1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058 2059 2060 2061 2062 2063 2064 2065 2066 2067 2068 2069 2070 2071 2072 2073 2074 2075 2076 2077 2078 2079 2080 2081 2082 2083 2084 2085 2086 2087 2088 2089 2090 2091 2092 2093 2094 2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105 2106 2107 2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118 2119 2120 2121 2122 2123 2124 2125 2126 2127 2128 2129 2130 2131 2132 2133 2134 2135 2136 2137 2138 2139 2140 2141 2142 2143 2144 2145 2146 2147 2148 2149 2150 2151 2152 2153 2154 2155 2156 2157 2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168 2169 2170 2171 2172 2173 2174 2175 2176 2177 2178 2179 2180 2181 2182 2183 2184 2185 2186 2187 2188 2189 2190 2191 2192 2193 2194 2195 2196 2197 2198 2199 2200 2201 2202 2203 2204 2205 2206 2207 2208 2209 2210 2211 2212 2213 2214 2215 2216 2217 2218 2219 2220 2221 2222 2223 2224 2225 2226 2227 2228 2229 2230 2231 2232 2233 2234 2235 2236 2237 2238 2239 2240 2241 2242 2243 2244 2245 2246 2247 2248 2249 2250 2251 2252 2253 2254 2255 2256 2257 2258 2259 2260 2261 2262 2263 2264 2265 2266 2267 2268 2269 2270 2271 2272 2273 2274 2275 2276 2277 2278 2279 2280 2281 2282 2283 2284 2285 2286 2287 2288 2289 2290 2291 2292 2293
|
<pre>Network Working Group H. Balakrishnan
Request for Comments: 3449 MIT LCS
BCP: 69 V. N. Padmanabhan
Category: Best Current Practice Microsoft Research
G. Fairhurst
M. Sooriyabandara
University of Aberdeen, U.K.
December 2002
<span class="h1">TCP Performance Implications</span>
<span class="h1">of Network Path Asymmetry</span>
Status of this Memo
This document specifies an Internet Best Current Practices for the
Internet Community, and requests discussion and suggestions for
improvements. Distribution of this memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2002). All Rights Reserved.
Abstract
This document describes TCP performance problems that arise because
of asymmetric effects. These problems arise in several access
networks, including bandwidth-asymmetric networks and packet radio
subnetworks, for different underlying reasons. However, the end
result on TCP performance is the same in both cases: performance
often degrades significantly because of imperfection and variability
in the ACK feedback from the receiver to the sender.
The document details several mitigations to these effects, which have
either been proposed or evaluated in the literature, or are currently
deployed in networks. These solutions use a combination of local
link-layer techniques, subnetwork, and end-to-end mechanisms,
consisting of: (i) techniques to manage the channel used for the
upstream bottleneck link carrying the ACKs, typically using header
compression or reducing the frequency of TCP ACKs, (ii) techniques to
handle this reduced ACK frequency to retain the TCP sender's
acknowledgment-triggered self-clocking and (iii) techniques to
schedule the data and ACK packets in the reverse direction to improve
performance in the presence of two-way traffic. Each technique is
described, together with known issues, and recommendations for use.
A summary of the recommendations is provided at the end of the
document.
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
Table of Contents
<a href="#section-1">1</a>. Conventions used in this Document ...............................<a href="#page-3">3</a>
<a href="#section-2">2</a>. Motivation ....................................................<a href="#page-4">4</a>
2.1 Asymmetry due to Differences in Transmit
and Receive Capacity .........................................<a href="#page-4">4</a>
<a href="#section-2.2">2.2</a> Asymmetry due to Shared Media in the Reverse Direction .......<a href="#page-5">5</a>
<a href="#section-2.3">2.3</a> The General Problem ..........................................<a href="#page-5">5</a>
<a href="#section-3">3</a>. How does Asymmetry Degrade TCP Performance? .....................<a href="#page-5">5</a>
<a href="#section-3.1">3.1</a> Asymmetric Capacity ..........................................<a href="#page-5">5</a>
<a href="#section-3.2">3.2</a> MAC Protocol Interactions ....................................<a href="#page-7">7</a>
<a href="#section-3.3">3.3</a> Bidirectional Traffic ........................................<a href="#page-8">8</a>
<a href="#section-3.4">3.4</a> Loss in Asymmetric Network Paths ............................<a href="#page-10">10</a>
<a href="#section-4">4</a>. Improving TCP Performance using Host Mitigations ...............<a href="#page-10">10</a>
<a href="#section-4.1">4.1</a> Modified Delayed ACKs .......................................<a href="#page-11">11</a>
<a href="#section-4.2">4.2</a> Use of Large MSS ............................................<a href="#page-12">12</a>
<a href="#section-4.3">4.3</a> ACK Congestion Control ......................................<a href="#page-13">13</a>
<a href="#section-4.4">4.4</a> Window Prediction Mechanism .................................<a href="#page-14">14</a>
<a href="#section-4.5">4.5</a> Acknowledgement based on Cwnd Estimation. ...................<a href="#page-14">14</a>
<a href="#section-4.6">4.6</a> TCP Sender Pacing ...........................................<a href="#page-14">14</a>
<a href="#section-4.7">4.7</a> TCP Byte Counting ...........................................<a href="#page-15">15</a>
<a href="#section-4.8">4.8</a> Backpressure ................................................<a href="#page-16">16</a>
<a href="#section-5">5</a>. Improving TCP performance using Transparent Modifications ......<a href="#page-17">17</a>
<a href="#section-5.1">5.1</a> TYPE 0: Header Compression ..................................<a href="#page-18">18</a>
<a href="#section-5.1.1">5.1.1</a> TCP Header Compression ..................................<a href="#page-18">18</a>
<a href="#section-5.1.2">5.1.2</a> Alternate Robust Header Compression Algorithms ..........<a href="#page-19">19</a>
<a href="#section-5.2">5.2</a> TYPE 1: Reverse Link Bandwidth Management ...................<a href="#page-19">19</a>
<a href="#section-5.2.1">5.2.1</a> ACK Filtering ...........................................<a href="#page-20">20</a>
<a href="#section-5.2.2">5.2.2</a> ACK Decimation ..........................................<a href="#page-21">21</a>
<a href="#section-5.3">5.3</a> TYPE 2: Handling Infrequent ACKs ............................<a href="#page-22">22</a>
<a href="#section-5.3.1">5.3.1</a> ACK Reconstruction ......................................<a href="#page-23">23</a>
<a href="#section-5.3.2">5.3.2</a> ACK Compaction and Companding ...........................<a href="#page-25">25</a>
5.3.3 Mitigating TCP packet bursts generated by
Infrequent ACKs .........................................<a href="#page-26">26</a>
<a href="#section-5.4">5.4</a> TYPE 3: Upstream Link Scheduling ............................<a href="#page-27">27</a>
<a href="#section-5.4.1">5.4.1</a> Per-Flow queuing at the Upstream Bottleneck Link ........<a href="#page-27">27</a>
<a href="#section-5.4.2">5.4.2</a> ACKs-first Scheduling ...................................<a href="#page-28">28</a>
<a href="#section-6">6</a>. Security Considerations ........................................<a href="#page-29">29</a>
<a href="#section-7">7</a>. Summary ........................................................<a href="#page-30">30</a>
<a href="#section-8">8</a>. Acknowledgments ................................................<a href="#page-32">32</a>
<a href="#section-9">9</a>. References .....................................................<a href="#page-32">32</a>
<a href="#section-10">10</a>. IANA Considerations ...........................................<a href="#page-37">37</a>
Appendix: Examples of Subnetworks Exhibiting Network Path
Asymmetry ...............................................<a href="#page-38">38</a>
Authors' Addresses ................................................<a href="#page-40">40</a>
Full Copyright Statement ..........................................<a href="#page-41">41</a>
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>. Conventions used in this Document</span>
FORWARD DIRECTION: The dominant direction of data transfer over an
asymmetric network path. It corresponds to the direction with better
characteristics in terms of capacity, latency, error rate, etc. Data
transfer in the forward direction is called "forward transfer".
Packets travelling in the forward direction follow the forward path
through the IP network.
REVERSE DIRECTION: The direction in which acknowledgments of a
forward TCP transfer flow. Data transfer could also happen in this
direction (and is termed "reverse transfer"), but it is typically
less voluminous than that in the forward direction. The reverse
direction typically exhibits worse characteristics than the forward
direction. Packets travelling in the reverse direction follow the
reverse path through the IP network.
UPSTREAM LINK: The specific bottleneck link that normally has much
less capability than the corresponding downstream link. Congestion
is not confined to this link alone, and may also occur at any point
along the forward and reverse directions (e.g., due to sharing with
other traffic flows).
DOWNSTREAM LINK: A link on the forward path, corresponding to the
upstream link.
ACK: A cumulative TCP acknowledgment [<a href="./rfc791">RFC791</a>]. In this document,
this term refers to a TCP segment that carries a cumulative
acknowledgement (ACK), but no data.
DELAYED ACK FACTOR, d: The number of TCP data segments acknowledged
by a TCP ACK. The minimum value of d is 1, since at most one ACK
should be sent for each data packet [RFC1122, <a href="./rfc2581">RFC2581</a>].
STRETCH ACK: Stretch ACKs are acknowledgements that cover more than 2
segments of previously unacknowledged data (d>2) [<a href="./rfc2581" title=""TCP Congestion Control"">RFC2581</a>]. Stretch
ACKs can occur by design (although this is not standard), due to
implementation bugs [All97b, <a href="./rfc2525">RFC2525</a>], or due to ACK loss [<a href="./rfc2760" title=""Ongoing TCP Research Related to Satellites"">RFC2760</a>].
NORMALIZED BANDWIDTH RATIO, k: The ratio of the raw bandwidth
(capacity) of the forward direction to the return direction, divided
by the ratio of the packet sizes used in the two directions [<a href="#ref-LMS97" title=""Window-based Error Recovery and Flow Control with a Slow Acknowledgement Channel: A Study of TCP/IP Performance"">LMS97</a>].
SOFTSTATE: Per-flow state established in a network device that is
used by the protocol [<a href="#ref-Cla88" title=""The Design Philosophy of the DARPA Internet Protocols"">Cla88</a>]. The state expires after a period of
time (i.e., is not required to be explicitly deleted when a session
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
expires), and is continuously refreshed while a flow continues (i.e.,
lost state may be reconstructed without needing to exchange
additional control messages).
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>. Motivation</span>
Asymmetric characteristics are exhibited by several network
technologies, including cable data networks, (e.g., DOCSIS cable TV
networks [<a href="#ref-DS00" title="Inc.">DS00</a>, <a href="#ref-DS01" title="Inc.">DS01</a>]), direct broadcast satellite (e.g., an IP
service using Digital Video Broadcast, DVB, [<a href="#ref-EN97" title=""Digital Video Broadcasting (DVB); DVB Specification for Data Broadcasting"">EN97</a>] with an
interactive return channel), Very Small Aperture satellite Terminals
(VSAT), Asymmetric Digital Subscriber Line (ADSL) [<a href="#ref-ITU02" title=""Asymmetrical Digital Subscriber Line (ADSL) Transceivers"">ITU02</a>, <a href="#ref-ANS01" title=""Network to Customer Installation Interfaces - Asymmetric Digital Subscriber Lines (ADSL) Metallic Interface"">ANS01</a>], and
several packet radio networks. These networks are increasingly being
deployed as high-speed Internet access networks, and it is therefore
highly desirable to achieve good TCP performance. However, the
asymmetry of the network paths often makes this challenging.
Examples of some networks that exhibit asymmetry are provided in the
Appendix.
Asymmetry may manifest itself as a difference in transmit and receive
capacity, an imbalance in the packet loss rate, or differences
between the transmit and receive paths [<a href="./rfc3077" title=""A link Layer tunneling mechanism for unidirectional links"">RFC3077</a>]. For example, when
capacity is asymmetric, such that there is reduced capacity on
reverse path used by TCP ACKs, slow or infrequent ACK feedback
degrades TCP performance in the forward direction. Similarly,
asymmetry in the underlying Medium Access Control (MAC) and Physical
(PHY) protocols could make it expensive to transmit TCP ACKs
(disproportionately to their size), even when capacity is symmetric.
<span class="h3"><a class="selflink" id="section-2.1" href="#section-2.1">2.1</a> Asymmetry due to Differences in Transmit and Receive Capacity</span>
Network paths may be asymmetric because the upstream and downstream
links operate at different rates and/or are implemented using
different technologies.
The asymmetry in capacity may be substantially increased when best
effort IP flows carrying TCP ACKs share the available upstream
capacity with other traffic flows, e.g., telephony, especially flows
that have reserved upstream capacity. This includes service
guarantees at the IP layer (e.g., the Guaranteed Service [<a href="./rfc2212">RFC2212</a>])
or at the subnet layer (e.g., support of Voice over IP [<a href="#ref-ITU01" title=""Traffic Engineering Methods For IP Access Networks Based on Hybrid Fiber/Coax System"">ITU01</a>] using
the Unsolicited Grant service in DOCSIS [<a href="#ref-DS01" title="Inc.">DS01</a>], or CBR virtual
connections in ATM over ADSL [<a href="#ref-ITU02" title=""Asymmetrical Digital Subscriber Line (ADSL) Transceivers"">ITU02</a>, <a href="#ref-ANS01" title=""Network to Customer Installation Interfaces - Asymmetric Digital Subscriber Lines (ADSL) Metallic Interface"">ANS01</a>]).
When multiple upstream links exist the asymmetry may be reduced by
dividing upstream traffic between a number of available upstream
links.
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
<span class="h3"><a class="selflink" id="section-2.2" href="#section-2.2">2.2</a> Asymmetry due to Shared Media in the Reverse Direction</span>
In networks employing centralized multiple access control, asymmetry
may be a fundamental consequence of the hub-and-spokes architecture
of the network (i.e., a single base node communicating with multiple
downstream nodes). The central node often incurs less transmission
overhead and does not incur latency in scheduling its own downstream
transmissions. In contrast, upstream transmission is subject to
additional overhead and latency (e.g., due to guard times between
transmission bursts, and contention intervals). This can produce
significant network path asymmetry.
Upstream capacity may be further limited by the requirement that each
node must first request per-packet bandwidth using a contention MAC
protocol (e.g., DOCSIS 1.0 MAC restricts each node to sending at most
a single packet in each upstream time-division interval [<a href="#ref-DS00" title="Inc.">DS00</a>]). A
satellite network employing dynamic Bandwidth on Demand (BoD), also
consumes MAC resources for each packet sent (e.g., [<a href="#ref-EN00" title=""Digital Video Broadcasting (DVB); Interaction Channel for Satellite Distribution Systems"">EN00</a>]). In these
schemes, the available uplink capacity is a function of the MAC
algorithm. The MAC and PHY schemes also introduce overhead per
upstream transmission which could be so significant that transmitting
short packets (including TCP ACKs) becomes as costly as transmitting
MTU-sized data packets.
<span class="h3"><a class="selflink" id="section-2.3" href="#section-2.3">2.3</a> The General Problem</span>
Despite the technological differences between capacity-dependent and
MAC-dependent asymmetries, both kinds of network path suffer reduced
TCP performance for the same fundamental reason: the imperfection and
variability of ACK feedback. This document discusses the problem in
detail and describes several techniques that may reduce or eliminate
the constraints.
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>. How does Asymmetry Degrade TCP Performance?</span>
This section describes the implications of network path asymmetry on
TCP performance. The reader is referred to [BPK99, Bal98, Pad98,
FSS01, Sam99] for more details and experimental results.
<span class="h3"><a class="selflink" id="section-3.1" href="#section-3.1">3.1</a> Asymmetric Capacity</span>
The problems that degrade unidirectional transfer performance when
the forward and return paths have very different capacities depend on
the characteristics of the upstream link. Two types of situations
arise for unidirectional traffic over such network paths: when the
upstream bottleneck link has sufficient queuing to prevent packet
(ACK) losses, and when the upstream bottleneck link has a small
buffer. Each is considered in turn.
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
If the upstream bottleneck link has deep queues, so that this does
not drop ACKs in the reverse direction, then performance is a strong
function of the normalized bandwidth ratio, k. For example, for a 10
Mbps downstream link and a 50 Kbps upstream link, the raw capacity
ratio is 200. With 1000-byte data packets and 40-byte ACKs, the
ratio of the packet sizes is 25. This implies that k is 200/25 = 8.
Thus, if the receiver acknowledges more frequently than one ACK every
8 (k) data packets, the upstream link will become saturated before
the downstream link, limiting the throughput in the forward
direction. Note that, the achieved TCP throughput is determined by
the minimum of the receiver advertised window or TCP congestion
window, cwnd [<a href="./rfc2581" title=""TCP Congestion Control"">RFC2581</a>].
If ACKs are not dropped (at the upstream bottleneck link) and k > 1
or k > 0.5 when delayed ACKs are used [<a href="./rfc1122" title=""Requirements for Internet Hosts - Communication Layers"">RFC1122</a>], TCP ACK-clocking
breaks down. Consider two data packets transmitted by the sender in
quick succession. En route to the receiver, these packets get spaced
apart according to the capacity of the smallest bottleneck link in
the forward direction. The principle of ACK clocking is that the
ACKs generated in response to receiving these data packets reflects
this temporal spacing all the way back to the sender, enabling it to
transmit new data packets that maintain the same spacing [<a href="#ref-Jac88" title=""Congestion Avoidance and Control"">Jac88</a>]. ACK
clocking with delayed ACKs, reflects the spacing between data packets
that actually trigger ACKs. However, the limited upstream capacity
and queuing at the upstream bottleneck router alters the inter-ACK
spacing of the reverse path, and hence that observed at the sender.
When ACKs arrive at the upstream bottleneck link at a faster rate
than the link can support, they get queued behind one another. The
spacing between them when they emerge from the link is dilated with
respect to their original spacing, and is a function of the upstream
bottleneck capacity. Thus the TCP sender clocks out new data packets
at a slower rate than if there had been no queuing of ACKs. The
performance of the connection is no longer dependent on the
downstream bottleneck link alone; instead, it is throttled by the
rate of arriving ACKs. As a side effect, the sender's rate of cwnd
growth also slows down.
A second side effect arises when the upstream bottleneck link on the
reverse path is saturated. The saturated link causes persistent
queuing of packets, leading to an increasing path Round Trip Time
(RTT) [<a href="./rfc2998">RFC2998</a>] observed by all end hosts using the bottleneck link.
This can impact the protocol control loops, and may also trigger
false time out (underestimation of the path RTT by the sending host).
A different situation arises when the upstream bottleneck link has a
relatively small amount of buffer space to accommodate ACKs. As the
transmission window grows, this queue fills, and ACKs are dropped. If
the receiver were to acknowledge every packet, only one of every k
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
ACKs would get through to the sender, and the remaining (k-1) are
dropped due to buffer overflow at the upstream link buffer (here k is
the normalized bandwidth ratio as before). In this case, the reverse
bottleneck link capacity and slow ACK arrival rate are not directly
responsible for any degraded performance. However, the infrequency
of ACKs leads to three reasons for degraded performance:
1. The sender transmits data in large bursts of packets, limited only
by the available cwnd. If the sender receives only one ACK in k,
it transmits data in bursts of k (or more) packets because each
ACK shifts the sliding window by at least k (acknowledged) data
packets (TCP data segments). This increases the likelihood of
data packet loss along the forward path especially when k is
large, because routers do not handle large bursts of packets well.
2. Current TCP sender implementations increase their cwnd by counting
the number of ACKs they receive and not by how much data is
actually acknowledged by each ACK. The later approach, also known
as byte counting (<a href="#section-4.7">section 4.7</a>), is a standard implementation
option for cwnd increase during the congestion avoidance period
[<a href="./rfc2581" title=""TCP Congestion Control"">RFC2581</a>]. Thus fewer ACKs imply a slower rate of growth of the
cwnd, which degrades performance over long-delay connections.
3. The sender TCP's Fast Retransmission and Fast Recovery algorithms
[<a href="./rfc2581" title=""TCP Congestion Control"">RFC2581</a>] are less effective when ACKs are lost. The sender may
possibly not receive the threshold number of duplicate ACKs even
if the receiver transmits more than the DupACK threshold (> 3
DupACKs) [<a href="./rfc2581" title=""TCP Congestion Control"">RFC2581</a>]. Furthermore, the sender may possibly not
receive enough duplicate ACKs to adequately inflate its cwnd
during Fast Recovery.
<span class="h3"><a class="selflink" id="section-3.2" href="#section-3.2">3.2</a> MAC Protocol Interactions</span>
The interaction of TCP with MAC protocols may degrade end-to-end
performance. Variable round-trip delays and ACK queuing are the main
symptoms of this problem.
One example is the impact on terrestrial wireless networks [<a href="#ref-Bal98" title=""Challenges to Reliable Data Transport over Heterogeneous Wireless Networks"">Bal98</a>]. A
high per-packet overhead may arise from the need for communicating
link nodes to first synchronise (e.g., via a Ready To Send / Clear to
Send (RTS/CTS) protocol) before communication and the significant
turn-around time for the wireless channel. This overhead is
variable, since the RTS/CTS exchange may need to back-off
exponentially when the remote node is busy (e.g., engaged in a
conversation with a different node). This leads to large and
variable communication latencies in packet-radio networks.
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
An asymmetric workload (more downstream than upstream traffic) may
cause ACKs to be queued in some wireless nodes (especially in the end
host modems), exacerbating the variable latency. Queuing may also
occur in other shared media, e.g., cable modem uplinks, BoD access
systems often employed on shared satellite channels.
Variable latency and ACK queuing reduces the smoothness of the TCP
data flow. In particular, ACK traffic can interfere with the flow of
data packets, increasing the traffic load of the system.
TCP measures the path RTT, and from this calculates a smoothed RTT
estimate (srtt) and a linear deviation, rttvar. These are used to
estimate a path retransmission timeout (RTO) [<a href="./rfc2988" title=""Computing TCP's Retransmission Timer"">RFC2988</a>], set to srtt +
4*rttvar. For most wired TCP connections, the srtt remains constant
or has a low linear deviation. The RTO therefore tracks the path
RTT, and the TCP sender will respond promptly when multiple losses
occur in a window. In contrast, some wireless networks exhibit a
high variability in RTT, causing the RTO to significantly increase
(e.g., on the order of 10 seconds). Paths traversing multiple
wireless hops are especially vulnerable to this effect, because this
increases the probability that the intermediate nodes may already be
engaged in conversation with other nodes. The overhead in most MAC
schemes is a function of both the number and size of packets.
However, the MAC contention problem is a significant function of the
number of packets (e.g., ACKs) transmitted rather than their size.
In other words, there is a significant cost to transmitting a packet
regardless of packet size.
Experiments conducted on the Ricochet packet radio network in 1996
and 1997 demonstrated the impact of radio turnarounds and the
corresponding increased RTT variability, resulting in degraded TCP
performance. It was not uncommon for TCP connections to experience
timeouts of 9 - 12 seconds, with the result that many connections
were idle for a significant fraction of their lifetime (e.g.,
sometimes 35% of the total transfer time). This leads to under-
utilization of the available capacity. These effects may also occur
in other wireless subnetworks.
<span class="h3"><a class="selflink" id="section-3.3" href="#section-3.3">3.3</a> Bidirectional Traffic</span>
Bidirectional traffic arises when there are simultaneous TCP
transfers in the forward and reverse directions over an asymmetric
network path, e.g., a user who sends an e-mail message in the reverse
direction while simultaneously receiving a web page in the forward
direction. To simplify the discussion, only one TCP connection in
each direction is considered. In many practical cases, several
simultaneous connections need to share the available capacity,
increasing the level of congestion.
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
Bidirectional traffic makes the effects discussed in <a href="#section-3.1">section 3.1</a> more
pronounced, because part of the upstream link bandwidth is consumed
by the reverse transfer. This effectively increases the degree of
bandwidth asymmetry. Other effects also arise due to the interaction
between data packets of the reverse transfer and ACKs of the forward
transfer. Suppose at the time the forward TCP connection is
initiated, the reverse TCP connection has already saturated the
bottleneck upstream link with data packets. There is then a high
probability that many ACKs of the new forward TCP connection will
encounter a full upstream link buffer and hence get dropped. Even
after these initial problems, ACKs of the forward connection could
get queued behind large data packets of the reverse connection. The
larger data packets may have correspondingly long transmission times
(e.g., it takes about 280 ms to transmit a 1 Kbyte data packet over a
28.8 kbps line). This causes the forward transfer to stall for long
periods of time. It is only at times when the reverse connection
loses packets (due to a buffer overflow at an intermediate router)
and slows down, that the forward connection gets the opportunity to
make rapid progress and build up its cwnd.
When ACKs are queued behind other traffic for appreciable periods of
time, the burst nature of TCP traffic and self-synchronizing effects
can result in an effect known as ACK Compression [<a href="#ref-ZSC91" title=""Observations and Dynamics of a Congestion Control Algorithm: The Effects of Two-Way Traffic"">ZSC91</a>], which
reduces the throughput of TCP. It occurs when a series of ACKs, in
one direction are queued behind a burst of other packets (e.g., data
packets traveling in the same direction) and become compressed in
time. This results in an intense burst of data packets in the other
direction, in response to the burst of compressed ACKs arriving at
the server. This phenomenon has been investigated in detail for
bidirectional traffic, and recent analytical work [<a href="#ref-LMS97" title=""Window-based Error Recovery and Flow Control with a Slow Acknowledgement Channel: A Study of TCP/IP Performance"">LMS97</a>] has
predicted ACK Compression may also result from bi-directional
transmission with asymmetry, and was observed in practical asymmetric
satellite subnetworks [<a href="#ref-FSS01" title=""Performance Issues in Asymmetric Service Provision using Broadband Satellite"">FSS01</a>]. In the case of extreme asymmetry
(k>>1), the inter-ACK spacing can increase due to queuing (<a href="#section-3.1">section</a>
<a href="#section-3.1">3.1</a>), resulting in ACK dilation.
In summary, sharing of the upstream bottleneck link by multiple flows
(e.g., IP flows to the same end host, or flows to a number of end
hosts sharing a common upstream link) increases the level of ACK
Congestion. The presence of bidirectional traffic exacerbates the
constraints introduced by bandwidth asymmetry because of the adverse
interaction between (large) data packets of a reverse direction
connection and the ACKs of a forward direction connection.
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
<span class="h3"><a class="selflink" id="section-3.4" href="#section-3.4">3.4</a> Loss in Asymmetric Network Paths</span>
Loss may occur in either the forward or reverse direction. For data
transfer in the forward direction this results respectively in loss
of data packets and ACK packets. Loss of ACKs is less significant
than loss of data packets, because it generally results in stretch
ACKs [<a href="#ref-CR98" title=""Tuning TCP for High Performance in Hybrid Fiber Coaxial Broad-Band Access Networks"">CR98</a>, <a href="#ref-FSS01" title=""Performance Issues in Asymmetric Service Provision using Broadband Satellite"">FSS01</a>].
In the case of long delay paths, a slow upstream link [<a href="./rfc3150" title=""End- to-end Performance Implications of Slow Links"">RFC3150</a>] can
lead to another complication when the end host uses TCP large windows
[<a href="./rfc1323" title=""TCP Extensions for High Performance"">RFC1323</a>] to maximize throughput in the forward direction. Loss of
data packets on the forward path, due to congestion, or link loss,
common for some wireless links, will generate a large number of
back-to-back duplicate ACKs (or TCP SACK packets [<a href="./rfc2018" title=""TCP Selective Acknowledgment Options"">RFC2018</a>]), for each
correctly received data packet following a loss. The TCP sender
employs Fast Retransmission and Recovery [<a href="./rfc2581" title=""TCP Congestion Control"">RFC2581</a>] to recover from
the loss, but even if this is successful, the ACK to the
retransmitted data segment may be significantly delayed by other
duplicate ACKs still queued at the upstream link buffer. This can
ultimately lead to a timeout [<a href="./rfc2988" title=""Computing TCP's Retransmission Timer"">RFC2988</a>] and a premature end to the TCP
Slow Start [<a href="./rfc2581" title=""TCP Congestion Control"">RFC2581</a>]. This results in poor forward path throughput.
<a href="#section-5.3">Section 5.3</a> describes some mitigations to counter this.
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>. Improving TCP Performance using Host Mitigations</span>
There are two key issues that need to be addressed to improve TCP
performance over asymmetric networks. The first is to manage the
capacity of the upstream bottleneck link, used by ACKs and possibly
other traffic. A number of techniques exist which work by reducing
the number of ACKs that flow in the reverse direction. This has the
side effect of potentially destroying the desirable self-clocking
property of the TCP sender where transmission of new data packets is
triggered by incoming ACKs. Thus, the second issue is to avoid any
adverse impact of infrequent ACKs.
Each of these issues can be handled by local link-layer solutions
and/or by end-to-end techniques. This section discusses end-to-end
modifications. Some techniques require TCP receiver changes
(sections <a href="#section-4.1">4.1</a> 4.4, 4.5), some require TCP sender changes (sections
4.6, 4.7), and a pair requires changes to both the TCP sender and
receiver (sections <a href="#section-4.2">4.2</a>, <a href="#section-4.3">4.3</a>). One technique requires a sender
modification at the receiving host (<a href="#section-4.8">section 4.8</a>). The techniques may
be used independently, however some sets of techniques are
complementary, e.g., pacing (<a href="#section-4.6">section 4.6</a>) and byte counting (<a href="#section-4.7">section</a>
<a href="#section-4.7">4.7</a>) which have been bundled into a single TCP Sender Adaptation
scheme [<a href="#ref-BPK99" title=""The Effects of Asymmetry on TCP Performance"">BPK99</a>].
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 10]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-11" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
It is normally envisaged that these changes would occur in the end
hosts using the asymmetric path, however they could, and have, been
used in a middle-box or Protocol Enhancing Proxy (PEP) [<a href="./rfc3135" title=""Performance Enhancing Proxies Intended to Mitigate Link-Related Degradations"">RFC3135</a>]
employing split TCP. This document does not discuss the issues
concerning PEPs. <a href="#section-4">Section 4</a> describes several techniques, which do
not require end-to-end changes.
<span class="h3"><a class="selflink" id="section-4.1" href="#section-4.1">4.1</a> Modified Delayed ACKs</span>
There are two standard methods that can be used by TCP receivers to
generate acknowledgments. The method outlined in [<a href="./rfc793" title=""Transmission Control Protocol"">RFC793</a>] generates
an ACK for each incoming data segment (i.e., d=1). [<a href="./rfc1122" title=""Requirements for Internet Hosts - Communication Layers"">RFC1122</a>] states
that hosts should use "delayed acknowledgments". Using this
algorithm, an ACK is generated for at least every second full-sized
segment (d=2), or if a second full-sized segment does not arrive
within a given timeout (which must not exceed 500 ms [<a href="./rfc1122" title=""Requirements for Internet Hosts - Communication Layers"">RFC1122</a>], and
is typically less than 200 ms). Relaxing the latter constraint
(i.e., allowing d>2) may generate Stretch ACKs [<a href="./rfc2760" title=""Ongoing TCP Research Related to Satellites"">RFC2760</a>]. This
provides a possible mitigation, which reduces the rate at which ACKs
are returned by the receiver. An implementer should only deviate
from this requirement after careful consideration of the implications
[<a href="./rfc2581" title=""TCP Congestion Control"">RFC2581</a>].
Reducing the number of ACKs per received data segment has a number of
undesirable effects including:
(i) Increased path RTT
(ii) Increased time for TCP to open the cwnd
(iii) Increased TCP sender burst size, since cwnd opens in larger
steps
In addition, a TCP receiver is often unable to determine an optimum
setting for a large d, since it will normally be unaware of the
details of the properties of the links that form the path in the
reverse direction.
RECOMMENDATION: A TCP receiver must use the standard TCP algorithm
for sending ACKs as specified in [<a href="./rfc2581" title=""TCP Congestion Control"">RFC2581</a>]. That is, it may delay
sending an ACK after it receives a data segment [<a href="./rfc1122" title=""Requirements for Internet Hosts - Communication Layers"">RFC1122</a>]. When ACKs
are delayed, the receiver must generate an ACK within 500 ms and the
ACK should be generated for at least every second full sized segment
(MSS) of received data [<a href="./rfc2581" title=""TCP Congestion Control"">RFC2581</a>]. This will result in an ACK delay
factor (d) that does not exceed a value of 2. Changing the algorithm
would require a host modification to the TCP receiver and awareness
by the receiving host that it is using a connection with an
asymmetric path. Such a change has many drawbacks in the general
case and is currently not recommended for use within the Internet.
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 11]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-12" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
<span class="h3"><a class="selflink" id="section-4.2" href="#section-4.2">4.2</a> Use of Large MSS</span>
A TCP sender that uses a large Maximum Segment Size (MSS) reduces the
number of ACKs generated per transmitted byte of data.
Although individual subnetworks may support a large MTU, the majority
of current Internet links employ an MTU of approx 1500 bytes (that of
Ethernet). By setting the Don't Fragment (DF) bit in the IP header,
Path MTU (PMTU) discovery [<a href="./rfc1191" title=""Path MTU Discovery"">RFC1191</a>] may be used to determine the
maximum packet size (and hence MSS) a sender can use on a given
network path without being subjected to IP fragmentation, and
provides a way to automatically select a suitable MSS for a specific
path. This also guarantees that routers will not perform IP
fragmentation of normal data packets.
By electing not to use PMTU Discovery, an end host may choose to use
IP fragmentation by routers along the path in the forward direction
[<a href="./rfc793" title=""Transmission Control Protocol"">RFC793</a>]. This allows an MSS larger than smallest MTU along the
path. However, this increases the unit of error recovery (TCP
segment) above the unit of transmission (IP packet). This is not
recommended, since it can increase the number of retransmitted
packets following loss of a single IP packet, leading to reduced
efficiency, and potentially aggravating network congestion [<a href="#ref-Ken87" title=""Fragmentation Considered Harmful"">Ken87</a>].
Choosing an MSS larger than the forward path minimum MTU also permits
the sender to transmit more initial packets (a burst of IP fragments
for each TCP segment) when a session starts or following RTO expiry,
increasing the aggressiveness of the sender compared to standard TCP
[<a href="./rfc2581" title=""TCP Congestion Control"">RFC2581</a>]. This can adversely impact other standard TCP sessions
that share a network path.
RECOMMENDATION:
A larger forward path MTU is desirable for paths with bandwidth
asymmetry. Network providers may use a large MTU on links in the
forward direction. TCP end hosts using Path MTU discovery may be
able to take advantage of a large MTU by automatically selecting an
appropriate larger MSS, without requiring modification. The use of
Path MTU discovery [<a href="./rfc1191" title=""Path MTU Discovery"">RFC1191</a>] is therefore recommended.
Increasing the unit of error recovery and congestion control (MSS)
above the unit of transmission and congestion loss (the IP packet) by
using a larger end host MSS and IP fragmentation in routers is not
recommended.
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 12]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-13" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
<span class="h3"><a class="selflink" id="section-4.3" href="#section-4.3">4.3</a> ACK Congestion Control</span>
ACK Congestion Control (ACC) is an experimental technique that
operates end to end. ACC extends congestion control to ACKs, since
they may make non-negligible demands on resources (e.g., packet
buffers, and MAC transmission overhead) at an upstream bottleneck
link. It has two parts: (a) a network mechanism indicating to the
receiver that the ACK path is congested, and (b) the receiver's
response to such an indication.
A router feeding an upstream bottleneck link may detect incipient
congestion, e.g., using an algorithm based on RED (Random Early
Detection) [<a href="#ref-FJ93" title=""Random Early Detection gateways for Congestion Avoidance"">FJ93</a>]. This may track the average queue size over a time
window in the recent past. If the average exceeds a threshold, the
router may select a packet at random. If the packet IP header has
the Explicit Congestion Notification Capable Transport (ECT) bit set,
the router may mark the packet, i.e., sets an Explicit Congestion
Notification (ECN) [<a href="./rfc3168" title=""A Proposal to add Explicit Congestion Notification (ECN) to IP"">RFC3168</a>] bit(s) in the IP header, otherwise the
packet is normally dropped. The ECN notification received by the end
host is reflected back to the sending TCP end host, to trigger
congestion avoidance [<a href="./rfc3168" title=""A Proposal to add Explicit Congestion Notification (ECN) to IP"">RFC3168</a>]. Note that routers implementing RED
with ECN, do not eliminate packet loss, and may drop a packet (even
when the ECT bit is set). It is also possible to use an algorithm
other than RED to decide when to set the ECN bit.
ACC extends ECN so that both TCP data packets and ACKs set the ECT
bit and are thus candidates for being marked with an ECN bit.
Therefore, upon receiving an ACK with the ECN bit set [<a href="./rfc3168" title=""A Proposal to add Explicit Congestion Notification (ECN) to IP"">RFC3168</a>], a
TCP receiver reduces the rate at which it sends ACKs. It maintains a
dynamically varying delayed-ACK factor, d, and sends one ACK for
every d data packets received. When it receives a packet with the
ECN bit set, it increases d multiplicatively, thereby
multiplicatively decreasing the frequency of ACKs. For each
subsequent RTT (e.g., determined using the TCP RTTM option [<a href="./rfc1323" title=""TCP Extensions for High Performance"">RFC1323</a>])
during which it does not receive an ECN, it linearly decreases the
factor d, increasing the frequency of ACKs. Thus, the receiver
mimics the standard congestion control behavior of TCP senders in the
manner in which it sends ACKs.
The maximum value of d is determined by the TCP sender window size,
which could be conveyed to the receiver in a new (experimental) TCP
option. The receiver should send at least one ACK (preferably more)
for each window of data from the sender (i.e., d < (cwnd/mss)) to
prevent the sender from stalling until the receiver's delayed ACK
timer triggers an ACK to be sent.
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 13]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-14" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
RECOMMENDATION: ACK Congestion Control (ACC) is an experimental
technique that requires TCP sender and receiver modifications. There
is currently little experience of using such techniques in the
Internet. Future versions of TCP may evolve to include this or
similar techniques. These are the subject of ongoing research. ACC
is not recommended for use within the Internet in its current form.
<span class="h3"><a class="selflink" id="section-4.4" href="#section-4.4">4.4</a> Window Prediction Mechanism</span>
The Window Prediction Mechanism (WPM) is a TCP receiver side
mechanism [<a href="#ref-CLP98" title=""Window Prediction Mechanism for Improving TCP in Wireless Asymmetric Links"">CLP98</a>] that uses a dynamic ACK delay factor (varying d)
resembling the ACC scheme (<a href="#section-4.3">section 4.3</a>). The TCP receiver
reconstructs the congestion control behavior of the TCP sender by
predicting a cwnd value. This value is used along with the allowed
window to adjust the receiver's value of d. WPM accommodates for
unnecessary retransmissions resulting from losses due to link errors.
RECOMMENDATION: Window Prediction Mechanism (WPM) is an experimental
TCP receiver side modification. There is currently little experience
of using such techniques in the Internet. Future versions of TCP may
evolve to include this or similar techniques. These are the subjects
of ongoing research. WPM is not recommended for use within the
Internet in its current form.
<span class="h3"><a class="selflink" id="section-4.5" href="#section-4.5">4.5</a> Acknowledgement based on Cwnd Estimation.</span>
Acknowledgement based on Cwnd Estimation (ACE) [<a href="#ref-MJW00" title=""Improving TCP Performance Over Asymmetric Networks"">MJW00</a>] attempts to
measure the cwnd at the TCP receiver and maintain a varying ACK delay
factor (d). The cwnd is estimated by counting the number of packets
received during a path RTT. The technique may improve accuracy of
prediction of a suitable cwnd.
RECOMMENDATION: Acknowledgement based on Cwnd Estimation (ACE) is an
experimental TCP receiver side modification. There is currently
little experience of using such techniques in the Internet. Future
versions of TCP may evolve to include this or similar techniques.
These are the subject of ongoing research. ACE is not recommended
for use within the Internet in its current form.
<span class="h3"><a class="selflink" id="section-4.6" href="#section-4.6">4.6</a> TCP Sender Pacing</span>
Reducing the frequency of ACKs may alleviate congestion of the
upstream bottleneck link, but can lead to increased size of TCP
sender bursts (<a href="#section-4.1">section 4.1</a>). This may slow the growth of cwnd, and
is undesirable when used over shared network paths since it may
significantly increase the maximum number of packets in the
bottleneck link buffer, potentially resulting in an increase in
network congestion. This may also lead to ACK Compression [<a href="#ref-ZSC91" title=""Observations and Dynamics of a Congestion Control Algorithm: The Effects of Two-Way Traffic"">ZSC91</a>].
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 14]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-15" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
TCP Pacing [<a href="#ref-AST00" title=""Understanding the Performance of TCP Pacing"">AST00</a>], generally referred to as TCP Sender pacing,
employs an adapted TCP sender to alleviating transmission burstiness.
A bound is placed on the maximum number of packets the TCP sender can
transmit back-to-back (at local line rate), even if the window(s)
allow the transmission of more data. If necessary, more bursts of
data packets are scheduled for later points in time computed based on
the transmission rate of the TCP connection. The transmission rate
may be estimated from the ratio cwnd/srtt. Thus, large bursts of
data packets get broken up into smaller bursts spread over time.
A subnetwork may also provide pacing (e.g., Generic Traffic Shaping
(GTS)), but implies a significant increase in the per-packet
processing overhead and buffer requirement at the router where
shaping is performed (<a href="#section-5.3.3">section 5.3.3</a>).
RECOMMENDATIONS: TCP Sender Pacing requires a change to
implementation of the TCP sender. It may be beneficial in the
Internet and will significantly reduce the burst size of packets
transmitted by a host. This successfully mitigates the impact of
receiving Stretch ACKs. TCP Sender Pacing implies increased
processing cost per packet, and requires a prediction algorithm to
suggest a suitable transmission rate. There are hence performance
trade-offs between end host cost and network performance.
Specification of efficient algorithms remains an area of ongoing
research. Use of TCP Sender Pacing is not expected to introduce new
problems. It is an experimental mitigation for TCP hosts that may
control the burstiness of transmission (e.g., resulting from Type 1
techniques, <a href="#section-5.1.2">section 5.1.2</a>), however it is not currently widely
deployed. It is not recommended for use within the Internet in its
current form.
<span class="h3"><a class="selflink" id="section-4.7" href="#section-4.7">4.7</a> TCP Byte Counting</span>
The TCP sender can avoid slowing growth of cwnd by taking into
account the volume of data acknowledged by each ACK, rather than
opening the cwnd based on the number of received ACKs. So, if an ACK
acknowledges d data packets (or TCP data segments), the cwnd would
grow as if d separate ACKs had been received. This is called TCP
Byte Counting [RFC2581, <a href="./rfc2760">RFC2760</a>]. (One could treat the single ACK as
being equivalent to d/2, instead of d ACKs, to mimic the effect of
the TCP delayed ACK algorithm.) This policy works because cwnd
growth is only tied to the available capacity in the forward
direction, so the number of ACKs is immaterial.
This may mitigate the impact of asymmetry when used in combination
with other techniques (e.g., a combination of TCP Pacing
(section4.6), and ACC (<a href="#section-4.3">section 4.3</a>) associated with a duplicate ACK
threshold at the receiver.)
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 15]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-16" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
The main issue is that TCP byte counting may generate undesirable
long bursts of TCP packets at the sender host line rate. An
implementation must also consider that data packets in the forward
direction and ACKs in the reverse direction may both travel over
network paths that perform some amount of packet reordering.
Reordering of IP packets is currently common, and may arise from
various causes [<a href="#ref-BPS00" title=""Packet Reordering is Not Pathological Network Behaviour"">BPS00</a>].
RECOMMENDATION: TCP Byte Counting requires a small TCP sender
modification. In its simplest form, it can generate large bursts of
TCP data packets, particularly when Stretch ACKs are received.
Unlimited byte counting is therefore not allowed [<a href="./rfc2581" title=""TCP Congestion Control"">RFC2581</a>] for use
within the Internet.
It is therefore strongly recommended [RFC2581, <a href="./rfc2760">RFC2760</a>] that any byte
counting scheme should include a method to mitigate the potentially
large bursts of TCP data packets the algorithm can cause (e.g., TCP
Sender Pacing (<a href="#section-4.6">section 4.6</a>), ABC [<a href="#ref-abc-ID" title=""TCP Congestion Control with Appropriate Byte Counting"">abc-ID</a>]). If the burst size or
sending rate of the TCP sender can be controlled then the scheme may
be beneficial when Stretch ACKs are received. Determining safe
algorithms remain an area of ongoing research. Further
experimentation will then be required to assess the success of these
safeguards, before they can be recommended for use in the Internet.
<span class="h3"><a class="selflink" id="section-4.8" href="#section-4.8">4.8</a> Backpressure</span>
Backpressure is a technique to enhance the performance of
bidirectional traffic for end hosts directly connected to the
upstream bottleneck link [<a href="#ref-KVR98" title=""Improving TCP Throughput over Two-Way Asymmetric Links: Analysis and Solutions"">KVR98</a>]. A limit is set on how many data
packets of upstream transfers can be enqueued at the upstream
bottleneck link. In other words, the bottleneck link queue exerts
'backpressure' on the TCP (sender) layer. This requires a modified
implementation, compared to that currently deployed in many TCP
stacks. Backpressure ensures that ACKs of downstream connections do
not get starved at the upstream bottleneck, thereby improving
performance of the downstream connections. Similar generic schemes
that may be implemented in hosts/routers are discussed in <a href="#section-5.4">section</a>
<a href="#section-5.4">5.4</a>.
Backpressure can be unfair to a reverse direction connection and make
its throughput highly sensitive to the dynamics of the forward
connection(s).
RECOMMENDATION: Backpressure requires an experimental modification to
the sender protocol stack of a host directly connected to an upstream
bottleneck link. Use of backpressure is an implementation issue,
rather than a network protocol issue. Where backpressure is
implemented, the optimizations described in this section could be
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 16]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-17" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
desirable and can benefit bidirectional traffic for hosts.
Specification of safe algorithms for providing backpressure is still
a subject of ongoing research. The technique is not recommended for
use within the Internet in its current form.
<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>. Improving TCP performance using Transparent Modifications</span>
Various link and network layer techniques have been suggested to
mitigate the effect of an upstream bottleneck link. These techniques
may provide benefit without modification to either the TCP sender or
receiver, or may alternately be used in conjunction with one or more
of the schemes identified in <a href="#section-4">section 4</a>. In this document, these
techniques are known as "transparent" [<a href="./rfc3135" title=""Performance Enhancing Proxies Intended to Mitigate Link-Related Degradations"">RFC3135</a>], because at the
transport layer, the TCP sender and receiver are not necessarily
aware of their existence. This does not imply that they do not
modify the pattern and timing of packets as observed at the network
layer. The techniques are classified here into three types based on
the point at which they are introduced.
Most techniques require the individual TCP connections passing over
the bottleneck link(s) to be separately identified and imply that
some per-flow state is maintained for active TCP connections. A link
scheduler may also be employed (<a href="#section-5.4">section 5.4</a>). The techniques (with
one exception, ACK Decimation (<a href="#section-5.2.2">section 5.2.2</a>) require:
(i) Visibility of an unencrypted IP and TCP packet header (e.g., no
use of IPSec with payload encryption [<a href="./rfc2406" title=""IP Encapsulating Security Payload (ESP)"">RFC2406</a>]).
(ii) Knowledge of IP/TCP options and ability to inspect packets with
tunnel encapsulations (e.g., [<a href="./rfc2784" title=""Generic Routing Encapsulation (GRE)"">RFC2784</a>]) or to suspend
processing of packets with unknown formats.
(iii) Ability to demultiplex flows (by using address/protocol/port
number, or an explicit flow-id).
[<a id="ref-RFC3135">RFC3135</a>] describes a class of network device that provides more than
forwarding of packets, and which is known as a Protocol Enhancing
Proxy (PEP). A large spectrum of PEP devices exists, ranging from
simple devices (e.g., ACK filtering) to more sophisticated devices
(e.g., stateful devices that split a TCP connection into two separate
parts). The techniques described in <a href="#section-5">section 5</a> of this document
belong to the simpler type, and do not inspect or modify any TCP or
UDP payload data. They also do not modify port numbers or link
addresses. Many of the risks associated with more complex PEPs do
not exist for these schemes. Further information about the operation
and the risks associated with using PEPs are described in [<a href="./rfc3135" title=""Performance Enhancing Proxies Intended to Mitigate Link-Related Degradations"">RFC3135</a>].
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 17]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-18" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
<span class="h3"><a class="selflink" id="section-5.1" href="#section-5.1">5.1</a> TYPE 0: Header Compression</span>
A client may reduce the volume of bits used to send a single ACK by
using compression [RFC3150, <a href="./rfc3135">RFC3135</a>]. Most modern dial-up modems
support ITU-T V.42 bulk compression. In contrast to bulk
compression, header compression is known to be very effective at
reducing the number of bits sent on the upstream link [<a href="./rfc1144" title=""Compressing TCP/IP Headers for Low-Speed Serial Links"">RFC1144</a>]. This
relies on the observation that most TCP packet headers vary only in a
few bit positions between successive packets in a flow, and that the
variations can often be predicted.
<span class="h4"><a class="selflink" id="section-5.1.1" href="#section-5.1.1">5.1.1</a> TCP Header Compression</span>
TCP header compression [<a href="./rfc1144" title=""Compressing TCP/IP Headers for Low-Speed Serial Links"">RFC1144</a>] (sometimes known as V-J compression)
is a Proposed Standard describing use over low capacity links running
SLIP or PPP [<a href="./rfc3150" title=""End- to-end Performance Implications of Slow Links"">RFC3150</a>]. It greatly reduces the size of ACKs on the
reverse link when losses are infrequent (a situation that ensures
that the state of the compressor and decompressor are synchronized).
However, this alone does not address all of the asymmetry issues:
(i) In some (e.g., wireless) subnetworks there is a significant
per-packet MAC overhead that is independent of packet size
(<a href="#section-3.2">section 3.2</a>).
(ii) A reduction in the size of ACKs does not prevent adverse
interaction with large upstream data packets in the presence
of bidirectional traffic (<a href="#section-3.3">section 3.3</a>).
(iii) TCP header compression cannot be used with packets that have
IP or TCP options (including IPSec [RFC2402, <a href="./rfc2406">RFC2406</a>], TCP
RTTM [<a href="./rfc1323" title=""TCP Extensions for High Performance"">RFC1323</a>], TCP SACK [<a href="./rfc2018" title=""TCP Selective Acknowledgment Options"">RFC2018</a>], etc.).
(iv) The performance of header compression described by <a href="./rfc1144">RFC1144</a> is
significantly degraded when compressed packets are lost. An
improvement, which can still incur significant penalty on
long network paths is described in [<a href="./rfc2507" title=""IP Header Compression"">RFC2507</a>]. This suggests
it should only be used on links (or paths) that experience a
low level of packet loss [<a href="./rfc3150" title=""End- to-end Performance Implications of Slow Links"">RFC3150</a>].
(v) The normal implementation of Header Compression inhibits
compression when IP is used to support tunneling (e.g., L2TP,
GRE [<a href="./rfc2794">RFC2794</a>], IP-in-IP). The tunnel encapsulation
complicates locating the appropriate packet headers. Although
GRE allows Header Compression on the inner (tunneled) IP
header [<a href="./rfc2784" title=""Generic Routing Encapsulation (GRE)"">RFC2784</a>], this is not recommended, since loss of a
packet (e.g., due to router congestion along the tunnel path)
will result in discard of all packets for one RTT [<a href="./rfc1144" title=""Compressing TCP/IP Headers for Low-Speed Serial Links"">RFC1144</a>].
RECOMMENDATION: TCP Header Compression is a transparent modification
performed at both ends of the upstream bottleneck link. It offers no
benefit for flows employing IPSec [RFC2402, <a href="./rfc2406">RFC2406</a>], or when
additional protocol headers are present (e.g., IP or TCP options,
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 18]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-19" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
and/or tunnel encapsulation headers). The scheme is widely
implemented and deployed and used over Internet links. It is
recommended to improve TCP performance for paths that have a low-to-
medium bandwidth asymmetry (e.g., k<10).
In the form described in [<a href="./rfc1144" title=""Compressing TCP/IP Headers for Low-Speed Serial Links"">RFC1144</a>], TCP performance is degraded when
used over links (or paths) that may exhibit appreciable rates of
packet loss [<a href="./rfc3150" title=""End- to-end Performance Implications of Slow Links"">RFC3150</a>]. It may also not provide significant
improvement for upstream links with bidirectional traffic. It is
therefore not desirable for paths that have a high bandwidth
asymmetry (e.g., k>10).
<span class="h4"><a class="selflink" id="section-5.1.2" href="#section-5.1.2">5.1.2</a> Alternate Robust Header Compression Algorithms</span>
TCP header compression [<a href="./rfc1144" title=""Compressing TCP/IP Headers for Low-Speed Serial Links"">RFC1144</a>] and IP header compression [<a href="./rfc2507" title=""IP Header Compression"">RFC2507</a>]
do not perform well when subject to packet loss. Further, they do
not compress packets with TCP option fields (e.g., SACK [<a href="./rfc2018" title=""TCP Selective Acknowledgment Options"">RFC2018</a>] and
Timestamp (RTTM) [<a href="./rfc1323" title=""TCP Extensions for High Performance"">RFC1323</a>]). However, recent work on more robust
schemes suggest that a new generation of compression algorithms may
be developed which are much more robust. The IETF ROHC working group
has specified compression techniques for UDP-based traffic [<a href="./rfc3095" title=""RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP ESP and uncompressed"">RFC3095</a>]
and is examining a number of schemes that may provide improve TCP
header compression. These could be beneficial for asymmetric network
paths.
RECOMMENDATION: Robust header compression is a transparent
modification that may be performed at both ends of an upstream
bottleneck link. This class of techniques may also be suited to
Internet paths that suffer low levels of re-ordering. The techniques
benefit paths with a low-to-medium bandwidth asymmetry (e.g., k>10)
and may be robust to packet loss.
Selection of suitable compression algorithms remains an area of
ongoing research. It is possible that schemes may be derived which
support IPSec authentication, but not IPSec payload encryption. Such
schemes do not alone provide significant improvement in asymmetric
networks with a high asymmetry and/or bidirectional traffic.
<span class="h3"><a class="selflink" id="section-5.2" href="#section-5.2">5.2</a> TYPE 1: Reverse Link Bandwidth Management</span>
Techniques beyond Type 0 header compression are required to address
the performance problems caused by appreciable asymmetry (k>>1). One
set of techniques is implemented only at one point on the reverse
direction path, within the router/host connected to the upstream
bottleneck link. These use flow class or per-flow queues at the
upstream link interface to manage the queue of packets waiting for
transmission on the bottleneck upstream link.
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 19]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-20" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
This type of technique bounds the upstream link buffer queue size,
and employs an algorithm to remove (discard) excess ACKs from each
queue. This relies on the cumulative nature of ACKs (<a href="#section-4.1">section 4.1</a>).
Two approaches are described which employ this type of mitigation.
