Re: [tsvwg] Neal Cardwell's rationale for supporting ECT(1) as an input/L4S signal

"Holland, Jake" <jholland@akamai.com> Thu, 28 May 2020 06:15 UTC

Return-Path: <jholland@akamai.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F06F43A0B31; Wed, 27 May 2020 23:15:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=akamai.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aEkrqKXcrdgb; Wed, 27 May 2020 23:15:03 -0700 (PDT)
Received: from mx0a-00190b01.pphosted.com (mx0a-00190b01.pphosted.com [IPv6:2620:100:9001:583::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2254D3A0B2F; Wed, 27 May 2020 23:15:02 -0700 (PDT)
Received: from pps.filterd (m0122333.ppops.net [127.0.0.1]) by mx0a-00190b01.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 04S677Yt003079; Thu, 28 May 2020 07:15:00 +0100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=jan2016.eng; bh=rm1KxIwnTy5sKDNxlV91YMufXPah8T0QSwzljcQzHYE=; b=NnWzcJHAZso/PDUby2FCmQ/+cPVSBl3hUGwNTLTADC05xwD/RI3DJIR3q1S6N3HZhTpw 1MxhL2b4WZCakebXtyMziZ3nbXM4lgXOBg6+4/J7bcW0i+olPMhGKV7zCO5iWBn2WBdd OmlU2xqPN22E+22ZikID0d6OKu7VOcH7ne73PB/GiJ5/U/vwXVSX/lHmR0MQ7awQZRJz D4eb910XUbN1P0ZoLgvFKXP88P2XBEUWgF0Q8L1Fh0HVxI3qiMbv2gkZBB80fT1gmsyB Ka+n6UnN+p4BwtGEhMbdbtcp83NwIu7/JX+Kyy4Ldnmlb2AOJV2BFzTkfKuUwH8mdgeq OA==
Received: from prod-mail-ppoint1 (prod-mail-ppoint1.akamai.com [184.51.33.18] (may be forged)) by mx0a-00190b01.pphosted.com with ESMTP id 316u3gmkw8-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 28 May 2020 07:15:00 +0100
Received: from pps.filterd (prod-mail-ppoint1.akamai.com [127.0.0.1]) by prod-mail-ppoint1.akamai.com (8.16.0.27/8.16.0.27) with SMTP id 04S5liPR024618; Thu, 28 May 2020 02:14:59 -0400
Received: from email.msg.corp.akamai.com ([172.27.123.32]) by prod-mail-ppoint1.akamai.com with ESMTP id 316y5w1md3-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Thu, 28 May 2020 02:14:59 -0400
Received: from usma1ex-dag1mb6.msg.corp.akamai.com (172.27.123.65) by usma1ex-dag1mb3.msg.corp.akamai.com (172.27.123.103) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 28 May 2020 02:14:58 -0400
Received: from usma1ex-dag1mb6.msg.corp.akamai.com ([172.27.123.65]) by usma1ex-dag1mb6.msg.corp.akamai.com ([172.27.123.65]) with mapi id 15.00.1497.006; Thu, 28 May 2020 02:14:58 -0400
From: "Holland, Jake" <jholland@akamai.com>
To: Neal Cardwell <ncardwell=40google.com@dmarc.ietf.org>, "Holland, Jake" <jholland=40akamai.com@dmarc.ietf.org>
CC: tsvwg IETF list <tsvwg@ietf.org>
Thread-Topic: [tsvwg] Neal Cardwell's rationale for supporting ECT(1) as an input/L4S signal
Thread-Index: AQHWJUxIcCajnIV5gk+TOCWCdAWIaqiei86AgAar9QCAF7n4gA==
Date: Thu, 28 May 2020 06:14:58 +0000
Message-ID: <9F3CC7ED-3C9C-4D44-913E-7E8D682A0DF0@akamai.com>
References: <CADVnQy=7f79Mj_GQBU-UsodTRORjB2U6rCPPQ+1Zck_gxr-rww@mail.gmail.com> <A4B43F47-9050-403D-B739-BF12C8F873EB@akamai.com> <CADVnQy=zbFSaJxosicyAjz0sbBRnq_N82LV=SeiCZqCx3BYqwA@mail.gmail.com>
In-Reply-To: <CADVnQy=zbFSaJxosicyAjz0sbBRnq_N82LV=SeiCZqCx3BYqwA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.37.20051002
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [172.19.88.116]
Content-Type: text/plain; charset="utf-8"
Content-ID: <AFEEEACC9B612E4F940C89A9F4509DE7@akamai.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.216, 18.0.687 definitions=2020-05-28_02:2020-05-28, 2020-05-27 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-2004280000 definitions=main-2005280035
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.216, 18.0.687 definitions=2020-05-28_02:2020-05-28, 2020-05-27 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 bulkscore=0 spamscore=0 lowpriorityscore=0 cotscore=-2147483648 phishscore=0 malwarescore=0 mlxlogscore=999 adultscore=0 suspectscore=0 clxscore=1011 priorityscore=1501 impostorscore=0 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2004280000 definitions=main-2005280038
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/zOxTaORWgJ7M-Z5zb7gx7hM6OHA>
Subject: Re: [tsvwg] Neal Cardwell's rationale for supporting ECT(1) as an input/L4S signal
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 May 2020 06:15:05 -0000

