[Trigtran] Why TRIGTRAN isn't ICMP Source Quench/Why TRIGTRAN isn't ECN

"Spencer Dawkins" <sdawkins@cynetanetworks.com> Fri, 17 January 2003 01:29 UTC

Received: from www1.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA28630 for <trigtran-archive@odin.ietf.org>; Thu, 16 Jan 2003 20:29:45 -0500 (EST)
Received: (from mailnull@localhost) by www1.ietf.org (8.11.6/8.11.6) id h0H1j7Q08201 for trigtran-archive@odin.ietf.org; Thu, 16 Jan 2003 20:45:07 -0500
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h0H1j7J08198 for <trigtran-web-archive@optimus.ietf.org>; Thu, 16 Jan 2003 20:45:07 -0500
Received: from www1.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA28619 for <trigtran-web-archive@ietf.org>; Thu, 16 Jan 2003 20:29:14 -0500 (EST)
Received: from www1.ietf.org (localhost.localdomain [127.0.0.1]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h0H1j2J08157; Thu, 16 Jan 2003 20:45:02 -0500
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h0H1iEJ08098 for <trigtran@optimus.ietf.org>; Thu, 16 Jan 2003 20:44:14 -0500
Received: from MAIL.cynetanetworks.com (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA28578 for <trigtran@ietf.org>; Thu, 16 Jan 2003 20:28:22 -0500 (EST)
X-MimeOLE: Produced By Microsoft Exchange V6.0.6249.0
content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Date: Thu, 16 Jan 2003 19:31:44 -0600
Message-ID: <9255B6CD76A88943A3062F7D4E6432F51030E6@mail.cynetanetworks.com>
Thread-Topic: Why TRIGTRAN isn't ICMP Source Quench/Why TRIGTRAN isn't ECN
Thread-Index: AcK9yDGYMpMwfMagTKWxXa4Q4T2mHw==
From: Spencer Dawkins <sdawkins@cynetanetworks.com>
To: "Trigtran Mailing List (E-mail)" <trigtran@ietf.org>
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by www1.ietf.org id h0H1iEJ08099
Subject: [Trigtran] Why TRIGTRAN isn't ICMP Source Quench/Why TRIGTRAN isn't ECN
Sender: trigtran-admin@ietf.org
Errors-To: trigtran-admin@ietf.org
X-BeenThere: trigtran@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/trigtran>, <mailto:trigtran-request@ietf.org?subject=unsubscribe>
List-Id: Triggers for Transport <trigtran.ietf.org>
List-Post: <mailto:trigtran@ietf.org>
List-Help: <mailto:trigtran-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/trigtran>, <mailto:trigtran-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 8bit
Content-Transfer-Encoding: 8bit

Dear All,

We've mentioned ICMP Source Quench a few times on the mailing list, and people asked about ICMP Source Quench and about ECN at the BOF. Carl and I weren't "there" for either ICMP Source Quench or ECN experience, but we're attempting to capture the collective wisdom (based on RFCs, etc).

Please don't read the following as a definitive statement - it's a question that needs to be answered in any TRIGTRAN work going forward, and we're interested in other understandings of the collective wisdom.

PLEASE SEND REBUTTALS AND CORRECTIONS!

Thanks,

Spencer, for Spencer and Carl

--------------------------

At the IETF 55 TRIGTRAN BoF, Sally Floyd presented a number of questions for TRIGTRAN. One of the most relevant was "ICMP Source Quench failed. P-MTU Discovery failed. Why will TRIGTRAN be different?". This question needs to be answered. Our crack at an answer follows.

ICMP Source Quench
------------------
RFC 792 describes the Internet Control Management Protocol (ICMP). ICMP includes a message type called "Source Quench" (Type 4). Source Quench was intended to provide "back pressure" when a gateway discards an incoming IP datagram because no buffers are available. The message is sent to the Source IP Address carried in the discarded IP datagram. Conceptually, a host receiving an ICMP Source Quench message would slow down its sending rate until it stopped receiving ICMP Source Quench messages, and then gradually increase its sending rate.

The original specification did not provide quantitative guidance on HOW MUCH to slow down. RFC 1016 proposed a formula Source Quench Induced Delay ("SQuID"), but this RFC was published six years after RFC 792, and defined itself as a "crazy idea". A better characterization might have been "embryonic", reflecting an unsophisticated awareness of congestion - TCP didn't include Slow Start/Congestion Avoidance until a couple of years later. 

The original specification allowed gateways to generate an ICMP Source Quench for every datagram dropped, but did not require gateways to send them at all. RFC 1009 ("Requirements for Internet Gateways") required gateways to include the capability to send rate-limited ICMP Source Quench messages, but when it was updated as RFC 1812 ("Requirements for IP Version 4 Routers"), this requirement was dropped in favor of deprecating ICMP Source Quench ("Gateways SHOULD NOT"). The reasons given for this about-face included:

- ICMP Source Quench affected only packets sent from the host generating the "over the top" packet, so did not provide a fair mechanism for hosts sharing overcommitted network paths, and 

- ICMP Source Quench added (reverse-direction) packets to the network during congestion events, and used router memory and processing power to construct and send ICMP Source Quenches during congestion events.

The overwhelming problem with ICMP Source Quench wasn't that it required gateways to send a "trigger" to hosts - it had problems with unfairness and inefficiency. Since the specifications omitted critical details and didn't require this functionality, hosts were forced to add end-to-end congestion avoidance at the transport layer, anyway.

This experience isn't terrically relevant to TRIGTRAN, because recommendations have shifted from MAY to SHOULD NOT - hardly an overwhelming push to deployment!

Path Maximum Transmission Unit Discovery
----------------------------------------

RFC 791 ("Internet Protocol") allows IP packets of up to 65,535 octets, but subnetworks typically don't support frames with a payload this large. A host can know the Maximum Transmission Unit size for its local subnetwork, but can't be sure that a path across multiple subnetworks will support a larger MTU without IP fragmentation. RFC 1122 ("Requirements for Internet Hosts -- Communication Layers") specified that IP implementations "SHOULD" use an MTU of 576 or less to communicate with hosts on a different network, unless the implementation "knew" that the path supported larger MTUs.

RFC 1063 ("IP MTU Discovery Options") and its successor RFC 1191 ("Path MTU Discovery") described a mechanism to gain this knowledge. An IP implementation wishing to use large MTUs sent a packet of the desired size into the network with the "Don't Fragment" bit set. If the packet encountered a subnetwork that didn't support the desired MTU size, the gateway for that link discarded the packet, and reported an ICMP ICMP Destination Unreachable error with a code meaning "fragmentation needed and DF set", (also described as "Datagram Too Big"), and an indication of the bottleneck MTU size, stored in a previously-unused ICMP header field. To avoid requiring a "flag day" for P-MTU discovery, hosts were required to accept "Datagram Too Big" errors that didn't include the bottleneck MTU size, and to either fall back to 576 bytes or search with a new, lower P-MTU "guess", thus accommodating gateways that hadn't been updated.

As P-MTU Discovery was deployed, another "discovery" happened. As described in RFC 1435 ("IESG Advice from Experience with Path MTU Discovery"), "some vendors have added to their routers the ability to disable ICMP messages generated by the router". The effect was that of a "black hole" - the router dropped the "too big" datagram, but did not send any notification to the sending host that this was happening. Further deployment experience led to RFC 2923 ("TCP Problems with Path MTU Discovery"), pointing out that "black holing" was still happening, and that routers were configured this way for a variety of reasons, including a misguided attempt to shut down ICMP messages crossing firewalled administrative domains. Procedures for hosts encountering "black holes" were described, but guessing too high on a "black-holed" path still leads to delays of several seconds as the host TCP implementation detects failure using timeouts before it "falls back" to 576 bytes.

The Internet experience with P-MTU Discovery is more relevant to TRIGTRAN if TRIGTRAN considers ICMP messages as a trigger signal mechanism, although the "black holing" problem is less severe because TRIGTRAN triggers are advisory in nature. End-to-end mechanisms will lead to the the same result after some delay. 

The history of P-MTU Discovery is useful as a reminder that TRIGTRAN triggers must traverse firewalls, no matter what mechanism is defined to transport them.
_______________________________________________
Trigtran mailing list
Trigtran@ietf.org
https://www1.ietf.org/mailman/listinfo/trigtran