Re: [ledbat] [R-C] LEDBAT vs RTCWeb

Randell Jesup <randell-ietf@jesup.org> Fri, 13 April 2012 09:21 UTC

Return-Path: <randell-ietf@jesup.org>
X-Original-To: ledbat@ietfa.amsl.com
Delivered-To: ledbat@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A4C621F87CC for <ledbat@ietfa.amsl.com>; Fri, 13 Apr 2012 02:21:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.308
X-Spam-Level:
X-Spam-Status: No, score=-1.308 tagged_above=-999 required=5 tests=[AWL=-0.198, BAYES_05=-1.11]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vi5Jaoux3yms for <ledbat@ietfa.amsl.com>; Fri, 13 Apr 2012 02:21:27 -0700 (PDT)
Received: from r2-chicago.webserversystems.com (r2-chicago.webserversystems.com [173.236.101.58]) by ietfa.amsl.com (Postfix) with ESMTP id 782FA21F8786 for <ledbat@ietf.org>; Fri, 13 Apr 2012 02:21:27 -0700 (PDT)
Received: from pool-108-16-41-249.phlapa.fios.verizon.net ([108.16.41.249] helo=[192.168.1.12]) by r2-chicago.webserversystems.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.69) (envelope-from <randell-ietf@jesup.org>) id 1SIch2-0006jB-F3; Fri, 13 Apr 2012 04:21:24 -0500
Message-ID: <4F87EF2B.1010805@jesup.org>
Date: Fri, 13 Apr 2012 05:17:31 -0400
From: Randell Jesup <randell-ietf@jesup.org>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:11.0) Gecko/20120312 Thunderbird/11.0
MIME-Version: 1.0
To: rtp-congestion@alvestrand.no, ledbat@ietf.org
References: <4F840709.4020103@alvestrand.no> <CAEdus3K+Q-tVHLxwhvHP+t1PAhxxcPDJ0e3c16e4KNPnmTi4ww@mail.gmail.com> <4F843D79.2040209@jesup.org> <CAEdus3Jv10S2UxXVbq6WpAHKq8Oieg0+h7Us1HpD16AT7zg2kw@mail.gmail.com> <4F8449FF.40504@jesup.org> <CAEdus3JrftxwEB=tweNC5sZ0_ask98Xd9k3hMBsX5_dzMdK1Og@mail.gmail.com> <4F874083.1030104@jesup.org> <CAEdus3+Muyy73UoXYuNv6K3OqaSnUYkZh5yBYcpOT1M4oqBc3w@mail.gmail.com>
In-Reply-To: <CAEdus3+Muyy73UoXYuNv6K3OqaSnUYkZh5yBYcpOT1M4oqBc3w@mail.gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - r2-chicago.webserversystems.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - jesup.org
X-Source:
X-Source-Args:
X-Source-Dir:
Subject: Re: [ledbat] [R-C] LEDBAT vs RTCWeb
X-BeenThere: ledbat@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Mailing list of the LEDBAT WG <ledbat.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ledbat>, <mailto:ledbat-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ledbat>
List-Post: <mailto:ledbat@ietf.org>
List-Help: <mailto:ledbat-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ledbat>, <mailto:ledbat-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Apr 2012 09:21:28 -0000

On 4/13/2012 3:03 AM, Stefan Holmer wrote:
>
>
> On Thu, Apr 12, 2012 at 10:52 PM, Randell Jesup <randell-ietf@jesup.org
> <mailto:randell-ietf@jesup.org>> wrote:

>     It's *possible* that RRTCC will 'win', it's also definitely possible
>     that they'll end up semi-stable where neither goes too far away from
>     a 'fair' share.  The one thing I don't predict is stable, fair and
>     predictable sharing of the bandwidth.  :-/
>
>
> I agree. Because of different averaging and trigger thresholds they will
> likely not end up in a stable state. It for sure seems unlikely that
> they will happen to fairly share the bandwidth.

The real problem here is that LEDBAT is designated a "scavenger" 
protocol that should get out of the way of primary uses (which includes 
rtcweb traffic).  While it's possible that will be the result 
experimentally, I tend to doubt it and it's certainly unclear without 
experiments - and I also doubt a fair sharing will occur.  So my guess 
(which should be checked!) is that LEDBAT and RRTCC are not compatible 
on the same bottleneck links.  This means that manual intervention will 
be needed to enable RRTCC traffic to be usable; either stopping or 
bandwidth-limiting any LEDBAT flows.

In theory if the OS was controlling the LEDBAT flows it could be asked 
by an RRTCC (userspace) application to have them get out of the way 
(which probably means halt or virtually so during RRTCC operation) or to 
in some manner use send() traffic as a flag to do so.  An example might 
be applications using LEDBAT in OSX for 'background' download/update 
that may not have external controls that a user could use to suspend 
transfers during a call.  I'm not holding my breath on this one; and it 
wouldn't help if there's another endpoint behind the same bottleneck 
using LEDBAT.

The last recourse is the advanced modem/router with classification 
(again, not something we can do anything about).  However, as Jim Gettys 
will tell you, this may not help you as much if another link is the 
bottleneck, such as a wifi router behind the modem or primary router.

I think we're going to find that LEDBAT has failed in (what should be) a 
primary goal, which is to avoid hurting "foreground" traffic, largely 
because they appear to have only considered TCP flows (from review of 
their mailing list and specs).  Regular inflexible VoIP traffic is 
likely badly hurt by the current spec (since 100+ms of extra delay will 
push typical VoIP traffic well into the "bad" part of the MOS slope), 
and delay-sensing foreground protocols like RRTCC are probably blown out 
of the water.

If LEDBAT actually is to be a 'scavenger' protocol, it must have some 
mechanism other than purely queue depth to allow foreground protocols to 
push it out of the way.  It's possible it could stick to queue depth but 
use very small values, and/or use slower time constants than 
"foreground" delay-sensing algorithms to guarantee they 'win' when 
competing with it.

Cross-posting to the LEDBAT list in the hopes that I'm wrong.  (For 
reference, RRTCC is a delay-sensing CC algorithm for RTP traffic, 
recently discussed at IETF83 in the ICCRG and planned for use in rtcweb
clients.  RRTCC is a brand-new moniker for the algorithm in Harald 
Alvestrand's draft, but similar algorithms have been in use (but not 
standardized) since at least 2004, long predating LEDBAT/uTP.)

-- 
Randell Jesup
randell-ietf@jesup.org