From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from iramx2.ira.uni-karlsruhe.de (iramx2.ira.uni-karlsruhe.de [IPv6:2a00:1398:2::10:81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.bufferbloat.net (Postfix) with ESMTPS id E18803B29E; Wed, 7 Jul 2021 18:19:20 -0400 (EDT) Received: from i72vorta.tm.uni-karlsruhe.de ([141.3.71.26] helo=i72vorta.tm.kit.edu) by iramx2.ira.uni-karlsruhe.de with esmtpsa port 25 iface 141.3.10.8 id 1m1Fsz-0005oq-PJ; Thu, 08 Jul 2021 00:19:17 +0200 Received: from [IPv6:::1] (localhost [127.0.0.1]) by i72vorta.tm.kit.edu (Postfix) with ESMTPS id 7DE1D420278; Thu, 8 Jul 2021 00:19:17 +0200 (CEST) To: Matt Mathis , Dave Taht Cc: "cerowrt-devel@lists.bufferbloat.net" , bloat References: <55fdf513-9c54-bea9-1f53-fe2c5229d7ba@eggo.org> <871t4as1h9.fsf@toke.dk> <3D32F19B-5DEA-48AD-97E7-D043C4EAEC51@gmail.com> <1465267957.902610235@apps.rackspace.com> <20210702095924.0427b579@hermes.local> From: "Bless, Roland (TM)" Organization: Institute of Telematics, Karlsruhe Institute of Technology (KIT) Message-ID: <1bab95a0-7904-2807-02fe-62674c19948f@kit.edu> Date: Thu, 8 Jul 2021 00:19:17 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/alternative; boundary="------------AAE78A179BEA08938A117E1A" Content-Language: en-US X-ATIS-AV: ClamAV (iramx2.ira.uni-karlsruhe.de) X-ATIS-Checksum: v3zoCAcc32ckk X-ATIS-Timestamp: iramx2.ira.uni-karlsruhe.de esmtpsa 1625696357.865932986 Subject: [Bloat] Abandoning Window-based CC Considered Harmful (was Re: Bechtolschiem) X-BeenThere: bloat@lists.bufferbloat.net X-Mailman-Version: 2.1.20 Precedence: list List-Id: General list for discussing Bufferbloat List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Jul 2021 22:19:21 -0000 This is a multi-part message in MIME format. --------------AAE78A179BEA08938A117E1A Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: quoted-printable Hi Matt, [sorry for the late reply, overlooked this one] please, see comments inline. On 02.07.21 at 21:46 Matt Mathis via Bloat wrote: > The argument is absolutely correct for Reno, CUBIC and all=20 > other=C2=A0self-clocked protocols.=C2=A0 One of the core assumptions in= =20 > Jacobson88, was that the clock=C2=A0for the entire system comes from=20 > packets draining through the bottleneck queue.=C2=A0 In this world, the= =20 > clock is intrinsically brittle if the buffers=C2=A0are too small.=C2=A0= The=20 > drain time needs to be a substantial fraction of the RTT. I'd like to separate the functions here a bit: 1) "automatic pacing" by ACK clocking 2) congestion-window-based operation I agree that the automatic pacing generated by the ACK clock (function=20 1) is increasingly distorted these days and may consequently cause micro bursts. This can be mitigated by using paced sending, which I consider very usefu= l. However, I consider abandoning the (congestion) window-based approaches with ACK feedback (function 2) as harmful: a congestion window has an automatic self-stabilizing property since the = ACK feedback reflects also the queuing delay and the congestion window limits the amount of=20 inflight data. In contrast, rate-based senders risk instability: two senders in an=20 M/D/1 setting, each sender sending with 50% bottleneck rate in average, both using paced sending at 120% of the=20 average rate, suffice to cause instability (queue grows unlimited). IMHO, two approaches seem to be useful: a) congestion-window-based operation with paced sending b) rate-based/paced sending with limiting the amount of inflight data > > However, we have reached the point where=C2=A0we need to discard that=20 > requirement.=C2=A0 One of the side points of BBR is that in many=20 > environments it is cheaper to burn serving CPU to pace into short=20 > queue networks than it is to "right size" the network=C2=A0queues. > > The fundamental problem with the old=C2=A0way is that in some contexts = the=20 > buffer memory has to beat Moore's law, because to maintain constant=20 > drain time the memory=C2=A0size and BW both have to scale with the link= =20 > (laser) BW. > > See the slides I gave at the=C2=A0Stanford Buffer Sizing workshop decem= ber=20 > 2019: Buffer Sizing: Position Paper=20 > =20 > > Thanks for the pointer. I don't quite get the point that the buffer must = have a certain size to keep the ACK clock stable: in case of an non application-limited sender, a very small buffer=20 suffices to let the ACK clock run steady. The large buffers were mainly required for loss-based CCs to = let the standing queue build up that keeps the bottleneck busy during CWnd reduction after=20 packet loss, thereby keeping the (bottleneck link) utilization high. Regards, =C2=A0Roland > Note that we are talking about DC and Internet core.=C2=A0 At the edge,= BW=20 > is low enough where memory is relatively cheap. =C2=A0In some sense BB = came=20 > about because memory is too cheap in these environments. > > Thanks, > --MM-- > The best way to predict the future is to create it. =C2=A0- Alan Kay > > We must not tolerate intolerance; > =C2=A0 =C2=A0 =C2=A0 =C2=A0however our response must be carefully measu= red: > =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 too strong would be hypocriti= cal and risks spiraling out=20 > of control; > =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 too weak risks being mistaken= for tacit approval. > > > On Fri, Jul 2, 2021 at 9:59 AM Stephen Hemminger=20 > > wrote:= > > On Fri, 2 Jul 2021 09:42:24 -0700 > Dave Taht > wrote:= > > > "Debunking Bechtolsheim credibly would get a lot of attention to = the > > bufferbloat cause, I suspect." - dpreed > > > > "Why Big Data Needs Big Buffer Switches" - > > > http://www.arista.com/assets/data/pdf/Whitepapers/BigDataBigBuffers= -WP.pdf > > > > > Also, a lot depends on the TCP congestion control algorithm being > used. > They are using NewReno which only researchers use in real life. > > Even TCP Cubic has gone through several revisions. In my > experience, the > NS-2 models don't correlate well to real world behavior. > > In real world tests, TCP Cubic will consume any buffer it sees at a= > congested link. Maybe that is what they mean by capture effect. > > There is also a weird oscillation effect with multiple streams, > where one > flow will take the buffer, then see a packet loss and back off, the= > other flow will take over the buffer until it sees loss. > > _______________________________________________ > > _______________________________________________ --------------AAE78A179BEA08938A117E1A Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: 8bit
Hi Matt,

[sorry for the late reply, overlooked this one]

please, see comments inline.

On 02.07.21 at 21:46 Matt Mathis via Bloat wrote:
The argument is absolutely correct for Reno, CUBIC and all other self-clocked protocols.  One of the core assumptions in Jacobson88, was that the clock for the entire system comes from packets draining through the bottleneck queue.  In this world, the clock is intrinsically brittle if the buffers are too small.  The drain time needs to be a substantial fraction of the RTT.
I'd like to separate the functions here a bit:

1) "automatic pacing" by ACK clocking

2) congestion-window-based operation

I agree that the automatic pacing generated by the ACK clock (function 1) is increasingly
distorted these days and may consequently cause micro bursts.
This can be mitigated by using paced sending, which I consider very useful.
However, I consider abandoning the (congestion) window-based approaches
with ACK feedback (function 2) as harmful:
a congestion window has an automatic self-stabilizing property since the ACK feedback reflects
also the queuing delay and the congestion window limits the amount of inflight data.
In contrast, rate-based senders risk instability: two senders in an M/D/1 setting, each sender sending with 50%
bottleneck rate in average, both using paced sending at 120% of the average rate, suffice to cause
instability (queue grows unlimited).

IMHO, two approaches seem to be useful:
a) congestion-window-based operation with paced sending
b) rate-based/paced sending with limiting the amount of inflight data


However, we have reached the point where we need to discard that requirement.  One of the side points of BBR is that in many environments it is cheaper to burn serving CPU to pace into short queue networks than it is to "right size" the network queues.

The fundamental problem with the old way is that in some contexts the buffer memory has to beat Moore's law, because to maintain constant drain time the memory size and BW both have to scale with the link (laser) BW.

See the slides I gave at the Stanford Buffer Sizing workshop december 2019: Buffer Sizing: Position Paper 

Thanks for the pointer. I don't quite get the point that the buffer must have a certain size to keep the ACK clock stable:
in case of an non application-limited sender, a very small buffer suffices to let the ACK clock
run steady. The large buffers were mainly required for loss-based CCs to let the standing queue
build up that keeps the bottleneck busy during CWnd reduction after packet loss, thereby
keeping the (bottleneck link) utilization high.

Regards,

 Roland


Note that we are talking about DC and Internet core.  At the edge, BW is low enough where memory is relatively cheap.   In some sense BB came about because memory is too cheap in these environments.

Thanks,
--MM--
The best way to predict the future is to create it.  - Alan Kay

We must not tolerate intolerance;
       however our response must be carefully measured: 
            too strong would be hypocritical and risks spiraling out of control;
            too weak risks being mistaken for tacit approval.


On Fri, Jul 2, 2021 at 9:59 AM Stephen Hemminger <stephen@networkplumber.org> wrote:
On Fri, 2 Jul 2021 09:42:24 -0700
Dave Taht <dave.taht@gmail.com> wrote:

> "Debunking Bechtolsheim credibly would get a lot of attention to the
> bufferbloat cause, I suspect." - dpreed
>
> "Why Big Data Needs Big Buffer Switches" -
> http://www.arista.com/assets/data/pdf/Whitepapers/BigDataBigBuffers-WP.pdf
>

Also, a lot depends on the TCP congestion control algorithm being used.
They are using NewReno which only researchers use in real life.

Even TCP Cubic has gone through several revisions. In my experience, the
NS-2 models don't correlate well to real world behavior.

In real world tests, TCP Cubic will consume any buffer it sees at a
congested link. Maybe that is what they mean by capture effect.

There is also a weird oscillation effect with multiple streams, where one
flow will take the buffer, then see a packet loss and back off, the
other flow will take over the buffer until it sees loss.

_______________________________________________
_______________________________________________

--------------AAE78A179BEA08938A117E1A--