Re: [sip-overload] draft-ietf-soc-overload-control-02 and algorithm agility
Volker Hilt <volker.hilt@alcatel-lucent.com> Thu, 31 March 2011 09:07 UTC
Return-Path: <volker.hilt@alcatel-lucent.com>
X-Original-To: sip-overload@core3.amsl.com
Delivered-To: sip-overload@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id ED4FB28C1F0 for <sip-overload@core3.amsl.com>; Thu, 31 Mar 2011 02:07:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q3MYw2TpKIyP for <sip-overload@core3.amsl.com>; Thu, 31 Mar 2011 02:07:58 -0700 (PDT)
Received: from ihemail4.lucent.com (ihemail4.lucent.com [135.245.0.39]) by core3.amsl.com (Postfix) with ESMTP id A10BE28C1E9 for <sip-overload@ietf.org>; Thu, 31 Mar 2011 02:07:58 -0700 (PDT)
Received: from usnavsmail2.ndc.alcatel-lucent.com (usnavsmail2.ndc.alcatel-lucent.com [135.3.39.10]) by ihemail4.lucent.com (8.13.8/IER-o) with ESMTP id p2V99akQ000268 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for <sip-overload@ietf.org>; Thu, 31 Mar 2011 04:09:36 -0500 (CDT)
Received: from USNAVSXCHHUB01.ndc.alcatel-lucent.com (usnavsxchhub01.ndc.alcatel-lucent.com [135.3.39.110]) by usnavsmail2.ndc.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id p2V99aVU007868 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT) for <sip-overload@ietf.org>; Thu, 31 Mar 2011 04:09:36 -0500
Received: from [135.104.20.65] (135.3.63.242) by USNAVSXCHHUB01.ndc.alcatel-lucent.com (135.3.39.110) with Microsoft SMTP Server (TLS) id 8.3.106.1; Thu, 31 Mar 2011 04:09:34 -0500
Message-ID: <4D9444C3.6080103@alcatel-lucent.com>
Date: Thu, 31 Mar 2011 11:09:23 +0200
From: Volker Hilt <volker.hilt@alcatel-lucent.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: sip-overload@ietf.org
References: <9AD888D2-CCED-4C4C-8F21-C3FA209538C3@acmepacket.com> <OF946E5F01.21612200-ON85257862.0062BFFD-85257862.0062C02A@csc.com>
In-Reply-To: <OF946E5F01.21612200-ON85257862.0062BFFD-85257862.0062C02A@csc.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.39
X-Scanned-By: MIMEDefang 2.64 on 135.3.39.10
Subject: Re: [sip-overload] draft-ietf-soc-overload-control-02 and algorithm agility
X-BeenThere: sip-overload@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: SIP Overload <sip-overload.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/sip-overload>, <mailto:sip-overload-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sip-overload>
List-Post: <mailto:sip-overload@ietf.org>
List-Help: <mailto:sip-overload-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sip-overload>, <mailto:sip-overload-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 09:08:00 -0000
The SIP overload control design team had spent quite some time on comparing the different types of algorithms. A summary of the results of the simulations that were run was presented in SIPPING at IETF 74: http://www.ietf.org/proceedings/74/slides/sipping-11/sipping-11.htm These results indicate that there is little difference between the different types of algorithms. The design team had evaluated the algorithms under a range of conditions. Details are in the slides above. More inline. > While both loss based and rate based algorithms work well in a simulated > environment, driven by random processes, there are a number of highly > probable real world scenarios (e.g. highly localized source of overload, > or rapidly varying overload) in which a loss based algorithm is either > ineffective or unfair. Do you have pointers to results that show that the loss based algorithms is ineffective or unfair in a SIP network? It would be helpful to back these statements up with results otherwise we end up guessing what may or may not happen in a network. The design team has evaluated scenarios with rapidly changing load conditions and fairness among sources. The results are in the slides above. Both loss and rate-based mechanisms worked well in all the scenarios we have evaluated. > Evidence of the greater robusness, fairness, and effectiveness of > rate-based network management controls is found in the circuit switched > PSTN where "Call Gapping" (rate based) has made the percentage-dropped > network management controls all but obsolete. > There are, of course, many differences between the PSTN and a SIP > network. But this particular case seems to be a place where we can, and > should, learn from the lessons learned in the PSTN. Again, I'd like to see these claims backed up with results for a SIP server. The members of the design team did not find these evidences. Thanks, Volker > -----sip-overload-bounces@ietf.org wrote: ----- > > To: "sip-overload@ietf.org" <sip-overload@ietf.org> > From: Hadriel Kaplan <HKaplan@acmepacket.com> > Sent by: sip-overload-bounces@ietf.org > Date: 03/29/2011 12:09PM > Subject: [sip-overload] draft-ietf-soc-overload-control-02 and > algorithm agility > > Howdy, > in today's WG session the new oc-algo mechanism was described, and > it was stated the WG had agreed to support multiple algorithms, with > a pointer to this thread: > http://www.ietf.org/mail-archive/web/sip-overload/current/msg00436.html > > I have read that thread, and there were actually few discussions > about the need for multiple algorithms (most of it was about 100 > response handling or how often algorithms would change, not the need > for multiple algorithms). > > 2 people seemed to want to support multiple algorithms, but did not > define what the "other" one would be. > > So I'm going to try to argue for NOT doing this (at least not right > now). Here's why: > > 1) Every time we add something optional, interop issues happen. The > protocol gets more complicated, there's more to test, more to fail, > etc. ISTM that a overload control mechanism should be as simple as > possible, with the greatest probability of success and interop. For > me, the bar would have to pretty darn high to add optionality - > there would have to be a really good reason. > > 2) Currently, there is only one algorithm: loss. Other algorithms > were tested (rate and window), but since the results were > effectively the same, it would seem rather foolish to add support > for those other two. So this would have to be a 4th, as yet unknown, > algorithm. That's fine, but we don't need to create a param or logic > to handle unknown future algorithms *now*. Think about it - nothing > prevents a future algorithm from adding this oc-algo param in a > backwards-compatible manner. Ergo, we don't need to do it now. In > fact, since we don't know the future algorithm(s), we have no idea > if they could even use the other params we have. > > 3) Doing this is not as trivial as the draft currently has it. You > cannot just "negotiate" it by having *only* the client-side send the > param again in the next request when it wants to re-negotiate it, > because the client has no idea when its next-hop server has > rebooted, or the next-hop server's had *its* config changed. If that > happens, the server would get a request form the client without the > param, and thus think the client is using loss, even if they > previously negotiated some new algo. > > 4) When you're the server-side, you'll now have to keep a negotiated > algorithm setting pre previous hop client. For some server systems > that's easy, but for some servers that's untenable - they don't keep > state per previous hop client. And I believe our charter requires us > to support a model of unknown previous-hop clients. > > -hadriel > > > > _______________________________________________ > sip-overload mailing list > sip-overload@ietf.org > https://www.ietf.org/mailman/listinfo/sip-overload > >
- [sip-overload] draft-ietf-soc-overload-control-02… Hadriel Kaplan
- Re: [sip-overload] draft-ietf-soc-overload-contro… Janet P Gunn
- Re: [sip-overload] draft-ietf-soc-overload-contro… Hadriel Kaplan
- Re: [sip-overload] draft-ietf-soc-overload-contro… Janet P Gunn
- Re: [sip-overload] draft-ietf-soc-overload-contro… bruno.chatras
- Re: [sip-overload] draft-ietf-soc-overload-contro… Vijay K. Gurbani
- Re: [sip-overload] draft-ietf-soc-overload-contro… Vijay K. Gurbani
- Re: [sip-overload] draft-ietf-soc-overload-contro… Volker Hilt
- Re: [sip-overload] draft-ietf-soc-overload-contro… Volker Hilt
- Re: [sip-overload] draft-ietf-soc-overload-contro… Volker Hilt