diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc2702.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc2702.txt')
-rw-r--r-- | doc/rfc/rfc2702.txt | 1627 |
1 files changed, 1627 insertions, 0 deletions
diff --git a/doc/rfc/rfc2702.txt b/doc/rfc/rfc2702.txt new file mode 100644 index 0000000..0306464 --- /dev/null +++ b/doc/rfc/rfc2702.txt @@ -0,0 +1,1627 @@ + + + + + + +Network Working Group D. Awduche +Request for Comments: 2702 J. Malcolm +Category: Informational J. Agogbua + M. O'Dell + J. McManus + UUNET (MCI Worldcom) + September 1999 + + + Requirements for Traffic Engineering Over MPLS + +Status of this Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (1999). All Rights Reserved. + +Abstract + + This document presents a set of requirements for Traffic Engineering + over Multiprotocol Label Switching (MPLS). It identifies the + functional capabilities required to implement policies that + facilitate efficient and reliable network operations in an MPLS + domain. These capabilities can be used to optimize the utilization of + network resources and to enhance traffic oriented performance + characteristics. + +Table of Contents + + 1.0 Introduction ............................................. 2 + 1.1 Terminology .............................................. 3 + 1.2 Document Organization .................................... 3 + 2.0 Traffic Engineering ...................................... 4 + 2.1 Traffic Engineering Performance Objectives ............... 4 + 2.2 Traffic and Resource Control ............................. 6 + 2.3 Limitations of Current IGP Control Mechanisms ............ 6 + 3.0 MPLS and Traffic Engineering ............................. 7 + 3.1 Induced MPLS Graph ....................................... 9 + 3.2 The Fundamental Problem of Traffic Engineering Over MPLS . 9 + 4.0 Augmented Capabilities for Traffic Engineering Over MPLS . 10 + 5.0 Traffic Trunk Attributes and Characteristics ........... 10 + 5.1 Bidirectional Traffic Trunks ............................. 11 + 5.2 Basic Operations on Traffic Trunks ....................... 12 + 5.3 Accounting and Performance Monitoring .................... 12 + + + +Awduche, et al. Informational [Page 1] + +RFC 2702 MPLS Traffic Engineering September 1999 + + + 5.4 Basic Attributes of Traffic Trunks ....................... 13 + 5.5 Traffic Parameter Attributes ............................ 14 + 5.6 Generic Path Selection and Management Attributes ......... 14 + 5.6.1 Administratively Specified Explicit Paths ................ 15 + 5.6.2 Hierarchy of Preference Rules for Multi-paths ............ 15 + 5.6.3 Resource Class Affinity Attributes ....................... 16 + 5.6.4 Adaptivity Attribute ..................................... 17 + 5.6.5 Load Distribution Across Parallel Traffic Trunks ......... 18 + 5.7 Priority Attribute ....................................... 18 + 5.8 Preemption Attribute ..................................... 18 + 5.9 Resilience Attribute ..................................... 19 + 5.10 Policing Attribute ...................................... 20 + 6.0 Resource Attributes ...................................... 21 + 6.1 Maximum Allocation Multiplier ............................ 21 + 6.2 Resource Class Attribute ................................ 22 + 7.0 Constraint-Based Routing ................................ 22 + 7.1 Basic Features of Constraint-Based Routing ............... 23 + 7.2 Implementation Considerations ............................ 24 + 8.0 Conclusion ............................................. 25 + 9.0 Security Considerations .................................. 26 + 10.0 References ............................................. 26 + 11.0 Acknowledgments .......................................... 27 + 12.0 Authors' Addresses ....................................... 28 + 13.0 Full Copyright Statement ................................. 29 + +1.0 Introduction + + Multiprotocol Label Switching (MPLS) [1,2] integrates a label + swapping framework with network layer routing. The basic idea + involves assigning short fixed length labels to packets at the + ingress to an MPLS cloud (based on the concept of forwarding + equivalence classes [1,2]). Throughout the interior of the MPLS + domain, the labels attached to packets are used to make forwarding + decisions (usually without recourse to the original packet headers). + + A set of powerful constructs to address many critical issues in the + emerging differentiated services Internet can be devised from this + relatively simple paradigm. One of the most significant initial + applications of MPLS will be in Traffic Engineering. The importance + of this application is already well-recognized (see [1,2,3]). + + This manuscript is exclusively focused on the Traffic Engineering + applications of MPLS. Specifically, the goal of this document is to + highlight the issues and requirements for Traffic Engineering in a + large Internet backbone. The expectation is that the MPLS + specifications, or implementations derived therefrom, will address + + + + + +Awduche, et al. Informational [Page 2] + +RFC 2702 MPLS Traffic Engineering September 1999 + + + the realization of these objectives. A description of the basic + capabilities and functionality required of an MPLS implementation to + accommodate the requirements is also presented. + + It should be noted that even though the focus is on Internet + backbones, the capabilities described in this document are equally + applicable to Traffic Engineering in enterprise networks. In general, + the capabilities can be applied to any label switched network under + a single technical administration in which at least two paths exist + between two nodes. + + Some recent manuscripts have focused on the considerations pertaining + to Traffic Engineering and Traffic management under MPLS, most + notably the works of Li and Rekhter [3], and others. In [3], an + architecture is proposed which employs MPLS and RSVP to provide + scalable differentiated services and Traffic Engineering in the + Internet. The present manuscript complements the aforementioned and + similar efforts. It reflects the authors' operational experience in + managing a large Internet backbone. + +1.1 Terminology + + The reader is assumed to be familiar with the MPLS terminology as + defined in [1]. + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in RFC 2119 [11]. + +1.2 Document Organization + + The remainder of this document is organized as follows: Section 2 + discusses the basic functions of Traffic Engineering in the Internet. + Section 3, provides an overview of the traffic Engineering potentials + of MPLS. Sections 1 to 3 are essentially background material. Section + 4 presents an overview of the fundamental requirements for Traffic + Engineering over MPLS. Section 5 describes the desirable attributes + and characteristics of traffic trunks which are pertinent to Traffic + Engineering. Section 6 presents a set of attributes which can be + associated with resources to constrain the routability of traffic + trunks and LSPs through them. Section 7 advocates the introduction of + a "constraint-based routing" framework in MPLS domains. Finally, + Section 8 contains concluding remarks. + + + + + + + + +Awduche, et al. Informational [Page 3] + +RFC 2702 MPLS Traffic Engineering September 1999 + + +2.0 Traffic Engineering + + This section describes the basic functions of Traffic Engineering in + an Autonomous System in the contemporary Internet. The limitations of + current IGPs with respect to traffic and resource control are + highlighted. This section serves as motivation for the requirements + on MPLS. + + Traffic Engineering (TE) is concerned with performance optimization + of operational networks. In general, it encompasses the application + of technology and scientific principles to the measurement, modeling, + characterization, and control of Internet traffic, and the + application of such knowledge and techniques to achieve specific + performance objectives. The aspects of Traffic Engineering that are + of interest concerning MPLS are measurement and control. + + A major goal of Internet Traffic Engineering is to facilitate + efficient and reliable network operations while simultaneously + optimizing network resource utilization and traffic performance. + Traffic Engineering has become an indispensable function in many + large Autonomous Systems because of the high cost of network assets + and the commercial and competitive nature of the Internet. These + factors emphasize the need for maximal operational efficiency. + +2.1 Traffic Engineering Performance Objectives + + The key performance objectives associated with traffic engineering + can be classified as being either: + + 1. traffic oriented or + + 2. resource oriented. + + Traffic oriented performance objectives include the aspects that + enhance the QoS of traffic streams. In a single class, best effort + Internet service model, the key traffic oriented performance + objectives include: minimization of packet loss, minimization of + delay, maximization of throughput, and enforcement of service level + agreements. Under a single class best effort Internet service model, + minimization of packet loss is one of the most important traffic + oriented performance objectives. Statistically bounded traffic + oriented performance objectives (such as peak to peak packet delay + variation, loss ratio, and maximum packet transfer delay) might + become useful in the forthcoming differentiated services Internet. + + Resource oriented performance objectives include the aspects + pertaining to the optimization of resource utilization. Efficient + management of network resources is the vehicle for the attainment of + + + +Awduche, et al. Informational [Page 4] + +RFC 2702 MPLS Traffic Engineering September 1999 + + + resource oriented performance objectives. In particular, it is + generally desirable to ensure that subsets of network resources do + not become over utilized and congested while other subsets along + alternate feasible paths remain underutilized. Bandwidth is a crucial + resource in contemporary networks. Therefore, a central function of + Traffic Engineering is to efficiently manage bandwidth resources. + + Minimizing congestion is a primary traffic and resource oriented + performance objective. The interest here is on congestion problems + that are prolonged rather than on transient congestion resulting from + instantaneous bursts. Congestion typically manifests under two + scenarios: + + 1. When network resources are insufficient or inadequate to + accommodate offered load. + + 2. When traffic streams are inefficiently mapped onto available + resources; causing subsets of network resources to become + over-utilized while others remain underutilized. + + The first type of congestion problem can be addressed by either: (i) + expansion of capacity, or (ii) application of classical congestion + control techniques, or (iii) both. Classical congestion control + techniques attempt to regulate the demand so that the traffic fits + onto available resources. Classical techniques for congestion control + include: rate limiting, window flow control, router queue management, + schedule-based control, and others; (see [8] and the references + therein). + + The second type of congestion problems, namely those resulting from + inefficient resource allocation, can usually be addressed through + Traffic Engineering. + + In general, congestion resulting from inefficient resource allocation + can be reduced by adopting load balancing policies. The objective of + such strategies is to minimize maximum congestion or alternatively to + minimize maximum resource utilization, through efficient resource + allocation. When congestion is minimized through efficient resource + allocation, packet loss decreases, transit delay decreases, and + aggregate throughput increases. Thereby, the perception of network + service quality experienced by end users becomes significantly + enhanced. + + Clearly, load balancing is an important network performance + optimization policy. Nevertheless, the capabilities provided for + Traffic Engineering should be flexible enough so that network + administrators can implement other policies which take into account + the prevailing cost structure and the utility or revenue model. + + + +Awduche, et al. Informational [Page 5] + +RFC 2702 MPLS Traffic Engineering September 1999 + + +2.2 Traffic and Resource Control + + Performance optimization of operational networks is fundamentally a + control problem. In the traffic engineering process model, the + Traffic Engineer, or a suitable automaton, acts as the controller in + an adaptive feedback control system. This system includes a set of + interconnected network elements, a network performance monitoring + system, and a set of network configuration management tools. The + Traffic Engineer formulates a control policy, observes the state of + the network through the monitoring system, characterizes the traffic, + and applies control actions to drive the network to a desired state, + in accordance with the control policy. This can be accomplished + reactively by taking action in response to the current state of the + network, or pro-actively by using forecasting techniques to + anticipate future trends and applying action to obviate the predicted + undesirable future states. + + Ideally, control actions should involve: + + 1. Modification of traffic management parameters, + + 2. Modification of parameters associated with routing, and + + 3. Modification of attributes and constraints associated with + resources. + + The level of manual intervention involved in the traffic engineering + process should be minimized whenever possible. This can be + accomplished by automating aspects of the control actions described + above, in a distributed and scalable fashion. + +2.3 Limitations of Current IGP Control Mechanisms + + This subsection reviews some of the well known limitations of current + IGPs with regard to Traffic Engineering. + + The control capabilities offered by existing Internet interior + gateway protocols are not adequate for Traffic Engineering. This + makes it difficult to actualize effective policies to address network + performance problems. Indeed, IGPs based on shortest path algorithms + contribute significantly to congestion problems in Autonomous Systems + within the Internet. SPF algorithms generally optimize based on a + simple additive metric. These protocols are topology driven, so + bandwidth availability and traffic characteristics are not factors + considered in routing decisions. Consequently, congestion frequently + occurs when: + + + + + +Awduche, et al. Informational [Page 6] + +RFC 2702 MPLS Traffic Engineering September 1999 + + + 1. the shortest paths of multiple traffic streams converge on + specific links or router interfaces, or + + 2. a given traffic stream is routed through a link or router + interface which does not have enough bandwidth to accommodate + it. + + These scenarios manifest even when feasible alternate paths with + excess capacity exist. It is this aspect of congestion problems (-- a + symptom of suboptimal resource allocation) that Traffic Engineering + aims to vigorously obviate. Equal cost path load sharing can be used + to address the second cause for congestion listed above with some + degree of success, however it is generally not helpful in alleviating + congestion due to the first cause listed above and particularly not + in large networks with dense topology. + + A popular approach to circumvent the inadequacies of current IGPs is + through the use of an overlay model, such as IP over ATM or IP over + frame relay. The overlay model extends the design space by enabling + arbitrary virtual topologies to be provisioned atop the network's + physical topology. The virtual topology is constructed from virtual + circuits which appear as physical links to the IGP routing protocols. + The overlay model provides additional important services to support + traffic and resource control, including: (1) constraint-based routing + at the VC level, (2) support for administratively configurable + explicit VC paths, (3) path compression, (4) call admission control + functions, (5) traffic shaping and traffic policing functions, and + (6) survivability of VCs. These capabilities enable the actualization + of a variety of Traffic Engineering policies. For example, virtual + circuits can easily be rerouted to move traffic from over-utilized + resources onto relatively underutilized ones. + + For Traffic Engineering in large dense networks, it is desirable to + equip MPLS with a level of functionality at least commensurate with + current overlay models. Fortunately, this can be done in a fairly + straight forward manner. + +3.0 MPLS and Traffic Engineering + + This section provides an overview of the applicability of MPLS to + Traffic Engineering. Subsequent sections discuss the set of + capabilities required to meet the Traffic Engineering requirements. + + MPLS is strategically significant for Traffic Engineering because it + can potentially provide most of the functionality available from the + overlay model, in an integrated manner, and at a lower cost than the + currently competing alternatives. Equally importantly, MPLS offers + + + + +Awduche, et al. Informational [Page 7] + +RFC 2702 MPLS Traffic Engineering September 1999 + + + the possibility to automate aspects of the Traffic Engineering + function. This last consideration requires further investigation and + is beyond the scope of this manuscript. + + A note on terminology: The concept of MPLS traffic trunks is used + extensively in the remainder of this document. According to Li and + Rekhter [3], a traffic trunk is an aggregation of traffic flows of + the same class which are placed inside a Label Switched Path. + Essentially, a traffic trunk is an abstract representation of traffic + to which specific characteristics can be associated. It is useful to + view traffic trunks as objects that can be routed; that is, the path + through which a traffic trunk traverses can be changed. In this + respect, traffic trunks are similar to virtual circuits in ATM and + Frame Relay networks. It is important, however, to emphasize that + there is a fundamental distinction between a traffic trunk and the + path, and indeed the LSP, through which it traverses. An LSP is a + specification of the label switched path through which the traffic + traverses. In practice, the terms LSP and traffic trunk are often + used synonymously. Additional characteristics of traffic trunks as + used in this manuscript are summarized in section 5.0. + + The attractiveness of MPLS for Traffic Engineering can be attributed + to the following factors: (1) explicit label switched paths which are + not constrained by the destination based forwarding paradigm can be + easily created through manual administrative action or through + automated action by the underlying protocols, (2) LSPs can + potentially be efficiently maintained, (3) traffic trunks can be + instantiated and mapped onto LSPs, (4) a set of attributes can be + associated with traffic trunks which modulate their behavioral + characteristics, (5) a set of attributes can be associated with + resources which constrain the placement of LSPs and traffic trunks + across them, (6) MPLS allows for both traffic aggregation and + disaggregation whereas classical destination only based IP forwarding + permits only aggregation, (7) it is relatively easy to integrate a + "constraint-based routing" framework with MPLS, (8) a good + implementation of MPLS can offer significantly lower overhead than + competing alternatives for Traffic Engineering. + + Additionally, through explicit label switched paths, MPLS permits a + quasi circuit switching capability to be superimposed on the current + Internet routing model. Many of the existing proposals for Traffic + Engineering over MPLS focus only on the potential to create explicit + LSPs. Although this capability is fundamental for Traffic + Engineering, it is not really sufficient. Additional augmentations + are required to foster the actualization of policies leading to + performance optimization of large operational networks. Some of the + necessary augmentations are described in this manuscript. + + + + +Awduche, et al. Informational [Page 8] + +RFC 2702 MPLS Traffic Engineering September 1999 + + +3.1 Induced MPLS Graph + + This subsection introduces the concept of an "induced MPLS graph" + which is central to Traffic Engineering in MPLS domains. An induced + MPLS graph is analogous to a virtual topology in an overlay model. It + is logically mapped onto the physical network through the selection + of LSPs for traffic trunks. + + An induced MPLS graph consists of a set of LSRs which comprise the + nodes of the graph and a set of LSPs which provide logical point to + point connectivity between the LSRs, and hence serve as the links of + the induced graph. it may be possible to construct hierarchical + induced MPLS graphs based on the concept of label stacks (see [1]). + + Induced MPLS graphs are important because the basic problem of + bandwidth management in an MPLS domain is the issue of how to + efficiently map an induced MPLS graph onto the physical network + topology. The induced MPLS graph abstraction is formalized below. + + Let G = (V, E, c) be a capacitated graph depicting the physical + topology of the network. Here, V is the set of nodes in the network + and E is the set of links; that is, for v and w in V, the object + (v,w) is in E if v and w are directly connected under G. The + parameter "c" is a set of capacity and other constraints associated + with E and V. We will refer to G as the "base" network topology. + + Let H = (U, F, d) be the induced MPLS graph, where U is a subset of + V representing the set of LSRs in the network, or more precisely the + set of LSRs that are the endpoints of at least one LSP. Here, F is + the set of LSPs, so that for x and y in U, the object (x, y) is in F + if there is an LSP with x and y as endpoints. The parameter "d" is + the set of demands and restrictions associated with F. Evidently, H + is a directed graph. It can be seen that H depends on the + transitivity characteristics of G. + +3.2 The Fundamental Problem of Traffic Engineering Over MPLS + + There are basically three fundamental problems that relate to Traffic + Engineering over MPLS. + + - The first problem concerns how to map packets onto forwarding + equivalence classes. + + - The second problem concerns how to map forwarding equivalence + classes onto traffic trunks. + + - The third problem concerns how to map traffic trunks onto the + physical network topology through label switched paths. + + + +Awduche, et al. Informational [Page 9] + +RFC 2702 MPLS Traffic Engineering September 1999 + + + This document is not focusing on the first two problems listed. + (even-though they are quite important). Instead, the remainder of + this manuscript will focus on the capabilities that permit the third + mapping function to be performed in a manner resulting in efficient + and reliable network operations. This is really the problem of + mapping an induced MPLS graph (H) onto the "base" network topology + (G). + +4.0 Augmented Capabilities for Traffic Engineering Over MPLS + + The previous sections reviewed the basic functions of Traffic + Engineering in the contemporary Internet. The applicability of MPLS + to that activity was also discussed. The remaining sections of this + manuscript describe the functional capabilities required to fully + support Traffic Engineering over MPLS in large networks. + + The proposed capabilities consist of: + + 1. A set of attributes associated with traffic trunks which + collectively specify their behavioral characteristics. + + 2. A set of attributes associated with resources which constrain + the placement of traffic trunks through them. These can also be + viewed as topology attribute constraints. + + 3. A "constraint-based routing" framework which is used to select + paths for traffic trunks subject to constraints imposed by items + 1) and 2) above. The constraint-based routing framework does not + have to be part of MPLS. However, the two need to be tightly + integrated together. + + The attributes associated with traffic trunks and resources, as well + as parameters associated with routing, collectively represent the + control variables which can be modified either through administrative + action or through automated agents to drive the network to a desired + state. + + In an operational network, it is highly desirable that these + attributes can be dynamically modified online by an operator without + adversely disrupting network operations. + +5.0 Traffic Trunk Attributes and Characteristics + + This section describes the desirable attributes which can be + associated with traffic trunks to influence their behavioral + characteristics. + + + + + +Awduche, et al. Informational [Page 10] + +RFC 2702 MPLS Traffic Engineering September 1999 + + + First, the basic properties of traffic trunks (as used in this + manuscript) are summarized below: + + - A traffic trunk is an *aggregate* of traffic flows belonging + to the same class. In some contexts, it may be desirable to + relax this definition and allow traffic trunks to include + multi-class traffic aggregates. + + - In a single class service model, such as the current Internet, + a traffic trunk could encapsulate all of the traffic between an + ingress LSR and an egress LSR, or subsets thereof. + + - Traffic trunks are routable objects (similar to ATM VCs). + + - A traffic trunk is distinct from the LSP through which it + traverses. In operational contexts, a traffic trunk can be + moved from one path onto another. + + - A traffic trunk is unidirectional. + + In practice, a traffic trunk can be characterized by its ingress and + egress LSRs, the forwarding equivalence class which is mapped onto + it, and a set of attributes which determine its behavioral + characteristics. + + Two basic issues are of particular significance: (1) parameterization + of traffic trunks and (2) path placement and maintenance rules for + traffic trunks. + +5.1 Bidirectional Traffic Trunks + + Although traffic trunks are conceptually unidirectional, in many + practical contexts, it is useful to simultaneously instantiate two + traffic trunks with the same endpoints, but which carry packets in + opposite directions. The two traffic trunks are logically coupled + together. One trunk, called the forward trunk, carries traffic from + an originating node to a destination node. The other trunk, called + the backward trunk, carries traffic from the destination node to the + originating node. We refer to the amalgamation of two such traffic + trunks as one bidirectional traffic trunk (BTT) if the following two + conditions hold: + + - Both traffic trunks are instantiated through an atomic action at + one LSR, called the originator node, or through an atomic action + at a network management station. + + - Neither of the composite traffic trunks can exist without the + other. That is, both are instantiated and destroyed together. + + + +Awduche, et al. Informational [Page 11] + +RFC 2702 MPLS Traffic Engineering September 1999 + + + The topological properties of BTTs should also be considered. A BTT + can be topologically symmetric or topologically asymmetric. A BTT is + said to be "topologically symmetric" if its constituent traffic + trunks are routed through the same physical path, even though they + operate in opposite directions. If, however, the component traffic + trunks are routed through different physical paths, then the BTT is + said to be "topologically asymmetric." + + It should be noted that bidirectional traffic trunks are merely an + administrative convenience. In practice, most traffic engineering + functions can be implemented using only unidirectional traffic + trunks. + +5.2 Basic Operations on Traffic Trunks + + The basic operations on traffic trunks significant to Traffic + Engineering purposes are summarized below. + + - Establish: To create an instance of a traffic trunk. + + - Activate: To cause a traffic trunk to start passing traffic. + The establishment and activation of a traffic trunk are + logically separate events. They may, however, be implemented + or invoked as one atomic action. + + - Deactivate: To cause a traffic trunk to stop passing traffic. + + - Modify Attributes: To cause the attributes of a traffic trunk + to be modified. + + - Reroute: To cause a traffic trunk to change its route. This + can be done through administrative action or automatically + by the underlying protocols. + + - Destroy: To remove an instance of a traffic trunk from the + network and reclaim all resources allocated to it. Such + resources include label space and possibly available bandwidth. + + The above are considered the basic operations on traffic trunks. + Additional operations are also possible such as policing and traffic + shaping. + +5.3 Accounting and Performance Monitoring + + Accounting and performance monitoring capabilities are very important + to the billing and traffic characterization functions. Performance + statistics obtained from accounting and performance monitoring + + + + +Awduche, et al. Informational [Page 12] + +RFC 2702 MPLS Traffic Engineering September 1999 + + + systems can be used for traffic characterization, performance + optimization, and capacity planning within the Traffic Engineering + realm.. + + The capability to obtain statistics at the traffic trunk level is so + important that it should be considered an essential requirement for + Traffic Engineering over MPLS. + +5.4 Basic Traffic Engineering Attributes of Traffic Trunks + + An attribute of a traffic trunk is a parameter assigned to it which + influences its behavioral characteristics. + + Attributes can be explicitly assigned to traffic trunks through + administration action or they can be implicitly assigned by the + underlying protocols when packets are classified and mapped into + equivalence classes at the ingress to an MPLS domain. Regardless of + how the attributes were originally assigned, for Traffic Engineering + purposes, it should be possible to administratively modify such + attributes. + + The basic attributes of traffic trunks particularly significant for + Traffic Engineering are itemized below. + + - Traffic parameter attributes + + - Generic Path selection and maintenance attributes + + - Priority attribute + + - Preemption attribute + + - Resilience attribute + + - Policing attribute + + The combination of traffic parameters and policing attributes is + analogous to usage parameter control in ATM networks. Most of the + attributes listed above have analogs in well established + technologies. Consequently, it should be relatively straight forward + to map the traffic trunk attributes onto many existing switching and + routing architectures. + + Priority and preemption can be regarded as relational attributes + because they express certain binary relations between traffic trunks. + Conceptually, these binary relations determine the manner in which + traffic trunks interact with each other as they compete for network + resources during path establishment and path maintenance. + + + +Awduche, et al. Informational [Page 13] + +RFC 2702 MPLS Traffic Engineering September 1999 + + +5.5 Traffic parameter attributes + + Traffic parameters can be used to capture the characteristics of the + traffic streams (or more precisely the forwarding equivalence class) + to be transported through the traffic trunk. Such characteristics may + include peak rates, average rates, permissible burst size, etc. From + a traffic engineering perspective, the traffic parameters are + significant because they indicate the resource requirements of the + traffic trunk. This is useful for resource allocation and congestion + avoidance through anticipatory policies. + + For the purpose of bandwidth allocation, a single canonical value of + bandwidth requirements can be computed from a traffic trunk's traffic + parameters. Techniques for performing these computations are well + known. One example of this is the theory of effective bandwidth. + +5.6 Generic Path Selection and Management Attributes + + Generic path selection and management attributes define the rules for + selecting the route taken by a traffic trunk as well as the rules for + maintenance of paths that are already established. + + Paths can be computed automatically by the underlying routing + protocols or they can be defined administratively by a network + operator. If there are no resource requirements or restrictions + associated with a traffic trunk, then a topology driven protocol can + be used to select its path. However, if resource requirements or + policy restrictions exist, then a constraint-based routing scheme + should be used for path selection. + + In Section 7, a constraint-based routing framework which can + automatically compute paths subject to a set of constraints is + described. Issues pertaining to explicit paths instantiated through + administrative action are discussed in Section 5.6.1 below. + + Path management concerns all aspects pertaining to the maintenance of + paths traversed by traffic trunks. In some operational contexts, it + is desirable that an MPLS implementation can dynamically reconfigure + itself, to adapt to some notion of change in "system state." + Adaptivity and resilience are aspects of dynamic path management. + + To guide the path selection and management process, a set of + attributes are required. The basic attributes and behavioral + characteristics associated with traffic trunk path selection and + management are described in the remainder of this sub-section. + + + + + + +Awduche, et al. Informational [Page 14] + +RFC 2702 MPLS Traffic Engineering September 1999 + + +5.6.1 Administratively Specified Explicit Paths + + An administratively specified explicit path for a traffic trunk is + one which is configured through operator action. An administratively + specified path can be completely specified or partially specified. A + path is completely specified if all of the required hops between the + endpoints are indicated. A path is partially specified if only a + subset of intermediate hops are indicated. In this case, the + underlying protocols are required to complete the path. Due to + operator errors, an administratively specified path can be + inconsistent or illogical. The underlying protocols should be able to + detect such inconsistencies and provide appropriate feedback. + + A "path preference rule" attribute should be associated with + administratively specified explicit paths. A path preference rule + attribute is a binary variable which indicates whether the + administratively configured explicit path is "mandatory" or "non- + mandatory." + + If an administratively specified explicit path is selected with a + "mandatory attribute, then that path (and only that path) must be + used. If a mandatory path is topological infeasible (e.g. the two + endpoints are topologically partitioned), or if the path cannot be + instantiated because the available resources are inadequate, then the + path setup process fails. In other words, if a path is specified as + mandatory, then an alternate path cannot be used regardless of + prevailing circumstance. A mandatory path which is successfully + instantiated is also implicitly pinned. Once the path is instantiated + it cannot be changed except through deletion and instantiation of a + new path. + + However, if an administratively specified explicit path is selected + with a "non-mandatory" preference rule attribute value, then the path + should be used if feasible. Otherwise, an alternate path can be + chosen instead by the underlying protocols. + +5.6.2 Hierarchy of Preference Rules For Multi-Paths + + In some practical contexts, it can be useful to have the ability to + administratively specify a set of candidate explicit paths for a + given traffic trunk and define a hierarchy of preference relations on + the paths. During path establishment, the preference rules are + applied to select a suitable path from the candidate list. Also, + under failure scenarios the preference rules are applied to select an + alternate path from the candidate list. + + + + + + +Awduche, et al. Informational [Page 15] + +RFC 2702 MPLS Traffic Engineering September 1999 + + +5.6.3 Resource Class Affinity Attributes + + Resource class affinity attributes associated with a traffic trunk + can be used to specify the class of resources (see Section 6) which + are to be explicitly included or excluded from the path of the + traffic trunk. These are policy attributes which can be used to + impose additional constraints on the path traversed by a given + traffic trunk. Resource class affinity attributes for a traffic can + be specified as a sequence of tuples: + + <resource-class, affinity>; <resource-class, affinity>; .. + + The resource-class parameter identifies a resource class for which an + affinity relationship is defined with respect to the traffic trunk. + The affinity parameter indicates the affinity relationship; that is, + whether members of the resource class are to be included or excluded + from the path of the traffic trunk. Specifically, the affinity + parameter may be a binary variable which takes one of the following + values: (1) explicit inclusion, and (2) explicit exclusion. + + If the affinity attribute is a binary variable, it may be possible to + use Boolean expressions to specify the resource class affinities + associated with a given traffic trunk. + + If no resource class affinity attributes are specified, then a "don't + care" affinity relationship is assumed to hold between the traffic + trunk and all resources. That is, there is no requirement to + explicitly include or exclude any resources from the traffic trunk's + path. This should be the default in practice. + + Resource class affinity attributes are very useful and powerful + constructs because they can be used to implement a variety of + policies. For example, they can be used to contain certain traffic + trunks within specific topological regions of the network. + + A "constraint-based routing" framework (see section 7.0) can be used + to compute an explicit path for a traffic trunk subject to resource + class affinity constraints in the following manner: + + 1. For explicit inclusion, prune all resources not belonging + to the specified classes prior to performing path computation. + + 2. For explicit exclusion, prune all resources belonging to the + specified classes before performing path placement computations. + + + + + + + +Awduche, et al. Informational [Page 16] + +RFC 2702 MPLS Traffic Engineering September 1999 + + +5.6.4 Adaptivity Attribute + + Network characteristics and state change over time. For example, new + resources become available, failed resources become reactivated, and + allocated resources become deallocated. In general, sometimes more + efficient paths become available. Therefore, from a Traffic + Engineering perspective, it is necessary to have administrative + control parameters that can be used to specify how traffic trunks + respond to this dynamism. In some scenarios, it might be desirable to + dynamically change the paths of certain traffic trunks in response to + changes in network state. This process is called re-optimization. In + other scenarios, re-optimization might be very undesirable. + + An Adaptivity attribute is a part of the path maintenance parameters + associated with traffic trunks. The adaptivity attribute associated + with a traffic trunk indicates whether the trunk is subject to re- + optimization. That is, an adaptivity attribute is a binary variable + which takes one of the following values: (1) permit re-optimization + and (2) disable re-optimization. + + If re-optimization is enabled, then a traffic trunk can be rerouted + through different paths by the underlying protocols in response to + changes in network state (primarily changes in resource + availability). Conversely, if re-optimization is disabled, then the + traffic trunk is "pinned" to its established path and cannot be + rerouted in response to changes in network state. + + Stability is a major concern when re-optimization is permitted. To + promote stability, an MPLS implementation should not be too reactive + to the evolutionary dynamics of the network. At the same time, it + must adapt fast enough so that optimal use can be made of network + assets. This implies that the frequency of re-optimization should be + administratively configurable to allow for tuning. + + It is to be noted that re-optimization is distinct from resilience. A + different attribute is used to specify the resilience characteristics + of a traffic trunk (see section 5.9). In practice, it would seem + reasonable to expect traffic trunks subject to re-optimization to be + implicitly resilient to failures along their paths. However, a + traffic trunk which is not subject to re-optimization and whose path + is not administratively specified with a "mandatory" attribute can + also be required to be resilient to link and node failures along its + established path + + Formally, it can be stated that adaptivity to state evolution through + re-optimization implies resilience to failures, whereas resilience to + failures does not imply general adaptivity through re-optimization to + state changes. + + + +Awduche, et al. Informational [Page 17] + +RFC 2702 MPLS Traffic Engineering September 1999 + + +5.6.5 Load Distribution Across Parallel Traffic Trunks + + Load distribution across multiple parallel traffic trunks between two + nodes is an important consideration. In many practical contexts, the + aggregate traffic between two nodes may be such that no single link + (hence no single path) can carry the load. However, the aggregate + flow might be less than the maximum permissible flow across a "min- + cut" that partitions the two nodes. In this case, the only feasible + solution is to appropriately divide the aggregate traffic into sub- + streams and route the sub-streams through multiple paths between the + two nodes. + + In an MPLS domain, this problem can be addressed by instantiating + multiple traffic trunks between the two nodes, such that each traffic + trunk carries a proportion of the aggregate traffic. Therefore, a + flexible means of load assignment to multiple parallel traffic trunks + carrying traffic between a pair of nodes is required. + + Specifically, from an operational perspective, in situations where + parallel traffic trunks are warranted, it would be useful to have + some attribute that can be used to indicate the relative proportion + of traffic to be carried by each traffic trunk. The underlying + protocols will then map the load onto the traffic trunks according to + the specified proportions. It is also, generally desirable to + maintain packet ordering between packets belong to the same micro- + flow (same source address, destination address, and port number). + +5.7 Priority attribute + + The priority attribute defines the relative importance of traffic + trunks. If a constraint-based routing framework is used with MPLS, + then priorities become very important because they can be used to + determine the order in which path selection is done for traffic + trunks at connection establishment and under fault scenarios. + + Priorities are also important in implementations permitting + preemption because they can be used to impose a partial order on the + set of traffic trunks according to which preemptive policies can be + actualized. + +5.8 Preemption attribute + + The preemption attribute determines whether a traffic trunk can + preempt another traffic trunk from a given path, and whether another + traffic trunk can preempt a specific traffic trunk. Preemption is + useful for both traffic oriented and resource oriented performance + + + + + +Awduche, et al. Informational [Page 18] + +RFC 2702 MPLS Traffic Engineering September 1999 + + + objectives. Preemption can used to assure that high priority traffic + trunks can always be routed through relatively favorable paths within + a differentiated services environment. + + Preemption can also be used to implement various prioritized + restoration policies following fault events. + + The preemption attribute can be used to specify four preempt modes + for a traffic trunk: (1) preemptor enabled, (2) non-preemptor, (3) + preemptable, and (4) non-preemptable. A preemptor enabled traffic + trunk can preempt lower priority traffic trunks designated as + preemptable. A traffic specified as non-preemptable cannot be + preempted by any other trunks, regardless of relative priorities. A + traffic trunk designated as preemptable can be preempted by higher + priority trunks which are preemptor enabled. + + It is trivial to see that some of the preempt modes are mutually + exclusive. Using the numbering scheme depicted above, the feasible + preempt mode combinations for a given traffic trunk are as follows: + (1, 3), (1, 4), (2, 3), and (2, 4). The (2, 4) combination should be + the default. + + A traffic trunk, say "A", can preempt another traffic trunk, say "B", + only if *all* of the following five conditions hold: (i) "A" has a + relatively higher priority than "B", (ii) "A" contends for a resource + utilized by "B", (iii) the resource cannot concurrently accommodate + "A" and "B" based on certain decision criteria, (iv) "A" is preemptor + enabled, and (v) "B" is preemptable. + + Preemption is not considered a mandatory attribute under the current + best effort Internet service model although it is useful. However, in + a differentiated services scenario, the need for preemption becomes + more compelling. Moreover, in the emerging optical internetworking + architectures, where some protection and restoration functions may be + migrated from the optical layer to data network elements (such as + gigabit and terabit label switching routers) to reduce costs, + preemptive strategies can be used to reduce the restoration time for + high priority traffic trunks under fault conditions. + +5.9 Resilience Attribute + + The resilience attribute determines the behavior of a traffic trunk + under fault conditions. That is, when a fault occurs along the path + through which the traffic trunk traverses. The following basic + problems need to be addressed under such circumstances: (1) fault + detection, (2) failure notification, (3) recovery and service + restoration. Obviously, an MPLS implementation will have to + incorporate mechanisms to address these issues. + + + +Awduche, et al. Informational [Page 19] + +RFC 2702 MPLS Traffic Engineering September 1999 + + + Many recovery policies can be specified for traffic trunks whose + established paths are impacted by faults. The following are examples + of feasible schemes: + + 1. Do not reroute the traffic trunk. For example, a survivability + scheme may already be in place, provisioned through an + alternate mechanism, which guarantees service continuity + under failure scenarios without the need to reroute traffic + trunks. An example of such an alternate scheme (certainly + many others exist), is a situation whereby multiple parallel + label switched paths are provisioned between two nodes, and + function in a manner such that failure of one LSP causes the + traffic trunk placed on it to be mapped onto the remaining LSPs + according to some well defined policy. + + 2. Reroute through a feasible path with enough resources. If none + exists, then do not reroute. + + 3. Reroute through any available path regardless of resource + constraints. + + 4. Many other schemes are possible including some which might be + combinations of the above. + + A "basic" resilience attribute indicates the recovery procedure to be + applied to traffic trunks whose paths are impacted by faults. + Specifically, a "basic" resilience attribute is a binary variable + which determines whether the target traffic trunk is to be rerouted + when segments of its path fail. "Extended" resilience attributes can + be used to specify detailed actions to be taken under fault + scenarios. For example, an extended resilience attribute might + specify a set of alternate paths to use under fault conditions, as + well as the rules that govern the relative preference of each + specified path. + + Resilience attributes mandate close interaction between MPLS and + routing. + +5.10 Policing attribute + + The policing attribute determines the actions that should be taken by + the underlying protocols when a traffic trunk becomes non-compliant. + That is, when a traffic trunk exceeds its contract as specified in + the traffic parameters. Generally, policing attributes can indicate + whether a non-conformant traffic trunk is to be rate limited, tagged, + or simply forwarded without any policing action. If policing is + used, then adaptations of established algorithms such as the ATM + Forum's GCRA [11] can be used to perform this function. + + + +Awduche, et al. Informational [Page 20] + +RFC 2702 MPLS Traffic Engineering September 1999 + + + Policing is necessary in many operational scenarios, but is quite + undesirable in some others. In general, it is usually desirable to + police at the ingress to a network (to enforce compliance with + service level agreements) and to minimize policing within the core, + except when capacity constraints dictate otherwise. + + Therefore, from a Traffic Engineering perspective, it is necessary to + be able to administratively enable or disable traffic policing for + each traffic trunk. + +6.0 Resource Attributes + + Resource attributes are part of the topology state parameters, which + are used to constrain the routing of traffic trunks through specific + resources. + +6.1 Maximum Allocation Multiplier + + The maximum allocation multiplier (MAM) of a resource is an + administratively configurable attribute which determines the + proportion of the resource that is available for allocation to + traffic trunks. This attribute is mostly applicable to link + bandwidth. However, it can also be applied to buffer resources on + LSRs. The concept of MAM is analogous to the concepts of subscription + and booking factors in frame relay and ATM networks. + + The values of the MAM can be chosen so that a resource can be under- + allocated or over-allocated. A resource is said to be under- + allocated if the aggregate demands of all traffic trunks (as + expressed in the trunk traffic parameters) that can be allocated to + it are always less than the capacity of the resource. A resource is + said to be over-allocated if the aggregate demands of all traffic + trunks allocated to it can exceed the capacity of the resource. + + Under-allocation can be used to bound the utilization of resources. + However,the situation under MPLS is more complex than in circuit + switched schemes because under MPLS, some flows can be routed via + conventional hop by hop protocols (also via explicit paths) without + consideration for resource constraints. + + Over-allocation can be used to take advantage of the statistical + characteristics of traffic in order to implement more efficient + resource allocation policies. In particular, over-allocation can be + used in situations where the peak demands of traffic trunks do not + coincide in time. + + + + + + +Awduche, et al. Informational [Page 21] + +RFC 2702 MPLS Traffic Engineering September 1999 + + +6.2 Resource Class Attribute + + Resource class attributes are administratively assigned parameters + which express some notion of "class" for resources. Resource class + attributes can be viewed as "colors" assigned to resources such that + the set of resources with the same "color" conceptually belong to the + same class. Resource class attributes can be used to implement a + variety of policies. The key resources of interest here are links. + When applied to links, the resource class attribute effectively + becomes an aspect of the "link state" parameters. + + The concept of resource class attributes is a powerful abstraction. + From a Traffic Engineering perspective, it can be used to implement + many policies with regard to both traffic and resource oriented + performance optimization. Specifically, resource class attributes can + be used to: + + 1. Apply uniform policies to a set of resources that do not need + to be in the same topological region. + + 2. Specify the relative preference of sets of resources for + path placement of traffic trunks. + + 3. Explicitly restrict the placement of traffic trunks + to specific subsets of resources. + + 4. Implement generalized inclusion / exclusion policies. + + 5. Enforce traffic locality containment policies. That is, + policies that seek to contain local traffic within + specific topological regions of the network. + + Additionally, resource class attributes can be used for + identification purposes. + + In general, a resource can be assigned more than one resource class + attribute. For example, all of the OC-48 links in a given network may + be assigned a distinguished resource class attribute. The subsets of + OC-48 links which exist with a given abstraction domain of the + network may be assigned additional resource class attributes in order + to implement specific containment policies, or to architect the + network in a certain manner. + +7.0 Constraint-Based Routing + + This section discusses the issues pertaining to constraint-based + routing in MPLS domains. In contemporary terminology, constraint- + based routing is often referred to as "QoS Routing" see [5,6,7,10]. + + + +Awduche, et al. Informational [Page 22] + +RFC 2702 MPLS Traffic Engineering September 1999 + + + This document uses the term "constraint-based routing" however, + because it better captures the functionality envisioned, which + generally encompasses QoS routing as a subset. + + constraint-based routing enables a demand driven, resource + reservation aware, routing paradigm to co-exist with current topology + driven hop by hop Internet interior gateway protocols. + + A constraint-based routing framework uses the following as input: + + - The attributes associated with traffic trunks. + + - The attributes associated with resources. + + - Other topology state information. + + Based on this information, a constraint-based routing process on each + node automatically computes explicit routes for each traffic trunk + originating from the node. In this case, an explicit route for each + traffic trunk is a specification of a label switched path that + satisfies the demand requirements expressed in the trunk's + attributes, subject to constraints imposed by resource availability, + administrative policy, and other topology state information. + + A constraint-based routing framework can greatly reduce the level of + manual configuration and intervention required to actualize Traffic + Engineering policies. + + In practice, the Traffic Engineer, an operator, or even an automaton + will specify the endpoints of a traffic trunk and assign a set of + attributes to the trunk which encapsulate the performance + expectations and behavioral characteristics of the trunk. The + constraint-based routing framework is then expected to find a + feasible path to satisfy the expectations. If necessary, the Traffic + Engineer or a traffic engineering support system can then use + administratively configured explicit routes to perform fine grained + optimization. + +7.1 Basic Features of Constraint-Based Routing + + A constraint-based routing framework should at least have the + capability to automatically obtain a basic feasible solution to the + traffic trunk path placement problem. + + In general, the constraint-based routing problem is known to be + intractable for most realistic constraints. However, in practice, a + very simple well known heuristic (see e.g. [9]) can be used to find a + feasible path if one exists: + + + +Awduche, et al. Informational [Page 23] + +RFC 2702 MPLS Traffic Engineering September 1999 + + + - First prune resources that do not satisfy the requirements of + the traffic trunk attributes. + + - Next, run a shortest path algorithm on the residual graph. + + Clearly, if a feasible path exists for a single traffic trunk, then + the above simple procedure will find it. Additional rules can be + specified to break ties and perform further optimizations. In + general, ties should be broken so that congestion is minimized. When + multiple traffic trunks are to be routed, however, it can be shown + that the above algorithm may not always find a mapping, even when a + feasible mapping exists. + +7.2 Implementation Considerations + + Many commercial implementations of frame relay and ATM switches + already support some notion of constraint-based routing. For such + devices or for the novel MPLS centric contraptions devised therefrom, + it should be relatively easy to extend the current constraint-based + routing implementations to accommodate the peculiar requirements of + MPLS. + + For routers that use topology driven hop by hop IGPs, constraint- + based routing can be incorporated in at least one of two ways: + + 1. By extending the current IGP protocols such as OSPF and IS-IS to + support constraint-based routing. Effort is already underway to + provide such extensions to OSPF (see [5,7]). + + 2. By adding a constraint-based routing process to each router which + can co-exist with current IGPs. This scenario is depicted + in Figure 1. + + ------------------------------------------ + | Management Interface | + ------------------------------------------ + | | | + ------------ ------------------ -------------- + | MPLS |<->| Constraint-Based | | Conventional | + | | | Routing Process | | IGP Process | + ------------ ------------------ -------------- + | | + ----------------------- -------------- + | Resource Attribute | | Link State | + | Availability Database | | Database | + ----------------------- -------------- + + Figure 1. Constraint-Based Routing Process on Layer 3 LSR + + + +Awduche, et al. Informational [Page 24] + +RFC 2702 MPLS Traffic Engineering September 1999 + + + There are many important details associated with implementing + constraint-based routing on Layer 3 devices which we do not discuss + here. These include the following: + + - Mechanisms for exchange of topology state information + (resource availability information, link state information, + resource attribute information) between constraint-based + routing processes. + + - Mechanisms for maintenance of topology state information. + + - Interaction between constraint-based routing processes and + conventional IGP processes. + + - Mechanisms to accommodate the adaptivity requirements of + traffic trunks. + + - Mechanisms to accommodate the resilience and survivability + requirements of traffic trunks. + + In summary, constraint-based routing assists in performance + optimization of operational networks by automatically finding + feasible paths that satisfy a set of constraints for traffic trunks. + It can drastically reduce the amount of administrative explicit path + configuration and manual intervention required to achieve Traffic + Engineering objectives. + +8.0 Conclusion + + This manuscript presented a set of requirements for Traffic + Engineering over MPLS. Many capabilities were described aimed at + enhancing the applicability of MPLS to Traffic Engineering in the + Internet. + + It should be noted that some of the issues described here can be + addressed by incorporating a minimal set of building blocks into + MPLS, and then using a network management superstructure to extend + the functionality in order to realize the requirements. Also, the + constraint-based routing framework does not have to be part of the + core MPLS specifications. However, MPLS does require some interaction + with a constraint-based routing framework in order to meet the + requirements. + + + + + + + + + +Awduche, et al. Informational [Page 25] + +RFC 2702 MPLS Traffic Engineering September 1999 + + +9.0 Security Considerations + + This document does not introduce new security issues beyond those + inherent in MPLS and may use the same mechanisms proposed for this + technology. It is, however, specifically important that manipulation + of administratively configurable parameters be executed in a secure + manner by authorized entities. + +10.0 References + + [1] Rosen, E., Viswanathan, A. and R. Callon, "A Proposed + Architecture for MPLS", Work in Progress. + + [2] Callon, R., Doolan, P., Feldman, N., Fredette, A., Swallow, G. + and A. Viswanathan, "A Framework for Multiprotocol Label + Switching", Work in Progress. + + [3] Li, T. and Y. Rekhter, "Provider Architecture for Differentiated + Services and Traffic Engineering (PASTE)", RFC 2430, October + 1998. + + [4] Rekhter, Y., Davie, B., Katz, D., Rosen, E. and G. Swallow, + "Cisco Systems' Tag Switching Architecture - Overview", RFC + 2105, February 1997. + + [5] Zhang, Z., Sanchez, C., Salkewicz, B. and E. Crawley "Quality of + Service Extensions to OSPF", Work in Progress. + + [6] Crawley, E., Nair, F., Rajagopalan, B. and H. Sandick, "A + Framework for QoS Based Routing in the Internet", RFC 2386, + August 1998. + + [7] Guerin, R., Kamat, S., Orda, A., Przygienda, T. and D. Williams, + "QoS Routing Mechanisms and OSPF Extensions", RFC 2676, August + 1999. + + [8] C. Yang and A. Reddy, "A Taxonomy for Congestion Control + Algorithms in Packet Switching Networks," IEEE Network Magazine, + Volume 9, Number 5, July/August 1995. + + [9] W. Lee, M. Hluchyi, and P. Humblet, "Routing Subject to Quality + of Service Constraints in Integrated Communication Networks," + IEEE Network, July 1995, pp 46-55. + + [10] ATM Forum, "Traffic Management Specification: Version 4.0" April + 1996. + + + + + +Awduche, et al. Informational [Page 26] + +RFC 2702 MPLS Traffic Engineering September 1999 + + +11.0 Acknowledgments + + The authors would like to thank Yakov Rekhter for his review of an + earlier draft of this document. The authors would also like to thank + Louis Mamakos and Bill Barns for their helpful suggestions, and + Curtis Villamizar for providing some useful feedback. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Awduche, et al. Informational [Page 27] + +RFC 2702 MPLS Traffic Engineering September 1999 + + +12.0 Authors' Addresses + + Daniel O. Awduche + UUNET (MCI Worldcom) + 3060 Williams Drive + Fairfax, VA 22031 + + Phone: +1 703-208-5277 + EMail: awduche@uu.net + + + Joe Malcolm + UUNET (MCI Worldcom) + 3060 Williams Drive + Fairfax, VA 22031 + + Phone: +1 703-206-5895 + EMail: jmalcolm@uu.net + + + Johnson Agogbua + UUNET (MCI Worldcom) + 3060 Williams Drive + Fairfax, VA 22031 + + Phone: +1 703-206-5794 + EMail: ja@uu.net + + + Mike O'Dell + UUNET (MCI Worldcom) + 3060 Williams Drive + Fairfax, VA 22031 + + Phone: +1 703-206-5890 + EMail: mo@uu.net + + + Jim McManus + UUNET (MCI Worldcom) + 3060 Williams Drive + Fairfax, VA 22031 + + Phone: +1 703-206-5607 + EMail: jmcmanus@uu.net + + + + + + +Awduche, et al. Informational [Page 28] + +RFC 2702 MPLS Traffic Engineering September 1999 + + +13.0 Full Copyright Statement + + Copyright (C) The Internet Society (1999). All Rights Reserved. + + This document and translations of it may be copied and furnished to + others, and derivative works that comment on or otherwise explain it + or assist in its implementation may be prepared, copied, published + and distributed, in whole or in part, without restriction of any + kind, provided that the above copyright notice and this paragraph are + included on all such copies and derivative works. However, this + document itself may not be modified in any way, such as by removing + the copyright notice or references to the Internet Society or other + Internet organizations, except as needed for the purpose of + developing Internet standards in which case the procedures for + copyrights defined in the Internet Standards process must be + followed, or as required to translate it into languages other than + English. + + The limited permissions granted above are perpetual and will not be + revoked by the Internet Society or its successors or assigns. + + This document and the information contained herein is provided on an + "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING + TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING + BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION + HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF + MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + + + + + + + + + + + +Awduche, et al. Informational [Page 29] + |