[re-ECN] some comments on congestion exposure problem statement
<philip.eardley@bt.com> Thu, 08 October 2009 12:06 UTC
Return-Path: <philip.eardley@bt.com>
X-Original-To: re-ecn@core3.amsl.com
Delivered-To: re-ecn@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id D025A3A6359 for <re-ecn@core3.amsl.com>;
Thu, 8 Oct 2009 05:06:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.1
X-Spam-Level:
X-Spam-Status: No, score=-1.1 tagged_above=-999 required=5 tests=[AWL=-1.602,
BAYES_50=0.001, HTML_MESSAGE=0.001, MIME_ASCII0=1.5, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vq9oEXK0KSyi for
<re-ecn@core3.amsl.com>; Thu, 8 Oct 2009 05:06:52 -0700 (PDT)
Received: from smtp2.smtp.bt.com (smtp2.smtp.bt.com [217.32.164.150]) by
core3.amsl.com (Postfix) with ESMTP id 5E01128C132 for <re-ecn@ietf.org>;
Thu, 8 Oct 2009 05:06:51 -0700 (PDT)
Received: from E03MVB1-UKBR.domain1.systemhost.net ([193.113.197.107]) by
smtp2.smtp.bt.com with Microsoft SMTPSVC(6.0.3790.3959);
Thu, 8 Oct 2009 13:08:31 +0100
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="----_=_NextPart_001_01CA4810.0CFB3517"
Date: Thu, 8 Oct 2009 13:08:30 +0100
Message-ID: <4A916DBC72536E419A0BD955EDECEDEC063638EF@E03MVB1-UKBR.domain1.systemhost.net>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: some comments on congestion exposure problem statement
thread-index: AcpID/jpNHcrz/2NTdKANnkS0nhDoA==
From: <philip.eardley@bt.com>
To: <re-ecn@ietf.org>
X-OriginalArrivalTime: 08 Oct 2009 12:08:31.0931 (UTC)
FILETIME=[0DA898B0:01CA4810]
Subject: [re-ECN] some comments on congestion exposure problem statement
X-BeenThere: re-ecn@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: re-inserted explicit congestion notification <re-ecn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>,
<mailto:re-ecn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/re-ecn>
List-Post: <mailto:re-ecn@ietf.org>
List-Help: <mailto:re-ecn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/re-ecn>,
<mailto:re-ecn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Oct 2009 12:06:58 -0000
Here are a few comments on http://www.ietf.org/id/draft-moncaster-congestion-exposure-problem-00.tx t Hope they're useful, best wishes phil. Abstract >> Congestion exposure gives many benfits including meaningful I'd re-phrase this: Congestion exposure potential allows mechanisms to be built on top that could do <list of things> >> fairer I'd avoid the F word here and throughout the doc - it's too emotionally-laden. The only place it's ok is the first para of S2, where you're talking specifically about tcp-fairness. Intro Para 3: complex vs crude measures. I don't really understand how you've divided these things up, eg I'd have thought that per-application prioritisation is quite a complex measure, esp if traffic is encrypted. I'd avoid mentioning Ledbat - I think the argument needs more explaining S3 Why now? I don't think ledbat is the right place to start, but first some comments about what you say about ledbat: "will focus ... seem to" -> "focuses ... are" to me the ledbat argument is [1] operators penalise certain 'heavy' apps. Ledbat behaves 'nicely', therefore operator doesn't penalise it. So user can avoid DPI action (& maybe avoid any contribution to my volume cap). [2] ledbat based on congestion, rather than delay, would be better [ie react more accurately to actual network conditions]. (this is based on instinct, eg are there ecn papers that explored the issue?) anyway, I think a better structure for section 3 (& re-organising some of the other material) would be:- 1. what are the current problems? How does congestion exposure help? This is really the argument you make in section 2, plus some bits of S4. I think it's good to concentrate on one main story here (I suggest: the problem is 'capacity sharing conflict' (ie the bandwidth exceeds a link's capacity) in an ISP's network - DPI etc - applications encrypt - arms race) . It's terms of how it helps, you could give a para from the isp perspective & a para from the user's perspective. I'm not sure how far to go here & what to leave to bullet 3 below, but maybe you could mention: - user: allow the most urgent applications to go faster than today, whilst encouraging less urgent ones to delay their transmissions until there was spare capacity, and so increasing the overall utility of the internet - ISP: provide an equable basis for simple and reasonable network management by operators 2. what are the emerging/expected problems where congestion exposure helps? How does it help? For instance, I think it's reasonably likely that congestion is no longer at the edge only &/or there are multiple congestion bottlenecks on the path. Then the DPI-style approach struggles & congestion exposure is good. 3. what are the new uses that congestion exposure enables? possibly concentrating on explaining one, with other ideas just mentioned? A simple one would be Don's performance metric "an indication of backhaul health" move S6 [the straw proposal] to after all this. S5.1 >> In economic terms, this impact is known as a negative externality and the classic solution is to convert it to a shadow price that is used to determine the marginal cost of using the network. Maybe stop the sentence after "externality". Mention of price/cost means you need the caveat, to avoid confusion: "nb in practice customers reject congestion pricing where you pay per congested packet; but a "non classic" solution doesn't need to do this but still gets the benefit blah" - but I think this is getting into more detail than needed, hence I'd just end the sentence earlier. S5.1 para 3 I don't really get the relevance of the comment >> However this has no benefit to the user if the operator is unable to see that they are behaving in an altruistic manner. S5.2 >> Upstream congestion is defined as Downstream congestion is defined I'd call them "rest-of-path congestion" and maybe "congestion-so-far" S5.2 I hate the idea of a requirements section. firstly from a practical point of view, ietf reqts docs seems to turn into vast lists of MUSTs, SHOULDs etc that then everyone ignores. Secondly, I don't think you've actually written a requirements section (phew!). So maybe re-jig what you have into [1] something about what the solution looks like - it's key characteristics [rest-of-path congestion & congestion-so-far are visible at the IP layer] [2] something about the assumptions you're going to make when fleshing out the solution [eg we will do both v4 & v6, only do tcp, etc. Incremental deployment could be mentioned here, but could do with detailing what deployment cases are in scope.] In terms of your list, Bullet 1 is ok, except mentioning benefits is out of place Bullet 2 I think is already covered because the congestion exposure is in the IP layer Bullet 3 I don't really get. Do you mean the congestion information will be accurate within ~ RTT (contrast several minutes accuracy that a solution at the O&M layer might have)? Actually I think it would be worth mentioning this as a 'key characteristic' of the solution. Bullet 4 again I think is already covered because the congestion exposure is in the IP layer Bullet 5 see earlier comment Bullet 6 & 7 - I'd put in the security considerations section S6 After "it works" in para 1, I'd skip straight to para 3. to me, it's easier to give the example and then talk about more generic stuff - the specific example makes it easier to understand the more general discussion A pic might help? Para 4 seems in the wrong place.
- [re-ECN] some comments on congestion exposure pro… philip.eardley