From: Sebastian Moeller <moeller0@gmx.de>
To: Jonathan Morton <chromatix99@gmail.com>
Cc: cake@lists.bufferbloat.net
Subject: Re: [Cake] ieee vs ietf stds for dscp mappings
Date: Sat, 14 Nov 2015 20:17:52 +0100 [thread overview]
Message-ID: <221B4D68-769D-4898-9847-BA96A4EC1B05@gmx.de> (raw)
In-Reply-To: <E5825F37-87FD-4729-AD30-F60042FC3650@gmail.com>
Hi Jonathan,
thanks for the long reply.
On Nov 14, 2015, at 17:46 , Jonathan Morton <chromatix99@gmail.com> wrote:
>
>> On 14 Nov, 2015, at 17:53, Sebastian Moeller <moeller0@gmx.de> wrote:
>>
>> Is anybody actually using any of that? The set of differences between the schemes as RFCd for the different technologies makes me believe nobody is ever using more than one of those domains.
>
> That’s part of the problem. The various recommendations conflict with each other and with actual practice.
That is the base for my hypothesis that they are not used in conjunction, as that would not work too well. On the other hand maybe it works good enough/ better than without DSCP so people might just not care about the fine print?
>
> Note in particular the different treatments just of CS0 (default, and defined as Best Effort) and CS1 (defined as Background Traffic) - RFC 7561 actually gets them backwards! The Szigeti-Baker draft is relatively sane and comprehensive, even though it differs from Cake’s schema in detail.
>
> The core of the problem is that Diffserv was originally specified without a complete, working implementation of its PHBs (Per Hop Behaviours). AFAIK, no such implementation exists to date - certainly no public one. So there are ad-hoc, locally-defined approximations all over the place, and my chart illustrates some of that.
>
> As well as the PHBs being poorly defined, it has become general practice for *networks* to set the DSCPs on traffic passing through them, rather than applications setting them at the endpoints. This makes it difficult for applications to express their traffic characteristics and transport needs in general. However, I think this practice has arisen because applications have not bothered to set their own DSCPs, due to their having no effect in most networks.
Well any equipment actually looking at the DSCP will need to consider whether the network owner approved of that marking. In other swords it might make a lot of sense to separate the 6b bits into 2 groups of 3 bits, one group for the current network’s effective markings and three for the endpoints to signal their intent. I realize that this still has the issue that one needs to trust the upstream enough to not have fudged the intent bits… but at least this idea realizes that the 6 bits have different parties interested in using them… I guess the only solution for the trust thing is a tunneled connection, then one only needs to trust the sender to accept the encrypted IP header’s DSCP markings.
>
> Dave noted previously that a lot of traffic gets marked as CS1 in Comcast’s network. I’ve recently noticed the same about the Elisa/Saunalahti network over here, having got myself a 4G-capable receiver that came with a prepaid 1-month Saunalahti SIM. DNA, my usual network, does something different - not sure whether it just doesn’t bother changing DSCPs, or does something more complex.
It might just do proper hygiene and rem app everything to DSCP 0 as not to leak internal network details outside DNA’s own network; I believe this is a functionality cake hold learn (I think Kevin implemented a branch allowing that…)
Best Regards
Sebastian
>
> - Jonathan Morton
>
next prev parent reply other threads:[~2015-11-14 19:17 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-11-14 12:42 Dave Taht
2015-11-14 12:43 ` Dave Taht
2015-11-14 13:55 ` Jonathan Morton
2015-11-14 14:09 ` Dave Taht
2015-11-14 15:53 ` Sebastian Moeller
2015-11-14 16:46 ` Jonathan Morton
2015-11-14 19:17 ` Sebastian Moeller [this message]
2015-11-15 14:52 ` Toke Høiland-Jørgensen
2015-11-15 15:35 ` Sebastian Moeller
2015-11-15 21:20 ` Stephen Hemminger
2015-11-15 21:39 ` Jonathan Morton
2015-11-15 21:40 ` Sebastian Moeller
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
List information: https://lists.bufferbloat.net/postorius/lists/cake.lists.bufferbloat.net/
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=221B4D68-769D-4898-9847-BA96A4EC1B05@gmx.de \
--to=moeller0@gmx.de \
--cc=cake@lists.bufferbloat.net \
--cc=chromatix99@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox