Discussion of explicit congestion notification's impact on the Internet
 help / color / mirror / Atom feed
From: Jonathan Morton <chromatix99@gmail.com>
To: Rich Brown <richb.hanover@gmail.com>
Cc: ecn-sane@lists.bufferbloat.net
Subject: Re: [Ecn-sane] Questions about TSVWG call
Date: Thu, 30 Apr 2020 20:55:49 +0300	[thread overview]
Message-ID: <7BF193B5-DF2E-493B-B8A7-B7CB5D4BABEA@gmail.com> (raw)
In-Reply-To: <2937CA62-6FCC-4E32-B7F5-11A6A485F1EE@gmail.com>

> On 30 Apr, 2020, at 8:28 pm, Rich Brown <richb.hanover@gmail.com> wrote:
> 
> I have been a bystander in these discussions, and could only listen in to part of the TSVWG conference call. But here are a couple questions that come to mind from what (I think) I heard...
> 
> 1) Has anyone run RRUL tests on L4S gear? What would be involved setting up such a test? Why hasn't it already been done?

I'm pretty sure the L4S team hasn't.  We're doing some runs now ourselves.  As for why, it might show up something inconvenient that doesn't look good for their marketing.

> 2) If I understand correctly, the L4S proposal is to use the ECT(1) bit as an input to the routing algorithm. If it's set, the router can assume that it's latency-sensitive traffic and use special routing rules/queues/etc. How does L4S guard against DoS/cheating? Has such a proposal been implemented and tested?

It's a fair question.  A "queue protection algorithm" is supposedly a MUST in the L4S spec, but we haven't seen a working implementation yet, and it rather undermines their claims that L4S doesn't require L4 header inspection.  I happen to think the real danger lies the other way, that with 1/p responses to CE legitimised, someone will alter a sender to be classed into the "classic" queue instead, squeezing out other traffic.  Y'know, like DCTCP does.

Because SCE doesn't rely on a classifier, no such danger exists for us.  We use a different method to ensure SCE traffic coexists nicely with conventional traffic.

> 3) The L4S proposal is designed to decrease latency. Can there be a successful L4S deployment in the face of the millions of current CPE that have no notion of latency control?

In a drop-tail queue, L4S is supposed to respond to lost packets with MD, and reserve the 1/p response solely for (at least) ECN enabled networks.  We found that functionality had not been very well tested, though they fixed the bug we found pretty quickly.  The major concern is with L4S' deployment into an Internet equipped with conventional AQMs and exhibiting significant jitter on real paths.

SCE works fine on any existing deployed network, with conventional behaviour as long as SCE signals are absent.  When the bottleneck is also SCE enabled, all flows passing through it benefit from the associated FQ or AF management, and SCE flows additionally get the benefits of high-fidelity congestion control.

> 4) I have a personal bias toward helping people with dreadfully slow ISP service. (My home can only get 7mbps/768kbps DSL; others in my town only get 3mbps/500kbps service.) Does L4S help for slow links like these?

Our testing has found that the "classic detection heuristic", intended to deal with existing AQM deployments, is triggered on slow links such as that (our example was at 5Mbps) even if they are L4S equipped, so no, there is no benefit from L4S there.

I think we can demonstrate SCE achieving better results here.  The goal for us is to achieve 100% link utilisation without incurring excess latency, and without breaking stuff that's already in use.

L4S tries to cut queue delay so low that, at anything less than 25Mbps, it takes longer to deliver a single packet.  So they can't reliably operate on ADSL at all.

 - Jonathan Morton

      reply	other threads:[~2020-04-30 17:55 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-04-30 17:28 Rich Brown
2020-04-30 17:55 ` Jonathan Morton [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

  List information: https://lists.bufferbloat.net/postorius/lists/ecn-sane.lists.bufferbloat.net/

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=7BF193B5-DF2E-493B-B8A7-B7CB5D4BABEA@gmail.com \
    --to=chromatix99@gmail.com \
    --cc=ecn-sane@lists.bufferbloat.net \
    --cc=richb.hanover@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox