< draft-mathis-conex-abstract-mech-00a.txt   draft-mathis-conex-abstract-mech-00b.txt >
Congestion Exposure (ConEx) M. Mathis Congestion Exposure (ConEx) M. Mathis
Working Group Google Working Group Google
Internet-Draft October 14, 2010 Internet-Draft B. Briscoe
Intended status: Informational Intended status: Informational BT
Expires: April 17, 2011 Expires: April 17, 2011 October 14, 2010
ConEx Concepts and Abstract Mechanism Congestion Exposure (ConEx) Concepts and Abstract Mechanism
draft-mathis-conex-abstract-mech-00a draft-mathis-conex-abstract-mech-00b
Abstract Abstract
This document describes and abstract mechanism by which senders This document describes an abstract mechanism by which senders inform
inform the network about the congestion encountered by previous the network about the congestion encountered by packets earlier in
packets on the same flow. Today, the network may signal congestion the same flow. Today, the network may signal congestion to the
by ECN markings or by dropping packets, and the receiver passes this receiver by ECN markings or by dropping packets, and the receiver may
information back to the sender in transport-layer acknowledgments. pass this information back to the sender in transport-layer feedback.
The mechanism to be developed by the CONEX WG will enable the sender The mechanism to be developed by the ConEx WG will enable the sender
to also relay the congestion information back into the network in- to also relay this congestion information back into the network in-
band at the IP layer, such that the total level of congestion is band at the IP layer, such that the total level of congestion is
visible to all IP devices along the path, from where it could, for visible to all IP devices along the path, from where it could, for
example, be provided as input to traffic management. example, be provided as input to traffic management.
Status of This Memo Status of This Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
skipping to change at page 2, line 13 skipping to change at page 2, line 13
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Requirements Language . . . . . . . . . . . . . . . . . . . 4 1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 4
2. Requirements for the Congestion Exposure Signal . . . . . . . . 4 2. Requirements for the Congestion Exposure Signal . . . . . . . 5
3. Representing Congestion Exposure . . . . . . . . . . . . . . . 5 3. Representing Congestion Exposure . . . . . . . . . . . . . . . 7
3.1. One Simple Encoding . . . . . . . . . . . . . . . . . . . . 6 3.1. One Simple Encoding . . . . . . . . . . . . . . . . . . . 7
3.2. ECN Based Encoding . . . . . . . . . . . . . . . . . . . . 6 3.2. ECN Based Encoding . . . . . . . . . . . . . . . . . . . . 8
3.2.1. ECN Changes . . . . . . . . . . . . . . . . . . . . . . 7 3.2.1. ECN Changes . . . . . . . . . . . . . . . . . . . . . 8
3.3. Abstract Encoding . . . . . . . . . . . . . . . . . . . . . 7 3.3. Abstract Encoding . . . . . . . . . . . . . . . . . . . . 9
3.3.1. Separate Bits . . . . . . . . . . . . . . . . . . . . . 7 3.3.1. Separate Bits . . . . . . . . . . . . . . . . . . . . 9
3.3.2. Enumerated Encoding . . . . . . . . . . . . . . . . . . 8 3.3.2. Enumerated Encoding . . . . . . . . . . . . . . . . . 9
4. Congestion Exposure Components . . . . . . . . . . . . . . . . 8 4. Congestion Exposure Components . . . . . . . . . . . . . . . . 9
4.1. Modified Senders . . . . . . . . . . . . . . . . . . . . . 8 4.1. Modified Senders . . . . . . . . . . . . . . . . . . . . . 9
4.2. Policy Devices . . . . . . . . . . . . . . . . . . . . . . 8 4.2. Policy Devices . . . . . . . . . . . . . . . . . . . . . . 9
4.2.1. Audit . . . . . . . . . . . . . . . . . . . . . . . . . 8 4.2.1. Audit . . . . . . . . . . . . . . . . . . . . . . . . 9
4.2.2. Policers and Shapers . . . . . . . . . . . . . . . . . 8 4.2.2. Policers and Shapers . . . . . . . . . . . . . . . . . 10
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 8 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10
6. Security Considerations . . . . . . . . . . . . . . . . . . . . 8 6. Security Considerations . . . . . . . . . . . . . . . . . . . 10
7. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . 9 7. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 10
8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 9 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 10
9. Comments Solicited . . . . . . . . . . . . . . . . . . . . . . 9 9. Comments Solicited . . . . . . . . . . . . . . . . . . . . . . 10
10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 9 10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 10
10.1. Normative References . . . . . . . . . . . . . . . . . . . 9 10.1. Normative References . . . . . . . . . . . . . . . . . . . 10
10.2. Informative References . . . . . . . . . . . . . . . . . . 9 10.2. Informative References . . . . . . . . . . . . . . . . . . 11
1. Introduction 1. Introduction
One of the required functions of a transport protocol is controlling One of the required functions of a transport protocol is controlling
congestion in the network. There are three techniques in use today congestion in the network. There are three techniques in use today
for signaling congestion: for the network to signal congestion to a transport:
o The most common congestion signal is packet loss. When congested, o The most common congestion signal is packet loss. When congested,
the network simply discards some packets either as part of an the network simply discards some packets either as part of an
explicit control function [RFC2309] or as the consequence of a explicit control function [RFC2309] or as the consequence of a
queue overflow or other resource starvation. The transport queue overflow or other resource starvation. The transport
receiver detects that some data is missing and signals such receiver detects that some data is missing and signals such
through transport acknowledgments to the transport sender (e.g. through transport acknowledgments to the transport sender (e.g.
TCP SACK options). The sender retransmits the missing data (if a TCP SACK options). The sender performs the appropriate congestion
reliable protocol) and then performs the mandatory congestion control rate reduction (e.g. [RFC5681] for TCP) and, if it is a
control adjustment [RFC5681]. reliable transport, it retransmits the missing data.
o Some experimental transport protocols and TCP variants [Vegas, o If the transport supports explicit congestion notification (ECN)
I-D.ietf-ledbat-congestion...] sense queuing delays in the network [RFC3168] or pre-congestion notification (PCN) [RFC5670] , the
before the network itself signals congestion. From the transport sender indicates this by setting an ECN-capable
perspective of this document, these algorithm and related transport (ECT) codepoint in every packet. Network devices can
techniques prevent congestion, therefore they are out of scope and then explicitly signal congestion to the receiver by setting ECN
are not discussed further in this document. bits in the IP header of such packets. The transport receiver
communicates these ECN signals back to the sender, which then
performs the appropriate congestion control rate reduction.
o With Explicit Congestion Notification (ECN) [RFC3168], network o Some experimental transport protocols and TCP variants [Vegas]
devices explicitly indicate congestion by setting ECN bits in the sense queuing delays in the network and reduce their rate before
IP header. The transport receiver communicates these signals back the network has to signal congestion using loss or ECN. A purely
to the sender, which then performs the mandatory congestion delay-sensing transport will tend to be pushed out by other
control adjustment. competing transports that do not back off until they have driven
the queue into loss. Therefore, modern delay-sensing algorithms
use delay in some combination with loss to signal congestion (e.g.
LEDBAT [I-D.ietf-ledbat-congestion], Compound
[I-D.sridharan-tcpm-ctcp]). In the rest of this document, we will
confine the discussion to concrete signals of congestion such as
loss and ECN. We will not discuss delay-sensing further, because
it can only avoid these more concrete signals of congestion in
some circumstances.
In all cases the congestion signals follow the route indicated in In all cases the congestion signals follow the route indicated in
Figure 1. A congested network device sends a signal in the data Figure 1. A congested network device sends a signal in the data
stream on the forward path to the transport receiver, the receiver stream on the forward path to the transport receiver, the receiver
passes it back to the sender through transport level acknowledgments, passes it back to the sender through transport level feedback, and
and the sender makes some congestion control adjustment. the sender makes some congestion control adjustment.
This document proposes to extend the capabilities of the Internet This document proposes to extend the capabilities of the Internet
suite with the addition of a Congestion Exposure Signal that relays protocol suite with the addition of a Congestion Exposure Signal
the congestion information from the Transport Sender back through the that, to a first approximation, relays the congestion information
network layer. That signal is shown Figure 1. It would be visible from the transport sender back through the internetwork layer. That
to all network layer devices along the forward (data) path and is signal is shown in Figure 1. It would be visible to all internetwork
intended to support a number of new policy mechanism that might be layer devices along the forward (data) path and is intended to
support a number of new policy-controlled mechanisms that might be
used to manage traffic. used to manage traffic.
123456789012345678901234567890123456789012345678901234567890123456789
1234567890123456789012345678901234567890123456789012345678901234567890 +---------+ +---------+
----------- ------------- ----------- | |<==Feedback Path==============================<| |
| | |(Congested)| | | | |<--Transport Layer returned Congestion Signal-<| |
| |>==Data=Path=>| Network |>=====Data=Path=====>| | | | | |
|Transport| | Device |>-Congestion-Signal->|Transport| |Transport| |Transport|
| Sender | ------------- | Receiver| | Sender |>-(new)-IP layer Congestion Exposure Signal--->| Receiver|
| | | | | | (Carried in Data Packet Headers) | |
| |<====ACK=Path==================================<| | | | +-----------+ | |
| |<---Transport Layer returned Congestion Signal-<| | | |>=Data=Path=>|(Congested)|>=====Data=Path=====>| |
| | | | | | | Network |>-Congestion-Signal->| |
| |>-(new)-IP layer Congestion Exposure Signal---->| | | | | Device | | |
----------- (Carried in Data Packets) ----------- +---------+ +-----------+ +---------+
Not shown are policy devices along the data path that observe the Not shown are policy devices along the data path that observe the
Congestion Exposure Signal, and use the information to monitor or Congestion Exposure Signal, and use the information to monitor or
manage traffic. These are discussed in Section 4.2. manage traffic. These are discussed in Section 4.2.
Figure 1 Figure 1
1.1. Requirements Language 1.1. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119]. document are to be interpreted as described in RFC 2119 [RFC2119].
ConEx signals in IP packet headers from the sender to the network
{ToDo: These are placeholders for whatever words we decide to use}:
Re-Echo Loss (aka Black-Loss) The transport has experienced a loss.
Re-Echo ECN (aka Black-ECN) The transport has experienced an ECN
mark
Pre-Echo (aka Green) The transport is building up credit to allow
for any future delay in expected ConEx signals
Neutral (aka Grey) The transport is ConEx-capable
Not-ConEx (aka White) The transport is not ConEx-capable
2. Requirements for the Congestion Exposure Signal 2. Requirements for the Congestion Exposure Signal
a. The Congestion Exposure Signal must be visible to the network a. The Congestion Exposure Signal SHOULD be visible to internetwork
layer along the entire path from the transport sender to the layer devices along the entire path from the transport sender to
transport receiver. Equivalently, it must be present in the IPv4 the transport receiver. Equivalently, it SHOULD be present in
or IPv6 header. A corollary of this is that existing (legacy) the IPv4 or IPv6 header, and in the outermost IP header if using
networking gear must at the very minimum pass the Congestion IP in IP tunnelling. The Congestion Exposure Signal SHOULD be
Exposures Signal without modification. immutable once set by the transport sender. A corollary of these
requirements is that existing (legacy) networking gear SHOULD
pass the Congestion Exposure Signal silently without
modification.
b. The Congestion Exposure Signal must be useful under only partial b. The Congestion Exposure Signal SHOULD be useful under only
deployment. A minimal deployment must only require changes to partial deployment. A minimal deployment SHOULD only require
the transport senders. Furthermore, partial deployment should changes to transport senders. Furthermore, partial deployment
create incentives for additional deployment, both in terms of SHOULD create incentives for additional deployment, both in terms
enabling Congestion Exposure on more devices and adding richer of enabling Congestion Exposure on more devices and adding richer
features to existing devices. It is anticipated that ConEx features to existing devices. Nonetheless, ConEx deployment need
deployment will be asymptotic, and some residual class of hosts never be universal, and it is anticipated that some hosts and
and network equipment will never fully support the Congestion some transports may never support the Congestion Exposure
Exposure Protocol. Protocol and some networks may never use the Congestion Exposure
Signals.
