Re: [re-ECN] LAST CALL Re: DRAFT minutes from the CONEX BoF at IETF76
<toby.moncaster@bt.com> Wed, 02 December 2009 17:15 UTC
Return-Path: <toby.moncaster@bt.com>
X-Original-To: re-ecn@core3.amsl.com
Delivered-To: re-ecn@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id 0630C3A6856 for <re-ecn@core3.amsl.com>;
Wed, 2 Dec 2009 09:15:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level:
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5
tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KWGEMJP2oG+a for
<re-ecn@core3.amsl.com>; Wed, 2 Dec 2009 09:15:05 -0800 (PST)
Received: from smtp2.smtp.bt.com (smtp2.smtp.bt.com [217.32.164.150]) by
core3.amsl.com (Postfix) with ESMTP id 139923A6ACB for <re-ecn@ietf.org>;
Wed, 2 Dec 2009 09:14:56 -0800 (PST)
Received: from E03MVZ1-UKDY.domain1.systemhost.net ([193.113.30.65]) by
smtp2.smtp.bt.com with Microsoft SMTPSVC(6.0.3790.3959);
Wed, 2 Dec 2009 17:14:48 +0000
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Wed, 2 Dec 2009 17:14:45 -0000
Message-ID: <AEDCAF87EEC94F49BA92EBDD49854CC70E38258B@E03MVZ1-UKDY.domain1.systemhost.net>
In-Reply-To: <4B1694FF.3040305@thinkingcat.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [re-ECN] LAST CALL Re: DRAFT minutes from the CONEX BoF at IETF76
Thread-Index: AcpzbCAuk9lgbHVRQPW8KZq8mVu4mwABh5JA
References: <4B07175A.60102@thinkingcat.com> <4B1694FF.3040305@thinkingcat.com>
From: <toby.moncaster@bt.com>
To: <leslie@thinkingcat.com>, <re-ecn@ietf.org>
X-OriginalArrivalTime: 02 Dec 2009 17:14:48.0068 (UTC)
FILETIME=[F368D440:01CA7372]
Cc: sblake@extremenetworks.com
Subject: Re: [re-ECN] LAST CALL Re: DRAFT minutes from the CONEX BoF at IETF76
X-BeenThere: re-ecn@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: re-inserted explicit congestion notification <re-ecn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>,
<mailto:re-ecn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/re-ecn>
List-Post: <mailto:re-ecn@ietf.org>
List-Help: <mailto:re-ecn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>,
<mailto:re-ecn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Dec 2009 17:15:09 -0000
Just a couple of typos: Bottlenect --> bottleneck wierd --> weird remaing --> remaining resterant --> restaurant at end "not formally not"; remove second not... > -----Original Message----- > From: re-ecn-bounces@ietf.org [mailto:re-ecn-bounces@ietf.org] On > Behalf Of Leslie Daigle > Sent: 02 December 2009 16:26 > To: re-ecn@ietf.org > Cc: Steven Blake > Subject: [re-ECN] LAST CALL Re: DRAFT minutes from the CONEX BoF at > IETF76 > > > Hi, > > I've not seen any comments on the list about these minutes -- I'd like > to post them to the proceedings for IETF 76. > > Given the apparent lack of controversy -- let me ask for any final > comments by Monday, December 7. > > Thanks, > Leslie. > > Leslie Daigle wrote: > > > > Hi, > > > > We had two note takers at last weeks meeting -- Steven Blake and Mat > > Ford. Thanks, again, to both of them for their efforts. > > > > Their notes are nicely complementary, so I've folded them together to > > provide a completer picture, and I propose them as the draft minutes > > from the meeting. Review /comment from people who attended the > meeting > > (f2f or virtually) would be appreciated. (Steven & Mat -- feel free > to > > shout out if you think I've (inadvertently) mangled your intent). > > > > Leslie. > > > > Congestion Exposure (CONEX) BoF > > =============================== > > Tuesday, November 10 from 1520-1810 > > > > NOTES by Steven Blake, Mat Ford > > > > CHAIRS: > > Leslie Daigle <leslie@thinkingcat.com> > > Philip Eardley <philip.eardley@bt.com> > > > > Meeting materials: > https://datatracker.ietf.org/meeting/76/materials.html > > > > AGENDA > > ------ > > > > Administrivia [ 5 mins] > > > > - no objections to the agenda > > > > Introduction by chairs [ 5 mins] > > > > Background > > The problem [50 mins] > > > > == End-user perspective [Murari Sridharan] > > > > - OS bottlenecks removed over last 6-7 years > > - congestion control has become so sophisticated they can fill up > any > > residual capacity now > > - people complain about lack of resources now that pipes regularly > get > > filled > > > > to end-host, network is largely a black box - characteristics are > inferred > > imposes complex usage requirements - volume caps - example of end > user > > hit with heavy pay-per-use bill for downloading windows update, > despite > > the fact that windows update runs over a scavenger service. > > > > network view - end hosts can't be trusted, application performance > needs > > to be inferred, end-hosts typically establish connectivity to well- > known > > servers, but reality is different. > > > > innovation is all in layer-violation - this isn't sustainable! > > > > congestion control purity is no longer reality - TCP tunnelled inside > > TCP isn't a route to deterministic results! > > > > > > - no comments at the mic > > > > > > == ISP Context/motivation [Rich Woundy] > > > > Enable customers to control their own network experience - take ISP > out > > of the loop of being 'congestion police' > > > > > > > Linda Dunbar: you discuss making the heavy user lower priority; > what > > does > > this have to do with network congestion? > > > > > Rich W: Comcast mechanism is not a conex proposal. Our mechanism > > does not > > see end2end. It only solves congestion problem at the edge, not > for > > any other part of our network or for third parties. comcast solution > is > > monitoring capacity and resource use in the network. Measuring > > end-to-end congestion requires another mechanism. > > > > > Linda Dunbar: congestion is very transient. End user has no > control > > over > > over the network's behavior. > > > > > Leslie: wait until after the other presentations > > > > > Bob Briscoe: mention LEDBAT > > > > > Leslie: non-IETF ISOC meeting today on bandwidth; meeting > materials > > (including audio) at ISOC website > > > > > > == Technical problem [Mark Handley] > > > > whenever he presents about congestion people say 'we're > overprovisioned, > > don't care' - he doesn't subscribe to that - will talk about why we > need > > to care about congestion > > > > TCP isn't broken, but we can do better > > > > used to be receive window limited in end systems - no longer the case > in > > popular modern TCP stacks > > > > goal should be for congested networks, at least at the bottleneck > > > > packet loss isn't necessarily a problem - for apps where it is a > problem > > we have ECN > > > > > > > Greg Lebovitz: think about next-gen apps, and where they might > > fit on the latency/size graph (e.g., Internet-of=things). Existing > apps > > were built a certain way because the network works the way it does. > > > > > Mark H: some things we haven't put on the net because they don't > work > > with > > today's Internet. > > > > > Geoff Huston: making a good use of the network in either case (re: > > latency, > > latency, latency) slide. > > > > > Mark H: better from a user's perspective > > > > > Aaron Falk: ISPs aren't charging by the byte > > > > > Jana Iyengar: works at residential education institution - > students > > tend to do a lot of 'stuff' that needs separated from academic work - > > DPI is used for that, maybe in other enterprises too > > > > > Ben Niven-Jenkins: if the prime driver for ISPs to use DPI is to > control > > costs, don't see how it is relevant in the context of controlling > > congestion > > > > > Mark H: because they need to control costs, because they have > > congestion - need to maintain good service for higher-paying > customers; > > trying to provide acceptable service to non P2P apps. > > > > > Ben N-J: DPI being used to prevent going over usage caps > > > > > Mat Ford: That doesn't explain why users on relatively low service > > tiers have their throughput throttled regardless of whether or not > they > > have exceeded any volume threshold > > > > > Ben N-J: economic issue; how does technology solve it. Don't know > > how the > > two are linked. > > > > > Vijay Gill: agree with Mat; if an ISP have chronic congestion, why > not > > keep raising the price until users fall off. Comcast has two tiers > of > > service (residential, business). Residential has 250 GB cap; > business > > service has no cap. Most folks I know go for the business service > > ($100/month). > > > > > Bob Briscoe: try to answer Ben's question - he was talking about > > retail ISPs > > as customers. Wholesaler sells bit rates to the retail ISPs. > > > > > Ben N-J: it is not us causing the bottlenect > > > > > Leslie: not here to talk about how to make things work with DPI; > > let's move > > on. > > > > > Stanislav Shalunov: what can you convey with conex that you can't > > convey with > > simple drops? Latency ... > > > > > Mark H: only talking about the problem space > > > > > Stanislav S: current loss rates (< 1%) are working fine. > > > > > Mark H: loss rates are very variable > > > > > Aaron Falk: re: IETF Goals - we shouldn't be talking about > economics. > > Disagree that the only cost is congestion cost (overstatement). > > Infrastructure has cost. Question is incremental cost. Economic > > expertise > > would be useful in this discussion. > > > > > Mark H: yes, underutilised network gives you ability to > communicate - > > additional traffic doesn't cost anything more, until you experience > > congestion > > > > Towards a solution [20 mins] > > > > == Overview of re-ECN [Bob Briscoe] > > > > > Greg