Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Clarify time threshold vs crypto timer #2620

Merged
merged 6 commits into from
Apr 16, 2019
Merged

Conversation

ianswett
Copy link
Contributor

Adds some explanation about why it's better to arm/fire the time threshold alarm before the crypto retransmission timeout.

Hopefully clarifies comments from #2565

Adds some explanation about why it's better to arm/fire the time threshold alarm before the crypto retransmission timeout.

Hopefully clarifies comments from #2565
@yangchi
Copy link

yangchi commented Apr 15, 2019

Thanks for the explanation. It's much clearer.
Can i ask for one more clarification? In DetectLostPackets, shouldn't the for-loop have been something like this:
foreach unacked in sent_packets[pn_space]:

Index DetectLostPackets by [pn_space]
@ianswett
Copy link
Contributor Author

Thanks for catching the pseudocode error in DetectLostPackets. PTAL.

@ianswett ianswett added -recovery editorial An issue that does not affect the design of the protocol; does not require consensus. labels Apr 15, 2019
@yangchi
Copy link

yangchi commented Apr 15, 2019

lgtm. thank you!

Copy link
Contributor

@janaiyengar janaiyengar left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A couple of comments.

draft-ietf-quic-recovery.md Outdated Show resolved Hide resolved
draft-ietf-quic-recovery.md Outdated Show resolved Hide resolved
janaiyengar and others added 3 commits April 15, 2019 17:31
retransmission timeout and be less likely to spuriously retransmit data.
The Initial and Handshake packet number spaces typically have a small number
of packets in them, so time threshold loss detection will typically declare
packets lost before packet threshold.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think what you want to say is that time-threshold is more likely to be used for loss detection than packet-threshold, since there just might not be enough packets. So how about just this, given that you've just talked about time-threshold: "The Initial and Handshake packet number spaces will typically carry a small number of packets, so losses are less likely to be detected using packet-threshold detection."

That said, I still am not sure that it's worth mentioning the packet-threshold here at all. But my opinion is not strong, so your call.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks, suggestion taken. I think why you'd arm the loss-detection timer is non-obvious, so I thought more explanatory text was better than less, and I think the small number of packets argument is relevant.

@janaiyengar janaiyengar merged commit 9283609 into master Apr 16, 2019
@martinthomson martinthomson deleted the ianswett-loss-timers branch April 30, 2019 22:55
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
-recovery editorial An issue that does not affect the design of the protocol; does not require consensus.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants