Re: [re-ECN] RE-ECN without ECN.

Matt Mathis <matt.mathis@gmail.com> Mon, 05 October 2009 21:25 UTC

Return-Path: <matt.mathis@gmail.com>
X-Original-To: re-ecn@core3.amsl.com
Delivered-To: re-ecn@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BC6FA3A6407 for <re-ecn@core3.amsl.com>; Mon, 5 Oct 2009 14:25:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.546
X-Spam-Level:
X-Spam-Status: No, score=-2.546 tagged_above=-999 required=5 tests=[AWL=0.052, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rfFb7h56Myz6 for <re-ecn@core3.amsl.com>; Mon, 5 Oct 2009 14:25:02 -0700 (PDT)
Received: from mail-bw0-f210.google.com (mail-bw0-f210.google.com [209.85.218.210]) by core3.amsl.com (Postfix) with ESMTP id 78F6C3A6982 for <re-ecn@ietf.org>; Mon, 5 Oct 2009 14:25:02 -0700 (PDT)
Received: by bwz6 with SMTP id 6so2832045bwz.37 for <re-ecn@ietf.org>; Mon, 05 Oct 2009 14:26:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=ijftLis2jqOC5UImUtnxgBcEqbZPBEj+RKLnpX1vX/0=; b=GhTA3yeTx+OFEJy0mQbHREwPwPLn6EJNEfUP8QnzTwTxiVWyal6EFV2Clr2L02KJxO RWZ3SBktAPoqB6xmMnZ2DZwb7hfFHSvuqW6IMyR9nNpoZqczc6qjgFpfYGBdg2Kfky/i S78G2VT1akZ70niJlmHY2bPe9VR9WFCEsp764=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=X8DLpvn+0MMZFL3LsO5F7yLn1thB5q1ApbVqZCTiaDuH6xwk+xDhoeCLFdWwZsv03K MF/RxQIkQcKc+XBKKVZbrirDtxV3Wp70zEoL6FRLXmB7+pBufSbsC2d2Fs7ADzOUI2Mw 2wnUPR+Br97qg7QfwtEo0jDw2MRetNudlCBLk=
MIME-Version: 1.0
Received: by 10.204.160.90 with SMTP id m26mr4431361bkx.63.1254777994837; Mon, 05 Oct 2009 14:26:34 -0700 (PDT)
In-Reply-To: <B56CF470-4149-4EEB-8538-CD804630045F@cisco.com>
References: <fc0ff13d0910010936i5aa26e6esd830c958422e340d@mail.gmail.com> <4AC52108.4090004@ee.ucl.ac.uk> <200910021543.n92Fh4f2014818@bagheera.jungle.bt.co.uk> <fc0ff13d0910021542h70e74adap859f8d8a20d3d1f@mail.gmail.com> <B56CF470-4149-4EEB-8538-CD804630045F@cisco.com>
Date: Mon, 5 Oct 2009 17:26:34 -0400
Message-ID: <fc0ff13d0910051426q7fb65262s42ea4559fc996b80@mail.gmail.com>
From: Matt Mathis <matt.mathis@gmail.com>
To: Fred Baker <fred@cisco.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: re-ecn@ietf.org
Subject: Re: [re-ECN] RE-ECN without ECN.
X-BeenThere: re-ecn@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: re-inserted explicit congestion notification <re-ecn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>, <mailto:re-ecn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/re-ecn>
List-Post: <mailto:re-ecn@ietf.org>
List-Help: <mailto:re-ecn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>, <mailto:re-ecn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Oct 2009 21:25:03 -0000

On Mon, Oct 5, 2009 at 2:51 PM, Fred Baker <fred@cisco.com> wrote:
>
> On Oct 2, 2009, at 3:42 PM, Matt Mathis wrote:
>
>>  My bet that it
>> is a lot easier to add the duplicate detection to the ingress router,
>> since the owner is motivated to do so.
>
> is the presence of encrypted or tunneled data streams important here?

Clearly, any encryption prevents peeking at sequence numbers and
generating pseudo re-feedback.  However, for RE-ECN, any non-ECN
receiver or non-re-ECN sender prevents re-feedback....   On day 1 loss
based re-feedback would be way ahead, even if it doesn't work
everywhere.

My hope that these two schemes might be unified.  One then becomes a
migration (bootstrapping?) strategy for the other.  I am also finding
that imagining a dual implementation (both loss based and ECN based
re-feedback) leads to a whole lot of clarity on many side issues.
Its got a much better chance of being deployable, because the
partially deployed states provide at least some of the function of
full deployment.

Thanks,
--MM--
-------------------------------------------
Matt Mathis      http://staff.psc.edu/mathis
Work:412.268.3319   Home/Cell:412.654.7529
-------------------------------------------
Evil is defined by mortals who think they know
"The Truth" and use force to apply it to others.