summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc6789.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc6789.txt')
-rw-r--r--doc/rfc/rfc6789.txt955
1 files changed, 955 insertions, 0 deletions
diff --git a/doc/rfc/rfc6789.txt b/doc/rfc/rfc6789.txt
new file mode 100644
index 0000000..e9bf806
--- /dev/null
+++ b/doc/rfc/rfc6789.txt
@@ -0,0 +1,955 @@
+
+
+
+
+
+
+Internet Engineering Task Force (IETF) B. Briscoe, Ed.
+Request for Comments: 6789 BT
+Category: Informational R. Woundy, Ed.
+ISSN: 2070-1721 Comcast
+ A. Cooper, Ed.
+ CDT
+ December 2012
+
+
+ Congestion Exposure (ConEx) Concepts and Use Cases
+
+Abstract
+
+ This document provides the entry point to the set of documentation
+ about the Congestion Exposure (ConEx) protocol. It explains the
+ motivation for including a ConEx marking at the IP layer: to expose
+ information about congestion to network nodes. Although such
+ information may have a number of uses, this document focuses on how
+ the information communicated by the ConEx marking can serve as the
+ basis for significantly more efficient and effective traffic
+ management than what exists on the Internet today.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Not all documents
+ approved by the IESG are a candidate for any level of Internet
+ Standard; see Section 2 of RFC 5741.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ http://www.rfc-editor.org/info/rfc6789.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Briscoe, et al. Informational [Page 1]
+
+RFC 6789 ConEx Concepts and Use Cases December 2012
+
+
+Copyright Notice
+
+ Copyright (c) 2012 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+Table of Contents
+
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 2
+ 2. Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
+ 2.1. Congestion . . . . . . . . . . . . . . . . . . . . . . . . 5
+ 2.2. Congestion-Volume . . . . . . . . . . . . . . . . . . . . 5
+ 2.3. Rest-of-Path Congestion . . . . . . . . . . . . . . . . . 6
+ 2.4. Definitions . . . . . . . . . . . . . . . . . . . . . . . 6
+ 3. Core Use Case: Informing Traffic Management . . . . . . . . . 7
+ 3.1. Use Case Description . . . . . . . . . . . . . . . . . . . 7
+ 3.2. Additional Benefits . . . . . . . . . . . . . . . . . . . 9
+ 3.3. Comparison with Existing Approaches . . . . . . . . . . . 9
+ 4. Other Use Cases . . . . . . . . . . . . . . . . . . . . . . . 11
+ 5. Deployment Arrangements . . . . . . . . . . . . . . . . . . . 12
+ 6. Experimental Considerations . . . . . . . . . . . . . . . . . 13
+ 7. Security Considerations . . . . . . . . . . . . . . . . . . . 14
+ 8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 14
+ 9. Contributors . . . . . . . . . . . . . . . . . . . . . . . . . 15
+ 10. Informative References . . . . . . . . . . . . . . . . . . . . 15
+
+1. Introduction
+
+ The power of Internet technology comes from multiplexing shared
+ capacity with packets rather than circuits. Network operators aim to
+ provide sufficient shared capacity, but when too much packet load
+ meets too little shared capacity, congestion results. Congestion
+ appears as either increased delay, dropped packets, or packets
+ explicitly marked with Explicit Congestion Notification (ECN)
+ markings [RFC3168]. As described in Figure 1, congestion control
+ currently relies on the transport receiver detecting these
+ 'Congestion Signals' and informing the transport sender in
+ 'Congestion Feedback Signals'. The sender is then expected to reduce
+ its rate in response.
+
+
+
+Briscoe, et al. Informational [Page 2]
+
+RFC 6789 ConEx Concepts and Use Cases December 2012
+
+
+ This document provides the entry point to the set of documentation
+ about the Congestion Exposure (ConEx) protocol. It focuses on the
+ motivation for including a ConEx marking at the IP layer. (A
+ companion document, [CONEX-ABS], focuses on the mechanics of the
+ protocol.) Briefly, the idea is for the sender to continually signal
+ expected congestion in the headers of any data it sends. To a first
+ approximation, the sender does this by relaying the 'Congestion
+ Feedback Signals' back into the IP layer. They then travel unchanged
+ across the network to the receiver (shown as 'IP-Layer-ConEx-Signals'
+ in Figure 1). This enables IP-layer devices on the path to see
+ information about the whole-path congestion.
+
+ ,---------. ,---------.
+ |Transport| |Transport|
+ | Sender | . |Receiver |
+ | | /|___________________________________________| |
+ | ,-<---------------Congestion-Feedback-Signals--<--------. |
+ | | |/ | | |
+ | | |\ Transport Layer Feedback Flow | | |
+ | | | \ ___________________________________________| | |
+ | | | \| | | |
+ | | | ' ,-----------. . | | |
+ | | |_____________| |_______________|\ | | |
+ | | | IP Layer | | Data Flow \ | | |
+ | | | |(Congested)| \ | | |
+ | | | | Network |--Congestion-Signals--->-' |
+ | | | | Device | \| |
+ | | | | | /| |
+ | `----------->--(new)-IP-Layer-ConEx-Signals-------->| |
+ | | | | / | |
+ | |_____________| |_______________ / | |
+ | | | | |/ | |
+ `---------' `-----------' ' `---------'
+
+ Figure 1: The ConEx Protocol in the Internet Architecture
+
+ One of the key benefits of exposing this congestion information at
+ the IP layer is that it makes the information available to network
+ operators for use as input into their traffic management procedures.
+ A ConEx-enabled sender signals expected whole-path congestion, which
+ is approximately the congestion at least a round-trip time earlier as
+ reported by the receiver to the sender (Figure 1). The ConEx signal
+ is a mark in the IP header that is easy for any IP device to read.
+ Therefore, a node performing traffic management can count congestion
+ as easily as it might count data volume today by simply counting the
+ volume of packets with ConEx markings.
+
+
+
+
+
+Briscoe, et al. Informational [Page 3]
+
+RFC 6789 ConEx Concepts and Use Cases December 2012
+
+
+ ConEx-based traffic management can make highly efficient use of
+ capacity. In times of no congestion, all traffic management
+ restraints can be removed, leaving the network's full capacity
+ available to all its users. If some users on the network cause
+ disproportionate congestion, the traffic management function can
+ learn about this and directly limit those users' traffic in order to
+ protect the service of other users sharing the same capacity. ConEx-
+ based traffic management thus presents a step change in terms of the
+ options available to network operators for managing traffic on their
+ networks.
+
+ The remainder of this document explains the concepts behind ConEx and
+ how exposing congestion can significantly improve Internet traffic
+ management, among other benefits. Section 2 introduces a number of
+ concepts that are fundamental to understanding how ConEx-based
+ traffic management works. Section 3 shows how ConEx can be used for
+ traffic management, discusses additional benefits from such usage,
+ and compares ConEx-based traffic management to existing traffic
+ management approaches. Section 4 discusses other related use cases.
+ Section 5 briefly discusses deployment arrangements. Section 6
+ suggests open issues that experiments in the use of ConEx could
+ usefully be designed to answer. The final sections are standard RFC
+ back matter.
+
+ The remainder of the core ConEx document suite consists of:
+
+ [CONEX-ABS], which provides an abstract encoding of ConEx signals,
+ explains the ConEx audit and security mechanisms, and describes
+ incremental deployment features;
+
+ [CONEX-DESTOPT], which specifies the IPv6 destination option
+ encoding for ConEx;
+
+ [TCP-MOD], which specifies TCP-sender modifications for use of
+ ConEx;
+
+ and the following documents, which describe some feasible
+ scenarios for deploying ConEx:
+
+ [CONEX-DEPLOY], which describes a scenario around a fixed
+ broadband access network;
+
+ [CONEX-MOBILE], which describes a scenario around a mobile
+ communications provider;
+
+ [CONEX-DATA], which describes how ConEx could be used for
+ performance isolation between tenants of a data centre.
+
+
+
+
+Briscoe, et al. Informational [Page 4]
+
+RFC 6789 ConEx Concepts and Use Cases December 2012
+
+
+2. Concepts
+
+ ConEx relies on a precise definition of congestion and a number of
+ newer concepts that are introduced in this section. Definitions are
+ summarized in Section 2.4.
+
+2.1. Congestion
+
+ Despite its central role in network control and management,
+ congestion is a remarkably difficult concept to define. Experts in
+ different disciplines and with different perspectives define
+ congestion in a variety of ways [Bauer09].
+
+ The definition used for the purposes of ConEx is expressed as the
+ probability of packet loss (or the probability of packet marking if
+ ECN is in use). This definition focuses on how congestion is
+ measured, rather than describing congestion as a condition or state.
+
+2.2. Congestion-Volume
+
+ The metric that ConEx exposes is congestion-volume: the volume of
+ bytes dropped or ECN-marked in a given period of time. Counting
+ congestion-volume allows each user to be held responsible for his or
+ her contribution to congestion. Congestion-volume can only be a
+ property of traffic, whereas congestion can be a property of traffic
+ or a property of a link or a path.
+
+ To understand congestion-volume, consider a simple example. Imagine
+ Alice sends 1 GB of a file while the loss-probability is a constant
+ 0.2%. Her contribution to congestion -- her congestion-volume -- is
+ 1 GB x 0.2% = 2 MB. If she then sends another 3 GB of the file while
+ the loss-probability is 0.1%, this adds 3 MB to her congestion-
+ volume. Her total contribution to congestion is then 2 MB + 3 MB = 5
+ MB.
+
+ Fortunately, measuring Alice's congestion-volume on a real network
+ does not require the kind of arithmetic shown above, because
+ congestion-volume can be directly measured by counting the total
+ volume of Alice's traffic that gets discarded or ECN-marked. (A
+ queue with varying percentage loss does these multiplications and
+ additions inherently.) With ConEx, network operators can count
+ congestion-volume using techniques very similar to those they use for
+ counting volume.
+
+
+
+
+
+
+
+
+Briscoe, et al. Informational [Page 5]
+
+RFC 6789 ConEx Concepts and Use Cases December 2012
+
+
+2.3. Rest-of-Path Congestion
+
+ At a particular measurement point within a network, "rest-of-path
+ congestion" (also known as "downstream congestion") is the level of
+ congestion that a traffic flow is expected to experience between the
+ measurement point and its final destination. "Upstream congestion"
+ is the congestion experienced up to the measurement point.
+
+ If traffic is ECN-capable, ECN signals monitored in the middle of a
+ network will indicate the congestion experienced so far on the path
+ (upstream congestion). In contrast, the ConEx signals inserted into
+ IP headers as shown in Figure 1 indicate the congestion along a whole
+ path from transport source to transport destination. Therefore, if a
+ measurement point detects both of these signals, it can subtract the
+ level of ECN (upstream congestion) from the level of ConEx (whole
+ path) to derive a measure of the congestion that packets are likely
+ to experience between the monitoring point and their destination
+ (rest-of-path congestion). A measurement point can calculate this
+ measurement in the aggregate, across all flows.
+
+ A network monitor can usually accurately measure upstream congestion
+ only if the traffic it observes is ECN-capable. [CONEX-ABS] further
+ discusses the constraints around the network's ability to measure
+ upstream and rest-of-path congestion in these circumstances.
+ However, there are a number of initial deployment arrangements that
+ benefit from ConEx but work without ECN (see Section 5).
+
+2.4. Definitions
+
+ Congestion: In general, congestion occurs when any user's traffic
+ suffers loss, ECN marking, or increased delay as a result of one
+ or more network resources becoming overloaded. For the purposes
+ of ConEx, congestion is measured using the concrete signals
+ provided by loss and ECN markings (delay is not considered).
+ Congestion is measured as the probability of loss or the
+ probability of ECN marking, usually expressed as a dimensionless
+ percentage.
+
+ Congestion-volume: For any granularity of traffic (packet, flow,
+ aggregate, link, etc.), the volume of bytes dropped or ECN-marked
+ in a given period of time. Conceptually, data volume multiplied
+ by the congestion each packet of the volume experienced. This is
+ usually expressed in bytes (or kB, MB, etc.).
+
+ Congestion policer: A logical entity that allows a network operator
+ to monitor each user's congestion-volume and enforce congestion-
+ volume limits (discussed in Section 3.1).
+
+
+
+
+Briscoe, et al. Informational [Page 6]
+
+RFC 6789 ConEx Concepts and Use Cases December 2012
+
+
+ Rest-of-path congestion (or downstream congestion): The congestion a
+ flow of traffic is expected to experience on the remainder of its
+ path. In other words, at a measurement point in the network, the
+ rest-of-path congestion is the congestion the traffic flow has yet
+ to experience as it travels from that point to the receiver.
+ Upstream congestion is usually expressed as a dimensionless
+ percentage.
+
+ Upstream congestion: The accumulated congestion experienced by a
+ traffic flow thus far, relative to a point along its path. In
+ other words, at a measurement point in the network, the upstream
+ congestion is the accumulated congestion the traffic flow has
+ experienced as it travels from the sender to that point. At the
+ receiver, this is equivalent to the end-to-end congestion level
+ that (usually) is reported back to the sender. This is usually
+ expressed as a dimensionless percentage.
+
+ Network operator (or provider): Operator of a residential,
+ commercial, enterprise, campus, or other network.
+
+ User: The contractual entity that represents an individual,
+ household, business, or institution that uses the service of a
+ network operator. There is no implication that the contract has
+ to be commercial; for instance, the users of a university or
+ enterprise network service could be students or employees who do
+ not pay for access, but may be required to comply with some form
+ of contract or acceptable use policy. There is also no
+ implication that every user is an end user. Where two networks
+ form a customer-provider relationship, the term "user" applies to
+ the customer network.
+
+ [CONEX-ABS] gives further definitions for aspects of ConEx related to
+ protocol mechanisms.
+
+3. Core Use Case: Informing Traffic Management
+
+ This section explains how ConEx could be used as the basis for
+ traffic management, highlights additional benefits derived from
+ having ConEx-aware nodes on the network, and compares ConEx-based
+ traffic management to existing approaches.
+
+3.1. Use Case Description
+
+ One of the key benefits that ConEx can deliver is in helping network
+ operators to improve how they manage traffic on their networks.
+ Consider the common case of a commercial broadband network where a
+ relatively small number of users place disproportionate demand on
+ network resources, at times resulting in congestion. The network
+
+
+
+Briscoe, et al. Informational [Page 7]
+
+RFC 6789 ConEx Concepts and Use Cases December 2012
+
+
+ operator seeks a way to manage traffic such that the traffic that
+ contributes more to congestion bears more of the brunt of the
+ management.
+
+ Assuming ConEx signals are visible at the IP layer, the network
+ operator can accomplish this by placing a congestion policer at an
+ enforcement point within the network and configuring it with a
+ traffic management policy that monitors each user's contribution to
+ congestion. As described in [CONEX-ABS] and elaborated in [CongPol],
+ one way to implement a congestion policer is in a similar way to a
+ bit-rate policer, except that it monitors congestion-volume (based on
+ IP-layer ConEx signals) rather than bit rate. When implemented as a
+ token bucket, the tokens provide users with the right to cause bits
+ of congestion-volume, rather than to send bits of data volume. The
+ fill rate represents each user's congestion-volume quota.
+
+ The congestion policer monitors the ConEx signals of the traffic
+ entering the network. As long as the network remains uncongested and
+ users stay within their quotas, no action is taken. When the network
+ becomes congested and a user exhausts his quota, some action is taken
+ against the traffic that breached the quota in accordance with the
+ network operator's traffic management policy. For example, the
+ traffic may be dropped, delayed, or marked with a lower QoS class.
+ In this way, traffic is managed according to its contribution to
+ congestion -- not some application- or flow-specific policy -- and is
+ not managed at all during times of no congestion.
+
+ As an example of how a network operator might employ a ConEx-based
+ traffic management system, consider a typical DSL network
+ architecture (as elaborated in [TR-059] and [TR-101]). Traffic is
+ routed from regional and global IP networks to an operator-controlled
+ IP node, the Broadband Remote Access Server (BRAS). From the BRAS,
+ traffic is delivered to access nodes. The BRAS carries enhanced
+ functionality, including IP QoS and traffic management capabilities.
+
+ By deploying a congestion policer at the BRAS location, the network
+ operator can measure the congestion-volume created by users within
+ the access nodes and police misbehaving users before their traffic
+ affects others on the access network. The policer would be
+ provisioned with a traffic management policy, perhaps directing the
+ BRAS to drop packets from users that exceed their congestion-volume
+ quotas during times of congestion. Those users' apps would be likely
+ to react in the typical way to drops, backing off (assuming at least
+ some use TCP), and thereby lowering the users' congestion-volumes
+ back within the quota limits. If none of a user's apps responds, the
+ policer would continue to increase focused drops and effectively
+ enforce its own congestion control.
+
+
+
+
+Briscoe, et al. Informational [Page 8]
+
+RFC 6789 ConEx Concepts and Use Cases December 2012
+
+
+3.2. Additional Benefits
+
+ The ConEx-based approach to traffic management has a number of
+ benefits in addition to efficient management of traffic. It provides
+ incentives for users to make use of "scavenger" transport protocols,
+ such as the Low Extra Delay Background Transport [LEDBAT], that
+ provide ways for bulk-transfer applications to rapidly yield when
+ interactive applications require capacity (thereby "scavenging"
+ remaining bandwidth). With a congestion policer in place as
+ described in Section 3.1, users of these protocols will be less
+ likely to run afoul of the network operator's traffic management
+ policy than those whose bulk-transfer applications generate the same
+ volume of traffic without being sensitive to congestion. In short,
+ two users who produce similar traffic volumes over the same time
+ interval may produce different congestion-volumes if one of them is
+ using a scavenger transport protocol and the other is not; in that
+ situation, the scavenger user's traffic is less likely to be managed
+ by the network operator.
+
+ ConEx-based traffic management also makes it possible for a user to
+ control the relative performance among its own traffic flows. If a
+ user wants some flows to have more bandwidth than others, it can
+ reduce the rate of some traffic so that it consumes less congestion-
+ volume "budget", leaving more congestion-volume "budget" for the user
+ to "spend" on making other traffic go faster. This approach is most
+ relevant if congestion is signalled by ECN, because no impairment due
+ to loss is involved and delay can remain low.
+
+3.3. Comparison with Existing Approaches
+
+ A variety of approaches already exist for network operators to manage
+ congestion, traffic, and the disproportionate usage of scarce
+ capacity by a small number of users. Common approaches can be
+ categorized as rate-based, volume-based, or application-based.
+
+ Rate-based approaches constrain the traffic rate per user or per
+ network. A user's peak and average (or "committed") rate may be
+ limited. These approaches have the potential to either over- or
+ under-constrain the network, suppressing rates even when the network
+ is uncongested or not suppressing them enough during heavy usage
+ periods.
+
+ Round-robin scheduling and fair queuing were developed to address
+ these problems. They equalize relative rates between active users
+ (or flows) at a known bottleneck. The bit rate allocated to any one
+ user depends on the number of active users at each instant. The
+ drawback of these approaches is that they favor heavy users over
+ light users over time, because they do not have any memory of usage.
+
+
+
+Briscoe, et al. Informational [Page 9]
+
+RFC 6789 ConEx Concepts and Use Cases December 2012
+
+
+ These approaches share bit rate instant by instant; however, heavy
+ users are active at every instant, whereas light users only occupy
+ their share of the link occasionally.
+
+ Volume-based approaches measure the overall volume of traffic a user
+ sends (and/or receives) over time. Users may be subject to an
+ absolute volume cap (for example, 10GB per month) or the "heaviest"
+ users may be sanctioned in some other manner. Many providers use
+ monthly volume limits, and count volume regardless of whether the
+ network is congested or not, creating the potential for over- or
+ under-constraining problems, as with the original rate-based
+ approaches.
+
+ ConEx-based approaches, by comparison, only react during times of
+ congestion and in proportion to each user's congestion contribution,
+ making more efficient use of capacity and more proportionate
+ management decisions.
+
+ Unlike ConEx-based approaches, neither rate-based nor volume-based
+ approaches provide incentives for applications to use scavenger
+ transport protocols. They may even penalize users of applications
+ that employ scavenger transports for the large amount of volume they
+ send, rather than rewarding them for carefully avoiding congestion
+ while sending it. While the volume-based approach described in
+ "Comcast's Protocol-Agnostic Congestion Management System" [RFC6057]
+ aims to overcome the over-/under-constraining problem by only
+ measuring volume and triggering traffic management action during
+ periods of high utilization, it still does not provide incentives to
+ use scavenger transports, because congestion-causing volume cannot be
+ distinguished from volume overall. ConEx provides this ability.
+
+ Application-based approaches use deep packet inspection or other
+ techniques to determine what application a given traffic flow is
+ associated with. Network operators may then use this information to
+ rate-limit or otherwise sanction certain applications, in some cases
+ only during peak hours. These approaches suffer from being at odds
+ with IPsec and some application-layer encryption, and they may raise
+ additional policy concerns. In contrast, ConEx offers an
+ application-agnostic metric to serve as the basis for traffic
+ management decisions.
+
+ The existing types of approaches share a further limitation that
+ ConEx can help to overcome: performance uncertainty. Flat-rate
+ pricing plans are popular because users appreciate the certainty of
+ having their monthly bill amount remain the same for each billing
+ period, allowing them to plan their costs accordingly. But while
+ flat-rate pricing avoids billing uncertainty, it creates performance
+ uncertainty: users cannot know whether the performance of their
+
+
+
+Briscoe, et al. Informational [Page 10]
+
+RFC 6789 ConEx Concepts and Use Cases December 2012
+
+
+ connections is being altered or degraded based on how the network
+ operator is attempting to manage congestion. By exposing congestion
+ information at the IP layer, ConEx instead provides a metric that can
+ serve as an open, transparent basis for traffic management policies
+ that both providers and their customers can measure and verify. It
+ can be used to reduce the performance uncertainty that some users
+ currently experience, without having to sacrifice their billing
+ certainty.
+
+4. Other Use Cases
+
+ ConEx information can be put to a number of uses other than informing
+ traffic management. These include:
+
+ Informing inter-operator contracts: ConEx information is made
+ visible to every IP node, including border nodes between networks.
+ Network operators can use ConEx combined with ECN markings to
+ measure how much traffic from each network contributes to
+ congestion in the other. As such, congestion-volume could be
+ included as a metric in inter-operator contracts, just as volume
+ or bit rate are included today. This would not be an initial
+ deployment scenario, unless ECN became widely deployed.
+
+ Enabling more efficient capacity provisioning: Section 3.2 explains
+ how operators can use ConEx-based traffic management to encourage
+ use of scavenger transport protocols, which significantly improves
+ the performance of interactive applications while still allowing
+ heavy users to transfer high volumes. Here we explain how this
+ can also benefit network operators.
+
+ Today, when loss, delay, or average utilization exceeds a certain
+ threshold, some operators just buy more capacity without
+ attempting to manage the traffic. Other operators prefer to limit
+ a minority of heavy users at peak times, but they still eventually
+ buy more capacity when utilization rises.
+
+ With ConEx-based traffic management, a network operator should be
+ able to provision capacity more efficiently. An operator could
+ benefit from this in a variety of ways. For example, the operator
+ could add capacity as it would do without ConEx, but deliver
+ better quality of service for its users. Or, the operator could
+ delay adding capacity while delivering similar quality of service
+ to what it currently provides.
+
+
+
+
+
+
+
+
+Briscoe, et al. Informational [Page 11]
+
+RFC 6789 ConEx Concepts and Use Cases December 2012
+
+
+5. Deployment Arrangements
+
+ ConEx is designed so that it can be incrementally deployed in the
+ Internet and still be valuable for early adopters. As long as some
+ senders are ConEx-enabled, a network on the path can unilaterally use
+ ConEx-aware policy devices for traffic management; no changes to
+ network forwarding elements are needed, and ConEx still works if
+ there are other networks on the path that are unaware of ConEx marks.
+
+ The above two steps seem to represent a stand-off where neither step
+ is useful until the other has made the first move: i) some sending
+ hosts must be modified to give information to the network, and ii) a
+ network must deploy policy devices to monitor this information and
+ act on it. Nonetheless, the developer of a scavenger transport
+ protocol like LEDBAT does stand to benefit from deploying ConEx. In
+ this case, the developer makes the first move, expecting it will
+ prompt at least some networks to move in response, using the ConEx
+ information to reward users of the scavenger transport protocol.
+
+ On the host side, we have already shown (Figure 1) how the sender
+ piggy-backs ConEx signals on normal data packets to re-insert
+ feedback about packet drops (and/or ECN) back into the IP layer. In
+ the case of TCP, [TCP-MOD] proposes the required sender
+ modifications. ConEx works with any TCP receiver as long as it uses
+ SACK (selective acknowledgment), which most do. There is a receiver
+ optimisation [TCPM-ECN] that improves ConEx precision when using ECN,
+ but ConEx can still use ECN without it. Networks can make use of
+ ConEx even if the implementations of some of the transport protocols
+ on a host do not support ConEx (e.g., the implementation of DNS over
+ UDP might not support ConEx, while perhaps RTP over UDP and TCP
+ will).
+
+ On the network side, the provider solely needs to place ConEx
+ congestion policers at each ingress to its network in a similar
+ arrangement to the edge-policed architecture of Diffserv [RFC2475].
+
+ A sender can choose whether to send packets that support ConEx or
+ packets that don't. ConEx-enabled packets bring information to the
+ policer about congestion expected on the rest of the path beyond the
+ policer. Packets that do not support ConEx bring no such
+ information. Therefore, the network will tend to conservatively
+ rate-limit non-ConEx-enabled packets in order to manage the unknown
+ risk of congestion. In contrast, a network doesn't normally need to
+ rate-limit ConEx-enabled packets unless they reveal a persistently
+ high contribution to congestion. This natural tendency for networks
+ to favour senders that provide ConEx information reinforces ConEx
+ deployment.
+
+
+
+
+Briscoe, et al. Informational [Page 12]
+
+RFC 6789 ConEx Concepts and Use Cases December 2012
+
+
+ Feasible initial deployment scenarios exist for a broadband access
+ network [CONEX-DEPLOY], a mobile communications network
+ [CONEX-MOBILE], and a multi-tenant data centre [CONEX-DATA]. The
+ first two of these scenarios are believed to work well without ECN
+ support, while the data center scenario works best with ECN (and ECN
+ can be deployed unilaterally).
+
+ The above gives only the most salient aspects of ConEx deployment.
+ For further detail, [CONEX-ABS] describes the incremental deployment
+ features of the ConEx protocol and the components that need to be
+ deployed for ConEx to work.
+
+6. Experimental Considerations
+
+ ConEx is initially designed as an experimental protocol because it
+ makes an ambitious change at the interoperability (IP) layer, so no
+ amount of careful design can foresee all the potential feature
+ interactions with other uses of IP. This section identifies a number
+ of questions that would be useful to answer through well-designed
+ experiments:
+
+ o Are the compromises that were made in order to fit the ConEx
+ encoding into IP (for example, that the initial design was solely
+ for IPv6 and not for IPv4, and that the encoding has limited
+ visibility when tunnelled [CONEX-DESTOPT]) the right ones?
+
+ o Is it possible to combine techniques for distinguishing self-
+ congestion from shared congestion with ConEx-based traffic
+ management such that users are not penalized for congestion that
+ does not impact others on the network? Are other techniques
+ needed?
+
+ o In practice, how does traffic management using ConEx compare with
+ traditional techniques (Section 3.3)? Does it give the benefits
+ claimed in Sections 3.1 and 3.2?
+
+ o Approaches are proposed for congestion policing of ConEx traffic
+ alongside existing management (or lack thereof) of non-ConEx
+ traffic, including UDP traffic [CONEX-ABS]. Are they strategy-
+ proof against users selectively using both? Are there better
+ transition strategies?
+
+ o Audit devices have been designed and implemented to assure ConEx
+ signal integrity [CONEX-ABS]. Do they achieve minimal false hits
+ and false misses in a wide range of traffic scenarios? Are there
+ new attacks? Are there better audit designs to defend against
+ these?
+
+
+
+
+Briscoe, et al. Informational [Page 13]
+
+RFC 6789 ConEx Concepts and Use Cases December 2012
+
+
+ o If ECN deployment remains patchy, are the proposed initial ConEx
+ deployment scenarios (Section 5) still useful enough to kick-start
+ deployment? Is auditing effective when based on loss at a primary
+ bottleneck? Can rest-of-path congestion be approximated
+ accurately enough without ECN? Are there other useful deployment
+ scenarios?
+
+ ConEx is intended to be a generative technology that might be used
+ for unexpected purposes unforeseen by the designers. Therefore, this
+ list of experimental considerations is not intended to be exhaustive.
+
+7. Security Considerations
+
+ This document does not specify a mechanism, it merely motivates
+ congestion exposure at the IP layer. Therefore, security
+ considerations are described in the companion document that gives an
+ abstract description of the ConEx protocol and the components that
+ would use it [CONEX-ABS].
+
+8. Acknowledgments
+
+ Bob Briscoe was partly funded by Trilogy, a research project (ICT-
+ 216372) supported by the European Community under its Seventh
+ Framework Programme. The views expressed here are those of the
+ author only.
+
+ The authors would like to thank the many people that have commented
+ on this document: Bernard Aboba, Mikael Abrahamsson, Joao Taveira
+ Araujo, Marcelo Bagnulo Braun, Steve Bauer, Caitlin Bestler, Steven
+ Blake, Louise Burness, Ken Carlberg, Nandita Dukkipati, Dave McDysan,
+ Wes Eddy, Matthew Ford, Ingemar Johansson, Georgios Karagiannis,
+ Mirja Kuehlewind, Dirk Kutscher, Zhu Lei, Kevin Mason, Matt Mathis,
+ Michael Menth, Chris Morrow, Tim Shepard, Hannes Tschofenig, and
+ Stuart Venters. Please accept our apologies if your name has been
+ missed off this list.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Briscoe, et al. Informational [Page 14]
+
+RFC 6789 ConEx Concepts and Use Cases December 2012
+
+
+9. Contributors
+
+ Philip Eardley and Andrea Soppera made helpful text contributions to
+ this document.
