[144346] in North American Network Operators' Group
Re: Silently dropping QoS marked packets on the greater Internet
daemon@ATHENA.MIT.EDU (Mark Tinka)
Fri Sep 9 01:16:56 2011
From: Mark Tinka <mtinka@globaltransit.net>
To: nanog@nanog.org
Date: Fri, 9 Sep 2011 13:16:18 +0800
In-Reply-To: <6403.1314979323@turing-police.cc.vt.edu>
Reply-To: mtinka@globaltransit.net
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
--nextPart1608076.iJh5fp4mIr
Content-Type: Text/Plain;
charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
On Saturday, September 03, 2011 12:02:03 AM=20
Valdis.Kletnieks@vt.edu wrote:
> Except you can't actually *guarantee* that QoS works
> every packet, every time, during congestion even within
> the same network. Remember - QoS is just a marking to
> shoot the other guy first. If a link ends up
> overcommitted with QoS traffic, you're still screwed.=20
> And there's a second-order effect as well - if your net
> is running sufficiently close to the capacity edge that
> QoS actually matters, there's probably other engineering
> deficiencies that are just waiting to screw you up.
Agree.
What we've seen (and I suppose what the design philosophy=20
suggests) is that so-called Priority traffic has the highest=20
chance of survival during times of evil. But then again,=20
depending on just how saturated the port queues are, even=20
Priority traffic can get dropped due to lack of buffers -=20
that is if it hasn't already been caught by policers that=20
tend to go along with Priority queues.
> Is the story I've heard about people managing to saturate
> a link with QoS'ed traffic, and then having the link
> drop because network management traffic was basically
> DoS'ed, apocryphal, or have people shot themselves in
> the foot that way?
This sounds like a hacked attempt to get management to=20
approve that 40Gbps upgrade :-).
Mark.
--nextPart1608076.iJh5fp4mIr
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: This is a digitally signed message part.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.16 (GNU/Linux)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=FYNA
-----END PGP SIGNATURE-----
--nextPart1608076.iJh5fp4mIr--