Re: [rtcweb] Endpoints that don't support RTCP

Colin Perkins <csp@csperkins.org> Thu, 23 April 2015 11:01 UTC

Return-Path: <csp@csperkins.org>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C1DAA1B2CEF for <rtcweb@ietfa.amsl.com>; Thu, 23 Apr 2015 04:01:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Fb1_PDONg8Dk for <rtcweb@ietfa.amsl.com>; Thu, 23 Apr 2015 04:01:55 -0700 (PDT)
Received: from haggis.mythic-beasts.com (haggis.mythic-beasts.com [IPv6:2a00:1098:0:86:1000:0:2:1]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 55D241B2D1B for <rtcweb@ietf.org>; Thu, 23 Apr 2015 04:01:41 -0700 (PDT)
Received: from [130.209.247.112] (port=62946 helo=mangole.dcs.gla.ac.uk) by haggis.mythic-beasts.com with esmtpsa (TLS1.0:RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <csp@csperkins.org>) id 1YlEsy-0005P5-Rp; Thu, 23 Apr 2015 12:01:38 +0100
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Colin Perkins <csp@csperkins.org>
In-Reply-To: <CAPvvaaKZ5OkB+kVqiX4iTZ+TnUotTK-MWah8W+goQW9DPVT+dg@mail.gmail.com>
Date: Thu, 23 Apr 2015 12:01:30 +0100
Content-Transfer-Encoding: quoted-printable
Message-Id: <B32981BB-BF46-4808-9DBD-CF9DA4284950@csperkins.org>
References: <CAOJ7v-01DhCKewmC-Cvh4Z-jeOmi=CunisjFWceoPfk2ZM9Wgg@mail.gmail.com> <7978938E-B510-43E2-9F19-C4752F6D23FD@cisco.com> <CABkgnnWvU+aYT9zgwEXCUhaO98y9kPyKwHnT=KXSr8O=knfW8w@mail.gmail.com> <CAPvvaa+SNPY+Ait2c8w9GPT-QfP7LEiuU6ejrokba93k60DdVg@mail.gmail.com> <CABkgnnW6KFuJhswLK97LE6J=9vqkf-cmeRMZOuz516ZryeSRQw@mail.gmail.com> <CAPvvaa+wid8y2h0g2040V8bSr50+rQRzpg-tCTK9EUFmtJrZYw@mail.gmail.com> <55361B07.3010707@ericsson.com> <CAPvvaaK-OxXk4=igyqix-XdubRhq+OafYvaTsJhNsbi4KHXJpw@mail.gmail.com> <553627F7.6010407@alvestrand.no> <CAPvvaaLZXH1bFeAVPD=gHUB8egJcemKcCLhtnZrCW3DrdMA9UA@mail.gmail.com> <B3EC2C3A-3DF1-4AA3-96FC-0C24B5FACDCE@csperkins.org> <CAPvvaaK+BoLVtK9XKKR4VWkrTw=TsZwd282ZO+RC8y-JeEOvLQ@mail.gmail.com> <8FC332B1-653F-423B-8B37-CD5574BF9A85@csperkins.org> <CAPvvaaKZ5OkB+kVqiX4iTZ+TnUotTK-MWah8W+goQW9DPVT+dg@mail.gmail.com>
To: Emil Ivov <emcho@jitsi.org>
X-Mailer: Apple Mail (2.1878.6)
X-BlackCat-Spam-Score: -28
X-Mythic-Debug: Threshold = On =
Archived-At: <http://mailarchive.ietf.org/arch/msg/rtcweb/kroUldSNGRC1GeN-MmslzEbYIUk>
Cc: "rtcweb@ietf.org" <rtcweb@ietf.org>
Subject: Re: [rtcweb] Endpoints that don't support RTCP
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb/>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Apr 2015 11:01:57 -0000

Emil,

On 23 Apr 2015, at 10:38, Emil Ivov <emcho@jitsi.org> wrote:
> On Thu, Apr 23, 2015 at 10:46 AM, Colin Perkins <csp@csperkins.org> wrote:
>> Emil,
>> 
>> I have repeatedly presented evidence,
> 
> You inadvertently forgot to paste the link to these presentations. I
> am particularly interested in the "real-world networks" ones.

They're in the IETF proceedings, for example AVTCORE at IETF 87 and 88:
http://www.ietf.org/proceedings/87/slides/slides-87-avtcore-2.pdf
http://www.ietf.org/proceedings/88/slides/slides-88-avtcore-4.pdf

I had assumed you were at the meetings and saw the presentations, but perhaps not.

>> including measurements on real-world
>> networks and
> 
> The one that I've seen is this:
> http://csperkins.org/publications/2013/12/singh2013circuitbreaker.pdf
> 
> It discusses a testbed evaluation. That's certainly a useful first
> step for a proof of concept sanity check but it is hardly more than
> that.

You'll also note that it evaluates the circuit breaker on several thousand packet traces taken over the public Internet, to residential users in the UK and Finland. It is, of course, always possible to do more measurements, and in different scenarios, but to say that this hasn't been tested on real networks is false.

>> simulations,
> 
> Simulations are handy to evaluate very specific features of CBs in
> very specific scenarios.
> 
> What we are discussing here is mandating mechanisms that have an
> impact in a huge variety of networks.
> 
>> to show that the proposal works. Varun and Zahed
>> have also done tests and presented their results at IETF.
> 
> Here too you forgot to paste the link. I am sure you wanted to be
> helpful and this was not intentional, so could you please send them
> over?
> 
> A quick google search with the names at site:ietf.org does not
> immediately yield pointers to measurements on real-world networks.

See above. 

>> You claim the circuit breaker doesn't work in some environments. I'm asking for details, so we can try to evaluate it in similar cases. That doesn't seem unreasonable.
> 
> I am claiming that we don't have sufficient evidence that they work
> and am concerned that they would trigger in situations where common
> sense dictates they shouldn't.

If you have specific scenarios where you want more evidence, that haven't been tested, then you need to explain those scenarios. 

> Now, I understand that our attitude is "we just need a backup plan on
> paper because in practice everyone is going to have some sort of
> congestion control anyway" and as such having circuit breakers lets us
> sort of pretend we did our job. I am fine with this. Let's just try
> not to forget it and treat CBs as rules set in stone (which is why I
> made the commented that started this discussion).

Given the number of caveats and the flexibility in the circuit breaker, it can hardly be claimed to be "rules set in stone". It's a tool, needed to protect the network, that if designed properly will rarely be triggered, since it's protecting against sustained overload only.

Colin





> Emil
> 
> 
> 
>> Colin
>> 
>> 
>> 
>> On 23 Apr 2015, at 06:31, Emil Ivov <emcho@jitsi.org> wrote:
>> 
>> Colin,
>> 
>> Is it really that hard to see that the burden of providing performence
>> evidence lies with the people advocating a solution?
>> 
>> Please show me the data from all the real world deployments where you
>> evaluated your mechanism and showed that it performed reasonably well!
>> 
>> Emil
>> 
>> On Thursday, April 23, 2015, Colin Perkins <csp@csperkins.org> wrote:
>>> 
>>> On 21 Apr 2015, at 11:53, Emil Ivov <emcho@jitsi.org> wrote:
>>> 
>>> Hey Harald,
>>> 
>>> On Tuesday, April 21, 2015, Harald Alvestrand <harald@alvestrand.no>
>>> wrote:
>>>> 
>>>> Den 21. april 2015 12:10, skrev Emil Ivov:
>>>>> On Tue, Apr 21, 2015 at 12:40 PM, Magnus Westerlund
>>>>> <magnus.westerlund@ericsson.com> wrote:
>>>>>> Emil Ivov skrev den 2015-03-30 23:00:
>>>>> So as I've mentioned before, I can see circuit breakers as an useful
>>>>> recommendation for some applications but they are definitely redundant
>>>>> in the context of WebRTC.
>>>> 
>>>> The purpose of circuit breakers is not to save the users from themselves.
>>>> 
>>>> It is to save the network from the users - to make sure that if WebRTC
>>>> users cause persistent congestion in the network, that congestion will
>>>> eventually go away.
>>> 
>>> 
>>> Sure, I completely understand the intention. I just think CBs are a very
>>> crude attempt of achieving it. Also somewhat redundant in the context of
>>> WebRTC.
>>> 
>>> I have repeatedly asked for data that shows how CBs are beneficial in
>>> large-scale diverse deployments and so far I haven't seen any (I have even
>>> been asked by Colin to provide data that they don't work ... which is quite
>>> absurd :) )
>>> 
>>> 
>>> The benefit is to the network, not to your application, of course.
>>> 
>>> And yes, I am looking for cases where the circuit breaker interferes with
>>> real applications, because I want to understand if the circuit breaker is
>>> being over-sensitive, or if the applications are being unreasonable.
>>> 
>>>> This is the same purpose as the AIMD algorithm in TCP (which is not
>>>> particularly beneficial for each individual user).
>>> 
>>> 
>>> Well ... it isn't really the same though is it. AIMD doesn't sadistically
>>> kill your connection at the first whiff of trouble ... :) ... it just MDs
>>> your bandwidth usage.
>>> 
>>> 
>>> If the circuit breaker is working correctly, it won't "kill your
>>> connection at the first whiff of trouble". It's designed to stop flows that
>>> cause long-term and persistent congestion.
>>> 
>>> You earlier said:
>>> 
>>> I am going to be *very* upset if my browser drops a call because of
>>> 10% packet loss. I regularly have calls in hotel networks with up to
>>> 20%+ regular packet loss and still enjoy productive conversations
>>> thanks to FEC and PLC.
>>> 
>>> 
>>> Give us some numbers: what packet size, data rate, and approximate RTT are
>>> being used for these calls with 10-20% packet loss, so we can evaluate if
>>> the circuit breaker will impact them?
>>> 
>>> 
>>> 
>>> --
>>> Colin Perkins
>>> https://csperkins.org/
>>> 
>>> 
>>> 
>>> 
>> 
>> 
>> --
>> --sent from my mobile
>> 
>> 
>> 
>> 
>> --
>> Colin Perkins
>> https://csperkins.org/
>> 
>> 
>> 
>> 
> 
> 
> 
> -- 
> https://jitsi.org



-- 
Colin Perkins
https://csperkins.org/