Re: [tsvwg] draft-ietf-tsvwg-nqb-15.txt - Section 5.2. Traffic Protection (text as is) - objective verification

Ruediger.Geib@telekom.de Wed, 15 March 2023 10:58 UTC

Return-Path: <Ruediger.Geib@telekom.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87264C151547 for <tsvwg@ietfa.amsl.com>; Wed, 15 Mar 2023 03:58:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.096
X-Spam-Level:
X-Spam-Status: No, score=-7.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=telekom.de
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GcX-I6l_pMoN for <tsvwg@ietfa.amsl.com>; Wed, 15 Mar 2023 03:58:50 -0700 (PDT)
Received: from mailout21.telekom.de (mailout21.telekom.de [194.25.225.215]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F2CA4C151533 for <tsvwg@ietf.org>; Wed, 15 Mar 2023 03:58:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telekom.de; i=@telekom.de; q=dns/txt; s=dtag1; t=1678877930; x=1710413930; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=Z4b3F2j+K1GBH86LIHKIIVz5Ns+vQInjk8S8DlKErTM=; b=L4pDIGAG+J3zxijdeE2CVO9DkxJ8tfP1cLXH5IH3KdKmZARHwyau/Gn8 CheGaFaqHAsuXhKZvb2wjp86yyw8rv8pOPbrv7l+YQg2WigMtYp25I+bH HRCNpTlyFubqkzXPgo8SPY1jjY72TKLt4bIz6pRYiKuqARWAmD/EmeWS+ 3ux/VHGlQw9v4VxfWVWb+NctXpCl2Vrzfa+CGgU1gcQBKLmNffF5juPkn mkUqGtE749mO/qv+5y4mNUmGX8NT4aML4QqsidfxLK+q2yfnfpm2yjjO6 73B1kYoVLrlpV4TBW5UV4yxxBczDH4AdaOLF6u0Lbna9qIV2u63UJO1CJ Q==;
Received: from qde9xy.de.t-internal.com ([10.171.254.32]) by MAILOUT21.dmznet.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 15 Mar 2023 11:58:47 +0100
IronPort-SDR: ApoL5/44ao4eEHTmysWDp2QJgJmIpuWTePuFvuD/4udn/kVwhp5RN6syFcg0MeA8QneNHupJ4p 65KlsYT+9GcjG49DSsIquwxhqsf5DKyN8=
X-IronPort-AV: E=Sophos;i="5.98,262,1673910000"; d="scan'208";a="666730719"
X-MGA-submission: MDEv2q6JP24xQg6LjFsQfQ6kZ05UFW0AzjDXwwo05qydcxpiorb9pdGjId78ZyMH6jKKJBFgQLpA015Y6GembQ2sFfNxPzeRYJPr0kWOeFwSD/R5aVn1Nt477XDS/6o0sJIRIbSdyJzHwRplzSqZTWly8t643cwtHwHR0a3yHmFBxA==
Received: from he104281.emea1.cds.t-internal.com ([10.169.119.195]) by QDE9Y1.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 15 Mar 2023 11:58:48 +0100
Received: from HE104281.emea1.cds.t-internal.com (10.169.119.195) by HE104281.emea1.cds.t-internal.com (10.169.119.195) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.25; Wed, 15 Mar 2023 11:58:43 +0100
Received: from HE102772.emea1.cds.t-internal.com (10.171.40.44) by HE104281.emea1.cds.t-internal.com (10.169.119.195) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.25 via Frontend Transport; Wed, 15 Mar 2023 11:58:43 +0100
Received: from DEU01-FR2-obe.outbound.protection.outlook.com (104.47.11.173) by O365mail09.telekom.de (172.30.0.241) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.25; Wed, 15 Mar 2023 11:58:43 +0100
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EBaTvO0OT+1P5NxJczU6O7IzN+yep15F5DtpfdivFwXeHzckU41zg8bDT3NJGPUim9MjnczLR2tQnyAUkksClUXtkQVAZ2nVrtLuyO2jZu8GUsRW39mVl2Ahu66ovgR+gtx7+V2tKt9nGla/KFV2Bd5z91xiTr8jcMtEq7cdOFcRP/cJn3wuKF7NABw7j6Hj/KusSAafoPTfxaV7CZgIre/5n7WbFUHnzSWtViAPlf9SCAc6E6tkY34NzXN893C8MXa6SN4bYBIy9MurPi0JP75HD9xoO17bPnJIghmKF63+kjWNboNZ+KldG/6UhkSAXMt6n8UIfys1ATTmGTxMBQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Z4b3F2j+K1GBH86LIHKIIVz5Ns+vQInjk8S8DlKErTM=; b=eKffdWLtZzrbomJA28k0f155JPcedB94PC64f+HSDYZehLQp838jJMGNAQ/fjSwaHdu4FSKoshY99ZWp//MgcoLYwYwezXLfJxCJAoDQdOEs4S8EeCZw4Pcgv/Slvh3chHy2kfN+Q082HDxD7EI56MrLbSHaMlu694XJwJZuU722l3NkRoKUdW5Law+MEy7nyBdx55waXUBHwkc+kZQbgNZ3hBb2H0wN99tP4dALlrAjmw+VCbY5badfeujzca7eojcFtoLuyR1Q0jFLaw1i6tV6KEFDplvnwlLNV37awft/81gpTPd2pDsUj9WQP9n3FEF3+E8rTgUdE8TesodTxw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telekom.de; dmarc=pass action=none header.from=telekom.de; dkim=pass header.d=telekom.de; arc=none
