<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" consensus="true" docName="draft-ietf-tcpm-prr-rfc6937bis-21" number="9937" ipr="trust200902" obsoletes="6937" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" tocDepth="4" symRefs="true" sortRefs="true" prepTime="2025-12-19T08:48:19" indexInclude="true" scripts="Common,Latin">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-tcpm-prr-rfc6937bis-21" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9937" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="PRR">Proportional Rate Reduction (PRR)</title>
    <seriesInfo name="RFC" value="9937" stream="IETF"/>
    <author fullname="Matt Mathis" initials="M." surname="Mathis">
      <address>
        <email>matt.mathis@gmail.com</email>
      </address>
    </author>
    <author fullname="Neal Cardwell" initials="N." surname="Cardwell">
      <organization showOnFrontPage="true">Google, Inc.</organization>
      <address>
        <email>ncardwell@google.com</email>
      </address>
    </author>
    <author fullname="Yuchung Cheng" initials="Y." surname="Cheng">
      <organization showOnFrontPage="true">Google, Inc.</organization>
      <address>
        <email>ycheng@google.com</email>
      </address>
    </author>
    <author fullname="Nandita Dukkipati" initials="N." surname="Dukkipati">
      <organization showOnFrontPage="true">Google, Inc.</organization>
      <address>
        <email>nanditad@google.com</email>
      </address>
    </author>
    <date month="12" year="2025"/>
    <area>WIT</area>
    <workgroup>tcpm</workgroup>
    <keyword>loss recovery</keyword>
    <keyword>SACK</keyword>
    <keyword>self clock</keyword>
    <keyword>fast retransmit</keyword>
    <keyword>fast recovery</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">This document specifies a Standards Track version of the Proportional Rate Reduction (PRR) algorithm that obsoletes the Experimental version described in RFC 6937.   PRR regulates the amount of data sent by TCP or other transport protocols during fast recovery.  PRR accurately regulates the actual flight size through recovery such that at the end of recovery it will be as close as possible to the slow start threshold (ssthresh), as determined by the congestion control algorithm.
</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9937" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2025 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-conventions">Conventions</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-definitions">Definitions</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-changes-relative-to-rfc-693">Changes Relative to RFC 6937</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-relationships-to-other-stan">Relationships to Other Standards</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-algorithm">Algorithm</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.6.2">
              <li pn="section-toc.1-1.6.2.1">
                <t indent="0" pn="section-toc.1-1.6.2.1.1"><xref derivedContent="6.1" format="counter" sectionFormat="of" target="section-6.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-initialization-steps">Initialization Steps</xref></t>
              </li>
              <li pn="section-toc.1-1.6.2.2">
                <t indent="0" pn="section-toc.1-1.6.2.2.1"><xref derivedContent="6.2" format="counter" sectionFormat="of" target="section-6.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-per-ack-steps">Per-ACK Steps</xref></t>
              </li>
              <li pn="section-toc.1-1.6.2.3">
                <t indent="0" pn="section-toc.1-1.6.2.3.1"><xref derivedContent="6.3" format="counter" sectionFormat="of" target="section-6.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-per-transmit-steps">Per-Transmit Steps</xref></t>
              </li>
              <li pn="section-toc.1-1.6.2.4">
                <t indent="0" pn="section-toc.1-1.6.2.4.1"><xref derivedContent="6.4" format="counter" sectionFormat="of" target="section-6.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-completion-steps">Completion Steps</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-properties">Properties</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-examples">Examples</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="9" format="counter" sectionFormat="of" target="section-9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-adapting-prr-to-other-trans">Adapting PRR to Other Transport Protocols</xref></t>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="10" format="counter" sectionFormat="of" target="section-10"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-measurement-studies">Measurement Studies</xref></t>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="11" format="counter" sectionFormat="of" target="section-11"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-operational-considerations">Operational Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.11.2">
              <li pn="section-toc.1-1.11.2.1">
                <t indent="0" pn="section-toc.1-1.11.2.1.1"><xref derivedContent="11.1" format="counter" sectionFormat="of" target="section-11.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-incremental-deployment">Incremental Deployment</xref></t>
              </li>
              <li pn="section-toc.1-1.11.2.2">
                <t indent="0" pn="section-toc.1-1.11.2.2.1"><xref derivedContent="11.2" format="counter" sectionFormat="of" target="section-11.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-fairness">Fairness</xref></t>
              </li>
              <li pn="section-toc.1-1.11.2.3">
                <t indent="0" pn="section-toc.1-1.11.2.3.1"><xref derivedContent="11.3" format="counter" sectionFormat="of" target="section-11.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-protecting-the-network-agai">Protecting the Network Against Excessive Queuing and Packet Loss</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.12">
            <t indent="0" pn="section-toc.1-1.12.1"><xref derivedContent="12" format="counter" sectionFormat="of" target="section-12"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.13">
            <t indent="0" pn="section-toc.1-1.13.1"><xref derivedContent="13" format="counter" sectionFormat="of" target="section-13"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.14">
            <t indent="0" pn="section-toc.1-1.14.1"><xref derivedContent="14" format="counter" sectionFormat="of" target="section-14"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.14.2">
              <li pn="section-toc.1-1.14.2.1">
                <t indent="0" pn="section-toc.1-1.14.2.1.1"><xref derivedContent="14.1" format="counter" sectionFormat="of" target="section-14.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.14.2.2">
                <t indent="0" pn="section-toc.1-1.14.2.2.1"><xref derivedContent="14.2" format="counter" sectionFormat="of" target="section-14.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.15">
            <t indent="0" pn="section-toc.1-1.15.1"><xref derivedContent="Appendix A" format="default" sectionFormat="of" target="section-appendix.a"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-strong-packet-conservation-">Strong Packet Conservation Bound</xref></t>
          </li>
          <li pn="section-toc.1-1.16">
            <t indent="0" pn="section-toc.1-1.16.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgments">Acknowledgments</xref></t>
          </li>
          <li pn="section-toc.1-1.17">
            <t indent="0" pn="section-toc.1-1.17.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.c"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">Van Jacobson's packet conservation principle <xref target="Jacobson88" format="default" sectionFormat="of" derivedContent="Jacobson88"/> defines a self clock process wherein N data segments delivered to the receiver generate acknowledgments that the data sender uses as the clock to trigger sending another N data segments into the network.</t>
      <t indent="0" pn="section-1-2">Congestion control algorithms like Reno <xref target="RFC5681" format="default" sectionFormat="of" derivedContent="RFC5681"/> and CUBIC <xref target="RFC9438" format="default" sectionFormat="of" derivedContent="RFC9438"/> are built on the conceptual foundation of this self clock process. They control the sending process of a transport protocol connection by using a congestion window ("cwnd") to limit "inflight", the volume of data that a connection estimates is in flight in the network at a given time. Furthermore, these algorithms require that transport protocol connections  reduce their cwnd in response to packet losses. Fast recovery (see <xref target="RFC5681" format="default" sectionFormat="of" derivedContent="RFC5681"/> and <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/>) is the algorithm for making this cwnd reduction using feedback from acknowledgments.  Its stated goal is to maintain a sender's self clock by relying on returning ACKs during recovery to clock more data into the network. Without Proportional Rate Reduction (PRR), fast recovery typically adjusts the window by waiting for a large fraction of a round-trip time (RTT) (one half round-trip time of ACKs for Reno <xref target="RFC5681" format="default" sectionFormat="of" derivedContent="RFC5681"/> or 30% of a round-trip time for CUBIC <xref target="RFC9438" format="default" sectionFormat="of" derivedContent="RFC9438"/>) to pass before sending any data.</t>
      <t indent="0" pn="section-1-3"><xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/> makes fast recovery with Selective Acknowledgment (SACK) <xref target="RFC2018" format="default" sectionFormat="of" derivedContent="RFC2018"/> more accurate by computing "pipe", a sender-side estimate of the number of bytes still outstanding in the network.   With <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/>, fast recovery is implemented by sending data as necessary on each ACK to allow pipe to rise to match ssthresh, the target window size for fast recovery, as determined by the congestion control algorithm.  This protects fast recovery from timeouts in many cases where there are heavy losses. However, <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/> has two significant drawbacks. First, because it makes a large multiplicative decrease in cwnd at the start of fast recovery, it can cause a timeout if the entire second half of the window of data or ACKs are lost.  Second, a single ACK carrying a SACK option that implies a large quantity of missing data can cause a step discontinuity in the pipe estimator, which can cause Fast Retransmit to send a large burst of data.</t>
      <t indent="0" pn="section-1-4">PRR  regulates the transmission process during fast recovery in a manner that avoids these excess window adjustments, such that transmissions progress smoothly, and at the end of recovery, the actual window size will be as close as possible to ssthresh.  </t>
      <t indent="0" pn="section-1-5">PRR's approach is inspired by Van Jacobson's packet conservation principle.  As much as possible, PRR relies  on the self clock process and is only slightly affected by the accuracy of estimators, such as the estimate of the volume of in-flight data.   This is what gives the algorithm its precision in the presence of events that cause uncertainty in other estimators.</t>
      <t indent="0" pn="section-1-6"> When inflight is above ssthresh, PRR reduces inflight smoothly toward ssthresh by clocking out transmissions at a rate that is in proportion to both the delivered data and ssthresh. </t>
      <t indent="0" pn="section-1-7">When inflight is less than ssthresh, PRR adaptively chooses between one of two  Reduction Bounds to limit the total window reduction due to all mechanisms, including transient application stalls and the losses themselves. As a baseline, to be cautious when there may be considerable congestion, PRR uses its Conservative Reduction Bound (CRB), which is strictly packet conserving. When recovery seems to be progressing well, PRR uses its Slow Start Reduction Bound (SSRB), which is more aggressive than PRR-CRB by at most one segment per ACK.  PRR-CRB meets the Strong Packet Conservation Bound described in <xref target="conservative" format="default" sectionFormat="of" derivedContent="Appendix A"/>; however, when used in real networks as the sole approach, it does not perform as well as the algorithm described in <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/>, which proves to be more aggressive in a significant number of cases.  PRR-SSRB offers a compromise by allowing a connection to send one additional segment per ACK, relative to PRR-CRB, in some situations. Although PRR-SSRB is less aggressive than <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/> (transmitting fewer segments or taking more time to transmit them), it outperforms due to the lower probability of additional losses during recovery.</t>
      <t indent="0" pn="section-1-8">The original definition of the packet conservation principle <xref target="Jacobson88" format="default" sectionFormat="of" derivedContent="Jacobson88"/>  treated packets that are presumed to be lost (e.g., marked as candidates for retransmission) as having left the network. This idea is reflected in the inflight estimator used by PRR, but it is distinct from the Strong Packet Conservation Bound as described in <xref target="conservative" format="default" sectionFormat="of" derivedContent="Appendix A"/>, which is defined solely on the basis of data arriving at the receiver.
