Re: [tcpm] New Version Notification for draft-kuehlewind-tcpm-ecn-fallback-00.txt

Brian Trammell <trammell@tik.ee.ethz.ch> Tue, 23 July 2013 16:20 UTC

Return-Path: <trammell@tik.ee.ethz.ch>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA3C811E82C2 for <tcpm@ietfa.amsl.com>; Tue, 23 Jul 2013 09:20:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.299
X-Spam-Level:
X-Spam-Status: No, score=-6.299 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, J_CHICKENPOX_33=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GjoPIahrWY4L for <tcpm@ietfa.amsl.com>; Tue, 23 Jul 2013 09:20:18 -0700 (PDT)
Received: from smtp.ee.ethz.ch (smtp.ee.ethz.ch [129.132.2.219]) by ietfa.amsl.com (Postfix) with ESMTP id D4EF511E80F9 for <tcpm@ietf.org>; Tue, 23 Jul 2013 09:20:17 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by smtp.ee.ethz.ch (Postfix) with ESMTP id 2EFF1D9308; Tue, 23 Jul 2013 18:20:16 +0200 (MEST)
X-Virus-Scanned: by amavisd-new on smtp.ee.ethz.ch
Received: from smtp.ee.ethz.ch ([127.0.0.1]) by localhost (.ee.ethz.ch [127.0.0.1]) (amavisd-new, port 10024) with LMTP id TH7lr8jYMzc6; Tue, 23 Jul 2013 18:20:15 +0200 (MEST)
Received: from pb-10243.ethz.ch (pb-10243.ethz.ch [82.130.102.152]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: briant) by smtp.ee.ethz.ch (Postfix) with ESMTPSA id E53E6D9305; Tue, 23 Jul 2013 18:20:15 +0200 (MEST)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
From: Brian Trammell <trammell@tik.ee.ethz.ch>
In-Reply-To: <012C3117EDDB3C4781FD802A8C27DD4F25C2C2ED@SACEXCMBX02-PRD.hq.netapp.com>
Date: Tue, 23 Jul 2013 18:20:15 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <E84E1F28-5DA4-4D68-90E6-B248C76FAAE9@tik.ee.ethz.ch>
References: <20130703154032.15474.58799.idtracker@ietfa.amsl.com> <82B14E2A-C7B8-4899-8954-80C66BACFB76@tik.ee.ethz.ch> <012C3117EDDB3C4781FD802A8C27DD4F25C03F89@SACEXCMBX02-PRD.hq.netapp.com> <6AE1ADEB-CADA-4BC5-AE3B-75001296C635@tik.ee.ethz.ch> <012C3117EDDB3C4781FD802A8C27DD4F25C2C2ED@SACEXCMBX02-PRD.hq.netapp.com>
To: "Scheffenegger, Richard" <rs@netapp.com>
X-Mailer: Apple Mail (2.1508)
Cc: "tcpm@ietf.org" <tcpm@ietf.org>
Subject: Re: [tcpm] New Version Notification for draft-kuehlewind-tcpm-ecn-fallback-00.txt
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Jul 2013 16:20:24 -0000

hi Richard, all,

On 22 Jul 2013, at 18:58 , "Scheffenegger, Richard" <rs@netapp.com> wrote:

> Hi Brian,
> 
>>> Including the optional ECN Nonce probing (4th segment with ECT1; 4th ACK
>> with NS=1) in the algorithm might be good...
>> 
>> Good suggestion; we were originally thinking of something a little more
>> elaborate, and I do think we need to think about this a bit more, though,
>> since an actual CE mark would obliterate the nonce. I know that's unlikely
>> _now_, but one of the goals of the work is making it less so. :)
> 
> 
> Indeed... You would want to send the ECT(1) first, and the artificial CEs afterwards; if there is an ACK,ECE for the segment with ECT(1), this would also prove the path is ECN-capable, right?

Yep. Would have to make sure we do the right thing if that one ECT(1) packet gets _legitimately_ lost though.

> But I'd like to listen to your elaborate scheme :)

It's basically a generalization of what we submitted (and which covers the case above): the general idea is to send J ECT codepoints (checking the nonce sum) followed by K CE codepoints, falling back any time a problem is detected (as described in the draft). We thought about various combinations before settling on (J,K) = (0,3) for this rev of the draft. This admittedly makes the assumption that middleboxes that would cause connectivity problems when seeing ECT would also do so on CE. On the other hand, we want to keep J+K as small as possible: the more data segments you're sending to probe, the more time you're not getting the full benefit of ECN-signaled CC. 

It seems (J,K) = (1,3) would work for testing nonce functionality, though. It's probably worth thinking a bit about other values, too.

