Rethinking Acks at the Transport Layer
Total Page:16
File Type:pdf, Size:1020Kb
Rethinking ACKs at the Transport Layer Ana Custura Tom Jones Gorry Fairhurst University of Aberdeen University of Aberdeen University of Aberdeen Abstract—Acknowledgements are a core component of trans- ACK Use-case TCP SCTP DCCP RTCP QUIC port protocols. They can send control information and be used Connection es- x x x x to receive feedback about transmission progress, to measure tablishment responsiveness and capacity of the network path, and numerous Param. Reneg. x x x other purposes. This paper takes a long look at the way acknowledgements are used across different transports and what Path estimation x x x x x ACK information is actually needed in new protocol designs. Loss detection x x x x x TCP’s use of ACKs has inspired the design of other Internet ACK Vector x x x transports and was used as a model for QUIC. CC x x x ? x Index Terms—ACK, transport protocols ACK-clocking x x Pacing ? ? x x x I. INTRODUCTION TABLE I: A summary of ACK functions by transport protocol. The design of any Internet transport protocol needs to operate safely over a wide range of path characteristics and be robust to changes in the set of devices forming the network path. Most transports rely on feedback from the remote This coordinates protocol state at endpoints (e.g., TCP SYN endpoint to inform the local endpoint about the success of options; SCTP INIT; DCCP feature negotiation). transmission across the path. Acknowledgments (ACKs) are ACKs have a role in estimating path characteristics. After often sent as separate packets. They can have any size, but an endpoint has started communicating, ACKs can be used to are typically much smaller than data packets. Some transports adjust the Round Trip Time (RTT) to track potential change therefore allow the ACK information to be coalesced with in path characteristics [8]. other information sent by a remote endpoint. Many transports Most reliable transports trigger loss recovery after ACKs send data in one direction and ACKs in the opposite direction. fail to confirm delivery by reception. Loss could be detected Many transports allow ACKs to be observed in the network. by observing the time-ordering of received ACKs (as in TCP Some devices intentionally reduce the volume/rate of ACKs DupACK, RFC 5681) or by utitilising a timer [8]. Care is to improve performance for asymmetric paths [9]. This can needed to avoid interpreting ACK loss (e.g. under persistent lead to network device ossification when connectivity becomes congestion) or ACK reordering, as as a signal of data loss. reliant on seeing ACKs. In response, protocols, such as Internet flows need to implement safeguards to avoid in- QUIC [14] have been designed to encrypt and authenticate appropriate impact on other flows that share resources along their ACKs. This prevents in-network modification, and moti- a path. Reception of ACKs indicate data has successfully vates our examination of how this will impact performance. traversed the network. Congestion control (CC) algorithms can The remainder of this paper explores how ACKs are used by estimate a safe transmission rate from the rate of reception Internet transport protocols. It examines the usage of ACKs in of ACKs, or the volume of data acknowledged per RTT. In QUIC and suggests the present design will face performance general, CC benefits from frequent feedback of ACKs. limits when used over asymmetric paths. It concludes with To promote more fair sharing of capacity, senders can limit recommendations for the design of an appropriate ACK policy bursts in transmission (e.g. SCTP, RFC 4960). ACKs can help for future transports such as QUIC. to pace the forward transmission. This could be explicit (e.g. II. FUNCTIONS OF ACKNOWLEDGMENTS each ACK releases new data) or implicit (i.e., ACKs drive a rate limiter or burst-mitigation method). This needs at least Although the most familiar use-case of ACKs is to perform multiple updates per RTT, but can benefit from additional retransmission or repair, the feedback of ACKs provides a understanding the timing of data received. range of important transport functions [8]. ACKs are used to complete setup of a new flow by determin- ing whether the remote endpoint accepts the communication. III. ACK POLICIES OF COMMON TRANSPORT PROTOCOLS This ensures both endpoints associate packets with the flow and understand how to process packets. Many transports sup- This section examines how ACKs are used in different port negotiation, allowing endpoints to agree (acknowledge) transports. Table I enumerates the protocols examined and a set of features and parameters to configure the transport. identifies relevant ACK functions. Annex to ISBN 978-3-903176-28-7© 2020 IFIP 731 A. Transmission Control Protocol (TCP) individual received packets. Like TCP, new connections start TCP is the most popular transport protocol and currently with AR 1:2. A DCCP sender can adjust transport parameters carries the majority of web and streaming video traffic. It during a connection, using DCCP feature negotiation [17]. uses a sliding window to provide reliable data reception using This allows a sender to change the AR. a cumulative ACK. This has influenced the design of later CCID2 (RFC 4341) defines an approximately TCP-friendly protocols. In TCP, ACK packets are used to perform all method that can adapt the AR, proving it does not exceed functions detailed in Section II. cwnd/2 and must be >= 2 for a cwnd of 4 or more packets. We define the ACK Ratio (AR) as the number of packets For each cwnd of data with l lost or marked ACK, the AR 2 received to the number of ACKs sent. Early versions of TCP is doubled; and is decremented for each cwnd =(AR − AR) sent an ACK for each received data packet, resulting in AR consecutive cwnds of data with no ACK loss or marking. This 1:1. While this provides ample information, it contributes 50% does not adapt to path delays, such as queues building; and of packets sent. A TCP receiver can delay sending an ACK for is unable to account for the cost of link ACK transmission. up to two times the Maximum Segment Size of data [2] (AR An AR more than 1:2 would increase burst sizes, unless the 1:2). RFC 5681 requires Delayed ACKs to be sent within 500 sender performs pacing (RFC 4341). ms of the arrival of a packet. However, many current receivers use a smaller delay, e.g. 200ms or 40ms. D. The Real Time Protocol (RTP) A TCP CC establishing the path capacity grows the con- gestion control (CC) window cwnd [2] exponentially during RTP (RFC 3550) is a connection-less transport for real slow-start, where each received ACK increases the cwnd and time media that is often sent at a target rate. RTP Control the sending rate is controlled by the ACK rate. Delaying ACKs Protocol (RTCP) provides control and signals statistics (e.g., can reduce the rate of cwnd growth. loss rate and delay variance) and can be used to provide Since Appropriate Byte Counting (RFC 3465), CC operates loss recovery/repair and CC. Reports can be encrypted. RTCP on the cumulative acknowledged bytes, not on individual reports are often regularly sent, e.g. a randomised default of ACKs. Delayed ACKs increase the time to reach the capacity five seconds. To reduce ACK frequency, a single packet can where the delay is significant compared to the RTT. For this carry multiple RTCP messages. The RTCP extended report reason, Delayed ACKs After Slow Start (DAASS) [1] can (XR) packet (RFC 3611) supports an ACK vector for less revert to an AR of 1:1 during slow start. However, a TCP frequent feedback (e.g., once per RTT, or each 50-200ms). receiver does not in general know which CC is used, so cannot know when slow start has finished. There is therefore E. QUIC no standard algorithm for implementing DAASS. The Linux QUIC is a new connection-oriented protocol being specified kernel implements a form of DAASS (TCP QUICKACK) by the IETF [14]. Packets have monotonically increasing num- using AR 1:1 for at least the first 8 packets1. bers to eliminate ACK ambiguity, and provides more precise ACK Delay is suspended during TCP loss recovery. Out RTT estimation [15]. Successful transmission is tracked by of sequence packets are reported using the selective acknowl- feedback of cumulative ACK frames. In contrast to TCP and edgement (SACK) option (RFC 2018). An ACK carries up to DCCP, QUIC encrypts all header fields including ACKs. 3 SACK blocks, each describing gaps in the received window. IETF QUIC [14] currently recommends sending an ACK SACK improves efficiency after loss, but increases the volume for each alternate ACK-eliciting packet and implementing of ACKs while a receiver is awaiting retransmission. ACK delay. This mimics the recommended policy for TCP B. The Stream Control Transport Protocol (SCTP) (AR 1:2). The default delay is 25 milliseconds (the value SCTP (RFC 4960) offers connection-oriented multi- used by emerging implementations such as Chromium and streaming, and supports a number of modes, from reliable Quicly). A QUIC receiver shares the ACK delay with the streams like TCP, to partial reliability. Although based on sender to improve the precision of RTT calculations. QUIC datagrams, methods resemble TCP. ACKs confirm connection employs a CC similar to TCP, but adapted to QUIC [12]. establishment and shutdown, and are used to provide relia- Early specifications for QUIC allowed continuing to sending bility. The SCTP initialisation (and INIT ACK) can be larger an ACK Frame for every subsequently received packet for up than for TCP. SCTP follows TCP guidelines on delayed ACKs, to 1/8 of an RTT after reordering.