summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc3248.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc3248.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc3248.txt')
-rw-r--r--doc/rfc/rfc3248.txt619
1 files changed, 619 insertions, 0 deletions
diff --git a/doc/rfc/rfc3248.txt b/doc/rfc/rfc3248.txt
new file mode 100644
index 0000000..3cf9c09
--- /dev/null
+++ b/doc/rfc/rfc3248.txt
@@ -0,0 +1,619 @@
+
+
+
+
+
+
+Network Working Group G. Armitage
+Request for Comments: 3248 Swinburne University of Technology
+Category: Informational B. Carpenter
+ IBM
+ A. Casati
+ Lucent Technologies
+ J. Crowcroft
+ University of Cambridge
+ J. Halpern
+ Consultant
+ B. Kumar
+ Corona Networks Inc.
+ J. Schnizlein
+ Cisco Systems
+ March 2002
+
+
+ A Delay Bound alternative revision of RFC 2598
+
+Status of this Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (2001). All Rights Reserved.
+
+Abstract
+
+ For historical interest, this document captures the EF Design Team's
+ proposed solution, preferred by the original authors of RFC 2598 but
+ not adopted by the working group in December 2000. The original
+ definition of EF was based on comparison of forwarding on an unloaded
+ network. This experimental Delay Bound (DB) PHB requires a bound on
+ the delay of packets due to other traffic in the network. At the
+ Pittsburgh IETF meeting in August 2000, the Differentiated Services
+ working group faced serious questions regarding RFC 2598 - the
+ group's standards track definition of the Expedited Forwarding (EF)
+ Per Hop Behavior (PHB). An 'EF Design Team' volunteered to develop a
+ re-expression of RFC 2598, bearing in mind the issues raised in the
+ DiffServ group. At the San Diego IETF meeting in December 2000 the
+ DiffServ working group decided to pursue an alternative re-expression
+ of the EF PHB.
+
+
+
+
+
+
+Armitage, et al. Informational [Page 1]
+
+RFC 3248 Delay Bound alternative revision of RFC 2598 March 2002
+
+
+Specification of Requirements
+
+ This document is for Informational purposes only. If implementors
+ choose to experiment with the DB PHB, key words "MUST", "MUST NOT",
+ "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT",
+ "RECOMMENDED", "MAY", and "OPTIONAL" are interpreted as described in
+ RFC 2119 [3].
+
+1 Introduction
+
+ RFC 2598 was the Differentiated Services (DiffServ) working group's
+ first standards track definition of the Expedited Forwarding (EF) Per
+ Hop Behavior (PHB) [1]. As part of the DiffServ working group's
+ ongoing refinement of the EF PHB, various issues were raised with the
+ text in RFC 2598 [2].
+
+ After the Pittsburgh IETF meeting in August 2000, a volunteer 'EF
+ design team' was formed (the authors of this document) to propose a
+ new expression of the EF PHB. The remainder of this Informational
+ document captures our feedback to the DiffServ working group at the
+ San Diego IETF in December 2000. Our solution focussed on a Delay
+ Bound (DB) based re-expression of RFC 2598 which met the goals of RFC
+ 2598's original authors. The DiffServ working group ultimately chose
+ an alternative re-expression of the EF PHB text, developed by the
+ authors of [2] and revised to additionally encompass our model
+ described here.
+
+ Our proposed Delay Bound solution is archived for historical
+ interest. Section 2 covers the minimum, necessary and sufficient
+ description of what we believed qualifies as 'DB' behavior from a
+ single node. Section 3 then discusses a number of issues and
+ assumptions made to support the definition in section 2.
+
+2. Definition of Delay Bound forwarding
+
+ For a traffic stream not exceeding a particular configured rate, the
+ goal of the DB PHB is a strict bound on the delay variation of
+ packets through a hop.
+
+ This section will begin with the goals and necessary boundary
+ conditions for DB behavior, then provide a descriptive definition of
+ DB behavior itself, discuss what it means to conform to the DB
+ definition, and assign the experimental DB PHB code point.
+
+
+
+
+
+
+
+
+Armitage, et al. Informational [Page 2]
+
+RFC 3248 Delay Bound alternative revision of RFC 2598 March 2002
+
+
+2.1 Goal and Scope of DB
+
+ For a traffic stream not exceeding a configured rate the goal of the
+ DB PHB is a strict bound on the delay variation of packets through a
+ hop.
+
+ Traffic MUST be policed and/or shaped at the source edge (for
+ example, on ingress to the DS-domain as discussed in RFC 2475 [5]) in
+ order to get such a bound. However, specific policing and/or shaping
+ rules are outside the scope of the DB PHB definition. Such rules
+ MUST be defined in any per-domain behaviors (PDBs) composed from the
+ DB PHB.
+
+ A device (hop) delivers DB behavior to appropriately marked traffic
+ received on one or more interfaces (marking is specified in section
+ 2.4). A device SHALL deliver the DB behavior on an interface to DB
+ marked traffic meeting (i.e. less than or equal) a certain arrival
+ rate limit R.
+
+ If more DB traffic arrives than is acceptable, the device is NOT
+ REQUIRED to deliver the DB behavior. However, although the original
+ source of DB traffic will be shaped, aggregation and upstream jitter
+ ensure that the traffic arriving at any given hop cannot be assumed
+ to be so shaped. Thus a DB implementation SHOULD have some tolerance
+ for burstiness - the ability to provide EF behavior even when the
+ arrival rate exceeds the rate limit R.
+
+ Different DB implementations are free to exhibit different tolerance
+ to burstiness. (Burstiness MAY be characterized in terms of the
+ number of back-to-back wire-rate packets to which the hop can deliver
+ DB behavior. However, since the goal of characterizing burstiness is
+ to allow useful comparison of DB implementations, vendors and users
+ of DB implementations MAY choose to utilize other burstiness
+ metrics.)
+
+ The DB PHB definition does NOT mandate or recommend any particular
+ method for achieving DB behavior. Rather, the DB PHB definition
+ identifies parameters that bound the operating range(s) over which an
+ implementation can deliver DB behavior. Implementors characterize
+ their implementations using these parameters, while network designers
+ and testers use these parameters to assess the utility of different
+ DB implementations.
+
+2.2 Description of DB behavior
+
+ For simplicity the definition will be explained using an example
+ where traffic arrives on only one interface and is destined for
+ another (single) interface.
+
+
+
+Armitage, et al. Informational [Page 3]
+
+RFC 3248 Delay Bound alternative revision of RFC 2598 March 2002
+
+
+ The crux of this definition is that the difference in time between
+ when a packet might have been delivered, and when it is delivered,
+ will never exceed a specifiable bound.
+
+ Given an acceptable (not exceeding arrival rate limit R) stream of DB
+ packets arriving on an interface:
+
+ There is a time sequence E(i) when these packets would be
+ delivered at the output interface in the absence of competing
+ traffic. That is, E(i) are the earliest times that the packets
+ could be delivered by the device.
+
+ In the presence of competing traffic, the packets will be delayed
+ to some later time D(i).
+
+ Competing traffic includes all DB traffic arriving at the device on
+ other ports, and all non-DB traffic arriving at the device on any
+ port.
+
+ DB is defined as the behavior which ensures, for all i, that:
+
+ D(i) - E(i) <= S * MTU/R.
+
+ MTU is the maximum transmission unit (packet size) of the output. R
+ is the arrival rate that the DB device is prepared to accept on this
+ interface.
+
+ Note that D(i) and E(i) simply refer to the times of what can be
+ thought of as "the same packet" under the two treatments (with and
+ without competing traffic).
+
+ The score, S, is a characteristic of the device at the rate, R, in
+ order to meet this defined bound. This score, preferably a small
+ constant, depends on the scheduling mechanism and configuration of
+ the device.
+
+2.3 Conformance to DB behavior
+
+ An implementation need not conform to the DB specification over an
+ arbitrary range of parameter values. Instead, implementations MUST
+ specify the rates, R, and scores S, for which they claim conformance
+ with the DB definition in section 2.2, and the implementation-
+ specific configuration parameters needed to deliver conformant
+ behavior. An implementation SHOULD document the traffic burstiness
+ it can tolerate while still providing DB behavior.