c. The Congestion Exposure Signal must be timely and accurate. It c. The Congestion Exposure Signal SHOULD be accurate. In
must not be delayed by significantly more than one RTT from the potentially hostile environments such as the public Internet, it
congestion event which triggered the signal. There must be SHOULD be possible for techniques to be deployed to audit the
techniques to audit the Congestion Exposure Signal by comparing Congestion Exposure Signal by comparing it to the actual
it to the actual congestion signals on the forward data path. congestion signals on the forward data path. The auditing
The auditing mechanism must have a capability for providing mechanism must have a capability for providing sufficient
strong disincentives for miss-reporting congestion, such as by disincentives against misreported congestion, such as by
throttling traffic that reports less congestion than it is throttling traffic that reports less congestion than it is
actually experiencing. actually experiencing.
d. The Congestion Exposure Signal SHOULD be timely. There will be a
delay between the time when an auditing device sees an actual
congestion signal and when it sees the subsequent Congestion
Exposure Signal from the sender. The minimum delay will be one
round trip, but it may be much longer depending on the
transport's choice of feedback delay (consider RTCP [RFC3550] for
example). It is not practical to expect auditing devices in the
network to make allowance for such feedback delays. Instead, the
sender MUST be able to send Congestion Exposure signals in
advance, as 'credit' for any audit device to hold as a balance
against the risk of congestion during the feedback delay. This
design choice simplifies auditing devices and correctly makes the
transport responsible for both minimising feedback delay and
minimising sharp increases in packets in flight that would risk
causing excessive congestion to others. This issue is discussed
in more detail in Section 4.2.1.
It is important to note that the auditing requirement implies a It is important to note that the auditing requirement implies a
number of additional constraints: The basic auditing technique is to number of additional constraints: The basic auditing technique is to
count both congestion signals and Congestion Exposure Signals count both actual congestion signals and Congestion Exposure Signals
someplace along the data path. For congestion signaled by ECN, this someplace along the data path:
is most accurate when done near the transport receiver. The total
number of ECN marks seen near the receiver should always be equal to
or less than the number of Congestion Exposure Signals seen one RTT
later.
Auditing loss based Congestion Exposure can most easily be o For congestion signaled by ECN, auditing is most accurate when
implemented near the sender, since down stream losses appear as located near the transport receiver. Within any flow or aggregate
duplicate data for all reliable protocols (and duplicate sequence of flows, the total volume of ECN marked data seen near the
numbers for TCP). The auditor can detect losses by observing both receiver should always be equal to or less than the volume of data
the original transmission and the retransmission after the loss. tagged with Congestion Exposure Signals.
(This method does assume that IPsec is not in use).
Given that loss based and ECN based Congestion Exposure are best o For congestion signaled by loss, totally accurate auditing is not
audited at different locations, it is likely that they will need to believed to be possible in the general case, because it involves a
have distinct encodings. In addition the simplest mechanism to network node detecting the absence of some packets, when it cannot
address the one RTT delay between the congestion event and the necessarily see the transport protocol sequence numbers and when
Congestion Exposure Signal is to pre-mark some packets with a special the missing packets might simply be taking a different route. But
Congestion Exposure credit prior any true congestion marks. This there are common cases where sufficient audit accuracy should be
technique is described in more detail in Section 4.2.1. possible:
* For non-IPsec traffic conforming to standard TCP sequence
numbering on a single path, the auditor could detect losses by
observing both the original transmission and the retransmission
after the loss. Such auditing would be most accurate near the
sender.
* For networks designed so that losses predominantly occur under
the management of one IP-aware node on the path, the auditor
could be located at this bottleneck. It could simply compare
Congestion Exposure Signals with actual local losses. Most
consumer access networks are design to this model, e.g. the
radio network controller (RNC) in a cellular network or the
broadband remote access server (BRAS) in a digital subscriber
line (DSL) network. Unlike the above TCP-specific solution,
this would work for IP packets carrying any transport layer
protocol, and whether encrypted or not.
The accuracy of an auditor at one predominant bottleneck might
still be sufficient, even if losses occasionally occurred at
other nodes in the network (e.g. border gateways). Although
the auditor at the predominant bottleneck would not always be
able to detect losses at other nodes, transports would not know
where losses were occurring either. Therefore any transport
would not know which losses it could cheat on without getting
caught, and which ones it couldn't.
Given that loss-based and ECN-based Congestion Exposure might
sometimes be best audited at different locations, have distinct
encodings would widen the design space for the auditing function.
{Bob: Got to here making suggested changes.}
3. Representing Congestion Exposure 3. Representing Congestion Exposure
Most protocol specifications start with a description of packet Most protocol specifications start with a description of packet
formats and code points with their associated meanings. This formats and code points with their associated meanings. This
document does not: It is already known that choosing the encoding for document does not: It is already known that choosing the encoding for
the Congestion Exposure Signal is likely to entail some engineering the Congestion Exposure Signal is likely to entail some engineering
compromises that have the potential to reduce the protocol's compromises that have the potential to reduce the protocol's
usefulness in some settings. Rather than making these engineering usefulness in some settings. Rather than making these engineering
choices prematurely, this document side steps the encoding problem by choices prematurely, this document side steps the encoding problem by
describing an abstract representation of Congestion Exposure Signal. describing an abstract representation of Congestion Exposure Signal.
All of the elements of the protocol can be defined in terms of this All of the elements of the protocol can be defined in terms of this
abstract representation. Most important, the preliminary use cases abstract representation. Most important, the preliminary use cases
for the protocol are described in terms of the abstract for the protocol are described in terms of the abstract
representation in companion documents. representation in companion documents.
Once we have some example use cases we can evaluate different Once we have some example use cases we can evaluate different
encoding schemes. Since theses schemes are likely to include some encoding schemes. Since these schemes are likely to include some
conflated code points, some information will be lost resulting in conflated code points, some information will be lost resulting in
weakening or disabling some of the algorithms and eliminating some weakening or disabling some of the algorithms and eliminating some
use cases. use cases.
The goal of this approach is to be as complete as possible for The goal of this approach is to be as complete as possible for
discovering the potential usage and capabilities of the Congestion discovering the potential usage and capabilities of the Congestion
Exposure protocol, so we have some hope of of making optimal design Exposure protocol, so we have some hope of making optimal design
decisions when choosing the encoding. decisions when choosing the encoding.
3.1. One Simple Encoding 3.1. One Simple Encoding
As an aid to the reader, it might be helpful to describe one simple As an aid to the reader, it might be helpful to describe one simple
encoding of the Congestion Exposure protocol: set IPv4 header bit 48 encoding of the Congestion Exposure protocol: set IPv4 header bit 48
(aka the "evil bit" [RFC3514]) on all retransmissions or once per ECN (aka the "evil bit" [RFC3514]) on all retransmissions or once per ECN
signaled window reduction. Clearly network devices along the forward signaled window reduction. Clearly network devices along the forward
path can see this bit and act on it. For example they can count path can see this bit and act on it. For example they can count
marked and unmarked packets to estimate the congestion levels along marked and unmarked packets to estimate the congestion levels along
skipping to change at page 9, line 11 skipping to change at page 10, line 32
6. Security Considerations 6. Security Considerations
{ToDo:} {ToDo:}
7. Conclusions 7. Conclusions
{ToDo:} {ToDo:}
8. Acknowledgements 8. Acknowledgements
{ToDo:} This document was improved by review comments from Toby Moncaster.
9. Comments Solicited 9. Comments Solicited
Comments and questions are encouraged and very welcome. They can be Comments and questions are encouraged and very welcome. They can be
addressed to the IETF Congestion Exposure (ConEx) working group addressed to the IETF Congestion Exposure (ConEx) working group
mailing list <conex@ietf.org>, and/or to the authors. mailing list <conex@ietf.org>, and/or to the authors.
10. References 10. References
10.1. Normative References 10.1. Normative References
skipping to change at page 9, line 51 skipping to change at page 11, line 28
Causing Congestion to TCP/IP", Causing Congestion to TCP/IP",
draft-briscoe-tsvwg-re-ecn-tcp-08 draft-briscoe-tsvwg-re-ecn-tcp-08
(work in progress), September 2009. (work in progress), September 2009.
[I-D.ietf-ledbat-congestion] Shalunov, S. and G. Hazel, "Low [I-D.ietf-ledbat-congestion] Shalunov, S. and G. Hazel, "Low
Extra Delay Background Transport Extra Delay Background Transport
(LEDBAT)", (LEDBAT)",
draft-ietf-ledbat-congestion-02 draft-ietf-ledbat-congestion-02
(work in progress), July 2010. (work in progress), July 2010.
