diff options
author | Dimitri Staessens <[email protected]> | 2020-04-26 21:50:50 +0200 |
---|---|---|
committer | Dimitri Staessens <[email protected]> | 2020-04-26 21:50:50 +0200 |
commit | 40650696bf9b6f4c32442b4779adf7ffaeadfdfd (patch) | |
tree | edac747451301221da92ad9a608142484df8f6fc /content/en/docs/Concepts | |
parent | 08f426ce93aa2bbcfbe2393d97ff2c02d27b2296 (diff) | |
download | website-40650696bf9b6f4c32442b4779adf7ffaeadfdfd.tar.gz website-40650696bf9b6f4c32442b4779adf7ffaeadfdfd.zip |
content: Add notes on FRCP and deallocation
Diffstat (limited to 'content/en/docs/Concepts')
-rw-r--r-- | content/en/docs/Concepts/protocols.md | 32 |
1 files changed, 31 insertions, 1 deletions
diff --git a/content/en/docs/Concepts/protocols.md b/content/en/docs/Concepts/protocols.md index fa6a3d0..a4b36cf 100644 --- a/content/en/docs/Concepts/protocols.md +++ b/content/en/docs/Concepts/protocols.md @@ -214,7 +214,11 @@ be taken that all sent packets are acknowledged or all retransmissions timed out (so, wait for R timer to expire). Flow deallocation will also trigger an ACK for the RWE from the receiver (ACKing all packets that can possibly be in flight, it doesn't care anymore if it receives -more packets). +more packets). To be safe, i.e. be sure there are no packets in the +network anymore, the state associated with the flow (i.e. the PORT ID +assigned by the IRMd, and by extension the EID in the DT protocol) +should only be reused after the sender and receiver state fully timed +out. Flow control works for both reliable and unreliable modes of FRCT. If flow control is enabled, the receiver will notify the sender of its @@ -257,6 +261,32 @@ the size of the sequence number space should be at least (2MPL + R + A) * T, where T is the number of sequence numbers generated in a certain unit of time. +The requirement that the connection needs to timeout before reuse +seems to imply that a _flow\_dealloc_() command may need to wait for +(at most) 3MPL + R + A. This would be _really_ annoying in a +program. The safest solution (pending implementation) that we see is +to send the remaining waiting time to the IRMd, so the flow +deallocation at the network side will be deferred and the EID will +only be released when safe. The _flow\_dealloc_() call at the sender +side can exit immediately after all packets are ack'd (or R timed +out). TCP has a similar waiting period (TIME_WAIT), which is one of +the reasons for the SO_REUSEADDR and SO_LINGER socket options, which +disregard these timeouts with some risk. Ouroboros has a number of +advantages (and at least one disadvantage) here. The first advantage +is that EIDs are all ephemeral, so one being blocked for some time by +the IRMd is never a problem (the connection is not tied to +address:port, so it can't block a future connection). The second +advantage is that the EID space should be large for security reasons +(see above), and should be chosen at random, so reuse of an EID within +3MPL + A + R is unlikely. The disadvantage is the waiting time on exit +of the sending program. Since that state is in the Ouroboros +application, the sender application has to either wait for the outcome +of the connection (and be informed whether all data was sent +successfully or not) or the remaining unsent/unacknowledged packets on +_exit_() are lost. The default for TCP sockets is to linger on +_exit_() of the program, where the socket keeps trying to finish +packets in the sending buffer of the connection. + [^1]: This was proven by Watson in [Timer-Based Mechanisms in Reliable Transport Protocol Connection Management](https://doi.org/10.1016/0376-5075(81)90031-3). TCP also has these three timers bounded. [^2]: Fast retransmit methods (retransmitting if a number of consecutive ACKs with the same sequence number are received) can still be useful. Underestimation of sRTT has little impact on throughput apart from possible unnecessary traffic duplication (the additional packets also update the RTT estimate). In Ouroboros, congestion avoidance is the responsability of the flow allocator. [^3]: IPv4 and IPv6 fragmentation makes for some rather amusing reading. |