Re: [tsvwg] path forward on L4S issue #16

Ingemar Johansson S <ingemar.s.johansson@ericsson.com> Mon, 08 June 2020 19:40 UTC

Return-Path: <ingemar.s.johansson@ericsson.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45F103A0F5F for <tsvwg@ietfa.amsl.com>; Mon, 8 Jun 2020 12:40:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.102
X-Spam-Level:
X-Spam-Status: No, score=-2.102 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FBwC-xJKpu_u for <tsvwg@ietfa.amsl.com>; Mon, 8 Jun 2020 12:40:30 -0700 (PDT)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60064.outbound.protection.outlook.com [40.107.6.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C2D1B3A0F5D for <tsvwg@ietf.org>; Mon, 8 Jun 2020 12:40:29 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Hwpv6mB3UkPAnqaK1PeaYNCaqZe+hVhpPBxvVoqatbjyZkY3ngrv7D2Z5p7WtwcvoQa23fSpfniAsoK2FdoN9xZ1VUFl1wHvoJo6bsWHFSz5U9pmw7NnobxMEo2ctA2LEztF4vF6E9GGrQir/gnbSwcfNL+89AB/Al9SCLqVevXGEhWgMkgiZWO3OGtqRsxMabPs7f0JLs5EWggpzE8WNtw4c6e7K7DqCRAopUMPvFQ4/DWdke5tw2TS/+kmR3u1H6zJbCGO5N3EKbXyEYZBuxtddV3Q8yqcUw7vMM3iVA/RxHaMUoJT1qgLTfyBG5qAFmHBVFFoIOtUDqcubfW44Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=H60ZzolhCd0jSzCDLrwXcNY8WrkRP+tdMTbXexW99Yw=; b=iPi4RV8prCc6UCFz9BiJB/dMVybAw2sJlYD/w9DIXe4A/3RVi+2NwbIZyG4gjChipMDp04jX/w/cwfWmv/4rFlDuTucu5h4JpWX6TLDkYtF9kclsiamNRAzWMF4fhb/Ja7TJ79lAUjVczDwtWK5F++WgQmzwcnKT23xmTpkjyT6IKhEi2baUTziZ+0Ad0QfSOvV3jX/ab3Y4k1ulQjwOccgvh+3YhE6pGNHqEvCFGI1ulJFTPzQ2xWXdrlAJJ8XU1FfVRqk+4oHSuJK9xCQsozq+ylhz4CVNz741Ml2EqPJQbRizgsXXyCVK/6iQu0zqtWotCmFvhcB91/K6c13Q9A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=H60ZzolhCd0jSzCDLrwXcNY8WrkRP+tdMTbXexW99Yw=; b=q9DjPYDbay9XpSR/YVQNayrlxw8XW9qEeetuHzk+0Xbo/8RTejWLQCMCCzWHAFyOFhc1PlQfC2cnoIS/uYRc7DDDt8vAhd87o/OSv0pswmRoDJnPpkxvANECjaQf4z8FYG+ZVbFgh7RDIFzn/wh0YJWmWdnrY4ecv1ez1fR2UJM=
Received: from HE1PR0701MB2876.eurprd07.prod.outlook.com (2603:10a6:3:56::8) by HE1PR07MB4155.eurprd07.prod.outlook.com (2603:10a6:7:98::32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3088.15; Mon, 8 Jun 2020 19:40:22 +0000
Received: from HE1PR0701MB2876.eurprd07.prod.outlook.com ([fe80::f411:8f72:4035:41d1]) by HE1PR0701MB2876.eurprd07.prod.outlook.com ([fe80::f411:8f72:4035:41d1%8]) with mapi id 15.20.3088.016; Mon, 8 Jun 2020 19:40:22 +0000
From: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
To: "tsvwg@ietf.org" <tsvwg@ietf.org>, "wes@mti-systems.com" <wes@mti-systems.com>, "David.Black@dell.com" <David.Black@dell.com>
CC: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>
Thread-Topic: [tsvwg] path forward on L4S issue #16
Thread-Index: AdY9yRytObkYFlR2TDKCXHspZYq26A==
Date: Mon, 08 Jun 2020 19:40:22 +0000
Message-ID: <HE1PR0701MB287631ECFC89806384B0C4E2C2850@HE1PR0701MB2876.eurprd07.prod.outlook.com>
Accept-Language: sv-SE, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=ericsson.com;
x-originating-ip: [83.227.122.88]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 40ed9cb2-9b2a-4a03-78bd-08d80be3c891
x-ms-traffictypediagnostic: HE1PR07MB4155:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <HE1PR07MB41556886E3F1176B32249952C2850@HE1PR07MB4155.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 042857DBB5
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: dTpLfeoDr5f8ykzhT/YnTGGF24ehlGWLS6JQiw+Xc4h0W7BW3SIsF91nJ8sRzOJ3nsB0z0S+i+sLqi8Qrr/8BeKky3fdg2FfwE6WoJMO5xCZq1R4T2s7ylXetggWYqee6yYTxaavFqi70M65Vw7Ibp1wmhyTaM1Y619tT9ve8gstHvANSV7IIuxUBE5peDs2MyQM8h8IfDMVvvaPqGzzPQlKNXDE1gJgLfOpU38EkYmCIP4/BsR400af/n4lDfwrVRtSdcHFW6BwcK2dpyIlsFl9cjciZBUGHzf7chm66eFNte3PxpVHyVL3N0yXxTQJxjGLnRuIrRZgKQlVunLtfStOXrHQZzD1+x6roO0NxMY9N6ZaYBFwFJqUWSUULkPpRTLJAMCftX+UV0xUHQNamw==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:HE1PR0701MB2876.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(136003)(366004)(396003)(39860400002)(346002)(376002)(8936002)(99936003)(110136005)(66574014)(83380400001)(71200400001)(478600001)(7696005)(2906002)(8676002)(316002)(966005)(76116006)(66446008)(5660300002)(26005)(66616009)(64756008)(33656002)(52536014)(6506007)(9686003)(186003)(66556008)(4326008)(55016002)(53546011)(107886003)(66946007)(86362001)(66476007); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: utWfOZkkQimRMNZVnUJMfdHLKncIN1tcTj+Wda++qKDlILnYhQo/AJXdUoJUbkqIDJG6tgsf6mvupZdoq3nYGB5+Arm7kkLjOPxInRnFXIBDYQ7vplib7zC6G/IlP4nlHEE87CRj0YBjB7vYegs1cFc9QU/9lw31vd0AU75bIXxKpYWQALuTVUAhpYtK1ob3vSuWWRwBfSafuX2eTSyYRMVoPrphqntvpvuG2LiWncSH3Z73zVIUBLF+w0WnzetxbDX26dUrUmHVW10oz87d2/mh9+uLfovzIxKfa7liWk2HAUK1foAA9wXhlcqHdeGdjrHFK5PO1dRvcYSjmu9a20YJ3oFSuwv5EJSPGlSXEw21zGAR6ethRCV222xPQqBB3rhNcpJg2I/C7HcyIgdu8DEUcFLofz2SYdjaPpqCWqn5Qk7Mzn4o2agAac7s+XUDZiUkrMYDZzp+F+ClT5KNSXgQ+ISmL/wa51io2ohO32U=
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg="SHA1"; boundary="----=_NextPart_000_0182_01D63DDD.68A35650"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 40ed9cb2-9b2a-4a03-78bd-08d80be3c891
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Jun 2020 19:40:22.1724 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: +Gh4/6IVd2gAZvHnk6ULFdPqntqAEgZdJyCqFesRh2zlwxscrUp55ykDcioZEUWKksuqVokcxuCJObbHt7bg0U1pmjttbS6r33eFTTQbhJXPOzHJfr43Xb0VVUZADGIZ
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB4155
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/6hQ0RsT7jQYCpaiZ4t3x4ZBsTHw>
Subject: Re: [tsvwg] path forward on L4S issue #16
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Jun 2020 19:40:32 -0000