<span class="h4"><a class="selflink" id="section-5.2.1" href="#section-5.2.1">5.2.1</a> ACK Filtering</span>
ACK Filtering (AF) [<a href="#ref-DMT96" title=""TCP Extensions for Space Communications"">DMT96</a>, <a href="#ref-BPK99" title=""The Effects of Asymmetry on TCP Performance"">BPK99</a>] (also known as ACK Suppression
[<a href="#ref-SF98" title=""High Speed Internet Access using Satellite-based DVB Networks"">SF98</a>, <a href="#ref-Sam99" title=""Return Link Optimization for Internet Service Provision Using DVB-S Networks"">Sam99</a>, <a href="#ref-FSS01" title=""Performance Issues in Asymmetric Service Provision using Broadband Satellite"">FSS01</a>]) is a TCP-aware link-layer technique that
reduces the number of ACKs sent on the upstream link. This technique
has been deployed in specific production networks (e.g., asymmetric
satellite networks [<a href="#ref-ASB96" title=""Asymmetric Internet Access over Satellite-Terrestrial Networks"">ASB96</a>]). The challenge is to ensure that the
sender does not stall waiting for ACKs, which may happen if ACKs are
indiscriminately removed.
When an ACK from the receiver is about to be enqueued at a upstream
bottleneck link interface, the router or the end host link layer (if
the host is directly connected to the upstream bottleneck link)
checks the transmit queue(s) for older ACKs belonging to the same TCP
connection. If ACKs are found, some (or all of them) are removed
from the queue, reducing the number of ACKs.
Some ACKs also have other functions in TCP [<a href="./rfc1144" title=""Compressing TCP/IP Headers for Low-Speed Serial Links"">RFC1144</a>], and should not
be deleted to ensure normal operation. AF should therefore not
delete an ACK that has any data or TCP flags set (SYN, RST, URG, and
FIN). In addition, it should avoid deleting a series of 3 duplicate
ACKs that indicate the need for Fast Retransmission [<a href="./rfc2581" title=""TCP Congestion Control"">RFC2581</a>] or ACKs
with the Selective ACK option (SACK)[<a href="./rfc2018" title=""TCP Selective Acknowledgment Options"">RFC2018</a>] from the queue to avoid
causing problems to TCP's data-driven loss recovery mechanisms.
Appropriate treatment is also needed to preserve correct operation of
ECN feedback (carried in the TCP header) [<a href="./rfc3168" title=""A Proposal to add Explicit Congestion Notification (ECN) to IP"">RFC3168</a>].
A range of policies to filter ACKs may be used. These may be either
deterministic or random (similar to a random-drop gateway, but should
take into consideration the semantics of the items in the queue).
Algorithms have also been suggested to ensure a minimum ACK rate to
guarantee the TCP sender window is updated [<a href="#ref-Sam99" title=""Return Link Optimization for Internet Service Provision Using DVB-S Networks"">Sam99</a>, <a href="#ref-FSS01" title=""Performance Issues in Asymmetric Service Provision using Broadband Satellite"">FSS01</a>], and to
limit the number of data packets (TCP segments) acknowledged by a
Stretch ACK. Per-flow state needs to be maintained only for
connections with at least one packet in the queue (similar to FRED
[<a href="#ref-LM97" title=""Dynamics of Random Early Detection"">LM97</a>]). This state is soft [<a href="#ref-Cla88" title=""The Design Philosophy of the DARPA Internet Protocols"">Cla88</a>], and if necessary, can easily be
reconstructed from the contents of the queue.
The undesirable effect of delayed DupACKs (<a href="#section-3.4">section 3.4</a>) can be
reduced by deleting duplicate ACKs above a threshold value [MJW00,
CLP98] allowing Fast Retransmission, but avoiding early TCP timeouts,
which may otherwise result from excessive queuing of DupACKs.
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 20]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-21" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
Future schemes may include more advanced rules allowing removal of
selected SACKs [<a href="./rfc2018" title=""TCP Selective Acknowledgment Options"">RFC2018</a>]. Such a scheme could prevent the upstream
link queue from becoming filled by back-to-back ACKs with SACK
blocks. Since a SACK packet is much larger than an ACK, it would
otherwise add significantly to the path delay in the reverse
direction. Selection of suitable algorithms remains an ongoing area
of research.
RECOMMENDATION: ACK Filtering requires a modification to the upstream
link interface. The scheme has been deployed in some networks where
the extra processing overhead (per ACK) may be compensated for by
avoiding the need to modify TCP. ACK Filtering can generate Stretch
ACKs resulting in large bursts of TCP data packets. Therefore on its
own, it is not recommended for use in the general Internet.
ACK Filtering when used in combination with a scheme to mitigate the
effect of Stretch ACKs (i.e., control TCP sender burst size) is
recommended for paths with appreciable asymmetry (k>1) and/or with
bidirectional traffic. Suitable algorithms to support IPSec
authentication, SACK, and ECN remain areas of ongoing research.
<span class="h4"><a class="selflink" id="section-5.2.2" href="#section-5.2.2">5.2.2</a> ACK Decimation</span>
ACK Decimation is based on standard router mechanisms. By using an
appropriate configuration of (small) per-flow queues and a chosen
dropping policy (e.g., Weighted Fair Queuing, WFQ) at the upstream
bottleneck link, a similar effect to AF (<a href="#section-5.2.1">section 5.2.1</a>) may be
obtained, but with less control of the actual packets which are
dropped.
In this scheme, the router/host at the bottleneck upstream link
maintains per-flow queues and services them fairly (or with
priorities) by queuing and scheduling of ACKs and data packets in the
reverse direction. A small queue threshold is maintained to drop
excessive ACKs from the tail of each queue, in order to reduce ACK
Congestion. The inability to identify special ACK packets (c.f., AF)
introduces some major drawbacks to this approach, such as the
possibility of losing DupACKs, FIN/ACK, RST packets, or packets
carrying ECN information [<a href="./rfc3168" title=""A Proposal to add Explicit Congestion Notification (ECN) to IP"">RFC3168</a>]. Loss of these packets does not
significantly impact network congestion, but does adversely impact
the performance of the TCP session observing the loss.
A WFQ scheduler may assign a higher priority to interactive traffic
(providing it has a mechanism to identify such traffic) and provide a
fair share of the remaining capacity to the bulk traffic. In the
presence of bidirectional traffic, and with a suitable scheduling
policy, this may ensure fairer sharing for ACK and data packets. An
increased forward transmission rate is achieved over asymmetric links
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 21]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-22" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
by an increased ACK Decimation rate, leading to generation of Stretch
ACKs. As in AF, TCP sender burst size increases when Stretch ACKs
are received unless other techniques are used in combination with
this technique.
This technique has been deployed in specific networks (e.g., a
network with high bandwidth asymmetry supporting high-speed data
services to in-transit mobile hosts [<a href="#ref-Seg00" title=""Asymmetric Networking Techniques For Hybrid Satellite Communications"">Seg00</a>]). Although not optimal,
it offered a potential mitigation applicable when the TCP header is
difficult to identify or not visible to the link layer (e.g., due to
IPSec encryption).
RECOMMENDATION: ACK Decimation uses standard router mechanisms at the
upstream link interface to constrain the rate at which ACKs are fed
to the upstream link. The technique is beneficial with paths having
appreciable asymmetry (k>1). It is however suboptimal, in that it
may lead to inefficient TCP error recovery (and hence in some cases
degraded TCP performance), and provides only crude control of link
behavior. It is therefore recommended that where possible, ACK
Filtering should be used in preference to ACK Decimation.
When ACK Decimation is used on paths with an appreciable asymmetry
(k>1) (or with bidirectional traffic) it increases the burst size of
the TCP sender, use of a scheme to mitigate the effect of Stretch
ACKs or control burstiness is therefore strongly recommended.
<span class="h3"><a class="selflink" id="section-5.3" href="#section-5.3">5.3</a> TYPE 2: Handling Infrequent ACKs</span>
TYPE 2 mitigations perform TYPE 1 upstream link bandwidth management,
but also employ a second active element which mitigates the effect of
the reduced ACK rate and burstiness of ACK transmission. This is
desirable when end hosts use standard TCP sender implementations
(e.g., those not implementing the techniques in sections <a href="#section-4.6">4.6</a>, <a href="#section-4.7">4.7</a>).
Consider a path where a TYPE 1 scheme forwards a Stretch ACK covering
d TCP packets (i.e., where the acknowledgement number is d*MSS larger
than the last ACK received by the TCP sender). When the TCP sender
receives this ACK, it can send a burst of d (or d+1) TCP data
packets. The sender is also constrained by the current cwnd.
Received ACKs also serve to increase cwnd (by at most one MSS).
A TYPE 2 scheme mitigates the impact of the reduced ACK frequency
resulting when a TYPE 1 scheme is used. This is achieved by
interspersing additional ACKs before each received Stretch ACK. The
additional ACKs, together with the original ACK, provide the TCP
sender with sufficient ACKs to allow the TCP cwnd to open in the same
way as if each of the original ACKs sent by the TCP receiver had been
forwarded by the reverse path. In addition, by attempting to restore
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 22]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-23" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
the spacing between ACKs, such a scheme can also restore the TCP
self-clocking behavior, and reduce the TCP sender burst size. Such
schemes need to ensure conservative behavior (i.e., should not
introduce more ACKs than were originally sent) and reduce the
probability of ACK Compression [<a href="#ref-ZSC91" title=""Observations and Dynamics of a Congestion Control Algorithm: The Effects of Two-Way Traffic"">ZSC91</a>].
The action is performed at two points on the return path: the
upstream link interface (where excess ACKs are removed), and a point
further along the reverse path (after the bottleneck upstream
link(s)), where replacement ACKs are inserted. This attempts to
reconstruct the ACK stream sent by the TCP receiver when used in
combination with AF (<a href="#section-5.2.1">section 5.2.1</a>), or ACK Decimation (<a href="#section-5.2.2">section</a>
<a href="#section-5.2.2">5.2.2</a>).
TYPE 2 mitigations may be performed locally at the receive interface
directly following the upstream bottleneck link, or may alternatively
be applied at any point further along the reverse path (this is not
necessarily on the forward path, since asymmetric routing may employ
different forward and reverse internet paths). Since the techniques
may generate multiple ACKs upon reception of each individual Stretch
ACK, it is strongly recommended that the expander implements a scheme
to prevent exploitation as a "packet amplifier" in a Denial-of-
Service (DoS) attack (e.g., to verify the originator of the ACK).
Identification of the sender could be accomplished by appropriately
configured packet filters and/or by tunnel authentication procedures
(e.g., [RFC2402, <a href="./rfc2406">RFC2406</a>]). A limit on the number of reconstructed
ACKs that may be generated from a single packet may also be
desirable.
<span class="h4"><a class="selflink" id="section-5.3.1" href="#section-5.3.1">5.3.1</a> ACK Reconstruction</span>
ACK Reconstruction (AR) [<a href="#ref-BPK99" title=""The Effects of Asymmetry on TCP Performance"">BPK99</a>] is used in conjunction with AF
(<a href="#section-5.2.1">section 5.2.1</a>). AR deploys a soft-state [<a href="#ref-Cla88" title=""The Design Philosophy of the DARPA Internet Protocols"">Cla88</a>] agent called an ACK
Reconstructor on the reverse path following the upstream bottleneck
link. The soft-state can be regenerated if lost, based on received
ACKs. When a Stretch ACK is received, AR introduces additional ACKs
by filling gaps in the ACK sequence. Some potential Denial-of-
Service vulnerabilities may arise (<a href="#section-6">section 6</a>) and need to be
addressed by appropriate security techniques.
The Reconstructor determines the number of additional ACKs, by
estimating the number of filtered ACKs. This uses implicit
information present in the received ACK stream by observing the ACK
sequence number of each received ACK. An example implementation
could set an ACK threshold, ackthresh, to twice the MSS (this assumes
the chosen MSS is known by the link). The factor of two corresponds
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 23]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-24" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
to standard TCP delayed-ACK policy (d=2). Thus, if successive ACKs
arrive separated by delta, the Reconstructor regenerates a maximum of
((delta/ackthresh) - 2) ACKs.
To reduce the TCP sender burst size and allow the cwnd to increase at
a rate governed by the downstream link, the reconstructed ACKs must
be sent at a consistent rate (i.e., temporal spacing between
reconstructed ACKs). One method is for the Reconstructor to measure
the arrival rate of ACKs using an exponentially weighted moving
average estimator. This rate depends on the output rate from the
upstream link and on the presence of other traffic sharing the link.
The output of the estimator indicates the average temporal spacing
for the ACKs (and the average rate at which ACKs would reach the TCP
sender if there were no further losses or delays). This may be used
by the Reconstructor to set the temporal spacing of reconstructed
ACKs. The scheme may also be used in combination with TCP sender
adaptation (e.g., a combination of the techniques in sections <a href="#section-4.6">4.6</a> and
4.7).
The trade-off in AR is between obtaining less TCP sender burstiness,
and a better rate of cwnd increase, with a reduction in RTT
variation, versus a modest increase in the path RTT. The technique
cannot perform reconstruction on connections using IPSec (AH
[<a href="./rfc2402" title=""IP Authentication Header"">RFC2402</a>] or ESP [<a href="./rfc2406" title=""IP Encapsulating Security Payload (ESP)"">RFC2406</a>]), since it is unable to generate
appropriate security information. It also cannot regenerate other
packet header information (e.g., the exact pattern of bits carried in
the IP packet ECN field [<a href="./rfc3168" title=""A Proposal to add Explicit Congestion Notification (ECN) to IP"">RFC3168</a>] or the TCP RTTM option [<a href="./rfc1323" title=""TCP Extensions for High Performance"">RFC1323</a>]).
An ACK Reconstructor operates correctly (i.e., generates no spurious
ACKs and preserves the end-to-end semantics of TCP), providing:
(i) the TCP receiver uses ACK Delay (d=2) [<a href="./rfc2581" title=""TCP Congestion Control"">RFC2581</a>]
(ii) the Reconstructor receives only in-order ACKs
(iii) all ACKs are routed via the Reconstructor
(iv) the Reconstructor correctly determines the TCP MSS used by
the session
(v) the packets do not carry additional header information (e.g.,
TCP RTTM option [<a href="./rfc1323" title=""TCP Extensions for High Performance"">RFC1323</a>], IPSec using AH [<a href="./rfc2402" title=""IP Authentication Header"">RFC2402</a>]or ESP
[<a href="./rfc2406" title=""IP Encapsulating Security Payload (ESP)"">RFC2406</a>]).
