Re: [tcpm] Possible error in accurate-ecn

Bob Briscoe <research@bobbriscoe.net> Tue, 23 February 2021 00:12 UTC

Return-Path: <research@bobbriscoe.net>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 64B963A21D0 for <tcpm@ietfa.amsl.com>; Mon, 22 Feb 2021 16:12:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.433
X-Spam-Level:
X-Spam-Status: No, score=-1.433 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, SPF_SOFTFAIL=0.665, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=bobbriscoe.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WOC-drXROOBm for <tcpm@ietfa.amsl.com>; Mon, 22 Feb 2021 16:12:06 -0800 (PST)
Received: from mail-ssdrsserver2.hosting.co.uk (mail-ssdrsserver2.hosting.co.uk [185.185.84.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D7AD63A21CF for <tcpm@ietf.org>; Mon, 22 Feb 2021 16:12:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bobbriscoe.net; s=default; h=Content-Type:In-Reply-To:MIME-Version:Date: Message-ID:From:References:Cc:To:Subject:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=DK3ACIUfgv6F1ygJQ10SZqYes8azMBnGoIvtEymXGqo=; b=CGElCLOx5mVLvGmldfSbBvMph QFjVPByEl9fHbnX/wTpWVRuvafA1zMEOeaB6nVDiZV2alkBKVPBNTv04ng7TrfAAg/DxOhOCiZqWm +x/wReg8i5F77JfjRmyyqxH0sxpZwCaRArA6IJt0LXJ60ysQS0PNU8FVzWFBJjeT4pnTsLRroFSFS iTxy9gVBvBHMd+/Lyd7xd5IRrzDanzlCsb7x26KNiEquUDqpj4wP/zsmqSMi9SX7nGXhXBBwRAWu8 8AFxSS1nLLl/P0omENf7jFYa4H3PW6S8jm0VbD3x6SwuFVH8f1/O/73h46h0A4bZUloZDFUJPMXMQ c/DOGLZNw==;
Received: from 67.153.238.178.in-addr.arpa ([178.238.153.67]:56070 helo=[192.168.1.11]) by ssdrsserver2.hosting.co.uk with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.93) (envelope-from <research@bobbriscoe.net>) id 1lELJ3-0002sL-Bx; Tue, 23 Feb 2021 00:12:01 +0000
To: "Scheffenegger, Richard" <rs.ietf@gmx.at>, Mirja Kuehlewind <ietf@kuehlewind.net>
Cc: tcpm IETF list <tcpm@ietf.org>, Richard Scheffenegger <rscheff@gmx.at>, Yoshifumi Nishada <nishida@sfc.wide.ad.jp>
References: <47df9b8b-515e-d40d-3473-599b0a3e3876@bobbriscoe.net> <6031BE2B-4D33-426F-BA17-DDF15CF821DE@kuehlewind.net> <060c8bd8-d64b-3e46-7874-742e35e6d114@bobbriscoe.net> <221e58f3-ada0-c880-db72-d98af84fedb8@gmx.at>
From: Bob Briscoe <research@bobbriscoe.net>
Message-ID: <bd6ab65d-ccd5-9fa9-58be-6d9fea4af870@bobbriscoe.net>
Date: Tue, 23 Feb 2021 00:12:00 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <221e58f3-ada0-c880-db72-d98af84fedb8@gmx.at>
Content-Type: multipart/alternative; boundary="------------9AFC5D1F5DB8AC7C93F3708F"
Content-Language: en-GB
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - ssdrsserver2.hosting.co.uk
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: ssdrsserver2.hosting.co.uk: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: ssdrsserver2.hosting.co.uk: in@bobbriscoe.net
X-Source:
X-Source-Args:
X-Source-Dir:
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/IRl2L0D84ozjQyY9R9iVmGrcwp0>
Subject: Re: [tcpm] Possible error in accurate-ecn
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Feb 2021 00:12:08 -0000

Mirja, Richard, Yoshi,

I just posted a new rev of AccECN for a number of other reasons, and 
realized we hadn't converged on an answer to the tricky problem in this 
old thread from Nov'20. For now, the text says the following (which I've 
justified below, but I don't think it's the solution yet), and I've 
asked Richard & Mirja if we (as co-authors) can act as a little design 
team to thrash out this problem in the next few days.

3.2.2.5.1.  Data Receiver Safety Procedures

    An AccECN Data Receiver:

    o  SHOULD immediately send an ACK whenever a data packet marked CE
       arrives after the previous packet was not CE.

    o  MUST immediately send an ACK once 'n' CE marks have arrived since
       the previous ACK, where 'n' SHOULD be 2 and MUST be in the range 2
       to 6 inclusive.


Justification for first bullet: The aim is to trigger an ACK on a 
transition from non-CE to CE, but only when the latest packet is a data 
packet. Cases where the previous packet was a CE-marked pure ACK and 
therefore not ACK'd ought to be picked up by the 2nd bullet, not the 
first. Similarly, if there's CE-marked packets (data or pure ACKs) that 
haven't been ACKd yet, and the next data packet is not CE-marked, I 
think the first bullet is still correct, and the second rule will pick 
up cases with enough CE marks.

The second bullet is more tricky. I've added Richard's suggesting of 
flooring 'n' at 2. But made no other changes. That's deliberate, 'cos I 
think it's sufficient to allow ACK CC to be added, but not to preclude 
it. And I think the danger of being interpreted as DupACKs shouldn't 
apply if there's no outstanding data. I know I'm wrong in those odd 
cases I mentioned when new data might cross the ACKs in the other 
direction. But I don't think that's going to cause too much harm.

However, I'm probably very wrong. Somehow I feel we haven't got a good 
model to check all the possibilities.


Bob



On 17/11/2020 08:48, Scheffenegger, Richard wrote:
>
> See my suggestion; The critical requirement for the 2nd bullet point is,
> to have n > 1 for pure, CE-marked ACKs. The exponential decay, after how
> many ACKs triggered by CE-marked ACKs these ACK-for-ACK stop, strongly
> depends on "n", so the recommendation should be to use a higher value of
> n in the case where you only observe a stream of pure ACKs (with or
> without marks; only those marked would account against "n" though).
>
> In the case of data packets mixed in, you don't want to delay
> excessively, thus "n" may be choosen lower...
>
> Richard
>
>
>
> Am 10.11.2020 um 17:38 schrieb Bob Briscoe:
>>
>> Moving on to the second bullet...
>>>> The second bullet doesn't consider the possibility that the 'n'th CE
>>>> mark might arrive on a pure ACK. Then, the wording as it stands says
>>>> the Data Receiver MUST immediately ACK a pure ACK. I know TCP never
>>>> ACKs a pure ACK, but I'm not actually sure it does any harm to do so
>>>> in this case (it cannot cause an infinite loop of ACKs). However,
>>>> given it would be unorthodox, we maybe ought to rule it out by
>>>> rewording anyway?
>>> [MK] I think we also can leave this as it is because if that ’n’
>>> packet is a pure ACK that still means that you have unacked data
>>> packets with CE marks and you should trigger an ACK for those packet
>>> now (rather than waiting for the delayed ACK timer to expire). However
>>> this case is less important. Also we should probably make sure that
>>> this doesn’t apply if there are only pure ACKs with CE marks, maybe by
>>> add “if unacknowledged data are outstanding” or something.
>>
>> [BB] By the end of your last para you start to realize that, if the n'th
>> CE mark arrives on pure ACK, it doesn't say anything about whether the
>> previous (n-1) CE marks were on data or pure ACKs.
>>
>> Consider another common scenario; a server delivering chunks of video
>> over a high BDP path (e.g. 500 packets per RTT), and going idle between
>> times (perhaps in response to an "exceeded high watermark" data packet
>> from the server). Now consider the possibility that the reverse path
>> bottleneck builds a queue during each chunk, and starts CE marking
>> towards the end of each chunk. Then, after the server stops sending a
>> chunk, it continues to see a couple of hundred CE-marked pure ACKs
>> arriving.
>>
>> However, by your proposed rule, it doesn't send any feedback, 'cos it
>> has no data to acknowledge. So the client cannot regulate its ACK
>> stream. That's just tough, 'cos the client will stop sending more pure
>> ACKs after it has received the last data, which is before any later
>> feedback from the server can reach it.
>>
>> However, if the client later sends a data packet that the server can
>> acknowledge (e.g. "a low watermark" message), the server's ACE counter
>> will have wrapped dozens of times, and the client won't be able to work
>> out how many. That doesn't matter if a few round trips have elapsed -
>> the congestion info will have become stale. But it does matter if it's
>> fairly soon.
>>
>> Instead, if we keep the text of the second bullet... if the server's 'n'
>> was 2, it would send a pure ACK for every other pure ACK it received.
>> But, what if these pure ACKs from the server were also CE-marked? Then
>> the client would feed back pure ACKs using its 'n'. This regression
>> would eventually die out, but I don't like it.
>>
>> This conversation about the second bullet presumes AccECN is being used
>> for ACK congestion control. I'm not comfortable with writing anything
>> specific about ACK congestion control into a draft on the standards
>> track. But I don't want to preclude AccECN being used for ACK CC.
>>
>>
>> I believe the second bullet needs something changed to limit the ACKing
>> of pure ACKs. However, before we put effort into wordsmithing, I'd like
>> to hear whether you agree with the general idea of not defining what to
>> do for ACK CC, but not precluding it.
>>
>> Cheers
>>
>>
>>
>>
>> Bob
>>
>>>
>>> Mirja
>>>
>>>
>>>
>>>> Thoughts anyone?
>>>>
>>>>
>>>> Bob
>>>>
>>>> -- 
>>>> ________________________________________________________________
>>>> Bob Briscoe
>>>> http://bobbriscoe.net/
>>> _______________________________________________
>>> tcpm mailing list
>>> tcpm@ietf.org
>>> https://www.ietf.org/mailman/listinfo/tcpm
>>
>
> _______________________________________________
> tcpm mailing list
> tcpm@ietf.org
> https://www.ietf.org/mailman/listinfo/tcpm

-- 
________________________________________________________________
Bob Briscoe                               http://bobbriscoe.net/