diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc2815.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc2815.txt')
-rw-r--r-- | doc/rfc/rfc2815.txt | 955 |
1 files changed, 955 insertions, 0 deletions
diff --git a/doc/rfc/rfc2815.txt b/doc/rfc/rfc2815.txt new file mode 100644 index 0000000..1011973 --- /dev/null +++ b/doc/rfc/rfc2815.txt @@ -0,0 +1,955 @@ + + + + + + +Network Working Group M. Seaman +Request for Comments: 2815 Telseon +Category: Standards Track A. Smith + Extreme Networks + E. Crawley + Unisphere Solutions + J. Wroclawski + MIT LCS + May 2000 + + + Integrated Service Mappings on IEEE 802 Networks + +Status of this Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2000). All Rights Reserved. + +Abstract + + This document describes mappings of IETF Integrated Services over + LANs built from IEEE 802 network segments which may be interconnected + by IEEE 802.1D MAC Bridges (switches). It describes parameter + mappings for supporting Controlled Load and Guaranteed Service using + the inherent capabilities of relevant IEEE 802 technologies and, in + particular, 802.1D-1998 queuing features in switches. + + These mappings are one component of the Integrated Services over IEEE + 802 LANs framework. + + + + + + + + + + + + + + + +Seaman, et al. Standards Track [Page 1] + +RFC 2815 Int-Serv Mappings on IEEE 802 Networks May 2000 + + +Table of Contents + + 1 Introduction ............................................... 2 + 2 Flow Identification and Traffic Class Selection ............ 3 + 3 Choosing a flow's IEEE 802 user_priority class ............. 5 + 3.1 Context of admission control and delay bounds ............ 6 + 3.2 Default service mappings ................................. 7 + 3.3 Discussion ............................................... 9 + 4 Computation of integrated services characterization parameters + by IEEE 802 devices .....................................10 + 4.1 General characterization parameters ......................10 + 4.2 Parameters to implement Guaranteed Service ...............11 + 4.3 Parameters to implement Controlled Load ..................11 + 4.4 Parameters to implement Best Effort ......................12 + 5 Merging of RSVP/SBM objects ................................12 + 6 Applicability of these service mappings ....................13 + 7 References .................................................14 + 8 Security Considerations ....................................15 + 9 Acknowledgments ............................................15 + 10 Authors' Addresses ........................................16 + 11 Full Copyright Statement ..................................17 + +1. Introduction + + The IEEE 802.1 Interworking Task Group has developed a set of + enhancements to the basic MAC Service provided in Bridged Local Area + Networks (a.k.a. "switched LANs"). As a supplement to the original + IEEE MAC Bridges standard, IEEE 802.1D-1990 [802.1D-ORIG], the + updated IEEE 802.1D-1998 [802.1D] proposes differential traffic class + queuing in switches. The IEEE 802.1Q specification [802.1Q] extends + the capabilities of Ethernet/802.3 media to carry a traffic class + indicator, or "user_priority" field, within data frames. + + The availability of this differential traffic queuing, together with + additional mechanisms to provide admission control and signaling, + allows IEEE 802 networks to support a close approximation of the IETF + Integrated Services capabilities [CL][GS]. This document describes + methods for mapping the service classes and parameters of the IETF + model into IEEE 802.1D network parameters. A companion document + [SBM] describes a signaling protocol for use with these mappings. It + is recommended that readers be familiar with the overall framework in + which these mappings and signaling protocol are expected to be used; + this framework is described fully in [IS802FRAME]. + + Within this document, Section 2 describes the method by which end + systems and routers bordering the IEEE Layer-2 cloud learn what + traffic class should be used for each data flow's packets. Section 3 + describes the approach recommended to map IP-level traffic flows to + + + +Seaman, et al. Standards Track [Page 2] + +RFC 2815 Int-Serv Mappings on IEEE 802 Networks May 2000 + + + IEEE traffic classes within the Layer 2 network. Section 4 describes + the computation of Characterization Parameters by the layer 2 + network. The remaining sections discuss some particular issues with + the use of the RSVP/SBM signaling protocols, and describe the + applicability of all of the above to different layer 2 network + topologies. + +2. Flow Identification and Traffic Class Selection + + One model for supporting integrated services over specific link + layers treats layer-2 devices very much as a special case of routers. + In this model, switches and other devices along the data path make + packet handling decisions based on the RSVP flow and filter + specifications, and use these specifications to classify the + corresponding data packets. The specifications could either be used + directly, or could be used indirectly by mapping each RSVP session + onto a layer-2 construct such as an ATM virtual circuit. + + This approach is inappropriate for use in the IEEE 802 environment. + Filtering to the per-flow level becomes expensive with increasing + switch speed; devices with such filtering capabilities are likely to + have a very similar implementation complexity to IP routers, and may + not make use of simpler mechanisms such as 802.1D user priority. + + The Integrated Services over IEEE 802 LANs framework [IS802FRAME] and + this document use an "aggregated flow" approach based on use of + layer-2 traffic classes. In this model, each arriving flow is + assigned to one of the available classes for the duration of the flow + and traverses the 802 cloud in this class. Traffic flows requiring + similar service are grouped together into a single class, while the + system's admission control and class selection rules ensure that the + service requirements for flows in each of the classes are met. In + many situations this is a viable intermediate point between no QoS + control and full router-type integrated services. The approach can + work effectively even with switches implementing only the simplest + differential traffic classification capability specified in the + 802.1D model. In the aggregated flow model, traffic arriving at the + boundary of a layer-2 cloud is tagged by the boundary device (end + host or border router) with an appropriate traffic class, represented + as an 802.1D "user_priority" value. Two fundamental questions are + "who determines the correspondence between IP-level traffic flows and + link-level classes?" and "how is this correspondence conveyed to the + boundary devices that must mark the data frames?" + + One approach to answering these questions would be for the meanings + of the classes to be universally defined. This document would then + standardize the meanings of a set of classes; e.g., 1 = best effort, + 2 = 100 ms peak delay target, 3 = 10 ms peak delay target, 4 = 1 ms + + + +Seaman, et al. Standards Track [Page 3] + +RFC 2815 Int-Serv Mappings on IEEE 802 Networks May 2000 + + + peak delay target, etc. The meanings of these universally defined + classes could then be encoded directly in end stations, and the + flow-to-class mappings computed directly in these devices. + + This universal definition approach would be simple to implement, but + is too rigid to map the wide range of possible user requirements onto + the limited number of available 802.1D classes. The model described + in [IS802FRAME] uses a more flexible mapping: clients ask "the + network" which user_priority traffic class to use for a given traffic + flow, as categorized by its flow-spec and layer-2 endpoints. The + network provides a value back to the requester that is appropriate + considering the current network topology, load conditions, other + admitted flows, etc. The task of configuring switches with this + mapping (e.g., through network management, a switch-switch protocol + or via some network-wide QoS-mapping directory service) is an order + of magnitude less complex than performing the same function in end + stations. Also, when new services (or other network reconfigurations) + are added to such a network, the network elements will typically be + the ones to be upgraded with new queuing algorithms etc. and can be + provided with new mappings at this time. + + In the current model it is assumed that all data packets of a flow + are assigned to the same traffic class for the duration of the flow: + the characteristics of the MAC service, as defined by Clause 6 of + [802.1D], then ensure the ordering of the data packets of the flow + between adjacent Layer 3 routers. This is usually desirable to avoid + potential re-ordering problems as discussed in [IS802FRAME] and [CL]. + Note that there are some scenarios where it might be desirable to + send conforming data traffic in one traffic class and non-conforming + traffic for the same flow in a different, lower traffic class: such a + division into separate traffic classes is for future study. When a + new session or "flow" requiring QoS support is created, a client must + ask "the network" which traffic class (IEEE 802 user_priority) to use + for a given traffic flow, so that it can label the packets of the + flow as it places them into the network. A request/response protocol + is needed between client and network to return this information. The + request can be piggy-backed onto an admission control request and the + response can be piggy-backed onto an admission control + acknowledgment. This "one pass" assignment has the benefit of + completing the admission control transaction in a timely way and + reducing the exposure to changing conditions that could occur if + clients cached the knowledge for extensive periods. A set of + extensions to the RSVP protocol for communicating this information + have been defined [SBM]. + + The network (i.e., the first network element encountered downstream + from the client) must then answer the following questions: + + + + +Seaman, et al. Standards Track [Page 4] + +RFC 2815 Int-Serv Mappings on IEEE 802 Networks May 2000 + + + 1. Which of the available traffic classes would be appropriate for + this flow? + + In general, a newly arriving flow might be assigned to a number + of classes. For example, if 10ms of delay is acceptable, the + flow could potentially be assigned to either a 10ms delay class + or a 1ms delay class. This packing problem is quite difficult to + solve if the target parameters of the classes are allowed to + change dynamically as flows arrive and depart. It is quite + simple if the target parameters of each class is held fixed, and + the class table is simply searched to find a class appropriate + for the arriving flow. This document adopts the latter + approach. + + 2. Of the appropriate traffic classes, which if any have enough + capacity available to accept the new flow? + + This is the admission control problem. It is necessary to + compare the level of traffic currently assigned to each class + with the available level of network resources (bandwidth, + buffers, etc), to ensure that adding the new flow to the class + will not cause the class's performance to go below its target + values. This problem is compounded because in a priority queuing + system adding traffic to a higher-priority class can affect the + performance of lower-priority classes. The admission control + algorithm for a system using the default 802 priority behavior + must be reasonably sophisticated to provide acceptable results. + + If an acceptable class is found, the network returns the chosen + user_priority value to the client. + + Note that the client may be an end station, a router at the edge of + the layer 2 network, or a first switch acting as a proxy for a device + that does not participate in these protocols for whatever reason. + Note also that a device e.g., a server or router may choose to + implement both the "client" as well as the "network" portion of this + model so that it can select its own user_priority values. Such an + implementation would generally be discouraged unless the device has a + close tie-in with the network topology and resource allocation + policies. It may, however, work acceptably in cases where there is + known over-provisioning of resources. + +3. Choosing a flow's IEEE 802 user_priority class + + This section describes the method by which IP-level flows are mapped + into appropriate IEEE user_priority classes. The IP-level services + considered are Best Effort, Controlled Load, and Guaranteed Service. + + + + +Seaman, et al. Standards Track [Page 5] + +RFC 2815 Int-Serv Mappings on IEEE 802 Networks May 2000 + + + The major issue is that admission control requests and application + requirements are specified in terms of a multidimensional vector of + parameters e.g., bandwidth, delay, jitter, service class. This + multidimensional space must be mapped onto a set of traffic classes + whose default behavior in L2 switches is unidimensional (i.e., strict + priority default queuing). This priority queuing alone can provide + only relative ordering between traffic classes. It can neither + enforce an absolute (quantifiable) delay bound for a traffic class, + nor can it discriminate amongst Int-Serv flows within the aggregate + in a traffic class. Therefore, it cannot provide the absolute control + of packet loss and delay required for individual Int-Serv flows. + + To provide absolute control of loss and delay three things must + occur: + + (1) The amount of bandwidth available to the QoS-controlled flows + must be known, and the number of flows admitted to the network + (allowed to use the bandwidth) must be limited. + + (2) A traffic scheduling mechanism is needed to give preferential + service to flows with lower delay targets. + + (3) Some mechanism must ensure that best-effort flows and QoS + controlled flows that are exceeding their Tspecs do not damage + the quality of service delivered to in-Tspec QoS controlled + flows. This mechanism could be part of the traffic scheduler, or + it could be a separate policing mechanism. + + For IEEE 802 networks, the first function (admission control) is + provided by a Subnet Bandwidth Manager, as discussed below. We use + the link-level user_priority mechanism at each switch and bridge to + implement the second function (preferential service to flows with + lower delay targets). Because a simple priority scheduler cannot + provide policing (function three), policing for IEEE networks is + generally implemented at the edge of the network by a layer-3 device. + When this policing is performed only at the edges of the network it + is of necessity approximate. This issue is discussed further in + [IS802FRAME]. + +3.1. Context of admission control and delay bounds + + As described above, it is the combination of priority-based + scheduling and admission control that creates quantified delay + bounds. Thus, any attempt to quantify the delay bounds expected by a + given traffic class has to made in the context of the admission + control elements. Section 6 of the framework [IS802FRAME] provides + for two different models of admission control - centralized or + distributed Bandwidth Allocators. + + + +Seaman, et al. Standards Track [Page 6] + +RFC 2815 Int-Serv Mappings on IEEE 802 Networks May 2000 + + + It is important to note that in this approach it is the admission + control algorithm that determines which of the Int-Serv services is + being offered. Given a set of priority classes with delay targets, a + relatively simple admission control algorithm can place flows into + classes so that the bandwidth and delay behavior experienced by each + flow corresponds to the requirements of the Controlled-Load service, + but cannot offer the higher assurance of the Guaranteed service. To + offer the Guaranteed service, the admission control algorithm must be + much more stringent in its allocation of resources, and must also + compute the C and D error terms required of this service. + + A delay bound can only be realized at the admission control element + itself so any delay numbers attached to a traffic class represent the + delay that a single element can allow for. That element may + represent a whole L2 domain or just a single L2 segment. + + With either admission control model, the delay bound has no scope + outside of a L2 domain. The only requirement is that it be understood + by all Bandwidth Allocators in the L2 domain and, for example, be + exported as C and D terms to L3 devices implementing the Guaranteed + Service. Thus, the end-to-end delay experienced by a flow can only + be characterized by summing along the path using the usual RSVP + mechanisms. + +3.2. Default service mappings + + Table 1 presents the default mapping from delay targets to IEEE 802.1 + user_priority classes. However, these mappings must be viewed as + defaults, and must be changeable. + + In order to simplify the task of changing mappings, this mapping + table is held by *switches* (and routers if desired) but generally + not by end-station hosts. It is a read-write table. The values + proposed below are defaults and can be overridden by management + control so long as all switches agree to some extent (the required + level of agreement requires further analysis). + + In future networks this mapping table might be adjusted dynamically + and without human intervention. It is possible that some form of + network-wide lookup service could be implemented that serviced + requests from clients e.g., traffic_class = getQoSbyName("H.323 + video") and notified switches of what traffic categories they were + likely to encounter and how to allocate those requests into traffic + classes. Alternatively, the network's admission control mechanisms + might directly adjust the mapping table to maximize the utilization + of network resources. Such mechanisms are for further study. + + + + + +Seaman, et al. Standards Track [Page 7] + +RFC 2815 Int-Serv Mappings on IEEE 802 Networks May 2000 + + + The delay bounds numbers proposed in Table 1 are for per-Bandwidth + Allocator element delay targets and are derived from a subjective + analysis of the needs of typical delay-sensitive applications e.g., + voice, video. See Annex H of [802.1D] for further discussion of the + selection of these values. Although these values appear to address + the needs of current video and voice technology, it should be noted + that there is no requirement to adhere to these values and no + dependence of IEEE 802.1 on these values. + + user_priority Service + + 0 Default, assumed to be Best Effort + 1 reserved, "less than" Best Effort + 2 reserved + 3 reserved + 4 Delay Sensitive, no bound + 5 Delay Sensitive, 100ms bound + 6 Delay Sensitive, 10ms bound + 7 Network Control + + Table 1 - Example user_priority to service mappings + + Note: These mappings are believed to be useful defaults but + further implementation and usage experience is required. The + mappings may be refined in future editions of this document. + + With this example set of mappings, delay-sensitive, admission + controlled traffic flows are mapped to user_priority values in + ascending order of their delay bound requirement. Note that the + bounds are targets only - see [IS802FRAME] for a discussion of the + effects of other non-conformant flows on delay bounds of other flows. + Only by applying admission control to higher-priority classes can any + promises be made to lower-priority classes. + + This set of mappings also leaves several classes as reserved for + future definition. + + Note: this mapping does not dictate what mechanisms or algorithms + a network element (e.g., an Ethernet switch) must perform to + implement these mappings: this is an implementation choice and + does not matter so long as the requirements for the particular + service model are met. + + Note: these mappings apply primarily to networks constructed from + devices that implement the priority-scheduling behavior defined as + the default in 802.1D. Some devices may implement more complex + scheduling behaviors not based only on priority. In that + circumstance these mappings might still be used, but other, more + + + +Seaman, et al. Standards Track [Page 8] + +RFC 2815 Int-Serv Mappings on IEEE 802 Networks May 2000 + + + specialized mappings may be more appropriate. + +3.3. Discussion + + The recommendation of classes 4, 5 and 6 for Delay Sensitive, + Admission Controlled flows is somewhat arbitrary; any classes with + priorities greater than that assigned to Best Effort can be used. + Those proposed here have the advantage that, for transit through + 802.1D switches with only two-level strict priority queuing, all + delay-sensitive traffic gets "high priority" treatment (the 802.1D + default split is 0-3 and 4-7 for a device with 2 queues). + + The choice of the delay bound targets is tuned to an average expected + application mix, and might be retuned by a network manager facing a + widely different mix of user needs. The choice is potentially very + significant: wise choice can lead to a much more efficient allocation + of resources as well as greater (though still not very good) + isolation between flows. + + Placing Network Control traffic at class 7 is necessary to protect + important traffic such as route updates and network management. + Unfortunately, placing this traffic higher in the user_priority + ordering causes it to have a direct effect on the ability of devices + to provide assurances to QoS controlled application traffic. + Therefore, an estimate of the amount of Network Control traffic must + be made by any device that is performing admission control (e.g., + SBMs). This would be in terms of the parameters that are normally + taken into account by the admission control algorithm. This estimate + should be used in the admission control decisions for the lower + classes (the estimate is likely to be a configuration parameter of + SBMs). + + A traffic class such as class 1 for "less than best effort" might be + useful for devices that wish to dynamically "penalty tag" all of the + data of flows that are presently exceeding their allocation or Tspec. + This provides a way to isolate flows that are exceeding their service + limits from flows that are not, to avoid reducing the QoS delivered + to flows that are within their contract. Data from such tagged flows + might also be preferentially discarded by an overloaded downstream + device. + + A somewhat simpler approach would be to tag only the portion of a + flow's packets that actually exceed the Tspec at any given instant as + low priority. However, it is often considered to be a bad idea to + treat flows in this way as it will likely cause significant re- + ordering of the flow's packets, which is not desirable. Note that the + default 802.1D treatment of user_priorities 1 and 2 is "less than" + the default class 0. + + + +Seaman, et al. Standards Track [Page 9] + +RFC 2815 Int-Serv Mappings on IEEE 802 Networks May 2000 + + +4. Computation of integrated services characterization parameters by + IEEE 802 devices + + The integrated service model requires that each network element that + supports integrated services compute and make available certain + "characterization parameters" describing the element's behavior. + These parameters may be either generally applicable or specific to a + particular QoS control service. These parameters may be computed by + calculation, measurement, or estimation. When a network element + cannot compute its own parameters (for example, a simple link), we + assume that the device sending onto or receiving data from the link + will compute the link's parameters as well as it's own. The accuracy + of calculation of these parameters may not be very critical; in some + cases loose estimates are all that is required to provide a useful + service. This is important in the IEEE 802 case, where it will be + virtually impossible to compute parameters accurately for certain + topologies and switch technologies. Indeed, it is an assumption of + the use of this model by relatively simple switches (see [IS802FRAME] + for a discussion of the different types of switch functionality that + might be expected) that they merely provide values to describe the + device and admit flows conservatively. The discussion below presents + a general outline for the computation of these parameters, and points + out some cases where the parameters must be computed accurately. + Further specification of how to export these parameters is for + further study. + +4.1. General characterization parameters + + There are some general parameters [GENCHAR] that a device will need + to use and/or supply for all service types: + + * Ingress link + + * Egress links and their MTUs, framing overheads and minimum packet + sizes (see media-specific information presented above). + + * Available path bandwidth: updated hop-by-hop by any device along + the path of the flow. + + * Minimum latency + + Of these parameters, the MTU and minimum packet size information must + be reported accurately. Also, the "break bits" must be set correctly, + both the overall bit that indicates the existence of QoS control + support and the individual bits that specify support for a particular + scheduling service. The available bandwidth should be reported as + accurately as possible, but very loose estimates are acceptable. The + minimum latency parameter should be determined and reported as + + + +Seaman, et al. Standards Track [Page 10] + +RFC 2815 Int-Serv Mappings on IEEE 802 Networks May 2000 + + + accurately as possible if the element offers Guaranteed service, but + may be loosely estimated or reported as zero if the element offers + only Controlled-Load service. + +4.2. Parameters to implement Guaranteed Service + + A network element supporting the Guaranteed Service [GS] must be able + to determine the following parameters: + + * Constant delay bound through this device (in addition to any value + provided by "minimum latency" above) and up to the receiver at the + next network element for the packets of this flow if it were to be + admitted. This includes any access latency bound to the outgoing + link as well as propagation delay across that link. This value is + advertised as the 'C' parameter of the Guaranteed Service. + + * Rate-proportional delay bound through this device and up to the + receiver at the next network element for the packets of this flow + if it were to be admitted. This value is advertised as the 'D' + parameter of the Guaranteed Service. + + * Receive resources that would need to be associated with this flow + (e.g., buffering, bandwidth) if it were to be admitted and not + suffer packet loss if it kept within its supplied Tspec/Rspec. + These values are used by the admission control algorithm to decide + whether a new flow can be accepted by the device. + + * Transmit resources that would need to be associated with this flow + (e.g., buffering, bandwidth, constant- and rate-proportional delay + bounds) if it were to be admitted. These values are used by the + admission control algorithm to decide whether a new flow can be + accepted by the device. + + The exported characterization parameters for this service should be + reported as accurately as possible. If estimations or approximations + are used, they should err in whatever direction causes the user to + receive better performance than requested. For example, the C and D + error terms should overestimate delay, rather than underestimate it. + +4.3. Parameters to implement Controlled Load + + A network element implementing the Controlled Load service [CL] must + be able to determine the following: + + * Receive resources that would need to be associated with this flow + (e.g., buffering) if it were to be admitted. These values are used + by the admission control algorithm to decide whether a new flow + can be accepted by the device. + + + +Seaman, et al. Standards Track [Page 11] + +RFC 2815 Int-Serv Mappings on IEEE 802 Networks May 2000 + + + * Transmit resources that would need to be associated with this flow + (e.g., buffering) if it were to be admitted. These values are used + by the admission control algorithm to decide whether a new flow + can be accepted by the device. + + The Controlled Load service does not export any service-specific + characterization parameters. Internal resource allocation estimates + should ensure that the service quality remains high when considering + the statistical aggregation of Controlled Load flows into 802 traffic + classes. + +4.4. Parameters to implement Best Effort + + For a network element that implements only best effort service there + are no explicit parameters that need to be characterized. Note that + an integrated services aware network element that implements only + best effort service will set the "break bit" described in + [RSVPINTSERV]. + +5. Merging of RSVP/SBM objects + + Where reservations that use the SBM protocol's TCLASS object [SBM] + need to be merged, an algorithm needs to be defined that is + consistent with the mappings to individual user_priority values in + use in the Layer-2 cloud. A merged reservation must receive at least + as good a service as the best of the component reservations. + + There is no single merging rule that can prevent all of the following + side-effects: + + * If a merger were to demote the existing branch of the flow into a + higher-delay traffic class then this is a denial of service to the + existing flow which would likely receive worse service than + before. + + * If a merger were to promote the existing branch of the flow into a + new, lower-delay, traffic class, this might then suffer either + admission control failures or may cost more in some sense than the + already-admitted flow. This can also be considered as a denial- + of-service attack. + + * Promotion of the new branch may lead to rejection of the request + because it has been re-assigned to a traffic class that has not + enough resources to accommodate it. + + Therefore, such a merger is declared to be illegal and the usual SBM + admission control failure rules are applied. Traffic class selection + is performed based on the TSpec information. When the first RESV for + + + +Seaman, et al. Standards Track [Page 12] + +RFC 2815 Int-Serv Mappings on IEEE 802 Networks May 2000 + + + a flow arrives, a traffic class is chosen based on the request, an + SBM TCLASS object is inserted into the message and admission control + for that traffic class is done by the SBM. Reservation succeeds or + fails as usual. + + When a second RESV for the same flow arrives at a different egress + point of the Layer-2 cloud the process starts to repeat. Eventually + the SBM-augmented RESV may hit a switch with an existing reservation + in place for the flow i.e., an L2 branch point for the flow. If so, + the traffic class chosen for the second reservation is checked + against the first. If they are the same, the RESV requests are merged + and passed on towards the sender(s). + + If the second TCLASS would have been different, an RSVP/SBM ResvErr + error is returned to the Layer-3 device that launched the second RESV + request into the Layer-2 cloud. This device will then pass on the + ResvErr to the original requester according to RSVP rules. Detailed + processing rules are specified in [SBM]. + +6. Applicability of these service mappings + + Switches using layer-2-only standards (e.g., 802.1D-1990, 802.1D- + 1998) need to inter-operate with routers and layer-3 switches. Wide + deployment of such 802.1D-1998 switches will occur in a number of + roles in the network: "desktop switches" provide dedicated 10/100 + Mbps links to end stations and high speed core switches often act as + central campus switching points for layer-3 devices. Layer-2 devices + will have to operate in all of the following scenarios: + + * every device along a network path is layer-3 capable and intrusive + into the full data stream + + * only the edge devices are pure layer-2 + + * every alternate device lacks layer-3 functionality + + * most devices lack layer-3 functionality except for some key + control points such as router firewalls, for example. + + Where int-serv flows pass through equipment which does not support + Integrated Services or 802.1D traffic management and which places + all packets through the same queuing and overload-dropping paths, + it is obvious that some of a flow's desired service parameters + become more difficult to support. In particular, the two + integrated service classes studied here, Controlled Load and + Guaranteed Service, both assume that flows will be policed and + kept "insulated" from misbehaving other flows or from best effort + traffic during their passage through the network. This cannot be + + + +Seaman, et al. Standards Track [Page 13] + +RFC 2815 Int-Serv Mappings on IEEE 802 Networks May 2000 + + + done within an IEEE 802 network using devices with the default + user_priority function; in this case policing must be approximated + at the network edges. + + In addition, in order to provide a Guaranteed Service, *all* + switching elements along the path must participate in special + treatment for packets in such flows: where there is a "break" in + guaranteed service, all bets are off. Thus, a network path that + includes even a single switch transmitting onto a shared or half- + duplex LAN segment is unlikely to be able to provide a very good + approximation to Guaranteed Service. For Controlled Load service, + the requirements on the switches and link types are less stringent + although it is still necessary to provide differential queuing and + buffering in switches for CL flows over best effort in order to + approximate CL service. Note that users receive indication of such + breaks in the path through the "break bits" described in y + [RSVPINTSERV]. These bits must be correctly set when IEEE 802 + devices that cannot provide a specific service exist in a network. + + Other approaches might be to pass more information between + switches about the capabilities of their neighbours and to route + around non-QoS-capable switches: such methods are for further + study. And of course the easiest solution of all is to upgrade + links and switches to higher capacities. + +7. References + + [802.1D-ORIG] "MAC Bridges", ISO/IEC 10038, ANSI/IEEE Std 802.1D-1993 + + [802.1D] "Information technology - Telecommunications and + information exchange between systems - Local and + metropolitan area networks - Common specifications - + Part 3: Media Access Control (MAC) Bridges: Revision. + This is a revision of ISO/IEC 10038: 1993, 802.1j-1992 + and 802.6k-1992. It incorporates P802.11c, P802.1p and + P802.12e." ISO/IEC 15802-3:1998" + + [INTSERV] Braden, R., Clark, D. and S. Shenker, "Integrated + Services in the Internet Architecture: an Overview", + RFC 1633, June 1994. + + [RSVP] Braden, R., Zhang, L., Berson, S., Herzog, S. and S. + Jamin, "Resource Reservation Protocol (RSVP) - Version + 1 Functional Specification", RFC 2205, September 1997. + + [CL] Wroclawski, J., "Specification of the Controlled-Load + Network Element Service", RFC 2211, September 1997. + + + + +Seaman, et al. Standards Track [Page 14] + +RFC 2815 Int-Serv Mappings on IEEE 802 Networks May 2000 + + + [GS] Schenker, S., Partridge, C. and R. Guerin, + "Specification of Guaranteed Quality of Service", RFC + 2212 September 1997. + + [802.1Q] ANSI/IEEE Standard 802.1Q-1998, "IEEE Standards for + Local and Metropolitan Area Networks: Virtual Bridged + Local Area Networks", 1998. + + [GENCHAR] Shenker, S., and J. Wroclawski, "General + Characterization Parameters for Integrated Service + Network Elements", RFC 2215, September 1997. + + [IS802FRAME] Ghanwani, A., Pace, W., Srinivasan, V., Smith, A. and + M. Seaman, "A Framework for Providing Integrated + Services Over Shared and Switched LAN Technologies", + RFC 2816, May 2000. + + [SBM] Yavatkar, R., Hoffman, D., Bernet, Y., Baker, F. and M. + Speer, "SBM (Subnet Bandwidth Manager): A Protocol for + Admission Control over IEEE 802-style Networks", RFC + 2814, May 2000. + + [RSVPINTSERV] Wroclawski, J., "The use of RSVP with IETF Integrated + Services", RFC 2210, September 1997. + + [PROCESS] Bradner, S., "The Internet Standards Process -- + Revision 3", BCP 9, RFC 2026, October 1996. + +8. Security Considerations + + Any use of QoS requires examination of security considerations + because it leaves the possibility open for denial of service or theft + of service attacks. This document introduces no new security issues + on top of those discussed in the companion ISSLL documents + [IS802FRAME] and [SBM]. Any use of these service mappings assumes + that all requests for service are authenticated appropriately. + +9. Acknowledgments + + This document draws heavily on the work of the ISSLL WG of the IETF + and the IEEE P802.1 Interworking Task Group. + + + + + + + + + + +Seaman, et al. Standards Track [Page 15] + +RFC 2815 Int-Serv Mappings on IEEE 802 Networks May 2000 + + +10. Authors' Addresses + + Mick Seaman + Telseon + 480 S. California Ave + Palo Alto, CA 94306 + USA + + Email: mick@telseon.com + + + Andrew Smith + Extreme Networks + 3585 Monroe St. + Santa Clara, CA 95051 + USA + + Phone: +1 408 579 2821 + EMail: andrew@extremenetworks.com + + + Eric Crawley + Unisphere Solutions + 5 Carlisle Rd. + Westford, MA 01886 + + Phone: +1 978 692 1999 + Email: esc@unispheresolutions.com + + + John Wroclawski + MIT Laboratory for Computer Science + 545 Technology Sq. + Cambridge, MA 02139 + USA + + Phone: +1 617 253 7885 + EMail: jtw@lcs.mit.edu + + + + + + + + + + + + + +Seaman, et al. Standards Track [Page 16] + +RFC 2815 Int-Serv Mappings on IEEE 802 Networks May 2000 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2000). All Rights Reserved. + + This document and translations of it may be copied and furnished to + others, and derivative works that comment on or otherwise explain it + or assist in its implementation may be prepared, copied, published + and distributed, in whole or in part, without restriction of any + kind, provided that the above copyright notice and this paragraph are + included on all such copies and derivative works. However, this + document itself may not be modified in any way, such as by removing + the copyright notice or references to the Internet Society or other + Internet organizations, except as needed for the purpose of + developing Internet standards in which case the procedures for + copyrights defined in the Internet Standards process must be + followed, or as required to translate it into languages other than + English. + + The limited permissions granted above are perpetual and will not be + revoked by the Internet Society or its successors or assigns. + + This document and the information contained herein is provided on an + "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING + TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING + BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION + HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF + MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + + + + + + + + + + + +Seaman, et al. Standards Track [Page 17] + |