Professional Documents
Culture Documents
332 Quality of Service in UMTS; Thor Gunnar Eskedal and Frédéric Paint
355 Abbreviations
Guest Editorial
TERJE JENSEN
To survive in today’s competitive environment, The Internet Protocol (IP) has become a pivotal
a service provider must continually evolve its component in communication between various
network and enable new revenue-generating ser- devices. It is rarely possible to make a single
vices faster and more cost effectively than the protocol suffice the diverse needs of all applica-
competitors. Prior to the Internet, prior to recent tions and users. To a certain extent, however,
mobile services, prior to e-business, a change in one may claim that the IP suite is addressing
the telecommunication industry was seen as such an objective. However, looking at the origi-
more predictable. Business leaders knew to take nal use of IP when it was designed, there are
action – actions like reducing costs, launching many other applications of the protocol these
new products, upgrading the networks, and so days; as more demanding services – like tele-
forth. Now providers are far less sure who their phony, video distribution and mission-critical
Terje Jensen competitors are, the value of their core strengths business applications – are gradually put onto
and skills, and whether the business they have IP-based networks, additional functions must be
done well in for many years will continue to implemented in the networks and end-systems.
keep them profitable in the future. Hence, one is stretching the capabilities of IP
and additional mechanisms are necessary to
Some may claim that a main cause for the uncer- allow IP to hold on to a central position. Several
tainty is that recent development of applications of these mechanisms are related to Traffic Engi-
and service demands has been going on outside neering, that is, means activated to ensure the
the sphere of the service providers. In particular, performance of the communication solutions.
the Internet Engineering Task Force (IETF) has This will also allow for more predictable
received major contributions from some main responses on service requests and swiftly
players and been guided by inputs from the support of more advance services and users.
academic world. For sure this has resulted in a
plethora of applications and usage patterns, and Quite a few phenomena influence the evolution
Front cover: The conflict phenomenal traffic growth. However, as more of IP-based networks, of which some interacting
between market require- commercial concerns are entering the stage the factors are:
ments and the service providers would regain more control, for exam- • Increased load and expansion; more efficient
provider’s resources ple by utilising the Traffic Engineering solu- ways of handling the traffic is sought. Scala-
tions. This also advocates further work on stan- bility challenges are commonly faced for this
At low traffic pressure incom-
dardisation, ensuring interoperable configura- reason.
ing traffic equals traffic car-
ried. The artist Odd Andersen tions. Including procedures for managing multi-
indicates this situation by his ple service types and requirements, Internet • New technologies; efficient ways of interact-
45 degrees black lines. How- Protocol (IP) Traffic Engineering thus provides ing with IP-based networks are looked for.
ever, every traffic machine – mechanisms for optimal operation and manage- An example of this is the relation between
be it switches, routers or the
ment of the IP-based network. Thereby, a functions related to IP and an underlying
whole network – has a capac-
ity limit at which the line provider would also improve its chances in optical layer.
breaks into a horizontal posi- the frenzied market.
tion. After that no more traffic • New user groups; additional requirements
can be carried whatever the Basically, one option could be simply to increase could be placed on the IP-based network.
pressure!
the capacity of the network, like adding more Thus, efficient ways of differentiation be-
But the enormous increase bandwidth to the links. A problem with this tween the groups are asked for, also accom-
– and non-established nature
argument is that capacity should then be added panied by appropriate charging solutions.
– of Internet traffic blasts
through all aspects of capacity wherever there is a problem, including the pro-
and quality constraints. The cessing capacity, and also in the access network, • New applications; innovative ways of utilising
artist’s skyrocketing white on the servers, etc. Furthermore, and perhaps an IP-based networks are steadily observed, e.g.
lines indicate the unprece- even heavier argument is that the possibility for related to electronic business, mobile services,
dented demands to proper
service differentiation would then still be rather and so forth.
engineering of traffic ma-
chines in the new market limited. Being able to offer a portfolio of differ-
environments. ent services is recognised as a key enabler for • Increased dependency on the network; coming
ensuring a provider’s profitability. Again, from the service providers themselves as com-
The artist’s generic message:
Matching capacity of all com- Traffic Engineering is promoting a set of mecha- mercial aspects, but also from their customers,
ponents to uncertain Internet nisms and procedures supporting a provider to of which several are basing their business on
traffic demands. achieve such goals. This becomes more impor- an operational network.
Ola Espvik, Editor in Chief tant as the number of users and services grows.
Telektronikk 2/3.2001 1
• Increasing number of actors involved in ser- then treated in a set of articles in the second sec-
vice provision and delivery; connecting sys- tion, called traffic, routing, resources. Interdo-
tems and networks managed by different main, SLA, policy and management is the fol-
actors, partly co-operating and partly compet- lowing section, addressing essential questions
ing, require adequate sets of means for a given for commercially offering services – in a fast,
actor to ensure its business and service levels accurate and automatic way. The papers deal
towards its customers. This is further compli- with internal procedures and systems (e.g. man-
cated by the dynamic commercial and techni- agement systems) as well as relations with other
cal environment that an actor faces. actors (e.g. agreements). Measurements are piv-
otal to follow and document the performance of
Several aspects have to be addressed as part of the network. A set of papers is showing how to
Traffic Engineering. A selection of the topics carry out measurements and factors to consider.
has been included in this issue of Telektronikk. The last section is called systems and services,
These are divided into a number of sections as presenting a few areas where solutions for IP
shown in the table of contents. Firstly, a set of and Traffic Engineering are used or required,
papers of introductory nature presents an over- like for mobile, for optics, and for voice.
view of the IP suite, history of Internet and prin-
ciples of Traffic Engineering. Basic topics of As the use of abbreviations flourishes, a com-
designing and operating an IP-based network are mon list is collected at the end of this issue.
2 Telektronikk 2/3.2001
Computers and Communication
Early Development of Computing and Internet-technology
– a Groundbreaking Part of Technical History
YNGVAR LUNDH
Building the Arpanet and using it as a laboratory for development was a major contribution both to
computing and to telecom. During the 1970s a very innovative and thorough research and development
took place under the leadership of the United States Department of Defense, Advanced Research
Projects Agency. From the outset the effort can best be characterized as basic technical research.
Ten research groups worked together as a team at developing the Internet-technology itself. At the same
time the development was influenced by many other research groups, mainly in the United States, who
actively pursued specialized networking applications, thereby creating needs and uncovering possi-
bilities. Concurrently dramatic developments took place both in circuit and device techniques for com-
puters and in the politics of telecom operation. A glimpse of the Norwegian perspective is included
Yngvar Lundh (69) graduated through the eyes of the small participating group in Norway. The text endeavours to be readable without
from the Norwegian Institute of prior technical special knowledge. Its objective is to interrelate main technical events of computing in a
Technology in 1956. He served historic perspective.
as leader of development teams
and projects in computer and
telecom technology, with the
Norwegian Defence research Strengthening Telecom and World Wide Web – WWW
Establishment until 1984, then
with the Norwegian Telecom Computer Techniques People today tend to think of Internet as synony-
Administration / Telenor until Internet is not only a modern hobby, nor an mous with World Wide Web. That technique
1996, then in his own consulting exotic new trading arena, nor new mail, nor new opens a splendid new view of a world of infor-
company. Since 1980 he also
served as Professor of Informat- distribution of information. Internet is all of that mation. Simple point and click movements catch
ics at the University of Oslo. His and much more. A result of a successful develop- posted information anywhere in the world inde-
main projects concerned digital ment since the late 1960s of basic new technical pendently of distance. Information is posted in
computing and circuit technol-
ogy, enabling the start of “hi- principles, it pertains to computer collaboration the form of “home pages”. The information is
tech” companies, notably Norsk and to various forms of information transfer. We coded in standardized format and is stored in
Data AS, and systems for de- shall refer to these techniques as Internet-tech- computers connected to the network. For the
fence and for telecom enhanc-
ing and employing emerging nology. During the same period – the last 25 coding and formatting various aids are readily
technologies. Lundh is a mem- years of the twentieth century – important devel- available and easy to use. Hence the “Web tech-
ber of he Norwegian Academy opment took place in two other areas. Electronic nology” can be used by anyone who wants a
of Technological Sciences.
circuit and device techniques made it possible message to be presented. It immediately be-
yngvar@joker.no
to fabricate computers cheap and small, thereby comes available to the whole world. That is a
making them more interesting economically. world that can be described as “countless mil-
They can now be used as components in new lions” and which grows such that it will shortly
roles (for that matter the same circuit technology comprise at least everyone who has or could
also made even more powerful computers possi- have a telephone. At the same time the technol-
ble). Telecommunications went through a pro- ogy is developed further towards user-facilities
found reorganization. This admitted new actors with far more comprehensive abilities than tele-
and driving forces into the technical and com- phones at conveying information.
mercial evolution of telecom networks.
However, World Wide Web is far from the
Those are features of a development presently entire Internet. It is only one – admittedly very
causing drastic changes in our relationship with conspicuous – example of exciting new possibil-
information and its use. Most likely we are just ities that can be implemented on top of the Inter-
at the beginning of a new era. Nobody knows net-technology itself. The Web technique first
where it will take us. This technology is already emerged as a practical internal information dis-
beginning to change important functions of our tribution system in a large international research
society. Some of the perspectives that can now establishment in Switzerland – CERN – in
be perceived imply exciting new possibilities. 1990–91. From there it spread incredibly fast
throughout the Internet, i.e. to “the whole world”.
This article describes that technical development
without assuming special technical knowledge But the basic ideas were already 25 years old
and avoids detail that is better described else- then. The idea of being able to open windows
where. Outlines of the historic development of via CRT-screens on collections of information
the internetworking technology and parts of of various types near or far and to navigate in a
computer- and telecom techniques are described. world of information by point and click move-
Special focus is directed at the 1970s when most ments of hands and fingers were demonstrated
of the basic technical development took place. already in 1968.
Telektronikk 2/3.2001 3
-----In any picture or text hyperlinks
may be built in. As an example, clicking stations were another of Engelbart’s ideas long
the name of a particular person may before the microprocessor). And, of special
immediately bring in his importance, the ban on commercial traffic in the
picture located in some Internet was lifted in 1991. Some of the prereq-
computer – anywhere in the
world uisites were met relatively early. Computer
screens, first demonstrated in the late 1950s,
• CV began to be common from the early 1970s, per-
• e-mail sonal computers a little later. Computer co-oper-
• web-add ation in general, vendor independent networks,
• work beyond the groups participating in developing
• home the Internet techniques themselves, became
usual from around 1980. Some of the ideas that
Engelbart demonstrated in 1968 are still (2001)
Mr. Ola Norman awaiting comprehensive use, but are expected
to become similarly important. Examples are
telephony and moving pictures.
Hyperlinks make information The leading person and creating and driving World Wide Web is primarily an example of
stored elsewhere available by force in these developments was Douglas Engel- technical possibilities that Internet technology
pointing at a reference to it bart of Stanford Research International – SRI – opens up as a carrier of entirely new and exciting
and clicking in Menlo Park, California. Engelbart developed forms of information handling.
and demonstrated a comprehensive set of con-
cepts and techniques of groundbreaking impor- Electronic Mail
tance. The most significant was perhaps the Message transfer was a dominating application
“mouse”, the little thing you hold in your hand. of the Internet already from the start of the
Everybody who has seen a computer today has development in 1969. That form of communica-
seen it. Equally important is the “hyperlink”. tion was especially practical and a necessary tool
That is a reference pointer-code that can be in the decentralized collaboration of the ten
embedded in any information-image – text or groups of researchers who undertook the basic
picture – displayed on a computer screen. A research and development in the 1970s.
mouse-click on the pointer opens the referred
The concept of workstation image. That happens independently of where in The original vision of resource sharing network-
was demonstrated at SRI by the net that information happens to be located. ing, an important source of inspiration for the
Douglas Engelbart as early development, comprised a number of other,
as 1968. It had cathode ray A quarter of a century would elapse before these more or less exotic, applications. E-mail was an
screen, a “mouse” for the ideas could be seriously employed and put to overwhelming generator of traffic for many
right hand and a five-finger extensive use. Only then the technical and eco- years. It perhaps still is, at least was so until the
key-set for the left hand. The nomic prerequisites were met. Microprocessors Web started another “landslide” of new users.
user could point, click and type had made low priced personal computers com- To many people either e-mail or Web is still
anywhere at the screen while mon as “workstations” and the Internet was synonymous with the Internet.
looking steadily available and ubiquitous (networking work-
E-mail is an important form of communication
already. It has unique properties in comparison
to ordinary mail and telephone. Therefore it
defends a place of its own as a communications
medium. It overcomes both time and distance,
it is fast, but still the addressee may answer pre-
cisely, for record, when convenient after having
had plenty of time to think, unlike the telephone.
E-mail is suitable for automation in various
forms. And it is cheap.
4 Telektronikk 2/3.2001
E-mail will be much more usable the day when The Internet is a network of
Local
the receiving apparatus immediately emits a nets interconnected by gateway
area
beep or blinking light signalling the arrival of net computers. Nets may be of
a message. The messaging apparatus should be different types. From one host
G
equally cheap to own as a telephone that rarely computer to another
rings. We are still some distance from being able G Net of information travels in packets
leased
to send important messages to many recipients along routes which may
lines
by e-mail only. But the trend is pointing in that G change with network “shape”
direction. And a transmitter and receiver of e- Packet Packet and traffic load. The Internet
mail will not be a PC only. It will be built into radio G satellite Protocol (IP) helps navigate
telephones or other future “popular boxes”, that net net through the network. The
G
we have not yet seen, but which will creatively Transport Control Protocol
be made usual in the future world. Many such G G (TCP) helps ensure that a
boxes will be gadgets with remotely controlled message transported
functions, etc. Local Local piecemeal as a number of
area area packets gets properly
Wireless or Wired Somehow net net re-assembled
The actual reason for the name Internet is that
the network may employ various carrier media Host A Host B
of many different kinds interconnected for the
transportation of information.
Further, Internet-technology implies mechanisms type of net. The individual nets are connected
for optimized mixing of different transport re- into one network (of nets) called Internet. Gate-
quirements. Urgent messages get there fast while way computers make the interconnection. They
less urgent traffic may be transported more cheap- convert the information on its way to the next
ly using otherwise idle periods. Traffic types are net into a format suitable for appropriate han-
more or less error prone. Particularly important dling there.
traffic needs precedence – e.g. for resolving
problems in the network itself, and so on. The basic development of Internet-technology
took place in the period 1969 – 1980. It com-
Characteristics such as error density, urgency, prised understanding the problems and the possi-
and precedence are measurable quantities to be bilities, creating and testing the technical meth-
specified, and to be met accordingly. Internet ods and defining the results as standards that
technology lets different requirements be met were open and available for use by anyone.
automatically by the available network capabilities.
The main result of this development is that dif-
In particular this enables many carrier media of ferent computers can now co-operate and ex-
rather different capabilities to co-operate in the change all types of information. Further, the
transport such that each medium is exploited to
its best ability. Prevailing media now are leased
lines capable of specific bit transfer rates – num-
ber of pulses per second. Various standard band-
widths (pulses per second) are available. Several
other carrier media are important and will be
used increasingly. Local area networks prevail
within buildings and geographically limited cor-
porate sites. Radio computer networking of vari-
ous kinds is evolving further.
Telektronikk 2/3.2001 5
Remote Computers and
Time Sharing
Computer Early computers and their users communicated
center using teleprinters – “Teletype machines” – that
conveyed text directly both into and out of the
computers. For many years information was
transferred in and out of computers via punched
Modems cards or punched paper tape. The need for effi-
cient use of computer time dictated these media.
They were much faster and hence occupied less
of the valuable computer time waiting for slow
Tele-net
fingers and printer mechanisms. Special line
printers to be directly driven by the computer
were developed. For many years powerful line-
printer machines were essential parts of com-
Modems puter centres, and they produced vast amounts
Terminals of paper printouts. Although they are capable of
••••••••
fast printing of text on paper lineprinters have
been surpassed in performance by newer de-
vices. Both ink jet printers and xerographic
printing mechanisms using lasers for pattern
generation are almost household items today,
and they outperform the earlier, powerful mech-
anical line printers both at efficiency, quality and
Timesharing allows many information can be transported through different flexibility.
users to work directly and types of transport media. Each transport is auto-
simultaneously with the com- matically handled as required by interconnected The first operating systems were developed early
puter from remote locations carrier media that may have different character- in the 1960s. That is programs that manage the
istics. computer itself and its attached resources. Since
then a computer without an operating system is
Figure 5 CRT-screens and The transport is handled according to technical unthinkable. The operating system manages the
timesharing were major steps rules called protocols. They depend on more computer and its various tasks. As an example
in adapting the power of detail and are significantly more complicated the operating system permits the fast central
computers to the abilities of than the protocol that govern ordinary telephone processing unit to carry on at full speed while
people. This picture was copied traffic. In reality the protocols are implemented slower attached units such as printers work at
from a brochure in 1971. The as programs in computers. Microprocessors of their speed. Important operating systems today
large company impressed various processing powers are now available and are Windows, NT, UNIX and Linux, each in
customers calling in. As soon can be used as components in devices built to several variations. While Internet-technology is
as the customer gave his name use the Internet for various purposes. It appears independent of individual machines and operat-
the operator could (actually that we are presently at the beginning of an era ing systems, the one operating system that was
type it immediately and thus of future types of information networks. most prevalent during the first decade of net-
display his data, hence –) working development was “Tenex” by Digital
“remember” details about him Equipment Corporation – DEC. It was a popular
operating system especially for that company’s
tenth major computer model (“Programmed
Data Processor”) – PDP 10. Towards the end of
the 1970s Unix became more and more popular
and has become an important industry standard
serving many types of computers. In the 1990s
Microsoft Corporation’s various “Windows”
systems have overtaken it in volume outnumber-
ing all others.
6 Telektronikk 2/3.2001
own comprehensive and successful standards in
computer networking.
Telektronikk 2/3.2001 7
From the mid 1970s that technical development
permitted complete programmable computers to
be made cheaply enough to make it meaningful
economically for one person to have the com-
puter alone. The movement of the human per-
son’s fingers and her ability to think and formu-
late commands and questions are very slow if
measured in a computer’s time scale. Looking at
the exploitation of a personal computer – PC –
one will typically find the computer running idle
most of the time while the user thinks or does
something else. The PC-phenomenon – econom-
ically seen – is that it makes economic sense to
have the machine idling, but immediately avail-
able to the user – the person. Unlike the situation
today that was far from true for many years.
8 Telektronikk 2/3.2001
Arpanet grew fast and more academic groups in
the USA were connected to the resource sharing
network. The research and development con-
cerned many technical and scientific areas and a
wide spectrum of applications were pursued in
addition to computer and networking techniques
themselves. The numbers of people and research
groups connected with the Arpanet far outnum-
bered the relatively few that worked on the basic
Internet-technology itself.
Telektronikk 2/3.2001 9
ber of qualified mathematicians in universities called host computers. They exchange informa-
were critical users while the development pro- tion with each other. The information transport
ceeded further. Errors and suggestions were eas- and exchange takes place according to standard-
ily reported to the developers. In this way the ized technical procedures called protocols. Vari-
program was subject to brutal testing and conse- ous quantitative requirements of speed and other
quent help in discovering weaknesses in the factors can be specified for each transportation
interactivity of the program, a new and very task. The transport network also comprises com-
effective way of improving program robustness. puters built into it, that carry out the logical
And a free source of good ideas was available functions of accepting, delivering and routing
from a world of interested and competent users. information being transported.
Many other research projects in many areas pro-
liferated around the network from the start. The name “Internet” reflects the fact that the
transport network actually is a network of indi-
Basic Open Technological vidual interconnected nets.
Research and Development
Basic ideas and techniques for networking were Computers can have various forms and sizes. A
implemented already in the initial “little” computer may also be small and cheap and may
Arpanet in 1969. The networking technology be built into an apparatus as a component, e.g. in
was further refined and developed in an intimate a telephone. Telecommunications are expected
co-operation of ten research groups during the to make increasing use of the Internet technol-
1970s. That co-operation resulted in the technol- ogy, which will thus have an increasing role in
ogy underlying today’s Internet. The results future telecommunications.
were documented as standards. They were made
available to the US defense to be further formal- Experiments in Computer Networking
ized and were openly available to anybody Historically some computer networking experi-
world-wide, especially interested academic ments began in 1969 as an experimental network
groups. called Arpanet. It consisted initially of a number
of nodes connected by leased lines that could
That led to an increasing interest, also interna- transmit digital data streams. Each node was a
tionally, through the 1980s. From 1991 a very computer with a program that made it function
rapid growth began. The public did generally not as a so-called “Interface Message Processor” –
know about the technology until 1995. The work IMP. The lines with modems could transmit up
was not secret, however. The work and the to 56,000 bits per second, somewhat more on
results were available to interested researchers some “legs” later on. One or more host comput-
from the start in 1969. The basic idea was ers could be connected to each IMP. Hosts might
resource sharing including human resources, be of various types and sizes and be used for
ideas and suggestions. And much was done to various applications. Unlike earlier computer
create interest. A comprehensive public confer- networks the Arpanet distinguished between the
ence with demonstrations of several research IMP-computers that were part of the transport
efforts was held in Washington DC in 1972. network, and the host computers that were the
Comprehensive presentations were made at the co-operating computers proper.
Computer Communication Networking Confer-
ence at Brighton, England in 1973 and at the From the initial Arpanet the technology was
International Computer Communication Confer- developed into a basically new computer co-
ence – ICCC – at Stockholm, Sweden in 1974. operating technology – Internetworking-technol-
ogy. Its main constituents were defined around
It was always essential for the development that 1980.
any kind of computer of any make could co-
operate in the network. Internet technology has Some further technical refinement and signifi-
become an important reinforcement of the foun- cant further geographical expansion of the net-
dations of both computer technology and tele- work took place through the 1980s. This was all
com technology. In turn that has stimulated carried out on a non-commercial, experimental
innovations in business and in society in many basis. The network spread into many countries
ways. Most likely we have just seen the begin- around the Earth, primarily to universities and
ning of that development. research groups.
10 Telektronikk 2/3.2001
Network of Nets and Header Trailer A packet switched network
bits “Payload” bits bits
Packet Switching transfers streams of packets.
Information gets transported through the net in Each packet has a limited
packets. The net is said to be packet switched. amount of “payload”
A packet consists of a certain number of bits – information plus a
binary digits – e.g. 2048 bits plus a “packaging” “packaging” of some header
of a few bits. Packet size (number of bits) may Packet and trailer bits for addressing
vary for different applications and different nets. and transport specifications.
This packaging of header bits and trailer bits Transfer of a packet over a
specify how the packet is to be treated in the line only occupies the line for
transport net, and identifies the packet to the The first computer networks were mostly if not the short time of that limited
receiver. Each digit assumes value 0 or 1. In exclusively star shaped. The transfer channel number of pulses
transmission each bit is typically represented as between any two points A and B in a star shaped
“pulse or no pulse” at defined instants in time. network is unique. The Arpanet/Internet devel-
opment consistently made use of mask shaped
The initial Arpanet had permanent leased lines nets. Transport between arbitrary points A and B
connecting the nodes. The further development in a network may then travel alternative routes.
comprised, among other things, possibilities for This strategy, well known in traditional telecom
other types of transmission carriers. Special networks, has many advantages. In the more
interest concerned packet radio nets where each
node had a radio transmitter and -receiver and all
nodes used the same radio channel – carrier fre-
quency. The purpose was to exploit such infor-
mation carrying media and their special proper-
ties. They have potential for connecting ships,
aircraft, cars, persons, as well as more or less A
temporary platforms such as oil rigs and other
stations in wayless territory or in developing
areas having inadequate permanent installations.
Further developments comprised ways of using
satellite channels and special cable channels in
similar ways.
Telektronikk 2/3.2001 11
Host A Host B quirements, network topologies and application
types were imagined, implemented, tried, failed,
-
- changed and tried again. The “final” TCP and IP
- Virtual were not easily postulated and approved.
Get file X X
- connection
-
- Traffic Diversity
Nobody can ever reproduce in a laboratory the
File transfer
FTP chaotic traffic pattern of a lively telecom or
program
• • computing network and even less the diverse
• •
• • demands of information exchange. The growing
Packet Packet active dynamic traffic situation in the Arpanet
handling handling prevailed during onwards development of its
Network own underlying technology. That may be one
reason for the robustness, elegance and surviv-
Real connection ability of the result. Arpanet was the laboratory.
At the same time it was an active telecom net-
work, a resource sharing network and a forum of
creative and critical people. During a period of
intensively active development methods were
Virtual
conceived and perfected until functioning well in
connection an environment which was closer to reality than
anyone might have dreamt up in a “sterile” labo-
ratory environment. At the same time a profound
theoretical understanding was developed. It kept
its scrutiny on experimental results and was both
guiding and following up the work in an ad-
Til Ola Norman
3,50 kr
12 Telektronikk 2/3.2001
demonstrated internetworking speech conferenc- group worked on a standard for packet switching
ing. Three persons located at Boston (Mas- X.25. Impressions of the participants were
sachusetts), London (England) and Kjeller (Nor- strong. We had something to learn from each
way) held a demonstration conference. The rest other.
of the development team, in a meeting at Uni-
versity College London at the occasion, were Although usually financed by private industry,
solemnly listening in with the rewarding feeling the success of such ad hoc forums is equally
of having successively penetrated the maze of dependent on full openness and access to the
so many difficult questions and challenges. results by anybody. Strongly competing actors
actively co-operate intimately in development
Each of the three sites had an LPC codec – so that they can go on to compete fiercely for
attached to a host computer. The three comput- their market shares and livelihood.
ers communicated through local area nets inter-
connected through gateways, via Arpanet and There have been examples of large companies
Satnet. The packet traffic in that Internet situa- setting their own standards and keeping them to
tion (new then!) was a combination of that themselves. Full openness is now considered
speech traffic together with “natural” traffic in necessary for success of standards setting.
the Arpanet at the time. Some special knowledge
may perhaps be required to fully appreciate the From Arpanet to Internet
complexity of that experiment. It was one of The network of nets was called Internet.
several major milestones during development of
Internet-technology. It took place in 1978 and One fact brought into focus and thoroughly
proved a number of new concepts workable. investigated was that various types of traffic
Intricate logic functioned, and detailed prepara- have different technical and economic require-
tion by several collaborating research groups ments of the transport. Important requirements
succeeded. are error freedom, time delay and economy.
Telektronikk 2/3.2001 13
Resource Sharing Networks media for different demand types and capability
When the research began in 1969 “all” comput- to exploit the versatility of computers.
ers were large and expensive. The development
had the main purpose to study and develop re- Flexibility concerns several factors. Primarily
source-sharing networks. Resources to be shared it has the ability to meet differences in volume
were both the “power” of the computers, pro- of information often expressed as bandwidth of
grams and data of various types – information offered traffic – measured as bits per second.
for shared use. Further, and not least, it was im- Large and small bandwidths may be mixed
portant to create an environment where human dynamically, i.e. can be accommodated and opti-
resources could co-operate and strengthen cre- mized while changing rapidly. Secondly there is
ativity and knowledge. a great economic potential in exploiting combi-
nations of requirements such as urgency, free-
Communicating via Computers dom of error and reliability. Last, but not least,
The development of electronic circuit tech- Internet techniques are good at exploiting differ-
niques, perhaps the most conspicuous part of ent carrier media in combination – various cable
computer hardware development, made so-called types, packet radio and satellite net, and proba-
microprocessors possible from about 1970. bly many new concepts that were less practical
Microprocessors are integrated circuits that com- without these new techniques.
prise the main part of a computer. Small chips
the size of a fingernail can now comprise entire Some Further Details
computers. That development has continued fur- National and international telecom networks
ther and further and will probably continue – may be viewed as nodes interconnected by col-
nobody knows how far. Ultimate limits of com- lections of lines of varying properties. Each line
plexity have been repeatedly sought, predicted may have characteristics such as analog or digi-
and broken. tal, bandwidth (pulses per second), subject to
noise and other factors that determine the capac-
Today microprocessors with programs are used ity and quality of channels. Nodes typically have
as component parts in many devices, more or switches capable of automatically setting up and
less specialized. taking down telephone calls and facilities for
manually setting up and taking down other types
Among the logical capabilities thus introduced of channels.
into an apparatus is the capability to execute the
rules – protocols – in Internet. That will enable All kinds of information may be represented dig-
more and more telecommunications to proceed itally. Natural values such as temperature, dis-
as Internet type traffic. Telecom operators of the tance, weight, pressure, etc. are measured in spe-
world are now eagerly studying the implications. cific units and the number of units is the digital
Developing techniques and new types of telecom representation of the value. Accuracy of such
market demands continue to emerge. We will representation can be as required. It is a matter
likely continue to see many great changes of of the units and the measurement precision.
telecommunications and the use of information Depending on the requirements this may be eas-
in the years to come. ier said than done of course, but when a measure
has been digitized the accuracy of each value is
Advantage of the Internet preserved thereafter, unharmed by noise and loss
Compared to the traditional telecom network as long as the number symbols can be recog-
two properties of Internet-technology are fore- nized, recovered and regenerated.
most: Flexible dynamical use of various carrier
Computers and communications represent num-
bers in the binary system, by strings of the sym-
bols 0 and 1. These are binary digits – bits. Simi-
larly, people represent numbers in the decimal
system, by decimal digits – the symbols
6 0,1,2,3,4,5,6,7,8,9. In a transmission channel or
in a storage system symbols are distorted and
5
mixed with noise. In such deteriorated signals it
4 is easier to distinguish between two symbols –
Units
14 Telektronikk 2/3.2001
sentation is easily converted by the computer Original
Bit symbols distorted and
to and from decimal before being displayed, recovered. Here the symbol
1 0 1 1 0 1 0 0 1
printed, etc. “1” is represented by “pulse”
and “0” by “no pulse”
Distorted in
Any kind of information, e.g. speech, music, transmission
images, etc. may be digitized. Some types of
1 0 1 1 0 1 0 0 1 Symbols
information such as text and numbers are inher- recovered by
ently digital. In particular co-operating comput- sampling at clock periods
ers need to exchange special control information
between them. Standards exist that specify pre-
cisely how various types of information are rep-
resented. Binary information is represented by
pulse patterns. Typically, pulses are grouped in
“bytes” of eight bits each. Various modulation Decimal and binary number
Decimal Binary
methods exist for representing bits in transmis- symbols
sion channels. Examples are pulse or no pulse, 0 0000
positive or negative pulse, high or low tone, and 1 0001
others. 2 0010
3 0011
In its earliest days telecommunications had to
4 0100
live with “the facts of life” that noise and loss
5 0101
along lines were inescapable limitations. Trans-
6 0110
mission theory and technology have matured
over the years. Information carrying capabilities - -
and limitations of various media are now well - -
understood. Techniques have been developed to 16 1000
exploit each medium according to technical and - -
economic criteria.
Telektronikk 2/3.2001 15
Over time digital techniques have been devel- History of Initial Internet
oped extensively and hence should replace older Development
techniques if it were possible to disregard exist-
ing assets. Digital transmission is now cheaper Development Teamwork
and exhibits better quality than analog ones. But The Arpanet collaboration that eventually led
several of the existing world-wide telenetworks to the establishment of the Internet was carried
are still predominantly analog, represent large out by a handful of research groups collaborat-
assets and function well. Further expansion and ing intimately for many years. Lawrence “Larry”
replacement – analog to digital – imply many Roberts initially led the Arpanet work as director
questions, trade-offs and techniques for change of ARPA’s Information Processing Techniques
or coexistence. Office – IPTO. Robert “Bob” Kahn later re-
placed him. More than anybody else Kahn was
As the demand for communication channels be- the person who formulated goals and guided
tween computers and their possibilities increase, development of the Internet-technology during
digital transmission and also packet switching the most active development period. Vinton
continue to become more advantageous. That is “Vint” Cerf later assisted Kahn. Later on, Cerf
especially the case for traffic consisting of many promoted and led the further development of the
and dynamically changing performance factors. technology and its applications. Vint Cerf today
An example illustrates that: appears as “Internet Guru number one”. All
these three persons distinguished themselves as
Some computer co-operating applications are excellent professionals and were able to moder-
characterized by burstyness. Machine A sends ate and lead the many capable and outspoken
one or more messages to machine B. Then for researchers and research groups that took part
some time nothing is sent because A has to do in the development.
something else, A’s user does some thinking, A
is awaiting answer or acknowledgement from B, During the 1970s the following ten groups par-
then B may suddenly respond with a large mes- ticipated in the development of Internet technol-
sage, and so on. Traffic in the communication ogy as one intimately collaborating team:
channel becomes bursty. Efficiency of such co-
operation often requires short transfer time to • Advanced Research Projects Agency – Infor-
avoid idle waiting of the receiver. This is typical mation Processing Techniques Office, Wash-
for answer- and acknowledge-type messages. ington, DC – ARPA
The length of various messages typically varies
a great deal. Transfer time for a message • Bolt Beranek and Newman, Cambridge,
depends on the bandwidth of the channel, i.e. the Massachusetts – BBN
bit transfer rate. Large bandwidth gets messages
through fast. This would tend to make relatively • Stanford Research International, Menlo Park,
poor use of the channel. It would be idling much California – SRI
of the time. More bursty traffic means less effi-
cient use of the channel because of more idling • University of California, Los Angeles – UCLA
time. A packet switched channel may be used by
a multiplex of packet streams. It may be espe- • Information Sciences Institute, Marina del
cially attractive to mix packet streams with dif- Rey, California – ISI
ferent transfer time requirements. Urgent packets
slip through fast while packet streams of lower • Linkabit Corporation, San Diego, California
In a packet switched network transfer time requirement can wait and make use – Linkabit
each leg may carry a mixture of otherwise idle periods.
of traffic streams belonging • Comsat Corporation, Gaithersburg, Maryland
to several different “con- – Comsat
versations”. Each packet is
addressed and has necessary • Massachusetts Institute of Technology,
identification with it Cambridge, Massachusetts – MIT
Packets
• Norwegian Defence Research Establishment,
Line x A to B
Kjeller, Norway – NDRE.
Dialog
Line y B to A Among these groups the company BBN had
many central and decisive roles in the develop-
Other traffic ment. BBN was responsible for the daily opera-
Line y in between
16 Telektronikk 2/3.2001
tion of the network. A Network Control Center administrations. Some Swedish researchers
– NCC – at BBN supervised the traffic and state showed interest in Arpanet, but did not partici-
of every node in the net. It was important for pate in the development. UCLA contributed
efficiency of the operation and the experiments strongly in the satellite work in addition to the
that each node (IMP, Interface Message Proces- groups at Comsat, UCL and NDRE. It resulted
sor or TIP, Terminal Interface Message Proces- in the satellite channel access protocol called
sor) in the entire net could be reprogrammed CPODA (Contention Priority Oriented Demand
remotely from NCC. New ideas and variations Access). This form of satellite communication
of protocols were tried all the time. Data from has had limited use up to now.
the experiments were recorded and sent via the
net to the responsible experimenters at their In the early 1970s the Arpanet consisted of both
home locations and to other interested groups. leased lines, mostly of 56,000 bits per second
Programs could be tested and errors corrected capacity, and of packet radio nets, mainly one in PSPWG meetings 1974 – 81.
from the NCC. As the network grew and traffic Hawaii and one in the San Francisco Bay area. The Packet Switching Protocol
from connected universities became significant ARPA now suggested developing packet Working Group meetings
“natural traffic” could be used for experiments switched satellite channels as a new information- during the most active period
in addition to synthetically generated traffic. carrying medium especially for use in resource of development
Telektronikk 2/3.2001 17
sharing computer networks. They expected, sim- TIP was placed at NORSAR, which resided in a
ilar to NDRE, that to be of special interest to civilian building just outside NDRE’s fence.
Norway. NDRE’s director Finn Lied, research Hence, access to the TIP was unrestricted, unlike
superintendent Karl Holberg and research engi- NDRE’s buildings which were located on mili-
neer Yngvar Lundh were positive to the pro- tary grounds. Lundh, backed by ARPA, made
posal. The Norwegian participation in the col- efforts to create interest in the Arpanet experi-
laboration started in 1972 and was led by Yng- ments at other establishments, notably the neigh-
var Lundh. A “Terminal Interface Message Pro- bouring large computer centre shared by the
cessor” – TIP – was provided by ARPA and University of Oslo and some other academic
installed in 1973. A TIP could connect both to institutions. During the 1970s such interest was
host computers and directly to simple interactive next to non-existent, perhaps due to generally
terminals. low political esteem of defence related activities
in that period of time, despite the basic research
ARPA already had a leased line of 9,600 bits per nature of this networking research and develop-
second between Washington and NORSAR, a ment. When the NDRE TIP (sometimes referred
seismic observatory at the NDRE site at Kjeller, to as the NORSAR TIP) had been established,
Norway, the result of another earlier collabora- interested NORSAR staff began to investigate
tion project between (another part of) ARPA and the possibilities for exchange of seismic data
NDRE. That opened a good opportunity for the through Arpanet as an alternative to their tradi-
two divisions of ARPA to co-operate, thus en- tional data exchange connection. As already
abling both co-operation in international net- mentioned they had a leased line for routine data
working and improvements for the seismic co- exchange as part of co-operation on seismic
operation with Norsar. The 9,600 bits per second research with peer institutions in the US.
line had a multiplexer installed to create two
independent channels. The new channel was for Increasing Interest
use by the Arpanet computer networking experi- Most universities, both in Norway and else-
ments. Another line was leased between Kjeller where, kept well away from the ARPA-collabo-
and London where another TIP was installed at ration during the 1970s. This situation slowly
UCL. This use of the seismic line thus made it began to change during the 1980s, because of a
economically feasible to extend the Arpanet to change in prevailing political attitudes, or for
Norway and England. other reasons. If nothing else, many academic
people discovered the convenient communica-
To build a Norwegian group took some time tions offered by the Internet. The network gradu-
because of lack of funding. It was hard to con- ally became global.
vince Norwegian financing sources of the impor-
tance of computer networking. For the first two Commercial traffic was prohibited in the
years Lundh’s group consisted of two of his Arpanet from the outset and that was still the
graduate students besides himself. In 1975 Paal rule as the network changed into Internet. The
Spilling, a Ph.D. in nuclear physics looking for a network was an experimental facility supported
currently more active field of research, was for research purposes. The ban on commercial
assigned to Lundh’s project. Later on, some traffic was lifted in 1991. From then on the num-
other well-qualified engineers were assigned, ber of connected computers and the aggregate
similarly available in NDRE’s personnel budget. traffic began to grow exponentially. In the early
Persistent invitation by NDRE to NTA’s 1990s such numbers doubled every seven
research establishment to participate resulted in months, approximately.
the free loan for experimental purposes of a
spare channel in the Intelsat IV satellite and a From 1994 a few articles in the general press
spare line between NDRE and the existing Scan- began to mention the Internet as an interesting
dinavian satellite earth station at Tanum, Swe- phenomenon. Since then of course, Internet soon
den. This experimental facility including a Satel- flew all around the world as a household word
lite Interface Message Processor – SIMP – pro- everywhere. From practical obscurity to com-
vided by ARPA was established in mid 1975. mon knowledge and use world-wide in less than
ten years is a remarkable if not unique develop-
It was the enthusiastic interest of NDRE’s re- ment in technological history.
search engineers and management for resource
sharing networks and new forms of communica- Transfer techniques and computer co-operation
tions that was the decisive factor and driving techniques that are basic to the Internet are
force of NDRE’s participation. Misunderstand- rather alien to traditional forms of telecommuni-
ings have prevailed in some comments about cation. The established telecom operating com-
NORSAR’s role in the development. The facts panies demonstrated little understanding of
are that NORSAR staff did not participate in the Internet technology. That attitude did not change
development of Internet technology. The NDRE appreciably until the mid 1990s. But from then
18 Telektronikk 2/3.2001
on telecom operators world-wide have become Transmission will make use of traditional chan-
aware of its great potential and they study it and nels as well as others that we have only thought
investigate ways and means for its exploitation of in special contexts. That comprises TV cable,
on broad fronts. local radio nets in many forms and sizes, and
local area cable nets of various types including
Visions optical fibres.
Computer- and networking development has led
to new applications. Computers can exploit In short: Internet-technology is capable of meet-
Internet-technology for co-operation. We can ing many different requirements for traffic types
expect Internet-technology to be employed for and can exploit many different information-car-
further improved telecommunications. That will rying media. The comprehensive development
no doubt be the case for some telephone traffic, that proposed, analysed and exercised so many
distribution of text, sound and images, including possibilities and tested them so thoroughly
moving pictures, and many new applications and throughout the whole decade of the 1970s laid
innovations. the foundation for the rapid growth of applica-
tions and its future importance.
Telektronikk 2/3.2001 19
Internet Protocol and Transport Protocols
TERJE JENSEN
The Internet Protocol suite has emerged as a pivotal component during the last decade. The basic
formats and protocol mechanisms for the protocols related to the Internet Protocol and its common
transport protocols are described in this paper.
0 4 8 16 19 24 31
Source IP address
Destination IP address
Options Padding
Data
20 Telektronikk 2/3.2001
below). The Length field (4 bit) gives the length 0 3 4 5 6 7 Figure 2 Format of the Type
of the header in number of 32 bits words. Fre- of Service field
Precedence D T R Unused
quently this contains the value 5 indicating 20
bytes (when no options are included).
The 8 bit Type of Service (ToS) field gives indi- tion in the routers. Hence, the value is often used
cations of how the packet should be handled. The as a hop counter.
original format of this field is given Figure 2.
The Protocol field specifies the higher-level
The three first Precedence bits (values 0 to 7) protocol (e.g. TCP or UDP). The field called
give a kind of priority, allowing a sender to indi- Header checksum is used for detecting bit errors
cate the priority of delivering the packet. When in the packet header. The fields Source IP
the D bit is set, a short delay is requested. When address and Destination IP address contain the
the T bit is set, high throughput is requested. IP addresses (32 bit).
Setting the R bit indicates that high reliability
is requested. In case a router has a number of
routes on which a packet can be forwarded, val- Box A History of ToS
ues of the D, T and R bits can be used when The history of the ToS octet for IPv4 can be found in [ID_ecn]. It goes as
choosing which route to use. For instance, if a follows:
medium capacity wireline path and a high capac-
• RFC 791 defined the ToS octet in the IP header. In RFC 791, bits 6 and 7 of
ity satellite-based path are available a packet
the ToS octet are listed as “Reserved for future Use”, and are shown set of
having the D bit set could be forwarded on the
zero. The first two fields of the ToS octet were defined as the Precedence
wireline path while packets having the T bit set
and Type of Service (TOS) fields:
may be forwarded on the satellite-based path.
The interpretation of the ToS field has changed
as outlined in Box A. 0 1 2 3 4 5 6 7
precedence TOS 0 0 RFC 791
The field called Total length gives the length of
the IP packet in number of bytes (including both • RFC 1122 included bits 6 and 7 in the TOS field, though it did not discuss
the header and the data). any specific use for those two bits:
0 1 2 3 4 5 6 7
The fields in the subsequent 32 bit line are used
for fragmentation control. The Identity contains precedence TOS RFC 1122
an integer that identifies the packet. The inten-
tion is to allow the destination to gather all frag- • The IPv4 ToS octet was redefined in RFC 1349 as follows:
ments as the Identity field specifies which infor-
0 1 2 3 4 5 6 7
mation unit a packet belongs to. The low order 2
bits of the Flags field contain the fragmentation precedence TOS MBZ RFC 1349
control. The first bit says whether or not the
packet can be (further) fragmented. The next bit where bit 6 in the ToS field was defined for “minimise monetary cost”. A motiva-
tells if this is the last packet belonging to an tion for this was the increasing commercialisation of IP-based networks, and
information unit. The Fragment offset field gives some might still ask for “free-of-charge” transfer of packets. In addition to the
the offset of the fragment in the packet in the precedence and Type of Service fields, the last field, MBZ, Must Be Zero, was
original information unit (given in units of 8 defined as currently unused. RFC 1349 stated that “the originator of a datagram
bytes). sets the MBZ field to zero unless participating in an Internet protocol experi-
ment which makes use of that bit.” Furthermore, the 4 bits are considered as
The Time field specifies how long (e.g. in time values meaning (1000 – minimise delay, 0100 – maximise throughput, 0010 –
ticks) the packet is allowed to remain in the net- maximise reliability, 0001 – minimise monetary costs) – other values use
work. In case that time has elapsed, the packet default routing/forwarding.
is discarded. This may for instance reduce the • RFC 1455 defined an experimental standard that used all four bits in the
amount of packets transported and arriving too TOS field to request a guaranteed level of link security.
late at the destination or being looped in the net-
• RFC 1349 is obsolete by “definition of the Differentiated Services field (DS
work. As it is challenging to synchronise all
field) in the IPv4 and IPv6 headers”, RFC 2474, in which bits 6 and 7 of the
routers, the value in this field could simply be
DS field are listed as Currently Unused (CU). The first six bits of the DS field
decreased by one for each hop (assuming one
are defined as the Differentiated Service Code Point (DSCP):
unit of time per router). Commonly, seconds is
used as time unit, implying that a value of max 0 1 2 3 4 5 6 7
255 sec (4 minutes and 15 seconds) can be
DSCP CU RFC 2474
stated. As each router has to reduce the value
with at least one tick, one second per router This shows that assuming a specific interpretation of that octet in the IP header
might then be assumed, which is rather long. might lead to unintentional actions.
This would however depend on the implementa-
Telektronikk 2/3.2001 21
• support more hosts, even with inefficient
Box B Type Length Value-Formatting
address space allocation;
A type-length-value (TLV) format is commonly applied in protocols for each of
the fields/attributes. This is applied when a number of optional attributes can • reduce the size of routing tables;
be included in a packet. As the name suggests, three fields are then given as
depicted in Figure Box B-1. • simplify the protocol, to allow routers to pro-
cess packets faster;
Type Length Value
• provide better security (authentication and
Figure Box B-1 TLV formatting
privacy) than IPv4;
The first field gives the type (of optional) attribute, that is identifying the attribute.
Then, the next field tells how long the attribute is, e.g. measured in number of • pay more attention to type of service, particu-
octets. The last field contains the value of the attribute itself. Naturally, when lar for real time data;
only a fixed length is allowed for an attribute, the Length field could be omitted.
In case an attribute is mandatory and its position given, the Type field is fre- • aid multicasting by allowing scopes to be
quently omitted. specified;
This way of formatting allows for flexibility when including attributes in each
of the packets, as well as potential further enhancements by defining new • make it possible for a host to roam without
attributes. changing its address;
A number of options can be included, contained • permit the old and new protocols to coexist
in the Options field. These options are for exam- for years.
ple used for testing and fault detection and local-
isation. Each option consists of one octet code This resulted in version 6 of IP, IPv6, as de-
field, one octet length field and a set of data scribed in [RFC2460]. The main motivations for
octets. Options can for example be used for specifying IPv6 compared to version 4 were:
recording the route (each router along the path
adds its address), specifying the route a packet • More addresses and addressing capabilities.
should follow (in strict or loose sense) and for IPv6 has 128 bit addressing (compared to 32
recording the time a packet is handled by a bit for IPv4). Addressing hierarchy and other
router (time stamp inserted). The options are grouping of addresses can also be extended.
commonly given according to a type-length-
value format, see Box B. • Simplified header format. Some of the fields
in the IPv4 header have been made optional.
The Padding field represents bytes containing
zeros that may be used to ensure that the packet • Better support for extensions. Further options
header is a multiple of 32 bits. The Data field can be introduced.
contains the higher level information, like trans-
port protocol and user data. • Flow labelling. By introducing the flow field,
packets belonging to a traffic flow can be
2.2 IP version 6 explicitly identified, e.g. when they request
In recognition of a growing need for upgrading special handling.
capabilities of IP, work was initiated to devise a
Figure 3 Header format “new” protocol. The major goals of this protocol • Improved security capabilities. Extensions are
of IPv6 were to (ref. [Tane96]): added to support authentication, integrity and
confidentiality.
22 Telektronikk 2/3.2001
3. Another feature with IPv6 is that so-called Each extension header should only be included
jumbograms can be supported by using the hop- once, except the destination options header that
by-hop extension header (normal packets are should not be given more than twice; once
limited to 64 kbyte). before the routing header and once before the
upper-layer header, see below. In case tunnelling
The header format of IPv6 is depicted in Figure is used, the outer header could be another IPv6
3. In addition to the basic format a number of header, again containing its separate set of ex-
options can be included as described later. tension headers. Most of the options within a
header follow a TLV-formatting, see Box B,
In the same way as for IPv4, the Version field with 8 bits for the type field, 8 bits for the length
gives the version number, i.e. equal to 6 here. field and a variable value field.
The Traffic class field indicates traffic class or
priorities for packets. It was intended that this The following sequence of extension headers is
field could be used similar to the ToS/DS field recommended, ref. [RFC2460]:
for IPv4, see Box A. The 20 bit field called Flow
label contains an identifier of the packets be- • IPv6 header as depicted in Figure 3.
longing to the same flow. A flow is said to be a
sequence of packets sent from a particular source • Hop-by-hop options header containing op-
to a particular (unicast or multicast) destination tional information that is to be examined in
for which the source may ask special handling every node along a packet’s path. This is not
by the intermediate nodes. The nature of the spe- further elaborated in [RFC2460].
cial handling can be conveyed by a control pro-
tocol (e.g. RSVP or similar) or carried by infor- • Destination options header to be processed by
mation within the packets. A flow is uniquely the first destination that is given in the IPv6
identified by the combination of source address destination address field and subsequent desti-
and a non-zero flow label. Hence, assigning a nations listed in the routing header. The infor-
zero flow label to a packet by a source, tells that mation in this header is not further detailed in
the packet does not belong to any flow. [RFC2460].
The Payload length field gives the length of • Routing header is used by a sender to list a set
the packet following the basic IPv6 header, in of intermediate nodes that a packet has to pass
octets. Any extension header fields (options) through. This is similar to IPv4 loose source
are considered as part of the payload. and record route option. The addresses of the
intermediate nodes (and the final destination)
The Next header field specifies the protocol are given as a list of IPv6 addresses in this
header following (e.g. TCP, UDP or any of the extension header. By having a counter that is
header extensions). The Hop limit field contains increased for each node, the node can find
an integer that is decrement by one for each node which node that is the next one. Then, the
that forwards the packet. If the value becomes address of the next node is inserted in the Des-
equal to zero, the packet is dropped. This basi- tination address field in the IPv6 basic header,
cally replaces the time field in IPv4 realising the see example in Figure 4. Dividing the Header
way it was implemented by most IPv4 routers extension length by 2 gives the number of
anyway. The Source address and Destination addresses.
address fields contain the addresses of the
sender and the receiver of the packet, respec- • Fragment header is used when a packet larger
tively, each 128 bits long. then the path MTU is to be sent. Unlike for
IPv4, the source node is the only one frag-
The optional fields are contained in separate menting packets. The fragment header in-
headers, where the Next header field specifies cludes a fragment offset (relative to the start
which header type that follows. Most extension of the original packet) and a unique identifier.
headers are not processed in the intermediate When a packet is to be fragmented, all unfrag-
nodes along a path, only in the source and desti- mentable parts of the packet are repeated in all
nation node. One exception is given for the Hop- fragments. The unfragmentable parts consist
by-hop option header as explained below. of all fields of the IPv6 packet header and any
extension headers up to and including the
The extension headers should be processed in routing header, if present. Then each of the
the same order as they are given. All extension fragments consists of a repeated unfrag-
headers begin with a Next header field, 8 bits as mentable part, the fragment header and the
for the basic IPv6 header. As several of the ex- fragment itself, see Figure 5.
tension headers may have a variable length, a
Header extension length field is also given for • Authentication header, see [RFC2402].
most of them.
Telektronikk 2/3.2001 23
S N1 N2 D packet encapsulated within an IPv6 packet. The
forwarding path between the source and the des-
Source address = S Source address = S Source address = S
tination of the tunnel packet is called an IPv6
Destination address = N1 Destination address = N2 Destination address = D tunnel. For the encapsulated packet, such a tun-
Routing header: Routing header: Routing header:
nel can be seen as a virtual link, as depicted in
Header extension length = 4 Header extension length = 4 Header extension length = 4 Figure 6. Tunnels looking like virtual point-to-
Segments left = 2 Segments left = 1 Segments left = 0
Address [1] = N2 Address [1] = N1 Address [1] = N1
multipoint links may also be composed.
Address [2] = D Address [2] = D Address [2] = N2
A tunnel is unidirectional. Two such tunnels can
Figure 4 Example of changing the routing header information along a packet’s path be combined to have a bidirectional tunnelling
between the same two end-nodes.
24 Telektronikk 2/3.2001
(destination unreachable, packet too big, time side allows a number of packets to be sent
exceeded, parameter problem) and informational before being acknowledged, increasing the utili-
messages (echo request, echo reply). sation of the network. In contrast to UDP, TCP
is connection-oriented. That is, prior to sending
4 User Datagram Protocol data a TCP connection is established between
– UDP the two end-points.
Avoiding addressing each of the processes util-
ising IP explicitly, protocol port numbers are TCP was specified to support a dependable flow
introduced as explained in Section 6. Each pro- of user data to be carried by IP packets, that is,
tocol port is identified by an integer. To commu- over an unreliable network. TCP was initially
nicate with a remote process, the destination IP defined in [RFC793], and some corrections and
address and port number of the process have to extensions described in [RFC1122] and
be known. Then, for a connectionless protocol [RFC1323], respectively. A TCP entity com-
this information has to be included in every mes- monly accepts a flow of user data and divides it
sage. Hence, while IP addresses commonly refer into packets smaller than 64 kbytes (commonly
to machines/IP layer processes, further identi- 1500 bytes are used), and sends each packet to
fiers must be used to identify the transport pro- the IP entity. As a network has its maximum
cess. transfer unit (MTU), this value is commonly
respected by the TCP entity when deciding upon
Two protocols dominate in the transport layer; the packet size in order to avoid fragmentation
Transmission Control Protocol (TCP) and User in the IP layer. At the receiver side, the IP packet
Data Protocol (UDP). The former is connection- is transferred to the TCP entity that reconstructs
oriented while the latter is connectionless. the original user data flow.
Simplified, UDP can be seen as placing a short TCP uses a sliding window mechanism for effi-
header in front of the user data before putting it cient transmission and flow control. Sending
into an IP packet. Hence, the User Datagram multiple packets before an acknowledgement
Protocol, UDP, is seen as one of the simplest has to arrive at the sender increases the transfer
transport protocols utilising IP. The format of rate and therefore the link utilisation. As the
the UDP header is depicted in Figure 7. window has a limited width, it can also be used
to limit the data volume that can be sent and
As depicted, the UDP header is divided into four therefore the transfer rate. The window size to
16 bit fields. The Source and Destination ports use depends on conditions in the network or the
identify the UDP processes at the two ends (fill- receiver (controlled by reporting on window
ing in the Source port is optional). The Length width to be used and delaying acknowledge-
field gives the number of bytes in the UDP ments). Moreover, as the sender is adjusting the
packet (sum of header and data). The UDP window width based on the packet dropping
checksum field can be used to detect bit errors (lack of timely acknowledgements), dropping
introduced in the header and user data. A pseudo packets in the network during congestion will
header is added before the checksum is calcu- also limit the sender’s transmission rate. Figure 7 UDP header format
lated allowing the receiving process to check
that the correct destination and protocol port
have been used.
0 16 31
Examining the fields in the UDP header, it is
Source port Destination port
recognised that UDP provides an unreliable con-
nectionless delivery service based on IP. How- Length UDP checksum
ever, UDP adds the ability to multiplex several
processes on a given host, see Figure 8.
5 Transmission Control
Protocol – TCP
Several applications are asking for more reliable Port i Port j Port k
transfers than UDP can provide. For those, TCP
can be used. TCP provides a reliable transfer ser-
vice, as packet loss does not need to be dealt UDP-
with by the application. Two basic features are demultiplexing
Telektronikk 2/3.2001 25
0 4 8 16 24 31
The Checksum is calculated in a similar manner
Source port Destination port as for UDP by appending a pseudo header.
Sequence number
Note that acknowledgements, windows, etc.
Acknowledgement number refer to volume/byte and not to number of seg-
Window ments. The TCP acknowledgement scheme is
Offset Reserved Code
called cumulate as it reports how much of the
Checksum Urgent pointer stream has been well received. A motivation for
Options Padding this is that it is simple to implement. In addition,
a lost acknowledgement does not necessarily
Data lead to a retransmission. On the other hand, the
sender would not receive information on which
information that is successfully received and
may prepare for retransmitting all segments
starting with the one being lost.
Figure 9 TCP segment format 5.1 TCP Format
The unit of transfer between two TCP layers is 5.2 TCP Connection Handling
frequently called a segment. Segments are ex- In order to establish a TCP connection three
changed to establish connections, to transfer user messages are commonly exchanged as illustrated
data, to send acknowledgements, to advertise in Figure 10. In the two first messages the flag
window size and to release connections. The for- called SYN in the Code field is set. In the two
mat of a TCP segment is illustrated in Figure 9. last messages the ACK flag as part of the Code
field is set.
The TCP header starts with the Source port and
the Destination port, similar to the UDP header To close a TCP connection, the FIN flag (part
format. The Sequence number identifies the of the Code field) is set. The receiver acknowl-
position in the sender’s byte stream of the data edges the segment and the session is over.
in the segment. The Acknowledgement number A TCP connection is unidirectional although
identifies the position of the highest byte that acknowledgements are transferred in the oppo-
the source has received. Note that the sequence site direction.
number refers to the flow in the same direction
as the segment, while the acknowledgement The units of user data seen at the sender side and
number refers to the stream flowing in the oppo- the receiver side may differ. For instance, at the
site direction as the segment. The Offset field sender side a TCP entity may receive two blocks
contains the integer specifying the offset of the of 10 kbyte, while at the receiver side, the TCP
data portion in the segment. This is needed as entity delivers 20 blocks of 1 kbyte. Further-
the length of the Options field varies. After the more, the TCP entity may collect user data
Offset field, 4 bits are reserved for future use. before sending it, unless a Push flag is used or
Urgent data is indicated. Then the information
The Code field gives the contents of the segment is sent without awaiting further user data.
by setting 6 flags (urgent pointer is valid – URG,
acknowledgement field is valid – ACK, a push is To accommodate interactive users, TCP pro-
requested – PSH, reset of the connection – RST, vides a push operation that can be used to force
synchronise sequence numbers – SYN, sender delivery of bytes (the PSH flag as part of the
reached end of its stream – FIN). Code field is set in the segment). An example of
this is when TCP is used to transfer keystrokes.
The TCP layer at the receiver uses the Window
field to advertise how much data it is willing to Similar to UDP, TCP has also some port num-
Figure 10 Messages accept. Having the Urgent pointer field allows bers that are reserved, although most ports are
exchanged for establishing TCP to specify that some data is urgent. The available for dynamic binding. Port numbers
a TCP connection value shows where the urgent data is located. below 256 are called well-known ports and are
reserved for “standard” services, like FTP and
Telnet. Having the sender and receiver aligned
a pair of sockets sets up a TCP service. Each of
source destination
SYN-flag, seq = x the sockets has a socket address consisting of the
IP address (32 bit or 128 bit) and a port number
(16 bit). A TCP connection can then be identi-
= y, ack = x + 1
SYN-flag, ACK-flag, seq fied by the socket addresses at both ends,
(receiver_socket number, sender_socket num-
ACK-flag, ack = y + 1 ber). A socket can be used for a number of paral-
seq = sequence number lel flows. All connections are full duplex and
ack = acknowledgement number point-to-point.
26 Telektronikk 2/3.2001
When a segment has been transmitted by the Another problem is the so-called silly window
sender, a timer is started. If this timer expires syndrome. This may occur when data is passed
before the data in that segment is acknowledged, in large blocks, but an interactive application at
the segment is assumed lost and is to be retrans- the receiving side reads the data in small por-
mitted. Which timer value to use could have a tions (e.g. single byte) at the time. So, when the
major influence on the efficiency of the transfer. receiver’s buffer is full, a window size of 0 is
Therefore, TCP estimates the round trip time by announced. Then, the application removes a
measuring the time elapsed from sending the small unit, allowing for the receiver to announce
segment until the segment is acknowledged. a window of the same small unit. This may
This value can be adapted during the session, immediately trigger the sender to transmit a
as described in the next sections. small unit (with TCP header and IP header),
reducing the window size to 0 again. This leads
5.3 TCP Transmission Policy to low efficiency as small packets are trans-
The window field in the TCP header is used to ferred. A proposed solution is to prevent the
announce how much data the sender may trans- receiver from announcing window sizes of such
mit on the connection without receiving an small units. For instance, the receiver may not
acknowledgement. Setting this field by the send a window update that is less than the maxi-
receiver informs the sender of the volume of mum block size advertised during connection
data that can be used. For instance, say that a establishment or its buffer is half full. In addi-
receiver has a 32 kbyte buffer. If the sender tion, the sender may also be restricted from
transmits a 24 kbyte block, the receiver will sending small packets, e.g. when the window fits
acknowledge this block and announce a window a full block or at least half the receiver’s buffer.
of 8 kbyte. If the sender then transmits an 8
kbyte block, it will be acknowledged, but the Much of the congestion management in today’s
window size will now be set to 0 (assuming the IP-based networks is placed on capabilities of
application in the receiver has not removed data the TCP. The congestion control applied adjusts
from the buffer). This means that the sender is the transmission rate. Setting the window size
not allowed to transmit more to this receiver (for is central for this. The first step, however, is to
this connection) until a higher window size is detect the congestion. For this lost packets are
announced (except for so-called urgent data). used, e.g. detected by acknowledgements not
received before the timeout value has elapsed.
Observe that the sender is not required to trans-
mit the data as soon as it appears in its buffer. A suitable window size is assigned when a con-
Neither is the receiver required to acknowledge nection is established. For instance, the receiver
the data as soon as the data is received. This is to can specify a window based on its buffer size.
avoid, for example, situations arising when Tel- When the sender keeps within this window,
net is used to transfer keystrokes and responses. packets should not be lost at the receiver side,
In case the keystrokes were to be transferred but rather to congestion/errors inside the net-
immediately, much overhead (TCP header and work. Basically, two potential problems could
IP header) would be associated with each key occur; related to receiver and related to network.
that was pushed. Nagle’s algorithm has been Therefore, two windows could be thought of; the
devised addressing this: window granted by the receiver and a congestion
window. Each of these windows gives the num-
When data appear at the sender one byte at a ber of bytes that the sender may transfer. The
time, just send the first byte and buffer all the effective number of bytes that can be transmitted
rest until the outstanding byte is acknowl- before being acknowledged is the minimum of
edged. Then send all the buffered characters the two window sizes. When a connection is
in one TCP block and start buffering again established the sender’s congestion window is
until they are all acknowledged. initialised to the size of the maximum segment
that can be used. It then sends one maximum
This is assumed to balance the delay/waiting segment. If this segment is acknowledged before
time observed by the user and protocol/band- timeout, the sender adds one segment (counted
width efficiency. The algorithm also allows a in number of bytes) to the congestion window,
new packet to be sent if enough data is present making it two maximum segment sizes. Then
to fill half the window of a maximum block. two maximum segments can be sent. For each
Although often useful for keystrokes, Nagle’s of these segments acknowledged, the congestion
algorithm may be less useful for depicting window is further increased by one segment
movements of a mouse that are controlled and size. Therefore, when the congestion window is
reflected from a remote host as the mouse cursor k segments, if all k are acknowledged on time,
could move rather erratically. the congestion window is increased by k seg-
ment sizes, that is, effectively doubled. This is
Telektronikk 2/3.2001 27
congestion window (kbyte)
1. Initialise cwnd to one segment and ssthresh
to 65535 bytes.
88
timeout 2. The TCP output routine never sends more
80
than the minimum of cwnd and the receiver’s
72
announced window.
64 threshold
3. When congestion occurs (timeout or duplicate
56 acknowledgements), one-half of the current
48
window size is saved in ssthresh. Further-
more, when a timeout occurs, cwnd is set to
40 threshold one segment.
32
4. When new data is acknowledged, cwnd is
24 increased as: i) in slow start (cwnd is less or
equal to ssthrresh) increase by one segment –
16 in effect a doubling of the window for each
8 round-trip time; ii) in congestion avoidance
increase by segsize*segsize/cwnd (segsize is
the segment size), which is a linear growth.
28 Telektronikk 2/3.2001
Karn’s algorithm, a feasible approach is not to timer. If this timer expires, a probe packet is sent
update RTT on segments that have been re-trans- to the receiver, who replies with the window
mitted, but instead double the retransmission size. If the size is still zero, the persistence timer
timer until the segments get through the first is set again.
time.
The keep alive timer is sometimes used when a
As mentioned above, TCP uses a retransmission connection is idle for a long time. This timer is
timer to ensure data delivery upon missing ACK used to check if the other side is still there. If a
messages. The duration of this timer is referred reply is not received from the other side, the
to as the retransmission timeout (RTO). A basic connection is released.
algorithm for computing the RTO is described in
[RFC2988]. A TCP sender maintains two state The last timer present in several TCP implemen-
variables, smoothed round-trip time (SRTT) and tations is used during connection release to make
round-trip time variation (RTTVAR). A clock sure that all packets belonging to a connection
granularity of G is assumed. Then, the following have arrived (or been lost).
five rules are to be obeyed:
5.5 TCP Friendly Rate Control
i) Until a round-trim time (RTT) measurement In a best-effort IP-based network, supporting
has been made RTO should be set to a value streaming services may ask for particular con-
between (2.5 + G) seconds and 3 seconds. cerns. Such a concern is to limit the variation in
the throughput. A protocol variant to address this
ii) When the first RTT measurement, say R, has is presented in [ID_tfrc], called TCP Friendly
been made: SRTT = R, RTTVAR = R/2, Rate Control (TFRC). A drawback of having
RTO = SRTT + max(G, 4 ⋅ RTTVAR). smoother throughput is that changes in available
bandwidth are responded to more slowly. Hence,
iii) When a subsequent RTT measurement, TFRC uses a throughput equation when calculat-
say S, has been made: RTTVAR = (1 – b) ⋅ ing the sending rate also considering the loss
RTTVAR + b ⋅ |SRTT – S|, SRTT = (1 – a) ⋅ ratio and round-trip time as for ordinary TCP.
SRTT + a ⋅ S (in the given sequence), where The equation for calculating the throughput, X,
a = 1/8, and b = 1/4. Then RTO = SRTT + as given in [ID_tfrc] is:
max(G, 4 ⋅ RTTVAR).
s
X=
iv) Whenever RTO is computed, if a value less
than 1 second is obtained, RTO should be
R⋅ 2p
3 + T ⋅3⋅ 2p
8 (
⋅ p ⋅ 1 + 32 p 2 )
rounded up to 1 second.
where
v) A maximum value of at least 60 seconds
may be assigned to RTO. s is the packet size in bytes (some streaming
applications have fixed packet sizes, otherwise
Furthermore it is stated that Karn’s algorithm an average measure might be applied);
has to be used when taking RTT samples, mean-
ing that retransmitted segments must not be con- R is the round-trip time in seconds;
sidered unless the timestamp option of TCP is
applied. At least one RTT measurement per RTT p is the loss ratio;
has to be taken (unless Karn’s algorithm pro-
hibits it). T is the TCP retransmission timeout value in
seconds.
When the retransmission timer expires, the earli-
est TCP segment not acknowledged is retrans- A further simplification is suggested by setting
mitted and RTO = RTO ⋅ 2. A maximum limit T = 4R (or T = max(4R, 1 second)). An argument
may be used, as stated above. For some TCP for the equation given is that it should give fairly
implementations, SRTT and RTVVAR may be similar values to when the TCP rate calculation
cleared when a segment is retransmitted several function is applied. Basically, the transfer rate is
times (and RTO has been doubled several times). doubled or halved when an acknowledgement is
Then, when a proper RTT estimate is found these received or missed, respectively. However, mod-
variables are initialised again according to ii) ifiers are used to limit the rate variations as
above. described in [ID_tfrc].
Another timer is the persistence timer. This is 5.6 High-capacity Links and TCP
used to avoid deadlocks that can occur when the A commonly referred quantity when discussing
window size is set to 0. After receiving this win- performance is the bandwidth-delay product.
dow size, the sender initialises the persistence It is obtained by multiplying the bandwidth by
Telektronikk 2/3.2001 29
Capacity, C • Estimating round-trip delay: Having an accu-
Round-trip delay, t
rate estimate of the round-trip delay is essen-
tial to avoid unnecessary retransmission at the
same time as dropped packets are retransmit-
ted without delaying the sender too much.
Therefore, the retransmission timeout interval
Bandwidth-delay product = C • t [volume]
(RTO) has to be set properly based on esti-
mates of the round-trip time (RTT). An addi-
tional TCP option including a timestamp
allows for improved estimates of RTT. Then
Figure 12 Bandwidth-delay the round-trip delay. An observation is that the the sender assigns a timestamp to the packet
product receiver’s window should be at least as great as and the receiver returns this timestamp in the
this product. If this window is too small, the ACK segment (timestamp echoing). This
sender has to pause in the transmission waiting implies that the timestamps returned are
for the data to be acknowledged. This could related to the ACKs that advance the window
result in poor utilisation of the transmission link. avoiding the introduction of “artificial delays”
On the other hand there is rarely only one single due to sequence buffering in the receiver
sender-receiver connection present at any major (when ACKs are delayed and several seg-
link. ments are to be acknowledged, this rule is
not followed).
As transmission rates increase, the bandwidth-
delay product may very well increase for an end- Two further mechanisms are described in
to-end connection. This may ask for additional [RFC1323]; Round Trip Time Measurement
features in TCP in order to efficiently utilise (RTTM) and Protect Against Wrapped Se-
high rate links. Due to the window mechanism quences (PAWS). The former addresses estimat-
TCP performance does not only depend on the ing round-trip delays, basically by introducing
transfer rate but also on the round-trip delay. time stamps in the segments.
The bandwidth-delay product gives a measure
of the amount of data that can “fill the transfer When large amounts of packets can be on the
link” see Figure 12. Note that the bandwidth way, it may happen that sequence numbers are
may not be symmetric. Additional TCP perfor- to be used several times for the same connection
mance challenges arise as this product gets within a short time. This could cause sequence
larger. numbers to be wrapped-around and also that
“old” packets arrive after the retransmitted ones,
Three fundamental problems are, ref. possibly being mistaken for a packet belonging
[RFC1323]: to a following round of sequence numbering.
The PAWS mechanism has been proposed to
• Limit of the window size: Using 16 bits to avoid this. The same mechanism as RTTM is
specify the window size limits the largest used, i.e. timestamps inserted into the segments.
size to 64 kbyte. This can be circumvented by Basically, if a segment is received for which the
introducing an additional TCP option, called timestamp is too old, this segment is dropped.
window scale. Then the TCP window can be What is considered as too old is found by com-
interpreted as a 32 bit value by considering paring the segment’s timestamp with the time-
the scaling factor that is given in the window stamp of the recent segment updating the
scale field of a TCP SYN segment. This counter for the RTTM mechanism.
means that the scaling is fixed in each direc-
tion at the establishment of the connection. 5.7 TCP and Short Transactions
When scaling the window, the value in the For many applications a small amount of infor-
field is right-shifted a number of positions mation is to be exchanged by the end-points. An
according to the value in the window scale example may be a message containing status
field (binary shift). This is the same as saying information of a network element reported to a
that the scale factor is given as a power of two management system. Having to establish and
and coded logarithmically. Say scaling by release (as well as maintain) a TCP connection
8 = 23 means sending the value 3. for such exchanges would imply additional over-
head in terms of messages and delays.
• Loss recovery: As more data could be under
way for a large bandwidth-delay product, a An extension to TCP for supporting (short)
dropped packet may have large impact on transactions more efficiently is described in
the resulting throughput and more data might [RFC1644]. Transactions are commonly used for
be scheduled for retransmission. Selective the client-server oriented end-user applications
acknowledging packets and selective retrans- as well as for several control and management
mission could alleviate this. procedures. The objective of the TCP extension
30 Telektronikk 2/3.2001
source destination
Figure 13 Message sequence
SYN-flag, seq = x
for establishing an ordinary
Ordinary TCP TCP connection and for the
connection = y, ack = x + 1 complete transaction/TCP
establishment SYN-flag, ACK-flag, seq
transfer
ACK-flag, ack = y + 1
...................
data2
Transaction CC = n, CC.echo = k,
TCP AC K-f lag , FIN -fla g, seq = y, ack = x + 1,
SYN-flag,
is to complete the transaction by exchanging a in the reverse direction may lead to TCP ACKs
few segments in each direction, thereby reducing not arriving at the sender in time for not restrict-
overhead by explicit connection establishment ing the sending rate. Two key issues have to be
and release. addressed: i) manage bandwidth usage on the
reverse link, e.g. to limit the number and trans-
A 32 bit incarnation number is introduced mission capacity for transferring ACKs; and ii)
(called Connection Count, CC). This is intro- avoid any adverse impact of infrequent ACKs.
duced as a TCP option. The CC values are Some approaches to deal with the former are,
increased for successive connections. The ref. [ID_pilc]:
receiver of a segment can check against its list
whether or not the received segment is a new • TCP header compression; reducing the size of
one. Thus, the receiver has to keep a list of the the header.
latest used CC values for all clients (for a while,
e.g. given by twice the Maximum Segment Life- • ACK filtering; drop ACKs that may not be
time, MSL). The CC number is also echoed in needed, e.g. by dropping ACKs in the buffer
the return segment in order for the sender to cor- when a new ACK arrives.
relate the response with the original request.
• ACK congestion control; having a mechanism
An ordinary TCP establishment sequence would that indicates to the receiver that the ACK
then not be needed, see Figure 13. A minimal path is congested and the receiver’s response
sequence consists of three segments; firstly a to such an indication, e.g. using Random Early
request – SYN segment (say CC = k); secondly Detection (RED) and Explicit Congestion
a reply – SYN segment (say CC = n, CC.echo Notification (ECN), see [Jens01].
= k); and thirdly an acknowledgement segment.
In case the second segment is not a segment con- • ACKs first scheduling; placing ACKs first in
taining the corresponding flags set, an ordinary the buffer.
TCP establishment and sequence is entered.
When a transaction consists of three segments • Back pressure and fair scheduling; limiting
only, estimating the RTT could be based on sev- the amount of data packets in the reverse
eral transactions. direction.
Telektronikk 2/3.2001 31
ACK expansion node ACK compaction node get there, a path says which sequence of steps
to traverse, and a link would be a step in the
path.
data data data data data data
Referring to the configuration depicted in Figure
ACK ACK ACK ACK ACK ACK 15 a major issue is how the different port num-
bers are allocated. In principle there are two
sender receiver ways this can be done; i) universal assignment;
and ii) dynamic binding. In the former, a cen-
constrained reverse link
tralised authority is typically used to assign port
numbers and publish the results to the hosts
(could well be done hierarchically). In the latter,
port numbers are assigned when needed. This
Figure 14 Introducing ACK • Sender adaptation; when an ACK message implies that each program that needs a port num-
compaction and expansion acknowledges a number of data segments, one ber is assigned one on demand. In order to know
nodes (note these might be the could equate it to the same number of ACK the port number on a remote host, an enquiry has
receiver and the sender nodes, messages. Thus, the congestion window at to be sent to that host, which replies with the
respectively) the sender side can grow correspondingly. proper port number to use.
Making sure that the number of segments
acknowledged and not the number of ACK Typically a combination of the two ways of
messages is used would also be in line with assigning port numbers has been chosen; some
the situation on the forward direction. numbers are fixed while others are used dynami-
cally. The ports refer to identifiers used on the
• Reconstructing ACK messages; in case sender transport layer (TCP/UDP). The port identifiers
adaptation is not used, the original sender side are included in the UDP/TCP headers.
of the constrained link (forward direction) can
examine the ACK messages and reconstruct Referring to identifiers used on the IP layer, a
any intermediate ACK messages not seen. Domain Name System (DNS) is used to translate
This could be done by generating the ACK between more high-level names and IP add-
messages and putting them on the link evenly resses. For instance, the name viking.telenor.com
distributed in time. could translate into a 32 bit IP version 4 address
(and the other way around). Such a naming
A more generic technique of the latter is to intro- scheme would then be used to assign names
duce an ACK compaction and an ACK expan- throughout the IP-based networks. It also pro-
sion in the network, see Figure 14. The com- vides a large-scale example of the client-server
paction would remove any “unnecessary” ACKs concept as a DNS server would be enquired in
and the expansion would reconstruct the same order to make a translation between the name
ACKs, making it transparent for the end-sys- and the address, see examples in Figure 16.
tems. However, additional protocol mechanisms
have to be introduced to enable this. In principle, the resolution algorithm used for
the translation proceeds from the top (top-level
6 Addressing and Routing domain) and continuing down. There are two
ways of using the domain name system: i) by
6.1 Addressing and Identifiers asking the name servers one by one until the
A name identifies what an object is, an add- resolution is complete; or ii) by asking a name
ress identifies where it is, a route tells how to server to do the complete resolution (lower
Host A Host B
IP IP IP
routing/forwarding
Network Network
Interface Network Interface Interface
Figure 15 Hierarchy of
functionality/protocols User data Transport layer header IP packet header Link level header
32 Telektronikk 2/3.2001
option in Figure 16). In both cases, the requester In order to have more efficient name resolutions
forms a query that includes the name to be (as well as to increase the availability of the res-
resolved, in addition to other fields. When a olution function), local name servers are com-
server receives a request, it checks to see if the monly used. Such a local server may keep a list
name is within its area (in the data base). If so, it of all names recently being resolved (recently
translates the name into the address and appends refers to a time less than a time-to-live which
this result to the request before returning the could be set per name). Asking the local server
reply message. If the server is not able to resolve first would frequently make the resolution func-
the name, it forwards the request to the next tion more efficient as it turns out that more
name server (if a complete resolution was indi- requests are initiated for the same domain name.
cated in the request) and returns the result to the Resolving a domain name is also commonly
requester, or replies its lack of information to the referred to as name binding.
requester (if no complete resolution was indi-
cated). To initiate this procedure, all machines As seen from the example, the names/addresses
must know the address of at least one domain are hierarchical. The last part of the name (after
name server. the last period) tells which “area” out of the first/
top-level separation. For the IP-address the first
viking.telenor.com
→129...............
1 Resolve(viking.telenor.com) 2 Resolved(129...............)
3 IP packets
viking.telenor.com
→129...............
5 IP packets redcar.bt.com
159...............
2 Resolve(redcar.bt.com)
1 Resolve(redcar.bt.com) 3 Resolved(159..................)
Telektronikk 2/3.2001 33
6.2.1 Routing Algorithms
Router
Destination address XXX.XXX The routing algorithm can be considered as the
= XXX.XXX A part of the network layer responsible of deciding
which output line an incoming packet should be
forwarded on. For a connectionless service, the
B
routing has to be done for each packet, while for
Destination address
= YYY.YYY
a connection-oriented service, routing is exer-
Routing table YYY.YYY cised on the establishment of the connection.
The latter may be called session routing as the
Addresses Outgoing path
routing decision remains in force for the session.
XXX A
YYY B
The term routing refers to the process of select-
ing a path along which packets are sent. Concep-
tually, one may think of the routing table in a
router as consisting of pairs; the set of addresses,
and the outgoing path to use (as seen for that
Figure 17 Illustration of part (before the first period) has a similar mean- router). This is schematically illustrated in Fig-
routing information in a router ing. However, more “fields” are commonly ure 17. Observe that the complete destination
needed to identify precisely the “area”. An address does not need to be specified in the rout-
organisation is assigned the responsibility to ing table.
administer the name range at a certain level. For
example, Telenor would by itself assign names A distinction between routing and forwarding
within the telenor.com range. Examples of some is also essential. The latter refers to the process
top-level domain names are .com, .edu, .gov and of transferring an IP packet to an outgoing link
.org. Recently, others have also been accepted when it arrives. Hence, the routing procedure
(.biz, .pro, .info, .name, .aero, .museum and finds which information to insert into the routing
.coop). In addition, most countries have their table, while forwarding sends packets on the
own domain name. The domain names may not next hop according to the routing table data.
contain information about the physical location
of a host/machine. This is one reason for the Executing routing algorithms may require in-
need to translate the name into an IP-address. volved calculations. Therefore separating these
processes and running them on different proces-
Inverse translation from IP address to name sors may allow for higher forwarding through-
could also be asked for. In particular, this is put.
often used for names written in so-called dotted-
decimal form; e.g. abc.def.ghi.klm, where all Basic properties requested from a routing algo-
these are digits in the range [0...9]. rithm are: correctness, simplicity, robustness,
stability, fairness and optimality [Tane96]. Two
6.2 Routing major classes can be identified for routing algo-
During the initial phase of the Internet (ARPA- rithms:
NET) the names and addresses of all computers
attached were kept in a single file that was • Non-adaptive algorithms that do not use mea-
edited by hand and then distributed to every site. surements or estimates of current traffic load
By the mid-1980s it was clear that such an or topology in the routing decisions. These are
approach would not suffice any more. This goes also called static routing algorithms.
for both the capacity to update the information
(the single file) and the capacity to distribute the • Adaptive algorithms that change their routing
file to every relevant location. decisions depending on changes in topology,
perhaps also the traffic load. These may fur-
As mentioned above distinctions are made ther differ in the way the information is dis-
between names, addresses and routes; a name tributed, how frequently the routing is
indicates what one seeks; an address indicates changed and which metrics are used.
where it is; a route indicates how to get there.
The IP packets deal primarily with the addresses, A few groups of routing algorithms are e.g.
while higher-level protocols may take care of the [Tane96]:
mapping from names to addresses. The mapping
from address to route is carried out in each of the • Flooding; every incoming packet is sent on
routers examining the IP packet header. In the every outgoing link except the one it arrived
following sections, a brief overview of routing on. One may avoid too many packets by using
is given. Some more details are presented in a packet hop counter, dropping packets which
[Feng01]. have already visited the node (by keeping
track of which packets have already been
34 Telektronikk 2/3.2001
there), or selective flooding (sending on Therefore a core-based tree algorithm has
outgoing links going approximately in the been suggested where a smaller core does the
requested direction). multicasting within the core and then other
multicast techniques can be applied between
• Flow-based routing; taking both traffic load the core and the final destination. This may be
and topology into account when deciding the seen to have some resemblance with hierarchi-
routing. In case the routing is static, mean traf- cal routing.
fic load values could be used (e.g. found from
measurements). Link state routing is commonly applied within a
domain, e.g. Open Shortest Path First, OSPF and
• Distance vector routing; each router maintains Intermediate System – Intermediate System, IS-
a table (vector) describing the better “dis- IS. Commonly topology information is used
tance” to each destination (or rather set of des- (only able to tell whether links are up or down).
tinations) and the corresponding outgoing More dynamics can be reached by introducing
link. As these tables are updated by informa- other measures. To include a measure based on
tion exchanged between routers, it can dynam- delay may only cause oscillations to occur as
ically adapt to the current situation in a net- traffic tends to be sent towards paths with short
work. The “distance” measure can be number delays. These paths may then become over-
of hops, delay, queuing length, and so forth. loaded and long delays result of which other
A well-known problem is the count-to-infinity links will be announced as lighter loaded and
problem when a node goes down as this infor- then the traffic may be sent towards these, and
mation may propagate slowly. so on.
• Link state routing; the topology and all delays Therefore, other measures and constraints are
are estimated and distributed to every router in also considered, ref. [Feng01]. When several
the network. Then, a shortest path algorithm links are included in a path, the measures of the
can be used to find which path to use to reach links have to be aggregated. Aggregating metrics
each (set of) router. Four steps can be recog- depends on the parameter as described in Box C.
nised: i) discover neighbour routers and their Finding an optimal path subject to two or more
addresses (e.g. by Hello packets); ii) measure additive, multiplicative or root-mean-square is
delay (or cost) to each of the neighbours (e.g. NP-complete (cannot be solved in polynomial
by Echo packets); iii) distribute a packet to all time). Hence, heuristic algorithms are used with
other routers containing the measure; and iv) such measures.
compute the shortest path to every (set of)
router. In addition to specifying the next router, looser
routing can be applied. Then a set of routers is
• Hierarchical routing; routers may be divided listed, allowing for flexibility to decide which
into a number of regions. All routers know one to use. Further, this allows a sender to have
every other router within its region although imperfect information on the details. The set of
without knowing details of other regions. routers may also be referred to as an abstract
Information on which router to use in case a router. This is support source specific routing
packet is to leave the region has to be known, when the complete path is, more or less, strictly
though. Several levels may be used in the specified by the sender.
hierarchy depending on the number of routers,
as well as other factors, like domains, opera-
tors, etc.
Telektronikk 2/3.2001 35
Two routers that belong to different ASs are said
autonomous system autonomous system
to be exterior neighbours. The protocol exterior
exterior interior gateway neighbour used to advertise reachability infor-
gateway protocol mation to other ASs is called the Exterior Gate-
protocol
way Protocol (EGP). An EGP has three main
features: i) support a mechanism allowing two
routers to agree to communicate reachability
information (acquisition); ii) a router tests
interior gateway
protocol
whether its EGP neighbour is responding; and
iii) EGP neighbours exchange reachability infor-
mation. The reachability information is com-
monly called routing information as it is used as
a basis for deciding upon routing of packets.
Figure 18 Use of exterior and 6.2.2 Routing Protocols In order to fulfil its three features a number of
interior gateway protocols The original core routers in the ARPANET used message types are devised, like ‘acquisition’,
a protocol call the Gateway-to-Gateway Protocol ‘cease’, ‘hello’, ‘poll’ and ‘routing update’.
(GGP) to exchange routing information (every
router was then referred to as a gateway). A When two routers agree to exchange reachability
router would exchange information with every information (acquisition), they also set initial
neighbour router (which was fixed). The routing values for a time interval to be used for testing
information consisted of a set of pairs (network, whether the neighbour is alive (called a hello
distance). The distance gives the cost of reaching interval) and a polling interval that controls the
that network. Here, cost was understood as the maximum frequency of routing updates. These
number of hops, meaning that low bandwidth intervals can be changed. Moreover, they may
paths with fewer hops would be preferred be asymmetric, i.e. different values in the two
to higher bandwidth paths with more hops. directions. Considering features ii) and iii)
above, one recognises that the reachability
A set of routers can be grouped into an autonom- exchange has been separated from the routing
ous system (AS). An AS is handled by a single information exchange. A motivation for this is
administrative authority, e.g. a network operator. that reachability could change more frequently
A conceptual view on two ASs using Exterior without influencing the routing.
Gateway Protocols (EGPs) between them and
Interior Gateway Protocols (IGPs) internally is In a sense, EGP routing update messages can be
given in Figure 18. As recognised, a gateway/ considered as a generalisation of GGP routing
border router may use two different protocols, updates as they include multiple routes (com-
one within the AS and another outside the AS. pared to a single route in the GGP). Basically,
by using the routing information conveyed by
One of the first IGPs is the Routing Information EGP, a tree structure can be composed for each
Protocol (RIP), originally designed to provide router where the router forms the root.
consistent routing and reachability information
among hosts in a local network at the University Between ASs, the Border Gateway Protocol
of California at Berkeley. Using RIP, routing (BGP) is commonly used. As seen from a BGP
data for each router is broadcast to all its neigh- router, the network is made up of other intercon-
bours periodically. Each destination in the rout- nected BGP routers. Two routers are connected
ing table is included in the route updates. For if they share a common network. Three cate-
a larger network, slow convergence may well gories of networks are used, see Figure 19: i)
occur, for instance when a network portion sud- stub network that has only one connection to the
denly becomes unavailable (slow count to infin- BGP graph (no transit possible); ii) multicon-
ity). This could be alleviated by principles called nected network (could be used for transit, but
split horizon and hold down, see [Come88]. does not allow it); and iii) transit network, which
Other IGPs are OSPF and IS-IS. is used for transiting packets.
Figure 19 Network categories,
referring to BGP BGP can be said to be a distance vector protocol.
In addition to the cost to each destination, each
router does also keep information on the exact
path to be used. Information on these exact paths
is then exchanged. More information on BGP is
found in [RFC1771] and [RFC1268].
36 Telektronikk 2/3.2001
BGP applies a “hop-by-hop” routing; a BGP utilised to reduce the amount of routing informa-
router only advertises the routes to its neigh- tion to be exchanged, as similar routing mea-
bours (in neighbouring domains) that it uses sures may be applicable for all links in the
itself. BGP runs over TCP (see Section 3.4) and group. This is also related to constraint-based
uses TCP port 179. After establishing a transport routing as described in [Feng01].
connection, BGP exchanges the initial data flow,
which is the entire BGP routing table. Then, 7 Concluding Remarks
incremental updates are sent when something in The main objective of this paper was to present
the routing table is changing. Hence, periodical formats and mechanisms related to the major
updates of the total routing table are avoided to protocols in Internet. These are the IP and the
save transfer capacity. Periodic “keep-alive” TCP, although UDP is gaining stronger foothold
messages are however used to ensure that the for traffic flows carrying timing sensitive data
peer BGP process is still running. (audio and video). Several of the accompanying
papers in this issue of the Telektronikk refer to
When transit is allowed, the routing information protocol fields and procedures mentioned above.
has to be conveyed between the border nodes.
An example is the two nodes depicted in Figure References
19 c). An interior “version” of BGP may then [Come88] Comer, D. Internetworking with
be used, referred to as IBGP, not treated in any TCP/IP. Prentice-Hall, 1988.
nodes on the path between the pair of border
nodes. [Feng01] Feng, B et al. State-of-the-art of IP
Routing. Telektronikk, 97 (2/3), 130–144, 2001.
6.2.3 Routing and Traffic Engineering (This issue.)
From the routing perspective, networks are
divided into Autonomous Systems (ASs) where [ID_ecn] Ramakrishnan, K K et al. The addition
each AS is divided into Interior Gateway Proto- of Explicit Congestion Notification (ECN) to IP.
col (IGP) areas to allow for hiding and aggregat- draft-ietf-tsvwg-ecn-00.txt, Nov. 2000. Work in
ing routing information. This way of hierarchical progress.
routing allows for more efficient routing han-
dling, although from a traffic engineering per- [ID_pilc] Balakrishnan, H, Padmanabhan, V N.
spective it may hide information, e.g. on paths TCP Performance Implications of Network
used. Related to establishment of Label Switch- Asymmetry. draft-ietf-pilc--asym-02.txt, Nov.
ed Paths (LSPs) such information could be re- 2000. Work in progress.
quested, leading to the introduction of additional
features into the routing protocols, ref. [Jens01], [ID-ppro] Dovolsky, D, Bryskin, I. 2000. Calcu-
e.g. to support traffic engineering. lating protection paths and proxy interfaces in
optical networks using OSPF. draft-dovolsky-
Typical attributes identified to support traffic bryskin-cspf-pathprotect-proxy-00.txt. Work in
engineering operations are: progress.
Telektronikk 2/3.2001 37
[RFC1268] IETF. 1991. Rekhter, Y, Gross, P. [RFC2402] IETF. 1998. Kent, S, Atkinson, R.
Application of the Border Gateway Protocol in IP Authentication Header. (RFC 2402.)
the Internet. (RFC 1268.)
[RFC2406] IETF. 1998. Kent, S, Atkinson, R.
[RFC1323] IETF. 1992. Jacobson, V, Braden, R, IP Encapsulating Security Protocol (ESP). (RFC
Borman, D. TCP Extensions for High Perfor- 2406.)
mance. (RFC 1323.)
[RFC2460] IETF. 1998. Deering, S, Hinden, R.
[RFC1644] IETF. 1994. Braden, R. T/TCP. TCP Internet Protocol, Version 6 (IPv6) Specifica-
Extensions for Transactions Functional Specifi- tion. (RFC 2460.)
cation. (RFC 1644.)
[RFC2463] IETF. 1998. Conta, A, Deering, S.
[RFC1771] IETF. 1995. Rekhter, Y, Li, T. A Internet Control Message Protocol (ICMPv6)
Border Gateway Protocol 4 (BGP-4). (RFC for the Internet Protocol Version 6 (IPv6) Speci-
1771.) fication. (RFC 2463.)
[RFC1981] IETF. 1996. McCann, J, Mogul, J, [RFC2988] IETF. 2000. Bernet, Y et al. A
Deering, S. Path MTU Discovery for IP version Framework for Integrated Services Operation
6. (RFC1981.) over Diffserv Networks. (RFC 2998.)
[RFC2001] IETF. 1997. Stevens, W. TCP Slow [Tane96] Tanenbaum, A S. 1996. Computer Net-
Start, Congestion Avoidance, Fast Retransmit, works. Upper Saddle River, NJ, Prentice Hall.
and Fast Recovery Algorithms. (RFC 2001.)
38 Telektronikk 2/3.2001
Traffic Engineering Principles, Activities
and Mechanisms
TERJE JENSEN
Moving beyond the single class, best-effort IP network, most operators introduce Traffic Engineering
(TE) mechanisms. These mechanisms are fairly crucial for further operation, supporting the portfolio of
services requested.
This article gives an overview of TE concepts and mechanisms by describing taxonomy and organisa-
tion of TE activities. It is mainly drawing on results presented in an Internet draft (ref. [ID_tepri]).
Traffic Engineering:
- measurements
- characterisation
- modelling
- control
Resources Traffic
Telektronikk 2/3.2001 39
assumed to be looking for low-priced, low ser-
high vice level.
increasing
traffic load An argument in the other direction is that as one
of the current trends is that more commercial
loss activities are based on IP networks, a stronger
increasing demand for predictable services will emerge.
buffer size
This also seems to be recognised by the industry
in this area as much work is allocated to TE-
related mechanisms.
low
In this article, some of the most central themes
of TE are described. In the following chapter
short long
overall objectives, scope and resource types are
delay
described. Chapter 3 presents the activities,
processes, key components and mechanisms
together with the contexts in which the TE activ-
Figure 2 Schematic illustra- served, longer buffer sizes may apply as these ities are carried out. Some requirements on TE
tion of relations between delay would accept longer delays (and delay varia- systems are listed in Chapter 4. Chapter 5 ex-
and loss tions), although the loss requirements might not plains the TE taxonomy, while Chapter 6 elabo-
be lower. rates on further challenges in the TE and QoS
areas.
One of the primary goals of TE in an operational
network is to limit the sustained congestion. 2 TE Objectives and
A focused congestion may result from unbal- Resource Types
anced mapping of traffic flows onto the resource The main goals of traffic engineering are to
groups. Then, means can be activated to dis- improve performance for IP-based traffic while
tribute the traffic flow in a better way. TE mech- still utilising the network resources efficiently.
anisms do also allow for differentiating and In the TE framework principles, as elaborated
ensuring service levels. This would meet the within IETF, architectures and methodologies
characteristics related to the spectrum of traffic for evaluating and optimising the performance
flows. An example is to use separate real-time of operational IP networks are addressed. The
and non-real-time traffic on the buffering side, framework as described in [ID_tepri] gives both
while still using the same link capacity. Hence, the terminology (set of key terms) and the taxon-
high link utilisation is achieved, while knowl- omy (criteria for describing a system). Internet
edge of the traffic flow characteristics is ex- traffic engineering is here defined as
ploited. Delay, delay variation and loss ratio are
examples of characteristics used so far. Another that aspect of Internet network engineering
important parameter is related to dependability, dealing with the issue of performance evalua-
such as the availability of the service. This tions and performance optimisation of opera-
would also be addressed by the TE-related tional IP networks. Hence, measurement,
mechanisms, increasing the general depend- characterisation, modelling and control of
ability but also allowing for differentiation. traffic are included.
In sum, the TE mechanisms offer a set of “tools” A major objective is to improve the performance
that a network operator can tune for its opera- of operational networks, at the traffic and at the
tion, reaching better utilisation of network resource levels. This is striven for by looking at
resources while allowing predictable service traffic-related performance requirements, like
levels (differentiated and ensured). delay, delay variation, packet loss and goodput.
At the same time the network resources should
The actual need for introducing TE-related be efficiently utilised. An essential part is to
mechanisms is questioned by some. Two factors achieve reliable network operations, e.g. during
supporting this view are the traffic growth and failures. Having efficient routing configurations
the willingness to pay. For the former, it is con- is also central as these decide the way the pack-
sidered that by the traffic growth seen these days ets are distributed in the network.
there is little need for accurate procedures as
more capacity should be installed all the time. Capacity management and traffic management
Hence, additional capacity present when over- can be used for the optimisation done as part of
provisioning would fairly soon be needed any- TE. Capacity arrangement includes capacity
way. Regarding the latter factor, much traffic on planning, routing control and resource manage-
IP-based networks comes from Web browsing, ment. The resources include link bandwidth,
buffer space and computational, see Figure 3.
40 Telektronikk 2/3.2001
Traffic management includes nodal traffic con- Processing/computing capacity
trol (e.g. traffic conditioning, queue manage-
ment, scheduling) and other functions that regu-
late traffic through the network or control access Link bandwidth/transfer capacity
to network resources. These activities can be
carried out continuously and in an iterative man-
ner. The activities are commonly divided into
proactive and reactive. In the former preventive
and perfective actions can be found, while cor-
rective actions would be part of the latter. Buffer space/storage capacity
Telektronikk 2/3.2001 41
Figure 5 Elements in the demand for abstracting, formulating and solving TE
system
network context problems; v) set of administrative control
parameters that may be managed by a config-
response uration management system; vi) set of guide-
system lines for network performance evaluation,
optimisation/improvement. Traffic estimates
can be derived from customer subscription
information, traffic projections, traffic models,
and from empirical measurements. Polices for
interconnected handling the congestion problem can be cate-
resources gorised according to the criteria: i) response
time scale (long – weeks to months, e.g.
capacity planning; medium – minutes to days,
e.g. setting routing parameters, adjusting
Label Switched Path (LSP) design; short –
ps to minutes, e.g. packet processing of mark-
lems is also how to optimise the performance ing, queue management); ii) reactive versus
of a network. Solving congestion is an essen- preventive; and iii) supply side (increase
tial part of performance improvement. Han- available capacity, redistribute traffic flows)
dling congestion can be divided into demand versus demand side (control the offered traf-
side policies (restrictive) and supply side poli- fic).
cies (expansive).
• Implementation and operational context;
• Solution context; elaborating how to solve implementing the actual solutions, involving
the TE problems. This includes evaluation of planning (including a priori to determine
alternatives. This requires estimating traffic actions based on triggers), organisation
load, characterising network state, elaborating (including assigning responsibilities to differ-
solutions on TE problems and setting up a set ent units and co-ordinating activities), and
of control actions. The instruments relevant execution (including measurement and appli-
include: i) set of policies, objectives and re- cation of corrective and perfective actions).
quirements for network performance evalua-
tion and optimisation; ii) set of tools and These context descriptions may also be looked
mechanisms for measurement, characterisa- upon as gradually getting more precise and
tion, modelling and controlling traffic and closer to the implementation.
allocation to network resources; iii) set of con-
straints on the operating environment, network 3.2 TE Process Model
protocols and TE system; iv) set of quantita- A TE process model is presented in [ID_tepri].
tive and qualitative techniques and methods This is depicted in Figure 6 as an iterative proce-
dure consisting of four main steps.
42 Telektronikk 2/3.2001
ity. This may also initiate a network planning in Optimisation Figure 7 TE key components/
order to improve network design, capacity, tech- subsystem: subsystems
nology, and element configuration. Modelling and - real time and
analysing non-real time
Measurement subsystem:
The actual relations between the process model subsystem: - traffic
- network
and the context are not elaborated on in - evaluation
- resources
- monitoring
[ID_tepri]. However, considering that an early
phase is to assess conditions of the network,
most of the process model relates to an opera-
tional network. The context/setting would also
include perspectives on a longer time, e.g. allow-
ing for more aspects to be considered.
Telektronikk 2/3.2001 43
criteria. An MPLS label is then prepended to
Box A Scalability
the packets. Then, the subsequent LSRs may
The term scalability is frequently observed in the discussion on various mecha- only look at the MPLS label to decide upon
nisms. Looking up in a dictionary, scalabiltiy is simply described as to allow the forwarding treatment. A Label Switched
increase (or decrease) of something. Path (LSP) is the path between an ingress LSR
and an egress LSR on which the packets are
A common interpretation of scalability, however, is that the network equipment
sent. LSPs can be used for several purposes,
may not be able to cope with the growing number of traffic flows or other units
including load distribution, Virtual Private
used to express the amount. Hence, there is a threshold on the number of units
Networks, and multicasting.
that a network node can handle. Such an understanding may implicitly assume
that the operating point is known (i.e. the range of number of units is given). Fur-
• Differentiated Services (DiffServ). Addressing
thermore, modifying the network node, e.g. by upgrading, would also affect the
the scalability challenge related to IntServ,
capacity threshold.
DiffServ was proposed to categorise the traffic
A statement seen is that IntServ does not scale well, although this will likely fol- flows into a limited set of service classes. A
low a linear growth as a function of the number of flows, see Figure Box A-1. class is defined using different classification,
DiffServ, on the other hand, has an improved scalability as aggregates are policing, shaping and scheduling policies.
looked at. Introducing MPLS in combination with DiffServ may result in higher Hence aggregates of traffic flows are used,
demands on the nodes. alleviating intermediate routers to consider
individual traffic flows. A DiffServ field is
Required node capacity defined in the IP header (part of the ToS octet,
Intserv see [Jens01]) in order to indicate which ser-
vice class a packet belongs to.
Interpreting scalability may therefore ask for a certain tolerance in the sense that
• End-point congestion management. The IETF
inherent demands on the network nodes capacity are assumed.
End-point Congestion Management working
group is set to define congestion control
mechanisms that transport protocols can use.
A congestion manager monitors the paths of
every congestion group under its control,
lem (see Box A). Furthermore, the reservation using this information to distribute the capac-
information has to be conveyed between the ity among the traffic flows in the group.
routers. The Resource reSerVation Protocol is Besides, procedures defined as part of TCP do
one means of doing this. also address congestion control, ref. [Jens01].
44 Telektronikk 2/3.2001
4.1 Non-functional Requirements • Maintainability. It should be simple to main-
The generic non-functional requirements given tain a TE system.
in [ID_tepri] are:
• Extensibility. It should be easy to extend a TE
• Usability. This is a human factor aspect refer- system, e.g. when introducing new functions
ring to the ease of deployment and operation and when the underlying network is extended.
of a TE system.
• Interoperability. Open standards should be
• Automation. Commonly, as many functions as used for the interfaces in order to simplify
possible should be automated, reducing the interoperation with other systems.
human effort to control and analyse the infor-
mation and network state. This is even • Security. Means supporting integrity, informa-
stronger for a larger network. tion concealment, etc. have to be imple-
mented.
• Scalability. The TE system should scale well
when the number of routers, links, traffic As mentioned, some of these requirements may
flows, subscribers, etc. grows. This may imply be mandatory while others are optional for a par-
that a scalable TE architecture is applied. ticular TE system.
Telektronikk 2/3.2001 45
more interest. This addresses the selection
Box C Resilience of paths for packets and may work well with
As the multitude of services on IP-based networks increases, a differentiation of path-oriented solutions, that is LSPs.
dependability (e.g. reliability and availability) requirements is asked for. This is
sometimes referred to as resilience requirements. A resilience differentiated net- • Traffic mapping. This refers to the assignment
work would only protect traffic flows that require higher availability that would of traffic flows onto paths to meet certain
allow for more effective network resource utilisation. Basically, this could be requirements considering the set of policies
done on other layers than IP. In principle realising resilience mechanisms in relevant. A central issue arises when several
lower layers would allow for faster response, e.g. from a link is broken until an paths are present between the same pair of
alternative link is found. On the other hand, lower layers also operate on more originating and destination router. Appropriate
coarse granularity of traffic aggregates. Thus, higher layers give finer granularity means should be taken to distribute the traffic
but commonly also longer response times. according to some defined ratios, still keeping
the ordering of packets belonging to the same
Traffic flows requiring high availability may belong to so-called mission-critical
application (or micro-flow).
applications. Such applications may include all types of applications, like real-
time, elastic, etc. Therefore, applications such as multimedia as well as data-
• Measurement. Mechanisms for monitoring,
base transactions could be asking for high availability. This means that the
collecting and analysing statistical data have
resilience requirement is orthogonal to other performance variables, like delay
to be in place. Such data may relate to perfor-
and loss.
mance and traffic. In particular, being able to
A possible set of resilience classes is described in [ID_resreq]: construct traffic matrices per service class is
• High resilience requirements: Resources should be exclusively reserved on an essential part of a TE system.
an alternative path. For a 1+1 protection, packets are forwarded on the work-
ing path and the backup path. In case the working path fails, the receiver just • Network survivability. Survivability refers to
selects packet on the other path. In case of 1:1 protection, the packets are the capability to maintain service continuity
forwarded on the alternative path in case of failure on the working path. This in presence of faults. This can be realised by
asks for recovery signalling to handle unidirectional failures. rapid recovering or by redundancy. Co-ordi-
nating protection and restoration capabilities
• Medium resilience requirements: Spare resources may be shared between across multiple layers is a challenging task. At
multiple flows. The bandwidth management has to assure that enough spare the different layers protection and restoration
resources are available for a given set of expected failures. In case of a fail- would typically occur at different temporal
ure, packets are forwarded after rerouting and reservation of spare resources. and bandwidth granularity. At the bottom
• Low resilience requirements: No resources are reserved in advance. In case layer, an optical network layer may be pre-
of failure, packets may be forwarded after a rerouting and reservation phase sent, e.g. utilising WDM. Then, SDH and/or
if enough resources are available. ATM could be present below the IP layer.
Restoration at the IP layer is commonly done
• No resilience requirements: In case of a network failure in the administrated
by the routing protocols, which may require
domain, packets may be discarded/dropped. This may happen even if the
some minutes to complete. Some means being
traffic is not directly affected by the failure but rather by a rerouting of other
proposed relate to MPLS allowing for faster
traffic flows having high resilience requirements.
recovery (ref. Box B). A common suit of con-
In order to implement differentiated resilience, updates of the service implemen- trol plane protocols has been proposed for the
tation could be needed. For IntServ/RSVP corresponding attributes have to be MPLS and optical transport networks. This
carried in the signalling messages and filters/conditioners have to be available. may support more sophisticated restoration
For DiffServ activating a resilience marking may be used, like a bit in the ToS capabilities. When multiple service classes are
octet (bit 5 of the DSCP field). Resilience attributes may also be used for MPLS. present, their requirements on restoration may
These mechanisms are described for the different mechanisms in this article. differ introducing further challenges on the
mechanisms to be used. Resilience attributes
can be attached to an LSP telling how traffic
on that LSP can be restored in case of failure.
A basic attribute may indicate if all traffic
Box D Information Distribution
trunks in the LSP are transferred on a backup
In current IP-based networks several means are used to make the distribution LSP or some of the traffic is to be routed out-
of information more efficient, including: side, e.g. following the routing protocols (see
• mirroring the information meaning that the information is replicated in several Box C). Extended attributes may be intro-
places/servers. This would increase the dependability and allow for faster duced giving indications like backup LSP is to
response; be pre-established, constraints for routing the
backup LSP, priorities when routing backup
• caching the information, basically meaning that previously accessed informa- LSP, and so forth.
tion is stored in a place closer to the user (limiting the traffic and allowing
faster response); • Servers and content distribution. Location and
• load balancing having the objective to distribute the traffic/requests among allocation of content on servers have signifi-
the servers. cant impact on the traffic distribution, in par-
ticular as long as much of the traffic is similar
46 Telektronikk 2/3.2001
to client – server interactions. Hence, load bal- Control mechanisms may be manual or auto-
ancing directing traffic on the different servers matic, the latter being a goal for most. Net-
may improve the overall performance. This is work control functions must be secure, reli-
sometimes called traffic directing, operating able and stable, in particular during failure
on the application layer, ref. Box D. situations.
Telektronikk 2/3.2001 47
interval for collecting and returning the infor- • Intradomain vs. interdomain. Interdomain
mation. A similar trade-off is also seen for the traffic engineering is primarily concerned with
distributed scheme, although then the deci- performance of traffic and networks when the
sions are made by each router. A drawback of traffic flows cross a domain, e.g. between two
a centralised scheme is commonly that a sin- operators. Both technical and administrative/
gle point of failure is introduced, implying business concerns make such a TE activity
that the central function is available and has more complicated. One example is based on
sufficiently processing capacity for the the fact that Border Gateway Protocol version
scheme to work efficiently. 4 (BGP-4), being the (default) standard rout-
ing protocol, does not carry full information
• Local vs. global information. Local informa- like an interior gateway protocol (e.g. no
tion refers to a portion of the region/domain topology and link state information). In a busi-
considered by the TE system. An example is ness sense it would not be likely that two par-
delay for a particular LSP. Global information ties, being potential competitors, would reveal
refers to the whole region/domain considered. all that data of their network. Another aspect
is the presence of relevant SLAs that govern
• Prescriptive vs. descriptive. When a prescrip- the interconnection, including description of
tive approach is used, a set of actions would traffic patterns, QoS, measurements and reac-
be suggested by the TE system. Such an tions. An SLA may explicitly or implicitly
approach can be either corrective (an action to specify a Traffic Conditioning Agreement
solve an existing or predicted anomaly) or (TCA, which defines classifier rules as well
perfective (an action suggested without identi- as metering, marking, discarding and shaping
fying any particular anomaly). A descriptive rules.
approach characterises the network state and
assesses the impact from exercising various A specific TE system can then be categorised by
policies without suggesting any specific applying the criteria listed above.
action.
6 Further Issues
• Open loop vs. closed loop. In an open loop
approach, the control actions do not use feed- 6.1 Basic Questions and Factors
back information from the network. Such Several forces are influencing on the evolution
feedback information is used when a closed of IP-based networks, see Figure 8.
loop approach is followed.
A number of basic questions can be raised re-
• Tactical vs. strategic. A tactical approach con- lated to the future of Internet/IP-based network:
siders a specific problem, without taking into
account the overall solutions, tending to be ad • Will the current Internet routing mechanisms
hoc in nature. A strategic approach considers operate as steadily more hosts and networks
the TE problem from a more organised and are added?
Figure 8 Factors influencing systematic perspective, including immediate
the evolution of IP-based net- and longer-term consequences. • How is it possible to automate mechanisms
works, adapted from for storing and locating information about
[Come88] individual users?
48 Telektronikk 2/3.2001
6.2 Open Issues Related to applications. Preferably these should go hand-
QoS Architecture in-hand.
As the best effort service is the most commonly
seen in most IP-based networks, a wider range • Scalable and accurate service environment. As
of service levels is also sought. The service lev- noted, IntServ allows fine granularity follow-
els can be widened in two respects; to provide ing traffic flows, resource allocation, and con-
a service level improved from best effort, and veying information to the other end-point. The
to provide a service level which is more pre- so-called scalability, however, may be a prob-
dictable. lem. On the other hand, DiffServ scales well,
while not supporting signalling. Some effort
Basically, a few features have to be in place in is undertaken to enhance DiffServ with capa-
order to allow for differentiating service levels. bilities for signalling and reservation of
Firstly, the application has to convey the infor- resources.
mation to the network of which service level it
wants (naturally, this may also be done manu- • Service query and discovery. Prior to using a
ally). Then, resources in the network have to service, an application may need to decide if
be available to provide the service level agreed. the service can be supported by the network.
In order to ensure that resources are available, This could likely be used for initiating a nego-
some load control and resource usage/configura- tiation between the application and the net-
tion schemes have to be applied. If an applica- work.
tion request the service level for a certain traffic
flow, it also has to mark the flow in a way for • Service levels on resource handling and rout-
the network to recognise it. Commonly, there ing. Considering service levels when deciding
are also some constraints attached on the traffic upon routing and configuring resources re-
to be transferred. An alternative to handling quires that additional attributes are introduced.
individual flows is to have the network look at These attributes would describe the service
aggregates. In such a case, the IP packets have to levels, or characteristics of the resources, and
be marked in order to assign them to the proper have to be correlated with corresponding attri-
aggregate. Then, it may not be needed for the butes on the service requests. In addition, fea-
application to signal its request to the network in tures like load distribution could be achieved.
advance; it could simply start sending packets.
Thus, it would not be up to the network to report • Relations with TCP. Recognising that TCP
explicitly to the application if a service request is one of the most used transport protocols,
cannot be met, it simply has to be detected by having efficient means for controlling the
the application itself (e.g. as lost packets). This TCP flow rate is essential. TCP relies on ACK
resembles DiffServ. The former approach resem- messages in order to adjust its rate as part of
bles IntServ, allowing for a finer and closer fol- the load control. When introducing different
lowing up of the network for each application service levels, the TCP should get the proper
and traffic flow initiated. feedback on the forward direction as this is
the one to be controlled. Thus, effects in the
In order to enhance the support of differentiated backward direction should not have too much
service levels some issues are mentioned in influence on the TCP estimates of required
[RFC2990]: flow rate.
Telektronikk 2/3.2001 49
differently by different networks along a path, c) Allow establishment of agreed service level in
leading to a vast number of options. Harmon- advance;
ising the service levels may result in easier
interconnection and service provision in mul- d) Control contention for network resources such
tiprovider environments, although service lev- that the appropriate service levels are achieved;
els could also be seen as a competitive factor.
Service discovery as mentioned above be- e) Control contention for network resources such
comes even more requested for such configu- that a fair allocation is achieved (although fair
rations. Between the different networks this has not been defined);
could also ask for enhancing the set of routing
protocol attributes, including some describing f) Allow for efficient utilisation of network
the service levels supported. resources while providing a range of service
levels.
• Measuring service level and delivery. In sell-
ing a service level to a customer, it is central All these issues have to be addressed in order to
to have means in place in order to document ensure that the service levels can be provided.
that the service has been delivered as agreed. Actually, all these have to be in place in a coher-
Another purpose of such measurements could ent way to offer end-to-end service levels in
be as a basis for admission control and routing. agreed ways.
• Accounting for service levels. In case various In addition to the issues listed above, more unan-
service levels are to be offered, corresponding swered questions are found for interdomain con-
range of tariffing levels should be used as figurations, like how to efficiently handle the set
well. A technical argument is that use of more of SLAs in a multi-service and multi-provider
network resources should be reflected in a configuration.
higher tariff. Naturally, other arguments may
go against such a conclusion. This technical 6.3 Overview of Further Challenges
argument points towards application of usage- In addition to the issues discussed above, more
based charging. aspects can be looked at. The following descrip-
tion of the open issues is centred around the
According to [RFC2990] the following aspects groups depicted in Figure 9:
are included in an architecture for service level/
QoS level: • The network nodes sphere representing vari-
ous nodes involved for IP transport, e.g.
a) Control the network response such that it is routers and hosts/terminals. Various segments
consistent and predictable; of an operator’s network, including access and
core, are part of this. User terminals and rele-
b) Control the network response such that the vant parts of applications can also be included.
service level is provided as agreed: Typical issues are related to ensuring and
monitoring performance of traffic flows, con-
figuring resources, and so forth.
Regulator, vendors
50 Telektronikk 2/3.2001
• The service concerns, involving control and sources for carrying voice-over-IP (also likely
management. Functionality both in the user’s to involve gateways).
equipment and in the provider’s domain is
included. Typical issues are definition of ser- • Completion of appropriate standards. At least
vice and corresponding QoS (e.g. which on a shorter term combinations of DiffServ
parameters to apply), integration of control and MPLS are promoted for use in the core
and management, elaboration of SLAs (con- network. Hence, completion of standards
sidering multi-provider and multi-service) – within that area is needed, in particular to
between providers and towards end-users, simplify interoperability between domains.
applications capable of expressing their ser- Regarding access, IntServ may also be
vice level demands, and so forth. applied. Then, solutions are needed for this as
well, in addition to mapping between IntServ
• The business concerns, addressing processes and DiffServ/MPLS.
and (internal) models within an actor (e.g.
provider or user). Typical issues are descrip- Establishing an efficient IP-based network also
tion of internal processes for providing/deliv- requests interworking with layers below and
ering IP services, processes for collecting above IP. For example, co-ordination of func-
and storing performance data from different tions in the optical layer and the IP layer should
sources, methods for searching optimal be utilised. The same goes for applications and
arrangements for delivering services. other “higher layer” functions, like policy and
directory.
Traffic Engineering should be aware of these
issues, incorporating appropriate procedures and 6.3.2 Service Concerns
interfaces. On quite a few occasions it is seen that specify-
ing the actual service to be delivered is not done
Naturally, the above-mentioned groups are just adequately. Hence, there may be some room for
giving one, non-exhaustive, way of dividing the interpretation both by the provider and by the
various issues. A further complicating fact is that user. As more higher-level services (i.e. above
quite a few of the various issues are inter-depen- mere transport of IP packets) are “sold”, the TE
dent, not making it easy to clearly separate the mechanisms should capture even these aspects.
questions to be addressed. This makes the scope somewhat broader than
what mainly springs to mind. Some essential
6.3.1 IP Transport Concerns issues in this group are:
Several open issues for QoS related to transport
of IP packets are described in [RFC2990]. • SLA/SLS/TCA/TCS. Elaborating agreements
Although these were discussed above, they, as and specifications at the proper level of detail
well as others, are summarised in the following: which are accurate, is still a challenge. De-
signing SLAs in a multi-provider/multi-ser-
• Monitoring capabilities. How to monitor the vice environment raises additional challenges,
traffic flows, resource utilisation and QoS- like how to relate two SLAs with independent
related performance in an efficient way? This providers referring to the same access line/
includes decision on what level of granularity user. Based on different events occurring in
to look at, that is, what aggregate of flows, the network, different users may be affected.
and time-scale to apply. Furthermore, the Ways of identifying service affecting faults
monitoring results must be applicable to docu- and which users that are bothered will then
ment the conditions stated in SLAs (which be requested. Particular challenges may arise
well may refer to “higher-level” services). from avoiding scalability problems.
Monitoring results are also used for further
tuning of resource configuration and traffic • Management models. Both service manage-
handling. ment and network management have to be
completed for efficient management. Regard-
• Configuring resources. TE mechanisms are ing network management, issues like collect-
needed to properly/efficiently configure the ing monitoring data, configuring network
network resources and control the traffic load resources (e.g. for MPLS paths) have to be
such that the SLA conditions are met. This implemented. Regarding service management,
involves routing, allocation of resources (e.g. there are some suggestions for the need for
bandwidth), admission control, and so forth. more centralised management architecture,
Considering the multi-service network, this supported by stronger admit and control
is a rather complex matter where scalability mechanisms of flows at the edge of the core
might become a particular challenge. Particu- network [ID_IPsm]. Then, the end-to-end (in-
lar attention is placed on configuring re- cluding multi-domain) view should be taken
on by service management, compared to only
Telektronikk 2/3.2001 51
looking at portions of it, as is most common sought, while major negative consequences are
today. Policy-based management might well avoided. Balancing internal mechanisms and the
be applied, also accommodating the dynamics conditions stated in agreements towards any sub-
of the network and the usage/traffic flows. providers would also be part of this picture as
seen by a provider.
• Integrated control and management. To some
extent control and management procedures A few issues related to business are listed in the
may perform similar tasks, like establishing an following:
MPLS path. Therefore, figuring out efficient
ways of combining control and management • Processes and data flows. An adequate model
is needed. of processes and flows related to a provider is
needed to implement systems allowing fast,
• Applications and service discovery. Applica- accurate and automatic service provision/
tions must be upgraded to be aware of the ser- delivery. Considering that several sources and
vices and service levels offered by a network. databases may be involved, keeping consisten-
Functions for discovery and negotiation cies and collecting relevant data may be a
should therefore be present, both in the termi- challenge, in particular when the data bases
nals/applications and in the network. In addi- are managed by different providers.
tion, applications should provide estimates of
their requests from the network, like estimates • Cost – revenue analysis of related mecha-
of the traffic flow characteristics (traffic pro- nisms. There still seems to be two overall sug-
file). gestions to the QoS challenges: i) introducing
more QoS-related mechanisms; or, ii) intro-
• Controlling traffic flows. In several of today’s ducing more capacity, keeping the network/
IP-based networks, TCP is used for flow con- system simple. An analysis of this could be
trol. This should also work properly even conducted, estimating any real benefit from
when several service levels are introduced. In having ensured and differentiated IP-based
addition, controlling the traffic flow in other services.
ways may be possible. One example is using
dynamic charging schemes, which is investi- • Optimising services, resources and SLA con-
gated although not concluded on. ditions. What service classes to offer, how to
deploy the network resources optimally, how
• Completing standards. For efficient imple- to state and balance SLA terms towards users
mentation of control and management and secondary providers against the need for
regimes, standards are crucial. Appropriate own resources, are a few questions that need
standards, e.g. for RSVP, policy and SLA to be answered by a provider. Hence, methods
management, are needed. to assist a provider in searching for the
answers are needed. A user does not com-
6.3.3 Business Concerns monly specify their quality needs merely from
Deciding upon QoS and internal arrangements a communication point of view, but rather
for handling traffic are parts in the business from the consequences they envisage on their
activities. Moreover, when settling the appropri- business and human relations – the secondary
ate value parameters and utilisation of mecha- scope – if a failure occurs. This also deter-
nisms, one would likely face several trade-offs, mines the level of QoS they are willing to pay
like what level to offer at what price, which for regarding a specific service ordered.
mechanisms to implement within its domain,
and so forth. Similar trade-offs have already • Then, guidelines to a way of assisting the cus-
been parts of the business decision process. tomer in structuring the consequences that
Therefore these aspects may smoothly fit into they might envisage – both in primary and
those concerns. secondary scope – would be requested.
Carrying out business-related evaluations, the • Accounting, charging and billing. In introduc-
market situation is taken into account. Potential ing a set of service classes, tariffing schemes
customers’ requests, competitors’ activities, reg- have to be defined as well. Considering inter-
ulatory directives, etc. would be considered. connections, schemes and mechanisms for ex-
Bearing in mind that service degradations/fail- changing accounting data is also necessary.
ures may occur, stating conditions in the agree-
ments can be looked upon as risk taking. That is, • Communicating with the human end-user. Of
damages/penalties in case an event happens are particular interest are the QoS parameters that
balanced against the cost of the means under- communicate well and unambiguously to the
taken in order to lower the probability of the non-professional users – i.e. residential end-
event occurring. Lower cost is commonly users. Imperative to all parameters is that they
52 Telektronikk 2/3.2001
are harmonised and allow for mapping into Level of service
provision guarantee
others. Monitoring a QoS parameter could be
done both “continuously” and by “sampling”
according to “typical” usage. The dynamics
of the QoS may have major influence on how
QoS is perceived.
more QoS-related
mechanisms
7 Concluding Remarks
One intention is that introducing “sophisticated”
mechanisms related to QoS, and TE in general,
allows the provision of a wider portfolio of ser-
vices and accompanying QoS levels. At the
same time the network resources are efficiently
utilised. These mechanisms introduce a cost in
the form of increased overhead/complexity,
meaning that the basic question is that such cost
must be weighed against the benefits that can be resource usage efficiency
obtained.
The quality-efficiency product is valid for a cer- [ID_IPsm] Eder, M, Chaskar, H, Nag, S. IP Ser-
tain network domain. In an end-to-end view, vice Management in the QoS Network. draft-irtf-
such a product/measure may not have the same smrg-ipsm-00.txt. July 2001. Work in progress.
value for all domains. That is, some domains
may have high utilisation, while for others a low [ID_resreq] Kirstaedter, A, Autenrieth, A. An
utilisation is allowed. Naturally, there is no clear Extended QoS Architecture Supporting Differen-
boundary between high and low utilisation, as tiated Resilience Requirements of IP Services.
between high and low levels of guarantee. draft-kirstaedter-extqosarch-00.txt. July, 2000.
Work in progress.
Returning to the issue of demand, not all traffic
flows (and users/applications) will ask for strict [ID_tepri] Awduche, D O et al. Overview and
guarantees. One question is whether to define a Principles of Internet Traffic Engineering. draft-
number of virtual networks, e.g. with different ietf-tewg-principles-00.txt. Aug. 2001. Work in
quality-efficiency products, on the same physical progress.
network. This would then open for a broader
spectre of service levels, better matching the dif- [Jens01] Jensen, T. Internet Protocol and Trans-
ferent customer groups. port Protocols. Telektronikk, 97 (2/3), 20–38,
2001. (This issue.)
In this paper, the basic activities and mecha-
nisms of TE have been described. A motivation [RFC2990] IETF. 2000. Huston, G. Next Steps
is to provide an introduction to the topics. Many for the IP QoS Architecture. (RFC 2990.)
of the issues are treated in accompanying papers
in this issue of Telektronikk.
Telektronikk 2/3.2001 53
Basic IP-related Mechanisms
TERJE JENSEN
When reading about IP-based networks, one almost immediately bangs into a series of abbreviations
and expressions. The main objective of this paper is to outline the basic mechanisms; Best Effort, Differ-
entiated Services, Integrated Services, MultiProtocol Label Switching, Resource reSerVation Protocol,
Label Distribution Protocol, and some of the ways packets are buffered and scheduled in a router.
54 Telektronikk 2/3.2001
end-to-end Figure 1 Levels/scopes for
network congestion control
link mechanisms
node
interface
enforcer ensurer/policer
• At the link level: retransmission policy, out- leak rate; see following section). When such a
of-order buffering policy, acknowledgement specification has been done it may also be used
policy, flow control policy. for admission control, i.e. to decide whether or
not more traffic should be admitted to the net-
As seen from the list, policies for how the infor- work.
mation is carried in an accurate manner affect
the congestion management, as should be ex- Buffering schemes and queueing disciplines are
pected. In particular, appropriate means should important components in congestion handling. In
be taken to avoid that an emerging congestion particular, when a number of service classes is
situation is further worsened, like simply to post- defined, those mechanisms have to maintain the
pone the re-transmission of packets when the differentiation between the classes, e.g. by serv-
buffers are filled. ing orders, packet dropping levels, and so forth.
Differentiations can be implemented for all
A basic cause of congestion is that the current mechanisms described in the following sections.
traffic load is greater than the service capacity.
Commonly, this would be due to failures in the 2.1 Policing
service capacity (e.g. link failure) or that the Policing is a general term used for the process
traffic is in a burst. The latter can be managed of preventing a traffic flow from grabbing more
by shaping the traffic, meaning that traffic peaks resources than allowed. Actions to be taken on
are made smaller. This might be observed at the non-conforming traffic (packets) include drop-
egress (or supported at the ingress border), in ping the packet or remarking the packet. Re-
fulfilment with the agreed traffic pattern. At the marking can be utilised for putting the packet
egress side this may be called a traffic enforcer. into another class/queue or to increase its proba-
On the other side of the border, the traffic flow bility for being dropped later in the network.
is frequently monitored and steps taken in case
the expected behaviour is not followed. Then a A leaky bucket algorithm is frequently used to
traffic policer can be implemented, ensuring that define the conformance of a traffic flow. The
the resulting load is as expected. Leaky buckets
are frequently used for shaping and policing.
When variable packet lengths are used, like for
IP, the bucket may count in data volume, e.g.
bytes, rather than in number of packets. The
leaky bucket may operate on the data flow itself
or on tokens (being permissions to send data).
Suitable reactions must also be specified when
too much traffic is arriving. One reaction is to Filling rate
drop the packet, another reaction is to change
the class/priority of the packet.
Dropping
level
In order to set up a shaper and policer a proper
traffic flow specification has to be made. Such Tagging
level
a specification may use parameters describing
the traffic flow itself (mean bitrate, peak bitrate, Leak rate
burst duration, etc.) or parameters more related
to a leaky bucket implementation (bucket size, Figure 2 Analogy to leaky bucket
Telektronikk 2/3.2001 55
B´ - internal auxiliary variable ated on. In addition, several classes may also be
B - bucket filling Arrival of packet
R - bucket leaking rate given for the traffic flow (i.e. a flow aggregate).
L - bucket capacity/threshold of size k at time tk
Above the bucket is described for the data flow
k - size of arriving packet
tk - time of arrival of packet itself, however, the bucket may also refer to an
tconf - time of arrival of previous amount of tokens as described in the following.
conforming packet
no
The srTCM meters a traffic flow and marks
packets according to three traffic parameters;
B´ = 0 Committed Information Rate (CIR), Committed
non-conforming yes Burst Size (CBS) and Excess Burst Size (EBS).
B´ > L?
packet The marking may be green, yellow or red. A
packet is marked green if it does not exceed the
no
CBS, yellow if it does exceed the CBS and not
the EBS, and red otherwise.
In the algorithm, a counter represents the content When the srTCM is configured in colour-blind
of the bucket. This counter is incremented mode, it treats all received packets as unmarked
according to the size of the packet that arrives. packets. The colour of the packet is determined
The “leak rate” in the algorithm is the decrement by the status of the token buckets upon its
rate, which reduces the counter value by a given arrival. A packet of size B bytes is marked as
value at certain intervals. The bucket volume is green if token bucket C contains at least B
analogous to the counter range, which is repre- tokens upon the packet’s arrival. If this is not the
sented by the permissible time tolerance for the case, it is marked as yellow if token bucket E
incoming cells. An algorithm flow is shown in contains at least B tokens. If none of the token
Figure 3. buckets contain at least B tokens, the packet is
marked red. When the decision is made to mark
As mentioned above, several time scales/param- the packet as green or yellow, B tokens are
eters of the traffic flow would typically be oper- removed from the associated token bucket.
56 Telektronikk 2/3.2001
CIR CIR PIR Figure 4 Single rate (left) and
spillover
two rate (right) Three Colour
Marking
CBS EBS CBS PBS
Tc credit Te credit Tc credit Tp credit
C E C P
G Y G G+Y
Tc credit X X Tc credit X X
Te credit X X Tp credit X X
blind G G Y R blind G R Y R
G G G Y R G G R Y R
Y Y Y Y R Y Y R Y R
R R R R R R R R R R
srTCM trTCM
When the srTCM operates in colour-aware queue for transmission on a link. The buffer
mode, arriving packets are considered to be pre- management schemes may be operating on dif-
marked. Then, the marking must be more con- ferent aggregates of traffic flows, e.g. from all
servative in the colouring of packets. That is, packets on an interface to individual traffic
the re-colouring is only allowed if it results in flows.
a higher drop probability (change green to yel-
low/red or change yellow to red) for the packet. Applying Tail-Drop (TD) arriving packets are
The algorithm described above is followed when dropped only when the queue is full. A problem
a green packet arrives. When an arriving packet with tail drop is that global synchronisation of
is pre-coloured as yellow, only the status of the TCP sources can occur as multiple TCP sources
E token bucket is considered. If the packet has reduce their transfer rates almost at the same
a size of B bytes, the packet remains yellow if time. Then congestion clears and the TCP
token bucket E contains at least B tokens upon sources gradually increase their transmission
its arrival. Otherwise, it is re-coloured as red. rates again until a new congestion situation may
A packet pre-coloured as red remains red. build up. This could result in longer periods dur-
ing which the transmission link is not fully
Two token buckets can be used also for mod- utilised. That is, oscillations of the link load
elling the trTCM (Figure 4). Tokens are added to could be observed with a poor average utilisa-
the token buckets at rates CIR for C and PIR for tion.
P. In colour-blind mode, a packet of size B bytes
is coloured as red if token bucket P contains less 2.2.1 Random Early Detections and
than B tokens upon its arrival. If token bucket P Derivatives
contains at least B tokens, it is checked whether Active queue management mechanisms can be
token bucket C also contains B tokens. If it does, designed to avoid the synchronisation of TCP
the packet is coloured as green and B tokens are connections. A goal of such an active queue
removed from both buckets. Otherwise, it is management mechanism is to make each TCP
coloured as yellow and B tokens are removed connection reduce its sending rate at different
only from token bucket P. The colour-aware moments. An essential algorithm for this is the
mode of operation is similar to the above de- Random Early Detection (RED). When applying
scription. this algorithm packets are discarded randomly
when the buffer is near to congestion. In this
As mentioned above the TCM policing is fre- way, TCP connections will lose packets at dif-
quently carried out at the boundary of a DiffServ ferent time instants, avoiding the synchronisa-
domain. Boundary nodes could limit traffic car- tion between TCP connections. RED supports
ried on behalf of customers to the constraints congestion avoidance by controlling the average
specified in the associated Traffic Conditioning queue size. During congestion (but before the
Specifications (see Chapter 4). queue is filled), the RED scheme marks arriving
packets according to a probabilistic algorithm
2.2 Buffer Management which takes into account the average queue size.
The basic buffer management scheme is to treat The marked packets can be dropped as an early
all packets equally; insert the packets into a congestion notification before queues actually
queue upon arrival and take them out of the overflow. This will trigger corresponding TCP
Telektronikk 2/3.2001 57
sources to slow down. RED is mainly useful
when the bulk of the traffic is TCP traffic. A
p=1 potential consequence of RED is that UDP
Discarding Probability, p
DP
RED with In/Out bit (RIO) is a RED-derived
mechanism that assigns two different priorities.
But instead of using the same average queue size
for both priorities (like WRED does for all the
RED
Average classes), it uses the average queue size for OUT
Queue Level (out of profile) packets, and the average queue
0
size without taking into account the queued
Qmin Qmax
OUT packets for IN (in profile) packets, see
Figure 7 Illustration of Shock-absorber RED compared to basic RED Figure 8.
58 Telektronikk 2/3.2001
Some experiments show that RIO may offer bet-
ter results than WRED when parameters are cor-
rectly set. However, a number of additional p= 1
OUT IN
parameters are to be given in RIO, such as those
Discarding Probability
of IN priority. These are influenced by the given
scenario. Therefore, WRED may be preferred by
some when robustness is required.
pmax
(Out)
Estimating the better combinations may well be
a challenge in itself, considering the number of
parameters that may be asked for and the pmax
dynamics in the traffic flows. (In)
Average
Queue Level
2.2.2 Explicit Congestion Notification Minth(In) Maxth(In)
Explicit Congestion Notification (ECN) has
been suggested as one way of tackling conges- Minth(total) Maxth(total)
tion handling. Two bits in the IP header are
used: Congestion experienced (CE) – bit 7 of the
ToS field, and ECN capable transport (ECT) –
bit 6 of the ToS field. For IPv6 the correspond- ECN, could be introduced to allow the source to Figure 8 RIO algorithm
ing bits in the traffic class field are used. The adjust its behaviour without experiencing too
ECT bit is set by a sender able to react on indi- low throughput (due to packet loss) or long
cation of congestion by ECN. delays. Then the active queue management
could rather set the CE bit than drop the packet
In addition TCP has to be modified in order to when congestion is building up. This allows the
carry the information back to the sender. TCP receiver to get the packet, avoiding retransmis-
can be said to treat the network as a black box, sion, at the same time as a congestion indication
only reacting on lost packets without any further is conveyed. However, for IPv4 the header
insight into the situation in the network. This checksum has to be updated when the CE bit is
might lead to low utilisation of the network. set. This can be done incrementally as described
Therefore, active queue management, ref. [RFC in [ID_ecn].
2309] has been promoted to avoid some of the
drawbacks of packet dropping when queues are When a sender gets information on congestion
(almost) full. Random Early Detection (RED) by ECN, it is supposed to behave as if a packet
is one example of an active queue management was dropped. One argument for this is to provide
mechanism. fairness compared to non-ECN systems. Thus a
router, in case a congestion threshold is ex-
The ordinary TCP algorithm will not assist app- ceeded, may drop a packet when the ECT bit is
lications that are sensitive on delays (and pack- not set and set the CE bit in packets where the
ets arriving too late). Some algorithms, like ECT bit is set.
Telektronikk 2/3.2001 59
In order to make use of the ECN, support from better mechanism to use to obtain the declared
the transport protocol is needed. For TCP three service differentiation is far from obvious. This
additional functions are identified: i) negotiation is one of the reasons for vendors to implement
between the end-points during connection estab- a variety of different queuing and scheduling
lishment to decide whether or not they are ECN- mechanisms. As an example a few of the differ-
capable; ii) an ECN echo flag in the TCP header ent mechanisms found in the Cisco routers are:
informing the sender that a CE-marked packet
has been received (bit 9 in the Reserved field of • Modified Deficit Round Robin (MDRR):
the TCP header); and iii) a Congestion window MDRR may be able to provide special support
reduced flag in the TCP header allowing the for delay sensitive traffic, such as Voice-over-
sender to inform the receiver that the congestion IP. MDRR includes a low-latency, high-prior-
window has been reduced (bit 8 in the Reserved ity queue that is treated differently from the
field of the TCP header). other queues. This special queue is used to
handle delay-sensitive traffic. It is possible to
The sequence of messages related to ECN is configure MDRR for strict priority handling
illustrated in Figure 9. of this queue. When that queue contains pack-
ets, it is served first until all of its packets are
TCP should not react on congestion indications sent. Within MDRR, IP packets are mapped
more than once every congestion/acknowledge- to different class-of-service queues, e.g. based
ment window (or about once every round-trip on precedence bits (part of the ToS field). The
time). That is, a sender should not reduce its remaining queues are served in a round-robin
congestion window more than once in response fashion.
to a message dropped and/or packets having the
CE bit set out of a single window. It is stated • Weighted Round Robin (WRR): WRR is a
that the ECT bit should not be set for pure TCP- packet queuing and scheduling algorithm,
ACK messages as no flow control is related to which provides class differentiation, band-
such messages. The same goes for TCP window width allocation, and delay bounding features.
probing, that is for packets generated periodi- Hence, it is possible to give voice packets pre-
cally by the sender when the receiver has mium service, although not strict priority.
announced a zero window. As explained in
[ID_tcpecn] nor should the ECT bit be set on • Weighted Fair Queuing (WFQ): WFQ is an
retransmitted packets. Furthermore, the receiver algorithm that provides priority management,
should ignore the ECN field on the out-of-win- but not strict prioritisation, during periods of
dow data packets. Both these means are intro- traffic congestion. WFQ offers a solution that
duced to increase the security against denial-of- provides consistent, fair response time, based
service attacks, i.e. where an attacker may spoof on weights. Hence, WFQ supports features
the IP source address and send packets making such as traffic isolation and delay bandwidth
the receiver asking the real sender to decrease guarantees.
its sending rate.
A second type of WFQ called Distributed
For the moment, no special concerns are given Weighted Fair Queuing (DWFQ) provides
when ECN is used within MPLS or other layer bandwidth allocations and delay bounds to
2 transport means. For other ways of tunnelling, specified traffic flows by segregating the traf-
i.e. IP in IP, two options have been described: fic into classes and then using first-in, first-out
(FIFO) service to the various queues accord-
• Full-functionality where the ECT bit of the ing to their assigned weights. There seems to
inner header is copied to the outer header. be two kinds of standard WFQ (Flow-based
At decapsulation, if the ECT bit of the inner WFQ, Class-based Weighted Fair Queuing,
header is set, the CE bit of the outer header CBWFQ) and three kinds of DWFQ (Flow-
is ORed with the CE bit of the inner header based DWFQ, QoS Group-based DWFQ,
to update the CE bit of the inner header. ToS-based DWFQ) implemented in the Cisco
routers.
• Limited-functionality when ECN is not used
for the IP tunnel. This is done by turning off • Internet Protocol Real-Time Transport Proto-
the ECT bit of the outer header and not alter- col Priority (IP RTP Priority): With the IP
ing the inner header. RTP Priority feature it is possible to specify a
range of UDP/RTP ports whose traffic flows
2.3 Scheduling receive strict priority service over any other
When implementing a network offering different queues or classes. Strict priority means that if
traffic classes, queueing and scheduling mecha- packets exist in the priority queue, they are
nisms have to be configured. The choice of the fetched from the queue and sent first.
60 Telektronikk 2/3.2001
Figure 10 Example of out-
EF (Premium)
going link side in a router
when DiffServ is implemented
AF2 in of profile
LINK
AF2 out of profile
AF3 in of profile
AF4 in of profile
• Priority Queuing within CBWFQ: The priority queues per service class on the IP level. Then,
queuing within the CBWFQ feature brings the there may be queueing for placing packet flows
strict priority queuing functionality of IP RTP into a transmission system, and, lastly, queueing
Priority required for delay-sensitive, real-time for being transmitted on the link. For the last
traffic, such as voice, to CBWFQ. queue a single First-In-First-Out queue is often
seen. Depending on the sizes and capacity of
A schematic illustration of an outgoing interface service, all these queues may impact the actual
in a router is depicted in Figure 10. traffic flow characteristics, experienced delays,
effective service differentiation, etc.
The different serving policies have their charac-
teristics and corresponding preferred area of 2.4 Admission Control
applicability. Normally, Head-Of-Line (HOL) is Quoted from [COST257] admission control is
used such that real time traffic is given priority a preventive traffic control which aims to admit
over elastic traffic. The problem is that this high- an arriving new traffic source if and only if its
priority traffic would cause starvation for lower quality of service as well as that of the already
classes during high load. On the other hand, accepted sources is guaranteed. The admission
General Processor Sharing (GPS) disciplines control procedure should also ensure a high
(such as WFQ) are preferred if a minimum band- utilisation of network resources through efficient
width must be guaranteed for each class. How- statistical multiplexing.
ever, this kind of scheduling discipline is more
complex to implement than HOL, and is suscep- Here a source may generate a set of flows.
tible to priority inversion if there is a higher- Remembering that flow may be defined as a uni-
class congestion. That is, a lower class can actu- directional succession of packets related to a
ally get a better service if there is congestion in certain (part of an) application. Packets belong-
a higher class. ing to the same flow have the same identifier
(e.g. given by source and destination addresses
So, an observation may be that HOL is preferred and port numbers) and are initiated within a
if higher priority classes demand is much lower maximum separation in time between each
than lower classes demand. On the other hand, other.
