Re: [sip-overload] draft-ietf-soc-overload-control-02 and algorithmagility

<bruno.chatras@orange-ftgroup.com> Thu, 31 March 2011 06:01 UTC

Return-Path: <bruno.chatras@orange-ftgroup.com>
X-Original-To: sip-overload@core3.amsl.com
Delivered-To: sip-overload@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0406828C1F9 for <sip-overload@core3.amsl.com>; Wed, 30 Mar 2011 23:01:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.248
X-Spam-Level:
X-Spam-Status: No, score=-3.248 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HELO_EQ_FR=0.35, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6q+pR2xFjxEJ for <sip-overload@core3.amsl.com>; Wed, 30 Mar 2011 23:01:34 -0700 (PDT)
Received: from p-mail1.rd.francetelecom.com (p-mail1.rd.francetelecom.com [195.101.245.15]) by core3.amsl.com (Postfix) with ESMTP id E58803A69AC for <sip-overload@ietf.org>; Wed, 30 Mar 2011 23:01:32 -0700 (PDT)
Received: from p-mail1.rd.francetelecom.com (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 5CF0E8B8006; Thu, 31 Mar 2011 08:03:42 +0200 (CEST)
Received: from ftrdsmtp2.rd.francetelecom.fr (unknown [10.192.128.47]) by p-mail1.rd.francetelecom.com (Postfix) with ESMTP id 4F51F8B8001; Thu, 31 Mar 2011 08:03:42 +0200 (CEST)
Received: from ftrdmel0.rd.francetelecom.fr ([10.192.128.56]) by ftrdsmtp2.rd.francetelecom.fr with Microsoft SMTPSVC(6.0.3790.4675); Thu, 31 Mar 2011 08:03:10 +0200
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01CBEF69.4FCA6911"
Date: Thu, 31 Mar 2011 08:03:09 +0200
Message-ID: <9ECCF01B52E7AB408A7EB8535264214102B3B14E@ftrdmel0.rd.francetelecom.fr>
In-Reply-To: <OF4E3F614B.4B85F148-ON85257863.004A3401-85257863.004A3413@csc.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [sip-overload] draft-ietf-soc-overload-control-02 and algorithmagility
Thread-Index: Acvu3rBv/inirrcfRF6nlZjJD2HopQAiZwSg
References: <9AD888D2-CCED-4C4C-8F21-C3FA209538C3@acmepacket.com><OF946E5F01.21612200-ON85257862.0062BFFD-85257862.0062C02A@csc.com>, <77199F7F-CC15-4113-AAF6-11654FC5C76B@acmepacket.com> <OF4E3F614B.4B85F148-ON85257863.004A3401-85257863.004A3413@csc.com>
From: bruno.chatras@orange-ftgroup.com
To: jgunn6@csc.com, HKaplan@acmepacket.com
X-OriginalArrivalTime: 31 Mar 2011 06:03:10.0544 (UTC) FILETIME=[5025A500:01CBEF69]
Cc: sip-overload@ietf.org
Subject: Re: [sip-overload] draft-ietf-soc-overload-control-02 and algorithmagility
X-BeenThere: sip-overload@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: SIP Overload <sip-overload.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/sip-overload>, <mailto:sip-overload-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sip-overload>
List-Post: <mailto:sip-overload@ietf.org>
List-Help: <mailto:sip-overload-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sip-overload>, <mailto:sip-overload-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 06:01:40 -0000

My understanding is that Rate-based is more efficient for handling mass calling (e.g. televoting) but is a bit more complex to operate than Loss-based. Considering that for Televoting and similar services the filter-based solution (i.e. draft-soc-shen…)  is probably more appropriate anyway, I’m wondering whether Rate-based should really be the “mandatory default” for the feedback-based solution…

Bruno

 

De : sip-overload-bounces@ietf.org [mailto:sip-overload-bounces@ietf.org] De la part de Janet P Gunn
Envoyé : mercredi 30 mars 2011 15:30
À : Hadriel Kaplan
Cc : sip-overload@ietf.org
Objet : Re: [sip-overload] draft-ietf-soc-overload-control-02 and algorithmagility

 

That would be my preference (use Rate as the only mechanism).  But there was pushback from the supporters of "loss based", so my fallback position was "at least give the provider a way to use Rate based when the provider prefers it."

Janet

This is a PRIVATE message. If you are not the intended recipient, please delete without copying and kindly advise us by e-mail of the mistake in delivery. 
NOTE: Regardless of content, this e-mail shall not operate to bind CSC to any order or other contract unless pursuant to explicit written agreement or government initiative expressly permitting the use of e-mail for such purpose.

 

-----Hadriel Kaplan <HKaplan@acmepacket.com> wrote: -----

To: Janet P Gunn/USA/CSC@CSC
From: Hadriel Kaplan <HKaplan@acmepacket.com>
Date: 03/29/2011 06:50PM
cc: "sip-overload@ietf.org" <sip-overload@ietf.org>
Subject: Re: [sip-overload] draft-ietf-soc-overload-control-02 and algorithm agility

 

But that to me argues we shouldn't pick the loss-based one to begin with.

Either they're all effectively the same, or they're not.  As far as I know, the results of the design-team were they were the same, so the loss based one was picked just because it's the simplest to implement.  If a rate-based is instead more effective, even if it's just for "corner cases", then we should pick that one instead.

No?

 

-hadriel

 

 

On Mar 29, 2011, at 1:58 PM, Janet P Gunn wrote:





 

I was one of the people pushing hard for the use of a rate based algorithm, either as well as or instead of a percentage loss based algorithm.

 

See, for instance, http://www.ietf.org/mail-archive/web/sip-overload/current/msg00403.html

http://www.ietf.org/mail-archive/web/sip-overload/current/msg00411.html

 

I know I discussed this in much greater detail at some point- but I can't find the specific message. Maybe it is in the minutes of the interim

 

While both loss based and rate based algorithms work well in a simulated environment, driven by random processes, there are a number  of highly probable real world scenarios (e.g. highly localized source of overload, or rapidly varying overload) in which a loss based algorithm is either ineffective or unfair.

 

Evidence of the greater robusness, fairness, and effectiveness of rate-based network management controls is found in the circuit switched PSTN where "Call Gapping" (rate based) has made the percentage-dropped network management controls all but obsolete.

 

There are, of course, many differences between the PSTN and a SIP network.  But this particular case seems to be a place where we can, and should, learn from the lessons learned in the PSTN.

 

Janet

-----sip-overload-bounces@ietf.org wrote: -----

To: "sip-overload@ietf.org" <sip-overload@ietf.org>
From: Hadriel Kaplan <HKaplan@acmepacket.com>
Sent by: sip-overload-bounces@ietf.org
Date: 03/29/2011 12:09PM
Subject: [sip-overload] draft-ietf-soc-overload-control-02 and algorithm agility

Howdy,
in today's WG session the new oc-algo mechanism was described, and it was stated the WG had agreed to support multiple algorithms, with a pointer to this thread:
http://www.ietf.org/mail-archive/web/sip-overload/current/msg00436.html

I have read that thread, and there were actually few discussions about the need for multiple algorithms (most of it was about 100 response handling or how often algorithms would change, not the need for multiple algorithms).

2 people seemed to want to support multiple algorithms, but did not define what the "other" one would be.

So I'm going to try to argue for NOT doing this (at least not right now).  Here's why:

1) Every time we add something optional, interop issues happen.  The protocol gets more complicated, there's more to test, more to fail, etc.  ISTM that a overload control mechanism should be as simple as possible, with the greatest probability of success and interop.  For me, the bar would have to pretty darn high to add optionality - there would have to be a really good reason.

2) Currently, there is only one algorithm: loss.  Other algorithms were tested (rate and window), but since the results were effectively the same, it would seem rather foolish to add support for those other two.  So this would have to be a 4th, as yet unknown, algorithm.  That's fine, but we don't need to create a param or logic to handle unknown future algorithms *now*. Think about it - nothing prevents a future algorithm from adding this oc-algo param in a backwards-compatible manner.  Ergo, we don't need to do it now.  In fact, since we don't know the future algorithm(s), we have no idea if they could even use the other params we have.

3) Doing this is not as trivial as the draft currently has it.  You cannot just "negotiate" it by having *only* the client-side send the param again in the next request when it wants to re-negotiate it, because the client has no idea when its next-hop server has rebooted, or the next-hop server's had *its* config changed.  If that happens, the server would get a request form the client without the param, and thus think the client is using loss, even if they previously negotiated some new algo.  

4) When you're the server-side, you'll now have to keep a negotiated algorithm setting pre previous hop client.  For some server systems that's easy, but for some servers that's untenable - they don't keep state per previous hop client.  And I believe our charter requires us to support a model of unknown previous-hop clients.

-hadriel



_______________________________________________
sip-overload mailing list
sip-overload@ietf.org
https://www.ietf.org/mailman/listinfo/sip-overload