Re: [p2pi] Follow-Up from Comcast Presentation

Richard Bennett <richard@bennett.com> Sat, 07 June 2008 19:54 UTC

Return-Path: <p2pi-bounces@ietf.org>
X-Original-To: p2pi-archive@ietf.org
Delivered-To: ietfarch-p2pi-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 255E43A6BCD; Sat, 7 Jun 2008 12:54:40 -0700 (PDT)
X-Original-To: p2pi@core3.amsl.com
Delivered-To: p2pi@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8D4493A6BCD for <p2pi@core3.amsl.com>; Sat, 7 Jun 2008 12:54:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.265
X-Spam-Level:
X-Spam-Status: No, score=-2.265 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id REdXVAGqCzE5 for <p2pi@core3.amsl.com>; Sat, 7 Jun 2008 12:54:38 -0700 (PDT)
Received: from outbound-mail-134.bluehost.com (outbound-mail-134.bluehost.com [67.222.39.24]) by core3.amsl.com (Postfix) with SMTP id 73F0E3A6B33 for <p2pi@ietf.org>; Sat, 7 Jun 2008 12:54:38 -0700 (PDT)
Received: (qmail 25064 invoked by uid 0); 7 Jun 2008 19:54:48 -0000
Received: from unknown (HELO host46.hostmonster.com) (74.220.202.46) by outboundproxy4.bluehost.com with SMTP; 7 Jun 2008 19:54:48 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=bennett.com; h=Received:Message-ID:Date:From:User-Agent:MIME-Version:To:CC:Subject:References:In-Reply-To:Content-Type:Content-Transfer-Encoding:X-Identified-User:DomainKey-Status; b=C8xPNXQy7TsYogQMpw5nOFaxrbsMsjPY+OAq3NRbtUZ4VkhSIbm+/RPPqBZFQ3Tf09TAKmOrcN05vJd/bJBtEI+0vWSxiN20MZ2q/RQUbnURDjWu2x3FxKch2+S87thT;
Received: from c-67-169-90-32.hsd1.ca.comcast.net ([67.169.90.32] helo=[192.168.0.12]) by host46.hostmonster.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <richard@bennett.com>) id 1K54Uy-0006u9-G1; Sat, 07 Jun 2008 13:54:48 -0600
Message-ID: <484AE788.1030208@bennett.com>
Date: Sat, 07 Jun 2008 12:54:48 -0700
From: Richard Bennett <richard@bennett.com>
User-Agent: Thunderbird 2.0.0.14 (Windows/20080421)
MIME-Version: 1.0
To: p2pi@ietf.org
References: <45AEC6EF95942140888406588E1A6602045CBA5E@PACDCEXCMB04.cable.comcast.com> <3efc39a60806061909n11a65eafnce88df7c73c30639@mail.gmail.com> <4CB75CEA-FE7E-4398-A1B3-A03DBF5063D3@icsi.berkeley.edu> <3efc39a60806070852p49f6a066y27e804fd5d4cf989@mail.gmail.com> <20080607173925.GJ8579@verdi> <484AC9EB.8060501@isi.edu> <20080607175712.GK8579@verdi> <484ACEEC.9070705@joelhalpern.com> <20080607191509.GL8579@verdi> <1B22E2BD-9910-477D-AF13-AC6F1B5FAD43@icsi.berkeley.edu>
In-Reply-To: <1B22E2BD-9910-477D-AF13-AC6F1B5FAD43@icsi.berkeley.edu>
X-Identified-User: {842:host46.hostmonster.com:bennett1:bennett.com} {sentby:smtp auth 67.169.90.32 authed with richard+bennett.com}
DomainKey-Status: no signature
Cc: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>
Subject: Re: [p2pi] Follow-Up from Comcast Presentation
X-BeenThere: p2pi@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: P2P Infrastructure Discussion <p2pi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/p2pi>
List-Post: <mailto:p2pi@ietf.org>
List-Help: <mailto:p2pi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/p2pi>, <mailto:p2pi-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: p2pi-bounces@ietf.org
Errors-To: p2pi-bounces@ietf.org

This is an interesting discussion. By way of introduction, I'm mainly an 
IEEE 802 guy, having contributed to 802.3, 802.11, and 802.15.3a, but I 
did have some input into RFC 1001 and 1002, and have worked on Bandwidth 
Brokers to support video conferencing and that sort of thing for a 
while. I think some combination of Re-ECN and Diffserv will solve the 
congestion problem that we see on primarily on Layer 2 networks thanks 
to increased use of P2P.

In the 802.11e/Wi-Fi Alliance WMM world, we created four priorities that 
are easily mappable to DSCP and 802.1d VLAN tags: Voice, Video, Best 
Effort, and Background. The worse-than-best-effort service is 
Background. WMM is implemented in all the wireless NAT boxes that have 
sold over the last three years or so, so it's basically the status quo 
model for residential networks. In the early days of the Internet, 
during the Great Switchover period, the default Layer 2 was DIX 
Ethernet, a single service system, but nowadays Wi-Fi is a major part of 
the Layer 2 scenario with its four service classes. We could do worse 
than see how to smoothly integrate this sort of Layer 2 service into the 
IETF stack.

David Clark made the observation at the FCC hearing in Cambridge that it 
would be nice for the network to communicate its congestion state to 
applications a priori, so that applications would make decisions about 
how to handle current conditions. This strikes me as a wise enhancement. 
It would no doubt be facilitated by a system that improved 
layer-to-layer communication within the stack.

IEEE 802 goes to great pains to describe Service Access Points at each 
layer and a variety of return codes for accessing functions. In 
principle a Layer 3 function desiring a specific priority from Layer 2 
can simply ask for it when presenting a packet, and be told if it got 
what it wanted. In practice, the DiffServ model of tagging packets with 
priority can be married with 802.11e/WMM through what we call a 
Convergence Function in 802 land. The 802.11e standard actually 
describes one, but I'm not sure it's right.

We probably won't make much progress here if we engage in too much 
hand-waving and opining about the old days of the Internet and what 
assumptions developers may or may not have, so it's probably wise to 
stick to specifics as Nick has below.

Richard Bennett

Nicholas Weaver wrote:
> There is always just "friendlier than TCP-Reno under reasonable ranges  
> of latency and bandwidth" as a definition, so conventional TCP flows  
> will outcompete the "scavenger" service.
>
> Of which there are plenty of examples, including TCP-vegas, of stable  
> congestion control algorithms which have this property.
>
> So the question is not "How do you do this?" but "Why is this not  
> done?".
>
> I believe that the Linux stack, for example, allows you to switch the  
> behavior of newly-created flows from Vegas to Reno with a /proc update.
>
> _______________________________________________
> p2pi mailing list
> p2pi@ietf.org
> https://www.ietf.org/mailman/listinfo/p2pi
>   
_______________________________________________
p2pi mailing list
p2pi@ietf.org
https://www.ietf.org/mailman/listinfo/p2pi