From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from iramx2.ira.uni-karlsruhe.de (iramx2.ira.uni-karlsruhe.de [IPv6:2a00:1398:2::10:81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.bufferbloat.net (Postfix) with ESMTPS id D15A83B2A4; Thu, 8 Jul 2021 07:24:56 -0400 (EDT) Received: from i72vorta.tm.uni-karlsruhe.de ([141.3.71.26] helo=i72vorta.tm.kit.edu) by iramx2.ira.uni-karlsruhe.de with esmtpsa port 25 iface 141.3.10.8 id 1m1S9E-0002Hj-Fu; Thu, 08 Jul 2021 13:24:52 +0200 Received: from [IPv6:::1] (localhost [127.0.0.1]) by i72vorta.tm.kit.edu (Postfix) with ESMTPS id 425694203BE; Thu, 8 Jul 2021 13:24:52 +0200 (CEST) To: Matt Mathis Cc: Dave Taht , "cerowrt-devel@lists.bufferbloat.net" , bloat References: <55fdf513-9c54-bea9-1f53-fe2c5229d7ba@eggo.org> <871t4as1h9.fsf@toke.dk> <3D32F19B-5DEA-48AD-97E7-D043C4EAEC51@gmail.com> <1465267957.902610235@apps.rackspace.com> <20210702095924.0427b579@hermes.local> <1bab95a0-7904-2807-02fe-62674c19948f@kit.edu> From: "Bless, Roland (TM)" Organization: Institute of Telematics, Karlsruhe Institute of Technology (KIT) Message-ID: <393e9ca6-f9f3-1826-9fbc-6d36871223d8@kit.edu> Date: Thu, 8 Jul 2021 13:24:51 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/alternative; boundary="------------4310C29B69059B094AF207CE" Content-Language: en-US X-ATIS-AV: ClamAV (iramx2.ira.uni-karlsruhe.de) X-ATIS-Checksum: v3zoCAcc32ckk X-ATIS-Timestamp: iramx2.ira.uni-karlsruhe.de esmtpsa 1625743492.575935643 Subject: Re: [Bloat] Abandoning Window-based CC Considered Harmful (was Re: Bechtolschiem) X-BeenThere: bloat@lists.bufferbloat.net X-Mailman-Version: 2.1.20 Precedence: list List-Id: General list for discussing Bufferbloat List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Jul 2021 11:24:57 -0000 This is a multi-part message in MIME format. --------------4310C29B69059B094AF207CE Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: quoted-printable Hi Matt, On 08.07.21 at 00:38 Matt Mathis wrote: > Actually BBR does have a window based backup, which normally only=20 > comes into play during load spikes and at very short RTTs.=C2=A0 =C2=A0= It=20 > defaults to 2*minRTT*maxBW, which is twice the steady state window in=20 > it's normal paced mode. So yes, BBR follows option b), but I guess that you are referring to=20 BBRv1 here. We have shown in [1, Sec.III] that BBRv1 flows will *always* run=20 (conceptually) toward their above quoted inflight-cap of 2*minRTT*maxBW, if more than one BBR flow is present at the bottleneck.=20 So strictly speaking " which *normally only* comes into play during load spikes and at very short RTTs" isn't true for=20 multiple BBRv1 flows. It seems that in BBRv2 there are many more mechanisms present that try to control the amount of inflight data more tightly and the new = "cap" is at 1.25 BDP. > This is too large for short queue routers in the Internet core, but it = > helps a lot with cross traffic on large queue edge routers. Best regards, =C2=A0Roland [1] https://ieeexplore.ieee.org/document/8117540 > > On Wed, Jul 7, 2021 at 3:19 PM Bless, Roland (TM)=20 > > wrote: > > Hi Matt, > > [sorry for the late reply, overlooked this one] > > please, see comments inline. > > On 02.07.21 at 21:46 Matt Mathis via Bloat wrote: >> The argument is absolutely correct for Reno, CUBIC and all >> other=C2=A0self-clocked protocols.=C2=A0 One of the core assumptio= ns in >> Jacobson88, was that the clock=C2=A0for the entire system comes fr= om >> packets draining through the bottleneck queue.=C2=A0 In this world= , >> the clock is intrinsically brittle if the buffers=C2=A0are too sma= ll. >> The drain time needs to be a substantial fraction of the RTT. > I'd like to separate the functions here a bit: > > 1) "automatic pacing" by ACK clocking > > 2) congestion-window-based operation > > I agree that the automatic pacing generated by the ACK clock > (function 1) is increasingly > distorted these days and may consequently cause micro bursts. > This can be mitigated by using paced sending, which I consider > very useful. > However, I consider abandoning the (congestion) window-based > approaches > with ACK feedback (function 2) as harmful: > a congestion window has an automatic self-stabilizing property > since the ACK feedback reflects > also the queuing delay and the congestion window limits the amount > of inflight data. > In contrast, rate-based senders risk instability: two senders in > an M/D/1 setting, each sender sending with 50% > bottleneck rate in average, both using paced sending at 120% of > the average rate, suffice to cause > instability (queue grows unlimited). > > IMHO, two approaches seem to be useful: > a) congestion-window-based operation with paced sending > b) rate-based/paced sending with limiting the amount of inflight da= ta > >> >> However, we have reached the point where=C2=A0we need to discard t= hat >> requirement.=C2=A0 One of the side points of BBR is that in many >> environments it is cheaper to burn serving CPU to pace into short >> queue networks than it is to "right size" the network=C2=A0queues.= >> >> The fundamental problem with the old=C2=A0way is that in some cont= exts >> the buffer memory has to beat Moore's law, because to maintain >> constant drain time the memory=C2=A0size and BW both have to scale= >> with the link (laser) BW. >> >> See the slides I gave at the=C2=A0Stanford Buffer Sizing workshop >> december 2019: Buffer Sizing: Position Paper >> >> >> > Thanks for the pointer. I don't quite get the point that the > buffer must have a certain size to keep the ACK clock stable: > in case of an non application-limited sender, a very small buffer > suffices to let the ACK clock > run steady. The large buffers were mainly required for loss-based > CCs to let the standing queue > build up that keeps the bottleneck busy during CWnd reduction > after packet loss, thereby > keeping the (bottleneck link) utilization high. > > Regards, > > =C2=A0Roland > > >> Note that we are talking about DC and Internet core.=C2=A0 At the >> edge, BW is low enough where memory is relatively cheap.=C2=A0 =C2= =A0In >> some sense BB came about because memory is too cheap in these >> environments. >> >> Thanks, >> --MM-- >> The best way to predict the future is to create it. =C2=A0- Alan K= ay >> >> We must not tolerate intolerance; >> =C2=A0 =C2=A0 =C2=A0 =C2=A0however our response must be carefully = measured: >> =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 too strong would be hypo= critical and risks spiraling >> out of control; >> =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 too weak risks being mis= taken for tacit approval. >> >> >> On Fri, Jul 2, 2021 at 9:59 AM Stephen Hemminger >> > >> wrote: >> >> On Fri, 2 Jul 2021 09:42:24 -0700 >> Dave Taht > >> wrote: >> >> > "Debunking Bechtolsheim credibly would get a lot of >> attention to the >> > bufferbloat cause, I suspect." - dpreed >> > >> > "Why Big Data Needs Big Buffer Switches" - >> > >> http://www.arista.com/assets/data/pdf/Whitepapers/BigDataBigBu= ffers-WP.pdf >> >> > >> >> Also, a lot depends on the TCP congestion control algorithm >> being used. >> They are using NewReno which only researchers use in real life= =2E >> >> Even TCP Cubic has gone through several revisions. In my >> experience, the >> NS-2 models don't correlate well to real world behavior. >> >> In real world tests, TCP Cubic will consume any buffer it >> sees at a >> congested link. Maybe that is what they mean by capture effect= =2E >> >> There is also a weird oscillation effect with multiple >> streams, where one >> flow will take the buffer, then see a packet loss and back >> off, the >> other flow will take over the buffer until it sees loss. >> >> _______________________________________________ >> >> _______________________________________________ > --------------4310C29B69059B094AF207CE Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: 8bit
Hi Matt,

On 08.07.21 at 00:38 Matt Mathis wrote:
Actually BBR does have a window based backup, which normally only comes into play during load spikes and at very short RTTs.   It defaults to 2*minRTT*maxBW, which is twice the steady state window in it's normal paced mode.

So yes, BBR follows option b), but I guess that you are referring to BBRv1 here.
We have shown in [1, Sec.III] that BBRv1 flows will always run (conceptually) toward their above quoted inflight-cap of
2*minRTT*maxBW, if more than one BBR flow is present at the bottleneck. So strictly speaking " which normally only comes
into play during load spikes and at very short RTTs" isn't true for multiple BBRv1 flows.

It seems that in BBRv2 there are many more mechanisms present
that try to control the amount of inflight data more tightly and the new "cap"
is at 1.25 BDP.

This is too large for short queue routers in the Internet core, but it helps a lot with cross traffic on large queue edge routers.

Best regards,
 Roland

[1] https://ieeexplore.ieee.org/document/8117540


On Wed, Jul 7, 2021 at 3:19 PM Bless, Roland (TM) <roland.bless@kit.edu> wrote:
Hi Matt,

[sorry for the late reply, overlooked this one]

please, see comments inline.

On 02.07.21 at 21:46 Matt Mathis via Bloat wrote:
The argument is absolutely correct for Reno, CUBIC and all other self-clocked protocols.  One of the core assumptions in Jacobson88, was that the clock for the entire system comes from packets draining through the bottleneck queue.  In this world, the clock is intrinsically brittle if the buffers are too small.  The drain time needs to be a substantial fraction of the RTT.
I'd like to separate the functions here a bit:

1) "automatic pacing" by ACK clocking

2) congestion-window-based operation

I agree that the automatic pacing generated by the ACK clock (function 1) is increasingly
distorted these days and may consequently cause micro bursts.
This can be mitigated by using paced sending, which I consider very useful.
However, I consider abandoning the (congestion) window-based approaches
with ACK feedback (function 2) as harmful:
a congestion window has an automatic self-stabilizing property since the ACK feedback reflects
also the queuing delay and the congestion window limits the amount of inflight data.
In contrast, rate-based senders risk instability: two senders in an M/D/1 setting, each sender sending with 50%
bottleneck rate in average, both using paced sending at 120% of the average rate, suffice to cause
instability (queue grows unlimited).

IMHO, two approaches seem to be useful:
a) congestion-window-based operation with paced sending
b) rate-based/paced sending with limiting the amount of inflight data


However, we have reached the point where we need to discard that requirement.  One of the side points of BBR is that in many environments it is cheaper to burn serving CPU to pace into short queue networks than it is to "right size" the network queues.

The fundamental problem with the old way is that in some contexts the buffer memory has to beat Moore's law, because to maintain constant drain time the memory size and BW both have to scale with the link (laser) BW.

See the slides I gave at the Stanford Buffer Sizing workshop december 2019: Buffer Sizing: Position Paper 

Thanks for the pointer. I don't quite get the point that the buffer must have a certain size to keep the ACK clock stable:
in case of an non application-limited sender, a very small buffer suffices to let the ACK clock
run steady. The large buffers were mainly required for loss-based CCs to let the standing queue
build up that keeps the bottleneck busy during CWnd reduction after packet loss, thereby
keeping the (bottleneck link) utilization high.

Regards,

 Roland


Note that we are talking about DC and Internet core.  At the edge, BW is low enough where memory is relatively cheap.   In some sense BB came about because memory is too cheap in these environments.

Thanks,
--MM--
The best way to predict the future is to create it.  - Alan Kay

We must not tolerate intolerance;
       however our response must be carefully measured: 
            too strong would be hypocritical and risks spiraling out of control;
            too weak risks being mistaken for tacit approval.


On Fri, Jul 2, 2021 at 9:59 AM Stephen Hemminger <stephen@networkplumber.org> wrote:
On Fri, 2 Jul 2021 09:42:24 -0700
Dave Taht <dave.taht@gmail.com> wrote:

> "Debunking Bechtolsheim credibly would get a lot of attention to the
> bufferbloat cause, I suspect." - dpreed
>
> "Why Big Data Needs Big Buffer Switches" -
> http://www.arista.com/assets/data/pdf/Whitepapers/BigDataBigBuffers-WP.pdf
>

Also, a lot depends on the TCP congestion control algorithm being used.
They are using NewReno which only researchers use in real life.

Even TCP Cubic has gone through several revisions. In my experience, the
NS-2 models don't correlate well to real world behavior.

In real world tests, TCP Cubic will consume any buffer it sees at a
congested link. Maybe that is what they mean by capture effect.

There is also a weird oscillation effect with multiple streams, where one
flow will take the buffer, then see a packet loss and back off, the
other flow will take over the buffer until it sees loss.

_______________________________________________
_______________________________________________


--------------4310C29B69059B094AF207CE--