| < draft-mathis-conex-abstract-mech-00a.txt | draft-mathis-conex-abstract-mech-00b.txt > | |||
|---|---|---|---|---|
| Congestion Exposure (ConEx) M. Mathis | Congestion Exposure (ConEx) M. Mathis | |||
| Working Group Google | Working Group Google | |||
| Internet-Draft October 14, 2010 | Internet-Draft B. Briscoe | |||
| Intended status: Informational | Intended status: Informational BT | |||
| Expires: April 17, 2011 | Expires: April 17, 2011 October 14, 2010 | |||
| ConEx Concepts and Abstract Mechanism | Congestion Exposure (ConEx) Concepts and Abstract Mechanism | |||
| draft-mathis-conex-abstract-mech-00a | draft-mathis-conex-abstract-mech-00b | |||
| Abstract | Abstract | |||
| This document describes and abstract mechanism by which senders | This document describes an abstract mechanism by which senders inform | |||
| inform the network about the congestion encountered by previous | the network about the congestion encountered by packets earlier in | |||
| packets on the same flow. Today, the network may signal congestion | the same flow. Today, the network may signal congestion to the | |||
| by ECN markings or by dropping packets, and the receiver passes this | receiver by ECN markings or by dropping packets, and the receiver may | |||
| information back to the sender in transport-layer acknowledgments. | pass this information back to the sender in transport-layer feedback. | |||
| The mechanism to be developed by the CONEX WG will enable the sender | The mechanism to be developed by the ConEx WG will enable the sender | |||
| to also relay the congestion information back into the network in- | to also relay this congestion information back into the network in- | |||
| band at the IP layer, such that the total level of congestion is | band at the IP layer, such that the total level of congestion is | |||
| visible to all IP devices along the path, from where it could, for | visible to all IP devices along the path, from where it could, for | |||
| example, be provided as input to traffic management. | example, be provided as input to traffic management. | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| skipping to change at page 2, line 13 | skipping to change at page 2, line 13 | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 1.1. Requirements Language . . . . . . . . . . . . . . . . . . . 4 | 1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 2. Requirements for the Congestion Exposure Signal . . . . . . . . 4 | 2. Requirements for the Congestion Exposure Signal . . . . . . . 5 | |||
| 3. Representing Congestion Exposure . . . . . . . . . . . . . . . 5 | 3. Representing Congestion Exposure . . . . . . . . . . . . . . . 7 | |||
| 3.1. One Simple Encoding . . . . . . . . . . . . . . . . . . . . 6 | 3.1. One Simple Encoding . . . . . . . . . . . . . . . . . . . 7 | |||
| 3.2. ECN Based Encoding . . . . . . . . . . . . . . . . . . . . 6 | 3.2. ECN Based Encoding . . . . . . . . . . . . . . . . . . . . 8 | |||
| 3.2.1. ECN Changes . . . . . . . . . . . . . . . . . . . . . . 7 | 3.2.1. ECN Changes . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 3.3. Abstract Encoding . . . . . . . . . . . . . . . . . . . . . 7 | 3.3. Abstract Encoding . . . . . . . . . . . . . . . . . . . . 9 | |||
| 3.3.1. Separate Bits . . . . . . . . . . . . . . . . . . . . . 7 | 3.3.1. Separate Bits . . . . . . . . . . . . . . . . . . . . 9 | |||
| 3.3.2. Enumerated Encoding . . . . . . . . . . . . . . . . . . 8 | 3.3.2. Enumerated Encoding . . . . . . . . . . . . . . . . . 9 | |||
| 4. Congestion Exposure Components . . . . . . . . . . . . . . . . 8 | 4. Congestion Exposure Components . . . . . . . . . . . . . . . . 9 | |||
| 4.1. Modified Senders . . . . . . . . . . . . . . . . . . . . . 8 | 4.1. Modified Senders . . . . . . . . . . . . . . . . . . . . . 9 | |||
| 4.2. Policy Devices . . . . . . . . . . . . . . . . . . . . . . 8 | 4.2. Policy Devices . . . . . . . . . . . . . . . . . . . . . . 9 | |||
| 4.2.1. Audit . . . . . . . . . . . . . . . . . . . . . . . . . 8 | 4.2.1. Audit . . . . . . . . . . . . . . . . . . . . . . . . 9 | |||
| 4.2.2. Policers and Shapers . . . . . . . . . . . . . . . . . 8 | 4.2.2. Policers and Shapers . . . . . . . . . . . . . . . . . 10 | |||
| 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 8 | 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 6. Security Considerations . . . . . . . . . . . . . . . . . . . . 8 | 6. Security Considerations . . . . . . . . . . . . . . . . . . . 10 | |||
| 7. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . 9 | 7. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 9 | 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 9. Comments Solicited . . . . . . . . . . . . . . . . . . . . . . 9 | 9. Comments Solicited . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 9 | 10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 10.1. Normative References . . . . . . . . . . . . . . . . . . . 9 | 10.1. Normative References . . . . . . . . . . . . . . . . . . . 10 | |||
| 10.2. Informative References . . . . . . . . . . . . . . . . . . 9 | 10.2. Informative References . . . . . . . . . . . . . . . . . . 11 | |||
| 1. Introduction | 1. Introduction | |||
| One of the required functions of a transport protocol is controlling | One of the required functions of a transport protocol is controlling | |||
| congestion in the network. There are three techniques in use today | congestion in the network. There are three techniques in use today | |||
| for signaling congestion: | for the network to signal congestion to a transport: | |||
| o The most common congestion signal is packet loss. When congested, | o The most common congestion signal is packet loss. When congested, | |||
| the network simply discards some packets either as part of an | the network simply discards some packets either as part of an | |||
| explicit control function [RFC2309] or as the consequence of a | explicit control function [RFC2309] or as the consequence of a | |||
| queue overflow or other resource starvation. The transport | queue overflow or other resource starvation. The transport | |||
| receiver detects that some data is missing and signals such | receiver detects that some data is missing and signals such | |||
| through transport acknowledgments to the transport sender (e.g. | through transport acknowledgments to the transport sender (e.g. | |||
| TCP SACK options). The sender retransmits the missing data (if a | TCP SACK options). The sender performs the appropriate congestion | |||
| reliable protocol) and then performs the mandatory congestion | control rate reduction (e.g. [RFC5681] for TCP) and, if it is a | |||
| control adjustment [RFC5681]. | reliable transport, it retransmits the missing data. | |||
| o Some experimental transport protocols and TCP variants [Vegas, | o If the transport supports explicit congestion notification (ECN) | |||
| I-D.ietf-ledbat-congestion...] sense queuing delays in the network | [RFC3168] or pre-congestion notification (PCN) [RFC5670] , the | |||
| before the network itself signals congestion. From the | transport sender indicates this by setting an ECN-capable | |||
| perspective of this document, these algorithm and related | transport (ECT) codepoint in every packet. Network devices can | |||
| techniques prevent congestion, therefore they are out of scope and | then explicitly signal congestion to the receiver by setting ECN | |||
| are not discussed further in this document. | bits in the IP header of such packets. The transport receiver | |||
| communicates these ECN signals back to the sender, which then | ||||
| performs the appropriate congestion control rate reduction. | ||||
| o With Explicit Congestion Notification (ECN) [RFC3168], network | o Some experimental transport protocols and TCP variants [Vegas] | |||
| devices explicitly indicate congestion by setting ECN bits in the | sense queuing delays in the network and reduce their rate before | |||
| IP header. The transport receiver communicates these signals back | the network has to signal congestion using loss or ECN. A purely | |||
| to the sender, which then performs the mandatory congestion | delay-sensing transport will tend to be pushed out by other | |||
| control adjustment. | competing transports that do not back off until they have driven | |||
| the queue into loss. Therefore, modern delay-sensing algorithms | ||||
| use delay in some combination with loss to signal congestion (e.g. | ||||
| LEDBAT [I-D.ietf-ledbat-congestion], Compound | ||||
| [I-D.sridharan-tcpm-ctcp]). In the rest of this document, we will | ||||
| confine the discussion to concrete signals of congestion such as | ||||
| loss and ECN. We will not discuss delay-sensing further, because | ||||
| it can only avoid these more concrete signals of congestion in | ||||
