Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Replace alarm with timer #1559

Merged
merged 6 commits into from
Jul 15, 2018
Merged

Replace alarm with timer #1559

merged 6 commits into from
Jul 15, 2018

Conversation

ianswett
Copy link
Contributor

Fixes #1383

@ianswett ianswett changed the title Remove alarm Replace alarm with timer Jul 14, 2018
@@ -111,8 +111,8 @@ of frames contained in a packet affect recovery and congestion control logic:
to as "retransmittable" below.

* Long header packets that contain CRYPTO frames are critical to the
performance of the QUIC handshake and use shorter timers for acknowledgement
and retransmission.
performance of the QUIC handshake and use shorter timeouts for
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

undo this change -- shorter timeouts not timers.

When CRYPTO frames are sent, the sender SHOULD set a timer for the handshake
timeout period. Upon timeout, the sender MUST retransmit all unacknowledged
CRYPTO data by calling RetransmitAllUnackedHandshakeData(). On each
consecutive firing of the handshake timer without receiving an
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

s/firing/expiration/

To reduce latency, it is RECOMMENDED that the sender set and allow the TLP alarm
to fire twice before setting an RTO alarm. In other words, when the TLP alarm
To reduce latency, it is RECOMMENDED that the sender set and allow the TLP timer
to fire twice before setting an RTO timer. In other words, when the TLP timer
fires the first time, a TLP packet is sent, and it is RECOMMENDED that the TLP
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

you should just do s/fires/expires/ through the doc

When the last TLP packet is sent, an alarm is scheduled for the RTO period. When
this alarm fires, the sender sends two packets, to evoke acknowledgements from
the receiver, and restarts the RTO alarm.
When the last TLP packet is sent, a timer is scheduled for the RTO period. When
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

s/a timer is scheduled/a timer is set/

if (smoothed_rtt == 0):
alarm_duration = 2 * kInitialRtt
timer_duration = 2 * kInitialRtt
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

s/timer_duration/timeout/

@ianswett
Copy link
Contributor Author

Thanks Jana, this PR got a bit larger, PTAL

@janaiyengar
Copy link
Contributor

I don't know why circle is still showing breakage with the old qpack draft. I'll merge this.

@janaiyengar janaiyengar merged commit a65c254 into master Jul 15, 2018
@rpaulo
Copy link
Contributor

rpaulo commented Jul 20, 2018

@ianswett I think you missed the transport doc (migration section)

@rpaulo
Copy link
Contributor

rpaulo commented Jul 20, 2018

Should be done now in PR #1590

@ianswett
Copy link
Contributor Author

You're right, thanks for the PR!

@martinthomson martinthomson added the editorial An issue that does not affect the design of the protocol; does not require consensus. label Aug 13, 2018
@martinthomson martinthomson deleted the ianswett-timer branch October 26, 2018 00:22
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
editorial An issue that does not affect the design of the protocol; does not require consensus.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants