[re-ECN] CONEX Principles & Constraints (version 2)
<philip.eardley@bt.com> Wed, 04 November 2009 16:36 UTC
Return-Path: <philip.eardley@bt.com>
X-Original-To: re-ecn@core3.amsl.com
Delivered-To: re-ecn@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id 903033A67E7 for <re-ecn@core3.amsl.com>;
Wed, 4 Nov 2009 08:36:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.359
X-Spam-Level:
X-Spam-Status: No, score=-2.359 tagged_above=-999 required=5 tests=[AWL=-0.261,
BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_ASCII0=1.5, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9UWnbTNXA73y for
<re-ecn@core3.amsl.com>; Wed, 4 Nov 2009 08:35:51 -0800 (PST)
Received: from smtp1.smtp.bt.com (smtp1.smtp.bt.com [217.32.164.137]) by
core3.amsl.com (Postfix) with ESMTP id A7AE728C0DB for <re-ecn@ietf.org>;
Wed, 4 Nov 2009 08:35:50 -0800 (PST)
Received: from E03MVB1-UKBR.domain1.systemhost.net ([193.113.197.110]) by
smtp1.smtp.bt.com with Microsoft SMTPSVC(6.0.3790.3959);
Wed, 4 Nov 2009 16:36:11 +0000
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="----_=_NextPart_001_01CA5D6C.D12FA41C"
Date: Wed, 4 Nov 2009 16:35:28 -0000
Message-ID: <4A916DBC72536E419A0BD955EDECEDEC06363A74@E03MVB1-UKBR.domain1.systemhost.net>
In-Reply-To: <4A916DBC72536E419A0BD955EDECEDEC06363A38@E03MVB1-UKBR.domain1.systemhost.net>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: CONEX Principles & Constraints (version 2)
Thread-Index: AcpW8rVzQhb7wlDsTTucwrzbg9FgLQAK/WvwAGffmEABKtbmAA==
From: <philip.eardley@bt.com>
To: <re-ecn@ietf.org>
X-OriginalArrivalTime: 04 Nov 2009 16:36:11.0032 (UTC)
FILETIME=[EAC83180:01CA5D6C]
Subject: [re-ECN] CONEX Principles & Constraints (version 2)
X-BeenThere: re-ecn@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: re-inserted explicit congestion notification <re-ecn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>,
<mailto:re-ecn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/re-ecn>
List-Post: <mailto:re-ecn@ietf.org>
List-Help: <mailto:re-ecn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>,
<mailto:re-ecn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Nov 2009 16:36:00 -0000
Thanks for your very usefull comments about this. I've attempted a revised version [CONEX information = expected rest-of-path congestion] 1. Application-agnostic - the CONEX protocol should be open about the responses it allows to the CONEX information, supporting a diversity of traffic management practices by networks and end-hosts. The proposed WG will encourage experiments on traffic management, but not standardise them (in order to reduce its scope). 2. Visibility of CONEX information - it should be easily visible to all network elements (even if the data traffic is encrypted), in order to ensure the widest possible applicability -- it is visible to both end-systems (to help them control their sending rate) and to network managers (to help them manage a bottleneck, whether traffic originates from their own users or from other networks). 3. Granularity of CONEX information - it should be sufficiently granular to allow near real-time, per packet traffic management. So that any node can see the impact of the packets it is asked to forward. The CONEX information is inevitably a minimum of 1 RTT out-of-date 4. CONEX information is in IP header - 2 & 3 imply that the CONEX information is carried in the IP header. Signalling of congestion information is thus explicit, rather than implicitly through packet loss, delay or jitter, which allows a faster and more accurate reaction. The proposed WG will specify a packet structure (v4 & v6) to encapsulate CONEX information (header bits, interpretation) 5. Transport protocol - the receiver needs to inform the sender what CONEX information to set (TBD: whether the capability of an ECN receiver is sufficient). 6. Threats analysis - the proposed WG will study the threats, especially from falsifying or suppressing the CONEX information 7. Deployability analysis - the proposed WG will study technology to support incremental deployment steps: ECN routers vs non-ECN routers vs CONEX routers; receivers with CONEX-capability, ECN-capability, or neither; opportunistic deployment. 3 - John, does this now briefly summarise your granularity point? 5 - some people have suggested we should restrict initial work to TCP (to limit WG scope). John has argued that UDP needs to be in scope. Views? 7 - bob, does 'opportunistic deployment' get your "subtle point 15"? thanks phil -----Original Message----- From: re-ecn-bounces@ietf.org [mailto:re-ecn-bounces@ietf.org] On Behalf Of philip.eardley@bt.com Sent: 29 October 2009 18:03 To: re-ecn@ietf.org Subject: [re-ECN] CONEX Principles & Constraints We wanted to start some discussion on "principles" and "constraints" ie what we want to do in the proposed WG and how would its scope would be restricted (building especially on emails from John (about "principles") and Rich (about "requirements"). Eventually this would feed into the Charter. This is just a first guess, so please bash. Something on these lines would be in the "Constraints" part of the Agenda. 1. the purpose is to standardise the conex protocol - this exposes congestion information along the forwarding path of the Internet ("rest-of-path congestion"). (This is in addition to the current capability that exposes the congestion on the "path-so-far".). Note, the purpose doesn't include studying how the conex information could be used. Reason: there are lots of potential uses for the information. In order to reduce the scope of the proposed WG, we concentrate on the underlying information protocol. 2. The protocol should be open about the responses it allows to the conex information. For example, it should not make assumptions about the behaviour of a particular application, and it should allow a diversity of potential traffic management practices (of networks and end-hosts). 3. the conex information needs to be easily visible to all network elements, and be application-independent (including encrypted apps). Reason: this ensures widest possible applicability -- it is visible to both end-systems (to help them control their sending rate) and to network managers (to help them manage a bottleneck, whether traffic originates from their own users or from other networks). 4. the conex information needs to be sufficiently up-to-date, for example so that it can usefully assist congestion control by end systems. Reason: stale information is little use. [Question: instead of "sufficiently up-to-date", would "real-time" or "near real-time" be better?] 5. the conex information needs to be sufficiently granular, to allow identification of those sending traffic to the bottleneck [Comment: this is trying to get a point that John made about 'granular enough for cost allocation' but in a more generic way. "Identification" is a bad word as, for some readers, it might be imply more than intended - but I can't think of a better one at the moment. I hope that the following bullet about conex information in the IP header solves how to do it.] 6. the conex information is carried in the IP header. Note: it is in scope to work out which IP header bits to use (and the implications for other stuff that may already be using those bits). 7. a protocol will be developed for both IPv4 and IPv6. Reason: both are needed for full applicability. (There was push-back on an earlier suggestion of narrowing the scope to IPv4.) 8. TCP options will be used to inform the sender about congestion received at the receiver. (Note, current proposals require this information transfer.) Reason: narrow the scope by looking only at TCP, which is used by the vast majority of the traffic (~85-90%). 9. a baseline assumption is that routers are unmodified. Reason: deployment viability 10. a baseline assumption is that conex information is signalled explicitly (through the IP header) and not implicitly signalled through packet loss, delay or jitter. Reason: explicit signalling allows a "better" reaction, for example faster, without impairment 11. but we will also develop a solution where the conex information is signalled through packet loss. Reason: ECN is not enabled in most routers today; incremental deployment is critical 12. (possibly) we will study an incremental deployment step where only the sender is conex-enabled [Step suggested by Matt] 13. (possibly) another incremental deployment step? 14. we will describe threats, especially from falsifying or suppressing the conex information - whether by ISPs or end-hosts. The protocol needs to allow such threats to be dealt with (in as simple a manner as possible), but the actual mechanisms to tackle those threats (using policer boxes, for instance) are out of scope. Reason: such mechanisms are about uses of conex, rather than exposing the information. 15. anything else? Thanks phil
- [re-ECN] CONEX Principles & Constraints philip.eardley
- Re: [re-ECN] CONEX Principles & Constraints toby.moncaster
- Re: [re-ECN] CONEX Principles & Constraints John Leslie
- Re: [re-ECN] CONEX Principles & Constraints Leslie Daigle
- Re: [re-ECN] CONEX Principles & Constraints Bob Briscoe
- [re-ECN] CONEX Principles & Constraints (version … philip.eardley
- Re: [re-ECN] CONEX Principles & Constraints (vers… toby.moncaster