Hi Neal and Bob,

On 5/12/20, 1:55 PM, "Neal Cardwell" <ncardwell=40google.com@dmarc.ietf.org> wrote:
On Fri, May 8, 2020 at 6:02 PM Holland, Jake
<jholland=40akamai.com@dmarc.ietf.org> wrote:
>> I thought the existing deployments generally wouldn’t be compliant
>> L4S-compatible dualq devices suitable for general internet traffic
>> anyway, and would continue to need traffic isolation the way they do
>> now.  Is that different from your understanding?
>
> My understanding is that dualq is not a required component of
> implementing L4S, and definitely would not be required at every hop or
> potential bottleneck along the network path. My understanding is that
> there would be sites that don't want to change the qdiscs on their
> senders/servers, and don't want to change their datacenter switches,
> but would like their connections over the public Internet to be able
> to use L4S.

I'm confused how this would operate in a way that's compatible with both
existing hardware and internet traffic, but I can think of 2 possible
interpretations.  Are you saying that:

(1) For internet traffic, classic markings (ECT(0) and NECT) would be
segregated to a different path, but L4S traffic (ECT(1) and CE) would be
sent through an existing marking low-threshold queue as currently
configured for DCTCP so it could mark the internet L4S traffic without a
hardware upgrade? Or

(2) The datacenter traffic and the internet traffic would be completely
segregated, and the existing datacenter switches wouldn't be involved in
marking the L4S traffic from the internet?

The point being: I don't think the existing switches would be able to
mark internet traffic as in (1) without segregation, because otherwise
the classic traffic would back off aggressively to the low-threshold
signal from the existing queues.

So it sounds to me like this idea is something like dualq but uncoupled,
with separate devices as the different queues to avoid a hardware upgrade
in order to use L4S?  (Otherwise, as in (2), I'm not clear on how the
existing hardware makes a difference.)

Just want to make sure I understand the datacenter angle on this.
Thanks in advance for clarifying, if you get a chance.

I tried to figure out which of these you meant (or whether it was a 3rd
option), by re-reading these messages:
https://mailarchive.ietf.org/arch/msg/tsvwg/Io3UlijUMEtjwyyxEwFSFBFpqIQ/
https://mailarchive.ietf.org/arch/msg/tsvwg/IWZNcqQCAwjX7AQT-QGJpLAqeEQ/
https://mailarchive.ietf.org/arch/msg/tsvwg/ZdNy965gDsqdqXz94rpENWaogwM/
https://mailarchive.ietf.org/arch/msg/tsvwg/1MlFf36hNSMqzG40uYGn-CpsqcY/

And it looked like you were thinking option (1) as far as I could tell,
but you didn't seem to have any mention of the need for segregating the
L4S vs. classic traffic from the internet, so I'm worried there might
have been a misunderstanding in the explanation you got from Bob.

As far as I could tell from Bob's response so far, he is claiming that
datacenter switches WOULD need to upgrade hardware to have dualq support
in order to participate in marking L4S traffic from the internet, unless
maybe they were marking ONLY L4S traffic, though it was a little hard to
be sure:
https://mailarchive.ietf.org/arch/msg/tsvwg/1cU3g2KfBFiWOAJZnUOKybeOrGk/

Or Bob, maybe you have some clarifying remarks on this point?  It's
possible I'm misunderstanding something.

(I'm granting the significance of the tunnel issues you mentioned in
the last referenced message (thanks for including your tunneling
protocol list and analysis), and asking just for your position on whether
existing switches can participate in marking mixed internet traffic
without segregating the L4S traffic.)

Best regards,
Jake