Re: [tcpm] initcwnd updates?
Mark Allman <mallman@icir.org> Mon, 18 March 2024 23:05 UTC
Return-Path: <mallman@icsi.berkeley.edu>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 80226C151989 for <tcpm@ietfa.amsl.com>; Mon, 18 Mar 2024 16:05:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.647
X-Spam-Level:
X-Spam-Status: No, score=-1.647 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_TEMPERROR=0.01] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MwyJxoJekiUy for <tcpm@ietfa.amsl.com>; Mon, 18 Mar 2024 16:05:38 -0700 (PDT)
Received: from mail-oa1-f50.google.com (mail-oa1-f50.google.com [209.85.160.50]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E4582C151717 for <tcpm@ietf.org>; Mon, 18 Mar 2024 16:05:32 -0700 (PDT)
Received: by mail-oa1-f50.google.com with SMTP id 586e51a60fabf-221830f6643so2618003fac.2 for <tcpm@ietf.org>; Mon, 18 Mar 2024 16:05:32 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1710803131; x=1711407931; h=mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=BAsYSEpjFUJtfgWsNhR42208oe85E2BU8Mwj3n3MBCA=; b=jMzFVFHWCoXsJMdoOSRWk0UfG1uBqtJe8QPJpPax5WZTPTx9EeXkTajpCty2OjvFsm td0NPHwg17VHef7ldyMrUT05oryugCNh3SMAKgqnLSpqHGkES1S3gtbllu9S2YOF4tki 7bzHCLR2aluobUXGVVJYJAaavIR2YJr8CZT5H1dnHajNzWCKpYrVKzW/n3CLJPXtApUi Ibs1ANxVhYV47xG9AA7styE+H7hnaDkP95u0oSR+L+v97HyjIk3vPy5hQFVUvvmrQnPm 3DTxDFSkBF2mf0PIdAOI1zF/rGRqUmRDZ8Hkr0WQbhzay4gdH02sWbRfDdtOnTLyzL7T 5VTg==
X-Forwarded-Encrypted: i=1; AJvYcCU1WUL2ojoOXRxFpSK7ts5kA7Xvkvses1rH2L0XsIweo2mTGMsb9OjcrS4rLXSMPJEhpk8zrFikfnRVXMDU
X-Gm-Message-State: AOJu0YzsiLMhB7CkHLaEML187L15C2EWD7TSEaCox6xO5yNwKucHFp9+ TN97bPvW86vXx8ddCuNSrZzaDJ3ghGneyDn98zg8+OKk0xYfNGCsQNRvHieWY5Y=
X-Google-Smtp-Source: AGHT+IFmscY7g7w/KH0hPiFLSiGX01b8CEEdbWam3Hbm6aZT2PaWLwFYyUClSCi7Bm4L/f4XpyKV7A==
X-Received: by 2002:a05:6870:4141:b0:221:c887:dc6b with SMTP id r1-20020a056870414100b00221c887dc6bmr1168320oad.6.1710803131649; Mon, 18 Mar 2024 16:05:31 -0700 (PDT)
Received: from [192.168.1.164] ([2600:1700:b380:3f00:9520:6145:bdc5:a53c]) by smtp.gmail.com with ESMTPSA id ny15-20020a056871750f00b002205bc51bfbsm2741314oac.14.2024.03.18.16.05.30 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Mon, 18 Mar 2024 16:05:30 -0700 (PDT)
From: Mark Allman <mallman@icir.org>
To: "Rodney W. Grimes" <ietf@gndrsh.dnsmgr.net>
Cc: Gorry Fairhurst <gorry@erg.abdn.ac.uk>, Joe Touch <touch@strayalpha.com>, "Kampanakis, Panos" <kpanos=40amazon.com@dmarc.ietf.org>, tcpm@ietf.org
Date: Mon, 18 Mar 2024 19:05:29 -0400
X-Mailer: MailMate (1.14r5937)
Message-ID: <8E67FBEF-A986-4165-AB20-EDF9F0DDF1B8@icir.org>
In-Reply-To: <202403182134.42ILY359009688@gndrsh.dnsmgr.net>
References: <202403182134.42ILY359009688@gndrsh.dnsmgr.net>
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/bK19qRWm9VxOH9_pVNGX6zHvzI8>
Subject: Re: [tcpm] initcwnd updates?
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Mar 2024 23:05:46 -0000
> if I am not mistaken there is already data that shows IW=10 and > unpaced easily leads to interesting microburst events in switches. I am OK with pacing larger windows. But, I will also say that an adaptive scheme covers the sort of situation you describe. I.e., it gives a way to adapt to a lower IW if IW=10 is causing lots of problems. > This is IW, if your losing a packet during the IW the network is > already in a bad state, do not make it worse by increasing the > amount of unacknowledged traffic to enter flight. Right. Agreed. But, we have to start somewhere (the IW). And, if we don't invent a better system then we're going to keep making the IW higher over time. That's how things work. And, the IW is going to sometimes be an issue---regardless of where we set it. Right now our process is someone proposes a higher IW, there is a little evidence gathered and then we decide either "it's in general OK" or "let's not increase it". And, we decide that for all hosts and connections and situations. The proposal is ... We know there is no ideal one-size-fits-all for IW across situations and contexts. So, why continue to pretend that we can pick such a number? Why don't we focus on something like the anticipated impact of starting a connection on the network? I.e., saying something like "if we use IW=X then we anticipate---based on previous experience---that the with probability 0.95 this IW will not lead to loss". > Rather than state this as a percentage perhaps > state it as any loss during IW MUST be acted upon. As far as I am aware nobody has ever said loss during the IW (or any W) would not be acted upon as congestion. Clearly when we directly observe congestion then we'll react to that in the standard manner. So, of course what you say is true. > (Note that 5% of 10 packets is only half a > packet, but I believe this number is being used over mutliple > IW's, so thats every other IW=10 experience loss, which would be a > poor situation.) No- not that at all. Both 9040 and what I said earlier involve a two stop process that doesn't measure the packet loss rate. (1) Does the connection experience any loss in the IW (could be 1 packet, could be all IW packets)? And, then (2) What percentage of connections have loss that sort of loss? So, say you have 100 connections (to make the math easy). And, say the IW is 10 packets. So, in total that is 1000 packets in the IWs of 100 connections. So, the 95% could be triggered by as few as 5 packet losses (1 loss in 5 connections) or as many as 50 packet losses (losing all 10 packets in 5 connections). So, your packet loss rate will range from 0.5% to 5%. So, this is not at all anything like one out of two connections. This is 1 out of 20 connections (5%). And, note, I didn't mean to suggest 95% was the right number. I think I specifically said this would be the decision point. I am not arguing for 95%. But, let's not confuse things that using this 95% would tolerate a loss in every second connection. allman
- [tcpm] initcwnd updates? Kampanakis, Panos
- Re: [tcpm] initcwnd updates? Neal Cardwell
- Re: [tcpm] initcwnd updates? touch@strayalpha.com
- Re: [tcpm] initcwnd updates? Mark Allman
- Re: [tcpm] initcwnd updates? Joe Touch
- Re: [tcpm] initcwnd updates? Gorry Fairhurst
- Re: [tcpm] initcwnd updates? Mark Allman
- Re: [tcpm] initcwnd updates? Gorry Fairhurst
- Re: [tcpm] initcwnd updates? Rodney W. Grimes
- Re: [tcpm] initcwnd updates? touch@strayalpha.com
- Re: [tcpm] initcwnd updates? Mark Allman