L: before when we saw that sometimes there is a long duration > > connection > > and something that was very short has to wait, in that case, one of > them > > will show the network is very bad, and the other one showing that > the > > network is very working well. > > > > > Bob B: small transfer can go fast, because it won't build up a big > > congestion volume; incentive for large transfer to back off because > it > > could > > build up large congestion volume. > > > > > Greg L: how do they know about each other? > > > > > Bob B: because of the congestion notifications. I'm able to use > up my > > congestion allowance if I know I won't be transferring long. > > > > > Greg L: you said that is how TCP works. This works by some box in > the > > middle. > > > > > Bob B: imagine a TCP with either a high weight or a low weight. > > > > > Greg L: is it dependent on a box in the middle, or just the > endpoints. > > > > > Bob B: box in middle just enforces congestion volume allowance, in > one > > possible deployment. > > > > > Lars Eggert: trying to show that the problem is solvable, not that > this > > is the solution. > > > > > Lars Eggert: we believe you Bob that you can't cheat (leap of > faith) > > > > > Murari S: Thought I understood conex, not I'm confused. If you > only > > look > > at the problem of short flows coming in and using lots of BW, > problem > > can be solved if all the bulk users used scavenger service. > Problem > > would > > automatically solve itself. > > > > > Bob B: ISPs can't see congestion, how do you get a free pass. > > > > > Murari S: ISPs problem is because customers complain that they're > not > > getting service. > > > > > Philip E: ISPs can't trust that end users are using LEDBAT; don't > > want them > > using DPI to figure this out. Trying to get the two to cooperate. > > > > > Murari S: if everyone would start using scavenger, then the main > purpose > > of Conex is to reroute traffic under congestion. > > > > > Bob B: how does the ISP know that the user is using LEDBAT. > Purpose > > is to help operators know which traffic is causing most congestion > > > > > Mark H: reasonable for ISPs to limit traffic that is causing a > problem. > > But ISPs cannot see which traffic is causing the problem. > > > > > Jana Iyengar: incentive issue with LEDBAT; end hosts may choose > not to > > use it. > > > > > Bob B: what about big-big flows and little-big flows? Two classes > > may not > > be enough. > > > > > Stanislav Shalunov: why send the info the user? Why not keep it > within > > the ISP, so that you can evolve the algorithm. > > > > > Bob B: don't want to do congestion control within the network. > > > > > Stanislav S: seems like two justifications: solve the LEDBAT > problem, ?? > > > > > Lars Eggert: bunch of questions, high-level question is whether we > all > > understand what the problem is, seems like it. Questions that > relate > > to whether exposing congestion solves the problems. Then questions > > around > > how re-ECN exposes congestion. > > > > > Leslie: next discussion is around principles and constraints. > > > > > Lars Eggert: should have questions along whether there is a > problem that > > IETF should solve. Is everyone confused? Then there is a question > of > > whether exposing congestion is a way to solve the problem, then there > is > > the question of re-ECN as a suitable solution - lets tease these > apart, > > and start at the beginning > > > > > Linda Dunbar: want to confirm the problem statement, to expose > network > > congestion to the end user? > > > > > Bob B: the opposite - expose it to the network > > > > > Linda Dunbar: if I'm an end user, what benefits me by doing > something > > different? > > > > > Bob B: suppose I say that the amount of volume you send is a > problem; > > that's not true. I can't judge whether you are sending during a > trough. > > > > > Linda D: one application is so trivial in the whole network. > > > > > Leslie: hypothetical, my husband tells me the road is congested; I > can > > use the toll road or wait in traffic > > > > > Linda D: I don't have a choice > > > > > Bob B: you can choose to slow down and send later > > > > > Linda D: can we have one single problem statement? > > > > > Aaron Falk: minor epiphany - way to identify responsive flows; > give them > > a seal of approval, giving them higher priority. Been discussed in > IETF > > for a long time. However, you are talking about aggregated > statistics, > > idea of distinguishing flows is problematic. > > > > > Bob B: can differentiate between networks that encourage users to > behave > > vs. ones that don't. > > > > > Tim Shephard: answer Lars - I think I understand this, but it has > > nothing > > to do with what I have heard in this room today. Seen Bob talk > many > > times > > and I don't think he has taken people that don't understand this to > > understand it. Not effective use of time to get these people to > > understand > > this in the meeting. You want to expose to your ISP which traffic > you > > are sending is exposing congestion somewhere in the network. ISP > has > > another > > thing to bill you on. ISP than then stop billing you on how much > total > > traffic you send, so then you can send lots of traffic. It might > be > > possible, bit of genius here. Whether IETF should proceed is the > > question > > here. will waste time if we try to educate everyone today. > > > > > Leslie: line closed after Stanislav > > > > > Luca Martini: talking about congestion-based pricing. What is the > > guarantee > > I have as a user that the network will provide enough BW? > > > > > Bob B: ISP wants to try to offer a better service than other ISPs. > > If it > > is only limiting the traffic that causes congestion, you can get > more out > > of my network. If I allow my network to get more congested I'd > have a > > crap network and would lose customers. Overall bandwidth availability > > isn't the issue, it's about good use of the available capacity - > doesn't > > mean net-ops can ignore need to provision 'adequately'. > > > > > Luca Martini: what is the SLA that you are giving me? > > > > > Bob B: my SLA might be that you can send 70 GB a day under typical > > conditions > > > > > Rich W: not sure I am changing my pricing as a result of this > > > > > Matt Mathis: very worried that there is a bigger problem on the > horizon > > that conex might be part of the solution. TCP Friendly is an > > oxymoron, only > > beginning to feel the symptoms of that. > > > > > Murari S: brilliant extension of ECN, summarizing: causes better > > cooperation > > between users so we don't have to do wierd things in the network, > > incentive > > to use scavenger service, better traffic engineering in the network > > > > > Christian Vogt: presentations show that the is an improvement > > opportunity. > > ECN has not been deployed. Seems like this is a solution to > congestion. > > Would this be more likely to be deployed than ECN? Why is it > easier to > > deploy than ECN. Think it might be due to additional incentives. > > > > > Bob B: why is this more deployable? Would give network operators > much > > better incremental performance boost than just with ECN. It would > > give net-ops a stronger incentive to get much greater performance out > of > > their network > > > > > Stanislav S: made the point that ISPs cannot trust users to use > the > > right applications. If this does affect pricing, this is a license > to > > charge whatever you want, because the network is sending you the > signal > > that you are congested. > > > > > Leslie: this is about information available in the network > > > > > Stanislav S: don't see incentives to setting those markings in > > congestion. > > Only works with perfect competition and transparency. If there is > no > > pricing impact, then this is an extra throttle (?). Applicable to > any > > mechanism ... > > > > > Lars Eggert: this isn't the network telling the end system that > there > > is congestion - ISPs can already drop packets if they don't like your > > flow. The question is can the ISP correctly trust the end-systems to > > accurately indicate the congestion that they are going to cause. > > > > > > > Stanislav S: extra throttle, it already has a throttle because it > can > > drop > > packets. > > > > > Philip E: several points. ISPs can't lie to their end-users in the > > presence of competition and negative customer feedback. In a market > > where you have a termination monopoly, they can charge what they like > > anyway, so this doesn't make a difference - that problem can only be > > solved through regulation. > > > > > Jana Iyengar: re-ECN presentation conflated two things: one way to > > expose > > congestion, and what the operator could do with the information. > That > > is one candidate way of exposing congestion. > > > > > Leslie: moving discussion to whether there is a problem for the > IETF to > > solve. > > > > > Lars Eggert: knew that this wasn't an easy thing to get your head > > around. > > Who has read the documents? (several hands). Who thought that the > > documents > > were perfectly clear? (didn't check for hands). Expected more > discussion > > on the mailing list. Disappointed. Not sure if we are ready at > this > > point > > to discuss a charter. Problem statement is good to discuss now. > If we > > are going for a second BoF, shouldn't spend time on tutorials. > > > > > Matt Mathis: how much risk there is associated with starting the > work > > before > > everything else is clear. Launch with a draft charter. > > > > > Bob B: one way to ask the question is whether those who don't > > understand it > > from stopping those that do from solving it. > > > > > Leslie: for those who do understand it, is the problem statement > > something > > the IETF should undertake (lots of hands), if you believe the IETF > should > > not undertake (no hands). > > > > > Greg L: process point, reason we bring to standards is so that > everyone > > else can understand and implement. Need to make sure that the rest > of > > the community can understand. > > > > > Matt Mathis: to people who don't understand it; how many of them > are > > afraid > > of it. > > > > > Stanislav S: believe I understand, but my understanding does not > > correspond > > with the intended one. > > > > > Leslie: repeat with hums > > - understand the material, believe the problem statement describes > work > > the IETF should do (loud hum) > > - understand, don't believe this is a good problem statement > (silent) > > Believe there is momentum > > > > > Mat Ford: another 30 minutes left, good use of remaing time to > explain > > for those who don't understand > > > > > Jana I: we need a really well written applicability statement > > > > > Aaron Falk: problem statement doesn't say anything about whether > this is > > a standards activity; is that the intention > > > > > Philip E: deliberately did not answer that in the charter; let > IESG > > decide > > that. > > > > > Aaron Falk: good candidate for experimental/informational RFCs on > > possibly > > multiple mechanisms; premature for standards track. > > > > > Vijay Gill: very interesting work; should proceed; need deployment > > considerations documentation > > > > > Leslie: two things: deployment considerations, how this would be > > considered > > useful in practice > > > > > Alissa Cooper: tried hard to keep the potential uses apart from > what is > > being exposed, but it makes it more difficult to understand why > this is > > useful without describing assumptions about ISP business models. > > > > > Leslie: important output would be an applicability statement > > > > > Francois Le Faucheur: responding to Stanislav - if ISPs don't make > > use of > > the feedback in unpleasant ways, then it is not useful, may be > true. > > Good properties because it is incrementally deployable. Not > obvious that > > this won't work. There is space for someone to say "in my > resterant, if > > you eat more, you pay more" > > > > > Ingemar Johansson: don't want to exclude other transports than > TCP. > > Feels that different dynamics in congestion behaviour could cause > some > > issues for a protocol like this. > > > > > Stanislav S: difference between restaurants and data transmission > is > > ratio of cost of billing to cost of goods. Restaurants will itemise, > but > > in data networks models are simpler. > > > > > Bob B: reason I put up congestion volume bill, was because it is > simple. > > > > > Francois L: agree? > > > > > Stanislav S: ISPs will expose congestion, but sometimes you will > get to > > send more, sometimes less. I expect that ISPs would use flat- > pricing > > but impose different congestion limits. > > > > > Francois L: something better than flat rate will evolve. Like > saying > > unlimited calling for cell phones. > > > > > Stanislav S: that is how things are rapidly evolving > > > > > Leslie: should a WG be formed with this charter + some word- > smithing > > - Yes (some hums) > > - No (some hums) > > Seems that there is rough consensus to form a WG. Willing to > declare > > victory. > > > > > Philip E: demo will start in 5 minutes. > > > > > > Meeting adjourned. > > > > > > Agenda items not formally not addressed: > > > > Discussion of potential IETF work > > Constraints [10 mins] [Philip Eardley] > > Discussion of viability of congestion exposure [40 mins] [Leslie > Daigle] > > Draft charter discussion [20 mins] > > > > > > > > -- > > ------------------------------------------------------------------- > "Reality: > Yours to discover." > -- ThinkingCat > Leslie Daigle > leslie@thinkingcat.com > ------------------------------------------------------------------- > _______________________________________________ > re-ECN mailing list > re-ECN@ietf.org > https://www.ietf.org/mailman/listinfo/re-ecn
- [re-ECN] DRAFT minutes from the CONEX BoF at IETF… Leslie Daigle
- [re-ECN] LAST CALL Re: DRAFT minutes from the CON… Leslie Daigle
- Re: [re-ECN] LAST CALL Re: DRAFT minutes from the… toby.moncaster
- Re: [re-ECN] DRAFT minutes from the CONEX BoF at … Bob Briscoe
- Re: [re-ECN] DRAFT minutes from the CONEX BoF at … Leslie Daigle
- Re: [re-ECN] LAST CALL Re: DRAFT minutes from the… Leslie Daigle