Re: [re-ECN] VIability issue #2
HeinerHummel@aol.com Fri, 06 November 2009 13:32 UTC
Return-Path: <HeinerHummel@aol.com>
X-Original-To: re-ecn@core3.amsl.com
Delivered-To: re-ecn@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id 96A623A6A93 for <re-ecn@core3.amsl.com>;
Fri, 6 Nov 2009 05:32:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.773
X-Spam-Level:
X-Spam-Status: No, score=-0.773 tagged_above=-999 required=5 tests=[AWL=1.225,
BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_43=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hb+J7A6ULtEL for
<re-ecn@core3.amsl.com>; Fri, 6 Nov 2009 05:32:01 -0800 (PST)
Received: from imr-da01.mx.aol.com (imr-da01.mx.aol.com [205.188.105.143]) by
core3.amsl.com (Postfix) with ESMTP id F37AD3A69CA for <re-ecn@ietf.org>;
Fri, 6 Nov 2009 05:31:57 -0800 (PST)
Received: from imo-da04.mx.aol.com (imo-da04.mx.aol.com [205.188.169.202]) by
imr-da01.mx.aol.com (8.14.1/8.14.1) with ESMTP id nA6DW0TP026645;
Fri, 6 Nov 2009 08:32:00 -0500
Received: from HeinerHummel@aol.com by imo-da04.mx.aol.com (mail_out_v42.5.)
id p.c7d.59b825c5 (39330); Fri, 6 Nov 2009 08:31:55 -0500 (EST)
From: HeinerHummel@aol.com
Message-ID: <c7d.59b825c5.38257f4a@aol.com>
Date: Fri, 6 Nov 2009 08:31:54 EST
To: toby.moncaster@bt.com, leslie@thinkingcat.com, re-ecn@ietf.org
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="-----------------------------1257514314"
X-Mailer: 9.0 SE for Windows sub 5021
X-AOL-SENDER: HeinerHummel@aol.com
Subject: Re: [re-ECN] VIability issue #2
X-BeenThere: re-ecn@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: re-inserted explicit congestion notification <re-ecn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>,
<mailto:re-ecn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/re-ecn>
List-Post: <mailto:re-ecn@ietf.org>
List-Help: <mailto:re-ecn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>,
<mailto:re-ecn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2009 13:32:02 -0000
See my comments inline, Heiner In einer eMail vom 06.11.2009 12:47:31 Westeuropäische Normalzeit schreibt toby.moncaster@bt.com: Viability Issue #2 The expectation is that congestion exposure information will be carried in IP packet headers. Is there really enough room to do that effectively (in IPv4)? For discussion: This assumes tight timing -- that feedback is received and acted upon such that subsequent flows will experience the same or similar network state. What are the implications (or likelihood) of different paths? Or, are there other network state changes that will (could) change in that timeframe (now or in future developments). 1) Congestion should be signalled only to those upstream (not downstream !) routers which are tempted to use this congested router for transit. {TM} This is exactly what re-ECN achieves. There are only two possible ways in which a router can signal to routers upstream that it is congested. It could do this directly by trying to send messages back along the path to say it is congested, but such approaches have long been shown to be unworkable for a number of reasons (and are getting more difficult not less). Before making such a generalized statement, have a look at the network picture at _www.hummel-research.de_ (http://www.hummel-research.de) : It not only shows multiple shortest and/or detouring loop-free paths to some given destination node (red node), ut also with respect to any particular (congested) node what is the precise upstream located subnetwork whose nodes would use it (the picked, congested one) for transit.Provided that each node knows the network topology, it can make this multipath determination, and also, for the sake of congestion notification send out messages to the respective upstream neighbor nodes, which in return may forward them further upstream until there is no further upstream one. The tree-like branching upstream directed notification message could even count the number of hops to the (downstream located) congested node, with the result that closer neighbors thereof might continue forwarding the flows unchanged, while those farer up might take action by-pass the congested node. Yes, some of the few bits of the IPv4-header might be used to impose a best by-pass forwarding. See my point 2). The other alternative is to inform downstream nodes and for the receiver to pass this back to the sender. The sender can then insert this and thus a router that is upstream can calculate how much congestion is being caused downstream of it. Routers ALREADY inform downstream nodes that they are congested. They either do this implicitly by drop (requiring some digging into flow state to be spotted) or they do it explicitly by ECN. This is not an information per single ip-packet, instead an information from time to time informing about the degree of congestion. I.e. it needs to be a message of some other protocol type. Also some mechanism must guide the notification message as to progress in a tree-way fashion upstream but not beyond the points where flows wouldn't use the actually congested node anyway. {TM} Congestion varies on near RTT scales. It is pointless to send periodic notifications of congestion levels because these would simply miss the potentially enormous short-term fluctuations. Ideally therefore the information should be carried with every packet. This is certainly not true:the change of the degree of congestion can be communicated right away rather than by periodic notifications. This (upstream) area to be informed can easily be identified with respect to flows to some distinct destination node. Hence congestions due to flows to one and the same destination node can easily and properly be handled. More patient work is needed if the congestion is due to flows destined to different destination nodes (that's what a working group is for, isn't it ?). {TM} I am not sure what you are getting at here. As far as I know it is pretty hard to identify the reverse path for a given flow given paths are often asymmetric. Even if it were possible why would the upstream node trust the downstream node. What would prevent an attacker spoofing pushback messages? And it sounds like you are suggesting using flow state in the core? See above. It takes however the knowledge about the network topology. This is - BTW - something I tried to tell the RRG of the IRTF: With distance vector algorithm (BGP as of today) you have no rear mirrow in your car :-) I am afraid re-ECN has something else in mind :-( 2) The few bits in the IP-header are definitely needed and should be saved for routing, e.g. for extending multipath such that even crankback (which is de facto a loop) becomes ok, i.e. so that endless-loops can be avoided hereby. {TM} Is there any firm proposal yet which makes use of these bits in such a fashion? If so, please could you send a link to a relevant paper or ID to this list? No there is definitely no work or relevant paper or ID yet. But try out by yourself: A bottle of wine for you if you can detect a single loop of arrows on the picture in my website. However there are a lot of RFCs dealing with loops and micro-loops. Heiner
- [re-ECN] VIability issue #2 Leslie Daigle
- Re: [re-ECN] VIability issue #2 toby.moncaster
- Re: [re-ECN] VIability issue #2 João Taveira Araújo
- Re: [re-ECN] VIability issue #2 HeinerHummel
- Re: [re-ECN] VIability issue #2 toby.moncaster
- Re: [re-ECN] VIability issue #2 HeinerHummel
- Re: [re-ECN] VIability issue #2 HeinerHummel
- Re: [re-ECN] VIability issue #2 Tom Taylor
- Re: [re-ECN] VIability issue #2 John Leslie
- Re: [re-ECN] VIability issue #2 HeinerHummel
- Re: [re-ECN] VIability issue #2 Woundy, Richard
- Re: [re-ECN] VIability issue #2 toby.moncaster