RE: ECN in QUIC

"Lubashev, Igor" <ilubashe@akamai.com> Wed, 24 January 2018 22:54 UTC

Return-Path: <ilubashe@akamai.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C027B12D779 for <quic@ietfa.amsl.com>; Wed, 24 Jan 2018 14:54:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.69
X-Spam-Level:
X-Spam-Status: No, score=-2.69 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=akamai.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kY7CqrTa6XYN for <quic@ietfa.amsl.com>; Wed, 24 Jan 2018 14:54:24 -0800 (PST)
Received: from mx0a-00190b01.pphosted.com (mx0a-00190b01.pphosted.com [IPv6:2620:100:9001:583::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3E5CD12AF84 for <quic@ietf.org>; Wed, 24 Jan 2018 14:54:24 -0800 (PST)
Received: from pps.filterd (m0050095.ppops.net [127.0.0.1]) by mx0a-00190b01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w0OMqXjq007257; Wed, 24 Jan 2018 22:53:32 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=jan2016.eng; bh=+v4PG9CvkEKySiplprFUunq6CTYYsOalcnvJr/pxH5E=; b=nUtXSVnOFR8yLCFG38NEgVr2guXRVIuUiznk9usd+tw6O64pKqQpXWaXjkq/iGoeadmE 2YMEi2kWyFZaMY2OniWw6390fAk6mlv8pwQNJP8mk+3sHdF2Uym0G8ZFKJ3kOK5sAnLR PFx4eZGO4YMzgSzxvaee2AycqNIQLnMg52GI8tujIipUON8bKkliuiL/vuzwu3J7cysX OzeRfya4Ak+1sAsj9Q4q6oeFt+71DZ1zv8Iao0mKOwxrBjvgh5GphQQ8MIvvF/6C1hOK IGdzGwpjsj5Lp1p9UTXgpJsP8Xb/VMMY3KNhx81kD2bO6MzNhH0CY2gDq72hWOqmtE9s 9w==
Received: from prod-mail-ppoint2 (prod-mail-ppoint2.akamai.com [184.51.33.19]) by m0050095.ppops.net-00190b01. with ESMTP id 2fkx69mt46-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 24 Jan 2018 22:53:32 +0000
Received: from pps.filterd (prod-mail-ppoint2.akamai.com [127.0.0.1]) by prod-mail-ppoint2.akamai.com (8.16.0.21/8.16.0.21) with SMTP id w0OMjleH031064; Wed, 24 Jan 2018 17:53:30 -0500
Received: from email.msg.corp.akamai.com ([172.27.123.31]) by prod-mail-ppoint2.akamai.com with ESMTP id 2fm1yyqa3f-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Wed, 24 Jan 2018 17:53:30 -0500
Received: from USMA1EX-DAG1MB5.msg.corp.akamai.com (172.27.123.105) by usma1ex-dag1mb1.msg.corp.akamai.com (172.27.123.101) with Microsoft SMTP Server (TLS) id 15.0.1263.5; Wed, 24 Jan 2018 17:53:30 -0500
Received: from USMA1EX-DAG1MB5.msg.corp.akamai.com ([172.27.123.105]) by usma1ex-dag1mb5.msg.corp.akamai.com ([172.27.123.105]) with mapi id 15.00.1263.000; Wed, 24 Jan 2018 17:53:29 -0500
From: "Lubashev, Igor" <ilubashe@akamai.com>
To: Christian Huitema <huitema@huitema.net>, Ingemar Johansson S <ingemar.s.johansson@ericsson.com>, QUIC WG <quic@ietf.org>
CC: "Bob Briscoe (research@bobbriscoe.net)" <research@bobbriscoe.net>, "koen.de_schepper@nokia-bell-labs.com" <koen.de_schepper@nokia-bell-labs.com>
Subject: RE: ECN in QUIC
Thread-Topic: ECN in QUIC
Thread-Index: AdOU5RXtZ09Jc7GvQAiw71TPDqLU5QATWZUQAAeBn1AADTxqAAAJCiHA
Date: Wed, 24 Jan 2018 22:53:29 +0000
Message-ID: <26b97168c48047018d1dfe6400a36b16@usma1ex-dag1mb5.msg.corp.akamai.com>
References: <HE1PR0702MB3625F6E2C399F7E6F187C883C2E20@HE1PR0702MB3625.eurprd07.prod.outlook.com> <660743ab697443f4ac5500e649a80285@usma1ex-dag1mb5.msg.corp.akamai.com> <HE1PR0702MB3625648A6943055201D46DCEC2E20@HE1PR0702MB3625.eurprd07.prod.outlook.com> <26dd29d9-ce96-e858-078b-cc867990e8c5@huitema.net>
In-Reply-To: <26dd29d9-ce96-e858-078b-cc867990e8c5@huitema.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [172.19.33.239]
Content-Type: multipart/alternative; boundary="_000_26b97168c48047018d1dfe6400a36b16usma1exdag1mb5msgcorpak_"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2018-01-24_09:, , signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1801240296
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2018-01-24_09:, , signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1801240297
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/Kn0ZTkAafRzq4lcMHqc1x7kYLz8>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Jan 2018 22:54:27 -0000

I think I like a per-packet bitmap.  If you are ACKing 30 packets, it is only 8 bytes.  The advantage of per-packet bitmap is that you do not need to split ACK Blocks – savings right there.


  *   Igor

From: Christian Huitema [mailto:huitema@huitema.net]
Sent: Wednesday, January 24, 2018 4:38 PM
To: Ingemar Johansson S <ingemar.s.johansson@ericsson.com>; Lubashev, Igor <ilubashe@akamai.com>; QUIC WG <quic@ietf.org>
Cc: Bob Briscoe (research@bobbriscoe.net) <research@bobbriscoe.net>; koen.de_schepper@nokia-bell-labs.com
Subject: Re: ECN in QUIC




On 1/24/2018 10:51 AM, Ingemar Johansson S wrote:
Hi

Comment on “CE is not going to be a very common occurrence”.
While that may be true for (almost) drop equivalent ECN (a.k.a. classic), it does unfortunately not hold at all for L4S. Typical values of ECN marking ratio with L4S is in the order of 10 to 50%. In addition the CE marks can be spread randomly (for instance with phantom queues).
This means that the ACK blocks in the suggested format below can become very short, in the worst case representing only one packet per ACK block if we have an alternating ECT-CE-ECT-CE… pattern in the received packets.
Yes.


So my take is that if an ECN bit pattern is really necessary then it is better to have it as an bitmap that represents all packets that are listed in the ACK block. If one make an assumption that an ACK frame contains two ACK blocks that ACKs 5 and 7 packets then the ECN block will become (5+7)*2 = 24bits , i.e. 3 octets.
Yes, we have to take that into account in the design.


But with that said I am still not convinced that the packet counter approach is flawed (I’m am happy to be enlightened 😊) .
Taking multipath as an example : Isn’t it the case that two connections are setup, each with its own congestion control context (I omit coupled CC for the moment). If that is the case then I don’t see any problem with the packet counters.

We are heading towards a single packet sequence number space shared by multiple paths. That means that we need precise per packet feedback. If a packet was marked with CE, you want to know on which path, and the way to know that is to find the "path" tag in the saved copy of the packet. You cant do that with counters.


As regards to connection migration. One possible matter is that it can become tricky to detect ECN bleaching or ECN bit access problems in OS immediately , however during the course of 1 RTT or even less, this should be possible to detect as e.g. ECN bleaching will result in that the neither on the ECT(0),ECT(1) and CE counters increase. But I am fully aware that I may miss things here.

Again, there is no problem if we have precise per packet feedback, because we can find out which packets were bleached.

-- Christian Huitema