<?xml version="1.0"encoding="US-ASCII"?> <!-- This template is for creating an Internet Draft using xml2rfc, which is available here: http://xml.resource.org. -->encoding="UTF-8"?> <!DOCTYPE rfc SYSTEM"rfc2629.dtd" []> <?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?> <!-- used by XSLT processors --> <!-- For a complete list and description of processing instructions (PIs), please see http://xml.resource.org/authoring/README.html. --> <!-- Below are generally applicable Processing Instructions (PIs) that most I-Ds might want to use. (Here they are set differently than their defaults in xml2rfc v1.32) --> <?rfc strict="yes" ?> <!-- give errors regarding ID-nits and DTD validation --> <!-- control the table of contents (ToC) --> <?rfc toc="yes"?> <!-- generate a ToC --> <?rfc tocdepth="4"?> <!-- the number of levels of subsections in ToC. default: 3 --> <!-- control references --> <?rfc symrefs="yes"?> <!-- use symbolic references tags, i.e, [RFC2119] instead of [1] --> <?rfc sortrefs="yes" ?> <!-- sort the reference entries alphabetically --> <!-- control vertical white space (using these PIs as follows is recommended by the RFC Editor) --> <?rfc compact="yes" ?> <!-- do not start each main section on a new page --> <?rfc subcompact="no" ?> <!-- keep one blank line between list items --> <!-- end of list of popular I-D processing instructions -->"rfc2629-xhtml.ent"> <rfc xmlns:xi="http://www.w3.org/2001/XInclude" submissionType="IETF" category="info" consensus="true" docName="draft-ietf-rmcat-wireless-tests-11"ipr="trust200902"> <!-- category values: std, bcp, info, exp, and historic ipr values: full3667, noModification3667, noDerivatives3667 you can add the attributes updates="NNNN" and obsoletes="NNNN" they will automatically be output with "(if approved)" -->number="8869" ipr="trust200902" obsoletes="" updates="" xml:lang="en" tocInclude="true" tocDepth="3" symRefs="true" sortRefs="true" version="3"> <!--***** FRONT MATTER *****xml2rfc v2v3 conversion 2.43.0 --> <front><!-- The abbreviated title is used in the page header - it is only necessary if the full title is longer than 39 characters --><titleabbrev="RMCAT Wirelessabbrev="Wireless TestCases">EvaluationCases for Interactive Real-Time Media"> Evaluation Test Cases for Interactive Real-Time Media over Wireless Networks</title> <seriesInfo name="RFC" value="8869"/> <author fullname="Zaheduzzaman Sarker" initials="Z." surname="Sarker"> <organization>Ericsson AB</organization> <address> <postal><street>Laboratoriegränd 11</street> <city>Luleå</city> <region></region> <code>97753</code> <country>Sweden</country> </postal> <phone>+46 107173743</phone> <email>zaheduzzaman.sarker@ericsson.com</email> </address> </author> <!-- <author fullname="Ingemar Johansson" initials="I." surname="Johansson"> <organization>Ericsson AB</organization> <address> <postal> <street>Laboratoriegränd 11</street> <city>Luleå</city> <region></region> <code>97753</code><street>Torshamnsgatan 23</street> <city>Stockholm</city> <code>164 83</code> <country>Sweden</country> </postal> <phone>+46 107143042</phone> <email>ingemar.s.johansson@ericsson.com</email>717 37 43</phone> <email>zaheduzzaman.sarker@ericsson.com</email> </address> </author>--><author fullname="Xiaoqing Zhu" initials="X" surname="Zhu"> <organization>Cisco Systems</organization> <address> <postal> <extaddr>Building 4</extaddr> <street>12515 ResearchBlvd., Building 4</street>Blvd</street> <city>Austin</city> <region>TX</region> <code>78759</code><country>USA</country><country>United States of America</country> </postal> <email>xiaoqzhu@cisco.com</email> </address> </author> <author fullname="Jiantao Fu" initials="J." surname="Fu"> <organization>Cisco Systems</organization> <address> <postal> <street>771 Alder Drive</street> <city>Milpitas</city> <region>CA</region> <code>95035</code><country>USA</country><country>United States of America</country> </postal> <email>jianfu@cisco.com</email> </address> </author><!-- <author fullname="Wei-Tian Tan" initials="W.-T." surname="Tan"> <organization>Cisco Systems</organization> <address> <postal> <street>510 McCarthy Blvd</street> <city>Milpitas</city> <region>CA</region> <code>95035</code> <country>USA</country> </postal> <email>dtan2@cisco.com</email> </address> </author> <author fullname="Michael A. Ramalho" initials="M. A." surname="Ramalho"> <organization abbrev="AcousticComms">AcousticComms Consulting</organization> <address> <postal> <street>6310 Watercrest Way Unit 203</street> <city>Lakewood Ranch</city> <region>FL</region> <code>34202-5211</code> <country>USA</country> </postal> <phone>+1 732 832 9723</phone> <email>mar42@cornell.edu</email> </address> </author> --><dateyear="2020" /> <!-- Meta-data Declarations -->year="2021" month="January"/> <area>TSV</area> <keyword>Cellular Network</keyword> <keyword>Wi-Fi Network</keyword> <keyword>Congestion Control</keyword> <keyword>RTP</keyword> <abstract> <t>The Real-time Transport Protocol (RTP) is a common transport choice for interactive multimedia communication applications. The performance of these applications typically depends on a well-functioning congestion control algorithm. To ensure a seamless and robust user experience, a well-designed RTP-based congestion control algorithm should work well across all access network types. This document describes test cases for evaluating performances of candidate congestion control algorithms over cellular and Wi-Fi networks.</t> </abstract> </front> <middle> <sectiontitle="Introduction">numbered="true" toc="default"> <name>Introduction</name> <t>Wireless networks (both cellular and Wi-Fi <xreftarget="IEEE802.11"></xref>)target="IEEE802.11" format="default"/>) are an integral and increasingly more significant part of the Internet. Typical application scenarios for interactive multimedia communication over wireless includefromvideo conferencing calls in a bus or train as well as live media streaming at home. It is well known that the characteristics and technical challenges for supporting multimedia services over wireless are very different from those of providing the same service over a wired network. Although the basic test cases as defined in <xreftarget="I-D.ietf-rmcat-eval-test"></xref>target="RFC8867" format="default"/> have covered many common effects of network impairments for evaluating RTP-based congestion control schemes, they remain to be tested over characteristics and dynamics unique to a given wireless environment. For example, in cellular networks, the base station maintains individual queues per radio bearer per user hence it leads to a different nature of interactions between traffic flows of different users. This contrasts with a typical wired network setting where traffic flows from all users share the same queue at the bottleneck. Furthermore, user mobility patterns in a cellular network differ from those in a Wi-Fi network. Therefore, it is important to evaluate the performance of proposed candidate RTP-based congestion control solutions over cellular mobile networks and over Wi-Fi networks respectively.</t><t>The draft <xref target="I-D.ietf-rmcat-eval-criteria"></xref><t><xref target="RFC8868" format="default"/> providesthe guidelineguidelines for evaluating candidate algorithms and recognizes the importance of testing over wireless access networks. However, it does not describe any specific test cases for performance evaluation of candidate algorithms. This document describes test cases specifically targeting cellular and Wi-Fi networks.