Re: [tcpm] New Version Notification for draft-kuehlewind-tcpm-ecn-fallback-00.txt

Michael Welzl <michawe@ifi.uio.no> Mon, 29 July 2013 12:15 UTC

Return-Path: <michawe@ifi.uio.no>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 76D2821F9E1A for <tcpm@ietfa.amsl.com>; Mon, 29 Jul 2013 05:15:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QIINmlXZSjDG for <tcpm@ietfa.amsl.com>; Mon, 29 Jul 2013 05:15:04 -0700 (PDT)
Received: from mail-out1.uio.no (mail-out1.uio.no [IPv6:2001:700:100:10::57]) by ietfa.amsl.com (Postfix) with ESMTP id EAE8A21F9E46 for <tcpm@ietf.org>; Mon, 29 Jul 2013 05:15:01 -0700 (PDT)
Received: from mail-mx4.uio.no ([129.240.10.45]) by mail-out1.uio.no with esmtp (Exim 4.75) (envelope-from <michawe@ifi.uio.no>) id 1V3mLr-00037x-NC; Mon, 29 Jul 2013 14:14:59 +0200
Received: from dhcp-9049.meeting.ietf.org ([130.129.8.73]) by mail-mx4.uio.no with esmtpsa (TLSv1:AES128-SHA:128) user michawe (Exim 4.80) (envelope-from <michawe@ifi.uio.no>) id 1V3mLr-0002vI-6k; Mon, 29 Jul 2013 14:14:59 +0200
Content-Type: text/plain; charset="windows-1252"
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
From: Michael Welzl <michawe@ifi.uio.no>
In-Reply-To: <D359AB72-8AC4-468A-9946-2AE0001A50CF@tik.ee.ethz.ch>
Date: Mon, 29 Jul 2013 14:14:58 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <718D8F34-8A8F-46A8-88F7-0E68B3F0DB1C@ifi.uio.no>
References: <20130703154032.15474.58799.idtracker@ietfa.amsl.com> <82B14E2A-C7B8-4899-8954-80C66BACFB76@tik.ee.ethz.ch> <012C3117EDDB3C4781FD802A8C27DD4F25C03F89@SACEXCMBX02-PRD.hq.netapp.com> <6AE1ADEB-CADA-4BC5-AE3B-75001296C635@tik.ee.ethz.ch> <012C3117EDDB3C4781FD802A8C27DD4F25C2C2ED@SACEXCMBX02-PRD.hq.netapp.com> <E84E1F28-5DA4-4D68-90E6-B248C76FAAE9@tik.ee.ethz.ch> <22D18C14-152E-4487-936E-121E95A63B4E@ifi.uio.no> <D359AB72-8AC4-468A-9946-2AE0001A50CF@tik.ee.ethz.ch>
To: Brian Trammell <trammell@tik.ee.ethz.ch>
X-Mailer: Apple Mail (2.1508)
X-UiO-SPF-Received:
X-UiO-Ratelimit-Test: rcpts/h 3 msgs/h 1 sum rcpts/h 7 sum msgs/h 2 total rcpts 6149 max rcpts/h 40 ratelimit 0
X-UiO-Spam-info: not spam, SpamAssassin (score=-5.0, required=5.0, autolearn=disabled, UIO_MAIL_IS_INTERNAL=-5, uiobl=NO, uiouri=NO)
X-UiO-Scanned: 286635C3D3E3838361C10A9761E6BB553ABA0C86
X-UiO-SPAM-Test: remote_host: 130.129.8.73 spam_score: -49 maxlevel 80 minaction 2 bait 0 mail/h: 1 total 67 max/h 10 blacklist 0 greylist 0 ratelimit 0
Cc: tcpm@ietf.org
Subject: Re: [tcpm] New Version Notification for draft-kuehlewind-tcpm-ecn-fallback-00.txt
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Jul 2013 12:15:15 -0000

Cutting, cutting… inline:


>> In case the probe packets are lost, it could be useful to have sent enough extra packets to be avoid an RTO (or at least reduce the risk for an RTO).
> 
> ...and requiring segments in the buffer would be a good way of doing this. We didn't want to get into buffer details, in on account of corner cases (in the timing of writes to the buffer) about which we didn't want to think about yet. But if we can ignore those, 

I think you can't avoid that anyway because of this:


>> I don't understand why the necessary information about the number of data that are available to send "is only available at the higher layer", can't TCP look into its send buffer to know how much it has available? Surely that must be possible?
> 
> Again, we didn't want to make assumptions about how applications write into the buffer, but yeah, requiring app changes at the API level is much, much worse. So good point, I think I'm convinced, at least, that an approach based on buffer occupancy is worth pursuing.

… seems like we agree now (wow, that was fast  :-)  ).


>> - step 6: "In this case, the sender may continue using ECN, because while it may not work for detecting congestion, the use of ECN does not negatively affect connectivity." => I'd rather not have it used if it's not working - if a router marks ECN to CE but the next downstream router clears the codepoint, we ignore congestion, and we'd like to avoid that, no?
> 
> The problem in this case is that we don't know if we have an ECN-aware middlebox that is clearing a CE from the end system, on the assumption that it is closer to the end-system than one would expect -- we did see some of this activity in the study detailed in the PAM paper. In this case the CE-clearing is arguably correct (or at least acceptable). 

I'm beginning to understand your point. It's about this sentence in the draft:
"If the ECE flag is not set on the ACK segment(s) sent by the
       receiver acknowledging the CE probe segments, the path may or may
       not be usable, as that there might be middleboxes/gateways that
       (arguably correctly) clear CE on segments from end hosts, because
       they assume that congestion can not have occurred up to this
       point on the path."

But here you're assuming that this is the only possible reason for a CE to be cleared, i.e. CE cannot be cleared by a middlebox for any other reason. It might well be that a middlebox makes a mistake when it clears CE…  well, but if that wasn't seen in any of the measurement studies (the IMC one and yours), I'm inclined to accept that it's okay to leave ECN on then.

Cheers,
Michael