From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-wi0-x235.google.com (mail-wi0-x235.google.com [IPv6:2a00:1450:400c:c05::235]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by huchra.bufferbloat.net (Postfix) with ESMTPS id 1E91E21F383; Fri, 12 Jun 2015 06:00:37 -0700 (PDT) Received: by wiga1 with SMTP id a1so16782516wig.0; Fri, 12 Jun 2015 06:00:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=BoqHimoHP3IDnbKXPJIpKR/a9IOpzgX+lfiPDIZ+kPs=; b=LMP15GkflH0HT0/bAaNfcL2wUrQvD+EGOLSXyOjmv7y7DDZgikEiDY7zmNmpWfTAeF dA5ih0HrsslijWM/XpfnpOK89eOYKdCdWnsG4Dh/6XQus6exzGxDzAiS8VhPCQKb8N1S Xw2TvffI+FftjK92QvFbG/sGZFCx5bFDTYAxeX4IxNsRh2xB0g/rJmuaSviWFFJ/DWfx 0xx5Ej1otxi91LSqNXrYAdNsIZjEwjEVQUhiq0VSUDT/KwGTXf3bMwSwSPFRAo9W+h+C yhsT3K0dQ83l8hXDukREPzN/xVH7gwjQhB/nIhVTXV7Me/yHgJWC2f3wukz7ORHYzZVg 6i3A== X-Received: by 10.194.76.132 with SMTP id k4mr25786044wjw.77.1434114035907; Fri, 12 Jun 2015 06:00:35 -0700 (PDT) Received: from volcano.localdomain (host-89-243-102-33.as13285.net. [89.243.102.33]) by mx.google.com with ESMTPSA id f8sm2661308wiy.7.2015.06.12.06.00.34 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 12 Jun 2015 06:00:34 -0700 (PDT) Message-ID: <557AD7F1.1000808@gmail.com> Date: Fri, 12 Jun 2015 14:00:33 +0100 From: Alan Jenkins User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.7.0 MIME-Version: 1.0 To: Sebastian Moeller , David Lang References: <5578DEE8.6090209@gmail.com> <2ACEC68A-3795-4F7C-BA0F-FBDBA3732566@gmx.de> In-Reply-To: <2ACEC68A-3795-4F7C-BA0F-FBDBA3732566@gmx.de> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Cc: cake@lists.bufferbloat.net, Daniel Havey , "cerowrt-devel@lists.bufferbloat.net" , bloat Subject: Re: [Cerowrt-devel] [Bloat] [Cake] active sensing queue management X-BeenThere: cerowrt-devel@lists.bufferbloat.net X-Mailman-Version: 2.1.13 Precedence: list List-Id: Development issues regarding the cerowrt test router project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 12 Jun 2015 13:01:14 -0000 On 12/06/15 02:44, David Lang wrote: > On Thu, 11 Jun 2015, Sebastian Moeller wrote: > >> >> On Jun 11, 2015, at 03:05 , Alan Jenkins >> wrote: >> >>> On 10/06/15 21:54, Sebastian Moeller wrote: >>> >>> One solution would be if ISPs made sure upload is 100% provisioned. >>> Could be cheaper than for (the higher rate) download. >> >> Not going to happen, in my opinion, as economically unfeasible >> for a publicly traded ISP. I would settle for that approach as long >> as the ISP is willing to fix its provisioning so that >> oversubscription episodes are reasonable rare, though. > > not going to happen on any network, publicly traded or not. Sure, I'm flailing. Note this was in the context of AQSM as Daniel describes it. (Possibly misnamed given it only drops. All the queuing is "underneath" AQSM, "in the MAC layer" as the paper says :). - AQSM isn't distinguishing up/down bloat. When it detects bloat it has to limit both directions in equal proportion. => if there is upload contention (and your user is uploading), you may hurt apps sensitive to download bandwidth (streaming video), when you don't need to. What would the solutions look like? i) If contention in one direction was negligible, you could limit the other direction only. Consumer connections are highly asymmetric, and AQSM is only measuring the first IP hop. So it's more feasible than 100% in both directions. And this isn't about core networks (with larger statistical universes... whether that helps or not). I'm sure you're right and they're not asymmetric _enough_. ii) Sebastian points out if you implement AQSM in the modem (as the paper claims :p), you may as well BQL the modem drivers and run AQM. *But that doesn't work on ingress* - ingress requires tbf/htb with a set rate - but the achievable rate is lower in peak hours. So run AQSM on ingress only! Point being that download bloat could be improved without changing the other end (CMTS). > > The question is not "can the theoretical max of all downstream devices > exceed the upstream bandwidth" because that answer is going to be > "yes" for every network built, LAN or WAN, but rather "does the demand > in practice of the combined downstream devices exceed the upstream > bandwidth for long enough to be a problem" > > it's not even a matter of what percentage are they oversubscribed. > > someone with 100 1.5Mb DSL lines downstream and a 50Mb upstream (30% > of theoretical requirements) is probably a lot worse than someone with > 100 1G lines downstream and a 10G upstream (10% of theoretical > requirements) because it's far less likely that the users of the 1G > lines are actually going to saturate them (let alone simultaniously > for a noticable timeframe), while it's very likely that the users of > the 1.5M DSL lines are going to saturate their lines for extended > timeframes. > > The problem shows up when either usage changes rapidly, or the network > operator is not keeping up with required upgrades as gradual usage > changes happen (including when they are prevented from upgrading > because a peer won't cooperate) > > As for the "100% provisioning" ideal, think through the theoretical > aggregate and realize that before you get past very many layers, you > get to a bandwidh requirement that it's not technically possible to > provide. > > David Lang