Re: [tcpm] I-D Action:draft-ietf-tcpm-tcp-auth-opt-01.txt

Stefanos Harhalakis <v13@v13.gr> Fri, 18 July 2008 14:32 UTC

Return-Path: <tcpm-bounces@ietf.org>
X-Original-To: tcpm-archive@megatron.ietf.org
Delivered-To: ietfarch-tcpm-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2925B3A686E; Fri, 18 Jul 2008 07:32:32 -0700 (PDT)
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DF4713A684A for <tcpm@core3.amsl.com>; Fri, 18 Jul 2008 07:32:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.299
X-Spam-Level:
X-Spam-Status: No, score=-2.299 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, J_CHICKENPOX_24=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ye2zunAfIaQV for <tcpm@core3.amsl.com>; Fri, 18 Jul 2008 07:32:30 -0700 (PDT)
Received: from mx-out.forthnet.gr (mx-out.forthnet.gr [193.92.150.104]) by core3.amsl.com (Postfix) with ESMTP id A86153A68AC for <tcpm@ietf.org>; Fri, 18 Jul 2008 07:32:29 -0700 (PDT)
Received: from mx-av-06.forthnet.gr (mx-av.forthnet.gr [193.92.150.27]) by mx-out-01.forthnet.gr (8.14.3/8.14.3) with ESMTP id m6IEX0Tn017369; Fri, 18 Jul 2008 17:33:00 +0300
Received: from MX-IN-02.forthnet.gr (mx-in-02.forthnet.gr [193.92.150.185]) by mx-av-06.forthnet.gr (8.14.3/8.14.3) with ESMTP id m6IEX0kN024145; Fri, 18 Jul 2008 17:33:00 +0300
Received: from hell.hell.gr (adsl43-134.lsf.forthnet.gr [79.103.170.134]) by MX-IN-02.forthnet.gr (8.14.3/8.14.3) with ESMTP id m6IEWowx024027; Fri, 18 Jul 2008 17:32:52 +0300
Authentication-Results: MX-IN-02.forthnet.gr smtp.mail=v13@v13.gr; spf=neutral
Authentication-Results: MX-IN-02.forthnet.gr header.from=v13@v13.gr; sender-id=neutral
From: Stefanos Harhalakis <v13@v13.gr>
To: Adam Langley <agl@imperialviolet.org>
Date: Fri, 18 Jul 2008 17:32:50 +0300
User-Agent: KMail/1.9.9
References: <20080714234502.AC4793A69F4@core3.amsl.com> <200807170325.59866.v13@v13.gr> <396556a20807161741p20cb4902l50f14856b8332716@mail.gmail.com>
In-Reply-To: <396556a20807161741p20cb4902l50f14856b8332716@mail.gmail.com>
MIME-Version: 1.0
Content-Disposition: inline
Message-Id: <200807181732.51217.v13@v13.gr>
Cc: tcpm@ietf.org, Joe Touch <touch@isi.edu>
Subject: Re: [tcpm] I-D Action:draft-ietf-tcpm-tcp-auth-opt-01.txt
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: tcpm-bounces@ietf.org
Errors-To: tcpm-bounces@ietf.org

On Thursday 17 July 2008, Adam Langley wrote:
> On Wed, Jul 16, 2008 at 5:25 PM, Stefanos Harhalakis <v13@v13.gr> wrote:
> > Apart from that, I believe that you (we) should fill a bug report.
>
> Well, since I was the last person to rewrite the options code in
> Linux(*), you might as well tell me here :)
>
> I'm not sure exactly what the issue is here. There isn't excessive
> padding: 99.9% of packets have only a timestamp option and thus have
> the minimal amount of padding. The advantage of writing/reading
> aligned data outweighs better compaction in SYN frames since there's
> (currently) no options that we excluded because of the padding.

There are not many more things to report that those discussed in the list:
* The ability to store more options when necessary
* 4 bytes of extra space for data when TSs and SACKs are included
* 4xN less bytes transmitted over the network in each session (where N is the 
number of segments with TS+SACK that are sent)

>From a very sallow test/accounting I've just performed (1 minute run) on a 
linux firewall for a not so large, not congested network, it seems that about 
3-4% of the TS segments also include a SACK header and that there could be 
saved about 1 byte every 7-8 TS-enabled segments (not counting SYN segments).

Sample results:

ts: 7497, tssack: 255, noop: 1020
ts: 8133, tssack: 347, noop: 1388
ts: 7295, tssack: 270, noop: 1080
ts: 7030, tssack: 265, noop: 1060
ts: 7162, tssack: 234, noop: 936
ts: 7328, tssack: 294, noop: 1176

1st column is segments with TS, second is segments with TS+SACK (also counted 
in first column), third column is SUM(floor(NOOP_count/4)*4) (number of bytes 
that where transmitted as NOOP and could be saved (only counts 32 bit 
words)).

Is it worth?
_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www.ietf.org/mailman/listinfo/tcpm