draft-briscoe-tsvwg-byte-pkt-mark-02.txt | draft-ietf-tsvwg-byte-pkt-congest-00.txt | |||
---|---|---|---|---|
Transport Area Working Group B. Briscoe | Transport Area Working Group B. Briscoe | |||
Internet-Draft BT & UCL | Internet-Draft BT & UCL | |||
Intended status: Informational February 24, 2008 | Intended status: Informational August 07, 2008 | |||
Expires: August 27, 2008 | Expires: February 8, 2009 | |||
Byte and Packet Congestion Notification | Byte and Packet Congestion Notification | |||
draft-briscoe-tsvwg-byte-pkt-mark-02 | draft-ietf-tsvwg-byte-pkt-congest-00 | |||
Status of this Memo | Status of this Memo | |||
By submitting this Internet-Draft, each author represents that any | By submitting this Internet-Draft, each author represents that any | |||
applicable patent or other IPR claims of which he or she is aware | applicable patent or other IPR claims of which he or she is aware | |||
have been or will be disclosed, and any of which he or she becomes | have been or will be disclosed, and any of which he or she becomes | |||
aware will be disclosed, in accordance with Section 6 of BCP 79. | aware will be disclosed, in accordance with Section 6 of BCP 79. | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF), its areas, and its working groups. Note that | |||
skipping to change at page 1, line 34 | skipping to change at page 1, line 34 | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
http://www.ietf.org/ietf/1id-abstracts.txt. | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
This Internet-Draft will expire on August 27, 2008. | This Internet-Draft will expire on February 8, 2009. | |||
Copyright Notice | ||||
Copyright (C) The IETF Trust (2008). | ||||
Abstract | Abstract | |||
This memo concerns dropping or marking packets using active queue | This memo concerns dropping or marking packets using active queue | |||
management (AQM) such as random early detection (RED) or pre- | management (AQM) such as random early detection (RED) or pre- | |||
congestion notification (PCN). The primary conclusion is that packet | congestion notification (PCN). The primary conclusion is that packet | |||
size should be taken into account when transports decode congestion | size should be taken into account when transports read congestion | |||
indications, not when network equipment writes them. Reducing drop | indications, not when network equipment writes them. Reducing drop | |||
of small packets has some tempting advantages: i) it drops less | of small packets has some tempting advantages: i) it drops less | |||
control packets, which tend to be small and ii) it makes TCP's bit- | control packets, which tend to be small and ii) it makes TCP's bit- | |||
rate less dependent on packet size. However, there are ways of | rate less dependent on packet size. However, there are ways of | |||
addressing these issues at the transport layer, rather than reverse | addressing these issues at the transport layer, rather than reverse | |||
engineering network forwarding to fix specific transport problems. | engineering network forwarding to fix specific transport problems. | |||
Network layer algorithms like the byte-mode packet drop variant of | Network layer algorithms like the byte-mode packet drop variant of | |||
RED should not be used to drop fewer small packets, because that | RED should not be used to drop fewer small packets, because that | |||
creates a perverse incentive for transports to use tiny segments, | creates a perverse incentive for transports to use tiny segments, | |||
consequently also opening up a DoS vulnerability. | consequently also opening up a DoS vulnerability. | |||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 5 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 5 | |||
2. Motivating Arguments . . . . . . . . . . . . . . . . . . . . . 9 | 2. Motivating Arguments . . . . . . . . . . . . . . . . . . . . . 8 | |||
2.1. Scaling Congestion Control with Packet Size . . . . . . . 9 | 2.1. Scaling Congestion Control with Packet Size . . . . . . . 8 | |||
2.2. Avoiding Perverse Incentives to (ab)use Smaller Packets . 10 | 2.2. Avoiding Perverse Incentives to (ab)use Smaller Packets . 10 | |||
2.3. Small != Control . . . . . . . . . . . . . . . . . . . . . 11 | 2.3. Small != Control . . . . . . . . . . . . . . . . . . . . . 11 | |||
3. Working Definition of Congestion Notification . . . . . . . . 12 | 3. Working Definition of Congestion Notification . . . . . . . . 11 | |||
4. Congestion Measurement . . . . . . . . . . . . . . . . . . . . 12 | 4. Congestion Measurement . . . . . . . . . . . . . . . . . . . . 12 | |||
4.1. Congestion Measurement by Queue Length . . . . . . . . . . 12 | 4.1. Congestion Measurement by Queue Length . . . . . . . . . . 12 | |||
4.1.1. Fixed Size Packet Buffers . . . . . . . . . . . . . . 13 | 4.1.1. Fixed Size Packet Buffers . . . . . . . . . . . . . . 12 | |||
4.2. Congestion Measurement without a Queue . . . . . . . . . . 14 | 4.2. Congestion Measurement without a Queue . . . . . . . . . . 13 | |||
5. Idealised Wire Protocol Coding . . . . . . . . . . . . . . . . 14 | 5. Idealised Wire Protocol Coding . . . . . . . . . . . . . . . . 14 | |||
6. The State of the Art . . . . . . . . . . . . . . . . . . . . . 16 | 6. The State of the Art . . . . . . . . . . . . . . . . . . . . . 15 | |||
6.1. Congestion Measurement: Status . . . . . . . . . . . . . . 17 | 6.1. Congestion Measurement: Status . . . . . . . . . . . . . . 16 | |||
6.2. Congestion Coding: Status . . . . . . . . . . . . . . . . 17 | 6.2. Congestion Coding: Status . . . . . . . . . . . . . . . . 17 | |||
6.2.1. Network Bias when Encoding . . . . . . . . . . . . . . 17 | 6.2.1. Network Bias when Encoding . . . . . . . . . . . . . . 17 | |||
6.2.2. Transport Bias when Decoding . . . . . . . . . . . . . 19 | 6.2.2. Transport Bias when Decoding . . . . . . . . . . . . . 19 | |||
6.2.3. Making Transports Robust against Control Packet | 6.2.3. Making Transports Robust against Control Packet | |||
Losses . . . . . . . . . . . . . . . . . . . . . . . . 20 | Losses . . . . . . . . . . . . . . . . . . . . . . . . 20 | |||
6.2.4. Congestion Coding: Summary of Status . . . . . . . . . 21 | 6.2.4. Congestion Coding: Summary of Status . . . . . . . . . 21 | |||