</t> </section> <sectiontitle="Cellularnumbered="true" toc="default"> <name>Cellular Network Specific TestCases">Cases</name> <t>A cellular environment is more complicated than its wireline counterpart since it seeks to provide services in the context of variable available bandwidth, locationdependenciesdependencies, and user mobilities at different speeds. In a cellular network, the user may reach the celledgeedge, which may lead to a significantamountnumber of retransmissions to deliver the data from the base station to the destination and vice versa. These radio links will often act as a bottleneck for the rest of the network and will eventually lead to excessive delays or packet drops. An efficient retransmission or link adaptation mechanism can reduce the packet lossprobabilityprobability, butthere will remainsome packet losses and delayvariations.variations will remain. Moreover, with increased cell load or handover to a congested cell, congestion in the transport network will become even worse. Besides, there exist certain characteristics that distinguish the cellular network from other wireless access networks such as Wi-Fi. In a cellularnetwork --network: </t><t><list style="symbols"><ul spacing="normal"> <li> <t>The bottleneck is often a shared link with relatively few users.<list style="symbols"> <t>The</t> <ul spacing="normal"> <li>The cost per bit over the shared link varies over time and is different for differentusers.</t> <t>Leftover/unusedusers.</li> <li>Leftover/unused resources can be consumed by other greedyusers.</t> </list> </t> <t>Queuesusers.</li> </ul> </li> <li>Queues are always per radiobearerbearer, hence each user can have many suchqueues.</t> <t>Usersqueues.</li> <li>Users can experience bothInterinter- andIntra Radiointra-Radio Access Technology (RAT) handovers (see <xreftarget="HO-def-3GPP"></xref>target="HO-def-3GPP" format="default"/> for the definition of"handover").</t> <t>Handover"handover").</li> <li>Handover between cells or change of serving cells (as described in <xreftarget="HO-LTE-3GPP"></xref>target="HO-LTE-3GPP" format="default"/> and <xreftarget="HO-UMTS-3GPP"></xref>)target="HO-UMTS-3GPP" format="default"/>) might cause user planeinterruptionsinterruptions, which can lead to bursts of packet losses,delaydelay, and/or jitter. The exact behavior depends on the type of radio bearer. Typically, the default best-effort bearers do not generate packet loss, instead, packets are queued up and transmitted once the handover iscompleted.</t> <t>Thecompleted.</li> <li>The network part decides how much the user cantransmit.</t>transmit.</li> <li> <t>The cellular network has variable link capacity per user.<list style="symbols"> <t>It</t> <ul spacing="normal"> <li>It can vary as fast as a period ofmilliseconds.</t> <t>Itmilliseconds.</li> <li>It depends on many factors (such as distance, speed, interference, differentflows).</t> <t>Itflows).</li> <li>It uses complex and smart linkadaptationadaptation, which makes the link behavior ever moredynamic.</t> <t>Thedynamic.</li> <li>The scheduling priority depends on the estimatedthroughput.</t> </list> </t> <t>Boththroughput.</li> </ul> </li> <li>Both Quality of Service (QoS) and non-QoS radio bearers can beused.</t> </list></t>used.</li> </ul> <t>Hence, a real-time communication application operating over a cellular network needs to cope with a shared bottleneck link and variable link capacity, events like handover,non-congestion relatednon-congestion-related loss, and abrupt changes in bandwidth (both short term and long term) due to handover, networkloadload, and bad radio coverage. Even though 3GPP has defined QoS bearers <xreftarget="QoS-3GPP"></xref>target="QoS-3GPP" format="default"/> to ensure high-quality user experience, it is still preferable for real-time applications to behave in an adaptive manner. </t> <t>Different mobile operators deploy their own cellular networks with their own set of network functionalities and policies. Usually, a mobile operator network includes a range of radio access technologies such as 3G and 4G/LTE. Looking at the specifications of such radiotechnologiestechnologies, it is evident that only the more recent radio technologies can support the high bandwidth requirements from real-time interactive video applications.The futureFuture real-time interactiveapplicationapplications will impose even greater demand on cellular networkperformanceperformance, which makes 4G (and beyond) radio technologies more suitable for such genre of application. </t> <t>The key factors in defining test cases for cellular networks are: </t><t><list style="symbols"> <t>Shared<ul spacing="normal"> <li>Shared and varying linkcapacity</t> <t>Mobility</t> <t>Handover</t> </list></t>capacity</li> <li>Mobility</li> <li>Handover</li> </ul> <t>However, these factors are typically highly correlated in a cellular network. Therefore, instead of devising separate test cases for individual important events, we have divided the testcasecases into two categories. It should be noted that the goal of the following test cases is to evaluate the performance of candidate algorithms over the radio interface of the cellular network.HenceHence, it is assumed that the radio interface is the bottleneck link between the communicating peers and that the core network does not introduce any extra congestion along the path. Consequently, thisdraftdocument haskept asleft out of scope the combination of multiple access technologies involving both cellular and Wi-Fi users. In this lattercasecase, the shared bottleneck is likely at the wired backhaul link. These test cases further assume a typical real-time telephony scenario where one real-time session consists of one voice stream and one video stream. </t> <t> Even though it is possible to carry out tests over operational cellular networks (e.g., LTE/5G), and actually such tests are already available today, these tests cannot in general be carried out in a deterministic fashion to ensure repeatability. The main reason is that these networks are controlled by cellularoperatorsoperators, and thereexistexists various amounts of competing traffic in the same cell(s). In practice, it is only in underground mines that one can carry out near deterministic testing. Even there, it is not guaranteed either as workers in the mines may carry with them their personal mobile phones. Furthermore, the underground mining setting may not reflect typical usage patterns in an urban setting. We, therefore, recommend that a cellular network simulatorisbe used for the test cases defined in this document, for example -- the LTE simulator in <xreftarget="NS-3"></xref>.target="NS-3" format="default"/>. </t> <section anchor="VNL"title="Varyingnumbered="true" toc="default"> <name>Varying NetworkLoad">Load</name> <t>The goal of this test is to evaluate the performance of the candidate congestion control algorithm under varying network load. The network load variation is created by adding and removing networkusersusers, a.k.a. UserEquipments (UEs)Equipment (UE), during the simulation. In this test case, each user/UE in the media session is an endpoint following RTP-based congestion control. User arrivals follow a Poisson distribution proportional to the length of the call, to keep the number of users per cell fairly constant during the evaluation period. At the beginning of the simulation, there should be enough time towarm-upwarm up the network. This is to avoid running the evaluation in an empty network where network nodesare havinghave emptybuffers,buffers and low interference at the beginning of the simulation. This network initialization period should be excluded from the evaluation period. Typically, the evaluation period starts 30 seconds after test initialization. </t> <t>This test case also includes user mobility and some competing traffic. The latter includes both the same types of flows (with same adaptation algorithms) and different types of flows (with different services and congestion control schemes). </t><!--<section anchor="NC-VNL" numbered="true" toc="default"> <name>Network Connection</name> <t>Each mobile user is connected to a fixed user. Theinvestigated congestion control algorithms should show maximum possible network utilization and stability in terms of rate variations, lowest possible end to end frame latency, network latency and Packet Loss Rate (PLR) at different cell load level.</t> --> <section anchor="NC-VNL" title="Network Connection"> <t>Each mobile user is connected to a fixed user. The connection between the mobile userconnection between the mobile user and fixed user consists of a cellular radio access, an Evolved Packet Core(EPC)(EPC), and an Internet connection. The mobile user is connected to the EPC using cellular radio accesstechnologytechnology, which is further connected to the Internet. At the other end, the fixed user is connected to the Internet via a wired connection with sufficiently high bandwidth, for instance, 10 Gbps, so that the system bottleneck is on the cellular radio access interface. The wired connectiontoin this setup does not introduce any network impairments to the test; it only adds 10 ms of one-way propagation delay. </t> <t>The path from the fixed user to the mobile users is defined as"Downlink""downlink", and the path from the mobile users to the fixed user is defined as"Uplink"."uplink". We assume that only uplink or downlink is congested for mobile users. Hence, we recommend that the uplink and downlink simulations are run separately. </t><t><figurealign="center" anchor="fig-siml-topology" title="Simulation Topology">anchor="fig-siml-topology"> <name>Simulation Topology</name> <artwork align="center" name="SimulationTopology"><![CDATA[Topology" type="" alt=""><![CDATA[ uplink ++))) +--------------------------> ++-+ ((o)) | | / \ +-------+ +------+ +---+ +--+ / \----+ +-----+ +----+ | / \ +-------+ +------+ +---+ UE BS EPC Internet fixed <--------------------------+ downlink ]]></artwork></figure></t></figure> </section> <section anchor="SS-VNL"title="Simulation Setup">numbered="true" toc="default"> <name>Simulation Setup</name> <t>The values enclosed within "[ ]" for the following simulation attributes follow the same notion as in <xreftarget="I-D.ietf-rmcat-eval-test"></xref>.target="RFC8867" format="default"/>. The desired simulation setup is asfollows --follows: </t><t><list style="numbers"> <t>Radio environment: <list style="letters"> <t>Deployment<dl newline="false" spacing="normal"> <dt>Radio environment:</dt> <dd> <t><br/></t> <dl newline="false" spacing="normal"> <dt>Deployment and propagationmodel: 3GPPmodel:</dt> <dd>3GPP case 1 (see <xreftarget="HO-deploy-3GPP"></xref>)</t> <t>Antenna:target="HO-deploy-3GPP" format="default"/>)</dd> <dt>Antenna:</dt> <dd> Multiple-Input and Multiple-Output (MIMO), 2D or 3D antennapattern.</t> <t>Mobility: [3km/h, 30km/h]</t> <t>Transmission bandwidth: 10MHz</t> <t>Numberpattern</dd> <dt>Mobility:</dt> <dd> [3 km/h, 30 km/h]</dd> <dt>Transmission bandwidth:</dt> <dd> 10 MHz</dd> <dt>Number ofcells:cells:</dt> <dd> multi-cell deployment (3Cellscells per Base Station (BS) * 7 BS) = 21cells</t> <t>Cell radius:cells</dd> <dt>Cell radius:</dt> <dd> 166.666Meters</t> <t>Scheduler:meters</dd> <dt>Scheduler:</dt> <dd> Proportional fair with nopriority</t> <t>Bearer:priority</dd> <dt>Bearer:</dt> <dd> Default bearer for alltraffic.</t> <t>Activetraffic</dd> <dt>Active Queue Management (AQM) settings:AQM [on,off]</t> </list></t> <t>End-to-end</dt> <dd>AQM [on, off]</dd> </dl> </dd> <dt>End-to-end Round Trip Time (RTT):[40ms, 150ms]</t> <t>User</dt> <dd>[40 ms, 150 ms]</dd> <dt>User arrival model:Poisson</dt> <dd>Poisson arrivalmodel</t> <t>User intensity: <list style="symbols"> <!-- [TODO] please explain/define what user intensity is, with what unit --> <t>Downlinkmodel</dd> <dt>User intensity:</dt> <dd> <t><br/></t> <dl newline="false" spacing="normal"> <dt>Downlink userintensity:intensity:</dt> <dd> {0.7, 1.4, 2.1, 2.8, 3.5, 4.2, 4.9, 5.6, 6.3, 7.0, 7.7, 8.4, 9,1, 9.8,10.5}</t> <t>Uplink10.5}</dd> <dt>Uplink userintensity :intensity:</dt> <dd> {0.7, 1.4, 2.1, 2.8, 3.5, 4.2, 4.9, 5.6, 6.3,7.0}</t> </list> </t> <t>Simulation duration: 91s</t> <t>Evaluation period: 30s-60s</t> <t>Media traffic: <list counter="reqs" style="numbers"> <t>Media type: Video<list style="letters"> <t>Media direction: [Uplink, Downlink]</t> <t>Number7.0}</dd> </dl> </dd> <dt>Simulation duration:</dt> <dd> 91 s</dd> <dt>Evaluation period:</dt> <dd> 30 s - 60 s</dd> <dt>Media traffic:</dt> <dd> <t><br/></t> <dl newline="false" spacing="normal"> <dt>Media type:</dt> <dd> <t>Video</t> <dl newline="false" spacing="normal"> <dt>Media direction:</dt> <dd> [uplink, downlink]</dd> <dt>Number ofMedia sourcemedia sources peruser:user:</dt> <dd> One(1)</t> <t>Media(1)</dd> <dt>Media duration peruser: 30s</t> <t>Media source: sameuser:</dt> <dd> 30 s</dd> <dt>Media source:</dt> <dd>same as defined inSection 4.3 of<xreftarget="I-D.ietf-rmcat-eval-test"></xref></t> </list> </t> <t>Media Type: Audio <list style="letters"> <t>Media direction: Uplink and Downlink</t> <t>Numbertarget="RFC8867" section="4.3" sectionFormat="of" format="default"/></dd> </dl> </dd> <dt>Media type:</dt> <dd> <t>Audio</t> <dl newline="false" spacing="normal"> <dt>Media direction:</dt> <dd> [uplink, downlink]</dd> <dt>Number ofMedia sourcemedia sources peruser:user:</dt> <dd> One(1)</t> <t>Media(1)</dd> <dt>Media duration peruser: 30s</t> <t>Media codec:user:</dt> <dd> 30 s</dd> <dt>Media codec:</dt> <dd> Constant Bit Rate(CBR)</t> <t>Media bitrate:(CBR)</dd> <dt>Media bitrate:</dt> <dd> 20Kbps</t> <t>Adaptation: off</t> </list> </t> </list></t> <t>OtherKbps</dd> <dt>Adaptation:</dt> <dd> off</dd> </dl> </dd> </dl> </dd> <dt>Other traffic models:<list style="symbols"> <t>Downlink</dt> <dd> <t><br/></t> <dl newline="false" spacing="normal"> <dt>Downlink simulation:Maximum</dt> <dd>Maximum of4Mbps/cell4 Mbps/cell (web browsing or FTP traffic following default TCP congestion control <xreftarget="RFC5681"/>)</t> <t>Unlinktarget="RFC5681" format="default"/>)</dd> <dt>Uplink simulation:Maximum</dt> <dd>Maximum of2Mbps/cell2 Mbps/cell (web browsing or FTP traffic following default TCP congestion control <xreftarget="RFC5681"/>)</t> </list> </t> </list></t>target="RFC5681" format="default"/>)</dd> </dl> </dd> </dl> </section> <sectiontitle="Expected behavior">numbered="true" toc="default"> <name>Expected Behavior</name> <t> The investigated congestion control algorithms should result in maximum possible network utilization and stability in terms of rate variations, lowest possibleend to endend-to-end frame latency, networklatencylatency, and Packet Loss Rate (PLR) at different cell load levels.</t> </section> </section> <sectiontitle="Badnumbered="true" toc="default"> <name>Bad RadioCoverage">Coverage</name> <t>The goal of this test is to evaluate the performance of the candidate congestion control algorithm when users visit part of the network with bad radio coverage. The scenario is created by using a larger cell radius than that in the previous test case. In this test case, each user/UE in the media session is an endpoint following RTP-based congestion control. User arrivals follow a Poisson distribution proportional to the length of the call, to keep the number of users per cell fairly constant during the evaluation period. At the beginning of the simulation, there should be enoughamount oftime towarm-upwarm up the network. This is to avoid running the evaluation in an empty network where network nodesare havinghave emptybuffers,buffers and low interference at the beginning of the simulation. This network initialization period should be excluded from the evaluation period. Typically, the evaluation period starts 30 seconds after test initialization. </t> <t>This test case also includes user mobility and some competing traffic. The latter includes the same kind of flows (with same adaptation algorithms).</t><!-- The investigated congestion control algorithms should result in maximum possible network utilization and stability in terms of rate variations, lowest possible end to end frame latency, network latency and Packet Loss Rate (PLR) at different cell load levels.</t> --><sectiontitle="Network connection">numbered="true" toc="default"> <name>Network Connection</name> <t>Same as defined in <xreftarget="NC-VNL"></xref></t>target="NC-VNL" format="default"/>.</t> </section> <sectiontitle="Simulation Setup">numbered="true" toc="default"> <name>Simulation Setup</name> <t>The desired simulation setup is the same as the Varying Network Load test case defined in <xreftarget="VNL"></xref>target="VNL" format="default"/> except for the followingchanges: <list style="numbers"> <t>Radio environment: Samechanges:</t> <dl spacing="normal"> <dt>Radio environment:</dt> <dd> <t>Same as defined in <xreftarget="SS-VNL"></xref>target="SS-VNL" format="default"/> except for thefollowing: <list style="letters"> <t>Deploymentfollowing:</t> <dl spacing="normal"> <dt>Deployment and propagationmodel: 3GPPmodel:</dt> <dd>3GPP case 3 (see <xreftarget="HO-deploy-3GPP"></xref>)</t> <t>Cell radius: 577.3333 Meters</t> <t>Mobility: 3km/h</t> </list></t> <t>User intensity = {0.7,target="HO-deploy-3GPP" format="default"/>)</dd> <dt>Cell radius:</dt> <dd>577.3333 meters</dd> <dt>Mobility:</dt> <dd>3 km/h</dd> </dl> </dd> <dt>User intensity:</dt> <dd>{0.7, 1.4, 2.1, 2.8, 3.5, 4.2, 4.9, 5.6, 6.3,7.0}</t> <t>Media7.0}</dd> <dt>Media trafficmodel: Samemodel:</dt> <dd>Same as defined in <xreftarget="SS-VNL"></xref></t> <t>Othertarget="SS-VNL" format="default"/></dd> <dt>Other trafficmodels: <list style="symbols"> <t>Downlink simulation: Maximummodels:</dt> <dd> <t><br/></t> <dl spacing="normal"> <dt>Downlink simulation:</dt> <dd>Maximum of2Mbps/cell2 Mbps/cell (web browsing or FTP traffic following default TCP congestion control <xreftarget="RFC5681"/>)</t> <t>Unlink simulation: Maximumtarget="RFC5681" format="default"/>)</dd> <dt>Uplink simulation:</dt> <dd>Maximum of1Mbps/cell1 Mbps/cell (web browsing or FTP traffic following default TCP congestion control <xreftarget="RFC5681"/>)</t> </list></t> </list></t>target="RFC5681" format="default"/>)</dd> </dl> </dd> </dl> </section> <sectiontitle="Expected behavior">numbered="true" toc="default"> <name>Expected Behavior</name> <t>The investigated congestion control algorithms should result in maximum possible network utilization and stability in terms of rate variations, lowest possibleend to endend-to-end frame latency, networklatencylatency, and Packet Loss Rate (PLR) at different cell load levels.</t> </section> </section> <sectiontitle="Desirednumbered="true" toc="default"> <name>Desired Evaluation Metrics forcellular test cases">Cellular Test Cases</name> <t>The evaluation criteria document <xreftarget="I-D.ietf-rmcat-eval-criteria"></xref>target="RFC8868" format="default"/> defines the metrics to be used to evaluate candidate algorithms. Considering the nature and distinction of cellularnetworksnetworks, we recommend that at least the following metrics be used to evaluate the performance of the candidate algorithms: </t><t> <list style="symbols"> <t>Average<ul spacing="normal"> <li>Average cell throughput (for all cells), shows cellutilizations.</t> <t>Applicationutilization.</li> <li>Application sending and receiving bitrate,goodput.</t> <t>Packetgoodput.</li> <li>Packet Loss Rate(PLR).</t> <t>End-to-end Media(PLR).</li> <li>End-to-end media frame delay. For video, this means the delay from capture todisplay.</t> <t>Transport delay.</t> <t>Algorithmdisplay.</li> <li>Transport delay.</li> <li>Algorithm stability in terms of ratevariation.</t> </list></t>variation.</li> </ul> </section> </section> <sectiontitle="Wi-Finumbered="true" toc="default"> <name>Wi-Fi Networks Specific TestCases">Cases</name> <t>Given the prevalence of Internet access links over Wi-Fi, it is important to evaluate candidate RTP-based congestion control solutions over test cases that include Wi-Fi access links. Such evaluations should highlight the inherently different characteristics of Wi-Fi networks in contrast to their wired counterparts:</t><t><list style="symbols"> <t>The<ul spacing="normal"> <li>The wireless radio channel is subject to interference from nearby transmitters, multipath fading, and shadowing. These effects lead to fluctuations in the link throughput and sometimes an error-prone communicationenvironment.</t> <t>Availableenvironment.</li> <li>Available network bandwidth is not only shared over the air between concurrent users but also between uplink and downlink traffic due to the half-duplex nature of the wireless transmissionmedium.</t> <t>Packetmedium.</li> <li>Packet transmissions over Wi-Fi are susceptible to contentions and collisions over the air. Consequently, traffic load beyond a certain utilization level over a Wi-Fi network can introduce frequent collisions over the air and significant network overhead, as well as packet drops due to buffer overflow at the transmitters. This, in turn, leads to excessive delay, retransmissions, packetlosseslosses, and lower effective bandwidth for applications. Note further that the collision-induced delay and loss patterns are qualitatively different from those caused by congestion over a wired connection.</t> <t>The</li> <li>The IEEE 802.11 standard (i.e., Wi-Fi) supports multi-rate transmission capabilities by dynamically choosing the most appropriate modulation and coding scheme (MCS) for the given received signal strength. A different choice in the MCS Index leads to different physical-layer (PHY-layer) link rates and consequently different application-layerthroughput.</t> <t>Thethroughput.</li> <li>The presence of legacy devices (e.g., ones operating only in IEEE 802.11b) at a much lower PHY-layer link rate can significantly slow down the rest of a modern Wi-Fi network. As discussed in <xreftarget="Heusse2003"></xref>,target="Heusse2003" format="default"/>, the main reason for such anomaly is that it takes much longer to transmit the same packet over a slower link than over a faster link, thereby consuming a substantial portion of airtime.</t> <t>Handovertime.</li> <li>Handover from one Wi-Fi Access Point (AP) to another may lead to excessive packet delays and losses during theprocess.</t> <t>IEEEprocess.</li> <li>IEEE 802.11e has introduced the Enhanced Distributed Channel Access (EDCA) mechanism to allow different traffic categories to contend for channel access using different random back-off parameters. This mechanism is a mandatory requirement for the Wi-Fi Multimedia (WMM) certification in Wi-Fi Alliance. It allows for prioritization of real-time application traffic such as voice and video over non-urgent data transmissions (e.g., filetransfer).</t> </list></t>transfer).</li> </ul> <t>In summary, the presence of Wi-Fi access links in different network topologies can exert differentimpactimpacts on the network performance in terms of application-layer effective throughput, packet loss rate, and packet delivery delay. These, in turn, will influence the behavior of end-to-end real-time multimedia congestion control.</t> <t>Unless otherwise mentioned, the test cases in this section choose the PHY- and MAC-layer parameters based on the IEEE 802.11nStandard.standard. Statistics collected from enterprise Wi-Fi networks show that the two dominant physical modes are 802.11n and 802.11ac, accounting for 41% and 58% of connecteddevices.devices, respectively. As Wi-Fi standards evolve over time -- for instance, with the introduction of the emerging Wi-Fi 6 (based on IEEE 802.11ax) products -- the PHY- and MAC-layer test case specifications need to be updated accordingly to reflect such changes.</t> <t>Typically, a Wi-Fi access network connects to a wired infrastructure. Either the wired or the Wi-Fi segment of the network can be the bottleneck. The following sections describe basic test cases for both scenarios separately. The same set of performance metrics as in <xreftarget="I-D.ietf-rmcat-eval-test"></xref>)target="RFC8867" format="default"/>) should be collected for each test case. </t> <t>We recommendto carrycarrying out the test cases as defined in this document using a simulator, such as <xreftarget="NS-2"></xref>target="NS-2" format="default"/> or <xreftarget="NS-3"></xref>.target="NS-3" format="default"/>. When feasible, it is encouraged to perform testbed-based evaluations using Wi-Fi access points and endpoints running up-to-date IEEE 802.11 protocols, such as 802.11ac and the emerging Wi-Fi 6, so as to verify the viability of the candidate schemes.</t> <section anchor="sec-wired-bottleneck"title="Bottlenecknumbered="true" toc="default"> <name>Bottleneck in WiredNetwork">Network</name> <t>The test scenarios below are intended to mimic the setup of video conferencing over Wi-Fi connections from the home. Typically, the Wi-Fi home network is notcongestedcongested, and the bottleneck is present over the wired home access link. Although it is expected that test evaluation results from this section are similar to thoseasin <xreftarget="I-D.ietf-rmcat-eval-test"></xref>,target="RFC8867" format="default"/>, it is still worthwhile to run through these tests as sanity checks.</t> <section anchor="sec-wifi-wired-bottleneck-topo"title="Network topology">numbered="true" toc="default"> <name>Network Topology</name> <t><xreftarget="fig-wifi-test-topology"></xref>target="fig-wifi-test-topology" format="default"/> shows the network topology of Wi-Fi test cases. The test contains multiple mobile nodes (MNs) connected to a common Wi-Fiaccess point (AP)AP and their corresponding wired clients on fixed nodes (FNs). Each connection carries eitheraan RTP-based media flow or a TCP traffic flow. Directions of the flows can be uplink (i.e., from mobile nodes to fixed nodes), downlink (i.e., from fixed nodes to mobile nodes), orbi-directional.bidirectional. The total number ofuplink/downlink/bi-directionaluplink/downlink/bidirectional flows for RTP-based media traffic and TCP traffic are denoted as N and M, respectively.</t><t><figure align="center" anchor="fig-wifi-test-topology" title="Network topology<figure anchor="fig-wifi-test-topology"> <name>Network Topology for Wi-Fitest cases">Test Cases</name> <artwork align="center" name="NetworktopologyTopology for Wi-Fitest cases"><![CDATA[Test Cases" type="" alt=""><![CDATA[ Uplink +----------------->+ +------+ +------+ | MN_1 |)))) /=====| FN_1 | +------+ )) // +------+ . )) // . . )) // . . )) // . +------+ +----+ +-----+ +------+ | MN_N | ))))))) | | | |========| FN_N | +------+ | | | | +------+ | AP |=========| FN0 | +----------+ | | | | +----------+ | MN_tcp_1 | )))) | | | |======| FN_tcp_1 | +----------+ +----+ +-----+ +----------+ . )) \\ . . )) \\ . . )) \\ . +----------+ )) \\ +----------+ | MN_tcp_M |))) \=====| FN_tcp_M | +----------+ +----------+ +<-----------------+ Downlink ]]></artwork></figure></t></figure> </section> <sectiontitle="Test/simulation setup"> <t><list style="symbols"> <t>Test duration: 120s</t> <t>Wi-Finumbered="true" toc="default"> <name>Test/Simulation Setup</name> <dl spacing="normal"> <dt>Test duration:</dt><dd>120 s</dd> <dt>Wi-Fi network characteristics:<list style="symbols"> <t>Radio</dt> <dd> <t><br/></t> <dl spacing="normal"> <dt>Radio propagationmodel: Log-distancemodel:</dt><dd>Log-distance path loss propagation model (see <xreftarget="NS3WiFi"></xref>)</t> <t>PHY-target="NS3WiFi" format="default"/>)</dd> <dt>PHY- and MAC-layerconfiguration: IEEE 802.11n</t> <t>MCSconfiguration:</dt><dd>IEEE 802.11n</dd> <dt>MCS Index at11: 16-QAM 1/2, Raw Data Rate11:</dt><dd>Raw data rate at52Mbps</t> </list></t> <t>Wired52 Mbps, 16-QAM (Quadrature amplitude modulation) and 1/2 coding rate</dd> </dl> </dd> <dt>Wired path characteristics:<list style="symbols"> <t>Path capacity: 1Mbps</t> <t>One-Way</dt> <dd> <t><br/></t> <dl spacing="normal"> <dt>Path capacity:</dt><dd>1 Mbps</dd> <dt>One-way propagationdelay: 50ms.</t> <t>Maximumdelay:</dt><dd>50 ms</dd> <dt>Maximum end-to-endjitter: 30ms</t> <t>Bottleneckjitter:</dt><dd>30 ms</dd> <dt>Bottleneck queuetype: Drop tail.</t> <t>Bottlenecktype:</dt><dd>Drop tail</dd> <dt>Bottleneck queuesize: 300ms.</t> <t>Pathsize:</dt><dd>300 ms</dd> <dt>Path lossratio: 0%.</t> </list></t> <t>Applicationratio:</dt><dd>0%</dd> </dl> </dd> <dt>Application characteristics:<list style="symbols"> <t>Media Traffic: <list style="symbols"> <t>Media type: Video</t> <t>Media direction: See <xref target="subsec-4-1-3"></xref></t> <t>Number</dt> <dd> <t><br/></t> <dl spacing="normal"> <dt>Media traffic: </dt> <dd> <t><br/></t> <dl spacing="normal"> <dt>Media type:</dt><dd>Video</dd> <dt>Media direction:</dt><dd>See <xref target="subsec-4-1-3" format="default"/></dd> <dt>Number of media sources(N): See(N):</dt><dd>See <xreftarget="subsec-4-1-3"></xref></t> <t>Media timeline: <list style="symbols"> <t>Start time: 0s.</t> <t>End time: 119s.</t> </list></t> </list></t> <t>Competing traffic: <list style="symbols"> <t>Typetarget="subsec-4-1-3" format="default"/></dd> <dt>Media timeline:</dt> <dd> <t><br/></t> <dl spacing="normal"> <dt>Start time:</dt><dd>0 s</dd> <dt>End time:</dt><dd>119 s</dd> </dl> </dd> </dl> </dd> <dt>Competing traffic:</dt> <dd> <t><br/></t> <dl spacing="normal"> <dt>Type ofsources: long-livedsources:</dt><dd>Long-lived TCP or CBR overUDP</t> <t>Traffic direction: See <xref target="subsec-4-1-3"></xref></t> <t>NumberUDP</dd> <dt>Traffic direction:</dt><dd>See <xref target="subsec-4-1-3" format="default"/></dd> <dt>Number of sources(M): See(M):</dt><dd>See <xreftarget="subsec-4-1-3"></xref></t> <t>Congestion control: Defaulttarget="subsec-4-1-3" format="default"/></dd> <dt>Congestion control:</dt><dd>Default TCP congestion control <xreftarget="RFC5681"></xref>target="RFC5681" format="default"/> orconstant-bit-rate (CBR)CBR traffic overUDP.</t> <t>Traffic timeline: See <xref target="subsec-4-1-3"></xref></t> </list></t> </list></t> </list></t>UDP</dd> <dt>Traffic timeline:</dt><dd>See <xref target="subsec-4-1-3" format="default"/></dd> </dl> </dd> </dl> </dd> </dl> </section> <sectionanchor = "subsec-4-1-3" title="Typical test scenarios"> <t> <list style="symbols"> <t>Singleanchor="subsec-4-1-3" numbered="true" toc="default"> <name>Typical Test Scenarios</name> <dl spacing="normal"> <dt>Single uplink RTP-based mediaflow: N=1flow:</dt><dd>N=1 with uplink direction andM=0.</t> <t>OneM=0.</dd> <dt>One pair ofbi-directionalbidirectional RTP-based media flows:N=2</dt><dd>N=2 (i.e., one uplink flow and one downlink flow);M=0.</t> <t>OneM=0.</dd> <dt>One pair ofbi-directionalbidirectional RTP-based mediaflows: N=2;flows:</dt><dd>N=2; one uplink on-off CBR flow over UDP: M=1 (uplink). The CBR flow has ON time at t=0s-60s and OFF time att=60s-119s.</t> <t>Onet=60s-119s.</dd> <dt>One pair ofbi-directionalbidirectional RTP-based mediaflows: N=2;flows:</dt><dd>N=2; one uplink off-on CBR flow over UDP: M=1 (uplink). The CBR flow has OFF time at t=0s-60s and ON time att=60s-119s.</t> <t>Onet=60s-119s.</dd> <dt>One RTP-based media flow competing against onelong-livelong-lived TCP flow in the uplinkdirection: N=1direction:</dt><dd>N=1 (uplink) andM = 1(uplink).M=1 (uplink). The TCP flow has start time at t=0s and end time att=119s.</t> </list></t>t=119s.</dd> </dl> </section> <sectiontitle="Expected behavior"> <t><list style="symbols"> <t>Singlenumbered="true" toc="default"> <name>Expected Behavior</name> <dl spacing="normal"> <dt>Single uplink RTP-based mediaflow: theflow:</dt> <dd>The candidate algorithm is expected to detect the path capacity constraint, to converge to the bottleneck link capacity, and to adapt the flow to avoid unwanted oscillations when the sending bit rate is approaching the bottleneck link capacity. No excessive oscillations in the media rate should bepresent.</t> <t>Bi-directionalpresent.</dd> <dt>Bidirectional RTP-based mediaflows: theflows:</dt> <dd>The candidate algorithm is expected to converge to the bottleneck capacity of the wired path in both directions despite the presence of measurement noise over the Wi-Fi connection. In the presence of background TCP or CBR over UDP traffic, the rate of RTP-based media flows should adapt promptly to the arrival and departure of background trafficflows.</t> <t>Oneflows.</dd> <dt>One RTP-based media flow competing withlong-livelong-lived TCP flow in the uplinkdirection: thedirection:</dt><dd>The candidate algorithm is expected to avoid congestion collapse and to stabilize at a fair share of the bottleneck linkcapacity.</t> </list></t>capacity.</dd> </dl> </section> </section> <sectiontitle="Bottlenecknumbered="true" toc="default"> <name>Bottleneck in Wi-FiNetwork">Network</name> <t>The test cases in this section assume that the wired segment along the media path iswell-provisionedwell-provisioned, whereas the bottleneck exists over the Wi-Fi access network. This is to mimic the application scenarios typically encountered by users in an enterprise environment or at a coffee house.</t> <sectiontitle="Network topology">numbered="true" toc="default"> <name>Network Topology</name> <t>Same as defined in <xreftarget="sec-wifi-wired-bottleneck-topo"></xref></t>target="sec-wifi-wired-bottleneck-topo" format="default"/>.</t> </section> <sectiontitle="Test/simulation setup"> <t><list style="symbols"> <t>Test duration: 120s</t> <t>Wi-Fi network characteristics: <list style="symbols"> <t>Radionumbered="true" toc="default"> <name>Test/Simulation Setup</name> <dl spacing="normal"> <dt>Test duration:</dt><dd>120 s</dd> <dt>Wi-Fi network characteristics:</dt> <dd><t><br/></t> <dl spacing="normal"> <dt>Radio propagationmodel: Log-distancemodel:</dt><dd>Log-distance path loss propagation model (see <xreftarget="NS3WiFi"></xref>)</t> <t>PHY-target="NS3WiFi" format="default"/>)</dd> <dt>PHY- and MAC-layerconfiguration: IEEE 802.11n</t> <t>MCSconfiguration:</dt><dd>IEEE 802.11n</dd> <dt>MCS Index at11: 16-QAM 1/2, Raw Data Rate11:</dt><dd>Raw data rate at52Mbps</t> </list></t> <t>Wired52 Mbps, 16-QAM (Quadrature amplitude modulation) and 1/2 coding rate</dd> </dl> </dd> <dt>Wired pathcharacteristics: <list style="symbols"> <t>Path capacity: 100Mbps.</t> <t>One-Waycharacteristics:</dt> <dd><t><br/></t> <dl spacing="normal"> <dt>Path capacity:</dt><dd>100 Mbps</dd> <dt>One-Way propagationdelay: 50ms.</t> <t>Maximumdelay:</dt><dd>50 ms</dd> <dt>Maximum end-to-endjitter: 30ms.</t> <t>Bottleneckjitter:</dt><dd>30 ms</dd> <dt>Bottleneck queuetype: Drop tail.</t> <t>Bottlenecktype:</dt><dd>Drop tail</dd> <dt>Bottleneck queuesize: 300ms.</t> <t>Pathsize:</dt><dd>300 ms</dd> <dt>Path lossratio: 0%.</t> </list></t> <t>Application characteristics: <list style="symbols"> <t>Media Traffic: <list style="symbols"> <t>Media type: Video</t> <t>Media direction: See <xref target="subsec-4-2-3"></xref>.</t> <t>Numberratio:</dt><dd>0%</dd> </dl> </dd> <dt>Application characteristics</dt> <dd><t><br/></t> <dl spacing="normal"> <dt>Media traffic:</dt> <dd><t><br/></t> <dl spacing="normal"> <dt>Media type:</dt><dd>Video</dd> <dt>Media direction:</dt><dd>See <xref target="subsec-4-2-3" format="default"/></dd> <dt>Number of media sources(N): See(N):</dt><dd>See <xreftarget="subsec-4-2-3"></xref>.</t> <t>Media timeline: <list style="symbols"> <t>Start time: 0s.</t> <t>End time: 119s.</t> </list></t> </list></t> <t>Competing traffic: <list style="symbols"> <t>Typetarget="subsec-4-2-3" format="default"/></dd> <dt>Media timeline:</dt> <dd><t><br/></t> <dl spacing="normal"> <dt>Start time:</dt><dd> 0 s</dd> <dt>End time:</dt><dd> 119 s</dd> </dl> </dd> </dl> </dd> <dt>Competing traffic:</dt> <dd><t><br/></t> <dl spacing="normal"> <dt>Type ofsources:sources:</dt><dd> long-lived TCP or CBR overUDP.</t> <t>NumberUDP</dd> <dt>Number of sources(M):(M):</dt><dd> See <xreftarget="subsec-4-2-3"></xref>.</t> <t>Traffic direction:target="subsec-4-2-3" format="default"/></dd> <dt>Traffic direction:</dt><dd> See <xreftarget="subsec-4-2-3"></xref>.</t> <t>Congestion control:target="subsec-4-2-3" format="default"/></dd> <dt>Congestion control:</dt><dd> Default TCP congestion control <xreftarget="RFC5681"/>target="RFC5681" format="default"/> orconstant-bit-rate (CBR)CBR traffic overUDP.</t> <t>Traffic timeline:UDP</dd> <dt>Traffic timeline:</dt><dd> See <xreftarget="subsec-4-2-3"></xref>.</t> </list></t> </list></t> </list></t>target="subsec-4-2-3" format="default"/></dd> </dl> </dd> </dl> </dd> </dl> </section> <sectionanchor = "subsec-4-2-3" title="Typical test scenarios">anchor="subsec-4-2-3" numbered="true" toc="default"> <name>Typical Test Scenarios</name> <t>This section describes a few test scenarios that are deemed as important for understanding the behavior of a candidate RTP-based congestion control scheme over a Wi-Fi network. </t><t><list style="letters"> <t>Multiple<dl spacing="normal"> <dt>Multiple RTP-based media flows sharing the wirelessdownlink:downlink:</dt><dd> N=16 (all downlink);M = 0.M=0. This test case is for studying the impact of contention on the multiple concurrent media flows. For an 802.11n network, given the MCS Index of 11 and the corresponding link rate of52Mbps,52 Mbps, the total application-layer throughput (assuming reasonable distance, lowinterferenceinterference, and infrequent contentions caused by competing streams) is around20Mbps.20 Mbps. A total of N=16 RTP-based media flows (with a maximum rate of1.5Mbps1.5 Mbps each) are expected to saturate the wireless interface in this experiment. Evaluation of a given candidate scheme should focus on whether the downlink media flows can stabilize at a fair share of the total application-layerthroughput.</t> <t>Multiplethroughput.</dd> <dt>Multiple RTP-based media flows sharing the wireless uplink:N = 16</dt><dd>N=16 (all uplink);M = 0.M=0. When multiple clients attempt to transmit media packets uplink over the Wi-Fi network, they introduce more frequent contentions and potential collisions. Per-flow throughput is expected to be lower than that in the previous downlink-only scenario. Evaluation of a given candidate scheme should focus on whether the uplink flows can stabilize at a fair share of the total application-layerthroughput.</t> <t>Multiple bi-directionalthroughput.</dd> <dt>Multiple bidirectional RTP-based mediaflows: N = 16flows:</dt><dd> N=16 (8 uplink and 8 downlink);M = 0.M=0. The goal of this test is to evaluate the performance of the candidate scheme in terms of bandwidth fairness between uplink and downlinkflows.</t> <t>Multiple bi-directionalflows.</dd> <dt>Multiple bidirectional RTP-based media flows with on-off CBR traffic overUDP: N = 16UDP:</dt><dd> N=16 (8 uplink and 8 downlink);M = 5M=5 (uplink). The goal of this test is to evaluate the adaptation behavior of the candidate scheme when its available bandwidth changes due to the departure of background traffic. The background traffic consists of several (e.g., M=5) CBR flows transported over UDP. These background flows are ON at time t=0-60s and OFF at timet=61-120s.</t> <t>Multiple bi-directionalt=61-120s.</dd> <dt>Multiple bidirectional RTP-based media flows with off-on CBR traffic overUDP: N = 16UDP:</dt><dd> N=16 (8 uplink and 8 downlink);M = 5M=5 (uplink). The goal of this test is to evaluate the adaptation behavior of the candidate scheme when its available bandwidth changes due to the arrival of background traffic. The background traffic consists of several (e.g., M=5) parallel CBR flows transported over UDP. These background flows are OFF at time t=0-60s and ON at timest=61-120s.</t> <t>Multiple bi-directionalt=61-120s.</dd> <dt>Multiple bidirectional RTP-based media flows in the presence of background TCPtraffic:traffic:</dt><dd> N=16 (8 uplink and 8 downlink);M = 5M=5 (uplink). The goal of this test is to evaluate how RTP-based media flows compete against TCP over a congested Wi-Fi network for a given candidate scheme. TCP flows have start time at t=40s and end time at t=80s.</t> <t>Varying</dd> <dt>Varying number of RTP-based media flows:A</dt><dd>A series of tests can be carried out for the above test cases with different values of N, e.g.,N = [4,N=[4, 8, 12, 16, 20]. The goal of this test is to evaluate how a candidate scheme responds to varying traffic load/demand over a congested Wi-Fi network. The start times of the media flows are randomlydistributesdistributed within a window of t=0-10s; their end times are randomly distributed within a window of t=110-120s.</t> </list></t></dd> </dl> </section> <sectiontitle="Expected behavior"> <t><list style="symbols"> <t>Multiplenumbered="true" toc="default"> <name>Expected Behavior</name> <dl spacing="normal"> <dt>Multiple downlink RTP-based mediaflows: eachflows:</dt><dd>Each media flow is expected to get its fair share of the total bottleneck link bandwidth. Overall bandwidth usage should not be significantly lower than that experienced by the same number of concurrent downlink TCP flows. In other words, the behavior of multiple concurrent TCP flows will be used as a performance benchmark for this test scenario. The end-to-end delay and packet loss ratio experienced by each flow should be within an acceptable range for real-time multimediaapplications.</t> <t>Multipleapplications.</dd> <dt>Multiple uplink RTP-based mediaflows: overallflows:</dt><dd>Overall bandwidth usage by all media flows should not be significantly lower than that experienced by the same number of concurrent uplink TCP flows. In other words, the behavior of multiple concurrent TCP flows will be used as a performance benchmark for this testscenario.</t> <t>Multiple bi-directionalscenario.</dd> <dt>Multiple bidirectional RTP-based media flows with dynamic background traffic carrying CBR flows overUDP: theUDP:</dt><dd>The media flows are expected to adapt in a timely fashion to the changes in available bandwidth introduced by the arrival/departure of backgroundtraffic.</t> <t>Multiple bi-directionaltraffic.</dd> <dt>Multiple bidirectional RTP-based media flows with dynamic background traffic overTCP: duringTCP:</dt><dd>During the presence of TCP background flows, the overall bandwidth usage by all media flows should not be significantly lower than those achieved by the same number ofbi-directionalbidirectional TCP flows. In other words, the behavior of multiple concurrent TCP flows will be used as a performance benchmark for this test scenario. All downlink media flows are expected to obtain similar bandwidth as each other. The throughput of each media flow is expected to decrease upon the arrival of TCP background traffic and, conversely, increase upon their departure. Both reactions should occur in a timely fashion, for example, within 10s ofseconds.</t> <t>Varyingseconds.</dd> <dt>Varying number ofbi-directionalbidirectional RTP-based mediaflows: theflows:</dt><dd>The test results for varying values of N -- while keeping all other parameters constant -- is expected to show steady and stable per-flow throughput for each value of N. The average throughput of all media flows is expected to stay constant around the maximum rate when N is small, then gradually decrease with increasing value of N till it reaches the minimum allowed rate, beyond which the offered load to the Wi-Fi network exceeds its capacity (i.e., with a very large value ofN).</t> </list></t>N).</dd> </dl> </section> </section> <sectiontitle="Othernumbered="true" toc="default"> <name>Other Potential TestCases">Cases</name> <section anchor="sec-edca-wmm-usage"title="EDCA/WMM usage">numbered="true" toc="default"> <name>EDCA/WMM usage</name> <t>The EDCA/WMM mechanism defines prioritized QoS for four traffic classes (or Access Categories). RTP-based real-time media flows should achieve better performance in terms of lower delay and fewer packet losses with EDCA/WMM enabled when competing against non-interactive background traffic such as file transfers. When most of the traffic over Wi-Fi is dominated by media, however, turning on WMM may degrade performance since all media flows now attempt to access the wireless transmission medium more aggressively, thereby causing more frequent collisions and collision-induced losses. This is a topic worthy of further investigation.</t> </section> <section anchor="sec-legacy-effects"title="Effect of heterogeneous link rates">numbered="true" toc="default"> <name>Effect of Heterogeneous Link Rates</name> <t>As discussed in <xreftarget="Heusse2003"></xref>,target="Heusse2003" format="default"/>, the presence of clients operating over slow PHY-layer link rates (e.g., a legacy 802.11b device) connected to a modern network may adversely impact the overall performance of the network. Additional test cases can be devised to evaluate the effect of clients with heterogeneous link rates on the performance of the candidate congestion control algorithm. Such test cases, for instance, can specify that the PHY-layer link rates for all clients span over a wide range (e.g.,2Mbps2 Mbps to54Mbps)54 Mbps) for investigating its effect on the congestion control behavior of the real-time interactive applications.</t> </section> </section> </section> <section anchor="IANA"title="IANA Considerations">numbered="true" toc="default"> <name>IANA Considerations</name> <t>Thismemo includesdocument has norequest to IANA.</t>IANA actions.</t> </section> <section anchor="Security"title="Security Considerations">numbered="true" toc="default"> <name>Security Considerations</name> <t>The security considerations in <xreftarget="I-D.ietf-rmcat-eval-criteria"></xref>target="RFC8868" format="default"/> and the relevant congestion control algorithms apply. The principles for congestion control are described in <xreftarget="RFC2914"></xref>,target="RFC2914" format="default"/>, and in particular, any new method must implement safeguards to avoid congestion collapse of the Internet.</t> <t>Given the difficulty of deterministic wireless testing, it is recommended and expected that the tests described in this document would be done via simulations. However, in the case where these test cases are carried out in a testbed setting, the evaluation should take place in a controlled lab environment. In the testbed, the applications,simulatorssimulators, and network nodes ought to be well-behaved and should not impact the desired results. It is important to take appropriate caution to avoid leakingnon-responsivenonresponsive traffic with unproven congestion avoidance behavior onto the open Internet.</t> </section><section title="Contributors"> <t>The following individuals contributed to the design, implementation, and verification of the proposed test cases during earlier stages of this work. They have helped to validate and substantially improve this specification. </t> <t>Ingemar Johansson, <ingemar.s.johansson@ericsson.com> of Ericsson AB contributing to the description and validation of cellular test cases during the earlier stage of this draft.</t> <t>Wei-Tian Tan, <dtan2@cisco.com>, of Cisco Systems designed and set up a Wi-Fi testbed for evaluating parallel video conferencing streams, based upon which proposed Wi-Fi test cases are described. He also recommended additional test cases to consider, such as the impact of EDCA/WMM usage. </t> <t>Michael A. Ramalho, <mar42@cornell.edu> of AcousticComms Consulting (previously at Cisco Systems) applied learnings from Cisco's internal experimentation to the early versions of the draft. He also worked on validating the proposed test cases in a VM-based lab setting.</t> </section> <section anchor="Acknowledgments" title="Acknowledgments"> <t>The authors would like to thank Tomas Frankkila, Magnus Westerlund, Kristofer Sandlund, Sergio Mena de la Cruz, and Mirja Kuehlewind for their valuable inputs and review comments regarding this draft.</t> </section></middle><!-- *****BACK MATTER ***** --><back><!-- References split into informative and normative --> <!-- There are 2 ways to insert reference entries from the citation libraries: 1. define an ENTITY at the top, and use "ampersand character"RFC2629; here (as shown) 2. simply use a PI "less than character"?rfc include="reference.RFC.2119.xml"?> here (for I-Ds: include="reference.I-D.narten-iana-considerations-rfc2434bis.xml") Both are cited textually in the same manner: by using xref elements. If you use the PI option, xml2rfc will, by default, try to find included files in the same directory as the including file. You can also define the XML_LIBRARY environment variable with a value containing a set of directories to search. These can be either in the local filing system or remote ones accessed by http (http://domain/dir/... ).--> <references title="Normative References"> <!--?rfc include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml"?--> <?rfc include='reference.RFC.5681.xml'?> <?rfc include='reference.RFC.8174.xml'?> <?rfc include='reference.I-D.ietf-rmcat-eval-criteria.xml'?> <?rfc include='reference.I-D.ietf-rmcat-eval-test.xml'?><references> <name>References</name> <references> <name>Normative References</name> <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5681.xml"/> <reference anchor="RFC8868" target="https://www.rfc-editor.org/info/rfc8868"> <front> <title>Evaluating Congestion Control for Interactive Real-Time Media</title> <author initials='V' surname='Singh' fullname='Varun Singh'> <organization /> </author> <author initials='J' surname='Ott' fullname='Jörg Ott'> <organization /> </author> <author initials='S' surname='Holmer' fullname='Stefan Holmer'> <organization /> </author> <date month='January' year='2021' /> </front> <seriesInfo name="RFC" value="8868"/> <seriesInfo name="DOI" value="10.17487/RFC8868"/> </reference> <reference anchor="RFC8867" target="https://www.rfc-editor.org/info/rfc8867"> <front> <title>Test Cases for Evaluating Congestion Control for Interactive Real-Time Media</title> <author initials='Z' surname='Sarker' fullname='Zaheduzzaman Sarker'> <organization /> </author> <author initials='V' surname='Singh' fullname='Varun Singh'> <organization /> </author> <author initials='X' surname='Zhu' fullname='Xiaoqing Zhu'> <organization /> </author> <author initials='M' surname='Ramalho' fullname='Michael A. Ramalho'> <organization /> </author> <date month='January' year='2021' /> </front> <seriesInfo name="RFC" value="8867"/> <seriesInfo name="DOI" value="10.17487/RFC8867"/> </reference> <reference anchor="HO-deploy-3GPP" target="http://www.3gpp.org/ftp/specs/archive/25_series/25.814/25814-710.zip"> <front> <title>Physical layer aspects for evolved Universal Terrestrial Radio Access (UTRA)</title><author fullname="3GPP R1" initials="3GPP" surname="TS 25.814"> <organization></organization><author> <organization>3GPP</organization> </author> <date month="October"year="2006" />year="2006"/> </front> <seriesInfo name="TS" value="25.814"/> </reference> <referenceanchor="IEEE802.11">anchor="IEEE802.11" target="https://ieeexplore.ieee.org/document/7786995"> <front> <title>Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications</title><author fullname="IEEE"> <organization></organization><author> <organization>IEEE</organization> </author><date year="2012" /></front> <seriesInfo name="IEEE" value="802.11-2012"/> </reference> <reference anchor="NS3WiFi" target="https://www.nsnam.org/doxygen/classns3_1_1_yans_wifi_channel.html"> <front><title>Wi-Fi Channel Model in ns-3 Simulator</title> <author></author> <date /><title>ns3::YansWifiChannel Class Reference</title> <author/> </front> </reference> </references><references title="Informative References"> <!-- Here we use entities that we defined at the beginning. --> <!-- A reference written by by an organization not a person. --> <?rfc include='reference.RFC.2914.xml'?><references> <name>Informative References</name> <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2914.xml"/> <reference anchor="HO-def-3GPP" target="http://www.3gpp.org/ftp/specs/archive/21_series/21.905/21905-940.zip"> <front> <title>Vocabulary for 3GPP Specifications</title><author fullname="3GPP SA" initials="3GPP" surname="TR 21.905"><author> <organization>3GPP</organization> </author> <date month="December"year="2009" />year="2009"/> </front> <seriesInfo name="3GPP TS" value="21.905"/> </reference> <reference anchor="HO-LTE-3GPP" target="http://www.3gpp.org/ftp/specs/archive/36_series/36.331/36331-990.zip"> <front><title>E-UTRA-<title>Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol specification</title><author fullname="3GPP R2" initials="3GPP" surname="TS 36.331"><author> <organization>3GPP</organization> </author> <date month="December"year="2011" />year="2011"/> </front> <seriesInfo name="3GPP TS" value="36.331"/> </reference> <reference anchor="HO-UMTS-3GPP" target="http://www.3gpp.org/ftp/specs/archive/25_series/25.331/25331-990.zip"> <front> <title>Radio Resource Control (RRC); Protocol specification</title><author fullname="3GPP R2" initials="3GPP" surname="TS 25.331"><author> <organization>3GPP</organization> </author> <date month="December"year="2011" />year="2011"/> </front> <seriesInfo name="3GPP TS" value="25.331"/> </reference> <reference anchor="QoS-3GPP" target="http://www.3gpp.org/ftp/specs/archive/23_series/23.203/23203-990.zip"> <front> <title>Policy and charging control architecture</title><author fullname="3GPP S2" initials="3GPP" surname="TS 23.203"> <organization></organization><author> <organization>3GPP</organization> </author> <date month="June"year="2011" />year="2011"/> </front> <seriesInfo name="3GPP TS" value="23.203"/> </reference> <reference anchor="NS-2" target="http://nsnam.sourceforge.net/wiki/index.php/Main_Page"> <front> <title>ns-2</title> <author><organization></organization><organization/> </author> <date month="December" year="2014"/> </front> </reference> <reference anchor="NS-3" target="https://www.nsnam.org/"> <front> <title>ns-3 Network Simulator</title> <author><organization></organization><organization/> </author><date /></front> </reference> <reference anchor="Heusse2003"target="">target="https://ieeexplore.ieee.org/document/1208921"> <front> <title>Performance anomaly of 802.11b</title> <author fullname="Martin Heusse" initials="M." surname="Heusse"><organization></organization><organization/> </author> <author fullname="Franck Rousseau" initials="F." surname="Rousseau"><organization></organization><organization/> </author> <author fullname="Gilles Berger-Sabbatel" initials="G." surname="Berger-Sabbatel"><organization></organization><organization/> </author> <author fullname="Andrzej Duda" initials="A." surname="Duda"><organization></organization><organization/> </author> <date month="March" year="2003"/> </front><seriesInfo name="in Proc. 23th<refcontent>IEEE INFOCOM 2003</refcontent> <refcontent>Twenty-second Annual Joint Conference of the IEEE Computer and CommunicationsSocieties," value = "(INFOCOM'03)"/>Societies</refcontent> <seriesInfo name="DOI" value="10.1109/INFCOM.2003.1208921"/> </reference> </references> </references> <section numbered="false" toc="default"> <name>Contributors</name> <t>The following individuals contributed to the design, implementation, and verification of the proposed test cases during earlier stages of this work. They have helped to validate and substantially improve this specification. </t> <t><contact fullname="Ingemar Johansson"/> <ingemar.s.johansson@ericsson.com> of Ericsson AB contributed to the description and validation of cellular test cases during the earlier stage of this document.</t> <t><contact fullname="Wei-Tian Tan"/> <dtan2@cisco.com> of Cisco Systems designed and set up a Wi-Fi testbed for evaluating parallel video conferencing streams, based upon which proposed Wi-Fi test cases are described. He also recommended additional test cases to consider, such as the impact of EDCA/WMM usage. </t> <t><contact fullname="Michael A. Ramalho"/> <mar42@cornell.edu> of AcousticComms Consulting (previously at Cisco Systems) applied lessons from Cisco's internal experimentation to the draft versions of the document. He also worked on validating the proposed test cases in a virtual-machine-based lab setting.</t> </section> <section anchor="Acknowledgments" numbered="false" toc="default"> <name>Acknowledgments</name> <t>The authors would like to thank <contact fullname="Tomas Frankkila"/>, <contact fullname="Magnus Westerlund"/>, <contact fullname="Kristofer Sandlund"/>, <contact fullname="Sergio Mena de la Cruz"/>, and <contact fullname="Mirja Kühlewind"/> for their valuable inputs and review comments regarding this document.</t> </section> </back> </rfc>