Re: [tsvwg] I-D Action: draft-ietf-tsvwg-l4sops-00.txt

Sebastian Moeller <moeller0@gmx.de> Thu, 06 May 2021 09:53 UTC

Return-Path: <moeller0@gmx.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D1EE23A07D6 for <tsvwg@ietfa.amsl.com>; Thu, 6 May 2021 02:53:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.649
X-Spam-Level:
X-Spam-Status: No, score=-1.649 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=gmx.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ghd6YjreBJ5C for <tsvwg@ietfa.amsl.com>; Thu, 6 May 2021 02:53:39 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D4AEA3A0833 for <tsvwg@ietf.org>; Thu, 6 May 2021 02:53:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1620294813; bh=IfKmBJ8fwJ29rQnKIts/XgcC/9qxspzqMvZKIHuzTQg=; h=X-UI-Sender-Class:Subject:From:In-Reply-To:Date:Cc:References:To; b=AKVnd5fLxC3sg5cxWYM7WjUHnAm6gBpxOvQPTAl2v1ube79gSJ+Irr4kZY+g7+V2d p+1BN7dt+EY/tBzmQxbenQ5cBfQbAZRmqt6HcsEbUEqwtFjbSv5DY0PoXBgkj64kwV XTw+u6/gSPkimRXL+Aw+MMcAEgdEaveO17qXwyh4=
X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c
Received: from [192.168.250.105] ([134.76.241.253]) by mail.gmx.net (mrgmx004 [212.227.17.190]) with ESMTPSA (Nemesis) id 1M7b6l-1ldBeC244b-007yQC; Thu, 06 May 2021 11:53:33 +0200
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.20\))
From: Sebastian Moeller <moeller0@gmx.de>
In-Reply-To: <0D313261-6F18-45AA-A40E-7CBCDF229EAD@cablelabs.com>
Date: Thu, 06 May 2021 11:53:31 +0200
Cc: "tsvwg@ietf.org" <tsvwg@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <55F0F23A-EBCA-4703-A2B8-176AD26789C9@gmx.de>
References: <162026122806.29902.12130492993431477595@ietfa.amsl.com> <0D313261-6F18-45AA-A40E-7CBCDF229EAD@cablelabs.com>
To: Greg White <g.white@CableLabs.com>
X-Mailer: Apple Mail (2.3445.104.20)
X-Provags-ID: V03:K1:jxWM7X9+PHV9pJAkLmvegzsWhZKnGzidruKzyiRk3IHgdJ0KU82 Ut+d2ORMzVdMz1nT/hegLBBOwARDYjtHwgDcRyI005NtquVoP2648N41NYlphG2tuNDlvt0 LoACkunkG5VtvpThVtohnJ45NH29EXUiDGcMGpB9seCzpD5JKG0i8JSgebmkIoHZY9WlZWo kLa2PAalg65E0w5MqqyGQ==
X-UI-Out-Filterresults: notjunk:1;V03:K0:WiNsvjBi8xE=:DXVTK/fLrs6TaEJXS8NIcs dnusjHQl1oug8epm//c+Sfq6Xr9HXr0wZkWpIX/M0PevZgdU4++rTzAAs3DVTO6DckLgunlQz 6Oa9/lrD740qdRPe8uWkq+E5PJsVE6MuPp9Z98LsW1+96Csq8TrheNZqDF8bPeAZcqj4CPbbJ Z94G49Mv9rv8Oue0axrr5cEDXe1FqCAIGBXz3vV994JOpalMbY7QDWCeIwbCIa04Fp8mrrDiD p061Zx/09M2AHVtRvGuu46v5K/WEI/0glS74+BEiZRqf3KDFEJ4I0XHMIU4ZAGfXT8iOYkZKB DNeNI0+an1Z0AugBpIpJRVLbopXzEdNqF0oXsGunyPkWbow7kTxDvWLNWgi77WVvTeJMYeALx xoVhdzNa2XnC3ZvJeGsPragGHLECeCtLeejTNmib4KVE5sydJAJDUAwWyjZEGjdPaU9RFL1Pi MsjXdLL9A7HNXmjLZksbR4AtmnvSwf7OmEb9oCUzf7O62/W0F5+rNgc112sVjgGXWUW12aPsc 1ssZtCXQYkS3vdSMBtrH9BfvrerwYB9WwIU69f9R/k+rTFWpRhIMOfZyFhTUyJyi8amWj02aU UPt9zgQiLNj0bsAsgXsIxF1ZixzjaLMe3XwLLdtwVY5LClCO5ORRNQs+cFQBDXAtMwRXD3qyu DlyIJzDfbXgpFQKaTECqAyZa33DJf2yT2OkJw51ByADvI82tw2BHLMhZPDISLVIUrt6RRLv+g MOkABqeiICnLtFF99MWCfZ7fiiCEtbymdwskwvkmWZRDkQ6n/j2UZ/tvSMvzOKmhFYkUDTT+y lr4NruhC/Op6FaTDVJng0Hw/lnppMi570tthlDYKJR+zoKrpazW6Z6of4hOKLPg7xGypeP60D gZMchBQnVYIsXCAFjtsWDM9mP0NDAgryREmAFofCaRG1wMGOlY/76+YPvIAKR2SPLeA+IVjAv If4C1aqH4/NGd/jUZ1RU8k5TzlCfxEcubSeIVrnNeOqnUPpoLQKRWeDZgnxCrdmaTh2rIL+0d zwJ8Of9uKtzHOQaKHDLo/wJ2KHYOX1XC3frGz4abujHpmbDUf9/cpAf32KFqdxdEB7VoeieHr +dvP3blTY627bpxjQ+u1Qy8HlpDPrFsw7pzGyfohr5DPTDpyXrdDWtMOzhmlcZIlZ9SLMZuP8 n3vJXHA/RHBqs2Xs5DiQJD48YsEEFQikE8EmWNfJj665zLGF0nv2gkyPwYcymLVFM2CUg=
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/tzwXLLL_Tl2c4e4NvusWF7gApfk>
Subject: Re: [tsvwg] I-D Action: draft-ietf-tsvwg-l4sops-00.txt
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 May 2021 09:53:44 -0000

Hi List, hi Greg,

sorry for being late, but...

...speaking of evidence for ECN marking in the wild; here an analysis of CAIDA internet "back-bone link " traffic from 2018 https://ieeexplore.ieee.org/document/8909187 that has not beed discussed as far as I can tell. The data showed between ~5% of IPv4 packets carrying something other than NotECT in the ECN bitfield, a more detailed look at port resolution showed 0.26% (port 80) or 0.3% (port 443) in IPv4. I do not think this was broken down by network, but indicates non-zero ECN usage in the wild in 2018. IMHO the percentage of traffic might be a better proxy for ECN prevalence than number of networks. That said for figuring out how many/which operators should be pro-actively informed of the coming changes identifying the networks seems helpful.



> On May 6, 2021, at 05:54, Greg White <g.white@CableLabs.com> wrote:
> 
> All,
> 
> I had hoped to upload this further in advance of the interim meeting next week so that participants would have more chance to review it beforehand. 
> 
> There are quite a few changes from the last individual draft, as can be seen in the diff: https://www.ietf.org/rfcdiff?url1=draft-white-tsvwg-l4sops-02&url2=draft-ietf-tsvwg-l4sops-00 
> And, there remain a few TODO items as well.  These changes/TODOs were the mainly result of review comments on the mailing list, though I received some offline comments and suggested text as well.
> 
> I'll do a relatively quick summary of the changes during the timeslot on Monday, but for now, the most notable changes are:
> 
> New Section 3.1 summarizing recent studies of RFC3168 deployment (Jake, Pete, please review and see if the text is an accurate summary).

[SM] See above for an additional relevant study with 2018 data that might be worth adding in the next revision.

> New Section 6 discussing actions that can be taken by an operator of FQ bottlenecks.

[SM] There I find:
"This unfairness is compounded by the fact that the FQ	
 	   scheduler will already be causing unfairness to flows within the	
 	   tunnel relative to flows that are not tunneled."

This argues that the AQM "should" divine the number of true capacity seeking flows in the compound tunnel aggregate and assign the proper share. I argue that this is impossible to robustly solve in general, and, in the case of encrypted tunnels also arguably the wrong thing to do, as doing so would introduce additional, potential severe re-ordering in the encrypted flow. But a partial solutions already exist, on IPv6 a tunnel could make use of the flow-label field to give additional flow identifier to AQMs. Arguably that is what tunnels should do, as that keeps the policy decision how much reordering one will accept in the hand of the tunnel operators.



> New Section 7 discussing conclusion of the L4S experiment (Sebastian, for now I went with the text proposed on the mailing list, we can revise it in the next draft if needed).

[SM] Much appreciated, while I have my quibbles, getting this section in feels quite helpful (and I do not pretend my initial draft was in any way complete and/or perfect). But for completeness, I still think it a good idea to lay out the gamut of potentially required/recommended actions at network termination. The argument will be better the more objective it is, and it already carries a noticeable pro-L4S bias.


Regards
	Sebastian


> 
> -Greg
> 
> 
> On 5/5/21, 6:34 PM, "tsvwg on behalf of internet-drafts@ietf.org" <tsvwg-bounces@ietf.org on behalf of internet-drafts@ietf.org> wrote:
> 
> 
>    A New Internet-Draft is available from the on-line Internet-Drafts directories.
>    This draft is a work item of the Transport Area Working Group WG of the IETF.
> 
>            Title           : Operational Guidance for Deployment of L4S in the Internet
>            Author          : Greg White
>    	Filename        : draft-ietf-tsvwg-l4sops-00.txt
>    	Pages           : 18
>    	Date            : 2021-05-05
> 
>    Abstract:
>       This document is intended to provide guidance in order to ensure
>       successful deployment of Low Latency Low Loss Scalable throughput
>       (L4S) in the Internet.  Other L4S documents provide guidance for
>       running an L4S experiment, but this document is focused solely on
>       potential interactions between L4S flows and flows using the original
>       ('Classic') ECN over a Classic ECN bottleneck link.  The document
>       discusses the potential outcomes of these interactions, describes
>       mechanisms to detect the presence of Classic ECN bottlenecks, and
>       identifies opportunities to prevent and/or detect and resolve
>       fairness problems in such networks.  This guidance is aimed at
>       operators of end-systems, operators of networks, and researchers.
> 
> 
>    The IETF datatracker status page for this draft is:
>    https://datatracker.ietf.org/doc/draft-ietf-tsvwg-l4sops/
> 
>    There is also an HTML version available at:
>    https://www.ietf.org/archive/id/draft-ietf-tsvwg-l4sops-00.html
> 
> 
>    Please note that it may take a couple of minutes from the time of submission
>    until the htmlized version and diff are available at tools.ietf.org.
> 
>    Internet-Drafts are also available by anonymous FTP at:
>    ftp://ftp.ietf.org/internet-drafts/
> 
> 
>