Re: [tcpm] Seeking WG opinions on ACKing ACKs with good cause (was: Possible error in accurate-ecn)

Martin Duke <martin.h.duke@gmail.com> Fri, 12 March 2021 21:37 UTC

Return-Path: <martin.h.duke@gmail.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 01A033A1488 for <tcpm@ietfa.amsl.com>; Fri, 12 Mar 2021 13:37:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5IzPohskDZmS for <tcpm@ietfa.amsl.com>; Fri, 12 Mar 2021 13:37:22 -0800 (PST)
Received: from mail-io1-xd2b.google.com (mail-io1-xd2b.google.com [IPv6:2607:f8b0:4864:20::d2b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 78F463A1486 for <tcpm@ietf.org>; Fri, 12 Mar 2021 13:37:22 -0800 (PST)
Received: by mail-io1-xd2b.google.com with SMTP id 81so27267829iou.11 for <tcpm@ietf.org>; Fri, 12 Mar 2021 13:37:22 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Ci2b6ejI7YB7unJCApKqJC0FAvKSRSMCEEdtHUVzZqU=; b=HdrZJoiLqtqZxptvn++QdRnyI2Pe5Z6ZbSq8UPjbx0TbFXXtBrK+JetoXrUe7SQ5gz gs85l+KtaVZgetMdGrGtaalf+5amV+2LQpAGgdk/q3MoP1RkC3hQwcPJR3QyQULrnaUJ sBjMn07CNDYSatr2OMcGl0cW818nUAHNUQQ5E2AKVlZ36Ri+bUfqcrg20/fep06kU/Mn IV5K3uBJDYrBbKnlCvGzgoRFLHntN22hberhjk/z5gCO86S+0ihIRjEPjXzhLO1oF8yS QlYb78zVariU1VvdQcSaD9AsB5j/Bm/zta6NDKc8g9ECc+mUaDmyqZXlKD9W56woxrKJ LHkw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Ci2b6ejI7YB7unJCApKqJC0FAvKSRSMCEEdtHUVzZqU=; b=WU+igLrNKrLso2KNRMkuD+UGT0quNH1qSi/0P2qD+kKIRQbEZ+G8VRt7fc+FaMabzr TgfrkjVJ+BKJwAsKXgHJ+Ms8ELwOaVq6hqiFSSi6F9kCArLrFqQvb0iUj+jHwxJupyk4 bvkjdM+/w0/4T7/qAMfJ+SATbarl7pJnA0uV5XfNoXwbOUat0FQPvfwDnsYxS1i6VFM3 Uk5/3Ck4JA1TmLEIONmwHg4EnmGVUPruUPuDcuioA5Oj5fBUc2B8lTw5Q98Wxb7WOFmp +3oXuNKeVVN1xvqXaiLXT1EvIF58aaHuaQaeTV1JIjkYgLP79l/an/YQ4B0lCgq3gAyy tO+Q==
X-Gm-Message-State: AOAM531yxZ/l3dXngVGyDyPd1bE6mepeB1qnvuL93YZDakQfhNt3I5+O Iuf0UbtXqnri/aH0kqhXLO/cktayuykmiYBk7Bk=
X-Google-Smtp-Source: ABdhPJxgmWByWQg9xcFCzhE1foUx+Gj9Yc24BoDE9WhHTEyj59xSqeLrNSD2cAbsy9zFIv+zRJkJcROF5Qvu4BYnS0k=
X-Received: by 2002:a5d:818f:: with SMTP id u15mr864252ion.95.1615585040889; Fri, 12 Mar 2021 13:37:20 -0800 (PST)
MIME-Version: 1.0
References: <47df9b8b-515e-d40d-3473-599b0a3e3876@bobbriscoe.net> <6031BE2B-4D33-426F-BA17-DDF15CF821DE@kuehlewind.net> <060c8bd8-d64b-3e46-7874-742e35e6d114@bobbriscoe.net> <221e58f3-ada0-c880-db72-d98af84fedb8@gmx.at> <bd6ab65d-ccd5-9fa9-58be-6d9fea4af870@bobbriscoe.net> <CAAK044QgF4pz5Wamnxkobthou5ac4_LBxh8=nBYWyOxQUtcW-Q@mail.gmail.com> <8151fdef-ae78-80f3-adfc-d40db878ac8e@gmx.at> <CAAK044RhdAYexcGRj_XDkdY_o6JqB0DDo1X0H2AeFkRcsb0i4A@mail.gmail.com> <48c5910d-5340-acd6-8fd9-fff1b7758310@bobbriscoe.net>
In-Reply-To: <48c5910d-5340-acd6-8fd9-fff1b7758310@bobbriscoe.net>
From: Martin Duke <martin.h.duke@gmail.com>
Date: Fri, 12 Mar 2021 13:37:10 -0800
Message-ID: <CAM4esxTiw7_es60DDK2E1wa3-c1nUD2W_Rf7Fhw5u0qJ0bFQpg@mail.gmail.com>
To: Bob Briscoe <ietf@bobbriscoe.net>
Cc: Yoshifumi Nishida <nsd.ietf@gmail.com>, tcpm IETF list <tcpm@ietf.org>, Mirja Kuehlewind <ietf@kuehlewind.net>, Yoshifumi Nishada <nishida@sfc.wide.ad.jp>
Content-Type: multipart/alternative; boundary="000000000000777bb905bd5db435"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/QvjcC8Iy92Q33rQyL1YPHWuE9kE>
Subject: Re: [tcpm] Seeking WG opinions on ACKing ACKs with good cause (was: Possible error in accurate-ecn)
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Mar 2021 21:37:25 -0000

Hi Bob,

Although I don't think the difference between these alternatives is all
that large, I believe I would go with (B) -- allow acks of acks at a rate
less than 100%. I suppose that in some corner cases it will prevent drops
out of a shallow queue, which isn't a big deal, but why not do it? To me,
the real complexity here is marking ACKs in the first place, which forces
you to do a bit of accounting about the number of acks you've sent.

It would be good to also add language to extend the RFC5681 definition of
"Duplicate ACK"

"

 DUPLICATE ACKNOWLEDGMENT: An acknowledgment is considered a
      "duplicate" in the following algorithms when (a) the receiver of
      the ACK has outstanding data, (b) the incoming acknowledgment
      carries no data, (c) the SYN and FIN bits are both off, (d) the
      acknowledgment number is equal to the greatest acknowledgment
      received on the given connection (TCP.UNA from [RFC793
<https://www.rfc-editor.org/rfc/rfc793>]) and (e)
      the advertised window in the incoming acknowledgment equals the
      advertised window in the last incoming acknowledgment.

      Alternatively, a TCP that utilizes selective acknowledgments
      (SACKs) [RFC2018, RFC2883
<https://www.rfc-editor.org/rfc/rfc2883>] can leverage the SACK
information to
      determine when an incoming ACK is a "duplicate" (e.g., if the ACK
      contains previously unknown SACK information).

"

to include "does not increase the ACE counter" as another criterion. Thus
TCP treats this as it would a pure window update, which is functionally
similar. This should solve any spurious retransmission issues.

On Fri, Mar 12, 2021 at 2:54 AM Bob Briscoe <ietf@bobbriscoe.net> wrote:

> Yoshi, tcpm list,
>
> As promised we set up a small design team on the single issue of
> occasionally ACKing pure ACKs if they carry new info (ECN marking at the IP
> layer). The design team has two solutions and everyone would be prepared to
> accept either, but preferences differ. So we're seeking wider opinions
> (more opinions obviously won't narrow the choices, but at least the WG can
> then make a decision informed by those who care).
>
> To understand the question, you can either read the email below. Or the 3
> slides for the tcpm meeting are briefer, and include pictures:
>
> https://datatracker.ietf.org/meeting/110/materials/slides-110-tcpm-draft-ietf-tcpm-accurate-ecn-00#page=6
>
> Here's the current draft text in question (see here for context
> https://tools.ietf.org/html/draft-ietf-tcpm-accurate-ecn-14#section-3.2.2.5
> ):
>
> 3.2.2.5.1 Data Receiver Safety Procedures   An AccECN Data Receiver:
>
>    o  SHOULD immediately send an ACK whenever a data packet marked CE
>       arrives after the previous packet was not CE.
>
>    o  MUST immediately send an ACK once 'n' CE marks have arrived since
>       the previous ACK, where 'n' SHOULD be 2 and MUST be in the range 2
>       to 6 inclusive.
>
>
> Only the second bullet is in question. Here is the proposed diff for each
> alternative, then we explain:
>
> Alternative A
>
>    o  MUST immediately send an ACK once 'n' CE marks have arrived since
> -     the previous ACK,
> +     the previous ACK and there is outstanding data to acknowledge,
>       where 'n' SHOULD be 2 and MUST be in the range 2 to 6 inclusive.
>
>
> Alternative B
>
>    o  MUST immediately send an ACK once 'n' CE marks have arrived since
> -     the previous ACK, where 'n' SHOULD be 2 and MUST be in the range 2
> +     the previous ACK, where 'n' SHOULD be 3 and MUST be in the range 3
>       to 6 inclusive.
>
>
> Extra guidance text would be required in each case too (see the end).
>
> Background:
> AccECN is a change to the TCP wire protocol that requires the packet count
> of congestion feedback to include any congestion experienced (CE) arriving
> on Pure ACKs (amongst other things). AccECN doesn't require Pure ACKs to be
> ECN-capable, but allows for them to be. Similarly, AccECN doesn't require
> any congestion response to CE on pure ACKs, but having the feedback
> information there allows a response to be added with a one-ended update, if
> desired/necessary. Basically the data receiver is a 'dumb reflector'.
>
> The above two bullets were designed to ensure that an ACK is triggered a)
> on the first sign of congestion, and b) frequently enough for the count of
> CE markings to be fed back using the 3-bit ACE field before it wraps, even
> if an occasional pure ACK is lost.
>
> We then realized that the wording could require an ACK to be triggered in
> response to a CE-marked pure ACK. The circumstance when this could occur
> would be when peer X sends a volley of data to Y then stops, and the path
> back from Y to X is congested (probably by other flow(s) so that many of
> the ACKs are CE-marked. The second bullet above under alternative (B) would
> require X to ACK every 'n-th' CE-marked pure ACK. However, if Y immediately
> started sending a volley of data to X, Y could misinterpret those ACKs (of
> ACKs) from X as DupACKs.
>
> There are two ways to deal with this:
> A) Some of us prefer to completely prevent ACKs on pure ACKs, on the basis
> that they do not want to risk sometimes generating more ACKs today
> B) Others want to ensure that these rules will cause pure ACKs to be ACKed
> when the amount of CE on the ACKs merits it. But sparingly and strongly
> damping any ACK ping-pong.
>
> There are complexity arguments on both sides.
>
> B more complex:
>     extra (non-mandatory) 'if' condition for lack of SACK options on a
> pure ACK (to decide it's not a DupACK).
> B less complex:
>     consistent handling of CE marking whether on pure ACKs or data (which
> would probably remove an 'if' condition).
>
> A more complex:
>     CE markings on a string of pure ACKs can build up without feeding them
> back, until released by a data packet (if ever).
>     More code at the other end to deal with the resulting risk of many
> wraps of the ACE field (or ignore?).
> A less complex:
>     less different from current TCP.
>
> Extra guidance text would be necessary in either case.
>
> * Alt A) would need text on handling the risk of many ACE wraps
>     (to be written).
>
> * Alt B) would need something like the following changes:
>
>     For the avoidance of doubt, the above change-triggered ACK mechanism
>     is deliberately worded to solely apply to data packets, and to ignore
>     the arrival of a control packet with no payload, because it is
> -  important that TCP does not acknowledge pure ACKs.  The change-
> +  important that TCP does not acknowledge pure ACKs which convey no new
> +  state information to the sender. The change-
>     triggered ACK approach can lead to some additional ACKs but it feeds
>     back the timing and the order in which ECN marks are received with
>     minimal additional complexity.  If only CE marks are infrequent, or
>     there are multiple marks in a row, the additional load will be low.
>     Other marking patterns could increase the load significantly.
> +
> +  Providing feedback on the congestion state of the return channel
> +  after a sender has ceased transmitting more data helps inform the
> +  clients TCP congestion controller about the state of the return path.
> +  Should the role of data sender and receiver subsequently change, the
> +  new sender has more up to date knowledge of the network state,
> +  preventing transmissions of inappropriate size at that moment.
>
>     Even though the first bullet is stated as a "SHOULD", it is important
>     for a transition to immediately trigger an ACK if at all possible, so
>     that the Data Sender can rely on change-triggered ACKs to detect
>     queue growth as soon as possible, e.g. at the start of a flow.  This
>     requirement can only be relaxed if certain offload hardware needed
>     for high performance cannot support change-triggered ACKs (although
>     high performance protocols such as DCTCP already successfully use
>     change-triggered ACKs).  One possible compromise would be for the
>     receiver to heuristically detect whether the sender is in slow-start,
>     then to implement change-triggered ACKs while the sender is in slow-
>     start, and offload otherwise.
>
> +   The second bullet creates a possible case where an AccECN
> implementation
> +   could sometimes ACK pure ACKs, which in turn might be mistaken for
> +   duplicate ACKs (in scenarios where TCP peers take turns to send
> +   sets of data packets). To prevent spurious transmissions in such
> +   circumstances, if SACK has been negotiated, an implementation could
> +   optionally assume that an ACK is not a Duplicate ACK if it has no SACK
> option,
> +   which would indicate it was an ACK of an  ACK. Alternatively it could
> use
> +   timestamp options to rule out DupACKs.
>
>
>
>
> Bob
>
> --
> ________________________________________________________________
> Bob Briscoe                               http://bobbriscoe.net/
>
> _______________________________________________
> tcpm mailing list
> tcpm@ietf.org
> https://www.ietf.org/mailman/listinfo/tcpm
>