| some circumstances. | ||||
| In all cases the congestion signals follow the route indicated in | In all cases the congestion signals follow the route indicated in | |||
| Figure 1. A congested network device sends a signal in the data | Figure 1. A congested network device sends a signal in the data | |||
| stream on the forward path to the transport receiver, the receiver | stream on the forward path to the transport receiver, the receiver | |||
| passes it back to the sender through transport level acknowledgments, | passes it back to the sender through transport level feedback, and | |||
| and the sender makes some congestion control adjustment. | the sender makes some congestion control adjustment. | |||
| This document proposes to extend the capabilities of the Internet | This document proposes to extend the capabilities of the Internet | |||
| suite with the addition of a Congestion Exposure Signal that relays | protocol suite with the addition of a Congestion Exposure Signal | |||
| the congestion information from the Transport Sender back through the | that, to a first approximation, relays the congestion information | |||
| network layer. That signal is shown Figure 1. It would be visible | from the transport sender back through the internetwork layer. That | |||
| to all network layer devices along the forward (data) path and is | signal is shown in Figure 1. It would be visible to all internetwork | |||
| intended to support a number of new policy mechanism that might be | layer devices along the forward (data) path and is intended to | |||
| support a number of new policy-controlled mechanisms that might be | ||||
| used to manage traffic. | used to manage traffic. | |||
| 123456789012345678901234567890123456789012345678901234567890123456789 | ||||
| 1234567890123456789012345678901234567890123456789012345678901234567890 | +---------+ +---------+ | |||
| ----------- ------------- ----------- | | |<==Feedback Path==============================<| | | |||
| | | |(Congested)| | | | | |<--Transport Layer returned Congestion Signal-<| | | |||
| | |>==Data=Path=>| Network |>=====Data=Path=====>| | | | | | | | |||
| |Transport| | Device |>-Congestion-Signal->|Transport| | |Transport| |Transport| | |||
| | Sender | ------------- | Receiver| | | Sender |>-(new)-IP layer Congestion Exposure Signal--->| Receiver| | |||
| | | | | | | | (Carried in Data Packet Headers) | | | |||
| | |<====ACK=Path==================================<| | | | | +-----------+ | | | |||
| | |<---Transport Layer returned Congestion Signal-<| | | | |>=Data=Path=>|(Congested)|>=====Data=Path=====>| | | |||
| | | | | | | | | Network |>-Congestion-Signal->| | | |||
| | |>-(new)-IP layer Congestion Exposure Signal---->| | | | | | Device | | | | |||
| ----------- (Carried in Data Packets) ----------- | +---------+ +-----------+ +---------+ | |||
| Not shown are policy devices along the data path that observe the | Not shown are policy devices along the data path that observe the | |||
| Congestion Exposure Signal, and use the information to monitor or | Congestion Exposure Signal, and use the information to monitor or | |||
| manage traffic. These are discussed in Section 4.2. | manage traffic. These are discussed in Section 4.2. | |||
| Figure 1 | Figure 1 | |||
| 1.1. Requirements Language | 1.1. Terminology | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in RFC 2119 [RFC2119]. | document are to be interpreted as described in RFC 2119 [RFC2119]. | |||
| ConEx signals in IP packet headers from the sender to the network | ||||
| {ToDo: These are placeholders for whatever words we decide to use}: | ||||
| Re-Echo Loss (aka Black-Loss) The transport has experienced a loss. | ||||
| Re-Echo ECN (aka Black-ECN) The transport has experienced an ECN | ||||
| mark | ||||
| Pre-Echo (aka Green) The transport is building up credit to allow | ||||
| for any future delay in expected ConEx signals | ||||
| Neutral (aka Grey) The transport is ConEx-capable | ||||
| Not-ConEx (aka White) The transport is not ConEx-capable | ||||
| 2. Requirements for the Congestion Exposure Signal | 2. Requirements for the Congestion Exposure Signal | |||
| a. The Congestion Exposure Signal must be visible to the network | a. The Congestion Exposure Signal SHOULD be visible to internetwork | |||
| layer along the entire path from the transport sender to the | layer devices along the entire path from the transport sender to | |||
| transport receiver. Equivalently, it must be present in the IPv4 | the transport receiver. Equivalently, it SHOULD be present in | |||
| or IPv6 header. A corollary of this is that existing (legacy) | the IPv4 or IPv6 header, and in the outermost IP header if using | |||
| networking gear must at the very minimum pass the Congestion | IP in IP tunnelling. The Congestion Exposure Signal SHOULD be | |||
| Exposures Signal without modification. | immutable once set by the transport sender. A corollary of these | |||
| requirements is that existing (legacy) networking gear SHOULD | ||||
| pass the Congestion Exposure Signal silently without | ||||
| modification. | ||||
| b. The Congestion Exposure Signal must be useful under only partial | b. The Congestion Exposure Signal SHOULD be useful under only | |||
| deployment. A minimal deployment must only require changes to | partial deployment. A minimal deployment SHOULD only require | |||
| the transport senders. Furthermore, partial deployment should | changes to transport senders. Furthermore, partial deployment | |||
| create incentives for additional deployment, both in terms of | SHOULD create incentives for additional deployment, both in terms | |||
| enabling Congestion Exposure on more devices and adding richer | of enabling Congestion Exposure on more devices and adding richer | |||
| features to existing devices. It is anticipated that ConEx | features to existing devices. Nonetheless, ConEx deployment need | |||
| deployment will be asymptotic, and some residual class of hosts | never be universal, and it is anticipated that some hosts and | |||
| and network equipment will never fully support the Congestion | some transports may never support the Congestion Exposure | |||
| Exposure Protocol. | Protocol and some networks may never use the Congestion Exposure | |||
| Signals. | ||||
| c. The Congestion Exposure Signal must be timely and accurate. It | c. The Congestion Exposure Signal SHOULD be accurate. In | |||
| must not be delayed by significantly more than one RTT from the | potentially hostile environments such as the public Internet, it | |||
| congestion event which triggered the signal. There must be | SHOULD be possible for techniques to be deployed to audit the | |||
| techniques to audit the Congestion Exposure Signal by comparing | Congestion Exposure Signal by comparing it to the actual | |||
| it to the actual congestion signals on the forward data path. | congestion signals on the forward data path. The auditing | |||
| The auditing mechanism must have a capability for providing | mechanism must have a capability for providing sufficient | |||
| strong disincentives for miss-reporting congestion, such as by | disincentives against misreported congestion, such as by | |||
| throttling traffic that reports less congestion than it is | throttling traffic that reports less congestion than it is | |||
| actually experiencing. | actually experiencing. | |||
| d. The Congestion Exposure Signal SHOULD be timely. There will be a | ||||
| delay between the time when an auditing device sees an actual | ||||
| congestion signal and when it sees the subsequent Congestion | ||||
| Exposure Signal from the sender. The minimum delay will be one | ||||
| round trip, but it may be much longer depending on the | ||||
| transport's choice of feedback delay (consider RTCP [RFC3550] for | ||||
| example). It is not practical to expect auditing devices in the | ||||
| network to make allowance for such feedback delays. Instead, the | ||||
| sender MUST be able to send Congestion Exposure signals in | ||||
| advance, as 'credit' for any audit device to hold as a balance | ||||
| against the risk of congestion during the feedback delay. This | ||||
| design choice simplifies auditing devices and correctly makes the | ||||
| transport responsible for both minimising feedback delay and | ||||
| minimising sharp increases in packets in flight that would risk | ||||
| causing excessive congestion to others. This issue is discussed | ||||
| in more detail in Section 4.2.1. | ||||
| It is important to note that the auditing requirement implies a | It is important to note that the auditing requirement implies a | |||
| number of additional constraints: The basic auditing technique is to | number of additional constraints: The basic auditing technique is to | |||
| count both congestion signals and Congestion Exposure Signals | count both actual congestion signals and Congestion Exposure Signals | |||
| someplace along the data path. For congestion signaled by ECN, this | someplace along the data path: | |||
| is most accurate when done near the transport receiver. The total | ||||
| number of ECN marks seen near the receiver should always be equal to | ||||
| or less than the number of Congestion Exposure Signals seen one RTT | ||||
| later. | ||||
| Auditing loss based Congestion Exposure can most easily be | o For congestion signaled by ECN, auditing is most accurate when | |||
| implemented near the sender, since down stream losses appear as | located near the transport receiver. Within any flow or aggregate | |||
| duplicate data for all reliable protocols (and duplicate sequence | of flows, the total volume of ECN marked data seen near the | |||
| numbers for TCP). The auditor can detect losses by observing both | receiver should always be equal to or less than the volume of data | |||
| the original transmission and the retransmission after the loss. | tagged with Congestion Exposure Signals. | |||
| (This method does assume that IPsec is not in use). | ||||
| Given that loss based and ECN based Congestion Exposure are best | o For congestion signaled by loss, totally accurate auditing is not | |||
| audited at different locations, it is likely that they will need to | believed to be possible in the general case, because it involves a | |||
| have distinct encodings. In addition the simplest mechanism to | network node detecting the absence of some packets, when it cannot | |||
| address the one RTT delay between the congestion event and the | necessarily see the transport protocol sequence numbers and when | |||
| Congestion Exposure Signal is to pre-mark some packets with a special | the missing packets might simply be taking a different route. But | |||
| Congestion Exposure credit prior any true congestion marks. This | there are common cases where sufficient audit accuracy should be | |||
| technique is described in more detail in Section 4.2.1. | possible: | |||
| * For non-IPsec traffic conforming to standard TCP sequence | ||||
| numbering on a single path, the auditor could detect losses by | ||||
| observing both the original transmission and the retransmission | ||||
| after the loss. Such auditing would be most accurate near the | ||||
| sender. | ||||
| * For networks designed so that losses predominantly occur under | ||||
| the management of one IP-aware node on the path, the auditor | ||||
| could be located at this bottleneck. It could simply compare | ||||
| Congestion Exposure Signals with actual local losses. Most | ||||
| consumer access networks are design to this model, e.g. the | ||||
| radio network controller (RNC) in a cellular network or the | ||||
| broadband remote access server (BRAS) in a digital subscriber | ||||
| line (DSL) network. Unlike the above TCP-specific solution, | ||||
| this would work for IP packets carrying any transport layer | ||||
| protocol, and whether encrypted or not. | ||||
| The accuracy of an auditor at one predominant bottleneck might | ||||
| still be sufficient, even if losses occasionally occurred at | ||||
| other nodes in the network (e.g. border gateways). Although | ||||
| the auditor at the predominant bottleneck would not always be | ||||
| able to detect losses at other nodes, transports would not know | ||||
| where losses were occurring either. Therefore any transport | ||||
| would not know which losses it could cheat on without getting | ||||
| caught, and which ones it couldn't. | ||||
| Given that loss-based and ECN-based Congestion Exposure might | ||||
| sometimes be best audited at different locations, have distinct | ||||
| encodings would widen the design space for the auditing function. | ||||
| {Bob: Got to here making suggested changes.} | ||||
| 3. Representing Congestion Exposure | 3. Representing Congestion Exposure | |||
| Most protocol specifications start with a description of packet | Most protocol specifications start with a description of packet | |||
| formats and code points with their associated meanings. This | formats and code points with their associated meanings. This | |||
| document does not: It is already known that choosing the encoding for | document does not: It is already known that choosing the encoding for | |||
| the Congestion Exposure Signal is likely to entail some engineering | the Congestion Exposure Signal is likely to entail some engineering | |||
| compromises that have the potential to reduce the protocol's | compromises that have the potential to reduce the protocol's | |||
| usefulness in some settings. Rather than making these engineering | usefulness in some settings. Rather than making these engineering | |||
| choices prematurely, this document side steps the encoding problem by | choices prematurely, this document side steps the encoding problem by | |||
| describing an abstract representation of Congestion Exposure Signal. | describing an abstract representation of Congestion Exposure Signal. | |||
| All of the elements of the protocol can be defined in terms of this | All of the elements of the protocol can be defined in terms of this | |||
| abstract representation. Most important, the preliminary use cases | abstract representation. Most important, the preliminary use cases | |||
| for the protocol are described in terms of the abstract | for the protocol are described in terms of the abstract | |||
| representation in companion documents. | representation in companion documents. | |||
| Once we have some example use cases we can evaluate different | Once we have some example use cases we can evaluate different | |||
| encoding schemes. Since theses schemes are likely to include some | encoding schemes. Since these schemes are likely to include some | |||
| conflated code points, some information will be lost resulting in | conflated code points, some information will be lost resulting in | |||
| weakening or disabling some of the algorithms and eliminating some | weakening or disabling some of the algorithms and eliminating some | |||
| use cases. | use cases. | |||
| The goal of this approach is to be as complete as possible for | The goal of this approach is to be as complete as possible for | |||
| discovering the potential usage and capabilities of the Congestion | discovering the potential usage and capabilities of the Congestion | |||
| Exposure protocol, so we have some hope of of making optimal design | Exposure protocol, so we have some hope of making optimal design | |||
| decisions when choosing the encoding. | decisions when choosing the encoding. | |||
| 3.1. One Simple Encoding | 3.1. One Simple Encoding | |||
| As an aid to the reader, it might be helpful to describe one simple | As an aid to the reader, it might be helpful to describe one simple | |||
| encoding of the Congestion Exposure protocol: set IPv4 header bit 48 | encoding of the Congestion Exposure protocol: set IPv4 header bit 48 | |||
| (aka the "evil bit" [RFC3514]) on all retransmissions or once per ECN | (aka the "evil bit" [RFC3514]) on all retransmissions or once per ECN | |||
| signaled window reduction. Clearly network devices along the forward | signaled window reduction. Clearly network devices along the forward | |||
| path can see this bit and act on it. For example they can count | path can see this bit and act on it. For example they can count | |||
| marked and unmarked packets to estimate the congestion levels along | marked and unmarked packets to estimate the congestion levels along | |||
| skipping to change at page 9, line 11 | skipping to change at page 10, line 32 | |||
| 6. Security Considerations | 6. Security Considerations | |||
| {ToDo:} | {ToDo:} | |||
| 7. Conclusions | 7. Conclusions | |||
| {ToDo:} | {ToDo:} | |||
| 8. Acknowledgements | 8. Acknowledgements | |||
| {ToDo:} | This document was improved by review comments from Toby Moncaster. | |||
| 9. Comments Solicited | 9. Comments Solicited | |||
| Comments and questions are encouraged and very welcome. They can be | Comments and questions are encouraged and very welcome. They can be | |||
| addressed to the IETF Congestion Exposure (ConEx) working group | addressed to the IETF Congestion Exposure (ConEx) working group | |||
| mailing list <conex@ietf.org>, and/or to the authors. | mailing list <conex@ietf.org>, and/or to the authors. | |||
| 10. References | 10. References | |||
| 10.1. Normative References | 10.1. Normative References | |||
| skipping to change at page 9, line 51 | skipping to change at page 11, line 28 | |||
| Causing Congestion to TCP/IP", | Causing Congestion to TCP/IP", | |||
| draft-briscoe-tsvwg-re-ecn-tcp-08 | draft-briscoe-tsvwg-re-ecn-tcp-08 | |||
| (work in progress), September 2009. | (work in progress), September 2009. | |||
| [I-D.ietf-ledbat-congestion] Shalunov, S. and G. Hazel, "Low | [I-D.ietf-ledbat-congestion] Shalunov, S. and G. Hazel, "Low | |||
| Extra Delay Background Transport | Extra Delay Background Transport | |||
| (LEDBAT)", | (LEDBAT)", | |||
| draft-ietf-ledbat-congestion-02 | draft-ietf-ledbat-congestion-02 | |||
| (work in progress), July 2010. | (work in progress), July 2010. | |||
| [I-D.sridharan-tcpm-ctcp] Sridharan, M., Tan, K., Bansal, D., | ||||
| and D. Thaler, "Compound TCP: A New | ||||
| TCP Congestion Control for High- | ||||
| Speed and Long Distance Networks", | ||||
| draft-sridharan-tcpm-ctcp-02 (work | ||||
| in progress), November 2008. | ||||
| [RFC2309] Braden, B., Clark, D., Crowcroft, | [RFC2309] Braden, B., Clark, D., Crowcroft, | |||
| J., Davie, B., Deering, S., Estrin, | J., Davie, B., Deering, S., Estrin, | |||
| D., Floyd, S., Jacobson, V., | D., Floyd, S., Jacobson, V., | |||
| Minshall, G., Partridge, C., | Minshall, G., Partridge, C., | |||
| Peterson, L., Ramakrishnan, K., | Peterson, L., Ramakrishnan, K., | |||
| Shenker, S., Wroclawski, J., and L. | Shenker, S., Wroclawski, J., and L. | |||
| Zhang, "Recommendations on Queue | Zhang, "Recommendations on Queue | |||
| Management and Congestion Avoidance | Management and Congestion Avoidance | |||
| in the Internet", RFC 2309, | in the Internet", RFC 2309, | |||
| April 1998. | April 1998. | |||
| skipping to change at page 10, line 27 | skipping to change at page 12, line 11 | |||
| [RFC3514] Bellovin, S., "The Security Flag in | [RFC3514] Bellovin, S., "The Security Flag in | |||
| the IPv4 Header", RFC 3514, | the IPv4 Header", RFC 3514, | |||
| April 2003. | April 2003. | |||
| [RFC3540] Spring, N., Wetherall, D., and D. | [RFC3540] Spring, N., Wetherall, D., and D. | |||
| Ely, "Robust Explicit Congestion | Ely, "Robust Explicit Congestion | |||
| Notification (ECN) Signaling with | Notification (ECN) Signaling with | |||
| Nonces", RFC 3540, June 2003. | Nonces", RFC 3540, June 2003. | |||
| [RFC3550] Schulzrinne, H., Casner, S., | ||||
| Frederick, R., and V. Jacobson, | ||||
| "RTP: A Transport Protocol for | ||||
| Real-Time Applications", STD 64, | ||||
| RFC 3550, July 2003. | ||||
| [RFC5670] Eardley, P., "Metering and Marking | ||||
| Behaviour of PCN-Nodes", RFC 5670, | ||||
| November 2009. | ||||
| [RFC5681] Allman, M., Paxson, V., and E. | [RFC5681] Allman, M., Paxson, V., and E. | |||
| Blanton, "TCP Congestion Control", | Blanton, "TCP Congestion Control", | |||
| RFC 5681, September 2009. | RFC 5681, September 2009. | |||
| [Refb-dis] Briscoe, B., "Re-feedback: Freedom | [Refb-dis] Briscoe, B., "Re-feedback: Freedom | |||
| with Accountability for Causing | with Accountability for Causing | |||
| Congestion in a Connectionless | Congestion in a Connectionless | |||
| Internetwork", UCL PhD | Internetwork", UCL PhD | |||
| Dissertation , 2009, <http:// | Dissertation , 2009, <http:// | |||
| bobbriscoe.net/projects/refb/ | bobbriscoe.net/projects/refb/ | |||
| skipping to change at page 11, line 5 | skipping to change at page 13, line 5 | |||
| [Vegas] Brakmo, L. and L. Peterson, "TCP | [Vegas] Brakmo, L. and L. Peterson, "TCP | |||
| Vegas: End-to-End Congestion | Vegas: End-to-End Congestion | |||
| Avoidance on a Global Internet", | Avoidance on a Global Internet", | |||
| IEEE Journal on Selected Areas in | IEEE Journal on Selected Areas in | |||
| Communications 13(8)1465--80, | Communications 13(8)1465--80, | |||
| October 1995, <http:// | October 1995, <http:// | |||
| ieeexplore.ieee.org/iel1/49/9740/ | ieeexplore.ieee.org/iel1/49/9740/ | |||
| 00464716.pdf?arnumber=464716>. | 00464716.pdf?arnumber=464716>. | |||
| Author's Address | Authors' Addresses | |||
| Matt Mathis | Matt Mathis | |||
| Phone: | Phone: | |||
| Fax: | Fax: | |||
| EMail: mattmathis at google.com | EMail: mattmathis at google.com | |||
| URI: | URI: | |||
| Bob Briscoe | ||||
| BT | ||||
| B54/77, Adastral Park | ||||
| Martlesham Heath | ||||
| Ipswich IP5 3RE | ||||
| UK | ||||
| Phone: +44 1473 645196 | ||||
| EMail: bob.briscoe@bt.com | ||||
| URI: http://bobbriscoe.net/ | ||||
| End of changes. 27 change blocks. | ||||
| 116 lines changed or deleted | 206 lines changed or added | |||
This html diff was produced by rfcdiff 1.40. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||