Re: [Lsr] Zaheduzzaman Sarker's Discuss on draft-ietf-lsr-isis-fast-flooding-08: (with DISCUSS and COMMENT)

Zaheduzzaman Sarker <zahed.sarker.ietf@gmail.com> Sun, 14 April 2024 20:42 UTC

Return-Path: <zahed.sarker.ietf@gmail.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D1A0CC14F5F3; Sun, 14 Apr 2024 13:42:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.995
X-Spam-Level:
X-Spam-Status: No, score=-1.995 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gc8QilewJObx; Sun, 14 Apr 2024 13:42:49 -0700 (PDT)
Received: from mail-pf1-x435.google.com (mail-pf1-x435.google.com [IPv6:2607:f8b0:4864:20::435]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 86371C14F61F; Sun, 14 Apr 2024 13:41:39 -0700 (PDT)
Received: by mail-pf1-x435.google.com with SMTP id d2e1a72fcca58-6ecee5c08e6so2724616b3a.3; Sun, 14 Apr 2024 13:41:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1713127299; x=1713732099; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=Yjy/++0yqMdLIAI+EIDVw7CkOyrY86MZGkWRLBkt3Uw=; b=DQOmgMNVCvdalIPbirKaZwXdR337d6eTpXDG3yNAa1y5hRKpvr70SfrnDhqM9kSLp0 0bvdup7WS2ZuvvZ10ykXMH35f4o0CSOtzLim49kJYLEQyJaj010RXFkcaJsoUf7n1Ak7 MEg6Z1caTn4DFZAKWo9Hn6ROEKlwIaR4nyh0/ACEveN7DXMIDWqX38FMaZfUMN3yihsj TH6oCrYOyO7hkLxEVquYZ5XgFJeOkZnDuIheAEQRq/2LGOtjXSNiblN9O/CpzhRWdrbG SoUfbjCQqMX9hhpqGZglZelZxfGqyYr10CYhEGUO17JurdmFhKfCHpZDIMkIlyoZf6ec gXdA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1713127299; x=1713732099; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=Yjy/++0yqMdLIAI+EIDVw7CkOyrY86MZGkWRLBkt3Uw=; b=vLIl13UEpEeZlrsnYYKf6BgF9vrqI5XQka/SWwmLkvwKV+hL3xFCtF9JoaBeU9ADh8 V1IkUHkBHdg/ubJdrx063Q2akvZX0RMc6GRlGZrACyS2eMpBtsqCXbL8KD7nM+keiAkj 1CVF7r+ZPOk7f0aGOdti4yh7j1hq7fkPvL6qo2zY9x6VVBRUqOC+rXSYgGBs8k7wU8ms +IEWiEyPm65viSMojXIbfCdaBWZXebXTAHslVWCIyJYxBxKu4zDUnZSpW7Z85yTT1jRJ SqE68vj/0s98uMTpI9lDV5rHfkKxwe4MnRdQSPogv5j8I68Wx7tavFJ+LJJT55BBz9Q3 9lqg==
X-Forwarded-Encrypted: i=1; AJvYcCVEt0iTr3+vKQjSpdGK2E9ITdDAPlgru8OfPfHCrG00QXWboLnkJLOLSN2Mb4gzOtswuPDwW539pTumG6fZPFBK8b+/++DIIfMpOqadTzPWDP2a4hsrlsvpFpzAwNpaUz27ck3X5Mqbbx03ku2cqURCsWPubE1fkn52qhnCoJKsHEaLw3lBJ18WGDv87g==
X-Gm-Message-State: AOJu0YxjgWQQnWe76uMd/hyib8V3kpHfrmeJgc85tDXXRatCHReaOckB XS4ELLTXOrhYPNeOvmvmxtoqs/wNm0EVuTnGjL4qAkYjU3NCPH+X/rO2kh3f28Qg8YzUjR5ohsT C1nbRWWNSDDpX4umZAj3Roj9fwOU=
X-Google-Smtp-Source: AGHT+IG4F6mxO58pKEpfnoN7/Hxr4DfQAfIgHm2OarRk9AZkvp1StixDZfbGaYuRl1tKnPzph3P2zxFQ5abFasDEDJI=
X-Received: by 2002:a05:6a20:96c6:b0:1a7:3365:d8ed with SMTP id hq6-20020a056a2096c600b001a73365d8edmr6853297pzc.29.1713127298723; Sun, 14 Apr 2024 13:41:38 -0700 (PDT)
MIME-Version: 1.0
References: <171222579232.2606.7357707210840921573@ietfa.amsl.com> <AS2PR02MB8839702CE989F60496AADB9AF0072@AS2PR02MB8839.eurprd02.prod.outlook.com> <CAEh=tcfPijYR98BR-f8xkhFEX8qnnh-B1zPHiB9RtzT3uVh9fQ@mail.gmail.com> <AS2PR02MB8839D63A9B7CF1A18D310D45F0052@AS2PR02MB8839.eurprd02.prod.outlook.com> <BY5PR11MB433727221B074D3946CEE814C1042@BY5PR11MB4337.namprd11.prod.outlook.com> <FDDF014D-DDE7-4571-8C85-85F3256ACC6F@juniper.net>
In-Reply-To: <FDDF014D-DDE7-4571-8C85-85F3256ACC6F@juniper.net>
From: Zaheduzzaman Sarker <zahed.sarker.ietf@gmail.com>
Date: Sun, 14 Apr 2024 22:41:27 +0200
Message-ID: <CAEh=tccwMVbTa9AArd00m0LXOyP4h=JBmwYj+03TWYuTaWhTfQ@mail.gmail.com>
To: John Scudder <jgs@juniper.net>
Cc: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>, DECRAENE Bruno INNOV/NET <bruno.decraene@orange.com>, "lsr-chairs@ietf.org" <lsr-chairs@ietf.org>, "draft-ietf-lsr-isis-fast-flooding@ietf.org" <draft-ietf-lsr-isis-fast-flooding@ietf.org>, "lsr@ietf.org" <lsr@ietf.org>, "acee.ietf@gmail.com" <acee.ietf@gmail.com>, The IESG <iesg@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000018770906161488a8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/a4QiuBO_fhq4Awh34P2sX2qmbns>
Subject: Re: [Lsr] Zaheduzzaman Sarker's Discuss on draft-ietf-lsr-isis-fast-flooding-08: (with DISCUSS and COMMENT)
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 14 Apr 2024 20:42:53 -0000

Hi,

I actually agree here that adding information about cross layer potential
might not be helpful here, also the proposed new text does not really the
description that I was looking for. My original ask is describe why flow
control and congestion control is required / need to be implemented for the
IS-IS flooding, and I wanted to see very simple explanation about the
motivation/reasoning for implementing flow control + congestion controls.
This is not written very clearly in this document.  This document says - "The
following two sections provide two Flow and/or Congestion control
algorithms that may be implemented by taking advantage of the extensions
defined in this document."

By the way John, your QUIC document example is not only vague but also
wrong here, I don't see why QUIC cannot be run over non-IP L3/L2 :-).

//Zahed

On Fri, Apr 12, 2024 at 8:01 PM John Scudder <jgs@juniper.net> wrote:

> I’m with Les on this one — "we should not conflate this document by
> discussing such issues.”
>
> We often have this tension at this stage of reviewing a draft that’s
> almost ready for publication. It’s being cross-reviewed by specialists in
> other areas, and so it’s helpful for the document to provide enough
> background to satisfy them. Sometimes this works, sometimes not, as seems
> to have been the case this time, and then as Bruno says, "I have large
> freedom to express myself in an email” to try to fill in the blanks. The
> question at hand is whether after publication, those blanks have to be
> filled in for future readers, or if we are in a special case situation
> right now.