Received: from FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:8b::11) by FRYP281MB2591.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:74::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.29; Wed, 15 Mar 2023 10:58:42 +0000
Received: from FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM ([fe80::e721:9a37:e9ff:f015]) by FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM ([fe80::e721:9a37:e9ff:f015%6]) with mapi id 15.20.6178.026; Wed, 15 Mar 2023 10:58:42 +0000
From: Ruediger.Geib@telekom.de
To: g.white@cablelabs.com
CC: tsvwg@ietf.org
Thread-Topic: [tsvwg] draft-ietf-tsvwg-nqb-15.txt - Section 5.2. Traffic Protection (text as is) - objective verification
Thread-Index: AQHZVy0beHF2Li4VWECcYiEvzICtmg==
Date: Wed, 15 Mar 2023 10:58:42 +0000
Message-ID: <FR2P281MB152726A0F0F59CAD8853221C9CBF9@FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM>
References: <167348364734.15098.9183646444272144529@ietfa.amsl.com> <FR2P281MB152729FCB5F6206A3926F57B9CD79@FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM> <EDED2A65-DE02-428B-99F9-1CB20FFFB139@cablelabs.com>
In-Reply-To: <EDED2A65-DE02-428B-99F9-1CB20FFFB139@cablelabs.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=telekom.de;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: FR2P281MB1527:EE_|FRYP281MB2591:EE_
x-ms-office365-filtering-correlation-id: 2b8a7782-7e14-47ad-088f-08db25443d92
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: wY3ADmJdaPhllPquFNQYHbRcDgtRwAMn9onjJUSBlmVPT46U00dRqgCI4kc+G++JGBgHuyN93tW9PhmqCtbnE+TAvlA3RZfw2uiN6Qbfv0IiJMvWfXz3FGsqcHE9ZytOEWE7ZUYgmnyf2ZzwUHH18/uOkOjmXAzn16wOZecB/gxnODqBjP3x9ydn8768VNXbJV5R+9Ms+IBPZh3a8QmmuEo5CAVAcXnGxEjN8YyAad1be1er/IpwcW+E4I8gSuHXEjbm3Qq701ZAU/HeRpKe2RRRP9RSX9FhLLEZpxjVZMZcEnExwZxZ0HsVPpB7IG91y68h/lB8dlCwLoXvk3SGs8+VAQSLP9skhkYrdlbQO2HnWLrutSYc4b0c2apNJqWv4i1Iz+KtkTZZHkVN9fhJJOvXnhfjut0GMJQYVS3Q77dulxDMmgaLeQVOChMYGxozEUpUvuqJ0oh/1YZ0Q77P+iKuFXSFRkotWKCdLLvL4jCPNpLelxxlKphQu5Upd9ZnAddkgOIi/gDD72K98wubVII/FepXBsxLEbhqRIUyu05T/Ss16f3jrB3bC1IrAL7chBaL0o18SnP9s9d7xFD+dQtnat6S5PwSXxMrfn6sDdD6jHW7WG4lo5PZauwZsBxyjUknk6Dfi/1qv28+oMdcCQDeOvbT68HdWWtuaWevsmJD3LL03PCeu5DMjqnSy28BgSNmZkErJgThSrBAp2pxEw==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230025)(4636009)(376002)(366004)(346002)(136003)(396003)(39860400002)(1590799015)(451199018)(38070700005)(85202003)(86362001)(85182001)(33656002)(38100700002)(82960400001)(122000001)(2906002)(15650500001)(52536014)(41300700001)(5660300002)(8936002)(55016003)(4326008)(26005)(9686003)(186003)(6506007)(83380400001)(66574015)(316002)(64756008)(66446008)(76116006)(8676002)(66476007)(66946007)(6916009)(966005)(7696005)(478600001)(71200400001)(66556008)(66899018)(1580799012); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: FR2P281MB1527.DEUP281.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 2b8a7782-7e14-47ad-088f-08db25443d92
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Mar 2023 10:58:42.3729 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bde4dffc-4b60-4cf6-8b04-a5eeb25f5c4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: UFC2rlCu/qvUth4yAEeTKGiVPCJmFC3HxeJi9fGsMv8wwCR79eCeSMrdtZ0UUd5faPpkrnPOKl8LtkyEnxfQfr+ecO9BlXgBy7IAnrCzf7k=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: FRYP281MB2591
X-OriginatorOrg: telekom.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/zaoJqBL021A2vAS4SAA0mqIusg4>
Subject: Re: [tsvwg] draft-ietf-tsvwg-nqb-15.txt - Section 5.2. Traffic Protection (text as is) - objective verification
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Mar 2023 10:58:54 -0000

[RG] Please confirm: your response is to say, that the authors of NQB deem the traffic protection to be sufficiently specified for multiple, functionally compatible implementations by the following: 
- identify flows that are inconsistent
- either re-mark those flows/packets as Default and reclassify them to the QB queue or discard the offending traffic. 
- SHOULD be implemented in an objective and verifiable manner, basing its decisions upon the behavior of the flow rather than on application-layer constructs. 
- RECOMMEND to base decisions on the detection of actual queuing, 
- employing hysteresis could be advantageous
- maintain some sort of flow state. 
- The traffic protection function MUST be designed to fail gracefully in the case that the flow state is exhausted.

[RG] I personally wouldn't expect two vendors to offer me implementations compatible by functionality, as draft NQB doesn't specify what a flow is or could be. And even if "flow" was specified to some basic level, I doubt that two different implementers come up with the same method for objective verifiable manner, producing identical results by function. I don't expect all implementations to be identical, but I expect a standard to standardize behaviour. 

[RG] As an example, I pick EF. The only functional requirement there is a simple rate-limit, if PQ or the like is deployed. The authors don't specify how the rate limit is implemented, they however clearly specify the function:
- the implementation MUST include some means to limit the damage EF traffic could inflict on other traffic (e.g., a token bucket rate limiter).
- Traffic that exceeds this limit MUST be discarded. 
- This maximum EF rate, and burst size if appropriate, MUST be settable by a network administrator

[RG] Crisp, clear, and verifiable REQUIRED functionality, without defining exact mechanisms. I suggest that the authors specify the "traffic protection" of NQB by requirements in a way as EF does specify how an EF compatible rate limiter works.

[RG] I take it as support of my feedback that even scheduler experts and contributors to TSVWG come back by questions to the NQB authors, see

https://mailarchive.ietf.org/arch/msg/tsvwg/tH3j6iKICxqtjugla1d75zUsXZQ/

https://mailarchive.ietf.org/arch/msg/tsvwg/nfiZC5LKHnZkJbmfa0LH-nYp9-c/ 



-----Ursprüngliche Nachricht-----
Von: Greg White <g.white@cablelabs.com> 
Gesendet: Sonntag, 12. März 2023 01:05
An: Geib, Rüdiger <Ruediger.Geib@telekom.de>
Cc: tsvwg@ietf.org
Betreff: Re: [tsvwg] draft-ietf-tsvwg-nqb-15.txt - Section 5.2. Traffic Protection (text as is)

See [GW].

On 2/3/23, 1:17 AM, "Ruediger.Geib@telekom.de <mailto:Ruediger.Geib@telekom.de>" <Ruediger.Geib@telekom.de <mailto:Ruediger.Geib@telekom.de>> wrote:


<snip>
- draft: Such a function SHOULD be implemented in an objective and verifiable manner, basing its decisions upon the behavior of the flow rather than on application-layer constructs.
<snip>

Objectively verified against which requirements (a requirement which can be verified is, e.g.: a sending rate SHOULD average at least the configured rate when measured over any time interval equal to or longer than the time it takes to send an output link MTU sized packet at the configured rate).
The draft doesn’t contain neither a specification, nor a definition, what a flow is, and it doesn't determine requirements on flow rates, which can be verified. All it offers is descriptive text to the latter.

[GW] The statement is that the implementation should be both objective and verifiable, which it then clarifies to mean that it bases its decisions on flow behavior rather than on *what* a flow is. The immediately preceding sentence defines the "function" as being one that can identify flows that are inconsistent with the sender requirements in Section 4.1.    So, what we're trying to get at is that the decision to take action SHOULD be driven by these objective aspects, and that it SHOULD be possible to verify that this is the case (presumably by introducing flows with different behavioral characteristics, or I suppose by inspecting source code).   I think it is important to state this. 



-----Ursprüngliche Nachricht-----
Von: tsvwg <tsvwg-bounces@ietf.org <mailto:tsvwg-bounces@ietf.org>> Im Auftrag von internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>
Gesendet: Donnerstag, 12. Januar 2023 01:34
An: i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>
Cc: tsvwg@ietf.org <mailto:tsvwg@ietf.org>
Betreff: [tsvwg] I-D Action: draft-ietf-tsvwg-nqb-15.txt




A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Transport Area Working Group WG of the IETF.


Title : A Non-Queue-Building Per-Hop Behavior (NQB PHB) for Differentiated Services Authors : Greg White Thomas Fossati Filename : draft-ietf-tsvwg-nqb-15.txt Pages : 25 Date : 2023-01-11


Abstract:
This document specifies properties and characteristics of a Non- Queue-Building Per-Hop Behavior (NQB PHB). The purpose of this NQB PHB is to provide a separate queue that enables smooth, low-data- rate, application-limited traffic flows, which would ordinarily share a queue with bursty and capacity-seeking traffic, to avoid the latency, latency variation and loss caused by such traffic. This PHB is implemented without prioritization and can be implemented without rate policing, making it suitable for environments where the use of these features is restricted. The NQB PHB has been developed primarily for use by access network segments, where queuing delays and queuing loss caused by Queue-Building protocols are manifested, but its use is not limited to such segments. In particular, applications to cable broadband links, Wi-Fi links, and mobile network radio and core segments are discussed. This document recommends a specific Differentiated Services Code Point (DSCP) to identify Non-Queue-Building flows.




The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-tsvwg-nqb/ <https://datatracker.ietf.org/doc/draft-ietf-tsvwg-nqb/>


There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-tsvwg-nqb-15.html <https://www.ietf.org/archive/id/draft-ietf-tsvwg-nqb-15.html>


A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-ietf-tsvwg-nqb-15 <https://author-tools.ietf.org/iddiff?url2=draft-ietf-tsvwg-nqb-15>




Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts