Re: [ippm] WGLC for draft-ietf-ippm-responsiveness

Christoph Paasch <cpaasch@apple.com> Wed, 17 January 2024 18:26 UTC

Return-Path: <cpaasch@apple.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45E9AC17C8B6 for <ippm@ietfa.amsl.com>; Wed, 17 Jan 2024 10:26:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.102
X-Spam-Level:
X-Spam-Status: No, score=-2.102 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6t0wl1-mh3G7 for <ippm@ietfa.amsl.com>; Wed, 17 Jan 2024 10:26:02 -0800 (PST)
Received: from ma-mailsvcp-mx-lapp03.apple.com (ma-mailsvcp-mx-lapp03.apple.com [17.32.222.24]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BC684C18DB84 for <ippm@ietf.org>; Wed, 17 Jan 2024 10:26:02 -0800 (PST)
Received: from rn-mailsvcp-mta-lapp04.rno.apple.com (rn-mailsvcp-mta-lapp04.rno.apple.com [10.225.203.152]) by ma-mailsvcp-mx-lapp03.apple.com (Oracle Communications Messaging Server 8.1.0.23.20230328 64bit (built Mar 28 2023)) with ESMTPS id <0S7F00F9K4J8PF20@ma-mailsvcp-mx-lapp03.apple.com> for ippm@ietf.org; Wed, 17 Jan 2024 10:26:02 -0800 (PST)
X-Proofpoint-GUID: av3L-xet0Fl9uA4lZFfNMFARWzBSAp6R
X-Proofpoint-ORIG-GUID: av3L-xet0Fl9uA4lZFfNMFARWzBSAp6R
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.619, 18.0.997 definitions=2024-01-17_11:2024-01-17, 2024-01-17 signatures=0
X-Proofpoint-Spam-Details: rule=interactive_user_notspam policy=interactive_user score=0 malwarescore=0 phishscore=0 spamscore=0 bulkscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2311290000 definitions=main-2401170133
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=from : message-id : content-type : mime-version : subject : date : in-reply-to : cc : to : references; s=20180706; bh=pisE+Q6KlKqfHf1l+YoH0Gnm05Q0RARcq9BU+5XnZc4=; b=nCBuAd2JuckmDy3W+OSXT5H/OM5sXQvBKzj1kj/5QOMXW/8WOqfKm8317aY0LduWgalj u2A8On0Wd24ZbH7RmlhDSzKdx7IKAuxjZvBLkV2TBsjH5FNpyoNGvykcYV6ekT21/lIm vXric/pHAi4MY9tV5WAbirxvphudlRi7WaVfHlf0OZ9WbpdUFVEt8BXqiYebeocoP6mR OzQ431TjDKlIy5iWgixqqDuZIwHav5xgus/jcqx9fV4v73QvvTB/iQp7Lcd2poMyUZ1w Wps8DtV1VjUY+D3OPkBIBXZLnbE7igTPmlC70feCWnn8WnS9QYGAMHPM7jnhjIIlbCd+ /A==
Received: from rn-mailsvcp-mmp-lapp02.rno.apple.com (rn-mailsvcp-mmp-lapp02.rno.apple.com [17.179.253.15]) by rn-mailsvcp-mta-lapp04.rno.apple.com (Oracle Communications Messaging Server 8.1.0.23.20230328 64bit (built Mar 28 2023)) with ESMTPS id <0S7F00XFW4J8YIS0@rn-mailsvcp-mta-lapp04.rno.apple.com>; Wed, 17 Jan 2024 10:25:57 -0800 (PST)
Received: from process_milters-daemon.rn-mailsvcp-mmp-lapp02.rno.apple.com by rn-mailsvcp-mmp-lapp02.rno.apple.com (Oracle Communications Messaging Server 8.1.0.23.20230328 64bit (built Mar 28 2023)) id <0S7F00J004CRO900@rn-mailsvcp-mmp-lapp02.rno.apple.com>; Wed, 17 Jan 2024 10:25:57 -0800 (PST)
X-Va-A:
X-Va-T-CD: 46e1ef45db604eac56460e774aa0f877
X-Va-E-CD: 842877e7db852f0855a0a3aa400dcaa0
X-Va-R-CD: 6f5e469cdd67fb51d84db0a635efcf38
X-Va-ID: 011839b9-1db8-410b-bcc2-f1650a01e5d0
X-Va-CD: 0
X-V-A:
X-V-T-CD: 46e1ef45db604eac56460e774aa0f877
X-V-E-CD: 842877e7db852f0855a0a3aa400dcaa0
X-V-R-CD: 6f5e469cdd67fb51d84db0a635efcf38
X-V-ID: 9fd224e6-c7ba-4716-ac23-25662170cdf4
X-V-CD: 0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.619, 18.0.997 definitions=2024-01-17_11:2024-01-17, 2024-01-17 signatures=0
Received: from smtpclient.apple ([17.192.155.119]) by rn-mailsvcp-mmp-lapp02.rno.apple.com (Oracle Communications Messaging Server 8.1.0.23.20230328 64bit (built Mar 28 2023)) with ESMTPSA id <0S7F00BAM4J8VR00@rn-mailsvcp-mmp-lapp02.rno.apple.com>; Wed, 17 Jan 2024 10:25:56 -0800 (PST)
From: Christoph Paasch <cpaasch@apple.com>
Message-id: <895465D7-C28D-44D6-9A62-B6CCC5A05774@apple.com>
Content-type: multipart/alternative; boundary="Apple-Mail=_E26B8E2B-F515-42C7-BDE4-FD15094BEC2C"
MIME-version: 1.0 (Mac OS X Mail 16.0 \(3774.300.61.1.2\))
Date: Wed, 17 Jan 2024 10:25:56 -0800
In-reply-to: <898baae114fe3a4b8916dcd1d417c8d706345c9c.camel@cisco.com>
Cc: "ippm@ietf.org" <ippm@ietf.org>
To: "Ben Janoff (bjj)" <bjj=40cisco.com@dmarc.ietf.org>
References: <898baae114fe3a4b8916dcd1d417c8d706345c9c.camel@cisco.com>
X-Mailer: Apple Mail (2.3774.300.61.1.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/m9A7QaSbjiY90-OE5Jt2po1IDfA>
Subject: Re: [ippm] WGLC for draft-ietf-ippm-responsiveness
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Jan 2024 18:26:07 -0000

Hello Ben!