Hi

I believe that it is fair to assume that it will be a difficult task to come
up with a RFC3168 bottleneck detection algorithm in Prague that will hold
water in all different kinds of scenarios. 
It reminds me of the competing TCP flows detection algorithms in the RMCAT
standards work, SCReAM has one such algo, that sometimes works, sometimes
not. It is disabled by default in the running code.

So, given that there is likely to be cases where the RFC3168 bottleneck
detection work as intended, how bad is it?, will the internet melt down ? 
I think some clues lie in the answer to the questions. 
1) How widely are  RFC3168 ECN capable AQMs deployed _and_ enabled ?
2) If they are deployed _and_ enabled, can/will they be updated ?

Looking at all this from a 3GPP view the answers to #1 and #2 above is very
simple, there is AFAIK no deployment of RFC3168 ECN capable AQMs in 4G and
5G, meaning that this is no issue as possible implementations from now on
can address the coexistence of L4S and RFC3168 style ECN.

Now this will to some people sound like I want to dismiss the whole issue an
irrelevant, please don't interpret it like that right away, find relevant
answers to #1 and #2 instead. 
Given the answers, this can then be put in relation to the cases where the
RFC3168 ECN bottleneck detection, the current or an improved version of it
can fail. 

/Ingemar  

> 
> > I think fixing this is part of making the
> > classic queue detection and end-host performance robust in as many cases
> as
> > possible when trying to take advantage of L4S in the network, but
doesn't
> lead to a
> > safety issue.
> >
> > Are there any plans or thoughts on how to proceed on issue #16 that
> people can share?
> 
> [Writing as an individual, not WG chair]
> I have an alternate perspective on this issue, and suggest an alternate
> approach to addressing it.
> 
> Under the heading of TCP Prague, an enormous amount of work has gone
> into endpoint detection of RFC 3168 ECN bottlenecks and endpoint-based
> problem avoidance.   Of the test results that have been posted, Pete
Heist's
> scenario 8 results (https://mailarchive.ietf.org/arch/msg/tsvwg/-
> gx8R1jcwiCsX1_5cdnvl3kKlOs/) ought to give everyone pause, as they show
> TCP Prague flows getting into trouble competing among themselves.
> 
> This TCP Prague work on bottleneck detection and problem avoidance has
> been going on for a year, and while it's produced some very interesting
> results and I'm sure that more progress will be made, I'm skeptical that
> relying on it to close issue #16 will yield much more than rounds of
finding
> new problems in the next five versions of TCP Prague.   Beyond that, I'd
> expect to see quite a bit of L4S low latency traffic from protocols whose
> endpoint implementations have not been scrutinized to anything
> approaching the degree of attention that has been recently devoted to TCP
> Prague, and hence are at more risk of getting into trouble.
> 
> As an alternative, I suggest starting from Neil Cardwell's network and
> operator perspective (from
> https://mailarchive.ietf.org/arch/msg/tsvwg/kyDZ7vYLeOk1V15nZfNXGmaU
> Nxk/):
> 
> 	- L4S flows potentially causing unfairness in RFC3168 ECN
bottlenecks
> has
> 	been mentioned as a potential concern. However, a robust RFC3168
> ECN
> 	bottleneck should already have a mechanism to avoid unfairness
> caused by
> 	flows that are marked as ECT(0|1) and yet not performing RFC3168
> responses.
> 	In particular, many of the large sources of known deployments of
> RFC3168
> 	--  Linux fq_codel and cake -- are already deployed with fair
> queueing. In
> 	such bottlenecks L4S traffic should not cause harm to other non-L4S
> flows.
> 	Furthermore, if there really are ISPs with deployments of RFC3168
> 	bottlenecks that have neither FQ nor any other protection from
> 	non-RFC3168-ECT(1) flows, then they can bleach incoming ECT(1)
> code points
> 	to Not-ECT and treat L4S as Not-ECT (ISPs typically already
transform
> the
> 	DSCP byte at their ingress anyway). So I do not see harm to RFC3168
> ECN
> 	bottlenecks as a prohibitive concern.
> 
> 	- More generally, if there is any problem discovered with the L4S
> 	experiment, either the algorithm or particular implementations,
> bottlenecks
> 	can easily identify L4S traffic and bleach it into Not-ECT, and
treat it
> 	like Reno/CUBIC traffic.
> 
> TCP Prague is not only not mentioned in the text quoted above, it appears
> nowhere in the entire email from which that was extracted.  Nonetheless,
> the email lays out an approach to L4S safety, although as initially
proposed, it
> invites operator bleaching of ECT(1), which would be unfortunate, as
ECT(1)
> not being subject to bleaching is among the key reasons for using it.
Refining
> that approach might produce something more robust that doesn't invite
> ECT(1) bleaching, and that recognizes that FQ is not a 100% solution to
flow
> interference (e.g., courtesy of the birthday paradox for the number of
hash
> buckets in an FQ implementation).  As noted before, please don't cast
> aspersions in Neal's direction for introducing the notion of operator
bleaching
> of ECT(1).
> 
> So, I would suggest focusing attention on networks and operators as an
> alternative approach to focusing on endpoints.
> 
> Thanks, --David
> 
> > -----Original Message-----
> > From: tsvwg <tsvwg-bounces@ietf.org> On Behalf Of Wesley Eddy
> > Sent: Thursday, June 4, 2020 4:54 PM
> > To: tsvwg@ietf.org
> > Subject: [tsvwg] path forward on L4S issue #16
> >
> >
> > [EXTERNAL EMAIL]
> >
> > I think we should discuss the path forward on L4S issue #16 and what
> people are
> > working on, planning to do, or expecting to see in this regard.
> >
> > This is the issue on interaction with RFC 3168 ECN AQMs in the network.
> >
> > I think this is one of the more important ones in many recent
discussions,
> so would
> > like to make sure we're agreeing on what it will take to complete or
what
> success
> > will look like.
> >
> > The classic bottleneck detection work is a key part of this.? In that
vein, I'd
> like to
> > subsume issue #29 (that it looks like Pete Heist
> > opened) under this one and close #29.? Issue #29 shows some cases where
> an L4S
> > queue is misidentified as a classic one.? I think fixing this is part of
making
> the
> > classic queue detection and end-host performance robust in as many cases
> as
> > possible when trying to take advantage of L4S in the network, but
doesn't
> lead to a
> > safety issue.
> >
> > Are there any plans or thoughts on how to proceed on issue #16 that
> people can
> > share?
>