GPS may be preferred in some cases if higher
priority classes demand is much higher than As stated, when running an application a number
lower classes demand. Besides, admission con- of flows might result. An example is a multime-
trol can be introduced to limit the load in each dia application covering voice, video, file trans-
class to allow for bounds on the service levels. fers, interaction control, etc. All these flows
should be served in order for the application to
When looking at some actual router implementa- be run in a satisfactory manner. Hence, the term
tions, one may find that several queueing and session is introduced. A session is a continuous
scheduling steps may be arranged in series. For period of activity during which a user generates
example, on the output link, there may first be a set of flows (elastic or streaming type).
Telektronikk 2/3.2001 61
It should be noted that the session term is seen authorisation, implying that the means for con-
with varying interpretations, like an FTP session, veying admission requests can also be applied
HTTP session, and so forth. Usually, the admis- for authorisation.
sion control acts on the flow level, not taking
into account effects on the session level. An 2.4.2 Overall Objectives of
argument may be that an application, in case a Admission Control
flow is not accepted, may retry the transfer and The overall objectives of having admission con-
then leave that operation to the end-system/ trol are to:
application. Hence, the network would not need
to be enhanced with capabilities enabling group- • Ensure that the existing traffic flows still
ing of flows into sessions. For some services and receive adequate service levels when addi-
users, however, the service portfolio (and the tional traffic flows are introduced;
conditions stated in the Service Level Agree-
ment, SLA) may refer to phenomena on the ses- • Provide appropriate feedback/advise to a user/
sion level. This is not covered here as any corre- application when initiating a session that the
lation between those levels might be estimated session (or traffic flow) may well receive a too
by monitoring/measuring, e.g. for verifying the low service performance;
SLA conditions.
• Enable differentiation between traffic flows,
2.4.1 Rationale for Admission Control including applications and users in accordance
The following reasoning is excerpted from with policy and subscription/user profile;
[ID_acaf]:
• Balancing ensured service provision (with
There is a growing feeling that the basic Diff- effective guarantees on performance levels)
Serv architectural model lacks the capability and efficient utilisation of network resources.
of providing service accuracy.
These objectives will not be equally weighed
Quoting [RFC2990]: both the Integrated Ser- independent of the scope of discussion. For
vices architecture and the Differentiated Ser- instance, from a user perspective, less interest
vices architecture have some critical elements could be placed on the network utilisation issue.
in terms of their current definition which
appear to be acting as deterrents to wide- In broad terms, traffic flows can be characterised
spread deployment. There appears to be no as elastic or streaming (inelastic), meaning the
single comprehensive service environment latter has stronger requirements on delay and
that possesses both service accuracy and scal- delay variations. Commonly, TCP is used for
ing properties. Also, in [RFC2998], it is the former, while UDP is used for the inelastic
pointed out that: further refinement of the QoS flows. Even though the elastic traffic flows adapt
architecture is required to integrate DiffServ to the network conditions (to a certain extent),
network services into an end-to-end service the effective throughput would decrease when
delivery model with the associated task of congestion appears. Hence, packets may experi-
resource reservation. To this purpose, ence time-out, being retransmitted and the dura-
[RFC2990] recommends to define an admis- tion of the session prolonged. The ultimate fac-
sion control function which can determine tor then limiting the traffic demand is the user
whether to admit a service differentiated flow impatience (as it takes too long to complete the
along the nominated network path. In fact, operation). It is discussed in [Robe01] that intro-
without per flow admission control, preven- ducing some form of admission control for elas-
tion of overload in a given service class, e.g. tic flows may give a more effective overload
by means of pure inter-domain Service Level control compared to relying on user impatience.
Agreements, does not appear to be an easy A criterion for the admission decision would be
task. Upon overload in a given service class, to reject a new flow when the resulting band-
all flows in that class suffer a potentially harsh width is below a specified threshold. This
degradation of service. implies that the available bandwidth has to be
followed by measurements and that the band-
Another track of reasoning behind the introduc- width requirement of a new flow has to be esti-
tion of admission control is that similar capabili- mated/predicted.
ties have been present in most telecommunica-
tion networks, in particular those based on cir- Considering elastic traffic, the TCP flow control
cuit-switched principles. Hence there is a certain algorithm, applying a closed loop approach, will
experience of how such mechanisms can be restrict the throughput. Naturally, this will also
utilised, combining high utilisation and ensured be influenced by the access rate and duration of
service levels. In addition, admission control the flows. An approximate expression of the
may also be seen together with the need for effective throughput as a function of the round-
62 Telektronikk 2/3.2001
trip-time and packet loss ratio has been sug- In some cases it is argued that so-called over-
gested. The delay and packet loss of a flow is provisioning may make the need for traffic han-
greatly influenced by the number of flows in dling mechanisms obsolete, including admission
progress using the same set of resources. This control. Apart from the economic argument, it
means that the packet scale performance of a might also be difficult to provide the amount of
given flow is strictly determined by flow level capacity on certain portions, like on the access
dynamics (i.e. number of flows and their charac- line if no technical solution is available. Another
teristics). A simple model of this is quoted in argument is the request for service differentia-
[Robe01], referring to the processing sharing tion. As quite a few models show, a “pure” Diff-
analogy when looking at a single resource. Serv model may have a narrow scope for effi-
Although still being a simplified model, two cient differentiation that is close to an overload
central observations are made: i) the perfor- situation. Hence, other means for differentiation
mance depends primarily on expected traffic would be asked for. Therefore, providing differ-
demands and only marginally on parameters entiated admission criteria is one group of means
describing distribution of file lengths; and ii) that could be introduced.
performance tends to be excellent as long as
expected demand is less than available capacity. 2.4.3 Admission Control Taxonomy
The latter proposes that service differentiation A number of issues for describing an admission
can only be effectively obtained for a limited control mechanism are described in this section.
area of the workload when there are several ser- The issues are not independent as some combi-
vice classes to be handled with their correspond- nations may be preferred or even needed for the
ing requirements. admission control procedure to function.
For streaming traffic, the algorithms in TCP may • Dynamic versus static. A dynamic mechanism
not be in effect, e.g. as UDP could be applied. is able to adapt to the changing situation, for
This means that the characteristics would be example captured by measuring traffic loads.
more determined by the inherent nature of the It is obvious that measurements for better
traffic source (as an open-loop control would be assessing the link utilisation and characteris-
present). Thus, it is simpler for a source/applica- tics of the traffic flows will lead to improved
tion to specify the required transfer service, throughput. On the other hand, running con-
which for instance can be input to an admission tinuous measurements may be fairly demand-
control function (as well as resource reservation ing on the routers. Hence, finding adequate
and others). measurement arrangements is a central chal-
lenge.
Integrating elastic and streaming traffic on the
same resource units may allow for increased • Explicit versus implicit. When explicit control
efficiency. By giving priority of the streaming is used, related information is exchanged be-
flows, they could experience a resource that is tween the end system and the network. That
(almost) loaded as if they were the only active is, protocol elements are defined which ex-
flows. Then, elastic flows could be served when- press the request for resources and the grant-
ever the resource is not used by the streaming ing/rejection of resources. In case implicit
flows. However, this may introduce long delays control is applied, there will be no information
for the elastic flows during some periods. An exchange before the information transfer. An
approach is to restrict the load from the stream- example is when the source simply starts to
ing flows, ensuring that some capacity is avail- send packets and the network decides whether
able for the elastic flows. This is an argument or not these packets can be forwarded without
for introducing admission control that operates informing the source of the decision. Thus, the
also on streaming flows. source has to apply other means for finding
out if the transfer was successful or not (e.g.
When the capacity of the resource is limited, it is time-out on acknowledgements).
generally assumed that some form of admission
control has to be present to ensure that active • Scope and objective function applied. When
streaming flows receive the delay and packet deciding whether or not to accept a request,
loss requirements they demand. To avoid keep- different scopes and different sets of variables
ing a detailed list per flow, a measurement-based can be implemented. This is further described
approach could be used, operating on the aggre- below.
gated flow. It is argued in [Robe01] that such an
aggregated measure might not be very precise, • Traffic flow aggregates and characteristics.
as the elastic traffic flows would tolerate some The admission control may work on a range of
variation in their available service rate. traffic flow aggregates and use various means
for describing the traffic flows. Examples of
bit rate measures are peak rate, mean rate and
Telektronikk 2/3.2001 63
load situation principle, derived from other identifiers like
characteristics measure user policy
existing flows matters combinations of addresses, port numbers,
characteristics resource
interfaces, etc.
new flow policy matters
64 Telektronikk 2/3.2001
RSVP-based agers and service providers to monitor, control,
As a general signalling protocol, RSVP may and enforce the use of network resources and
carry most of the data needed for admission con- services based on policies derived from criteria
trol, including characteristics of the traffic flow such as the identity of users and applications,
(see Section 7.1) as well as information about traffic/bandwidth requirements, security consid-
the users/port numbers. erations, and time of day/week. A framework for
policy-based control over admission control is
Initiating the RSVP messages by the end sys- described in [RFC2753].
tems, the traffic handling mechanisms may be
co-ordinated dynamically along the relevant Implicit Admission Control/Local Probing
data path. In some places this is referred to as The local probing approach relies on generating
dynamic topology-aware admission control. test packets (probes) to check whether or not a
new traffic flow can be set up. The probes may
RSVP is used by an end system to request spe- be generated by the end systems. In case several
cific service levels from the network for particu- service classes are offered, it is to be decided if
lar traffic flows. Routers also apply RSVP to the probes should be sent in the same class as the
forward requests to all nodes along the path(s) following traffic flow or in another class (e.g.
of the flows and to establish and maintain state the lower service class). Hence, the local probing
to provide the requested service. Hence, RSVP may be suitable for DiffServ. An advantage of
requests will generally result in resources being this method is that no changes are needed in the
reserved in each node along the path. RSVP routers not generating probes. This has also been
allows users to obtain preferential access to net- referred to as distributed admission control, see
work resources, under the control of an admis- e.g. [Kell00].
sion control mechanism. Such admission control
is often based on user or application identity; Probing results may also be based on marking
however, it is also valuable to provide the ability (e.g. using ECN) of ongoing traffic flows. Hence,
for per-session admission control. In order to information on the marking tells the admission
allow for per-session admission control, it is control algorithm whether or not a new traffic
necessary to provide a mechanism for ensuring flow with certain characteristics can be served.
that an RSVP request from an end system has
been properly authorized before allowing the A common feature of implicit admission control
reservation of resources. In order to meet this is that no per-flow state information is needed,
requirement, there must be information in the which may also be run in the end systems. How-
RSVP message, which may be used to verify the ever, remembering the connectionless nature of
validity of the RSVP request. An example is to IP, and if the routers are not taking part in the
have an authorization element assigned to the control, it may be uncertain whether all packets
user, which can be inserted in the RSVP mes- in the traffic flow actually traverse the same
sages. path. This means that some mid-flow packets
may well experience other conditions than the
Policy and Bandwidth Broker-based information estimated from probes if they are
Policy and Bandwidth Broker (BB) is described transferred on another path.
in [Jens01a]. Although RSVP supports the abil-
ity to convey requests allowing for resource The different schemes for admission control may Figure 12 Illustration of
reservations, an essential feature may be miss- be combined. For example, an implicit admis- features related to admission
ing. This feature is the ability of network man- sion control may be used in the access network control (by the network)
routing
policing
buffer
classifying scheduling
management
shaping
Telektronikk 2/3.2001 65
Figure 13 Microsoft QoS
components, from [Bern00] QoS-aware Network management
application application
WinSock2 API
Traffic control
providers
Packet Classifier
Packet
scheduler
Netcards
SBM/ACS
(between the terminal/host and the edge router) The Subnet Bandwidth Manager (SBM) can be
while other schemes are used in other parts of considered as a server connected to the LAN
the network. controlling the bandwidth usage between the
different hosts connected. The SBM is presented
2.4.5 Functions Related to Network- in [RFC2814]. This can be considered as a sig-
centric Admission Control nalling protocol supporting admission control
In order to implement an explicit full-guarantee over IEEE 802-type networks by utilising RSVP.
admission control, the features indicated in Fig- Hence, it provides a method for mapping sig-
ure 12 should be available. Note that some of nalling protocols, like RSVP, onto the IEEE
these may be optional depending on the configu- 802-type of networks, including operations of
ration and the overall solution for traffic han- terminals and routers in order to allow for reser-
dling. vation of LAN resources.
Pivotal for having admission control is naturally From [Bern00a] admission control agents may
to implement an algorithm making the admission be allocated at key locations, referring to con-
decisions (accept/reject). In order to carry out gestion points. Examples of such are:
such a ruling, the status of the resource situation
(and the present load) as well as characteristics • Single interface: a classic RSVP model could
of the flow related to the request have to be be applied.
made available, i.e. given as input. As described
earlier this information could be provided by dif- • DiffServ domain: admission control at ingress
ferent means and with various levels of details router may be introduced.
and dynamics. Additional inputs may also be rel-
evant, like user/application profiles that could be • 802-based domain: Subnet Bandwidth Manager
part of policy matters. Another function needed (SBM) could be introduced, ref. [RFC2814].
is called classification, i.e. that the packets arriv-
ing are recognised as belonging to the traffic • ATM subnetwork: admission control at ATM
flow in question. edge devices
In addition to the mechanisms present in the net- • Provider domain: admission control as part of
work, the terminal/application must also be able bandwidth broker.
to formulate, categorise and convey the relevant
information. An example of blocks adopted from Still in the end system, a congestion manager
Windows/Microsoft is depicted in Figure 13. may be implemented as described in [ID_cm].
66 Telektronikk 2/3.2001
HTTP FTP RTP 1 RTP 2 API Figure 14 Framework for
congestion manager, adapted
Scheduler
from [ID_cm]
Congestion
Controller
IP
This is to support multiple traffic flows between implemented at several places. Basically a single
the same sender and receiver(s) allowing the queue may suffice for each link, being served
application to adapt to congestion. A framework according to a first-in-first-out discipline.
is stretched out in that document, integrating con-
gestion management for all types of applications As also shown, a separation between forwarding
and transport protocols. This is done by main- and routing is made; routing referring to ex-
taining parameters reflecting the network condi- changes of routing information (by routing pro-
tion, like throughput, round-trip delay, etc. and tocols) to set up routing tables, and forwarding
making this information accessible from the app- referring to sending packets on according to the
lications through an API as shown in Figure 14. information in the routing tables.
The main components, as depicted, are the API, The traffic flows carried by the node may have
the congestion controller and the scheduler. The different characteristics, e.g. in terms of packet
congestion controller adjusts transmission rates lengths, bit rates, use of transport protocols, and
based on estimates of the network condition, so forth. Combining all these in the same buffer
which is obtained from the applications (via the and on the same link may pose additional chal-
API). The scheduler divides the bandwidth lenges, as described in several accompanying
amongst the different traffic flows papers in this issue of Telektronikk. Hence, other
service models – Differentiated Services and
3 Best-Effort Integrated Services – have been defined, as
From the outset a single class of serving IP treated in the following chapters.
packets was present. At the same time this was
referred to as best-effort, implying that each 4 Differentiated Services
node along the path was doing its best to trans- Differentiated Services (DiffServ) is promoted
port the packet towards its destination. A fairly as a service architecture supporting a scalable
simple router implementation may then be ade- way to achieve relative service and QoS levels in
quate as schematically depicted in Figure 15. an IP network. DiffServ operates on aggregated
flows by dividing the traffic flows into a set of Figure 15 Schematic
Packets entering the router are to be forwarded classes. The DiffServ architecture is defined in illustration of router
to the output link. Buffers (queues) may be [RFC2475], see Figure 16. for best effort
routing routing
protocol
forwarding
Telektronikk 2/3.2001 67
Assignment to service per traffic. For each class three drop precedences
queue based on DSCP class (PHB) are defined, each representing a PHB and thus
a reserved DSCP value.
68 Telektronikk 2/3.2001
based solely on the DSCP value. This can take Box A Some DiffServ Terms
place in every DiffServ-capable router.
Flow – A stream of packets with the same source IP address, source port
Which functions that are activated in a router number, destination IP address, destination port number, and protocol identity
would depend on where the router is located, (packets not separated by a time longer than a threshold).
e.g. ingress, egress or interior. An example of Service Level Agreement (SLA) – A service contract between a customer and a
use of functions is given in Table 1. service provider that specifies the forwarding service a customer should receive.
A customer may be a user organisation or another provider domain (upstream
One is faced with quite a few challenges when domain).
deciding to mark packets:
Traffic profile – A description of the properties of a traffic flow such as rate and
burst size.
• Applications may use transient ports or source
multiple traffic flows on the same port, where Precedence Field – The three leftmost bits in the TOS octet of an IPv4 header.
the flows may require different service levels. Note that in DiffServ, these bits may or may not be used to denote the prece-
dence of the IP packet.
• Users’ IP addresses change as a result of
TOS field – Bits 3–6 in the TOS octet of the IPv4 header.
DHCP. Multi-user machines use the same
IP address for multiple users. Differentiated Services field (DS field) – The TOS octet of an IPv4 header, or the
traffic class octet of an IPv6 header is renamed the differentiated services field
• IPSec encryption encrypts port identities, leav- by DiffServ. It is the field where service classes are encoded.
ing them less useful as classification criteria. Admission Control – The decision process of whether to accept a request for
resources (link bandwidth plus buffer space).
Basically, the end system may mark the packets,
or the edge router may do the marking. Allowing Classification – The process of sorting packets based on the content of packet
end systems to mark the packets would likely headers according to defined rules.
make it easier to meet the challenges listed above. Behaviour Aggregate (BA) classification – The process of sorting packets based
only on the content of the DS field.
5 IntServ
Multi-Field (MF) classification – The process of classifying packets based on the
The Integrated Services (IntServ) architecture
content of multiple fields such as source address, destination address, TOS
was defined to allow separate treatment to indi-
octet, protocol identity, source port number, and destination port number.
vidual or groups of traffic flows, [RFC1633].
Two sets of capabilities are necessary to enable Marking – The process of setting the DS fields of packets.
this: i) functions in individual network elements Policing – The process of handling out-of-profile traffic, e.g. discarding excess
along the path; and ii) ways to communicate the packets.
requests between the network elements.
Shaping – The process of delaying packets within the traffic flow to make it
In [RFC1633] a flow is defined as a distinguish- conform to some defined traffic profile.
able stream of related datagrams that results Scheduling – The process of deciding which packet to send first in a system of
from a single user activity and requires the same multiple queues.
QoS. That is, it is the finest granularity of packet
Queue management – Controlling the length of packet queues by dropping
stream that can be identified. A flow is unidirec-
packets when necessary or appropriate.
tional (from a single source to a set of destina-
tions). In order to identify a flow, an MF filter
can be applied, as described in the previous
chapter.
MF Classifier Dropper
when checking
marking
DSCP has
been set
Remark local
domain DSCPs
Figure 18 Logical view
BA Classifier Remarker of traffic conditioning in
a DiffServ node
Telektronikk 2/3.2001 69
Function block Ingress router Interior router Egress router Prior to transferring “user” data a signalling
sequence has to be carried out (optionally, this
MF classification X could also be done by management operations or
as a combination). Upon arrival of a request (e.g.
BA classification X X X
RSVP_PATH message) a router would check its
Meter X X current load/configuration to decide whether or
not the request can be served (done by the
Marker X X
admission control). In case the request can be
Policer/Dropper X served, a corresponding message is passed on
Shaper X X to the next element. When the request has made
the whole path (between the two end points),
Signalling X X
an “acknowledge” message (e.g. RSVP_RESV
message) is returned if all required resources are
available. When such a message arrives at a net-
work element, the resources are reserved imply-
Table 1 Example of use of Two service classes are described in addition to ing that the units depicted as part of the IP For-
the function blocks related to the best effort class; Controlled Load [RFC2211] warding module in Figure 19 are properly con-
DiffServ and Guaranteed Service [RFC2212]. An objec- figured. Information in the admission control
tive of the Controlled Load (CL) class is to offer could also be updated. Then “user” data can be
low average delay and limited loss. It is intended transferred (having the specified Multi-Field
to offer roughly the same service (e.g. through- class) and being served as notified by the sig-
put, delay, loss) independent of the network nalling activities.
load. Thus, if a flow is accepted for the CL ser-
vice, the routers are supposed to make a commit- IntServ nodes support the required performance
ment to offer a flow service level equivalent to guarantees by implementing multiple queues per
that seen by a best-effort flow on an unloaded output port in combination with scheduling and
network. The CL class supports applications that buffer management. Typical mechanisms are
can tolerate a small amount of delay and loss Weighted Fair Queuing (WFQ) scheduling and a
(e.g. adaptive real-time services). The Guaran- Random Early Detection (RED) variant for con-
teed Service (GS) class offers a quantifiable gestion avoidance as described in Chapter 2.
bounded queuing delay and no loss and is in-
tended for real-time applications with stringent A key feature of the IntServ model is that re-
timing requirements. sources are explicitly managed; by resource
reservation and admission control. According
In order to provide the requested service class to to [RFC1633] traffic control is implemented by
an application, information on class (and corre- the packet scheduler, the classifier, admission
sponding parameters) has to be conveyed to a control and the reservation setup protocol:
network element (e.g. a router). Signalling (e.g.
Resource Reservation Protocol, RSVP) can be • Packet scheduler manages forwarding of flows
used to create and maintain the required flow- by use of buffering and scheduling algorithms.
specific states in network elements allowing Policing is taken care of by the scheduler.
them to provide the requested services. Introduc-
ing such control activities allows for additional • Classifier maps each incoming packet to a
mechanisms related to resource handling. These class (all packets in the same class get the
are depicted in Figure 19. same treatment from the scheduler). A class
is an abstraction that may be local to a router;
IP Forwarding module
MF Scheduler
Classifier •
Figure 19 Schematic •
illustration of an IntServ •
router, adapted from Buffer Management
[RFC1633]
70 Telektronikk 2/3.2001
the same packet may be classified differently An estimate for the end-to-end delay bound is
by different routers along the path. then given as, ref. [RFC2212]:
• r; rate of leaky bucket (measured in bytes per The basis for the estimate of end-to-end delay
second: 1 byte/sec – 40 Tbyte/sec); bound is a fluid flow model. Then, the terms C
and D may be considered as capturing deviates
• b; depth of leaky bucket (measured in bytes: of the node compared to a fluid flow model.
1 byte – 250 Gbyte);
Note that the Guaranteed Service does not con-
• M; maximum packet size; trol minimal or average delay, nor the propaga-
tion delay, only the maximal queueing delay.
• m; minimum policed unit (packets shorter than Neither does the Guaranteed Service give an
m are counted as having size m); estimate of the jitter as such.
• p; peak rate (measured in bytes per second – When aggregating and merging flows, a way of
same as for r); handling the traffic parameters is asked for, ref.
[RFC2212]:
• R; service (link) rate (measured in bytes per
second – same as for r); • TSpec for a merged flow may be calculated
by: i) taking the largest token bucket rate; ii)
• S; slack term (measured in µs). the largest bucket size; iii) the largest peak
rate; iv) the smallest minimum policed unit;
The two latter are part of the RSpec field while and v) the smallest maximum packet size,
the 5 first parameters are carried in the TSpec across all flows in the merged flow. A merged
field, see Figure 20. TSpec is one that is adequate to describe the
traffic from any one of the constituent TSpecs.
source destination
Telektronikk 2/3.2001 71
buffer space =
RSpec_out (Rout, Sout) RSpec_in (Rin, Sin)
Node i (b − M ) · (p − X) Csum
M+ +X · + Dsum
p−r R
where
Rin ≥ Rout ≥ r
Sin - Sout = consumed slack in node
⎧ r , if b − M < Csum + Dsum
⎪ p−r R
⎪
⎪ ⎧ b − M Csum ⎫
X = ⎨ R , if ⎨ ≥ + Dsum ⎬ ∧ { p > r }
⎪ ⎩ p−r R ⎭
Figure 21 Relations between • TSpec summed may be calculated by: i) the ⎪ p , otherwise
⎪⎩
parameters in incoming and sum of token bucket rates; ii) the sum of
outgoing side of a node have bucket sizes; iii) the sum of peak rates; iv)
to be found the smallest minimum policed unit; and v) Csum and Dsum are considered for the aggregate
the maximum packet size, across all flows using that buffer space.
in the set.
Using these estimates, both expressions for
• TSpec as a least common “measure” is one assigning resources in the node and expressions
that is sufficient to describe the traffic of any- for finding the parameter values in the setup
one in the set. It may be calculated by: i) the message on the outgoing side are given.
largest token bucket rate; ii) the largest bucket
size; iii) the largest peak rate; iv) the smallest In order to provide the performance guarantees
minimum policed unit; and v) the largest max- as stated by the IntServ node, several queues are
imum packet size, across all flows in the set. used per output interface, in combination with
It differs from the merged flow by the way scheduling and buffer management as depicted
the maximum packet size is found. Note that in Figure 19. As guarantees are provided on a
merge refers to characteristics of packet flows per flow basis for the Guaranteed Service, a sep-
while least common refers to requests on the arate queue per flow could be needed. However,
resource capabilities. a common queue can be used for a group of
flows in case these have similar requirements on
Values of the RSpec field can be considered in delay and loss. In particular, a common queue
a similar way as for the TSpec field; i.e. a set of can be used for flows requesting Controlled
RSpecs is merged into a single RSpec by taking Load service.
the largest rate R, Rout = maxj{Rj} and the
smallest slack S, Sout = minj{Sj}. Three groups of queues may therefore be seen;
one set for flows in the Guaranteed Service
Consider a node along the path, see Figure 21. class, one set for flows in the Controlled Load
When it receives a setup message containing the class, and one set for flows in best effort class.
TSpec and RSpec fields, it has to estimate the The two latter classes might consist of a com-
values to assign to the RSpec parameters on the mon queue. Appropriate scheduling mechanisms
outgoing side (when the setup message is passed are then applied to serve the queues such that the
on to the following node). service level guarantees given to the flows are
kept.
The overall rule for determining the new RSpec
values is given by the delay constraint: 6 Multi-Protocol Label
b Ctot i b Ctot i Switching, MPLS
Sout + + ≤ Sin + + At the IP layer (layer 3) a router makes forward-
Rout Rout Rin Rin
ing decisions for a packet based on information
where Ctot_i is the cumulative sum of “devia- in the IP header. The analysis of the packet
tion” terms, C, for all network elements in the header is performed and an algorithm is exe-
upstream (between the destination and node i), cuted in each router to decide upon further treat-
including node i. ment. This can be viewed as a two step process,
ref [RFC3031]: i) The packets are classified into
To ensure no loss of flow, some portion of a a set of Forwarding Equivalence Classes
buffer has to be allocated. If a fluid flow model (FECs); ii) Each FEC is mapped to a next hop.
would be adequate, this amount would simply be
equal to b, the token bucket size. However, tak- The following advantages of MPLS are listed in
ing into account that the traffic flow may gain [RFC3031]:
burstiness in the network, some margin should
be considered. An estimate of the needed buffer • MPLS forwarding can be done by nodes in-
space is, ref. [RFC2212]: capable of analysing the IP packet headers,
72 Telektronikk 2/3.2001
or incapable of analysing these headers with
Box B Selected MPLS terminology (from [RFC3031])
sufficient high speed.
Label – A short fixed length physically continuous identifier used to identify an
• Assigning a packet to an FEC, the ingress FEC, of local significance.
router may use information about the packet
Label merging – The replacement of multiple incoming labels for a particular
that goes beyond the content of the packet
FEC with a single outgoing label.
header, like the interface. Hence, assignment
to FECs can be a more involved process, with- Label swap – The basic forwarding operation consisting of looking up an in-
out impacting all routers in the network. coming label to determine the outgoing label, encapsulating, port, and other
data handling information.
• Forwarding decisions within a network may Label swapping – A forwarding paradigm allowing streamlined forwarding
be made depending on which ingress router a of data by using labels to identify classes of data packets which are treated
packet used. Then a packet may be forced to indistinguishably when forwarding.
follow a particular route explicitly chosen, cir-
Label switched hop – The hop between two MPLS nodes, on which forwarding
cumventing the ordinary routing.
is done by use of labels.
Some central terms for MPLS are given in Box B. Label switched path – The path through one of more Label Switched Routers
(LSRs) at one level of the hierarchy followed by a packet of a particular FEC.
6.1 MPLS Formats and Terms
Label stack – An ordered set of labels.
To some extent, the use of Label Switched Paths
(LSPs) can be considered as introducing tun- Merge point – A node at which label merging is done.
nelling as seen from the IP layer. That is, when MPLS domain – A continuous set of nodes which operate MPLS routing and
an LSP is introduced an intermediate node forwarding and which are also in one routing or administrative domain.
would not examine the IP header information in
order to decide upon the proper handling of the MPLS edge node – An MPLS node that connects an MPLS domain with a node
packets arriving in that LSP. That is, with MPLS which is outside of the domain, either because it does not run MPLS, and/or
the classification of packets into FECs is only because it is in a different domain. Note that if an LSR has a neighbouring host
performed at the ingress to the MPLS domain. which is not running MPLS, that LSR is an MPLS edge node.
The packet is then mapped to an LSP by encap- MPLS egress node – An MPLS edge node in its role in handling traffic as it
sulation of an MPLS header. The LSP is identi- leaves an MPLS domain.
fied locally by the header, see Figure 22. Based
MPLS ingress node – An MPLS edge node in its role in handling traffic as it
on the value of the label the packet is mapped
enters an MPLS domain.
to the next hop. In successive routers within the
MPLS domain the label is swapped (therefore it MPLS label – A label which is carried in a packet header, and which represent
can have only local significance) and the packet the packet’s FEC.
is mapped to the next hop.
MPLS node – A node which runs MPLS. An MPLS node will be aware of MPLS
control protocols, will operate one or more layer 3 routing protocols, and will be
An LSP can be considered as a path created by
capable of forwarding packets based on labels.
concatenation of one or more hops, allowing a
packet to be forwarded by swapping labels from
an incoming to an outgoing side of the MPLS
node. An MPLS path is frequently referred to as Referring to Figure 22, the fields in the MPLS
layer 2 1/2 in the OSI model. That is, it may be header can be used as follows:
considered as a tunnel as mentioned above. In
order to introduce a tunnel, a “header” is att- • Label – contains a 20 bit tag identifying an
ached to the IP packet as shown in Figure 22 for LSP;
the Point-to-Point Protocol (PPP) case (e.g. IP
over SDH). When the IP packets are carried by • Exp – contains 3 bits (originally not allocated,
ATM the label may be identical to the VPI/VCI intended for experimentation) which can refer
fields in the ATM cell header. The MPLS archi- to a certain service class, e.g. in analogy to the
tecture is described in [RFC3031]. DiffServ classes;
Telektronikk 2/3.2001 73
Ingress LSR Transit LSR Egress LSR
Forwarding
packet
Forward
Equivalence
Class
Incoming: Outgoing:
- interface - interface
- label - label
MPLS header
Figure 23 Illustration of • S – 1 bit indicates end of label stacking as sev- At the ingress of an MPLS domain an FEC-to-
information attached to an eral labels may be stacked; NHLFE mapping is needed, that is when packets
LSP in an LSR arrive without an MPLS label.
• TTL – 8 bit giving the Time To Live informa-
tion. Within an MPLS domain an incoming label
mapping is executed, mapping the packet onto
When an MPLS packet enters a Label Switching a set of NHLFEs.
Router (LSR) a table containing information,
Label Information Base (LIB) on further treat- MPLS can operate on a label stack. Operations
ment of the packet is looked up. This is illus- on this stack are push, pop and swap. This can
trated in Figure 23. This base may also be re- be used to merge and split traffic streams. The
ferred to as the Next Hop Label Forwarding push operation adds a new label at the top of the
Entry (NHLFE), which typically contains stack and the pop operation removes one label
the following information (ref. [RFC3031]): from the stack. The MPLS stack functionality
can be used to aggregate traffic trunks. A com-
• Next hop of the packet; mon label is added to the stack of labels. The
result is an aggregated trunk. When this MPLS
• Operation to perform on the packet’s label path is terminated the result will be a splitting
stack (replace the label at the top with another (de-aggregation) of the aggregated trunk into
label, pop the label stack, or replace the label its individual components. Two trunks can be
at the top of the stack with a new label and at aggregated in this way if they share a portion of
the same time push one or more new labels their path. Hence, MPLS can provide hier-
onto the stack); archical forwarding, which may become an
important feature. A consequence may be that
• Data link encapsulation to use when transmit- the transit provider need not carry global routing
ting the packet; information, thus making the MPLS network
more stable and scalable than a full-blown
• Way of encoding the label stack when trans- routed network.
mitting the packet;
To limit the number of MPLS paths, merging
• Other information relevant to forwarding can be utilised. Then two paths in the same
treatment. direction and with common requirements are
placed together in a common LSP on the out-
In a given LSR, the “next hop LSR” may be going side resulting in a many-to-one mapping
the same LSR, implying that the top level label of labels.
should be popped and the packet “forwarded” to
itself, allowing or more forwarding decisions.
74 Telektronikk 2/3.2001
6.2 TE and MPLS is in F if there is an LSP going from x to y.
An explicitly routed LSP is an LSP whose path d represents the set of demands and restric-
is established by means other than normal IP tions associated with F.
routing. In one approach this requires among
other things a management system representa- The fundamental problem of designing an MPLS
tion as described in [Henr01]. network is to relate the two graphs such that an
objective function is optimised. This is add-
When utilising MPLS with Traffic Engineering, ressed in several accompanying papers in this
a number of mapping relations is asked for, see Telektronikk issue.
Figure 23:
One of the requirements from Traffic Engineer-
• Mapping packets onto FECs. An FEC com- ing is to be able to reroute an LSP under a num-
poses a group of packets to be forwarded over ber of conditions (failure, better route available,
the same path with the same forwarding treat- etc.). This should preferably be done without
ment. In order to carry out this mapping fields disturbing the traffic flows; for example by
in the IP packet are examined. establishing the new LSP before the old/existing
LSP is released, which is called make-before-
• Mapping FECs onto traffic trunks. A traffic break. In case the existing and new LSP compete
trunk is an aggregation of traffic flows of the for the same resources, particular concerns have
same class. A traffic trunk can again be routed to be made, also considered by the admission
(placed inside an LSP, i.e. a traffic trunk is control.
only given for one LSP and not a sequence of
LSPs). As mentioned above, IP packets are classified at
the ingress of the MPLS domain into a number
• Mapping traffic trunks onto LSPs. of Forwarding Equivalence Classes (FECs). All
the packets in a given FEC are treated the same
• Mapping LSPs onto links in the physical net- way within the domain. Choosing the use of
work. FEC may depend on criteria like:
In several sources, the terms traffic trunk and • the user (derived from the source address,
LSP are used synonymously. However, a funda- interface, etc.);
mental difference between traffic trunk and LSP • the application type;
can be observed; that is, a traffic trunk is an • the packet destination.
abstract representation of traffic to which spe-
cific characteristics can be associated. An LSP A traffic trunk is described by its ingress and
is a description of a path in the network through egress LSRs, the set of FECs which is mapped
which the traffic traverses. onto it, and a set of attributes that gives its char-
acteristics. Two fundamental questions have to
Trunks having the same egress point may be be answered related to traffic trunks; i) how to
merged into a common tree. This may reduce the give the characteristics; and ii) how to relate
number of trees significantly. Trunks can also be traffic trunks to the physical network (through
aggregated by adding a new label to the stack for LSPs). This requires three capabilities:
each trunk (that is, bundling the trunks into a
single path/tunnel). • Set of attributes characterising the traffic
trunks that give its characteristics;
Designing an MPLS network “on top of” a phys-
ical network could be looked upon as relating • Set of attributes related with resources that
two graphs to each other; constrain the placement of traffic trunks onto
the resources;
• Physical graph, G = (V, E, c), is a capacitated
graph depicting the physical topology of the • Mechanism for placing/maintaining traffic
network. V is the set of nodes in the network trunks onto the set of resources.
and E is the set of links. For v to w in V, (v, w)
represents the link in E when v and w are For the last item, constraint-based routing could
directly connected under G. c indicates the set be applied as described in [Feng01].
of capacity and other constraints associated
with E and V. Attributes characterising traffic trunks are
([RFC2702]):
• MPLS graph, H = (U, F, d), where U is a sub-
set of V representing the LSRs, that is the set • Traffic parameter attributes. These are used
of LSRs that are end point of at least one LSP. to describe the traffic flows (the FECs) trans-
F is the set of LSPs. For x and y in U, (x, y) ported in the traffic trunk. Relevant parame-
Telektronikk 2/3.2001 75
ters include peak rates, average rates, maximal fic trunk. In case of fault the traffic trunk
burst size, etc. Possibly, equivalent measures could be rerouted or not depending on the
could be applied, like the effective bandwidth. value of this attribute. For rerouting, the
constraints given (e.g. by affinity) could be
• Explicit path specification attribute. An ex- observed or not.
plicit path assignment for a traffic trunk is
a path that is specified through “operator” • Policing attribute. The value of this attribute
action (e.g. management procedures). Such a tells which actions to take when the traffic on
path can be completely or partially specified. the trunk is non-compliant (excessive traffic).
Path preference rules may be associated with Examples of actions are packet dropping (rate
explicit paths, telling whether the explicit limiting), packet tagging and packet shaping.
path is “mandatory” (has to be followed) or
“optional” (other paths could be selected in In addition to attributes related to traffic trunks,
case sufficient resources are not available on some attributes are also related to resources (fre-
the preferred path). quently thought of as the links). These attributes
are ([RFC2702]):
• Resource class affinity attribute. This attribute
can be used to specify which resource types • Maximum allocation multiplier attribute. The
that can be explicitly included or excluded value of this attribute tells what proportion of
from the path through which the traffic trunk the link and buffer capacity that is available.
is routed. If no affinity attribute is given a Then “over-allocation” could be achieved (as
“don’t care” condition is assumed. Routing well as “under-allocation”).
traffic trunks onto resources have to take these
attributes into account, matching the require- • Resource class attributes. The attributes
ments. express the resource type (e.g. thought of as
colours). These are matched with the traffic
• Adaptivity attribute. As network state and trunk affinity attribute when finding paths
traffic state change over time, more optimal onto which the traffic trunks are routed.
routes of traffic trunks could appear. Setting
this attribute tells whether or not the route can Basic operations on traffic trunks are
be re-optimised for the traffic trunk. However, ([RFC2702]):
appropriate thresholds should be given avoid-
ing too frequent changes of routing. • Establish a traffic trunk;
• Activate a traffic trunk, to start forwarding
• Load distribution attribute. In case several packets;
traffic trunks are used between the pair of • Deactivate a traffic trunk;
nodes, the load distribution attribute can tell • Modify attributes for a traffic trunk;
whether or not the load (traffic trunk) can be • Reroute a traffic trunk;
distributed on these trunks. In general the • Remove a traffic trunk.
packet order should be maintained, implying
that packets belonging to the same traffic flow In addition to these basic operations, a few more,
are transferred on the same traffic trunk. like policing and shaping could also be defined.
• Priority attribute. This attribute gives the rela- A traffic trunk is defined as unidirectional. As a
tive importance of the traffic trunk. The value bidirectional transfer capability is commonly
can be used to determine the order in which asked for, two traffic trunks having the same end
trunks are assigned to paths under establish- points but passing packets in opposite directions
ment and failure situations. Priorities will also can be defined. In case these are always handled
be used together with pre-emption. as a unit, it is called a bidirectional traffic trunk
(they are established as an atomic operation and
• Pre-emption attribute. The value of this one may not exist without the other). If a trunk is
attribute tells whether or not a traffic trunk can routed through a different physical path than the
preempt another traffic trunk, and whether or corresponding trunk in the opposite direction,
not another traffic trunk can preempt a spe- the bidirectional traffic trunk is called topologi-
cific traffic trunk. This will assist to ensure cal asymmetric. Otherwise, it is called topologi-
that high priority traffic trunks are routed cal symmetric.
through even though the capacity is not suffi-
cient to handle all traffic trunks. MPLS is an essential component for carrying
out Traffic Engineering in IP-based networks.
• Resilience attribute. The resilience attribute A simple argument is its inherent feature to cir-
gives the behaviour of a traffic trunk when cumvent the “ordinary” IP packet handling in
faults occur along the path followed by a traf-
76 Telektronikk 2/3.2001
traversed routers. According to [RFC2702], the 6.3 MPLS-support of DiffServ
advantages of MPLS can be further described by: Utilising MPLS to carry DiffServ classes has
been looked upon with much interest. This is
• Explicit label switched paths which are not described in e.g. [ID_MPLSdiff]. Then the ques-
constrained by the destination based forward- tion arises how to map the behaviour aggregates
ing paradigm can easily be created through (BAs) onto LSPs. Basically this can be done by
administrative action or through automated either:
actions by the underlying protocols.
• Using LSPs that carry several Ordered Aggre-
• LSPs can potentially be efficiently main- gates (OAs), implying that the Exp field in the
tained. MPLS header is used for separating different
classes (giving scheduling treatment, prece-
• Traffic trunks can be instantiated and mapped dence, etc.). This is called Exp-inferred PSC
onto LSPs. LSPs (E-LSPs). Then up to eight BAs (3 bits
in the Exp field) can be carried by a single
• The attributes can be associated with traffic LSP. Mapping from Exp to PHB (PSC and
trunks that modulate their behavioural charac- drop precedence) for an LSP is either explic-
teristics. itly signalled or pre-configured; or
• A set of attributes can be associated with re- • Using LSPs to carry a single OA, saying that
sources that constrain the placement of LSPs the packet treatment can be derived from the
and traffic trunks across them. Label field while precedence might be derived
from the Exp field. This is called Label-only
• MPLS allows for both traffic aggregation and inferred PSC LSPs (L-LSPs). Then an LSP
disaggregation whereas classical destination carries a single (FEC, OA) pair. The PSC can
only based IP forwarding permits only aggre- be inferred from the label without looking at
gation. other information. This implies that the PSC
is explicitly signalled at label establishment.
• It is relatively easy to carry out constraint- The Exp field may give the drop precedence.
based routing with MPLS. In case ATM is used, information in the ATM
header can be used, e.g. the CLP field.
• A good implementation of MPLS can offer
lower overhead than competing alternatives As mentioned above, combining DiffServ and
for Traffic Engineering. MPLS allows further differentiation, e.g. by
defining different levels of protection for the
One way of designing MPLS networks is to LSPs.
apply constraint-based routing. Then the follow-
ing information is commonly used as input: DiffServ implies service differentiation at every
hop, while MPLS and TE may achieve better
• Attributes associated with traffic trunks; traffic distribution of the aggregated traffic
• Attributes associated with resources; loads. In this respect, they may work partly inde-
• Other topology state information. pendent of each other. Then, MPLS can apply
constraint-based routing and admission control
Based on this every node may find an explicit for all traffic flows carried in the same LSP. In
route for each traffic trunk originating from that case more fine-tuning of resources and traffic
node. Here, an explicit route for each traffic flows is sought, TE mechanisms may be applied
trunk is a specification of an LSP that satisfies on each service class or smaller groups of traffic
the demand requirements expressed by the traf- flows, e.g. by mapping more specific traffic
fic trunk’s attributes, subject to constraints im- trunks onto the LSPs.
posed by resource availability, administrative
policy, etc. Some requirements for support of DiffServ
by MPLS traffic engineering are listed in
A heuristic approach might follow two steps; [ID_DMreq]:
i) prone resources that do not satisfy the require-
ments of the traffic trunk attributes; and ii) run • Compatibility between mechanisms applied
a shortest path algorithm for the residual graph. on DiffServ and MPLS level;
In general, when multiple traffic trunks are to
be routed, it cannot be shown that the algorithm • Support of separate constraints on bandwidth
always finds a better mapping (or even a solution). for the different classes;
Telektronikk 2/3.2001 77
• Allow for pre-emption per class-type; For LDP a new TLV field (DiffServ TLV) is
described in [ID_MPLSdiff]. When a predefined
• Allow for specifying resource class affinity; mapping is applied between Exp and PHB, use
of this field is optional. The DiffServ TLV
• Support mapping of DiffServ classes as when includes information for mapping between Exp
MPLS is not used; and PHB for an E-LSP. For an L-LSP the Diff-
Serv TLV describes the PSC supported by the
• Allow dynamic adjustment of PHBs for Diff- LSP. The Label request, Label mapping, Label
Serv; release and Notification messages may include
the DiffServ TLV. Bandwidth reservation may
• Support multiple TE metrics, e.g. to be used be done by including the Traffic parameters TLV.
when finding routes of LSPs.
7 Resource Reservation
Then a transit LSR can be seen to consist of four When reserving capacity for a flow (or flow
functional stages (compare with Figure 23): aggregate) a setup protocol can be used. An
option is to apply management-related proce-
1. Determine the incoming PHB (i.e. which PHB dures for this purpose, implying that the man-
the packet belongs to); agement system could interact with the routers
instead of signalling being exchanged directly
2. Determine the outgoing PHB (optionally with between routers. In addition, a combination of
traffic conditioning, e.g. policing). When the management and signalling procedures may also
conditioning is not present the outgoing PHB work, for example when combining the action
is equal to the incoming PHB; with policy matters, bandwidth brokers, and so
forth.
3. Label swapping, i.e. from an incoming label
to an outgoing label; 7.1 Resource Reservation Protocol
(RSVP)
4. Coding of DiffServ information into the The Resource reSerVation Protocol (RSVP) is
“encapsulation layer” information, e.g. Exp frequently referred to when discussing reserva-
field, CLP, etc. tion of resources. The signalling sequence is
illustrated in Figure 24. RSVP was designed to
Suggestions for mapping between DiffServ enable senders, receivers, and routers of commu-
classes and “encapsulation layer” information nication sessions (either multicast or unicast) to
are given in [ID_MPLSdiff]. communicate with each other in order to set up
the necessary router state to support the services.
In order to establish LSPs supporting DiffServ RSVP is receiver-oriented, e.g. to overcome
by signalling, the signalling protocol has to be scalability problems for multicast and to allow
extended. For example, for RSVP a DiffServ heterogeneity for multicast.
object has been defined, see [ID_MPLSdiff]. For
an E-LSP this object includes a description of Each RSVP-capable node handles reservation
the mapping between Exp values and PHB. This and enforcement of traffic flows by using several
object contains the PSC for an L-LSP. Both E- modules (see Figure 25). The modules related to
LSPs and L-LSPs can be established with band- Integrated Services/RSVP in routers and hosts
width reservation or without reservation. When are the same, but the actual implementations are
bandwidth is to be reserved, a TSpec field is commonly different. An RSVP process on both
included in the PATH message and a Flowspec hosts and routers handles all the RSVP protocol
field is included in the RESV message as de- messages needed to establish reservations.
scribed for IntServ/RSVP.
78 Telektronikk 2/3.2001
Figure 25 RSVP
RSVP Messages
implementation overview
Appli- RSVP RSVP
cation Process Process
Policy Policy
Routing
Control Control
Process
Module Module
Admis- Admis-
sion sion
Traffic Control Traffic Control
Control Control
Host Router
The different modules are: The primary messages used by RSVP are the
PATH message, which originates from the traf-
• The RSVP process taking care of processing fic sender; and the RESV message, which origi-
of RSVP PATH and RESV messages. nates from the traffic receiver. The primary
functions of the PATH message are firstly to
• The Policy control module being responsible install reverse routing state in each router along
for enforcing policies. That is, the policy con- the path, and secondly to provide receivers with
trol module answers questions like “is the user information about the characteristics of the
allowed to do this” (ref. [Jens01a]). sender traffic and end-to-end path so that they
can make appropriate reservation requests. The
• The admission control module being responsi- primary function of the RESV messages is to
ble for ensuring that there are enough re- carry reservation requests to the routers along
sources for the admitted flows. If there is a the distribution tree between receivers and
shortage of resources the admission control senders.
module will deny reservation requests.
RSVP messages can be transported “raw” within
• The Packet Classifier and Scheduler support- IP packets using protocol number 46, although
ing appropriate handling of the traffic flows. hosts without this raw input/output (I/O) capabil-
The Packet Classifier looks at every data ity might first encapsulate the RSVP messages
packet to determine whether the appropriate within a UDP header.
flow has a reservation and which service class
the flow belongs to. The Packet Scheduler 7.1.1 TE-related Parameters
then makes the forwarding decision according As described above, the sender initiates a PATH
to the class. message, which carries a number of fields. Two
of these fields are of special interest as seen from
• The RSVP process would also interwork with a traffic engineering point of view; Sender_TSpec,
the Routing process since the routing informa- and AdSpec. The Sender_TSpec field carries
tion is subject to dynamic changes. information about the traffic to be generated.
This information is given as a set of token
RSVP identifies a communication session by the bucket parameters: token bucket rate [r], token
combination of destination address, transport- bucket size [b], peak data rate [p], minimum
layer protocol type, and destination port number, policed unit [m] and maximum packet size [M].
as given by the Multi-Field. It is important to For IntServ, these parameters are given for both
note that each RSVP operation only applies to Guaranteed and Controlled Load service class,
packets of a particular flow; therefore, every ref. Chapter 5.
RSVP message must include details of the flow
to which it applies. The AdSpec field includes flags telling whether
or not resources can be reserved along the com-
Telektronikk 2/3.2001 79
plete path. These flags are commonly called regions, packets are scheduled according to their
“break bits” as they indicate if gaps in the assigned service class. Because the number of
RSVP/IntServ scheme were faced by the PATH classes is given, packet scheduling is less
message. The AdSpec field is put together by demanding. However, there is a risk of conges-
fragments; starting by default general parame- tion within any service class. Instead of simply
ters, followed by fragments for each function combining all flows blindly into one service
that is selected by the sender application. class, the overall bandwidth available for each
Absence of a fragment indicates that the sender service class can be specified. RSVP-based
application does not know or care about that admission control could be used to admit new
functionality. Then neither the intermediate flows if there is sufficient bandwidth within the
nodes nor the receiver node should select such service class. In this manner, the advantages of
functionality. Information in the AdSpec field admission control still apply, but the packets
can be modified by intermediate nodes. Typical within each service class can be processed and
fragments in the AdSpec field, in addition to the routed more efficiently.
flags are: number of hops, estimate of bandwidth
available, minimum path latency and maximum 7.1.3 Hierarchical RSVP
transfer unit. These are described in [RFC2215]. Activities within the IETF are also examining
hierarchical RSVP. While set-up and release pat-
The combination of Receiver_TSpec and RSpec terns of single RSVP flows are unpredictable,
fields in the RESV message is frequently called the aggregation of a greater number of flows
the FlowSpec field. This carries the information seems less varying. The idea of hierarchical
from the receiver through the network, indicat- RSVP is that routers at the edge of aggregating
ing which functionality and values of parameters regions use RSVP to reserve large “pipes” with
that are requested. For the Controlled Load ser- particular characteristics through the region. At
vice, the FlowSpec field contains the same set of the ingress router, packets are assigned to a pipe
parameters as for the Sender_TSpec (i.e. mainly and encapsulated so they can be classified and
the leaky bucket parameters). For the Guaran- scheduled as part of the pipe. Source and desti-
teed service two more parameters in addition to nation of the encapsulated packet would be
those in the Sender_TSpec field are given. These ingress and egress routers. A limited number
are referred to as the RSpec; the rate [R], and the of different service classes is available. Since
slack term [S]. The RSpec parameters are also RSVP is receiver-oriented, pipe reservations
described in [RFC2212]. have to be made by egress routers. Egress routers
could reserve a number of pipes by default and
RSVP defines a session to be a traffic flow with then adjust the reservations as the actual demand
a particular destination and transport layer proto- becomes known. When the demand changes,
col. The RSVP can then be used by end applica- pipe reservations can be further adjusted. A pipe
tions to select and invoke the appropriate class reservation is only maintained if there is a suffi-
and QoS level. It has been claimed, see cient capacity associated with the reserved flows
[RFC2208], that RSVP does not scale to the size to use the pipe. Therefore, a router does not nec-
of the Internet. To overcome this problem sev- essarily have to have a pipe to every other
eral solutions have been proposed as described router, leading to better scaling of the mecha-
in the following subsections. nism. Reserved flows for which no pipe exists
are served as usual, without aggregation.
7.1.2 Class-based Aggregation
One intention of introducing aggregation is that The advantage of hierarchical RSVP is the re-
individual flows do not have to be reflected by a duction of reservation state information in the
state in each intermediate router. The states refer routers. Routers in the interior of aggregating
to a class and then the traffic flows are put into regions only keep reservation state for the outer
the set of classes. pipe reservations. Packet scheduling is simpli-
fied by offering only a few choices of classes.
On entering the aggregating region, each flow The main disadvantage is that packet classifying
for which a reservation was made, is assigned is still done by looking into the packet headers
to one of the service classes. Flows with similar and comparing source and destination against
service requirements are grouped together into a the (now shorter) list of reservations.
service class. (Service class definition and flow
assignment are subjects of ongoing research.) 7.1.4 Enhancing RSVP for MPLS
Each packet is marked with a tag that identifies Once an LSP is established the traffic on the
which service the flow should receive. For IP, path is identified by the label assigned by the
this tag could consist of the Type of Service ingress node of the LSP. The packets that are
(ToS) bits in the packet header (e.g. similar to given the same label values by a specific node
DiffServ) or the packet could be encapsulated belong to the same forwarding equivalence class
(e.g. similar to MPLS). Inside the aggregating (FEC). When labels are assigned to traffic flows,
80 Telektronikk 2/3.2001
ingress Figure 26 Illustration of LSP
LER A LSP
set-up by using RSVP
pa
incoming traffic th
(B mes
, C sa
, D ge
)
res path message LSR C path message
v (C, D) (D) LER D
(la mes
be sag
l7 e
)
resv message resv message
LSR B (label 3) (label 5) egress
a node may use it to index the corresponding Using explicitly routed LSPs, a node at the
reservation state. Thus, when MPLS and RSVP ingress edge of an MPLS domain can control the
are combined, the definition of a traffic flow can path through which traffic traverses from itself,
be made more flexible. Compared to an ordinary through the MPLS domain, to an egress node.
RSVP way of identifying a flow, more general- Explicit routing can be used to improve the utili-
ity can be obtained when MPLS is also consid- sation of network resources and enhance traffic
ered. Then, the ingress node of an LSP can use a oriented performance characteristics.
variety of means to determine which packets that
are assigned to a particular label. After assigning Explicitly routed label switched paths can be
a label to a set of packets, the label may identify generalised through the notion of abstract nodes.
a flow. The actual packets within the flow are An abstract node is a group of nodes whose
“hidden” for intermediate nodes. Hence these internal topology is opaque to the ingress node
nodes do not need to be aware of which flows of the LSP. An abstract node is said to be simple
(sources, destinations, applications, etc.) that are if it contains only one physical node. Using this
placed into the LSP. concept of abstraction, an explicitly routed LSP
can be specified as a sequence of IP prefixes or
The setup protocol uses downstream on-demand a sequence of Autonomous Systems.
label distribution. That is, a request introduces
an LSP and assigns a label. This is initiated by The signalling protocol model supports the spec-
an ingress node using the RSVP PATH message, ification of an explicit path as a sequence of
see Figure 26. In order to allow this, the PATH strict and loose routes. The combination of
message is augmented with a Label_request abstract nodes and strict and loose routes sig-
field. The labels are allocated downstream and nificantly enhances the flexibility of path defini-
distributed (propagated upstream) by the RSVP tions.
RESV message (augmented with a Label field).
In order to complete the handling of LSPs, pro- Utilising the combinations of RSVP, MPLS and
cedures for label allocation, distribution, binding DiffServ is described in [RFC2430].
and stacking have to be devised. Moreover, the
concepts of strict and loose routes and abstract 7.2 Label Distribution Protocol
nodes enhance the way of handling LSPs. Five The Label Distribution Protocol (LDP) is de-
new fields (objects) are introduced in order to fined for distribution of labels within an MPLS
handle LSPs with RSVP; Label, Label_request, domain. Hence, RSVP could replace this proto-
Explicit_route, Record_route and Session_att- col. Introducing constraint-based routing, Con-
ribute. In addition, some changes are also seen straint-based Routing LDP (CR-LDP), extends
for the fields Session, Sender_template, the information used when setting up paths
Filter_spec and Flowspec. beyond what is available for the routing proto-
col. The idea is that the LSP will then be better
A key advantage using RSVP to establish LSPs suited to serve the traffic flows. Explicit routing
is that allocation of resources along the path is can be said to be a subset of the more general
possible. Resource reservation, however, is not constraint-based routing, as the constraint actu-
mandatory. Such LSPs without resource reserva- ally gives the route [ID_crldp].
tions can be used for example to carry best effort
traffic. They can also be used in many other con- CR-LDP is a simple, scalable, open, non-propri-
texts, including implementation of fallback and etary traffic engineering signalling protocol for
recovery policies under fault conditions, and so MPLS IP networks. CR-LDP provides mecha-
forth. nisms for establishing explicitly routed LSPs
in an MPLS network, as depicted in Figure 27.
Telektronikk 2/3.2001 81
ingress
Figure 27 Illustration of LSP
LER A LSP
set-up by use of CR-LDP lab
incoming traffic e
(B l req
, C ue
, D st
)
lab label request LSR C label request
el (C, D) (D) LER D
(la map
be pin
l7 g
)
label mapping label mapping
LSR B (label 3) (label 5) egress
ingress
These mechanisms are defined as extensions cate which types of resources an LSP can be
to LDP. Using CR-LDP, resources can also be placed on (often called colours).
reserved along a path to guarantee service levels
and adequate handling for traffic carried on the These features are reflected in a number of fields
LSP. (Type-Length-Value, ref. [Jens01]):
To designate an explicit path that satisfies the • Explicit route hop TLV – being a series of
constraints, it is necessary to discern the re- variable length TLVs where each gives the
sources available to each link or node in the net- address of a router (or router group) in a strict
work. For the collection of such resource infor- or loose sense.
mation, routing protocols can be extended to dis-
tribute additional state information. • Explicit route TLV – specifying the path to
be taken by the LSP to be established. It is
Additional fields are introduced in the LDP sup- composed of one or more Explicit route hop
porting constraint-based routing of LSPs. The TLVs.
following features are supported:
• Traffic parameters TLV – lists traffic parame-
• Strict and loose explicit routing; where the ters: peak rate (peak token rate, PDR, and
route is given by a list of groups of nodes. maximum token bucket size, PBS), committed
In case more than one router is given in the rate (committed token rate, CDR, and maxi-
group a certain level of flexibility is present mum token bucket size of this rate, CBS),
when fulfilling the explicit route. excess burst size, EBS. As seen, a dual token
bucket may be used, one operating on the
• Specification of traffic parameters; for in- peak rate and another operating on the com-
stance given by peak rate, committed rate and mitted rate. A flag field is used to indicate
delay variation allowed. which of the parameters that can be negoti-
ated. A weight field is also included specify-
• Route pinning; which can be used when it is ing the LSP’s relative share of a possible
undesirable to change the path followed by the excess bandwidth above its committed rate.
LSP, e.g. in loosely routed segments in case a
better route becomes available in that seg- • Pre-emption TLV – containing the set-up and
ment. holding priorities.
• LSP pre-emption through set-up/holding pri- • LSPID TLV – giving the unique identifier of
orities; set-up and holding priorities are used the LSP, composed of the ingress LSR iden-
to rank existing LSPs (holding priority) and tity (or its IP address) and a locally unique
the new LSP (set up priority) to determine LSP identity for that LSR.
whether the new LSP can preempt an existing
LSP. Priorities in the range from 0 (highest) to • Resource class (colour) TLV – specifying
7 (lowest) are suggested. which link types that are acceptable for the
LSP given as a bit mask (32 bits).
• Failure handling.
• Route pinning TLV – indicating whether
• LSP identity. route pinning is requested (bit set) or not (bit
cleared). A single bit is currently defined.
• Resource classes; used when the network
resources are categorised into classes to indi-
82 Telektronikk 2/3.2001
Category CR-LDP RSVP
State management Hard state Soft state; needs per-flow refresh management
Base architecture Based on LDP developed for MPLS Based on RSVP, but may require major changes
to the basic protocol to improve its scalability
Signalling of QoS and Can signal DiffServ and ATM Extendable; currently based on IntServ
traffic parameters traffic classes traffic classes
Types of LSPs Strict, loose and loose pinned Strict and loose, no pinning
Modes of label distribution Easy to support all modes since Only downstream on demand; need to run
and LSP set-up CR-LDP is based on LDP both RSVP and LPD for other modes
Failure recovery Global and local repair Global and local repair; local repair done
using fast-reroute which requires precomputing
alternative paths at every node
Loop detection/prevention LDP employs Path Vector TLV to prevent May be done using the Record Route object
Label Request messages from looping.
Hop Count TLV is used to find looping LSPs
Path optimisation and rerouting LSP id can be used to prevent double Shared explicit filter prevents double booking
booking of bandwidth for an LSP when of bandwidth for an LSP when doing
doing ‘make-before-break’ ‘make-before-break’
7.3 RSVP and LDP Overview • The direction for reserving resources differs Table 2 Comparison of
As described above, both RSVP and LDP can be (i.e. ingress to egress and egress to ingress); CR-LDP and RSVP
used for establishing LSPs. These protocols are (from [Ghan99])
somewhat different as they were developed for • RSVP uses refresh messages for each LSP
different purposes. RSVP was developed to sup- (some work is taken on to change this);
port the IntServ service architecture enabling
an application to signal a request to reserve • CR-LDP might have more problems dealing
resources in the network. On the other hand, with failures and requires the rebuilding of
LDP is developed for the particular purpose of LSPs on a backup system. RSVP includes
establishing LSPs in the network, i.e. with this mechanisms to recover from failures, possibly
protocol information can be exchanged between being more fault-tolerant;
routers about which labels can be used and for
what purposes. • Extensions to RSVP for policy management
have been proposed.
A comparison of Constraint-Based LSP set-up
using LDP (CR-LDP) and LSP set-up using 8 Concluding Remarks
RSVP is given in Table 2. The main IP-related mechanisms have been out-
lined in this paper. These are promoted to sup-
The main differences between CR-LSP and port a range of services as well as allowing for
RSVP are that: ensured service levels (at least to some extent).
Therefore, most providers are investigating
• CR-LDP uses TCP whereas RSVP is carried which mechanisms to introduce and how to con-
directly on IP (or within UDP), which may figure the mechanisms. Another aspect is that
imply that information exchange with CR- different mechanisms may be preferable in dif-
LDP could be more reliable; ferent portions of the network/system. However,
still the end-to-end service is not adequately
delivered. This requires that solutions for map-
Telektronikk 2/3.2001 83
ping between the different mechanisms are in (ECN) to IP. draft-ietf-tsvwg-ecn-00.txt. Work
place. in progress.
Several of the papers in this issue of Telektron- [ID_MPLSdiff] IETF. 2000. Le Faucheur, F et
ikk address various aspects of this. The material al. MPLS Support of Differentiated Services.
in this article is intended to support the basic draft-ietf-mpls-diff-ext-07.txt. Work in progress.
understanding and thereby ease the comprehen-
sion of the remaining material. [ID_tcpecn] IETF. 2000. Floyd, S, Ramakrish-
nan, K K. TCP with ECN: The treatment of
References Retransmitted Data Packets. draft-ietf-tsvwg-
[Bern00] Bernet, Y. 2000. The Role of the Host tcp-ecn-00.txt.Work in progress.
Supporting the Full Service QoS Enabled Net-
work. Internet2 workshop. Houston. (2001, [Jens01] Jensen, T. 2001. Internet Protocol and
October 24) [online] – URL: http://www.inter- transport protocols. Telektronikk, 97 (2/3),
net2.edu/qos/houston2000/proceedings/ 20–38. (This issue.)
Bernet/20000210-QoS2000-Bernet.pdf
[Jens01a] Jensen, T. 2001. Traffic Engineering –
[Bern00a] Bernet, Y. 2000. The Complementary Inter-domain and Policy Issues. Telektronikk, 97
Roles of RSVP and Differentiated Services in (2/3), 170–185. (This issue.)
the Full-Service QoS Network. IEEE Com.
Mag., 38 (2), 154–162. [Kell00] Kelly, F P, Key, P B, Zachary, S. 2000.
Distributed Admission Control. IEEE Journal on
[COST257] COST. 2000. Impacts of New Ser- Selected Areas in Communications, 18 (12),
vices on the Architecture and Performance of 2617–2628.
Broadband Networks. COST 257 Final Report.
[RFC1633] IETF. 1994. Braden, R, Clark, D,
[Feng01] Feng, B et al. 2001. State-of-the-art of Shenker, S. Integrated Services in the Internet
IP Routing. Telektronikk, 97 (2/3), 130–144. Architecture: an Overview. (RFC 16333.)
(This issue.)
[RFC2208] IETF. Mankin, A et al. 1997.
[Ghan99] Ghanwani et al. 1999. Traffic Engi- Resource ReSerVation Protocol (RSVP) Version
neering Standards in IP Networks Using MPLS. 1 Applicability Statement. Some Guidelines on
IEEE Com Mag., 37 (12), 49–53. Deployment. (RFC 2208.)
[Henr01] Henriksen, T, Kåråsen, A-G, Wolland, [RFC2211] IETF. Wroclawski, J. 1997. Specifi-
S. 2001. Modelling the topology of IP networks. cation of the Controlled-Load Network Element
Telektronikk, 97 (2/3), 213–229. (This issue.) Service. (RFC 2211.)
[ID_crldp] IETF. 2000. Jamoussi, B et al. Con- [RFC2309] IETF. 1998. Braden, B et al. Recom-
straint-Based LSP Setup using LDP. draft-ietf- mendations on Queue Management and Conges-
mpls-cr-ldp-04.txt. Work in progress. tion Avoidance in the Internet. (RFC 2309.)
[ID_DMreq] IETF. 2001. Le Faucheur, F et al. [RFC2430] IETF. 1998. Li, T, Rekhter, Y. A
Requirements for support of Diff-Serv-aware Provider Architecture for Differentiated Services
MPLS Traffic Engineering. draft-ietf-tewg-diff- and Traffic Engineering (PASTE). (RFC 2430.)
te-reqts-01.txt. Work in progress.
[RFC2474] IETF. 1998. Nichols, K et al. Defini-
[ID_dsterms] IETF. 2000. Grossman, D. New tion of the Differentiated Services Field (DS
Terminology for Diffserv. draft-ietf-diffserv- Field) in the IPv4 and IPv6 Headers. (RFC
new-terms-03.txt. Work in progress. 2474.)
[ID_ecn] IETF. 2000. Ramakrishnan, K K et al. [RFC2475] IETF. 1998. Blake, S et al. An Archi-
The addition of Explicit Congestion Notification tecture for Differentiated Services. (RFC 2475.)
84 Telektronikk 2/3.2001
[RFC2597] IETF. 1999. Heinanen, J et al. RSVP-based Admission Control over IEEE 802-
Assured Forwarding PHB Group. (RFC 2597.) style networks. (RFC 2814.)
[RFC2598] IETF. 1999. Jacobson, V et al. An [RFC2990] IETF. 2000. Huston, G. Next Steps
Expedited Forwarding PHB. (RFC 2598.) for the IP QoS Architecture. (RFC 2990.)
[RFC2697] IETF. 1999. Heinanen, J, Guerin, R. [RFC2998] IETF. 2000. Bernet, Y et al. A
A Single Rate Three Color Marker. (RFC 2697.) Framework for Integrated Services Operation
over Diffserv Networks. (RFC 2998.)
[RFC2698] IETF. 1999. Heinanen, J, Guerin, R.
A Two Rate Three Color Marker. (RFC 2698.) [RFC3031] IETF. 2001. Rosen, E et al. Multi-
protocol Label Switching Architecture. (RFC
[RFC2702] IETF. 1999. Awduche, D et al. 3031.)
Requirements for Traffic Engineering Over
MPLS. (RFC 2702.) [Robe01] Roberts, J W. 2001. Traffic Theory
and the Internet. IEEE Com Mag., 39 (1), 94–99.
[RFC2753] IETF. 2000. Yavatkar, R et al. A
Framework or Policy-based Admission Control. [Tane96] Tanenbaum, A S. Computer Networks.
(RFC 2753.) Upper Saddle River, NJ, Prentice Hall, 1996.
Telektronikk 2/3.2001 85
Planning and Designing IP-based Networks
TERJE JENSEN, METTE RØHNE, INGE SVINNSET,
RIMA VENTURIN AND IRENA GRGIC
Offering a range of services, it is essential for an operator to configure the network such that the perfor-
mance levels are achieved as expected. Hence, for a multi-service IP-based network the mechanisms
available have to be set up to support the service portfolio. Preparing for this, an operator has to have
an apparatus in place to estimate the demands and to design the network. These aspects are
addressed in this article.
86 Telektronikk 2/3.2001
Demand Network element Management
characteristics characteristics policy External
factors
activities has to be conducted to prepare for pro- • External factors. Other phenomena to be taken
vision of services. into account are put into a common group.
Inge Svinnset (46) is Senior Examples of such factors are ways of inter-
Research Scientist at Telenor These inputs are categorised as: connecting, regulatory directives, competitors’
R&D. His research interests actions, etc.
include teletraffic, network per-
formance, Quality of Service • Demand characteristics. The demand patterns
and dimensioning. During the for the different applications have to be speci- • Charging and accounting policy. The charging
last ten years he has been fied. Besides the demand patterns for the principles may be identified as flat rate charg-
involved in several European
research projects related to applications, characteristics of each applica- ing, volume based charging, time based charg-
ATM network performance and tion have to be more closely specified, e.g. in ing and congestion-based charging, or a com-
dimensioning. He is currently terms of required bit rates, delay requirements, bination of these. In addition to the charging
working with Quality of Service
and Traffic Engineering in IP etc. This also includes the set of traffic matri- principles the tariffs may vary over certain
networks. ces referring to certain instances of time. time periods, i.e. over the day and specific
inge-einar.svinnset@telenor.com Commonly a number of traffic matrices would days during a week, and so forth.
be needed, each related to a set of applica-
tions. A traffic matrix gives the amount of Deciding upon an efficient network design
traffic requested from an originating location implies that an objective function has to be spec-
area towards a destination. When the traffic ified in order to settle which designs are the bet-
sources are moving, the spatial impacts have ter ones. That is, the objective function would be
to be taken into account more closely. a measure on how good the solutions is, imply-
ing that any improvement in the design results in
• Network element characteristics. The network a better objective value. Thus, this can be seen
elements belong to the set of building blocks as an optimisation problem using the objective
that the network may be composed of. These function and a set of constraints. One set of clas-
elements have to be described in ways rele- sical objective functions used contains a measure
vant for traffic and resource handling. That is, of cost. This will reflect the capacities needed of
information like capacity per unit, hierarchy the different equipment types. The constraints
of units, dependability and load sharing fea- would then state the demands to be served as
tures, queueing management principles, well as other requirements, e.g. those belonging
admission control mechanisms, and so forth, to the management policy group of inputs.
have to be specified. When a cost model is
Rima Venturin (32) is Research
Scientist at Telenor R&D. She is used, some of the network element character- After finishing the deployment investigations,
involved in projects related to istics will also be included in the cost calcula- an appropriate way of configuring the network
broadband network planning. tions. Which elements to consider depends on resources in order to handle the traffic flows is
She is currently working with
techno-economics of IP-based the scope of the study. In some cases only found. In addition to the technical solution, other
networks. Other activities in- routers and transmission link capacity are aspects might also be relevant, like some eco-
clude demands and application looked at, while other types (e.g. call servers, nomic measures.
modelling. She received her
MScEE degree from the Univer- management systems, etc.) may also be rele-
sity of Zagreb in 1995. vant for other studies. 2.2 Relations with Economic
rima.venturin@telenor.com Considerations
• Management policy. The main principles of Usually, a management team considers the eco-
handling traffic and network resources belong nomic variables when deciding upon steps for
to the management policy. That is, principles changing a network. This means that these vari-
like which routing policy to apply, which ables should be estimated. In order to carry out
dependability principle to use, and so forth, such studies, a combination of technical and eco-
are placed in this category. Ways of integrat- nomic considerations is needed. That is, the
ing and segregating types of traffic flows may technical aspects may involve demand estima-
be candidates to be decided on. tion, description of network building blocks,
Telektronikk 2/3.2001 87
Demands modelling
Architecture
Applications Traffic
demands flow Network topology
Applications Network
Operational elements
characteristics
costs
Market
Tariffs
Market
shares
Calculation
Regulations
Access Traffic
solutions load
Economic Data
Irena Grgic (30) is Research NPV, IRR
Scientist at Telenor R&D, Kjeller.
She is mainly involved in activi- Investments
ties related to QoS and charging
for different networks and sys-
Running costs
tems, and studies related to net- Revenues
work evolution, both in interna-
tional and national projects. She Cash flows
holds an MSc in Electrical Engi-
neering from the University of
Depreciations
Zagreb in 1999.
irena.grgic@telenor.com Figure 2 Illustration of work flow for techno-economic studies
technical performance requirements, and so ence periods is assumed for these calculations
forth. Economic aspects may include require- (e.g. similar to some “busy hour” although a
ments on net present value, cash flow restriction, shorter period than one hour would likely be
financial conditions, etc. Figure 2 contains an assumed). The reference periods may refer to
illustration similar to the one in Figure 1, with morning, afternoon, evening, or any other practi-
more emphasis placed on the economic side, on cal identification.
cost and revenue in particular. In order to arrive
at a tractable model, quite a few approximations Given these loads, the performance targets and
are made on the technical side. the capacities of the network elements, a roll-out
plan for the network arises. An aggregated plan
A techno-economic study will capture a number showing only the number of elements is given in
of time periods (e.g. years). The variables must Figure 4. Then, having the number of units
then refer to a number of the time periods, or an needed for each year and the cost for each of the
evolution of the variables must be given. Two units, a cash flow can be obtained. Here the
examples of traffic load are given in Figure 3. demands may also be related to a set of revenue
Starting with traffic load for individual applica- streams where a mixture of subscription rate,
tions, the total traffic load expected from a user usage rate and income from other parties (e.g.
can be estimated by looking at the simultaneous for commercial) may differ for the different
use of the applications. Commonly a set of refer- applications and user groups.
450 100
400 %
Traffic load (Gb/s)
350 80
Residential
300
60
250
200 Corporate
40
150 Large SMB
100 20
Small SMB
50
Micro SMB
0 0
1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 10
Time period (year) Time period (year)
Figure 3 Examples of traffic load inputs for a 10 year study period (left – aggregate traffic load, right – fraction of the traffic load
referring to customer segments)
88 Telektronikk 2/3.2001
400
In addition to the roll-out plans, accompanying Access nodes Figure 4 Illustration of a
economic measures are also asked for. Some of 350 roll-out plan for three
these are illustrated in Figure 5 a) and b). 300 types of network
Number of units
250
Edge routers elements (in a 6 year
Trying to predict a future situation, most of the study period)
200
values are associated with uncertainties. There-
fore, carrying out sensitivity analyses becomes 150 Core routers
450
400
Investments
350 Running costs
Depreciations
Million Cost units
300
250
200
150
100
50
0
1 2 3 4 5 6 7 8 9 10
Time period (year)
a)
200
Revenues
150 Cash Flow
Profits
Cash Balance
Million Cost units
100
50
0
1 2 3 4 5 6 7 8 9 10
Telektronikk 2/3.2001 89
Figure 6 Feedbacks on two other factors (e.g. profit
level, revenue sharing,
levels – technical and competition)
economic
Tariffing
policy
network cost
performance
Interest Demand Network
design
90 Telektronikk 2/3.2001
• Penetration: giving the fraction of potential charging schemes. How to reach an efficient
users that use the applications; interplay with the demand applying such effects
is a major area where several questions still
• Number of sources: giving the number of remain unanswered. A further example of the
potential users. technical feedback is illustrated in Figure 6.
Again, these calculations could be done in a In addition to the service characterisation men-
number of ways. Moreover, the values have to tioned so far, issues related to implementation
be referenced to a certain level in the network, could be considered. For instance, three ways
as schematically given in Figure 8. of supporting services could be relevant:
This is due to the distribution of the traffic, i) Service with connectivity to a predefined set
given by the traffic matrices, and the effect that of destination points. One example can be a
different link rates and other capacity units have virtual leased capacity service. In this case
on the traffic characteristics. Naturally, this dis- the Service Level Agreement (SLA) speci-
tribution might differ for the different applica- fies the allowed traffic towards these desti-
tions, e.g. due to accessing servers that are nation points (pipe model); there are no spa-
located at certain sites. tial gambling and the necessary resources
can be reserved in the network.
3 Characterising Applications
ii) Service with call admission control function-
3.1 Traffic Flows and Service ality. IP telephony may be implemented with
Implementation call admission control deciding whether to
A service class refers to a coherent way of treat- accept or reject a given call request based on
ing traffic flows. That is, it includes traffic han- knowledge about the available resources in
dling mechanisms/parameters and it may include the network. If resources are not available,
features like support of multicast, security and the service is blocked, otherwise the neces-
mobility. Identifying the proper set of service sary resources can be reserved and the con-
classes would also be an essential point in the nection established.
business decisions taken by an actor.
iii) A one-to-any service without call admission
The mapping of traffic flows resulting from the control functionality. In this case the SLA
use of applications into the set of service classes only controls the volume of the traffic flow-
may be a non-trivial task. Besides, a service ing over one user-network interface (of each
class and accompanying ways of handling the class and both directions). This is called a
traffic flows may refer to different aggregation hose SLA. The SLA is therefore not enough
levels and portions of the network as described to control the volume of traffic in a given
in the previous chapter. direction, i.e. a kind of spatial gambling on
traffic volume.
Traffic handling is the set of rules applied by the
control and network management system. On The three types provide various means for con-
this set of rules decisions like how to handle trolling the traffic flows and resource usage. For
flows in the network can be made. A segregation some types the result might be less efficient
scheme is applied when the set of network re- resource utilisation, but then likely accompanied
sources is divided for groups of traffic flows. by less complexity.
That is, some traffic flows get preference for an
amount of resources. Traffic flows with different 3.2 Inherent Characteristics of
characteristics are allocated to different Class of Applications and Traffic Flows
Service (CoS) based on various criteria, such as As stated in [Robe01] traffic descriptors should
different bitrate demands or different QoS re- satisfy three requirements:
quirements (e.g. delay variation, loss ratio).
These may also be considered when CoS indi- • Useful for resource allocation;
cators are assigned. For some services, other • Understandable by the user;
aspects like blocking, control delays and • Verifiable at the network ingress.
dependability requirements can be examined.
The routing scheme can differ for different traf- It is further stated that in practise it is impossible
fic streams. to fulfil all these requirements.
Various factors may influence the resulting traf- From the outset, two types of traffic flows have
fic load experienced by a network. In several been used – elastic flows and inelastic flows. As
cases feedback effects may be present, like flow understood by the former, it can adapt itself to
control algorithms implemented by TCP and conditions such as network congestion. This is
Telektronikk 2/3.2001 91
Figure 9 Resulting
characteristics of traffic flows
user
are largely influenced by a
number of factors, such as
inherent characteristics of Application
applications, usage of
Application application
applications, protocols used, characteristics/requirements
component
conditions in the network
service
capabilities
traffic characteristics
network requirements
Network
traffic flow
for example done by using the control mecha- • Best effort flows: These would have little
nisms inherent in TCP. On the other hand, UDP requirements, being able to adapt to the net-
as used for some inelastic flow does not contain work conditions. One example is exchange of
similar mechanisms. Hence, the set of protocols e-mails between servers.
applied will influence the resulting characteris-
tics. This is schematically illustrated in Figure 9. A characterisation of the traffic classed for
UMTS is summarised in Box A.
Then different classes of traffic flows may be
identified in several ways. One approach is the When estimating the aggregated traffic it seems
following categories: to be confirmed [Robe01] that the arrivals of
sessions follow closely a Poisson process (due
• Real-time stream flows: These would have to the inherent nature of superposition of a large
requirements on low delay, low delay varia- number of independent sources). However, the
tion, low loss ratios, and behaving so that a lengths of the sessions may vary (even following
fixed bandwidth could preferably be allocated. a so-called long-tailed distribution). This may be
Examples are uncompressed voice (no silence one of the motivations for some applying self-
suppression) and constant-rate video. similar modelling (where the traffic flow charac-
teristics look similar on different time scales).
• Real-time bursty flows: These would have The more detailed characteristics of the traffic
requirements on low delay, low loss ratios flows are more relevant when looking at the con-
and low delay variation, although generating figuring of units in the network elements, like
flows with varying bit rates. Examples are buffers.
compressed voice, variable coded video and
shared applications. 4 Characterising Network
Components
• Non-real-time stream flows: These would
have requirements on low loss ratios and some 4.1 Components of Networks
requirements on delay and delay variation. From the outset, different types of resources can
Packets will be generated at fixed rate. One be identified in a telecommunication network.
example is downloading of video from a Three basic categories are:
server where a play-out buffer is implemented
to deal with any delay variation in the net- • link/transfer bandwidth;
work. • buffer/storage space;
• computational.
• Non-real-time elastic flows: These would
have requirements on low loss ratios and some In one way, these resource types may be consid-
requirements on delay, like when TCP is used ered to reflect physical components in a network
and human interaction is involved. One exam- (e.g. transmission links, RAMs and CPUs,
ple is web browsing. respectively). However, more abstract/logical
representation can also be looked at, for in-
stance, when (logical) partitions of a resource
92 Telektronikk 2/3.2001
Box A Summarised Traffic Types in UMTS (from [22.105])
The main groups of applications, based on performance requirements are given in Figure A-1.
The end-user expectations are given in Tables A-1, A-2 and A-3.
Medium Application Degree of Data rate Key performance parameters and target values
symmetry
End-to-end Delay variation Information loss
one-way delay within a call
Audio Conversational Two-way 4–25 kb/s < 150 msec < 1 msec < 3 % FER
voice preferred
< 400 msec limit
Note 1
Video Videophone Two-way 32–284 kb/s < 150 msec < 1% FER
preferred
< 400 msec limit
Lip-synch:
< 100 msec
Data Telemetry Two-way < 28.8 kb/s < 250 msec N/A Zero
- two-way
control
Data Interactive Two-way < 1 kb < 250 msec N/A Zero
Data Telnet Two-way < 1 kb < 250 msec N/A Zero
(asymmetric)
Note 1: The overall one-way delay in the mobile network (from UE to PLMN border) is approximately 100 msec.
Medium Application Degree of Data rate Key performance parameters and target values
symmetry
One-way delay Delay variation Information loss
Audio Voice Primarily 4–13 kb/s < 1 sec for < 1 msec < 3 % FER
messaging one-way playback
< 2 sec for
record
Data Web-browsing Primarily < 4 sec/page N/A Zero
- HTML one-way
Data Transaction Two-way < 4 sec N/A Zero
services – high
priority, e.g.
e-commerce,
ATM
Data E-mail Primarily < 4 sec N/A Zero
(server access) One-way
Telektronikk 2/3.2001 93
Box A continued
Medium Application Degree of Data rate Key performance parameters and target values
symmetry
One-way delay Delay variation Information loss
Audio High quality Primarily 32–128 kb/s < 10 sec for < 1 msec < 1 % FER
streaming one-way
audio
Video One-way One-way 32–384 kb/s < 10 sec < 1 % FER
Data Bulk data Primarily < 10 sec N/A Zero
transfer/ one-way
retrieval
Data Still image One-way < 10 sec N/A Zero
Data Telemetry One-way < 28.8 kb/s < 10 sec N/A Zero
- monitoring
are considered for a set of traffic flows. Such a Both hardware and software related costs should
logical partition could be a certain amount of be taken into account. In several cases it is seen
transfer bandwidth, or a certain amount of the by an operator that the basic hardware and soft-
buffering capacity. Furthermore, a set of re- ware come at a specified price, although up-
sources can be bundled and considered as a com- grading the functionality by introducing new
ponent at a certain abstraction level. Such per- software packages would be relatively costly.
spectives are likely in a traffic/network manage- Such factors would be essential in a techno-eco-
ment system. These resources are commonly nomic study, but again might be less relevant
reflected in an objective function used to deter- during network design.
mine which configuration is the better one. For
network design costs of the resources are often 4.2 A Cost Model
essential components in the objective function. When elaborating a cost model a basic assump-
tion is that sets of resources can be related to
When calculating the overall cost of a network certain groups of traffic flows. In particular this
deployment, several aspects should be assessed. is relevant for link/bandwidth capacity. Here
These include the routers, the transmission LSPs can be applied, possibly with capacity
capacity, any service handler, management sys- reservation. Some measures of the required
tems, and so forth. Depending on the scope of capacity are then needed. For simplicity a single
the study, some of these may be less relevant. measure is adopted, like the effective bandwidth
For example, when a network design is to be defined. This measure is assumed in the discus-
found, aspects of management systems may not sion to follow. Other measures might also be
be considered when these are not affected by the incorporated in the model/algorithm presented.
resulting solution.
Control cost
Call handler
Switching cost
Transmission cost
IP-level network
Figure 10 Components of the
cost model/objective function
94 Telektronikk 2/3.2001
Besides the bandwidth cost, other contributions The one-to-any service type may have more
come from basic router functions (backplane, elastic behaviour, implying that actual relations
etc.) and processing in routers and call handlers, between traffic load and capacity are not strict.
see Figure 10. Thus, corresponding contributions Then a minimum capacity could be obtained
have to be incorporated in the cost model. The assuming some minimum effective bandwidth
traffic flows may contribute differently to the value (e.g. minimum acceptable throughput).
various cost components. For instance, a flow
not bothering the call handler is likely to have Switching cost, Zsq; reflecting the effort
lower cost associated with control (e.g. accep- requested for transferring packets from an input
tance control). to an output port. This cost component is
assumed to be proportional to the traffic load,
Referring to the illustration in Figure 11 three Ab, and the effective bandwidth, EBb, for flows
basic contributions to the cost can be identified of type b. That is, for a traffic aggregate q carry-
as described in the following: ing several types:
Transmission/link/bandwidth cost, Ztq; reflecting Zsq = Zsb = Ab (α · EBb + β)
the cost of links between routers as well as ter- b∈q b∈q
mination units within the routers. One unit of
transmission capacity between locations i and j where α and β are cost factors. These are chosen
with capacity Bij, has a cost Cij. Each transmis- to reflect actual router implementations. A cen-
sion link terminates with a module in location i tral point is to express the effective bandwidth
that has a cost Ci. The module may connect Ni of for the traffic flows. For some flows the charac-
these transmission links. The same relations teristics may be less influenced by the network
apply for location j. Assuming a traffic aggre- load, e.g. for inelastic traffic. Then an effective
gate q having capacity demand Bq, the band- bandwidth measure could be estimated for the
width cost for that aggregate carried from i to j original traffic source characterisation (mean
is calculated as: bitrate, peak bitrate, etc.). For other flow types,
in particular those using TCP flow control, the
Bq Bq Bq resulting characteristics for an individual flow
Ztq = Cij + Ci + Cj
Bij Ni Bij Nj Bij will depend on the network state. Thus, a base
estimate could be assumed depending on termi-
The relation between traffic load in a flow nal capabilities, duration of the transfer (due to
aggregate and the required capacity may not be slow-start behaviour) acceptable delay, etc. An
simple. Again this depends on the service types. important observation is that some “statistical”
For service involving call handler, an effective effects have to be considered during the network
bandwidth measure may be needed, for instance design task. One argument is that several inde-
when doing admission control. For some of pendent sources will be behind the traffic facing
these services, a blocking probability measure the network. Another factor is that several of the
may well be introduced. Thus, multirate block- values used would frequently be attached with
ing formulae could be applied, abstractly giving uncertainties, in particular when a future net-
the vector of blocking probabilities, Pb by: work is to be designed. A more detailed exami-
nation of effective rates of such sources could
Pb = f(A,R,C) be done when the resulting network design has
been found. The switching cost is frequently
where the load, A, and the characteristics, R, of associated with operations taking place per
all flows are to be supported by the capacity C. packet, like exercising traffic handling mecha-
A challenge is being able to find the needed nisms (policer, marker, etc.).
capacity, C. This could be done iteratively or
assuming approximate relationships. In case Control cost, Zcq; reflecting the processing
measurement-based algorithms are used, these requested for establishing/releasing a connec-
parameters may vary. To some extent this could tion. Control cost will commonly be related to
be captured by the effective bandwidth (consid- call handler functionality and other mechanisms
ering A and R), e.g. see [COST242]. implying exchange of information and configu-
ration of relevant traffic handling functions,
For some “pipe” services a fixed capacity is like policer, marker and shaper. It is frequently
specified between ingress and egress points (vir- assumed that each hop contributes to this cost.
tual leased capacity service) and this bandwidth That is, if no individual packets but rather aggre-
value can then be used. Similar arguments might gates are examined (e.g. due to the use of LSP
be relevant when a certain level of overbooking through-connection) the control cost is likely to
is introduced. be lower for that hop. For a call handler three
types of processing steps; connection request,
establishment and rejection, are considered.
Telektronikk 2/3.2001 95
Assuming there are N paths that could be used analyses varying the weight factors. In principle,
for establishing the connection, where path k has these weight factors can be considered as taking
blocking probability Pbk, this cost component part of the cost or placing relative credibility on
could be written as: each, e.g. when certain components are esti-
mated with higher accuracy.
Zc q = ∑ Zc b
b ∈q
5 Some Lessons Learned
Elsewhere
⎪⎧ A ⎡ N ⎤
While IP-based networks do have their charac-
= ∑ ⎨ b ⎢δ (1 − Pb1 ) + ( Nγ + ε)∏ Pbk ⎥
⎪
b ∈ q ⎩ hb ⎣ k =1 ⎦ teristics, looking at other networks may well
N −1⎡ i ⎤⎪⎫ give several ideas on how to efficiently config-
+∑⎢(δ + iγ )∏ Pbk (1 − Pbi +1 )⎥⎬ ure and manage the network. In most traditional
i= 1 ⎣ k =1 ⎦⎪⎭ telephone networks, a fixed hierarchical routing
has been applied. A number of results have indi-
where connections belonging to aggregate q cated that introducing more dynamic schemes
have a mean offered traffic of Aq with mean may improve the blocking and the network
duration hq. The cost factors δ, γ and ε express resilience. Three main types of dynamic routing
the effort related to a successful connection, an have been described:
additional search for paths and rejection of a
connection, respectively. As recognised, this • Time-dependent routing (TDR); changing
expression is adapted from circuit switched net- effective routing tables at pre-planned time
works. Depending on the router mechanisms instants, e.g. due to daily variations in the
available, more than one path may not be select- traffic pattern;
able. Then the expression becomes fairly simple.
• State-dependent routing (SDR); changing
Total cost is obtained by adding the different routing tables according to the network state,
contributions after assigning different weights. given e.g. by traffic load;
In this way the cost for a group of flows, Q, can
be calculated as: • Event-dependent routing (EDR); changing
routing tables triggered by certain events, like
ZQ = ∑ {kt Ztq + ks Zsq + kc Zcq } congestion thresholds crossed.
q∈Q
Low priority transit traffic – best effort general Includes general subscription or free
IP traffic (e-mail, Web, ftp, etc.) traffic delivered as a best effort
service (e.g. most web browsing)
96 Telektronikk 2/3.2001
Trade-offs Traffic management Routing table management Capacity management
TE methods applied TE methods considerably Control load comparable Design efficiency comparable
vs. not applied improving performance for the two cases for the two cases
Centralised vs. distributed Distributed control Control load comparable Design efficiency comparable
routing table control performance somewhat on per-node basis for for the two cases
better (more up-to-date the two cases
status information
Off-line/pre-planned (TDR) On-line control somewhat TDR and EDR control load SDR and EDR gives comparable
vs. online (SDR, EDR) better performance less than SDR design efficiency, both are better
routing table control than TDR
FR vs. TDR vs. SDR EDR/SDR performance FR/TDR/EDR have lower EDR/SDR design efficiency better
vs. EDR path selection better than TDR better control load than SDR than TDR better than FR
than FR
Multilink vs. two-link Multilink path selection Multilink path selection Multilink design efficiency better
path selection better under overload control load generally than two-link
Two-link path selection less than two-link path
better under failure. selection
Two-link path selection
lower call set-up delay
Sparse logic topology vs. Sparse topology better Sparse topology control Sparse topology design efficiency
meshed logical topology under overload. load generally less than somewhat better than multi-area
Meshed topology better meshed topology
under failure
Local status information vs. Local status performance Local status control load Design efficiency comparable for the
global status information somewhat better than global less than global status two cases
(more up-to-date information) control load
Status dissemination: Distributed query-for-status Centralized and distributed Design efficiency comparable for the
status flooding vs. somewhat better than status query-for-status two cases
distributed query-for-status flooding and centralized comparable on per-node
vs. centralised status status (more up-to-date basis. Status flooding
information) considerably higher control
load
Per-flow vs. per Comparable performance Per-virtual-network control Per-flow design efficiency somewhat
virtual-network (per-traffic load less than per-flow better than per-virtual network
trunk) traffic management control load
Integrated vs. separated Integrated network Total control load Integrated network design efficiency
voice and data network performance better than comparable for the better than separate network
separated network two cases
performance
In case the IP-based network is placed over • Traffic management, e.g. by controlling rout- Table 1 Trade-offs for
another network, an overlay model is seen. ing of traffic, used to maximise the network introducing TE-related
Then, the underlying network, e.g. WDM or performance under varying traffic load pat- mechanisms (from the E.TE
ATM, can be managed separately. However, terns; series of recommendations)
some initiatives are initiated to see the IP-layer
and an underlying network co-operating, like • Capacity management, e.g. by controlling
IP over optics. resource configuration, used to design the net-
work in order to minimise its cost while per-
Traffic Engineering encompasses mechanisms formance objectives are met.
that control a network’s response to traffic
demands and events that affect the traffic carry- Besides these, network planning can be said to
ing capabilities. As mentioned earlier, TE include planning and deploying node and trans-
includes: port capacity in advance of the traffic changes.
Thus, these three activities can be said to interact
on three time scales.
Telektronikk 2/3.2001 97
Learning from other networks a series of studies • E.TE1: Framework for Traffic Engineering
are documented in [ID_tems], although several and QoS Methods for IP-, ATM- and TDM-
of the results are seen for ISDN-like traffic based Multiservice Networks.
behaviour. Some of the main observations are:
• E.TE2: Traffic Engineering and QoS Methods
• Network performance seems to always be – Call Routing and Connection Routing Meth-
improved when TE methods are applied, and ods.
commonly a substantial improvement is seen.
• E.TE3: Traffic Engineering and QoS Methods
• Sparse-topology multilink routing networks – QoS Resource Management Methods.
provide better overall performance under
overload than meshed topology networks, • E.TE4: Traffic Engineering and QoS Methods
although performance under failure may – Routing Table Management Methods and
favour meshed topology with more routing Requirements.
alternatives.
• E.TE5: Traffic Engineering and QoS Methods
• Using state information as in SDR provides – Transport Routing Methods.
essentially equivalent performance as using
EDR. EDR is seen as an important class of TE • E.TE6: Traffic Engineering and QoS Methods
algorithms, being adaptive and distributed in – Capacity Management Methods.
nature. Moreover, EDR may allow less over-
head in terms of exchanging routing informa- • E.TE7: Traffic Engineering and QoS Methods
tion. – Traffic Engineering Operational Require-
ments.
• Bandwidth reservation is critical to stable and
efficient performance of TE methods, and to Some overall observations/results are captured
ensure proper operation of multiservice band- in Table 1.
width allocation, protection, and priority treat-
ment. Bandwidth allocation per logical net- 6 Network Design Algorithm
work (Virtual Network) is essentially equiva- The objectives of the algorithm for network
lent to per-flow bandwidth allocation when dimensioning are to obtain the capacities of
looking at network performance and effi- routers and link sets in this network and to find
ciency and allows great reduction in routing the number and paths of LSPs that give the low-
table management and size. This is also pro- est total network cost, including control, switch-
posed as a trend in [Ov_NGI], ref. Figure 11. ing and transmission costs. Introducing LSP
capability, the question of whether or not to
• Single-area flat topologies give better network cross-connect LSPs arise. Cross-connecting
performance and design efficiencies compared traffic flows is a means of separating the traffic
with multi-area hierarchical topologies. flows from their previous LSPs that terminate in
the router and putting them into a new LSP that
• Resource management is shown to be effec- could be cross-connected in this router.
tive to achieve service differentiation. MPLS
bandwidth management and DiffServ queue- 6.1 Initial Steps
ing priority management are important for To investigate for a better LSP network, trade-
ensuring that performance objectives are met offs between control and switching costs and
under a range of network conditions. costs for having separate LSPs should be bal-
anced. Typically, additional costs by introducing
• Dynamic transport routing network design more LSPs come from dividing the link set
improves network performance in comparison capacities into smaller units (optionally reducing
with fixed transport routing for all cases the scale effect). Compared with some other
examined in [ID_tems] for normal load pat- approaches (e.g. [E.737], [COST242], [Røhn97],
terns, abnormal load patterns and failure situa- [Popp00]), the algorithm applied does not use a
tions. global optimisation formulation. Rather, the pro-
cedure has some resemblance with the decompo-
Work on traffic engineering is going on in sev- sition approach in the sense that decisions with
eral projects and standardisation groups. For respect to traffic handling and capacities are
example, ITU-T formulated one question in made for each location in sequence, iteratively.
study group 2 addressing this topic. Seven A flow chart of the initial steps is depicted in
draft recommendations are under preparation: Figure 12.
98 Telektronikk 2/3.2001
First part - LSP level not considered Second part - Separating and Figure 12 Flow chart showing
cross-connecting LSPs main outline of program
Read input
initialise Sort routers according to
number of incoming LSPs
Select next router, n
yes yes
More routers More routers
no no
no no
Convergence Convergence
yes
yes
Network solution,
Physical network dimensioned physical and logical
In the first step the physical network is dimen- LSPs are considered for cross-connection. Each
sioned without considering LSPs. Each traffic traffic flow type is characterised by a CoS
flow connection will be treated at the IP-packet parameter, and the CoS parameter is used for the
level in every router it crosses. The iteration is segregation. The segregation scheme for LSPs
carried out until changes for all the main vari- can be defined for any other combination of CoS
ables attached to the traffic flows (e.g. mean parameters.
traffic, capacities needed) are below specified
thresholds (convergence criteria). The resulting The dimensioning algorithm implemented has
network from the first step has one LSP per a fixed routing scheme and segregates traffic
physical link with the capacity of the physical flows according to their CoS parameter. Other
link. It should be noted that an LSP would not be schemes for routing and service priority may be
needed and this notion is introduced for simplifi- considered as well.
cation.
The dimensioning procedure results in a cost-
In the second step we are looking for cost-effec- effective network solution considering the cost
tive solutions by separating and cross-connect- factors and weight factors chosen. The solution
ing LSPs. Here, cross-connecting means to has the set of LSPs in the logical network that
extend an LSP through a router (corresponding should be close to the obtainable minimal net-
packets not examined on IP level) and on the work cost. The characteristics of the network
subsequent hop (or hops). This is accomplished elements are given as the bandwidth on the
by looking at one router at the time. The cost physical links of each LSP and the capacity of
model as described above and the relevant segre- the routers for switching and control functional-
gation schemes are used when deciding whether ity. Variables for the resulting service quality
or not to cross-connect traffic flows by using an and network utilisation can also be calculated.
LSP. The saving or additional cost related to
transmission, switching and control before and The procedure may be used to study the sensitiv-
after the cross-connection are calculated and ity for changes in cost factors, weight factors,
compared. If the net saving is above a specified traffic demand, topology, and so forth. The
threshold, the bundle of traffic flows will be dimensioning procedure presented is modular.
assigned to an LSP and cross-connected in the Therefore, several of the steps can be replaced
router. The segregation scheme is applied when by corresponding expressions such that alterna-
Telektronikk 2/3.2001 99
1274 Tromsø In the following it is assumed that two depend-
5 ability traffic flow classes are used; high and low
Servers for the Telegame
application in Arendal, Oslo 1, priority. In case of failure the low priority class
Bergen and Trondheim may be dropped from the links carrying the
554
backup LSP in case the bandwidth is not suffi-
cient to carry the total load. Each link must then
Bodø have access to a backup capacity that is at least
5 the maximum of the needed capacity for high
priority flows on the working LSPs that will use
554 the link on its backup LSP. A backup capacity
may be the difference between the total capacity
and the capacity needed to carry the link’s high
Trondheim priority traffic flows.
9
The part of the algorithm related to dependabil-
287 342 1217 ity starts after the initial steps described in the
Lillehammer section above. First, all links are considered one
Ålesund 9 by one, and for each link (“failed” link) all LSPs
4 44 are examined. A backup LSP is identified for the
837
Gjøvik
high priority traffic flows having the same end
378
427 5 points as the considered LSP on the link. The
124 167 LSPs on the link are examined according to
Bergen
10 decreasing cost. As a mixture of low and high
478 Oslo 1 15 priority traffic may flow on an LSP, the needed
14 Oslo 2
6 capacity to restore the high priority traffic is cal-
170 80 culated first. Then a route for a backup LSP is
452 91
found by applying a shortest path algorithm
Tønsberg 53
Sarpsborg (Dijkstra’s algorithm). The “distance” measure
243 6
5 used in that algorithm is then the cost of trans-
Stavanger 168
9 mission and switching. In case some links hav-
ing available restoration capacity is looked at the
245 Arendal corresponding restoration capacity is attached
69 7 with zero cost. However, when doing these cal-
Kristiansand 320
culations all needed capacity for high priority
6
traffic on the “failed” link must be taken into
account. Finding a backup LSP is only done
once for an LSP, meaning that for some LSPs on
a link the above calculations may already have
Figure 13 Network structure, tive combinations can be examined. It means been done when that link is examined.
giving location identity, that several approximations could be introduced
relative demand and unit cost and compared. 7 Examples
per link between locations The numerical results given in this section are
6.2 Dependability Concerns based on an example network depicted in Figure
Strategies for establishing protection/backup 13. The network consists of routers that are
paths for parts of LSPs and utilisation of such placed at 14 locations in Norway.
paths may have great implications on depend-
ability and also on the cost of the network de- The network structure is described by the fol-
sign. As seen from an operator’s view point, a lowing parameters:
solution with pre-allocated restoration paths and
sharing of restoration capacity between working • Location identity – given by the name of the
LSPs seem to be flexible and cost efficient. city where the router is located;
Then, a set of attributes as described in
[Awdu99] can be attached to each LSP, like • Relative demand – presented by a percentage
resilience attribute, pre-emption attribute, adap- of the total traffic generated;
tive attribute, etc. The backup LSP should be
router disjoint from the working LSP and can • Unit cost per link between two locations.
be established without reserving capacity. This
is done as the backup LSP may be common to Five applications are considered and charac-
more than one LSP and these LSPs are likely to terised in Table 2. For simplicity all applications
have different bandwidth requirements, and the are assumed to use a call handler, implying that
backup LSP pool may be common to many blocking requirements could be more relevant.
backup LSPs. The total demand per application is also given
in Table 2. In order to calculate elements of the factors for control and switching are equal,
traffic matrix, this total demand is multiplied by kc = ks = k.
a size measure (percentage) for the source and
destination location indicated in Figure 13. For 7.1 Reference Case
example, the element in the traffic matrix for In the reference case, the configuration and val-
the Videoconference application from Bodø to ues are kept as described in Figure 13 and in
Bergen is found as: 97567 ⋅ 5/100 ⋅ 10/100. Tables 1 and 2. The network consists of 50 uni-
directional links giving a minimum of 50 LSPs.
Links of capacity 155 Mbit/s are considered. Although these LSPs may not be established,
The distance between two locations are multi- this notion of counting is used for simplification
plied by 100 in order to get the cost for having as the relative increase in the number of LSPs
one 155 Mbit/s link between those locations. In and which additional LSPs are established is
addition, termination modules in the routers rep- more interesting than the absolute number of
resent the other cost component depending on LSPs. Since LSPs on direct links will not be
capacity cost. One termination unit able to han- considered for splitting between different CoS
dle one link is assumed to have cost equal to classes, no more than 448 LSPs can be estab-
10,000 cost units. lished.
Table 3 Cost factors and
The reference values of the cost factors used The weight factors for control and switching weight factors for reference
when deciding whether or not to cross-connect costs are varied and the resulting number of case
an LSP are given in Table 3. In this chapter, the
term LSP is used for any grouping of capacity
allocated to traffic aggregates, even though such kt ks α β kc δ γ ε
a grouping may have a capacity higher than a
single link (i.e. greater than 155 Mbit/s for these 1.0 k 200.0 0.0 k 1.0 1.0 1.0
cases). For the calculations presented weight
Million
350
80 transmission shapes of the curves are explained by this effect.
250 switching In one respect, these curves show the “good-
150 40 control ness” of the solution found compared to alterna-
50 0
0.01 1 10 1000 50 250 450 tive solutions. For instance, in case k = 1.0, hav-
ing only 50 LSPs gives a total cost that is
Weight factor, k Number of LSPs
approximately 15.5 % greater than the better
a) b) solution having 406 LSPs.
Relative cost Average VP capacity During the calculations, the bigger LSPs will be
k=10 cross-connected first. This is clearly shown by
1.4 4.6
03 Mvit/s the results in Figure 14 d). One rationale for this
1.3 3.0
k=1.0 is that splitting an LSP into two LSPs might lead
1.2
k=0.5
k=0 1.9 to less additional need for bandwidth when
1.1 k=0.1
larger LSPs are considered, as the amount of
1.0 0
50 250 450 50 250 450 traffic load (number of micro flows and their
Number of LSPs Number of LSPs characteristics) influences the needed bandwidth.
This is recognised as the scale effect observed
c) d)
through the effective bandwidth measure.
Million
nificant dependence on the LSP capacity, and in 650
high demand
the case of decreasing the demand the effective reference 100
450
bandwidth has a higher relative increase. There- one tenth demand
0
250 single CoS
reference
case
single
high
demand
one tenth
demand
fore the case with reduced demand is more sen-
50
sitive to the number of LSPs. 0.01 1 100
Weight factor, k
For all cases the sum of the required bandwidth
a) b)
on the LSPs on a link is less than the actual link
bandwidth, and the link bandwidth not allocated Relative cost
is illustrated in Figure 16 a). When the number
1.15
of LSPs is increased from the minimum number
to the maximum number of LSPs, the required 1.10
total LSP bandwidth increases. The additional 1.05
bandwidth caused by establishing LSPs is
1.00
depicted in Figure 16 b). In these examples, the
last type of traffic flow in Table 2 (i.e. Flow 0.95
reference case single high demand one tenth demand
id 5.2) has been assigned its mean rate during
min LSPs max LSPs
the capacity calculations. This is to see the effect
of less guarantees to the Telegame application. c)
The superfluous capacities on links could be
used for additional traffic loads, both giving
higher rates to ongoing sessions and potentially Figure 15 Results from a selection of example variations: a) Number of LSPs;
accepting more sections (when admission con- b) Total, k = 1.0; c) Relative cost for minimum number of LSPs and maximum
trol is used). number of LSPs related to the lowest obtainable cost
15000
reference single CoS
• The metrics must exhibit understood and fair 10000
bias for IP networks implemented with non-
identical technology. 5000
As identical conditions are commonly quite dif- • Singleton metric – a metric that is atomic in a
ficult to achieve, continuity is frequently used. sense (e.g. a single observation);
Then a methodology for a given metric exhibits
continuity if, for small variations in conditions • Sample metric – metrics derived from a given
(δ), the variation in the measurements are small singleton metric by taking a number of dis-
(ε). That is, for every positive ε, there exists a tinct instances together;
positive δ such that if two sets of conditions are
within δ of each other, the resulting measure- • Statistical metric – metrics defined from a
ments will be within ε of each other. A metric sample metric by computing some statistics of
that has at least one method exhibiting continu- the values defined by the singleton metric on
ity is said itself to exhibit continuity. the sample (e.g. mean value of a sample).
• Path; giving the hops that a packet traverses • Meters observe packets as they pass by a single
between the end points. point on their way through the network and
classify them into certain groups. For each such
• Lifetime; being the total time that the flow of group a meter will accumulate certain attributes
IP packets exists. For a permanent flow, e.g. a (such as number of packets and bytes). These
backbone link, the lifetime would be infinite metered traffic groups may correspond to a
unless there are failures or other changes in user, a host system, a network, a particular
the network topology. For dynamic flows, transport address (e.g. a port), etc. Meters are
there may be challenges attached to deciding placed at measurement points and selectively
when a flow is started and when it is stopped. record network activity as directed by its con-
figuration settings. Meters can also aggregate,
A series of RFCs has been issued for specific transform and further process the recorded
performance metrics: activity before the data is stored.
• RFC 2330 Framework for IP Performance • Traffic flow is said to be a logical entity
Metrics equivalent to a call or connection. A flow is
a portion of traffic that belongs to one of the
• RFC 2678 IPPM Metrics for Measuring metered traffic groups mentioned above.
Connectivity Attribute values (source/destination addresses,
number of packets, etc.) associated with a
• RFC 2679 A One-Way Delay Metric for IPPM flow are aggregate quantities reflecting events
that take place. Flows are stored in the meter’s
• RFC 2680 A One-Way Packet Loss Metric flow table.
for IPPM
A traffic meter has a set of rules which specify
• RFC 2681 A Round-Trip Delay Metric for the flows of interest. One way to identify a flow
IPPM is by stating values of its address attributes.
Annex C in [RFC2722] provides a list of flow
There are multiple purposes of doing measure- attributes.
ments including modifying routing for network
utilisation, detect threshold crossing for chang- As well as flows and meters, the traffic model
ing capacity allocation, observing trends, ob- measurement includes managers (to configure
serving conditions in SLAs, etc. In particular, and control meters), meter readers (to transport
measurements are crucial to allow for proactive recorded data from meter to analysis applica-
and real-time TE actions. As one aspect of TE tions), and analysis applications (to process the
is to reach high utilisation of the network, appro- data from meters readings so as to produce what-
priate load balancing is needed, asking for mea- ever reports are required).
surements of the traffic in different directions
and on the different links, in order to balance NetraMet is an implementation of the RTFM
the traffic. Policy-based TE in connection with Architecture, which has been available since
measurements allow for considering the policy 1993. Details of the implementation and experi-
attributes on paths when carrying out actions ence gained with NetraMet are recorded in
triggered by measurement results. Such policy [RFC2123].
attributes include priority, pre-emption, resil-
ience, resource classes and policing. 9 Concluding Remarks
This paper has discussed several issues central
Performance parameters related to forwarding of to carrying out network planning and network
IP packets have also been described in ITU-T, design studies. Besides finding efficient algo-
e.g. see [Y1540] and [Y1541]. These include IP rithms for conducting these studies, input data
packet delay variation, IP packet error ratio, IP must also be assessed. Here, as in several other
packet loss ratio, IP packet transfer reference areas, one faces the trade-offs between tractabil-
event, IP packet throughput, IP packet transfer ity and accuracy. On the one hand the traffic
delay, and spurious packet ratio. flows and the network resource could be mod-
Inputs and steps for planning and designing IP- [Ov_NGI] Stevenson, I, Pugh, E. 2000. Next-
based networks have been treated in this paper, Generation Internet: Strategies for the Multiser-
including ways of characterising traffic demands vice Network. Ovum report.
and network resources. In addition, an algorithm
for designing LSPs in a multi-service network [Popp00] Poppe, F et al. 2000. Choosing the
was outlined to show the applicability of the net- Objectives for Traffic Engineering in IP Back-
work design. bone Networks Based on Quality-of-Service
Requirements. In: Proceedings of Quality of
References Future Internet Services (QofIS 2000). Berlin,
[22.105] ETSI. 2000. Universal Mobile Germany.
Telecommunications Systems (UMTS); Service
aspects; Services and Service Capabilities. [RFC2123] IETF. 1997. Brownlee, N. Traffic
(ETSI TS 122 105.) Flow Measurement: Experiences with
NeTraMet. (RFC 2123.)
[Awdu99] Awduche, D O. 1999. MPLS and
Traffic Engineering in IP Networks. IEEE Com [RFC2330] IETF. 1998. Paxson, V et al. Frame-
Mag., 37 (12), 42–47. work for IP Performance Metrics. (RFC 2330.)
[COST242] COST. 1996. Roberts, J, Mocci, M, [RFC2722] IETF. 1999. Brownlee, N, Mills, C,
Virtamo, J (eds.). Broadband Network Teletraf- Ruth, G. Traffic Flow Measurement: Architec-
fic. Final Report of Action COST-242. Berlin, ture. (RFC 2722.)
Springer Verlag.
[Robe01] Roberts, J W. 2001. Traffic Theory
[COST257] COST. 2000. Impacts of New Ser- and the Internet. IEEE Com Mag., 39 (1), 94–99.
vices on the Architecture and Performance of
Broadband Networks. (COST 257 Final Report.) [Røhn97] Røhne, M. 1997. On the dimensioning
of ATM-based VP-networks. In: Proceedings of
[E.737] ITU. 1997. Dimensioning methods for the 4th International Conference on Telecommu-
B-ISDN. (ITU-T E.737.) nications, ConTEL97. Zagreb, Croatia.
The classification of packets in BAs is based on In [Johnsen 1999] a CoS is defined as ‘a cate-
the Service Level Agreement (SLA) between the gory based on type of users, type of applications,
parties (e.g. customer and provider). Of interest or some other criteria that QoS systems can use
in this context is the technical part of the agree- to provide differentiated classes of service. The
ment, called Service Level Specification (SLS). characteristics of the CoS may be appropriate
It contains, among other things, details on how for high throughput traffic, for traffic with a
much traffic of different types the customer can requirement for low latency or simply for Best
initiate and the quality he can expect. From such Effort. The QoS experienced for a particular
information the network operator must assure flow will be dependent on the number and type
that his network is able to carry all customer cre- of other traffic flows admitted to its class.’
ated traffic within the contracted limits with a
satisfactory quality. This wide definition opens up for included
parameters like packet loss, latency, throughput,
A Per Hop Behaviour Scheduling Class (PSC) as well as survivability aspects in defining the
is the set of PHBs that are applied to the BAs different classes. But it could be discussed
belonging to an OA [mpls-diff-ext]. For exam- whether CoS should be used in a relative sense
ple, the PHBs that are associated with a given and the term QoS classes should be used when
AF class constitute a PSC. classes are differentiated with quantitative
requirements.
Multi Protocol Label Switching
(MPLS) In an MPLS context CoS is used in relation to
At the IP layer (layer 3) a router makes forward- the CoS-field, which is three bits in the MPLS
ing decisions for a packet based on information header. This field can either be used to differen-
in the IP header. The analysis of the packet tiate between different CoS within an LSP (E-
header is performed and a routing algorithm is LSP) or to identify colouring in case the LSP is
executed in each router. This can be viewed as a dedicated to one CoS (L-LSP). The classifica-
two-step process. First the packets are classified tion into CoS is left for the network operators
into a set of Forwarding Equivalence Classes to decide.
(FECs). Then each FEC is mapped to a next hop.
An FEC is a group of packets that shall be for- In a DiffServ context the term ‘traffic class’ is
warded over the same path with the same for- sometimes used for traffic that shares a common
warding treatment. set of QoS requirements. Such a class could be
characterised by using a standardised PHB group
With Multi-Protocol Label Switching (MPLS) [diffserv-new-terms] like EF, one of the AF
the classification of packets into FECs is only classes or Best Effort (BE), in each node. Such
performed at the ingress to the MPLS domain. classes are also often referred to as DiffServ
The packet is then mapped to a Label Switched classes. CoS in the first definition above could
Path (LSP) by encapsulation of an MPLS in addition add criteria like resilience so that a
header. The LSP is identified locally by the DiffServ class could contain many CoS.
header, or more correctly by the label field in
the header. Based on the value of the label the An associated term in DiffServ is Per-Domain
packet is mapped to the next hop. In successive Behaviour (PDB). This is defined in [diffserv-
routers within the MPLS domain the label is pdb-def] as “the expected treatment that an iden-
swapped (therefore it can have only local signifi- tifiable or target group of packets will receive
cance) and the packet is mapped to the next hop. from ‘edge to edge’ of a DS domain”. A particu-
lar PHB (or, if applicable, list of PHBs) and traf-
The MPLS architecture is described in [RFC3031] fic conditioning requirements are associated
whereas support of DiffServ over MPLS net- with each PDB.
works is described in [mpls-diff-ext].
CoS 2: Streaming traffic. This is non-priority The latency as a function of total offered traffic
traffic with real-time requirements, but with is given in Figure 3.
looser requirements than CoS 1. The traffic is
mapped to an Assured Forwarding PHB class In the given example the BE queue starts to
using WFQ with weight 50 %. The packet size grow as soon as congestion state is reached. The
is 942 byte (IP). latency fast approaches a maximum value corre-
sponding to the buffer size for this queue. Due to
CoS 3: Better than Best Effort (BBE) traffic or the Tx-buffer the latency increases accordingly
Business Class. This is non-priority traffic with for all the other classes as soon as congestion
no real-time requirement but high requirement state occurs. In the example this increase is from
on loss and throughput. This traffic should be 0.5 ms to 4–5 ms. With the given offered traffic
based on a protocol like TCP. The traffic is and configuration, VoIP is the next class to get Figure 2 Low latency queuing
mapped to an Assured Forwarding PHB class
using WFQ with weight 25 %. The packet size
is 622 byte (IP).
NRT AF class
Traffic from a given CoS is mapped to a unique
Class Based
queue at the router output interface, and different Weighted Fair
classes use different queues. While CoS 1 has BE class Queueing
absolute delay priority over the other classes,
Tx-buffered
gets filled
1000
Tx-buffer - 30 particles
100
139.5 143.2 146,9 150.5 154.2 157.9 161.6 165.2 168.9 172.6
Total offered traffic (Mbit/s)
performance degradation. This is due to the other parts are under-utilised. Also dimensioning
policing function (CAR rate-limit), and the of the network cannot be based solely on the
effect is packet loss (not shown in the figure). SLS parameters, since these are upper limits
Streaming is then the next class to get perfor- and will give an expensive worst case design. A
mance degradation. As long as offered rate for more sophisticated control framework is needed
this queue is lower than the scheduler rate, the to support a well-dimensioned network that can
average latency is almost as low as for VoIP differentiate between service classes and at the
(difference is 0.4 ms). But this load interval is same time give some performance support. This
rather small and when scheduler rate gets too can be based on admission control or on the use
low performance degrades quickly. of bandwidth reservation on an aggregated level
combined with traffic measurements, e.g. by use
Although the example given is not a realistic of MPLS. Also MPLS has support for fast re-
traffic load scenario, it shows that the load inter- covery in case of failure that may be required
val where we have some kind of performance by some services.
differentiation can be rather small and that we
need some control mechanism to guarantee per- The Use of Measurements for
formance to some extent. With low load (no Control and Capacity Planning
congestion) there will be no differentiation The utilisation of MPLS simplifies the task of
between the service classes. Only in case of monitoring the traffic on each trunk and building
congestion can we see a difference between the a picture of the load on the network. With the
classes. This difference relies on the relation aid of this information it should be possible to
between the relative share of offered traffic and
the weight given to the class by the scheduler • Manage the network more effectively to
(drain rate). If the configured rate does not obtain better end-to-end performance and
match the actual traffic we may e.g. see that the more efficient use of resources;
BE class gets the best performance! Even the
performance guarantee of the priority class relies • Guide connection admission control (CAC);
on the fact that offered traffic is below the rate-
limit for this class. • Build traffic matrixes for capacity planning
purposes.
A problem with DiffServ is that control of the
traffic from a given customer is based on the This monitoring should be done at the entrance
SLA/SLS that is normally given as a total vol- to the MPLS network, i.e. at the LSP ingress in
ume for each class to and from that customer. the edge routers. A clearer picture of the avail-
That is, we can give an upper limit for the traffic able resources in the network should be gained.
(for each class) entering the network, but we do By making use of this information in the CAC
not know how the traffic is distributed. This may process, it should be possible to allow higher
create congested points in the network while utilisation without risking congestion.
• Unintentional loss (buffer overflow); We assume that the LSP parameters will be
updated based on observed threshold crossings
• Other, e.g. delay statistics through a router. according to the following scheme. At set-up a
set of initial parameters will be provided. These
The integration time for rate measurements may be taken as an initial guess based for in-
depends on the type of traffic we are measuring. stance on experience from similar LSPs. Once
The higher the requirement for packet loss / an LSP is set up the traffic monitoring will be
delay performance, the smaller is the window triggered. Based on the measurements performed
size needed. As a consequence real-time traffic per LSP, it may be necessary to renegotiate the
should be measured in shorter intervals than parameters for the LSPs. Resetting of parameters
what would be necessary for typical TCP traffic. should be on a rather long time scale (compared
to the packet arriving times) to avoid rapid
Although measurements are believed to be more changes and possible instabilities.
important in the future and constitute a basic part
of the control framework presented in the next Traffic monitoring is a basis for estimation of
section, the most important questions related to CDR for a given LSP. In advance we have a set
how measurements can be performed remain of predefined limiting values for CDR, say C1,
open. Fundamental questions are the cost of C2, ..., Cn. The number of levels must be limited
implementing monitoring hardware in the to avoid too rapid changes. We assume that the
routers and possible technology constraints estimate of bit-rate fluctuates rather slowly as a
related to monitoring at high speed. What mea- function of time (minutes or hours). This can for
surement time intervals should in fact be used instance be achieved by using some kind of Figure 4 Estimated traffic as a
is also an item for further study. weighting. function of time
a Be mapped to a PSC and carried by pure Diff- ii Scheduling is done on an aggregated level
Serv; with one queue for each CoS, or rather a set
of CoS. This solution is better from a scala-
b Be mapped to an L-LSP designated for this bility viewpoint, but only the aggregated
CoS solely; bandwidth of all traffic of the same queue is
guaranteed. The LSP bandwidth must there-
c Be mapped to an E-LSP designated to this fore be enforced, or at least in some way con-
CoS together with other CoS (up to 8 BAs). trolled, before queueing on the output inter-
face module (LSP parameter control).
In either case the possibility of reserving
resources must be discussed. This is of vital We presume that option ii is chosen. This gives
importance for controlling traffic and assuring the following distribution of QoS mechanisms in
QoS in a network with dynamically changing an edge router with MPLS:
traffic.
• Access interface upstream (direction from cus-
For the time being MPLS distinguishes itself as tomer): Classification, metering, action (drop
the most promising way for introducing a con- or (re)mark), forwarding;
trol framework, both for service types ii and iii.
For service type iii a measurement based solu- • Access interface downstream (direction
tion is proposed. For service type ii the traffic towards customer): Classification, metering,
volume in a given direction can be controlled by action, queueing, algorithmic dropping and
the call admission control. But our framework possibly shaping;
for dynamically changing the LSP bandwidth
parameters (see above) still applies. The decision • Core interface upstream: Label encapsulation,
will then be based on the number of active calls parameter control per LSP (classification,
instead of traffic volume measurements. metering, action), queueing, algorithmic drop-
ping and possibly shaping;
Dimensioning and re-dimensioning for service
type ii can be done using • Core interface downstream: LSP termination
and forwarding.
a An effective bandwidth approach for estimat-
ing the relationship between number of calls The SLA monitoring is here indicated to take
and trunk (LSP) bandwidth demand; place at the access interface of the edge router.
As mentioned above this should be done as near
b A call level module for dimensioning the to the user as possible. The SLA monitoring
trunk bandwidth using traffic forecasts (call could therefore be done in a router between the
level) and a call blocking objective. user and the edge router.
Dimensioning and re-dimensioning for service A conceptual model of the interface to the core
type iii requires new methods, and in the follow- network is given in Figure 6, presuming a
ing sections we discuss a framework where net- unique mapping from LSP to DiffServ queue
work resources are re-dimensioned or re-config- (e.g. L-LSPs).
ured based on actual measurements of traffic in
the network. The LSP monitoring in the edge routers will
be the basis for the bandwidth reservations as
A Measurement-based Approach for described above. If this monitoring can be a
Traffic Control basis for reliable control of resources, e.g. by
As discussed above the possibilities of reserving introducing enough slack, LSP policing is not
resources is of vital importance for controlling necessary.
traffic and assuring QoS in a network with
dynamically changing traffic.
Output
Encapsulation Queueing classes link
Encapsulation
Mapping of
LSP to queue
The core router is simpler: i User traffic is monitored at the router nearest
to the user that is controlled by the operator
• Input interface: LSP label switching, possible and can do parameter control. In what fol-
with hierarchy functionality (push/pop includ- lows we assume for simplicity that this is the
ing possible split); ingress edge node.
• Output interface: LSP merge (as a conse- ii The user traffic is mapped to an appropriate
quence of label switching at the input), moni- CoS. This can be done as part of i. Based
toring per LSP, CoS or per queue, queueing on CoS and destination edge node the traffic
and scheduling. is mapped to an appropriate LSP. This is
assumed done in the ingress edge node, either
LSP monitoring in the core router is probably as part of i at the access interface or at the
not necessary, since the bandwidth reservation core interface of the ingress edge node.
for a merged LSP in principle could be based on
the bandwidth reservation for each individual iii LSPs are set up between pairs of edge nodes
LSP. A conceptual model of the output interface for carrying user traffic. In core nodes LSPs
is given in Figure 7, presuming again a unique carrying the same CoS (L-LSPs) and towards
mapping from LSP to DiffServ queue. the same edge node, may be merged to make
the configuration more scalable.
The reservation of resources must in some way
relate to the traffic actually flowing in the net- iv The LSPs are set up with reserved bandwidth
work and should therefore be dynamically using bandwidth parameters negotiated either
changed based on monitoring data as described using RSVP or LDP. The reserved bandwidth
above. has implications for configuration of sched-
ulers in the routers. The bandwidth can be re-
The control framework can now be summarised configured based on measurements.
as follows:
Scheduling and
bandwidth
allocation
LSP merge
Output
LSP merge Queueing classes link
vi In an operational network the LSP parameters [diffserv-pdb-def] IETF. 2001. Definition of Dif-
must be dynamically updated based on traffic ferentiated Services Per Domain Behaviours and
measurements. This is at least necessary for Rules for their Specification. (RFC 3086)
traffic for which bandwidth is not reserved
end-to-end. Thresholds must be defined for [IETF-TE] IETF. 2001. A Framework for Inter-
such updating. net Traffic Engineering. (draft-ietf-tewg-frame-
work-05.txt)
Conclusions
Lack of traffic control in IP networks makes it [Johnsen1999] Johnson, V. 1999. Technology
very difficult, if at all possible, to offer differen- Backgrounder – Quality of Service – Glossary of
tiated services with some kind of performance Terms. [online] – URL: www.stardust.com.
guarantee. A control framework has been pro-
posed. This framework is based on the use of [mpls-diff-ext] IETF. 2001. MPLS support for
the Differentiated Services architecture, Multi Differentiated Services. (draft-ietf-mpls-diff-ext-
Protocol Label Switching, monitoring of Label 09.txt)
Switched Path traffic volume and dynamically
updating of bandwidth reservations based on [RFC1633] IETF. 1994. Integrated Services in
actual traffic. the Internet Architecture: an Overview. (RFC
1633)
The deployment of the proposed solution de-
pends however on cost related to implementing [RFC2474] IETF. 1998. Definition of the Differ-
monitoring hardware in the edge routers and entiated Services Field (DS Field) in the IPv4
possible technology constraints related to moni- and IPv6 Headers. (RFC 2474)
toring at high speed. Also it remains to be seen
what service differentiations are possible to [RFC2475] IETF. 1998. An Architecture for Dif-
achieve in this type of network. ferentiated Services. (RFC 2475)
The framework should be extended to treat inter- [RFC2597] IETF. 1999. A Single Rate Three
domain aspects and the use of e.g. IntServ in the Color Marker. (RFC 2697)
access part of the network. Also related aspects
like [RFC2598] IETF. 1999. An Expedited Forward-
ing PHB. (RFC 2598)
• Use of load sharing;
[RFC3031] IETF. 2001. Multiprotocol Label
• Criteria for creation and termination of LSPs; Switching Architecture. (RFC 3031)
Multiprotocol label switching (MPLS) extends the IP destination-based routing protocols to provide new
and scalable routing capabilities in connectionless networks using relatively simple packet forwarding
mechanisms.
MPLS networks carry traffic aggregates on virtual connections called label switched paths (LSPs). The
first part of this paper examines under what circumstances it is advantageous to design dedicated LSPs
for individual origin-destination pairs and service classes. We show that separate LSPs in most realistic
cases are likely to be the preferred mode of operation.
We next consider path selection and bandwidth allocation in multi-service MPLS networks in order to
optimise the overall network quality of service. The optimisation is based upon the constrained optimisa-
Åke Arvidsson (43) obtained the tion of a non-linear objective function. We present a model of an MPLS network and a computationally
MSc and PhD from the Lund
efficient algorithm called XFG to find and capacitate optimal LSPs. The algorithm is based on a band-
Institute of Technology, Sweden.
Between 1990 and 1992 he width market where bandwidth prices determine the allocation of bandwidth to LSPs. The XFG algo-
worked at Bond University and rithm is applied to compute optimal LSPs for a 55 node network model carrying 6 service classes.
the University of Adelaide in
Australia. From 1993 to 1995 The results above are limited to service classes typically supported by UDP, e.g. conversational voice
he was with the Lund Institute and streaming video, where the notation of equivalent bandwidth can be applied. This is, however, not
of Technology and in 1995 he
joined the Blekinge Institute of the case for service classes typically supported by TCP, e.g. interactive or background data, because of
Technology, Sweden, as Profes- the responsiveness of the protocol. We therefore extend our work to incorporate these types of traffic
sor of Teletraffic Theory. Since and apply the XFG algorithm to compute optimal LSPs for a network of 8 nodes and 2 service classes.
1998 he is on leave and works
for Ericsson Core Network Finally we use core networks of third generation cellular mobile systems as an example to show how
Development as Technical
Expert on Data Traffic Theory.
the method can be generalised to any multi-service network and we also discuss how to include virtual
His professional interests in- private networks.
clude traffic modelling, perfor-
mance evaluation, network
architecture and load control.
1 Background ATM was seen as too costly and too complicated
Ake.Arvidsson@uab.ericsson.se
Two major trends have dominated the telecom- and all-IP was questioned in relation to quality
munications industry over the past decade, viz. of service.
wireless cellular systems such as GSM and
packet switched services over IP. The two tech- 2 MPLS
nologies have largely evolved independently of The favourite candidate for service integration is
each other and the services are basically sepa- MPLS [1]. The fundamental idea behind MPLS
rated in the networks. can be characterised as enhancing IP with some
quality of service concepts from ATM. From
This split approach is however set to change for this point of view, a primary feature of MPLS is
technological and commercial reasons. On the the ability to perform traffic engineering and a
technology side, high speed packet switching is secondary feature is quality of service control [2].
an integral part of third generation cellular sys-
tems, e.g. UMTS, and packet switching is be- IP networks typically use OSPF or a similar pro-
Anthony Krzesinski (55) obtain-
ed the MSc from the University coming deployed in fixed access networks, e.g. tocol to find shortest routes between points. The
of Cape Town and the PhD from CATV. On the commercial side, competition fact that there is only one such route from any
Cambridge University, UK. In eats into the margins of traditional wireline ser- node to any other node may lead to situations
1972 he joined the Shell Re-
search Laboratory in Amster- vices while the growth of packet switched ser- where links on shortest routes are congested
dam where he worked on the vices exposes the costs associated with separate while other links remain idle. Traffic engineer-
development of mathematical networks. ing in MPLS essentially means that traffic flows
models to predict the perfor-
mance of computer systems. In can be controlled in order to balance link loads.
1975 he joined the Department There is thus a growing need for an integrated
of Computer Science at Univer- services network. This is by no means a new Moreover, classical IP networks typically sup-
sity of Stellenbosch. He is
presently a Professor of Com- idea, in fact it has been a vision at least since port only one service class, viz. best effort.
puter Science at the University the seventies, although the technologies have Although proposals such as IntServ and DiffServ
of Stellenbosch. His research differed: ISDN over STM in the seventies, B- have been around for some time, they have not
interests centre on the perfor-
mance evaluation of communi- ISDN over ATM in the eighties and everything yet gained widespread acceptance, let alone
cation networks. over IP in the nineties. The visions have how- deployment. IntServ suffers from scalability
aek1@cs.sun.ac.za ever remained visions, albeit for different rea- problems which makes it unsuitable for back-
sons. ISDN/STM was made obsolete by the bone networks, while the ability of DiffServ to
development of the computer industry, B-ISDN/ provide quality of service is doubted. Quality of
We present two MPLS models. The first model, Let Ra denote the set of LSPs including the
presented in this section, finds and capacitates direct one (if it exists) that is used to carry
optimal LSPs which support connection oriented aggregate a. Let Al denote the set of LSPs
aggregates using, e.g., UDP for which the nota- including the direct LSP that uses link l.
tion of equivalent bandwidth applies and some
CAC mechanism is in place. The second model, Let xr denote the bandwidth assigned to LSP r.
presented in Section 5, finds and capacitates Let xa = (xr )r∈R denote the bandwidths assigned
a
optimal LSPs which support connectionless to the LSPs in Ra. The capacity C(a,xa) of the
aggregates using TCP for which equivalent LSP set Ra used by aggregate a is given by
bandwidth makes no sense and best effort
applies. C(a, xa ) = fs(a) (xr ) (1)
r∈a
4.1 The LSP Design Problem
Consider a network which consists of N nodes where fs(a) (x) is the equivalent number of ser-
and L physical links. The network supports A vice class s(a) circuits configured on LSP r
aggregates, each of which is characterised by its which has bandwidth x. The equivalent number
origin ELR, destination ELR and service class. of circuits is the maximum number of simultane-
Each aggregate a corresponds to a unique triple ous connections that can be supported. The func-
(o,d,s): let n(a) = (o,d) denote that the origin and tion will typically be non-linear unless peak rate
destination nodes of aggregate a are o and d allocation is applied.
respectively and let s(a) = s denote that the ser-
vice class of aggregate a is s. Let E(C(a,xa),ρa) denote the blocking probabil-
ity (objective function) experienced by aggregate
Let λa denote the Poisson arrival rate of connec- a connections with load ρa on an LSP set of
tion requests in aggregate a. Let 1/µa denote the capacity C(a,xa). The rate F(a,xa) at which
mean connection holding time in aggregate a. aggregate a connections generate revenue when
The holding time distribution is general. Let ρa the LSP configuration is xa is
= λa / µa denote the load offered by aggregate a.
A connection in aggregate a generates revenue at F(a,xa) = θaρa(1 – E(C(a,xa), ρa)). (2)
a rate θa per time unit.
The LSP design problem is specified in terms of
Let Bl denote the bandwidth of the link l between the following constrained non-linear optimisa-
n(l) = (o,d) such that Bl > 0 denotes the existence tion problem: Find the LSP configuration xopt
of a physical link from node o to node d. that maximises the revenue earning rate F(x)
In words, equation (3) says that the change in where the link revenue function F(a,c) is given
revenue obtained by moving an infinitesimal in equation (2).
amount of bandwidth to route r of aggregate a is
equal to the revenue lost in acquiring this band- When the bandwidth of the aggregate a LSP
width from aggregates whose LSP sets include from node o to node d is increased from c to
direct LSPs over the links of r, and vice versa. c + u, the additional u units of bandwidth are
obtained from aggregates with direct LSPs on
4.2 XFG: An LSP Optimisation all links l on the route. The cost qa'(l)(c) of
Algorithm acquiring u units of bandwidth from an aggre-
We wish to design an MPLS network were each gate a'(l),a'l ∈ Ra' , is given by
aggregate is supported by one or more LSPs. If a
flow is routed over more than one LSP, packets qa' (c) = F(a',c) – F(a',c – u) (5)
belonging to the same flow may arrive out of
order at the destination. This can be avoided by where for each link l, class s(a'(l)) is the cheapest
a systematic sub-classification of packets such provider of bandwidth on link l and c is the class
that any flow in an aggregate will always use the s(a'(l)) bandwidth of link l.
same LSP. For example, if two LSPs with equal
bandwidth support an aggregate, packets may be Equations (4) and (5) approximate the deriva-
split between the LSPs according to the parity of tives of equation (3). A cubic spline is fitted to
the full destination address. the values computed for equations (4) and (5) to
ensure that the values of left- and right deriva-
4.2.1 A Bandwidth Market tives are identical.
The XFG algorithm is based on the concept of
bandwidth cost. Each aggregate computes the The total cost qr(x) of acquiring a unit of band-
price that it is willing to pay in order to buy width from each link along the route r = (l1, ...,
more bandwidth, and the price at which it is lJ) is
willing to sell off bandwidth. An under-capaci- J
tated aggregate will buy more bandwidth on an qr (x) = qa (j ) (c)
j=1
existing LSP or establish a new LSP according
to where the largest revenue increase can be 4.2.3 The Algorithm
made at the smallest bandwidth cost. An over- The XFG algorithm uses the model of a band-
capacitated aggregate will sell off bandwidth on width market to solve the LSP design problem
the LSP where the largest bandwidth cost can be by allocating capacity to LSPs in a series of
obtained for the smallest revenue decrease. transactions. The algorithm executes in a loop
and each iteration of the loop implements one
Bandwidth is traded in units the size of which is transaction. A transaction can either be a multi-
typically determined by scheduling mechanism link LSP buying one unit of bandwidth from a
constraints in the LSRs and quality of service set of single link LSPs or a set of single link
requirements from users. For example, LSRs LSPs buying one unit of bandwidth from a
multi-link LSP. The transaction chosen is the
The lengths of the LSPs and their bandwidth Work in progress includes a more elaborate TCP
assignments are shown in Table 1. Let ur denote model which also accounts for short file trans-
the un-normalised length of an LSP r which is fers, slow start and time-outs. The queuing/loss
equal to the number of links in the route. Let nr model is also elaborated upon.
= ur – mr denote the normalised length of an
LSP r, where mr is the number of links in the 5.1.1 A Single Path Model
shortest LSP connecting the O-D pair. A route r Consider a uni-directional path between two
edge routers to which users and servers are con-
1) Throughout this section “infinite” denotes a value which is large enough for its precise value to be
irrelevant.
Finally, a lower limit of w ≥ 1 and an upper limit Equation (13) implies that full attraction α = 1
of w ≤wmax are applied. The lower limit models occurs when the bottleneck has been shifted
the protocol while the upper limit can be set to from the MPLS network to the user access.
account for restrictions imposed by the receiver. The transmission factor is obtained as
Note, however, that the user window size w
refers to an average, hence the bounds are not
strict.
ϕa 1
na = (14)
pusr 1 − er
The rate λ of data packets per individual TCP
flow is related to the user window size w and the
round trip time t as
2) An alternative to complete redesigns is partial redesigns where some LSPs, for example those of
business users, are “locked”.
This paper summarises the state-of-the-art of IP routing. Starting with an overview of the currently used
routing strategies and protocols in IP networks, it identifies the problems and challenges introduced by
the explosive growth of the Internet and the introduction of newer applications and services.
The routing problems in future IP networks are not trivial, with many complex problems yet to be identi-
fied and solved. In this paper, a class of routing systems that compute routes subject to satisfaction of
a set of constraints and requirements (called “constraint-based routing”, CBR) is presented.
Also included in this paper is a discussion of requirements for developing new routing protocols that
support new types of services, such as multicast and mobility.
1) With stochastic routing, routers may send packets on alternative paths even if the primary path is
available.
• the cost of reaching each neighbour (where the With the continued exchange of distance vec-
cost measures quantities like the link’s capac- tors, the cost of every link is eventually known
ity, the current queuing delay, or a per-packet throughout the network. The distance-vector
charge). algorithm is also called Bellman-Ford
([BELL57], [FF62]) after its creators.
Both algorithms allow a router to find global
routing information, that is, the next hop to reach The distance-vector algorithm works well if
every destination in the network by the shortest nodes and links are always up, but it runs into
path, by exchanging routing information with many problems when links go down or come up.
only its neighbour. In the following, we will give The root cause of problems is that when a node
a brief introduction to these two algorithms. updates and distributes a distance vector, it hides
More details can be found in many places in the the sequence of operations it used to compute
literature, such as [HUIT00]. the vector. Thus, downstream routers do not
have sufficient information to figure out whether
2.3.1 Distance-vector Routing their choice of a next hop will cause loops to
In distance-vector routing, we assume that each form. One typical problem is count-to-infinity
router knows the identity of every other router in [KESH97]. Solutions to this problem can be
the network (but not necessarily the shortest path found in many places in the routing literature
to it). Each router maintains a distance vector, (e.g. [HUIT00]).
which is a list of <destination, cost> tuples, one
tuple per destination, where cost is the current 2.3.2 Link-state Routing
estimate for the sum of the link costs on the In distance-vector routing, a router knows only
shortest path to that destination. Each router ini- the cost to each destination or, sometimes, the
tialises the cost to reach all non-neighbour nodes path to the destination. This cost of path is partly
to a value higher than the expected cost of any determined on its behalf by other routers in the
route in the network (commonly referred to in network. This hiding of information is the cause
the routing literature as infinity). A router sends of many problems with distance-vector algo-
a copy of its distance vector to all its neighbours. rithms.
1 2
A B C
3 4
5
6
D E
Initial
Computation at A when Distance Vectors from B
A B C D E and D arrive
Figure 2.1 Distance-vector
1. Cost to destinations via B = Cost to go to B + Cost to algorithm at node A. In the
A 0 1 ∞ 3 ∞ destinations from B = (1,1,1,1,1) + (1,0,2,∞,4) =
(2,1,3,∞,5) figure, A receives a distance
B 1 0 2 ∞ 4 vector from its neighbours B
2. Cost to destinations via D = Cost to go to D + Cost to and D. It uses this information
destinations from D = (3,3,3,3,3) + (3,∞,∞,0,6) =
C ∞ 2 0 ∞ 5 (6,∞,∞,3,9) to find that it can reach nodes
C and E at a lower cost. It
3. Current cost from A = (0,1,∞,3,∞) therefore updates its own
D 3 ∞ ∞ 0 6
Minimum cost to destinations = (0,1,3,3,5) distance vector and chooses
E ∞ 4 5 6 0 B as its next hop to nodes C
and E
The EGP-protocol was designed for this pur- 2.5 Supporting QoS Requirements
pose. Although EGP is still in use today, how- Routing deployed in today’s Internet typically
ever, it is being replaced by Border Gateway supports only one type of datagram service
Protocol (BGP). The BGP version that has been called “best-effort”. No guarantee of QoS re-
in use since 1995 is BGP-4 [RFC1771]. quirements is offered, but routing is optimised
for a single arbitrary metric, administrative
BGP-4 is a path-vector protocol, where distance weight or hop count. Alternative paths with
vectors are annotated not only with the entire acceptable but non-optimal cost cannot be used
path used to compute each distance, but also to route traffic.
with certain policy attributes. It guarantees loop-
freeness at the expense of large routing tables. In order to support integrated-services class of
BGP routers use TCP to communicate with each services, multiple paths between node pairs will
other, instead of layering the routing messages have to be calculated. Some of these new classes
directly over IP, as is done in every other Inter- of service will require the distribution of addi-
net routing protocol. This simplifies the error tional routing metrics, e.g. delay, and available
management in the routing protocol. However, bandwidth. If any of these metrics change fre-
routing updates are subject to TCP flow control, quently, routing updates can become more fre-
which can lead to fairly complicated and poorly quent, thereby consuming network bandwidth
understood network dynamics. For example, and router CPU cycles.
routing updates might be delayed waiting for
TCP to time out. Thus, the choice of TCP is A second problem is that today’s routing will
still controversial [KESH97]. shift the traffic from one path to another as soon
as a “better” path is found. The traffic will be
If an AS has more than one BGP-speaking bor- shifted even if the existing path can meet the ser-
der gateway, path vectors arriving at a gateway vice requirements of the exiting traffic. If rout-
must somehow make their way to all the other ing calculation is tied to frequently changing
2) Some routing protocols, such as OSPF, do support alternative routes with equal cost, so a split of
traffic among several equal-cost paths are accepted.
)
(2 )
.5
(5
routing is to find a path whose delay is bounded
,2
,2
,2
,3
by a required value.
(1
)
s t
A number of composite routing problems can be
(2 )
,1 6 .3 derived from the four basic problems cited above.
,1
) , 2,
.5 Some of these composite routing problems are
(1
(2,1,2) hard to solve. For details, see [CHEN98].
k l
Proposed traffic engineering extensions to OSPF
[OSPF-TE] and IS-IS [ISIS-TE] currently sup-
port the advertisement of a single routing metric,
in addition to bandwidth and resource class
information. Additional link metrics, e.g. delay-
related metrics, are not supported. Thus, infor-
Figure 3.1 Network state will never be completely up-to-date due to the mation will not be directly available “on-line”
[CHEN 98] non-negligible delay of the information dissemi- for calculating paths with delay-related QoS
nation process. The larger the network, the more requirements. A solution to get around this
imprecise the information gets. might be to use the resource class information
(link colour) to mark links, so that e.g. satellite
To reduce the scalability problem for larger net- links are avoided for delay-sensitive traffic.
works, information may be aggregated according
to the hierarchical structure of the network, There is work in progress that considers IGP
obtaining an aggregated (partial) global state extensions supporting multiple metrics, see e.g.
view. [CHEN98] has described these matters in [Fedyk].
more detail.
3.2.3 Path Precomputation versus
3.2.2 The Unicast Routing Problem Dynamic QoS Routing
The unicast routing problem is defined as fol- QoS routing may primarily be aimed at traffic
lows: given a source node s, a destination node t, engineering, and the operation is characterised
a set of QoS constraints C, and possibly an opti- by a long timescale and a coarse granularity of
misation goal, find the best feasible path from s the traffic flow it handles (traffic aggregates). In
to t that satisfies C. this case, the goal of QoS routing is to maximise
the network performance in the presence of
QoS requirements on metrics such as residual slowly changing traffic patterns. The different
bandwidth and buffer space, so-called “bottle- paths computed by QoS routing are either pre-
neck” requirements, are relatively easy to han- established or change only infrequently. Several
dle. The state of the resulting path is determined proposed QoS routing protocols are based on
by the state of the bottleneck link. In Figure 3.1, precomputing paths for all possible QoS require-
the bandwidth of path s – i – j – t is 1, which is ments, and then assign traffic to the paths
the bandwidth of the bottleneck link (i, j). In this accordingly. An example would be the establish-
case, two basic routing problems may be de- ment of MPLS LSPs to accommodate traffic
fined. One problem is called link-optimisation with varying QoS requirements (e.g. DiffServ
routing. For example, bandwidth-optimisation classes). A drawback here is that the use of traf-
routing is to find a path that has the largest band- fic aggregates and the focus on network wide
width on the bottleneck link (the widest path). traffic optimisation cannot provide explicit QoS
The other problem is called link-constrained guarantees to individual flows. The precomputa-
routing. For example, bandwidth-constrained tion perspective of QoS routing is described in
routing is to find a path whose bottleneck link detail in [ORDA00].
has a bandwidth above a required value.
The other extreme is to compute QoS routes for
QoS requirements on metrics such as delay and each request, where each request explicitly
cost, so called “additive” requirements, are more express its resource requirements (e.g. similar
complex to handle. The state of the path is deter- to IntServ). The QoS routing will in this case
mined by the combined state of all links on the be constrained by satisfying individual QoS
path. In Figure 3.1, the delay of path s – i – j – t requirements, rather than obtaining a more
is 10, which is the total delay of all links on the global optimisation of network performance
path. In this case, two basic routing problems and resource usage.
2 A partial path for the LSP may be calculated Each ingress router uses this database to calcu-
offline, permitting online calculation in the late the paths for its own set of LSPs across the
ingress router to determine the full path; MPLS domain. The path for each LSP can be
represented by either a strict or loose explicit
3 The full path for the LSP may be calculated route. If the ingress router specifies all the LSRs
online, based on the input of LSP constraints; in the LSP, the LSP is identified by a strict ex-
plicit route. If the ingress router specifies only
4 The full path for the LSP may be calculated some of the LSRs in the LSP, the LSP is de-
online, with no input of LSP constraints. scribed by a loose explicit route.
Cases 1 and 2 are described in 4.2.3, while case The ingress router may apply a CSPF algorithm
3 is described in 4.2.2. Case 4 above results in (see 4.2.1) to the information in the database to
normal IGP shortest-path routing for the LSP, determine the LSP paths.
and no further description is given here.
4.2.3 Offline Path Selection
4.2.1 The CSPF Algorithm An administratively specified explicit path for an
Constrained shortest path first (CSPF) is a short- LSP is configured through operator action. The
est path first (SPF) algorithm that has been mod- path may be completely specified or partially
ified to take into account specific restriction specified. The path is completely specified if all
when calculating the shortest path across the net- the hops between the LSP endpoints are identi-
work. Constraint-based routing becomes rela- fied. The path is partly specified if only some of
tively simple when this algorithm is used. The the hops are identified, leaving the completion of
algorithm seems to be convenient for online path the path selection to online route calculation.
selection, where one LSP path is calculated at a
time. However, when multiple LSPs are to be When a path has been fully calculated offline,
routed, CSPF may have difficulty finding feasi- the LSP may be instantiated in two ways. Each
ble routes even if they exist. router in the LSP may be individually config-
ured with the necessary static forwarding state.
The CSPF algorithm requires input of the type: Alternatively, the ingress router may be config-
ured with the full path. The ingress router then
• Topology link-state information; uses [CR-LDP] or [RSVP-TE] as a dynamic sig-
nalling protocol to install forwarding state in
• Attributes associated with the state of network each router along the LSP. The resulting LSP
resources (link attributes, see 4.1); is termed a strict ER-LSP.
For the parts of the route that have not been cal- The priority attribute defines the relative impor-
culated offline, the ingress router may also use tance of LSPs. Priorities can be used to deter-
abstract nodes in the explicit route representa- mine the order in which path selection is done
tion. This permits local flexibility in fulfilling for LSPs. Priorities are also important if pre-
the request for a constraint-based route. The emption (see below) is permitted. They can be
resulting LSP is termed a loose ER-LSP. In this used to define a partial order on a set of LSPs,
case, the question of route pinning should be and pre-emptive policies may be actualised
considered. Route pinning is applicable to seg- according to this. [CR-LDP] defines two priority
ments of the ER-LSP that are loosely routed, and parameters, namely setupPriority and holding-
should be applied if it is undesirable to change Priority.
the path for the loosely routed segments of the
LSP. The pre-emption attribute determines whether a
specific LSP can pre-empt another LSP from a
If global optimisation of network resources is given path, and whether another LSP can pre-
required, the LSP path selection must take place empt a specific LSP. Pre-emption means rerout-
offline. Online path selection calculates one LSP ing existing LSPs to reallocate resources to a
at a time, and the order in which the LSPs are new path. Pre-emption can be used to assure
calculated determines the resulting set of physi- that relatively favourable paths always can be
cal paths in the network. This will probably not selected for high priority LSPs. Setup and hold-
result in optimal network resource utilisation. ing priorities are used to rank existing LSPs and
An offline path selection tool is able to simulta- the new LSP to determine if the new LSP can
neously examine the requirements for each LSP pre-empt an existing one.
and the resource constraints of each link. A
global calculation may be performed, and the A path preference rule attribute should be asso-
output of this calculation is a set of LSPs that ciated with administratively specified ER-LSPs.
optimises resource utilisation for the network as This is a binary attribute with values “manda-
a whole. After completion of the offline calcula- tory” and “non-mandatory”. If the ER-LSP path
tion, the LSPs may be instantiated in any order. is defined as “mandatory”, then that path must
be used. If the specified path for some reason
4.2.4 Generic Traffic Trunk Attributes cannot be instantiated, the LSP instantiation pro-
A traffic trunk is defined as an aggregation of cess fails. If the LSP instantiation process suc-
traffic flows of the same class that are placed ceeds, the LSP is implicitly pinned. On the other
inside an LSP. This abstract representation of hand, “non-mandatory” paths are used if feasi-
traffic allows for specific characteristics to be ble. If not, an alternate path can be chosen
associated with traffic aggregates. Traffic trunks instead by the ingress router.
are objects that can be routed, and traffic trunk
characteristics may put constraints on the path 4.2.5 Generic Resource Attributes
of the LSP into which it is placed. A number of generic resource attributes have
been defined in [RFC2702]. Some of these
A number of generic traffic trunk attributes have attributes are applicable to path selection, and
been defined in [RFC2702]. Some of these are described below.
attributes are applicable to LSP path selection,
and are described below. The maximum allocation multiplier of a resource
is an administratively configurable attribute that
Traffic parameters indicate the resource require- determines the proportion of the resource avail-
ments for the traffic trunk, as they define the able for allocation to LSPs. The attribute is most
characteristics of the FEC to be transported applicable to link bandwidth, but can also be
through the LSP. These characteristics may applied to buffer resources on LSRs. The rela-
include peak rates, average rates, permissible tionship between maximum bandwidth and max-
burst size, etc. For the purpose of path selection, imum reservable bandwidth of a link represents
or bandwidth allocation in general, the traffic the maximum allocation multiplier concept.
parameters can be used to calculate a single
value for the LSP bandwidth requirements.
There is a number of key challenges that must be We are now only seeing the beginning of mobile
met by a multicast routing algorithm to be appli- computing. IP extensions for mobility are being
cable to the Internet. It must route data only to standardized, and the real deployment is slowly
group members, optimise routes from the source starting. The current protocols have been de-
to receivers, maintain loop-free routes, and not signed in a very conservative fashion, so as to
concentrate all multicast traffic on a subset of work in the current Internet. Many refinements
links. Furthermore, the signalling in creating and will have to be addressed in further versions of
maintaining a group must scale well with a IP mobility. To gain the advantage of mobility,
dynamic receiver set. one will probably have to update the routing pro-
tocols so that they will allow multiple home
In order to provide a multicast service, one also agents and clusters of bases [HUIT00].
has to implement a complex protocol architec-
ture not limited to a single routing protocol. 6 Conclusion
Issues like address allocation, domain isolation, In this paper we have given an overview of the
access control, and security have to be provided state-of-the-art of IP routing.
for multicast to become a commercial service.
In today’s Internet, there is a clear distinction
Today, multicast has not yet matured enough to between intra-domain protocols (IGPs) and
be widely used. Research efforts are currently inter-domain protocols (BGPs).
trying to address the scalability issues by provid-
ing a simpler architecture. The future of multi- Each ISP can make its own choice of IGP. The
cast routing relies on these efforts, and also on most popular IGPs are still those defined in the
the capacity of the network providers to define 80s (and based on algorithms from the late 50s),
business models that can fund the deployment although we observe a shift from vector-distance
of the service. protocols (such as RIP) to link-state protocols
(such as OSPF and IS-IS). Link-state protocols
5.2 Mobility have many advantages compared to the vector-
With the advent of portable computers, the need distance ones; however, they still have some
to support mobility in the Internet has become major drawbacks. One of these is that all the
pressing in recent years. According to the IETF IGPs used in the Internet today offer best-effort
mobile IP working group, the requirements for a service, which means that they do not support
mobile IP solution are: QoS requirements.
The growth of the Internet leads to more com- [BLAC00] Black, U. 2000. IP Routing Proto-
plexity in the routing process; while the emer- cols. Upper Saddle River, NJ, Prentice-Hall.
gence of new applications also leads to new ser-
vice requirements. In order to support the new [CHEN98] Chen, S, Nahrstedt, K. 1998. An
demands, we believe that the research on routing Overview of Quality of Service Routing for
will be focused on these areas: Next-Generation High-Speed Networks: Prob-
lems and Solutions. IEEE Network, 12 (6),
• Inter-domain routing. As the Internet contin- 64–79.
ues to grow, the number of ASs and the sizes
of individual ASs will increase. BGP will [CR-LDP] Constraint-based LSP setup using
probably continue to evolve and new para- LDP. Work in progress, Internet Draft <draft-
meters will be defined. Consequently, the ietf-mpls-cr-ldp-05.txt>, February 2001.
complexity of inter-domain routing will also
increase. A new routing technology that gives [CR-notes] Notes on Path Computation in Con-
better support to inter-domain routing will be straint-Based Routing. Work in progress, Inter-
needed in the near future. net Draft <draft-kompella-te-pathcomp-00.txt>,
July 2000 (obsolete document).
• Multicast routing. The importance of multi-
cast routing is recognised. Examples of ser- [DIJK59] Dijkstra, E W. 1959. A Note on Two
vices that require multicast are conferencing, Problems in Connection with Graphs. Numerical
streaming audio and video, and interactive Mathematics.
gaming. These applications and services can-
not scale to thousands or millions of receivers [EURP616] Eurescom. State-of-the-art of Rout-
with multiple point-to-point, unicast streams. ing Principles. Eurescom P616, Task 2, PIR 2.3.
• Support for mobility. In the long run, it may [Fedyk] Multiple metrics for traffic engineering
well be the case that all computers are mobile. with IS-IS and OSPF. Work in progress, Internet
Even so, they will have to be connected to the Draft <draft-fedyk-isis-ospf-te-metrics-01.txt>,
Internet. Therefore, the Internet Protocol must November 2000.
be extended to support mobility.
[FF62] Ford, L R, Fulkerson, D R. 1962. Flows
• Supporting QoS requirements. New appli- in Network. Princeton, New Jersey, Princeton
cations, such as multimedia or real-time data, University Press.
[MEEL90] Maxemchuk, N, El Zarki, M. 1990. [RSVP-TE] Extensions to RSVP for LSP tunnels.
Routing and Flow Control in High-Speed Wide- Work in progress, Internet Draft <draft-ietf-
Area Networks. Proceedings of IEEE, 78 (1), mpls-rsvp-lsp-tunnel-09.txt>, August 2001.
204–221.
[STEE95] Steenstrup, M (ed.). 1995. Routing in
[ORDA00] Orda, A, Sprintson, A. QoS Routing: Communications Networks. Englewood Cliffs,
The Precomputation Perspective. In: Proceed- NJ, Prentice-Hall.
ings: IEEE INFOCOM 2000. Piscataway, NJ,
IEEE, 128–136. [SU00] Xun Su, de Veciana, G. 2000. Source
Routing in Networks with Uncertainty: Interfer-
[OSPF-TE] Traffic Engineering Extensions to ence, Sensitivity and Path Caching. In: Proceed-
OSPF. Work in progress, Internet Draft <draft- ings of IEEE GLOBECOM 2000. Piscataway,
katz-yeung-ospf-traffic-05.txt>, June 2001 NJ, IEEE, 460–464.
This work addresses the problem of static routing complexity and performance for best effort traffic in a
data network and more specifically an Internet network running an IGP (Interior Gateway protocol), and
MPLS if necessary. We first give a short presentation of the various routing strategies (single-path and
multi-path) and their possible realisation in an IP intra-domain network. We then briefly introduce the
problem of the performance measurement of a routing pattern. We also define the complexity of a
routing pattern as the number of MPLS tunnels needed for its realisation. We show how the number
of MPLS tunnels that are needed to enhance an IGP routing strategy can be minimised. We compare
different routing strategies in IP networks from the two points of view: complexity and performance.
We then propose two off-line Traffic Engineering methodologies for IP intra-domain network: the first
one is based on an IGP/MPLS architecture; the second one is based only on the IGP routing using an
Walid Ben-Ameur (28) is cur- optimised load balancing scheme. The algorithms used to compute the IGP metric and to optimise the
rently Associate Professor in the
INT, National Institute of Tele- routing patterns are also briefly described.
communications, Evry, France.
Prior to that he was a researcher
at France Telecom R&D from
1999 to 2001. He earned his
PhD degree in computer sci-
1 Introduction 2 Organisation of the Paper
ence with best honours from the Traffic routing within a telecommunication net- We introduce various (static) routing strategies
ENST, “Ecole Nationale Supér- work defines how the traffic matrix is mapped (single-path and multi-path routing strategies)
ieure des Télécommunications”, on the network topology. Routing mechanisms and describe how they can be specifically real-
in 2000. His research interests
span various aspects of network are thus identified as an essential feature in the ised in an IP intra-domain network (Section 3).
design including graph prob- control of the network performance
lems and optimization algo- [Awduche_1]. The routing mechanisms involved We then present some of the routing perform-
rithms. Dr. Ben-Ameur is the
author of more than 20 confer- allow assigning the network capacities, more or ance criteria that can be optimised (Section 4).
ence and journal papers. less efficiently, to the demands. The routing We also introduce the complexity of an IP rout-
walid.benameur@int-evry.fr choice has a direct impact on the existence and ing strategy as the number of MPLS tunnels
location of congestion within the network. A needed.
high level of congestion may decrease the grade
of service (call blocking, increased delays, The performance and complexity of various IP
packet losses, etc.). routing strategies are then compared according to
the most heavily loaded link criterion (Section 5).
Routing mechanisms within an IP network may
induce some restrictions on the path choice Some classes of efficient routing strategies are
related to the path selection algorithm. The prob- selected from these comparisons and two off-
lem occurs more specifically in the case of IP line Traffic Engineering methodologies are de-
networks running an IGP (Interior Gateway Pro- rived (Section 6).
tocol) routing protocol. In this case, the routes
derive from very simple routing algorithms Section 7 is devoted to the algorithms used in
(shortest path calculations) which offer only lim- the context of performance optimisation.
ited control over the routing paths. This often
Nicolas Michel (29) was a stu-
dent of the Ecole Polytechnique leads to a sub-optimal utilisation of the network 3 Some Static Routing
from 1991 to 1994 and gradu- resources. Today several new mechanisms are Patterns
ated from ENST (Ecole Nation- proposed to increase the routing control and to We first need the following definitions:
ale Supérieure des Télécommu-
nications) in 1996. He joined optimise the network performance, and among
France Telecom R&D (former them MPLS. However, such mechanisms also Network topology: We assume that we can rep-
CNET) in 1996 in the “Optimiza- introduce some complexity in the network man- resent the network topology as a simple non ori-
tion, Architecture and Traffic”
R&D laboratory. His main areas agement. We try to analyse the compromise ented graph that is represented by its nodes and
of research have been in net- between routing performance and complexity. edges. Multiple parallel links are represented by
work dimensioning and provi- We propose two off-line Traffic Engineering a unique edge between the nodes.
sioning and in network cost
modelling for strategic analysis. methodologies: the first one is based on an IGP/
Since 1998 he has studied Next MPLS architecture; the second one is based only • Note that in MPLS Traffic Engineering
Generation Network (NGN) ar- on the IGP routing using an optimised load bal- although n parallel links can be announced as
chitectures and routing methods
for broadband networks (IP, ATM, ancing scheme. a single bundled link [Kompella], in order to
MPLS). He is now in charge of a use all links capacity, n parallel LSPs must be
project on Traffic Engineering established (unless a solution based on LSP
solutions for France Telecom’s
IP networks. hierarchy is used [Kompella_2]). For IGP
routing see ECMP below.
nicolas.michel@francetelecom.com
2 1
C Load Balancing parameters
F at node B destination A
1
1 2
- Dest = A, Interface = E, 60%
B A
2 1 - Dest = A, Interface = F, 30%
3
D G - Dest = A, Interface = G, 10%
3 1
H
Figure 2 General ECMP
Interpretations similar as for criterion (1) can be 2) For a given routing strategy, a given network
proposed. The higher the value of α, the more topology, and a given performance criterion,
attention is paid to the edge with the lowest we call performance of a routing strategy the
residual capacity. best performance of all routing patterns that
can be achieved with this routing strategy.
Note that a routing pattern achieving the optimal
value for one of the criteria described above is a We first define the notion of complexity of a
non-dominated solution. routing strategy in an IP network. We then try to
analyze the various routing patterns that can be
The choice of a performance objective can be achieved with the above routing strategies and
driven by the nature of the studied network, the associated complexity. Finally we compare
backbone or access network. Considering a the performance of these routing strategies.
backbone network, the customer bit rate is gen-
erally bounded by the access rate (or the rate of 5.1 Complexity of the Realisation of
the Web server) which is small compared to the a Routing Pattern in IP Networks
edge capacities. The traffic oriented perfor- The IGP routing protocol has some advantages:
mance criteria are thus less crucial than the net- its simplicity, scalability, automated and dis-
work oriented performance ones. A criterion tributed implementation. Moreover IGP routing
related to the most heavily loaded edge seems has already proven its robustness and resilience.
relevant in the case of static routing when the A disadvantage of using MPLS explicit routes is
network is unable to automatically adapt to traf- the administrative burden and potential for
fic fluctuations. The most heavily loaded edge human induced errors from using this approach
criterion is one of the most often used criteria to on a large scale [Michel&al]. Network operators
evaluate the performance of backbone networks. might thus want to minimise the total number of
MPLS tunnels created in the network.
5 Comparison of Static
Routing Patterns Definition:
The following static routing strategies are com- We define the complexity of a routing pattern as
pared (listed in a decreasing order of flexibility): the number of tunnels that are needed for its
realisation in an IP network.
• Multi-path symmetric routing;
5.2 Scenarios
• Single-path symmetric routing; Several scenarios (topology and traffic matrix)
have been selected in order to compare the dif-
• Single-path symmetric routing with constraint ferent routing strategies. Some of them have
of sub-optimality; been studied by C. Villamizar [Villamizar_1,
Villamizar_2] in the evaluation of OMP
• Unique symmetric shortest path routing; approaches and the others have been extracted
from real case world networks.
• Minimum hop (symmetric) routing.
The scenarios used by Curtis Villamizar are
In the sequel, it is implicit that all routing pat- available on his Web site along with the results
terns considered are symmetric. We believe of his simulations [Villamizar_2].
some of the results can be extended to asymmet-
ric routing patterns but this is left for further These scenarios are defined by a network topol-
study. ogy (obtained by random generation) along with
capacity on the edges and a traffic matrix. Edges
Bear in mind that for any multi-path routing
pattern, it is possible to find a destination based
multi-path routing scheme that achieves the
Nodes Edges Mesh degree Demands
same load links (see Section 3.2). This routing
scheme can be implemented using a generalised OMP_10_29 10 29 5.8 45
ECMP technique.
OMP_20_51 20 51 5.1 190
OMP_10_29 0% 51 % 35 % 95 %
OMP_20_51 0% 2% 29 % 88 %
OMP_50_101 0% 0% 33 % 69 %
are symmetric but may have a different capacity satisfying the sub-optimality condition. In each
in each direction. The traffic matrix is oriented. case a compatible metric has been searched
using a linear programming method described
The two following scenarios extracted from real in [Ben-Ameur&Gourdin_1] and [Ben-Ameur&
case networks have also been studied: Liau] (see Section7). Results are displayed in
Table 1.
• Scenario FT_1: 9 nodes 20 edges and 35 sym-
metric demands; Bear in mind that a routing pattern that is not
satisfying the sub-optimality condition is never
• Scenario FT_2: 26 nodes 39 edges and 154 compatible [Ben-Ameur&Gourdin_1].
symmetric demands.
Although a limited number of topologies has
5.3 Comparison of Routing Sets: been tested, we can draw the following trends
Size and Complexity from these results:
In what follows, we try to answer the following
questions: what is the relative size of the routing • General single-path routing patterns: It seems
sets of each routing strategy? What is the com- difficult to find a compatible metric for gen-
plexity of realisation of the corresponding rout- eral single-path routing patterns (not a single
ing patterns in an IP network? case in our tests). The routing set of single-
path routing strategy is thus much larger than
5.3.1 Shortest Path Routing the routing set of the unique shortest path
We first introduce some definitions: routing strategy. However it is possible to find
a metric compatible with at least a significant
1) A single path and a metric are compatible if sub-routing pattern: in average 30 % of the
the path is a unique shortest path according paths whatever the size of the network;
to the metric. A metric is compatible with a
single-path routing pattern if all paths are • Sub-optimality compliant routing patterns: In
compatible with the metric. In Section 7, a significant number of cases it is possible to
we address the case where the constraint find a compatible metric. The size of the rout-
of uniqueness of a shortest path is relaxed; ing set of the sub-optimality compliant routing
strategy seems to be very close to the size of
2) A routing pattern is compatible if there exists the routing set of the unique shortest path
a metric compatible with all paths in the rout- routing strategy for (very) small networks
ing pattern; (scenario OMP_10_29). As the size of the net-
work increases (a few dozen nodes), the size
3) For a given single-path routing pattern the of the routing set of the sub-optimality com-
number of compatible paths is defined as the pliant routing strategy seems again to be much
maximal number of paths of a compatible sub- bigger than the size of the routing set of the
routing pattern (a subset of paths of the rout- unique shortest path routing strategy (scenario
ing pattern). OMP_20_51 and OMP_50_101). However
the percentage of compatible routing paths is
A first step in this routing strategy analysis is to higher than for the general routing patterns
measure the difficulty to find compatible metrics (more than 70 %) although it seems to de-
for a given routing pattern. For different network crease with the size of the network.
topologies, we have randomly generated 100
fully meshed single-path routing patterns and These results depend on the studied topologies.
100 fully meshed single-path routing patterns For example, for a ring network the routing set
Multi-Path
Single-Path
Sub-optimality
compliant
Single-Path
Unique
Shortest Path
of the sub-optimality compliant routing strategy It is easy to show the following result: if the ini-
is equal to the routing set of the unique shortest tial routing pattern satisfies the sub-optimality
path routing strategy [Ben-Ameur&Gourdin_1]. condition, then the tunnels created as described
It is likely that the results depend on the degree above do not modify the IGP routing for the
of connectivity of the network. Other relevant paths that were compatible with the metric.
topologies for IP networks are under study. Thus, in the case where the routing pattern satis-
fies the sub-optimality condition, it can be real-
5.3.2 Single-path Routing with Metrics ized by an IGP routing protocol modified by
and Tunnels some tunnels. The number of pairs of tunnels
We have seen that a general single-path routing (one in each direction) needed is equal to the
pattern is often not compatible. It is possible to number of paths in the routing pattern minus the
realise such routing patterns in an IP network number of compatible paths. However, in some
using strict explicit routing, for example by cre- cases, it may be possible to create less tunnels
ating two ER-LPS per path, one in each direc- because a pair of tunnels may modify more than
tion. This requires n * (n – 1) MPLS tunnels one shortest path into the correct routing path
in the network (if the routing pattern is fully (see Section 7.1.2).
meshed). The routing complexity is thus directly
related to the number of demands. 5.3.3 Complexity of the Routing Patterns
We consider all routing patterns (including sin-
However in the case of sub-optimality compliant gle-path and multi-path routing patterns) and
routing patterns, it is often possible to find a their realisation in IP networks. Some of them
metric compatible with a large percentage of the can be reproduced without any MPLS tunnels
paths in the routing pattern. The question is now (i.e. using only the IGP routing), some others
the following: is it possible to reproduce the require the creation of a limited number of MPLS
remaining non-compatible paths with the IGP tunnels (IGP routing modified with some MPLS
routing modified with a limited number of tunnels) and the last routing patterns require a
MPLS tunnels? large number of MPLS tunnels (in the order of
the number of paths in the routing pattern).
We consider the “IGP Shortcut” model of inte-
gration of the IGP routing with the MPLS tun- Based on the results above, we can represent in
nels (Section 3.3). For each remaining path not Figure 3 a comparison of the complexity of dif-
compatible with the metric, the two correspond- ferent routing patterns.
ing ER-LSP are created (one in each direction).
The modified IGP routing will thus route the We can see that a large number of routing pat-
traffic along the correct paths for these routing terns (much larger than the number of routing
paths not compatible with the metric. However patterns that can be achieved with the IGP rout-
those tunnels can modify the routes found by the ing only) can be achieved with a “reasonable”
modified IGP for the paths that are compatible complexity (with a limited number of tunnels).
with the metric. The natural question that arises is the following:
what level of performance can be achieved with
each level of complexity?
FT_26 0.64* 0.66* 1.50 0.88 • Single-path versus multi-path routing: In the
case of scenarios FT_9 and FT_26, the pro-
posed solution is optimal and the performance
of both routing strategies is very close. The
result is quite different in the case of Vil-
Table 2 Performance of 5.4 Comparison of Performance lamizar scenarios. The single path constraint
different routing strategies The performance criteria considered in this Sec- decreases the performance (about 30 %). Note
tion concern the network’s ability to support that in the latter case the optimisation heuristic
traffic increases. It is measured by the maximum used is very simple and we have no guarantee
edge load (Section 4). of the quality of the solution. Results seem to
depend highly on the network topology and on
5.4.1 Optimisation the traffic matrix. Note that it is easy to build
A different optimisation problem has to be scenarios for which the performance of the
solved for each routing strategy. Some of them single-path routing strategy is arbitrarily
are NP-hard and cannot be solved exactly: in worse than the performance of the multi-path
these cases a heuristic has been used. As a con- routing strategy (below is an example of a
sequence, the comparison of the routing strategy topology on which a single-path routing strat-
performance may be affected by the accuracy of egy will perform very badly compared to a
these heuristics. The routing optimisation proce- multi-path routing strategy because it is not
dures we have used are described below: possible to balance the traffic from O to D on
the n parallel paths). However, in an opera-
• Multi-path routings: A linear programming tional perspective, the worst case is not rele-
(exact solution); vant, only the average case over realistic
topologies;
• Single-path routings: A heuristic (a branch
and cut algorithm) based on linear program- D
ming which also provides an upper bound on
the optimal solution [Geffard]. Only symmet-
n
ric problems can be solved with this tool (con-
sequently not the Villamizar scenarios1)); I
1) Results for the Villamizar scenarios are directly reported from his Web site [Villamizar_2].
TAG
RBG RBG
B E F B E F
routing strategy, the edge metric value is sys- at the routing paths, we note that 3 links have the
tematically set to one) may induce a very poor maximum load of 85 %. We have identified 3
performance compared to the performance pairs of MPLS tunnels that lead to a modified
achievable with an optimised metric (in the routing pattern where the most heavily loaded
studied scenarios, the relative performance link has a load of 77 %.
drops from 25 % up to 200 %);
By creating a few MPLS tunnels, it is in some
• Single-path routing versus unique shortest cases possible to realise a new routing pattern
path routing: with a significantly improved performance. An
- Note that for the Villamizar scenarios, the important point to mention here is that the result-
performance achieved with unique shortest ing routing pattern does not necessarily satisfy
path strategy is sometimes better than with the sub-optimality condition. This means that it
a less constrained single-path routing strat- is possible to achieve some kind of load distribu-
egy. It only means that, in the case of sin- tion where two demands may be routed on two
gle-path routing optimisation, the heuristic paths with two nodes in common but using a
is not accurate enough to reach a value distinct path between the 2 nodes (Figure 4).
close to the optimum. This may be of some
importance, because such heuristics are Finally, note that it is not clear which of the
quite often used, even in operational net- three different models of integration of the IGP
work configuration tools; routing with MPLS tunnels is the most interest-
ing. The first one, however, may add more com-
- In the case of FT_9 and FT_26 scenarios, plexity because one tunnel can be used by only
the optimal performance of the single-path a limited number of demands.
routing strategy is found. For the smaller
network (FT_9), the performance that can 6 “Off-line” Traffic
be achieved with the unique shortest path Engineering Methodologies
strategy is very close to this value. However Based on the results of Section 5, we can pro-
for scenario FT_26, the best performance pose off-line “Traffic Engineering” methodolo-
that can be achieved with the unique short- gies. The objective is to improve the perfor-
est path strategy is 30 % worse than this mance of the network in terms of resource utili-
value. Further tests are needed to investi- sation. Two different methodologies are de-
gate whether the gap increases with the scribed: the first one using MPLS, the second
size of the network (number of edges). one relying on the IGP routing only but using a
generalised ECMP technique. In both cases, a
5.4.3 Performance Improvement with single class of (best effort) traffic is considered.
MPLS Tunnels It is also assumed that a representative end-to-
The size of the routing set for the unique shortest end traffic matrix between the network nodes
path routing strategy modified with a few MPLS can be measured or estimated.
tunnels is much larger than the size of the rout-
ing set for the unique shortest path routing strat- 6.1 An MPLS-based off-line Traffic
egy. A natural question then follows: is it possi- Engineering Methodology
ble to significantly improve the performance of The following assumptions are made:
unique shortest path routing by adding a few
MPLS tunnels? • MPLS is deployed in the network and it is
possible to create explicitly routed MPLS
We suppose that the IGP routing is modified by tunnels (ER-LSP);
the MPLS tunnels according to the “IGP Short-
cut” integration model (Section 3.3). For exam- • The IGP routing is modified to take into
ple, if we consider scenario OMP_10_29, the account the MPLS tunnels in the determina-
best performance achieved with the unique tion of the next hop according to the “IGP
shortest path routing strategy is 0.85. By looking Shortcut” model (Section 3.3).
Medium/Short Term
{ER_LSP}2
• Step 2. Search a metric compatible with a One of the advantages of this TE methodology
number of paths in this routing pattern equal is to rely as much as possible on the IGP routing
to the number of compatible paths of the rout- which has already proven its scalability, reliabil-
ing pattern. This step can also include some ity and which is automated. The administrative
extra constraints provided that they can be metric values are changed when needed in order
expressed using a linear formulation (for to optimise the routing performance of the nomi-
example, equalities or inequalities verified nal routing pattern. The use of MPLS tunnels
by the metric values, minimising the value enables the network operator to significantly
changes from an existing metric set); improve the routing performance in response to
events in the network (transient change of traffic
• Step 3. If the metric obtained in Step 2 is not profile etc.) while limiting the number of MPLS
compatible with the entire routing pattern tunnels which limits the complexity of manage-
obtained in Step 1, create the necessary MPLS ment.
tunnels (ER-LSP) in order to reproduce com-
pletely the routing pattern obtained in Step 1 6.2 An ECMP-based off-line Traffic
(Section 5.3.2); Engineering Methodology
We assume that the routers are able to split the
• Step 4. Then try to improve the routing perfor- traffic through different equal cost paths (see
mance of the solution obtained in Step 3 by Section 3.2). The load splitting parameters have
adding a few MPLS tunnels: it is necessary in to be administratively configured.
this step to find a trade-off between the num-
ber of tunnels created and the gain in perfor- The methodology involves the following steps:
mance.
• Step 1. First compute off-line a multi-path
We can identify two different parts in this routing pattern optimising the performance
methodology. The first one (Steps 1 through 3) criteria chosen (for example, try to minimise
⎧
• Step 2. Determine the destination based multi- ⎪
⎪ Find(me )e∈E
⎪
⎪
path routing pattern that achieves the same ⎨ Subject
to :
load links. In other words, determine the ade- (LP1 ) e∈R(a,b) me = yab ; ∀(a, b) ∈ K
⎪
⎪
⎪
⎪
⎩ e∈p me ≥ 1 + yab ; ∀(a, b) ∈ K, p ∈ S(a, b)
quate load balancing parameters at each inter- me ≥ 0; ∀e ∈ E
mediate node and for each destination so that
the resulting hop-by-hop routing achieves the
same link loads (see Section3.2); This linear program can be solved by gener-
alised linear programming. An equivalent poly-
• Step 3. Compute a metric compatible with this nomial formulation can also be given [Ben-
routing pattern (see Section 7.1.3). Ameur&Gourdin_1] [Ben-Ameur&Liau]. If a
solution is found, the metric given by LP1 is
We note that with this methodology, both IGP compatible with the routing paths: every path
metrics and load balancing parameters must be R(a,b) is a unique shortest path, according to
administratively configured. The operation of this metric, between a and b.
modification of administrative metric values of
the IGP in the network can be considered on a Note that many particular constraints can be
medium or long-term basis. The operation of added to LP1:
modifying load-balancing parameters however
does not have any convergence consequence. • All the metric values must be larger than 1;
This could be done on a more frequent basis in
response to events in the network (transient • We may also want some links to have equal
change of traffic profile, etc.). metrics;
7 Algorithms for Traffic • The routing paths used during failures are also
Engineering given in advance (they must be shortest paths
In this Section we briefly present some of the in the resulting graph obtained after the fail-
algorithms used to address the problems that ure);
arise in the context of traffic engineering as
described above. Due to space limitation, it • The metrics may be required to be integer.
is not possible in this paper to give neither the
proofs nor the whole details of the algorithms. LP1 can also be solved considering various kinds
However, this Section is self-contained and of objective functions: minimise the maximum
can be understood easily. metric, the sum of metrics, or any linear function
of the variables, etc.
7.1 Compatible Metrics
This Section is devoted to methods used to com- Note that LP1 does not always have a solution.
pute a set of edge metrics compatible with a set Said another way, the sub-optimality condition
of routing paths. is a necessary but not always a sufficient condi-
tion to find a metric. Some other necessary con-
7.1.1 Unique Shortest Paths ditions are proposed in [Ben-Ameur&Gour-
First let us focus on the case of unique shortest din_1]. However, we showed that the sub-opti-
paths. As said in Section 3, the sub-optimality mality is sufficient for some graphs such as
condition (Figure 1) of the routing paths is a cycles, cactus, etc.
necessary condition to find a set of compatible
metrics. In the case where there is no feasible solution, an
interesting particular formulation of LP1 is the
Let G = (V,E) be the graph associated with the one maximising the number of demands whose
network. The set of node pairs of G for which a routing paths are unique shortest paths (or equiv-
routing path R is given is denoted by K. In other alently that maximises the number of compatible
terms, we assume that a path R(a,b) is given for paths):
each (a,b) ∈ K. If c and d are such that
c ∈ R(a,b) and d ∈ R(c,b), then R(c,d) is
assumed to be the sub-path of R(a,b) linking c to
d (by sub-optimality). S(a,b) is defined as the set
of paths between a and b which are different to
R(a,b). The metric is denoted by (me )e∈E .
However, MPLS can integrate various types of [Mo&Walrand] Mo, J, Walrand, J. 2000. Fair
routing constraints allowing to implement spe- End-to-End Window-Based Congestion Control.
cific routing strategies and QoS policies. IEEE/ACM Transactions on Networking, 8 (5),
556–567.
Acknowledgement
We wish to thank Jérome Geffard for providing [OSPF-OMP] Villamizar, C. OSPF Optimized
his single path optimization software. Multipath (OSPF-OMP). (draft-ietf-ospf-omp-
00.txt), March 1998.
9 References
[Awduche_1] Awduche, D et al. A framework [Pioro&al] Pioro, M et al. 2000. Solving an OSPF
for Internet Traffic Engineering. (draft-ietf- Routing Problem with Simulated Allocation. In:
tewg-framework-05.txt), June 2001. Proceedings of the First Polish German Teletraf-
fic Symposium, PGTS 2000. Ude Verlag, 177–184.
[Awduche_2] Awduche, D. 1999. MPLS and
Traffic Engineering in IP Networks. IEEE Com- [Smit] Shen, N, Smit, H. Calculating IGP routes
munications Magazine, 37 (12), 42–47. over Traffic Engineering tunnels. (draft-hsmit-
mpls-igp-spf-00.txt), June 1999.
[Ben-Ameur&al] Ben Ameur, W et al. 2000.
Designing Internet networks. In: Proc. DRCN [Thorup&al] Fortz, B, Thorup, M. 2000. Internet
2000, Reliable Networks for the Information Traffic Engineering by Optimizing OSPF
Age, 56–61, Munich, Herbert Utz Verlag. Weights. In: Proceedings of INFOCOMM 2000.
Piscataway, NJ, IEEE, 519–528.
[Ben-Ameur&Gourdin_1] Ben Ameur, W,
Gourdin, E. Internet routing and related topology [Villamizar_1] Villamizar, C (UUNET). MPLS
issues. Submitted to SIAM journal of discrete Optimized Multipath. draft-villamizar-mpls-
mathematics (2000). omp-01.txt, February 1999.
In this paper we address the well known multiplexing problem in IP-networks containing links with low
capacity. Due to the highly variable packet lengths real time traffic may experience transmission with
unacceptable delays and jitter that may cause degraded quality.
Even if priority mechanisms are implemented in the routers (e.g. DiffServ is implemented), this will not
completely solve the problem unless some kind of fragmentation of long IP packets is performed.
To study this negative multiplexing effect we have taken a non-preemptive priority queuing model, which
will give the best performance for the high priority traffic classes if no fragmentation is performed. As a
second model describing the effect of fragmentation we have taken a non-preemptive priority queuing
model with batch arrivals where the size of a batch corresponds to the number of fragments an IP
Olav Østerbø (48) received his packet will consist of. The numerical examples presented show that the critical link capacity lies around
MSc in Applied Mathematics
2 Mbit/s if the maximum packet length is limited to 1500 bytes.
from the University of Bergen
1980 and joined Telenor R&D
the same year. His main inter-
ests include teletraffic modelling
and performance analysis of 1 Introduction or AAL5), however, there is a common trend to
various aspects of telecom net-
works. Activities in recent years Introducing high capacity links in IP-based net- try to minimise the use of circuit-like protocols
have been related to dimension- works, with differentiated QoS, allows delivery and instead deploy IP also in the radio network.
ing and performance analysis of of services with highly variable characteristics. The multiplexing of IP packets over ATM has
ATM networks and now moving
towards IP networks, where the As we know the IP protocol provides statistical some desired features due to the fact that the
main focus is on modelling and multiplexing between user applications that may ATM cells are rather short and have fixed
control of different parts of next generate packets of highly variable lengths. For lengths, thereby avoiding large delay variation
generation IP-based networks.
typical real time services the main QoS parame- due to long packets.
olav-norvald.osterbo
@telenor.com
ters are end-to-end delay and jitter, and we must
be aware that the main contributions to these Traditionally there has been quite a strict distinc-
parameters will come from low capacity links tion between the access network and the core
(in the access network). This justifies the need to (transit) network, where the access is defined as
put special emphasis on the link layer protocol the part of the network from the subscriber to the
and the multiplexing structure in the access net- local exchange. By increasing the line speed by
work. introducing different active components this def-
inition of where the access network ends and
The access network will encompass a variety of where the core (transit) network starts are not
different access technologies that are currently directly valuable any more. In IP networks the
available. These can be divided according to definition seems to be more flexible on the basis
• Fixed access, or of more functional distinctions. Usually one will
• Mobile access. define the core network as the part of the net-
work where DiffServ and/or MPLS is deployed.
With the recent advances in access technology By the increased line speeds it is however an
the fixed access may be a mixture of one or interesting question to find out how ‘far’ out in
more different types such as Asymmetric Digital the ‘old access network’ the DiffServ model
Subscriber Line (ADSL), Very high speed Digi- (and possible MPLS) is effective.
tal Subscriber Line (VDSL), Coax and optical
fibre, all having very different physical charac- 2 A Model Evaluating the IP
teristics. The logical structure of the access net- Multiplexing Problem
work may therefore be very different. for Low Capacity Links
Multiplexing traffic of different types on the IP
For mobile access the radio medium has limited level may cause delay and jitter problems if
bandwidth implying that the available bitrate for these traffic types share a link with rather low
each user will be limited. capacity. The main cause for this delay and jitter
is the variation in the packet lengths for the dif-
The link layer protocol structure in the access ferent traffic types. While typical real time traf-
network will therefore be very different depend- fic like voice will emit packets of a small fixed
ing on the actual physical technologies applied. size, the typical data application may generate
In Universal Mobile Telecommunication System packets that are quite long. Due to this mismatch
Terrestrial Radio Access Network (UTRAN) the in packet size between different applications the
current link protocols are based on ATM (AAL2 queuing delay for typical real time traffic may
One could hope that deploying the DiffServ • All other traffic which we assumed to have
model with traffic classification and PHB prior- lower (second) priority.
ity scheduling would overcome this problem.
This is however not the case unless there is some Further we make the following assumptions:
kind of fragmentation of the long IP packets on
lower layers. This means that although most of • Packets arrive according to Poisson processes.
the DiffServ implementations (in routers) have
implemented priority among different traffic • The link capacity is C (given in bits/sec).
classes these priority mechanisms are all non-
preemptive. With this type of priority mecha- • The packet lengths for the high priority class
nism a high priority packet cannot interrupt an is either constant or exponentially distributed
ongoing transmission of a packet of lower prior- with mean PL1 (given in bits).
ity. This means that the packet length distribution
of the lower priority traffic classes will have an • The packet lengths for the low priority class
impact on the delay for the high priority traffic. are exponentially distributed with mean PL2
(given in bits) and the length of a fragment
The only way to get round the multiplexing is (constant) equal to FRL (given in bits).
problem for low capacity links is to have some
kind of fragmentation of the long IP packet, • The load from the different traffic classes are
making it possible to interleave small real time ρ1 and ρ2 (where we assume ρ = ρ1 + ρ2 < 1).
IP packets. By this option the maximum waiting
time due to lower priority traffic will just be the With these definitions we get mean service times
transmission time for a single fragment. This for packets and the service time for a fragment
fragmentation will be possible if IP is trans- as:
ported over ATM, and in this case the maximum
PL1 PL2
disturbance of the high priority traffic due to b1 = µ 1−1 = , b2 = µ 2−1 = , and
lower priority is limited to one ATM cell. C C
-0.5 -0.5
-1 -1
Log[P(W>t)]
Log[P(W>t)]
-1.5 -1.5
2 2
-2.5 -2.5
-3 -3
-3.5 -3.5
0.005 0.01 0.015 0.02 0.025 0.03 0.035 0.04 0.005 0.01 0.015 0.02 0.025 0.03 0.035 0.04
sec sec
Figure 1 The complementary waiting time distribution for high priority traffic with ATM fragmentation (the lower curves) and without
any fragmentation (upper curves) for a link of capacity 2 Mbit/s, and high priority packet length of 200 bytes, low priority packet length
of 1500 bytes. The load is 0.2 and 0.5 in the left figure and 0.3 and 0.6 in the right figure for high priority and low priority traffic
0 0
-0.5 -0.5
-1 -1
Log[P(W>t)]
Log[P(W>t)]
-1.5 -1.5
2 2
-2.5 -2.5
-3 -3
-3.5 -3.5
0.005 0.01 0.015 0.02 0.025 0.03 0.035 0.04 0.005 0.01 0.015 0.02 0.025 0.03 0.035 0.04
sec sec
Figure 2 The complementary waiting time distribution for priority traffic with ATM fragmentation (the lower curves) and without any
fragmentation (upper curves) for a link of capacity 2 Mbit/s, and high priority packet length of 200 bytes, low priority packet length of
3000 bytes in the left figure and 6000 bytes in the right figure. The load is 0.2 and 0.5 for high priority and low priority traffic
0 0
-0.5 -0.5
-1 -1
Log[P(W>t)]
Log[P(W>t)]
-1.5 -1.5
2 2
-2.5 -2.5
-3 -3
-3.5 -3.5
0.025 0.05 0.075 0.1 0.125 0.15 0.175 0.02 0.025 0.05 0.075 0.1 0.125 0.15 0.175 0.02
sec sec
Figure 3 The complementary waiting time distribution for priority traffic with ATM fragmentation (the lower curves) and without any
fragmentation (upper curves) for a link of capacity 0.5 Mbit/s, and high priority packet length of 200 bytes, low priority packet length
of 1500 bytes. The load is 0.2 and 0.5 in the left figure and 0.3 and 0.6 in the right figure for high priority and low priority traffic
-0.5 -0.5
-1 -1
Log[P(W>t)]
Log[P(W>t)]
-1.5 -1.5
2 2
-2.5 -2.5
-3 -3
-3.5 -3.5
0.025 0.05 0.075 0.1 0.125 0.15 0.175 0.02 0.025 0.05 0.075 0.1 0.125 0.15 0.175 0.02
sec sec
Figure 4 The complementary waiting time distribution for priority traffic with ATM fragmentation (the lower curves) and without any
fragmentation (upper curves) for a link of capacity 0.5 Mbit/s, and high priority packet length of 200 bytes, low priority packet length
of 3000 bytes in the left figure and 6000 bytes in the right figure. The load is 0.2 and 0.5 for high priority and low priority traffic
In the second example we have taken a slower 4 Some Methods for Calculat-
link with capacity 0.5 Mbit/s. In this case we see ing Delay Distributions in
that approximately one out of 100 high priority Non-Preemptive Priority
packets will get a queuing delay greater than 80 Queues
ms. This delay lies in the range where it adds up In this section we will consider some methods to
with other types of delay and may reach the limit calculate waiting time distributions for priority
where QoS is not possible to maintain, for queues. Most of the results for the M/G/1 queues
instance for speech services. with priorities are given in terms of Laplace-
Stieltjes transforms (LSTs). To get the actual
If the packet length of the background traffic distributions we then have to invert these trans-
increases, the distribution function of the queu- forms.
ing delay will decrease very slowly, and with a
relatively high probability the high priority traf- We consider a non-preemptive queuing system
fic will experience unacceptable delays and with P priority classes where the priority order-
therefore fragmentation will be necessary in ing is according to the increasing numbers
order to maintain QoS. indexed by p = 1, 2, ..., P.
To conclude the numerical examples it seems Packets from class p arrive according to a Poisson
that the DiffServ model with the EF traffic hav- process with rate λp and the service times (de-
ing (non-preemptive) priority over the other noted Bp in each class) are all independent with
classes seems to give satisfactory performance Distribution Functions (DF) Bp(t) = P(Bp ≤ t)
on access-links higher than 2 Mbit/s. For links ∞
with lower bitrate the multiplexing disturbance and LST Bp∗ (s) = e−st dBp (t). We denote
t=0
from lower priority traffic may be so high that it
will be difficult to maintain stable QoS. In this mean of the service time bp and the ith moments
case fragmentation of the lower priority traffic,
for instance by deploying ATM as a link proto- bp(i), i = 2, 3, .... Further the load from class p is
col, will be an efficient alternative in order to given by ρp = λpbp and the total arrival rate and
solve these multiplexing problems. This is how- load on the server are:
ever a critical limit since a broad part of the
access links will typically be ADSL links with P P
access rates in the range of 2 Mbit/s. λ= ∑λ p and ρ = ∑ρp .
p=1 p=1
Similarly it is also efficient to define the service Further the function σp–1(s) is defined through
time distribution of an arbitrary packet in one of
the lower priority classes p + 1, ..., P, which we the LST of the busy period distribution, θ +p-1 (s),
denote B p–. The corresponding LST is given as generated by packets of class 1, 2, ..., p – 1:
the weighted sum
1
P σp−1 (s) = s + λ+ + +
p−1 − λp−1 θp−1 (s)
Bp− (s) = − λk Bk∗ (s)
λp k=p+1
where θ +p-1 (s) is the unique solution of the equa-
P
tion
where the rate λ−
p = λk and correspond-
+ +
k=p+1
θp−1 (s) = Bp−1 s + λ+ + +
p−1 − λp−1 θp−1 (s) .
P
−
ing load ρp = ρk . Further the mean and
k=p+1 Combining the two last equations yields the
ith moment are given as important relation:
P
1 ρ−
p s = σp−1 (s) − λ+ +
b−
p = − λk bk = − and p−1 (1 − Bp−1 (σp−1 (s))).
λp k=p+1 λp
and by integrating the relation above we get: where we assume that µk = µ1(1 – ρ1) for
k = 2, ..., P.
ρ−
W1c (t) = 1 − 1 c
WM/G/1 (t)
1 − ρ1
The similar result when fragmentation is per-
ρ−
formed is found to be:
+ 1 1 − b̃−
1 (t) ∗ WM/G/1 (t)
1 − ρ1
c
Wf,1 (t) =
c
where WM/G/1(t) is the DF and W M/G/1(t)
is the ρ1 ρ−
1−ρ− 1
e−µ1 (1−ρ1 )t +
CDF of the corresponding M/G/1 queue and 1 − ρ1 (1 − ρ1 )bf µ1
~–
b 1 (t) PDF for the remaining service time for an ρ−
1 ρ1 e−µ1 (1−ρ1 )H(t−bf ) t
+ H(bf − t) 1 − .
arbitrary low priority packet. More explicitly we 1 − ρ1 (1 − ρ1 )µ1 bf bf
~
have the following expressions for b 1–(t):
P
1
b̃−
1 (t) = − λk Bkc (t), where 4.3.2 Constant Service Times for the
ρ1 k=2
Highest Priority Traffic
B kc(t) = P(Bk > t) is the CDF of service time of
packets from priority class k. In this case we assume that the highest priority
traffic is constant with mean b1 = (µ -1
1 ). For the
In the case where fragmentation is performed the M/D/1 queue the DF of the waiting time may be
results for the waiting time for the highest prior- written as [Roberts1996]:
c
ity traffic looks very similar. If we let W f,1(t) =
P(Wf,1 > t) be the CDF of the waiting time for WM/D/1(t) = q(t/b1; ρ) with
x
the first fragment of a high priority packet we [ρ(k − x)]k −ρ(k−x)
find: q(x; ρ) = (1 − ρ) e .
k!
k=0
c ρ−
1 c
Wf,1 (t) = 1 − WM/G/1 (t)+ Below we show that it is possible to express the
1 − ρ1
convolution with an exponential density in terms
t
ρ−
1 1 of a sum of q(x; ρ)’s in the following way:
1− WM/G/1 (τ )dτ
1 − ρ1 bf τ =H(t−bf )(t−bf ) t
µk e−µk (t−x) WM/D/1 (x)dx = F (t/b1 ; µk b1 , ρ)
c x=0
where WM/G/1(t) is the DF and W M/G/1
is the (t)
CDF of the corresponding M/G/1 queue, and where
t
1 for x > 0 F (t; µ, ρ) = µ e−µ(t−x) q(x; ρ)dx =
H(x) = is the unit step function.
0 for x < 0 x=0
t k
4.3.1 Exponentially Distributed Service µ ρ
q(t − k; ρ) − (1 − ρ)eµ(k−t) .
µ+ρ ρ+µ
Times k=0
(1 − ρ ) ∑
⎣t ⎦ t
µk [ρ ( k − x )]k e − (ρ + µ )( k − x ) dx =
If we assume that all the lower priority classes ∫e k!
have negative exponentially distributed service k =0 x=k
times (with mean service times bk = µ p-1 for pri- ( k µ + ρ ) ( k −t )
1 − ρ ⎣ t ⎦ ⎛ ρ ⎞ µk ζ k −ζ
ority class p) we find by applying the formula − ∑ ⎜ ⎟ e
µ + ρ k =0⎝ µ + ρ ⎠ ∫ k!
e dζ .
above: ζ =0
1−ρ
W1c (t) = 1 − q(t/b1 ; ρ1 ) Integrating (and collecting) we get:
1 − ρ1
P
1 1− ρ ⎛ ⎣ t ⎦ ⎛ ρ ⎞ µk
k
− ρk F (t/b1 ; µk b1 , ρ1 ) G(t; µ , ρ ) = − ⎜∑⎜ ⎟ e
1 − ρ1
k=2
µ + ρ ⎜⎝ k = 0 ⎝ µ + ρ ⎠
(ρ ( i − ( t − j ))) e − ρ ( i − ( t − j ) )
i
i!
⎣t ⎦ j
⎛ ρ ⎞
= ∑ ⎜ ⎟ q ( t − j; ρ )
j =0 ⎝ µ +ρ⎠
(q(t − k;ρ ) − (1 − ρ )e ( ) ). µ k −t
Jamin S et al. 1997. A Measurement based
Admission Control Algorithm for Integrated
Lemma 1: Let fi(x) be a sequence of functions Services Packet Networks. IEEE ACM Transac-
indexed by i. Then one can interchange integra- tions on Networking, 5 (1), 56–70.
tion and summation according to the following
rule: Johnson, V. 1999. Technology Backgrounder –
Quality of Service – Glossary of Terms. (2001,
t ⎣x⎦ ⎣t ⎦ t September 7) [online] – URL:
∫ ∑ f k ( x)dx = ∑ ∫ f k ( x)dx . www.Stardust.com.
x=0k =0 k =0 x=k
⎣ t ⎦ −1 ⎣ t ⎦ −1 i +1 ⎣ t ⎦ −1 t
∑ ∑ ∫ f k ( x)dx + ∑ ∫ f k ( x)dx +
k = 0 i = k x =i k = 0 x = ⎣t ⎦
t
∫ f ⎣ t ⎦ ( x)dx =
x = ⎣t ⎦
⎣ t ⎦ −1 t t
∑ ∫ f k ( x)dx + ∫ f ⎣ t ⎦ ( x)dx =
k =0 x=k x = ⎣t ⎦
⎣t ⎦ t
∑ ∫ f k ( x)dx
k =0 x=k
An essential complication when managing a network is the interconnections with other operators. This
implies that the operator does not have control over the complete path, but depends on conditions in the
connected networks. A further challenge is to introduce more automatic and accurate service provision,
possibly adapted to individual customers and following the conditions in the network. Some means for
achieving these goals are treated in this paper.
SLA
Service Service
provider provider
Xm
Management Management
SLA system system SLA
Xu Xu
Xn
End-user End-user
G1 CR1 G2 G2 CR G1
access access
Xnu Xnu
CR CR
Legend
ISP: Internet Service Provider SLA: Service Level Agreement
Xn : Network to network interface Xm: ISP to ISP management interface
G1: Edge Router (or Gateway) G2: Border Router (or Gateway)
CR: Core Router Xu: ISP to User management interface
Xnu: User-network interface
SLS
Subscription SLS Dynamic
Subscription Route Mgt.
Customer/ISP Dynamic
SLS Resource Mgt.
invocation Routing
SLS
invocation
“Control Plane”
Monitoring SLS Network
Port Monitoring Monitoring
Node
Monitoring
“Data Plane”
Data Traffic Per Hop
Transmission Conditioning Data Plane Behaviour
the technical level. Means for negotiating and order to convey this information between the Figure 2 Potential architec-
documenting terms in the SLAs/SLSs can be network elements, RSVP has been suggested (as ture for managing IP-based
provided by the management systems. There- one candidate). In contrast to the per-flow identi- services, from [Asga01 ]
fore, an actor would likely eventually implement fication used in IntServ (and RSVP), DiffServ
the required functionality in these systems. A applies a more coarse set of flows, based on the
potential architecture is outlined in Figure 2. DSCP in the IP packet header. This is known
as Behaviour Aggregate (BA) classification. In
3 Issues on IP Level each DiffServ router packets are given a treat-
ment called Per-Hop Behaviour (PHB) accord-
3.1 Operating IntServ over DiffServ ing to the DSCP. As DiffServ avoids per-flow
Networks processing and state information, it is said to
The IntServ model contains means for providing scale better than IntServ. RSVP can then refer
guaranteed service levels. However, the so- to aggregates.
called scalability problem of IntServ is a main
disadvantage. DiffServ has therefore been pro- Combining IntServ/RSVP and DiffServ can
moted, in particular in the core network where bring some benefits compared to “pure” Diff-
the number of flows is high. Then IntServ might Serv. One example is that admission control can
be applied in the access network, in combination be applied at the border of the DiffServ domain.
with DiffServ in the core portion. In order to still Explicit signalling per flow allows for admission
support end-to-end service delivery, providing control, e.g. of the EF class such that the flows
IntServ across the DiffServ portion has to be in that class receive the service level expected.
promoted. A framework for this is presented in Voice conversations are examples where admis-
[RFC2998]. sion control could be fruitful to ensure that the
ongoing conversations get the service level and
IntServ-based services are implemented by net- additional conversations are rejected in case
work elements, likely to be understood as there is not sufficient network resources.
routers. However, a DiffServ network “cloud”
could also be seen as such a network element. As explicit signalling per flow is used, policy-
IntServ contains the service classes and ways of based control, e.g. per user and per application
quantifying resource requirements and deciding can be introduced in a more dynamic way.
upon the availability of the requested resource Moreover, if the router in the network marks the
in the network element (admission control). In packets, e.g. based on MF, signalling can be
If the DiffServ region is RSVP-aware, the border When IGPs like OSPF and ISIS are used, the
routers (BRs) apply admission control based on link state announcements (LSAs) can be used for
local resource availability and on customer (Tx, carrying information from a border router to
Rx) defined policy. In principle, more routers in another border router informing about the met-
the DiffServ region may also be RSVP aware, rics relevant for reaching destinations using that
which means that these can also take part in the domain.
resource reservation. Still, on what granularity
level, e.g. on an aggregate level, the reservation The TE metrics (weights) described in [IDbgpte]
in the DiffServ region should take place, is to be are:
decided.
• available bandwidth;
At the border of the DiffServ region appropriate • unreserved bandwidth;
mapping to a PHB has to be done per flow. In • colours (or class types);
addition, policing (optionally including shaping • transit delay;
and remarking) would be needed. Admission • IGP metrics/hops.
control, taking into account the resource situa-
tion in the DiffServ region, is also necessary. When a route optimisation algorithm is exe-
The mapping could be static (from IntServ ser- cuted, these metrics must somehow be com-
vice type to DSCP) or given by information in bined. Therefore a weight priority may also be
the RSVP messages. introduced, telling which metrics are the most
significant ones.
SLAa
The SLA template is used to capture a set of Ser-
vice Level Objectives for a service. A Service provider 1 SLA1 provider 2
Level Objective is a representation of the guar-
anteed level of service offered. It defines an indi- SLA2
vidual objective for example in terms of service SLAb
metric, threshold values and tolerances. A ser-
vice metric could be related to the entire service
bundle, to a service element or to a single ser-
vice interface, but is always related to something SLAa
visible to the customer. SLA1
provider 1 provider 2
The components of an SLS can according to Example of a schema to apply is also included
[ID_sfsls] be grouped as (note that this assumes in [ID_sfsls] in addition to some selected exam-
DiffServ-based services): ples.
communicate with the user via Resource Alloca- which mainly express a bandwidth requirement Figure 8 Location of
tion Requests (RARs) to receive the request for between core edge nodes. This information is Bandwidth Broker
bandwidth and to indicate success or failure. The supplied by the policy manager, which is a stor-
BB will also communicate with the edge routers age of committed SLSs.
to set traffic conditioning parameters corre-
sponding to accept reservations. Examples of On the basis of the topology and network traffic
protocols that can be used to communicate with characteristics, different indicators can be calcu-
routers are DIAMETER, SNMP and COPS, lated by the Bandwidth Broker such as the link
while protocols for communicating with hosts loads. This information can be used to determine
may include RSVP, COPS, web interfaces whether a new SLS can be accepted or not. The
(HTTP) and DIAMETER. position of the Bandwidth Broker is depicted in
Figure 8.
In the interdomain case, the BB is also responsi-
ble for managing interdomain communication 4.3 AAA Functionality
with BBs in neighbouring networks, for the pur- Providing a service commercially it has to be
pose of co-ordinating SLAs across boundaries. supported by corresponding AAA functionality.
In order to co-ordinate bandwidth assignments The Internet Research Task Force (IRTF) has
across domains, a single inter-domain BB proto- an Authentication Authorisation Accounting
col must exist. ARCHitecture Research Group (AAAARCH)
that develops an AAA architecture. This can be
Figure 7 shows a sample network configuration. said to apply a policy-based approach.
It consists of three domains AS1, AS2, and AS3
with a BB for each one (BB1, BB2 and BB3). Accounting can be seen as included in the ser-
The SLAs are placed between AS1 and AS2, vice provisioning process (called integrated
and between AS2 and AS3. A BB communicates accounting) or it can be offered as a separate ser-
with users (terminals or servers) requesting ser- vice (called discrete accounting). In the former
vice via RARs, other BBs, and network devices the accounting is coupled to a specific service,
(i.e. routers). In this case, a user can be either an collecting relevant information by using service
end system or an application that requests band- specific entities. A configuration for this is de-
width. picted in Figure 9. Then a common Application
Specific Module (ASM) contains functions for
The Bandwidth Broker makes decisions based providing the AAA services. This means that it
on the network topology and the network traffic transforms instructions from the AAA server
characteristics. The network topology consists of into appropriate commands for the equipment.
a description of all available network resources: Relevant data on the resource usage is returned
nodes, links, link metrics, physical link capaci- by the meters to the ASM, which compiles (con-
ties, allocatable link capacity, resource class version, aggregation, filtering) the metered data
(gold links, links only to be used for premium into accounting records and forwards them to the
customers, ...), etc. The network traffic charac- AAA server.
teristics are expressed as a set of traffic trunks,
ASM
service
equipment
policy parameters
QoS-related
accounting policies bandwidth
policies request
other
Accounting QoS auditing Bandwidth bandwidth
configuration control Broker brokers
meter measurement
instruction setup
Measurement infrastructure
To get access to a service, the user sends a ser- • Centralised management with fewer classes of
vice request to the AAA server. This checks the management interfaces;
authorisation of the user and, assuming access
is granted, forwards the necessary information • Abstracted (or simplified) management data;
(Application Specific Information, ASI) to the
ASM. The ASM finds the information relevant • End-to-end provisioning of the network;
for configuration of the network resources (ser-
vice equipment) and distributes this information • Consistent and uniform provisioning across all
to the network nodes. In case of DiffServ, the network elements;
accounting system, QoS control, and Bandwidth
Broker are noted. • Standards-based solutions in order to allow
inter-operability at network element and OSS
5 Policy and Traffic level;
Engineering
Considering the heterogeneous network ele- • Scalable solution for large networks.
ments and traffic flows that are expected to be
observed, a number of high-level requirements The IETF Policy Management Framework has
are placed on the management solutions: been devised keeping these requirements in
mind.
• Automation of management task;
5.1 Policy – What is it?
Policy can be considered as a set of principles
for usage of resources, given by business con-
siderations. That is, the business decisions are
Policy Entry Console
translated into statements relevant for the usage
of resources in the network.
In order to carry out efficient management of and relationships (both modelled by classes) that Figure 11 Policy domain and
the network resources a number of features of a define managed objects and interactions between related terms
management system are asked for, adapted from managed objects that can be used to define,
[ID_polreq]: manage and control IntServ- and DiffServ-
related mechanisms using policies. Policy
• Centralised management view – implying the classes and relationships between them are
ability to carry out management activities depicted in Figure 12.
remotely and that the management system is
able to cope with all network resources in the QPIM is an information model in the sense that
network. it is independent of any specific implementation.
The model of policies can be seen similar to an
• Abstracted management data – saying that object oriented modelling in the sense that hier-
simplified views of network resources should archies and reuse are present. Furthermore, poli-
be possible, e.g. “hiding” details when they cies can be “nested” such that a policy contains
are not relevant. another policy (possible decision strategies
defined are match-first and match-all).
• Common and consistent views/interfaces
– similar procedures and similar data views Two hierarchies of object classes are seen:
should be used for similar procedures. The
number of views/interfaces needed should i) structural classes representing policy informa-
also be limited. tion and control of policies (entities in the
managed policy environment); and
• Automation of tasks – including less human
intervention needed and that customers may ii)relationship classes that show how instances
serve themselves within the authorised set of of the structural classes are related to each
activities. other. Both associations and aggregations can
be given as relationship classes. Containment
A major key to meet such required features is is a directional relationship – the containing
the way of giving data used for representing the entity is known as the aggregate and the con-
resources, customers, etc. Such data has also tained entities are known as the components.
been referred to as policy. When applying pol-
icy-based management the required features A QoS policy domain (see Figure 11) can be
listed above are addressed. So far, much effort viewed as a contiguous set of nodes that operate
has been spent on the representation of such data under a common system of administration and
in a repository. provide a common set of services. Each of the
nodes can contain policy rules and/or policy
Having a policy repository, interfaces from the information. Such a grouping is done to simplify
management/operator side as well as the net- management and ensure consistencies. A QoS
work side have to be present. A way to trans- policy domain can also be seen as a container
form the policy into usable formats and inform that provides scooping for a QoS policy con-
the network components also has to be imple- tainer, policy rules and other policy information.
mented. Then appropriate mechanisms in the
network elements to enforce the policies have A policy group class holds a property called pol-
to be activated. icy roles. This represents the roles and combina-
tions of roles that are associated with a set of
A QoS Policy Information Model (QPIM) is policy rules. Each value represents one role
described in [ID_qpim]. QPIM is a set of entities combination. After identifying the relevant set
PolicyGroup PolicyRepository
PolicyGroupInSystem
PolicyRuleInPolicyGroup
PolicyConditionInPolicyRepository
PolicyRuleInSystem
PolicyRule PolicyConditionInPolicyRule
PolicyCondition
PolicyRuleValidityPeriod PolicyActionInPolicyRepository
PolicyTimePeriodCondition
PolicyActionInPolicyRule
• Usage; controlling the selection and configu- • Monitoring. The state of the network, includ-
ration of entities based on usage data, e.g. ing characteristics of traffic load and network
configuration of entities for a certain traffic resource, has to be estimated.
flow;
• Decision-making. This compares the current
• Security; verifying that the user (client) is state of the network to a desired state de-
the one he claims to be and then accepting scribed by an application-specific policy
or rejecting access to entities, selecting and and decides how to achieve the desired state.
applying authentication mechanisms and per- PDPs are the points where policy decisions
forming accounting and auditing of entities; are made.
• Service; characterising network and other • Enforcement. This implements a desired pol-
available services. icy state through a set of management com-
mands; when applied to network elements,
Such a categorisation determines whether the these management commands change the con-
policy is used to motivate when or how an action figuration of the device using one or more
occurs, or to characterise services. Service poli- mechanisms. These mechanisms may be ven-
cies describe services available in the network dor-specific. The PEPs are the points where
while usage policies give the binding of a user the policy decisions are actually enforced. It is
(client) to the available services. assumed that policy decisions will always be
made in the PDP and implemented in the PEP.
The policies can be said to represent business
goals and objectives. These goals have to be PEP is seen as integrated in a router, while PDP
related to implementations in the network. This may be located in a policy server. As described
is described by an example of having an SLA at in [RFC2753] a basic interaction can begin with
the higher level, which has to be related to a set a PEP receiving a notification/message that
of Service Level Objects (SLOs). The SLOs give requires a policy decision. The PEP then formats
the more specific metrics. a request and sends it to the PDP. Such a request
may contain more information elements. The
In [ID_pterm] SLA is defined as the documented PDP returns the policy decision, possibly with
results of a negotiation between a customer/con- several information elements. The PEP then
sumer and a provider of a service. It specifies enforces the policy decision, e.g. by appropri-
the levels of availability, serviceability, perfor- ately accepting or rejecting a request and setting
mance, operation or other attributes of the ser- values for the involved mechanisms. In order to
vice. Then the Service Level Object (SLO) is settle the policy decision, the PDP may engage
defined as a partition of an SLA giving individ- other servers (e.g. using protocols like SNMP
ual metrics and operational information to and LDAP). The PEP and PDP may be located
enforce and/or monitor the SLA. SLO may be in the same node. Furthermore, there may be
defined as part of an SLA, or as a separate docu- policies locally stored in the node that also have
ment. It is a set of parameters and their values. to be checked (LPDP). An example of this is
The actions of enforcing and reporting moni- when an access list is stored in a border router.
tored compliance can be implemented as one Then this list has to be checked in addition to
or more policies.
LPDP
Admission
control
Packet Packet
classifier scheduler
Router
possibly sending a request to a PDP. This is the framework being standardised in the IETF
depicted in Figure 13. Policy Working Group. COPS is a query res-
ponse protocol used to exchange policy informa-
Figure 13 shows an example of relating traffic tion between a policy server and a set of clients.
control/signalling and PEP/PDP. When a sig-
nalling message arrives at a router, the signalling The PEP reports all its role combinations to the
module has to direct the request to the PEP. The PDP in the initial COPS request message. This is
PEP asks PDP and LPDP (PDP may override a also done in subsequent request messages gener-
policy given by LPDP) for decisions and returns ated in response to COPS state synchronisation
the reply to the signalling module. Note that a requests and local configuration changes. A pol-
PDP may also send notifications to a PEP based icy can then be given for each role combination.
on other triggers, for instance to change previous
decisions. In addition to PEP and PDP, reposi- COPS may also be used between Bandwidth
tion and management are needed, ref. Figure 14. Brokers, which essentially act as PDPs for
dynamic interdomain policy exchange (see
The Resource Allocation (RAP) Working Group Section 5.6.1).
(WG) is establishing a scalable policy control
model for RSVP and IntServ by specifying a Policy Management Function provides the inter-
protocol for use among RSVP-capable network face to the network manager. It comprises func-
nodes and policy servers. In addition, this WG is tions of policy editing, rules translation and vali-
planning to define directives for use of the Com- dation. With the Policy Editor the administrator
mon Open Policy Service (COPS) base protocol can enter, view and edit policy rules in the Pol-
to support policy information exchange within icy Repository.
• Network policy administration user interface; A PDP works as a policy server containing a Figure 15 Conceptual
policy repository as well as a translator convert- architecture of policy with
• Master network policy repository for storage ing policies from a QoS policy schema to a Pol- examples of protocols,
of all network policies for all domains; icy Information Base (PIB) format. The follow- adapted from [eTOM]
ing functions may be included:
• Policy distribution capability to distribute pol-
icy data to the element management system • Domain-specific policy repository;
policy servers;
• Policy distribution capability to distribute pol-
• Global policy conflict detection. icy data to PEPs;
The policy repositories may use an LDAP-based • Translation from QoS policy schema to PIB;
directory for storing the policy information.
• Optional real-time policy decision-making
The element management system QoS policy function;
provisioning contains functions that administrate
policy for a network domain. Here, a domain is • Local policy conflict detection.
an area of the network that contains equipment
that performs a logically related function (e.g. The PEPs implement the policies, incorporating
access network, core network, transport net- functions like:
work). The following functions are typically
included: • Storage of policy-related data in its MIB;
• Element management system specific policy • Execution of policies according to state and
repository; events.
• Policy distribution capability used for dis- The QoS monitoring contains functions for col-
tributing policy data to the PDPs; lecting, processing performance statistics, usage
data and QoS related faults. This includes func-
• Local policy conflict detection. tions like:
A user interface and a PDP may also be included. • Manage QoS fault conditions received from
network elements;
5.4 Policy-enabled MPLS Networks This may be broken down into several different
In general, policy management for MPLS in- groups, including:
volves Life Cycle management (i.e. creating,
deleting and monitoring) of Label Switched • QoS Interface Group: contains PRCs which
Paths (LSPs) through the network along with can be used to tell a PDP the types of interface
controlling traffic flow admission (LSP Admis- supported by a PEP and the PRCs a PDP may
sion Control) to those managed resources. install to configure the PEP. Examples of
MPLS supports explicit traffic engineering via a attributes are: queues, scheduling parameters,
number of specifications (CR-LDP, RSVP) that buffer sizes, etc.
allow LSPs to be managed based on certain con-
straints. The policy management architecture • QoS Metering Group: contains PRCs relating
used to control traffic engineering functionality to the configuration of meters.
should be independent of the MPLS mechanisms
used. An objective of introducing policy man- • QoS Action Group: contains PRCs used to
agement is to arrive at predictable network ser- define the actions to be taken after the result
vices. of classification and metering. It also contains
policies that associate classifiers, meters and
A major application of MPLS is in providing actions.
traffic engineering capabilities to IP networks. In
some cases, this may involve the use of specific • IP Classification and Policing Group: contains
mechanisms (e.g. DiffServ- and IntServ-related). policies that define IP classifier elements.
For handling MPLS related to traffic engineer- 5.6 Some Related Protocols
ing, there are two basic categories of polices, ref.
[ID_MPLScops]: 5.6.1 COPS
The main characteristics of the COPS protocol
• LSP/tunnel management (or LSP life-cycle) include:
policies; dealing with configuration related to
initiating, maintaining and removing LSPs; • A client/server model where the PEP sends
requests, updates, and deletes to the remote
• LSP admission control (or flow management) PDP and the PDP returns decisions back to
policies; dealing with classification for map- the PEP.
ping traffic flows onto LSPs.
• The utilisation of TCP as its transport protocol
In an MPLS environment, the PEP resides in the for reliable exchange of messages.
LSRs (Label Switching Routers). A connection
to a policy server (PDP) is then required, al- • The protocol is extensible in that it is designed
though several of the decisions would likely be to take advantage of self-identifying objects
taken internally in the LSR, possibly notifying and can support diverse PEP specific informa-
Note that the COPS architecture does not pro- An IETF SNMP working group is to elaborate,
vide a complete management framework as among other things, some QoS MIB modules to
such. It merely provides a way to distribute pol- describe management objects for the control of
icy configuration information to devices. The DiffServ policy in co-ordination with the effort
COPS architecture relies on other management currently taking place in the DiffServ WG.
protocols, e.g. for monitoring.
In addition, the DiffServ WG is producing an
A client-type of COPS for TE is drafted in MIB designed according to the DiffServ imple-
[ID_COPS]. There, within an IP router and in mentation conceptual model. The purpose of the
addition to a PEP and the LPDP, a set of routing DiffServ MIB is to allow the setting up of Multi-
information bases (RIBs) and Forwarding Infor- Field and Behaviour Aggregate traffic classifica-
mation Bases (FIBs) are also defined. The RIB tion filters and queues; to monitor whether or not
represents a routing protocol, like OSPF and a traffic flow is within its profile; and finally to
BGP. The FIB stores the routes that have been perform some action on the traffic depending on
selected by the routing processes. The request, whether or not it is in profile (shaping, policing,
decision and report messages have to include (re-)marking). SNMP is the protocol used to
relevant attributes for traffic engineering, like implement the DS MIB. The MIB is composed
link metrics and traffic flow characteristics. of six basic elements:
Business
Model
nents need to be bought from sub-providers in of actors, pointing to the service provision con- Figure 1 Handling SLAs –
order to satisfy users’ demands. As an output of figuration. input needed by the provider
running the procedure, the complete business results in SLAs
model will be known (all the partners and the Generally, the agreement made between any user
customers’ segments will be decided upon) as and any provider represents the harmonised
well as the content of SLAs, e.g. QoS objectives, understanding between these two parties by
reaction pattern, etc. formally comprising/expressing the way they
should behave. Their behaviour is described via
This paper addresses issues related to the SLAs a set of expressed duties, rights, and obligations.
and SLSs. First of all, in Chapter 2, the relation-
ships between different types of agreements pre- Three types of agreements present in today’s
sent in today’s IP-aware telecom market are dis- business and technical research – a Business
cussed. In Chapter 3, basics of SLA, its types, Level Agreement (BLA), an SLA, and a Traffic
structure and applicability are presented from a Conditioning Agreement (TCA) – are described
generic perspective. A suggestion for the generic in this chapter. The original definitions made
structure of the QoS-related part of a technical by the bodies/fora introducing these terms are
portion of an SLA is presented, offering a possi- quoted if available. In addition to the agreements
bility for providers to reuse the same structure
each time the situation changes for them (either
in the business or technical sense). The generic
principles are elaborated further, specifically
SLAs related to IP, as presented in Chapter 4. BLA
Some examples of SLAs offered in today’s mar-
ket for various IP-based services are presented
SLA
in Chapter 5, followed by the status of the work
undertaken in various standardisation bodies
given in Chapter 6. A discussion on the mapping SLS
between SLAs and SLSs is conducted in Chapter
7. Finally, the paper concludes by analysing the TCA
future and possible evolution paths for SLAs and
SLSs in IP-based networks.
TCS
2 Agreements and specifica-
tions – BLA, SLA, SLS, TCA
Various types of agreements/specifications that Figure 2 Illustrating relation-
are discussed nowadays are depicted in Figure 2. ships between BLA, SLA, SLS,
These are all referring to relations between pairs TCA ans TCS2)
1) Discussions on the procedure and trade-off/strategic decision undertaken by provider are given in [Tele0200].
2) Note that any of the hierarchically superior agreements may contain a set of inferior agreements/ specifications. For example, a BLA
may contain more than one SLA, e.g. if a service packet is subject to provision, or an SLA may contain multiple SLSs, etc. as illus-
trated in Figure 2.
3) Note that a provider taking a role in the market is here called actor. Any legal entity, e.g. a com-
pany, is an actor when appearing in the market and using and/or providing a service or service
components.
Hence, SLA and TCA terms are considered in The results available in the IETF and in
a broader sense than in [rfc2475], [rfc2474], TEQUILA and other projects adopting SLS
[rfc2597], and this change will be introduced notions are presented in Chapter 6.
in the RFCs published by this WG.
2.4 Traffic level – TCAs
SLAs are further discussed both in general and This term is related to the provisioning of IP ser-
for IP in particular in Chapter 3. vices and is defined by the IETF. According to
[rfc2475] TCA is defined as “an agreement spec-
2.3 Service/Service Component ifying classifier rules and any corresponding
Technical Level – SLSs traffic profiles and metering, marking, discard-
An SLS consists of technical parameters and ing and/or shaping rules which are to apply to
conditions related to serving a traffic flow using the traffic streams selected by the classifier. A
an IP transport service. An SLS would typically TCA encompasses all of the traffic conditioning
include: rules explicitly specified within a SLA along
with all of the rules implicit from the relevant
• The type and nature of the service to be pro- service requirements and/or from a DS domain’s
vided. All the components should be identi- service provisioning policy.”
fied and described. The description of compo-
nents related to particular interfaces is not a Note that the TCA refers to rules executed at the
trivial task. border of a DiffServ domain. Thus a TCA is
given for a certain class, identified according to
• The QoS of the service provided (this part will the fields relevant for DiffServ. Examples of
be elaborated on in the following section). these sets for fields are found in [rfc2475] like:
• The process of monitoring service provision i) Multi-Field (MF): combination of one or more
(and QoS), i.e. which statistics to collect and header fields, such as source address, destina-
present. tion address, DS field, protocol ID, source
port and destination port numbers, and other
• Any technical consequences and the reaction information such as incoming interface, or,
pattern for the cases when either the user or
the provider did not obey conditions agreed. ii)Behaviour Aggregate (BA): based on the DS
codepoint only.
Additionally, the constraints on user behaviour
may be included (e.g. the type of equipment nec- TCA refers to a traffic flow, its characteristics
essary to experience the quality as agreed). and mechanisms to use in order to ensure/
Escape clauses may be included to define when enforce that the characteristics are followed.
the statements from the agreement do not apply
– e.g. a fire damaged the provider’s equipment,
etc.
4) An escalation matrix indicates the hierarchy/degree of importance of problems, and the informa-
tion necessary to solve the problems. This information may include e.g. persons to be contacted,
alarm description, messages to send out, format of messages, etc.
SP SP
NO NO NO
service
user SLA provider
4.1 SLA Types for IP-based Services 2. Network-level SLA – deals with the perfor-
SLAs for IP-based services will naturally be of mance of the network offering a transport
the same generic SLA types as presented in Sec- service. Traditionally, in the Internet, a best-
tion 3.1, i.e. SLAs will differ according to the effort service is offered, but now the paradigm
level of detail included, language, nature of is changing in order to support real-time ser-
parties involved, contracting period. vices. Three different approaches can be
recognised5) (Figure 6):
The interesting issue is actually whether an SLA
is agreed on a timely basis, i.e. in traditional • Tunnel approach – defines aggregate QoS
manner for a time period of e.g. one month (like between two specific points in the network.
5) Some argues that this way of organising SLAs better reflects the scope of the transport service pro-
vided, i.e. point-to-point (tunnel), point-to-multipoint (funnel), many-to-many point (cloud/hose).
E
The issues of how the ITU-T’s I.350 3x3 matrix
Tunnel Approach to SLAs approach may be applied for an IP transport ser-
E E vice and how the parameters are devised, are dis-
cussed next. According to [I.350] QoS parame-
ters could be primary or derived, and may be
I I expressed in a more technical or more “humans
understandable” language. Primary parameters
E E are those that are necessary to measure to prove
Funnel Approach to SLAs Cloud Approach to SLAs the performance as agreed, while derived param-
eters are actually functionally dependable on
the primary parameters and do not need to be
directly observed (i.e. measured/monitored).
Figure 6 Types of SLAs for a An example is the service for traffic trans-
network connectivity service ported e.g. from Telenor R&D at Kjeller Considering the primary QoS parameters, the
to the Telenor headquarters in Oslo. This 3x3 matrix approach identifies three generic
approach is depicted in Figure 6.a, where functions:
the points A, B and C are defined as input/ • Access;
outputs for a traffic stream. • Information transfer;
• Disengagement.
• Funnel approach – defines aggregate QoS
between a specific ingress point to multiple Also three criteria for characterising the realisa-
egress points. An example is the QoS for IP tion of the generic functions are defined:
transport services from the VoD server
to any IP-based user. This approach is • Speed characterises the temporal aspects of
depicted in Figure 6.b, where the ingress QoS associated with a function, showing time
point goes to a range of egress points for related efficiency characteristics, e.g. latency/
a traffic stream. delay.
• Cloud approach – defines aggregate QoS • Accuracy characterises the degree of correct-
between multiple points in the network. An ness with which a given function is realised,
example can be IP-based transport services e.g. ratio of errored packets.
realised within one network (note that one
network here implies the network con- • Dependability characterises the degree of cer-
trolled/owned by a single operator). This tainty that a function is performed, e.g. ratio
approach is depicted in Figure 6.c, where of failures on total attempts.
any of the points attached to the ‘cloud’ can
be either ingress or egress point for a traffic Although the above definitions for primary QoS
stream. parameters apply to telecommunication services,
they can be generalised even for other types of
3. Service provider SLA – this type of the SLAs services.
are of special interest in the IP-based environ-
ment, since they open for many 3rd party As mentioned before, derived QoS parameters
providers, and a myriad of service providers are defined as functions of others. In particular,
may be present. The operator has control over derived QoS parameters can be defined on the
the server side but not over the customer side basis of observed values taken by primary QoS
or the network performance. An example of parameters, and of decision thresholds for each
such an SLA can be relevant when designing relevant primary QoS parameter. One example
the SLA for an Application Service Provider of derived QoS parameters could be those char-
(ASP), or when offering web-hosting/co-loca- acterising the availability of a service.
tion service.
When making a list of requirements the end-user
4.2 QoS Part in SLA for IP-based may express the request in a form of non-techni-
Services cal parameters. Such issues should be taken into
Following the generic structure presented in account by the provider and mapped into techni-
Chapter 3, the content of an SLA for an IP ser- cal parameters related to those aspects.
vice may be made. Devising details is not possi-
ble if there are no ‘clear’ business model (i.e.
QoS-related part
Some examples of the content of an SLA for an IP packet transfer delay ex- transfer
IP connectivity service are illustrated in Figure 7. pressed both as a mean value speed
and variation [Y.1540],
The interface description includes the descrip- [rfc2330], [rfc2123]
tion of the business interaction points – perfor-
mance reporting point, service access points, and IP packet error ratio [Y.1540], transfer
protocols/formats used for exchanging informa- [rfc2330], [rfc2123] accuracy
tion on these protocols. Traffic pattern is basi-
cally described by the throughput which is IP packet loss ratio [Y.1540] transfer
linked to the time-of-day distribution and user’s dependability
behaviour, where different values are allowed
for different time periods. The most mentioned IP transfer availability [Y.1540] transfer
QoS parameters related to the provision of real- dependability
time services in the IP-based environment are
delay, loss and jitter. Also, availability is proven In order to prove delivery of the quality of the
to be a very important factor for customers. service as agreed in an SLA, the chosen parame-
Hence, these are usually used in SLAs indepen- ters need to be observed whether they are con-
dently of the SLA type. In case of value added formant to the agreed values or not. Also, the
services, additional parameters related to the behaviour of the users has to be observed, so the
quality of customer care, e.g. help desk avail- provider may react when the user does not obey
ability, mean time to repair, etc. are given as the agreement (e.g. generating more traffic than
well. allowed in the SLA). Therefore, measurement
schemes have to be developed and agreed –
Applying the 3x3 matrix to the case of a Virtual active vs. passive measurement methods, fre-
Leased Line (VLL), where the access and disen- quency of measurements that are chosen so they
gagement functions are not relevant, the QoS are not too much of an overhead for the servers,
parameters identified for the IP packets transfer etc. The relevant measurement points need to be
phase can be listed as: identified, e.g. ingress and egress routers, gate-
5 SLAs for IP-based Services A brief summary of the SLA for Internet access
in Practice service would include the fact they are network
It is easier to capture the importance of an SLA connectivity SLAs of the cloud type. This type is
when a case study is examined. The examples used since it supports similar applications across
below will illustrate how the structure described different access points, and is the easiest to spec-
before can be used in practice. The elements of ify, track and manage. UUNet monitors the net-
the QoS-related part of an SLA can be identified work continuously to ensure that all the metrics
in a more or less similar form in all examples defined in SLAs are satisfied. UUNet does not
illustrated in this chapter. Note that the actual specify strict delay bounds, but instead provides
content may differ, e.g. selection of parameters, an average delay. The SLAs [uunet1] include
values, statistics, but the structure is not diverg- guarantees on:
ing. This section aims at highlighting the fact
that the structure could be generic and standard- Network quality including:
ised, while the content may differ for a particular • delay ~ averaged monthly ≤ 65/85/120 ms,
service, interface observed, provider involved, etc. for US/European/Trans-Atlantic networks,
respectively, measured as RTD by using
Examples described here include SLAs for some ICMP6) echo messages;
of the services offered by UUNet and Epoch
Internet™. • packet delivery rate = monthly averaged
≥ 99 % for US, EU, Trans-Atlantic links, ser-
5.1 UUNet’s SLAs vice quality (network availability of 100 % of
Businesses realised the advantages of the IP the time, apart from scheduled maintenance in
technology, but they want their services to be time windows agreed with the customer).
guaranteed to them. For example, they want fast,
reliable and robust Internet access. UUNet Service quality including 100 % availability for
[uunet], a Worldcom company, was one of the the network, e.g. for the VPN service UUNet
first ISPs understanding the need to offer guar- uses ping to monitor the customer’s router every
antees in the form of an SLA to its customers. two minutes to determine network availability.
UUNet offers a wide range of services. A range If the router does not respond after three pings,
of services provided may vary depending on the UUNet will deem the service unavailable and let
country in focus. the customer know immediately. Failure to do so
will result in the customer’s account being cred-
• Internet access, including dial-up and remote ited for that day. The estimated number of lost
access (suitable for single users, SME, or ping packets yields information about the avail-
6) ICMP measurements will replace the current NTP measurements (run each 15 minutes) as the
technology used to gather the data on delay.
7) For the dedicated access services only the backbone network availability applies.
8) For detailed description of the Epoch services visit [epoch].
10) Due to the unidirectional nature of connections, the two directions of a flow across the boundary
will need to be considered separately.
• Constraints on the ingress and egress points at 2. Traffic offered at service level B will be deliv-
which the service is provided. The ingress and ered with low loss.
egress points indicate the scope of the service;
This assurance is only relative and can only be
• Traffic profiles that must be adhered to for verified by comparison.
the requested service to be provided, such as
token bucket parameters; Examples of quantitative services are:
1. 90 % of the traffic within the profile delivered
• Disposition of traffic submitted in excess of at service level C will experience no more
the specified profile; than 50 ms latency;
Many-to-many is excluded from the list but • Shaped – if excess traffic is shaped, then all
may be decomposed into many times one-to- packets marked as ‘out-of-profile’ by the
many. Traffic Conformance Algorithm are delayed
until they are ‘in-profile’. The shaping rate
2. Flow description – Indicates for which IP is the policing/token bucket rate. The extra
packets the QoS guarantees are to be enforced. parameter is the buffer size of the shaper.
A flow description identifies a stream of IP
datagrams sharing at least one common char- • Marked – if excess traffic is marked or
acteristic. An SLS contains one (and only one) remarked, then all packets marked as ‘out-
flow description, which may formally be spec- of-profile’ by the Traffic Conformance
ified by providing one or more of the follow- Algorithm are (re-)marked with a particular
ing attributes: DSCP-value (yellow or red). The extra
parameter is the DSCP.
• Differentiated Services information = DSCP;
The SLS must specify the appropriate action,
• Source information = source address; otherwise the excess traffic is dropped.
The ratio is measured over (any) time period • Service acknowledgement (ACK), indicating
with a length equal to the (indicated) time agreement with the requested service level;
interval.
• Service rejection (NAC) but indicating the
The throughput is the rate measured at egress possibility of offering a closely related service
counting all packets identified by the flow (or indication of alternative DSCP to use for
description. Notice that all packets, indepen- a particular service). The reply message may
dent of their conformance level (in/out-of- indicate the related offering by overwriting
profile) contribution. Indeed, if the customer the proposed SLS attributes;
(only) wants a throughput guarantee, then they
do not care whether in- or out-of-profile pack- • Service rejection (REJECT) indicating incapa-
ets are dropped, but are only interested in the bility of providing the service;
overall throughput of the packet stream.
• The ACK/NACK procedures require a reliable
Quantitative performance guarantees – A per- transport mode for such a negotiation protocol;
formance parameter is said to be quantified if
its value is specified to a numeric (quantita- • Service modification from both user and
tive) value. The service guarantee described provider.
by the SLS is said to be quantitative if at least
one of the four performance parameters is 6.2.3 Aquila – Adaptive Resource
quantified. Control for QoS Using an
IP-based Layered Architecture
Qualitative performance guarantees – If none The IST Aquila consortium [aquila] aims to
of the SLS performance parameters are quan- have a standard formalised representation of
tified, then the performance parameters delay SLS between the customer and the network. This
and packet loss may be qualified. Possible representation should be very general and capa-
qualitative values (for delay and/or loss): high, ble of expressing all the possible service offer-
medium, low. ings based on the DiffServ model. The Aquila
consortium also identified the need for a mecha-
6. Service schedule indicates the start time and nism to simplify the generic description of the
end time of the service, i.e. when is the service SLS. This led to the definition of predefined
available. This might be expressed as a collec- SLS types.
tion of the following parameters:
• Time of day range; The Aquila draft [aquila] is aligned with the
• Day of the week range; Tequila-draft [many], and there is a set of com-
• Month of the year range. monalties between the Aquila and Tequila
In a DiffServ network the SLS parameters should • Definition of common business processes
be used to map the user requirements into inter- (e.g. in the context of NMF Business Process
nal QoS mechanisms (e.g. DiffServ classes). The model);
mapping process between the generic SLS and
the concrete QoS mechanisms can be very com- • Common QoS needs;
plex if the user can freely select and combine the
parameters. Naturally, in a DiffServ network • Technical constraints;
there will be a restricted number of service
classes handled in the core. • Definition of relevant QoS/performance
parameters for the end-to-end relationship;
The SLS type in Aquila distinguishes between a
customised SLS and a predefined SLS type. In • Notifications and actions in case of problems;
the instance of a customised SLS all the parame-
ters can be specified, whereas in the instance of • References to management interface types
a predefined SLS only a subset of the parameters being supported (e.g. X.user, X.coop);
must be specified. The predefined SLS types in
Aquila are: • Common management policies;
11) As mentioned before, there are numerous definitions of the agreement, SLA, etc. The one from
NMF on the “end-to-end SLA” is “an SLA between multiple SPs, which defines common agree-
ments between all parties involved in the service provisioning/consuming process” [NMF701].
The values of the parameters and their signifi- • Many-to-one: Each service has a separate
cance are decided by the provider by relating SLA with a description of the QoS parameters
application categories (AC) (e.g. interactive real- at the application/service level. A set of ser-
time applications) and quality categories (QC) vices is provided and this set of SLAs share
(different classes possible to assure by the
provider). More details on the QUASI-model,
where the (QC, AC) mapping is given, and SOS
presented in detail can be found in [P960d1],
[p906ti6].
SLA
Service
Desription
QoS
Desription Figure 9 SLA contains both service description and
QoS description
• All-in-one: In this case the SLA relates to the In Figure 11 is illustrated an example of a ser-
bundled service, i.e. all services offered to the vice delivery with related agreements. The ser-
user and their quality are described in a single vice provider (SP) delivers a VoIP service to the
document. This might be the case if one pro- user. In this example, the SP is responsible for
vider is responsible for all services delivered the IP connection used to deliver the VoIP ser-
and controls all networks involved in the ser- vice. The user and the SP have set up the SLA,
vice delivery. which covers both business and technical aspects
for the VoIP service delivery/usage. That means
that the SP has to take care of the IP connectivity
(via another SLA made with network operator,
NO12)), and to include the description and QoS-
related aspects in the user-SP SLA. The QoS
Service A Service B Service C description in this SLA (QoSb) covers the rele-
vant parameters for both IP network connectivity
SLS: SLS: SLS: and VoIP level. In order to fulfil SLA User-SP,
QoSa QoSb QoSc two other SLAs should exist, User NP and NP-
SP. In this case a single provider (i.e. SP) con-
QoSIPa QoSIPb QoSIPc
trols the process of making agreements and has
an overview/control of mapping service parame-
ters and QoS parameters, but it is still not a triv-
Figure 10 One-to-one relationship ial problem.
12) Note that the SLA made between SP and NO is not visible to the user and is therefore omitted in Figure 11.
Service Provider B
(SP B)
= SLA
QoSb
QoSIPtot
QoSa
Service Provider A
(SP A)
Figure 13 Several services delivered over the same access
As illustrated in Figure 14 a single SLA Existing SLAs involve no ‘hard’ QoS guarantees
envelops the service descriptions for all services for IP-based services, where the parameters are
(A, B, C), as well as one SLS which includes strictly defined, objectively measurable with the
QoS descriptions for each of the services (i.e. desired granularity and where the values are set
QoSa, QoSb and QoSc), as well as a QoS to the theoretical estimations. The reason is
description of the common IP service QoSIPtot. obviously to be found in the fact that the tech-
Note that QoSIPtot includes the requirements nology is not mature enough for it to be fully
and parameters from all QoS descriptions and
demands given in QoSa, QoSb and QoSc.
Service Provider A
(SP A)
= SLA
QoS
Service Provider C
(SP C)
Service Provider B
Figure 15 NO is responsible for all (SP B)
services delivered to the users connected to it
[rfc2543] Handley, M et al. SIP: Session Initia- [Y.1540] ITU-T. Internet Protocol Data Com-
tion Protocol. 1999. (RFC 2543.) munication Service – IP Packet Transfer and
Availability Performance Parameters. 1999.
[rfc2597] IETF. Heinanen, J. Assured Forward- (ITU-T Y.1540.) (ex. I.380).
ing PHB Group. 1999. (RFC 2597.)
The Enterprise Viewpoint, constituting the The forwarding function transfers packets
requirements part of the resulting model, is between the input- and output ports on the basis
described in Section 4 in terms of common of the information in the routing table. The
community policies and actions related to the entries of the routing table, also known as next
resource types involved. hop information, are calculated by the routing
Anne-Grethe Kåråsen (42) is
Research Scientist, R&D Kjeller. function taking into account the destination
She is working in the Internet In Section 5 the deletion of a topological link is address and the routing algorithm chosen. It does
Network Architecture group with presented as an example in terms of Enterprise so by comparing the appropriate part of the des-
special interest in layer 1-3 net-
work management and control.
anne-grethe.karasen
@telenor.com
Incoming Outgoing
routing Routing routing
information information
Control
Incoming Outgoing
traffic Forwarding traffic
(packets) (packets)
When a new router is installed and the source • Differentiated Services (DiffServ), possible
and destination of its in- and outgoing links are in combination with MultiProtocol Label
defined, this information is passed to all other Switching (MPLS) , i.e. DiffServ-over-MPLS.
routers by means of flooding. It is stored in the
topology database of the router and used to Over-provisioning of network capacity may be
recalculate the routing table entries affected by utilized temporarily to cope with expected traffic
the introduction of the new router. In this way, increase, but it cannot solve any of the four
each router holds information about the exis- shortcomings of the Best Effort service on a
tence and topology of every other reachable permanent basis.
router, i.e. it has a view of the overall network.
An extensive discussion of the properties of
Within the domain controlled by a single ISP, IntServ, DiffServ and MPLS is given in
Ståle Wolland (55) is Research i.e. within an Autonomous System, an Interior [RessHandlIP].
Fellow at Telenor R&D. He holds Gateway Protocol like the Open Shortest Path
a PhD in Physics from Heriot-
First – or the Intermediate System-Intermediate 2.2.1 Differentiated Services (DiffServ)
Watt University in 1974. He
joined Telenor R&D in 1976 and System protocol is utilized. For interdomain In DiffServ, aggregated packet flows are classi-
has worked with information sys- routing, a Border Gateway Protocol (BGP), such fied into Behaviour Aggregate (BA) traffic
tems, distributed systems, net-
as BGP-4 is used. classes. The treatment to be applied to all the
work management systems,
middleware and peer-to-peer flows of a BA in every DiffServ router is called
systems. The forwarding function is realized as a FIFO the Per Hop Behaviour (PHB). The classification
stale.wolland@telenor.com queue with tail-first dropping, i.e. in case of may either be based on BA membership only, or
congestion, the last incoming packet is dropped on Multiple Fields (MF) membership. With the
first. There is only one queue for each output latter, a number of fields in the IP header, such
port and no marking of packets, so every packet as destination host address and port number, are
gets the same treatment. Only one network ser- used as additional basis for the classification.
vice is provided, Best Effort, i.e. “as soon as The BAs are distinguished from one another by
possible” with “as much bandwidth as possible”. the DiffServ Code Point (DSCP) values speci-
There is no way of preventing greedy users fied in the DS-byte of the IP4 header, replacing
ignoring congestion signals and making things the TOS byte when DiffServ is being used.
worse for other users.
When multiple BAs share an ordering constraint,
Most IP networks are Best Effort-based, despite i.e. the packets may not be re-ordered, these BAs
a number of shortcomings encountered with form an Ordered Aggregate (OA). The corre-
such networks, in particular: sponding set of PHBs is called a PHB Schedul-
ing Class (PSC). Behaviour may also be defined
1. There is no way of enforcing differentiated on the AS level, so-called Per Domain Be-
behaviour to individual packets, flows or haviour.
traffic aggregates.
DiffServ presumes the existence of proper
2. There is no way of ensuring “fair” service pro- SLAs/SLSs to define the service level to be
visioning, i.e. binding the effect of over-usage delivered to the users. The BA-/MF-classifica-
to the over-user. tion is part of the SLS.
are defined. Each precedence level represents a At the egress LSR, the MPLS header is stripped
separate PHB, and thus a reserved DSCP value. off and further transport is again carried out on
the basis of the information in the IP header.
The functional blocks of a DiffServ router are
shown in Figure 2. MPLS in isolation does not help much in provid-
ing differentiated behaviour, fair service and
The functionality of the first two blocks is per- quantifiable QoS. It is the combination with
formed at the ingress of the DiffServ domain to DiffServ that provides the requested differentia-
enforce the SLA in question. MF-classification tion of behaviour to traffic trunks being the basis
typically takes place at the edge of the network, for quantifiable performance guarantees with the
whereas BA classification may take place in service fairness preserved, and all this in an
every DiffServ router. environment characterized by powerful and flex-
ible means for routing traffic.
2.2.2 Multi-Protocol Label Switching
(MPLS) Combined with DiffServ 2.2.3 Integrated Services (IntServ)
The router in an MPLS domain, the Label An IntServ network provides specific classes of
Switched Router (LSR), works on the basis of service to individual flows or groups of flows.
the MPLS header being attached to the packets In addition to Best Effort, two other classes are
at the ingress LSR, confer Figure 3. The For- available:
warding Equivalent Class (FEC) of the packets
is decided on the basis of the destination address • Controlled Load (CL). This class delivers low
and the DiffServ PHB or PSC classification. The average delay and minimum loss. It resembles
packets are encapsulated into an MPLS frame Best Effort service as if the network were
(with MPLS overhead added) and forwarded to unloaded.
the next LSR.
• Guaranteed Service (GS). This service offers
The route to be followed by the packets belong- quantifiable bounded queuing delay and no
ing to a particular traffic class (a traffic trunk) or loss. It is intended for real time applications
set of traffic classes, i.e. the Label Switched Path with strict timing requirements.
(LSP), has been set up in advance by ordinary
routing or constraint-based routing. The routing In order to establish the flow-specific state,
process is either controlled by RSVP or LDP IntServ makes resource allocations in the routers
(Label Distributed Path) signalling directly, or by means of the Resource Reservation Protocol
by invoking the same functionality at a manage- (RSVP). The PATH-message is transmitted
ment interface in the ingress LSR. downstream from the source host to the destina-
tion carrying with it the TSpec data structure.
Each LSR contains a Label Information Base TSpec contains the requested delay, jitter and
(LIB), supporting look-up of the outgoing inter- bandwidth parameters including the Token
face as a function of the destination address. Bucket parameters. The path state established in
each router includes the address of the upstream
Operations are available to merge traffic in the router. This datum is essential for the upstream
transit LSRs along the route. transmission of the RESV-message. When the
IP link
Layer 3
(IP layer)
IP router IP router
(DiffServ LSP (carrying 1-N traffic trunks) (DiffServ
-aware) -aware)
Layer 2.5
(MPLS layer)
Ingress LSR LSR Egress LSR
(MPLS-aware) (MPLS-aware) Figure 3 IP over MPLS
1) In many cases, all the input ports belonging to one incoming link are interconnected so there is
only one input CP.
Subnetwork
Link CPG
CPG
Link
CPG
CPG
Subnetwork
Subnetwork CPG
CPG CPG
Link
CPG
CPG Subnetwork
CPG
CPG
To support partitioning, the model must define The overall traffic requirements for the network
the mappings between the different levels of par- in question is represented jointly in [TE_REQ]
titioning. by the combination of the properties of the traf-
fic trunks, topological constraints and the capa-
An important property of contained subnetworks bilities of the other routing protocols involved
is that they may span multiple physical loca- on layer 3 (IGP-oriented).
tions.
2.4.1 The Traffic Trunk Model
Routing tables may be defined for containing The properties of the traffic trunk may be
subnetworks the same way as was done for expressed in terms of an object containing oper-
the subnetwork representing a single router. ations and attributes as described below.
Link
Link
Subnetwork
Layer Network
• Topology2) in terms of links, subnetworks and tion, transport and termination of a particular
access groups3). characteristic information. A layer network is
defined by the complete set of access groups of
• Connectivity in terms of trails, link connec- the same type which may be associated for the
tions, subnetwork connections, ports and ref- purpose of transferring information.
erence points.
Subnetwork: A “topological component” used to
Here, the topological representation will be effect routing of a specific characteristic infor-
addressed. mation. A subnetwork is defined by the set of
ports (see [G.805]) which are available for the
[G.805] introduces a set of concepts for describ- purpose of transferring characteristic informa-
ing the various functional aspects of a transport tion. A subnetwork exists within a single layer
network: network.
Architectural component: An item that is used to Link: A “topological component” which de-
generically describe transport network function- scribes a fixed relationship between a “subnet-
ality. work” or “access group” and another “subnet-
work” or “access group”.
Network: All of the entities (such as equipment,
plant, facilities) which together provide commu- Access group: A group of co-located trail termi-
nication services. nation functions that are connected to the same
subnetwork or link.
Transport network: The functional resources of
the network which convey user information The topological view describes the geographical
between locations. distribution of the resources of a single layer net-
work. Layering is a method for splitting the
Topological component: An architectural com- overall transport function into a hierarchy of
ponent, used to describe the transport network in layer networks on top of each other where each
terms of the topological relationships between layer uses the service from the server layer to
sets of points within the same layer network. provide its own service.
Here we focus on four topological components:
The topological concepts and their relationships
• Layer network; are illustrated in Figure 7.
• Subnetwork;
• Link; 3.2 The Enhanced RM-ODP
• Access group. Framework
ITU-T SG4 has chosen the ISO Reference
Layer network: A “topological component” that Model – Open Distributed Processing (RM-
includes both transport entities and transport ODP) [X.901, X.902, X.903, X.904] as the basic
processing functions that describe the genera- framework for management modelling on the
2) Of a layer network.
3) When modelling the topology of a subnetwork rather than a full layer network, one may replace the
access group with the connection point group containing a number of co-located connection points.
Community Service
Policy Contract
They may either be provided as structured The relationships are provided with the relation-
English text and graphical UML diagrams or ship name, the role names and the role cardinal-
by means of the formal language Z [Zintro]. ity. The arrows in Figure 9 point to the informa-
tion objects playing the various relationship
[G.853.1] is a library of information elements roles.
directly defined on the basis of the network
resource types in [G.852.2]. Information ele- The Information Viewpoint is the ultimate
ments for specific management areas are pro- source for the definition of information elements
duced using these as superclasses and defining within the system. This is reflected by the
specializations with new requirements and ele- Parameter Matching clause in the Computational
ments. Viewpoint which maps the input and output
parameters to the corresponding information
By convention, new elements are provided with elements.
the community prefix, in the example case,
iptom. Elements defined in [G.853.1] are either The syntax applied when defining elements in
left unprefixed or prefixed G.853.1. The Infor- the Information Viewpoint is illustrated by
mation Viewpoint concepts are illustrated in examples in the following sub-sections.
Figure 9.
3.2.2.1 Information Object: Topological Link
The CPG role has no direct counterpart in (example)
[G.853.1], so a new information object class, This information type is related to the following
iptomCTPG has been defined. enterprise entity:
Enterprise Information
Viewpoint mapping
Inheritance and
Composition
Relationships
server client
1...1 1...* boundedSN boundingCTPG
1...1 0...*
iptomLndCan
iptomSnIsBoundedBy
ServeLNDs
NOTE1: The iptomSN and iptomCTPG information objects are taking the “element”
role in layerNetworkDomainIsMadeOf relationships not shown in the figure.
A model for setting up LSP tunnels in DiffServ- [X.901] ITU-T. Basic reference model for Open
over-MPLS networks via a management inter- Distributed Processing – Part 1: Overview.
face has been developed already [genIPmodel] Geneva. (ITU-T rec. X.901.)
providing the basis for the server layer support
of the IP layer in a layered model. Extensions to [X.902] ITU-T. Basic reference model for Open
accommodate VPNs and Multicast will be con- Distributed Processing – Part2: Foundations.
sidered. Geneva. (ITU-T rec. X.902.)
There is an increasing need for traffic performance measurements in IP networks. The Internet has
become an important part of the communication infrastructure, and network operators and service
providers need to measure the flow of traffic. Today’s best effort networks give variable quality to users.
This may be alleviated in the near future offering differentiated services to the users. This article pre-
sents an overview of issues related to traffic measurements in IP networks, including characterization
of services, measures of interest, measurement methods, measurement infrastructures and post-pro-
cessing of measurement data. The main focus is on network-level performance measurements from
the perspective of a network operator. A novel model appropriate for precise and concise discussion
and definition of network level measurement issues is introduced and used to precisely describe net-
work-level performance metrics. A discussion of the implications on traffic measurements by introducing
Brynjar Å. Viken (31) is means and mechanisms for service differentiation concludes the paper.
Research Scientist at Telenor
R&D, Trondheim. His research
interests are performance mea-
surements and analysis of com-
munication networks with a spe- 1 Introduction Network operators are focused on the network
cial interest in IP networks. He is The traditional Internet provides an unreliable domain under their management. Measurements
currently pursuing a PhD at the
Norwegian University of Science
best-effort packet delivery. Packets can be lost, are important for the network operators both on
and Technology. errored, duplicated and delivered out-of-order. a day-to-day basis and for long term planning
brynjar-age.viken@telenor.com The packet delivery is characterized by the and engineering. A network operator needs to
absence of service guarantees and fairness. New perform daily measurements to diagnose net-
emerging applications with the need for end-to- work problems before they occur, perform trou-
end performance guarantees drive the introduc- bleshooting and solve network failures. Histori-
tion of service differentiation in IP networks. cal data form a foundation on which decisions
Examples of these applications are IP telephony, can be made. That is, planning, optimizing and
network games, audio and video streaming. The traffic engineering of the network domain. An
introduction of service differentiation in IP net- operator must also monitor performance to
works increases the importance of traffic mea- ensure that the services delivered to peering net-
surements. Traffic measurements are vital for works, service and content providers, and end-
several areas including network management, users meet the service level agreements. A net-
traffic engineering, charging and billing, and work operator will need information from peer-
monitoring of service level agreements. ing networks in order to decide how to route
traffic of various service qualities. An end-to-
1.1 Actors Involved in Traffic end path often crosses several network domains
Measurements and the end-to-end performance is beyond the
Actors interested in collecting measurement data control of one individual network operator. Evi-
are end-users, network providers, service and dently, efforts to both deliver and measure end-
content providers, vendors and researchers. The to-end services require co-operation between
respective actors have various perspectives and network operators, service providers and content
needs of traffic measurements on various time- providers.
Dr.Ing. Peder J. Emstad (61) is
Professor at the Department of
scales. The time-scales may be classified as
Telematics at the Norwegian short (seconds – minutes – hours), medium Service and content providers must rely on other
University of Science and Tech- (days – weeks) and long (months – years). actors to provide end-to-end network services
nology. His research interests
are performance modelling and
for their customers. Thus, it is crucial for service
analysis of communication net- End-users need to gather measurement data to and content providers that their service level
works and switching systems. ensure that the IP services they receive from agreements with other actors are fulfilled and
peder@item.ntnu.no their service providers meet the agreed levels of that the end-to-end services delivered satisfy the
service. In the coming years as service differen- QoS requirements of their customers. Service
tiation is introduced, traffic measurements will and content providers can collect some measure-
play a major part in evaluating service quality ment data themselves, e.g. from service specific
versus price for services an end-user receives. equipment (Video on demand servers, VoIP
The main focus of the end-user is end-to-end gateways, etc.), but depend on network
performance of certain services where the net- providers to measure network performance.
work is considered as a black box.
Finally, measurement data is important as input In each phase the costs of measurements can be
to researchers to increase the understanding of IP grouped in measurement specific equipment
networks and develop better solutions. Research- (hardware and software), network resources and
ers depend on accurate measurement data as an human resources. Measurement specific equip-
input to make realistic predictions and estimates ment includes hardware (processing power, pri-
and to build models for analysis and simulations. mary and secondary memory) and software that
For the researcher, the measurements of today’s is required to collect, handle and post-process
Internet support the improvement of existing measurement data. The measurement functional-
technology and the development of new tech- ity can either be implemented on stand-alone
nologies. devices and/or integrated into the functionality
of the network nodes. Network resources include
Table 1.1 summarizes the need for measure- bandwidth needed to collect and transport the
ments for various actors on different time scales. measurement data. Obviously, human resources
are needed in every phase of the measurement
process.
Network-level measurements focus on the basic This article addresses traffic measurements.
components of a network domain, namely nodes However, note that dependability measures can
and links, and the packets traversing this com- in some cases be derived from performance mea-
munication infrastructure. Network-level mea- sures, e.g. the service availability can be defined
surements is a common building block from as the state where the end-to-end delay is less
which the performance of every service carried than a specified limit, and the measurement
in an IP network depends. The fundamental per- accumulates the fraction of the time the system
formance parameters for any resource sharing is in this state.
system are delay, throughput, loss and resource
utilization. Obviously, measuring the performance of vari-
ous protocol layers is vital for IP traffic engi-
At the transport level the performance of the neering. The focus of this article is on network-
transport protocols is addressed. The dominating level performance measurements from the per-
transport protocols in IP networks are currently spective of a network operator. However, the
TCP and UDP. Examples of transport level met- remainder of the article is also applicable to per-
rics for TCP are number of retransmissions, the formance measurements at the transport protocol
time to set up and close a TCP connection, aver- and application layers.
2) Performance can also be measured at lower protocol layers than the IP layer, e.g. MAC and
physical layer.
3.1 Introduction
The specification of an actual measurement and
monitoring platform depends on what perfor- Measurement
mance parameters that are to be observed. The point
measurement platform is characterized by the
following properties: Network domain
3) A measurement unit is not necessarily a dedicated physical unit. The measurement functionality
can be integrated in the hardware or software of a node.
points. As opposed to active measurements, this Each packet record carries a number of attributes
approach is non-intrusive and ideally the mea- that characterize the packet and the correspond-
surement process does not disturb the operation ing events. The attributes of a packet can be
of the network. Measurement data of highly classified as endogen and exogen attributes.
variable granularity is gathered: ranging from Endogen attributes are carried in the packet
detailed packet traces5) and flow records6) to headers and user data. Exogen attributes are not
routing tables and counters from network nodes carried inside the packet but are implicitly
(e.g. SNMP counters on router interfaces). derived. Examples of exogen attributes are
Packet traces and flow records require the vari- incoming and outgoing interface for the packet
ous fields of the packet headers to be monitored at a certain router and the time of arrival of the
while interface counters typically accumulate packet to a given node. Packet traces can contain
the number of packets and bytes transferred/ a copy of the entire packet including headers as
dropped. The major drawback of collecting raw well as user data. However, to reduce the sensi-
packet traces or flow records from high capacity tivity and data volume usually only the IP header
networks is that huge data volumes are created. and transport protocol header is kept, as illus-
Thus, it may not be feasible to store raw data for trated in Figure 3.2.
long periods of time without performing some
data reduction. Note that packet traces and flow 3.4.1 Passive Measurements of Unidirec-
records contain sensitive information that must tional Performance Parameters
be handled with care. Using Packet Traces
Passive measurements of unidirectional delay
Examples of functionality to process, store and and loss require raw packet traces to be captured
export passive measurement data integrated in at several measurement points, as illustrated in
the hardware and software of network nodes are Figure 3.3. One example of measurements col-
interface counters and Cisco’s NetFlow [Net- lected using this method is [Graham].
Flow99] data export. The design of router archi-
tectures capable of collecting passive measure- Note that timestamps could be added to real
ments is beyond the scope of this discussion. packets inside the network for the purpose of
However, the routers should be built to collect passive measurements of unidirectional delay.
the necessary measurement data without any dis- Hence, this would allow unidirectional delay to
turbance to the packet forwarding capability of be estimated from a single packet trace. This
the router. concept needs further study and requires special-
ized equipment to be developed and installed in
Specialized stand-alone PCs that collect passive the network. Further, for packets that contain
measurements from high capacity links without sequence numbers it could be possible to esti-
impacting network operation are available. mate loss from a single packet trace. However,
These passive stand-alone measurement units in the following it is assumed that delay and loss
usually run specialized software on a hardware must be estimated by correlating the information
platform that taps information from packets from several packet traces.
traversing the link being monitored. Examples
of such dedicated measurement units are Netra- 3.4.2 Single Packet Trace
met [Brownlee], the OCXmon/Coral monitor From a single trace captured at a given measure-
[Coral] [MOAT] and the DAG monitor [Gra- ment point it is possible to compute e.g. the
ham]. Packet traces can also be collected on reg- number of bytes sent and received to/from vari-
ular workstations by using the tcpdump applica- ous remote machines, interarrival times, packet
tion [Tcpdump].
5) A packet trace contains detailed information (timestamp and packet attributes) about packets
observed at a certain measurement point.
6) Flow records have detailed information about network flows as observed at a given measurement
point. A network flow is a sequence of packets satisfying certain conditions, e.g. a unidirectional
stream of packets from a specified source to a certain destination satisfying a given time-out value.
Data Data
• Group packets that follow a certain end-to-end
path;
λi
The disadvantage of any data reduction is that • The measurement period, t, considered has a
single item information in the original measure- duration of 60 minutes.
ment data is lost and cannot be reconstructed
from the processed measurement data. The following methods for grouping, sorting and
data reduction techniques of raw packet traces
The post-processing of measurement data, as are considered:
shown in Figure 3.5, can be performed locally at
the measurement unit (local data reduction) or at Method A) Unidirectional performance
a central host (central data reduction). Further, without data reduction
the local host can perform the post-processing All available information about packets, in-
“off-line” or “real-time”. Thus, the following cluding both endogen and exogen attributes,
strategies to process the measurement data must is needed. Assume that b bytes are required
be considered: to store all information about a single packet.
Let b be equal to 64 bytes.
Central Processing of Measurement Data
The measurement units collect and store raw Method B) Unidirectional performance
packet traces captured during a given measure- – filtering of packets
ment period. Then the raw data is exported to the All available information about every packet
central host where post-processing of the mea- satisfying certain requirements are kept (e.g.
surement data is performed. type of service equal to a certain value).
Assume that ten percent of the packets meet
Local “off-line” Processing of Measurement the requirements.
Data
The measurement units collect and store raw Method C) Flow records
packet traces to permanent storage locally. After All information about every flow is collected.
each measurement period, the raw measurement Assume that on the average a flow consists of
data is post-processed and only the processed f packets and that b bytes are required to store
data is exported to the central site. all information about a flow. Let f be equal to
40 packets per flow. It may be noted that the
Local “real-time” Processing of Measurement number of packets per flow depends on how
Data a flow is defined.
The measurement units extract relevant informa-
tion from every packet and perform the post-pro- Method D) Single point metrics
cessing in real-time without writing raw data to Statistical data reduction of the measurement
permanent storage. Thus, only processed data is data is performed. To determine the average
stored locally and exported to the central host. and variance, ∑ li and ∑ li2 are computed
Some selected examples of post-processing of for certain metrics (e.g. throughput, packet
raw packet traces are presented to illustrate the length, interarrival time etc.). Let m denote
resources required by the various approaches. number of variables computed while k is the
The following assumptions are made for the number of bytes required to store each of the
examples: variables. Let m and k be equal to 100 metrics
and ten bytes, respectively.
• n measurement units capture packet traces at
selected measurement points. Each unit cap- Table 3.3 shows the data volumes stored locally
tures traces from two links (e.g. each direction at each monitor, totally exported and stored cen-
of a bi-directional link) with capacity, c [Mb/s], trally by the various methods described above.
at full line rate. The links carry traffic with an Note that which approach to apply depend on the
average packet length, m [Bytes]. Thus, the performance metrics to be observed.
arrival rate of packets to each unit equals
Obviously, the actual handling and post-process- • I denotes the set of ingress nodes, I ⊆ V, that
ing of measurement data depends on the ultimate consists of nodes where packets enter the net-
usage of the measurement data and must be work domain.
planned carefully. Hence, there are many
options, and the analyses presented in this sec- • O denotes the set of egress nodes, O ⊆ V, that
tion merely illustrate some of the possibilities. consists of nodes where packets leave the net-
work domain.
4 A Conceptual Model for IP
Measurements • X denotes the set of external nodes, X ⊆ V,
that consists of nodes that symbolize the out-
4.1 Introduction side world of the network domain.
There is an increasing need to define network
level performance parameters precisely. For • M denotes the set of internal nodes, M ⊆ V,
instance service level agreements must state that consists of nodes that are neither external,
exactly what is being measured. This situation is ingress nor egress nodes.
currently being addressed by the IETF working
group IP performance metrics (IPPM) [Pax- Note that a node, n ∈ V, can be both an ingress
son96] [RFC2330] and ITU-T [I.380]. This and an egress node, consequently I ∩ O = Φ.
chapter presents a conceptual model for IP mea-
surements [Viken2000] that allows precise defi- E, E ⊆ V × V, represents the set of directional
nitions of network level performance parame- links that connect the nodes. A directed link,
ters. The foundation of the model is simple well- l ∈ E, has certain properties like transmission
defined operations and functions on sets of capacity and propagation delay. The propagation
events. The conceptual model presented is delay is mainly determined by the physical dis-
appropriate for packet-switched networks but the tance to the next remote node.
nomenclature in this chapter is for IP networks.
The model will be used to give precise defini- Note that the entire network, a given network
tions of previously loosely defined concepts. domain or any chosen part of a network can be
represented by this notation, see example in Fig-
4.2 Network Topology ure 4.1 (for simplicity the directed links are not
Graph theory is used to describe the topology of shown but only indicated by arrows). For related
a given network domain. The topology of a net- work on graph-based models of large networks,
work domain is modeled by a directed8) graph see e.g. [Calvert97].
G = (V, E) where V = {1, 2, ..., n} and E ⊆V × V
are the set of nodes and directional links, respec- 4.3 Paths
tively. A packet that enters the network domain,
G = (V, E), follows a certain path, π(i,j)k, from
V denotes the set of nodes that represent the node i ∈ V to node j ∈ V. Index k indicates that
routers, switches and hosts in the network there are several possible paths from node i to
domain and the outside world. The set of nodes, node j. π(i,j)k is defined by the sequence of nodes
V, can be divided into four subsets:
7) Assume that raw packet traces are deleted after the post-processing has been performed.
8) Parallel directed links from node A to node B cannot be represented by this notation. That is, they
are represented as one link.
Network congestion causes buffer overflow in • Xn(t1, t2) denotes set of packets lost at node
nodes and leads to packet loss. Further, nodes n ∈ V in time window [t1, t2>.
may also drop packets intentionally. Packets can
be dropped by buffer management and packet The fundamental sets of events are illustrated in
scheduling algorithms at intermediate nodes or Figure 4.2.
dropped at the receiver’s end if the end-to-end
delay is too large. In the conceptual model, packet Note that the sets of events observed by a node
loss includes both lost and dropped packets. can be specialized depending on the internal
architecture of the node.
Packets can also be lost because of transmission
errors on the links. The transmission error rate is In addition, at a given point in time packets can
normally not significant in backbone networks be in transit between two nodes or already lost
due to transmission errors on the link.
9) In this context, a successfully carried packet is a packet that was neither lost in a node nor on a
link. That is, the content of the packet is not evaluated.
10) Note that the membership of packets in a certain set is a matter of definition.
Figure 4.2 Fundamental sets X n( t 1, t 2) • td(p, n) denotes the time of departure for
of events as observed at node n packet p ∈ Sn(t1, t2) from node n ∈ V. The
time of departure is defined as the time when
the last bit of packet p was transmitted from
node n.
4.5 Packet Attributes and
Characterization of Packets For a packet, p, that was lost in node n or on link
A packet travelling through the network domain l = (n, k) the time the loss occurred is referred to
is characterised by certain attributes. For a as ta(p, n) and td(p, n), respectively.
packet11), p, the following functions are exam-
ples of definitions that characterize packet prop- By using the definitions from the previous sec-
erties: tions of this chapter, various sets of events that
satisfy more complex properties can now be
• src(p) – returns the source IP address of expressed.
packet p;
4.5.1 Unusual Network Behavior
• dst(p) – returns the destination IP address of Unusual network behavior13) [Paxson97] in-
packet p; cludes packet re-ordering, packet misdirection,
packet replication and packet corruption. These
• pri(p) – returns the priority level of packet p; unexpected behaviors can all be expressed by the
model. Note that the model does not explicitly
• m(p) – returns the total length of the IP packet define how to handle unusual network behavior.
p in bytes; However, the model allows various approaches
to be precisely expressed. Below are some ex-
• pth(p) – returns the path that packet p shall amples of how the conceptual model is applied.
follow through the network domain. The path
is defined by the sequence of nodes that • A packet, p, is misdirected if it is received by
should be traversed by the packet as deter- a node, n, that is not a part of its path, pth(p).
mined by the routing algorithm; The set of misdirected packets received by
node n in time window [t1, t2> is defined by
• lnk(p) – returns the links that should be tra- {p|p ∈ Rn(t1, t2, ∧ n ∉ pth(p)}.
versed along the path of packet p.
• A packet, p, is replicated if the network deliv-
Generally, every header field of a packet corre- ers multiple copies of the same14) packet. The
sponds to an attribute. Note that whether a cer- set of replicated packets received by node n in
tain function exists or not depends on the con- time window [t1, t2> is defined by {p|p ∈
text12). Further, functions that return the time a Rn(t1, t2) ∧ ∃pj ∈ Rn(t1, t2) such that p ≡ pj}.
11) A packet, p, is considered to be unique. That is, it is assumed that packets are uniquely identified.
However, in a real network the ability to uniquely identify a packet depends on which attributes
that are available.
12) In a real network, the measurement instrumentation decides which attributes that are observable.
However, the conceptual model provides a flexible framework that can be adjusted according to
an actual measurement set-up.
13) It may be noted that packet re-ordering is usual behavior in a network with service differentia-
tion. Further, packet corruption not detected from the packet header checksum is not considered.
14) The definition of multiple copies of the same packet depends on which packet attributes that are
available. Generally, two packets are equal if all header fields are equal. This is denoted by
pi ≡ pj. Note that packets with equal attributes can be differentiated by the time of observation.
Packet
loss on link
⎪⎧1 p ∈ X *l ( t1 ,t2 )
I*(p, l), indicator variable for loss of packet p I * ( p,l) = ⎨ (4.2)
on link l = (n–1, n). ⎩⎪ 0 p ∉ X *l ( t1 ,t2 )
∑ I * ( p,l )
p∈R*( n−1,n ) ( t1 ,t2 )
η*l(t1, t2), average loss rate for link l = (n–1, n) η *l ( t1 ,t2 ) = (4.x)
t2 − t1
∑ I * ( p,l )
p∈R*( n−1,n ) ( t1 ,t2 )
Prob*l(loss), loss ratio for link l = (n – 1, n). Prob *l (loss) = (4.7)
p ∈R *( n −1,n ) ( t1 ,t2 )
[Careces91] Cáceres, R et al. 1991. Characteris- [MOAT] National Laboratory for Applied Net-
tics of Wide-Area TCP/IP Conversations. In: work Research, Measurement and Operations
Proceedings of ACM SIGCOMM’91, 101–112. Analysis Team (NLANR/MOAT). (2001, August
13) [online] – URL: http://moat.nlanr.net/
[Cflowd] McRobb, D W. cflowd design. (2001,
August 13) [online] – URL: http://www.caida. [McGregor] McGregor, A, Braun, H-W, Brown,
org/tools/mea-surement/cflowd/design/ J. 2000. The NLANR Network Analysis Infras-
design.html tructure. IEEE Communications Magazine, 38
(5), 122–128.
[Claffy95] Claffy, K C, Braun, H-W, Polyzos,
G C. A Parametrizable methodology for Internet [NAI] NLANR/MOAT Network Analysis Infras-
traffic flow profiling. (2001, August 13) [online] tructure (NAI). (2001, August 13) [online] –
– URL: http://www.caida.org/outreach/papers/ URL: http://moat.nlanr.net/NAI/
pmi.html
[NIMI] Paxson et al. 1998. An Architecture for
[Claffy97] Apisdorf, J et al. 1997. OC3MON: Large-Scale Internet Measurement. IEEE Com-
Flexible, Affordable, High-Performance Statis- munications, 36 (8), 48–54.
tics Collection. In: Proceedings of INET`97.
(2001, August 13) [online] – URL: http://www. [NetFlow99] Cisco Systems, Inc. NetFlow ser-
isoc.org/isoc/whatis/confer-ences/inet/97/ vices and Applications. White paper. (2001,
proceedings/longtoc.HTM. Kuala Lumpur, August 13) [online] – URL: http://www.cisco.
Malaysia. com/warp/public/cc/pd/iosw/ioft/neflct/tech/
napps_wp.pdf
[Claffy98] Claffy, K C, Miller, G, Thompson, K.
1998. The nature of the beast: recent traffic mea- [ocxmon] NLANR/MOAT Passive Measurement
surements from an Internet backbone. In: Pro- and Analysis. (2001, August 13) [online] – URL:
ceedings of INET’98. (2001, August 13) [online] http://moat.nlanr.net/PMA/
– URL: http://www.caida.org/outreach/papers/
Inet98/
[RFC2330] IETF. 1998. Paxson, V et al. Frame- [Viken99] Viken, B Å. 1999. Passive measure-
work for IP Provider Metrics. (Internet RFC ment of Internet traffic from SCi-net’98. In: Pro-
2330.) ceedings of the Norwegian Informatics Confer-
ence 99 (NIK’99), Trondheim, 259–270.
As input to IP Traffic Engineering it is required to conduct measurement both on live networks and test
networks. This paper presents a distributed test platform currently being used for QoS performance test-
ing in an experimental, IP based communication platform that will provide differentiated services. The
measurement platform developed for QoS tests consists of two main components; (i) DAG monitors to
derive performance measures like end-to-end packet loss and one-way packet delay accurately, and (ii)
GenSyn, a Java-based traffic generator running on dedicated PCs. This testbed configuration is a very
flexible platform that opens for doing many exciting and controlled QoS performance evaluation mea-
surements in an IP network.
Most testbeds have no, or very low traffic load, so traffic generators are required. The traffic mixture that
Poul E. Heegaard (37) is Senior
is generated by GenSyn is controllable, reproducible, synthetic traffic according to an aggregation of
Research Scientist at Telenor stochastic application models. Currently available are models of web and FTP clients that generate TCP
R&D, Trondheim. His research traffic by downloading pages and files from actual web servers, and models that generate UDP traffic
interests are within the areas of
traffic and dependability evalua-
from a video server (using MPEG), from voice over IP (VoIP), and in a Constant Bit Rate (CBR) stream.
tion of telecommunication sys- Besides generating traffic, there is a need for accurate traffic measurements in order to derive perfor-
tems. He has a special interest mance measures like unidirectional end-to-end packet loss and delay. This has been achieved by
in speedup simulation tech-
niques for assessment of sys-
deploying PCs dedicated to traffic monitoring using specialized hardware, so-called DAG PCI cards.
tems with rare events, and moni-
For the purpose of QoS testing of new applications and network mechanisms in IP networks, several
toring and measurements of IP
networks. He received his Mas- test scenarios are defined. The scenarios specify the application mixture (VoIP, VoD, FTP, web, TV,
ter’s degree in 1989 and his etc.) and/or protocol mixture (TCP, UDP), load level, traffic matrix, and network configuration (DiffServ,
Dr.Ing (PhD) in 1998 in Telemat-
Best Effort etc.).
ics from the Norwegian Univer-
sity of Science and Technology The experiences from running experiments in such a distributed test environment revealed a need for a
(NTNU). Heegaard holds an
adjunct (20 %) associate profes- support system assisting the analysts in setting up the experiments, collecting data, and post process-
sorship in simulation at the ing it. Such support functions are under development and are briefly presented in this paper.
Department of Telematics,
NTNU. From 1989 to 1999 he
was research scientist at SIN-
TEF Telecom and Informatics.
1 Introduction load is of great importance in order to test the
poul.heegaard@telenor.com A test platform is required for Quality of Service QoS of new applications, i.e. interactive video.
testing in IP based networks that carry all types In addition, to increase the understanding and
of services. The services that are provided can get experience with the configuration of new
e.g. include Internet access, home office, tele- QoS network mechanisms the network must
phony, video and TV distribution. These ser- be offered a high load of heterogeneous traffic
vices have different traffic characteristics and mixture.
Quality of Service requirements and the IP net-
work will therefore require some support for dif- Besides generating traffic, a set of performance
ferentiated QoS provisioning. Such a test plat- parameters must be monitored to study the ser-
form should include generation of realistic traf- vice performance defined at IP layer or transport
fic and monitor functions that are able to study layer (UDP/TCP), or even higher layers, e.g. for
Brynjar Å. Viken (31) is
Research Scientist at Telenor the details of traffic streams in the network. This real-time services the parameters can be IP
Research and Development, paper presents a flexible test platform currently packet delay, jitter and loss, while the quality of
Trondheim. His research inter- being used for QoS performance testing in an TCP connections can be measured as throughput
ests are performance measure-
ments and analysis of communi- experimental, IP based, communication platform at TCP or IP layers. Other performance charac-
cation networks with a special that will provide differentiated services. teristics can be derived based on these parame-
interest in IP networks. He is ters, e.g. the service availability can be defined
currently pursuing a PhD at the
Norwegian University of Science For the purpose of QoS testing of new applica- as the state where the end-to-end delay is less
and Technology. tions and network mechanisms in IP networks, than a specified limit, and the measurement
brynjar-age.viken@telenor.com a generator of controllable, re-producible, scal- accumulates the fraction of the time the system
able, synthetic but realistic traffic is required. is in this state. A flexible measurement set-up
This is the motivation for the development of has been achieved by deploying PCs dedicated
GenSyn – a generator of synthetic IP traffic to passively monitor traffic using specialized
implemented in Java. The generator will typi- hardware, so-called DAG PCI cards. However,
cally produce traffic in a controlled testbed en- the specification of a measurement and monitor-
vironment where there are few real users and a ing platform depends on what performance
corresponding low traffic load. Realistic, con- parameters that are to be observed.
trollable, and reproducible background traffic
Internet Internet
protocols New network protocols
mechanisms
In this paper, the GenSyn measurement platform • User behaviour model (“white box”) – genera-
is described. In Section 2 details about the Gen- tion of IP packets from physically based
Syn traffic generator are given. The general source models. More detailed measurements
modelling framework of GenSyn is described in than for the two other approaches are required.
Section 2.1, while Section 2.2 contains the cur- However, the parameters in the model reflect
rent available interface modules and examples of the user behaviour and hence it is straightfor-
source models; including FTP client, VoIP and a ward to change the model if e.g. the number
combined user model. In Section 2.3 the imple- of sources is changed.
mentation details of GenSyn are given and per-
formance constraints are discussed. Section 3 For generation of traffic in IP based testbeds
describes details of a distributed test platform both user behaviour models, see e.g. [MTW99],
and different test scenarios, including examples [ChLi99], [Vic98], [Ake99], [BaCr98], and
of results. Section 4 describes support systems bulk-transfers, e.g. tTCP [MTW99], are being
for conducting distributed experiments, GenSyn used. GenSyn combines the user behaviour
Designer for setting up an experiment, and Gen- approach with bulk-transfer of data via commu-
Syn DataReporter for post-processing of mea- nication streams. Application of stochastic user
surement data. Finally, the paper closes with behaviour models described by state diagrams
some general remarks and a list of ongoing and introduces flexibility, scalability, and physically
further work in Section 5. interpretable model parameters. This part of the
modelling framework is similar to ideas used in
2 GenSyn – a Java-based a former ATM traffic generator, called ATM100
Traffic Generator or STG [HMM93]. However, instead of devel-
oping a specialized hardware instrument, Gen-
2.1 The Modelling Framework Syn applies modern Web- and Java-technology
Different source modelling approaches can be and exploits the Internet protocol suite (TCP/IP)
considered to describe a typical Internet source: that is already available. This means that the
generator is only a software process that imitates
• Trace – replay of recorded stream of IP pack- the user behaviour and dynamically controls
ets, i.e. a stream of IP packets obtained from the creation and deletion of one or more links
measurements is replayed and offered to the (threads) to physical HTTP- and TCP-connec-
test network (e.g. replay of a tcpdump-file). tions. The generator is not only a simulator; it
If the recorded stream contains traffic from generates real IP packets that flow through a
elastic sources (e.g. TCP connections) the real (test) IP network.
replay will not be representative unless the
congestion situation in the network is exactly This section describes the fundaments of Gen-
the same. This will rarely be the case in a net- Syn and the flexible modelling framework with
work with a mixture of traffic streams. a few examples of use.
End user
1 hour
present
100 s
Connection
10 s
Dialogue
Burst 100 ms
TRANSP.
NETW. RELAY
Packet 1 ms
LLC LLC AAL/FR
MAC MAC ATM
Cell 0,01 ms
PHY PHY SDH
Cell stream
End user system LAN-ATM gataway
illustrated in Figure 2. The example is originally • Variation in information stream – e.g. variable Figure 2 Illustration of
from ATM [Helv95], but this general multi-level video coding (MPEG). different activity levels in a
behaviour is independent of the communication source [Helv95]
technology. Consider for instance a telephony Equipment and protocols:
user. The user is present (at the office) {end-user • End user equipment constraints – access
present level}, he is making a phone call {con- capacity, processor capacity, disk, video
nection level}, during the call he is speaking and coding processing;
listening {dialogue level}, when he is speaking
he sends voice and takes short breaks {burst • Communication system constraints – buffer
level}, when voice is sent it is wrapped in pack- space, transmission capacity, router capacity;
ets {packet level}, each packet is segmented into
cells {cell level}. The last two levels are tech- • Network mechanisms – routing strategies,
nology dependent. The typical time constants priorities (DiffServ), weighted fair queuing,
involved on various levels are indicated in the resource reservations (RSVP, IntServ);
table in Figure 2. Hence, the aggregated packet
or cell stream that can be observed on the trans- • Protocols – e.g. TCP congestion control and
port or cell level will have a communication pat- avoidance.
tern that is generated as a result of many inter-
acting stochastic processes with different time 2.1.2 Linking Stochastic User Behaviour
constants. In [HeHo95] and [WTSW97] this Models to Real Communication
multilevel superposition of stochastic processes Streams
with different time constants is considered to GenSyn models the user behaviour in a state
be an explanation of the observed self-similar based source model, while the communication
behaviour observed in aggregated traffic streams systems are not modelled. The equipment con-
(packet or cell level) on the Internet [LTWW94]. straints and protocol behaviour are automatically
included through the linking of the stochastic
The aggregated stream will be a heterogeneous processes to the built-in protocol stack on the
mixture of traffic from various sources where workstation. This means that no incorrect
each source will be influenced by user be- assumptions about the protocols or network
haviour, equipment and protocols, see Figure 2. mechanisms will be made, it is for instance not
necessary to know the details about the MPEG
User behaviour: coding or the TCP slow start mechanisms.
• The end user behaviour – set-up/disconnect a
session, application mixture (web browsing, In general it can be said that the modelling
software downloads, chat, games, email, framework combines the better of two worlds,
streaming (video, audio)); it gets the flexibility and scalability of state dia-
gram description with composition of users com-
• User-network interaction – slow variation, bined with the accuracy of protocol and network
interest/impatience, takes a break and returns behaviour by using the actual protocol instead of
later due to congestion, cost, etc.; a model.
• Stochastic state space, ΩS, where the stochas- • ΩC – communication state space
tic user behaviour is described by a state
machine where each state can contain a collec- • Ω – global state space, ΩS ∪ ΩC
tion (composition) of many users1); and
• m – state vector, m = {mi}i∈Ω
• Communication state space, ΩC, which is a
“placeholder” for the users that are waiting for • mi – number of users in state i
response from the communication system.
• Ii – identity vector of users with an open
All transitions from the stochastic to the commu- communication stream in state i ∈ ΩS
nication state space, ΩS → ΩC, will instantiate
an interface module that creates a communica- • θi,j – state transition rate from state i to state
tion stream to and/or from the workstation. j, i ∈ ΩS
A communication stream is either a TCP con-
nection or a stream of UDP datagrams. The user • θi – total transition rate in state i, i ∈ ΩS,
that instantiated the communication stream will θi = Σj∈Ω θi,j
Figure 4 The modelling be placed in a communication state and stay
framework: division of state there until the communication is completed. • E(Ti) – expected sojourn time E(Ti) =
space Hence, a transition from the communication 1 / (θimi), i ∈ ΩS
1) The state model has to be (semi-)Markovian, i.e. each state sojourn time must be negative exponentially distributed, in order to make
the composition of users in each state.
A state model is semi-Markovian if all states ΩC, for all users in the communication states are
have state sojourn times that are negative expo- fully determined by the behaviour of the under-
nential distributed, or if neither of the states in lying communication system, i.e. the perfor-
the model have more than one non-exponential mance of the end user equipment, protocols, net-
sojourn time. In case of a state with non-expo- work mechanisms. Using UDP for transmission,
nential time distribution, an approximation by a the state sojourn times are stochastically deter-
phase-type distribution is feasible by substituting mined by the distribution included in the corre-
this state with a combination of states that have sponding interface module (e.g. CBR, VoIP, or
negative exponential time distributions. This mpeg). However, in both TCP and UDP cases a
means it is possible to model state sojourn times user will be “locked” in the communication state
that follow a hyper-exponential, hypo-exponen- as long as the communication stream is open,
tial, or Coxian distribution. All these distribu- and immediately be removed when the stream is
tions are a combination of states with negative closed. Hence, for user x the transition from state
exponentially distributed state sojourn times. i in ΩC to state j in ΩS is considered to be a con-
ditional transition, i.e.
When all state sojourn times are exponential,
the procedure described in Algorithm 1 can be ⎛ ∞ comm.stream opened by x is closed
applied to determine the next stochastic event. θ i, j ( x ) = ⎜ (1)
Observe, however, if a communication stream is ⎝ 0 comm.stream opened by x is open
completed while waiting for the next scheduled
stochastic event to occur, an immediate state where state i ∈ ΩC and state j ∈ ΩS.
change will occur caused by closing the commu-
nication stream, see Algorithm 2 for further In the communication states a relation, e.g. a
details. process identity, to all opened communication
streams must exist. When a communication
2.1.2.4 Communication State Model stream is opened and a new user enters state i,
– Link to the Network i ∈ ΩC, the process identity of the interface
The communication states are the “placeholders” module related to this state transition needs to
for all users that currently have an open commu- be stored. For this purpose an identity vector Ii
nication stream. In the case where TCP is used is added as a new attribute to the communication
for transmission of packets (e.g. using the FTP states in addition to the list in Section 2.2.3.
or web model), the states sojourn times, Ti, i ∈ When a communication stream is closed, e.g.
when a file is downloaded, an instantaneous
state transition will occur, and a user leaves this
communication state (mi – 1). Observe that the
Algorithm 1: Update the state vector when number of users in state i equals the number of
the next event is a stochastic event in WS elements in the identity vector in state i, mi = |Ii|.
The identity vector, Ii, is implemented as a list of
(i) Sample the time T to next event in WS, the
pointers (process identities) to open communica-
expected value is
tion streams.
E(T ) = 1 / (∑ j ∈Ω S
θ jmj ) In Algorithm 2 the addition to Algorithm 1 is
(ii) Wait T given to handle both stochastic events and
(iii) Sample which state i ∈ WS where the next events triggered upon completion of a commu-
event took place, the probability is nication stream.
θ i mi / (∑ j ∈Ω S
θ jmj ) The state sojourn time in a communication state
may depend on the current congestion situation
(iv) Sample the next state j from state i, the in the underlying network. In the case of down-
probability is pi,j = qi,j / qi loading web pages, the congestion, the size and
(v) Move a user from state i to state j by location of the requested page will contribute to
updating the mi – 1 and mj + 1. the sojourn time. Furthermore, for web- and
FTP-downloads an impatience factor is defined
(iii) The next event takes place in state k in The url addresses are randomly chosen from a list
WC where k is the first stream closed, i.e. of 2500 addresses from all over the world. This
list can easily be changed. For example, as an
⎩
( ( ))
k = ⎧⎨i i ∈Ω C ∧ T i = min j ∈ΩC T j ⎫⎬
⎭ option, GenSyn offers to dynamically check and
update the url list as the generator is running and
Step (iv) and (v) are the same steps as in new pages are visited. This is done by inclusion
Algorithm 1 except that the pi,j is given as of some, or all, of the href addresses found when
parameters because they cannot be derived parsing through the source file of a web page.
from the conditional rate qi,j(x) which is now
either ∞ or 0. The download time per web page is constrained
by the transport protocol and the network and
server conditions. In addition, GenSyn allows
the user to set a time-out parameter, impatience
time, that sets the maximum limit of the down-
for each communication state. This enables the load time.
definition of an upper limit on the time spent in
the communication state. The impatience factor 2.2.1.2 Ftp Module – Download a File
is formulated as a condition of θi,j(x) in (1), and The FTP interface module uses http to download
its randomness is defined in the stochastic part a file. The file can be downloaded from any
of the source model. machine that is set up as a web server and read
directly into the memory on the receiving
2.2 Model Template Examples machine, i.e. the machine that is hosting the
This section demonstrates the applicability and GenSyn process running the FTP client. In con-
the flexibility of the modelling framework by trast to the web interface module in Section
describing the model templates that have been 2.2.1.1, see also [Heeg00], the FTP module adds
developed using the GenSyn framework. First very little to the download time due to process-
the interface modules currently available are ing in GenSyn, and hence the download time is
described, followed by two examples of model constrained by the server responses and transfer
templates that imitate web and VoIP user be- delays. Similar to the web module, the impa-
haviours and a model that combines these. The tience time is also a parameter in the FTP mod-
interface modules handle the actual communi- ule. See Section 4.2 for discussion of GenSyn
cation through the IP network. constraints.
The framework of GenSyn is not limited to these The pointer to the files that can be downloaded
models, and can easily describe other state ori- by the FTP interface module are given as url
ented models, or change the model parameters. addresses in a separate parameter list as input.
Finally, Section 2.2.3 includes an example of a This list is in a text file that can easily be
packet trace collected at a single point in a test changed and hence the user of GenSyn can cre-
network viewing packets generated from several ate any empirical file distribution. As an exam-
GenSyn processes running a mixture of FTP and ple, the FTP client in the experiment in this
voice models. paper randomly selects its files from the file size
distribution (i.e. not the IP packet distribution)
2.2.1 Available Interface Modules depicted in Figure 5 with an average size of
To make it easy to build new models and create 154 kbytes (adopted from [Dan92]).
realistic traffic mixtures a set of different inter-
face modules is developed – including e.g. a 2.2.1.3 Mpeg Module – Sending UDP
module for downloading and reading web pages, Packets According to Trace Data
a module for sending a deterministic stream of The mpeg module was developed to have a mod-
UDP, and a module for sending a stream of UDP ule that can read a stream of numbers represent-
packets determined by the content of a trace file, ing a variable bitrate coded video trace, convert
e.g. an mpeg coded video stream. This section to udp packets and send it to a given address. In
describes some of the details in these modules. general this module can take any file that con-
cummulativ density
(fixed) duration of each period. If the number of 0,6
bits in the trace file for one period does not fit
0,5
into one packet, several packets are created and
sent back-to-back. 0,4
All Yi UDP packets in position i are sent back- 2.2.1.4 VoIP and CBR Modules – Sending
to-back at maximum line speed. A video is ran- Constant Stream of Fixed Sized
domly, and uniformly, selected among the Packets
K = 19 different video streams that are available. Both the VoIP and the CBR (from the term con-
The packet size NP and interference time TF are stant bit rate) interface modules send a determin-
parameters that can be set by the scenario de- istic stream of packets, i.e. a stream of equally
signer. Default values are set to NP = 1024 bytes sized packets with a constant inter-packet arrival
and TF = 40 ms. time. Hence, the packet pattern is characterized
by the packet size Np (not included overhead like
Although this module originally uses a set of 8 byte UDP header and 20 byte IP header) and
MPEG-1 coded video sequences it is very sim- the (constant) time between packets, Tp. This
ple to e.g. use MPEG-2 traces instead, as long as gives a bitrate of (excluded overhead) 8Np / Tp.
the resulting input trace files have the same for- Figure 7 shows an example of a packet pattern
mat as X. In fact, any trace with the format of X generating a 64 kbit/s stream, or 8 packets per
applies. It is also easy to change the size of UDP second (pps).
Forward Predictions
Figure 7 An example of a
64 kbit/s streaming of udp
Np = 1024 bytes 1024 bytes 1024 bytes 1024 bytes
time datagrams for the constant
Tp = 125 ms 125 ms 125 ms 125 ms packet source
Mpeg Udp Fixed, Random, Random Parameter Frame size Frame Random,
given uniform from IP from is interarrival neg. exp.
by the in (25000, address parameter parameter is parameter distributed
machine 30000] list file from from
parameter parameter
file file
Table 1 Characteristics of The VoIP is a specialisation of the CBR module In this section a model that combines the FTP
the current available set of where the stream of packets has random breaks. and voice models from [Heeg01] will be briefly
interface modules Both the time between breaks and the break described to demonstrate another aspect of the
duration follow a negative exponential distribu- flexibility of the GenSyn framework, namely the
tion. The VoIP module was created to model ability to use more than one interface module in
silence suppression in an audio stream as intro- the same model. First the descriptions of the
duced and described in [Brad69]. FTP and voice models from [Heeg01] are
repeated before the complete combined model is
2.2.1.5 Overview of Interface Modules given.
In Table 1 is given an overview of the current
set of interface modules. New modules will be 2.2.2.1 The FTP Client
developed as requested by new models in new The overall model of the FTP clients describes
traffic scenarios. the user behaviour within and between sessions
by the 3-state model in Figure 8. A session is
2.2.2 Example of a User Behaviour Model essentially the same as the web sessions defined
In Section 2.1 the modelling framework of Gen- in [Vic98] as a sequence of packets with less
Syn was described. The two-layered modelling than 30 minutes between two consecutive file
consists of a flexible and scalable state diagram requests. The following states are defined:
approach for describing the user-behaviour and
the interface modules described in the previous • Idle – the user is in-between sessions.
sections. This means that on top of the interface
modules that were introduced in the previous • Read – the user reads the downloaded web
section many source models can be described. page or a file and considers what to do next,
In [Heeg01] descriptions can be found of an FTP download another one, or close the session?
client that uses the FTP module and a voice
model that uses either the VoIP (for modelling • Download – the user opens a connection to a
of silence suppression) or the CBR module. In url address, randomly selected from a list of
[Heeg00] models of a web and video server are addresses, and downloads this page or file. In
given. the web interface module the page is parsed
and all corresponding image files and applets
are downloaded.
The parameters of the state model are extracted 2.2.2.3 The Complete and Combined Model
from the work described in [Vic98] where an The two models can be combined on one
aggregated stream of HTTP connections was machine by running either
separated and broken into web sessions. • two processes, one with FTP and one with
voice; or
• Time sequence of file downloads – The Idle
state uses the web session separator criterion • one process where the user behaviour state
as the expected sojourn time description is combined into one model.
TIdle ~ neg.exp. (γ); 1 / γ = 30 ⋅ 60 = 1800 [sec.].
In the current case, the simplest, and probably
• Time between requests – Within a web session the most efficient approach is to run two pro-
–
the mean time between requests is X 42.8 cesses. Even so, this section will look at a com-
[sec.] with a coefficient of variation equal to
–
S / X = 2.9. This means that the Read state in
the overall model is not negative exponential
–
distributed (in that case the S / X = 1). This Figure 9 The model of a voice
state is therefore substituted by a hyper-expo- VoIP or CBR source without call signalling
nential distribution with 4 branches, each with
different time constants. The parameters are
determined to fit the truncated-Pareto model
used in [Vic98]. λv
Idle Send
Substituting the Read state with four sub-states α
to model the hyper exponential distribution, the
complete model and the model parameters are Stochastic State Space Comm. State Space
given in Figure 8.
bination to demonstrate that a model can use ator with different models. A measurement pro-
more than one interface module. cess is invoked on the interface between GenSyn
machine TG1 and TGx, x = 2, ..., 10, see Figure
To combine the two models, a common state 11. All packets in both directions over this inter-
needs to be identified. In this example the Idle face are collected. The traffic generator, TG1, is
state is an obvious choice. As an implicit hosting a GenSyn process running the FTP
assumption a single user instance in this com- model, and hence TG1 sends requests and
bined model cannot be both downloading a file receives files from TGx, x = 2, ..., 10 that acts as
and sending an audio stream at the same time, file servers for TG1. At the same time, TG1 is
but the model can contain many users so the pro- the file server for all machines TGx, x = 2,..., 10
cess may have many FTP and voice connections that are running an FTP client process. In byte
open at the same time. An illustration of the volume, the traffic mixture consists of 85 %
combined model is given in Figure 10. Out of TCP and 15 % UDP. A principal sketch of the
the Idle state, the transitions that were described measurement set-up is given in Figure 11. More
for the separate models are unchanged. How- details of the measurement platform are given in
ever, observe that the transition rates have to be Section 3.
adjusted to provide the requested mixture of
TCP and UDP traffic. All packets transmitted and received over the
measurement interface for a period of 1800 sec-
2.2.3 Example of a Packet Trace from onds are collected by tcpdump. The packet trace
GenSyn is post-processed and divided into bins of size
To demonstrate the use of GenSyn, a packet 10 milliseconds where the number of bits in each
trace is captured on a single point in a test net- bin is calculated. This time series is denoted X(1).
work. The test network consists of four edge Furthermore, the average traffic over blocksize
Figure 12 Normalized routers connected in a ring topology. To these 4 m bins forms the time series X(m). The variance
variance for average traffic edge routers there are ten PCs connected that are is calculated for various block sizes, Var(X(m)).
over block length running an instance of the GenSyn traffic gener- In Figure 12 the normalized variance,
Var(X(m)) / Var(X(1)), is plotted for different
block sizes. The TCP and UDP traffic is split
into two curves and compared to the normalized
variance of Poisson process as a reference. The
Var(X(m)) 1
Var(X(1))
plot shows slowly decaying variance for both
0.7 UDP and TCP.
0.5
observed TCP traffic It is important to emphasize that this experiment
(85% of bytes volume) is included for the purpose of demonstrating the
0.3 features of GenSyn only, and not to give a full
observed UDP traffic
(15% of bytes volume) verification of the two model examples. In this
0.2
section the focus is the modelling framework of
0.15 GenSyn and characteristics and features of the
model examples are out of scope. Building good
0.1
Poisson reference models and verifying them is an important task
and should be treated much more thoroughly in
an additional study. However, GenSyn provides
1 5 10 50 100 500 m a flexible means for modelling and allows the
• Portable – run on Windows, Linux, Unix, and The following section presents a few results of
produce the same results. the performance of a single GenSyn process,
using a scenario generating both TCP and UDP
• Distributed – run in parallel on several work- traffic by running a single instance on a dedi-
stations – and be easy to distribute. cated machine. Knowledge of these constraints
are important for instance while specifying a test
• Scalable – run many active users in parallel on scenario.
a single workstation.
2.3.1 The GenSyn Performance
The first two requirements made Java an attrac- Constraints
tive choice as the implementation language. Java
provides simple, high level, and well-defined 2.3.1.1 TCP Traffic – the Throughput
interfaces and methods for communication (via Constraints
APIs) with the underlying protocol stack. This The web interface module described in [Heeg00]
makes it fairly easy to create HTTP and TCP downloads and parses through web pages. This
connections and to send streams of UDP packets. puts a rather heavy burden on the processor and
will limit the scaling of a model that uses a web
The flip side of the coin is that Java limits the module. The maximum number of simultaneous
scalability of GenSyn due to two constraints: sessions is limited by the ability to handle paral-
lel threads in the Java runtime environment. The
• Time scheduling and granularity. The sleep maximum number of sessions constrains the
function in Java is inaccurate for time granu- number of users in a model and this will again
larity in milliseconds, and returns different limit the throughput. To reduce this constraint
results on various platforms. This will limit the FTP interface module was developed where
the number of users that can be defined in the the web pages and files are simply downloaded
model because many users means short time into memory and discarded without further
between events in a composite model. The inspection. Hence, the downloading of pages
experience so far, running between 300 and and files will be much less computer demanding
3000 web users on a single processor because the GenSyn program now only needs to
machine, indicates that the generator running send a request for a page/file.
on one workstation should limit the number
of users to keep the expected time between The throughput has been studied by use of the
stochastic events of at least 10 ms. FTP model as described in Section 2.2.2.1 with
100 160
140
80
download time [ms]
download time
throughput [Mbit/s]
120
linear extrapolation 100
60
80
40 observed throughput 60 Figure 13 The constraints of a
40 GenSyn process downloading
20 files to a single machine
20 (average file size = 154 kbytes,
0 0 average download time =
0 2000 4000 6000 8000 10000 12000 14000 16000 86 ms, interface rate =
Users 100 Mbit/s)
2) Some problems have been observed with ICMP messages from the destination machine stating “port
unreachable”. These messages were ignored in Windows, but had to be filtered out in Linux.
3) Each point in the plots is from a single experiment. However, replicated experiments showed that
the variance was very small.
Mbit/s
Mbit/s
pps
pps
6000 6000
40 observed 40
4000 observed 4000
20 2000 20
2000
0 0 0 0
0 500 1000 1500 2000 2500 3000 0 500 1000 1500 2000 2500 3000
Users Users
(a) Constant bit rate source (b) Variable video source (MPEG)
- UDP packet size = 1024 bytes - UDP packet size = 1024 bytes
- Interpacket time = 125 ms - Average frame size = 2.7 UDP packets
- Interface rate = 100 Mbit/s - Interframe time = 40 ms
- Interface rate = 100 Mbit/s
7 7000 7
24000
unconstrained
6 6000 6
- interpacket time = 10 ms - interpacket time = 100 ms
20000
- UDP packet size = 10 bytes 5 - UDP packet size = 100 bytes
5000 5
16000 unconstrained
4 4
Mbit/s
4000
Mbit/s
pps
pps
12000
observed 3 3
3000 observed
8000
2
2000 2
4000 1
1000 1
0 0
0 2000 4000 6000 8000 0 0
Users 0 3000 6000 9000 12000 15000
Users
Figure 14 The constraints of a GenSyn process generating UDP packets from a single machine
Internet Internet
protocols protocols
File
server
Internet
protocols
Switch
User behaviour model User behaviour model User behaviour model User behaviour model
Switch Switch
Post-processing
PC
Switch
User behaviour model User behaviour model User behaviour model User behaviour model
described by the framework of GenSyn. This in Section 3.3 and examples of results that can
includes models of web and FTP clients that be obtained from such an experiment are found
generate TCP traffic by downloading pages and in Section 3.4.
files from actual web servers, and models that
generate UDP traffic from a video server (using 3.1 An Overview of the Measurement
MPEG), from voice over IP (VoIP), and in a Platform
Constant Bit Rate (CBR) stream. The GenSyn traffic generator is used in dis-
tributed experiments with traffic generators run-
Besides generating traffic, there is a need for ning on several dedicated machines in the net-
accurate traffic measurements in order to derive work being tested. Because GenSyn is imple-
performance measures like unidirectional end- mented in Java, very little measurement func-
to-end packet loss and delay. This has been tionality is included on a per IP packet basis.
achieved by deploying PCs dedicated to traffic Instead, the measurement platform is based on
monitoring using specialized hardware, so-called dedicated monitors, counters at the interface
DAG PCI cards. Section 3.1 describes the Gen- cards (to monitor the routing and load balance),
Syn measurement platform developed for QoS and specialized equipment for generation and
testing of IP networks. analyzation like Smartbits.
A test scenario defines the application and proto- Figure 15 shows the GenSyn test topology used
col mixture, load level, traffic matrix and net- for QoS testing of an experimental IP network.
work configuration (DiffServ, Best Effort, etc.). The figure illustrates all major components
Several test scenarios have been defined for test- including both GenSyn machines and dedicated
ing of the QoS mechanisms in an IP network. monitoring machines. The GenSyn PCs execute
The design of GenSyn test scenarios is presented
the GenSyn traffic generator processes while • The packet capturing software (tcpdump) has
DAG monitors (probes) collect the IP packet been observed to lose information when the
traces. load is high.
3.2 Using Passive Measurements Each monitor PC has two DAG3.2E Fast Ether-
and DAG Cards net interface boards [Dag] specialized for captur-
Passive measurement data is collected by ing packet traces. The DAG cards generate a 64
observing real packets at selected measurement byte record for each packet received. The record
points. The method captures information con- contains Ethernet, IP and transport layer header
tained in the various fields of the packet header. information together with a timestamp as illus-
As opposed to active measurements, this trated in Figure 16.
approach is non-intrusive and ideally the mea-
surement process does not disturb the operation Packets are tapped from a Fast Ethernet inter-
of the network. Unlike active measurements, faces to a DAG interface board using an Ether-
passive measurements can gather detailed infor- net switch, as shown in Figure 17. The clocks
mation about every packet by tracing (taking a of the DAG interface boards have a very high
copy of) every packet sent and received. The clock precision and are synchronized by GPS
obvious drawback of this method is that the col- receivers. Hence, synchronisation of the time- Figure 17 Configuration for
lection of raw packet traces from high capacity stamp clocks in the microsecond range is attaching traffic generating
networks creates huge data volumes. achieved. and monitoring PCs
3.3.1 The GenSyn Application Models 3.3.2 QoS Mechanisms and Service
The following models are currently available in Differentiation
the GenSyn framework. There is a trend towards building communica-
tion platforms for integration of a great variety
TCP traffic – adjusts to the network perfor- of applications with different traffic characteris-
mance (slow-start window mechanism) tics and users with different Quality of Service
• Web – a model of users (clients) that down- requirements. There is a trend in networking
load web-pages with all their content (inclu- towards Full Service Network, i.e. a network for
sive applets and images) from real web all types of services. The various services and
servers all over the world. The url addresses applications need to be treated differently, and
are found in a parameter list of predefined hence some means for service differentiation is
addresses that may dynamically be updated required with different support for traffic man-
as the experiment evolves. agement and control. In an IP based network
such differentiation and management techniques
are still a research topic. The proposed, and
Figure 18 Snapshot of 4
traces captured from the
visualizer in GenSyn c) CBR trace d) MPEG trace
implemented, mechanisms and methods (e.g. include entries in the access lists in the edge Figure 19 Support for QoS
DiffServ) need to be studied carefully. Several routers. These entries define a mapping from the in test
approaches can be chosen for differentiation IP addresses of the GenSyn machines and port
of services, e.g. according to numbers that can be manipulated by the GenSyn.
The static access list entries are only valid to UDP
• Real time requirements – no (best effort), traffic. The TCP traffic sources use the HTTP that
weak (audio/video streaming), and hard has default port number 80. To enable TCP traffic
(telephony, interactive video); or in other than the best effort class (IP precedence =
0), it is necessary to change the mapping of port
• Willingness to pay – economy (free/cheap, number 80 and IP precedence for a specific Gen-
only connectivity requirements), business Syn IP address for a given experiment. However,
(inexpensive, minimum guaranteed level on in most of the experiments the TCP traffic will be
QoS requirements) and first class (expensive, best effort traffic.
hard QoS requirements).
3.3.3 Load Level and Application Mixture
The service differentiation is part of a Service Before the GenSyn processes can be distributed
Level Agreement (SLA) that will exist between on the PCs and started, it is necessary to decide
end-users, network providers, service providers, where to run the various processes. Furthermore,
and content providers. In order to provide (and it has to be specified what number of users to
observe) different QoS performance, some run for each type of model to produce the re-
mechanisms and methods are required in the net- quested traffic mixture and load.
work. To test the implemented mechanisms of
commercial routers it has been proposed to carry 3.3.3.1 The Load Level
out the same experiment under different network All traffic scenarios define their load level as the
configurations, see Figure 19. total offered load from all GenSyn processes rel-
ative to the network capacity. As a start, the fol-
• Best effort – to establish a reference system; lowing load levels can be defined: e = 0.2, 0.4,
0.6, and 0.8. As an option, other load levels can
• Classification without differentiation (best be defined.
effort) – to study overhead of the mechanism;
3.3.3.2 The TCP – UDP Mixture
• Classification with differentiation in service Each load level must define different mixtures of
classes – to study effect of differentiation. TCP and UDP. Different TCP/UDP mixtures are
constructed by the use of the application models
In all 3 cases the QoS performance is studied that are available in GenSyn.
separately for all service classes although in case
1 and 2 they all receive the same treatment. Examples of TCP/UDP mixtures that can be
included in a test scenario are:
For DiffServ, the service differentiation is in
accordance with the IP precedence bit setting. The • Today – in bytes, 85 % TCP and 15 % UDP
IP precedence bits are the 3 least significant bits traffic;
of the Type of Service (ToS) field in the IP
header. The GenSyn traffic generator cannot • Tomorrow – in bytes, 40 % TCP and 60 %
change the IP header because GenSyn operates UDP traffic;
only on the TCP and UDP protocol layers. Hence,
in order to get traffic streams in different service • Near future – in bytes, 10 % TCP and 90 %
classes while using GenSyn it is necessary to UDP traffic, under the assumption that appli-
on an edge router
VoIP source
GenSyn GenSyn
Tg4 Tg7
GenSyn GenSyn
Tg3 Tg8
Bottleneck node
GenSyn GenSyn
Tg2 Tg9
GenSyn GenSyn
Tg1 Tg10
Figure 21 Delay over time for voice traffic sent as (a) best effort, (b) with priority
Figure 22 Delay distribution for voice traffic sent as (a) best effort, (b) with priority
4 Experiment Support
In an experiment, the configuration, implemen-
tation and evaluation of results involve a lot of
(manual) work even when the measurement plat-
form is well established and configured. To help
the analyst some automated support is under
development for setting up GenSyn experiments
and post-processing of results.
4) It may be noted that the post-processing of packet traces generally is independent of the GenSyn traffic generator. However, currently
the GenSyn DataReporter is tailor-made for this purpose.
The GenSyn DataReporter requires a directory Note that the multi-point performance statistics
structure as illustrated in Figure 26. That is, only provide an overview as observed at a single
before the DataReporter can be run the following measurement point and are not suitable for eval-
steps must be performed: uate end-to-end performance. However, the
In addition, various statistics are computed for 5.2.1 GenSyn Modelling Framework
the entire measurement period. The modelling framework itself is flexible and
prepared for modelling of many different Inter-
Note that point-to-point performance provides net applications. Several model examples are
statistics addressing unidirectional performance described in the GenSyn framework, including
including delay and packet loss. However, the web, FTP, VoIP, MPEG video, and constant
processing is computation intensive and requires packet rate. The models developed are to some
a substantial amount of time for large packet extent parameter controlled and can therefore
traces. easily be changed with respect to the number of
users, state sojourn times, size of packets, time
5 Closing Comments between packets, IP destination and source
The measurement platform developed for QoS addresses, file and web page locations.
tests of the IP network consists of two main
components; (i) to derive performance measures New user behaviour state models using existing
like end-to-end packet loss and one-way packet interface modules can be developed without any
delay accurate traffic measurements are con- changes in the GenSyn implementation.
ducted by external monitors, i.e. dedicated PCs
with a specialized interface card (DAG), and (ii) 5.2.2 GenSyn Constraints
a Java based traffic generator (GenSyn) that runs The scalability of the generator is limited by the
on a dedicated PC produces synthetic traffic time granularity and time scheduler of the Java
according to an aggregation of stochastic appli- Runtime Environment (JRE). The portability of
cation models. This test bed configuration is a the generator is limited by both the inconsisten-
very flexible platform that opens for doing many cies between different versions of Java APIs,
Studies of the constraints of a single GenSyn GenSyn has also been used in combination with
process on a single machine show that embedded load generation and measurement
equipment like SmartBits [SBit] where GenSyn
• The number of transmitted UDP packets per provides the background load of controllable
second is limited by the processor capacity and realistic elastic load (TCP connections).
and the memory size;
5.2.5 Ongoing and Planned Work
• The TCP throughput is constrained by the Currently, a lot of work is being done on Gen-
interface card in the sense that the TCP win- Syn and more is planned in the near future. The
dow mechanism reduces the throughput due to key issues are:
congestion (the offered load is greater than the
capacity) before the handling of multi-threads Extend the model template library – In the cur-
becomes a problem. rent version of the generator there are interface
modules to support the download of web pages
5.2.3 GenSyn Measurements and files through http, video streaming, and
In the current implementation some measure- VoIP and constant packet rate. This library will
ment functionality exists. This includes constantly be extended as new requirements
appear. In the licence agreement that accompa-
• Source and destination ports are added to the nies the GenSyn distribution, the licensee is
UDP packets generated to enable filtering invited to return to the distributor all models that
packets by tcpdump; are developed using the GenSyn framework.
• Trace file with records of the size of a web Validation and verification – The correctness of
page or FTP file, or the length of a phone con- GenSyn models relative to the models defined is
nection or a video stream; verified, see [HeLu99]. The traffic stream from
the models defined in the GenSyn framework is
• Summary report on the total amount of sub- studied and one example was given in this paper.
mitted and received data (in bytes and pack- More work on checking the validity of the mod-
ets), and the number of unsuccessful attempts. els and develop new models needs to be done.
The results in Section 2.3.1 are based on the lat- Network measurements – GenSyn is now being
ter summary report from GenSyn. deployed in a fully equipped IP platform with
DiffServ and MPLS functionality and several
In the current version of GenSyn, no end-to-end different applications. The measurements from
measurements of real-time performance like these experiments will demonstrate the applica-
delay, jitter (delay variation) and loss are done bility with respect to generating realistic traffic,
by GenSyn. These measurements are carried out and will serve as a verification of the GenSyn
by the use of trace software (e.g. tcpdump) on process.
dedicated or separate machines. Extension of the
built-in measurement functionality in GenSyn The GenSyn is a Java process that generates IP
is not realistic because of the time granularity traffic using a flexible, scalable, stochastic mod-
problems of Java. If GenSyn needs to process elling framework for describing user behaviour
each packet, e.g. add time stamp, sequence num- of sources. This stochastic behaviour model is
ber, change TOS bit, this will significantly linked to the underlying protocol stack and gen-
reduce the performance of the traffic generator. erates real packets into the network. This is a
The solution is to make a platform dependent novel modelling approach that chooses the better
function (in hardware or at least OS dependent) of two world, flexibility and scalability of com-
that processes each packet. However, this is in posite state models, and accuracy in the protocol
conflict with the philosophy of GenSyn that has behaviour by use of the underlying protocol
portability as a major requirement. stack instead of making a model of it.
[BaCr98] Badford, P, Crovella, M. 1998. Gener- [Helv95] Helvik, B E. 1995. Synthetic Load
ating representative Web workloads for network Generation for ATM Traffic Measurements.
and server performance valuation. In: Proceed- Telektronikk, 91 (2/3), 174–194.
ings of ACM SIGMETRICS’98, Madison, WI,
USA, 151–160. [HMM93] Helvik, B E, Melteig, O, Morland, L.
1993. The synthesized traffic generator; objec-
[Brad69] Brady, P T. 1969. A model for generat- tives, design and capabilities. In: Integrated
ing on-off speech patterns in a two-way conver- Broadband Communication Networks and Ser-
sion. Bell system technical journal, 48, vices (IBCN&S). IFIP, Elsevier, Copenhagen,
2445–2472. Denmark. (Also available as SINTEF Technical
Report STF40 A93077.)
[ChLi99] Choi, H-K, Limb, J O. 1999. A
Behavioural Model of Web Traffic. In: Proceed- [LTWW94] Leland, W E et al. 1994. On the
ings of the 7th International Conference on Net- self-similar nature of Ethernet traffic (extended
work Protocols (ICNP’99), Toronto, Canada, version). IEEE/ACM Transaction of Networking,
327–334. (Extended version: http://users.ece. 1–15.
gatech.edu/~hkchoi/paper/model.pdf)
[MTW99] Miller, G J, Thompson, K, Wilder, R.
[Dag] Graham, I D et al. 1998. Nonintrusive and 1998. Performance Measurements on the vBNS.
Accurate Measurements of Unidirectional Delay In: Proceedings of Interop ’98, Las Vegas, NV.
and Delay Variation on the Internet. In: Pro-
ceedings of INET’98. (http://www.comms. [Rose95] Rose, O. 1995. Statistical properties
uab.es/inet99/inet98/6g/6g_2.htm) (Dag project of MPEG video traffic and their impact on traf-
homepage http://dag.cs.waikato.ac.nz/) fic modeling in ATM systems. University of
Wurzburg, Institute of Computer Science.
[Dan92] Danzig, P B et al. 1992. An empirical (Technical Report 101.) (The traces obtained
workload model for driving wide-area TCP/IP from: ftp-info.informatik.uni-wuerzburg.de/
network simulations. Internetworking: research pub/MPEG.)
and experience, 3, 1–26.
[SBit] SmartBits info. (2001, June 6) [online]
[Heeg00] Heegaard, P E. 2000. GenSyn – a Java – URL: http://www.netcomsystems.com/
based generator of synthetic Internet traffic link-
ing user behaviour models to real network proto- [Vic98] Vicari, N. 1998. Models of WWW-Traf-
cols. In: Proceedings from ITC Specialist Semi- fic: a Comparison of Pareto and Logarithmic
nar on IP Traffic Measurement, Modeling and Histogram Models. University of Wurzburg,
Management, Monterey, CA, USA. Institute of Computer Science. Research Report
Series. (Report No. 198.)
[Heeg01] Heegaard, P E. 2001. GenSyn – a Java
based generator of synthetic Internet. Submitted [ViEm01] Viken, B Å, Emstad, P J. 2001. Traf-
to Advances in Performance Analysis. fic measurements in IP networks. Telektronikk,
97 (2), 230–244. (This issue.)
[HeHo95] Helvik, B E, Hofseth, L. 1995. Self-
similar traffic and multilevel source models. In: [WTSW97] Willinger, W et al. 1997. Self-simi-
The 12th Nordic Teletraffic Seminar (NTS-12). larity through high-variability: Statistical analy-
Norros, I and Virtamo, J (eds). Espoo, Finland, sis of Ethernet LAN traffic at the source level.
407–420. VTT Information Technology. IEEE/ACM transactions on networking, 5 (1),
71–86.
The EURESCOM project P906-GI QUASI- During the project it was understood that this
MODO (Quality of Service Methodologies and service cannot be offered directly to a user, since
solutions within the service framework: Measur- the guarantees were expressed in terms of Net-
ing, Managing and Charging QoS) tried to work Performance Level (NPL) parameters, i.e.
answer some of these issues. The main idea of delay, jitter and loss. Therefore, a QUASI-aware
offering a reasonable set of quality classes to business model with a role of a Service Provider
users according to their needs and possibilities (SP) added, was introduced.
(e.g. to pay) was investigated by developing
and implementing the QUASI-model. A business model, in general, describes different
roles involved in service provisioning, and their
2 The QUASI-model corresponding relations. By role is assumed a set
The QUASI-model [P906-1] was intended as a of activities a business organisation (or an actor)
Irena Grgic (30) received her
BScEE and MScEE from the simple and practical way to offer several classes can perform in order to produce/consume a ser-
Faculty of Electrical Engineering of service to customers. As a basic assumption, vice. Different roles exchange information and
and Computing at the University it was decided that guarantees could only be have relationships. Some examples of roles are:
of Zagreb, Croatia, in 1996 and
1999, respectively. She is cur- offered within the network under provider’s user, customer, vendor, service provider, net-
rently working at Telenor R&D
as a Research Scientist within
the Future com Business pro-
gramme. Her main areas of
interest include Quality of Ser-
vice issues, Service Level C D
Agreements handling, manage- A B
ment, negotiations, as well as
pricing and charging for IP- User Operator(s) User
based services provided end- Network Network Network
to-end in a multiprovider envi-
ronment. She has participated
in several international projects Characterized Provided Characterized
handling these topics, among
them EURESCOM P906-GI.
irena.grgic@telenor.com
Figure 1 Original QUASI-model physical scenario
Each pair (QC, AC) in the matrix is called a Quality Premium NPL11 NPL12 NPL13
Quality Class Specification (QCS), and its value
corresponds to a Network Performance Level Classes Basic NPL21 NPL22 NPL23
(NPL). As briefly mentioned above, an NPL is a Best Effort – – –
(feasible/small) set of NPPs (e.g. delay, jitter and
loss), each with an objective, i.e. value1) and a
guarantee per parameter that its value will stay
inside the range. By doing so, it is enabled to
relate different quality classes with different In order to implement this kind of model, there Table 2 The practical QUASI-
application categories. In other words, the objec- should be methods for the operator to monitor model
tives of an NPL are the target for the network in the achieved NPL and control the network so
order to provide the desired QC when an appli- that guaranteed NPL is reached.
cation (belonging to an AC) is instantiated. Each
NPL can be seen as a data ‘flow’ within the net- One of the first things to be fixed was selection
work and must be treated/managed accordingly. of the NPL parameters. The project started by
investigating similar architectures. They mostly
Regarding ACs, three options have been chosen: use end-to-end delay of IP packets, IP packet
interactive real-time, non interactive real-time loss ratio, jitter – which may mean variation of
and non real-time. Regarding NPLs, relevant delay between consecutive IP-packets or some-
NPPs chosen are delay, jitter and loss. Regard- thing else, and throughput in some sense. There
ing their values, upper bounds on the values of are definitions for similar parameters in the
those parameters and related guarantees (e.g. % ITU-T Recommendation I.380 and IETF’s IPPM
of time the parameter value is below the thresh- (RFC2330). Why the QUASI-model definitions
old) are specified. are not adopted from either of these is partially
caused by the QUASI-model as the parameters
As input to the experiments (as described in next should be between MRPs and partially since
chapters), a QUASI-model with two QCs (i.e. these standards also define the way to measure
Premium and Basic) and three ACs relative to them, indicating test traffic based measurements.
applications characterised by significantly differ- There was some concern whether measuring low
ent performance requirements (i.e. non real-time, loss ratios with test traffic would be a good solu-
non interactive real-time, interactive real-time) tion and whether test traffic could accurately de-
was used. Combining two QCs with three ACs scribe delay and jitter of user traffic. The reason
results in at most six possible data flows to be why jitter was defined as standard deviation in a
treated differently in the network in order to pre- small time interval and not from the difference
serve the performance requirements of the rela- between two consecutive packets was that, if the
tive services/applications (Table 2). The Pre- measurement is on user traffic, the packets may
mium class of each AC would be treated better belong to different users and we did not want to
than the Basic class. All the remaining traffic not measure per flow. These considerations led to
belonging to these two subscribed quality classes the following definitions for the NPL-parameters:
or exceeding the agreed traffic profile or the
total bandwidth available, is treated as Best Delay: Delay is the average delay over the time
Effort (no NPL values are given for BE). interval of 16 minutes of one-way transfer
The choice of 16 minutes was made because we There were different views concerning the mea-
wanted the measurements in the DiffServ imple- surement of connection blocking – IP does not
mentation to be over the same interval as in the have connections, but still there are flows for
QUASI-IntServ implementation for easier com- each user – and of something similar to through-
parison. In the DiffServ implementation mea- put. Throughput for the QUASI-model is some-
surements were done using CISCO SAA creat- thing the user requests, but if the user does not
ing test traffic. The time between test traffic get it, then we assume that we see some deterio-
packets could not be easily assigned an arbitrary ration in the NPL-parameters and do not need to
fractional value. We set 2 * 8 = 16 meaning measure the achieved throughput. This may or
8 test bursts and 2 minutes between a burst. may not be true, and there is an optional NPL
Each test burst of SAA consisted of a sequence parameter resembling achieved throughput
of packets selected to measure the jitter over called the transfer rate.
10 seconds.
The usual procedure to set quality requirements
The time interval of 16 minutes may seem far to a network is to select the quality parameters,
too long considering burstiness of Internet traf- select some reference connections or scenarios
fic. However, better QoS flows are often and to set target values to the quality parameters.
assumed to be less bursty, data produced by The project did not follow this procedure, but
measurements cannot be very large for storing rather chose to run a number of experiments test-
and processing reasons, and dynamic manage- ing users’ acceptability. A sample table of upper
ment is not expected to follow fast changes in bounds resulting from a set of tests was com-
traffic volumes but to adapt to longer time varia- piled (Table 3).
tions. In each 16 minute time slot the RSVP-
pipes are dimensioned to carry peak traffic and The table contains figures, which can be under-
there is admission control for connections and stood completely after studying the tests as
shaping of packets by RED in the edge routers. described in [P906-1]. A brief explanation is
AC AC 1 AC 2 AC 3
Interactive Non Interactive Non Real-Time
QC Real-Time Real-Time
Loss 2% 1% 2.5 %
Guarantee 99 % 99 % 98 %
In general, the values given in Table 3 are not a QoS monitoring is made using commercial test
recommendation, but the examples of the values traffic generating measurement tools, CISCO
achieved as a result of some tests. SAA and some tools to collect measurement
data (FireHunter or NetSys). The accuracy is
4 Implementation of the good for delay and jitter, but very small loss
QUASI-model probabilities are difficult to measure accurately.
The next step was to implement the QUASI- Test traffic and user traffic may not be treated
model monitoring and control mechanisms. equally, e.g. if the user data flow is routed differ-
Several techniques can be used to implement the ently. The traffic management part of the Diff-
QUASI-model. The project focused on two tech- Serv implementation, notably updating the
niques: IETF’s DiffServ and IETF’s IntServ. We access lists and rate limiters and their tolerances,
did not consider MPLS – though it may be very needs further elaboration.
interesting – since it was investigated in other
EURESCOM projects. We also discarded some The problem of the DiffServ in the QUASI-
more complicated QoS architectures (XRM, model was basically a requirement that a sub-
HeiRat) as they were rather far from the basic scriber of better quality class should also receive
ideas of the QUASI-model, see [P906-3]. better quality, for instance for videotelephony.
One way this could be solved is to extend the
4.1 DiffServ Concerns application protocols, like SIP, so that they keep
In this paper we will not describe the DiffServ knowledge of current connections and insert into
based implementation, but it is documented in access lists all parties of a connection. Such a
[P906-4]. It supports quality classes by setting solution is outside the QUASI-model as it
the Type of Service (TOS) field in the packets. requires improved application protocols. The
A user selects a desired service quality for his way this problem was solved in the DiffServ
application by subscribing to it in a WWW-page. implementation of the QUASI-model was to
This information is inserted to access lists of all have all users of quality classes better than best
edge routers. The edge router where the user’s effort in access lists of all edge routers. This
access network is connected marks the TOS- solution is not easily scalable. Another scalabil-
field in the packets. The edge router gets the ity problem is the selected way of making class
mapping information from the access lists and differentiation by carefully adjusting rate lim-
therefore the solution also supports the ability to iters to drop more packets from classes with Figure 3 Laboratory test bed
Linux PC Sun
Workstation
MRP A MRP B
MRP MRP
daemon daemon
process process
Figure 4 Architecture of
QUASI-IntServ software User network A Provider network User network B
End system
Physical connection
QoS Window
Router,
User´s Firewall,
Network Proxies
QC/AC Selection
change it at any time. The MPR daemon process users and active connections. There is a simple
measures the NPL parameters and sends them admission control, but it is currently rough.
every 16 minutes to the Management server
through a TCP socket interface. The Manage- Figure 5 shows the structure of the MRP dae-
ment server receives the measured values, puts mon. IP-packets come from a user’s application
them to a file for the charging application, and without any quality markings. When these pack-
calculates with some algorithm new reservations ets enter the MRP, in Figure 5 the Access Node,
between the MRPs and starts scripts in the the MRP daemon looks at a table where for each
MRPs to refresh and to modify the RSVP reser- registered user are kept the assignments of IP
vations. packets with given protocol and port number to
an AC/QC pair. The AC/QC pair is mapped one-
When the network is initialised, RSVP reserva- to-one to a ClassID, which is the quality class
tions are made between the MRPs. As band- identifier that the technical solution understands.
width in a practical IP-network is limited and The packet is marked with the ClassID. The
traffic variations could be rather high, we did ClassID also gives the MRP number because
not set up one-to-one reservations between each of the way the ClassIDs are assigned: they are
MRP for each class but instead configured each unique to the extent that a receiving MRP can
MRP to accept up to a given limit traffic coming know which MRP sent a packet with a given
from all other MRPs. In the laboratory network ClassID. If there is no entry for a given user or
this difference cannot be seen as there are two (protocol, port)-pair, no marking is done, and the
MRPs only. After each 16 minute time slot the packet will be best effort.
RSVP reservations are modified by the manage-
ment server based on the measured NPL values. The MRP daemon also sets a time stamp into the
In the implementation the management server IP-packet. This time stamp enables calculation
collects the measurement values from each MRP of the delay and jitter from a short term delay
every 16 minutes, but to minimise management variation. We need to time-synchronise the
traffic we could have sent a trap only if the NPL MRPs with some protocol like NTP (Network
value measurements show exceptionally bad or Time Protocol). As all MRPs are in one opera-
good results. There is a small protocol guaran- tor’s network, we can assume that NTP can be
teeing that a user of a better class will also used and is sufficiently accurate: 10 ms is a suf-
receive good quality, not only be able to send it: ficient accuracy to the QUASI-model, and that
the receiving MRP stores the class of each exist- can be reached.
ing connection to a table. Provided that there is
a response or reverse flow which sends the cor- A packet with a given ClassID is mapped to a
rect receiver’s class to the sender’s MRP, the correct RSVP reservation selected by the routing
received quality will also be good. mechanism. The reservations are already set in
the beginning and modified in a slow pace with
User traffic must be accepted to a reserved pipe updates every 16 minutes, they are not made
by the MRP, which then must keep tables of when a user starts his connection. This is for
scalability reasons.
MRP Dest
Address Transport Source Dest
Level Port Port
If we were using IPv6, we could set the flowID to separate other UDP traffic and treat the re-
in the packet and identify the ClassID with the maining part as RTP traffic and give it good
flowID. If we were using only Linux routers, quality.
we could decode in all routers the flowID from
the ClassID in the IP-packet. As we are using The QUASIMODO project made a number of
CISCO routers and IP v4, there is a problem: tests to see if the QUASI-IntServ implementa-
CISCO-routers decode the flow from an address tion works. The test network is very simple hav-
in IP version 4. In QUASI-IntServ RSVP estab- ing only two MRPs, and we cannot say if the
lishes a pipe between two MRPs and the core software actually works in a larger network. It
routers use the address of the user traffic to was shown that in the test network it performed
decide which flow the packet uses. We had to fine, and the dynamic bandwidth allocation
replace the original address by an MRP address made by the Management server could adopt the
and store the original address into the padding network to changes in traffic load within the
field. We use the padding field also for storing time scale of the bandwidth modifications.
the time stamp and the Class ID. In the receiving
MRP the original address is restored. This is One goal of the QUASI-model was to provide
made with NAT and surprisingly it is rather fast. several classes which have clear differences in
Figure 6 shows the content of the padding field. quality. In the QUASI-IntServ implementation
There are the necessary time stamp and ClassID, RSVP reservations guarantee the bandwidth
but for IPv4 we have also stored the original allocations for AC/QC. They are similar to Diff-
addresses there. The receiving MRP restores Serv in providing quality for an aggregate of
the original addresses. connections, not for an individual user’s flow.
They are a bit better than DiffServ because if the
The QoS Software converts the QUASI-model core network changes, the RSVP reservations
Class to network class or ClassID (CID). The IP- are rerouted. We should not have the problem
packet is marked by setting the CID and the with congestion in the core network. However,
packet is sent forward. If the (protocol, port)-pair do we see class differentiation in this model?
is not in the table, no marking is done.
There is a reserved bandwidth for each RSVP
In the implemented version, the user can access pipe and the routers respect the reservations. If
the service table and select the AC/QC to his the offered traffic to a pipe does not exceed the
application. A natural way to do this in a real reserved bandwidth, we will get very good qual-
system is to use a WWW-page for user selection ity for all classes. Users of flexible sources
of the AC/QC, as was done in the DiffServ im- (TCP) see the effect of the bandwidth as data
plementation. Mapping applications to AC/QC flows slower if there is less bandwidth. Users of
is not an easy matter. We have mapped applica- unflexible sources (UDP) would see either good
tions using the port number and the IP-address quality or bad quality depending on the admis-
of packets coming to the MRP. There are special sion control mechanism. We could overdimen-
cases that have not been treated: Mbone is IP- sion worse quality pipes by admitting more traf-
on-IP. It is currently not supported. Separating fic than could be carried with good quality, or
RTP traffic from other UDP traffic, such as we could intentionally drop packets just to make
DNS, is not treated. The problem is that RTP the service differentiation. For QUASI-IntServ
does not have a protocol number, nor does it it may be better to use blocking in the following
have a well-known port number. It may be best way. Best effort class is worse than NPL-classes
Av. Delay Av. Jitter Av. Delay Av. Jitter MRP A MRP B
(ms) (ms) (ms) (ms)
Charging Configuration
5.3 Example Test Charging Policy Charging Layer
Seven tests were performed for the measurement (e.g. charging formula)
Charging specific
and management methods of the QUASI-model. requirements
Accounting data
We only present one test here, the test 7 in
[P906-5] made by Denis Karpov and Imad Accounting Configuration
Accounting Policy Accounting Layer
Ossaily. This test would verify whether the (e.g. collector address)
dynamic re-allocation of RSVP reservations Accounting
requirements
based on NPL measurements works in the net- Collected data
2) In this section, the term “network service” is used to refer to either end-user service or network
transport service.
3) Note that this component is sometimes in literature referred to as the access fee/component.
Equation (2) is rather general and can describe a In the case of best-effort services, the effective
wide range of the charging schemes that are pre- bandwidth of a stream reduces to its mean rate.
sent in today’s telecommunications market, for This can be understood as follows: For best-
both guaranteed services and best-effort ser- effort services, there are no performance guaran-
vices. Equation (1) can be further generalised by tees. The only requirement is that traffic eventu-
including time-of-day pricing, which allows ally reaches its destination. Considering a single
prices to depend on the specific time-of-day the link, the latter requirement translates to a stabil-
service is delivered. The rationale for such a ity condition for the link that can be written as
charging scheme is to provide incentives for
users to move traffic which they value less to ∑ mi ≤ C ,
off-peak hours (for which the prices are lower where mi is the mean rate of a traffic stream i
compared to on-peak hours), hence achieving a and C is the link capacity. Hence, the mean rate
more uniform utilisation of network resources is the appropriate measure of resource usage for
throughout the day. best-effort services.
7.1 Charging for Network In the case of guaranteed services, the actual
Connectivity Services effective bandwidth of a traffic stream is a com-
In addition to recovering the costs for service plex function, and one usually considers bounds
provisioning and generating revenue, charging of the actual effective bandwidth that are simpler
may play an important role for controlling re- and involve easy to measure quantities. In the
source usage. When demand is always less than case where the only measure of resource usage
supply, the controlling function of charging is is the mean rate, the bound can be written as
not so important. On the contrary, if demand B(x,m), where x includes the NPL and traffic
exceeds supply, charging can be used as an profile, and m is the mean rate of stream. It can
effective mechanism for controlling how re- be shown that this bound is a concave function
sources are used, and help the network achieve of the mean rate m [CA$hMAN].
efficient and stable operation. In such cases, in
order to provide incentives for users to use the The concavity of the effective bandwidth bound
network according to their actual needs and to is large when the peak rate is high relative to the
charge them in a fair way, charges need to take network capacity or when the QoS guarantees
some account of resource usage. Furthermore, are tight (e.g. small delay and small loss proba-
by setting prices appropriately, usage-based bility). This concavity property can be used to
charging can generate the amount of revenue provide interesting incentives to the users. On
necessary for expanding the network to meet the other hand, for best-effort services the curve
the excess demand. becomes linear, i.e. the effective bandwidth is
equal to the mean rate of the stream, as dis-
The issues of measurement methods for the cussed above.
resource usage in networks supporting bursty
traffic and different ways of constructing charg- More complex bounds that depend on more
ing schemes using these measurements, are dis- detailed statistics than the mean rate would
cussed next. Note that the discussion refers to result in higher accuracy. However, investiga-
the usage component of a user’s charge, which tions and trials have shown that higher complex-
is associated with resource consumption. The ity, hence greater difficulty to understand charg-
schemes discussed here are appropriate for ing schemes based on such bounds, can easily
charging wholesale transport services, e.g. a outweigh the advantage of higher accuracy
service provided by NP to SP. [CA$hMAN].
pB⎛ x, ⎞ T ,
V Recall the business model described in Chapter
⎝ T⎠ 2, where the SP offers a different quality class to
where T is the duration and V is the transferred the user according to the applications he might
volume. A disadvantage of such an approach is use. Hence, the SP “hides” from end users the
that charges are not linear functions of the mea- low level details of the QoS parameters and their
surements of duration and volume, thus making corresponding values. In the same sense, an SP
it difficult for users to understand. may wish to provide very simple tariffs, even if
they lose some, or even all, the structural charac-
Interestingly enough [CA$hMAN, SoKe97], teristics of the transport level charges. The moti-
based on the effective bandwidth bound as a vation for that might be to attract the customers
measure of resource usage, one can construct a by having a very simple charging scheme, e.g.
charging scheme linear in measurements of flat-rate charging, or because the transport level
duration and volume that approximate the previ- charges are a small percentage of the charges for
ous charge. This charging scheme is presented the service itself (e.g. the content charge).
to the users as a trade-off between a duration Indeed, economic and marketing issues may
charge and a volume charge. In particular, given have a significant effect on both the structure of
his NPL and traffic profile, the user is offered a the charging scheme for end services and the
set of charging parameters (pT(x), pV(x)) to corresponding prices.
choose from. The parameters pT(x), pV(x) repre-
sent a duration and a volume charge, respec- As mentioned before, transport level charges at
tively. The usage charge will be the SP-NP interface will influence service level
charges. Consider the following examples:
Usage_charge = pT(x)T + pV(x)V
• For an SP offering a video playback service,
In practice, for a given SLA, the provider can the characteristics and requirements (e.g. in
offer a small number of tariff pairs. terms of bandwidth) for a particular video are
known in advance. Indeed, these requirements
A number of additions/modifications can be depend not only on the content but also on the
made to the basic approach described above. If resolution of the video encoding. Knowledge
the service is connection oriented, then one can of the requirements will in turn enable an SP
include in the usage charge a connection set-up to estimate the corresponding charges of the
fee pc [SoKe97]. This fee accounts for the sig- transport level services required by the net-
nalling resources required to set up the connec- work provider for the delivery of the particu-
tion and the state that needs to be maintained lar video. Of course, different video streams
throughout the duration of the connection. In may have different transport level require-
addition, a discount for higher volume connec- ments. The service provider, however, may
tions can be incorporated in the scheme. select to offer simple duration-based charges
with the same prices for all video streams
In the case a user generates and injects the traffic which, when averaged over all connections of
that is not conformant (exceeds the conditions) many users, will absorb the varying transport
with the traffic profile agreed in the SLA be- level charges.
tween the user and the provider, various reac-
tions can be initiated. One such reaction is to • For an SP offering IP telephony or videocon-
mark such traffic for dropping, and charge it ferencing services, the characteristics and
at the same rate as best-effort. requirements for a particular session are not
4) An issue we do not discuss here is which system (accounting or QoS monitoring) is responsible for
collecting such measurements.
Another observation is that there are cases when [P906-1] EURESCOM P906-QUASIMODO:
changes in traffic volume are predictable, like Deliverable 1 – Offering Quality Classes to end
the traffic variation during the day to a large users. Heidelberg, EURESCOM, May 2000.
extent is. If volume changes are predictable and
there are operators offering flat prices and others [P906-2] EURESCOM P906-QUASIMODO:
offering usage based prices, the ISP may shift Project Report 2 – Methodologies and tools for
traffic on high traffic times to the flat rate and on QoS measurement and management. Heidelberg,
low traffic times to the usage based rate. These EURESCOM, December 2000.
may influence the viability of a particular pric-
ing scheme, and there are also countermeasures. [P906-3] EURESCOM P906-QUASIMODO
In this example the operator may require that Technical Information 1 – Survey of existing
capacity is bought only for time units of a cer- methodologies and tools for QoS measurement
tain duration, that predictability of traffic cannot and management. Heidelberg, EURESCOM,
be used by an ISP for unwanted optimising pur- December 2000.
poses.
[P906-4] EURESCOM P906-QUASIMODO
This paper described some results of the Technical Information 2: QUASI-model Imple-
QUASIMODO-project, with emphasis on the mentation. Heidelberg, EURESCOM, December
parts where the authors of the paper worked. The 2000.
QUASI-model implementations for measure-
ment and management contain measurements for [P906-5] EURESCOM P906-QUASIMODO
QoS monitoring, mapping users’ (QC, AC) Technical Information 3: Experimental evalua-
selections to DiffServ and IntServ architectures, tion of QoS measurement and management. Hei-
and some additional QoS management methods. delberg, EURESCOM, December 2000.
The charging-related work in the QUASI-
MODO-project included both generic charging [P906-6] EURESCOM P906-QUASIMODO
and accounting model, as well as two possible Technical Information 4 – Key QoS charging
billing system solutions. Here, the theoretical issues. Heidelberg, EURESCOM, 2001.
findings have been stressed, while more details
on the particular implementations can be found [P906-7] EURESCOM P906-QUASIMODO
in [P906-7], [P906-8]. The linking between the Deliverable 3 – Methodologies and policies for
measurement and management implementations QoS charging. Heidelberg, EURESCOM, Febru-
and the billing systems was not demonstrated; it ary, 2001.
is realised by the possibility of obtaining NPL-
measurements to the charging system. [P906-8] EURESCOM P906-QUASIMODO
Technical Information 6 – Summary of QUASI-
Acknowledgement MODO Findings on QoS. EURESCOM, Heidel-
Although this paper represents the view of the berg, February 2001.
authors, this way we would like to thank all the
P906-GI participants for the interesting work [SoKe97] Songhurst, D, Kelly, F. 1997. Charg-
and discussions undertaken. A special thanks ing Schemes for Multiservice Networks. In:
goes to Mr. Imad Ossaily and Mr. Denis Karpov, Proc. ITC-15. Ramaswami, V, Wirth, P E (eds).
who worked with the QUASI IntServ implemen- Amsterdam, Elsevier.
tation. Several figures are from the QUASI-
MODO deliverables. http://www.eurescom.de/Public/Projects/p900-
series/P906/P906.htm
Although the IP-based networks are said to have inherent features that differ from the “traditional”
telecommunication networks, there are quite a lot of similarities. This paper points out the similarities
by elaborating on generic capabilities being present in all wide area networks. However, the IP
“specifics” are also included. These are more directed on routing and the use of IP in relation with other
protocols and systems. In particular, relations with optics, mobility and multicasting are discussed. The
Web and support of the Virtual Private Network and telephony services are also described.
However, it should be observed that much work Within certain limits, one may say that arriving
is being carried out to find efficient configura- at more predictable services is one of the main
tions and mechanisms built around IP. This can goals of the IP-related work. This is also
be referred to as IP++, including the portfolio of addressed by the IP++, and addressed in accom-
functionality promoted, e.g. for routing, resource panying papers of this Telektronikk issue. Pre-
handling, traffic control, multicast, and so forth. dictability is not to be understood in a restricted
SLA
IP++ intserv
difserv
cost efficient
constraint-based
traffic characterisation routing
infrastructure
Figure 1 IP ++ as the common “glue” for carrying traffic flows from different applications
over different infrastructure types
stratum
service
logic/data
solution/
implementation router/
switch
transport/
domain line/cable
management plane
layers (strata)
• User plane – to convey the user information An access line may be dedicated to a single cus-
(information from higher layers); tomer, resulting in relatively low average utilisa-
tion (e.g. for a residential customer). Hence,
• Control plane – to control traffic flows and commonly a significant fraction of the overall
resource configurations; cost is associated with the access network.
Shortening the dedicated capacity introducing
• Management plane – to manage network multiplexing/concentrating equipment is often
resources, including fault management, con- used seeking to reduce the overall cost, see Fig-
figuration management, accounting manage- ure 5. For several networks the relative cost of
ment, performance management, security the access portion is fairly high, commonly in
management. the area of 60 % – 80 % for public networks,
although this depends on the solutions used.
Any larger network would typically have func-
tions belonging to all these planes, although On the IP level the access network commonly
the way functions are implemented varies. An looks like a tree or a star network, with the edge
objective is to find efficient complete solutions router located at the root (or in the centre). How-
and combinations of functions that incorporate ever, on the transmission layer ring structures
all needed functionality. could be used, e.g. for dependability arguments.
In order to locate where to direct the informa- Looking at the access link for a single user, the
tion, addresses and routing functionality have to capacity of the links should be according to the
be present. So, addresses are used for identifying maximum demand from that user. However, the
a unit/interface, while routing is used to find peak load (bit rate) may very well be rather high Figure 4 Schematic
how to direct the information towards the compared to the average load, e.g. during the illustration of
address (and the unit/interface it represents). day. An analogy is found in the telephony net- interconnected domains
2.2 Domains
Domains are commonly identified according to
some kind of geographical arrangements. That
is, separate domains are physically dispersed,
and likely to be interconnected at certain points.
domain A domain B domain C domain D
When traffic has to traverse a number of
domains, this can be schematically depicted as traffic flow
= interconnection points
a chain, see Figure 4. Interconnection points are
ADSL
edge
router
= concentrator/multiplexer
work were the access link is in use during a Providing efficient traffic handling implies that
phone conversation, but idle most of the time. appropriate solutions must be available in all
Installing a capacity much higher than the aver- the domains involved. However, for customer
age load is a reason for the rather high cost of equipment, it is usually expected that the cost of
the access network. providing capacity is relatively low, implying
that capacity is added in case a performance
As many types of applications and users will be problem emerges. For other domains mecha-
connected, a range of access capacities could be nisms for differentiated handling of services
requested. Commonly, however, rather fixed (and traffic flows) seem to be gradually intro-
capacities are used, e.g. offering Asymmetric duced. In addition to differentiating between ser-
Digital Subscriber Line (ADSL) downstream vices, differentiating between customers would
rates as 384, 768 and 1024 kbit/s. This also con- also be likely (although this could again be seen
tributes to the potential capacity of the access as a kind of service differentiation).
network usually being poorly utilised.
When looking for potential performance bottle-
A core domain usually carries traffic from necks it is essential to include the end systems
a greater set of customers resulting in higher as well as the processing capabilities in all
capacity links and routers. A certain averaging domains. This means that efficiency of protocol
effect of the traffic, e.g. during the day is also software (as well as software of other traffic
commonly observed, for example related to the handling mechanisms) is a pivotal point. As the
different customer types and use of services. capacity evolution of transmission outpaces the
computer capacity growth, the system designers
The edge of the core network usually has a num- may rather concentrate on achieving high trans-
ber of features related to individual users, like fer speed (putting data on the output interface)
access lists and monitoring mechanisms. Edge than optimised utilisation of the transmission
routers will then implement such features. bandwidth when seen from an end system point
Towards other operators, border routers, possi- of view. The network operator view may be
bly with similar functionality can be present. more balanced, however, as a huge number of
traffic flows will be present.
2.3 Layering
Similar to the OSI model (Open System Inter-
connection), the Internet-related protocols can
Voice/video also be depicted as a hierarchy, see Figure 6.
codec
Telnet FTP HTTP Routing Numerous protocols could be used below IP,
protocols like Asynchronous Transfer Mode (ATM) and
TCP UDP Point-to-Point Protocol (PPP). A number of pro-
layers ICMP tocols could also be used in the transport layer,
IP although Transmission Control Protocol (TCP)
and User Datagram Protocol (UDP) are amongst
Figure 6 Layers and example ATM the most popular ones.
of protocols related to IP PPP
IP IP IP
routing/forwarding
Network Network
Interface Network Interface Interface
User data Transport layer header IP packet header Link level header
A principle behind the layering is that a layer Figure 8 Layers for TIPHON,
entity at a destination sees the same object/mes- TIPHON voice QoS class user a telephony service, from
sage as sent by the corresponding layer entity in [TS329-3]
the source as illustrated in Figure 7.
Jitter, buffer delay, overall one-way application
An application interacts with a transport proto- delay, frame loss, etc.
col. The application chooses the format of data
transfer. Two examples are stream (a longer
flow of information) and transaction (an ex- Packet loss, mean delay, transport
delay variation
change of a single information unit). In the
transport layer an association with the transport
layer at the destination is established (frequently
called end-to-end, although when interworking
units are involved the user information could
even be carried further before the final destina-
tion is reached). The transport protocol divides one argument for investigating use of optics in
the data into units, sometimes called segments, closer connection with IP (although the general
and transfers these units to the IP layer. In the IP traffic growth and price trends for optics also
layer, these data units are enveloped by the IP advocate this).
header information and transferred to the net-
work interface. In a terminal/host that interface One of the means to step up the traffic handling
would be interacting with hardware drivers. capability of the IP network is to develop routers
with higher throughput. Some means undertaken
Even QoS parameters can be assigned to layers are:
as illustrated in Figure 8. This implies that dif-
ferent aspects can be discussed on certain layers, • Separate forwarding and route determination
for example allowing for “hiding” characteristics and make the routing software leaner;
of lower layers. However, it also raises the need
for finding the mapping between parameter val- • Introduce interfaces with higher transfer rates,
ues on the different layers. When fairly generic increased switching speed;
layers are used, such a mapping may not be
straightforward, balancing the requirements of • Introduce hardware adapted solutions (e.g.
the upper layers with efficient utilisation of through application-specific integrated cir-
resources seen by layers below. cuits, ASICs).
• Indirect interface with out-of-band IP control These models refer to a certain degree of imple-
channel. The channel may be running between mentation complexity; the overlay being the
management systems or servers; least complex one for near-term deployment and
the peer model the most complex one. As each
• Provisioned interface involving manual opera- of the models has its advantages, an evolution
tions. path for IP over optical network may be seen.
Two service models are outlined in The migration path described in [ID_IPoptfw] is
[ID_IPoptfw]: to start with the simpler functionality, meaning
the domain service model with overlay intercon-
These can be organised in a hierarchical manner Motivations for combining solutions for MPLS,
as shown in Figure 11 and corresponding labels in particular related to Traffic Engineering, and
and Label Switched Paths (LSPs) defined. Then mechanisms for control plane in OXCs are
an LSP that starts and ends on a packet-switch described in [ID_MPLSoptte]:
• To allow the use of uniform semantics for net- • Infrastructure used for propagating the control
work management and operation control and information;
hybrid networks consisting of OXCs and label
switching routers (LSRs). • Computing constrained paths fulfilling perfor-
mance and policy requirements;
A particular emphasis may be placed on the
support of various protection and restoration • Domain specific requirements for establishing
schemes. optical channels and enhancements for MPLS
signalling protocols for addressing these
3.3 Traffic Engineering Topics requirements.
The main components of the MPLS TE control
plane model include (ref. [Jens01]): The vertical dimension includes concerns when
porting MPLS control plane software onto an
• Discovery of resources; OXC. A potential architecture of an OXC is also
given in [ID_MPLSoptte], see Figure 12.
• Dissemination of state information (similar to
abilities of routing protocols); Looking closer into an OTN as described by
ITU-T, it should be noted that it is itself divided
• Selection of paths (similar to constraint-based into layers, including:
routing);
• an optical channel (OCh) layer network;
• Management of paths (label distribution, path • an optical multiplex section (OMS) layer net-
placement, path maintenance, path revoca- work;
tion). • an optical transmission section (OTS) layer
network.
Several of the capabilities can be derived from
MPLS by replacing “traffic trunk” with “optical 4 Mobility
channel”.
4.1 Mobile Routing – Mobile IP
As users and hosts may be moving around and
still want to be connected to a network as if they
were “at home”, the network has to be capable
of supporting this. One issue is mobile routing
where a mobile user (mobile node) may move
OXC with MPLS control plane
while still having a predefined home location
(where a Home Agent, HA, is located).
MPLS control plane
• Route optimisation: the correspondent node The other part may ask for a different behaviour,
can send packets to the mobile node without implying that the TCP functions should be
passing through the home agent (avoiding tri- changed. In this case the base station has to ter-
angular routing). minate both TCP connections, meaning that end-
to-end connection and acknowledgements are
• Filtering: allowing the mobile node to use its not present.
care-of-address in the source address, any fil-
tering in intermediate routers may be passed Another suggestion is not to split the TCP con-
more easily (compared to when a “foreign” nection, but to introduce an agent into the base
address would be used). The home address station. This agent will examine the TCP seg-
would be carried in a destination header ments transmitted on the air interface and
option. retransmit the segment if an acknowledgement
has not been received within a short delay. This
• Foreign Agents not needed: by using IPv6 fea- is to “hide” those losses to the original sender,
tures like neighbour discovery and address which after a relatively longer delay will retrans-
autoconfiguration, the FAs are eliminated. mit the packets. In case there is a high bit error
ratio on the air interface, the retransmission
• Security: IPv6 would use IPSec for security timer in the original sender may expire, after all
requirements. resulting in little gain. This solution could be
further extended by introducing selective re-
• IPv6 routing headers: introducing the routing transmissions, suppression of acknowledgement
header option, IP tunnelling could be obsolete, duplicates and so forth.
reducing the overhead.
Another issue is to deal with handovers. Two
Mobile IP originally primarily addressed factors are that the handovers may take some
“slowly” moving entities, which is likely to time, and that the effective throughput may be
be combined with other features for so-called quite different on the interfaces before and after
micro-mobility. Some of these are surveyed in the handover. An example of the latter is hand-
[Pain01]. over from a LAN to a GSM network, e.g. for an
ongoing file transfer. Hence, combining wireless
4.2 TCP and Wireless and transport protocols may imply additional
A transport protocol like TCP should in princi- challenges.
ple be independent of the underlying layers.
However, considering the congestion control 5 Multicast
algorithm used in TCP it turns out to be sensitive Multicast, as the term says, is traffic flowing
to the characteristics of those layers. For in- from one to many users at the same time. For
stance, when a segment is lost TCP assumes this such applications the use of unicast, implying
is due to network congestion and reduces its rate sending the same information in parallel to the
Figure 14 Dividing into of transmission. When a system introducing high receivers, would in most cases be rather ineffi-
several TCP connections bit error rate is used, a segment could very well cient.
A source tree means that each source has its tree. i) Source tree
When a number of sources share the distribution
tree, this is naturally referred to as a shared tree.
In the shared distribution tree, the traffic flows
from all sources must go to the shared tree root,
from which the information is distributed. Multi-
cast sessions are identified by a special multicast
receivers
address and all packets from the source to the
receivers carry this address.
source A source B
In the following some multicast protocols are
described.
6.1 Authorisation Framework All these entities may interact in many different
Authorisation is the function of deciding whether ways depending on the type of service and sce-
a particular right can be granted to the presenter nario. In some cases the user may send the ser-
of a particular credential; for instance, if a given vice requests to the AAA server, while in others
user is allowed to use a certain resource. the request is sent to the service element (e.g.
dial-in access). Also, it is possible for the user to
The framework identifies the conceptual entities get a ticket or certificate from the AAA server to
that may be participants in an authorisation pro- include it in the request to the service element.
cedure (see Figure 16):
One view of an authorisation is that it is the
1. A User who wants to access the service or result of evaluating policies of each organisation
resource; that has an interest in the authorisation decision.
The authorisation process can be modelled in
Figure 16 Entities in the 2. A User Home Organisation (UHO) that has an terms of the Policy Framework [Jens01a]. AAA
authorisation framework agreement with the user and checks whether servers may act as Policy Retrieval Points (PRP)
and Policy Decision Points (PDP). Service ele-
ments correspond to Policy Enforcement Points
(PEP). Both entities are also Policy Information
Points (PIP) containing information needed for
User Home policy evaluation, which can be accessed as Pol-
= agreement Organisation
icy Information Base (PIB). The user may also
be a PRP, a PIP and a PDP if policy is used to
Service Provider request the service. These are described in
[Jens01a].
AAA
User
server
In many applications, authorisation results in
service establishing an ongoing service which is called
element a session. Each of the AAA servers involved in
The DNS is used for translating the server name Some browsers support the use of local disk to
to the corresponding IP address. This allows the cache pages that have been fetched. Then, before
Another aspect is to balance the loads among • Call set-up: “ringing”, establishment of call
the servers, e.g. to speed up the delivery of Web- parameters at both called and calling party;
pages. How to balance the load in a distributed
environment is a complex matter; one way being • Call handling: including transfer and release
to introduce a load balancer which can be imple- of calls.
mented in different terminals/servers.
SIP is part of the multimedia data and control
A proxy sever can be seen as a gateway having architecture as depicted in Figure 31. RSVP is
multiple functions. One function can be that it used for reserving network resources, the real-
accepts HTTP requests and translates these into time transport protocol (RTP) is used for trans-
other protocols, e.g. FTP. Another function is porting real-time data and providing feedback,
that the proxy server may implement a cache. A the real-time streaming protocol (RTSP) is used
third function is access control, both for requests for controlling delivery of streaming media, the
going out to the rest of the networks and for session announcement protocol (SAP) for adver-
responses that arrive, i.e. a firewall function. tising multimedia sessions via multicast, and the
Hence, a proxy is commonly present for a com- session description protocol (SDP) for describ-
pany network supporting Web browsing. ing multimedia sessions. However, it is stated
that SIP does not depend on either of these.
7.4 Supporting Telephony
The Real-Time Protocol (RTP) has been men-
7.4.1 Protocols and Servers tioned, which has emerged as a commonly used
The Session Initiation Protocol (SIP) is a proto- protocol for real-time traffic flows in IP-based
col elaborated by IETF activities used for estab- networks. RTP is a protocol that provides identi-
lishing, modifying and releasing real-time calls fication of media type and synchronisation infor-
and conferences over IP-based networks. Each mation (time stamps). These allow individual
session may include different traffic flows, such packets to be reconstructed by a receiver. Addi-
as audio and video. SIP is a text-based and gen- tional information is needed to support flow con-
eral-purpose protocol. An alternative is to use trol and management of the traffic flows. Here
the H.323 architecture as described by ITU-T. the RTP Control Protocol (RTCP) has been
v = 0
o = tom.jones 3546342323 6434236545 IN IP4 telenor.com
s = Session SDP
e = tom.jones@telenor.com INVITE sip:cliff.rich@newco.com SIP/2.0
e = IN IP4 193.291.192 Via: SIP/2.0.UDP mach.tel:5060
t = 00 From: Tom Jones <sip:tom.jones@telenor.com>
m = audio 9150 RTP/AVP 0 To: Cliff Rich <sip:cliff.rich@newco.com>
a = rtpmap:0 PCMU/8000 Call-ID: 10000001@telenor.com
CSeq: 1 INVITE
Subject: Call
Contact: Tom Jones <sip:tom.jones@telenor.com>
Content-Type: application/sdp
Content-Length: 160
SDP description SIP header UDP header IP header Figure 24 Example of SIP
message
Six SIP messages have been specified: i) invite – • Registration servers: A registrar is a server
to begin an SIP dialogue; ii) ack – to respond to that accepts Register requests. A registrar is
an SIP request; iii) cancel – to reject the session; typically co-located with a proxy or redirect
iv) bye – to disconnect a session after it has been server and may offer location services.
established; v) options – to discover user’s
response without actually sending an invitation; • Redirect servers: A redirect server accepts a
and vi) register – to register by a location data SIP request, maps the address into zero or
base. In reply to a SIP message a response is more new addresses and returns these add-
generated, of which there are six types: 1xx resses to the client. Unlike a proxy server, it
informational, 2xx success, 3xx redirection, 4xx does not initiate its own SP request. Unlike a
client error, 5xx server error, 6xx global failure. user agent server, it does not accept calls.
These response messages follow a format similar
to the ones used for HTTP. • User agent: A user agent is an application that
contains both a user agent client (initiate a ses-
The format of SIP messages comprises two sion) and a user agent server (receives a ses-
parts; a header consisting of SIP fields, and a sion request from the network)
body. Header fields contain parameters such
as the identity of the caller, the identity of the Here, a client is an application program that
receiver, a unique call identity, sequence num- sends SIP requests. The client may or may not
ber, etc.; see Figure 24. The body typically uses interact directly with a human user. A server is
the Session Description Protocol (SDP) to an application program that accepts requests in
describe the session. SIP messages are coded in order to serve requests and sends back responses
plain text. to those requests.
A short form (compact form) can be used to Every SIP user has a SIP URL. They are similar
identify the fields, using a single letter coding to e-mail addresses, for instance
(c – Content-Type; e – Content-Encoding; f – sip:tom.jones@telenor.com. There is a registra-
From; i – Call-ID; m – Contact; l – Content tion server within a user’s home domain. When
Length; s – Subject; t – To; v – Via). a user is started, it sends a register message to
this registration server which typically contains
In order to avoid that the calling user has to the URL of the user, that user’s actual terminal
Figure 25 Example of know the whereabouts of the called user in address, port number, transport protocol (TCP,
registration and set-up advance, a number of elements are included in UDP), time stamp for duration of registration.
using SIP the SIP architecture: The registration server authenticates the user and
inserts the mapping between URL and the termi-
nal address in the location data base. This allows
users to be reached irrespective of their actual
point of contact, similar to mobile IP.
calling user SIP server called user
So, when a calling user wants to reach the called
register user, assistance of a proxy or redirect server.
registration register 100 ok Such servers would request mapping from URL
phase 100 ok
to terminal address from the location server.
Naturally, when the users already know the ter-
invite minal addresses, such requests are not needed.
invite
180 ringing 180 ringing
A simplified message sequence chart is depicted
call set-up 200 ok 200 ok
phase in Figure 25.
ack
ack SIP is a protocol that deals with session initia-
tion and does not explicitly describe how
As shown, SIP may use UDP (unlike HTTP). • Effects of packets being delayed;
Then, several SIP messages can be put into the
same UDP message. When TCP is used, several • Packets arriving in a different order at the
SIP transactions can be carried on the same TCP receiver than they were sent;
connection. If the server leaves the TCP connec-
tion open after returning the reply, the client • Multiple traffic flows and different types of
may use the connection for later SIP messages traffic flows;
(or even other protocols, like HTTP).
• Monitoring and flow control.
A similar architecture has also been described
for H.323. There are multiple ways of implementing the
voice transfer service, in the network, but per-
SDP
distribution RTP/ reliable
RSVP
control RTCP multicast
SAP SIP HTTP SMTP
IP and IP multicast
• Silence suppression;
• Multiplexing speech samples from several Considering the range of customers connected,
conversations into the same set of packets; some more advanced than others, there will also
be a need for tailoring the service portfolios.
• Compressing headers, e.g. for the combination Some customers may well be more or less self-
of IP/UDP/RTP; provided (self-service), while others may want
more “customer nursing” packages. This again
• Suppressing silence periods. asks for differentiation and adaptation. A particu-
lar challenge is to arrive at fast, accurate and effi-
8 Concluding Remarks cient ways of implementing such mechanisms in
Facing the dynamic environment, a network the operator’s organisation and systems.
operator looks for a general-purpose network.
Most often these days, this network is IP-based. Further supporting mobility implies the need to
However, is should also be “future proof” in the decouple the static home address of each termi-
sense that future services are supported. This nal/user from its current whereabouts. This will
asks for mechanisms additional to pure IP for- place performance/capacity requirements on
warding, inviting for Traffic Engineering mecha- mobility-like servers. It also means that interoper-
nisms. A part of the argumentation, at least to an ability/interconnection arrangements between
incumbent network operator, is the need to con- several providers/operators must be solved.
solidate his current portfolio of networks, being Exporting/importing relevant information, e.g. for
PSTN/ISDN and others, such as Frame Relay, roaming users, must be done in a secure and effi-
ATM and X.25. During this, more simple and cient way. Other interactions should also be auto-
efficient solutions are sought, including all mated, for instance applying e-commerce solu-
aspects, like infrastructure, service network, tions. This would also open for having more
service control, management, etc. dynamic arrangements between the different
actors; customers, network operators and service
Before the complete network integration has providers, making the challenges of adequate traf-
been achieved, interworking between different fic engineering functions even tougher to fulfil.
networks is needed. In particular, the telephony
service will likely require gateways between IP- In this article the more basic topics have been
based network and PSTN. addressed. These are directed towards the IP-
based network, the main protocols, as well as
When the access networks are upgraded, for relations with underlying media (fibre) and cer-
instance by introducing xDSL, the total traffic tain applications of the IP-networks (VPN, tele-
loads into IP-based networks are expected to phony, mobility, multicast). By no means is the
The idea of combining both data and voice information in the same network can be traced back to the
days of early discussions of ISDN. The envisioned deployment of ISDN was however more technically
challenging than planned. The next step into convergence was the introduction of the Internet Protocol
(IP). IP was able to route packets through diverse networks without prior knowledge of the service
involved. Mostly transfer of files and other text-based information took place. Later, a discussion of
differentiated services was introduced, which opened for different kinds of services to be transmitted
over the packet switched networks. This paper focuses on the transfer of real-time data and in specific
voice over IP (VoIP). Examples of VoIP applications and implementation issues are discussed. The
requirements for voice coders and acceptable time delays are mentioned. Further, the specific problems
of sending voice samples over a packet switched network as well as some of the protocols supporting
Johan M Karlsson (40) obtained this are evaluated.
his MSc and PhD degrees from
Lund Institute of Technology,
Sweden. He is working on
mobile telecommunications Introduction After finalizing the call the signalling system
and wireless communications One aspect of real-time transmission stands out revokes all the resources that have been allo-
issues. Quality of service as especially important, the use of IP as the cated on the links and in the switches along the
aspects and performance of
traffic and networks, as well as foundation for telephony services. The idea is route. The resources (capacity) of the transmis-
protocol issues are his main endorsed by many operators around the world. sion network that are allocated during a call are
research topics. Karlsson is The functionality is often referred to as Voice dedicated entirely for that specific call, i.e. even
also program director for PCC
(Personal Computing and over IP (VoIP) and on more general, non-techni- if nothing is sent at the moment the resources
Communications), which is cal occasions IP Telephony or Internet Tele- cannot be used for other connections. The capac-
the largest Swedish research phony. Although it was designed and optimised ity allocated is for an ordinary telephone call
initiative in its field.
to transport data, IP has successfully carried 64 kb/s. This is due to the fact that the voice is
johan@telecom.lth.se
audio and video since its inception. In fact, sampled with a frequency of 8 kHz and that
researchers began to experiment with audio each sample is coded by 8 bits, i.e. 64 kb/s. The
transmission across ARPANET before the Inter- advantage of the approach to allocate capacity
net of today was in place. By the 1990s, com- along the route is that no variations in delay
mercial radio stations were sending audio across between sender and receiver are introduced; the
the Internet, and software was available that delay that will exist will be fixed and determinis-
allowed an individual to send audio across the tic in its nature.
Internet or to the standard telephony network.
Commercial operators also began using IP tech- Packet Switching
nology internationally to carry ordinary tele- The data networks have mainly been built to be
phone calls, i.e. voice. connectionless. This means that no connection
or resources are allocated for a specific transmis-
Network Characteristics sion. The information that is to be sent is divided
There are mainly two different network categories, into small segments, called packets, which are
namely circuit switched and packet switched net- sent out on the network independently. All trans-
works. The problem with the deployment or inte- missions on such a network have to compete for
gration of voice and data transfer is that they the available resources in some fair manner.
belong to the circuit switched and packet switched Two different approaches are taken within this
category, respectively. To get a better understand- concept, datagram and virtual circuit. In the case
ing, the two are described below. of datagram the packets from one transmission
are sent as if each of them belonged to a new
Circuit Switching independent transmission. This could very well
The traditional networks built for transmitting mean that the packets will be received at the des-
voice are connection-oriented. This means that tination in another order than they were trans-
to initiate a call the caller has to invoke a certain mitted at the sender. For example, after some
procedure where a specific route through the time the link that seems to be the closest and/or
entire network is established before any trans- most efficient will be congested or a switch
mission of voice information is carried out. The overloaded along the route. The next packet in
network signalling system, which is put into order to traverse the network will then be routed
action when the caller dials the number of the along a different route in order to avoid this con-
destination, establishes this route. The route is gestion. Due to the new route, this packet could
then used by all information (the pulse code reach the receiver before some of the packets on
modulated voice) during the call. the congested route.
The following issues have an impact on the QoS assumed that two frames, with an encoding
obtained by the receiver; delay/latency, jitter, delay of 30 ms each, are captured in one IP
digital sampling, voice compression, digital-to- packet, and that a look-ahead delay of 7.5 ms
analogue conversion, tandem encoding, voice is needed.
activity detection, echo, packet loss and the pro-
tocols chosen. Even though the received quality Packetized Voice
is subjective ITU have tried to make some stan- One of the problems of using real-time applica-
dardized measures and from these it could be tions over packet switched networks is that
concluded that the three main factors of the the timing of the sent packets never could be
impact of the received quality are latency, jitter obtained at the receiver end. This is due to the
and packet loss. For latency the two main prob- fact that the IP networks are not isochronous, i.e.
lems are echo and talker overlap. Echo becomes the exact distance between two packets sent out
a problem when the delay increases above about by the sender will most probably be changed dur-
50 ms, and the talker overlap becomes signifi- ing the time they traverse the networks, since
cant and quite annoying when the delay is 500 they will experience different conditions on their
ms and more. Both figures apply to the round- way to their destination. The conditions within
trip-delay. The ITU specification G.114 [1] rec- the network and along a route could be modelled
ommends that no more than 300 ms should according to a probabilistic distribution to be able
occur for the connection to be categorized as a to determine the expected delay variations. The
high quality connection. (It should be mentioned jitter is usually solved with a buffer; see Figure 3,
that the one-way end-to-end delay for transmis- where the buffer has to be filled with L buffer
sion to a satellite is approximately 270 ms. places before any packet is released to the
Satellite links have been very common and are receiver. In this way, there will hopefully always
still widely used for telephone conversations.) be a packet to release even though the arrival rate
For most cases the limit for echo to become of new packets has decreased momentarily. The
annoying will be reached and therefore VoIP arrival rate to the buffer has a probabilistic distri-
have to implement some kind of echo cancella- bution (λ) while the release from the buffer is
tion procedures. done according to a deterministic distribution (d).
The delay is characterized as the total amount The packets traversing the network are not guar-
of time it takes to transfer the voice from the anteed in any way to reach their destination, for
sender to the receiver. This time has mainly datagram services not even to reach the destina-
three components; it is the propagation delay, tion in order. Individual packets could be lost Figure 3 A buffer to com-
the serialization delay and the processing delay. due to congestion on the links traversed. In nor- pensate for the jitter intro-
A description of the various components of the mal cases the packet switched networks using IP duced by the IP networks.
delay is summarized in Figure 2, where all num- have retransmission algorithms implemented on L is the number of packets
bers indicate time in milliseconds. The figures higher layers, i.e. the TCP on the transport layer. required in the buffer to start
come from a study performed by Bell [2]. The The retransmission procedures are unfortunately releasing packets
consumer objective (100 ms) and the business
objective (300 ms) are assumed values, which
are allocated to the six delay components. The
PSTN and the telephone client are neither L
assumed to contribute to the total delay and are
therefore combined in the figure and marked
λ d
“negligible”. The column marked “today” is data
from actual measurements performed. The PC
Client and Gateway/POP values in the theoreti-
cal column may need some explanation. It is
The transition to this new order will likely occur • High quality for voice (3.5 or higher on the
gradually, emerging from organizations back MOS1) (mean opinion score) scale);
offices and special application workgroups. The
current paradigm consists of a circuit switched • Low latency.
fabric for voice networks and a complex separate
LAN infrastructure for data. The hybrid model, In real-time transmission, up to 30 % of the
deployed by some enterprises already, is the CTI packets in a transmission could be lost or
(Computer Telephony Integration). While most delayed to an extent where they have to be cal-
of the data transfer takes place on specific data culated as lost. A successful IP telephony appli-
networks, some have selectively deployed CTI cation then needs to recover from lost packets by
systems for specific applications, generally those effectively reconstructing the lost data. The com-
designed to generate revenue, such as telemar- plexity of coding algorithms has an impact as
keting, or minimize costs, such as customer sup- well. High complexity increases the cost of the
port. In a typical CTI system the incoming host platform. G.723.1 [5] is emerging as a pop-
caller’s telephony number is transferred to the ular coding choice. It is an algorithm for com-
systems database, i.e. computer network, which pressed digital audio over telephone lines. The
transforms the customer’s telephony number to enduring requirement for coders, however, is
specific customer information. This information that IP telephony systems will be capable of sup-
is then displayed on the screen in front of the porting multiple coders and adding more as tech-
specialist, sales or support personnel. The con- nology emerges and popularity increases.
nections between the telephony and data net-
works are loose. The market is severely re- Echo Cancellation
strained because it relies on proprietary connec- VoIP, using ordinary telephones at the end-
tions between insular systems. Unlike the world points, will cause echo problems and the gate-
of packet telephony CTI relies on short distance ways have to perform some kind of echo cancel-
relationships, over proprietary lines, between lation. The ordinary telephone switches do not
complementary systems (vendors) that have generally perform any echo cancellation on local
each been optimized bilaterally for their specific lines. The echo is present due to the exchange of
purpose. The final (?) telephony paradigm con- information/signals between the two wire and
sists of telephony and data tightly coupled on four wire systems. The echo is however not a
packet based multimedia networks. In this sce- problem on the local lines, the latency is not
nario, data and voice share a common transport long enough to come back as a separate trans-
network and equipment. Designed with this in mission. When using long distance lines echo
mind the fabrics are capable of growing to sup- cancellation is performed within the telephony
port new services like video conferencing and system. On these lines the time it takes for the
video streaming and voice mail. To be able to signal to propagate back to the sender is long
support all these kinds of services the fabrics enough to receive a quite disruptive signal.
have to be equipped with features to cope with Comparing VoIP to ordinary telephony makes us
streams with different QoS demands. In this sce- discover one of the big differences. When VoIP
nario the telephony calls become transparent, i.e. is used, with ordinary telephones at the end sta-
the users will not be able to tell whether a call is tions and an IP network in between, local lines
1) For many years the industry has employed a rather subjective scale to determine the quality of a
conversation, defined in [4]. This test is based on a number of volunteer testers who listen to a voice
sample and grade it according to the following scale; 5:excellent, 4:good, 3:fair, 2:poor and 1:bad.
Noise floor
Figure 5 The voice activity
detection (VAD) algorithm,
Time
used to decrease the required Front-end Front-end
bandwidth for VoIP calls speech clipping speech clipping
UDP TCP
IP
This paper studies the influence of the mouth-to-ear delay and distortion (due to voice compression and
packet loss) on the quality of a phone call, since these parameters are likely to be larger when the call is
transported over a packet-based network instead of over a circuit-switched network. First, the need for
echo controlling packetized phone calls is discussed. Second, it is shown that some codecs, in particu-
lar predictive codecs, do not attain high enough quality at low bit rates. In the same context also the
potential danger of transcoding is recognized. Third, the merit of a packet loss concealment technique
to considerably increase the robustness against packet loss is demonstrated. Next, the bounds on the
mean one-way mouth-to-ear delay and packet loss that need to be respected in order to attain tradi-
tional PSTN quality, are derived for standard codecs (even the recently developed Adaptive MultiRate
(AMR) codec) and various levels of echo control (i.e. perfect echo control and standard-compliant echo
Danny De Vleeschauwer (39) is control). Finally, a gateway-to-gateway scenario in which the transport between the gateways is gov-
a research engineer participat-
ing in the QoS, Traffic and Rout- erned by a Service Level Specification (SLS), is discussed and a numerical example is given to show
ing Technology Project within how the quality bounds can be met in this scenario by tuning the gateway parameters correctly.
the Network Architecture Team
of the Alcatel Network Strategy
Group in Antwerp, Belgium.
danny.de_vleeschauwer@ 1 Introduction duces a negligible amount of distortion with
alcatel.be
The quality of a telephone call depends on the respect to the analog format. Hence, for most
parameter settings in the user terminal and on telephone calls transported over a PSTN there is
the parameters of the network over which the practically no (additional) distortion involved.
call is transported. In this paper, we assume that There are exceptions however, where some dis-
the user terminals are optimally tuned and study tortion is introduced by signal compression: on
the influence of the network parameters. Offer- some transoceanic links the voice is sometimes
ing quality to telephone calls transported over compressed and in GSM access the voice is
a Public Switched Telephone Network (PSTN) transported in a compressed format over the air
has been understood already for a long time. interface.
The main topic of this paper is to investigate
how quality can be offered for calls (partly) When there is little distortion of the voice signal
transported over packet-based networks. (and when optimally tuned user terminals are
utilized), the level of the echo and the one-way
Although currently most of the core of the PSTN mouth-to-ear delay mainly determine the quality
is digital, the access parts (e.g. the local loop) of telephone calls transported over a PSTN. It is
are in a lot of cases still analog. There are excep- known that some echo and some delay can be
tions however, where even the access is digital, tolerated. ITU-T Recommendations G.114 [1]
e.g. ISDN access and GSM access. In the 4-to-2- and G.131 [2] specify the mouth-to-ear delay
wire hybrids of those analog access parts hybrid that can be tolerated (for undistorted voice and)
echo may be introduced. Additionally, acoustic for the case with and without echo control.
echo may also be introduced in the user termi-
nals (even when the transport is digital end-to- The packet-based transport of telephone calls is
Annelies Van Moffaert (29) is a
research engineer participating end). In any case, the level of the echo can be more flexible than the transport over a PSTN.
in the QoS, Traffic and Routing controlled with an echo controller (see ITU-T A packet-based network is not so tightly bound
Technology Project within the Recommendation G.168 [3]). to one codec as the PSTN is to the G.711 codec
Network Architecture Team of
the Alcatel Network Strategy (which only takes frequencies up to 3.1 kHz into
Group in Antwerp, Belgium. In the PSTN the one-way mouth-to-ear delay account and has a bit rate of 64 kb/s). Any codec
annelies.van_moffaert mainly consists of propagation delay and switch- that both user terminals support can be utilized.
@alcatel.be ing delay, and hence, it is practically completely Wide-band codecs (which take frequencies in
determined by the physical distance between the speech signal below 7 kHz into account)
both calling parties. An exception is GSM access, could be used to improve the intelligibility of the
where the transport over the air interface alone speech. Note that the bit rate of such a codec is
already introduces about 100 ms of delay [7]. not necessarily higher than the 64 kb/s of the
G.711 codec (as the G.711 codec is not very
The analog access part of a PSTN is nowadays efficient). However, in this paper we only con-
so short that the distortion introduced in that part sider low-bit-rate narrow-band codecs, i.e.
of the network is negligible. Over the core of a codecs that like the G.711 only take the frequen-
PSTN the voice signal is (mostly) transported in cies up to 3.1 kHz into account but compress the
the G.711 codec format, a format that only intro- voice signal to a smaller bit rate than 64 kb/s,
(Concatenation of)
Packet-based
Network(s)
Encoding and Dejittering
packetization and decoding
stage Packet transport stage stage
time time
The total queuing delay Tque is the sum of the The dejittering, decoding and echo control can
queuing delay in each node. The queuing delay be performed either in the user terminal or in a
in one network node is due to the competition of gateway. In the latter case we assume that the
several flows for the available resources in the transport of the voice signal from the gateway to
queue of that node. The total queuing delay is the user terminal (possibly over an analog access
responsible for the jitter introduced in the voice network) again merely introduces a negligible
flow. The tail distribution function of the total amount of delay and distortion.
queuing delay is defined as
To conclude this section we bring together the
F(T) = Prob[Tque > T]. (2) impact of all stages on the one-way mouth-to-ear
delay TM2E and the overall packet loss Ploss.
Note that the inverse of this function evaluated
in P, i.e. F-1(P), gives the (1-P)-quantile of the First, we consider a packetized phone call that is
total queuing delay. statically dejittered. In that case the one-way
mouth-to-ear delay (in one direction) can be split
In the transport over the network a fraction up in the following terms
Ploss,net of the packets may get lost. In the case
where an unreliable medium (e.g. an air inter- TM2E =
face) is traversed, a trade-off exists between Tpack + TDSP + Tnet,min + Tque,1 + Tjit, (4)
packet loss in the network and FEC delay intro-
duced in the network where Tpack is the packetization delay, TDSP is
the sum of encoding, decoding, look-ahead and
Ploss,net = G(TFEC). (3) echo control delays, Tnet,min is the total minimal
network delay (possibly including the delays
The function G(.) is non-increasing. For reliable over the analog access parts if a gateway is
channels G(TFEC) ≡ 0 and there is no gain in involved and the delay TFEC introduced by the
choosing TFEC > 0. In this paper we do not con- scheme to protect the transport over an unreli-
sider the transport over an unreliable medium, able channel), Tque,1 is the total queuing delay of
but refer the interested reader to [14] and [15]. the first arriving packet and Tjit is the dejittering
delay. The DSP delay TDSP is lower bounded by
In the last stage the jittered packet flow is de- the sum of all look-aheads, i.e. even if technol-
jittered and decoded. Since the decoder needs ogy keeps evolving culminating in DSPs with a
the packets at a constant rate, dejittering is abso- dazzling processing power, the look-aheads
lutely necessary. Dejittering a voice flow con- remain unaffected. The minimal network delay
sists of retaining the fastest packets in the dejit- Tnet,min is lower bounded by the total propaga-
R-value 90 – 100 80 – 90 70 – 80 60 – 70 0 – 60
range
Speech transmission
best high medium low (very) poor
quality category
Table 1 Quality classes
according to ITU-T
Recommendation G.109 PSTN quality
PARTY 2
PARTY 1
ium”, “low” and “poor” quality, respectively.
EL1 EL2
A rating below 50 indicates unacceptable qual-
ity. Throughout this paper, the classes are color
Listener echo
coded according to Table 1.
Rating R
values; (a) in case both echo
loss values (expressed in dB) 50
are the same, and (b) in case 40
the echo loss values (expressed
30
in dB) are different
20
10
0
0 100 200 300 400
Mean one-way mouth-to-ear delay (ms)
a)
60
Rating R
50
40
30
20
10
0
0 100 200 300 400
Mean one-way mouth-to-ear delay (ms)
b)
(resulting in an echo loss of e.g. 10 dB). An echo associated with the loss of interactivity is a func-
controller increases the echo losses EL1 and EL2. tion of the sum of both mouth-to-ear delays
A standard-compliant echo controller [3] should TM2E,12+TM2E,21.
increase the echo loss by 30 dB. Perfect echo
control, which increases the echo losses EL1 and Hence, under the above mentioned assumptions
EL2 to infinity, can be achieved at moderate the impairment Id is a function of TM2E,m, EL1
computational cost. Since it gradually gets more and EL2, with
difficult to control the echo as it is more delayed
with respect to its original signal, the echo con- T M 2 E,12 + T M 2 E,21
T M 2 E,m = (9)
troller should be deployed as close to the source 2
of echo as possible. Hence, it is recommended
that the echo controller in the gateway compen- the mean one-way mouth-to-ear delay. Figure 3
sates for the echo generated in the hybrids of the illustrates the behavior of this function. Figure
PSTN over which the call is terminated and the 3(a) shows how the rating R drops (due to an
echo controller in the terminal compensates for increase in Id) as the mouth-to-ear delay in-
the acoustic echo this terminal generates itself. creases for different values of the echo loss for
the case when the echo losses at both end points
The third delay-related factor that may disturb are equal (EL1 = EL2) and when there is no dis-
party 1 is the loss of interactivity. If the mouth- tortion, i.e. Ie = 0. The impairment associated
to-ear delays are too large, an interactive con- with delay is strongly influenced by this echo
versation becomes impossible. The impairment loss value. Note that the rating R is a non-
Impairment Ie
30
Rcod vs. Impairment Ie) curve GSM HR
is interpolated for the G.726 25 GSM FR
codec, the G.728 codec and the
20
AMR codec
AMR G.728
15
G.729
10
5
G.729 GSM EFR G.711
0
0 8 16 24 32 40 48 56 64
Codec bit rate Rcod (kb/s)
just two pairs or a quadratic best fitting curve in A VAD scheme, which detects if the signal con-
case there are more pairs. One line is associated tains active speech or background noise, can be
with the G.726 codec and gives the rate-distor- used to further reduce the overall bit rate to be
tion trade-off for predictive codecs. It can be sent. Good VAD schemes hardly introduce any
seen that at low bit rates predictive codecs intro- additional distortion.
duce a lot of distortion. Another line is associ-
ated with the G.728 codec. This codec has a The distortion impairment Ie associated with
better rate-distortion trade-off than predictive a codec increases as the packet loss ratio in-
codecs but does not reach the full potential of creases. Only a few results are known and are
codecs of the vocoder type, as its voice frame summarized in Figure 5. In that figure we draw
size is too small. Also the older GSM-FR and the quadratic curves that best fit the experimen-
GSM-HR codecs do not reach the full potential tal data (i.e. the points in that figure) reported in
of vocoder codecs. A third line is drawn through [6], which gives experimental data for four
the state-of-the-art codecs of the vocoder type codecs under the assumption that voice packets
(i.e. the G.729, G.723.1 and GSM-EFR codec) are lost at random. Although other results are not
and as such gives the rate-distortion trade-off yet known some trends can be observed.
for vocoder codecs. It can be seen that vocoder
codecs have the best rate-distortion trade-off. The sensitivity to packet loss depends on the
Although the AMR codec has not been charac- Packet Loss Concealment (PLC) technique used
terized yet in terms of how much distortion it by the codec. In contrast to the G.711 codec,
introduces at what bit rate, the latter curve on most state-of-the-art low-bit-rate codecs (e.g.
Figure 4 (labeled “AMR”) forms a very good G.729, G.723.1 and GSM-EFR) have a built-in
initial estimate. PLC scheme. However, a (proprietary) PLC
50
G.711 without PLC
45 G.723.1
40
Impairment Ie
35 G.729
30
25
GSM-EFR
20 G.711 with PLC
15
10
5
Figure 5 Distortion impair- 0
ment Ie as a function of the 0 2 4 6 8 10
packet loss Ploss Packet loss Ploss (%)
G.711 94 92 87 69 44 87 74 74 89 84 79 71 75
(64kb/s)
G.726 92 90 85 67 42 85 72 72 87 82 77 69 73
(40kb/s)
G.726 87 85 80 62 37 80 67 67 82 77 72 64 68
(32kb/s)
G.726 69 67 62 44 19 62 49 49 64 59 54 46 50
(24kb/s)
G.726 44 42 37 19 0 37 24 24 39 34 29 21 25
(16kb/s)
G.728 87 85 80 62 37 80 67 67 82 77 72 64 68
(16kb/s)
GSM-FR 74 72 67 49 24 67 54 54 69 64 59 51 55
(13kb/s)
G.728 74 72 67 49 24 67 54 54 69 64 59 51 55
(12.8kb/s)
GSM-EFR 89 87 82 64 39 82 69 69 84 79 74 66 70
(12.2kb/s)
G.729 84 82 77 59 34 77 64 64 79 74 69 61 65
(8kb/s)
G.723.1 79 77 72 54 29 72 59 59 74 69 64 56 60
(6.3kb/s)
GSM-HR 71 69 64 46 21 64 51 51 66 61 56 48 52
(5.6kb/s)
G.723.1 75 73 68 50 25 68 55 55 70 65 60 52 56
(5.3kb/s)
scheme can be implemented on top of the G.711 The voice signal does not need to be transported Table 2 Transcoding matrix
codec. From Figure 5 it can be seen that for the in the same format end-to-end. Somewhere
codecs that use PLC, the impairment increases along the route, the voice signal might be trans-
by about 4 units on the R-scale per percent coded from one codec format into another. Since
packet loss (for low loss values). If no PLC all (considered) standard codecs need an 8 kHz
scheme is implemented on top of the G.711 stream of uniformly quantized voice samples at
codec, the distortion impairment increases by the input, the code words of the first codec need
25 units on the R-scale for each percent packet to be decoded before the signals can be encoded
loss (for low loss values). into another codec format. Consequently, the
impairment terms associated with the two codecs
Figure 5 deals only with one specific packetiza- should be added to obtain the overall distortion
tion interval per codec (10 ms for G.711, 20 ms impairment Ie, because in the E-model, impair-
for G.729 and GSM-EFR, 30 ms for G.723.1). ments are approximately additive on the R-scale.
The G.723.1 codec was only used at 6.3 kb/s. The intrinsic quality associated with all combi-
Comparing the slopes of the curves in Figure 5, nations of two codecs can be found in Table 2
we see that the G.711 codec with PLC is slightly (using the color code of Table 1). The diagonal
less sensitive to packet loss than the G.729 entries in this table correspond to tandeming two
codec, which in turn is a bit less sensitive than codecs of the same type. Table 2 readily shows
the G.723.1 codec. From the results it cannot be that transcoding can be very harmful to the qual-
concluded if this is due to the bit rate of the ity of a call. In practice, the order in which the
codecs (high-bit-rate codec formats contain more codecs are tandemed has a small influence,
redundant information, and hence are probably which cannot be seen in (the symmetric) Table 2
less sensitive to loss) or to a smaller packetiza- because, as impairments are considered to be
tion interval. Also from Figure 5 it can be seen additive in the E-model, asymmetries cannot
that the PLC technique of the GSM-EFR codec occur. The conclusion from Table 2 is that trans-
does not perform so well as the PLC techniques coding should be avoided.
of the other considered codecs. The conclusion
from this paragraph is that in lossy environments
a PLC is highly recommended.
ITU-T G.728 12.8 210 106 The combined effect of the first and second term
16 322 243 is illustrated in Figure 3. The third term is dis-
played in Figure 5.
ITU-T G.726 16 NA NA
G.727 24 NA NA 4.1 Quality Bounds
32 322 243 Since the echo control bound of 25 ms is almost
40 375 276
always exceeded when the phone calls are trans-
ported over a packet-based network, echo con-
ITU-T G.723.1 5.3 219 131 trol is strongly recommended for packetized
6.3 251 187 phone calls. A good echo controller, i.e. an echo
canceller compliant with ITU-T recommenda-
ITU-T G.729 8 294 223 tion G.168 [3], can increase the echo loss (from
20 dB usually occurring in the PSTN) to 50 dB.
ETSI GSM-EFR 12.2 342 256
With an echo controller with a non-linear ele-
3GPP AMR 4.75 197 72 ment perfect echo control, in which case the
echo loss is increased to infinity, can be
5.15 214 117
achieved.
5.9 239 172
6.7 262 198
From Figure 3 it is clear that in the case of per-
7.4 280 213 fect echo control at both sides, the intrinsic qual-
7.95 293 223 ity of the call is attained if the mean one-way
10.2 332 250 mouth-to-ear delay is kept below 150 ms. From
12.2 342 256 eq. (10) we notice that this intrinsic quality is
solely determined by the distortion impairment
Table 3 Tolerable mean one-way mouth-to-ear delay TM2E bounds when there is no Ie, which in turn is determined by the codec(s)
packet loss in the case of perfect echo control (EL=inf) and an echo loss used and the overall packet loss experienced.
EL = 50 dB. (NA = Traditional PSTN quality (R = 70) is Not Attainable.) Since the intrinsic quality Rint,G.711 of an undis-
torted call is about 94 and the bound for tradi-
tional quality is 70, there is an impairment bud-
Standard Short name Codec bit Ploss Ploss get of 24, part of which is consumed by the
body rate (kb/s) EL = infinite EL = 50 dB
codec(s) (see Figure 4). Once the codec has been
TM2E < 150 ms TM2E = 150 ms
chosen, the remainder of the margin can be con-
sumed either by allowing the mean one-way
ITU-T G.711 no PLC 64 1.2 0.9
mouth-to-ear delay to exceed 150 ms or by toler-
ITU-T G.711 PLC 6.4 9.6 6.1 ating some packet loss. The bound on the mean
one-way mouth-to-ear delay for a certain codec
ITU-T G.723.1 6.3 2.1 0.6 is derived by subtracting the impairment associ-
ated with that codec (displayed in Figure 4) from
ITU-T G.729 8 3.5 1.7
the curves of Figure 3 and determining where
ETSI GSM-EFR 12.2 2.5 1.5 the curve associated with perfect echo control
drops below 70. The bound on packet loss for a
3GPP AMR 4.75 0.7 NA certain codec is derived by determining in Fig-
5.15 1.2 NA ure 5 for which packet loss value the impairment
5.9 1.9 0.3 budget of 24 is just not consumed. The bounds
6.7 2.6 1.1
for the AMR codec are derived under the
assumption that the interpolation (i.e. the curve
7.4 3.2 1.6
in Figure 4 labeled “AMR”) is valid and that per
7.95 3.5 2.0
percent packet loss 4 units are added to the
10.2 4.6 3.0 impairment Ie. The fourth column of Table 3
12.2 4.8 3.2 and Table 4 gives the codec-dependent bounds
on the mean one-way mouth-to-ear delay and
Table 4 Tolerable packet loss Ploss bounds for a mean one-way mouth-to-ear delay packet loss, respectively, when the echo is per-
below 150 ms in the case of perfect echo control and for a mean one-way mouth-to- fectly controlled [10].
ear delay of 150 ms for an echo loss EL = 50 dB. (NA = Traditional PSTN quality
(R = 70) is Not Attainable.)
Tpack (ms) 10 20 30 40
b)
Tpack (ms)
10 20 30 40
Ploss,jit
1.E-01 52 52 51 51
1.E-02 76 75 75 75
Table 5 (a) SLS specification,
1.E-03 79 79 79 78 (b) effective codec rate Reff
1.E-04 79 79 78 78 (kb/s), and (c) rating R for
1.E-05 72 70 69 67 various values of the
packetization delay and
c) dejittering loss
The third generation cellular network, UMTS (Universal Mobile Telecommunication System), is a
standard specified by the Third Generation Partnership Project (3GPP). It deploys the 3rd generation
W-CDMA air interface which will be deployed in Europe and Asia, including Japan and Korea in the
frequency band around 2 GHz. With this frequency it is capable of a peak bandwidth of 2 Mb/s which
may support simultaneous low bit rate voice services and high bit rate multimedia and video applica-
tions. To ensure reusability of platforms, it was decided to reuse the GPRS architecture. With the advent
of real time Internet multimedia services it was felt necessary to ensure the provisioning of QoS. This
was not trivial given the deficiencies of GPRS in supporting QoS. Considerable work was made to
provide the necessary enhancements in the specifications to ensure adequate QoS support.
U IP
IP SGSN IP GGSN IP (Internet, Intranet)
T
Networks
R IP
A
MGW
N
CS Domain
CS-MGW IP CS-MGW
PSTN / ISDN / GSM
IP IP
MSC-server IP GMSC-server T-SGW
classes will be described as well as aspects con- IP multimedia subsystem. Our focus will be on
cerning QoS support over the radio interface, the PD of UMTS.
handover issues and interworking with legacy
mobile systems. Chapter 4 gives a status over- 2.1 Core Network
view of the end-to-end capabilities in UMTS The Core Network [5,6,7] transports packets
including the policy framework and IP layer between the radio access network and external
functionality to negotiate end-to-end QoS. To IP networks. Besides this transport function it
conclude we give a summary of the matters dis- is also responsible for Lawful Intercept, Charg-
cussed and point out some remaining open stan- ing, authenticating users and authorising connec-
dardisation issues. tions to the external IP networks as well as func-
tionality specific to mobile networks such as
2 UMTS Architecture Overview mobility management. The three main nodes of
UMTS has been standardised in phases. The ini- the Core Network are the Home Subscriber
tial release (R99) includes the basic functionality Server (HSS), the Serving GPRS support node
to access IP networks and the circuit switched (SGSN) and the Gateway GPRS Support Node
networks. The Core network part is composed (GGSN).
of a packet domain based on the GPRS architec-
ture and a circuit domain based on the GSM The Home Subscriber Server (HSS) is the mas-
architecture. The radio network (UTRAN) is ter database for a given user. It is the entity con-
based on the W-CDMA technology and is func- taining the subscription related information to
tionally independent from the core network. Its support the network entities actually handling
function is to provide access to the core network calls/sessions. The HSS includes the GSM HLR
domains via the Iu interface. Further releases functionality and IETF AAA functionality.
add features to this basic functionality set.
Release 5 introduces the IP multimedia subsys- The SGSN is the node that serves the MS. The
tem for efficiently providing IP based multime- SGSN supports GPRS for GSM and/or UMTS.
dia services over the packet domain. The IP When the mobile is attaching to the network, the
Multimedia subsystem is an overlay control sys- SGSN establishes a mobility management con-
tem to perform session control of IP multimedia text that records the mobility and security infor-
services based on SIP signalling. The transport mation of the mobile. When the mobile wants to
part is evolving towards an “All IP” architecture, establish a connection to external networks it
e.g. the transport for the CS domain could be initiates PDP Context Activation procedure. The
transported by IP through the CN. SGSN participates in that procedure and keeps
track of the parameters (Routing information,
In the following we provide a short description QoS information) of that connection in a PDP
of the core network, the radio network and the context.
The next chapter presents the QoS framework • UMTS shall provide QoS attribute control on a peer-to-peer basis between UE
and 3G gateway node;
of UMTS [1,2]. The development of this frame-
work has been done incrementally. In the first • UMS QoS shall provide a mapping between applications requirements and
release of UMTS only internal UMTS QoS is UMTS services;
provided, i.e. QoS from the mobile termination • UMTS QoS shall be able to efficiently interwork with current QoS schemes.
to the Gateway (GGSN). The next releases Further, the QoS concept should be capable of providing different levels of
develop the framework further by including end- QoS by using UMTS specific control mechanisms (not related to QoS mecha-
to-end QoS support. nisms in the external networks);
• A session based approach needs to be adopted for all packet mode commu-
3 UMTS QoS Architecture nication within the 3G serving node with which UMTS QoS approach shall be
intimately linked, essential features are multiple QoS streams per address;
3.1 UMTS QoS development
• The overhead and additional complexity caused by the QoS scheme should
The UMTS QoS framework is being established be kept reasonably low, as well as the amount of state information transmitted
based on a set of requirements of both general and stored in the network;
and technical character. The requirements incor-
• QoS shall support efficient resource utilisation;
porate internal as well as the end-to-end aspects.
Some of these requirements are given in Figure • The QoS attributes are needed to support asymmetric bearers;
3-1. • Applications (or special software in UE or 3G gateway node) should be able
to indicate QoS values for their data transmissions;
During the work these QoS requirements act as
• QoS behaviour should be dynamic, i.e. it shall be possible to modify QoS
strict working rules for the QoS team in 3GPP.
attributes during an active session;
However, before starting the QoS specification,
a system perspective had to be clarified in terms • Number of attributes should be kept reasonably low (increasing number of
of which bearer services the UMTS system con- attributes, increased system complexity);
tained, and how they interacted. The bearers • User QoS requirements shall be satisfied by the system, including when
comprise a framework of how the QoS func- change of SGSN within the Core Network occurs.
tional entities interact. It also showed how the
UTRA UTRA Iu NS Iu NS BB NS BB NS
ph BS M ph BS M Manager Manager Manager Manager
3.3.1 QoS Management for the Control Radio BS managers, Iu BS managers and CN BS
Plane managers use services provided by lower layers
The UMTS BS Manager in the UE, CN EDGE as indicated in Figure 3-2.
and the Gateway signal between each other and
via the translation function with external in- Admission/Capability control maintains infor-
stances to establish or modify a UMTS bearer mation about all available resources of a net-
service. Each of the UMTS BS managers inter- work entity and about all resources allocated to
rogates its associated admission/capability con- UMTS bearer services. It determines for each
trol whether the network entity supports the UMTS bearer service request or modification
requested service and whether the required whether the required resources can be provided
resources are available. Additionally, the CN by this entity, and it reserves these resources if
EDGE UMTS BS manager verifies with the allocated to the UMTS bearer service. The func-
Subscription Control the administrative rights tion also checks the capabilities of the network
for using the service. entity to provide the requested service, i.e.
whether the specific service is implemented and
In requesting a service the UMTS BS manager not blocked e.g. for administrative reasons.
of the CN EDGE translates the UMTS bearer
service attributes into Radio Access Bearer 3.3.2 QoS Management for the
(RAB) service attributes, Iu bearer service User Plane
attributes and CN bearer service attributes. Figure 3-4 depicts the functions taking place
prior to or during user data transport through the
The RAB manager verifies with its admission/ UMTS network. The user traffic traverses sev-
capability control whether the UTRAN supports eral UMTS specific functions to adapt the traffic
the specific requested service and whether the to the UMTS transport functionality. The func-
required resources are available. It translates the tions can be categorised into the following enti-
RAB service attributes into radio bearer service ties:
and Iu bearer service attributes and requests the
radio BS manager and the Iu BS manager to • Classification: The classification function
provide bearer services with the required (Class), which is located both in the Gateway
attributes. and in the UE, assigns user data units received
from the external bearer service or internal
The Gateway UMTS BS manager translates the service interface to the appropriate UMTS
UMTS bearer service attributes into CN bearer bearer service. This is done according to the
service attributes and requests its CN BS man- QoS requirements of each user data unit.
ager to provide the service. To support the trans-
port into external environments, the UMTS BS • Conditioning: The traffic conditioner (Cond.)
manager communicates with a translation func- in the UE provides conformance of the uplink
tion who translates the UMTS bearer service user data traffic with the QoS attributes of the
attributes into the external bearer services and relevant UMTS bearer service. In the Gateway
requests the service from the Ext BS manager. a traffic conditioner may provide conformance
Class
Class if.
if.
Cond.
Cond. Cond. Mapper. Mapper.
Mapper.
Figure 3-4 QoS management of the downlink user data traffic with the QoS 3.4 UMTS QoS Classes
functions for the UMTS bearer attributes of the relevant UMTS bearer ser- The network must be able to distinguish between
service in the User plane vice. For example, the packet-oriented trans- types of services to be able to support different
port of the downlink data units is received QoS requirements. Four QoS classes have been
from the external bearer service and sent specified:
through the core network to the UTRAN and
is buffered at the RNC. If the downlink traffic • Conversational class
results in bursts of data units not conformant The conversational class supports real-time
with the UMTS BS QoS attributes, a traffic communication between entities. The class
conditioner in the UTRAN conforms the data provides low latency and drop reliability.
traffic according to the relevant QoS attributes
as e.g. the peak bandwidth limit. • Streaming class
The streaming class intends to support appli-
The traffic conditioner is not necessarily the cations which are not real time demanding but
only function to ensure that the traffic does not sensitive to jitter. However, the latency be-
exceed the QoS attributes. For example a re- tween the communication entities must be
source manager may also provide conformance limited within a defined maximum value.
with the relevant QoS attributes by appropriate
data unit scheduling. Or, if fixed resources are • Interactive class
dedicated to one bearer service the resource limi- The interactive class offers three levels of
tations implicitly condition the traffic. precedence and supports non real-time appli-
cations.
• Mapping: The mapping function (Mapper)
marks each data unit with the specific QoS • Background
indication related to the bearer service per- The background class supports non real-time
forming the transfer of the data unit. This may demands. The class is served with the lowest
be marking the packets with specific DiffServ priorities.
code points for differentiated treatment in
DiffServ enabled IP networks. As noted the difference between them is first and
foremost their delay sensitivity, ref. Table 1. The
• Resource manager: Each of the Resource conversational class is the most delay sensitive.
Managers of a network entity is responsible This class is therefore best suited for real time
for a specific resource. The resource manager services such as voice applications. The back-
distributes its resource budget between all ground class is the most delay intolerant class
bearer services requesting transfer of data and is suited for e-mails and file transfer. The
units. The resource manager thereby attempts table on the following page gives an overview of
to support the QoS attributes required for each the classes and what types of services are suit-
individual bearer service. able to use within each class.
Each of the QoS classes in Table 1 are associ- the Radio access due to the delay budget through
ated with a set of QoS parameters describing the the Core network. For asymmetric bearers some
requirements demanded from the associated attributes may have different values in uplink
applications. Table 2 describes the QoS attri- than in downlink direction.
butes and Table 3 gives the value ranges of
UMTS bearer service attributes for the different 3.5 UMTS Bearer Establishment
QoS classes. These values give the capabilities To illustrate how the different parts work
demanded from the UMTS network. Value together we present the overall procedure for
ranges for the Radio access bearer have also establishing a UMTS bearer. We also discuss
been put forward. Some parameters, e.g. transfer how QoS is mapped to DiffServ within the IP
delay, will contain a lower maximum value for transport networks. Additionally we address the
Maximum bitrate (kb/s) Maximum no. of bits provided by the UMTS network within a
period of time.
Residual bit error ratio Undected bit error ratio in the delivered SDUs.
Delivery of erroneous SDUs (y/n) Whether SDUs detected as erroneous shall be delivered or
discarded or not.
Transfer delay (ms) Maximum delay for 95th percentile of the distribution of delay
for all delivered SDUs.
Delay is time from a request to transfer an SDU at one SAP
to its delivery at the other SA.
Traffic handling priority Relative importance for handling of all SDUs belonging to the
UMTS bearer compared to the SDUs of other bearers.
Maximum bitrate (kb/s) < 2 048 < 2 048 < 2 048 - < 2 048 -
overhead overhead
Maximum SDU size <= 1 500 or 1 502 <= 1 500 or 1 502 <= 1 500 or 1 502 <= 1 500 or 1 502
(octets)
SDU 5*10-2, 10-2, 5*10-3, 5*10-2, 10-2, 5*10-3, 4*10-3, 10-5, 4*10-3, 10-5,
Residual BER 10-3, 10-4, 10-6 10-3, 10-4, 10-5, 6*10-8 6*10-8
10-6
SDU error ratio 10-2, 7*10-3, 10-3, 10-1, 10-2, 7*10-3, 10-3, 10-4, 10-6 10-3, 10-4, 10-6
10-4, 10-5 10-3, 10-4, 10-5
Allocation/Retention priority 1, 2, 3 1, 2, 3 1, 2, 3 1, 2, 3
Table 3 Values for the UMTS establishment of the radio access bearer in more the subscription of the user and does admission
bearer service attributes detail. control given its available resources. It then
requests the establishment of a radio access
3.5.1 Overall Procedure bearer (RAB). To do so it derives the adequate
Figure 3-5 shows how the bearer is established QoS profile for the RAB given the QoS profile
in UMTS. The user establishes a UMTS bearer of the UMTS bearer. As an example the transfer
Figure 3-5 UMTS Bearer (PDP context activation) by specifying the QoS delay might be set to 80 ms if the UMTS bearer
establishment requested. The SGSN authorises the QoS given QoS profile indicates 100 ms. This mapping is
implementation dependent.
Handover
command and Toffset
Toffset
set-up to a specific radio bearer is not part of the ent QoS criteria chooses the best one to forward
standards and is left for the implementation and to the remote host. This mechanism is denoted
deployment. We illustrate in Table 5 one simple macro diversity. Macro diversity may be used
algorithm taken from [22]. The Iu bearer is set- in both uplink and downlink. In uplink it is the
up after the radio bearer has been established. RNC that chooses the best traffic stream, in
downlink it is the mobile itself that selects the
3.6 QoS and Handovers best traffic stream. Figure 3-7 illustrates a soft
handover case.
3.6.1 UMTS Handovers
Most wireless systems need mechanisms to sup- The handover procedures are transparent to the
port situations where radio connections allocated Core network except in the case of a terminal
to mobiles moved out of reach of the radio moving from one RNC to another. In that case
transceiver they initiated the communication ses- the Core network may have to re-establish the
sion from. To be able to keep the session alive it bearers to the new RNC. This procedure called
has to be taken over by another radio transceiver. SRNC relocation first establishes bearers on the
This switching of radio transceiver is denoted new path before the switching is accomplished.
handover. In UMTS there are two fundamentally It uses the make before break concept allowing
different ways of conducting handovers – hard faster switching of routes and thus less disrup-
handover and soft handover. With hard handover tion.
the communication session is broken when a
mobile leaves a radio transceiver and established 3.6.2 Handover to Legacy Systems
again at the new radio transceiver. This switch- UMTS was designed to allow smooth deploy-
ing of radio transceiver introduces a slight drop ment. A typical scenario for the first years of
of connection and possible drop of packets. The UMTS deployment is that UMTS covers a lim-
user may hear it as a clip in a speech conversa- ited number of cities while GPRS/GSM is nation
tion. In UMTS this handover mode is compara- wide. In that context users would like to seam-
ble with that of GSM today regarding QoS. The lessly roam between the two accesses. Handover
radio system of UMTS however is especially between UMTS and GPRS/GSM is thus an
constructed to perform soft handover with macro important feature.
diversity. With soft handover the mobile can
send or receive on up to several radio channels To allow easy interworking the provisioning of
simultaneously thereby increasing the QoS per- QoS in GPRS was aligned with UMTS for the
formance, however at the cost of used band- release 99 of GPRS. GPRS supports only two
width. Figure 3-7 shows a mobile receiving data QoS classes, the Background class and the Inter-
from two Node Bs, connected to the same RNC, active class. In case of handover between UMTS
simultaneously. and GPRS QoS renegotiation may occur. This
allows the user/application to decide whether it
This handover mechanism enhances the QoS, can accept lower Quality of Service. If it cannot
especially for voice and real-time services, since the session will be broken.
the session will always be on. The RNC receives
the data from both Node Bs and based on differ-
P-CSCF
local Policy Control
SIP proxy Function
Radio BS Radio BS lu BS lu BS CN BS CN BS
Manager Manager Manager Manager Manager Manager
UTRA UTRA lu NS lu NS BB NS BB NS
ph. BS M ph. BS M Manager Manager Manager Manager
The role of the PCF in regard to sessions is first • Phase 3 reports that the preconditions are met
and foremost to authorise the use of QoS re- and ringing is accomplished.
sources to support a service to a specific user.
The PCF may collect the parameters needed in • Phase 4 starts when the called party picks up
several ways, e.g. by use of SIP signalling, i.e. the phone, the resources are committed.
from the SDP information, or the information in
the RSVP FlowSpec. By use of the QoS infor- The resource management framework distin-
mation proper authorisation in the form of IP re- guishes between two phases: Reserve and Com-
sources is communicated to the PEP. The PEP mit. Reserving resources is the ability to admit
deploys this information to enforce the use of the flow with the QoS requested. The commit-
network recourses. If the user violates the ment is the effective allocation of specific re-
resource usage, e.g. sends more packets than it sources to the flow. Making this distinction
is authorised to, it may drop the exceeding pack- improves system efficiency because it assigns
ets. If the user wishes to renegotiate the resource resources only when necessary, and when the
usage, new policy information has to be con- use of these resources may be charged to a cus-
veyed between the PCF and the PEP. tomer.
4.3 Bearer Control and Call Control UMTS does not support the distinction between
Integration resource reservation and resource commitment
This section gives a short overview of how as the bearer set-up procedure includes both the
bearer control and call control can be managed admission of the bearer and the allocation of
for a typical VoIP call. It is to be noted that fur- resources to that bearer. Some modifications of
ther work is needed on these issues. UMTS bearer establishment procedures are thus
needed. The main concern is the radio bearer as
Voice over IP services over UMTS represent a the radio access network holds the scarce and
major asset for a service provider. The provision- expensive resources. One way of solving the
ing of these services is nevertheless technically problem is to design a radio access bearer reser-
challenging in many regards. One of the issues vation procedure. This would trigger the admis-
that is being addressed in 3GPP is the co-ordina- sion control in the RNC without the radio bearer
tion of the SIP call control procedure with the IP being set-up. Later during the commit phase the
bearer establishment procedure. These two pro- radio bearer will be set-up.
cedures need indeed to be co-ordinated to prevent
Phase 1 and phase 3 are SIP message exchanges.
• Calls to be established prior to resources being These phases are not dependent on the access
reserved, thus leading to unnecessary call technology itself and therefore they can be app-
defects; lied to UMTS without modifications. Neverthe-
less, they introduce additional signalling over
• Resources being committed before the call is the air interface as SIP is carried end-to-end.
set-up leading to inefficient use of resources
and users being charged before the called This counterbalances the resource efficiency
party picks up; benefits of allocating resources only after the
caller has picked up. Additionally, the post pick-
• Theft of service and fraud. up delay may be large as the resource allocation
procedure in UMTS can be time consuming
A proposal to co-ordinate the call control with (phase 4).
the bearer control is the two phase commit con-
5 3GPP. General Packet Radio Service 20 3GPP. UTRAN Iub interface: User plane
(GPRS) Service description; Stage 2, v 3.6.0. protocol for CCH Data streams, v3.5.0. (TS
(TS 23.060) 25.435)
6 3GPP. Network Architecture, v 5.1.0. (TS 21 3GPP. Delay budget within the access stra-
23.002) tum, v 4.0.0. (TR 25.853)
8 3GPP. UTRAN Overall description, v 3.5.0. 23 Holma, H, Toskala, A. WCDMA for UMTS,
(TS 25.401) Radio access for Third Generation Mobile
Communications. Chichester, Wiley, 2000.
9 3GPP. UTRAN Iu interface: General Aspects
and Principals, v3.3.0. (TS 25.410) 24 PacketCable Distributed Call Signalling
Specification, PKT-SP-DCS-D17-03-
10 3GPP. UTRAN Iu interface: layer 1,v3.3.0. 000428, PacketCable Draft internal docu-
(TS 25.411) ment.
Optical technology has experienced an explosive growth in the past years that has enabled multi-terabit
optical transmission over several hundreds of kilometres. Yet the potential of optical networking is far
from being exploited. Optical network functionality may be the answer to efficient and reliable data-cen-
tric networks, a technology that complements IP. This article aims at giving an overview of the driving
forces behind optical networking, the potential offered by it, the challenges encountered, and the current
state-of-the-art.
OXC
IP-router
UNI
NNI
UNI
optical
subnet OCh
optical
subnet OCh
end-to-end LSP
The peer model: In this architecture the control ever, leasing of “dark” capacity lines is not facil- Figure 2 The Peer-to-Peer
planes of the optical network and IP are fully itated by this architecture. Despite its drawbacks, model. IP routers and optical
integrated such that IP routers and optical the peer-to-peer model can be expected to be the network elements (OXCs) are
switching nodes (OXCs) are peers. The two net- architecture to be adopted in the longer term if peers in a merged network that
works are merged into a new integrated network IP indeed dominates the scene. is managed seamlessly in a
that is managed in a unified way. The optical unified way
network topology is fully visible to routers. A The augmented model: This architecture can
single protocol is run through all domains and be a whole range of solutions that lie in the area
establishes paths through all network elements between the peer and the overlay model. Here
in a seamless manner (Figure 2). the network can be seen as comprising separate
IP and optical domains, where each one is using
This “top-down” approach is primarily the view a separate instance of an interior routing proto-
of IP experts and equipment suppliers that have col. Some reachability information is exchanged
good expertise in IP but little experience with between these domains but the topology of the
optical technology. The view is to keep optical optical network is by and large opaque to the
“dumb and fat” as it has been up to now and rely client network. This option may be a good com-
on IP intelligence to run the network. The ad- promise in that it is more feasible than the peer
vantage of this architecture stems exactly from solution and at the same time less rigid and more
the fact that it is IP-centric: optimised routes efficient than the overlay model. It can be argued
may be found through the network taking into that this solution combines the best of two
account all factors, also physical factors. The worlds because it limits the amount of info
architecture is scalable, functionality is not exchange within the network and at the same
duplicated and conflicts between several control time it may allow the delivery of wavelength
planes do not arise. On the other hand, this services, i.e. trading of pure end-to-end band-
architecture demands that information regarding width, that circumvent the IP layer.
the optical network elements is advertised to
routers, resulting in excessive information flows The above three architectures were initially seen
within the network and an overblown control as rival solutions. Lately it appears that as the
system. Thorough adaptations of the routers are realities of pros and cons for all options are
required in that routing information that is spe- becoming more evident, the three solutions are
cific to optical networks needs to be incorpo- seen as possible evolution stages down one sin-
rated in the protocols. The degree to which this gle path. According to this scenario, networks
creates conflicts is still unclear. Both software will first be based on the overlay model, proceed
and hardware adaptations can in any case be to an augmented model with enhanced signalling
required that may not be easy to implement in as well as routing information exchange between
the short term. Finally, this architecture is not different domains, and finally – assuming IP
inherently multi-client, an aspect that may be becomes the transport protocol – move to the
important for some operators (e.g. incumbents). peer model with a full integration between the
If the amount of non-IP traffic is relatively optical and the IP plane. This scenario may be
small, this traffic may be carried over IP. How- challenged if good solutions based on the aug-
• Label stacking, pushing and popping appears Route computation is based on the information
rather complex and expensive to realise opti- revealed by the link state update. In a distributed
cally – if at all possible; it will probably implementation the request for path establish-
require a smart combination with electronic ment is forwarded to the OXC at the ingress
techniques. Intense R&D work is taking place point that is then responsible for the computation
in this area. and the establishment of the path. Protection
and/or restoration routes may be optimised glob-
• Label swapping can be carried out optically ally and off-line or locally at the OXC and real-
(e.g. by wavelength conversion) but it is time [8, 9].
expensive and should be minimised in optical
networks. Path establishment is again carried out based on
IP models. The MPLS architecture for IP net-
works implements either RSVP or Constraint
Routed LDP (CR-LDP). These existing proto-
cols for establishing label switched paths are
being extended to encompass optical technology.
NMI-A
NMI-T
ASON
control OCC
plane
E-NNI
User
signaling OCC OCC OCC
UNI I-NNI
Transport
plane
Edge
SDH
SDH
Node
EN EN
ATM
GbEth
GbEth
intelligence. The functionality required by the be in-band, i.e. within the range of the (standard-
control plane is based on IP models. Thus the ised) optical channels that are used for the trans-
functionality carried out by the control plane mission of traffic, or out-of-band. The signalling
here includes service invocation via the UNI, channel requires a dedicated resilience strategy.
neighbour discovery, status updating, as well as GMPLS-based signalling protocols are envis-
routing of optical channels, wavelength alloca- aged used in ASON as well as through the UNI
tion and path establishment. These can be based and a lot of development work is being carried
on GMPLS as presented in the previous section. out in this area.
Indeed, both effective development when adapt-
ing existing well-proven protocols, and easier Classes of Service
migration scenarios towards future solutions, ASON can provide service differentiation as
justify this choice. based upon a set of parameters such as priority,
resilience, delay, jitter, etc., following IP
The control plane comprises local Optical Con- resource handling models [12]. Figure 5 shows
nection Controllers (OCC) at each node that an example of an ASON providing end-to-end Figure 6 Service requirements
exchanges information with the optical network connections arranged by client. Optical channels are mapped in Classes of
via the Connection Controller Interface (CCI). are then allocated separately to each client, Services, followed by route
The OCC instructs the local optical switch to according to a set of classes of service (CoS) as computation (not shown) and
reconfigure via the CCI, which also carries shown in Figure 6. This would place traffic wavelength allocation
topology updates from the node. Communication
between OCCs is done via the Network Network
Interface (NNI). This can be an internal network
interface (I-NNI) when it carries routing/signal-
ling messages within a single ASON administra- Service description CoS OCh
mapping allocation
tive domain (e.g. a single operator), or an exter-
nal network interface (E-NNI) when it connects Client 1 a
λ1
two separate administrative domains. The main λ2
CoS I
difference between the two is that no topology λ3
information is carried through the E-NNI; nei- Client 2 b
ther is resource control possible through this CoS II λ4
interface. Finally, the control plane communi- •
• c
cates with the network management system via • λ5
the NNI-A and NNI-T interfaces. CoS III
• • λ6
• •
• •
Signalling information within the control plane • • CoS IV λi
can be embedded information but is best con-
veyed using a separate signalling channel. This Client n k
signalling channel can be out-of-fibre, i.e. going
through an altogether separate network, or in- Service
fibre. In the latter case the signalling channel can parameter
A C
AAA Authentication Authorisation Accounting CAC Call Admission Control
Connection Admission Control
AAAARCH Authentication Authorisation Accounting
ARCHitecture research group CAR Committed Access Rate
AAL ATM Adaptation Layer CATV Cable Television
AC Alternating Current CBC Cipher Block Chaining
Application Categories
CBR Constraint-Based Routing
ACK Acknowledgement
CBS Committed Burst Size
ACS Admission Control Service
CBT Core Based Tree
ADSL Asymmetric Digital Subscriber Line
CBWFQ Class-Based Weighted Fair Queueing
AF Assured Forwarding
CC Connection Count
AH Authentication Header
CCI Connection Controller Interface
AMR Adaptive MultiRate
CCITT International Telegraph and Telephone Consultative
API Application Programming Interface Committee (now: ITU-T)
ARIB Association of Radio Industries and Businesses CDF Complementary Distribution Function
ARPA Advanced Research Projects Agency CDMA Code Division Multiple Access
AS Autonomous System CDR Committed Data Rate
ASCII American Standard Code and Information CE Congestion Experienced (part of ECN mechanism)
Interchange Customer Edge
ASI Application Specific Information CI Configuration Interface
ASIC Application-Specific Integrated Circuit CID Class Identity
ASM Application Specific Module CIM Common Information Model
ASN.1 Abstract Syntax Notation no.1 CIR Committed Information Rate
ASON Automatically Switched Optical Network CIV Common Information Viewpoint
ASP Application Service Provider CL Controlled Load (Intserv class)
ATM Asynchronous Transfer Mode CLP Cell Loss Priority
CMIP Common Management Information
B CN Core Network
COA Care-Of-Address
BA Behaviour Aggregate
COPS Common Open Policy Service
BB Bandwidth Broker
CORBA Common Object Request Broker Architecture
BBE Better than Best Effort
CoS Class of Service
BE Best Effort
CP Connection Point
BER Bit Error Ratio
CPE Customer Premises Equipment
BGP Border Gateway Protocol
CPG Connection Point Group
BGP-4 Border Gateway Protocol, version 4
CPODA Contention Priority Oriented Demand Access
BICC Bearer-Independent Call Control
CPU Central Processing Unit
B-ISDN Broadband Integrated Services Digital Network
CR Core Router
BLA Business Level Agreement
CR-LDP Constraint-Based Label Distribution Protocol
BR Border Router
CRT Cathode Ray Terminal
BS Bearer Service
CS Circuit Switched
Class Selector (Diffserv class)
CSCF Call State Control Function
CS-MGW Circuit Switched Media Gateway
CSPF Constrained Shortest Path First
DARPA Defence Advanced Research Projects Agency FEC Forward Error Correction
Forwarding Equivalence Class
DC Default Class
FER Frame Error Ratio
DCS Distributed Call Signalling
FIB Forwarding Information Base
DE Default class
FIFO First In First Out
DEC Decision
Digital Equipment Corporation Fin Final
N
J
NA Not Attainable
JRE Java Runtime Environment
NAK Negative Acknowledgement (rejection)
NAP Network Access Point
K
NAS Network Access Server
NAT Network Address Translation
L
NCC Network Control Centre
LAC Level 2 tunnel Access Concentrator ND Network Domain
LAN Local Area Network NDRE Norwegian Defence Research Establishment
LDAP Lightweight Directory Access Protocol NE Network Element
LDP Label Distribution Protocol NHLFE Next Hop Label Forwarding Entry
LIB Label Information Base NMC Network Management Centre
LL Leased Line NMF Network Management Forum
L-LSP Label only inferred LSP NMS Network Management System
LND Layer Network Domain NNI Network Node Interface
LNS Level 2 tunnel Network Server NO Network Operator
LP Linear Program NP Network Performance
PAWS Protect Against Wrapped Sequences RADIUS Remote Authentication Dial-In User Service
PDR Peak Data Rate RIO Random Early Detection with In/Out bit
SLS Service Level Specification trTCM two rate Three Colour Marker
SN Subnetwork Tx Transmit
W
WAN Wide Area Network
W-CDMA Wideband Code Division Multiple Access
WDM Wavelength Division Multiplexing
WFQ Weighted Fair Queueing
WG Work Group
WRED Weighted Random Early Detection
WRR Weighted Round Robin
WWW World Wide Web
X
xDSL any Digital Subscriber Line
XFG Cross Configuration