[tcpm] Review: draft-ietf-tcpm-fastopen-07 and sharding

Bob Briscoe <bob.briscoe@bt.com> Thu, 27 February 2014 15:32 UTC

Return-Path: <bob.briscoe@bt.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 911971A0310 for <tcpm@ietfa.amsl.com>; Thu, 27 Feb 2014 07:32:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.448
X-Spam-Level:
X-Spam-Status: No, score=-0.448 tagged_above=-999 required=5 tests=[BAYES_50=0.8, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-0.547, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ESCHpWFBrRiC for <tcpm@ietfa.amsl.com>; Thu, 27 Feb 2014 07:32:09 -0800 (PST)
Received: from hubrelay-by-03.bt.com (hubrelay-by-03.bt.com [62.7.242.139]) by ietfa.amsl.com (Postfix) with ESMTP id 95C441A0314 for <tcpm@ietf.org>; Thu, 27 Feb 2014 07:32:08 -0800 (PST)
Received: from EVMHR71-UKRD.domain1.systemhost.net (10.36.3.109) by EVMHR03-UKBR.bt.com (10.216.161.35) with Microsoft SMTP Server (TLS) id 8.3.327.1; Thu, 27 Feb 2014 15:32:05 +0000
Received: from EPHR01-UKIP.domain1.systemhost.net (147.149.196.177) by EVMHR71-UKRD.domain1.systemhost.net (10.36.3.109) with Microsoft SMTP Server (TLS) id 8.3.279.1; Thu, 27 Feb 2014 15:32:05 +0000
Received: from bagheera.jungle.bt.co.uk (132.146.168.158) by EPHR01-UKIP.domain1.systemhost.net (147.149.196.177) with Microsoft SMTP Server id 14.2.347.0; Thu, 27 Feb 2014 15:32:00 +0000
Received: from BTP075694.jungle.bt.co.uk ([10.109.157.111]) by bagheera.jungle.bt.co.uk (8.13.5/8.12.8) with ESMTP id s1RFVwG1026396; Thu, 27 Feb 2014 15:31:58 GMT
Message-ID: <201402271531.s1RFVwG1026396@bagheera.jungle.bt.co.uk>
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Thu, 27 Feb 2014 15:31:58 +0000
To: Yuchung Cheng <ycheng@google.com>
From: Bob Briscoe <bob.briscoe@bt.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
X-Scanned-By: MIMEDefang 2.56 on 132.146.168.158
Archived-At: http://mailarchive.ietf.org/arch/msg/tcpm/B-Jr42faZ5HbCN_cDab70A5E3nA
Cc: tcpm IETF list <tcpm@ietf.org>, draft-ietf-tcpm-fastopen@tools.ietf.org
Subject: [tcpm] Review: draft-ietf-tcpm-fastopen-07 and sharding
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Feb 2014 15:32:11 -0000

Yuchung & co-authors,

Thx for the new draft.
* The more specific text in "6.1 Duplicate Data in SYNs" is better, thx.
* I'm happy with the text about the initial congestion window too.

I don't want to hold up this draft any further. However, I would 
prefer the IESG to see the following text about cookie-in-FIN in the 
draft. It raises the concern about sharding, and provides a potential 
solution if it becomes a problem.

I've also added some nits, that could be dealt with at the same time.

4.2.1
OLD:
    An alternate proposal is to request cookie in FIN instead since FIN-
    drop by incompatible middle-box does not affect latency. However such
    paths are likely to drop SYN packet with data later, and many
    applications close the connections with RST instead, so the actual
    benefit of this approach is not clear.
SUGGESTED:
    An alternate proposal is to request a TFO cookie in the FIN instead,
    since FIN-drop by incompatible middle-boxes does not affect latency.
    However paths that block SYN cookies may be more likely to drop a
    later SYN packet with data, and many applications close a connection
    with RST instead anyway.

    Although cookie-in-FIN may not improve robustness, it would give
    clients using a single connection a latency advantage over clients
    opening multiple parallel connections. If experiments with TFO find
    that it leads to increased connection-sharding, cookie-in-FIN may prove
    to be a useful alternative.
REASONING:
* The previous dismissal of cookie in FIN said what these boxes were 
likely to do, but gave no evidence, so I've made it more circumspect.
* When I originally proposed cookie in FIN, I gave two reasons for 
it, but the main one seemed to get overlooked - the advantage that 
TFO in SYN gives to sharding clients.
* I also improved the English.

NITS
====

Section 4.2.2
OLD:
    6. Advance to the SYN-RCVD state. If the FastOpened flag is set, the
       server MUST follow the congestion control [RFC5681] to set the
       initial congestion window [RFC3390], to send more data packets.
SUGGESTED:
    6. Advance to the SYN-RCVD state. If the FastOpened flag is set, the
       server MUST follow RFC 5681 (based on RFC 3390) to set the
       initial congestion window for sending more data packets.

Section 6.3.3
s/idem-potency/idempotency/

Section 7.3
s/Further experimentation regarding the congestion control impact are useful./
  /Further experimentation regarding the congestion control impact 
will be useful./

Section 8.3
s/Therefore applications like Web may not receive the latency benefit as TFO./
  /Therefore the latency of applications such as Web may be worse 
than with TFO./


Bob


________________________________________________________________
Bob Briscoe,                                                  BT