+
+ The following co-edited this document through most of its life:
+
+ Toby Moncaster
+ Computer Laboratory
+ William Gates Building
+ JJ Thomson Avenue
+ Cambridge, CB3 0FD
+ UK
+ EMail: toby.moncaster@cl.cam.ac.uk
+
+ John Leslie
+ JLC.net
+ 10 Souhegan Street
+ Milford, NH 03055
+ US
+ EMail: john@jlc.net
+
+10. Informative References
+
+ [Bauer09] Bauer, S., Clark, D., and W. Lehr, "The Evolution of
+ Internet Congestion", 2009.
+
+ [CONEX-ABS] Mathis, M. and B. Briscoe, "Congestion Exposure
+ (ConEx) Concepts and Abstract Mechanism", Work
+ in Progress, October 2012.
+
+ [CONEX-DATA] Briscoe, B. and M. Sridharan, "Network Performance
+ Isolation in Data Centres using Congestion Exposure
+ (ConEx)", Work in Progress, July 2012.
+
+ [CONEX-DEPLOY] Briscoe, B., "Initial Congestion Exposure (ConEx)
+ Deployment Examples", Work in Progress, July 2012.
+
+ [CONEX-DESTOPT] Krishnan, S., Kuehlewind, M., and C. Ucendo, "IPv6
+ Destination Option for ConEx", Work in Progress,
+ September 2012.
+
+ [CONEX-MOBILE] Kutscher, D., Mir, F., Winter, R., Krishnan, S.,
+ Zhang, Y., and C. Bernardos, "Mobile Communication
+ Congestion Exposure Scenario", Work in Progress,
+ July 2012.
+
+
+
+
+
+Briscoe, et al. Informational [Page 15]
+
+RFC 6789 ConEx Concepts and Use Cases December 2012
+
+
+ [CongPol] Briscoe, B., Jacquet, A., and T. Moncaster, "Policing
+ Freedom to Use the Internet Resource Pool", ReArch
+ 2008 hosted at the 2008 CoNEXT conference ,
+ December 2008.
+
+ [LEDBAT] Shalunov, S., Hazel, G., Iyengar, J., and M.
+ Kuehlewind, "Low Extra Delay Background Transport
+ (LEDBAT)", Work in Progress, September 2012.
+
+ [RFC2475] Blake, S., Black, D., Carlson, M., Davies, E., Wang,
+ Z., and W. Weiss, "An Architecture for Differentiated
+ Services", RFC 2475, December 1998.
+
+ [RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The
+ Addition of Explicit Congestion Notification (ECN) to
+ IP", RFC 3168, September 2001.
+
+ [RFC6057] Bastian, C., Klieber, T., Livingood, J., Mills, J.,
+ and R. Woundy, "Comcast's Protocol-Agnostic
+ Congestion Management System", RFC 6057,
+ December 2010.
+
+ [TCP-MOD] Kuehlewind, M. and R. Scheffenegger, "TCP
+ modifications for Congestion Exposure", Work
+ in Progress, May 2012.
+
+ [TCPM-ECN] Kuehlewind, M. and R. Scheffenegger, "More Accurate
+ ECN Feedback in TCP", Work in Progress, July 2012.
+
+ [TR-059] Anschutz, T., Ed., "DSL Forum Technical Report
+ TR-059: Requirements for the Support of QoS-Enabled
+ IP Services", September 2003.
+
+ [TR-101] Cohen, A., Ed. and E. Schrum, Ed., "DSL Forum
+ Technical Report TR-101: Migration to Ethernet-Based
+ DSL Aggregation", April 2006.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Briscoe, et al. Informational [Page 16]
+
+RFC 6789 ConEx Concepts and Use Cases December 2012
+
+
+Authors' Addresses
+
+ Bob Briscoe (editor)
+ BT
+ B54/77, Adastral Park
+ Martlesham Heath
+ Ipswich IP5 3RE
+ UK
+
+ Phone: +44 1473 645196
+ EMail: bob.briscoe@bt.com
+ URI: http://bobbriscoe.net/
+
+
+ Richard Woundy (editor)
+ Comcast
+ 1701 John F Kennedy Boulevard
+ Philadelphia, PA 19103
+ US
+
+ EMail: richard_woundy@cable.comcast.com
+ URI: http://www.comcast.com
+
+
+ Alissa Cooper (editor)
+ CDT
+ 1634 Eye St. NW, Suite 1100
+ Washington, DC 20006
+ US
+
+ EMail: acooper@cdt.org
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Briscoe, et al. Informational [Page 17]
+