RECOMMENDATION: ACK Reconstruction is an experimental transparent
modification performed on the reverse path following the upstream
bottleneck link. It is designed to be used in conjunction with a
TYPE 1 mitigation. It reduces the burst size of TCP transmission in
the forward direction, which may otherwise increase when TYPE 1
schemes are used alone. It requires modification of equipment after
the upstream link (including maintaining per-flow soft state). The
scheme introduces implicit assumptions about the network path and has
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 24]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-25" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
potential Denial-of-Service vulnerabilities (i.e., acting as a packet
amplifier); these need to be better understood and addressed by
appropriate security techniques.
Selection of appropriate algorithms to pace the ACK traffic remains
an open research issue. There is also currently little experience of
the implications of using such techniques in the Internet, and
therefore it is recommended that this technique should not be used
within the Internet in its current form.
<span class="h4"><a class="selflink" id="section-5.3.2" href="#section-5.3.2">5.3.2</a> ACK Compaction and Companding</span>
ACK Compaction and ACK Companding [SAM99, FSS01] are techniques that
operate at a point on the reverse path following the constrained ACK
bottleneck. Like AR (<a href="#section-5.3.1">section 5.3.1</a>), ACK Compaction and ACK
Companding are both used in conjunction with an AF technique (<a href="#section-5.2.1">section</a>
<a href="#section-5.2.1">5.2.1</a>) and regenerate filtered ACKs, restoring the ACK stream.
However, they differ from AR in that they use a modified AF (known as
a compactor or compressor), in which explicit information is added to
all Stretch ACKs generated by the AF. This is used to explicitly
synchronize the reconstruction operation (referred to here as
expansion).
The modified AF combines two modifications: First, when the
compressor deletes an ACK from the upstream bottleneck link queue, it
appends explicit information (a prefix) to the remaining ACK (this
ACK is marked to ensure it is not subsequently deleted). The
additional information contains details the conditions under which
ACKs were previously filtered. A variety of information may be
encoded in the prefix. This includes the number of ACKs deleted by
the AF and the average number of bytes acknowledged. This may
subsequently be used by an expander at the remote end of the tunnel.
Further timing information may also be added to control the pacing of
the regenerated ACKs [<a href="#ref-FSS01" title=""Performance Issues in Asymmetric Service Provision using Broadband Satellite"">FSS01</a>]. The temporal spacing of the filtered
ACKs may also be encoded.
To encode the prefix requires the subsequent expander to recognize a
modified ACK header. This would normally limit the expander to
link-local operation (at the receive interface of the upstream
bottleneck link). If remote expansion is needed further along the
reverse path, a tunnel may be used to pass the modified ACKs to the
remote expander. The tunnel introduces extra overhead, however
networks with asymmetric capacity and symmetric routing frequently
already employ such tunnels (e.g., in a UDLR network [<a href="./rfc3077" title=""A link Layer tunneling mechanism for unidirectional links"">RFC3077</a>], the
expander may be co-located with the feed router).
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 25]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-26" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
ACK expansion uses a stateless algorithm to expand the ACK (i.e.,
each received packet is processed independently of previously
received packets). It uses the prefix information together with the
acknowledgment field in the received ACK, to produce an equivalent
number of ACKs to those previously deleted by the compactor. These
ACKs are forwarded to the original destination (i.e., the TCP
sender), preserving normal TCP ACK clocking. In this way, ACK
Compaction, unlike AR, is not reliant on specific ACK policies, nor
must it see all ACKs associated with the reverse path (e.g., it may
be compatible with schemes such as DAASS [<a href="./rfc2760" title=""Ongoing TCP Research Related to Satellites"">RFC2760</a>]).
Some potential Denial-of-Service vulnerabilities may arise (<a href="#section-6">section</a>
<a href="#section-6">6</a>) and need to be addressed by appropriate security techniques. The
technique cannot perform reconstruction on connections using IPSec,
since they are unable to regenerate appropriate security information.
It is possible to explicitly encode IPSec security information from
suppressed packets, allowing operation with IPSec AH, however this
remains an open research issue, and implies an additional overhead
per ACK.
RECOMMENDATION: ACK Compaction and Companding are experimental
transparent modifications performed on the reverse path following the
upstream bottleneck link. They are designed to be used in
conjunction with a modified TYPE 1 mitigation and reduce the burst
size of TCP transmission in the forward direction, which may
otherwise increase when TYPE 1 schemes are used alone.
The technique is desirable, but requires modification of equipment
after the upstream bottleneck link (including processing of a
modified ACK header). Selection of appropriate algorithms to pace
the ACK traffic also remains an open research issue. Some potential
Denial-of-Service vulnerabilities may arise with any device that may
act as a packet amplifier. These need to be addressed by appropriate
security techniques. There is little experience of using the scheme
over Internet paths. This scheme is a subject of ongoing research
and is not recommended for use within the Internet in its current
form.
<span class="h4"><a class="selflink" id="section-5.3.3" href="#section-5.3.3">5.3.3</a> Mitigating TCP packet bursts generated by Infrequent ACKs</span>
The bursts of data packets generated when a Type 1 scheme is used on
the reverse direction path may be mitigated by introducing a router
supporting Generic Traffic Shaping (GTS) on the forward path [<a href="#ref-Seg00" title=""Asymmetric Networking Techniques For Hybrid Satellite Communications"">Seg00</a>].
GTS is a standard router mechanism implemented in many deployed
routers. This technique does not eliminate the bursts of data
generated by the TCP sender, but attempts to smooth out the bursts by
employing scheduling and queuing techniques, producing traffic which
resembles that when TCP Pacing is used (<a href="#section-4.6">section 4.6</a>). These
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 26]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-27" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
techniques require maintaining per-flow soft-state in the router, and
increase per-packet processing overhead. Some additional buffer
capacity is needed to queue packets being shaped.
To perform GTS, the router needs to select appropriate traffic
shaping parameters, which require knowledge of the network policy,
connection behavior and/or downstream bottleneck characteristics. GTS
may also be used to enforce other network policies and promote
fairness between competing TCP connections (and also UDP and
multicast flows). It also reduces the probability of ACK Compression
[<a href="#ref-ZSC91" title=""Observations and Dynamics of a Congestion Control Algorithm: The Effects of Two-Way Traffic"">ZSC91</a>].
The smoothing of packet bursts reduces the impact of the TCP
transmission bursts on routers and hosts following the point at which
GTS is performed. It is therefore desirable to perform GTS near to
the sending host, or at least at a point before the first forward
path bottleneck router.
RECOMMENDATIONS: Generic Traffic Shaping (GTS) is a transparent
technique employed at a router on the forward path. The algorithms
to implement GTS are available in widely deployed routers and may be
used on an Internet link, but do imply significant additional per-
packet processing cost.
Configuration of a GTS is a policy decision of a network service
provider. When appropriately configured the technique will reduce
size of TCP data packet bursts, mitigating the effects of Type 1
techniques. GTS is recommended for use in the Internet in
conjunction with type 1 techniques such as ACK Filtering (<a href="#section-5.2.1">section</a>
<a href="#section-5.2.1">5.2.1</a>) and ACK Decimation (<a href="#section-5.2.2">section 5.2.2</a>).
<span class="h3"><a class="selflink" id="section-5.4" href="#section-5.4">5.4</a> TYPE 3: Upstream Link Scheduling</span>
Many of the above schemes imply using per flow queues (or per
connection queues in the case of TCP) at the upstream bottleneck
link. Per-flow queuing (e.g., FQ, CBQ) offers benefit when used on
any slow link (where the time to transmit a packet forms an
appreciable part of the path RTT) [<a href="./rfc3150" title=""End- to-end Performance Implications of Slow Links"">RFC3150</a>]. Type 3 schemes offer
additional benefit when used with one of the above techniques.
<span class="h4"><a class="selflink" id="section-5.4.1" href="#section-5.4.1">5.4.1</a> Per-Flow queuing at the Upstream Bottleneck Link</span>
When bidirectional traffic exists in a bandwidth asymmetric network
competing ACK and packet data flows along the return path may degrade
the performance of both upstream and downstream flows [<a href="#ref-KVR98" title=""Improving TCP Throughput over Two-Way Asymmetric Links: Analysis and Solutions"">KVR98</a>].
Therefore, it is highly desirable to use a queuing strategy combined
with a scheduling mechanism at the upstream link. This has also been
called priority-based multiplexing [<a href="./rfc3135" title=""Performance Enhancing Proxies Intended to Mitigate Link-Related Degradations"">RFC3135</a>].
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 27]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-28" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
On a slow upstream link, appreciable jitter may be introduced by
sending large data packets ahead of ACKs [<a href="./rfc3150" title=""End- to-end Performance Implications of Slow Links"">RFC3150</a>]. A simple scheme
may be implemented using per-flow queuing with a fair scheduler
(e.g., round robin service to all flows, or priority scheduling). A
modified scheduler [<a href="#ref-KVR98" title=""Improving TCP Throughput over Two-Way Asymmetric Links: Analysis and Solutions"">KVR98</a>] could place a limit on the number of ACKs
a host is allowed to transmit upstream before transmitting a data
packet (assuming at least one data packet is waiting in the upstream
link queue). This guarantees at least a certain minimum share of the
capacity to flows in the reverse direction, while enabling flows in
the forward direction to improve TCP throughput.
Bulk (payload) compression, a small MTU, link level transparent
fragmentation [RFC1991, <a href="./rfc2686">RFC2686</a>] or link level suspend/resume
capability (where higher priority frames may pre-empt transmission of
lower priority frames) may be used to mitigate the impact (jitter) of
bidirectional traffic on low speed links [<a href="./rfc3150" title=""End- to-end Performance Implications of Slow Links"">RFC3150</a>]. More advanced
schemes (e.g., WFQ) may also be used to improve the performance of
transfers with multiple ACK streams such as http [<a href="#ref-Seg00" title=""Asymmetric Networking Techniques For Hybrid Satellite Communications"">Seg00</a>].
RECOMMENDATION: Per-flow queuing is a transparent modification
performed at the upstream bottleneck link. Per-flow (or per-class)
scheduling does not impact the congestion behavior of the Internet,
and may be used on any Internet link. The scheme has particular
benefits for slow links. It is widely implemented and widely
deployed on links operating at less than 2 Mbps. This is recommended
as a mitigation on its own or in combination with one of the other
described techniques.
<span class="h4"><a class="selflink" id="section-5.4.2" href="#section-5.4.2">5.4.2</a> ACKs-first Scheduling</span>
ACKs-first Scheduling is an experimental technique to improve
performance of bidirectional transfers. In this case data packets
and ACKs compete for resources at the upstream bottleneck link
[<a href="./rfc3150" title=""End- to-end Performance Implications of Slow Links"">RFC3150</a>]. A single First-In First-Out, FIFO, queue for both data
packets and ACKs could impact the performance of forward transfers.
For example, if the upstream bottleneck link is a 28.8 kbps dialup
line, the transmission of a 1 Kbyte sized data packet would take
about 280 ms. So even if just two such data packets get queued ahead
of ACKs (not an uncommon occurrence since data packets are sent out
in pairs during slow start), they would shut out ACKs for well over
half a second. If more than two data packets are queued up ahead of
an ACK, the ACKs would be delayed by even more [<a href="./rfc3150" title=""End- to-end Performance Implications of Slow Links"">RFC3150</a>].
A possible approach to alleviating this is to schedule data and ACKs
differently from FIFO. One algorithm, in particular, is ACKs-first
scheduling, which accords a higher priority to ACKs over data
packets. The motivation for such scheduling is that it minimizes the
idle time for the forward connection by minimizing the time that ACKs
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 28]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-29" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
spend queued behind data packets at the upstream link. At the same
time, with Type 0 techniques such as header compression [<a href="./rfc1144" title=""Compressing TCP/IP Headers for Low-Speed Serial Links"">RFC1144</a>],
the transmission time of ACKs becomes small enough that the impact on
subsequent data packets is minimal. (Subnetworks in which the per-
packet overhead of the upstream link is large, e.g., packet radio
subnetworks, are an exception, <a href="#section-3.2">section 3.2</a>.) This scheduling scheme
does not require the upstream bottleneck router/host to explicitly
identify or maintain state for individual TCP connections.
ACKs-first scheduling does not help avoid a delay due to a data
packet in transmission. Link fragmentation or suspend/resume may be
beneficial in this case.
RECOMMENDATION: ACKs-first scheduling is an experimental transparent
modification performed at the upstream bottleneck link. If it is
used without a mechanism (such as ACK Congestion Control (ACC),
<a href="#section-4.3">section 4.3</a>) to regulate the volume of ACKs, it could lead to
starvation of data packets. This is a performance penalty
experienced by end hosts using the link and does not modify Internet
congestion behavior. Experiments indicate that ACKs-first scheduling
in combination with ACC is promising. However, there is little
experience of using the technique in the wider Internet. Further
development of the technique remains an open research issue, and
therefore the scheme is not currently recommended for use within the
Internet.
<span class="h2"><a class="selflink" id="section-6" href="#section-6">6</a>. Security Considerations</span>
The recommendations contained in this document do not impact the
integrity of TCP, introduce new security implications to the TCP
protocol, or applications using TCP.
Some security considerations in the context of this document arise
from the implications of using IPSec by the end hosts or routers
operating along the return path. Use of IPSec prevents, or
complicates, some of the mitigations. For example:
(i) When IPSec ESP [<a href="./rfc2406" title=""IP Encapsulating Security Payload (ESP)"">RFC2406</a>] is used to encrypt the IP payload, the
TCP header can neither be read nor modified by intermediate
entities. This rules out header compression, ACK Filtering, ACK
Reconstruction, and the ACK Compaction.
(ii) The TCP header information may be visible, when some forms of
network layer security are used. For example, using IPSec AH
[<a href="./rfc2402" title=""IP Authentication Header"">RFC2402</a>], the TCP header may be read, but not modified, by
intermediaries. This may in future allow extensions to support
ACK Filtering, but rules out the generation of new
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 29]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-30" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
packets by intermediaries (e.g., ACK Reconstruction). The
enhanced header compression scheme discussed in [<a href="./rfc2507" title=""IP Header Compression"">RFC2507</a>] would
also work with IPSec AH.
There are potential Denial-of-Service (DoS) implications when using
Type 2 schemes. Unless additional security mechanisms are used, a
Reconstructor/expander could be exploited as a packet amplifier. A
third party may inject unauthorized Stretch ACKs into the reverse
path, triggering the generation of additional ACKs. These ACKs would
consume capacity on the return path and processing resources at the
systems along the path, including the destination host. This
provides a potential platform for a DoS attack. The usual
precautions must be taken to verify the correct tunnel end point, and
to ensure that applications cannot falsely inject packets that expand
to generate unwanted traffic. Imposing a rate limit and bound on the
delayed ACK factor(d) would also lessen the impact of any undetected
exploitation.
<span class="h2"><a class="selflink" id="section-7" href="#section-7">7</a>. Summary</span>
This document considers several TCP performance constraints that
arise from asymmetry in the properties of the forward and reverse
paths across an IP network. Such performance constraints arise,
e.g., as a result of both bandwidth (capacity) asymmetry, asymmetric
shared media in the reverse direction, and interactions with Media
Access Control (MAC) protocols. Asymmetric capacity may cause TCP
Acknowledgments (ACKs) to be lost or become inordinately delayed
(e.g., when a bottleneck link is shared between many flows, or when
there is bidirectional traffic). This effect may be exacerbated with
media-access delays (e.g., in certain multi-hop radio subnetworks,
satellite Bandwidth on Demand access). Asymmetry, and particular
high asymmetry, raises a set of TCP performance issues.
A set of techniques providing performance improvement is surveyed.
These include techniques to alleviate ACK Congestion and techniques
that enable a TCP sender to cope with infrequent ACKs without
destroying TCP self-clocking. These techniques include both end-to-
end, local link-layer, and subnetwork schemes. Many of these
techniques have been evaluated in detail via analysis, simulation,
and/or implementation on asymmetric subnetworks forming part of the
Internet. There is however as yet insufficient operational
experience for some techniques, and these therefore currently remain
items of on-going research and experimentation.
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 30]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-31" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
The following table summarizes the current recommendations.
Mechanisms are classified as recommended (REC), not recommended (NOT
REC) or experimental (EXP). Experimental techniques may not be well
specified. These techniques will require further operational
experience before they can be recommended for use in the public
Internet.
The recommendations for end-to-end host modifications are summarized
in table 1. This lists each technique, the section in which each
technique is discussed, and where it is applied (S denotes the host
sending TCP data packets in the forward direction, R denotes the host
which receives these data packets).
+------------------------+-------------+------------+--------+
| Technique | Use | Section | Where |
+------------------------+-------------+------------+--------+
| Modified Delayed ACKs | NOT REC | 4.1 | TCP R |
| Large MSS & NO FRAG | REC | 4.2 | TCP SR |
| Large MSS & IP FRAG | NOT REC | 4.2 | TCP SR |
| ACK Congestion Control | EXP | 4.3 | TCP SR |
| Window Pred. Mech (WPM)| NOT REC | 4.4 | TCP R |
| Window Cwnd. Est. (ACE)| NOT REC | 4.5 | TCP R |
| TCP Sender Pacing | EXP *1 | 4.6 | TCP S |
| Byte Counting | NOT REC *2 | 4.7 | TCP S |
| Backpressure | EXP *1 | 4.8 | TCP R |
+------------------------+-------------+------------+--------+
Table 1: Recommendations concerning host modifications.
*1 Implementation of the technique may require changes to the
internal design of the protocol stack in end hosts.
*2 Dependent on a scheme for preventing excessive TCP transmission
burst.
The recommendations for techniques that do not require the TCP sender
and receiver to be aware of their existence (i.e., transparent
techniques) are summarized in table 2. Each technique is listed
along with the section in which each mechanism is discussed, and
where the technique is applied (S denotes the sending interface prior
to the upstream bottleneck link, R denotes receiving interface
following the upstream bottleneck link).
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 31]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-32" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
+------------------------+-------------+------------+--------+
| Mechanism | Use | Section | Type |
+------------------------+-------------+------------+--------+
| Header Compr. (V-J) | REC *1 | 5.1.1 | 0 SR |
| Header Compr. (ROHC) | REC *1 *2 | 5.1.2 | 0 SR |
+------------------------+-------------+------------+--------+
| ACK Filtering (AF) | EXP *3 | 5.2.1 | 1 S |
| ACK Decimation | EXP *3 | 5.2.2 | 1 S |
+------------------------+-------------+------------+--------+
| ACK Reconstruction (AR)| NOT REC | 5.3.1 | 2 *4 |
| ACK Compaction/Compand.| EXP | 5.3.2 | 2 S *4 |
| Gen. Traff. Shap. (GTS)| REC | 5.3.3 | 2 *5 |
+------------------------+-------------+------------+--------+
| Fair Queueing (FQ) | REC | 5.4.1 | 3 S |
| ACKs-First Scheduling | NOT REC | 5.4.2 | 3 S |
+------------------------+-------------+------------+--------+
Table 2: Recommendations concerning transparent modifications.
*1 At high asymmetry these schemes may degrade TCP performance, but
are not considered harmful to the Internet.
*2 Standardisation of new TCP compression protocols is the subject of
ongoing work within the ROHC WG, refer to other IETF RFCs on the
use of these techniques.
*3 Use in the Internet is dependent on a scheme for preventing
excessive TCP transmission burst.
*4 Performed at a point along the reverse path after the upstream
bottleneck link.
*5 Performed at a point along the forward path.
<span class="h2"><a class="selflink" id="section-8" href="#section-8">8</a>. Acknowledgments</span>
This document has benefited from comments from the members of the
Performance Implications of Links (PILC) Working Group. In
particular, the authors would like to thank John Border, Spencer
Dawkins, Aaron Falk, Dan Grossman, Randy Katz, Jeff Mandin, Rod
Ragland, Ramon Segura, Joe Touch, and Lloyd Wood for their useful
comments. They also acknowledge the data provided by Metricom Inc.,
concerning operation of their packet data network.
<span class="h2"><a class="selflink" id="section-9" href="#section-9">9</a>. References</span>
References of the form RFCnnnn are Internet Request for Comments
(RFC) documents available online at <a href="http://www.rfc-editor.org/">http://www.rfc-editor.org/</a>.
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 32]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-33" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
<span class="h3"><a class="selflink" id="section-9.1" href="#section-9.1">9.1</a> Normative References</span>
[<a id="ref-RFC793">RFC793</a>] Postel, J., "Transmission Control Protocol", STD 7, <a href="./rfc793">RFC</a>
<a href="./rfc793">793</a>, September 1981.
[<a id="ref-RFC1122">RFC1122</a>] Braden, R., Ed., "Requirements for Internet Hosts -
Communication Layers", STD 3, <a href="./rfc1122">RFC 1122</a>, October 1989.
[<a id="ref-RFC1144">RFC1144</a>] Jacobson, V., "Compressing TCP/IP Headers for Low-Speed
Serial Links", <a href="./rfc1144">RFC 1144</a>, February 1990.
[<a id="ref-RFC1191">RFC1191</a>] Mogul, J. and S. Deering, "Path MTU Discovery", <a href="./rfc1191">RFC 1191</a>,
November 1990.
[<a id="ref-RFC2581">RFC2581</a>] Allman, M., Paxson, V. and W. Stevens, "TCP Congestion
Control", <a href="./rfc2581">RFC 2581</a>, April 1999.
[<a id="ref-RFC2784">RFC2784</a>] Farinacci, D., Li, T., Hanks, S., Meyer, D. and P. Traina,
"Generic Routing Encapsulation (GRE)", <a href="./rfc2784">RFC 2784</a>, March
2000.
[<a id="ref-RFC3135">RFC3135</a>] Border, J., Kojo, M., Griner, J., Montenegro, G. and Z.
Shelby, "Performance Enhancing Proxies Intended to Mitigate
Link-Related Degradations", <a href="./rfc3135">RFC 3135</a>, June 2001.
<span class="h3"><a class="selflink" id="section-9.2" href="#section-9.2">9.2</a> Informative References</span>
[<a id="ref-abc-ID">abc-ID</a>] Allman, M., "TCP Congestion Control with Appropriate Byte
Counting", Work in Progress.
[<a id="ref-All97b">All97b</a>] Allman, M., "Fixing Two BSD TCP Bugs", Technical Report
CR-204151, NASA Lewis Research Center, October 1997.
[<a id="ref-ANS01">ANS01</a>] ANSI Standard T1.413, "Network to Customer Installation
Interfaces - Asymmetric Digital Subscriber Lines (ADSL)
Metallic Interface", November 1998.
[<a id="ref-ASB96">ASB96</a>] Arora, V., Suphasindhu, N., Baras, J.S. and D. Dillon,
"Asymmetric Internet Access over Satellite-Terrestrial
Networks", Proc. AIAA: 16th International Communications
Satellite Systems Conference and Exhibit, Part 1,
Washington, D.C., February 25-29, 1996, pp.476-482.
[<a id="ref-AST00">AST00</a>] Aggarwal, A., Savage, S., and T. Anderson, "Understanding
the Performance of TCP Pacing", Proc. IEEE INFOCOM, Tel-
Aviv, Israel, V.3, March 2000, pp. 1157-1165.
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 33]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-34" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
[<a id="ref-Bal98">Bal98</a>] Balakrishnan, H., "Challenges to Reliable Data Transport
over Heterogeneous Wireless Networks", Ph.D. Thesis,
University of California at Berkeley, USA, August 1998.
<a href="http://nms.lcs.mit.edu/papers/hari-phd/">http://nms.lcs.mit.edu/papers/hari-phd/</a>
[<a id="ref-BPK99">BPK99</a>] Balakrishnan, H., Padmanabhan, V. N., and R. H. Katz, "The
Effects of Asymmetry on TCP Performance", ACM Mobile
Networks and Applications (MONET), Vol.4, No.3, 1999, pp.
219-241. An expanded version of a paper published at Proc.
ACM/IEEE Mobile Communications Conference (MOBICOM), 1997.
[<a id="ref-BPS00">BPS00</a>] Bennett, J. C., Partridge, C., and N. Schectman, "Packet
Reordering is Not Pathological Network Behaviour", IEEE/ACM
Transactions on Networking, Vol. 7, Issue. 6, 2000,
pp.789-798.
[<a id="ref-Cla88">Cla88</a>] Clark, D.D, "The Design Philosophy of the DARPA Internet
Protocols", ACM Computer Communications Review (CCR), Vol.
18, Issue 4, 1988, pp.106-114.
[<a id="ref-CLC99">CLC99</a>] Clausen, H., Linder, H., and B. Collini-Nocker, "Internet
over Broadcast Satellites", IEEE Communications Magazine,
Vol. 37, Issue. 6, 1999, pp.146-151.
[<a id="ref-CLP98">CLP98</a>] Calveras, A., Linares, J., and J. Paradells, "Window
Prediction Mechanism for Improving TCP in Wireless
Asymmetric Links". Proc. IEEE Global Communications
Conference (GLOBECOM), Sydney Australia, November 1998,
pp.533-538.
[<a id="ref-CR98">CR98</a>] Cohen, R., and Ramanathan, S., "Tuning TCP for High
Performance in Hybrid Fiber Coaxial Broad-Band Access
Networks", IEEE/ACM Transactions on Networking, Vol.6,
No.1, 1998, pp.15-29.
[<a id="ref-DS00">DS00</a>] Cable Television Laboratories, Inc., Data-Over-Cable
Service Interface Specifications---Radio Frequency
Interface Specification SP-RFIv1.1-I04-00407, 2000
[<a id="ref-DS01">DS01</a>] Data-Over-Cable Service Interface Specifications, Radio
Frequency Interface Specification 1.0, SP-RFI-I05-991105,
Cable Television Laboratories, Inc., November 1999.
[<a id="ref-DMT96">DMT96</a>] Durst, R., Miller, G., and E. Travis, "TCP Extensions for
Space Communications", ACM/IEEE Mobile Communications
Conference (MOBICOM), New York, USA, November 1996, pp.15-
26.
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 34]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-35" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
[<a id="ref-EN97">EN97</a>] "Digital Video Broadcasting (DVB); DVB Specification for
Data Broadcasting", European Standard (Telecommunications
series) EN 301 192, 1997.
[<a id="ref-EN00">EN00</a>] "Digital Video Broadcasting (DVB); Interaction Channel for
Satellite Distribution Systems", Draft European Standard
(Telecommunications series) ETSI, Draft EN 301 790, v.1.2.1
[<a id="ref-FJ93">FJ93</a>] Floyd, S., and V. Jacobson, "Random Early Detection
gateways for Congestion Avoidance", IEEE/ACM Transactions
on Networking, Vol.1, No.4, 1993, pp.397-413.
[<a id="ref-FSS01">FSS01</a>] Fairhurst, G., Samaraweera, N.K.G, Sooriyabandara, M.,
Harun, H., Hodson, K., and R. Donardio, "Performance Issues
in Asymmetric Service Provision using Broadband Satellite",
IEE Proceedings on Communication, Vol.148, No.2, 2001,
pp.95-99.
[<a id="ref-ITU01">ITU01</a>] ITU-T Recommendation E.681, "Traffic Engineering Methods
For IP Access Networks Based on Hybrid Fiber/Coax System",
September 2001.
[<a id="ref-ITU02">ITU02</a>] ITU-T Recommendation G.992.1, "Asymmetrical Digital
Subscriber Line (ADSL) Transceivers", July 1999.
[<a id="ref-Jac88">Jac88</a>] Jacobson, V., "Congestion Avoidance and Control", Proc. ACM
SIGCOMM, Stanford, CA, ACM Computer Communications Review
(CCR), Vol.18, No.4, 1988, pp.314-329.
[<a id="ref-Ken87">Ken87</a>] Kent C.A., and J. C. Mogul, "Fragmentation Considered
Harmful", Proc. ACM SIGCOMM, USA, ACM Computer
Communications Review (CCR), Vol.17, No.5, 1988, pp.390-
401.
[<a id="ref-KSG98">KSG98</a>] Krout, T., Solsman, M., and J. Goldstein, "The Effects of
Asymmetric Satellite Networks on Protocols", Proc. IEEE
Military Communications Conference (MILCOM), Bradford, MA,
USA, Vol.3, 1998, pp.1072-1076.
[<a id="ref-KVR98">KVR98</a>] Kalampoukas, L., Varma, A., and Ramakrishnan, K.K.,
"Improving TCP Throughput over Two-Way Asymmetric Links:
Analysis and Solutions", Proc. ACM SIGMETRICS, Medison,
USA, 1998, pp.78-89.
[<a id="ref-LM97">LM97</a>] Lin, D., and R. Morris, "Dynamics of Random Early
Detection", Proc. ACM SIGCOMM, Cannes, France, ACM Computer
Communications Review (CCR), Vol.27, No.4, 1997, pp.78-89.
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 35]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-36" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
[<a id="ref-LMS97">LMS97</a>] Lakshman, T.V., Madhow, U., and B. Suter, "Window-based
Error Recovery and Flow Control with a Slow Acknowledgement
Channel: A Study of TCP/IP Performance", Proc. IEEE
INFOCOM, Vol.3, Kobe, Japan, 1997, pp.1199-1209.
[<a id="ref-MJW00">MJW00</a>] Ming-Chit, I.T., Jinsong, D., and W. Wang,"Improving TCP
Performance Over Asymmetric Networks", ACM SIGCOMM, ACM
Computer Communications Review (CCR), Vol.30, No.3, 2000.
[<a id="ref-Pad98">Pad98</a>] Padmanabhan, V.N., "Addressing the Challenges of Web Data
Transport", Ph.D. Thesis, University of California at
Berkeley, USA, September 1998 (also Tech Report UCB/CSD-
98-1016). <a href="http://www.cs.berkeley.edu/~padmanab/phd-thesis.html">http://www.cs.berkeley.edu/~padmanab/phd-</a>
<a href="http://www.cs.berkeley.edu/~padmanab/phd-thesis.html">thesis.html</a>
[<a id="ref-RFC1323">RFC1323</a>] Jacobson, V., Braden, R. and D. Borman, "TCP Extensions for
High Performance", <a href="./rfc1323">RFC 1323</a>, May 1992.
[<a id="ref-RFC2018">RFC2018</a>] Mathis, B., Mahdavi, J., Floyd, S. and A. Romanow, "TCP
Selective Acknowledgment Options", <a href="./rfc2018">RFC 2018</a>, October 1996.
[<a id="ref-RFC2402">RFC2402</a>] Kent, S. and R. Atkinson, "IP Authentication Header", <a href="./rfc2402">RFC</a>
<a href="./rfc2402">2402</a>, November 1998.
[<a id="ref-RFC2406">RFC2406</a>] Kent, S. and R. Atkinson, "IP Encapsulating Security
Payload (ESP)", <a href="./rfc2406">RFC 2406</a>, November 1998.
[<a id="ref-RFC2507">RFC2507</a>] Degermark, M., Nordgren, B. and S. Pink, "IP Header
Compression", <a href="./rfc2507">RFC 2507</a>, February 1999.
[<a id="ref-RFC2525">RFC2525</a>] Paxson, V., Allman, M., Dawson, S., Heavens, I. and B.
Volz, "Known TCP Implementation Problems", <a href="./rfc2525">RFC 2525</a>, March
1999.
[<a id="ref-RFC2686">RFC2686</a>] Bormann, C., "The Multi-Class Extension to Multi-Link PPP",
<a href="./rfc2686">RFC 2686</a>, September 1999.
[<a id="ref-RFC2760">RFC2760</a>] Allman, M., Dawkins, S., Glover, D., Griner, J., Henderson,
T., Heidemann, J., Kruse, H., Ostermann, S., Scott, K.,
Semke, J., Touch, J. and D. Tran, "Ongoing TCP Research
Related to Satellites", <a href="./rfc2760">RFC 2760</a>, February 2000.
[<a id="ref-RFC2988">RFC2988</a>] Paxson, V. and M. Allman, "Computing TCP's Retransmission
Timer", <a href="./rfc2988">RFC 2988</a>, November 2000.
[<a id="ref-RFC3077">RFC3077</a>] Duros, E., Dabbous, W., Izumiyama, H., Fujii, N. and Y.
Zhang, "A link Layer tunneling mechanism for unidirectional
links", <a href="./rfc3077">RFC 3077</a>, March 2001.
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 36]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-37" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
[<a id="ref-RFC3095">RFC3095</a>] Bormann, C., Burmeister, C., Degermark, M., Fukushima, H.,
Hannu, H., Jonsson, E., Hakenberg, R., Koren, T., Le, K.,
Liu, Z., Martensson, A., Miyazaki, A., Svanbro, K., Wiebke,
T., Yoshimura, T. and H. Zheng, "RObust Header Compression
(ROHC): Framework and four profiles: RTP, UDP ESP and
uncompressed", <a href="./rfc3095">RFC 3095</a>, July 2001.
[<a id="ref-RFC3150">RFC3150</a>] Dawkins, S., Montenegro, G., Kojo, M. and V. Magret, "End-
to-end Performance Implications of Slow Links", <a href="https://www.rfc-editor.org/bcp/bcp48">BCP 48</a>, <a href="./rfc3150">RFC</a>
<a href="./rfc3150">3150</a>, July 2001.
[<a id="ref-RFC3168">RFC3168</a>] Ramakrishnan K., Floyd, S. and D. Black, "A Proposal to add
Explicit Congestion Notification (ECN) to IP", <a href="./rfc3168">RFC 3168</a>,
September 2001.
[<a id="ref-Sam99">Sam99</a>] Samaraweera, N.K.G, "Return Link Optimization for Internet
Service Provision Using DVB-S Networks", ACM Computer
Communications Review (CCR), Vol.29, No.3, 1999, pp.4-19.
[<a id="ref-Seg00">Seg00</a>] Segura R., "Asymmetric Networking Techniques For Hybrid
Satellite Communications", NC3A, The Hague, Netherlands,
NATO Technical Note 810, August 2000, pp.32-37.
[<a id="ref-SF98">SF98</a>] Samaraweera, N.K.G., and G. Fairhurst. "High Speed Internet
Access using Satellite-based DVB Networks", Proc. IEEE
International Networks Conference (INC98), Plymouth, UK,
1998, pp.23-28.
[<a id="ref-ZSC91">ZSC91</a>] Zhang, L., Shenker, S., and D. D. Clark, "Observations and
Dynamics of a Congestion Control Algorithm: The Effects of
Two-Way Traffic", Proc. ACM SIGCOMM, ACM Computer
Communications Review (CCR), Vol 21, No 4, 1991, pp.133-
147.
<span class="h2"><a class="selflink" id="section-10" href="#section-10">10</a>. IANA Considerations</span>
There are no IANA considerations associated with this document.
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 37]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-38" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
Appendix - Examples of Subnetworks Exhibiting Network Path Asymmetry
This appendix provides a list of some subnetworks which are known to
experience network path asymmetry. The asymmetry in capacity of
these network paths can require mitigations to provide acceptable
overall performance. Examples include the following:
- IP service over some wide area and local area wireless networks.
In such networks, the predominant network path asymmetry arises
from the hub-and-spokes architecture of the network (e.g., a
single base station that communicates with multiple mobile
stations), this requires a Ready To Send / Clear To Send (RTS/CTS)
protocol and a Medium Access Control (MAC) protocol which needs to
accommodate the significant turn-around time for the radios. A
high per-packet transmission overhead may lead to significant
network path asymmetry.
- IP service over a forward satellite link utilizing Digital Video
Broadcast (DVB) transmission [<a href="#ref-EN97" title=""Digital Video Broadcasting (DVB); DVB Specification for Data Broadcasting"">EN97</a>] (e.g., 38-45 Mbps), and a
slower upstream link using terrestrial network technology (e.g.,
dial-up modem, line of sight microwave, cellular radio) [<a href="#ref-CLC99" title=""Internet over Broadcast Satellites"">CLC99</a>].
Network path asymmetry arises from a difference in the upstream
and downstream link capacities.
- Certain military networks [<a href="#ref-KSG98" title=""The Effects of Asymmetric Satellite Networks on Protocols"">KSG98</a>] providing Internet access to
in-transit or isolated hosts [<a href="#ref-Seg00" title=""Asymmetric Networking Techniques For Hybrid Satellite Communications"">Seg00</a>] using a high capacity
downstream satellite link (e.g., 2-3 Mbps) with a narrowband
upstream link (e.g., 2.4-9.6 kbps) using either Demand Assigned
Multiple Access (DAMA) or fixed rate satellite links. The main
factor contributing to network path asymmetry is the difference in
the upstream and downstream link capacities. Some differences
between forward and reverse paths may arise from the way in which
upstream link capacity is allocated.
- Most data over cable TV networks (e.g., DOCSIS [<a href="#ref-ITU01" title=""Traffic Engineering Methods For IP Access Networks Based on Hybrid Fiber/Coax System"">ITU01</a>, <a href="#ref-DS00" title="Inc.">DS00</a>]),
where the analogue channels assigned for upstream communication
(i.e., in the reverse direction) are narrower and may be more
noisy than those assigned for the downstream link. As a
consequence, the upstream and downstream links differ in their
transmission rate. For example, in DOCSIS 1.0 [<a href="#ref-DS00" title="Inc.">DS00</a>], the
downstream transmission rate is either 27 or 52 Mbps. Upstream
transmission rates may be dynamically selected to be one of a
series of rates which range between 166 kbps to 9 Mbps. Operators
may assign multiple upstream channels per downstream channel.
Physical layer (PHY) overhead (which accompanies upstream
transmissions, but is not present in the downstream link) can also
increase the network path asymmetry. The Best Effort service,
which is typically used to carry TCP, uses a
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 38]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-39" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
contention/reservation MAC protocol. A cable modem (CM) sending
an isolated packet (such as a TCP ACK) on the upstream link must
contend with other CMs to request capacity from the central cable
modem termination system (CMTS). The CMTS then grants timeslots
to a CM for the upstream transmission. The CM may "piggyback"
subsequent requests onto upstream packets, avoiding contention
cycles; as a result, spacing of TCP ACKs can be dramatically
altered due to minor variations in load of the cable data network
and inter-arrival times of TCP DATA packets. Numerous other
complexities may add to, or mitigate, the asymmetry in rate and
access latency experienced by packets sent on the upstream link
relative to downstream packets in DOCSIS. The asymmetry
experienced by end hosts may also change dynamically (e.g., with
network load), and when best effort services share capacity with
services that have symmetric reserved capacity (e.g., IP telephony
over the Unsolicited Grant service) [<a href="#ref-ITU01" title=""Traffic Engineering Methods For IP Access Networks Based on Hybrid Fiber/Coax System"">ITU01</a>].
- Asymmetric Digital Subscriber Line (ADSL), by definition, offers a
downstream link transmission rate that is higher than that of the
upstream link. The available rates depend upon channel quality
and system configuration. For example, one widely deployed ADSL
technology [<a href="#ref-ITU02" title=""Asymmetrical Digital Subscriber Line (ADSL) Transceivers"">ITU02</a>, <a href="#ref-ANS01" title=""Network to Customer Installation Interfaces - Asymmetric Digital Subscriber Lines (ADSL) Metallic Interface"">ANS01</a>] operates at rates that are multiples of
32 kbps (up to 6.144 Mbps) in the downstream link, and up to 640
kbps for the upstream link. The network path asymmetry
experienced by end hosts may be further increased when best effort
services, e.g., Internet access over ADSL, share the available
upstream capacity with reserved services (e.g., constant bit rate
voice telephony).
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 39]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-40" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
Authors' Addresses
Hari Balakrishnan
Laboratory for Computer Science
200 Technology Square
Massachusetts Institute of Technology
Cambridge, MA 02139
USA
Phone: +1-617-253-8713
EMail: hari@lcs.mit.edu
Web: <a href="http://nms.lcs.mit.edu/~hari/">http://nms.lcs.mit.edu/~hari/</a>
Venkata N. Padmanabhan
Microsoft Research
One Microsoft Way
Redmond, WA 98052
USA
Phone: +1-425-705-2790
EMail: padmanab@microsoft.com
Web: <a href="http://www.research.microsoft.com/~padmanab/">http://www.research.microsoft.com/~padmanab/</a>
Godred Fairhurst
Department of Engineering
Fraser Noble Building
University of Aberdeen
Aberdeen AB24 3UE
UK
EMail: gorry@erg.abdn.ac.uk
Web: <a href="http://www.erg.abdn.ac.uk/users/gorry">http://www.erg.abdn.ac.uk/users/gorry</a>
Mahesh Sooriyabandara
Department of Engineering
Fraser Noble Building
University of Aberdeen
Aberdeen AB24 3UE
UK
EMail: mahesh@erg.abdn.ac.uk
Web: <a href="http://www.erg.abdn.ac.uk/users/mahesh">http://www.erg.abdn.ac.uk/users/mahesh</a>
<span class="grey">Balakrishnan et. al. Best Current Practice [Page 40]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-41" ></span>
<span class="grey"><a href="./rfc3449">RFC 3449</a> PILC - Asymmetric Links December 2002</span>
Full Copyright Statement
Copyright (C) The Internet Society (2002). All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be
followed, or as required to translate it into languages other than
English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
Balakrishnan et. al. Best Current Practice [Page 41]
</pre>
|