7. Outstanding Issues and Next Steps . . . . . . . . . . . . . . 23 | 7. Outstanding Issues and Next Steps . . . . . . . . . . . . . . 23 | |||
7.1. Bit-congestible World . . . . . . . . . . . . . . . . . . 23 | 7.1. Bit-congestible World . . . . . . . . . . . . . . . . . . 23 | |||
7.2. Bit- & Packet-congestible World . . . . . . . . . . . . . 24 | 7.2. Bit- & Packet-congestible World . . . . . . . . . . . . . 23 | |||
8. Security Considerations . . . . . . . . . . . . . . . . . . . 25 | 8. Security Considerations . . . . . . . . . . . . . . . . . . . 24 | |||
9. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 26 | 9. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 25 | |||
10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 27 | 10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 27 | |||
11. Comments Solicited . . . . . . . . . . . . . . . . . . . . . . 27 | 11. Comments Solicited . . . . . . . . . . . . . . . . . . . . . . 27 | |||
12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 27 | ||||
12.1. Normative References . . . . . . . . . . . . . . . . . . . 27 | ||||
12.2. Informative References . . . . . . . . . . . . . . . . . . 27 | ||||
Editorial Comments . . . . . . . . . . . . . . . . . . . . . . . . | Editorial Comments . . . . . . . . . . . . . . . . . . . . . . . . | |||
Appendix A. Example Scenarios . . . . . . . . . . . . . . . . . . 28 | Appendix A. Example Scenarios . . . . . . . . . . . . . . . . . . 31 | |||
A.1. Notation . . . . . . . . . . . . . . . . . . . . . . . . . 28 | A.1. Notation . . . . . . . . . . . . . . . . . . . . . . . . . 31 | |||
A.2. Bit-congestible resource, equal bit rates (Ai) . . . . . . 28 | A.2. Bit-congestible resource, equal bit rates (Ai) . . . . . . 31 | |||
A.3. Bit-congestible resource, equal packet rates (Bi) . . . . 29 | A.3. Bit-congestible resource, equal packet rates (Bi) . . . . 32 | |||
A.4. Pkt-congestible resource, equal bit rates (Aii) . . . . . 30 | A.4. Pkt-congestible resource, equal bit rates (Aii) . . . . . 33 | |||
A.5. Pkt-congestible resource, equal packet rates (Bii) . . . . 31 | A.5. Pkt-congestible resource, equal packet rates (Bii) . . . . 34 | |||
Appendix B. Congestion Notification Definition: Further | Appendix B. Congestion Notification Definition: Further | |||
Justification . . . . . . . . . . . . . . . . . . . . 31 | Justification . . . . . . . . . . . . . . . . . . . . 34 | |||
Appendix C. Byte-mode Drop Complicates Policing Congestion | Appendix C. Byte-mode Drop Complicates Policing Congestion | |||
Response . . . . . . . . . . . . . . . . . . . . . . 32 | Response . . . . . . . . . . . . . . . . . . . . . . 35 | |||
12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 33 | ||||
12.1. Normative References . . . . . . . . . . . . . . . . . . . 33 | ||||
12.2. Informative References . . . . . . . . . . . . . . . . . . 33 | ||||
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 36 | Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 36 | |||
Intellectual Property and Copyright Statements . . . . . . . . . . 37 | Intellectual Property and Copyright Statements . . . . . . . . . . 37 | |||
Relationship to existing RFCs | ||||
To be removed by the RFC Editor on publication (with appropriate | ||||
changes to the 'Updates:' header and the RFC Index as appropriate). | ||||
This memo intends to update RFC2309, which stated an interim view but | ||||
requested that further research was needed on this topic. | ||||
Changes from Previous Versions | Changes from Previous Versions | |||
To be removed by the RFC Editor on publication. | To be removed by the RFC Editor on publication. | |||
Full incremental diffs between each version are available at | Full incremental diffs between each version are available at | |||
<http://www.cs.ucl.ac.uk/staff/B.Briscoe/pubs.html#byte-pkt-mark> | <http://www.cs.ucl.ac.uk/staff/B.Briscoe/pubs.html#byte-pkt-congest> | |||
or | ||||
<http://tools.ietf.org/wg/tsvwg/draft-ietf-tsvwg-byte-pkt-congest/> | ||||
(courtesy of the rfcdiff tool): | (courtesy of the rfcdiff tool): | |||
From -01 to -02 (this version): | From briscoe-byte-pkt-mark-02 to ietf-byte-pkt-congest-00 (this | |||
version): | ||||
Added note on relationship to existing RFCs | ||||
Posed the question of whether packet-congestion could become | ||||
common and deferred it to the IRTF ICCRG. Added ref to the | ||||
dual-resource queue (DRQ) proposal. | ||||
Changed PCN references from the PCN charter & architecture to | ||||
the PCN marking behaviour draft most likely to imminently | ||||
become the standards track WG item. | ||||
From -01 to -02: | ||||
Abstract reorganised to align with clearer separation of issue | Abstract reorganised to align with clearer separation of issue | |||
in the memo. | in the memo. | |||
Introduction reorganised with motivating arguments removed to | Introduction reorganised with motivating arguments removed to | |||
new Section 2. | new Section 2. | |||
Clarified avoiding lock-out of large packets is not the main or | Clarified avoiding lock-out of large packets is not the main or | |||
only motivation for RED. | only motivation for RED. | |||
skipping to change at page 6, line 16 | skipping to change at page 5, line 40 | |||
discussed. Indeed, one reason AQM was originally introduced was to | discussed. Indeed, one reason AQM was originally introduced was to | |||
reduce the lock-out effects that small packets can have on large | reduce the lock-out effects that small packets can have on large | |||
packets in drop-tail queues. This memo aims to state the principles | packets in drop-tail queues. This memo aims to state the principles | |||
we should be using and to come to conclusions on what these | we should be using and to come to conclusions on what these | |||
principles will mean for future protocol design, taking into account | principles will mean for future protocol design, taking into account | |||
the deployments we have already. | the deployments we have already. | |||
Note that the byte vs. packet dilemma concerns congestion | Note that the byte vs. packet dilemma concerns congestion | |||
notification irrespective of whether it is signalled implicitly by | notification irrespective of whether it is signalled implicitly by | |||
drop or using explicit congestion notification (ECN [RFC3168] or PCN | drop or using explicit congestion notification (ECN [RFC3168] or PCN | |||
[I-D.ietf-pcn-architecture]). Throughout this document, unless clear | [I-D.eardley-pcn-marking-behaviour]). Throughout this document, | |||
from the context, the term marking will be used to mean notifying | unless clear from the context, the term marking will be used to mean | |||
congestion explicitly, while congestion notification will be used to | notifying congestion explicitly, while congestion notification will | |||
mean notifying congestion either implicitly by drop or explicitly by | be used to mean notifying congestion either implicitly by drop or | |||
marking. | explicitly by marking. | |||
If the load on a resource depends on the rate at which packets | If the load on a resource depends on the rate at which packets | |||
arrive, it is called packet-congestible. If the load depends on the | arrive, it is called packet-congestible. If the load depends on the | |||
rate at which bits arrive it is called bit-congestible. | rate at which bits arrive it is called bit-congestible. | |||
Examples of packet-congestible resources are route look-up engines | Examples of packet-congestible resources are route look-up engines | |||
and firewalls, because load depends on how many packet headers they | and firewalls, because load depends on how many packet headers they | |||
have to process. Examples of bit-congestible resources are | have to process. Examples of bit-congestible resources are | |||
transmission links, and most buffer memory, because the load depends | transmission links, and most buffer memory, because the load depends | |||
on how many bits they have to transmit or store. Some machine | on how many bits they have to transmit or store. Some machine | |||
skipping to change at page 7, line 46 | skipping to change at page 7, line 19 | |||
followed this advice. The primary purpose of this memo is to build a | followed this advice. The primary purpose of this memo is to build a | |||
definitive consensus against deliberate preferential treatment for | definitive consensus against deliberate preferential treatment for | |||
small packets in AQM algorithms and to record this advice within the | small packets in AQM algorithms and to record this advice within the | |||
RFC series. | RFC series. | |||
Now is a good time to discuss whether fairness between different | Now is a good time to discuss whether fairness between different | |||
sized packets would best be implemented in the network layer, or at | sized packets would best be implemented in the network layer, or at | |||
the transport, for a number of reasons: | the transport, for a number of reasons: | |||
1. The packet vs. byte issue requires speedy resolution because the | 1. The packet vs. byte issue requires speedy resolution because the | |||
IETF pre-congestion notification (PCN) working group has been | IETF pre-congestion notification (PCN) working group is about to | |||
chartered to produce a standards track specification of its | standardise the external behaviour of a PCN congestion | |||
congestion notification (AQM) algorithm [PCNcharter]; | notification (AQM) algorithm [I-D.eardley-pcn-marking-behaviour]; | |||
2. [RFC2309] says RED may either take account of packet size or not | 2. [RFC2309] says RED may either take account of packet size or not | |||
when dropping, but gives no recommendation between the two, | when dropping, but gives no recommendation between the two, | |||
referring instead to advice on the performance implications in an | referring instead to advice on the performance implications in an | |||
email [pktByteEmail], which recommends byte-mode drop. Further, | email [pktByteEmail], which recommends byte-mode drop. Further, | |||
just before RFC2309 was issued, an addendum was added to the | just before RFC2309 was issued, an addendum was added to the | |||
archived email that revisited the issue of packet vs. byte-mode | archived email that revisited the issue of packet vs. byte-mode | |||
drop in its last para, making the recommendation less clear-cut; | drop in its last para, making the recommendation less clear-cut; | |||
3. Without the present memo, the only advice in the RFC series on | 3. Without the present memo, the only advice in the RFC series on | |||
skipping to change at page 12, line 18 | skipping to change at page 11, line 39 | |||
Rather than aim to achieve what many have tried and failed, this memo | Rather than aim to achieve what many have tried and failed, this memo | |||
will not try to define congestion. It will give a working definition | will not try to define congestion. It will give a working definition | |||
of what congestion notification should be taken to mean for this | of what congestion notification should be taken to mean for this | |||
document. Congestion notification is a changing signal that aims to | document. Congestion notification is a changing signal that aims to | |||
communicate the ratio E/L, where E is the instantaneous excess load | communicate the ratio E/L, where E is the instantaneous excess load | |||
offered to a resource that it cannot (or would not) serve and L is | offered to a resource that it cannot (or would not) serve and L is | |||
the instantaneous offered load. | the instantaneous offered load. | |||
The phrase `would not serve' is added, because AQM systems (e.g. | The phrase `would not serve' is added, because AQM systems (e.g. | |||
RED, PCN [I-D.ietf-pcn-architecture]) use a virtual capacity smaller | RED, PCN [I-D.eardley-pcn-marking-behaviour]) use a virtual capacity | |||
than actual capacity, then notify congestion of this virtual capacity | smaller than actual capacity, then notify congestion of this virtual | |||
in order to avoid congestion of the actual capacity. | capacity in order to avoid congestion of the actual capacity. | |||
Note that the denominator is offered load, not capacity. Therefore | Note that the denominator is offered load, not capacity. Therefore | |||
congestion notification is a real number bounded by the range [0,1]. | congestion notification is a real number bounded by the range [0,1]. | |||
This ties in with the most well-understood form of congestion | This ties in with the most well-understood form of congestion | |||
notification: drop rate. It also means that congestion has a natural | notification: drop rate. It also means that congestion has a natural | |||
interpretation as a probability; the probability of offered traffic | interpretation as a probability; the probability of offered traffic | |||
not being served (or being marked as at risk of not being served). | not being served (or being marked as at risk of not being served). | |||
Appendix B describes a further incidental benefit that arises from | Appendix B describes a further incidental benefit that arises from | |||
using load as the denominator of congestion notification. | using load as the denominator of congestion notification. | |||
skipping to change at page 14, line 40 | skipping to change at page 14, line 10 | |||
and theoretically sound way to combine congestion notification for | and theoretically sound way to combine congestion notification for | |||
different bit-congestible resources at different layers along an end | different bit-congestible resources at different layers along an end | |||
to end path, whether wireless or wired, and whether with or without | to end path, whether wireless or wired, and whether with or without | |||
queues. | queues. | |||
5. Idealised Wire Protocol Coding | 5. Idealised Wire Protocol Coding | |||
We will start by inventing an idealised congestion notification | We will start by inventing an idealised congestion notification | |||
protocol before discussing how to make it practical. The idealised | protocol before discussing how to make it practical. The idealised | |||
protocol is shown to be correct using examples in Appendix A. | protocol is shown to be correct using examples in Appendix A. | |||
Congestion notification involves the congested resource coding a | Congestion notification involves the congested resource coding a | |||
congestion notification signal into the packet stream and the | congestion notification signal into the packet stream and the | |||
transports decoding it. The idealised protocol uses two different | transports decoding it. The idealised protocol uses two different | |||
fields in each datagram to signal congestion: one for byte congestion | (imaginary) fields in each datagram to signal congestion: one for | |||
and one for packet congestion. | byte congestion and one for packet congestion. | |||
We are not saying two ECN fields will be needed (and we are not | We are not saying two ECN fields will be needed (and we are not | |||
saying that somehow a resource should be able to drop a packet in one | saying that somehow a resource should be able to drop a packet in one | |||
of two different ways so that the transport can distinguish which | of two different ways so that the transport can distinguish which | |||
sort of drop it was!). These two congestion notification channels | sort of drop it was!). These two congestion notification channels | |||
are just a conceptual device. They allow us to defer having to | are just a conceptual device. They allow us to defer having to | |||
decide whether to distinguish between byte and packet congestion when | decide whether to distinguish between byte and packet congestion when | |||
the network resource codes the signal or when the transport decodes | the network resource codes the signal or when the transport decodes | |||
it. | it. | |||
skipping to change at page 20, line 38 | skipping to change at page 20, line 7 | |||
The paper originally proposing TFRC with virtual packets (VP-TFRC) | The paper originally proposing TFRC with virtual packets (VP-TFRC) | |||
[CCvarPktSize] proposed that there should perhaps be two variants to | [CCvarPktSize] proposed that there should perhaps be two variants to | |||
cater for the different variants of RED. However, as the TFRC-SP | cater for the different variants of RED. However, as the TFRC-SP | |||
authors point out, there is no way for a transport to know whether | authors point out, there is no way for a transport to know whether | |||
some queues on its path have deployed RED with byte-mode packet drop | some queues on its path have deployed RED with byte-mode packet drop | |||
(except if an exhaustive survey found that no-one has deployed it!-- | (except if an exhaustive survey found that no-one has deployed it!-- | |||
see Section 6.2.4). Incidentally, VP-TFRC also proposed that byte- | see Section 6.2.4). Incidentally, VP-TFRC also proposed that byte- | |||
mode RED dropping should really square the packet size compensation | mode RED dropping should really square the packet size compensation | |||
factor (like that of RED_5, but apparently unaware of it). | factor (like that of RED_5, but apparently unaware of it). | |||
Pre-congestion notification [I-D.ietf-pcn-architecture] is a proposal | Pre-congestion notification [I-D.eardley-pcn-marking-behaviour] is a | |||
to use a virtual queue for AQM marking for packets within one | proposal to use a virtual queue for AQM marking for packets within | |||
Diffserv class in order to give early warning prior to any real | one Diffserv class in order to give early warning prior to any real | |||
queuing. The proposed PCN marking algorithms have been designed not | queuing. The proposed PCN marking algorithms have been designed not | |||
to take account of packet size when forwarding through queues. | to take account of packet size when forwarding through queues. | |||
Instead the general principle has been to take account of the sizes | Instead the general principle has been to take account of the sizes | |||
of marked packets when monitoring the fraction of marking at the edge | of marked packets when monitoring the fraction of marking at the edge | |||
of the network. | of the network. | |||
6.2.3. Making Transports Robust against Control Packet Losses | 6.2.3. Making Transports Robust against Control Packet Losses | |||
Recently, two drafts have proposed changes to TCP that make it more | Recently, two drafts have proposed changes to TCP that make it more | |||
robust against losing small control packets [I-D.ietf-tcpm-ecnsyn] | robust against losing small control packets [I-D.ietf-tcpm-ecnsyn] | |||
skipping to change at page 23, line 44 | skipping to change at page 23, line 11 | |||
still be prevalent in the Internet. As explained in Section 6.2.1, | still be prevalent in the Internet. As explained in Section 6.2.1, | |||
these also provide a marginal (but legitimate) bias towards small | these also provide a marginal (but legitimate) bias towards small | |||
packets. So even though RED byte-mode drop is not prevalent, it is | packets. So even though RED byte-mode drop is not prevalent, it is | |||
likely there is still some bias towards small packets in the Internet | likely there is still some bias towards small packets in the Internet | |||
due to tail drop and fixed buffer borrowing. | due to tail drop and fixed buffer borrowing. | |||
7. Outstanding Issues and Next Steps | 7. Outstanding Issues and Next Steps | |||
7.1. Bit-congestible World | 7.1. Bit-congestible World | |||
For a connectionless network with only bit-congestible resources we | For a connectionless network with nearly all resources being bit- | |||
believe the recommended position is now unarguably clear--that the | congestible we believe the recommended position is now unarguably | |||
network should not make allowance for packet sizes and the transport | clear--that the network should not make allowance for packet sizes | |||
should. This leaves two outstanding issues: | and the transport should. This leaves two outstanding issues: | |||
o How to handle any legacy of AQM with byte-mode drop already | o How to handle any legacy of AQM with byte-mode drop already | |||
deployed; | deployed; | |||
o The need to start a programme to update transport congestion | o The need to start a programme to update transport congestion | |||
control protocol standards to take account of packet size. | control protocol standards to take account of packet size. | |||
The sample of returns from our vendor survey Section 6.2.4 suggest | The sample of returns from our vendor survey Section 6.2.4 suggest | |||
that byte-mode packet drop seems not to be implemented at all let | that byte-mode packet drop seems not to be implemented at all let | |||
alone deployed, or if it is, it is likely to be very sparse. | alone deployed, or if it is, it is likely to be very sparse. | |||
Therefore, we do not really need a migration strategy from all but | Therefore, we do not really need a migration strategy from all but | |||
nothing to nothing. | nothing to nothing. | |||
A programme of standards updates to take account of packet size in | A programme of standards updates to take account of packet size in | |||
skipping to change at page 24, line 49 | skipping to change at page 24, line 17 | |||
distinguishing wireless transmission losses from congestive losses. | distinguishing wireless transmission losses from congestive losses. | |||
We should also note that, strictly, packet-congestible resources are | We should also note that, strictly, packet-congestible resources are | |||
actually cycle-congestible because load also depends on the | actually cycle-congestible because load also depends on the | |||
complexity of each look-up and whether the pattern of arrivals is | complexity of each look-up and whether the pattern of arrivals is | |||
amenable to caching or not. Further, this reminds us that any | amenable to caching or not. Further, this reminds us that any | |||
solution must not require a forwarding engine to use excessive | solution must not require a forwarding engine to use excessive | |||
processor cycles in order to decide how to say it has no spare | processor cycles in order to decide how to say it has no spare | |||
processor cycles. | processor cycles. | |||
Recently, the dual resource queue (DRQ) proposal [DRQ] has been made | ||||
on the premise that, as network processors become more cost | ||||
effective, per packet operations will become more complex | ||||
(irrespective of whether more function in the network layer is | ||||
desirable). Consequently the premise is that CPU congestion will | ||||
become more common. DRQ is a proposed modification to the RED | ||||
algorithm that folds both bit congestion and packet congestion into | ||||
one signal (either loss or ECN). | ||||
The problem of signalling packet processing congestion is not | The problem of signalling packet processing congestion is not | |||
pressing, as most if not all Internet resources are designed to be | pressing, as most Internet resources are designed to be bit- | |||
bit-congestible before packet processing starts to congest. However, | congestible before packet processing starts to congest. However, the | |||
given the IRTF ICCRG has set itself the task of reaching consensus on | IRTF Internet congestion control research group (ICCRG) has set | |||
generic forwarding mechanisms that are necessary and sufficient to | itself the task of reaching consensus on generic forwarding | |||
support the Internet's future congestion control requirements | mechanisms that are necessary and sufficient to support the | |||
[I-D.irtf-iccrg-welzl-congestion-control-open-research], we must not | Internet's future congestion control requirements (the first | |||
give this problem no thought at all, just because it is hard and | challenge in | |||
currently hypothetical. | [I-D.irtf-iccrg-welzl-congestion-control-open-research]). Therefore, | |||
rather than not giving this problem any thought at all, just because | ||||
it is hard and currently hypothetical, we defer the question of | ||||
whether packet congestion might become common and what to do if it | ||||
does to the IRTF (the 'Small Packets' challenge in | ||||
[I-D.irtf-iccrg-welzl-congestion-control-open-research]). | ||||
8. Security Considerations | 8. Security Considerations | |||
This draft recommends that queues do not bias drop probability | This draft recommends that queues do not bias drop probability | |||
towards small packets as this creates a perverse incentive for | towards small packets as this creates a perverse incentive for | |||
transports to break down their flows into tiny segments. One of the | transports to break down their flows into tiny segments. One of the | |||
benefits of implementing AQM was meant to be to remove this perverse | benefits of implementing AQM was meant to be to remove this perverse | |||
incentive that drop-tail queues gave to small packets. Of course, if | incentive that drop-tail queues gave to small packets. Of course, if | |||
transports really want to make the greatest gains, they don't have to | transports really want to make the greatest gains, they don't have to | |||
respond to congestion anyway. But we don't want applications that | respond to congestion anyway. But we don't want applications that | |||
skipping to change at page 27, line 38 | skipping to change at page 27, line 23 | |||
further helped survey the current status of RED implementation and | further helped survey the current status of RED implementation and | |||
deployment and, finally, thanks to the anonymous individuals who | deployment and, finally, thanks to the anonymous individuals who | |||
responded. | responded. | |||
11. Comments Solicited | 11. Comments Solicited | |||
Comments and questions are encouraged and very welcome. They can be | Comments and questions are encouraged and very welcome. They can be | |||
addressed to the IETF Transport Area working group mailing list | addressed to the IETF Transport Area working group mailing list | |||
<tsvwg@ietf.org>, and/or to the authors. | <tsvwg@ietf.org>, and/or to the authors. | |||
Editorial Comments | 12. References | |||
12.1. Normative References | ||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | ||||
Requirement Levels", BCP 14, RFC 2119, March 1997. | ||||
[RFC2309] Braden, B., Clark, D., Crowcroft, J., Davie, B., Deering, | ||||
S., Estrin, D., Floyd, S., Jacobson, V., Minshall, G., | ||||
Partridge, C., Peterson, L., Ramakrishnan, K., Shenker, | ||||
S., Wroclawski, J., and L. Zhang, "Recommendations on | ||||
Queue Management and Congestion Avoidance in the | ||||
Internet", RFC 2309, April 1998. | ||||
[RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition | ||||
of Explicit Congestion Notification (ECN) to IP", | ||||
RFC 3168, September 2001. | ||||
[RFC3426] Floyd, S., "General Architectural and Policy | ||||
Considerations", RFC 3426, November 2002. | ||||
[RFC5033] Floyd, S. and M. Allman, "Specifying New Congestion | ||||
Control Algorithms", BCP 133, RFC 5033, August 2007. | ||||
12.2. Informative References | ||||
[CCvarPktSize] | ||||
Widmer, J., Boutremans, C., and J-Y. Le Boudec, | ||||
"Congestion Control for Flows with Variable Packet Size", | ||||
ACM CCR 34(2) 137--151, 2004, | ||||
<http://doi.acm.org/10.1145/997150.997162>. | ||||
[DRQ] Shin, M., Chong, S., and I. Rhee, "Dual-Resource TCP/AQM | ||||
for Processing-Constrained Networks", IEEE/ACM | ||||
Transactions on Networking Vol 16, issue 2, April 2008, | ||||
<http://dx.doi.org/10.1109/TNET.2007.900415>. | ||||
[DupTCP] Wischik, D., "Short messages", Royal Society workshop on | ||||
networks: modelling and control , September 2007, <http:// | ||||
www.cs.ucl.ac.uk/staff/ucacdjw/Research/shortmsg.html>. | ||||
[ECNFixedWireless] | ||||
Siris, V., "Resource Control for Elastic Traffic in CDMA | ||||
Networks", Proc. ACM MOBICOM'02 , September 2002, <http:// | ||||
www.ics.forth.gr/netlab/publications/ | ||||
resource_control_elastic_cdma.html>. | ||||
[Evol_cc] Gibbens, R. and F. Kelly, "Resource pricing and the | ||||
evolution of congestion control", Automatica 35(12)1969-- | ||||
1985, December 1999, | ||||
<http://www.statslab.cam.ac.uk/~frank/evol.html>. | ||||
[I-D.eardley-pcn-marking-behaviour] | ||||
Eardley, P., "Marking behaviour of PCN-nodes", | ||||
draft-eardley-pcn-marking-behaviour-01 (work in progress), | ||||
June 2008. | ||||
[I-D.falk-xcp-spec] | ||||
Falk, A., "Specification for the Explicit Control Protocol | ||||
(XCP)", draft-falk-xcp-spec-03 (work in progress), | ||||
July 2007. | ||||
[I-D.floyd-tcpm-ackcc] | ||||
Floyd, S. and I. Property, "Adding Acknowledgement | ||||
Congestion Control to TCP", draft-floyd-tcpm-ackcc-02 | ||||
(work in progress), November 2007. | ||||
[I-D.ietf-tcpm-ecnsyn] | ||||
Floyd, S., "Adding Explicit Congestion Notification (ECN) | ||||
Capability to TCP's SYN/ACK Packets", | ||||
draft-ietf-tcpm-ecnsyn-05 (work in progress), | ||||
February 2008. | ||||
[I-D.ietf-tcpm-rfc2581bis] | ||||
Allman, M., "TCP Congestion Control", | ||||
draft-ietf-tcpm-rfc2581bis-03 (work in progress), | ||||
September 2007. | ||||
[I-D.irtf-iccrg-welzl-congestion-control-open-research] | ||||
Papadimitriou, D., "Open Research Issues in Internet | ||||
Congestion Control", | ||||
draft-irtf-iccrg-welzl-congestion-control-open-research-00 | ||||
(work in progress), July 2007. | ||||
[IOSArch] Bollapragada, V., White, R., and C. Murphy, "Inside Cisco | ||||
IOS Software Architecture", Cisco Press: CCIE Professional | ||||
Development ISBN13: 978-1-57870-181-0, July 2000. | ||||
[MulTCP] Crowcroft, J. and Ph. Oechslin, "Differentiated End to End | ||||
Internet Services using a Weighted Proportional Fair | ||||
Sharing TCP", CCR 28(3) 53--69, July 1998, <http:// | ||||
www.cs.ucl.ac.uk/staff/J.Crowcroft/hipparch/pricing.html>. | ||||
[PktSizeEquCC] | ||||
Vasallo, P., "Variable Packet Size Equation-Based | ||||
Congestion Control", ICSI Technical Report tr-00-008, | ||||
2000, <http://http.icsi.berkeley.edu/ftp/global/pub/ | ||||
techreports/2000/tr-00-008.pdf>. | ||||
[RED93] Floyd, S. and V. Jacobson, "Random Early Detection (RED) | ||||
gateways for Congestion Avoidance", IEEE/ACM Transactions | ||||
on Networking 1(4) 397--413, August 1993, | ||||
<http://www.icir.org/floyd/papers/red/red.html>. | ||||
[REDbias] Eddy, W. and M. Allman, "A Comparison of RED's Byte and | ||||
Packet Modes", Computer Networks 42(3) 261--280, | ||||
June 2003, | ||||
<http://www.ir.bbn.com/documents/articles/redbias.ps>. | ||||
[REDbyte] De Cnodder, S., Elloumi, O., and K. Pauwels, "RED behavior | ||||
with different packet sizes", Proc. 5th IEEE Symposium on | ||||
Computers and Communications (ISCC) 793--799, July 2000, | ||||
<http://www.icir.org/floyd/red/Elloumi99.pdf>. | ||||
[RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black, | ||||
"Definition of the Differentiated Services Field (DS | ||||
Field) in the IPv4 and IPv6 Headers", RFC 2474, | ||||
December 1998. | ||||
[RFC2581] Allman, M., Paxson, V., and W. Stevens, "TCP Congestion | ||||
Control", RFC 2581, April 1999. | ||||
[RFC3448] Handley, M., Floyd, S., Padhye, J., and J. Widmer, "TCP | ||||
Friendly Rate Control (TFRC): Protocol Specification", | ||||
RFC 3448, January 2003. | ||||
[RFC3714] Floyd, S. and J. Kempf, "IAB Concerns Regarding Congestion | ||||
Control for Voice Traffic in the Internet", RFC 3714, | ||||
March 2004. | ||||
[RFC4782] Floyd, S., Allman, M., Jain, A., and P. Sarolahti, "Quick- | ||||
Start for TCP and IP", RFC 4782, January 2007. | ||||
[RFC4828] Floyd, S. and E. Kohler, "TCP Friendly Rate Control | ||||
(TFRC): The Small-Packet (SP) Variant", RFC 4828, | ||||
April 2007. | ||||
[Rate_fair_Dis] | ||||
Briscoe, B., "Flow Rate Fairness: Dismantling a Religion", | ||||
ACM CCR 37(2)63--74, April 2007, | ||||
<http://portal.acm.org/citation.cfm?id=1232926>. | ||||
[Re-TCP] Briscoe, B., Jacquet, A., Moncaster, T., and A. Smith, | ||||
"Re-ECN: Adding Accountability for Causing Congestion to | ||||
TCP/IP", draft-briscoe-tsvwg-re-ecn-tcp-05 (work in | ||||
progress), January 2008. | ||||
[WindowPropFair] | ||||
Siris, V., "Service Differentiation and Performance of | ||||
Weighted Window-Based Congestion Control and Packet | ||||
Marking Algorithms in ECN Networks", Computer | ||||
Communications 26(4) 314--326, 2002, <http:// | ||||
www.ics.forth.gr/netgroup/publications/ | ||||
weighted_window_control.html>. | ||||
[gentle_RED] | ||||
Floyd, S., "Recommendation on using the "gentle_" variant | ||||
of RED", Web page , March 2000, | ||||
<http://www.icir.org/floyd/red/gentle.html>. | ||||
[pBox] Floyd, S. and K. Fall, "Promoting the Use of End-to-End | ||||
Congestion Control in the Internet", IEEE/ACM Transactions | ||||
on Networking 7(4) 458--472, August 1999, | ||||
<http://www.aciri.org/floyd/end2end-paper.html>. | ||||
[pktByteEmail] | ||||
Floyd, S., "RED: Discussions of Byte and Packet Modes", | ||||
email , March 1997, | ||||
<http://www-nrg.ee.lbl.gov/floyd/REDaveraging.txt>. | ||||
Editorial Comments | ||||
[Note_Variation] The algorithm of the byte-mode drop variant of RED | [Note_Variation] The algorithm of the byte-mode drop variant of RED | |||
switches off any bias towards small packets | switches off any bias towards small packets | |||
whenever the smoothed queue length dictates that | whenever the smoothed queue length dictates that | |||
the drop probability of large packets should be | the drop probability of large packets should be | |||
100%. In the example in the Introduction, as the | 100%. In the example in the Introduction, as the | |||
large packet drop probability varies around 25% the | large packet drop probability varies around 25% the | |||
small packet drop probability will vary around 1%, | small packet drop probability will vary around 1%, | |||
but with occasional jumps to 100% whenever the | but with occasional jumps to 100% whenever the | |||
instantaneous queue (after drop) manages to sustain | instantaneous queue (after drop) manages to sustain | |||
a length above the 100% drop point for longer than | a length above the 100% drop point for longer than | |||
skipping to change at page 32, line 49 | skipping to change at page 36, line 6 | |||
packets or across different size flows [Rate_fair_Dis]. Therefore | packets or across different size flows [Rate_fair_Dis]. Therefore | |||
policing would work naturally with just simple packet-mode drop in | policing would work naturally with just simple packet-mode drop in | |||
RED. | RED. | |||
In summary, making drop probability depend on the size of the packets | In summary, making drop probability depend on the size of the packets | |||
that bits happen to be divided into simply encourages the bits to be | that bits happen to be divided into simply encourages the bits to be | |||
divided into smaller packets. Byte-mode drop would therefore | divided into smaller packets. Byte-mode drop would therefore | |||
irreversibly complicate any attempt to fix the Internet's incentive | irreversibly complicate any attempt to fix the Internet's incentive | |||
structures. | structures. | |||
12. References | ||||
12.1. Normative References | ||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | ||||
Requirement Levels", BCP 14, RFC 2119, March 1997. | ||||
[RFC2309] Braden, B., Clark, D., Crowcroft, J., Davie, B., Deering, | ||||
S., Estrin, D., Floyd, S., Jacobson, V., Minshall, G., | ||||
Partridge, C., Peterson, L., Ramakrishnan, K., Shenker, | ||||
S., Wroclawski, J., and L. Zhang, "Recommendations on | ||||
Queue Management and Congestion Avoidance in the | ||||
Internet", RFC 2309, April 1998. | ||||
[RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black, | ||||
"Definition of the Differentiated Services Field (DS | ||||
Field) in the IPv4 and IPv6 Headers", RFC 2474, | ||||
December 1998. | ||||
[RFC2581] Allman, M., Paxson, V., and W. Stevens, "TCP Congestion | ||||
Control", RFC 2581, April 1999. | ||||
[RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition | ||||
of Explicit Congestion Notification (ECN) to IP", | ||||
RFC 3168, September 2001. | ||||
[RFC3426] Floyd, S., "General Architectural and Policy | ||||
Considerations", RFC 3426, November 2002. | ||||
[RFC3448] Handley, M., Floyd, S., Padhye, J., and J. Widmer, "TCP | ||||
Friendly Rate Control (TFRC): Protocol Specification", | ||||
RFC 3448, January 2003. | ||||
[RFC4828] Floyd, S. and E. Kohler, "TCP Friendly Rate Control | ||||
(TFRC): The Small-Packet (SP) Variant", RFC 4828, | ||||
April 2007. | ||||
[RFC5033] Floyd, S. and M. Allman, "Specifying New Congestion | ||||
Control Algorithms", BCP 133, RFC 5033, August 2007. | ||||
12.2. Informative References | ||||
[CCvarPktSize] | ||||
Widmer, J., Boutremans, C., and J-Y. Le Boudec, | ||||
"Congestion Control for Flows with Variable Packet Size", | ||||
ACM CCR 34(2) 137--151, 2004, | ||||
<http://doi.acm.org/10.1145/997150.997162>. | ||||
[DupTCP] Wischik, D., "Short messages", Royal Society workshop on | ||||
networks: modelling and control , September 2007, <http:// | ||||
www.cs.ucl.ac.uk/staff/ucacdjw/Research/shortmsg.html>. | ||||
[ECNFixedWireless] | ||||
Siris, V., "Resource Control for Elastic Traffic in CDMA | ||||
Networks", Proc. ACM MOBICOM'02 , September 2002, <http:// | ||||
www.ics.forth.gr/netlab/publications/ | ||||
resource_control_elastic_cdma.html>. | ||||
[Evol_cc] Gibbens, R. and F. Kelly, "Resource pricing and the | ||||
evolution of congestion control", Automatica 35(12)1969-- | ||||
1985, December 1999, | ||||
<http://www.statslab.cam.ac.uk/~frank/evol.html>. | ||||
[I-D.falk-xcp-spec] | ||||
Falk, A., "Specification for the Explicit Control Protocol | ||||
(XCP)", draft-falk-xcp-spec-03 (work in progress), | ||||
July 2007. | ||||
[I-D.floyd-tcpm-ackcc] | ||||
Floyd, S. and I. Property, "Adding Acknowledgement | ||||
Congestion Control to TCP", draft-floyd-tcpm-ackcc-02 | ||||
(work in progress), November 2007. | ||||
[I-D.ietf-pcn-architecture] | ||||
Eardley, P., "Pre-Congestion Notification Architecture", | ||||
draft-ietf-pcn-architecture-03 (work in progress), | ||||
February 2008. | ||||
[I-D.ietf-tcpm-ecnsyn] | ||||
Floyd, S., "Adding Explicit Congestion Notification (ECN) | ||||
Capability to TCP's SYN/ACK Packets", | ||||
draft-ietf-tcpm-ecnsyn-05 (work in progress), | ||||
February 2008. | ||||
[I-D.ietf-tcpm-rfc2581bis] | ||||
Allman, M., "TCP Congestion Control", | ||||
draft-ietf-tcpm-rfc2581bis-03 (work in progress), | ||||
September 2007. | ||||
[I-D.irtf-iccrg-welzl-congestion-control-open-research] | ||||
Papadimitriou, D., "Open Research Issues in Internet | ||||
Congestion Control", | ||||
draft-irtf-iccrg-welzl-congestion-control-open-research-00 | ||||
(work in progress), July 2007. | ||||
[IOSArch] Bollapragada, V., White, R., and C. Murphy, "Inside Cisco | ||||
IOS Software Architecture", Cisco Press: CCIE Professional | ||||
Development ISBN13: 978-1-57870-181-0, July 2000. | ||||
[MulTCP] Crowcroft, J. and Ph. Oechslin, "Differentiated End to End | ||||
Internet Services using a Weighted Proportional Fair | ||||
Sharing TCP", CCR 28(3) 53--69, July 1998, <http:// | ||||
www.cs.ucl.ac.uk/staff/J.Crowcroft/hipparch/pricing.html>. | ||||
[PCNcharter] | ||||
IETF, "Congestion and Pre-Congestion Notification (pcn)", | ||||
IETF w-g charter , Feb 2007, | ||||
<http://www.ietf.org/html.charters/pcn-charter.html>. | ||||
[PktSizeEquCC] | ||||
Vasallo, P., "Variable Packet Size Equation-Based | ||||
Congestion Control", ICSI Technical Report tr-00-008, | ||||
2000, <http://http.icsi.berkeley.edu/ftp/global/pub/ | ||||
techreports/2000/tr-00-008.pdf>. | ||||
[RED93] Floyd, S. and V. Jacobson, "Random Early Detection (RED) | ||||
gateways for Congestion Avoidance", IEEE/ACM Transactions | ||||
on Networking 1(4) 397--413, August 1993, | ||||
<http://www.icir.org/floyd/papers/red/red.html>. | ||||
[REDbias] Eddy, W. and M. Allman, "A Comparison of RED's Byte and | ||||
Packet Modes", Computer Networks 42(3) 261--280, | ||||
June 2003, | ||||
<http://www.ir.bbn.com/documents/articles/redbias.ps>. | ||||
[REDbyte] De Cnodder, S., Elloumi, O., and K. Pauwels, "RED behavior | ||||
with different packet sizes", Proc. 5th IEEE Symposium on | ||||
Computers and Communications (ISCC) 793--799, July 2000, | ||||
<http://www.icir.org/floyd/red/Elloumi99.pdf>. | ||||
[RFC3714] Floyd, S. and J. Kempf, "IAB Concerns Regarding Congestion | ||||
Control for Voice Traffic in the Internet", RFC 3714, | ||||
March 2004. | ||||
[RFC4782] Floyd, S., Allman, M., Jain, A., and P. Sarolahti, "Quick- | ||||
Start for TCP and IP", RFC 4782, January 2007. | ||||
[Rate_fair_Dis] | ||||
Briscoe, B., "Flow Rate Fairness: Dismantling a Religion", | ||||
ACM CCR 37(2)63--74, April 2007, | ||||
<http://portal.acm.org/citation.cfm?id=1232926>. | ||||
[Re-TCP] Briscoe, B., Jacquet, A., Moncaster, T., and A. Smith, | ||||
"Re-ECN: Adding Accountability for Causing Congestion to | ||||
TCP/IP", draft-briscoe-tsvwg-re-ecn-tcp-05 (work in | ||||
progress), January 2008. | ||||
[WindowPropFair] | ||||
Siris, V., "Service Differentiation and Performance of | ||||
Weighted Window-Based Congestion Control and Packet | ||||
Marking Algorithms in ECN Networks", Computer | ||||
Communications 26(4) 314--326, 2002, <http:// | ||||
www.ics.forth.gr/netgroup/publications/ | ||||
weighted_window_control.html>. | ||||
[gentle_RED] | ||||
Floyd, S., "Recommendation on using the "gentle_" variant | ||||
of RED", Web page , March 2000, | ||||
<http://www.icir.org/floyd/red/gentle.html>. | ||||
[pBox] Floyd, S. and K. Fall, "Promoting the Use of End-to-End | ||||
Congestion Control in the Internet", IEEE/ACM Transactions | ||||
on Networking 7(4) 458--472, August 1999, | ||||
<http://www.aciri.org/floyd/end2end-paper.html>. | ||||
[pktByteEmail] | ||||
Floyd, S., "RED: Discussions of Byte and Packet Modes", | ||||
email , March 1997, | ||||
<http://www-nrg.ee.lbl.gov/floyd/REDaveraging.txt>. | ||||
Author's Address | Author's Address | |||
Bob Briscoe | Bob Briscoe | |||
BT & UCL | BT & UCL | |||
B54/77, Adastral Park | B54/77, Adastral Park | |||
Martlesham Heath | Martlesham Heath | |||
Ipswich IP5 3RE | Ipswich IP5 3RE | |||
UK | UK | |||
Phone: +44 1473 645196 | Phone: +44 1473 645196 | |||
skipping to change at page 37, line 45 | skipping to change at page 37, line 45 | |||
such proprietary rights by implementers or users of this | such proprietary rights by implementers or users of this | |||
specification can be obtained from the IETF on-line IPR repository at | specification can be obtained from the IETF on-line IPR repository at | |||
http://www.ietf.org/ipr. | http://www.ietf.org/ipr. | |||
The IETF invites any interested party to bring to its attention any | The IETF invites any interested party to bring to its attention any | |||
copyrights, patents or patent applications, or other proprietary | copyrights, patents or patent applications, or other proprietary | |||
rights that may cover technology that may be required to implement | rights that may cover technology that may be required to implement | |||
this standard. Please address the information to the IETF at | this standard. Please address the information to the IETF at | |||
ietf-ipr@ietf.org. | ietf-ipr@ietf.org. | |||
Acknowledgments | Acknowledgment | |||
Funding for the RFC Editor function is provided by the IETF | This document was produced using xml2rfc v1.33 (of | |||
Administrative Support Activity (IASA). This document was produced | http://xml.resource.org/) from a source in RFC-2629 XML format. | |||
using xml2rfc v1.32 (of http://xml.resource.org/) from a source in | ||||
RFC-2629 XML format. | ||||
End of changes. 31 change blocks. | ||||
232 lines changed or deleted | 266 lines changed or added | |||
This html diff was produced by rfcdiff 1.35. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |