Re: [AVTCORE] [R-C] I-D Action: draft-perkins-avtcore-rtp-circuit-breakers-00.txt

Colin Perkins <csp@csperkins.org> Tue, 06 March 2012 22:23 UTC

Return-Path: <csp@csperkins.org>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 33F7D21E80CA for <avt@ietfa.amsl.com>; Tue, 6 Mar 2012 14:23:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.598
X-Spam-Level:
X-Spam-Status: No, score=-103.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aeIujspWNxiA for <avt@ietfa.amsl.com>; Tue, 6 Mar 2012 14:23:25 -0800 (PST)
Received: from lon1-msapost-3.mail.demon.net (lon1-msapost-3.mail.demon.net [195.173.77.182]) by ietfa.amsl.com (Postfix) with ESMTP id 0131721E8013 for <avt@ietf.org>; Tue, 6 Mar 2012 14:23:25 -0800 (PST)
Received: from starkperkins.demon.co.uk ([80.176.158.71] helo=[192.168.0.30]) by lon1-post-3.mail.demon.net with esmtpsa (AUTH csperkins-dwh) (TLSv1:AES128-SHA:128) (Exim 4.69) id 1S52mX-0001aI-dH; Tue, 06 Mar 2012 22:23:23 +0000
Mime-Version: 1.0 (Apple Message framework v1257)
Content-Type: multipart/alternative; boundary="Apple-Mail=_D57FDCE6-D3BD-4F78-A9B9-57BD1BA50C91"
From: Colin Perkins <csp@csperkins.org>
In-Reply-To: <4F55C25A.9010407@alvestrand.no>
Date: Tue, 06 Mar 2012 22:22:49 +0000
Message-Id: <312FF88C-92AC-4BD7-AE80-56BE51DFD626@csperkins.org>
References: <20120305201759.24406.49431.idtracker@ietfa.amsl.com> <766FE318-7DE3-4481-B3C4-C45F2A94C881@csperkins.org> <4F55C25A.9010407@alvestrand.no>
To: Harald Alvestrand <harald@alvestrand.no>
X-Mailer: Apple Mail (2.1257)
Cc: rtp-congestion@alvestrand.no, "avt@ietf.org WG" <avt@ietf.org>
Subject: Re: [AVTCORE] [R-C] I-D Action: draft-perkins-avtcore-rtp-circuit-breakers-00.txt
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/avt>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Mar 2012 22:23:26 -0000

On 6 Mar 2012, at 07:52, Harald Alvestrand wrote:
> On 03/06/2012 12:32 AM, Colin Perkins wrote:
>> 
>> Here's our initial attempt at a "circuit breakers" draft for RTCWeb. Comments welcome - this is very much a straw-man for discussion, rather than a final solution.
>> 
>> Colin
>> 
>> 
>> 
>> Begin forwarded message:
>>> From: internet-drafts@ietf.org
>>> Subject: I-D Action: draft-perkins-avtcore-rtp-circuit-breakers-00.txt
>>> Date: 5 March 2012 20:17:59 GMT
>>> To: i-d-announce@ietf.org
>>> Reply-To: internet-drafts@ietf.org
>>> 
>>> 
>>> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>>> 
>>> 	Title           : RTP Congestion Control: Circuit Breakers for Unicast Sessions
>>> 	Author(s)       : Colin Perkins
>>>                          Varun Singh
>>> 	Filename        : draft-perkins-avtcore-rtp-circuit-breakers-00.txt
>>> 	Pages           : 14
>>> 	Date            : 2012-03-05
>>> 
>>>   The Real-time Transport Protocol (RTP) is widely used for telephony,
>>>   video conferencing, and telepresence applications.  These
>>>   applications are often used over best-effort UDP/IP networks.  If
>>>   congestion control is not implemented then network congestion will
>>>   deteriorate the user's multimedia experience.  This document does not
>>>   propose a congestion control algorithm.  Instead, it specifies a
>>>   minimal set of "circuit-breakers".  Circuit-breakers are conditions
>>>   under which an RTP flow should cease to transmit media to protect the
>>>   network from excessive congestion.  It is expected that all RTP
>>>   applications running on best-effort networks will be able to run
>>>   without triggering these circuit breakers in normal operation.
>>> 
>>> 
>>> A URL for this Internet-Draft is:
>>> http://www.ietf.org/internet-drafts/draft-perkins-avtcore-rtp-circuit-breakers-00.txt
> Thanks for this work!
> 
> A few questions (to make sure I get them noted down):
> 
> Section 4.1:
> 
>    Accordingly, if a
>    sender of RTP data packets receives two or more consecutive RTCP RR
>    packets from the same receiver that correspond to its transmission
>    and have a non-increasing extended highest sequence number received
>    field, then that sender SHOULD cease transmission.
> 
> If I see RTCP packets with
> 
> 1: highest sequence number = 2
> 2: highest sequence number = 2
> 3: highest sequence number = 2
> 
> do I cease transmission after packet 3 has arrived, or after packet 2 has arrived?
> I *think* the logical time is after packet 3 has arrived, but I'm a little unsure that the words are
> unambiguously saying that; it's not 100% clear to me whether packet 1 is considered included in the set of "non-increasing highest sequence number".

We should clarify. My feeling is that either way would work, depending on how aggressive we want the circuit breaker to be. 

> Section 4.2: Is it reasonable to replace, for the purposes of this calculation, "an order of magnitude" with "a factor of ten"? (for those who don't have a physics background, putting text somewhere that says that an order of magnitude is "somewhere around a factor of ten" might be appropriate.)

Sure, will clarify. 

> We might also want to add the words about doing a dramatically reduced rate if we can from section 4.1 here, factor it out as a general statement, or say that it is not appropriate here if it's not.

Yes.

> Security considerations (missing section): For an end node that implements this specification, an active attacker can cut the transmission by faking two RTCP packets that get accepted instead of the recipient's RTCP packets. This may be worthy of a note, and pointer to appropriate defenses.

Agreed.

> Good stuff!
> 
>                      Harald
> 
> 
> 
>  
> 
> 
> _______________________________________________
> Rtp-congestion mailing list
> Rtp-congestion@alvestrand.no
> http://www.alvestrand.no/mailman/listinfo/rtp-congestion



-- 
Colin Perkins
http://csperkins.org/