<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body text="#000000" bgcolor="#FFFFFF">
Sebastien,<br>
<br>
Sry, I sent that last reply too early, and not bottom posted. Both
corrected below (tagged [BB]):<br>
<br>
<br>
<div class="moz-cite-prefix">On 25/07/2019 16:51, Bob Briscoe wrote:<br>
</div>
<blockquote type="cite"
cite="mid:77522c07-6f2e-2491-ba0e-cbef62aad194@bobbriscoe.net">
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
Sebastien,<br>
<br>
<br>
<div class="moz-cite-prefix">On 21/07/2019 16:48, Sebastian
Moeller wrote:<br>
</div>
<blockquote type="cite"
cite="mid:E031B993-DAAF-4BE4-A542-33C44310D6E9@gmx.de">
<pre class="moz-quote-pre" wrap="">Dear Bob,
</pre>
<blockquote type="cite">
<pre class="moz-quote-pre" wrap="">On Jul 21, 2019, at 21:14, Bob Briscoe <a class="moz-txt-link-rfc2396E" href="mailto:ietf@bobbriscoe.net" moz-do-not-send="true"><ietf@bobbriscoe.net></a> wrote:
Sebastien,
On 21/07/2019 17:08, Sebastian Moeller wrote:
</pre>
<blockquote type="cite">
<pre class="moz-quote-pre" wrap="">Hi Bob,
</pre>
<blockquote type="cite">
<pre class="moz-quote-pre" wrap="">On Jul 21, 2019, at 14:30, Bob Briscoe <a class="moz-txt-link-rfc2396E" href="mailto:ietf@bobbriscoe.net" moz-do-not-send="true"><ietf@bobbriscoe.net></a>
wrote:
David,
On 19/07/2019 21:06, Black, David wrote:
</pre>
<blockquote type="cite">
<pre class="moz-quote-pre" wrap="">Two comments as an individual, not as a WG chair:
</pre>
<blockquote type="cite">
<pre class="moz-quote-pre" wrap="">Mostly, they're things that an end-host algorithm needs
to do in order to behave nicely, that might be good things anyways
without regard to L4S in the network (coexist w/ Reno, avoid RTT bias,
work well w/ small RTT, be robust to reordering). I am curious which
ones you think are too rigid ... maybe they can be loosened?
</pre>
</blockquote>
<pre class="moz-quote-pre" wrap="">[1] I have profoundly objected to L4S's RACK-like requirement (use time to detect loss, and in particular do not use 3DupACK) in public on multiple occasions, because in reliable transport space, that forces use of TCP Prague, a protocol with which we have little to no deployment or operational experience. Moreover, that requirement raises the bar for other protocols in a fashion that impacts endpoint firmware, and possibly hardware in some important (IMHO) environments where investing in those changes delivers little to no benefit. The environments that I have in mind include a lot of data centers. Process wise, I'm ok with addressing this objection via some sort of "controlled environment" escape clause text that makes this RACK-like requirement inapplicable in a "controlled environment" that does not need that behavior (e.g., where 3DupACK does not cause problems and is not expected to cause problems).
For clarity, I understand the multi-lane link design rationale behind the RACK-like requirement and would agree with that requirement in a perfect world ... BUT ... this world is not perfect ... e.g., 3DupACK will not vanish from "running code" anytime soon.
</pre>
</blockquote>
<pre class="moz-quote-pre" wrap="">As you know, we have been at pains to address every concern about L4S that has come up over the years, and I thought we had addressed this one to your satisfaction.
The reliable transports you are are concerned about require ordered delivery by the underlying fabric, so they can only ever exist in a controlled environment. In such a controlled environment, your ECT1+DSCP idea (below) could be used to isolate the L4S experiment from these transports and their firmware/hardware constraints.
On the public Internet, the DSCP commonly gets wiped at the first hop. So requiring a DSCP as well as ECT1 to separate off L4S would serve no useful purpose: it would still lead to ECT1 packets without the DSCP sent from a scalable congestion controls (which is behind Jonathan's concern in response to you).
