Re: [sip-overload] A modest (and new) proposal on multiple algorithms for overload control

Volker Hilt <volker.hilt@alcatel-lucent.com> Wed, 13 July 2011 00:14 UTC

Return-Path: <volker.hilt@alcatel-lucent.com>
X-Original-To: sip-overload@ietfa.amsl.com
Delivered-To: sip-overload@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9416B21F8B75 for <sip-overload@ietfa.amsl.com>; Tue, 12 Jul 2011 17:14:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.195
X-Spam-Level:
X-Spam-Status: No, score=-6.195 tagged_above=-999 required=5 tests=[AWL=0.404, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QeLFBES5yWrY for <sip-overload@ietfa.amsl.com>; Tue, 12 Jul 2011 17:14:53 -0700 (PDT)
Received: from ihemail3.lucent.com (ihemail3.lucent.com [135.245.0.37]) by ietfa.amsl.com (Postfix) with ESMTP id 0068621F8B73 for <sip-overload@ietf.org>; Tue, 12 Jul 2011 17:14:52 -0700 (PDT)
Received: from usnavsmail4.ndc.alcatel-lucent.com (usnavsmail4.ndc.alcatel-lucent.com [135.3.39.12]) by ihemail3.lucent.com (8.13.8/IER-o) with ESMTP id p6D0EoS5028595 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 12 Jul 2011 19:14:50 -0500 (CDT)
Received: from USNAVSXCHHUB01.ndc.alcatel-lucent.com (usnavsxchhub01.ndc.alcatel-lucent.com [135.3.39.110]) by usnavsmail4.ndc.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id p6D0Eo7C021163 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Tue, 12 Jul 2011 19:14:50 -0500
Received: from [135.244.35.137] (135.3.63.242) by USNAVSXCHHUB01.ndc.alcatel-lucent.com (135.3.39.110) with Microsoft SMTP Server (TLS) id 8.3.106.1; Tue, 12 Jul 2011 19:14:50 -0500
Message-ID: <4E1CE376.4090204@alcatel-lucent.com>
Date: Tue, 12 Jul 2011 20:14:46 -0400
From: Volker Hilt <volker.hilt@alcatel-lucent.com>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:5.0) Gecko/20110624 Thunderbird/5.0
MIME-Version: 1.0
To: "phil.m.williams@bt.com" <phil.m.williams@bt.com>
References: <4E08FA57.7040807@bell-labs.com> <98176208-B87E-4D73-A84B-0E625132F4C9@acmepacket.com> <4E1C5366.6070306@alcatel-lucent.com> <E4B3F0DC6D953D4EBEC223BC86FE322C4A48C1B7C1@EMV04-UKBR.domain1.systemhost.net>
In-Reply-To: <E4B3F0DC6D953D4EBEC223BC86FE322C4A48C1B7C1@EMV04-UKBR.domain1.systemhost.net>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.37
X-Scanned-By: MIMEDefang 2.64 on 135.3.39.12
Cc: "sip-overload@ietf.org" <sip-overload@ietf.org>
Subject: Re: [sip-overload] A modest (and new) proposal on multiple algorithms for overload control
X-BeenThere: sip-overload@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: SIP Overload <sip-overload.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sip-overload>, <mailto:sip-overload-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sip-overload>
List-Post: <mailto:sip-overload@ietf.org>
List-Help: <mailto:sip-overload-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sip-overload>, <mailto:sip-overload-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Jul 2011 00:14:57 -0000

Phil,
>
> I pointed out in [1] that the server needs to determine the algorithm
> to be used, otherwise it has to use an overload control method that
> will support a mix of restriction algorithms on the client, which
> would be significantly more complex for the server than the client
> having to support two restriction algorithms (which I view as
> relatively straightforward to specify and implement).

For a server it is fairly easy to convert a loss value into a rate (or 
vice versa) if it has the data available that is needed for rate-based 
controls (current call rate, number of upstream neighbors,...).

> Because the
> draft spec does not specify the server algorithm, it gives the
> illusion that most complexity is in the client, whereas in reality it
> is most likely to be on the server.
>
With the current proposal it is possible to build a simple client and 
server with effective overload control and to go for a more complex 
mechanism depending on the targeted scenario and use case.

> In [2] I gave an example modification of the draft whereby the client
> algorithms are mandatory, which removes the complexity of the
> negotiation as well.
>
I believe it is fairly simple for client and server to agree. There are 
four cases:
- Client and Server support A and B.
   * Client sends AB to server.
   * Server responds with A or with B (e.g., depending on configuration).
- Client supports A and B. Server supports A.
   * Client sends AB to server
   * Server responds with A.
- Client supports A. Server supports A and B
   * Client sends A to server.
   * Server responds with A.
- Client supports A. Server supports A
   * same as above.

Thanks,

Volker (as individual)







> -----Original Message----- From: sip-overload-bounces@ietf.org
> [mailto:sip-overload-bounces@ietf.org] On Behalf Of Volker Hilt Sent:
> 12 July 2011 15:00 To: sip-overload@ietf.org Subject: Re:
> [sip-overload] A modest (and new) proposal on multiple algorithms for
> overload control
>
> Hadriel,
>
> the idea is to have a mandatory algorithm in the base draft and, at
> the same time, to leave the draft open for extensions to other
> algorithms. The second draft will then specify such an algorithm.
>
> That way RFC A is the common denominator supported by all devices
> and advanced devices can implement RFC A and B.
>
> Thanks,
>
> Volker (as individual)
>
>
>
>
>
> On 7/12/2011 9:09 AM, Hadriel Kaplan wrote:
>>
>> So in summary you're proposing to resolve the issue that having two
>> mechanisms is a bad idea, by specifying the two mechanisms in two
>> separate docs??
>>
>> OK, well if we have to have two ways of doing the same thing, then
>> I suggest we MANDATE BOTH, by putting them in the same document and
>> a "MUST implement both" written right in it. Otherwise, if you have
>> RFC A and RFC B, then some devices will do A and others B and there
>> won't be interop.
>>
>> -hadriel
>>
>>
>> On Jun 27, 2011, at 5:47 PM, Vijay K. Gurbani wrote:
>>
>>> Folks: I am trying to close the conversation on SIP overload
>>> control algorithms.
>>>
>>> To recap, we had a decision on making loss-based as the default
>>> mandatory-to-implement algorithm and had agreed to allow the
>>> choice of rate- and windows-based algorithms.
>>>
>>> This is what's currently reflected in the protocol draft [1].
>>>
>>> During the Prague IETF, it was suggested that we revisit this
>>> decision and use only one algorithm.  This suggestion lead to a
>>> subsequent thread [2] about which algorithm should be chosen ---
>>> loss-, rate- or windows-based one.
>>>
>>> I think we have to be realistic here in recognizing that the
>>> relative performance of all the algorithms is about the same. So
>>> therefore, if the relative performance is the same then there may
>>> be certain network deployments where the choice of one algorithm
>>> seems better than the other.
>>>
>>> Rate-based one will work well in managed networks where the set
>>> of upstream clients sending requests is bounded and rather
>>> static; this also makes it easier to apply capacity guarantees.
>>> Loss-based one works well where the set of upstream clients
>>> sending traffic is unbounded and frequently changing.
>>>
>>> The loss-based algorithm is less complex than the rate-based one
>>> or the windows-based one.
>>>
>>> Phil Williams has put out a proposal [3] to support all three
>>> algorithms simultaneously, thereby eliminating the need for
>>> protocol machinations to choose one.  However, issues still
>>> remain: first, this will force implementations to implement all
>>> of the algorithms, and this I believe is a heavy burden.
>>>
>>> Second, it does not eliminate the need or the desire to change
>>> algorithms mid stream, and finally, this decision forces an
>>> overloaded server to maintain considerable state as to which
>>> particular algorithm has been chosen with the paired upstream
>>> client.
>>>
>>> It seems that we are at an impasse.
>>>
>>> So, let me suggest another concrete proposal, which will help
>>> move the work forward expeditiously if all agree.
>>>
>>> I propose that draft-ietf-soc-overload-control continue as it is
>>> now with the following exception:
>>>
>>> 1) Take window class out of the mix, leaving rate and loss.  No
>>> one is explicitly championing the windows-based one; it could be
>>> added later if desired.
>>>
>>> 2) Invite Phil Williams, Eric Noel, or Janet Gunn to start
>>> working on a rate-based draft that uses the agreement mechanisms
>>> defined in draft-ietf-soc-overload-control and fleshes out how
>>> rate-based mechanism will function.
>>>
>>> 3) Move draft-ietf-soc-overload-control and the new draft in (2)
>>> as a bundle so that no one algorithm gets an undue advantage of
>>> being specified first.
>>>
>>> Note that (2) and (3) effectively mitigate Phil's concern that
>>> "proceeding with a single mandated algorithm would result in
>>> non-adoption of the other algorithms by suppliers and in effect
>>> the alternatives would become redundant."
>>>
>>> Personally I do not think that the market will favour a
>>> sub-optimal algorithm and if loss-based does not work I am sure
>>> it will be replaced in short order.  But I do empathize with the
>>> perceived advantage that loss-based one seems to benefit from if
>>> it is made the only mandatory-to-implement algorithm in [1].
>>> Therefore, (2) and (3) above should mitigate this particular
>>> concern.
>>>
>>> I suspect what will end up happening is that implementations
>>> geared to managed network providers will end up supporting both
>>> loss- and rate-based algorithms while other implementations can
>>> support only the loss-based one.
>>>
>>> Do folks think that this is an agreeable compromise?  It is no
>>> worse off than what we had agreed to before, and in fact it is
>>> much better since we have eliminated windows-based one and are
>>> moving loss-based and rate-based ahead at the same time.
>>>
>>> I do note that the chairs may have to re-negotiate the charter
>>> deliverables with the ADs, but modifying the charter or deciding
>>> to make the rate-based draft as an extension to the second
>>> deliverable ("2. A specification for an SIP overload control
>>> mechanism based on implicit/explicit feedback.") is a minor
>>> detail once everyone agrees to this proposal.
>>>
>>> Please comment.  Thank you.
>>>
>>> [1]
>>> http://tools.ietf.org/html/draft-ietf-soc-overload-control-02 [2]
>>> http://www.ietf.org/mail-archive/web/sip-overload/current/msg00616.html
>>>
>>>
[3] http://www.ietf.org/mail-archive/web/sip-overload/current/msg00629.html
>>>
>>> - vijay -- Vijay K. Gurbani, Bell Laboratories, Alcatel-Lucent
>>> 1960 Lucent Lane, Rm. 9C-533, Naperville, Illinois 60566 (USA)
>>> Email: vkg@{bell-labs.com,acm.org} /
>>> vijay.gurbani@alcatel-lucent.com Web:
>>> http://ect.bell-labs.com/who/vkg/
>>> _______________________________________________ sip-overload
>>> mailing list sip-overload@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sip-overload
>>
>> _______________________________________________ sip-overload
>> mailing list sip-overload@ietf.org
>> https://www.ietf.org/mailman/listinfo/sip-overload
> _______________________________________________ sip-overload mailing
> list sip-overload@ietf.org
> https://www.ietf.org/mailman/listinfo/sip-overload