Re: [rmcat] Following up on my ECN feedback question at the meeting today

"Bob Briscoe" <in@bobbriscoe.net> Thu, 17 November 2016 18:00 UTC

Return-Path: <in@bobbriscoe.net>
X-Original-To: rmcat@ietfa.amsl.com
Delivered-To: rmcat@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 43C121299BF for <rmcat@ietfa.amsl.com>; Thu, 17 Nov 2016 10:00:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TDATm_nfQ9m0 for <rmcat@ietfa.amsl.com>; Thu, 17 Nov 2016 10:00:51 -0800 (PST)
Received: from server.dnsblock1.com (server.dnsblock1.com [85.13.236.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 57BAC129406 for <rmcat@ietf.org>; Thu, 17 Nov 2016 10:00:51 -0800 (PST)
Received: from [::1] (port=35778 helo=server.dnsblock1.com) by server.dnsblock1.com with esmtpa (Exim 4.87) (envelope-from <in@bobbriscoe.net>) id 1c7QzR-0005dl-N5; Thu, 17 Nov 2016 18:00:49 +0000
Received: from 125.177.184.81 ([125.177.184.81]) (SquirrelMail authenticated user in@bobbriscoe.net) by server.dnsblock1.com with HTTP; Thu, 17 Nov 2016 18:00:49 -0000
Message-ID: <57f0db24766a124929b403b16fc412d4.squirrel@server.dnsblock1.com>
In-Reply-To: <582DC8CA.1050103@erg.abdn.ac.uk>
References: <582D8488.1000200@erg.abdn.ac.uk> <237b098db57e43668bcc4ce72bef1ec1@XCH-ALN-017.cisco.com> <582DC8CA.1050103@erg.abdn.ac.uk>
Date: Thu, 17 Nov 2016 18:00:49 -0000
From: "Bob Briscoe" <in@bobbriscoe.net>
To: gorry@erg.abdn.ac.uk, "Michael Ramalho (mramalho)" <mramalho@cisco.com>
User-Agent: SquirrelMail/1.5.2 [SVN]
MIME-Version: 1.0
Content-Type: text/plain;charset=utf-8
Content-Transfer-Encoding: 8bit
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server.dnsblock1.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: server.dnsblock1.com: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: server.dnsblock1.com: in@bobbriscoe.net
Archived-At: <https://mailarchive.ietf.org/arch/msg/rmcat/uJ23GJ3PUIC_JTQJ0BQqKgY5D9I>
Cc: "rmcat@ietf.org" <rmcat@ietf.org>
Subject: Re: [rmcat] Following up on my ECN feedback question at the meeting today
X-BeenThere: rmcat@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
Reply-To: in@bobbriscoe.net
List-Id: "RTP Media Congestion Avoidance Techniques \(RMCAT\) Working Group discussion list." <rmcat.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rmcat>, <mailto:rmcat-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rmcat/>
List-Post: <mailto:rmcat@ietf.org>
List-Help: <mailto:rmcat-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rmcat>, <mailto:rmcat-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Nov 2016 18:00:53 -0000

Michael, Gorry,

On Thu, November 17, 2016 3:12 pm, Gorry Fairhurst wrote:
> Sounds fine, thanks - I'll let others also get back if they wish,
> otherwise keep designing!
>
> Gorry
>
>
> On 17/11/2016 14:59, Michael Ramalho (mramalho) wrote:
>
>> Hi Gorry,
>>
>>
>> Speaking for myself (and not necessarily all on the RMCAT Design Team),
>> every proposal so far has the ability to report both ECN bits for ALL
>> the packets the receiver received. Thus the sender, knowing what was
>> sent and what was received, could determine any changes in these bits.
>>
>> The proposals since the "01" draft have put the ECN information in
>> different places - to attain the goal of trivial compression. Note that
>> we have not come to closure if compression is needed (that was what
>> Colin's presentation addressed).
>>
>>
>> In the proposal shown at the meeting - if all the ECN bits received
>> were identical, one instance of those two bits appeared in the fixed
>> body of the report (two bits stolen from where the end_seq was
>> previously) along with a flag (another bit stolen from the same field)
>> that stated that all received ECN bits were identical. If all received
>> ECN bits were not identical, then ALL of the individual ECN bits for
>> all packets received were reported elsewhere (in the "C bits" after all
>> the arrival time offset fields).
>>
>> There was discussion in one of the DT meetings that one might want
>> disable the reporting of the individual ECN bits - perhaps dynamically
>> via signaling - and I briefly mentioned that during my presentation.
>> Such discussion has not been reflected in any consensus nor in any
>> text. I think the option was discussed in the context of a low
>> bandwidth stream (but I am not certain on this point).
>>
>> However, if such an option to disable ECN reporting was desired and
>> enabled - the format in the proposal shown had two ECN bit locations
>> above as "a representative ECN". Again, this was not defined or
>> discussed - but such could be the most prevalent ECN ... or the
>> "worst-case" ECN (i.e., if there was congestion flagged in some of
>> them) ... or [who knows].
>>
>> In closing, we are not certain that we need compression. But we do know
>> how to compress loss indications and individual ECN bits efficiently
>> via run length encoding (perhaps using what is already defined in RTCP
>> XR). My vote would be to compress the ECN (rather than disabling ECN
>> reporting) if we ever decided that the reporting all ECN bits
>> individually was too burdensome.

[BB]: In any compression scheme, please try to avoid allowing the receiver
to opt out of giving an accurate count of CE received...

One of the reasons for (potentially) deciding we do not need the ECN nonce
in the IP header any more (see draft-black-tsvwg-ecn-experimentation) is
that an alternative is possible without consuming any IP header
codepoints. It has not been written up, but it would involve the sender
randomly setting CE itself once or twice, and checking that the receiver
reports these faithfully. I believe it would be sufficient for the
receiver to just report the sum of CE marks (so the sender's injected CE
marks would set a lower bound to how much marking a receiver could
suppress).

Like the ECN nonce, this is only applicable if the sender is willing to
police ECN on behalf of the network. But despite its limitations, it is
worth ensuring that a receiver cannot downgrade feedback precision
sufficiently to enable its own attack.

I believe it will be sufficient for CE feedback to always be accurate. ECT
0/1 do not need to be accurate.

Also, please ensure the feedback always gives bytes marked not just
packets marked (or allows the sender to infer bytes marked, e.g. if all
packets are the same size). Not just to aid testing for receiver cheating,
but also as motivated in RFC7141.

Until someone writes up a scheme for testing receiver ECN feedback
compliance, I'm afraid I cannot give more details. But you can find the
equivalent scheme for drop here:
draft-moncaster-tcpm-rcv-cheat-03 (Expired)

Also I suggest a read of rfc7560. Despite its title, "Problem Statement
and Requirements for Increased Accuracy in ECN Feedback", it is solely
about TCP, but still a useful checklist for rmcat.


Cheers


Bob

>>
>> Again, those are my opinions and not necessarily all on the Design
>> Team. I'll let Colin and others respond to the frequency and overhead
>> portions of your comments.
>>
>> Best,
>>
>>
>> Michael Ramalho
>>
>>
>> -----Original Message-----
>> From: rmcat [mailto:rmcat-bounces@ietf.org] On Behalf Of Gorry Fairhurst
>>  Sent: Thursday, November 17, 2016 5:21 AM
>> To: rmcat@ietf.org
>> Subject: [rmcat] Following up on my ECN feedback question at the meeting
>> today
>>
>> I have some follow-up comments on things relating to the transport use
>> of ECNthat may relate to draft-dt-rmcat-feedback-message-01.
>>
>> (1) My meeting comment on jabber was (I may have missed the point
>> earlier in the talk) that I wanted to check if a new method could
>> potentially hide the presence of a CE-Mark (specifically receiving a
>> CE-marked packet and not reporting this seems like something we may
>> wish to worry about and I could not work out is the proposal ever
>> omitted ECN information).
>>
>> (2) Now looking at the design team draft, this statement is of course
>> OK with me:
>>
>>
>> "If ECN
>> [RFC3168] is used, it is necessary to report on the 2-bit ECN mark in
>> received packets, indicating for each packet whether it is marked
>> not-ECT, ECT(0), ECT(1), or ECN-CE."
>>
>> And following this it seems to me that there are two very basic pieces
>> of information that I'd love to be able to know as a sender when using
>> an ECN-capable network:
>>
>> (2a) It *can* be important to know that an ECT(?) codepoint is being
>> received at the IP layer. A sender may well know that it is sending
>> either ECT(0) or ECT(1), but doesn't definitely know these are being
>> received unchanged (i.e., the path has not remarked these). - Reporting
>> all ECN marks would clearly satisfy this - read no further if you plan
>> to always do this. - A count of how many ECT marks were received is
>> really helpful to know that the current ECN forwarding path is broken,
>> it could even allow a sender to check that any chosen ECT(x) encoding
>> is working, by independently setting x=0 or x=1, if it wishes. - Knowing
>> which specific ECT(?) is received is potentially useful information.
>> This could perhaps be used in a method to determine which flavour of
>> ECN-marking is supported by a path, and more info about whether ECN is
>> being handled correctly by a network (knowing middleboxes don't do
>> unwanted things can always utilise extra information). (As new info,
>> the TSVWG is currently considering work proposing to eliminate the use
>> of NONCE encoding where an apps sends ECT(0) and ECT(1) randomly. This
>> could simplify the need to encode which ECT(?) codepoints were received
>> - see draft-black-tsvwg-ecn-experimentation.)
>>
>>
>> (2b) A sender must *at least* know if there were any CE marks in a
>> reporting interval. - If you report each CE received than this is
>> sufficient. But I have a word of caution. *If* an app looses a report
>> with a CE-mark report it may never know, and does not impact user
>> experience in terms of loss, but the CC still needs to respond to
>> behave correctly for AQM, and may impact delay :-). - It can be very
>> valuable for the sender to know if ANY CE-marked packets were received,
>> even if sending not-ECN capable packets at this moment (where it is an
>> error that indicates ECT(?) is unreliable). - Knowing how many CE-marks
>> (or CE-marked bytes) per interval is probably really valuable for a CC.
>> I'd think a sender could easily utilise more CE per packet information,
>> and may need to do (e.g., to utilise L4S should that be wanted in
>> future). - Knowing each CE-mark is something that any CC can utilise and
>> could be needed for L4S. It could also help to know about whether
>> bursts are being marked, rather than average rate. - Some AQMs may use
>> shallow marking and that is something that COULD be nice to detect in
>> future from per-packet CE-mark reports. (At the moment, I really think
>> we don't completely know yet how to do this).
>>
>>
>> So to me, this suggests at least some counters per reporting interval
>> are needed - and per-packet info will be much better.
>>
>> (3) In relation to "Feedback Frequency and Overhead", section 4. I have
>> one less useful comment:
>>
>> Amortising overhead by reporting less often could perhaps result in a
>> performance tradeoff. There may well be quite stringent timing
>> implications if an RMCAT app wants to use "low latency" ECN - that's
>> something to be watched as the transport as the L4S work in TSVWG
>> progresses, but it would be nice to know that the report interval does
>> not constrain our options. I'm arguing that the WG may need to note
>> this (or consider this), but I for one, don't yet know how this will
>> evolve in future.
>>
>> In case anyone needs it, draft-ietf-aqm-ecn-benefits-08 may have some
>> more info.
>>
>> Best wishes,
>>
>>
>> Gorry
>>
>>
>
>