Re: [p2pi] Follow-Up from Comcast Presentation
Richard Bennett <richard@bennett.com> Sat, 07 June 2008 19:54 UTC
Return-Path: <p2pi-bounces@ietf.org>
X-Original-To: p2pi-archive@ietf.org
Delivered-To: ietfarch-p2pi-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 255E43A6BCD; Sat, 7 Jun 2008 12:54:40 -0700 (PDT)
X-Original-To: p2pi@core3.amsl.com
Delivered-To: p2pi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8D4493A6BCD for <p2pi@core3.amsl.com>; Sat, 7 Jun 2008 12:54:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.265
X-Spam-Level:
X-Spam-Status: No, score=-2.265 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id REdXVAGqCzE5 for <p2pi@core3.amsl.com>; Sat, 7 Jun 2008 12:54:38 -0700 (PDT)
Received: from outbound-mail-134.bluehost.com (outbound-mail-134.bluehost.com [67.222.39.24]) by core3.amsl.com (Postfix) with SMTP id 73F0E3A6B33 for <p2pi@ietf.org>; Sat, 7 Jun 2008 12:54:38 -0700 (PDT)
Received: (qmail 25064 invoked by uid 0); 7 Jun 2008 19:54:48 -0000
Received: from unknown (HELO host46.hostmonster.com) (74.220.202.46) by outboundproxy4.bluehost.com with SMTP; 7 Jun 2008 19:54:48 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=bennett.com; h=Received:Message-ID:Date:From:User-Agent:MIME-Version:To:CC:Subject:References:In-Reply-To:Content-Type:Content-Transfer-Encoding:X-Identified-User:DomainKey-Status; b=C8xPNXQy7TsYogQMpw5nOFaxrbsMsjPY+OAq3NRbtUZ4VkhSIbm+/RPPqBZFQ3Tf09TAKmOrcN05vJd/bJBtEI+0vWSxiN20MZ2q/RQUbnURDjWu2x3FxKch2+S87thT;
Received: from c-67-169-90-32.hsd1.ca.comcast.net ([67.169.90.32] helo=[192.168.0.12]) by host46.hostmonster.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <richard@bennett.com>) id 1K54Uy-0006u9-G1; Sat, 07 Jun 2008 13:54:48 -0600
Message-ID: <484AE788.1030208@bennett.com>
Date: Sat, 07 Jun 2008 12:54:48 -0700
From: Richard Bennett <richard@bennett.com>
User-Agent: Thunderbird 2.0.0.14 (Windows/20080421)
MIME-Version: 1.0
To: p2pi@ietf.org
References: <45AEC6EF95942140888406588E1A6602045CBA5E@PACDCEXCMB04.cable.comcast.com> <3efc39a60806061909n11a65eafnce88df7c73c30639@mail.gmail.com> <4CB75CEA-FE7E-4398-A1B3-A03DBF5063D3@icsi.berkeley.edu> <3efc39a60806070852p49f6a066y27e804fd5d4cf989@mail.gmail.com> <20080607173925.GJ8579@verdi> <484AC9EB.8060501@isi.edu> <20080607175712.GK8579@verdi> <484ACEEC.9070705@joelhalpern.com> <20080607191509.GL8579@verdi> <1B22E2BD-9910-477D-AF13-AC6F1B5FAD43@icsi.berkeley.edu>
In-Reply-To: <1B22E2BD-9910-477D-AF13-AC6F1B5FAD43@icsi.berkeley.edu>
X-Identified-User: {842:host46.hostmonster.com:bennett1:bennett.com} {sentby:smtp auth 67.169.90.32 authed with richard+bennett.com}
DomainKey-Status: no signature
Cc: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>
Subject: Re: [p2pi] Follow-Up from Comcast Presentation
X-BeenThere: p2pi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: P2P Infrastructure Discussion <p2pi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/p2pi>
List-Post: <mailto:p2pi@ietf.org>
List-Help: <mailto:p2pi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: p2pi-bounces@ietf.org
Errors-To: p2pi-bounces@ietf.org
This is an interesting discussion. By way of introduction, I'm mainly an IEEE 802 guy, having contributed to 802.3, 802.11, and 802.15.3a, but I did have some input into RFC 1001 and 1002, and have worked on Bandwidth Brokers to support video conferencing and that sort of thing for a while. I think some combination of Re-ECN and Diffserv will solve the congestion problem that we see on primarily on Layer 2 networks thanks to increased use of P2P. In the 802.11e/Wi-Fi Alliance WMM world, we created four priorities that are easily mappable to DSCP and 802.1d VLAN tags: Voice, Video, Best Effort, and Background. The worse-than-best-effort service is Background. WMM is implemented in all the wireless NAT boxes that have sold over the last three years or so, so it's basically the status quo model for residential networks. In the early days of the Internet, during the Great Switchover period, the default Layer 2 was DIX Ethernet, a single service system, but nowadays Wi-Fi is a major part of the Layer 2 scenario with its four service classes. We could do worse than see how to smoothly integrate this sort of Layer 2 service into the IETF stack. David Clark made the observation at the FCC hearing in Cambridge that it would be nice for the network to communicate its congestion state to applications a priori, so that applications would make decisions about how to handle current conditions. This strikes me as a wise enhancement. It would no doubt be facilitated by a system that improved layer-to-layer communication within the stack. IEEE 802 goes to great pains to describe Service Access Points at each layer and a variety of return codes for accessing functions. In principle a Layer 3 function desiring a specific priority from Layer 2 can simply ask for it when presenting a packet, and be told if it got what it wanted. In practice, the DiffServ model of tagging packets with priority can be married with 802.11e/WMM through what we call a Convergence Function in 802 land. The 802.11e standard actually describes one, but I'm not sure it's right. We probably won't make much progress here if we engage in too much hand-waving and opining about the old days of the Internet and what assumptions developers may or may not have, so it's probably wise to stick to specifics as Nick has below. Richard Bennett Nicholas Weaver wrote: > There is always just "friendlier than TCP-Reno under reasonable ranges > of latency and bandwidth" as a definition, so conventional TCP flows > will outcompete the "scavenger" service. > > Of which there are plenty of examples, including TCP-vegas, of stable > congestion control algorithms which have this property. > > So the question is not "How do you do this?" but "Why is this not > done?". > > I believe that the Linux stack, for example, allows you to switch the > behavior of newly-created flows from Vegas to Reno with a /proc update. > > _______________________________________________ > p2pi mailing list > p2pi@ietf.org > https://www.ietf.org/mailman/listinfo/p2pi > _______________________________________________ p2pi mailing list p2pi@ietf.org https://www.ietf.org/mailman/listinfo/p2pi
- [p2pi] Follow-Up from Comcast Presentation Livingood, Jason
- Re: [p2pi] Follow-Up from Comcast Presentation Robb Topolski
- Re: [p2pi] Follow-Up from Comcast Presentation Nicholas Weaver
- Re: [p2pi] Follow-Up from Comcast Presentation Robb Topolski
- Re: [p2pi] Follow-Up from Comcast Presentation John Leslie
- Re: [p2pi] Follow-Up from Comcast Presentation Joe Touch
- Re: [p2pi] Follow-Up from Comcast Presentation John Leslie
- Re: [p2pi] Follow-Up from Comcast Presentation Joe Touch
- Re: [p2pi] Follow-Up from Comcast Presentation Joel M. Halpern
- Re: [p2pi] Follow-Up from Comcast Presentation John Leslie
- Re: [p2pi] Follow-Up from Comcast Presentation Nicholas Weaver
- Re: [p2pi] Follow-Up from Comcast Presentation Richard Bennett
- Re: [p2pi] Follow-Up from Comcast Presentation Robb Topolski
- Re: [p2pi] Follow-Up from Comcast Presentation Richard Bennett
- Re: [p2pi] Follow-Up from Comcast Presentation Lars Eggert
- Re: [p2pi] Follow-Up from Comcast Presentation Stanislav Shalunov
- Re: [p2pi] Follow-Up from Comcast Presentation Woundy, Richard
- Re: [p2pi] Follow-Up from Comcast Presentation Livingood, Jason
- Re: [p2pi] Follow-Up from Comcast Presentation Livingood, Jason
- Re: [p2pi] Follow-Up from Comcast Presentation Robb Topolski