Re: I-D Action:draft-ietf-tsvwg-byte-pkt-congest-03.txt
Mirja Kuehlewind <mirja.kuehlewind@ikr.uni-stuttgart.de> Tue, 22 February 2011 18:38 UTC
Return-Path: <mirja.kuehlewind@ikr.uni-stuttgart.de>
X-Original-To: tsvwg@core3.amsl.com
Delivered-To: tsvwg@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9FB883A695C for <tsvwg@core3.amsl.com>; Tue, 22 Feb 2011 10:38:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.019
X-Spam-Level:
X-Spam-Status: No, score=-2.019 tagged_above=-999 required=5 tests=[AWL=0.230, BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OLcMLdZzR5Jm for <tsvwg@core3.amsl.com>; Tue, 22 Feb 2011 10:38:07 -0800 (PST)
Received: from mailsrv.ikr.uni-stuttgart.de (mailsrv.ikr.uni-stuttgart.de [129.69.170.2]) by core3.amsl.com (Postfix) with ESMTP id B703E3A6943 for <tsvwg@ietf.org>; Tue, 22 Feb 2011 10:38:06 -0800 (PST)
Received: from netsrv1.ikr.uni-stuttgart.de (netsrv1-c [10.11.12.12]) by mailsrv.ikr.uni-stuttgart.de (Postfix) with ESMTP id 682A2633B1; Tue, 22 Feb 2011 19:38:49 +0100 (CET)
Received: from vpn-2-cl177 (vpn-2-cl177 [10.41.21.177]) by netsrv1.ikr.uni-stuttgart.de (Postfix) with ESMTP id 59C1D59A8A; Tue, 22 Feb 2011 19:38:49 +0100 (CET)
From: Mirja Kuehlewind <mirja.kuehlewind@ikr.uni-stuttgart.de>
Organization: University of Stuttgart (Germany), IKR
To: tsvwg@ietf.org
Subject: Re: I-D Action:draft-ietf-tsvwg-byte-pkt-congest-03.txt
Date: Tue, 22 Feb 2011 19:38:48 +0100
User-Agent: KMail/1.9.10 (enterprise35 0.20090731.1005176)
References: <20101025221535.A7CE33A68B7@core3.amsl.com>
In-Reply-To: <20101025221535.A7CE33A68B7@core3.amsl.com>
X-KMail-QuotePrefix: >
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline
Message-Id: <201102221938.48204.mirja.kuehlewind@ikr.uni-stuttgart.de>
Cc: Bob Briscoe <bob.briscoe@bt.com>
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tsvwg>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Feb 2011 18:38:08 -0000
Hi,
I reviewed the doc. Here are comments:
-> I haven't read the previous version but I still find the doc quite hard to
read. I would prefer to have the recommendation right after the introduction
and all kind of reasoning afterwards. The whole section "1.2 Why now?" might
not be intresting for somebody how really wants a recommendation. Maybe move
it to the appendix.
-> You mention this mail [pktByteEmail] at least 4 times at different places.
After a while I really got annoyed reading the same things over and over
again... as the doc is anyway quite long, maybe there is an option to shorten
this.
-> 1. Introduction
------------------
- page 6, 1. paragraph:
"However, there are ways of addressing these issues at the transport
layer, rather than reverse engineering network forwarding to fix the
problems of one specific transport."
At this point in the doc it is not clear if the network is reverse
engineering the transport or vice versa...
- page 6, 4 paragraph:
Reference to RFC 3465 - TCP Congestion Control with Appropriate Byte
Counting (ABC)?
- page 6, 3. paragraph:
Maybe have a brief list with the arguments described in 2. Motivating
Arguments. I would say, if somebody is reading the doc to get some
recommendations he would like to hear some arguments right at the beginning
but having the full discussion is not necessary. That's why I would move 2.
Motivating Arguments after the recommendation section itself.
- 1.2. Why now:
Its 2. and 3. the same?
Would move the whole section to the appendix...
-> 2. Motivating Arguments
------
- 2.3. page 12, 2. paragraph
From my point of view does this example give the main reason why
packet-mode drop is the right thing to do and all other points just support
this with examples showing that either byte-mode drop is wrong or packet-size
congestion control would be the easier solution. But the example is
complicated to read and the reason itself is never clearly stated: Network
should provide the same behavior against all flows (in this case the same
rate reduction) independent of their higher level characteristics!
I would include this example in the introduction and maybe a table like this
might help (?):
Packet Size 1500B 60B
# of packet per 1.2 sec 100 2500
drop probability 25% 1%
# of drops 25 25
rate reduction 300k 12k
With the first reading I was confused because the example says XX% of packets
drops. But as there is a different number of packet in the same time, this
equals XX% of bits dropped. Maybe this table is a way to make this more
explicit and thus easier to read (or maybe its just me....). Moreover, you
could include a picture like this:
1 Mbps ---------| 25% |----------750 kbps
| RED |
1 Mbps............ | 1% |.............990 kbps
Further remarks on the example to make thing clearer:
- The rates are not the link capacity but the transmission rates if sufficient
link capacity is available.
- The RED queue would just operate in a certain state with 25% and 1% drop but
whenever RED is dropping packets the one probability will be 25 times larger
than the other.
- This is the troughput not the goodput. Thus header overhead it not taken
into account.
-> 3. Recommendations
-----------------
- 3.1. Recommendations on Queue Measurement
The 2. paragraph says the same than the 2. corollary. Also I don't know
why the 2. corollary says "If RED is used" because this is true for all queue
measurements. This paragraph should be the first collary and for the other
one I would suggest to rephrase to:
"An Admin SHOULD NOT be able to configure the way a queue measures itself,
because wether a queue is bit-congestible or packet-congestible is a property
of the resource."
Maybe add an example here.
- 3.2. page 14, 4. paragraph NOTE WELL
This is important for understanding the whole wording used. Maybe make
this statement earlier more explicit.
- 3.3. Both corollaries basically say if modifications are needed because of
layer-specific characteristics, those changes MUST be done in the same layer
and MUST never been done in any layer below.
But the question left open here is: If the network is doing the wrong thing
and I can't know what the network is doing, how can I do the right thing
(e.g. to get equal rates)?
-> 4. A Survey and Critique of Past Advice
------------------------
- 4.1.: 1. paragraph: Do you have the respective reference?
- 4.2.3.: 1.paragraph: "... these two proposal are safer and ..." Why are
they safer?
- 4.2.3.: 2.paragraph: Doesn't this give a new option for attacks?
-> Would move 4.2.5. to Appendix
-> Even though section 4. and 5. are intresting to read, I would see this doc
as a guideline for implementers or transport designers. Some point are more
about open research issues. Maybe there is a way to shorten these parts (or
to move them into a second doc...). Maybe have something like implementor's
guidelines or design principles instead. Allover the message of the doc is
(more or less) quite simple but the long discussions on various different
side effects makes the doc hard to read and it's hard to focus on the
actually statement.
-> I like the conclusion!
Mirja
On Tuesday 26 October 2010 00:15:32 Internet-Drafts@ietf.org wrote:
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories. This draft is a work item of the Transport Area Working Group
> Working Group of the IETF.
>
>
> Title : Byte and Packet Congestion Notification
> Author(s) : B. Briscoe, J. Manner
> Filename : draft-ietf-tsvwg-byte-pkt-congest-03.txt
> Pages : 41
> Date : 2010-10-25
>
> This memo concerns dropping or marking packets using active queue
> management (AQM) such as random early detection (RED) or pre-
> congestion notification (PCN). We give three strong recommendations:
> (1) packet size should be taken into account when transports read
> congestion indications, (2) packet size should not be taken into
> account when network equipment creates congestion signals (marking,
> dropping), and therefore (3) the byte-mode packet drop variant of the
> RED AQM algorithm that drops fewer small packets should not be used.
>
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft-ietf-tsvwg-byte-pkt-congest-03.tx
>t
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> Below is the data which will enable a MIME compliant mail reader
> implementation to automatically retrieve the ASCII version of the
> Internet-Draft.
--
-------------------------------------------------------------------
Dipl.-Ing. Mirja Kühlewind
Institute of Communication Networks and Computer Engineering (IKR)
University of Stuttgart, Germany
Pfaffenwaldring 47, D-70569 Stuttgart
tel: +49(0)711/685-67973
email: mirja.kuehlewind@ikr.uni-stuttgart.de
web: www.ikr.uni-stuttgart.de
-------------------------------------------------------------------
- I-D Action:draft-ietf-tsvwg-byte-pkt-congest-03.t… Internet-Drafts
- Re: I-D Action:draft-ietf-tsvwg-byte-pkt-congest-… Jukka Manner
- Re: I-D Action:draft-ietf-tsvwg-byte-pkt-congest-… Colin Perkins
- Re: I-D Action:draft-ietf-tsvwg-byte-pkt-congest-… Jukka Manner
- Re: I-D Action:draft-ietf-tsvwg-byte-pkt-congest-… Mirja Kuehlewind
- Re: I-D Action:draft-ietf-tsvwg-byte-pkt-congest-… Bob Briscoe
- Re: I-D Action:draft-ietf-tsvwg-byte-pkt-congest-… Jukka Manner
- Re: I-D Action:draft-ietf-tsvwg-byte-pkt-congest-… Bob Briscoe