>
> My take is that once the document is published, its primary and most
> important audience will be people who are already experts in IS-IS, either
> as implementors or operators (or both!), and those people won’t find a
> discussion of IS-IS over a standard L4 to be illuminating, but confusing…
> even if the discussion ends up saying “here’s why we didn’t do it over a
> standard L4”. It’s vaguely analogous to asking a QUIC document to provide a
> rationale for why it’s specified over IP and not over CLNS… sure, you could
> provide that rationale, but everyone reading it would end up wondering why
> you spent your time and theirs on it.
>
> So while the NEW text Bruno suggested is correct of course, I wouldn’t
> encourage adding it to the document, because I think it doesn’t serve the
> needs of future readers, it just creates clutter.
>
> $0.02,
>
> —John
>
> On Apr 12, 2024, at 1:03 PM, Les Ginsberg (ginsberg) <ginsberg@cisco.com>
> wrote:
>
>
> Top posting one comment.
>
> Regarding
>
> <snip>
> [Bruno2] Well, I have large freedom to express myself in an email. Writing
> a summary of WG history in an RFC is a little bit more engaging... Also,
> although the perspective may be of interest, it’s less likely of little
> interest to an IS-IS implementor.
> I would propose the below addition in §6.1 “overview”  but I’d very much
> welcome the opinion of chairs and responsible AD on this text. (both added
> in destination of this email)
>
> OLD:
> Ensuring the goodput between two entities is a layer-4 responsibility as
> per the OSI model. A typical example is the TCP protocol defined in
> [RFC9293] that provides flow control, congestion control, and reliability.
>
> NEW:
> Ensuring the goodput between two entities is a layer-4 responsibility as
> per the OSI model. A typical example is the TCP protocol defined in
> [RFC9293] that provides flow control, congestion control, and reliability.
> In order to improve the IS-IS goodput an option would be to carry IS-IS in
> a layer-4 protocol. However this creates challenges as IS-IS does not use
> IP so existing layer-4 stacks using IP are not readily available. Also
> IS-IS already have reliability mechanisms which would create duplication
> and possibly interference. Finally, many layer-4 providing flow control
> also provides ordered delivery which is not required for IS-IS and even
> harmful.
> <end snip>
>
> IS-IS runs directly over Layer 2.
> The solutions proposed in this document are for IS-IS as it is currently
> defined.
>
> The question of whether to run IS-IS over Layer 3 and if so how to do it
> are not in scope for this document.
> If a definition of running Is-IS over Layer 3 ever becomes standardized,
> how that may impact fast-flooding is just one of many aspects which will
> need to be addressed.
>
> I feel very strongly that we should not conflate this document by
> discussing such issues.
>
>    Les
>
>
> *From:* bruno.decraene@orange.com <bruno.decraene@orange.com>
> *Sent:* Thursday, April 11, 2024 11:53 AM
> *To:* Zaheduzzaman Sarker <zahed.sarker.ietf@gmail.com>;
> lsr-chairs@ietf.org; John Scudder - Juniper (jgs@juniper.net) <
> jgs@juniper.net>
> *Cc:* Zaheduzzaman Sarker <Zaheduzzaman.Sarker@ericsson.com>;
> draft-ietf-lsr-isis-fast-flooding@ietf.org; lsr@ietf.org;
> acee.ietf@gmail.com; acee-ietf@gmail.com; The IESG <iesg@ietf.org>
> *Subject:* RE: Zaheduzzaman Sarker's Discuss on
> draft-ietf-lsr-isis-fast-flooding-08: (with DISCUSS and COMMENT)
>
> Hi Zahed,
>
> Please see inline [Bruno2]
>
>
> *From:* Zaheduzzaman Sarker <zahed.sarker.ietf@gmail.com>
> *Sent:* Thursday, April 11, 2024 11:33 AM
> Hi Bruno,
>
> My apologies too :-) , I was on PTO
>
> [Bruno2] No problem. I was also partly on PTO and I would also hope to be
> next week.
>
> My responses inline below.
>
> //Zahed
>
> On Tue, Apr 9, 2024 at 5:13 PM <bruno.decraene@orange.com> wrote:
>
> Zahed,
>
> Thank you for your review and comments.
> Sorry for my delayed response.
>
> Les has already commented on the algo 2 section.
>
> Please see inline for other points [Bruno]
>
> >
> > -----Original Message-----
> > From: Zaheduzzaman Sarker via Datatracker <noreply@ietf.org>
> > Sent: Thursday, April 4, 2024 12:17 PM
> > To: The IESG <iesg@ietf.org>
> > Cc: draft-ietf-lsr-isis-fast-flooding@ietf.org; lsr-chairs@ietf.org;
> lsr@ietf.org; acee.ietf@gmail.com; acee-ietf@gmail.com
> > Subject: Zaheduzzaman Sarker's Discuss on
> draft-ietf-lsr-isis-fast-flooding-08: (with DISCUSS and COMMENT)
> >
> >
> --------------------------------------------------------------------------------------------------------------
> > CAUTION : This email originated outside the company. Do not click on any
> links or open attachments unless you are expecting them from the sender.
> >
> > ATTENTION : Cet e-mail provient de l'extérieur de l'entreprise. Ne
> cliquez pas sur les liens ou n'ouvrez pas les pièces jointes à moins de
> connaitre l'expéditeur.
> >
> --------------------------------------------------------------------------------------------------------------
> >
> > Zaheduzzaman Sarker has entered the following ballot position for
> > draft-ietf-lsr-isis-fast-flooding-08: Discuss
> >
> > When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
> >
> >
> > Please refer to
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
> <https://urldefense.com/v3/__https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/__;!!NEt6yMaO-gk!FDHx3wNpakbxfPKYe6pJLwOf3XxUO16VP1r7D8kL6gqR_txXY-NAStAYlkkgZ885hWPBQgPiHH9Ciw$>
> > for more information about how to handle DISCUSS and COMMENT positions.
> >
> >
> > The document, along with other ballot positions, can be found here:
> > https://datatracker.ietf.org/doc/draft-ietf-lsr-isis-fast-flooding/
> <https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-ietf-lsr-isis-fast-flooding/__;!!NEt6yMaO-gk!FDHx3wNpakbxfPKYe6pJLwOf3XxUO16VP1r7D8kL6gqR_txXY-NAStAYlkkgZ885hWPBQgPkuXf5lQ$>
> >
> >
> >
> > ----------------------------------------------------------------------
> > DISCUSS:
> > ----------------------------------------------------------------------
> >
> > Thanks for working on this specification. Thanks for Mirja for the TSVART
> > review.
> >
> > I would like to discuss the following points as I believe some
> clarifications
> > would help -
> >
> > - Does the flow and congestion control algorithm 1 assume that there is
> only on
> > (input)queue in a particular link? I understand that the motivation for
> > congestion control algorithm 2 is that there are multiple input queues
> and
> > defining rwin is difficult. Why is that easy for the case of algorithm 1?
>
> [Bruno]
> Sorry it's not clear to me if by "multiple input queues" you mean in
> parallel (e.g. for different IS-IS neighbors or different incoming traffic)
> or serial (consecutive congestion points).
>
>
> I was considering 6.3.1 kind of setup.
>
> [Bruno2] Thank you for the clarification. That’s good as this is something
> that I can understand 😉
>
>
> Also by " the flow and congestion control algorithm 1" is this specific to
> flow or congestion control?
>
>
> The fact is it was not clear to me if flow control in section 6.2.1 is an
> independent solution to the problem or is part of the Algorithm 1. Over all
> it is now not clear to me what should I implement from 6.2...Is
> implementing the flow control described in 6.2.1 is good enough? or do we
> need flow control and congestion control both to be implemented?
