Re: [sip-overload] draft-ietf-soc-overload-control-02 and algorithm agility

Volker Hilt <volker.hilt@alcatel-lucent.com> Thu, 31 March 2011 09:07 UTC

Return-Path: <volker.hilt@alcatel-lucent.com>
X-Original-To: sip-overload@core3.amsl.com
Delivered-To: sip-overload@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id ED4FB28C1F0 for <sip-overload@core3.amsl.com>; Thu, 31 Mar 2011 02:07:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q3MYw2TpKIyP for <sip-overload@core3.amsl.com>; Thu, 31 Mar 2011 02:07:58 -0700 (PDT)
Received: from ihemail4.lucent.com (ihemail4.lucent.com [135.245.0.39]) by core3.amsl.com (Postfix) with ESMTP id A10BE28C1E9 for <sip-overload@ietf.org>; Thu, 31 Mar 2011 02:07:58 -0700 (PDT)
Received: from usnavsmail2.ndc.alcatel-lucent.com (usnavsmail2.ndc.alcatel-lucent.com [135.3.39.10]) by ihemail4.lucent.com (8.13.8/IER-o) with ESMTP id p2V99akQ000268 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for <sip-overload@ietf.org>; Thu, 31 Mar 2011 04:09:36 -0500 (CDT)
Received: from USNAVSXCHHUB01.ndc.alcatel-lucent.com (usnavsxchhub01.ndc.alcatel-lucent.com [135.3.39.110]) by usnavsmail2.ndc.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id p2V99aVU007868 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT) for <sip-overload@ietf.org>; Thu, 31 Mar 2011 04:09:36 -0500
Received: from [135.104.20.65] (135.3.63.242) by USNAVSXCHHUB01.ndc.alcatel-lucent.com (135.3.39.110) with Microsoft SMTP Server (TLS) id 8.3.106.1; Thu, 31 Mar 2011 04:09:34 -0500
Message-ID: <4D9444C3.6080103@alcatel-lucent.com>
Date: Thu, 31 Mar 2011 11:09:23 +0200
From: Volker Hilt <volker.hilt@alcatel-lucent.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: sip-overload@ietf.org
References: <9AD888D2-CCED-4C4C-8F21-C3FA209538C3@acmepacket.com> <OF946E5F01.21612200-ON85257862.0062BFFD-85257862.0062C02A@csc.com>
In-Reply-To: <OF946E5F01.21612200-ON85257862.0062BFFD-85257862.0062C02A@csc.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.39
X-Scanned-By: MIMEDefang 2.64 on 135.3.39.10
Subject: Re: [sip-overload] draft-ietf-soc-overload-control-02 and algorithm agility
X-BeenThere: sip-overload@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: SIP Overload <sip-overload.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/sip-overload>, <mailto:sip-overload-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sip-overload>
List-Post: <mailto:sip-overload@ietf.org>
List-Help: <mailto:sip-overload-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sip-overload>, <mailto:sip-overload-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 09:08:00 -0000

The SIP overload control design team had spent quite some time on 
comparing the different types of algorithms. A summary of the results of 
the simulations that were run was presented in SIPPING at IETF 74:

http://www.ietf.org/proceedings/74/slides/sipping-11/sipping-11.htm

These results indicate that there is little difference between the 
different types of algorithms. The design team had evaluated the 
algorithms under a range of conditions. Details are in the slides above.

More inline.

> While both loss based and rate based algorithms work well in a simulated
> environment, driven by random processes, there are a number of highly
> probable real world scenarios (e.g. highly localized source of overload,
> or rapidly varying overload) in which a loss based algorithm is either
> ineffective or unfair.

Do you have pointers to results that show that the loss based algorithms 
is ineffective or unfair in a SIP network? It would be helpful to back 
these statements up with results otherwise we end up guessing what may 
or may not happen in a network.

The design team has evaluated scenarios with rapidly changing load 
conditions and fairness among sources. The results are in the slides 
above. Both loss and rate-based mechanisms worked well in all the 
scenarios we have evaluated.

> Evidence of the greater robusness, fairness, and effectiveness of
> rate-based network management controls is found in the circuit switched
> PSTN where "Call Gapping" (rate based) has made the percentage-dropped
> network management controls all but obsolete.
> There are, of course, many differences between the PSTN and a SIP
> network. But this particular case seems to be a place where we can, and
> should, learn from the lessons learned in the PSTN.

Again, I'd like to see these claims backed up with results for a SIP 
server. The members of the design team did not find these evidences.

Thanks,

Volker



> -----sip-overload-bounces@ietf.org wrote: -----
>
>     To: "sip-overload@ietf.org" <sip-overload@ietf.org>
>     From: Hadriel Kaplan <HKaplan@acmepacket.com>
>     Sent by: sip-overload-bounces@ietf.org
>     Date: 03/29/2011 12:09PM
>     Subject: [sip-overload] draft-ietf-soc-overload-control-02 and
>     algorithm agility
>
>     Howdy,
>     in today's WG session the new oc-algo mechanism was described, and
>     it was stated the WG had agreed to support multiple algorithms, with
>     a pointer to this thread:
>     http://www.ietf.org/mail-archive/web/sip-overload/current/msg00436.html
>
>     I have read that thread, and there were actually few discussions
>     about the need for multiple algorithms (most of it was about 100
>     response handling or how often algorithms would change, not the need
>     for multiple algorithms).
>
>     2 people seemed to want to support multiple algorithms, but did not
>     define what the "other" one would be.
>
>     So I'm going to try to argue for NOT doing this (at least not right
>     now). Here's why:
>
>     1) Every time we add something optional, interop issues happen. The
>     protocol gets more complicated, there's more to test, more to fail,
>     etc. ISTM that a overload control mechanism should be as simple as
>     possible, with the greatest probability of success and interop. For
>     me, the bar would have to pretty darn high to add optionality -
>     there would have to be a really good reason.
>
>     2) Currently, there is only one algorithm: loss. Other algorithms
>     were tested (rate and window), but since the results were
>     effectively the same, it would seem rather foolish to add support
>     for those other two. So this would have to be a 4th, as yet unknown,
>     algorithm. That's fine, but we don't need to create a param or logic
>     to handle unknown future algorithms *now*. Think about it - nothing
>     prevents a future algorithm from adding this oc-algo param in a
>     backwards-compatible manner. Ergo, we don't need to do it now. In
>     fact, since we don't know the future algorithm(s), we have no idea
>     if they could even use the other params we have.
>
>     3) Doing this is not as trivial as the draft currently has it. You
>     cannot just "negotiate" it by having *only* the client-side send the
>     param again in the next request when it wants to re-negotiate it,
>     because the client has no idea when its next-hop server has
>     rebooted, or the next-hop server's had *its* config changed. If that
>     happens, the server would get a request form the client without the
>     param, and thus think the client is using loss, even if they
>     previously negotiated some new algo.
>
>     4) When you're the server-side, you'll now have to keep a negotiated
>     algorithm setting pre previous hop client. For some server systems
>     that's easy, but for some servers that's untenable - they don't keep
>     state per previous hop client. And I believe our charter requires us
>     to support a model of unknown previous-hop clients.
>
>     -hadriel
>
>
>
>     _______________________________________________
>     sip-overload mailing list
>     sip-overload@ietf.org
>     https://www.ietf.org/mailman/listinfo/sip-overload
>
>