Internet Engineering Task Force N. Kuhn Internet-Draft Thales Alenia Space Intended status: Standards Track E. Stephan Expires: 31 March 2024 Orange G. Fairhurst University of Aberdeen C. Huitema Private Octopus Inc. 28 September 2023 Convergence of Congestion Control from Retained State draft-ietf-tsvwg-careful-resume-03 Abstract This document specifies a cautious method for IETF transports that enables fast startup of congestion control for a wide range of connections or reconnections. It reuses a set of computed congestion control parameters that are based on previously observed path characteristics between the same pair of transport endpoints. These parameters are stored, allowing them to be later used to modify the congestion control behavior of a subsequent connection. It discusses assumptions and defines requirements for how a sender utilizes these parameters to provide opportunities for a connection to more rapidly get up to speed and rapidly utilize available capacity. It discusses how use of the method impacts the capacity at a shared network bottleneck and the safe response that is needed after any indication that the new rate is inappropriate. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." Kuhn, et al. Expires 31 March 2024 [Page 1] Internet-Draft Congestion Control Convergence September 2023 This Internet-Draft will expire on 31 March 2024. Copyright Notice Copyright (c) 2023 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1. Use of saved CC parameters by a Sender . . . . . . . . . 4 1.2. Receiver Preference . . . . . . . . . . . . . . . . . . . 4 1.3. Examples of Scenarios of Interest . . . . . . . . . . . . 5 2. Language, Notation and Terms . . . . . . . . . . . . . . . . 6 2.1. Requirements Language . . . . . . . . . . . . . . . . . . 6 2.2. Notation and Terms . . . . . . . . . . . . . . . . . . . 6 3. The Phases of CC using Resume . . . . . . . . . . . . . . . . 7 3.1. Observe Phase . . . . . . . . . . . . . . . . . . . . . . 7 3.2. Reconnaissance Phase . . . . . . . . . . . . . . . . . . 7 3.3. Unvalidated Phase . . . . . . . . . . . . . . . . . . . . 8 3.4. Validating Phase . . . . . . . . . . . . . . . . . . . . 9 3.5. Safe Retreat Phase . . . . . . . . . . . . . . . . . . . 10 3.5.1. Loss Recovery after entering Safe Retreat . . . . . . 10 3.6. Normal Phase . . . . . . . . . . . . . . . . . . . . . . 11 3.7. RTO Expiry while using Careful Resume . . . . . . . . . . 11 4. Congestion Control Guidelines and Requirements . . . . . . . 11 4.1. Determining the Current Path Capacity in the Observe Phase . . . . . . . . . . . . . . . . . . . . . . . . . . 12 4.2. Confirming the Path in the Reconnaissance Phase . . . . . 12 4.2.1. Confirming the Path . . . . . . . . . . . . . . . . . 13 4.3. Safety Requirements for the Unvalidated Phase . . . . . . 13 4.3.1. Exit for the Unvalidated Phase because of Variable Network Conditions . . . . . . . . . . . . . . . . . 14 4.3.2. Pacing in the Unvalidated Phase . . . . . . . . . . . 14 4.4. Safety Requirements for the Validating Phase . . . . . . 15 4.5. Safety Requirements for the Safe Retreat Phase . . . . . 15 4.6. Returning to Normal Congestion Control . . . . . . . . . 16 4.7. Limitations from Transport Protocols . . . . . . . . . . 16 5. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 17 Kuhn, et al. Expires 31 March 2024 [Page 2] Internet-Draft Congestion Control Convergence September 2023 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 17 7. Security Considerations . . . . . . . . . . . . . . . . . . . 17 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 17 8.1. Normative References . . . . . . . . . . . . . . . . . . 17 8.2. Informative References . . . . . . . . . . . . . . . . . 17 Appendix A. Appendix: An Endpoint Token . . . . . . . . . . . . 19 A.1. Creating an Endpoint Token . . . . . . . . . . . . . . . 19 Appendix B. Appendix: Revision details . . . . . . . . . . . . . 20 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 21 1. Introduction All Internet transports are required to either use a Congestion Control (CC) method, or to constrain their rate of transmission [RFC8085]. In 2010, a survey of alternative CC methods [RFC5783], noted that there are challenges when a CC method operates across an Internet path with a high and/or varying Bandwidth-Delay Product (BDP). This mechanism targets a solution for these challenges. A CC method typically takes time to ramp-up the sending rate, called the "slow-start phase", informally known as the time to "Get up to speed". This slow-start phase defines a time in which a sender intentionally uses less capacity than might be available, with the intention to avoid or limit overshooting the available capacity for the path. The slow-start design can increase queuing (latency/ jitter) and/or congestion packet loss to the flow. Any overshoot can have a detrimental effect on other flows sharing a common bottleneck. In the extreme case, persistent congestion could result in unwanted starvation of other flows [RFC8867] (i.e., preventing other flows from successfully sharing capacity at a common bottleneck). This document proposes a CC method that is expected to reduce the time to complete a transfer when the transfer sends significantly more data than allowed by the Initial congestion Window (IW), and where the BDP of the path is also significantly more than the product of the IW and the Round Trip Rime (RTT). It introduces an alternative method to select initial CC parameters, that seek to more rapidly and safely grow the sending rate controlled by then congestion window, CWND. (CC methods that are rate-based can make similar adjustments to their target sending rate. This method is based on temporal sharing (sometimes known as caching) of a saved set of CC parameters that relate to previous observations of the same path. The saved CC parameters include: the available capacity found on the path and the RTT. These parameters are stored and used to modify the CC behavior of a subsequent connection between the same endpoints. Kuhn, et al. Expires 31 March 2024 [Page 3] Internet-Draft Congestion Control Convergence September 2023 When used with the QUIC transport, this provides transport services that resemble those currently available in TCP, using methods such as TCP Control Block (TCB) [RFC9040] caching. 1.1. Use of saved CC parameters by a Sender CC parameters are used by Careful Resume for two functions: * Information about the utilised path capacity. This allows a later sender to determine an appropriate set of CC parameters for re- using the path. * Information to characterize the saved path. This allows a sender to confirm whether the current path is consistent with a saved path. "Generally, implementations are advised to be cautious when using saved CC parameters on a new path", as stated in [RFC9000]. While this statement has been proposed in the context of QUIC standardization, this advice is appropriate for any IETF transport protocol. Care is therefore needed to assure safe use and to be robust to changes in traffic patterns, network routing, and link/node conditions. There are cases where using the saved parameters of a previous connection is not appropriate. 1.2. Receiver Preference Whilst a sender could take optimization decisions without considering the receiver's preference, there are cases where a receiver could have information that is not available at the sender, or might benefit from understanding that Resume might be used. In these cases, a receiver could explicitly ask to enable or inhibit tuning of the CC when an application initiates a new session or resume an existing one. An indication from the sender that Careful Resume is available, could also allow a receiver to tune policies for using the connection (e.g., managing the receiver window or flow credit). Examples where a receiver could request not to use Careful Resume include: 1. a receiver that can predict the pattern of traffic (e.g., insight into the volume of data to be sent, the expected length of a session, or the maximum transfer rate required); 2. a receiver with a local indication that a path/local interface has changed since the CC parameters were stored; Kuhn, et al. Expires 31 March 2024 [Page 4] Internet-Draft Congestion Control Convergence September 2023 3. knowledge of the current hardware limitations at a receiver; 4. a receiver that can predict additional capacity will be needed for other concurrent/later flows (i.e., prefers to activate Careful Resume for the a different connection). QUIC introduces the concept of transport parameters (Section 4 of [RFC9000]). A related document proposes an extension for QUIC that requests the sender-generated CC parameters to be stored at the receiver [I-D.kuhn-quic-bdpframe-extension]. Transferring the information to a receiver releases the need for a sender to retain transport state for each receiver. This document also evaluates the potential for malicious use of this exchange. 1.3. Examples of Scenarios of Interest This section provides a set of examples where Careful Resume is expected to improve performance. Either endpoint can assume the role of a sender or a receiver. Careful Resume also supports a bidirectional data transfer, where both endpoints simultaneously send data (e.g., remote execution of an application, or a bidirectional video conference call). In one example, an application uses a series of connections over a path (i.e., resumes a connection to the same endpoint). Without a new method, each connection would need to individually discover appropriate CC parameters, whereas Careful Resume allows the flow to continue at a rate that resembles the observed rate. In another example, an application reconnects after a disruption had temporarily reduced the path capacity (e.g., after a link propagation impairment, or where a user on a train journey travels through different areas of connectivity). When the endpoint returns to use a path with the original characteristics, it can resume a transmission rate based on the previously observed CC parameters. There is particular benefit for any path with an RTT that is much larger than typical Internet paths. In a specific example, an application connected via a satellite access network [IJSCN] could require 9 seconds to complete a 5.3 MB transfer using standard CC, whereas using Careful Resume this transfer time could be reduced to 4 seconds. The time to complete a 1 MB transfer could similarly be reduced by 62 % [MAPRG111]. This benefit is also expected for other sizes of transfer and for different path characteristics when a path has a large BDP. Kuhn, et al. Expires 31 March 2024 [Page 5] Internet-Draft Congestion Control Convergence September 2023 {XXX-Editor note: A future revision would helpfully provide further Path Examples here.} 2. Language, Notation and Terms This subsection provides a brief summary of key terms and the requirements language. 2.1. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 2.2. Notation and Terms The document uses language drawn from a range of IETF RFCs. It defines current, and saved values for a set of CC parameters: saved_capacity: The capacity preserved from a previous connection; current_rtt: A sample measurement of the current RTT; saved_rtt: The preserved minimum RTT, corresponding to the minimum of a set RTT of measurements taken at the time when the saved_capacity was estimated; endpoint_token: An Endpoint Token for a receiver; current_endpoint_token: The Endpoint Token of the current receiver; saved_endpoint_token: The Endpoint Token of a previous connection by the receiver; jump_cwnd: The resumed CWND, used in the Unvalidated Phase. max_jump : The maximum configured jump_cwnd; Pipe: The estimated available capacity at the time of congestion. The Endpoint Token is described in Appendix A. Kuhn, et al. Expires 31 March 2024 [Page 6] Internet-Draft Congestion Control Convergence September 2023 3. The Phases of CC using Resume This section defines a series of phases that the CC algorithm moves through as a connection uses Careful Resume, as shown in Figure 1. Connect -> Reconaissance --------------------> Normal | ^ v | Unvalidated --> Validating -----------+ | | | | | | +---------------+--> Safe Retreat --+ Figure 1: Phases when a connection uses the Careful Resume. The Observe Phase is later performed by an established connection. 3.1. Observe Phase During a previous connection, CC pareameters for the specific path to an endpoint are saved. This is used to characterize the path and to measure the capacity that was used. This includes the minimum RTT (saved_rtt), the path capacity (saved_capacity) and the receiver Endpoint Token (saved_endpoint_token). An implementation can store this information at the server (or could exchange this information with a receiver, as detailed in [I-D.kuhn-quic-bdpframe-extension]). * Observe Phase: If the measured CWND is less than four times the Initial Windown (IW) ( CWND less than IW*4), a sender SHOULD NOT store and/or send CC parameter information. 3.2. Reconnaissance Phase When a sender resumes transmission between the same pair of endpoints, (a.k.a. thinks it uses the same path) it enters the Reconnaissance Phase. The sender only enters this phase when there are saved CC parameters for the same pair of endpoints and this information is currently valid (i.e., the saved parameters have not expired). A receiver can use a method (such as the QUIC BDP Frame [I-D.kuhn-quic-bdpframe-extension])) to request that the sender does not enter this phase. In this phase, the sender transmits initial data, limited by the IW, and monitors its reception. This phase measures the current path characteristics to confirm these are consistent with the previously observed CC parameters. Kuhn, et al. Expires 31 March 2024 [Page 7] Internet-Draft Congestion Control Convergence September 2023 * Reconnaissance Phase (Endpoint change): If the current endpoint is not the same, the sender MUST revert to using the standard CC, and enters the Normal Phase. If the Endpoint Token changes (i.e., the saved_endpoint_token is different from the current_endpoint_token), it is assumed to represent a different network path. * Reconnaissance Phase (Confirming RTT): Since the CC information is directly impacted by the RTT, a significant change in the RTT is a strong indication that the previously observed CC parameters are not valid for the current path. An RTT measurement is confirmed when current_rtt ≥ (saved_rtt / 2) and the current_rtt ≤ (saved_rtt x 10 (TBC)). * Reconnaissance Phase (Lifetime of saved information): The CC information is temporal. Frequent connections to the same endpoint are likely to track changes, but long-term use of the previously observed parameters is not appropriate. When a sender confirms the path and it receives an acknowledgement for the initial data without reported congestion, it MAY then enter the Unvalidated Phase. This transition occurs when a sender has more data than permitted by the current CWND. Implementation requirements are provided in Section 4.2. When the path is not confirmed, Careful Resume is not used and the sender enters the Normal Phase. 