2118.outbound.protection.outlook.com [40.107.20.118]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 07CC63A23DF for <tsvwg@ietf.org>; Fri, 26 Mar 2021 10:34:37 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=THgKQyZ6Rn3rI1WqEYzus66qs8EKwviuXJa3UocL2T9f16nZRheUa3CBSG+n1PV9+mxRYihRNT2uWggypR9rJDiL/1DXtsHGthqosrmbJ/kUendnrQ2XbUJFfTDFDm7y52B3y/+eq1aFBzYMZn/gKtkknU2CEs4mkiaEuEaTWF2faQVcs1K8Bo9BxJGLO1jAqREay4blYWB8x6L9tyyCdraX1Is9UXsTZZ4/a1dt8aspxiar0Lmk8cBOaW9doPMUK1bE755tFQ7B2vL3lyT300Ff9bFI9jbgL5xWfmQ8bGtjxG2V8NA9aO9bK3CNMdIvjbaKt2Fjigy+tHbEMcEvXg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=t+U5kfe/fMg4yE/PA/rUpQP3AiHOdLyi8sftOwe2wI8=; b=XuM4KG+dJa1c+YgNUgP9hB9snvbxm621jXkKQAskq1L7LCJA4bD/XjzEAJlAMEqwYA5P6oEkgZAS8gsOaVT1tEXre8yqAZDHLTSanuM66kTR82QZzyFo0MUIoX3hmNHLltl6LAI//CMigVxWuUA+YCloqwtJ3k+TWDQBtOIZTFjbvLi4Ag60Gs28E8VGGVhIkauf2FrXzkbmJl+krvvLBMW9QbYCvCIr4BJwEfctVBZTHrtKxQkIZj1lWTChvrpVzVxdIUhZHjIbe5Ut2wsfKbkffV3DEiyMm95zOvAokZnGQ6EDZCdwuHhRCFBKn3hxlEAuP45SGEaCRRCx4ro0xA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia-bell-labs.com; dmarc=pass action=none header.from=nokia-bell-labs.com; dkim=pass header.d=nokia-bell-labs.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=t+U5kfe/fMg4yE/PA/rUpQP3AiHOdLyi8sftOwe2wI8=; b=rXvVsdJ3m6HI5291JNdsIa+Nvcy+Sg/VT3JWi6mdJJuf7pCsRWKT8GVaBbKMmKQ/CfGLoSl16WgsF9HpHJ20vMMD57si0W9VHAAzyxq8wAz6gVlFS+eqxG5eM7vNqFrcdG4V5HKufNPpcs/PkdfOJ2nWWBOKZILawXp1nLNq1JA=
Received: from AM8PR07MB7476.eurprd07.prod.outlook.com (2603:10a6:20b:24e::12) by AM4PR0701MB2148.eurprd07.prod.outlook.com (2603:10a6:200:48::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3999.17; Fri, 26 Mar 2021 17:34:34 +0000
Received: from AM8PR07MB7476.eurprd07.prod.outlook.com ([fe80::219a:cbf4:dec3:ac9]) by AM8PR07MB7476.eurprd07.prod.outlook.com ([fe80::219a:cbf4:dec3:ac9%7]) with mapi id 15.20.3977.025; Fri, 26 Mar 2021 17:34:34 +0000
From: "De Schepper, Koen (Nokia - BE/Antwerp)" <koen.de_schepper@nokia-bell-labs.com>
To: Sebastian Moeller <moeller0@gmx.de>
CC: Jonathan Morton <chromatix99@gmail.com>, Bob Briscoe <in@bobbriscoe.net>, "tsvwg@ietf.org" <tsvwg@ietf.org>
Thread-Topic: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)
Thread-Index: AdcfUdg330SgU1t/Rc2OwNBrVFfTigBqJnwAAAB6MQAAGe1RMAAsswKAAAMS/MAABOnBgAAAo0SQAAH8eoAABwyJ8A==
Date: Fri, 26 Mar 2021 17:34:34 +0000
