From dave.taht at gmail.com Sun Jul 10 16:29:19 2022 From: dave.taht at gmail.com (Dave Taht) Date: Sun, 10 Jul 2022 13:29:19 -0700 Subject: [Ecn-sane] l4s threats Message-ID: https://assets.researchsquare.com/files/rs-1713495/v1_covered.pdf?c=1654295892 -- FQ World Domination pending: https://blog.cerowrt.org/post/state_of_fq_codel/ Dave Täht CEO, TekLibre, LLC From moeller0 at gmx.de Sun Jul 10 18:39:24 2022 From: moeller0 at gmx.de (Sebastian Moeller) Date: Mon, 11 Jul 2022 00:39:24 +0200 Subject: [Ecn-sane] l4s threats In-Reply-To: References: Message-ID: <439C4423-E453-49AC-9B67-398C0812F517@gmx.de> Hi Dave. Thanks a lot. I seems that the predicted "allergy" against bursty traffic indeed exists in L4S implementations in the field. This IMHO is problematic, given that some applications that are interested in low latency are also interested in sending bunches of packets ASAP, or put differently in bursts... Happy that actual research is done on this by outside groups that have no pony in the race. However I am not sure that their stated goal of retrofitting detection of and counter measures against bursty flows is going to solve the problem that a number of bona-fide low latency use-cases are also bursty. To put it bluntly, L4S seems having been developed without a deeper understanding of what kind of low latency service (at least some type of) applications actually desire/require. Puzzled as so often, on why this is being forced through the IETF process in spite of looking like it at best is half-baked. Regards Sebastian > On Jul 10, 2022, at 22:29, Dave Taht via Ecn-sane wrote: > > https://assets.researchsquare.com/files/rs-1713495/v1_covered.pdf?c=1654295892 > > -- > FQ World Domination pending: https://blog.cerowrt.org/post/state_of_fq_codel/ > Dave Täht CEO, TekLibre, LLC > _______________________________________________ > Ecn-sane mailing list > Ecn-sane at lists.bufferbloat.net > https://lists.bufferbloat.net/listinfo/ecn-sane