Thanks for your pull-request at https://github.com/network-quality/draft-ietf-ippm-responsiveness/pull/96.


Christoph

> On Dec 18, 2023, at 8:28 AM, Ben Janoff (bjj) <bjj=40cisco.com@dmarc.ietf.org> wrote:
> 
> Hi all,
> 
> We have been working on an implementation of this test based on draft 02
> which used plain HTTP instead of HTTPS due to resource constraints. The
> draft 03 does include the possiblity of HTTP in the URLs for server
> discovery but the formula for aggregated responsiveness doesn't specify
> what should be computed in the plaintext case.
> 
> I've written a suggested addition to the draft to specify the
> computation that resource constrained implementations can use, to ensure
> that any future plain HTTP implementations have a compatible definition
> of aggregated responsiveness.
> 
> My suggested edits are below.
> 
> In 4.1.  Working Conditions, add the following section:
> ---
> 4.1.4.  Avoiding Test Hardware Bottlenecks
> 
>   The Responsiveness Test could be run from various devices which are
>   either consumer devices or internet infrastructure such as routers.
>   Many routers are cost-sensitive embedded devices optimised for
>   switching packets rather than terminating TLS connections at line
>   rate.  As a result, they may not have sufficient processing power or
>   memory bandwidth to saturate a bottleneck link in order to be a
>   useful test client for the responsiveness test.
> 
>   In order to measure responsiveness from these devices, the test can
>   be conducted without TLS over plain HTTP.  Whenever possible, it is
>   preferred to test using TLS to resemble typical internet traffic to
>   the maximum extent.
> ---
> 
> 
> In 4.3. Measuring Responsiveness, edit the following paragraphs:
> ---
> 
>   Foreign probes will provide three (3) sets of data-points: First, the
>   duration of the TCP-handshake (noted hereafter as tcp_f).  Second,
>   the TLS round-trip-time (noted tls_f).  For this, it is important to
>   note that different TLS versions have a different number of round-
>   trips.  Thus, the TLS establishment time needs to be normalized to
>   the number of round-trips the TLS handshake takes until the
>   connection is ready to transmit data.  In the case that TLS is not
>   being used, it is undefined.  And third, the HTTP elapsed time
>   between issuing the GET request for a 1-byte object and receiving the
>   entire response (noted http_f).
> 
>   Self probes will provide a single data-point that measures the
>   duration of time between when the HTTP GET request for the 1-byte
>   object is issued on the load-generating connection and when the full
>   HTTP response has been received (noted http_s).  For cases where
>   multiplexing GET requests into the load generation connections is not
>   possible (e.g. due to only HTTP/1.1 being available), the TCP stack
>   estimated round-trip-time can be used as a proxy or substitute value.
> ---
> 
> 
> In 4.3.1. Aggregating the Measurements, modify the paragraph level and
> insert the additional section:
> ---
> 4.3.1.1.  For the TLS-Enabled Case
> 
>   The algorithm produces sets of 4 times for each probe, namely: tcp_f,
>   tls_f, http_f, http_l (from the previous section).  The
>   responsiveness of the network connection being tested evolves over
>   time as buffers gradually reach saturation.  Once the buffers are
>   saturated, responsiveness will stabilize.  Thus, the final
>   calculation of network responsiveness considers the last MAD (Moving
>   Average Distance - default to 4) intervals worth of completed
>   responsiveness probes.
> 
>   Over that period of time, a large number of samples will have been
>   collected.  These may be affected by noise in the measurements, and
>   outliers.  Thus, to aggregate these we suggest using a trimmed mean
>   at the TMP (Trimmed Mean Percentage - default to 95%) percentile,
>   thus providing the following numbers: TM(tcp_f), TM(tls_f),
>   TM(http_f), TM(http_l).
> 
>   The responsiveness is then calculated as the weighted mean:
> 
>   Responsiveness = 60000 /
>   (1/6*(TM(tcp_f) + TM(tls_f) + TM(http_f)) + 1/2*TM(http_s))
> 
>   This responsiveness value presents round-trips per minute (RPM).
> 
> 4.3.1.2.  For the TCP-Only Case
> 
>   If there are no TLS connections being used, then the notion of a
>   normalised round-trip time for the TLS handshake does not apply.
>   Zeroes cannot be substituted for tls_f, as that will result in an
>   artificially low responsiveness value.  Instead, the same principle
>   of weighing each contribution to the foreign RTT equally (and then
>   weighting the foreign and self RTTs equally) is applied.
> 
>   The TCP-only responsiveness is therefore calculated as the weighted
>   mean:
> 
>   Responsiveness = 60000 /
>   (1/4*(TM(tcp_f) + TM(http_f)) + 1/2*TM(http_s))
> ---
> 
> Best regards
>        Ben
> _______________________________________________
> ippm mailing list
> ippm@ietf.org
> https://www.ietf.org/mailman/listinfo/ippm