Re: [aqm] TCP ACK Suppression

Joe Touch <touch@isi.edu> Fri, 09 October 2015 18:16 UTC

Return-Path: <touch@isi.edu>
X-Original-To: aqm@ietfa.amsl.com
Delivered-To: aqm@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E58381B4971 for <aqm@ietfa.amsl.com>; Fri, 9 Oct 2015 11:16:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level:
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DwwZjb0-Uprs for <aqm@ietfa.amsl.com>; Fri, 9 Oct 2015 11:16:57 -0700 (PDT)
Received: from vapor.isi.edu (vapor.isi.edu [128.9.64.64]) (using TLSv1 with cipher ECDHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 114AD1B4970 for <aqm@ietf.org>; Fri, 9 Oct 2015 11:16:57 -0700 (PDT)
Received: from [128.9.160.211] (mul.isi.edu [128.9.160.211]) (authenticated bits=0) by vapor.isi.edu (8.13.8/8.13.8) with ESMTP id t99IGFfC010759 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Fri, 9 Oct 2015 11:16:16 -0700 (PDT)
To: Rick Jones <rick.jones2@hpe.com>, aqm@ietf.org
References: <alpine.DEB.2.02.1510060748480.8750@uplift.swm.pp.se> <D2394BB6.548C5%g.white@cablelabs.com> <0A452E1DADEF254C9A7AC1969B8781284A7D9B66@FR712WXCHMBA13.zeu.alcatel-lucent.com> <5616DCD9.8@isi.edu> <alpine.DEB.2.02.1510081428470.3852@nftneq.ynat.uz> <CAK6E8=ePXkK4-=As2QQJCZjOyK7-NvC2njiYrsLzGEsqqFDJxg@mail.gmail.com> <56170C0F.2010404@hpe.com>
From: Joe Touch <touch@isi.edu>
Message-ID: <5618046F.4080501@isi.edu>
Date: Fri, 09 Oct 2015 11:16:15 -0700
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <56170C0F.2010404@hpe.com>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: <http://mailarchive.ietf.org/arch/msg/aqm/Bcs51pSpNZfGNraA8atmX7SGvpY>
Cc: touch@isi.edu
Subject: Re: [aqm] TCP ACK Suppression
X-BeenThere: aqm@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion list for active queue management and flow isolation." <aqm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/aqm>, <mailto:aqm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/aqm/>
List-Post: <mailto:aqm@ietf.org>
List-Help: <mailto:aqm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/aqm>, <mailto:aqm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Oct 2015 18:16:58 -0000


On 10/8/2015 5:36 PM, Rick Jones wrote:
> GRO, TSO, CKO etc have come into being from the fields made fertile by
> the combination of ever increasing link speeds, never increasing de jure
> Ethernet MTUs, no longer increasing processor core frequency, and paying
> customer demand for performance.

Right, and we're just starting to see places where they interfere with
TCP. I've been doing tests on a new TCP option to extend the space
available for options.

We've already seen cases where these extensions aggregate segments that
have different unknown options (which should clearly never happen), or
even when they aggregate segments with unknown options that match (which
I believe should never happen either).

Again, just because nobody's screamed to date doesn't mean these are
known safe.

Joe