>
> [Bruno2] flow control in section 6.2.1 is part of Algorithm 1 which is
> section 6.2
> Implementing flow control in 6.2.1 is good enough if your internal router
> implementation will not significantly drop IS-IS PDU (considering 6.3.1
> setup). E.g., if you have congestion for IS-IS traffic, you are capable of
> buffering it. (IS-IS is typically treated as high priority). Otherwise,
> adding congestion control will help. (in our tests, we had a rather
> simplified router, more like pizza box than chassis, and flow control was
> enough. We had to deliberately create congestion with a deliberate small
> buffer to see benefit from congestion control)
>
>
>
> Regardless, I'll try an answer and please refocus me as needed.
>
> Flow control assume the existence of a control plane buffer e.g. in the
> socket. In the general case, there may be one per IS-IS neighbor or one
> shared by multiple neighbors. In the first case, the size of this buffer is
> advertised as the rwin. In the latter case, the size needs to be split
> across those neighbors. (In more details, some room need to be kept to
> handle some IS-IS traffic which is not flow controlled such as Hello and
> PSNP).
>
>
> Right and I am under the understanding that the first case is where the
> 6.2.1 is only valid, am I wrong?
>
> [Bruno2] 6.2.1 is valid in both cases. If multiple neighbhors share the
> same socket buffer one need to advertise rwin as buffer/number of neighbors.
>
> On the shared queues what happens if Algorithm 1 is implemented by some
> and Algorithm 2 implemented by others? on a shared queue to get the goodput
> we need fairness among the competing algorithms.
>
> [Bruno2] Good question.
> To begin with, contrary to typical transport goal, I don’t think that we
> require fairness between IS-IS neighbors. For IS-IS, assuming a single
> IS-IS level/instance, all IS-IS neighbors will advertise me the same
> packets/LSP. It’s does not matter whether I receive all LSPs from
> neighbhor1 only while neighbhor2 has zero goodput.
> Then to answer your question, in your scenario, algorithm2 would typically
> be more aggressive and get all the bandwidth. (although we don’t have
> details about algo2). IMHO likely algo1 would be less aggressive as its
> flow control RWIN is aiming at proving control without loss while algo2 is
> reacting when it has exceeded the capability of the receiver. And for algo
> 1 LSP loss would temporarily reduce the usable RWIN and hence the
> throughput (if the throughput was limited by RTT and RWIN size).
> Finally, please consider that currently there is zero flow control or
> congestion control algorithm specified for IS-IS. It’s all proprietary and
> different. (Possibly with little consideration for interop from some
> implementation). So I believe this document is a step in the right
> direction.
>
>
>
> Congestion control does not make much assumptions because it seems like
> router architectures may be quite different and for the complex cases
> (chassis with multiple line cards) the internal are a secret sauce. However
> during out test we only introduced a single and simple congestion point.
>
>
> Have you run any test with two different algorithms sharing same
> congestion point?
>
> [Bruno2] No in our lab.
> But as there is currently no specified algo, and different vendors have
> different behaviors, well I’d say that multiple vendors networks experience
> this in live networks for about 2 decade (and even for single vendor, some
> vendors have changed their algo over the time)
>
>
> On a side note, we have presented some tests results at IETF 111. If you
> want to have a look at them, please find below the slides. If you have some
> comments on the tests results, I would be obviously interested in your
> comments. Either on the list or of the list.
>
> https://datatracker.ietf.org/meeting/111/materials/slides-111-lsr-22-flow-congestion-control-00.pdf
> <https://urldefense.com/v3/__https://datatracker.ietf.org/meeting/111/materials/slides-111-lsr-22-flow-congestion-control-00.pdf__;!!NEt6yMaO-gk!FDHx3wNpakbxfPKYe6pJLwOf3XxUO16VP1r7D8kL6gqR_txXY-NAStAYlkkgZ885hWPBQgMpO83Ozg$>
>
> As far as I understood it, the motivation for congestion control algorithm
> 2 is that:
> - determining rwin may be difficult when the same software runs on very
> different hardware and that no API exist to get that info;
> - the congestion control algorithm may cover the functionality of the flow
> control in which case implementing only the congestion control is simpler
> than implementing both
>
>
> This should be in the document and very important one.
>
> [Bruno2] The first point is an implementation specific point/issue. This
> may be completely irrelevant for another implementation.
> I’ll leave the second point to Les as this is my understanding but he may
> have a different opinion.
>
>
> - flow control requires both the sender and the receiver to be upgraded
> while congestion control algorithm 2 could cover existing implementation
> including in their various forms...
>
>
> This is also information to share.
>
> [Bruno2]
> https://datatracker.ietf.org/doc/html/draft-ietf-lsr-isis-fast-flooding-09#section-5
> <https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/draft-ietf-lsr-isis-fast-flooding-09*section-5__;Iw!!NEt6yMaO-gk!FDHx3wNpakbxfPKYe6pJLwOf3XxUO16VP1r7D8kL6gqR_txXY-NAStAYlkkgZ885hWPBQgMPJX5d4A$>
>  already states that performance improvement on the receiver is needed in
> order to have a faster feedback (and more rythme) from the sender. I tend
> to believe that this is useful for both algo (as this looks difficult for
> the sender to adapt in the absence of feedback from the receiver) but I’m
> ok adding specific text in the Algo 1 flow control section.
> I would propose to add the following text at the end of  6.2.1. Flow
> control (i.e., just after the discussion on the impact of RWIN value on the
> performance, which start with “The RWIN value is of importance when the
> RTT is the limiting factor for the throughput.”)
>
> “Equally RTT is of importance for the performance. That’s why the
> performance improvement on the receiver, described in section 5, are
> important to achieve good throughput. If the receiver does not support
> those performance improvement, in the worst case (small RWIN and high RTT)
> the throughput will be limited by the LSP Transmission Interval as defined
> in section 4.2.“
>
> (text subject to review from my co-authors)
>
>
>
> > Why is that easy for the case of algorithm 1?
>
> [Bruno] In our implementation (Free Range Routing) determining rwin has
> not been found to be a problem.
>
>
> > - Can we really call congestion control algorithm 2 a congestion control
> > algorithm? We are are really solving the problem of flow control, it
> sounded
> > more like a emergency break ( aka circuit breaker ) to me where you
> reduce or
> > even stop sending LSPs. My point is I am not sure how to interpret the
> > congestion control algorithm 2 with any sort of details. If I replace
> section
> > 6.3.2 with - "if the routing architecture does not support deterministic
> rwin,
> > the transmitter MUST adapts the transmission rate based on measurement
> of the
> > actual rate of acknowledgments received." what harm would it cause?
> >
> > - For the congestion control algorithm 2, I am missing when the
> transmitter
> > should reduce or when it should stop sending as I am not sure reducing
> the
> > transmission rate would solve the problem of not. This comes from lack of
> > details on the particular algorithm that will be implemented eventually.
> >
> > - Section 6.3.2. says -
> >
>     > The congestion control algorithm MUST NOT assume the receive
> performance of
>     > a neighbor is static, i.e., it MUST handle transient conditions which
>     > result in a slower or faster receive rate on the part of a neighbor.
> >
> >   How to separate the persistent congestion from transient slower
> receive rate?
>   > I am not sure how to fulfill the "MUST".
> >
> >
> > ----------------------------------------------------------------------
> > COMMENT:
> > ----------------------------------------------------------------------
> >
> > I have some further questions or comments -
> >
> > - How does the implementers select between congestion control (CC)
> algorithm 1
> > and 2? or is the intention that both gets implemented and after
> experiments we
> > pick one? As in my discuss point I am not sure about the CC algorithm 2
> on how
> > to conclude on the experiments.
>
> [Bruno] My guess is that each implementation makes its choices based on
> its constrained.
> Algo 2 is supposed to adapt to any receiver but as you stated the detailed
> are not specified.
> Algo 1 flow control needs two things from the receiver:
>
>
> Again. does Algo 1 include both flow and congestion control?
>
> [Bruno2] already replied above (I believe)
>
>
> -a- the advertisement of the received window.
> -b- acknowledgements faster than the original ISO spec in order to get a
> feedback loop and to "release" the window.
>
> In the absence of "a" the value could be locally configured on the sender.
> This is covered in the document.
> In the absence of "b" the performance will be affected (but not worst than
> today)
>
>
> is b discussed in the document?
>
> [Bruno2] indirectly in 6.2.1 but the above proposed addition would make it
> more explicit.
>
>
>
> >
> > - It already says flow control and congestion control is a Layer-4
> > responsibility, it would be great if we can say why that is not the
> preferred
> > layer for fast flooding even if it may be obvious for some of us.
>
> [Bruno]
> >From a protocol perspective, IS-IS does not even have a layer-3 (at least
> IP) so a layer-4 is not readily available.
> The LSR WG considered using TCP/IP with
> draft-hsmit-lsr-isis-flooding-over-tcp. In short, the requirement to use IP
> (with same version on both side) was seen as a significant change.
> Also, IS-IS only lacks flow and congestion control while layer-4 usually
> brings other functions. In particular, the "reliability delivery" is
> already covered by IS-IS and there would be duplication. Also we don't
> need/want ordered delivery.
>
> Surely, the ISO, which originally specified IS-IS, was aware of network
> layers and the benefit of layers, including layer 4. I was not there at
> this time so I don't know why precisely they didn't use a layer 4. I guess
> that at the time it was felt that using static constant would be good
> enough. Scaling and routing convergence requirements were much different
> though. Also IS-IS flooding is the hard part and it (really) needs to work
> so there is probably also a desire for control. (Also I've been told that
> for BGP -which uses TCP- it's not as simple as "just using TCP")
>
>
> I think a summery of what you wrote would be very useful to describe when
> we are doing congestion and flow control in this document. Currently it
> just says it is L4 job and we are defining flow control and congestion
> control, without answering why.
>
> [Bruno2] Well, I have large freedom to express myself in an email. Writing
> a summary of WG history in an RFC is a little bit more engaging... Also,
> although the perspective may be of interest, it’s less likely of little
> interest to an IS-IS implementor.
> I would propose the below addition in §6.1 “overview”  but I’d very much
> welcome the opinion of chairs and responsible AD on this text. (both added
> in destination of this email)
>
> OLD:
> Ensuring the goodput between two entities is a layer-4 responsibility as
> per the OSI model. A typical example is the TCP protocol defined in
> [RFC9293] that provides flow control, congestion control, and reliability.
>
> NEW:
> Ensuring the goodput between two entities is a layer-4 responsibility as
> per the OSI model. A typical example is the TCP protocol defined in
> [RFC9293] that provides flow control, congestion control, and reliability.
> In order to improve the IS-IS goodput an option would be to carry IS-IS in
> a layer-4 protocol. However this creates challenges as IS-IS does not use
> IP so existing layer-4 stacks using IP are not readily available. Also
> IS-IS already have reliability mechanisms which would create duplication
> and possibly interference. Finally, many layer-4 providing flow control
> also provides ordered delivery which is not required for IS-IS and even
> harmful.
>
> Thanks,
> Regards,
> --Bruno
>
> //Zahed
>
>
>
> Regards,
> --Bruno
>
> > - Section 6.3.2 says -
> >
>     > When congestion control is necessary, it can be implemented based on
>     > knowledge of the current flooding rate and the current
> acknowledgement rate.
> >
> >   So, how do we know when the congestion control is necessary?
> >
> >
> >
> >
>
> ____________________________________________________________________________________________________________
> Ce message et ses pieces jointes peuvent contenir des informations
> confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez
> recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages
> electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou
> falsifie. Merci.
>
> This message and its attachments may contain confidential or privileged
> information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and
> delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been
> modified, changed or falsified.
> Thank you.
>
> ____________________________________________________________________________________________________________
>
> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
>
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
>
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
>
> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>
>
>
> This message and its attachments may contain confidential or privileged information that may be protected by law;
>
> they should not be distributed, used or copied without authorisation.
>
> If you have received this email in error, please notify the sender and delete this message and its attachments.
>
> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
>
> Thank you.
>
>
>