</t>
      <t indent="0" pn="section-1-9">This document specifies several main changes from the earlier version of PRR in <xref target="RFC6937" format="default" sectionFormat="of" derivedContent="RFC6937"/>. First, it introduces a new adaptive heuristic that replaces a manual configuration parameter that determined how conservative PRR was when inflight was less than ssthresh (whether to use PRR-CRB or PRR-SSRB). Second, the algorithm specifies behavior for non-SACK connections (connections that have not negotiated SACK <xref target="RFC2018" format="default" sectionFormat="of" derivedContent="RFC2018"/> support via the "SACK-permitted" option). Third, the algorithm ensures a smooth sending process even when the sender has experienced high reordering and starts loss recovery after a large amount of sequence space has been SACKed.  Finally, this document also includes additional discussion about the integration of PRR with congestion control and loss detection algorithms.
</t>
      <t indent="0" pn="section-1-10">PRR has extensive deployment experience in multiple TCP implementations since the first widely deployed TCP PRR implementation in 2011 <xref target="First_TCP_PRR" format="default" sectionFormat="of" derivedContent="First_TCP_PRR"/>.</t>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-2">
      <name slugifiedName="name-conventions">Conventions</name>
      <t indent="0" pn="section-2-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
      </t>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-3">
      <name slugifiedName="name-definitions">Definitions</name>
      <t indent="0" pn="section-3-1">The following terms, parameters, and state variables are used as they are defined in earlier documents:</t>
      <dl spacing="normal" newline="false" indent="3" pn="section-3-2">
        <dt pn="section-3-2.1">SND.UNA:</dt>
        <dd pn="section-3-2.2">The oldest unacknowledged sequence number. This is
  defined in <xref target="RFC9293" section="3.4" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc9293#section-3.4" derivedContent="RFC9293"/>.</dd>
        <dt pn="section-3-2.3">SND.NXT:</dt>
        <dd pn="section-3-2.4">The next sequence number to be sent.  This is defined
  in <xref target="RFC9293" section="3.4" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc9293#section-3.4" derivedContent="RFC9293"/>.</dd>
        <dt pn="section-3-2.5">duplicate ACK: </dt>
        <dd pn="section-3-2.6">An acknowledgment is considered a "duplicate
  ACK" or "duplicate acknowledgment" when (a) the receiver of the ACK has
  outstanding data, (b) the incoming acknowledgment carries no data, (c) the
  SYN and FIN bits are both off, (d) the acknowledgment number is equal to
  SND.UNA, and (e) the advertised window in the incoming acknowledgment equals
  the advertised window in the last incoming acknowledgment. This is defined
  in <xref target="RFC5681" section="2" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc5681#section-2" derivedContent="RFC5681"/>.</dd>
        <dt pn="section-3-2.7">FlightSize:</dt>
        <dd pn="section-3-2.8">The amount of data that has been sent but not yet
  cumulatively acknowledged. This is defined in <xref target="RFC5681" section="2" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc5681#section-2" derivedContent="RFC5681"/>.</dd>
        <dt pn="section-3-2.9">Receiver Maximum Segment Size (RMSS):</dt>
        <dd pn="section-3-2.10">The RMSS is the size of
  the largest segment the receiver is willing to accept. This is the value
  specified in the MSS option sent by the receiver during connection startup
  (see <xref target="RFC9293" section="3.7.1" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc9293#section-3.7.1" derivedContent="RFC9293"/>). Or if the MSS option is not
  used, it is the default of 536 bytes for IPv4 or 1220 bytes for IPv6 (see
  <xref target="RFC9293" section="3.7.1" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc9293#section-3.7.1" derivedContent="RFC9293"/>). The size does not include the
  TCP/IP headers and options. The RMSS is defined in <xref target="RFC5681" section="2" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc5681#section-2" derivedContent="RFC5681"/> and <xref target="RFC9293" section="3.8.6.3" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc9293#section-3.8.6.3" derivedContent="RFC9293"/>.</dd>
        <dt pn="section-3-2.11">Sender Maximum Segment Size (SMSS):</dt>
        <dd pn="section-3-2.12">The SMSS is the size of the
  largest segment that the sender can transmit.  This value can be based on
  the Maximum Transmission Unit (MTU) of the network, the path MTU discovery <xref target="RFC1191" format="default" sectionFormat="of" derivedContent="RFC1191"/> <xref target="RFC8201" format="default" sectionFormat="of" derivedContent="RFC8201"/> <xref target="RFC4821" format="default" sectionFormat="of" derivedContent="RFC4821"/>
  algorithm, RMSS, or other factors.  The size does not include the TCP/IP
  headers and options. This is defined in <xref target="RFC5681" section="2" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc5681#section-2" derivedContent="RFC5681"/>.</dd>
        <dt pn="section-3-2.13">Receiver Window (rwnd):</dt>
        <dd pn="section-3-2.14">The most recently received advertised
  receiver window, in bytes.  At any given time, a connection <bcp14>MUST NOT</bcp14> send data with a sequence number higher than the sum of SND.UNA
  and rwnd. This is defined in <xref target="RFC5681" section="2" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc5681#section-2" derivedContent="RFC5681"/>.</dd>
        <dt pn="section-3-2.15">Congestion Window (cwnd):</dt>
        <dd pn="section-3-2.16">A state variable that limits the
  amount of data a connection can send.  At any given time, a connection
  <bcp14>MUST NOT</bcp14> send data if inflight (see below) matches or exceeds
  cwnd. This is defined in <xref target="RFC5681" section="2" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc5681#section-2" derivedContent="RFC5681"/>.</dd>
        <dt pn="section-3-2.17">Slow Start Threshold (ssthresh):</dt>
        <dd pn="section-3-2.18">The slow start threshold
  (ssthresh) state variable is used to determine whether the slow start or
  congestion avoidance algorithm is used to control data transmission. During
  fast recovery, ssthresh is the target window size for a fast recovery
  episode, as determined by the congestion control algorithm. This is defined
  in <xref target="RFC5681" section="3.1" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc5681#section-3.1" derivedContent="RFC5681"/>.</dd>
      </dl>
      <t indent="0" pn="section-3-3">PRR defines additional variables and terms:</t>
      <dl spacing="normal" newline="false" indent="3" pn="section-3-4">
        <dt pn="section-3-4.1">Delivered Data (DeliveredData):</dt>
        <dd pn="section-3-4.2">The data sender's best estimate of the total number of bytes that the current ACK indicates have been delivered to the receiver since the previously received ACK.</dd>
        <dt pn="section-3-4.3">In-Flight Data (inflight):</dt>
        <dd pn="section-3-4.4">The data sender's best estimate of the number of unacknowledged bytes in flight in the network, i.e., bytes that were sent and neither lost nor received by the data receiver.</dd>
        <dt pn="section-3-4.5">Recovery Flight Size (RecoverFS):</dt>
        <dd pn="section-3-4.6">The number of bytes the sender estimates might possibly be delivered over the course of the current PRR episode.</dd>
        <dt pn="section-3-4.7">SafeACK:</dt>
        <dd pn="section-3-4.8">A local boolean variable indicating that the current ACK indicates the recovery is making good progress and the sender can send more aggressively, increasing inflight, if appropriate.</dd>
        <dt pn="section-3-4.9">SndCnt:</dt>
        <dd pn="section-3-4.10">A local variable indicating exactly how many bytes should be sent  in response to each ACK. </dd>
        <dt pn="section-3-4.11">Voluntary window reductions:</dt>
        <dd pn="section-3-4.12">Choosing not to send data in response to some ACKs, for the purpose of reducing the sending window size and data rate.</dd>
      </dl>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-4">
      <name slugifiedName="name-changes-relative-to-rfc-693">Changes Relative to RFC 6937</name>
      <t indent="0" pn="section-4-1">The largest change since <xref target="RFC6937" format="default" sectionFormat="of" derivedContent="RFC6937"/> is the introduction of a new heuristic that uses good recovery progress (for TCP, when the latest ACK advances SND.UNA and does not indicate that a prior fast retransmit has been lost) to select the Reduction Bound (PRR-CRB or PRR-SSRB).  <xref target="RFC6937" format="default" sectionFormat="of" derivedContent="RFC6937"/> left the choice of Reduction Bound to the discretion of the implementer but recommended to use PRR-SSRB by default.  For all of the environments explored in earlier PRR research, the new heuristic is consistent with the old recommendation.</t>
      <t indent="0" pn="section-4-2">
The paper "An Internet-Wide Analysis of Traffic Policing" <xref target="Flach2016policing" format="default" sectionFormat="of" derivedContent="Flach2016policing"/>
uncovered a crucial situation not previously explored, where both Reduction Bounds perform very poorly but for different reasons.  Under many configurations, token bucket traffic policers can suddenly start discarding a large fraction of the traffic when tokens are depleted, without any warning to the end systems.  The transport congestion control has no opportunity to measure the token rate and sets ssthresh based on the previously observed path performance.  This value for ssthresh may cause a data rate that is substantially larger than the token replenishment rate, causing high loss. Under these conditions, both Reduction Bounds perform very poorly.   PRR-CRB is too timid, sometimes causing very long recovery times at smaller than necessary windows, and PRR-SSRB is too aggressive, often causing many retransmissions to be lost for multiple rounds. Both cases lead to prolonged recovery, decimating application latency and/or goodput. </t>
      <t indent="0" pn="section-4-3">Investigating these environments led to the development of a "SafeACK" heuristic to dynamically switch between Reduction Bounds: by default, conservatively use PRR-CRB and only switch to PRR-SSRB when ACKs indicate the recovery is making good progress (SND.UNA is advancing without detecting any new losses). The SafeACK heuristic was experimented with in Google's Content Delivery Network (CDN) <xref target="Flach2016policing" format="default" sectionFormat="of" derivedContent="Flach2016policing"/> and implemented in Linux TCP since 2015. </t>