</pre>
</blockquote>
<pre class="moz-quote-pre" wrap=""> And this is why IPv4's protocol fiel/ IPv6's next header field are the classifier you actually need... You are changing a significant portion of TCP's observable behavior, so it can be argued that TCP-Prague is TCP by name only; this "classifier" still lives in the IP header, so no deeper layer's need to be accessed, this is non-leaky in that the classifier is unambiguously present independent of the value of the ECN bits; and it is also compatible with an SCE style ECN signaling. Since I believe the most/only likely roll-out of L4S is going to be at the ISPs access nodes (BRAS/BNG/CMTS/whatever) middleboxes shpould not be an unsurmountable problem, as ISPs controll their own middleboxes and often even the CPEs, so protocoll ossification is not going to be a showstopper for this part of the roll-out.
Best Regards
Sebastian
</pre>
</blockquote>
<pre class="moz-quote-pre" wrap="">I think you've understood this from reading abbreviated description of the requirement on the list, rather than the spec. The spec. solely says:
A scalable congestion control MUST detect loss by counting in time-based units
That's all. No more, no less.
People call this the "RACK requirement", purely because the idea came from RACK. There is no requirement to do RACK, and the requirement applies to all transports, not just TCP.
</pre>
</blockquote>
<pre class="moz-quote-pre" wrap=""> Fair enough, but my argument was not really about RACK at all, it more-so applies to the linear response to CE-marks that ECT(1) promises in the L4S approach. You are making changes to TCP's congestion controller that make it cease to be "TCP-friendly" (for arguably good reasons). So why insist on pretending that this is still TCP? So give it a new protocol ID already and all your classification needs are solved. As a bonus you do not need to use the same signal (CE) to elicit two different responses, but you could use the re-gained ECT(1) code point similarly to SCE to put the new fine-grained congestion signal into... while using CE in the RFC3168 compliant sense.</pre>
</blockquote>
</blockquote>
<br>
[BB] The protocol ID identifies the wire protocol, not the
congestion control behaviour. If we had used a different protocol ID
for each congestion control behaviour, we'd have run out of protocol
IDs long ago (semi serious ;)<br>
<br>
This is a re-run of a debate that has already been had (in Jul 2015
- Nov 2016), which is recorded in the appendix of ecn-l4s-id here:<br>
<a class="moz-txt-link-freetext"
href="https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-l4s-id-07#appendix-B.4">https://tools.ietf.org/html/draft-ietf-tsvwg-ecn-l4s-id-07#appendix-B.4</a><br>
Quoted and annotated below:<br>
<br>
<pre class="newpage"><blockquote type="cite"><pre class="newpage">B.4. Protocol ID
It has been suggested that a new ID in the IPv4 Protocol field or the
IPv6 Next Header field could identify L4S packets. However this
approach is ruled out by numerous problems:
o A new protocol ID would need to be paired with the old one for
each transport (TCP, SCTP, UDP, etc.);
o In IPv6, there can be a sequence of Next Header fields, and it
would not be obvious which one would be expected to identify a
network service like L4S;</pre></blockquote></pre>
In particular, the protocol ID / next header stays next to the upper
layer header as a PDU gets encapsulated, possibly many times. So the
protocol ID is not necessarily (rarely?) in the outer, particularly
in IPv6, and it might be encrypted in IPSec.<br>
<br>
<pre class="newpage"><blockquote type="cite"><pre class="newpage"> o A new protocol ID would rarely provide an end-to-end service,
because It is well-known that new protocol IDs are often blocked
by numerous types of middlebox;
o The approach is not a solution for AQMs below the IP layer;</pre>
</blockquote></pre>
That last point means that the protocol ID is not designed to always
propagate to the outer on encap and back from the outer on decap,
whereas the ECN field is (and it's the only field that is).<br>
<br>
more....
<blockquote type="cite"
cite="mid:77522c07-6f2e-2491-ba0e-cbef62aad194@bobbriscoe.net">
<blockquote type="cite"
cite="mid:E031B993-DAAF-4BE4-A542-33C44310D6E9@gmx.de">
<pre class="moz-quote-pre" wrap="">
</pre>
<blockquote type="cite">
<pre class="moz-quote-pre" wrap="">It then means that a packet with ECT1 in the IP field can be forwarded without resequencing (no requirement - it just it /can/ be).
</pre>
</blockquote>
<pre class="moz-quote-pre" wrap=""> Packets always "can" be forwarded without resequencing, the question is whether the end-points are going to like that...
