[re-ECN] LAST CALL Re: DRAFT minutes from the CONEX BoF at IETF76
Leslie Daigle <leslie@thinkingcat.com> Wed, 02 December 2009 16:25 UTC
Return-Path: <leslie@thinkingcat.com>
X-Original-To: re-ecn@core3.amsl.com
Delivered-To: re-ecn@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id B472E28C217 for <re-ecn@core3.amsl.com>;
Wed, 2 Dec 2009 08:25:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.001
X-Spam-Level:
X-Spam-Status: No,
score=0.001 tagged_above=-999 required=5 tests=[BAYES_50=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aFUfpmPLCMcz for
<re-ecn@core3.amsl.com>; Wed, 2 Dec 2009 08:25:54 -0800 (PST)
Received: from zeke.ecotroph.net (zeke.ecotroph.net [70.164.19.155]) by
core3.amsl.com (Postfix) with ESMTP id 80EFA28C1EC for <re-ecn@ietf.org>;
Wed, 2 Dec 2009 08:25:54 -0800 (PST)
Received: from beethoven.local ([::ffff:81.253.81.142]) (AUTH: PLAIN leslie,
SSL: TLSv1/SSLv3,256bits,AES256-SHA) by zeke.ecotroph.net with esmtp;
Wed, 02 Dec 2009 11:25:44 -0500 id 015B00AB.4B169508.0000653D
Message-ID: <4B1694FF.3040305@thinkingcat.com>
Date: Wed, 02 Dec 2009 11:25:35 -0500
From: Leslie Daigle <leslie@thinkingcat.com>
User-Agent: Thunderbird 2.0.0.23 (Macintosh/20090812)
MIME-Version: 1.0
To: re-ecn@ietf.org
References: <4B07175A.60102@thinkingcat.com>
In-Reply-To: <4B07175A.60102@thinkingcat.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: Steven Blake <sblake@extremenetworks.com>
Subject: [re-ECN] LAST CALL Re: DRAFT minutes from the CONEX BoF at IETF76
X-BeenThere: re-ecn@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: re-inserted explicit congestion notification <re-ecn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>,
<mailto:re-ecn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/re-ecn>
List-Post: <mailto:re-ecn@ietf.org>
List-Help: <mailto:re-ecn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>,
<mailto:re-ecn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Dec 2009 16:25:56 -0000
Hi, I've not seen any comments on the list about these minutes -- I'd like to post them to the proceedings for IETF 76. Given the apparent lack of controversy -- let me ask for any final comments by Monday, December 7. Thanks, Leslie. Leslie Daigle wrote: > > Hi, > > We had two note takers at last weeks meeting -- Steven Blake and Mat > Ford. Thanks, again, to both of them for their efforts. > > Their notes are nicely complementary, so I've folded them together to > provide a completer picture, and I propose them as the draft minutes > from the meeting. Review /comment from people who attended the meeting > (f2f or virtually) would be appreciated. (Steven & Mat -- feel free to > shout out if you think I've (inadvertently) mangled your intent). > > Leslie. > > Congestion Exposure (CONEX) BoF > =============================== > Tuesday, November 10 from 1520-1810 > > NOTES by Steven Blake, Mat Ford > > CHAIRS: > Leslie Daigle <leslie@thinkingcat.com> > Philip Eardley <philip.eardley@bt.com> > > Meeting materials: https://datatracker.ietf.org/meeting/76/materials.html > > AGENDA > ------ > > Administrivia [ 5 mins] > > - no objections to the agenda > > Introduction by chairs [ 5 mins] > > Background > The problem [50 mins] > > == End-user perspective [Murari Sridharan] > > - OS bottlenecks removed over last 6-7 years > - congestion control has become so sophisticated they can fill up any > residual capacity now > - people complain about lack of resources now that pipes regularly get > filled > > to end-host, network is largely a black box - characteristics are inferred > imposes complex usage requirements - volume caps - example of end user > hit with heavy pay-per-use bill for downloading windows update, despite > the fact that windows update runs over a scavenger service. > > network view - end hosts can't be trusted, application performance needs > to be inferred, end-hosts typically establish connectivity to well-known > servers, but reality is different. > > innovation is all in layer-violation - this isn't sustainable! > > congestion control purity is no longer reality - TCP tunnelled inside > TCP isn't a route to deterministic results! > > > - no comments at the mic > > > == ISP Context/motivation [Rich Woundy] > > Enable customers to control their own network experience - take ISP out > of the loop of being 'congestion police' > > > > Linda Dunbar: you discuss making the heavy user lower priority; what > does > this have to do with network congestion? > > > Rich W: Comcast mechanism is not a conex proposal. Our mechanism > does not > see end2end. It only solves congestion problem at the edge, not for > any other part of our network or for third parties. comcast solution is > monitoring capacity and resource use in the network. Measuring > end-to-end congestion requires another mechanism. > > > Linda Dunbar: congestion is very transient. End user has no control > over > over the network's behavior. > > > Leslie: wait until after the other presentations > > > Bob Briscoe: mention LEDBAT > > > Leslie: non-IETF ISOC meeting today on bandwidth; meeting materials > (including audio) at ISOC website > > > == Technical problem [Mark Handley] > > whenever he presents about congestion people say 'we're overprovisioned, > don't care' - he doesn't subscribe to that - will talk about why we need > to care about congestion > > TCP isn't broken, but we can do better > > used to be receive window limited in end systems - no longer the case in > popular modern TCP stacks > > goal should be for congested networks, at least at the bottleneck > > packet loss isn't necessarily a problem - for apps where it is a problem > we have ECN > > > > Greg Lebovitz: think about next-gen apps, and where they might > fit on the latency/size graph (e.g., Internet-of=things). Existing apps > were built a certain way because the network works the way it does. > > > Mark H: some things we haven't put on the net because they don't work > with > today's Internet. > > > Geoff Huston: making a good use of the network in either case (re: > latency, > latency, latency) slide. > > > Mark H: better from a user's perspective > > > Aaron Falk: ISPs aren't charging by the byte > > > Jana Iyengar: works at residential education institution - students > tend to do a lot of 'stuff' that needs separated from academic work - > DPI is used for that, maybe in other enterprises too > > > Ben Niven-Jenkins: if the prime driver for ISPs to use DPI is to control > costs, don't see how it is relevant in the context of controlling > congestion > > > Mark H: because they need to control costs, because they have > congestion - need to maintain good service for higher-paying customers; > trying to provide acceptable service to non P2P apps. > > > Ben N-J: DPI being used to prevent going over usage caps > > > Mat Ford: That doesn't explain why users on relatively low service > tiers have their throughput throttled regardless of whether or not they > have exceeded any volume threshold > > > Ben N-J: economic issue; how does technology solve it. Don't know > how the > two are linked. > > > Vijay Gill: agree with Mat; if an ISP have chronic congestion, why not > keep raising the price until users fall off. Comcast has two tiers of > service (residential, business). Residential has 250 GB cap; business > service has no cap. Most folks I know go for the business service > ($100/month). > > > Bob Briscoe: try to answer Ben's question - he was talking about > retail ISPs > as customers. Wholesaler sells bit rates to the retail ISPs. > > > Ben N-J: it is not us causing the bottlenect > > > Leslie: not here to talk about how to make things work with DPI; > let's move > on. > > > Stanislav Shalunov: what can you convey with conex that you can't > convey with > simple drops? Latency ... > > > Mark H: only talking about the problem space > > > Stanislav S: current loss rates (< 1%) are working fine. > > > Mark H: loss rates are very variable > > > Aaron Falk: re: IETF Goals - we shouldn't be talking about economics. > Disagree that the only cost is congestion cost (overstatement). > Infrastructure has cost. Question is incremental cost. Economic > expertise > would be useful in this discussion. > > > Mark H: yes, underutilised network gives you ability to communicate - > additional traffic doesn't cost anything more, until you experience > congestion > > Towards a solution [20 mins] > > == Overview of re-ECN [Bob Briscoe] > > > Greg L: before when we saw that sometimes there is a long duration > connection > and something that was very short has to wait, in that case, one of them > will show the network is very bad, and the other one showing that the > network is very working well. > > > Bob B: small transfer can go fast, because it won't build up a big > congestion volume; incentive for large transfer to back off because it > could > build up large congestion volume. > > > Greg L: how do they know about each other? > > > Bob B: because of the congestion notifications. I'm able to use up my > congestion allowance if I know I won't be transferring long. > > > Greg L: you said that is how TCP works. This works by some box in the > middle. > > > Bob B: imagine a TCP with either a high weight or a low weight. > > > Greg L: is it dependent on a box in the middle, or just the endpoints. > > > Bob B: box in middle just enforces congestion volume allowance, in one > possible deployment. > > > Lars Eggert: trying to show that the problem is solvable, not that this > is the solution. > > > Lars Eggert: we believe you Bob that you can't cheat (leap of faith) > > > Murari S: Thought I understood conex, not I'm confused. If you only > look > at the problem of short flows coming in and using lots of BW, problem > can be solved if all the bulk users used scavenger service. Problem > would > automatically solve itself. > > > Bob B: ISPs can't see congestion, how do you get a free pass. > > > Murari S: ISPs problem is because customers complain that they're not > getting service. > > > Philip E: ISPs can't trust that end users are using LEDBAT; don't > want them > using DPI to figure this out. Trying to get the two to cooperate. > > > Murari S: if everyone would start using scavenger, then the main purpose > of Conex is to reroute traffic under congestion. > > > Bob B: how does the ISP know that the user is using LEDBAT. Purpose > is to help operators know which traffic is causing most congestion > > > Mark H: reasonable for ISPs to limit traffic that is causing a problem. > But ISPs cannot see which traffic is causing the problem. > > > Jana Iyengar: incentive issue with LEDBAT; end hosts may choose not to > use it. > > > Bob B: what about big-big flows and little-big flows? Two classes > may not > be enough. > > > Stanislav Shalunov: why send the info the user? Why not keep it within > the ISP, so that you can evolve the algorithm. > > > Bob B: don't want to do congestion control within the network. > > > Stanislav S: seems like two justifications: solve the LEDBAT problem, ?? > > > Lars Eggert: bunch of questions, high-level question is whether we all > understand what the problem is, seems like it. Questions that relate > to whether exposing congestion solves the problems. Then questions > around > how re-ECN exposes congestion. > > > Leslie: next discussion is around principles and constraints. > > > Lars Eggert: should have questions along whether there is a problem that > IETF should solve. Is everyone confused? Then there is a question of > whether exposing congestion is a way to solve the problem, then there is > the question of re-ECN as a suitable solution - lets tease these apart, > and start at the beginning > > > Linda Dunbar: want to confirm the problem statement, to expose network > congestion to the end user? > > > Bob B: the opposite - expose it to the network > > > Linda Dunbar: if I'm an end user, what benefits me by doing something > different? > > > Bob B: suppose I say that the amount of volume you send is a problem; > that's not true. I can't judge whether you are sending during a trough. > > > Linda D: one application is so trivial in the whole network. > > > Leslie: hypothetical, my husband tells me the road is congested; I can > use the toll road or wait in traffic > > > Linda D: I don't have a choice > > > Bob B: you can choose to slow down and send later > > > Linda D: can we have one single problem statement? > > > Aaron Falk: minor epiphany - way to identify responsive flows; give them > a seal of approval, giving them higher priority. Been discussed in IETF > for a long time. However, you are talking about aggregated statistics, > idea of distinguishing flows is problematic. > > > Bob B: can differentiate between networks that encourage users to behave > vs. ones that don't. > > > Tim Shephard: answer Lars - I think I understand this, but it has > nothing > to do with what I have heard in this room today. Seen Bob talk many > times > and I don't think he has taken people that don't understand this to > understand it. Not effective use of time to get these people to > understand > this in the meeting. You want to expose to your ISP which traffic you > are sending is exposing congestion somewhere in the network. ISP has > another > thing to bill you on. ISP than then stop billing you on how much total > traffic you send, so then you can send lots of traffic. It might be > possible, bit of genius here. Whether IETF should proceed is the > question > here. will waste time if we try to educate everyone today. > > > Leslie: line closed after Stanislav > > > Luca Martini: talking about congestion-based pricing. What is the > guarantee > I have as a user that the network will provide enough BW? > > > Bob B: ISP wants to try to offer a better service than other ISPs. > If it > is only limiting the traffic that causes congestion, you can get more out > of my network. If I allow my network to get more congested I'd have a > crap network and would lose customers. Overall bandwidth availability > isn't the issue, it's about good use of the available capacity - doesn't > mean net-ops can ignore need to provision 'adequately'. > > > Luca Martini: what is the SLA that you are giving me? > > > Bob B: my SLA might be that you can send 70 GB a day under typical > conditions > > > Rich W: not sure I am changing my pricing as a result of this > > > Matt Mathis: very worried that there is a bigger problem on the horizon > that conex might be part of the solution. TCP Friendly is an > oxymoron, only > beginning to feel the symptoms of that. > > > Murari S: brilliant extension of ECN, summarizing: causes better > cooperation > between users so we don't have to do wierd things in the network, > incentive > to use scavenger service, better traffic engineering in the network > > > Christian Vogt: presentations show that the is an improvement > opportunity. > ECN has not been deployed. Seems like this is a solution to congestion. > Would this be more likely to be deployed than ECN? Why is it easier to > deploy than ECN. Think it might be due to additional incentives. > > > Bob B: why is this more deployable? Would give network operators much > better incremental performance boost than just with ECN. It would > give net-ops a stronger incentive to get much greater performance out of > their network > > > Stanislav S: made the point that ISPs cannot trust users to use the > right applications. If this does affect pricing, this is a license to > charge whatever you want, because the network is sending you the signal > that you are congested. > > > Leslie: this is about information available in the network > > > Stanislav S: don't see incentives to setting those markings in > congestion. > Only works with perfect competition and transparency. If there is no > pricing impact, then this is an extra throttle (?). Applicable to any > mechanism ... > > > Lars Eggert: this isn't the network telling the end system that there > is congestion - ISPs can already drop packets if they don't like your > flow. The question is can the ISP correctly trust the end-systems to > accurately indicate the congestion that they are going to cause. > > > > Stanislav S: extra throttle, it already has a throttle because it can > drop > packets. > > > Philip E: several points. ISPs can't lie to their end-users in the > presence of competition and negative customer feedback. In a market > where you have a termination monopoly, they can charge what they like > anyway, so this doesn't make a difference - that problem can only be > solved through regulation. > > > Jana Iyengar: re-ECN presentation conflated two things: one way to > expose > congestion, and what the operator could do with the information. That > is one candidate way of exposing congestion. > > > Leslie: moving discussion to whether there is a problem for the IETF to > solve. > > > Lars Eggert: knew that this wasn't an easy thing to get your head > around. > Who has read the documents? (several hands). Who thought that the > documents > were perfectly clear? (didn't check for hands). Expected more discussion > on the mailing list. Disappointed. Not sure if we are ready at this > point > to discuss a charter. Problem statement is good to discuss now. If we > are going for a second BoF, shouldn't spend time on tutorials. > > > Matt Mathis: how much risk there is associated with starting the work > before > everything else is clear. Launch with a draft charter. > > > Bob B: one way to ask the question is whether those who don't > understand it > from stopping those that do from solving it. > > > Leslie: for those who do understand it, is the problem statement > something > the IETF should undertake (lots of hands), if you believe the IETF should > not undertake (no hands). > > > Greg L: process point, reason we bring to standards is so that everyone > else can understand and implement. Need to make sure that the rest of > the community can understand. > > > Matt Mathis: to people who don't understand it; how many of them are > afraid > of it. > > > Stanislav S: believe I understand, but my understanding does not > correspond > with the intended one. > > > Leslie: repeat with hums > - understand the material, believe the problem statement describes work > the IETF should do (loud hum) > - understand, don't believe this is a good problem statement (silent) > Believe there is momentum > > > Mat Ford: another 30 minutes left, good use of remaing time to explain > for those who don't understand > > > Jana I: we need a really well written applicability statement > > > Aaron Falk: problem statement doesn't say anything about whether this is > a standards activity; is that the intention > > > Philip E: deliberately did not answer that in the charter; let IESG > decide > that. > > > Aaron Falk: good candidate for experimental/informational RFCs on > possibly > multiple mechanisms; premature for standards track. > > > Vijay Gill: very interesting work; should proceed; need deployment > considerations documentation > > > Leslie: two things: deployment considerations, how this would be > considered > useful in practice > > > Alissa Cooper: tried hard to keep the potential uses apart from what is > being exposed, but it makes it more difficult to understand why this is > useful without describing assumptions about ISP business models. > > > Leslie: important output would be an applicability statement > > > Francois Le Faucheur: responding to Stanislav - if ISPs don't make > use of > the feedback in unpleasant ways, then it is not useful, may be true. > Good properties because it is incrementally deployable. Not obvious that > this won't work. There is space for someone to say "in my resterant, if > you eat more, you pay more" > > > Ingemar Johansson: don't want to exclude other transports than TCP. > Feels that different dynamics in congestion behaviour could cause some > issues for a protocol like this. > > > Stanislav S: difference between restaurants and data transmission is > ratio of cost of billing to cost of goods. Restaurants will itemise, but > in data networks models are simpler. > > > Bob B: reason I put up congestion volume bill, was because it is simple. > > > Francois L: agree? > > > Stanislav S: ISPs will expose congestion, but sometimes you will get to > send more, sometimes less. I expect that ISPs would use flat-pricing > but impose different congestion limits. > > > Francois L: something better than flat rate will evolve. Like saying > unlimited calling for cell phones. > > > Stanislav S: that is how things are rapidly evolving > > > Leslie: should a WG be formed with this charter + some word-smithing > - Yes (some hums) > - No (some hums) > Seems that there is rough consensus to form a WG. Willing to declare > victory. > > > Philip E: demo will start in 5 minutes. > > > Meeting adjourned. > > > Agenda items not formally not addressed: > > Discussion of potential IETF work > Constraints [10 mins] [Philip Eardley] > Discussion of viability of congestion exposure [40 mins] [Leslie Daigle] > Draft charter discussion [20 mins] > > > -- ------------------------------------------------------------------- "Reality: Yours to discover." -- ThinkingCat Leslie Daigle leslie@thinkingcat.com -------------------------------------------------------------------
- [re-ECN] DRAFT minutes from the CONEX BoF at IETF… Leslie Daigle
- [re-ECN] LAST CALL Re: DRAFT minutes from the CON… Leslie Daigle
- Re: [re-ECN] LAST CALL Re: DRAFT minutes from the… toby.moncaster
- Re: [re-ECN] DRAFT minutes from the CONEX BoF at … Bob Briscoe
- Re: [re-ECN] DRAFT minutes from the CONEX BoF at … Leslie Daigle
- Re: [re-ECN] LAST CALL Re: DRAFT minutes from the… Leslie Daigle