[tcpm] Re: using SACK info for RTTM?

Yoshifumi Nishida <nsd.ietf@gmail.com> Wed, 05 June 2024 18:21 UTC

Return-Path: <nsd.ietf@gmail.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 29B55C169430 for <tcpm@ietfa.amsl.com>; Wed, 5 Jun 2024 11:21:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.094
X-Spam-Level:
X-Spam-Status: No, score=-2.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YpHam2kVULcp for <tcpm@ietfa.amsl.com>; Wed, 5 Jun 2024 11:21:23 -0700 (PDT)
Received: from mail-wr1-x42c.google.com (mail-wr1-x42c.google.com [IPv6:2a00:1450:4864:20::42c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 14BC4C151717 for <tcpm@ietf.org>; Wed, 5 Jun 2024 11:21:23 -0700 (PDT)
Received: by mail-wr1-x42c.google.com with SMTP id ffacd0b85a97d-35dceef429bso34603f8f.1 for <tcpm@ietf.org>; Wed, 05 Jun 2024 11:21:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1717611681; x=1718216481; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=ehE2wv7NOwJjLjuKx877a9JLGQXkTTc0mbDBgT2QoDU=; b=baoRkistaAtTWRWbNiJWYsqvC33j+2y8lFtp2Ltle5uDYnHVig5d6VZ+b4EN9AapxN jitxjiY111I6y2pL5RUf6+KIRxG6eDMBqhgTQL0umiw5GrgIgSqTQeQgUgdwauGfnDwV i6hFzIMdulsN0yziEtWLV9eMV3/iRSe5UsJsBU8zDKKyRbKdnKHrpfNbAQ+w6unjICmt q41mylC/g4xw6Fye4tVm/ASkB+v3hxeyA1hDxcXi/ZD8NRFRWz+Tc+fNm4BA7QYYo0mb gJ2oUuXAHylxY+wxb3DK54Fp1sqtT4eaghgTNh8fRRSCiw7E2uk/VUo6Hbg/hN01PCLv WYjg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1717611681; x=1718216481; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=ehE2wv7NOwJjLjuKx877a9JLGQXkTTc0mbDBgT2QoDU=; b=X8VGHS8HWselgFD2jJv7Yw5QmsYrcp02QqFGHXTUW30/YlFFz4rMzKFpjxupPbxahS lz5eNfOwkkfslAFDh+UsUZThp7DudXkErngtOnph4T6ENqTD+aTWmf4WVBR2drtTVb7u y2OxlrZzsf+MOYm9a7kwvN8YvJrrVOZsyPW/9/3VFZNugNeiYRNrKzowX1hOgG0ZR4z/ R4imqHbjNo9EFtXvc90cYn6uqJaA468heVJJgmUdFJKx5T+0SU71X6LeC2ptQTdb1uOM +NekL+E8XxwlqOyRQDS3tqtItKaED+siHGfdQ694RlUrNE//Hh0EOr9Dz0grcpWl9AbZ Or7g==
X-Forwarded-Encrypted: i=1; AJvYcCVkxN1e841LovVHqmx85rbFOYgXgIxYzNBTDX49aXn+VRHWZgCjoynUydZuUqY3l1XFm6p0yOzschcVKGIW
X-Gm-Message-State: AOJu0YwyLjw2NMxvo7h50XiHe/QnJedll//OHA0sgOX/KdeGDVIzsY9G kXl4XUsztN2BBTLlGVZGh4aSe3jHIpo6iz+ctTUBzdWKpndLs1nP9EHetMXKJn2uVM5LwoTnV4O X9skFnagGOE+vR0rUan4TsPA6uU0=
X-Google-Smtp-Source: AGHT+IEqgSbYNHaXobVAue+5qWHCQhk4YocRiRiQm9d8jnkxx6NQfJv56CiL29hrZjjtnekTNf9cZkWdqZqMjlDhfwY=
X-Received: by 2002:adf:ec01:0:b0:34c:fd92:3359 with SMTP id ffacd0b85a97d-35ef0d96fedmr418729f8f.21.1717611680640; Wed, 05 Jun 2024 11:21:20 -0700 (PDT)
MIME-Version: 1.0
References: <CAAK044QOLRucPZBzeTRBj=m83aXVsFq83zJQgmvYuVVwKTHzFA@mail.gmail.com> <CADVnQy=4Lqsbx_cMgK05ydrYNUbg-tiX8r3ZDmTkZVPTyCZJRg@mail.gmail.com> <CAAK044R5eA622EMPFu2p1hmA_tDHrYdCa5S+r6OSWzCKcsQmSw@mail.gmail.com> <CAK6E8=dcDfawq7z9mDTDQS3PjKyjZibUxvEygqZYvgR6_AHCUA@mail.gmail.com> <CAAK044Rj=BQz__SAqjPUqyFP_Q3Td35LKfxzNRMgNsJX0ES-=Q@mail.gmail.com> <CADVnQykv3JNBWX3xkxdyDVpD+ru9i+aGFygtaL9rtdee0H6_8Q@mail.gmail.com> <CAK6E8=e40CBEj2fcTtYR-aLBxNL5+b2a0D4uDUzJX=-qYwBe=Q@mail.gmail.com>
In-Reply-To: <CAK6E8=e40CBEj2fcTtYR-aLBxNL5+b2a0D4uDUzJX=-qYwBe=Q@mail.gmail.com>
From: Yoshifumi Nishida <nsd.ietf@gmail.com>
Date: Wed, 05 Jun 2024 11:21:09 -0700
Message-ID: <CAAK044Rgu32KVsq4FzqS4dFjL-ZdCt=aeAy3oF9zbLfmPVG28g@mail.gmail.com>
To: Yuchung Cheng <ycheng@google.com>
Content-Type: multipart/alternative; boundary="00000000000016361c061a28a22d"
Message-ID-Hash: VRWH6HI4CD4CL7BIPVE4XKEH7YAOHKV2
X-Message-ID-Hash: VRWH6HI4CD4CL7BIPVE4XKEH7YAOHKV2
X-MailFrom: nsd.ietf@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tcpm.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "tcpm@ietf.org Extensions" <tcpm@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [tcpm] Re: using SACK info for RTTM?
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/3HAmkh4Kn4nZ8MdyYlsWScpgXi4>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Owner: <mailto:tcpm-owner@ietf.org>
List-Post: <mailto:tcpm@ietf.org>
List-Subscribe: <mailto:tcpm-join@ietf.org>
List-Unsubscribe: <mailto:tcpm-leave@ietf.org>

Hi Yuchung, Neal, thank you so much. It’s interesting.

So, it might be a good time to revive
https://datatracker.ietf.org/doc/draft-yang-tcpm-ets/ ?

OTOH, I’m thinking why DSACK is not sufficient here.

Thanks,
—
Yoshi

On Wed, Jun 5, 2024 at 10:06 AM Yuchung Cheng <ycheng@google.com> wrote:

> Also TCP timestamp needs to really move to usec level for today's
> data-center networks, which Eric Dumazet finally upstreamed that feature
> (to opt-in). anything beyond 10us can't be used in Eifel
>
> On Wed, Jun 5, 2024 at 6:41 AM Neal Cardwell <ncardwell@google.com> wrote:
>
>> IMHO by far the biggest benefit of TCP timestamps is not in RTT
>> measurement or PAWS, but in using them for "Eifel" undo (a la RFC 3522, RFC
>> 4015): quickly detecting spurious loss detection events due to reordering,
>> and quickly undoing the spurious congestion control slow-down response.
>> This is important since reordering is increasingly common due to many
>> increasingly common network mechanisms: link-layer retransmissions for
>> wifi/cellular links, traffic engineering, multipathing and ECMP/WCMP
>> load-balancing, protective load balancing (SIGCOMM 2022), protective
>> reroute (SIGCOMM 2023), multi-queue NICs, etc. Those factors make the 12
>> bytes of TCP option space overwhelmingly worth it.
>>
>> best regards,
>> neal
>>
>>
>> On Wed, Jun 5, 2024 at 3:03 AM Yoshifumi Nishida <nsd.ietf@gmail.com>
>> wrote:
>>
>>> Hi Yuchung,
>>>
>>> Thanks for the explanation.
>>> I thought a bit about the trade-off between using 12 bytes options space
>>> and giving up measuring RTTs for retransmitted packets.
>>> But, I am included to prefer measuring RTTs for now.
>>>
>>> --
>>> Yoshi
>>>
>>> On Mon, Jun 3, 2024 at 1:57 PM Yuchung Cheng <ycheng@google.com> wrote:
>>>
>>>> hi Yoshifumi,
>>>>
>>>> Linux only uses TS-opts if needed to disambiguate on RTT samples
>>>> covering sequences that have been retransmitted. This applies to SACK or
>>>> non-SACK. In order words, if an S/ACK covers a sequence range that has
>>>> never been retransmitted, Linux does not use timestamp options.
>>>>
>>>> On Mon, Jun 3, 2024 at 1:29 PM Yoshifumi Nishida <nsd.ietf@gmail.com>
>>>> wrote:
>>>>
>>>>> Hi Neal, thank you so much for the comments.
>>>>>
>>>>> The linux algorithm you've described makes sense to me and it seems
>>>>> the scheme doesn't require timestamp options.
>>>>> However, as far as I've read linux code, it seems that linux still
>>>>> uses timestamp options for RTT measurement to some extent.
>>>>> I'm curious why linux is mixing two schemes for RTTM.
>>>>> --
>>>>> Yoshi
>>>>>
>>>>> On Mon, Jun 3, 2024 at 8:57 AM Neal Cardwell <ncardwell@google.com>
>>>>> wrote:
>>>>>
>>>>>>
>>>>>>
>>>>>> On Mon, Jun 3, 2024 at 11:02 AM Yoshifumi Nishida <nsd.ietf@gmail.com>
>>>>>> wrote:
>>>>>>
>>>>>>> Hi folks,
>>>>>>>
>>>>>>> While I was checking RFC7323, I found the following sentence.
>>>>>>>
>>>>>>> RTTM update processing explicitly excludes segments not updating
>>>>>>> SND.UNA.  The original text could be interpreted to allow taking
>>>>>>> RTT samples when SACK acknowledges some new, non-continuous
>>>>>>> data.
>>>>>>>
>>>>>>> I am a bit curious about the rationale of this sentence.
>>>>>>> It seems to me that we cannot measure RTT when we have a gap in packet sequence with this rule.
>>>>>>>
>>>>>>>
>>>>>> Yes, that rule forbids using RFC7323 timestamps for calculating RTT
>>>>>> samples for SACKed sequence ranges.
>>>>>>
>>>>>> The rationale: AFAIK this rule is a necessary consequence of the
>>>>>> conditions under which TS.Recent is updated.
>>>>>>
>>>>>> The rules for updating TS.Recent are in sec 4.3, "Which Timestamp to
>>>>>> Echo":
>>>>>>   https://datatracker.ietf.org/doc/html/rfc7323#section-4.3
>>>>>> Rule (2) in sec 4.3 says:
>>>>>>   If:
>>>>>>     SEG.TSval >= TS.Recent and SEG.SEQ <= Last.ACK.sent
>>>>>>   then SEG.TSval is copied to TS.Recent; otherwise, it is ignored.
>>>>>>
>>>>>> Since out-of-order sequence ranges that are SACKed will fail the
>>>>>> SEG.SEQ <= Last.ACK.sent check, SACKed sequence ranges will not update
>>>>>> TS.Recent. So using TS.Recent to calculate an RTT sample for a SACKed
>>>>>> sequence range could, in general, give a vastly overestimated RTT sample.
>>>>>> So that's why it's forbidden by the RFC.
>>>>>>
>>>>>> However, in practice usually this does not need to be a big deal. For
>>>>>> example, Linux TCP still obtains an RTT sample for every non-retransmitted
>>>>>> SACKed sequence range, by:
>>>>>>
>>>>>> (a) recording the transmit time of every sequence range
>>>>>> (b) recording whether that sequence range was retransmitted, and then
>>>>>> (c) using those two pieces of information when that sequence range is
>>>>>> cumulatively or selectively ACKed, to calculate an RTT sample (rtt_sample =
>>>>>> now - transmit_timestamp) if the sequence range was never retransmitted.
>>>>>>
>>>>>> So, in Linux TCP, SACKed sequence ranges fail to generate an RTT
>>>>>> sample only when they were previously retransmitted.
>>>>>>
>>>>>> best regards,
>>>>>> neal
>>>>>>
>>>>>>
>>>>>>> Thanks,
>>>>>>> --
>>>>>>> Yoshi
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> tcpm mailing list -- tcpm@ietf.org
>>>>>>> To unsubscribe send an email to tcpm-leave@ietf.org
>>>>>>>
>>>>>> _______________________________________________
>>>>> tcpm mailing list -- tcpm@ietf.org
>>>>> To unsubscribe send an email to tcpm-leave@ietf.org
>>>>>
>>>>