And IMHO even RACK with its at maximum one RTT reordering windows gives intermediate hops not much to work with, without knowing the full RTT a cautious hop might allow itself one retransmission slot (so its own contribution to the RTT), but as far as I can tell they do that already. And tracking the RTT will require to keep per flow statistics, this also seems like it can get computationally expensive quickly... (I probably misunderstand how RACK works, but I fail to see how it will really allow more re-ordering, but that is also orthogonal to the L4S issues I try to raise).</pre>
</blockquote>
</blockquote>
[BB] No-one's suggesting reordering degree will adapt to measured
RTT at run-time. <br>
<br>
See the original discussion on this point here:<br>
<a moz-do-not-send="true"
href="https://mailarchive.ietf.org/arch/msg/tcpm/QOhMjHEo2kbHGInH8eFEsXbdwkA">Vicious
or Virtuous circle? Adapting reordering window to reordering
degree</a><br>
<br>
In summary, the uncertainty for the network is a feature not a bug.
It means it has to keep reordering degree lower than the lowest
likely RTT (or some fraction of it) that is expected for that link
technology at the design stage. This will keep reordering low, but
not too unnecessarily low (i.e. not 3 packets at the link rate).<br>
<br>
<blockquote type="cite"
cite="mid:77522c07-6f2e-2491-ba0e-cbef62aad194@bobbriscoe.net">
<blockquote type="cite"
cite="mid:E031B993-DAAF-4BE4-A542-33C44310D6E9@gmx.de">
<pre class="moz-quote-pre" wrap="">
</pre>
<blockquote type="cite">
<pre class="moz-quote-pre" wrap="">This is a network layer 'unordered delivery' property, so it's appropriate to flag at the IP layer.
</pre>
</blockquote>
<pre class="moz-quote-pre" wrap=""> But at that point you are multiplexing multiple things into the poor ECT(1) codepoint, the promise of a certain "linear" back-off behavior on encountered congestion AND a "allow relaxed ordering" ( "detect loss by counting in time-based units" does not seem to be fully equivalent with a generic tolerance to 'unordered delivery' as far as I understand). That seems asking to much of a simple number...</pre>
</blockquote>
</blockquote>
[BB] In a purist sense, it is a valid architectural criticism that
we overload one codepoint with two architecturally distinct
functions:<br>
<ul>
<li>low queuing delay</li>
<li>low resequencing delay</li>
</ul>
But then, one has to consider the value vs cost of 2 independent
identifiers for two things that are unlikely to ever need to be
distinguished. If an app wants low delay, would it want only low
queuing delay and not low resequencing delay? <br>
<br>
You could contrive a case where the receiver is memory-challenged
and needs the network to do the resequencing. But it's not a
reasonable expectation for the network to do a function that will
cause HoL blocking for other applications in the process of helping
you with your memory problems.<br>
<br>
Given we are header-bit-challenged, it would not be unreasonable for
the WG to decide to conflate these two architectural identifiers
into one.<br>
<br>
<br>
Bob<br>
<br>
<blockquote type="cite"
cite="mid:77522c07-6f2e-2491-ba0e-cbef62aad194@bobbriscoe.net">
<blockquote type="cite"
cite="mid:E031B993-DAAF-4BE4-A542-33C44310D6E9@gmx.de">
<pre class="moz-quote-pre" wrap="">
Best Regards
Sebastian
</pre>
<blockquote type="cite">
<pre class="moz-quote-pre" wrap="">
Bob
--
________________________________________________________________
Bob Briscoe
<a class="moz-txt-link-freetext" href="http://bobbriscoe.net/" moz-do-not-send="true">http://bobbriscoe.net/</a>
</pre>
</blockquote>
<pre class="moz-quote-pre" wrap="">_______________________________________________
Ecn-sane mailing list
<a class="moz-txt-link-abbreviated" href="mailto:Ecn-sane@lists.bufferbloat.net" moz-do-not-send="true">Ecn-sane@lists.bufferbloat.net</a>
<a class="moz-txt-link-freetext" href="https://lists.bufferbloat.net/listinfo/ecn-sane" moz-do-not-send="true">https://lists.bufferbloat.net/listinfo/ecn-sane</a>
</pre>
</blockquote>
<br>
<pre class="moz-signature" cols="72">--
________________________________________________________________
Bob Briscoe <a class="moz-txt-link-freetext" href="http://bobbriscoe.net/" moz-do-not-send="true">http://bobbriscoe.net/</a></pre>
</blockquote>
<br>
<pre class="moz-signature" cols="72">--
________________________________________________________________
Bob Briscoe <a class="moz-txt-link-freetext" href="http://bobbriscoe.net/">http://bobbriscoe.net/</a></pre>
</body>
</html>