ppt - Bob Briscoe
Download
Report
Transcript ppt - Bob Briscoe
congestion exposure BoF
candidate protocol: re-ECN
Bob Briscoe
Chief Researcher, BT
Nov 2009
This work is partly funded by Trilogy, a research
project supported by the European Community
www.trilogy-project.org
This work is investigative.
It does not yet indicate the
direction of BT’s production architecture.
goals
• network can measure contribution to congestion
as easily as it measures volume today
• metric for neutral but sufficient capacity sharing
• Internet designed so endpoints deal with congestion
• endpoints expose congestion in packets to network
• purpose of this talk
• one protocol exists & implemented (x2) – concrete
• not asking BoF to bless this solution – a strong contender
congestion exposure uses drop or
explicit congestion notification (ECN) [RFC3168]
11. Congested queue marks some packets (‘debits’)
22. Receiver feeds back marks
Feedback path
Networks
Switches & routers
Sender
-1
Data packet flow
-1
Receiver
congestion signal without impairment
• then tiny queuing delay and tiny tiny loss for all traffic
• no need to avoid congestion to prevent impairment
• whether core, access or borders
3
measuring contribution to congestion
bit-rate
• user’s contribution to congestion
= bytes marked
time
congestion
• can transfer very high volume
• but keep congestion-volume very low
• similar trick for video streaming
1% marking
0.01% marking
3MB
300MB
100MB
time
10GB
1MB
1MB
4
re-inserted feedback (re-feedback) = re-ECN
sender exposes congestion to network
11. Congested queue marks some packets (‘debits’)
33. Sender re-inserts feedback (re-feedback)
22. Receiver feeds back marks
into the forward data flow as ‘credit’ marks
Feedback path
Networks
+1
Sender
Switches & routers
+1
+1
-1
+1
Data packet flow
• important details
• bootstrap: send no less credit than likely debit in 1 RTT
• sender re-inserts feedback whether triggered by ECN or loss
• no changes required to IP or MPLS data forwarding
-1
Receiver
packets expose congestion over rest of path
from wherever you look at them
Networks
+1
Switches & routers
+1
Data packet flow
Sender
-1
+1
+1
+1
-1 +1
+1
-1
+1
-1
+1
+1
-1
-1
Receivers
0|0|2|7|6|0|5 whole path
- 0|0|0|9|4|2|1 upstream (path so far)
0 0 1 8 1 8 4 downstream (rest of path)
6
bulk congestion policing
Acceptable Use Policy
'congestion-volume'
allowance: 35MB/day
example use of ConEx
no other limits needed;
no PIR, unlimited volume
• not proposing this for standardisation
• but need models like this to be possible
~70GB data per day
under typical conditions
bulk
congestion
2 Mb/s policer
Internet
0%
0.3%
congestion
0.3Mb/s
6 Mb/s
0.1%
no time for other potential uses…
• see motivation draft & papers for…
•
•
•
•
•
•
•
bulk congestion policing (or per flow)
DDoS mitigation
e2e QoS, all within best efforts, with no flow signalling
relaxes unnecessary constraints on transport design
self-admission control
server / middlebox flow state exhaustion control
wholesale & interconnect SLAs
• more speculative
• inter-domain traffic engineering?
• all-optical interconnects more feasible?
• replaces multiple access in shared access networks?
8
why won’t sender under-expose congestion?
11. Congested queue marks some packets (‘debits’)
33. Sender re-inserts feedback (re-feedback)
22. Receiver feeds back marks
into the forward data flow as credit marks
Feedback path
Networks
+1
Routers
+1
Sender
+1
-1
+1
Data packet flow
-1
Receiver
44. Sender has to reveal congestion it will cause
Example use:
end-points still do congestion control.
But network limits overall congestion
55. Cheaters will be persistently in debt
So network can discard their packets
(In this diagram no-one is cheating)
(5) cheat detection: haven’t been able to avoid per-flow state
• but designed so flow state does not break shared fate principle
• agnostic to flow behaviour – just checks diff between 2 numbers per flow
9
VNC
re-ECN status
Server
10M
10M
1G
1G
1G
TG
1G
1G
1G
10M
Intermediate
Router
100M
Client
• relatively stable draft of spec in IPv4&6
• with TCP as transport – exemplar & full spec
• two independent prototype implementations (Linux)
• quick simple demo afterwards
• ns-2 implementation
• full security analysis
• resisted several perverse research community attacks
• Global Info Infrastructure Commission analysis
• public policy
• commercial
• technical feasibility
10
goals
• network can measure contribution to congestion
as easily as it measures volume today
• metric for neutral but sufficient capacity sharing
• purpose of this talk
• one protocol exists & implemented (x2) – concrete
• not asking BoF to bless this solution – a strong contender
11
congestion exposure BoF
candidate protocol: re-ECN
<draft-briscoe-tsvwg-re-ecn-tcp>
<draft-briscoe-tsvwg-re-ecn-tcp-motivation>
re-ECN & re-feedback project page:
<http://bobbriscoe.net/projects/refb/>
Q&A
12