3.3. Unvalidated Phase The Unvalidated Phase is designed to enable the CWND to more rapidly get up to speed, but this requires data to send. If the application is data limited, the sender sends insufficient data to be able to validate transmission at the tentative higher rate. Careful Resume therefore remains in the Reconnaissance Phase and does not transition to the Unvalidated Phase until the sender has more data ready to send in the transmission buffer than is permitted by the current CWND. (If an application is data-limited, the sender sends insufficient data to be able to validate the tentative higher rate.) In some implementations, the decision to enter the Unvalidated Phase could require coordination with the management of buffers in the interface to the higher layers. This phase paces transmission using an increased CWND (jump_CWND) that is calculated based on the saved CC parameters and current_RTT. Kuhn, et al. Expires 31 March 2024 [Page 8] Internet-Draft Congestion Control Convergence September 2023 * Unvalidated Phase (jump_cwnd): To avoid starving other (potential) flows that could have started or increased their capacity after the Observation Phase, the jump_cwnd MUST be no more than half of the saved_capacity. Hence, jump_cwnd ≤ saved_capacity/2. * Unvalidated Phase (Pacing): Transmission using an unvalidated CWND MUST use pacing. * Unvalidated Phase (Confirming the path): If a sender determines that the previous CC parameters are not valid (due to a detected change in the path) (e.g., the RTT has changed), Careful Resume enters the Safe Retreat Phase. * The sender enters the Validating Phase when an acknowledgement is received for the first packet number (or higher) that was sent in the Unvalidated Phase. Implementation requirements are provided in Section 4.3. 3.4. Validating Phase The Validating Phase is checks that the packets sent in the Unvalidated Phase were received without inducing congestion. The sender typically remains in this phase for 1 RTT. The CWND remains unvalidated. (Note: When the full jump_cwnd is not fully utilised, it results in a smaller capacity being validated.) * Validating Phase (Limiting CWND): On entry to the Validating Phase, the CWND is set to the flight size. * Validating Phase (Updating CWND): The CWND is updated using the normal rules for the current congestion controller. The default rule is Reno. * Validating Phase (Validating capacity): A sender monitors the correct reception of the packets that were sent using the unvalidated jump. If a sender determines that congestion was experienced (e.g., packet loss or ECN-CE marking), Careful Resume enters the Safe Retreat Phase. * The sender enters the Normal Phase when an acknowledgement is received for the last packet number (or higher) that was sent in the Unvalidated Phase. Kuhn, et al. Expires 31 March 2024 [Page 9] Internet-Draft Congestion Control Convergence September 2023 3.5. Safe Retreat Phase This phase is entered when the sender detects that a jump in the Unvalidated Phase has overshot the currently available capacity. It starts when the first loss/ECN-CE marking is detected. (This trigger is the same as used by a QUIC sender to transition from Slow Start to Recovery [RFC9002] .) * Safe Retreat Phase (Saved information): Any saved CC parameters for the path are removed from any cache, to prevent these parameters from being used again by other flows. * Safe Retreat Phase (Re-initializing CC): On entry, the CWND MUST be reduced to no more than the IW. This avoids persistent starvation by allowing capacity for other flows to regain their share of the total capacity. * Safe Retreat Phase (QUIC recovery): When the CWND is reduced, a QUIC sender can immediately send a single packet prior to the reduction [RFC9002]. (This speeds up loss recovery if the data in the lost packet is retransmitted and is similar to TCP as described in Section 5 of [RFC6675].) * Safe Retreat Phase (Increasing CWND): The CWND MAY be increased for each acknowledgment that acknowledges a previously unacknowledged packet that was sent in the Unvalidated Phase, since this indicates a packet has been successfully sent across the path. * The sender enters Normal Phase when the last packet (or later) sent during the Unvalidated Phase has been acknowledged. Implementation requirements are provided in Section 4.5. 3.5.1. Loss Recovery after entering Safe Retreat Unacknowledged packets that were sent in the Unvalidated Phase can be lost when there is congestion. Loss recovery commences using the reduced CWND that was set on entry to the Safe Retreat Phase. NOTE: A TCP or SCTP sender is required to retransmit all lost data. For QUIC and DCCP, the need for loss recovery depends on the sender policy for retransmission. Kuhn, et al. Expires 31 March 2024 [Page 10] Internet-Draft Congestion Control Convergence September 2023 NOTE: During loss recovery, a receiver can cumulatively acknowledge data that was previously sent in the Unvalidated Phase in addition to acknowledging successful retransmission of data. [RFC3465] describes how to appropriately account for such acknowledgments. NOTE: On entry to the Safe Retreat Phase, the CWND can be significantly reduced, when there was multiple loss, recovery of all lost data could require multiple RTTs to complete. The sender leaves the Safe Retreat Phase when an acknowledgement is received for the last packet number (or higher) sent in the Unvalidated Phase. If the last packet number is not cumulatively acknowledged, then additional packets might need to be retransmitted. CC methods using a slowstart threshold need to update this from the CWND (i.e., ssthresh = CWND). The Normal Phase is then entered. 3.6. Normal Phase In the Normal Phase, the sender transitions to using the normal CC method (e.g., in congestion avoidance). * Normal Phase (Updating CC): The sender MUST reset the CWND on entry to the Normal Phase to reflect the volume of acknowledged data that was received during the Unvalidated Phase. (When the sender has used the entire jump_cwnd and this was acknowledged in full, no adjustment is needed.) Implementation requirements are provided in Section 4.6. 3.7. RTO Expiry while using Careful Resume A sender that experiences a Retransmission Time Out (RTO) expiry ceases to use Careful Resume. The sender continues using normal CC. NOTE: As in loss recovery, data sent in the Unvalidated Phase could be later acknowledged after an RTO event (see Section 3.5.1). 4. Congestion Control Guidelines and Requirements This section provides requirements for implementation and guidance on use. Kuhn, et al. Expires 31 March 2024 [Page 11] Internet-Draft Congestion Control Convergence September 2023 4.1. Determining the Current Path Capacity in the Observe Phase There are various approaches to measuring the capacity that used by a connection. Congestion controllers, such as CUBIC or Reno, can estimate the capacity by utilizing a combination of the CWND/ flight_size and the RTT. A different approach could estimate the same parameters for a rate-based congestion controller, such as BBR [I-D.cardwell-iccrg-bbr-congestion-control]. * Observe Phase: The sender should update the stored CC parameters and/or send updated CC parameter information related to an estimated path capacity (saved_capacity) after each observation. * Observe Phase: The stored CC parameters should be updated if there are significant changes in the saved CC parameters. The frequency of update MUST be less than one update for several RTTs of time. * Observe Phase: There are cases where the current CWND does not reflect the path capacity. At the End of the CC slow start phase, the size can be significantly larger than needed to fully utilize the path (i.e., a CWND overshoot). It is inappropriate to use an overshoot in the CWND as a basis for estimating the capacity. In most cases, the CWND will converge to a stable value after several more RTTs. One mitigation could be to calculate the capacity based on the flight_size, an averaged CWND. Also when the sender is application-limited or in an RTT following a burst of transmission, a sender typically transmits much less data than allowed. This case also ought to be discounted when estimating the capacity. 4.2. Confirming the Path in the Reconnaissance Phase In the Reconnaissance Phase a sender initiates a connection and starts sending initial data. It measures the RTT to confirm the path it wishes to use. A sender must limit the initial data, sent in the first RTT of transmitted data, to not more than the IW [RFC9000]. This transmission using the IW is assumed to be a safe starting point for any path to avoid adding excessive load to a potentially congested path. (When used in a controlled network, additional information about local path characteristics could be known, which might be used to configure a non-standard IW.) Kuhn, et al. Expires 31 March 2024 [Page 12] Internet-Draft Congestion Control Convergence September 2023 4.2.1. Confirming the Path Path characteristics can change over time for many reasons, resulting in the previously observed CC parameters becoming irrelevant. The sender therefore compares the saved_RTT with each of a series of measured RTT samples. If the current RTT sample is less than a half of the saved_RTT, this is regarded as too small, and is an indicator of a path change. (This factor of two arises, because the rate should not exceed the observed rate when the capacity was measured, because the jump_cwnd is calculated as half the measured capacity.) A current RTT larger than that at the time the capacity was measured results in a proportionaly lower resumed rate, because the transmission using the CR method is paced based on the current RTT. An RTT sample more than ten times the saved_RTT is regarded as too large, such a high RTT is indicative of a path change. (The factor of ten accommodates both increases in latency from buffering on a path, and any variation between samples). NOTE: Some transport protocols implement methods that infer potential congestion from an increase in the RTT. In the Reconnaissance Phase, this indication occurs earlier than congestion which is reported by loss or by ECN marking. Designs need to consider if this is a suitable trigger for changing the phase of CR. 4.3. Safety Requirements for the Unvalidated Phase This section defines the safety requirements for using saved CC parameters to tentatively update the CWND. These safety guidelines mitigate the risk of adding excessive congestion to an already congested path. {XXX-Editor NOTE: A future revision of this document needs to specify how long CC Parameters can be cached, possibly based on TCP-new-CWV or TCB, RFC9040.} * Unvalidated Phase (Jump): A connection must not directly use the previously saved_capacity to directly initialize a new flow causing it to resume sending at the same rate. The jump_cwnd MUST be no more than half the previously saved_capacity and is paced based on the current RTT (current_RTT). Using the current_rtt rather than a saved RTT value helps to ensure appropriate pacing, but places a limitation on the minimum acceptable RTT to avoid sending at a rate higher than was previously observed. Kuhn, et al. Expires 31 March 2024 [Page 13] Internet-Draft Congestion Control Convergence September 2023 4.3.1. Exit for the Unvalidated Phase because of Variable Network Conditions Unvalidated and Reconnaissance Phases: Careful Resume MUST be robust to changes in network conditions due to variations in the forwarding path, reconfiguration of equipment, or changes in the link conditions. * Unvalidated Phase: Careful Resume MUST be robust to changes in network traffic, including the arrival of new traffic flows that compete for capacity at a shared bottleneck. * Unvalidated Phase: Careful Resume MUST prevent unduly suppressing flows that used the capacity since the available capacity was measured. * Unvalidated Phase: The sender MUST transition to the Safe Retreat Phase when a packet loss is detected or acknowledgments indicate sent packets were ECN CE-marked. These are an indication of potential congestion. 4.3.2. Pacing in the Unvalidated Phase The sender must avoid sending a burst of packets greater than IW as a result of a step-increase in the congestion window [RFC8085], [RFC9000]. Pacing sent packets as a function of the current RTT provides an additional safety during the Unvalidated Phase. Other sender mitigations have also been suggested to avoid line-rate bursts (e.g., [I-D.hughes-restart]). The following example provides a relevant pacing rhythm using the RTT and the saved_capacity. The Inter-packet Transmission Time (ITT) is determined from the ratio between the current Maximum Message Size (MMS) and the ratio between the saved_capacity and the RTT. A safety margin can avoid sending more than a recommended maximum (max_jump): jump_cwnd = min(max_jump,saved_capacity/2) ITT = MSS/(jump_cwnd/saved_rtt) This follows the idea presented in [RFC4782], [I-D.irtf-iccrg-sallantin-initial-spreading] and [CONEXT15]. Kuhn, et al. Expires 31 March 2024 [Page 14] Internet-Draft Congestion Control Convergence September 2023 4.4. Safety Requirements for the Validating Phase When a sender completes the Unvalidated Phase, either by sending the jump_cwnd or after one RTT, it ceases to use the unvalidated CWND. That is, CWND is reset to the flight size, and the sender awaits reception of the acknowledgments to validate the use of this capacity. During this phase, new packets are sent when previously sent data is newly acknowledged. The purpose of this phase is to trigger a safe retreat in the case when the capacity is not validated. 4.5. Safety Requirements for the Safe Retreat Phase This section defines the safety requirements after congestion has been detected during the Unvalidated Phase. The Safe Retreat reaction MUST differ from a traditional reaction to detected congestion, because the jump_cwnd can result in a significantly higher rate than would be allowed by the slow-start mechanism. This could aggressively feed a congested bottleneck, resulting in overshoot where a disproportionate number of packets from existing flows are displaced from the buffer at the congested bottleneck. For this reason, a sender needs to react to detected congestion by reducing significantly CWND significantly below the saved_capacity. Note: Proportional Rate Reduction (PRR) assumes that it is safe to reduce the rate gradually when in congestion avoidance. The method specified by PRR [RFC6937] is therefore not appropriate when there might be significant overshoot in the use of the capacity. The CWND is reduced on entry to the Safe Retreat Phase to no more than the IW. This provides some examples of how to implement the Safe Retreat Phase: 1. A simple conservative design sets CWND = IW and then resumes using normal slow-start. This does not require measuring the capacity at congestion. The resulting pattern of CWND growth resembles that which would have occurred had the design not been used. 2. Performance can be improved by tracking the volume of successfully transmitted packets sent using the Unvalidated Phase (e.g., by recording the sequence number of the first packet sent in the phase). This measured capacity is called the Pipe. The Pipe is not a safe measure of the currently available share of Kuhn, et al. Expires 31 March 2024 [Page 15] Internet-Draft Congestion Control Convergence September 2023 the capacity whenever there was also a significant overshoot at the bottleneck, as indicated by excessive loss. Therefore, any design that increases CWND based on received acknowledgments ought to be scaled, because an overshoot could have resulted in unduly taking capacity from sharing flows. 4.6. Returning to Normal Congestion Control After using Careful Resume, the CC controller returns to the Normal Phase. The implementation details for the transition to the Normal Phase depend on the design of the CC method. For NewReno and CUBIC, it is recommended to exit slow-start and enter the congestion avoidance phase of the CC method. For BBR CC, it is recommended to enter the "probe bandwidth" state. {XXX-Editor note: A future revision should discuss updating the saved parameters, whether used or not, after reaching normal operation for use the next time even if that update is to just refresh the expiration time.} 4.7. Limitations from Transport Protocols A sender is limited by any rate-limitation of the transport protocol that is used. The implementation details for different transports depend on the design of the transport. For QUIC this includes flow control mechanisms or preventing amplification attacks. In particular, a QUIC receiver might need to issue proactive MAX_DATA frames to increase the flow control limits of a connection that is started when using Careful Resume to gain the expected benefit. A TCP sender is limited by the receiver window (rwnd). Unless configured at a receiver, the rwnd constrains the rate of increase for a connection and reduces the benefit of Careful Resume. Kuhn, et al. Expires 31 March 2024 [Page 16] Internet-Draft Congestion Control Convergence September 2023 5. Acknowledgments The authors would like to thank John Border, Gabriel Montenegro, Patrick McManus, Ian Swett, Igor Lubashev, Robin Marx, Roland Bless, Franklin Simo, Raffaello Secchi for their fruitful comments on earlier versions of this document. The authors would like to particularly thank Tom Jones for co- authoring several previous versions of this document. 6. IANA Considerations No current parameters are required to be registered by IANA. 7. Security Considerations This document does not exhibit specific security considerations. Security considerations for the interactions with the receiver are discussed in [I-D.kuhn-quic-bdpframe-extension]. 8. References 8.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . [RFC8085] Eggert, L., Fairhurst, G., and G. Shepherd, "UDP Usage Guidelines", BCP 145, RFC 8085, DOI 10.17487/RFC8085, March 2017, . [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, . [RFC8801] Pfister, P., Vyncke, É., Pauly, T., Schinazi, D., and W. Shao, "Discovering Provisioning Domain Names and Data", RFC 8801, DOI 10.17487/RFC8801, July 2020, . [RFC9000] Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based Multiplexed and Secure Transport", RFC 9000, DOI 10.17487/RFC9000, May 2021, . 8.2. Informative References Kuhn, et al. Expires 31 March 2024 [Page 17] Internet-Draft Congestion Control Convergence September 2023 [CONEXT15] Li, Q., Dong, M., and P B. Godfrey, "Halfback: Running Short Flows Quickly and Safely", ACM CoNEXT , 2015. [I-D.cardwell-iccrg-bbr-congestion-control] Cardwell, N., Cheng, Y., Yeganeh, S. H., Swett, I., and V. Jacobson, "BBR Congestion Control", Work in Progress, Internet-Draft, draft-cardwell-iccrg-bbr-congestion- control-02, 7 March 2022, . [I-D.hughes-restart] Hughes, A., "Issues in TCP Slow-Start Restart After Idle", Work in Progress, Internet-Draft, draft-hughes-restart-00, 30 November 2001, . [I-D.irtf-iccrg-sallantin-initial-spreading] Sallantin, R., Baudoin, C., Arnal, F., Dubois, E., Chaput, E., and A. Beylot, "Safe increase of the TCP's Initial Window Using Initial Spreading", Work in Progress, Internet-Draft, draft-irtf-iccrg-sallantin-initial- spreading-00, 15 January 2014, . [I-D.kuhn-quic-bdpframe-extension] Kuhn, N., Emile, S., Fairhurst, G., and C. Huitema, "BDP Frame Extension", Work in Progress, Internet-Draft, draft- kuhn-quic-bdpframe-extension-02, 10 May 2023, . [IJSCN] Thomas, L., Dubois, E., Kuhn, N., and E. Lochin, "Google QUIC performance over a public SATCOM access", International Journal of Satellite Communications and Networking 10.1002/sat.1301, 2019. [MAPRG111] Kuhn, N., Stephan, E., Fairhurst, G., Jones, T., and C. Huitema, "Feedback from using QUIC's 0-RTT-BDP extension over SATCOM public access", IETF 111 - MAPRG meeting , 2022. [RFC3465] Allman, M., "TCP Congestion Control with Appropriate Byte Counting (ABC)", RFC 3465, DOI 10.17487/RFC3465, February 2003, . Kuhn, et al. Expires 31 March 2024 [Page 18] Internet-Draft Congestion Control Convergence September 2023 [RFC4782] Floyd, S., Allman, M., Jain, A., and P. Sarolahti, "Quick- Start for TCP and IP", RFC 4782, DOI 10.17487/RFC4782, January 2007, . [RFC5681] Allman, M., Paxson, V., and E. Blanton, "TCP Congestion Control", RFC 5681, DOI 10.17487/RFC5681, September 2009, . [RFC5783] Welzl, M. and W. Eddy, "Congestion Control in the RFC Series", RFC 5783, DOI 10.17487/RFC5783, February 2010, . [RFC6675] Blanton, E., Allman, M., Wang, L., Jarvinen, I., Kojo, M., and Y. Nishida, "A Conservative Loss Recovery Algorithm Based on Selective Acknowledgment (SACK) for TCP", RFC 6675, DOI 10.17487/RFC6675, August 2012, . [RFC6937] Mathis, M., Dukkipati, N., and Y. Cheng, "Proportional Rate Reduction for TCP", RFC 6937, DOI 10.17487/RFC6937, May 2013, . [RFC8867] Sarker, Z., Singh, V., Zhu, X., and M. Ramalho, "Test Cases for Evaluating Congestion Control for Interactive Real-Time Media", RFC 8867, DOI 10.17487/RFC8867, January 2021, . [RFC9002] Iyengar, J., Ed. and I. Swett, Ed., "QUIC Loss Detection and Congestion Control", RFC 9002, DOI 10.17487/RFC9002, May 2021, . [RFC9040] Touch, J., Welzl, M., and S. Islam, "TCP Control Block Interdependence", RFC 9040, DOI 10.17487/RFC9040, July 2021, . Appendix A. Appendix: An Endpoint Token This annex proposes an Endpoint Token to allow a sender to identify its own view of the network path that it is using. In [I-D.kuhn-quic-bdpframe-extension] this Endpoint Token could be shared and used as an opaque path identifier to other parties and the sender can verify if this is one of its current paths. A.1. Creating an Endpoint Token When computing the Endpoint Token, the sender includes information to identify the path on which it sends, for example: Kuhn, et al. Expires 31 March 2024 [Page 19] Internet-Draft Congestion Control Convergence September 2023 * it needs to include a unique identifier for itself (e.g., a globally assigned address/prefix; or randomly chosen value such as a nonce); * it needs to include an identifier for the destination (e.g., a destination IP address or name); * it needs to include an interface identifier (e.g., an index value or a MAC address to associate the endpoint with the interface on which the path starts); * it could include other information such as the DSCP, ports, flow label, etc (recognising that this additional information might improve the path differentiation, but that this can reduce the re- usability of the token); * it could include any other information the sender chooses to include, and potentially including PvD information [RFC8801] or information relating to its public-facing IP address; * it could include a time-dependent value to define the validity period of the token. When creating an Endpoint Token, the sender has to ensure the following: 1. To reduce the likelihood of misuse of the Endpoint Token, the value ought to be encoded in a way that hides the component information from the recipient and any eavesdropper on the path. 2. The sender can recalculate the Endpoint Token if it needs to validate a previously issued token; and that the Endpoint Token itself can be included in the computed integrity check for any path information it provides. 3. The Endpoint Token is designed so that if shared, it prevents another party from deriving private data from the token, or to use the token to perform unwanted likability with other information. This implies that the Endpoint Token MUST necessarily be different when used to identify paths using different interfaces. Appendix B. Appendix: Revision details Previous individual submissions were discussed in TSVWG and QUIC. WG -00 included clarifications and restructuring to form the 1st WG draft. Kuhn, et al. Expires 31 March 2024 [Page 20] Internet-Draft Congestion Control Convergence September 2023 WG -01 included review comments and suggestions from John Border, and follows the setting of the TSVWG milestone with an intended status of "Proposed Standard". WG -02 includes steps to complete the spec. In particular, consideration of application-limited senders; selection of reasoned parameters; specification of safe retreat; and improvements to the consistency throughout. Added the validating phase. WG -03, explain entry to Validating Phase, editorial tidy. Authors' Addresses Nicolas Kuhn Thales Alenia Space Email: nicolas.kuhn.ietf@gmail.com Emile Stephan Orange Email: emile.stephan@orange.com Godred Fairhurst University of Aberdeen Department of Engineering Fraser Noble Building Aberdeen AB24 3UE United Kingdom Email: gorry@erg.abdn.ac.uk Christian Huitema Private Octopus Inc. Email: huitema@huitema.net Kuhn, et al. Expires 31 March 2024 [Page 21]