      <t indent="0" pn="section-4-4">This SafeACK heuristic is only invoked where losses, application-limited behavior, or other events cause the current estimate of in-flight data to fall below ssthresh.  The high loss rates that make the heuristic essential are only common in the presence of heavy losses, such as traffic policers <xref target="Flach2016policing" format="default" sectionFormat="of" derivedContent="Flach2016policing"/>.  In these environments, the heuristic performs better than either bound by itself. </t>
      <t indent="0" pn="section-4-5">Another PRR algorithm change improves the sending process when the sender enters recovery after a large portion of sequence space has been SACKed. This scenario could happen when the sender has previously detected reordering, for example, by using <xref target="RFC8985" format="default" sectionFormat="of" derivedContent="RFC8985"/>. In the previous version of PRR, RecoverFS did not properly account for sequence ranges SACKed before entering fast recovery, which caused PRR to initially send too slowly. With the change, PRR properly accounts for sequence ranges SACKed before entering fast recovery.</t>
      <t indent="0" pn="section-4-6">Yet another change is to force a fast retransmit  upon the first ACK that triggers the recovery. Previously, PRR may not allow a fast retransmit (i.e., SndCnt is 0) on the first ACK in fast recovery, depending on the loss situation. Forcing a fast retransmit is important to maintain the ACK clock and avoid potential retransmission timeout (RTO) events. The forced fast retransmit only happens once during the entire recovery and still follows the packet conservation principles in PRR. This heuristic has been implemented since the first widely deployed TCP PRR implementation in 2011 <xref target="First_TCP_PRR" format="default" sectionFormat="of" derivedContent="First_TCP_PRR"/>. </t>
      <t indent="0" pn="section-4-7"> In another change, upon exiting recovery, a data sender sets cwnd to ssthresh. This is important for robust performance. Without setting cwnd to ssthresh at the end of recovery and with application-limited sender behavior and some loss patterns, cwnd could end fast recovery well below ssthresh, leading to bad performance. The performance could, in some cases, be worse than <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/> recovery, which simply sets cwnd to ssthresh at the start of recovery. This behavior of setting cwnd to ssthresh at the end of recovery has been implemented since the first widely deployed TCP PRR implementation in 2011 <xref target="First_TCP_PRR" format="default" sectionFormat="of" derivedContent="First_TCP_PRR"/> and is similar to <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/>, which specifies setting cwnd to ssthresh at the start of recovery. </t>
      <t indent="0" pn="section-4-8">
Since <xref target="RFC6937" format="default" sectionFormat="of" derivedContent="RFC6937"/> was written, PRR has also been adapted to perform multiplicative window reduction for non-loss-based congestion control algorithms, such as for Explicit Congestion Notification (ECN) as specified in <xref target="RFC3168" format="default" sectionFormat="of" derivedContent="RFC3168"/>.   This can be done by using some parts of the loss recovery state machine (in particular, the RecoveryPoint from <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/>) to invoke the PRR ACK processing for exactly one round trip worth of ACKs. However, there can be interactions between using PRR and approaches to Active Queue Management (AQM) and ECN; guidance on the development and assessment of congestion control mechanisms is provided in <xref target="RFC9743" format="default" sectionFormat="of" derivedContent="RFC9743"/>.
</t>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-5">
      <name slugifiedName="name-relationships-to-other-stan">Relationships to Other Standards</name>
      <t indent="0" pn="section-5-1">PRR <bcp14>MAY</bcp14> be used in conjunction with any congestion control algorithm that intends to make a multiplicative decrease in its sending rate over approximately the time scale of one round-trip time, as long as the current volume of in-flight data is limited by a congestion window (cwnd) and the target volume of in-flight data during that reduction is a fixed value given by ssthresh. In particular, PRR is applicable to both Reno <xref target="RFC5681" format="default" sectionFormat="of" derivedContent="RFC5681"/> and CUBIC <xref target="RFC9438" format="default" sectionFormat="of" derivedContent="RFC9438"/> congestion control. PRR is described as a modification to "A Conservative Loss Recovery Algorithm Based on Selective Acknowledgment (SACK) for TCP" <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/>.   It is most accurate with SACK <xref target="RFC2018" format="default" sectionFormat="of" derivedContent="RFC2018"/> but does not require SACK.</t>
      <t indent="0" pn="section-5-2">PRR can be used in conjunction with a wide array of loss detection algorithms. This is because PRR does not have any dependencies on the details of how a loss detection algorithm estimates which packets have been delivered and which packets have been lost. Upon the reception of each ACK, PRR simply needs the loss detection algorithm to communicate how many packets have been marked as lost and how many packets have been marked as delivered.  Thus, PRR <bcp14>MAY</bcp14> be used in conjunction with the  loss detection algorithms specified or described in the following documents: Reno <xref target="RFC5681" format="default" sectionFormat="of" derivedContent="RFC5681"/>, NewReno <xref target="RFC6582" format="default" sectionFormat="of" derivedContent="RFC6582"/>, SACK <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/>, Forward Acknowledgment (FACK) <xref target="FACK" format="default" sectionFormat="of" derivedContent="FACK"/>, and Recent Acknowledgment Tail Loss Probe (RACK-TLP) <xref target="RFC8985" format="default" sectionFormat="of" derivedContent="RFC8985"/>. Because of the performance properties of RACK-TLP, including resilience to tail loss, reordering, and lost retransmissions, it is <bcp14>RECOMMENDED</bcp14> that PRR is implemented together with RACK-TLP loss recovery <xref target="RFC8985" format="default" sectionFormat="of" derivedContent="RFC8985"/>.
</t>
      <t indent="0" pn="section-5-3">The SafeACK heuristic came about as a result of robust Lost Retransmission Detection under development in an early precursor to <xref target="RFC8985" format="default" sectionFormat="of" derivedContent="RFC8985"/>.  Without Lost Retransmission Detection, policers that cause very high loss rates are at very high risk of causing retransmission timeouts because Reno <xref target="RFC5681" format="default" sectionFormat="of" derivedContent="RFC5681"/>,  CUBIC <xref target="RFC9438" format="default" sectionFormat="of" derivedContent="RFC9438"/>, and <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/> can send retransmissions significantly above the policed rate. </t>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-6">
      <name slugifiedName="name-algorithm">Algorithm</name>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-6.1">
        <name slugifiedName="name-initialization-steps">Initialization Steps</name>
        <t indent="0" pn="section-6.1-1">
At the beginning of a congestion control response episode initiated by the congestion control algorithm, a data sender using PRR <bcp14>MUST</bcp14> initialize the PRR state.</t>
        <t indent="0" pn="section-6.1-2">The timing of the start of a congestion control response episode is entirely up to the congestion control algorithm, and (for example) could correspond to the start of a fast recovery episode, or a once-per-round-trip reduction when lost retransmits or lost original transmissions are detected after fast recovery is already in progress.</t>
        <t indent="0" pn="section-6.1-3">The PRR initialization allows a congestion control algorithm, CongCtrlAlg(), that might set ssthresh to something other than FlightSize/2 (including, e.g., CUBIC <xref target="RFC9438" format="default" sectionFormat="of" derivedContent="RFC9438"/>). </t>
        <t indent="0" pn="section-6.1-4"> A key step of PRR initialization is computing Recovery Flight Size (RecoverFS), the number of bytes the data sender estimates might possibly be delivered over the course of the PRR episode. This can be thought of as the sum of the following values at the start of the episode: inflight, the bytes cumulatively acknowledged in the ACK triggering recovery, the bytes SACKed in the ACK triggering recovery, and the bytes between SND.UNA and SND.NXT that have been marked lost. The RecoverFS includes losses because losses are marked using heuristics, so some packets previously marked as lost may ultimately be delivered (without being retransmitted) during recovery. PRR uses RecoverFS to compute a smooth sending rate. Upon entering fast recovery, PRR initializes RecoverFS, and RecoverFS remains constant during a given fast recovery episode.</t>
        <t indent="0" pn="section-6.1-5">The full sequence of PRR algorithm initialization steps is as follows:</t>
        <sourcecode type="pseudocode" markers="false" pn="section-6.1-6">
   ssthresh = CongCtrlAlg()      // Target flight size in recovery
   prr_delivered = 0             // Total bytes delivered in recovery
   prr_out = 0                   // Total bytes sent in recovery
   RecoverFS = SND.NXT - SND.UNA
   // Bytes SACKed before entering recovery will not be
   // marked as delivered during recovery:
   RecoverFS -= (bytes SACKed in scoreboard)
   // Include the (common) case of selectively ACKed bytes:
   RecoverFS += (bytes newly SACKed)
   // Include the (rare) case of cumulatively ACKed bytes:
   RecoverFS += (bytes newly cumulatively acknowledged)
</sourcecode>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-6.2">
        <name slugifiedName="name-per-ack-steps">Per-ACK Steps</name>
        <t indent="0" pn="section-6.2-1">On every ACK starting or during fast recovery, excluding the ACK that concludes a PRR episode, PRR executes the following steps.</t>
        <t indent="0" pn="section-6.2-2">First, the sender computes DeliveredData, the data sender's best estimate of the total number of bytes that the current ACK indicates have been delivered to the receiver since the previously received ACK. With SACK, DeliveredData can be computed precisely as the change in SND.UNA, plus the signed change in quantity of data marked SACKed in the scoreboard. Thus, in the special case when there are no SACKed sequence ranges in the scoreboard before or after the ACK, DeliveredData is the change in SND.UNA. In recovery without SACK, DeliveredData is estimated to be 1 SMSS on each received duplicate ACK (i.e., SND.UNA did not change). When SND.UNA advances (i.e., a full or partial ACK), DeliveredData is the change in SND.UNA, minus 1 SMSS for each preceding duplicate ACK. Note that without SACK, a poorly behaved receiver that returns extraneous duplicate ACKs  (as described in <xref target="Savage99" format="default" sectionFormat="of" derivedContent="Savage99"/>) could attempt to artificially inflate DeliveredData. As a mitigation, if not using SACK, then PRR disallows incrementing DeliveredData when the total bytes delivered in a PRR episode would exceed the estimated data outstanding upon entering recovery (RecoverFS).</t>
        <t indent="0" pn="section-6.2-3">Next, the sender computes inflight, the data sender's best estimate of the number of bytes that are in flight in the network. To calculate inflight, connections with SACK enabled and using <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/> loss detection <bcp14>MAY</bcp14> use the "pipe" algorithm as specified in <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/>. SACK-enabled connections using RACK-TLP loss detection <xref target="RFC8985" format="default" sectionFormat="of" derivedContent="RFC8985"/> or other loss detection algorithms <bcp14>MUST</bcp14> calculate inflight by starting with SND.NXT -  SND.UNA, subtracting out bytes SACKed in the scoreboard, subtracting out bytes marked lost in the scoreboard, and adding bytes in the scoreboard that have been retransmitted since they were last marked lost. For non-SACK-enabled connections, instead of subtracting out bytes SACKed in the SACK scoreboard, senders <bcp14>MUST</bcp14> subtract out: min(RecoverFS, 1 SMSS for each preceding duplicate ACK in the fast recovery episode); the min() with RecoverFS is to protect against misbehaving receivers <xref target="Savage99" format="default" sectionFormat="of" derivedContent="Savage99"/>.</t>
        <t indent="0" pn="section-6.2-4">Next, the sender computes SafeACK, a local boolean variable indicating that the current ACK reported good progress. SafeACK is true only when the ACK has cumulatively acknowledged new data and the ACK does not indicate further losses. For example, an ACK triggering "rescue" retransmission (<xref target="RFC6675" section="4" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc6675#section-4" derivedContent="RFC6675"/>, NextSeg() condition 4) may indicate further losses. Both conditions indicate the recovery is making good progress and the sender can send more aggressively, increasing inflight, if appropriate. </t>
        <t indent="0" pn="section-6.2-5">Finally, the sender uses DeliveredData, inflight, SafeACK, and other PRR state to compute SndCnt, a local variable indicating exactly how many bytes should be sent  in response to each ACK, and then uses  SndCnt to update cwnd.</t>
        <t indent="0" pn="section-6.2-6">The full sequence of per-ACK PRR algorithm steps is as follows:</t>
        <sourcecode type="pseudocode" markers="false" pn="section-6.2-7">
   if (DeliveredData is 0)
      Return


   prr_delivered += DeliveredData
   inflight = (estimated volume of in-flight data)
   SafeACK = (SND.UNA advances and no further loss indicated)
   if (inflight &gt; ssthresh) {
      // Proportional Rate Reduction
      // This uses integer division, rounding up:
      #define DIV_ROUND_UP(n, d) (((n) + (d) - 1) / (d))
      out = DIV_ROUND_UP(prr_delivered * ssthresh, RecoverFS)
      SndCnt = out - prr_out
   } else {
      // PRR-CRB by default
      SndCnt = MAX(prr_delivered - prr_out, DeliveredData)
      if (SafeACK) {
         // PRR-SSRB when recovery is making good progress
         SndCnt += SMSS
      }
      // Attempt to catch up, as permitted
      SndCnt = MIN(ssthresh - inflight, SndCnt)
   }


   if (prr_out is 0 AND SndCnt is 0) {
      // Force a fast retransmit upon entering recovery
      SndCnt = SMSS
   }
   cwnd = inflight + SndCnt</sourcecode>
        <t indent="0" pn="section-6.2-8">After the sender computes SndCnt and uses it to update cwnd, the sender transmits more data. Note that the decision of which data to send (e.g., retransmit missing data or send more new data) is out of scope for this document.</t>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-6.3">
        <name slugifiedName="name-per-transmit-steps">Per-Transmit Steps</name>
        <t indent="0" pn="section-6.3-1">On any data transmission or retransmission, PRR executes the following:</t>
        <sourcecode type="pseudocode" markers="false" pn="section-6.3-2">
   prr_out += (data sent)
</sourcecode>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-6.4">
        <name slugifiedName="name-completion-steps">Completion Steps</name>
        <t indent="0" pn="section-6.4-1"> A PRR episode ends upon either completing fast recovery or before initiating a new PRR episode due to a new congestion control response episode. </t>
        <t indent="0" pn="section-6.4-2">On the completion of a PRR episode, PRR executes the following:</t>
        <sourcecode type="pseudocode" markers="false" pn="section-6.4-3">
   cwnd = ssthresh
</sourcecode>
        <t indent="0" pn="section-6.4-4"> Note that this step that sets cwnd to ssthresh can potentially, in some scenarios, allow a burst of back-to-back segments into the network. </t>
        <t indent="0" pn="section-6.4-5">It is <bcp14>RECOMMENDED</bcp14> that implementations use pacing to reduce the burstiness of data traffic. This recommendation is consistent with current practice to mitigate bursts (e.g., <xref target="I-D.welzl-iccrg-pacing" format="default" sectionFormat="of" derivedContent="PACING"/>), including pacing transmission bursts after restarting from idle. </t>
      </section>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-7">
      <name slugifiedName="name-properties">Properties</name>
      <t indent="0" pn="section-7-1">The following properties are common to both PRR-CRB and PRR-SSRB, except as noted:</t>
      <t indent="0" pn="section-7-2">PRR attempts to maintain the sender's ACK clocking across recovery events, including burst losses. By contrast, <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/> can send large, unclocked bursts following burst losses.</t>
      <t indent="0" pn="section-7-3">Normally, PRR will spread voluntary window reductions out evenly across a full RTT.  This has the potential to generally reduce the burstiness of Internet traffic and could be considered to be a type of soft pacing.   Hypothetically, any pacing increases the probability that different flows are interleaved, reducing the opportunity for ACK compression and other phenomena that increase traffic burstiness. However, these effects have not been quantified.</t>
      <t indent="0" pn="section-7-4">If there are minimal losses, PRR will converge to exactly the target window chosen by the congestion control algorithm. Note that as the sender approaches the end of recovery, prr_delivered will approach RecoverFS and SndCnt will be computed such that prr_out approaches ssthresh.</t>
      <t indent="0" pn="section-7-5">Implicit window reductions, due to multiple isolated losses during recovery, cause later voluntary reductions to be skipped.  For small numbers of losses, the window size ends at exactly the window chosen by the congestion control algorithm.</t>
      <t indent="0" pn="section-7-6">For burst losses, earlier voluntary window reductions can be undone by sending extra segments in response to ACKs arriving later during recovery.    Note that as long as some voluntary window reductions are not undone, and there is no application stall, the final value for inflight will be the same as ssthresh.</t>
      <t indent="0" pn="section-7-7">PRR using either Reduction Bound improves the situation when there are
application stalls, e.g., when the sending application does not queue data for
transmission quickly enough or the receiver stops advancing its receive window.
When there is an application stall early during recovery, prr_out will
fall behind the sum of transmissions allowed by SndCnt.   The missed
opportunities to send due to stalls are treated like banked voluntary window
reductions; specifically, they cause prr_delivered - prr_out to be significantly positive.  If the application catches up while the sender is still in recovery, the sender will send a partial window burst to grow inflight to catch up to exactly where it would have been had the application never stalled.   Although such a burst could negatively impact the given flow or other sharing flows, this is exactly what happens every time there is a partial-RTT application stall while not in recovery.   PRR makes partial-RTT stall behavior uniform in all states.  Changing this behavior is out of scope for this document.</t>
      <t indent="0" pn="section-7-8">PRR with Reduction Bound is less sensitive to errors in the inflight estimator.
While in recovery, inflight is intrinsically an estimator, using incomplete
information to estimate if un-SACKed segments are actually lost or merely out
of order in the network.   Under some conditions, inflight can have significant errors; for example, inflight is underestimated when a burst of reordered data is prematurely assumed to be lost and marked for retransmission. If the transmissions are regulated directly by inflight as they are with <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/>, a step discontinuity in the inflight estimator causes a burst of data, which cannot be retracted once the inflight estimator is corrected a few ACKs later.   For PRR dynamics, inflight merely determines which algorithm, PRR or the Reduction Bound, is used to compute SndCnt from DeliveredData.  While inflight is underestimated, the algorithms are different by at most 1 segment per ACK.  Once inflight is updated, they converge to the same final window at the end of recovery.</t>
      <t indent="0" pn="section-7-9">Under all conditions and sequences of events during recovery, PRR-CRB strictly bounds the data transmitted to be equal to or less than the amount of data delivered to the receiver.   This Strong Packet Conservation Bound is the most aggressive algorithm that does not lead to additional forced losses in some environments.   It has the property that if there is a standing queue at a bottleneck with no cross traffic, the queue will maintain exactly constant length for the duration of the recovery, except for +1/-1 fluctuation due to differences in packet arrival and exit times.  See  <xref target="conservative" format="default" sectionFormat="of" derivedContent="Appendix A"/> for a detailed discussion of this property.</t>
      <t indent="0" pn="section-7-10">Although the Strong Packet Conservation Bound is very appealing for a number of reasons, earlier measurements (in <xref target="RFC6675" section="6" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc6675#section-6" derivedContent="RFC6675"/>)  demonstrate that it is less aggressive and does not perform as well as <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/>, which permits bursts of data when there are bursts of losses.   PRR-SSRB is a compromise that permits a sender to send one extra segment per ACK as compared to the Packet Conserving Bound when the ACK indicates the recovery is in good progress without further losses.  From the perspective of a strict Packet Conserving Bound, PRR-SSRB does indeed open the window during recovery; however, it is significantly less aggressive than <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/> in the presence of burst losses.
</t>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-8">
      <name slugifiedName="name-examples">Examples</name>
      <t indent="0" pn="section-8-1">This section illustrates the PRR and <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/> algorithms by showing their different behaviors for two example scenarios: a connection experiencing either a single loss or a burst of 15 consecutive losses. All cases use bulk data transfers (no application pauses), Reno congestion control <xref target="RFC5681" format="default" sectionFormat="of" derivedContent="RFC5681"/>, and cwnd = FlightSize = inflight = 20 segments, so ssthresh will be set to 10 at the beginning of recovery.   The scenarios use standard Fast Retransmit <xref target="RFC5681" format="default" sectionFormat="of" derivedContent="RFC5681"/> and Limited Transmit <xref target="RFC3042" format="default" sectionFormat="of" derivedContent="RFC3042"/>, so the sender will send two new segments followed by one retransmit in response to the first three duplicate ACKs following the losses.</t>
      <t indent="0" pn="section-8-2">Each of the diagrams below shows the per ACK response to the first round trip for the two recovery algorithms when the zeroth segment is lost.   The top line ("ack#") indicates the transmitted segment number triggering the ACKs, with an X for the lost segment.  The "cwnd" and "inflight" lines indicate the values of cwnd and inflight, respectively, for these algorithms after processing each returning ACK but before further (re)transmission.  The "sent" line indicates how much "N"ew or "R"etransmitted data would be sent.  Note that the algorithms for deciding which data to send are out of scope of this document.</t>
      <figure align="left" suppress-title="false" pn="figure-1">
        <artwork align="left" pn="section-8-3.1">
RFC 6675
a X  1  2  3  4  5  6  7  8  9 10 11 12 13 14 15 16 17 18 19 20 21 22
c   20 20 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10
i   19 19 18 18 17 16 15 14 13 12 11 10  9  9  9  9  9  9  9  9  9  9
s    N  N  R                             N  N  N  N  N  N  N  N  N  N








PRR
a X  1  2  3  4  5  6  7  8  9 10 11 12 13 14 15 16 17 18 19 20 21 22
c   20 20 19 18 18 17 17 16 16 15 15 14 14 13 13 12 12 11 11 10 10 10
i   19 19 18 18 17 17 16 16 15 15 14 14 13 13 12 12 11 11 10 10  9  9
s    N  N  R     N     N     N     N     N     N     N     N     N  N


a: ack#;  c: cwnd;  i: inflight;  s: sent
</artwork>
      </figure>
      <t indent="0" pn="section-8-4">In this first example, ACK#1 through ACK#19 contain SACKs for the original flight of data, ACK#20 and ACK#21 carry SACKs for the limited transmits triggered by the first and second SACKed segments, and ACK#22 carries the full cumulative ACK covering all data up through the limited transmits. ACK#22 completes the fast recovery episode and thus completes the PRR episode.</t>
      <t indent="0" pn="section-8-5">Note that both algorithms send the same total amount of data, and both algorithms complete the fast recovery episode with a cwnd matching the ssthresh of 20.  <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/> experiences a "half window of silence" while PRR spreads the voluntary window reduction across an entire RTT.</t>
      <t indent="0" pn="section-8-6">Next, consider an example scenario with the same initial conditions, except that the first 15 packets (0-14) are lost.   During the remainder of the lossy round trip, only 5 ACKs are returned to the sender.   The following examines each of these algorithms in succession.
</t>
      <figure align="left" suppress-title="false" pn="figure-2">
        <artwork align="left" pn="section-8-7.1">
RFC 6675
a X  X  X  X  X  X  X  X  X  X  X  X  X  X  X  15 16 17 18 19
c                                              20 20 10 10 10
i                                              19 19  4  9  9
s                                               N  N 6R  R  R




PRR
a X  X  X  X  X  X  X  X  X  X  X  X  X  X  X  15 16 17 18 19
c                                              20 20  5  5  5
i                                              19 19  4  4  4
s                                               N  N  R  R  R


a: ack#;  c: cwnd;  i: inflight;  s: sent
</artwork>
      </figure>
      <t indent="0" pn="section-8-8">In this specific situation, <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/> is more aggressive because once Fast Retransmit is triggered (on the ACK for segment 17), the sender  immediately retransmits sufficient data to bring inflight up to cwnd.  Earlier measurements (in <xref target="RFC6675" section="6" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc6675#section-6" derivedContent="RFC6675"/>) indicate that <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/> significantly outperforms the <xref target="RFC6937" format="default" sectionFormat="of" derivedContent="RFC6937"/> version of PRR using only PRR-CRB and some other similarly conservative algorithms that were tested, showing that it is significantly common for the actual losses to exceed the cwnd reduction determined by the congestion control algorithm. </t>
      <t indent="0" pn="section-8-9">Under such heavy losses, during the first round trip of fast recovery, PRR uses the PRR-CRB to follow the packet conservation principle.   Since the total losses bring inflight below ssthresh, data is sent such that the total data transmitted, prr_out, follows the total data delivered to the receiver as reported by returning ACKs. Transmission is controlled by the sending limit, which is set to prr_delivered - prr_out. </t>
      <t indent="0" pn="section-8-10">While not shown in the figure above, once the fast retransmits sent starting at ACK#17 are delivered and elicit ACKs that increment the SND.UNA, PRR enters PRR-SSRB and  increases the window by exactly 1 segment per ACK until inflight rises to ssthresh during recovery.  On heavy losses when cwnd is large, PRR-SSRB recovers the losses exponentially faster than PRR-CRB. Although increasing the window during recovery seems to be ill advised, it is important to remember that this is actually less aggressive than permitted by <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/>, which sends the same quantity of additional data as a single burst in response to the ACK that triggered Fast Retransmit.</t>
      <t indent="0" pn="section-8-11">For less severe loss events, where the total losses are smaller than the difference between FlightSize and ssthresh, PRR-CRB and PRR-SSRB are not invoked since PRR stays in the Proportional Rate Reduction mode. </t>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-9">
      <name slugifiedName="name-adapting-prr-to-other-trans">Adapting PRR to Other Transport Protocols</name>
      <t indent="0" pn="section-9-1">The main PRR algorithm and reductions bounds can be adapted to any transport that can support <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/>. In one major implementation (Linux TCP), PRR has been the fast recovery algorithm for its default and supported congestion control modules since its introduction in 2011 <xref target="First_TCP_PRR" format="default" sectionFormat="of" derivedContent="First_TCP_PRR"/>. </t>
      <t indent="0" pn="section-9-2">The SafeACK heuristic can be generalized as any ACK of a retransmission that does not cause some other segment to be marked for retransmission.  </t>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-10">
      <name slugifiedName="name-measurement-studies">Measurement Studies</name>
      <t indent="0" pn="section-10-1">
For <xref target="RFC6937" format="default" sectionFormat="of" derivedContent="RFC6937"/>, a companion paper <xref target="IMC11" format="default" sectionFormat="of" derivedContent="IMC11"/> evaluated <xref target="RFC3517" format="default" sectionFormat="of" derivedContent="RFC3517"/> and various experimental PRR versions in a large-scale measurement study.  At the time of publication, the legacy algorithms used in that study are no longer present in the code base used in that study, making such comparisons difficult without recreating historical algorithms.   Readers interested in the measurement study should review <xref target="RFC6937" section="5" format="default" sectionFormat="of" derivedLink="https://rfc-editor.org/rfc/rfc6937#section-5" derivedContent="RFC6937"/> and the IMC paper <xref target="IMC11" format="default" sectionFormat="of" derivedContent="IMC11"/>.
</t>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-11">
      <name slugifiedName="name-operational-considerations">Operational Considerations</name>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-11.1">
        <name slugifiedName="name-incremental-deployment">Incremental Deployment</name>
        <t indent="0" pn="section-11.1-1">
PRR is incrementally deployable, because it utilizes only existing transport protocol mechanisms for data delivery acknowledgment and the detection of lost data. PRR only requires changes to the transport protocol implementation at the data sender; it does not require any changes at data receivers or in networks. This allows data senders using PRR to work correctly with any existing data receivers or networks. PRR does not require any changes to or assistance from routers, switches, or other devices in the network.
</t>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-11.2">
        <name slugifiedName="name-fairness">Fairness</name>
        <t indent="0" pn="section-11.2-1">
PRR is designed to maintain the fairness properties of the congestion control algorithm with which it is deployed. PRR only operates during a congestion control response episode, such as fast recovery or when there is a step reduction in the cwnd from the TCP ECN reaction defined in <xref target="RFC3168" format="default" sectionFormat="of" derivedContent="RFC3168"/>, and only makes short-term, per-acknowledgment decisions to smoothly regulate the  volume of in-flight data during an episode such that at the end of the episode it will be as close as possible to the slow start threshold (ssthresh), as determined by the congestion control algorithm. PRR does not modify the congestion control cwnd increase or decrease mechanisms outside of congestion control response episodes.
</t>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-11.3">
        <name slugifiedName="name-protecting-the-network-agai">Protecting the Network Against Excessive Queuing and Packet Loss</name>
        <t indent="0" pn="section-11.3-1">Over long time scales, PRR is designed to maintain the queuing and packet loss properties of the congestion control algorithm with which it is deployed. As noted above, PRR only operates during a congestion control response episode, such as fast recovery or response to ECN, and only makes short-term, per-acknowledgment decisions to smoothly regulate the  volume of in-flight data during an episode such that at the end of the episode it will be as close as possible to the slow start threshold (ssthresh), as determined by the congestion control algorithm. </t>
        <t indent="0" pn="section-11.3-2"> Over short time scales, PRR is designed to cause lower packet loss rates than preceding approaches like <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/>. At a high level, PRR is inspired by the packet conservation principle, and as much as possible, PRR relies on the self clock process. By contrast, with <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/>, a single ACK carrying a SACK option that implies a large quantity of missing data can cause a step discontinuity in the pipe estimator, which can cause Fast Retransmit to send a large burst of data that is much larger than the volume of delivered data. PRR avoids such bursts by basing transmission decisions on the volume of delivered data rather than the volume of lost data. Furthermore, as noted above, PRR-SSRB is less aggressive than <xref target="RFC6675" format="default" sectionFormat="of" derivedContent="RFC6675"/> (transmitting fewer segments or taking more time to transmit them), and it outperforms due to the lower probability of additional losses during recovery.</t>
      </section>
    </section>
    <section anchor="IANA" numbered="true" removeInRFC="false" toc="include" pn="section-12">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-12-1">This document has no IANA actions.</t>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-13">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-13-1">PRR does not change the risk profile for transport protocols.</t>
      <t indent="0" pn="section-13-2">Implementers that change PRR from counting bytes to segments have to be cautious about the effects of ACK splitting attacks <xref target="Savage99" format="default" sectionFormat="of" derivedContent="Savage99"/>, where the receiver acknowledges partial segments for the purpose of confusing the sender's congestion accounting.</t>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.mathis-tcp-ratehalving" to="TCP-RH"/>
    <displayreference target="I-D.welzl-iccrg-pacing" to="PACING"/>
    <references pn="section-14">
      <name slugifiedName="name-references">References</name>
      <references pn="section-14.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC1191" target="https://www.rfc-editor.org/info/rfc1191" quoteTitle="true" derivedAnchor="RFC1191">
          <front>
            <title>Path MTU discovery</title>
            <author fullname="J. Mogul" initials="J." surname="Mogul"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="November" year="1990"/>
            <abstract>
              <t indent="0">This memo describes a technique for dynamically discovering the maximum transmission unit (MTU) of an arbitrary internet path. It specifies a small change to the way routers generate one type of ICMP message. For a path that passes through a router that has not been so changed, this technique might not discover the correct Path MTU, but it will always choose a Path MTU as accurate as, and in many cases more accurate than, the Path MTU that would be chosen by current practice. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1191"/>
          <seriesInfo name="DOI" value="10.17487/RFC1191"/>
        </reference>
        <reference anchor="RFC2018" target="https://www.rfc-editor.org/info/rfc2018" quoteTitle="true" derivedAnchor="RFC2018">
          <front>
            <title>TCP Selective Acknowledgment Options</title>
            <author fullname="M. Mathis" initials="M." surname="Mathis"/>
            <author fullname="J. Mahdavi" initials="J." surname="Mahdavi"/>
            <author fullname="S. Floyd" initials="S." surname="Floyd"/>
            <author fullname="A. Romanow" initials="A." surname="Romanow"/>
            <date month="October" year="1996"/>
            <abstract>
              <t indent="0">This memo proposes an implementation of SACK and discusses its performance and related issues. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2018"/>
          <seriesInfo name="DOI" value="10.17487/RFC2018"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC4821" target="https://www.rfc-editor.org/info/rfc4821" quoteTitle="true" derivedAnchor="RFC4821">
          <front>
            <title>Packetization Layer Path MTU Discovery</title>
            <author fullname="M. Mathis" initials="M." surname="Mathis"/>
            <author fullname="J. Heffner" initials="J." surname="Heffner"/>
            <date month="March" year="2007"/>
            <abstract>
              <t indent="0">This document describes a robust method for Path MTU Discovery (PMTUD) that relies on TCP or some other Packetization Layer to probe an Internet path with progressively larger packets. This method is described as an extension to RFC 1191 and RFC 1981, which specify ICMP-based Path MTU Discovery for IP versions 4 and 6, respectively. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4821"/>
          <seriesInfo name="DOI" value="10.17487/RFC4821"/>
        </reference>
        <reference anchor="RFC5681" target="https://www.rfc-editor.org/info/rfc5681" quoteTitle="true" derivedAnchor="RFC5681">
          <front>
            <title>TCP Congestion Control</title>
            <author fullname="M. Allman" initials="M." surname="Allman"/>
            <author fullname="V. Paxson" initials="V." surname="Paxson"/>
            <author fullname="E. Blanton" initials="E." surname="Blanton"/>
            <date month="September" year="2009"/>
            <abstract>
              <t indent="0">This document defines TCP's four intertwined congestion control algorithms: slow start, congestion avoidance, fast retransmit, and fast recovery. In addition, the document specifies how TCP should begin transmission after a relatively long idle period, as well as discussing various acknowledgment generation methods. This document obsoletes RFC 2581. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5681"/>
          <seriesInfo name="DOI" value="10.17487/RFC5681"/>
        </reference>
        <reference anchor="RFC6582" target="https://www.rfc-editor.org/info/rfc6582" quoteTitle="true" derivedAnchor="RFC6582">
          <front>
            <title>The NewReno Modification to TCP's Fast Recovery Algorithm</title>
            <author fullname="T. Henderson" initials="T." surname="Henderson"/>
            <author fullname="S. Floyd" initials="S." surname="Floyd"/>
            <author fullname="A. Gurtov" initials="A." surname="Gurtov"/>
            <author fullname="Y. Nishida" initials="Y." surname="Nishida"/>
            <date month="April" year="2012"/>
            <abstract>
              <t indent="0">RFC 5681 documents the following four intertwined TCP congestion control algorithms: slow start, congestion avoidance, fast retransmit, and fast recovery. RFC 5681 explicitly allows certain modifications of these algorithms, including modifications that use the TCP Selective Acknowledgment (SACK) option (RFC 2883), and modifications that respond to "partial acknowledgments" (ACKs that cover new data, but not all the data outstanding when loss was detected) in the absence of SACK. This document describes a specific algorithm for responding to partial acknowledgments, referred to as "NewReno". This response to partial acknowledgments was first proposed by Janey Hoe. This document obsoletes RFC 3782. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6582"/>
          <seriesInfo name="DOI" value="10.17487/RFC6582"/>
        </reference>
        <reference anchor="RFC6675" target="https://www.rfc-editor.org/info/rfc6675" quoteTitle="true" derivedAnchor="RFC6675">
          <front>
            <title>A Conservative Loss Recovery Algorithm Based on Selective Acknowledgment (SACK) for TCP</title>
            <author fullname="E. Blanton" initials="E." surname="Blanton"/>
            <author fullname="M. Allman" initials="M." surname="Allman"/>
            <author fullname="L. Wang" initials="L." surname="Wang"/>
            <author fullname="I. Jarvinen" initials="I." surname="Jarvinen"/>
            <author fullname="M. Kojo" initials="M." surname="Kojo"/>
            <author fullname="Y. Nishida" initials="Y." surname="Nishida"/>
            <date month="August" year="2012"/>
            <abstract>
              <t indent="0">This document presents a conservative loss recovery algorithm for TCP that is based on the use of the selective acknowledgment (SACK) TCP option. The algorithm presented in this document conforms to the spirit of the current congestion control specification (RFC 5681), but allows TCP senders to recover more effectively when multiple segments are lost from a single flight of data. This document obsoletes RFC 3517 and describes changes from it. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6675"/>
          <seriesInfo name="DOI" value="10.17487/RFC6675"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8201" target="https://www.rfc-editor.org/info/rfc8201" quoteTitle="true" derivedAnchor="RFC8201">
          <front>
            <title>Path MTU Discovery for IP version 6</title>
            <author fullname="J. McCann" initials="J." surname="McCann"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="J. Mogul" initials="J." surname="Mogul"/>
            <author fullname="R. Hinden" initials="R." role="editor" surname="Hinden"/>
            <date month="July" year="2017"/>
            <abstract>
              <t indent="0">This document describes Path MTU Discovery (PMTUD) for IP version 6. It is largely derived from RFC 1191, which describes Path MTU Discovery for IP version 4. It obsoletes RFC 1981.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="87"/>
          <seriesInfo name="RFC" value="8201"/>
          <seriesInfo name="DOI" value="10.17487/RFC8201"/>
        </reference>
        <reference anchor="RFC8985" target="https://www.rfc-editor.org/info/rfc8985" quoteTitle="true" derivedAnchor="RFC8985">
          <front>
            <title>The RACK-TLP Loss Detection Algorithm for TCP</title>
            <author fullname="Y. Cheng" initials="Y." surname="Cheng"/>
            <author fullname="N. Cardwell" initials="N." surname="Cardwell"/>
            <author fullname="N. Dukkipati" initials="N." surname="Dukkipati"/>
            <author fullname="P. Jha" initials="P." surname="Jha"/>
            <date month="February" year="2021"/>
            <abstract>
              <t indent="0">This document presents the RACK-TLP loss detection algorithm for TCP. RACK-TLP uses per-segment transmit timestamps and selective acknowledgments (SACKs) and has two parts. Recent Acknowledgment (RACK) starts fast recovery quickly using time-based inferences derived from acknowledgment (ACK) feedback, and Tail Loss Probe (TLP) leverages RACK and sends a probe packet to trigger ACK feedback to avoid retransmission timeout (RTO) events. Compared to the widely used duplicate acknowledgment (DupAck) threshold approach, RACK-TLP detects losses more efficiently when there are application-limited flights of data, lost retransmissions, or data packet reordering events. It is intended to be an alternative to the DupAck threshold approach.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8985"/>
          <seriesInfo name="DOI" value="10.17487/RFC8985"/>
        </reference>
        <reference anchor="RFC9293" target="https://www.rfc-editor.org/info/rfc9293" quoteTitle="true" derivedAnchor="RFC9293">
          <front>
            <title>Transmission Control Protocol (TCP)</title>
            <author fullname="W. Eddy" initials="W." role="editor" surname="Eddy"/>
            <date month="August" year="2022"/>
            <abstract>
              <t indent="0">This document specifies the Transmission Control Protocol (TCP). TCP is an important transport-layer protocol in the Internet protocol stack, and it has continuously evolved over decades of use and growth of the Internet. Over this time, a number of changes have been made to TCP as it was specified in RFC 793, though these have only been documented in a piecemeal fashion. This document collects and brings those changes together with the protocol specification from RFC 793. This document obsoletes RFC 793, as well as RFCs 879, 2873, 6093, 6429, 6528, and 6691 that updated parts of RFC 793. It updates RFCs 1011 and 1122, and it should be considered as a replacement for the portions of those documents dealing with TCP requirements. It also updates RFC 5961 by adding a small clarification in reset handling while in the SYN-RECEIVED state. The TCP header control bits from RFC 793 have also been updated based on RFC 3168.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="7"/>
          <seriesInfo name="RFC" value="9293"/>
          <seriesInfo name="DOI" value="10.17487/RFC9293"/>
        </reference>
        <reference anchor="RFC9438" target="https://www.rfc-editor.org/info/rfc9438" quoteTitle="true" derivedAnchor="RFC9438">
          <front>
            <title>CUBIC for Fast and Long-Distance Networks</title>
            <author fullname="L. Xu" initials="L." surname="Xu"/>
            <author fullname="S. Ha" initials="S." surname="Ha"/>
            <author fullname="I. Rhee" initials="I." surname="Rhee"/>
            <author fullname="V. Goel" initials="V." surname="Goel"/>
            <author fullname="L. Eggert" initials="L." role="editor" surname="Eggert"/>
            <date month="August" year="2023"/>
            <abstract>
              <t indent="0">CUBIC is a standard TCP congestion control algorithm that uses a cubic function instead of a linear congestion window increase function to improve scalability and stability over fast and long-distance networks. CUBIC has been adopted as the default TCP congestion control algorithm by the Linux, Windows, and Apple stacks.</t>
              <t indent="0">This document updates the specification of CUBIC to include algorithmic improvements based on these implementations and recent academic work. Based on the extensive deployment experience with CUBIC, this document also moves the specification to the Standards Track and obsoletes RFC 8312. This document also updates RFC 5681, to allow for CUBIC's occasionally more aggressive sending behavior.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9438"/>
          <seriesInfo name="DOI" value="10.17487/RFC9438"/>
        </reference>
      </references>
      <references pn="section-14.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="FACK" target="https://dl.acm.org/doi/10.1145/248156.248181" quoteTitle="true" derivedAnchor="FACK">
          <front>
            <title>Forward Acknowledgment: Refining TCP Congestion Control</title>
            <author initials="M." surname="Mathis" fullname="Matthew Mathis">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Mahdavi" fullname="Jamshid Mahdavi">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="August" year="1996"/>
          </front>
          <refcontent>SIGCOMM '96: Conference Proceedings on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 281-291</refcontent>
          <seriesInfo name="DOI" value="10.1145/248156.248181"/>
        </reference>
        <reference anchor="First_TCP_PRR" target="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a262f0cdf1f2916ea918dc329492abb5323d9a6c" quoteTitle="true" derivedAnchor="First_TCP_PRR">
          <front>
            <title>Proportional Rate Reduction for TCP.</title>
            <author>
              <organization showOnFrontPage="true"/>
            </author>
            <date month="August" year="2011"/>
          </front>
          <refcontent>commit a262f0cdf1f2916ea918dc329492abb5323d9a6c</refcontent>
        </reference>
        <reference anchor="Flach2016policing" target="https://doi.org/10.1145/2934872.2934873" quoteTitle="true" derivedAnchor="Flach2016policing">
          <front>
            <title>An Internet-Wide Analysis of Traffic Policing</title>
            <author initials="T" surname="Flach" fullname="Tobias Flach">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P" surname="Papageorge" fullname="Pavlos Papageorge">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A" surname="Terzis" fullname="Andreas Terzis">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L" surname="Pedrosa" fullname="Luis Pedrosa">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Y" surname="Cheng" fullname="Yuchung Cheng">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T" surname="Karim" fullname="Tayeb Karim">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E" surname="Katz-Bassett" fullname="Ethan Katz-Bassett">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R" surname="Govindan" fullname="R. Govindan">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="August" year="2016"/>
          </front>
          <refcontent>SIGCOMM '16: Proceedings of the 2016 ACM SIGCOMM Conference, pp. 468-482</refcontent>
          <seriesInfo name="DOI" value="10.1145/2934872.2934873"/>
        </reference>
        <reference anchor="Hoe96Startup" quoteTitle="true" target="https://doi.org/10.1145/248156.248180" derivedAnchor="Hoe96Startup">
          <front>
            <title>Improving the Start-up Behavior of a Congestion Control Scheme for TCP</title>
            <author initials="J" surname="Hoe" fullname="Janey C. Hoe">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="August" year="1996"/>
          </front>
          <refcontent>SIGCOMM '96: Conference Proceedings on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 270-280</refcontent>
          <seriesInfo name="DOI" value="10.1145/248156.248180"/>
        </reference>
        <reference anchor="IMC11" quoteTitle="true" target="https://doi.org/10.1145/2068816.2068832" derivedAnchor="IMC11">
          <front>
            <title>Proportional Rate Reduction for TCP</title>
            <author initials="N" surname="Dukkipati" fullname="Nandita Dukkipati">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M" surname="Mathis" fullname="Matt Mathis">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="Y" surname="Cheng" fullname="Yuchung Cheng">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M" surname="Ghobadi" fullname="Monia Ghobadi">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="November" year="2011"/>
          </front>
          <refcontent>IMC '11: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 155-170</refcontent>
          <seriesInfo name="DOI" value="10.1145/2068816.2068832"/>
        </reference>
        <reference anchor="Jacobson88" quoteTitle="true" target="https://doi.org/10.1145/52325.52356" derivedAnchor="Jacobson88">
          <front>
            <title>Congestion Avoidance and Control</title>
            <author initials="V" surname="Jacobson">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1988" month="August"/>
          </front>
          <refcontent>Symposium proceedings on Communications architectures and protocols (SIGCOMM '88), pp. 314-329</refcontent>
          <seriesInfo name="DOI" value="10.1145/52325.52356"/>
        </reference>
        <reference anchor="I-D.welzl-iccrg-pacing" target="https://datatracker.ietf.org/doc/html/draft-welzl-iccrg-pacing-03" quoteTitle="true" derivedAnchor="PACING">
          <front>
            <title>Pacing in Transport Protocols</title>
            <author initials="M." surname="Welzl" fullname="Michael Welzl">
              <organization showOnFrontPage="true">University of Oslo</organization>
            </author>
            <author initials="W." surname="Eddy" fullname="Wesley Eddy">
              <organization showOnFrontPage="true">MTI Systems</organization>
            </author>
            <author initials="V." surname="Goel" fullname="Vidhi Goel">
              <organization showOnFrontPage="true">Apple Inc.</organization>
            </author>
            <author initials="M." surname="Tüxen" fullname="Michael Tüxen">
              <organization showOnFrontPage="true">Münster University of Applied Sciences</organization>
            </author>
            <date month="July" day="7" year="2025"/>
            <abstract>
              <t indent="0">   Applications or congestion control mechanisms can produce bursty
   traffic which can cause unnecessary queuing and packet loss.  To
   reduce the burstiness of traffic, the concept of evenly spacing out
   the traffic from a data sender over a round-trip time known as
   "pacing" has been used in many transport protocol implementations.
   This document gives an overview of pacing and how some known pacing
   implementations work.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-welzl-iccrg-pacing-03"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="RFC3042" target="https://www.rfc-editor.org/info/rfc3042" quoteTitle="true" derivedAnchor="RFC3042">
          <front>
            <title>Enhancing TCP's Loss Recovery Using Limited Transmit</title>
            <author fullname="M. Allman" initials="M." surname="Allman"/>
            <author fullname="H. Balakrishnan" initials="H." surname="Balakrishnan"/>
            <author fullname="S. Floyd" initials="S." surname="Floyd"/>
            <date month="January" year="2001"/>
            <abstract>
              <t indent="0">This document proposes a new Transmission Control Protocol (TCP) mechanism that can be used to more effectively recover lost segments when a connection's congestion window is small, or when a large number of segments are lost in a single transmission window. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3042"/>
          <seriesInfo name="DOI" value="10.17487/RFC3042"/>
        </reference>
        <reference anchor="RFC3168" target="https://www.rfc-editor.org/info/rfc3168" quoteTitle="true" derivedAnchor="RFC3168">
          <front>
            <title>The Addition of Explicit Congestion Notification (ECN) to IP</title>
            <author fullname="K. Ramakrishnan" initials="K." surname="Ramakrishnan"/>
            <author fullname="S. Floyd" initials="S." surname="Floyd"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="September" year="2001"/>
            <abstract>
              <t indent="0">This memo specifies the incorporation of ECN (Explicit Congestion Notification) to TCP and IP, including ECN's use of two bits in the IP header. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3168"/>
          <seriesInfo name="DOI" value="10.17487/RFC3168"/>
        </reference>
        <reference anchor="RFC3517" target="https://www.rfc-editor.org/info/rfc3517" quoteTitle="true" derivedAnchor="RFC3517">
          <front>
            <title>A Conservative Selective Acknowledgment (SACK)-based Loss Recovery Algorithm for TCP</title>
            <author fullname="E. Blanton" initials="E." surname="Blanton"/>
            <author fullname="M. Allman" initials="M." surname="Allman"/>
            <author fullname="K. Fall" initials="K." surname="Fall"/>
            <author fullname="L. Wang" initials="L." surname="Wang"/>
            <date month="April" year="2003"/>
            <abstract>
              <t indent="0">This document presents a conservative loss recovery algorithm for TCP that is based on the use of the selective acknowledgment (SACK) TCP option. The algorithm presented in this document conforms to the spirit of the current congestion control specification (RFC 2581), but allows TCP senders to recover more effectively when multiple segments are lost from a single flight of data. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3517"/>
          <seriesInfo name="DOI" value="10.17487/RFC3517"/>
        </reference>
        <reference anchor="RFC6937" target="https://www.rfc-editor.org/info/rfc6937" quoteTitle="true" derivedAnchor="RFC6937">
          <front>
            <title>Proportional Rate Reduction for TCP</title>
            <author fullname="M. Mathis" initials="M." surname="Mathis"/>
            <author fullname="N. Dukkipati" initials="N." surname="Dukkipati"/>
            <author fullname="Y. Cheng" initials="Y." surname="Cheng"/>
            <date month="May" year="2013"/>
            <abstract>
              <t indent="0">This document describes an experimental Proportional Rate Reduction (PRR) algorithm as an alternative to the widely deployed Fast Recovery and Rate-Halving algorithms. These algorithms determine the amount of data sent by TCP during loss recovery. PRR minimizes excess window adjustments, and the actual window size at the end of recovery will be as close as possible to the ssthresh, as determined by the congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6937"/>
          <seriesInfo name="DOI" value="10.17487/RFC6937"/>
        </reference>
        <reference anchor="RFC9743" target="https://www.rfc-editor.org/info/rfc9743" quoteTitle="true" derivedAnchor="RFC9743">
          <front>
            <title>Specifying New Congestion Control Algorithms</title>
            <author fullname="M. Duke" initials="M." role="editor" surname="Duke"/>
            <author fullname="G. Fairhurst" initials="G." role="editor" surname="Fairhurst"/>
            <date month="March" year="2025"/>
            <abstract>
              <t indent="0">RFC 5033 discusses the principles and guidelines for standardizing new congestion control algorithms. This document obsoletes RFC 5033 to reflect changes in the congestion control landscape by providing a framework for the development and assessment of congestion control mechanisms, promoting stability across diverse network paths. This document seeks to ensure that proposed congestion control algorithms operate efficiently and without harm when used in the global Internet. It emphasizes the need for comprehensive testing and validation to prevent adverse interactions with existing flows.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="133"/>
          <seriesInfo name="RFC" value="9743"/>
          <seriesInfo name="DOI" value="10.17487/RFC9743"/>
        </reference>
        <reference anchor="Savage99" quoteTitle="true" target="https://doi.org/10.1145/505696.505704" derivedAnchor="Savage99">
          <front>
            <title>TCP Congestion Control with a Misbehaving Receiver</title>
            <author initials="S" surname="Savage">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="N" surname="Cardwell">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D" surname="Wetherall">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T" surname="Anderson">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1999" month="October"/>
          </front>
          <refcontent>ACM SIGCOMM Computer Communication Review, vol. 29, no. 5, pp. 71-78</refcontent>
          <seriesInfo name="DOI" value="10.1145/505696.505704"/>
        </reference>
        <reference anchor="I-D.mathis-tcp-ratehalving" target="https://datatracker.ietf.org/doc/html/draft-mathis-tcp-ratehalving-00" quoteTitle="true" derivedAnchor="TCP-RH">
          <front>
            <title>The Rate-Halving Algorithm for TCP Congestion Control</title>
            <author initials="M." surname="Mathis" fullname="Matt Mathis">
         </author>
            <author initials="J." surname="Mahdavi" fullname="Jamshid Mahdavi">
              <organization showOnFrontPage="true">Novell</organization>
            </author>
            <author initials="J." surname="Semke" fullname="Jeff Semke">
         </author>
            <date month="August" day="30" year="1999"/>
            <abstract>
              <t indent="0">This draft provides a detailed description of the Rate-Halving
algorithm.  As specified by RFC2581, Fast Recovery adjusts the
congestion window (cwnd) by transmitting new data only during the
second half of the recovery interval.  The Rate-Halving algorithm
adjusts the congestion window by spacing transmissions at the rate of
one data segment per two segments acknowledged over the entire
recovery period, thereby sustaining the self-clocking of TCP and
avoiding a burst.  Since it is largely independent of the details of
the data retransmission strategy, the Rate-Halving algorithm can be
used with several standard and experimental TCP implementations:
NewReno, SACK, and ECN.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-mathis-tcp-ratehalving-00"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
      </references>
    </references>
    <section anchor="conservative" numbered="true" removeInRFC="false" toc="include" pn="section-appendix.a">
      <name slugifiedName="name-strong-packet-conservation-">Strong Packet Conservation Bound</name>
      <t indent="0" pn="section-appendix.a-1">
PRR-CRB is based on a conservative, philosophically pure, and aesthetically appealing Strong Packet Conservation Bound, described here.   Although inspired by the packet conservation principle <xref target="Jacobson88" format="default" sectionFormat="of" derivedContent="Jacobson88"/>, it differs in how it treats segments that are missing and presumed lost.   Under all conditions and sequences of events during recovery, PRR-CRB strictly bounds the data transmitted to be equal to or less than the amount of data delivered to the receiver.   
Note that the effects of presumed losses are included in the inflight calculation but do not affect the outcome of PRR-CRB once inflight has fallen below ssthresh.</t>
      <t indent="0" pn="section-appendix.a-2">This Strong Packet Conservation Bound is the most aggressive algorithm that does not lead to additional forced losses in some environments.   It has the property that if there is a standing queue at a bottleneck that is carrying no other traffic, the queue will maintain exactly constant length for the entire  duration of the recovery, except for +1/-1 fluctuation due to differences in packet arrival and exit times.    Any less aggressive algorithm will result in a declining queue at the bottleneck.  Any more aggressive algorithm will result in an increasing queue or additional losses if it is a full drop tail queue.</t>
      <t indent="0" pn="section-appendix.a-3">This property is demonstrated with a thought experiment:</t>
      <t indent="0" pn="section-appendix.a-4">
Imagine a network path that has insignificant delays in both directions, except for the processing time and queue at a single bottleneck in the forward path.  In particular, when a packet is "served" at the head of the bottleneck queue, the following events happen in much less than one bottleneck packet time: the packet arrives at the receiver; the receiver sends an ACK that arrives at the sender; the sender processes the ACK and sends some data; the data is queued at the bottleneck.  </t>
      <t indent="0" pn="section-appendix.a-5">
If SndCnt is set to DeliveredData and nothing else is inhibiting sending data,
then clearly the data arriving at the bottleneck queue will exactly replace the
data that was served at the head of the queue, so the queue will have a
constant length.  If the queue is drop tail and full, then the queue will stay
exactly full. Losses or reordering on the ACK path only cause wider
fluctuations in the queue size but do not raise its peak size, independent of
whether the data is in order or out of order (including loss recovery from an earlier RTT).  Any more aggressive algorithm that sends additional data will overflow the drop tail queue and cause loss.  Any less aggressive algorithm will under-fill the queue.  Therefore, setting SndCnt to DeliveredData is the most aggressive algorithm that does not cause forced losses in this simple network.  Relaxing the assumptions (e.g., making delays more authentic and adding more flows, delayed ACKs, etc.) is likely to increase the fine-grained fluctuations in queue size but does not change its basic behavior.</t>
      <t indent="0" pn="section-appendix.a-6">Note that the congestion control algorithm implements a broader notion of optimal that includes appropriately sharing the network.  Typical congestion control algorithms are likely to reduce the data sent relative to the Packet Conserving Bound implemented by PRR, bringing TCP's actual window down to ssthresh.</t>
    </section>
    <section numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-acknowledgments">Acknowledgments</name>
      <t indent="0" pn="section-appendix.b-1">This document is based in part on previous work by <contact fullname="Janey C. Hoe"/> (see "Recovery from Multiple Packet Losses", Section 3.2 of <xref target="Hoe96Startup" format="default" sectionFormat="of" derivedContent="Hoe96Startup"/>), <contact fullname="Matt Mathis"/>, <contact fullname="Jeff Semke"/>, and <contact fullname="Jamshid Mahdavi"/> <xref target="I-D.mathis-tcp-ratehalving" format="default" sectionFormat="of" derivedContent="TCP-RH"/> and influenced by several discussions with <contact fullname="John Heffner"/>.</t>
      <t indent="0" pn="section-appendix.b-2"><contact fullname="Monia Ghobadi"/> and <contact fullname="Sivasankar Radhakrishnan"/> helped analyze the experiments. <contact fullname="Ilpo Jarvinen"/> reviewed the initial implementation. <contact fullname="Mark Allman"/>, <contact fullname="Richard Scheffenegger"/>, <contact fullname="Markku Kojo"/>, <contact fullname="Mirja Kuehlewind"/>, <contact fullname="Gorry Fairhurst"/>, <contact fullname="Russ Housley"/>, <contact fullname="Paul Aitken"/>, <contact fullname="Daniele Ceccarelli"/>, and <contact fullname="Mohamed Boucadair"/> improved the document through their insightful reviews and suggestions.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.c">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Matt Mathis" initials="M." surname="Mathis">
        <address>
          <email>matt.mathis@gmail.com</email>
        </address>
      </author>
      <author fullname="Neal Cardwell" initials="N." surname="Cardwell">
        <organization showOnFrontPage="true">Google, Inc.</organization>
        <address>
          <email>ncardwell@google.com</email>
        </address>
      </author>
      <author fullname="Yuchung Cheng" initials="Y." surname="Cheng">
        <organization showOnFrontPage="true">Google, Inc.</organization>
        <address>
          <email>ycheng@google.com</email>
        </address>
      </author>
      <author fullname="Nandita Dukkipati" initials="N." surname="Dukkipati">
        <organization showOnFrontPage="true">Google, Inc.</organization>
        <address>
          <email>nanditad@google.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
