From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-wr1-x42c.google.com (mail-wr1-x42c.google.com [IPv6:2a00:1450:4864:20::42c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by lists.bufferbloat.net (Postfix) with ESMTPS id E10713B29E for ; Wed, 29 Apr 2020 05:26:07 -0400 (EDT) Received: by mail-wr1-x42c.google.com with SMTP id k1so1633381wrx.4 for ; Wed, 29 Apr 2020 02:26:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ieee.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=FyuocCmY4bmymHkdFDWOQbhb2xpGujpVVnT1CBJvObU=; b=f6B67JF87iE7yD/5F72yc3DxaLiApT7QjGj3PeXs+LHABd5FPnmiB+mjMXTSwTiHUP 7CkPpGJ2+W7K8ifiNtbdKjG6cawxb3JeFazc/kGzetDITmP/QyDtZ3oTDprELf+ahfvg mh8HccpKq4TOgxz7w8Q8PG8ik80die9ULflvU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=FyuocCmY4bmymHkdFDWOQbhb2xpGujpVVnT1CBJvObU=; b=JTV4k3QpzxBvrsS3kTyDhWdRGrWue0LxbnHuF2WLu8jH+ypzAulOYyFZikOhD2QqnW qQNlFs5SjPA5pQfKBshITMnSkjQ79/LYMUijWpYuo+4EljYFj1h8LHvwQ3u0kg5QAtFL nXSx3ekHHh6nVKqwtWguqxMjF4U2MwQPUZvApaE1KFTZch3UzwmydKG1bXbn/h8/ZS+L h0QH7oOTwOmGIXfjQ31R6i9Lm/TI8rXd0ML1oAtg8rA0vnCVeSCIjzIudBobdzIvOvZW GuRbh7iMPSgIeGltA0vjSYyrucNLq8oluD/rYAYUndLc/KsCSb/QWZPMNbRIFA9Dl+2G ozow== X-Gm-Message-State: AGi0PuaTIB/lQSWqEHBreVhCVIn5g0/2zwRz8H/gvlyRe9rmXV49hLBT 0GwjQbf/SiHA+LpO+g2vaj+wfXlHmWhQhaR8RHV/Ag== X-Google-Smtp-Source: APiQypJD4af26panhxAeRpJhYXBneff+Q3Li0KG/JX06AI8sFaVUbXUskVpE3xJaNPaQqXkUpzix0pDqiOtLs2LsAlQ= X-Received: by 2002:adf:f648:: with SMTP id x8mr37356572wrp.257.1588152366792; Wed, 29 Apr 2020 02:26:06 -0700 (PDT) MIME-Version: 1.0 References: <202004290844.03T8ihOm008139@gndrsh.dnsmgr.net> In-Reply-To: <202004290844.03T8ihOm008139@gndrsh.dnsmgr.net> From: Luca Muscariello Date: Wed, 29 Apr 2020 11:25:55 +0200 Message-ID: To: "Rodney W. Grimes" Cc: "Holland, Jake" , tsvwg IETF list , bloat Content-Type: multipart/alternative; boundary="000000000000ac36f905a46a8978" Subject: Re: [Bloat] [tsvwg] my backlogged comments on the ECT(1) interim call X-BeenThere: bloat@lists.bufferbloat.net X-Mailman-Version: 2.1.20 Precedence: list List-Id: General list for discussing Bufferbloat List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 29 Apr 2020 09:26:08 -0000 --000000000000ac36f905a46a8978 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Hello Rodney, yes I agree. Elasticity may mean different things. BTW, I hope I made the point about incentives to cheat, and the risks for unresponsive traffic for L4S when using ECT(1) as a trusted input. My comments are mostly related to my experience with Cisco WebEx as a Cisco employee working on that. I do care about these applications! But I do care of all other on-line meetings apps. I'm sure we all do lately. These apps may have incentives to cheat. Other apps too. I know for sure Cisco WebEx does not cheat. Incentives to cheat will force everyone to cheat. I believe we do not want that. So I was talking about real-time video (media in general, including content sharing), transported using RTP/UDP. Not DAS video transported using HTTP/TCP. Typically the latter do not use FEC while the former do have FEC streams over defined RTP payload types. Luca On Wed, Apr 29, 2020 at 10:44 AM Rodney W. Grimes wrote: > Hello Luca, tsvwg'ers, > > I believe that there is some confusion around about how video > conference streams, and video *streams* in general differ from other > forms of traffic. I believe some of that confusion comes about not > only becasue of the FEC nature that many use but also over the terms > "elastic", "greedy" and "capacity seeking." > > Though video streams *do* adapt to network conditions, they > do so at fixed consumption steps, this is the elastic nature of a > video stream. They do not continually seek to find full bandwidth, > that is a greedy or capacity seeking flow which video streams are *not*. > > There is a differenece between watching a video vs downloading > a video on the internet. > > The above are *rough* statements, as the details are much more > involved with things like traffic burst of next frame chunk, and other > techniques that have come onto the market. I would love to hear from > an expert on the current true nature, but there was certainly some > mis-statements about video conference streams during the meeting. > > Regards, > Rod > > > Hi Jake, > > > > Thanks for the notes. Very useful. > > The other issue with the meeting was that the virtual mic queue control > > channel was the WebEx Meeting chat that does not exist in WebEx Teams. > So, > > I had to switch to Meetings and lost some pieces of the discussion. > > > > Yes there might be a terminology difference. Elastic traffic is usually > > used in the sense of bandwidth sharing not just to define variable bit > > rates. > > > > The point is that there are incentives to cheat in L4S. > > > > There is a priority queue that my application can enter by providing as > > input ECT(1). > > Applications such as on-line meetings will have a relatively low and > highly > > paced rate. > > > > This traffic is conformant to dualQ L queue but is unresponsive to > > congestion notifications. > > > > This is especially true for FEC streams which could be used to ameliora= te > > the media quality in presence of losses(e.g. Wi-Fi) > > or increased jitter. > > > > > > That was one more point on why using ECT(1) as input assumes trust or a > > black list after being caught. > > > > In both cases the ECT(1) as input is DoSable. > > > > > > > > On Tue, Apr 28, 2020 at 7:12 PM Holland, Jake > wrote: > > > > > Hi Luca, > > > > > > > > > > > > To your point about the discussion being difficult to follow: I tried > to > > > capture the intent of everyone who commented while taking notes: > > > > > > https://etherpad.ietf.org:9009/p/notes-ietf-interim-2020-tsvwg-03 > > > > > > > > > > > > I think this was intended to take the place of a need for everyone to > > > re-send the same points to the list, but of course some of the most > crucial > > > points could probably use fleshing out with on-list follow up. > > > > > > > > > > > > It got a bit rough in places because I was disconnected a few times a= nd > > > had to cut over to a local text file, and I may have failed to > correctly > > > understand or summarize some of the comments, so there?s chances I > might > > > have missed something, but I did my best to capture them all. > > > > > > > > > > > > I encourage people to review comments and check whether they came out > more > > > or less correct, and to offer formatting and cleanup suggestions if > there?s > > > a good way to make it easier to follow. > > > > > > > > > > > > I had timestamps at the beginning of each main point of discussion, > with > > > the intent that after the video is published it would be easier to go > back > > > and check precisely what was said. It looks like someone has been > making > > > cleanup edits that removed the first half of those so far, but my loc= al > > > text file still has most of those and I can go back and re-insert the= m > if > > > it seems useful. > > > > > > > > > > > > @Luca: during your comments in particular I think there might have > been a > > > disruption--I had a ?first comment missed, please check video? > placeholder > > > and I may have misunderstood the part about video elasticity, but my > > > interpretation at the time was that Stuart was claiming that video wa= s > > > elastic in that it would adjust downward to avoid overflowing a loade= d > > > link, and I thought you were claiming that it was not elastic in that > it > > > would not exceed a maximum rate, which I summarized as perhaps a > semantic > > > disagreement, but if you?d like to help clean that up, it might be > useful. > > > > > > > > > > > > From this message, it sounds like the key point you were making was > that > > > it also will not go below a certain rate, and perhaps that quality ca= n > stay > > > relatively good in spite of high network loss? > > > > > > > > > > > > Best regards, > > > > > > Jake > > > > > > > > > > > > *From: *Luca Muscariello > > > *Date: *Tuesday, April 28, 2020 at 1:54 AM > > > *To: *Dave Taht > > > *Cc: *tsvwg IETF list , bloat < > bloat@lists.bufferbloat.net > > > > > > > *Subject: *Re: [Bloat] my backlogged comments on the ECT(1) interim > call > > > > > > > > > > > > Hi Dave and list members, > > > > > > > > > > > > It was difficult to follow the discussion at the meeting yesterday. > > > > > > Who said what in the first place. > > > > > > > > > > > > There have been a lot of non-technical comments such as: this solutio= n > > > > > > is better than another in my opinion. "better" has often been used > > > > > > as when evaluating the taste of an ice cream: White chocolate vs blac= k > > > chocolate. > > > > > > This has taken a significant amount of time at the meeting. I haven't > > > learned > > > > > > much from that kind of discussion and I do not think that helped to > make > > > > > > much progress. > > > > > > > > > > > > If people can re-make their points in the list it would help the > debate. > > > > > > > > > > > > Another point that a few raised is that we have to make a decision as > fast > > > as possible. > > > > > > I dismissed entirely that argument. Trading off latency with > resilience of > > > the Internet > > > > > > is entirely against the design principle of the Internet architecture > > > itself. > > > > > > Risk analysis is something that we should keep in mind even when > > > deploying any experiment > > > > > > and should be a substantial part of it. > > > > > > > > > > > > Someone claimed that on-line meeting traffic is elastic. This is not > true, > > > I tried to > > > > > > clarify this. These applications (WebEx/Zoom) are low rate, a typical > > > maximum upstream > > > > > > rate is 2Mbps and is not elastic. These applications have often a > > > stand-alone app > > > > > > that is not using the browser WebRTC stack (the standalone app > typically > > > works better). > > > > > > > > > > > > A client sends upstream one or two video qualities unless the video > camera > > > is switched off. > > > > > > In presence of losses, FEC is used but it is still non elastic. > > > > > > Someone claimed (at yesterday's meeting) that fairness is not an issu= e > > > (who cares, I heard!) > > > > > > Well, fairness can constitute a differentiation advantage between two > > > companies that are > > > > > > commercializing on-line meetings products. Unless at the IETF we acce= pt > > > > > > "law-of-the-jungle" behaviours from Internet applications developers, > we > > > should be careful > > > > > > about making such claims. > > > > > > Any opportunity to cheat, that brings a business advantage WILL be > used. > > > > > > > > > > > > /Luca > > > > > > > > > > > > TL;DR > > > > > > To Dave: you asked several times what Cisco does on latency reductio= n > in > > > > > > network equipment. I tend to be very shy when replying on these > questions > > > > > > as this is not vendor neutral. If chairs think this is not appropriat= e > for > > > > > > the list, please say it and I'll reply privately only. > > > > > > > > > > > > What I write below can be found in Cisco products data sheets and is > not > > > > > > trade secret. There are very good blog posts explaining details. > > > > > > Not surprisingly Cisco implements the state of the art on the topic > > > > > > and it is totally feasible to do-the-right-thing in software and > hardware.. > > > > > > > > > > > > Cisco implements AFD (one queue + a flow table) accompanied by a > priority > > > queue for > > > > > > flows that have a certain profile in rate and size. The concept is we= ll > > > known and well > > > > > > studied in the literature. AFD is safe and can well serve a complex > > > traffic mix when > > > > > > accompanied by a priority queue. This prio-queue should not be confus= ed > > > with a strict > > > > > > priority queue (e.g. EF in diffserv). There are subtleties related to > the > > > DOCSIS > > > > > > shared medium which would be too long to describe here. > > > > > > > > > > > > This is available in Cisco CMTS for the DOCSIS segment. Bottleneck > traffic > > > > > > does not negatively impact non-bottlenecked-traffic such as an on-lin= e > > > meeting like > > > > > > the WebEx call we had yesterday. It is safe from a network neutrality > > > point-of-view > > > > > > and no applications get hurt. > > > > > > > > > > > > Cisco implements AFD+prio also for some DC switches such as the Nexus > 9k. > > > There > > > > > > is a blog post written by Tom Edsal online that explains pretty well > how > > > that works. > > > > > > This includes mechanisms such as p-fabric to approximate SRPT (shorte= st > > > remaining processing time) > > > > > > and minimize flow completion time for many DC workloads. The mix of > the two > > > > > > brings FCT minimization AND latency minimization. This is silicon and > > > scales at any speed. > > > > > > For those who are not familiar with these concepts, please search the > > > research work of Balaji > > > > > > Prabhakar and Ron Pang at Stanford. > > > > > > > > > > > > Wi-Fi: Cisco does airtime fairness in Aironet but I think in the Mera= ki > > > series too. > > > > > > The concept is similar to what described above but there are several > > > queues, one per STA. > > > > > > Packets are enqueued in the access (category) queue at dequeue time > from > > > the air-time > > > > > > packet scheduler. > > > > > > > > > > > > On Mon, Apr 27, 2020 at 9:24 PM Dave Taht wrote= : > > > > > > It looks like the majority of what I say below is not related to the > > > fate of the "bit". The push to take the bit was > > > strong with this one, and me... can't we deploy more of what we > > > already got in places where it matters? > > > > > > ... > > > > > > so: A) PLEA: From 10 years now, of me working on bufferbloat, working > > > on real end-user and wifi traffic and real networks.... > > > > > > I would like folk here to stop benchmarking two flows that run for a > long > > > time > > > and in one direction only... and thus exclusively in tcp congestion > > > avoidance mode. > > > > > > Please. just. stop. Real traffic looks nothing like that. The interne= t > > > looks nothing like that. > > > The netops folk I know just roll their eyes up at benchmarks like thi= s > > > that prove nothing and tell me to go to ripe meetings instead. > > > When y'all talk about "not looking foolish for not mandating ecn now"= , > > > you've already lost that audience with benchmarks like these. > > > > > > Sure, setup a background flow(s) like that, but then hit the result > > > with a mix of > > > far more normal traffic? Please? networks are never used > unidirectionally > > > and both directions congesting is frequent. To illustrate that > problem... > > > > > > I have a really robust benchmark that we have used throughout the > > > bufferbloat > > > project that I would like everyone to run in their environments, the > flent > > > "rrul" test. Everybody on both sides has big enough testbeds setup > that a > > > few > > > hours spent on doing that - and please add in asymmetric networks > > > especially - > > > and perusing the results ought to be enlightening to everyone as to t= he > > > kind > > > of problems real people have, on real networks. > > > > > > Can the L4S and SCE folk run the rrul test some day soon? Please? > > > > > > I rather liked this benchmark that tested another traffic mix, > > > > > > ( > > > > https://www.cablelabs.com/wp-content/uploads/2014/06/DOCSIS-AQM_May2014.p= df > > > < > https://urldefense.proofpoint.com/v2/url?u=3Dhttps-3A__www.cablelabs.com_= wp-2Dcontent_uploads_2014_06_DOCSIS-2DAQM-5FMay2014.pdf&d=3DDwMFaQ&c=3D96Zb= ZZcaMF4w0F4jpN6LZg&r=3DbqnFROivDo_4iF8Z3R4DyNWKbbMeXr0LOgLnElT1Ook&m=3Dj5nE= J3W8fRmqjnBSWapTVKj6dNbpegl4kSeynebCQT4&s=3DDrB4ENWjWbVu9SqtIh7lXKJj96fwm6T= qESC6E8_IdnY&e=3D > > > > > ) > > > > > > although it had many flaws (like not doing dns lookups), I wish it > > > could be dusted off and used to compare this > > > new fangled ecn enabled stuff with the kind of results you can merely > get > > > with packet loss and rtt awareness. It would be so great to be able > > > to directly compare all these new algorithms against this benchmark. > > > > > > Adding in a non ecn'd udp based routing protocol on heavily > > > oversubscribed 100mbit link is also enlightening. > > > > > > I'd rather like to see that benchmark improved for a more modernized > > > home traffic mix > > > where it is projected there may be 30 devices on the network on > average, > > > in a few years. > > > > > > If there is any one thing y'all can do to reduce my blood pressure an= d > > > keep me engaged here whilst you > > > debate the end of the internet as I understand it, it would be to run > > > the rrul test as part of all your benchmarks. > > > > > > thank you. > > > > > > B) Stuart Cheshire regaled us with several anecdotes - one concerning > > > his problems > > > with comcast's 1Gbit/35mbit service being unusable, under load, for > > > videoconferencing. This is true. The overbuffering at the CMTSes > > > still, has to be seen to be believed, at all rates. At lower rates > > > it's possible to shape this, with another device (which is what > > > the entire SQM deployment does in self defense and why cake has a > > > specific docsis ingress mode), but it is cpu intensive > > > and requires x86 hardware to do well at rates above 500Mbits, > presently. > > > > > > So I wish CMTS makers (Arris and Cisco) were in this room. are they? > > > > > > (Stuart, if you'd like a box that can make your comcast link > pleasurable > > > under all workloads, whenever you get back to los gatos, I've got a f= ew > > > lying around. Was so happy to get a few ietfers this past week to app= ly > > > what's off the shelf for end users today. :) > > > > > > C) I am glad bob said the L4S is finally looking at asymmetric > > > networks, and starting to tackle ack-filtering and accecn issues > > > there. > > > > > > But... I would have *started there*. Asymmetric access is the > predominate > > > form > > > of all edge technologies. > > > > > > I would love to see flent rrul test results for 1gig/35mbit, 100/10, > 200/10 > > > services, in particular. (from SCE also!). "lifeline" service (11/2) > > > would be good > > > to have results on. It would be especially good to have baseline > > > comparison data from the measured, current deployment > > > of the CMTSes at these rates, to start with, with no queue management > in > > > play, then pie on the uplink, then fq_codel on the uplink, and then > > > this ecn stuff, and so on. > > > > > > D) The two CPE makers in the room have dismissed both fq and sce as > > > being too difficult to implement. They did say that dualpi was > > > actually implemented in software, not hardware. > > > > > > I would certainly like them to benchmark what they plan to offer in L= 4S > > > vs what is already available in the edgerouter X, as one low end > > > example among thousands. > > > > > > I also have to note, at higher speeds, all the buffering moves into > > > the wifi and the results are currently ugly. I imagine > > > they are exploring how to fix their wifi stacks also? I wish more fol= k > > > were using RVR + latency benchmarks like this one: > > > > > > > > > > http://flent-newark.bufferbloat.net/~d/Airtime%20based%20queue%20limit%20= for%20FQ_CoDel%20in%20wireless%20interface.pdf > > > < > https://urldefense.proofpoint.com/v2/url?u=3Dhttp-3A__flent-2Dnewark.buff= erbloat.net_-7Ed_Airtime-2520based-2520queue-2520limit-2520for-2520FQ-5FCoD= el-2520in-2520wireless-2520interface.pdf&d=3DDwMFaQ&c=3D96ZbZZcaMF4w0F4jpN6= LZg&r=3DbqnFROivDo_4iF8Z3R4DyNWKbbMeXr0LOgLnElT1Ook&m=3Dj5nEJ3W8fRmqjnBSWap= TVKj6dNbpegl4kSeynebCQT4&s=3DUEzrGb3xL5zElDhYxB7wHpux1_SLFHGUcEkgTNMOe2Q&e= =3D > > > > > > > > Same goes for the LTE folk. > > > > > > E) Andrew mcgregor mentioned how great it would be for a closeted > musician > > > to > > > be able to play in real time with someone across town. that has been = my > > > goal > > > for nearly 30 years now!! And although I rather enjoyed his > participation > > > in > > > my last talk on the subject ( > > > > > > > https://blog.apnic.net/2020/01/22/bufferbloat-may-be-solved-but-its-not-o= ver-yet/ > > > < > https://urldefense.proofpoint.com/v2/url?u=3Dhttps-3A__blog.apnic.net_202= 0_01_22_bufferbloat-2Dmay-2Dbe-2Dsolved-2Dbut-2Dits-2Dnot-2Dover-2Dyet_&d= =3DDwMFaQ&c=3D96ZbZZcaMF4w0F4jpN6LZg&r=3DbqnFROivDo_4iF8Z3R4DyNWKbbMeXr0LOg= LnElT1Ook&m=3Dj5nEJ3W8fRmqjnBSWapTVKj6dNbpegl4kSeynebCQT4&s=3DBSDbzxnB7k7kr= FmkHv9id0BeDC6Vh39LgPNxyHUIg34&e=3D > > > > > ) conflating > > > a need for ecn and l4s signalling for low latency audio applications > > > with what I actually said in that talk, kind of hurt. I achieved > > > "my 2ms fiber based guitarist to fiber based drummer dream" 4+ years > > > back with fq_codel and diffserv, no ecn required, > > > no changes to the specs, no mandating packets be undroppable" and > > > would like to rip the opus codec out of that mix one day. > > > > > > F) I agree with jana that changing the definition of RFC3168 to suit > > > the RED algorithm (which is not pi or anything fancy) often present i= n > > > network switches, > > > today to suit dctcp, works. But you should say "configuring red to > > > have l4s marking style" and document that. > > > > > > Sometimes I try to point out many switches have a form of DRR in them= , > > > and it's helpful to use that in conjunction with whatever diffserv > > > markings you trust in your network. > > > > > > To this day I wish someone would publish how much they use DCTCP styl= e > > > signalling on a dc network relative to their other traffic. > > > > > > To this day I keep hoping that someone will publish a suitable > > > set of RED parameters for a wide variety of switches and routers - > > > for the most common switches and ethernet chips, for correct DCTCP > usage. > > > > > > Mellonox's example: > > > ( > > > > https://community.mellanox.com/s/article/howto-configure-ecn-on-mellanox-= ethernet-switches--spectrum-x > > > < > https://urldefense.proofpoint.com/v2/url?u=3Dhttps-3A__community.mellanox= .com_s_article_howto-2Dconfigure-2Decn-2Don-2Dmellanox-2Dethernet-2Dswitche= s-2D-2Dspectrum-2Dx&d=3DDwMFaQ&c=3D96ZbZZcaMF4w0F4jpN6LZg&r=3DbqnFROivDo_4i= F8Z3R4DyNWKbbMeXr0LOgLnElT1Ook&m=3Dj5nEJ3W8fRmqjnBSWapTVKj6dNbpegl4kSeynebC= QT4&s=3DnEIW1DhRXOHu3F5tMwpyO5rQUBMfCZx3Hs4wVvkVFIQ&e=3D > > > > > ) is not dctcp specific. > > > > > > many switches have a form of DRR in them, and it's helpful to use tha= t > > > in conjunction with whatever diffserv markings you trust in your > > > network, > > > and, as per the above example, segregate two red queues that way. Fro= m > > > what I see > > > above there is no way to differentiate ECT(0) from ECT(1) in that > switch. > > > (?) > > > > > > I do keep trying to point out the size of the end user ecn enabled > > > deployment, starting with the data I have from free.fr > > > < > https://urldefense.proofpoint.com/v2/url?u=3Dhttp-3A__free.fr&d=3DDwMFaQ&= c=3D96ZbZZcaMF4w0F4jpN6LZg&r=3DbqnFROivDo_4iF8Z3R4DyNWKbbMeXr0LOgLnElT1Ook&= m=3Dj5nEJ3W8fRmqjnBSWapTVKj6dNbpegl4kSeynebCQT4&s=3D7gswGhl21lejSnIiu3yyUTP= ZEArHqQG6hD64BoW2Zco&e=3D > >. > > > Are we > > > building a network for AIs or people? > > > > > > G) Jana also made a point about 2 queues "being enough" (I might be > > > mis-remembering the exact point). Mellonoxes ethernet chips at 10Gig > expose > > > 64 hardware queues, some new intel hardware exposes 2000+. How do the= se > > > queues work relative to these algorithms? > > > > > > We have generally found hw mq to be far less of a benefit than the > > > manufacturers think, especially as regard to > > > lower latency or reduced cpu usage (as cache crossing is a bear). > > > There is a lot of software work in this area left to be done, however > > > they are needed to match queues to cpus (and tenants) > > > > > > Until sch_pie gained timestamping support recently, the rate estimato= r > > > did not work correctly in a hw mq environment. Haven't looked over > > > dualpi in this respect. > > > > > > > > > > > > > > > > > > -- > > > Make Music, Not War > > > > > > Dave T?ht > > > CTO, TekLibre, LLC > > > http://www.teklibre.com > > > < > https://urldefense.proofpoint.com/v2/url?u=3Dhttp-3A__www.teklibre.com&d= =3DDwMFaQ&c=3D96ZbZZcaMF4w0F4jpN6LZg&r=3DbqnFROivDo_4iF8Z3R4DyNWKbbMeXr0LOg= LnElT1Ook&m=3Dj5nEJ3W8fRmqjnBSWapTVKj6dNbpegl4kSeynebCQT4&s=3DDqPVjNVWDmF4_= cwubNhhJS4Y1jCj71szPiBn9pmDZ70&e=3D > > > > > Tel: 1-831-435-0729 > > > _______________________________________________ > > > Bloat mailing list > > > Bloat@lists.bufferbloat.net > > > https://lists.bufferbloat.net/listinfo/bloat > > > < > https://urldefense.proofpoint.com/v2/url?u=3Dhttps-3A__lists.bufferbloat.= .net_listinfo_bloat&d=3DDwMFaQ&c=3D96ZbZZcaMF4w0F4jpN6LZg&r=3DbqnFROivDo_4i= F8Z3R4DyNWKbbMeXr0LOgLnElT1Ook&m=3Dj5nEJ3W8fRmqjnBSWapTVKj6dNbpegl4kSeynebC= QT4&s=3DDBDxIR6eSYcBOh7rqZx0PWzsHOfvvJeqioI3r2IQOA4&e=3D > > > > > > > > > > -- > Rod Grimes > rgrimes@freebsd.org > --000000000000ac36f905a46a8978 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Hello Rodney,

yes I agree. Elasticity may mean different things.

=
BTW, I hope I = made the point about incentives=C2=A0to cheat, and the risks
for unresponsive traffi= c for L4S when using ECT(1) as a trusted input.

My comments are mostly related to my exp= erience with Cisco WebEx as a=C2=A0Cisco employee
working=C2=A0on that.
I do care about these= applications! But I do care of all other on-line meetings apps.
I'm sure we all= do lately. These apps may have incentives to cheat. Other apps too.
<= div class=3D"gmail_default" style=3D"font-family:monospace">I know for sure= Cisco WebEx does not cheat.

Incentives to cheat will force everyone to cheat. I believe= we do not want that.

So I was talking about real-time video (media in general, includin= g content sharing),=C2=A0
transported=C2=A0using RTP/UDP. Not DAS video transported = using HTTP/TCP.

Typically the latter do not use FEC while the former do have FEC streams=
over def= ined RTP payload types.=C2=A0

Luca


On Wed, Apr 29, 2020 at 10:44 AM Rodney W. Grimes &l= t;ietf@gndrsh.dnsmgr.net> = wrote:
Hello Luc= a, tsvwg'ers,

=C2=A0 =C2=A0 =C2=A0 =C2=A0 I believe that there is some confusion around a= bout how video
conference streams, and video *streams* in general differ from other
forms of traffic.=C2=A0 I believe some of that confusion comes about not only becasue of the FEC nature that many use but also over the terms
"elastic", "greedy" and "capacity seeking."
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Though video streams *do* adapt to network cond= itions, they
do so at fixed consumption steps, this is the elastic nature of a
video stream.=C2=A0 They do not continually seek to find full bandwidth, that is a greedy or capacity seeking flow which video streams are *not*.
=C2=A0 =C2=A0 =C2=A0 =C2=A0 There is a differenece between watching a video= vs downloading
a video on the internet.

=C2=A0 =C2=A0 =C2=A0 =C2=A0 The above are *rough* statements, as the detail= s are much more
involved with things like traffic burst of next frame chunk, and other
techniques that have come onto the market.=C2=A0 I would love to hear from<= br> an expert on the current true nature, but there was certainly some
mis-statements about video conference streams during the meeting.

Regards,
Rod

> Hi Jake,
>
> Thanks for the notes. Very useful.
> The other issue with the meeting was that the virtual mic queue contro= l
> channel was the WebEx Meeting chat that does not exist in WebEx Teams.= So,
> I had to switch to Meetings and lost some pieces of the discussion. >
> Yes there might be a terminology difference. Elastic traffic is usuall= y
> used in the sense of bandwidth sharing not just to define variable bit=
> rates.
>
> The point is that there are incentives to cheat in L4S.
>
> There is a priority queue that my application can enter by providing a= s
> input ECT(1).
> Applications such as on-line meetings will have a relatively low and h= ighly
> paced rate.
>
> This traffic is conformant to dualQ L queue but is unresponsive to
> congestion notifications.
>
> This is especially true for FEC streams which could be used to amelior= ate
> the media quality in presence of losses(e.g. Wi-Fi)
> or increased jitter.
>
>
> That was one more point on why using ECT(1) as input assumes trust or = a
> black list after being caught.
>
> In both cases the ECT(1) as input is DoSable.
>
>
>
> On Tue, Apr 28, 2020 at 7:12 PM Holland, Jake <jholland@akamai.com> wrote:
>
> > Hi Luca,
> >
> >
> >
> > To your point about the discussion being difficult to follow: I t= ried to
> > capture the intent of everyone who commented while taking notes:<= br> > >
> > https://etherpad.ietf.org= :9009/p/notes-ietf-interim-2020-tsvwg-03
> >
> >
> >
> > I think this was intended to take the place of a need for everyon= e to
> > re-send the same points to the list, but of course some of the mo= st crucial
> > points could probably use fleshing out with on-list follow up. > >
> >
> >
> > It got a bit rough in places because I was disconnected a few tim= es and
> > had to cut over to a local text file, and I may have failed to co= rrectly
> > understand or summarize some of the comments, so there?s chances = I might
> > have missed something, but I did my best to capture them all.
> >
> >
> >
> > I encourage people to review comments and check whether they came= out more
> > or less correct, and to offer formatting and cleanup suggestions = if there?s
> > a good way to make it easier to follow.
> >
> >
> >
> > I had timestamps at the beginning of each main point of discussio= n, with
> > the intent that after the video is published it would be easier t= o go back
> > and check precisely what was said. It looks like someone has been= making
> > cleanup edits that removed the first half of those so far, but my= local
> > text file still has most of those and I can go back and re-insert= them if
> > it seems useful.
> >
> >
> >
> > @Luca: during your comments in particular I think there might hav= e been a
> > disruption--I had a ?first comment missed, please check video? pl= aceholder
> > and I may have misunderstood the part about video elasticity, but= my
> > interpretation at the time was that Stuart was claiming that vide= o was
> > elastic in that it would adjust downward to avoid overflowing a l= oaded
> > link, and I thought you were claiming that it was not elastic in = that it
> > would not exceed a maximum rate, which I summarized as perhaps a = semantic
> > disagreement, but if you?d like to help clean that up, it might b= e useful.
> >
> >
> >
> > From this message, it sounds like the key point you were making w= as that
> > it also will not go below a certain rate, and perhaps that qualit= y can stay
> > relatively good in spite of high network loss?
> >
> >
> >
> > Best regards,
> >
> > Jake
> >
> >
> >
> > *From: *Luca Muscariello <muscariello@ieee.org>
> > *Date: *Tuesday, April 28, 2020 at 1:54 AM
> > *To: *Dave Taht <dave.taht@gmail.com>
> > *Cc: *tsvwg IETF list <tsvwg@ietf.org>, bloat <bloat@lists.bufferbloat.net
> > >
> > *Subject: *Re: [Bloat] my backlogged comments on the ECT(1) inter= im call
> >
> >
> >
> > Hi Dave and list members,
> >
> >
> >
> > It was difficult to follow the discussion at the meeting yesterda= y.
> >
> > Who=C2=A0 said what in the first place.
> >
> >
> >
> > There have been a lot of non-technical comments such as: this sol= ution
> >
> > is better than another in my opinion. "better" has ofte= n been used
> >
> > as when evaluating the taste of an ice cream: White chocolate vs = black
> > chocolate.
> >
> > This has taken a significant amount of time at the meeting. I hav= en't
> > learned
> >
> > much from that kind of discussion and I do not think that helped = to make
> >
> > much progress.
> >
> >
> >
> > If people can re-make their points in the list it would help the = debate.
> >
> >
> >
> > Another point that a few raised is that we have to make a decisio= n as fast
> > as possible.
> >
> > I dismissed entirely that argument. Trading off latency with resi= lience of
> > the Internet
> >
> > is entirely against the design principle of the Internet architec= ture
> > itself.
> >
> > Risk analysis is something that we should keep in mind even when<= br> > > deploying any experiment
> >
> > and should be a substantial part of it.
> >
> >
> >
> > Someone claimed that on-line meeting traffic is elastic. This is = not true,
> > I tried to
> >
> > clarify this. These applications (WebEx/Zoom) are low rate, a typ= ical
> > maximum upstream
> >
> > rate is 2Mbps and is not elastic. These applications have often a=
> > stand-alone app
> >
> > that is not using the browser WebRTC stack (the standalone app ty= pically
> > works better).
> >
> >
> >
> > A client sends upstream one or two video qualities unless the vid= eo camera
> > is switched off.
> >
> > In presence of losses, FEC is used but it is still non elastic. > >
> > Someone claimed (at yesterday's meeting) that fairness is not= an issue
> > (who cares, I heard!)
> >
> > Well, fairness can constitute a differentiation advantage between= two
> > companies that are
> >
> > commercializing on-line meetings products. Unless at the IETF we = accept
> >
> > "law-of-the-jungle" behaviours from Internet applicatio= ns developers, we
> > should be careful
> >
> > about making such claims.
> >
> > Any opportunity to cheat, that brings a business advantage WILL b= e used.
> >
> >
> >
> > /Luca
> >
> >
> >
> > TL;DR
> >
> > To Dave: you asked several times what=C2=A0 Cisco does on latency= reduction in
> >
> > network equipment. I tend to be very shy when replying on these q= uestions
> >
> > as this is not vendor neutral. If chairs think this is not approp= riate for
> >
> > the list, please say it and I'll reply privately only.
> >
> >
> >
> > What I write below can be found in Cisco products data sheets and= is not
> >
> > trade secret. There are very good blog posts explaining details.<= br> > >
> > Not surprisingly Cisco implements the state of the art on the top= ic
> >
> > and it is totally feasible to do-the-right-thing in software and = hardware..
> >
> >
> >
> > Cisco implements AFD (one queue + a flow table) accompanied by a = priority
> > queue for
> >
> > flows that have a certain profile in rate and size. The concept i= s well
> > known and well
> >
> > studied in the literature. AFD is safe and can well serve a compl= ex
> > traffic mix when
> >
> > accompanied by a priority queue. This prio-queue should not be co= nfused
> > with a strict
> >
> > priority queue (e.g. EF in diffserv). There are subtleties relate= d to the
> > DOCSIS
> >
> > shared medium which would be too long to describe here.
> >
> >
> >
> > This is available in Cisco CMTS for the DOCSIS segment. Bottlenec= k traffic
> >
> > does not negatively impact non-bottlenecked-traffic such as an on= -line
> > meeting like
> >
> > the WebEx call we had yesterday. It is safe from a network neutra= lity
> > point-of-view
> >
> > and no applications get hurt.
> >
> >
> >
> > Cisco implements AFD+prio also for some DC switches such as the N= exus 9k.
> > There
> >
> > is a blog post written by Tom Edsal online that explains pretty w= ell how
> > that works.
> >
> > This includes mechanisms such as p-fabric to approximate SRPT (sh= ortest
> > remaining processing time)
> >
> > and minimize flow completion time for many DC workloads. The mix = of the two
> >
> > brings FCT minimization AND latency minimization. This is silicon= and
> > scales at any speed.
> >
> > For those who are not familiar with these concepts, please search= the
> > research work of Balaji
> >
> > Prabhakar and Ron Pang at Stanford.
> >
> >
> >
> > Wi-Fi: Cisco does airtime fairness in Aironet but I think in the = Meraki
> > series too.
> >
> > The concept is similar to what described above but there are seve= ral
> > queues, one per STA.
> >
> > Packets are enqueued in the access (category) queue at dequeue ti= me from
> > the air-time
> >
> > packet scheduler.
> >
> >
> >
> > On Mon, Apr 27, 2020 at 9:24 PM Dave Taht <dave.taht@gmail.com> wrote: > >
> > It looks like the majority of what I say below is not related to = the
> > fate of the "bit". The push to take the bit was
> > strong with this one, and me... can't we deploy more of what = we
> > already got in places where it matters?
> >
> > ...
> >
> > so: A) PLEA: From 10 years now, of me working on bufferbloat, wor= king
> > on real end-user and wifi traffic and real networks....
> >
> > I would like folk here to stop benchmarking two flows that run fo= r a long
> > time
> > and in one direction only... and thus exclusively in tcp congesti= on
> > avoidance mode.
> >
> > Please. just. stop. Real traffic looks nothing like that. The int= ernet
> > looks nothing like that.
> > The netops folk I know just roll their eyes up at benchmarks like= this
> > that prove nothing and tell me to go to ripe meetings instead. > > When y'all talk about "not looking foolish for not manda= ting ecn now",
> > you've already lost that audience with benchmarks like these.=
> >
> > Sure, setup a background flow(s)=C2=A0 like that, but then hit th= e result
> > with a mix of
> > far more normal traffic? Please? networks are never used unidirec= tionally
> > and both directions congesting is frequent. To illustrate that pr= oblem...
> >
> > I have a really robust benchmark that we have used throughout the=
> > bufferbloat
> > project that I would like everyone to run in their environments, = the flent
> > "rrul" test. Everybody on both sides has big enough tes= tbeds setup that a
> > few
> > hours spent on doing that - and please add in asymmetric networks=
> > especially -
> > and perusing the results ought to be enlightening to everyone as = to the
> > kind
> > of problems real people have, on real networks.
> >
> > Can the L4S and SCE folk run the rrul test some day soon? Please?=
> >
> > I rather liked this benchmark that tested another traffic mix, > >
> > (
> > https://www.cab= lelabs.com/wp-content/uploads/2014/06/DOCSIS-AQM_May2014.pdf
> > <https://urldefense.proofpoint.com/v2/url?u=3Dht= tps-3A__www.cablelabs.com_wp-2Dcontent_uploads_2014_06_DOCSIS-2DAQM-5FMay20= 14.pdf&d=3DDwMFaQ&c=3D96ZbZZcaMF4w0F4jpN6LZg&r=3DbqnFROivDo_4iF= 8Z3R4DyNWKbbMeXr0LOgLnElT1Ook&m=3Dj5nEJ3W8fRmqjnBSWapTVKj6dNbpegl4kSeyn= ebCQT4&s=3DDrB4ENWjWbVu9SqtIh7lXKJj96fwm6TqESC6E8_IdnY&e=3D>=
> > )
> >
> > although it had many flaws (like not doing dns lookups), I wish i= t
> > could be dusted off and used to compare this
> > new fangled ecn enabled stuff with the kind of results you can me= rely get
> > with packet loss and rtt awareness. It would be so great to be ab= le
> > to directly compare all these new algorithms against this benchma= rk.
> >
> > Adding in a non ecn'd udp based routing protocol on heavily > > oversubscribed 100mbit link is also enlightening.
> >
> > I'd rather like to see that benchmark improved for a more mod= ernized
> > home traffic mix
> > where it is projected there may be 30 devices on the network on a= verage,
> > in a few years.
> >
> > If there is any one thing y'all can do to reduce my blood pre= ssure and
> > keep me engaged here whilst you
> > debate the end of the internet as I understand it, it would be to= run
> > the rrul test as part of all your benchmarks.
> >
> > thank you.
> >
> > B) Stuart Cheshire regaled us with several anecdotes - one concer= ning
> > his problems
> > with comcast's 1Gbit/35mbit service being unusable, under loa= d, for
> > videoconferencing. This is true. The overbuffering at the CMTSes<= br> > > still, has to be seen to be believed, at all rates. At lower rate= s
> > it's possible to shape this, with another device (which is wh= at
> > the entire SQM deployment does in self defense and why cake has a=
> > specific docsis ingress mode), but it is cpu intensive
> > and requires x86 hardware to do well at rates above 500Mbits, pre= sently.
> >
> > So I wish CMTS makers (Arris and Cisco) were in this room. are th= ey?
> >
> > (Stuart, if you'd like a box that can make your comcast link = pleasurable
> > under all workloads, whenever you get back to los gatos, I've= got a few
> > lying around. Was so happy to get a few ietfers this past week to= apply
> > what's off the shelf for end users today. :)
> >
> > C) I am glad bob said the L4S is finally looking at asymmetric > > networks, and starting to tackle ack-filtering and accecn issues<= br> > > there.
> >
> > But... I would have *started there*. Asymmetric access is the pre= dominate
> > form
> > of all edge technologies.
> >
> > I would love to see flent rrul test results for 1gig/35mbit, 100/= 10, 200/10
> > services, in particular. (from SCE also!). "lifeline" s= ervice (11/2)
> > would be good
> > to have results on. It would be especially good to have baseline<= br> > > comparison data from the measured, current deployment
> > of the CMTSes at these rates, to start with, with no queue manage= ment in
> > play, then pie on the uplink, then fq_codel on the uplink, and th= en
> > this ecn stuff, and so on.
> >
> > D) The two CPE makers in the room have dismissed both fq and sce = as
> > being too difficult to implement. They did say that dualpi was > > actually implemented in software, not hardware.
> >
> > I would certainly like them to benchmark what they plan to offer = in L4S
> > vs what is already available in the edgerouter X, as one low end<= br> > > example among thousands.
> >
> > I also have to note, at higher speeds, all the buffering moves in= to
> > the wifi and the results are currently ugly. I imagine
> > they are exploring how to fix their wifi stacks also? I wish more= folk
> > were using RVR + latency benchmarks like this one:
> >
> >
> > http://flent-newark.bufferbloat.net/~d/Airtime= %20based%20queue%20limit%20for%20FQ_CoDel%20in%20wireless%20interface.pdf
> > <
https://urldefense.proofpoint.com/v2/url?u=3Dhttp-3A__flent-2D= newark.bufferbloat.net_-7Ed_Airtime-2520based-2520queue-2520limit-2520for-2= 520FQ-5FCoDel-2520in-2520wireless-2520interface.pdf&d=3DDwMFaQ&c=3D= 96ZbZZcaMF4w0F4jpN6LZg&r=3DbqnFROivDo_4iF8Z3R4DyNWKbbMeXr0LOgLnElT1Ook&= amp;m=3Dj5nEJ3W8fRmqjnBSWapTVKj6dNbpegl4kSeynebCQT4&s=3DUEzrGb3xL5zElDh= YxB7wHpux1_SLFHGUcEkgTNMOe2Q&e=3D>
> >
> > Same goes for the LTE folk.
> >
> > E) Andrew mcgregor mentioned how great it would be for a closeted= musician
> > to
> > be able to play in real time with someone across town. that has b= een my
> > goal
> > for nearly 30 years now!! And although I rather enjoyed his parti= cipation
> > in
> > my last talk on the subject (
> >
> > https://b= log.apnic.net/2020/01/22/bufferbloat-may-be-solved-but-its-not-over-yet/
> > <
https://urldefense.proofpoint.c= om/v2/url?u=3Dhttps-3A__blog.apnic.net_2020_01_22_bufferbloat-2Dmay-2Dbe-2D= solved-2Dbut-2Dits-2Dnot-2Dover-2Dyet_&d=3DDwMFaQ&c=3D96ZbZZcaMF4w0= F4jpN6LZg&r=3DbqnFROivDo_4iF8Z3R4DyNWKbbMeXr0LOgLnElT1Ook&m=3Dj5nEJ= 3W8fRmqjnBSWapTVKj6dNbpegl4kSeynebCQT4&s=3DBSDbzxnB7k7krFmkHv9id0BeDC6V= h39LgPNxyHUIg34&e=3D>
> > ) conflating
> > a need for ecn and l4s signalling for low latency audio applicati= ons
> > with what I actually said in that talk, kind of hurt. I achieved<= br> > > "my 2ms fiber based guitarist to fiber based drummer dream&q= uot; 4+ years
> > back with fq_codel and diffserv, no ecn required,
> > no changes to the specs, no mandating packets be undroppable"= ; and
> > would like to rip the opus codec out of that mix one day.
> >
> > F) I agree with jana that changing the definition of RFC3168 to s= uit
> > the RED algorithm (which is not pi or anything fancy) often prese= nt in
> > network switches,
> > today to suit dctcp, works. But you should say "configuring = red to
> > have l4s marking style" and document that.
> >
> > Sometimes I try to point out many switches have a form of DRR in = them,
> > and it's helpful to use that in conjunction with whatever dif= fserv
> > markings you trust in your network.
> >
> > To this day I wish someone would publish how much they use DCTCP = style
> > signalling on a dc network relative to their other traffic.
> >
> > To this day I keep hoping that someone will publish a suitable > > set of RED parameters for a wide variety of switches and routers = -
> > for the most common switches and ethernet chips, for correct DCTC= P usage.
> >
> > Mellonox's example:
> > (
> > https://community.mellanox.com/s/article/howto-configure-ecn-on= -mellanox-ethernet-switches--spectrum-x
> > <https://= urldefense.proofpoint.com/v2/url?u=3Dhttps-3A__community.mellanox.com_s_art= icle_howto-2Dconfigure-2Decn-2Don-2Dmellanox-2Dethernet-2Dswitches-2D-2Dspe= ctrum-2Dx&d=3DDwMFaQ&c=3D96ZbZZcaMF4w0F4jpN6LZg&r=3DbqnFROivDo_= 4iF8Z3R4DyNWKbbMeXr0LOgLnElT1Ook&m=3Dj5nEJ3W8fRmqjnBSWapTVKj6dNbpegl4kS= eynebCQT4&s=3DnEIW1DhRXOHu3F5tMwpyO5rQUBMfCZx3Hs4wVvkVFIQ&e=3D&= gt;
> > ) is not dctcp specific.
> >
> > many switches have a form of DRR in them, and it's helpful to= use that
> > in conjunction with whatever diffserv markings you trust in your<= br> > > network,
> > and, as per the above example, segregate two red queues that way.= From
> > what I see
> > above there is no way to differentiate ECT(0) from ECT(1) in that= switch.
> > (?)
> >
> > I do keep trying to point out the size of the end user ecn enable= d
> > deployment, starting with the data I have from free.fr
> > <https://urldefense.proofpoint.com/v2/ur= l?u=3Dhttp-3A__free.fr&d=3DDwMFaQ&c=3D96ZbZZcaMF4w0F4jpN6LZg&r= =3DbqnFROivDo_4iF8Z3R4DyNWKbbMeXr0LOgLnElT1Ook&m=3Dj5nEJ3W8fRmqjnBSWapT= VKj6dNbpegl4kSeynebCQT4&s=3D7gswGhl21lejSnIiu3yyUTPZEArHqQG6hD64BoW2Zco= &e=3D>.
> > Are we
> > building a network for AIs or people?
> >
> > G) Jana also made a point about 2 queues "being enough"= (I might be
> > mis-remembering the exact point). Mellonoxes ethernet chips at 10= Gig expose
> > 64 hardware queues, some new intel hardware exposes 2000+. How do= these
> > queues work relative to these algorithms?
> >
> > We have generally found hw mq to be far less of a benefit than th= e
> > manufacturers think, especially as regard to
> > lower latency or reduced cpu usage (as cache crossing is a bear).=
> > There is a lot of software work in this area left to be done, how= ever
> > they are needed to match queues to cpus (and tenants)
> >
> > Until sch_pie gained timestamping support recently, the rate esti= mator
> > did not work correctly in a hw mq environment. Haven't looked= over
> > dualpi in this respect.
> >
> >
> >
> >
> >
> > --
> > Make Music, Not War
> >
> > Dave T?ht
> > CTO, TekLibre, LLC
> > http://www.teklibre.com
> > <https://urldefense.proofpoint.= com/v2/url?u=3Dhttp-3A__www.teklibre.com&d=3DDwMFaQ&c=3D96ZbZZcaMF4= w0F4jpN6LZg&r=3DbqnFROivDo_4iF8Z3R4DyNWKbbMeXr0LOgLnElT1Ook&m=3Dj5n= EJ3W8fRmqjnBSWapTVKj6dNbpegl4kSeynebCQT4&s=3DDqPVjNVWDmF4_cwubNhhJS4Y1j= Cj71szPiBn9pmDZ70&e=3D>
> > Tel: 1-831-435-0729
> > _______________________________________________
> > Bloat mailing list
> > = Bloat@lists.bufferbloat.net
> > https://lists.bufferbloat.net/listinfo/bloat
> > <
https://= urldefense.proofpoint.com/v2/url?u=3Dhttps-3A__lists.bufferbloat..net_listi= nfo_bloat&d=3DDwMFaQ&c=3D96ZbZZcaMF4w0F4jpN6LZg&r=3DbqnFROivDo_= 4iF8Z3R4DyNWKbbMeXr0LOgLnElT1Ook&m=3Dj5nEJ3W8fRmqjnBSWapTVKj6dNbpegl4kS= eynebCQT4&s=3DDBDxIR6eSYcBOh7rqZx0PWzsHOfvvJeqioI3r2IQOA4&e=3D&= gt;
> >
> >

--
Rod Grimes=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 = =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0rgrimes@freebsd.org
--000000000000ac36f905a46a8978--