Re: [AVTCORE] Comments on draft-ietf-avtcore-rtp-circuit-breakers-05

Colin Perkins <csp@csperkins.org> Fri, 04 July 2014 22:09 UTC

Return-Path: <csp@csperkins.org>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD20E1A0051 for <avt@ietfa.amsl.com>; Fri, 4 Jul 2014 15:09:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v9ggKRQrVk6t for <avt@ietfa.amsl.com>; Fri, 4 Jul 2014 15:09:05 -0700 (PDT)
Received: from haggis.mythic-beasts.com (haggis.mythic-beasts.com [IPv6:2a00:1098:0:86:1000:0:2:1]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A329A1A004A for <avt@ietf.org>; Fri, 4 Jul 2014 15:09:05 -0700 (PDT)
Received: from [81.187.2.149] (port=60750 helo=[192.168.0.67]) by haggis.mythic-beasts.com with esmtpsa (TLS1.0:RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <csp@csperkins.org>) id 1X3BfB-0003vV-Sl; Fri, 04 Jul 2014 23:09:02 +0100
Content-Type: text/plain; charset="windows-1252"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Colin Perkins <csp@csperkins.org>
In-Reply-To: <1E75F583-20FE-4796-A40C-FC9F903750B0@csperkins.org>
Date: Fri, 04 Jul 2014 23:08:55 +0100
Content-Transfer-Encoding: quoted-printable
Message-Id: <C918655B-3DA0-40F9-8B7A-1E9BB114130E@csperkins.org>
References: <530F52B0.3020804@ericsson.com> <1E75F583-20FE-4796-A40C-FC9F903750B0@csperkins.org>
To: Magnus Westerlund <magnus.westerlund@ericsson.com>
X-Mailer: Apple Mail (2.1878.6)
X-BlackCat-Spam-Score: -28
X-Mythic-Debug: Threshold = On =
Archived-At: http://mailarchive.ietf.org/arch/msg/avt/iXhxpxX9fC9nyEdGSF4vMLqtAeE
Cc: Varun Singh <varun@comnet.tkk.fi>, IETF AVTCore WG <avt@ietf.org>
Subject: Re: [AVTCORE] Comments on draft-ietf-avtcore-rtp-circuit-breakers-05
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/avt/>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Jul 2014 22:09:07 -0000

Hi,

I just submitted an updated -06 draft, that addresses the majority of these comments. These fixes are small enough that I don’t think we need agenda time to discuss them.

There are a few more small issues from the last meeting to address, and we need to add rules to compensate for changes in the reporting interval. Unfortunately I ran out of time to complete these before the deadline, but will do so over the summer.

Colin




On 1 Mar 2014, at 13:33, Colin Perkins <csp@csperkins.org> wrote:

> Hi Magnus,
> 
> On 27 Feb 2014, at 14:58, Magnus Westerlund <magnus.westerlund@ericsson.com> wrote:
>> I have reviewed draft-ietf-avtcore-rtp-circuit-breakers-05 and have some comments:
> 
> Thanks for the feedback. I have some responses inline.
> 
>> 1) Section 3:
>> This modifies the RTCP timing rules to allow RTCP
>>     reports to be sent early, in some cases immediately, provided the
>>     average RTCP reporting interval remains unchanged.
>> 
>> I would suggest changing "provided the average RTCP reporting interval
>> remains unchanged." is changed to:
>> 
>> 	provided the RTCP transmission keeps within its bandwidth
>>       allocation.
>> 
>> The reason is that AVPF does not necessarily keep within the average
>> reporting interval. As that is commonly under using the RTCP bandwidth.
> 
> Ok.
> 
>> 2) Section 3:
>>     The use of the RTP/AVPF profile is dependent
>>     on signalling, but is otherwise generally backwards compatible
>>     with the RTP/AVP profile, as it keeps the same average RTCP
>>     reporting interval as the base RTP specification.
>> 
>> I wouldn't claim that it is generally backwards compatible. In many
>> configurations it would not, and even with the timeout clarification
>> being proposed in draft-ietf-avtcore-rtp-multi-stream-03 there will
>> still be cases where interoperability would be questionable.
>> 
>> I suggest some other formulations, maybe saying that one can configure
>> AVPF to be backwards compatible.
> 
> I think we can just remove the sentence in question without affecting the meaning of the draft.
> 
>> 3) Section 4:
>> 
>> TCP congestion control intentionally tries to fill
>>  the router queues, and uses the resulting packet loss as congestion
>>  feedback.
>> 
>> I think a reference would be appropriate after “TCP congestion control".
> 
> I can add a reference to RFC 5681.
> 
>> 4) Section 4.1:
>> 
>>  Accordingly, if a sender of RTP data packets receives two or more
>>  consecutive RTCP SR or RR packets from the same receiver, and those
>>  packets correspond to its transmission and have a non-increasing
>>  extended highest sequence number received field (i.e., the sender
>>  receivers at least three RTCP SR or RR packets that report the same
>>  value in the extended highest sequence number received field for an
>>  SSRC, but the sender has sent RTP data packets for that SSRC that
>>  would have caused an increase in the reported value of the extended
>>  highest sequence number received if they had reached the receiver),
>>  then that sender SHOULD cease transmission (see Section 4.5).
>> 
>> 
>> It is a long sentence,
> 
> Agree; we should try to rephrase that sentence. 
> 
>> and my comment relate to "has sent RTP data
>> packets for that SSRC that would have caused an increase in the
>> reported value of the extended highest sequence number"
>> 
>> If the sender sends very few packets, this effects the probability for
>> this CB to trigger. So if I send only 1 packet per reporting interval,
>> and each packet is lost with a probability of 10%, then I have 1%
>> (0.1^2) probability of this being triggered. If I send 10 packets per
>> interval, then I have 0.1^20 = 1E-20. Thus, it might be worth making
>> some lower threshold recommendation here. This example assumes equal
>> distribution of loss also, but if we take into burst a short packet
>> burst may be likely to be completely lost, while the same amount of
>> packets may be likelier to have at least one arrive if distributed
>> over the reporting interval.
> 
> I agree that this is a potential issue, although I expect the practical impact will be limited (the most likely case I can see that would trigger this is a voice call, where one party is sending only comfort noise for several reporting intervals, and there is an asymmetric path failure). I can certainly add a note highlighting the issue, so application developers can be aware in those cases where it might affect their application. In terms of a threshold though, what value would you suggest?
> 
>> 5) Section 4.2:
>> 
>> Accordingly, an RTP
>>  sender that has not received any RTCP SR or RTCP RR packets reporting
>>  on the SSRC it is using for three or more RTCP reporting intervals
>>  SHOULD cease transmission (see Section 4.5).
>> 
>> Maybe one should clarify that the reporting intervals used in this
>> calculation is the interval calculated for the SSRC sending the media.
>> 
>> This is in comparision with 4.1 where the trigger is calculated on a
>> per remote basis for the received reports from that particular remote
>> SSRC.
> 
> Okay.
> 
>> Is there an issue if one gets reports from multiple remote SSRCs on
>> ones transmission. From a media timeout in a point to point case,
>> these reports although from many SSRCs should not skew the result as
>> they would be based on the same underlying data. But, using any two
>> consecutive reports, does not ensure that one is measuring over an
>> sufficient long interval.
> 
> I’m not sure I see the problem here. Can you clarify?
> 
>> 6) Section 4.2:
>> 
>> When calculating the
>>  timeout, the fixed minimum RTCP reporting interval SHOULD be used
>>  (based on the rationale in Section 6.2 of RFC 3550 [RFC3550]).
>> 
>> I think this sentence provides an minor issue if one tries to match
>> this with the RFC 3550 terminology. fixed minimum (interval) is used
>> in section 6.2. I think the added "RTCP reporting" is confusing here,
>> I would suggest to use another formulation here.
>> 
>> I think you may have to define what fixed minimum RTCP reporting
>> interval means, i.e. the RTCP reporting interval (T or Td?, i.e. with
>> or without randomization) (and in case of randomization, two random
>> draws or simple 2*T?) calculated with the current set of RTCP stack
>> parameters and using the fixed minimum interval (SHOULD be 5 sec).
> 
> Okay. I meant without randomisation, but will clarify.
> 
>> 7) Section 5:
>> 
>> As there is a difference between CB #1 and #3 and #2 that has to do
>> with that the first (#1 and #3) uses incoming RTCP reports and that #2
>> uses the CB implementers estimate of what the regular reporting
>> interval is. Thus, I wonder if there needs to exist include a
>> reflection over t_rr_int as well as the RTCP SSRC timeout calculation
>> that we recommend to use 5 seconds as fixed minimal value in those
>> calculations (if 5 sec larger than t_rr_int).
> 
> Maybe, I’m not sure. Can you give a concrete suggestion for the recommendation? You’re more familiar with the impact of T_rr_int on the timing than me.
> 
>> 8) Section 5:
>> 
>>  Reports of ECN-CE packets sent as reduced-size RTCP ECN feedback
>>  packets without an RTCP SR/RR packet MUST be ignored.
>> 
>> Shouldn't then be accounted as loss event in CB #3? Or are you
>> assuming that this will anyway be counted in the next compound packets
>> ECN XR summary?
> 
> The motivation is in the following paragraph of the draft. This is to allow the congestion control algorithm to use early feedback without worrying about accidental interactions with the circuit breaker. The information will be sent in the regular RTCP reports anyway, which the circuit breaker will then consider.
> 
>> 9) Section 9:
>> 
>> This attack can be avoided if RTCP packets are
>>  authenticated, for example using the Secure RTP profile [RFC3711].
>> 
>> Maybe this should reference draft-ietf-rtp-security-options for other
>> potential solutions?
> 
> Sure.
> 
> 
> Cheers,
> Colin
> 
> 
> 
> -- 
> Colin Perkins
> http://csperkins.org/
> 
> 
> 
> _______________________________________________
> Audio/Video Transport Core Maintenance
> avt@ietf.org
> https://www.ietf.org/mailman/listinfo/avt



-- 
Colin Perkins
http://csperkins.org/