Hi,
Thank you Chris for emphasizing that congestion control is hard and more reference may be necessary. And as the the follow-up of my comments in the interim meeting, I would like to make my question more clear: In congestion control of layer 4, it is assumed that there is a bottleneck in the network, and the ideal rate of the transmitters equals to a fair share of the bandwidth in the bottleneck. The flows in the network change all the time and so as to the ideal transmitting rate. There are some methods to detect the bottleneck, for example detecting packet loss, setting ECN, RTT and so on. Considering that the goal of cc is to maximize the throughput and minimize the queuing delay, the throughput and delay could be used to compare different cc algorithms. The problem of mine is that for CC of ISIS flooding, where is the bottleneck?(maybe the receiver capability) What method of detecting could be used? (In my understanding, we have two options at this stage: one from the receiver side and the other from the transmitter side) What is the criteria of comparing? (still a little confusing for me ) Best Regards Xuesong -----Original Message----- From: Lsr [mailto:lsr-boun...@ietf.org] On Behalf Of Christian Hopps Sent: Wednesday, April 29, 2020 8:24 PM To: lsr@ietf.org Cc: cho...@chopps.org Subject: [Lsr] Congestion (flow) control thoughts. [As WG member] I like the start these drafts are making, I have a few thoughts. - I think its worthwhile work and as a WG we should end up adopting a draft or drafts that try to solve the problem. - Congestion control is hard, and a very well studied problem, as such whatever we end up should reference prior-art to justify it's claims. - Data, whatever solution we end up with needs to have data to back up it's claims. ** draft-ginsberg-lsr-isis-flooding-scale Having just recently offered a, "CC algorithm is local so we aren't specifying it", in some unrelated work, I discovered (correctly so) that it was not sufficient (see [*] for the resulting changes if curious). One needs to provide (doesn't need to be normative) a working algorithm to prove that the protocol is providing enough information to the transmitter to actually implement a viable CC algorithm. Now draft-ginsberg does suggest an algorithm, however only for P2P. We need to address LAN as well. This also needs references on how this algorithm relates to existing studied work, and perhaps most importantly some data showing that it actually works. Without this it will almost for sure not clear the IESG (in particular Transport AD review), and rightly so. :) ** draft-decraene-lsr-isis-flooding-speed-03 I read this draft as providing feedback to transmitters on ways to modify the parameters of their CC algorithm. It doesn't actually seem in conflict with draft-ginsberg (or doesn't need to be) to me. I believe it's following the path of least resistance in utilizing existing IS-IS parameters. I wonder if we could be more adventurous here. ** Both Both drafts mention trying to increase the ACK rate. I think we need to look deeply into this, as this is critical information for CC algorithms. It very well could be that we do not need protocol changes as the protocol provides an ACK (or NACK for LANs), but I also don't think changes or additions should be verboten either if they could provide significant improvements. In the algorithms we propose or envision we need to be considering the affect of larger RTT on the algorithm for slow or long distant links (radios, satellites, long-haul fibers, etc). Thanks, Chris. [As WG member] [*] - https://tools.ietf.org/html/draft-hopps-ipsecme-iptfs-01#section-3 https://tools.ietf.org/html/draft-hopps-ipsecme-iptfs-01#appendix-B),
_______________________________________________ Lsr mailing list Lsr@ietf.org https://www.ietf.org/mailman/listinfo/lsr