Cheers,

Brian

>> -----Original Message-----
>> From: Brian Trammell [mailto:trammell@tik.ee.ethz.ch]
>> Sent: Montag, 22. Juli 2013 17:03
>> To: Scheffenegger, Richard
>> Cc: tcpm@ietf.org; Mirja Kuehlewind
>> Subject: Re: [tcpm] New Version Notification for draft-kuehlewind-tcpm-
>> ecn-fallback-00.txt
>> 
>> hi Richard,
>> 
>> Thanks for the comments! Inline...
>> 
>> On 16 Jul 2013, at 14:55 , "Scheffenegger, Richard" <rs@netapp.com> wrote:
>> 
>>> Brian, Mirja,
>>> 
>>> 
>>> Having read this draft (I think the rationale for not probing in the IW
>> is a good one, but perhaps a little more text in the draft would do good -
>> i.e. a short flow will be effectively non-reactive anyway, thus any ECN
>> signal would be superfluous), I like it.
>>> 
>>> 
>>> I have one (probably academic) point though:
>>> 
>>> 
>>> (I would like to see a diagram visualizing the probing process).
>> 
>> Good suggestion; we'll add one in the next rev.
>> 
>>> In Step 4, the algo sends the next 3 segments after IW with "CE". In
>> addition to the "first hop must not have experienced congestion" scenario,
>> a middlebox might also clear CE if these three segments are pure ACKs, as
>> per 3168, pure ACKs should not be marked ECN-capable... also, you expect
>> an ACK for these. Thus you need to send 3 "data segments" not simply
>> segments, right?
>> 
>> Yep, this is what we meant, but we need to make this more clear.
>> 
>>> In Step 6, you mention an interaction with ECN Nonce... Perhaps having
>> an explicit example for an ECN-Nonce enabled session would do well (which
>> can detect the removal of the CE-flag in probing data segments by sending
>> one ECT(1) data segment).
>>> 
>>> In Step 7, CWR should be sent with the segment (not necessarily data
>> segment) ACKing any of the 1st up to the 3rd probing CE data segment. This
>> could be 1, 2 or 3 segments (the text only hints on a single such
>> segment).
>> 
>> hm, that wasn't the intention, but on review that could be clearer, as
>> well. We'll make it so.
>> 
>>> Including the optional ECN Nonce probing (4th segment with ECT1; 4th ACK
>> with NS=1) in the algorithm might be good...
>> 
>> Good suggestion; we were originally thinking of something a little more
>> elaborate, and I do think we need to think about this a bit more, though,
>> since an actual CE mark would obliterate the nonce. I know that's unlikely
>> _now_, but one of the goals of the work is making it less so. :)
>> 
>> Cheers,
>> 
>> Brian
>> 
>> 
>>>> -----Original Message-----
>>>> From: tcpm-bounces@ietf.org [mailto:tcpm-bounces@ietf.org] On Behalf
>>>> Of Brian Trammell
>>>> Sent: Donnerstag, 04. Juli 2013 14:14
>>>> To: tcpm@ietf.org
>>>> Subject: [tcpm] Fwd: New Version Notification for
>>>> draft-kuehlewind-tcpm- ecn-fallback-00.txt
>>>> 
>>>> Greetings, all,
>>>> 
>>>> We've posted a draft on ECN path probing and fallback, which we'd
>>>> like to discuss at the TCPM meeting in Berlin. In a recent work [1],
>>>> we found that though the ECN-readiness of popular webservers has
>>>> significantly increased even in the last couple of years, there still
>>>> exist paths on which attempts to use ECN after successful ECN
>>>> negotiation will cause connection disruption.
>>>> 
>>>> This draft proposes an experimental approach to determine at runtime
>>>> whether a path is usable, by sending segments after connection
>>>> startup and ECN negotiation with the CE codepoint set, and disabling
>>>> ECN if all probe segments were lost, on a per-flow or per-destination
>> basis.
>>>> 
>>>> Experiments with an implementation of the approach within the Linux
>>>> kernel are underway; we plan to be able to present initial results in
>> Berlin.
>>>> 
>>>> Best regards,
>>>> 
>>>> Mirja and Brian
>>>> 
>>>> [1] Kuehlewind, M., Neuner, S., and Trammell, B., "On the state of
>>>> ECN and TCP Options on the Internet", in Proceedings of the the 2013
>>>> Passive and Active Measurement Conference, Hong Kong SAR, China, 19
>> March 2013.
>>>> 
>>>> Begin forwarded message:
>>>> 
>>>>> From: internet-drafts@ietf.org
>>>>> Subject: New Version Notification for
>>>>> draft-kuehlewind-tcpm-ecn-fallback-00.txt
>>>>> Date: 3 July 2013 17:40:32 GMT+02:00
>>>>> To: Mirja Kuehlewind <mirja.kuehlewind@ikr.uni-stuttgart.de>, Brian
>>>>> Trammell <trammell@tik.ee.ethz.ch>
>>>>> 
>>>>> 
>>>>> A new version of I-D, draft-kuehlewind-tcpm-ecn-fallback-00.txt
>>>>> has been successfully submitted by Mirja Kuehlewind and posted to
>>>>> the IETF repository.
>>>>> 
>>>>> Filename:	 draft-kuehlewind-tcpm-ecn-fallback
>>>>> Revision:	 00
>>>>> Title:		 A Mechanism for ECN Path Probing and Fallback
>>>>> Creation date:	 2013-07-02
>>>>> Group:		 Individual Submission
>>>>> Number of pages: 5
>>>>> URL:             http://www.ietf.org/internet-drafts/draft-kuehlewind-
>>>> tcpm-ecn-fallback-00.txt
>>>>> Status:          http://datatracker.ietf.org/doc/draft-kuehlewind-
>> tcpm-
>>>> ecn-fallback
>>>>> Htmlized:        http://tools.ietf.org/html/draft-kuehlewind-tcpm-ecn-
>>>> fallback-00
>>>>> 
>>>>> 
>>>>> Abstract:
>>>>> Explicit Congestion Notification (ECN) is a TCP/IP extension that
>>>>> is  widely implemented but hardly used due to the perceived
>>>>> unusablilty  of ECN on many paths through the Internet caused by
>>>>> ECN-ignorant  routers and middleboxes.  This document specifies an
>>>>> ECN probing and  fall-back mechanism in case ECN has be successfully
>>>>> negotiated  between two connection endpoints, but might not be
>>>>> usable on the  path.
>>>>> 
>>>>> 
>>>>> 
>>>>> 
>>>>> The IETF Secretariat
>>>> 
>>>> _______________________________________________
>>>> tcpm mailing list
>>>> tcpm@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/tcpm