From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-out02.uio.no (mail-out02.uio.no [IPv6:2001:700:100:8210::71]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.bufferbloat.net (Postfix) with ESMTPS id BF08E3CB37 for ; Sat, 23 Mar 2019 15:11:59 -0400 (EDT) Received: from mail-mx11.uio.no ([129.240.10.83]) by mail-out02.uio.no with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.91) (envelope-from ) id 1h7m3h-0004xH-Dq; Sat, 23 Mar 2019 20:11:57 +0100 Received: from 58.116.34.95.customer.cdi.no ([95.34.116.58] helo=[10.0.0.9]) by mail-mx11.uio.no with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) user michawe (Exim 4.91) (envelope-from ) id 1h7m3g-0000Bv-UX; Sat, 23 Mar 2019 20:11:57 +0100 Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\)) From: Michael Welzl In-Reply-To: Date: Sat, 23 Mar 2019 20:11:56 +0100 Cc: Luca Muscariello , Victor Hou , bloat@lists.bufferbloat.net Content-Transfer-Encoding: quoted-printable Message-Id: References: <2c8ad5fe4be5c52ad1a3c2bf7f91a09a@mail.gmail.com> <00674bef-877b-3ccc-9c8e-e7e06ee8e1cd@kit.edu> <00a6bc91-22f2-8971-cec9-8aed615d632b@kit.edu> To: Mikael Abrahamsson X-Mailer: Apple Mail (2.3445.102.3) X-UiO-SPF-Received: Received-SPF: neutral (mail-mx11.uio.no: 95.34.116.58 is neither permitted nor denied by domain of ifi.uio.no) client-ip=95.34.116.58; envelope-from=michawe@ifi.uio.no; helo=[10.0.0.9]; X-UiO-Spam-info: not spam, SpamAssassin (score=-5.0, required=5.0, autolearn=disabled, TVD_RCVD_IP=0.001, UIO_MAIL_IS_INTERNAL=-5, uiobl=NO, uiouri=NO) X-UiO-Scanned: C4D180D2E613E05D76C7E6C490F403C483B05760 Subject: Re: [Bloat] [Ecn-sane] [iccrg] Fwd: [tcpPrague] Implementation and experimentation of TCP Prague/L4S hackaton at IETF104 X-BeenThere: bloat@lists.bufferbloat.net X-Mailman-Version: 2.1.20 Precedence: list List-Id: General list for discussing Bufferbloat List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 23 Mar 2019 19:11:59 -0000 Our paper has some data - again, fig. 4. That=E2=80=99s an AS level = analysis, for the data that we had (which wasn=E2=80=99t huge - a couple = thousand paths). For the majority of measurements, the DSCP survived = more than 1 AS hop; in case of IPv6, the majority survived more than 2. Cheers, Michael > On Mar 23, 2019, at 7:40 PM, Mikael Abrahamsson = wrote: >=20 > On Sat, 23 Mar 2019, Luca Muscariello wrote: >=20 >> It the app runs in the cloud and the cloud has direct peering links = to your branch office or SP most likely DSCP works. >=20 > Do you have numbers to back this statement up? In my experience direct = peering links has nothing to do with this, instead remaking is done = equally at the customer edge and peering/transit edge respectively. >=20 > --=20 > Mikael Abrahamsson email: swmike@swm.pp.se