Message-ID: <AM8PR07MB747613F8333DE25A81C68692B9619@AM8PR07MB7476.eurprd07.prod.outlook.com>
References: <MN2PR19MB404527384A1B1DD9CFC2A3D983659@MN2PR19MB4045.namprd19.prod.outlook.com> <6f0ac4bf-bd1a-65cd-1d40-a97d4aa71aab@bobbriscoe.net> <7B4426F9-E1C5-4F88-A264-0D54C809D523@gmail.com> <AM8PR07MB74761AFC8F5BE0F9573DFF32B9629@AM8PR07MB7476.eurprd07.prod.outlook.com> <6481E606-2458-49D7-B580-8DF7B93494FD@gmx.de> <AM8PR07MB747675E421F0B7A6246C67BEB9619@AM8PR07MB7476.eurprd07.prod.outlook.com> <9A9D4AC3-43F0-4778-839B-E1E247A3C5FA@gmx.de> <AM8PR07MB7476026EA3AA7AD49622B296B9619@AM8PR07MB7476.eurprd07.prod.outlook.com> <7C0C3D20-250E-471F-89EC-9FF828B0BA10@gmx.de>
In-Reply-To: <7C0C3D20-250E-471F-89EC-9FF828B0BA10@gmx.de>
Accept-Language: nl-BE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: gmx.de; dkim=none (message not signed) header.d=none; gmx.de; dmarc=none action=none header.from=nokia-bell-labs.com;
x-originating-ip: [2a02:1810:1e00:cb00:210b:63c2:20dd:546d]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 3dc030a3-d875-4117-03cc-08d8f07d6be3
x-ms-traffictypediagnostic: AM4PR0701MB2148:
x-microsoft-antispam-prvs: <AM4PR0701MB2148EAEDDC0019A912C0E8E9B9619@AM4PR0701MB2148.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM8PR07MB7476.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(136003)(396003)(366004)(376002)(39860400002)(346002)(64756008)(55016002)(66556008)(76116006)(8936002)(66446008)(83380400001)(8676002)(66476007)(30864003)(71200400001)(66946007)(9686003)(316002)(54906003)(86362001)(53546011)(6506007)(52536014)(4326008)(478600001)(5660300002)(966005)(7696005)(38100700001)(66574015)(33656002)(6916009)(186003)(2906002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: nokia-bell-labs.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM8PR07MB7476.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3dc030a3-d875-4117-03cc-08d8f07d6be3
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Mar 2021 17:34:34.3676 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 4viEL6QA2O8nrdTaRuLqhKVtEAq/4zgxZ3jjl/MULiorEyI6klfj/Vz4rWwa3djGfrdkSVuzZpYfX5ADQ+1dgQ0CY/XEUhzkg7JcP7tVFfQojMkcLfABn09L55D6iWiW
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR0701MB2148
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/gZN5BgrCbt7w5V0q2Hc3JjSm7Ps>
Subject: Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Mar 2021 17:34:49 -0000

Hi Sebastian,

To be clear: I assume (didn't bother to dive into the details) your proposal works for the purpose of what you intend to do: block L4S everywhere except for the paths that are explicitly allowing it. 

My first point is that requiring to set a DiffServ codepoint alone would already support that.

Second clarification on your quote: 
>> "Also I do not accept for one minute that you are actually willing to entertain this as a real option."
I don't have any objections to the added value that SCE would bring. I'm a fan of it 😊. For me this is not a religious war against SCE!!! Unfortunately SCE would also need a DiffServ (or other) L4S-ID to make it work in all cases. My proposal (which Jonathan acked by the way) was to combine it in that case. "IF" DiffServ is seriously considered to not being a show stopper we should use SCE as congestion mark and DiffServ as L4S-ID. I'm also in favor for the best technical solution, but it needs to have a realistic deployment chance...

Then the second point I tried to make is that I think DiffServ will largely block the deployment of L4S and/or SCE from the start. I know we could see this as a feature (like you do, I still assume well intended), but I think it will be its destruction/decline from the start. My fear is that this will cause the interest of investing in L4S/SCE from end-systems to drop to zero. Would you buy a car, if you would not be permitted to drive it from your driveway?

And why? Because there might be some classic ECN single Q bottlenecks that might get congested long enough by L4S flows and cause noticeable rate reductions for ECT(0) users? I don't know what your Internet experience is, but this is my everyday's reality, definitely working remotely from home now. To extend the analogy: would you leave your car on the driveway not using it, because you know there is a chance that you might hurt, even kill some innocent bystander by accident?

I wonder if there is some (accessible) L4S network support out there, who would want to use ECT(0) still? There is much more to win with L4S than with classic ECN.

Koen.


-----Original Message-----
From: Sebastian Moeller <moeller0@gmx.de> 
Sent: Friday, March 26, 2021 2:10 PM
To: De Schepper, Koen (Nokia - BE/Antwerp) <koen.de_schepper@nokia-bell-labs.com>
Cc: Jonathan Morton <chromatix99@gmail.com>; Bob Briscoe <in@bobbriscoe.net>; tsvwg@ietf.org
Subject: Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)

Hi Koen,


> On Mar 26, 2021, at 13:30, De Schepper, Koen (Nokia - BE/Antwerp) <koen.de_schepper@nokia-bell-labs.com> wrote:
> 
> Hi Sebastian,
> 
> I understood the goal of your proposal.

	[SM] Then why did you not actually address it? I am confused.



> But before diving into the details of a DiffServ-based proposals, I'm taking a step back asking: Is using DiffServ an option at all. I don't believe so (see other reply to Steve's mail related to the reason for deployment).

	[SM] Well, then you failed, because none of your abstract theoretical objections actually fit my proposal, you are free to slay any strawmen you like, but that does not show why my simple proposal would be unworkable. I tried to address yours and Bob's objections and think I showed why these, in the context of a guard DSCP are sufficientky met tp at east merit a discussion of the proposal. Sure, this proposal has been declared "crazy" by some, but if you feel the same than show my where and why, please.

> 
> As a second step after this, "IF" using DiffServ is an option,

	[SM] Sorry, this is trying to use a general challenge with Diffserv in a context where it does not apply. The core idea of my proposal is, the guard DSCPs will not escape participating networks, so the fact that DSCPs are unlikely to be E2E (your single most important objection) simply is not a logical argument against my proposal. 


> then L4S and SCE can get married and we can benefit from both.

	[SM] Different discussion. Also I do not accept for one minute that you are actually willing to entertain this as a real option. But I understood that when proposing a guard DSCP that leaves the core L4S machinery underneath in tact. Which is of essence, given that it took you like a decade to get to this point, so I accept that you want to test the design and implementation you have, and not that you might wish you had.


> If DiffServ cannot be used,

	[SM] There is zero indication that it can not be used as a guard DSCP, if you have real objections, please bring them, the proposal needs fleshing out (or shooting down, I might have overlooked a showstopper, but DSCP not naturally being E2E is not a showstopper here).


> we have to pick one, like we did up to now and trust as a community that we together can make that work.

	[SM] What in the L4S development in this WG for the last few years, makes you believe that?


> I think the IETF needs to provide the platform for multi-party innovations, but then needs to be able to let control go and to trust the professionalism of the individual parties.

	[SM] Hard to parse, but it explains why you essentially propose RFCs without teeth (like no mandatory policing that ECT(1) flows actually behave in an L4S compatible fashion, and no reliable guarantees for sharing between flows of different RTT or traffic class). Add to this the desire to inflict the current known broke state of L4S (it neither functions as promised, nor is t safe for the rest of the internet) onto the existing internet without any robust and reliable safety mechanisms, and I really doubt that I am willing to trust your professionalism, sorry. 


So after this philosophical aside, can we maybe discuss why my proposal is unacceptable, please? 

Regards
	Sebastian


> 
> Koen.
> 
> -----Original Message-----
> From: Sebastian Moeller <moeller0@gmx.de> 
> Sent: Friday, March 26, 2021 12:55 PM
> To: De Schepper, Koen (Nokia - BE/Antwerp) <koen.de_schepper@nokia-bell-labs.com>
> Cc: Jonathan Morton <chromatix99@gmail.com>; Bob Briscoe <in@bobbriscoe.net>; tsvwg@ietf.org
> Subject: Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)
> 
> Hi Koen,
> 
> more below, prefixed [SM]. But as a preface, it seems while you addresses this mail at me, you do not actually discuss my proposal at all. Why?
> 	While I am fully sympathetic to the proposal to re-jig L4S' signaling mechanism, all I was/am proposing is a method to contain potential fall-out during an L4S experiment to those voluntarily participating in the experiment, while keeping innocent bystanders reasonably safe. 
> 	Is my proposal 100% perfect or technically elegant? Sure not, but it does not need be, the initial "mandatory" life-time of this would only cover L4S experimental phase and a PS phase only IFF it had proved itself to be functional and feasible, so the containment mechanism would need to survive the same level of evaluation and scrutiny as L4S itself.  
> 
> 
> 
>> On Mar 26, 2021, at 12:07, De Schepper, Koen (Nokia - BE/Antwerp) <koen.de_schepper@nokia-bell-labs.com> wrote:
>> 
>> Hi Sebastian,
>> 
>> The NQB codepoint is not needed to make L4S work.
> 
> 	[SM] I know, but I did not claim that (the guard DSCP is about making the L4S experiment safe, not about L4S' core functionality). My claim is, that the biggest expected immediate user of L4S saw it fit to make sure that an L4S-DSCP exists. This indicates that they do/did not share your concerns about the applicability of such a DSCP. And in actual discussion Greg seemed to indicate that he sees the fact that SLA's/TCAs might be required to guarantee safe-passage of such an L4S-DSCP as acceptable and clearly not a show-stopper.
> 
> 
>> It could be interesting within small network segments (near the access edges: home and DC, not the core) to add more traffic into the L4S Q. I don't think anyone considers it very realistic using NQB as a widely deployable E2E feature, although it would be a bonus if it would finally, and RFCs should allow it to become that. That doesn't mean it will be a fact within the next decades.
> 
> 	[SM] Mind you, you are still discussing the "make DSCPs an integral part of L4S signaling" proposal. For my proposal of using a guard DSCP for the duration of the L4S experiment, your arguments do simply not hold. Not propagating by default E2E is part of what makes a guard DSCP actually helpful to contain an L4S experiment to participating networks. Also, the one use case where L4S is going to work for reasonably well, is short-RTT, low-hop count "fast-lanes", say, between eyeballs and content providers, a situation that typically involves a sufficient low number of AS/networks/actors to make the "negotioate DSCP-passage per contract" approach feasible.
> 
> 
>> 
>> I don't think your proposal is very simple,
> 
> 	[SM] Well, the problem is complex, so any solution will have to have some complexity in itself, but conceptually my proposal is rather small; I do not claim that implementing it might not take work and effort though.
> 
>> and has quite some impact on all parts of the architecture.
> 
> 	[SM] I disagree, adding configuration options that are required to be active for the experiment, will allow to require/allow to change these to inactive for full standards deployment. The impact would be to add these features/capabilities for the duration of the experiment sure. IMHO adding these sounds preferable than not running an experiment at all... As David indicated, with a safety proposal similar to my rough idea, the L4S experiment could have probably been started years ago, so is not changing the implementation really worth years of wall clock waiting time?
> 
> 
>> If DiffServ would be in the picture, I see the DiffServ-input and ECN-output as the only simple straightforward solution.
> 
> 	[SM] I agree that this sounds like a better design, than what L4S proposed right now, in regards to safety-by-design, but I maintain, that even my more modest guard-DSCP proposal might unlock the path to experimentation sooner. I would be delighted, if during experimentation such an "DiffServ-input and ECN-output" alternative would also be tested.
> 
>> It removes the disadvantages of both while keeping the advantages of both. This was always my understanding, and I don't see any reason why this has changed. Let's keep things to the point.
> 
> 	[SM] Well, that is not my point, so if you will. I keep sticking to my point. If you want to deploy L4S signaling as currently designed and implemented for experimentation in live production networks soon, put L4S under the containment of a guarding DSCP would be a great way to convince me of the safety of doing so. And I assume that I am not alone in this.
> 
>> 
>> Would you want SCE only to work if it has the right DiffServ codepoint on it? SCE would also need the DiffServ codepoint to protect SCE from non-SCE traffic. Even when using FQ, tunneled SCE gets trampled over by non-SCE traffic.
> 
> 	[SM] I defer to Jonathan's point regarding fitting SCE-style ECT(1) output signaling into L4S. This is orthogonal to the issue of how to make experiments with existing L4S design and implementation safe.
> 
>> 
>> Again, the only question is, who wants to deploy a feature that relies on a DiffServ codepoint that needs end to end path support??? 
> 
> 	[SM] According to the NQG ID, Greg, assumes this to be an attractive feature. I assume that Greg speaks on behalf of CableLabs and also assume that CableLabs thinks that DOCSIS-ISPs will be interested in that feature as well. I did not notice you objecting to the NQB draft based on your doubts about DSCP passage... 
> 
>> Let it be clear: I'm NOT. I think this is suicide...
> 
> 	[SM] Why? And "suicide" is not really an appropriate term here. That said IMHO, L4S is not going to fail because of a DSCP requirement; L4S is going to fail because L4S-compliant protocols fail to compete sufficiently well on non-L4S bottlenecks, and because L4S bottlenecks give such an undeserved advantage to L4S flows that folks will disable these pretty quickly. Whether or not you use a DSCP, is irrelevant to the sad fact that L4S is simply not ready for anything else than Eyeball<->nearCDN fast lanes (where ironically, DSCP can be reasonably expected to be E2E, either by default or facilitated by SLA/TCA).
> 
> 
>> And I understood that was the main consensus during the input/output vote, and the main reason why people accepted L4S with the small risk of getting too high throughput, rather than SCE needing FQ or getting again the delay-based problems (getting trampled over by loss based and CE-only CCs).
> 
> 	[SM] If we actually had asked folks about their motivations, we might know, but we didn't... so let's not go there, please.
> 
> Best Regards
> 	Sebastian
> 
> 
> 
>> 
>> Regards,
>> Koen.
>> 
>> -----Original Message-----
>> From: Sebastian Moeller <moeller0@gmx.de> 
>> Sent: Friday, March 26, 2021 9:06 AM
>> To: De Schepper, Koen (Nokia - BE/Antwerp) <koen.de_schepper@nokia-bell-labs.com>
>> Cc: Jonathan Morton <chromatix99@gmail.com>; Bob Briscoe <in@bobbriscoe.net>; tsvwg@ietf.org
>> Subject: Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)
>> 
>> Hi Koen,
>> 
>> I think none of this addresses my simple proposal to use a guard DSCP for the duration of the L4S experiment. Looking at the NQB ID (https://tools.ietf.org/html/draft-ietf-tsvwg-nqb-05) and the low latency docsis (LLD) ID (https://tools.ietf.org/id/draft-white-tsvwg-lld-00.html) I think I can even propose a candidate DSCP pattern: 0x2A (for the use as guard DSCP the fact that this has a lower per-chance traversal likelihood than say 0x02 is actually a feature in the context of a guard DSCP). 
>> 
>> Here is cable labs position (NQB is used as synonym for the LL-queue and traffic having appropriate properties to qualify for the LL-queue):
>> "As of the writing of this draft, it is proposed that the DiffServ value 0x2A be standardized in IETF/IANA to indicate NQB [I-D.white-tsvwg-nqb]."
>> 
>> So it seems pretty clear that one of the biggest drivers behind the L4S effort already assumes that a L4S DSCP is viable, desirable and standardization is already in process. One could say they consider "DiffServ [...] as a widely deployable technique on the internet", no?
>> 
>> Since I have seen no arguments from you on the list arguing against the feasibility of an NQB DSCP/PHB, I wonder why you accept that as viable for the NQB draft and LLD, but not for L4S. Especially since LLD contains L4S as one of its building blocks?
>> 
>> Best Regards
>> 	Sebastian
>> 
>> 
>> 
>>> On Mar 25, 2021, at 18:54, De Schepper, Koen (Nokia - BE/Antwerp) <koen.de_schepper@nokia-bell-labs.com> wrote:
>>> 
>>> If using DiffServ is considered as a widely deployable technique on the internet, then we should simply use DiffServ as the "input" L4S identifier and use SCE as the congestion "output". I don't think we need more complex experimental schemes, especially if they end up needing a final DiffServ codepoint anyway even after the experiment (like in Jonathan's proposal).
>>> 
>>> As such it would be the perfect marriage of both L4S and SCE. So an AQM can only mark SCE if it has the DiffServ L4S-id and can protect and isolate the L4S-SCE flows from flows not responding to the SCE marks (in a DualQ or FQ, or any other scheme detecting presence of non-L4S flows).
>>> 
>>> This was one of the options that was considered before and which would be the simplest solution involving DiffServ.
>>> 
>>> The question was and still is if DiffServ "is" the perfect wedding proposal for Internet wide traffic. How many more hurdles do we need for deploying scalable and smooth congestion control (which is I assume the common goal of both L4S and SCE).
>>> 
>>> Main question is: Is the risk (pushing away Classic flows on a RFC3168 ECN bottleneck after tens of seconds) worth the extra deployment obstacles (practically making its deployment as constrained as an end-to-end managed service).
>>> 
>>> If the answer is yes, then we should define a DiffServ codepoint that identify L4S and only use SCE for those. If the risk is assumed minimal and comparable with other experimental CCs (see ICCRG https://datatracker.ietf.org/meeting/109/materials/slides-109-iccrg-the-great-internet-tcp-congestion-control-census-00), then we live with the (small?/controlled?) impact.
>>> 
>>> I understood the latter had the biggest support in the input/output vote during the previous interim. I think if L4S flows are not used for long time downloads (non-application-limited flows), the impact is minimal and a 3168 detection and fallback would never be needed. It also was known that Classic bottleneck detection would be a challenge, but I think Asad/Bob showed that a (maybe not 100% perfect, but already) very good implementation is possible if needed for the problem conditions that are known then. These could be used (experimented with) when using L4S for downloads.
>>> 
>>> So bottom-line question: Who believes an end-to-end DiffServ solution is realistically deployable???
>>> Second sub question: who believes L4S is a bigger risk than all other CCs "experiments" on the Internet??
>>> 
>>> Regards,
>>> Koen.
>>> 
>>> 
>>> 
>>> -----Original Message-----
>>> From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of Jonathan Morton
>>> Sent: Wednesday, March 24, 2021 11:24 PM
>>> To: Bob Briscoe <in@bobbriscoe.net>
>>> Cc: tsvwg@ietf.org
>>> Subject: Re: [tsvwg] L4S DSCP (was: L4S drafts: Next Steps)
>>> 
>>>> On 25 Mar, 2021, at 12:10 am, Bob Briscoe <in@bobbriscoe.net> wrote:
>>>> 
>>>> Can someone explain for the record how using a DSCP as an L4S identifier would solve the CE ambiguity problem?
>>> 
>>> It doesn't.  It only allows containing the resulting harm to participating networks, thereby protecting (most) innocent bystanders.  It's enough, I think, to conduct a field experiment to discover just how bad the problem really is in practice.
>>> 
>>> This is predicated on the notion that the L4S-ID DSCP(s) are bleached or dropped at the participating networks' border, and in the case of border bleaching, that L4S endpoints interpret CE marks *not* carrying the L4S-ID DSCP as per RFC-3168 or RFC-8511.
>>> 
>>> I refer you also to my recent post titled "L4S, DSCP, and RFC-4774 Option 2" in which I give a more detailed explanation of a two-DSCP proposal.  The short version is that a version of L4S using that scheme would have *some* positive confidence whether or not they were receiving L4S or conventional marking, without the need for heuristic probing or monitoring.
>>> 
>>> - Jonathan Morton
>>> 
>> 
>