[I-D.sridharan-tcpm-ctcp] Sridharan, M., Tan, K., Bansal, D.,
and D. Thaler, "Compound TCP: A New
TCP Congestion Control for High-
Speed and Long Distance Networks",
draft-sridharan-tcpm-ctcp-02 (work
in progress), November 2008.
[RFC2309] Braden, B., Clark, D., Crowcroft, [RFC2309] Braden, B., Clark, D., Crowcroft,
J., Davie, B., Deering, S., Estrin, J., Davie, B., Deering, S., Estrin,
D., Floyd, S., Jacobson, V., D., Floyd, S., Jacobson, V.,
Minshall, G., Partridge, C., Minshall, G., Partridge, C.,
Peterson, L., Ramakrishnan, K., Peterson, L., Ramakrishnan, K.,
Shenker, S., Wroclawski, J., and L. Shenker, S., Wroclawski, J., and L.
Zhang, "Recommendations on Queue Zhang, "Recommendations on Queue
Management and Congestion Avoidance Management and Congestion Avoidance
in the Internet", RFC 2309, in the Internet", RFC 2309,
April 1998. April 1998.
skipping to change at page 10, line 27 skipping to change at page 12, line 11
[RFC3514] Bellovin, S., "The Security Flag in [RFC3514] Bellovin, S., "The Security Flag in
the IPv4 Header", RFC 3514, the IPv4 Header", RFC 3514,
April 2003. April 2003.
[RFC3540] Spring, N., Wetherall, D., and D. [RFC3540] Spring, N., Wetherall, D., and D.
Ely, "Robust Explicit Congestion Ely, "Robust Explicit Congestion
Notification (ECN) Signaling with Notification (ECN) Signaling with
Nonces", RFC 3540, June 2003. Nonces", RFC 3540, June 2003.
[RFC3550] Schulzrinne, H., Casner, S.,
Frederick, R., and V. Jacobson,
"RTP: A Transport Protocol for
Real-Time Applications", STD 64,
RFC 3550, July 2003.
[RFC5670] Eardley, P., "Metering and Marking
Behaviour of PCN-Nodes", RFC 5670,
November 2009.
[RFC5681] Allman, M., Paxson, V., and E. [RFC5681] Allman, M., Paxson, V., and E.
Blanton, "TCP Congestion Control", Blanton, "TCP Congestion Control",
RFC 5681, September 2009. RFC 5681, September 2009.
[Refb-dis] Briscoe, B., "Re-feedback: Freedom [Refb-dis] Briscoe, B., "Re-feedback: Freedom
with Accountability for Causing with Accountability for Causing
Congestion in a Connectionless Congestion in a Connectionless
Internetwork", UCL PhD Internetwork", UCL PhD
Dissertation , 2009, <http:// Dissertation , 2009, <http://
bobbriscoe.net/projects/refb/ bobbriscoe.net/projects/refb/
skipping to change at page 11, line 5 skipping to change at page 13, line 5
[Vegas] Brakmo, L. and L. Peterson, "TCP [Vegas] Brakmo, L. and L. Peterson, "TCP
Vegas: End-to-End Congestion Vegas: End-to-End Congestion
Avoidance on a Global Internet", Avoidance on a Global Internet",
IEEE Journal on Selected Areas in IEEE Journal on Selected Areas in
Communications 13(8)1465--80, Communications 13(8)1465--80,
October 1995, <http:// October 1995, <http://
ieeexplore.ieee.org/iel1/49/9740/ ieeexplore.ieee.org/iel1/49/9740/
00464716.pdf?arnumber=464716>. 00464716.pdf?arnumber=464716>.
Author's Address Authors' Addresses
Matt Mathis Matt Mathis
Google Google
Phone: Phone:
Fax: Fax:
EMail: mattmathis at google.com EMail: mattmathis at google.com
URI: URI:
Bob Briscoe
BT
B54/77, Adastral Park
Martlesham Heath
Ipswich IP5 3RE
UK
Phone: +44 1473 645196
EMail: bob.briscoe@bt.com
URI: http://bobbriscoe.net/
 End of changes. 27 change blocks. 
116 lines changed or deleted 206 lines changed or added

This html diff was produced by rfcdiff 1.40. The latest version is available from http://tools.ietf.org/tools/rfcdiff/