Re: [AVTCORE] I-D Action: draft-ietf-avtcore-rtp-circuit-breakers-01.txt

Colin Perkins <csp@csperkins.org> Wed, 13 February 2013 00:18 UTC

Return-Path: <csp@csperkins.org>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A7A521F8964 for <avt@ietfa.amsl.com>; Tue, 12 Feb 2013 16:18:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level:
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[AWL=-0.001, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t-AeSV29GMiy for <avt@ietfa.amsl.com>; Tue, 12 Feb 2013 16:18:45 -0800 (PST)
Received: from balrog.mythic-beasts.com (balrog.mythic-beasts.com [93.93.130.6]) by ietfa.amsl.com (Postfix) with ESMTP id 34F4C21F88CF for <avt@ietf.org>; Tue, 12 Feb 2013 16:18:45 -0800 (PST)
Received: from [80.176.158.71] (helo=[192.168.0.11]) by balrog.mythic-beasts.com with esmtpsa (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.72) (envelope-from <csp@csperkins.org>) id 1U5Q3d-0005rJ-7C; Wed, 13 Feb 2013 00:18:41 +0000
Mime-Version: 1.0 (Apple Message framework v1283)
Content-Type: multipart/alternative; boundary="Apple-Mail=_863F9FC3-C2EF-48AA-99D5-3435096D7DE9"
From: Colin Perkins <csp@csperkins.org>
In-Reply-To: <CALw1_Q12AJkaKomh3EHNSJKXWoFJW_G6NqsQxGnJaup9=Mg9Bw@mail.gmail.com>
Date: Wed, 13 Feb 2013 00:18:40 +0000
Message-Id: <2B95330E-6BF9-4F14-9F36-9E2CDF48A96D@csperkins.org>
References: <20121022221624.7138.24306.idtracker@ietfa.amsl.com> <A1CB2B6E-E860-4BF5-AEE7-97C71DF10D9C@csperkins.org> <CALw1_Q12AJkaKomh3EHNSJKXWoFJW_G6NqsQxGnJaup9=Mg9Bw@mail.gmail.com>
To: Kevin Gross <kevin.gross@avanw.com>
X-Mailer: Apple Mail (2.1283)
X-BlackCat-Spam-Score: -12
X-Mythic-Debug: Threshold = On =
Cc: "avt@ietf.org WG" <avt@ietf.org>
Subject: Re: [AVTCORE] I-D Action: draft-ietf-avtcore-rtp-circuit-breakers-01.txt
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/avt>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Feb 2013 00:18:46 -0000

Hi Kevin,

Thanks for these comments. I've incorporated most of them into the draft ready for the next version, which will be submitted before the deadline. Some comments inline.

On 5 Nov 2012, at 21:56, Kevin Gross wrote:
> Comments on this draft. Some I mentioned in the session today. Smaller ones I did not.
...
> Last bullet point on page 4 mentions that RTCP report interval is dependent on number of participants in the session. Number of participants in a unicast session is always 2 so this is not a contribution if multicast is our of scope.

Participants was misleading: what matters is the number of SSRC values, which can be greater than two in a unicast session if the participants send multiple media streams.

...
> p.7 The following text may need work:
> 
> "The remaining congestion signals are the packet loss fraction and the
>    cumulative number of packets lost.  These are robust indicators of
>    congestion in a network where packet loss is primarily due to queue
>    overflows, although less accurate in networks where losses can be
>    caused by non-congestive packet corruption.  TCP uses packet loss as
>    a congestion signal." 
> 
> TCP intentionally causes congestion to determine available link bandwidth. It is using packet loss to measure capacity. In the presence of TCP characterizing loss fraction as a roust indicator is probably an overstatement. The interaction probably deserves some some further investigation.

Agree. I expanded this text slightly, but more might need to be said.

> Section 4.1: Delete second paragraph. As disused in the session today, if things are messed up enough to trigger circuit breaker #1, reducing offered load is not likely a useful response. Section 4.3 contains a copy of this recommendation and is probably an appropriate recommendation for circuit breaker #3 described there.

If this were a congestion control algorithm, I'd probably agree that we should be more aggressive in stopping transmission here, but the circuit breaker is supposed to be conservative when it fires, to encompass all reasonable congestion control behaviours. As such, I think it is better that the draft allow the option of reducing offered load as a response here, rather than mandate ceasing transmission immediately.

> Section 4.2: As discussed in the session today, this section needs to be improved to discuss devices that don't implement RTCP. One obvious improvement is to condition the receiver behavior described at the bottom of page 9. A receiver should not trip this circuit breaker if it is receiving RTP packets from the sender.

None of these circuit breakers work if RTCP is not implemented. I'll clarify at the start of section 4.

> Section 4.3: Simulation is required to gain confidence that there are no false-trigger conditions for this circuit breaker. Test in the presence of competing TCP flows. Test different RTCP RR reporting delay and packet loss scenarios. Solicit more ideas from others.

In progress.

Cheers,
Colin


-- 
Colin Perkins
http://csperkins.org/