General list for discussing Bufferbloat
 help / color / mirror / Atom feed
From: Jonathan Morton <chromatix99@gmail.com>
To: Luca Muscariello <muscariello@ieee.org>
Cc: "Rodney W. Grimes" <ietf@gndrsh.dnsmgr.net>,
	tsvwg IETF list <tsvwg@ietf.org>,
	bloat <bloat@lists.bufferbloat.net>
Subject: Re: [Bloat] [tsvwg] my backlogged comments on the ECT(1) interim call
Date: Wed, 29 Apr 2020 12:46:20 +0300	[thread overview]
Message-ID: <4439559D-35A6-47A3-8827-BCA893FA3F3E@gmail.com> (raw)
In-Reply-To: <CAH8sseRAWppo_jLJQWMpjgw+-t3ksf40SN6t2-SJ-yMxHf2Pxw@mail.gmail.com>

> On 29 Apr, 2020, at 12:25 pm, Luca Muscariello <muscariello@ieee.org> wrote:
> 
> BTW, I hope I made the point about incentives to cheat, and the risks
> for unresponsive traffic for L4S when using ECT(1) as a trusted input.

One scenario that I think hasn't been highlighted yet, is the case of a transport which implements 1/p congestion control through CE, but marks itself as a "classic" transport.  We don't even have to imagine such a thing; it already exists as DCTCP, so is trivial for a bad (or merely ignorant) actor to implement.

Such a flow would squeeze out other traffic that correctly responds to CE with MD, and would not be "caught" by queue protection logic designed to protect the latency of the LL queue (as that has no effect on traffic in the classic queue).  It would only be corralled by an AQM which can act to isolate the effects of one flow on others; in this case AF would suffice, but FQ would also work.

This hazard already exists today.  However, the L4S proposal "legitimises" the use of 1/p congestion control using CE, and the subtlety that marking such traffic with a specific classifier is required for effective congestion control is likely to be lost on people focused entirely on their own throughput, as much of the Internet still is.

Using ECT(1) as an output from the network avoids this new hazard, by making it clear that 1/p CC behaviour is only acceptable on signals that unambiguously originate from an AQM which expects and can handle it.  The SCE proposal also inserts AF or FQ protection at these nodes, which serves as a prophylactic against the likes of DCTCP being used inappropriately on the Internet.

 - Jonathan Morton

      reply	other threads:[~2020-04-29  9:46 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-04-27 19:24 [Bloat] " Dave Taht
2020-04-28  8:53 ` Luca Muscariello
2020-04-28 17:12   ` Holland, Jake
2020-04-28 19:04     ` Luca Muscariello
     [not found]       ` <bad22a6b-698d-c85f-b829-6b5391833a1e@erg.abdn.ac.uk>
2020-04-28 19:38         ` [Bloat] [tsvwg] " Luca Muscariello
2020-04-28 19:43           ` Black, David
2020-04-28 19:59             ` Jonathan Morton
2020-04-28 20:33         ` Sebastian Moeller
2020-04-29  8:44       ` Rodney W. Grimes
2020-04-29  9:25         ` Luca Muscariello
2020-04-29  9:46           ` Jonathan Morton [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

  List information: https://lists.bufferbloat.net/postorius/lists/bloat.lists.bufferbloat.net/

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4439559D-35A6-47A3-8827-BCA893FA3F3E@gmail.com \
    --to=chromatix99@gmail.com \
    --cc=bloat@lists.bufferbloat.net \
    --cc=ietf@gndrsh.dnsmgr.net \
    --cc=muscariello@ieee.org \
    --cc=tsvwg@ietf.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox