Re: [tcpm] Re: draft-ietf-tcpm-ecnsyn-03.txt backwards compatibility
Bob Briscoe <rbriscoe@jungle.bt.co.uk> Wed, 09 January 2008 00:07 UTC
Return-path: <tcpm-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1JCOU6-0000nv-49; Tue, 08 Jan 2008 19:07:54 -0500
Received: from tcpm by megatron.ietf.org with local (Exim 4.43) id 1JCOU4-0000Rq-Gl for tcpm-confirm+ok@megatron.ietf.org; Tue, 08 Jan 2008 19:07:52 -0500
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1JCOU3-0000Ri-Lt for tcpm@ietf.org; Tue, 08 Jan 2008 19:07:51 -0500
Received: from smtp1.smtp.bt.com ([217.32.164.137]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1JCOU2-0002jn-LU for tcpm@ietf.org; Tue, 08 Jan 2008 19:07:51 -0500
Received: from i2kc08-ukbr.domain1.systemhost.net ([193.113.197.71]) by smtp1.smtp.bt.com with Microsoft SMTPSVC(6.0.3790.1830); Wed, 9 Jan 2008 00:07:47 +0000
Received: from cbibipnt08.iuser.iroot.adidom.com ([147.149.100.81]) by i2kc08-ukbr.domain1.systemhost.net with Microsoft SMTPSVC(6.0.3790.1830); Wed, 9 Jan 2008 00:07:47 +0000
Received: From bagheera.jungle.bt.co.uk ([132.146.168.158]) by cbibipnt08.iuser.iroot.adidom.com (WebShield SMTP v4.5 MR1a P0803.399); id 1199837266705; Wed, 9 Jan 2008 00:07:46 +0000
Received: from mut.jungle.bt.co.uk ([10.73.176.65]) by bagheera.jungle.bt.co.uk (8.13.5/8.12.8) with ESMTP id m09079NU032330; Wed, 9 Jan 2008 00:07:28 GMT
Message-Id: <200801090007.m09079NU032330@bagheera.jungle.bt.co.uk>
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Wed, 09 Jan 2008 00:06:47 +0000
To: Sally Floyd <sallyfloyd@mac.com>
From: Bob Briscoe <rbriscoe@jungle.bt.co.uk>
Subject: Re: [tcpm] Re: draft-ietf-tcpm-ecnsyn-03.txt backwards compatibility
In-Reply-To: <1bb51f3f2858e4828998faf9afb6a745@mac.com>
References: <9ee77c9bed4cf392d49f6aeff4774470@mac.com> <20080104140011.B80A7328DFE@lawyers.icir.org> <200801041804.m04I4O2L008832@bagheera.jungle.bt.co.uk> <d5e6611a4ea0c4c0c54718e4b6310bab@mac.com> <200801060012.m060Bc8e031128@bagheera.jungle.bt.co.uk> <1bb51f3f2858e4828998faf9afb6a745@mac.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
X-Spam-Score: -1.36 () ALL_TRUSTED
X-Scanned-By: MIMEDefang 2.56 on 132.146.168.158
X-OriginalArrivalTime: 09 Jan 2008 00:07:47.0213 (UTC) FILETIME=[AA3FCBD0:01C85253]
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 86f85b2f88b0d50615aed44a7f9e33c7
Cc: tcpm@ietf.org, Aleksandar Kuzmanovic <akuzma@northwestern.edu>, "K. K. Ramakrishnan" <kkrama@research.att.com>, Amit Mondal <a-mondal@northwestern.edu>, mallman@icir.org
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Errors-To: tcpm-bounces@ietf.org
Sally, I'll accept all your responses... Except, I probably didn't explain well why I didn't like: "This would not be a problem in an environment with mostly long-lived TCP connections..." This is ambiguous as to whether it means the competing flows are long lived or the ECN+ server's flows are long lived. The problem is short flows from the ECN+server. The problem hits both short and long competing flows. Bob At 05:21 08/01/2008, Sally Floyd wrote: >Bob - > >>The new text outlines the issues well (I've suggested some minor >>changes inline - all in the para below Fig 2). >> >>But I'm not a great fan of writing long complicated text in standards >>track documents that describes a problem, when it's sort of hinting >>that implementers don't actually need to do anything about it. One way >>round this would be to move this text about incremental deployment to >>an appendix. > >Yep, I will do that. >> >>Point (3) is a good one that I hadn't thought of. >> >>Here's strawman text for a solution that could be put in the body. >>I've used the terms 'TCP clients' and 'TCP servers' for machines used >>mostly as initiators or responders respectively: >> >>/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/ \/\ >>"There is a potential incremental deployment problem in circumstances >>we believe will be unlikely, described in (Appendix X). In monitoring >>the deployment of ECN and ECN+, if significant numbers of queues have >>ECN turned on and if we find that large numbers of TCP clients still >>have legacy ECN enabled while significant numbers of TCP servers have >>upgraded to ECN+, the management application described below could be >>deployed on ECN+ servers, particularly if most of the flows served fit >>within an initial window. >> >>The management application could monitor the average fraction of ACKs >>with ECE set in response to: >> 1. a SYN/ACK >> 2. the segments in the initial window. >>If the former fraction was significantly lower than the latter, the >>management application could switch ECN+ back to ECN, perhaps >>requiring manual intervention rather than automatic switching. >> >>Once the community deemed that the deployment situation had become >>safer for ECN+, server administrators could switch ECN+ back on, >>either leaving the managment application running, or eventually >>removing the management application. >> >>Therefore, all ECN+ TCP implementations SHOULD provide the following >>management interfaces, in order to ease installation of such a >>management application after the TCP has been upgraded to ECN+: >> o An interface to turn ECN+ on or off; >> o An interface to read a count of only those ACKs with ECE set >>that were responses to SYN/ACKs." >>/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/ \/\ >> >>I said this is strawman text, because I'm not sure I even support it >>myself. I'm just trying to work through the minimum implementers would >>need to do about incremental deployment other than 'nothing'. > >I am inclined to leave that out, for now. >Unless others have other opinions. > >But I did add a moderated version as follows: > >"The TCP implementation using ECN-Capable SYN/ACK packets SHOULD >include a management interface to allow the use of ECN to be turned >off for SYN/ACK packets. This is to deal with possible backwards >compatibility problems such as those discussed in Appendix B." > >>The alternative of doing absolutely nothing about incremental >>deployment right now is still possible. The above required management >>interfaces can be added by upgrading the kernel any time. I just >>figured the above might be worthwhile to ease installation of a little >>monitoring application, so at least sysadmins can simply test whether >>there is a problem if they choose to. >> >>[BTW, there are cases where the approach in (3) wouldn't work (e.g. if >>SYN/ACKs had a significantly lower probability of ECN marking than >>data packets). But I really don't think we should start down that >>rat-hole in this I-D - it would be like describing a pimple on a spot >>on a flea.] >> >>A little more inline... >> >>At 19:50 04/01/2008, Sally Floyd wrote: >>>Bob - >>> >>>... >>>>I've noted a general lack of concern/interest here about >>>>standardising a congestion control that doesn't respond to >>>>congestion in a set of circumstances that might happen or might not. >>>>I assume this is because of the glacial deployment of ECN so far. >>>> >>>>If the world turns out differently to the above assumptions, we will >>>>have to think of a plan B pretty snappish. >>>> >>>>But I'm not going to hold this up further, as ECN+ is generally a >>>>good idea, and the other alternatives for incremental deployment are >>>>cumbersome. >>> >>>I think it is safe not to use a flag for ECN-Capable SYN/ACK packets, >>>but I wouldn't have any problems with using a flag either. >>> >>>The revised text for draft-ietf-tcpm-ecnsyn is attached below. >>> >>>- Sally >>>http://www.icir.org/floyd/ >>> >>> >>> Backwards compatibility: >> >>\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/ \/ >> >>/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/ \/\ >> >>> Figure 2: SYN exchange with the SYN/ACK packet marked, >>> but with the ECN mark ignored by the TCP initiator. >>> >>> Thus, to be explicit, when a TCP connection includes an initiator >>> that supports ECN but *does not* support ECN-Capability for SYN/ACK >>> packets, in combination with a responder that *does* support ECN- >>> Capabililty for SYN/ACK packets, it is possible that the >>>ECN-Capable >>> SYN/ACK packets will be marked rather than dropped in the network, >>> and that the responder will not learn about the ECN mark on the >>> SYN/ACK packet. This would not be a problem >> >>s/ in a scenario with/ with machines serving / > >I changed "scenario" to "environment" > >>> mostly long-lived TCP connections, but it would be more problematic >> >>s/in a scenario where all /with an ECN+ TCP responder where most / > >I changed "scenario" to "environment" here also, and changed >"all" to "much". > >>>TCP connections consisted of >> >>at most > >I left it as it. If all TCP connections used an initial window of >one data packet, or had only one data packet to send, for example, >then ECN+ wouldn't have as large backwards compatibility problems. >(That is, the congestion control situation would be pretty bad with >or without backwards compatibility problems with ECN+.) > >>>four data >>> packets, and the TCP responder was ready to send its data packets >>> immediately after the SYN/ACK exchange. >> >>If correctly responding ECN-capable traffic shared a bottleneck with >>traffic from such an ECN+ machine, its rate would be continually >>beaten down by the ECN+ machine's reduced congestion response. > >Yep. > >>>Of course, with *severe* >>> congestion, the SYN/ACK packets would likely be dropped rather than >>> ECN-marked at the congested router, preventing the TCP responder >>>from >>> adding to the congestion by sending its initial window of four data >>> packets. >> >>/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/ \/\ > >- Sally >http://www.icir.org/floyd/ ____________________________________________________________________________ Bob Briscoe, <bob.briscoe@bt.com> Networks Research Centre, BT Research B54/77 Adastral Park,Martlesham Heath,Ipswich,IP5 3RE,UK. +44 1473 645196 _______________________________________________ tcpm mailing list tcpm@ietf.org https://www1.ietf.org/mailman/listinfo/tcpm
- [tcpm] Re: draft-ietf-tcpm-ecnsyn-03.txt backward… Bob Briscoe
- [tcpm] Re: draft-ietf-tcpm-ecnsyn-03.txt backward… Sally Floyd
- Re: [tcpm] Re: draft-ietf-tcpm-ecnsyn-03.txt back… Mark Allman
- Re: [tcpm] Re: draft-ietf-tcpm-ecnsyn-03.txt back… Bob Briscoe
- Fwd: Re: [tcpm] Re: draft-ietf-tcpm-ecnsyn-03.txt… Bob Briscoe
- Re: Fwd: Re: [tcpm] Re: draft-ietf-tcpm-ecnsyn-03… Mark Allman
- Re: [tcpm] Re: draft-ietf-tcpm-ecnsyn-03.txt back… Sally Floyd
- Re: [tcpm] Re: draft-ietf-tcpm-ecnsyn-03.txt back… Sally Floyd
- Re: [tcpm] Re: draft-ietf-tcpm-ecnsyn-03.txt back… Bob Briscoe
- Re: [tcpm] Re: draft-ietf-tcpm-ecnsyn-03.txt back… Sally Floyd
- Re: [tcpm] Re: draft-ietf-tcpm-ecnsyn-03.txt back… Bob Briscoe
- Re: [tcpm] Re: draft-ietf-tcpm-ecnsyn-03.txt back… Sally Floyd
- Re: [tcpm] Re: draft-ietf-tcpm-ecnsyn-03.txt back… Mark Allman
- Re: [tcpm] Re: draft-ietf-tcpm-ecnsyn-03.txt back… Sally Floyd