Professional Documents
Culture Documents
Traveling in First Class e-mail, all of which use TCP and can
therefore adapt their sending rates to
whatever capacity the network offers.
fic will never exceed R(t) + B for any IntSer v. In 1994, the R (token/sec)
increment of time equal to t. Each Internet community began
implementation must decide what to work to define an Inte-
do with nonconforming traffic. The grated Services Architec-
token bucket filter is used in many ture (IntServ) that would
router implementations to quantify extend the existing IP
and enforce the treatment a particular architectural model to sup- Token
B (tokens)
flow will receive from the network. port both real-time and Packet
best-effort traffic flows.6
Weighted fair queuing . The second The IntServ architecture
important mechanism described by defines a flow as a stream
Clark, Shenker, and Zhang was a of packets with common
weighted-fair-queuing (WFQ) algo- source addresses, destina-
rithm used to schedule packets for tion addresses, and port
outbound transmission from the numbers. IntServ suggested
routers or switches. WFQ is variant of that for a flow to receive a
the fair-queuing algorithm in which desired level of service in
individual packets of a flow are time- terms of quantifiable band- Figure 1. Token bucket filter. The flow of packets
stamped based on their arrival rate at width or delay, it is neces- through a router can be enforced by establish-
the router, their scheduled departure sary to install and maintain ing a “bucket “of depth B that is replenished
time from the router, and their flow-specific state in the with tokens or credits at a rate of R tokens per
length.4 The departure queue of the network. Of course a router second, and the quantification can be used to
WFQ scheduler is reordered every only has a finite amount of enforce the treatment of a particular flow.
time a new packet arrives so the pack- buffers and CPU, and is
ets with the smallest time stamps are attached to links with a
transmitted first. The original FQ maximum bandwidth. Thus each amount of resources from the network.
algorithm provides a fair share of the router in the network would have to It delivers the reservation request gen-
available bandwidth for each flow exercise a degree of discretionary con- erated by the application to each
(1/N) for N number of flows while trol over what flows would be allocat- router’s traffic control component.
the weighted variant allows a particu- ed what resources based on available
lar flow to receive more than its fair capacity. This idea that the network RSVP. The de facto setup protocol in
share of bandwidth. might deny service because of insuffi- the IntServ architecture is the
Two properties make the WFQ cient resources ran contrary to the Resource Reservation Protocol, other-
scheduler an ideal choice for support- notion of the connectionless, best wise known as RSVP. With RSVP, the
ing real-time traffic flows. First, a par- effort, “send-packets-whenever” kind application source (the sender) trans-
ticular flow is guaranteed its allocated of service offered by traditional IP. mits a Path message along the routed
share of the bandwidth irrespective of The basic components of the path to the unicast or multicast desti-
the behavior of other flows traveling IntServ architecture are traffic control, nation (the receiver). The purpose of
through the same router. Second, a traffic classes, and the setup protocol. the Path message is twofold: to mark
WFQ scheduler is work-conserving, Traffic control includes admission the routed path between the sender
which means that the router will control, which checks to see if the and receiver and to collect informa-
always transmit available packets and resources in the host or router can tion about the QoS viability of each
therefore the link is never idle. support a particular service; the packet router along that path.
Moreover, Parekh and Gallager classifier, which examines the source Upon receiving the Path message,
proved that a network of routers address, destination address, and port the destination host or hosts can gauge
could quantifiably bound delay for fields in each packet to determine what services the network can support
traffic conforming to a token bucket what class the packet belongs to; and (for example, guaranteed service or
filter and scheduled using WFQ. 5 the packet scheduler, which schedules controlled load) and then generate an
Sophisticated scheduling algorithms the packet for transmission on the RSVP reservation (Resv) message. The
like WFQ—essential for QoS sup- outbound link. Resv message contains traffic and QoS
port—are currently implemented in IntServ supports two traffic classes objects that are processed by the traffic
many advanced routers and switches. in addition to best-effort service: control component of each router as it
guaranteed service supports real-time follows the reverse path upstream
Reservations Required traffic flows that require a quantifiable toward the sender. If the router has suf-
As the number of real-time applica- bound on delay; controlled load ficient capacity, then resources along
tions grew, so did the realization that approximates a best-effort service over the path back toward the receiver are
best-effort service was inadequate to an uncongested network. reserved for that flow. If resources are
support them. The setup protocol enables a host or not available, RSVP error messages are
application to request a specific generated and returned to the receiver.
■ The DS-field is a bit pattern con- packets that do not conform to a The core routers in Figure 3 con-
tained in the header of each pack- token bucket filter) deemed neces- tains a simple BA classifier that deter-
et that denotes the service (termed sary to deliver the service to the mines the PHB to be applied to the
per-hop behavior or PHB) the external customer. The functions packet. All packets belonging to a BA
packet should receive at each hop defined for the boundary router are handled the same way. Again, the
as it is forwarded through the net- can be performed on a router, fire- PHB is an externally observable
work.11 The type-of-service (TOS) wall, or even a host. behavior performed on each node that
field in IPv4 and the traffic class ■ Interior nodes can be core switches is realized through internal queue
field in IPv6 have been redefined or routers that provide the PHB management and scheduling tech-
respectively as the DS-fields. The based on the DSCP bits con- niques. In addition, observe that the
8-bit DS-field contains 6 bits for tained in the DS-field. These complex “high-touch” per-packet pro-
DS code points (DSCP) and 2 devices typically employ a queue cessing is only performed at the edge
bits that are currently undefined. management and scheduling dis- of the network by the boundary or
■ The per-hop behavior (PHB) defines cipline to provide the PHB. RED ingress device. The net result of the
the service the packet receives at and WFQ are examples of mech- DiffServ machinery is that a particular
each hop as it is forwarded through anisms used by routers and aggregate flow is provided with a spe-
the network. A PHB may be switches to support a PHB. cial service as it traverses the network.
expressed in relative (compared to The IETF DiffServ Working
other PHBs) or absolute (such as Figure 3 illustrates the DiffServ bound- Group is finishing work on two
bandwidth or delay) terms. ary and interior functions. Packets PHBs: expedited forwarding (EF) and
■ A behavior aggregate (BA) is a enter the network through an ingress assured forwarding (AF).
group of packets with the same boundary router. Each packet passes The EF PHB was designed to sup-
DSCP. A PHB is applied to each through a multifield (MF) classifier, port low loss, low delay, and low jitter
BA inside the network. which works with a traffic meter to connections. It appears as a point-to-
■ The boundary router is positioned determine the next action to be per- point virtual leased line (VLL) service
at the edge of a DiffServ-capable formed. The role of the traffic meter is between endpoints with a peak band-
network. This device is responsi- to measure the packet’s conformance width. To minimize jitter and delay,
ble for packet classification, with a traffic profile agreed upon by the packets must spend little or no time in
metering, packet marking, and network provider and the customer. In- router queues. Therefore the EF PHB
possibly traffic conditioning (such profile packets or those that fall inside requires that the traffic be conditioned
as policing or shaping). Network the parameters of the profile will be to conform to the peak rate at the
administrators are responsible for treated differently from out-of-profile boundary, and the network of routers
configuring the classifier, which packets. The DSCP bits in the DS-field be provisioned such that this peak rate
defines the fields to be examined may then be marked and the packet is less than the minimum packet depar-
in each packet, and any other conditioned (for example, shaped or ture rate at each router in the network.
actions (for example, dropping dropped) before entering the network. The EF PHB uses a single DSCP bit to
REFERENCES
IP QoS Resources on the Web
on the 1. P. Ferguson and G. Huston, Quality of
Service—Delivering QoS on the Internet and
IETF IntServ Working Group
http://www.ietf.org/html.charters/intserv-charter.html
eb in Corporate Networks, Wiley Computer
Publishing, 1998.
IETF ISSLL Working Group 2. V. Jacobson, “Congestion Avoidance and
http://www.ietf.org/html.charters/issll-charter.html Control,” Computer Comm. Rev., Vol. 18,
IETF DiffServ Working Group No. 4, Aug. 1988, pp. 314-329; also avail-
http://www.ietf.org/html.charters/diffserv-charter.html able at ftp://ftp.ee.lbl.gov/papers/con-
Random Early Detection (RED) Queue Management gavoid.ps.Z.
http://www-nrg.ee.lbl.gov/floyd/red.html 3. D. Clark, S. Shenker, and L. Zhang,
Internet2 Qbone http://www.internet2.edu/qos/qbone/ “Supporting Realtime Applications in an
RSVP http://www.isi.edu/rsvp/ Integrated Services Packet Network:
QoS Forum http://www.stardust.com/qosform/ Architecture and Mechanisms,” ACM
Sigcomm Proc., 1992.
4. A. Demers, S. Shenker, and S. Keshav,
indicate that the packet should be Server (COPS). Work has now begun “Analysis and Simulation of a Fair Queuing
placed in a high-priority queue on the in the Policy Framework Working Algorithm,” ACM Sigcomm Proc., 1989.
outbound link of each router hop. Group of the IETF to define a frame- 5. A. Parekh and B. Gallager, “A Generalized
The AF PHB defines four relative work and schemata for managing net- Processor Sharing Approach to Flow
classes of service with each service work QoS policies. Control in Integrated Services Networks—
supporting three levels of drop prece- Another issue concerns extending the Multiple Node Case,” IEEE/ACM Trans.
dence. Twelve distinct DSCP bit DiffServ across network or ISP on Networking, Apr. 1994, pp. 137-150.
combinations define the AF classes boundaries. Obviously this requires 6. B. Braden, S. Shenker, and D. Clark, “
and the drop precedence within each some form of bilateral agreement and Integrated Services in the Internet
class. When congestion is encoun- coordinated network configuration Architecture: an Overview,” RFC 1633,
tered at a router, packets with a high- between two consenting providers to IETF IntServ Working Group, available at
er drop precedence will be discarded support each other’s BA PHBs. This http://info.internet.isi.edu:80/in-notes/rfc/
ahead of those with a lower drop could be implemented by having a files/rfc1633.txt.
precedence. The four AF classes bandwidth broker in each domain 7. G. Gaines and M. Festa, “A Survey of
define no specific bandwidth or delay manage DiffServ policies and then RSVP/QoS Implementations,” update 2,
constraints other than that AF class 1 communicate that information across RSVP Working Group, 1 July 1998, avail-
is distinct from AF class 2, and so on. ISP boundaries.12 able at http://www.iit.nrc.ca/IETF/RSVP_
As a means of providing a scalable What’s next on the IP QoS front? survey/ietf_rsvp-qos_survey_02.txt.
and coarse level of service suitable for The ISSLL working group is studying 8. A. Mankin, ed., “Resource ReSerVation
the ISP-size and enterprise networks, ways in which RSVP/IntServ and Protocol (RSVP) Version 1 Applicability
DiffServ holds much promise. It is DiffServ can interwork. Efforts are Statement: Some Guidelines on Deploy-
certainly more scalable than the fine- under way to evolve RSVP so that it ment,” RFC 2208, IETF RSVP Working
grained, per-flow approach of can set up and maintain state in the Group, available at http://info.internet.isi.
RSVP/IntServ and does not require network that can benefit aggregate edu:80/in-notes/rfc/files/rfc2208.txt.
new applications or extensive router traffic flows transported over large 9. B. Braden et al., “Recommendations on
upgrades. Moreover, DiffServ gives ISP backbones. One application Queue Management and Congestion
network providers some degree of lati- involves the use of RSVP as a means Avoidance in the Internet,” RFC 2309,
tude in deploying and operating dif- of setting up MPLS explicit paths IETF, available at http://info.internet.isi.
ferent network infrastructures (for between ingress and egress routers for edu:80/in-notes/rfc/files/rfc2309.txt.
example, ATM or routers) that can traffic engineering purposes. Another 10. S. Blake et al., “An Architecture for
support different PHBs. application is to employ RSVP exten- Differentiated Services,” RFC 2475, IETF
sions to reserve network resources for DiffServ Working Group, available at
What’s Next? an aggregate number of microflows ftp://ftp.isi.edu/in-notes/rfc2475.txt.
Still, some issues remain. For example, such as a bundle of VoIP calls. The 11. K. Nichols, “Definition of the Dif-
how will network policies (such as fil- Internet2 community has undertaken ferentiated Services Field (DS Field) in the
ters, rules, and parameters) be man- creation of the Qbone to understand IPv4 and IPv6 Headers,” RFC 2474, IETF
aged and installed on a potentially how it can employ IP QoS mecha- DiffServ Working Group, available at
large number of boundary compo- nisms over next-generation high- ftp://ftp.isi.edu/in-notes/rfc2474.txt.
nents? Possibilities include manual speed networks. In the long run it 12. K. Nichols, V. Jacobson, and L. Zhang, “A
configuration, Simple Network will most likely be a combination of Two-bit Differentiated Services Archi-
Management Protocol (SNMP), the aforementioned solutions along tecture for the Internet,” Internet Draft,
Lightweight Directory Access Protocol with more bandwidth that will enable Nov. 1997, available at http://www-nrg.
(LDAP), and Common Open Policy the Internet to offer QoS. ■ ee.lbl.gov/papers/2bitarch.pdf.