Re: New Version Notification for draft-huitema-quic-ts-05.txt

Vidhi Goel <vidhi_goel@apple.com> Thu, 18 March 2021 06:03 UTC

Return-Path: <vidhi_goel@apple.com>
X-Original-To: quic@ietfa.amsl.com
Delivered-To: quic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D54B83A2078 for <quic@ietfa.amsl.com>; Wed, 17 Mar 2021 23:03:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.348
X-Spam-Level:
X-Spam-Status: No, score=-2.348 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.248, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id izNumG9GaVix for <quic@ietfa.amsl.com>; Wed, 17 Mar 2021 23:03:09 -0700 (PDT)
Received: from ma1-aaemail-dr-lapp03.apple.com (ma1-aaemail-dr-lapp03.apple.com [17.171.2.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C04203A2077 for <quic@ietf.org>; Wed, 17 Mar 2021 23:03:09 -0700 (PDT)
Received: from pps.filterd (ma1-aaemail-dr-lapp03.apple.com [127.0.0.1]) by ma1-aaemail-dr-lapp03.apple.com (8.16.0.42/8.16.0.42) with SMTP id 12I5wA0t053383; Wed, 17 Mar 2021 23:03:07 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=from : message-id : content-type : mime-version : subject : date : in-reply-to : cc : to : references; s=20180706; bh=sgRlLhPf9PffOSGRUM4/swyrfn0Hk4R+HbGLLAMxdd4=; b=i2N/NfBdsLq2N2fyV+xUx8NDMr+s4w6iNCa3wwbDND8+UyNEbpV/cE+Vnp6Zv8CHwfai gZypanrJ3RlRvV+Y2sPYLFdJoMoXeVrsvIMIDzgAAxouOwY2e7W4vM+x9iq0eEJnor9s VblYVOdkhBJVYoIY7cOoepVczlpDWjOVChvSuCB+wu1mRO7DEu/nLjaXlwpxgFoescGl 9pcji6u58wepy4uWKnwuSFNq8m0+p+qxQe7hf9iutiRB2kSVuGhzXB4vFFsNQ1z0rmqP SZ54qLP2OU8EgUoY2qil3AymLF3yn5Ex5tWm/ql+mLeIVNVzCqJ6UrBIrc31QnYTCw8Q jQ==
Received: from rn-mailsvcp-mta-lapp04.rno.apple.com (rn-mailsvcp-mta-lapp04.rno.apple.com [10.225.203.152]) by ma1-aaemail-dr-lapp03.apple.com with ESMTP id 378w90tck1-4 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Wed, 17 Mar 2021 23:03:07 -0700
Received: from rn-mailsvcp-mmp-lapp01.rno.apple.com (rn-mailsvcp-mmp-lapp01.rno.apple.com [17.179.253.14]) by rn-mailsvcp-mta-lapp04.rno.apple.com (Oracle Communications Messaging Server 8.1.0.7.20201203 64bit (built Dec 3 2020)) with ESMTPS id <0QQ500GWRI56YOG0@rn-mailsvcp-mta-lapp04.rno.apple.com>; Wed, 17 Mar 2021 23:03:06 -0700 (PDT)
Received: from process_milters-daemon.rn-mailsvcp-mmp-lapp01.rno.apple.com by rn-mailsvcp-mmp-lapp01.rno.apple.com (Oracle Communications Messaging Server 8.1.0.7.20201203 64bit (built Dec 3 2020)) id <0QQ500W00HSHFY00@rn-mailsvcp-mmp-lapp01.rno.apple.com>; Wed, 17 Mar 2021 23:03:06 -0700 (PDT)
X-Va-A:
X-Va-T-CD: 058bbac8ca772bcfc9e38720b87faa94
X-Va-E-CD: a73bc9fdfae71d4bbd14013b04a8c9d1
X-Va-R-CD: a1424e4cd2d59af676e64a21e913831b
X-Va-CD: 0
X-Va-ID: ad3f0769-8fc6-4d94-b536-bfe40cc130c7
X-V-A:
X-V-T-CD: 058bbac8ca772bcfc9e38720b87faa94
X-V-E-CD: a73bc9fdfae71d4bbd14013b04a8c9d1
X-V-R-CD: a1424e4cd2d59af676e64a21e913831b
X-V-CD: 0
X-V-ID: 426efd97-120f-4a75-b511-46c9f4dd0536
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.369, 18.0.761 definitions=2021-03-18_01:2021-03-17, 2021-03-18 signatures=0
Received: from [17.11.64.42] (unknown [17.11.64.42]) by rn-mailsvcp-mmp-lapp01.rno.apple.com (Oracle Communications Messaging Server 8.1.0.7.20201203 64bit (built Dec 3 2020)) with ESMTPSA id <0QQ501090I54Z800@rn-mailsvcp-mmp-lapp01.rno.apple.com>; Wed, 17 Mar 2021 23:03:05 -0700 (PDT)
From: Vidhi Goel <vidhi_goel@apple.com>
Message-id: <25E11134-A5D7-43C2-9DA8-A055BA89B413@apple.com>
Content-type: multipart/alternative; boundary="Apple-Mail=_34C81740-8B39-414F-AB08-89CA507CA69E"
MIME-version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\))
Subject: Re: New Version Notification for draft-huitema-quic-ts-05.txt
Date: Wed, 17 Mar 2021 23:03:04 -0700
In-reply-to: <71a72a2c-b6eb-7640-391c-663d21afa8da@huitema.net>
Cc: IETF QUIC WG <quic@ietf.org>
To: Christian Huitema <huitema@huitema.net>
References: <161602961576.29713.5556006395853657310@ietfa.amsl.com> <a5d9bbf2-227d-90b6-fd22-52e05895713b@huitema.net> <2F127CC0-5D13-4DEB-9B4D-4EF89C8D9E0F@apple.com> <71a72a2c-b6eb-7640-391c-663d21afa8da@huitema.net>
X-Mailer: Apple Mail (2.3608.80.23.2.2)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.369, 18.0.761 definitions=2021-03-18_01:2021-03-17, 2021-03-18 signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic/Tfrc3QToz-bBwBfjzszmssghGuU>
X-BeenThere: quic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Main mailing list of the IETF QUIC working group <quic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic>, <mailto:quic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic/>
List-Post: <mailto:quic@ietf.org>
List-Help: <mailto:quic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic>, <mailto:quic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Mar 2021 06:03:13 -0000

>> 1. Abstract - QUIC is not used as an acronym.
> Yes. I don't use it as an acronym either. But I realize I wrote "Quic" instead of "QUIC". I wonder whether WG members have strong feelings about that.

It would be good to be consistent. I’d prefer it to be acronym (QUIC).

>> 2. Introduction:
>>  An example would be the Low Extra Delay Background Transport (LEDBAT)
>>    [RFC6817 <https://tools.ietf.org/html/rfc6817>] which uses variations in transmission delay ….
>> 
>> I think you meant to say queuing delay here.
> No. I do mean transmission delay, because that's what the LEDBAT implementations use. There is an assumption that the variations of transmission delays correspond to variations of queuing delays, but that's just an hypothesis.


I am confused. RFC 6817 says the below which points to queuing delay varying while other delays remaining constant-ish.

“End-to-end delay can be decomposed into transmission (or
   serialization) delay, propagation (or speed-of-light) delay, queueing
   delay, and processing delay.  On any given path, barring some noise,
   all delay components except for queueing delay are constant.  To
   observe an increase in the queueing delay in the network, a LEDBAT
   sender separates the queueing delay component from the rest of the
   end-to-end delay, as described below.”


>> 3. Introduction:
>> Using 1WD solves these
>>    issues.  Similar argument can be made for most delay-based
>>    algorithms.
>> 
>> I disagree that it can be said for most delay based CCAs. LEDBAT++ and Receive LEDBAT don’t use OWD.
>> For delay based algorithms, I am of the opinion that we should consider RTT (instead of 1WD) as we should also be mindful of the ACK traffic on the return path, if it is congested and we can do that by slowing down the sender.
> 
> Well, I am on the opinion that LEDBAT++ should use one-way-delay when timestamps are available. It does fallback to RTT when timestamps are not available, but that's a fallback mechanism, not a design goal. In fact, section 4.5 of the LEDBAT++ draft (https://tools.ietf.org/html/draft-irtf-iccrg-ledbat-plus-plus-01#section-4.5) acknowledges that using RTT instead of one-way-delays "can lead to unnecessary slowdowns”

Yes, and LEDBAT++ continues to say the below. For a delay based CC, how do you suggest the increased delay on reverse path (receiver to sender) be handled, if we don’t use RTT?
"but in practice this
   seems to benefit the workloads because bottleneck link can carry ACK
   traffic in the other direction for the competing flows."

>> 7. Section 2.3
>> For congestion control, TIMESTAMP frames are treated like ACK frames.
>> 
>> I don’t understand why this should be the case. I think TIMESTAMP frame should be guarded by CC limits.
> 
> This text is based on a suggestion by Ian Swett, `The draft says "TIME_STAMP frames are not ack-eliciting. Their loss does not require retransmission." I (Ian)  believe the draft should clarify whether adding a TIME_STAMP frame to a packet causes it to count as in-flight as PADDING would, or not in-flight as an ACK frame would. I (Ian) believe treating it like an ACK frame is the ideal option, personally.`
> 
> The whole point of adoption by the WG is that we can discuss this issue in the WG.

Sorry, I am not too familiar with IETF procedures. Does this mean we can discuss in the next IETF meeting or something else?


Thanks,
Vidhi

> On Mar 17, 2021, at 9:39 PM, Christian Huitema <huitema@huitema.net> wrote:
> 
> Thanks for the review, Vidhi.
> 
> A few comments in line.
> 
> On 3/17/2021 8:44 PM, Vidhi Goel wrote:
>> Thanks Christian.
>> 
>> I have some comments.
>> 
>> 1. Abstract - QUIC is not used as an acronym.
> Yes. I don't use it as an acronym either. But I realize I wrote "Quic" instead of "QUIC". I wonder whether WG members have strong feelings about that.
>> 
>> 2. Introduction:
>>  An example would be the Low Extra Delay Background Transport (LEDBAT)
>>    [RFC6817 <https://tools.ietf.org/html/rfc6817>] which uses variations in transmission delay ….
>> 
>> I think you meant to say queuing delay here.
> No. I do mean transmission delay, because that's what the LEDBAT implementations use. There is an assumption that the variations of transmission delays correspond to variations of queuing delays, but that's just an hypothesis.
>> 
>> 3. Introduction:
>> Using 1WD solves these
>>    issues.  Similar argument can be made for most delay-based
>>    algorithms.
>> 
>> I disagree that it can be said for most delay based CCAs. LEDBAT++ and Receive LEDBAT don’t use OWD.
>> For delay based algorithms, I am of the opinion that we should consider RTT (instead of 1WD) as we should also be mindful of the ACK traffic on the return path, if it is congested and we can do that by slowing down the sender.
> 
> Well, I am on the opinion that LEDBAT++ should use one-way-delay when timestamps are available. It does fallback to RTT when timestamps are not available, but that's a fallback mechanism, not a design goal. In fact, section 4.5 of the LEDBAT++ draft (https://tools.ietf.org/html/draft-irtf-iccrg-ledbat-plus-plus-01#section-4.5) acknowledges that using RTT instead of one-way-delays "can lead to unnecessary slowdowns". The text in that section goes on explaining how they mitigate that, but using one-way-delays would definitely be cleaner than relying on mitigations.
> 
> And yes, it is worth monitoring congestion on the return path, but the proper response there is not to "do as if the direct path was congested." Other mechanisms are available, such as sending fewer ACKs or fewer data on that path.
> 
> 
>> 
>> 4. Section 2.1
>> 2 or 3 MUST NOT send these frames if the other
>>    peer does not announce advertise
>> 
>> Typo  - either announce or advertise
> Yes. Will fix that in the next iteration.
>> 
>> 5. Section 2.2
>> 
>> Following successful sending negotiation…
>> 
>> “Sending” is probably extraneous here.
> Yes. Will fix that too.
>> 
>> 6. Section 2.2
>>  They MAY be sent either before or after the ACK frame.
>> 
>> I think replacing “sent” with “added” would be better here.
> Yes.
>> 
>> 7. Section 2.3
>> For congestion control, TIMESTAMP frames are treated like ACK frames.
>> 
>> I don’t understand why this should be the case. I think TIMESTAMP frame should be guarded by CC limits.
> 
> This text is based on a suggestion by Ian Swett, `The draft says "TIME_STAMP frames are not ack-eliciting. Their loss does not require retransmission." I (Ian)  believe the draft should clarify whether adding a TIME_STAMP frame to a packet causes it to count as in-flight as PADDING would, or not in-flight as an ACK frame would. I (Ian) believe treating it like an ACK frame is the ideal option, personally.`
> 
> The whole point of adoption by the WG is that we can discuss this issue in the WG.
> 
>> 8. Section 2.3
>> The same applies to packets
>>    containing only TIMESTAMP frames
>> 
>> For my curiosity, when do you think packets containing only TS frame would be useful? Also, based on Section 2.6, such a packet wouldn’t be used for 1wd computation.
>> Is it better to prohibit such a packet?
> 
> I would rather not introduce another failure condition. I have at least one use case, measuring one way delays on seldom used paths in a multi-path configuration. It is not exactly compelling, but at the same time there is no strong reason to prohibit it.
> 
>> 
>> 9. Section 2.6
>>  latest_1wd = timestamp - send_time_of_largest_acked - phase_shift
>> 
>> I think ack_delay should also be subtracted to remove the processing delay from the 1wd.
>> 
>> Alternatively, one could change how timestamp is encoded. The current text in Section 2.3 says
>> 
>> "The timestamp encodes the number of microseconds since the beginning
>>    of the epoch, as measured by the peer at the time at which the packet
>>    is sent.”
>> 
>> This could be changed to “time at which the packet was received by the peer”. That would eliminate the processing delay.
> 
> Good point.  I think the computation should mention the ACK delay.
> 
> I like the timestamp being exactly the time at which the packet is sent, because that keeps the specification very clean. It also helps scenarios in which the timestamp is used with something else than an ACK -- challenge response comes to mind, but there are probably other possibilities when composing timestamps with other frames. Maybe composing timestamps and datagrams in real time applications.
> 
>> Thats all for now. Will let you know if something else comes to mind.
>> 
> Thanks for the feedback!
> 
> -- Christian Huitema
> 
>