Re: HTTP/2 and TCP CWND

Mark Nottingham <mnot@mnot.net> Mon, 15 April 2013 06:06 UTC

Return-Path: <ietf-http-wg-request@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC3A621F8FFB for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sun, 14 Apr 2013 23:06:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8
X-Spam-Level:
X-Spam-Status: No, score=-8 tagged_above=-999 required=5 tests=[RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5UBGOkztgoTN for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Sun, 14 Apr 2013 23:06:24 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) by ietfa.amsl.com (Postfix) with ESMTP id C2C8421F8F44 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Sun, 14 Apr 2013 23:06:24 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.72) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1URcXW-0003QL-W8 for ietf-http-wg-dist@listhub.w3.org; Mon, 15 Apr 2013 06:05:19 +0000
Resent-Date: Mon, 15 Apr 2013 06:05:18 +0000
Resent-Message-Id: <E1URcXW-0003QL-W8@frink.w3.org>
Received: from maggie.w3.org ([128.30.52.39]) by frink.w3.org with esmtp (Exim 4.72) (envelope-from <mnot@mnot.net>) id 1URcXU-0003Pc-Hf for ietf-http-wg@listhub.w3.org; Mon, 15 Apr 2013 06:05:16 +0000
Received: from mxout-07.mxes.net ([216.86.168.182]) by maggie.w3.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.72) (envelope-from <mnot@mnot.net>) id 1URcXT-0004O6-NU for ietf-http-wg@w3.org; Mon, 15 Apr 2013 06:05:16 +0000
Received: from [192.168.1.80] (unknown [118.209.210.200]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by smtp.mxes.net (Postfix) with ESMTPSA id AEC5522E1FA; Mon, 15 Apr 2013 02:04:52 -0400 (EDT)
Content-Type: text/plain; charset="windows-1252"
Mime-Version: 1.0 (Mac OS X Mail 6.3 \(1503\))
From: Mark Nottingham <mnot@mnot.net>
In-Reply-To: <a9421189aa294987a1627019a3411902@BN1PR03MB072.namprd03.prod.outlook.com>
Date: Mon, 15 Apr 2013 16:04:48 +1000
Cc: Lars Eggert <lars@netapp.com>, Gabriel Montenegro <Gabriel.Montenegro@microsoft.com>, Martin Stiemerling <martin.stiemerling@neclab.eu>
Content-Transfer-Encoding: quoted-printable
Message-Id: <BA43F8F6-8B7F-4B34-B620-2806A02A5AA1@mnot.net>
References: <8e7e9a7db6204492afde5d8883570579@BN1PR03MB006.namprd03.prod.outlook.com> <CAP+FsNeG4ew88sWs6OL+PQXbqSANE6smRTJuVBzo8ppkLVPYtA@mail.gmail.com> <CAJ3HoZ2zHBNpRw7NrVZO5UsdnPuW3ZiSu56ppM5fqhaP+5=uFQ@mail.gmail.com> <CAP+FsNf2NE+mH2a6KxdNan6oh1Uvb3LoVojCuU9kOV1aQs3WkQ@mail.gmail.com> <a9421189aa294987a1627019a3411902@BN1PR03MB072.namprd03.prod.outlook.com>
To: "ietf-http-wg@w3.org Group" <ietf-http-wg@w3.org>
X-Mailer: Apple Mail (2.1503)
Received-SPF: pass client-ip=216.86.168.182; envelope-from=mnot@mnot.net; helo=mxout-07.mxes.net
X-W3C-Hub-Spam-Status: No, score=-4.3
X-W3C-Hub-Spam-Report: AWL=-2.409, BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001
X-W3C-Scan-Sig: maggie.w3.org 1URcXT-0004O6-NU 0fb577a37ce3ac1a2de2a35fc37bf76e
X-Original-To: ietf-http-wg@w3.org
Subject: Re: HTTP/2 and TCP CWND
Archived-At: <http://www.w3.org/mid/BA43F8F6-8B7F-4B34-B620-2806A02A5AA1@mnot.net>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/17226
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

On 13/04/2013, at 7:52 AM, Gabriel Montenegro <Gabriel.Montenegro@microsoft.com> wrote:

> I’ve opened issue #65 to track what we should do about SETTINGS_CURRENT_CWND:
> https://github.com/http2/http2-spec/issues/65

Thanks.

>  As for my opinion about what to do: I think we should delete this TCP congestion window setting from HTTP/2.0.
>  
> This is as out of scope as I’ve ever seen at the IETF. Modifying TCP (by modifying its contract to upper layers such as HTTP, and by modifying its state machine) is not something that can be done outside of the Transport Area. I’m cc-ing Lars Eggert and Martin Stiemerling (former and current Transport ADs), in case they have additional comments or clarifications.

I'd love to hear what Transport folks have to say on-list.

I've also been talking with the Martin about having more Transport cross-fertilisation; we're hoping to spend some time on discussing relevant issues in Berlin.


> Besides, as pointed out by Lars Eggert (cc-ed, along with Martin Stiemerling) in an offline exchange, there is a perfectly reasonable alternative progressing in the Transport Area’s TCPM working group, namely, the proposal to bump up the TCP’s initial congestion window to 10. This has undergone the rigorous review required of such a fundamental change, and is currently in the RFC editor’s queue (so it’s basically done):
>  
> https://datatracker.ietf.org/doc/draft-ietf-tcpm-initcwnd/
>  
> That exchange also confirmed my opinion that there is very little chance the IESG would allow SETTINGS_CURRENT_CWND to remain in the HTTP/2.0 spec. In the interest of optimizing community time (HTTPbis, HTTP/2.0 implementors, IESG, etc) I think eliminating this now so it does not appear in the first implementable draft makes sense.

My understanding from discussion in Tokyo was that this is in the spec so that some interested parties can perform some experiments with it and figure out whether it offers any value. In as much as that will serve as input to the discussions with the transport area, it could be useful to leave it in for a bit longer.

So - are people still intending to do that? In particular, in the scope of the first few implementation drafts?

Regarding the overhead for implementers - this feature is completely optional, so it doesn't represent any waste of community time in those terms. 

That said, if we consider removing this, we may want to revisit our decision to only mark settings persistence 'at risk' for the implementation draft.

Cheers,

--
Mark Nottingham   http://www.mnot.net/