+
+
+
+
+
+
+Armitage, et al. Informational [Page 4]
+
+RFC 3248 Delay Bound alternative revision of RFC 2598 March 2002
+
+
+ The score, S, and configuration parameters depend on the
+ implementation error from an ideal scheduler. Discussion of the
+ ability of any particular scheduler to provide DB behavior, and the
+ conditions under which it might do so, is outside the scope of this
+ document.
+
+ The implementor MAY define additional constraints on the range of
+ configurations in which DB behavior is delivered. These constraints
+ MAY include limits on the total DB traffic across the device, or
+ total DB traffic targeted at a given interface from all inputs.
+
+ This document does not specify any requirements on DB
+ implementation's values for R, S, or tolerable burstiness. These
+ parameters will be bounded by real-world considerations such as the
+ actual network being designed and the desired PDB.
+
+2.4 Marking for DB behavior
+
+ One or more DiffServ codepoint (DSCP) value may be used to indicate a
+ requirement for DB behavior [4].
+
+ By default we suggest an 'experimental' DSCP of 101111 be used to
+ indicate that DB PHB is required.
+
+3. Discussion
+
+ This section discusses some issues that might not be immediately
+ obvious from the definition in section 2.
+
+3.1 Mutability
+
+ Packets marked for DB PHB MAY be remarked at a DS domain boundary
+ only to other codepoints that satisfy the DB PHB. Packets marked for
+ DB PHBs SHOULD NOT be demoted or promoted to another PHB by a DS
+ domain.
+
+3.2 Tunneling
+
+ When DB packets are tunneled, the tunneling packets must be marked as
+ DB.
+
+3.3 Interaction with other PHBs
+
+ Other PHBs and PHB groups may be deployed in the same DS node or
+ domain with the DB PHB as long as the requirement of section 2 is
+ met.
+
+
+
+
+
+Armitage, et al. Informational [Page 5]
+
+RFC 3248 Delay Bound alternative revision of RFC 2598 March 2002
+
+
+3.4 Output Rate not specified
+
+ The definition of DB behavior given in section 2 is quite explicitly
+ given in terms of input rate R and output delay variation D(i) -
+ E(i). A scheduler's output rate does not need to be specified, since
+ (by design) it will be whatever is needed to achieve the target delay
+ variation bounds.
+
+3.5 Jitter
+
+ Jitter is not the bounded parameter in DB behavior. Jitter can be
+ understood in a number of ways, for example the variability in
+ inter-packet times from one inter-packet interval to the next.
+ However, DB behavior aims to bound a related but different parameter
+ - the variation in delay between the time packets would depart in the
+ absence of competing traffic, E(i), and when they would depart in the
+ presence of competing traffic, D(i).
+
+3.6 Multiple Inputs and/or Multiple Outputs
+
+ The definition of 'competing traffic' in section 2.2 covers both the
+ single input/single output case and the more general case where DB
+ traffic is converging on a single output port from multiple input
+ ports. When evaluating the ability of an DB device to offer DB
+ behavior to traffic arriving on one port, DB traffic arriving on
+ other ports is factored in as competing traffic.
+
+ When considering DB traffic from a single input that is leaving via
+ multiple ports, it is clear that the behavior is no worse than if all
+ of the traffic could be leaving through each one of those ports
+ individually (subject to limits on how much is permitted).
+
+3.7 Fragmentation and Rate
+
+ Where an ingress link has an MTU higher than that of an egress link,
+ it is conceivable packets may be fragmented as they pass through a
+ Diffserv hop. However, the unpredictability of fragmentation is
+ significantly counter to the goal of providing controllable QoS.
+ Therefore we assume that fragmentation of DB packets is being avoided
+ (either through some form of Path MTU discovery, or configuration),
+ and does not need to be specifically considered in the DB behavior
+ definition.
+
+
+
+
+
+
+
+
+
+Armitage, et al. Informational [Page 6]
+
+RFC 3248 Delay Bound alternative revision of RFC 2598 March 2002
+
+
+3.8 Interference with other traffic
+
+ If the DB PHB is implemented by a mechanism that allows unlimited
+ preemption of other traffic (e.g., a priority queue), the
+ implementation MUST include some means to limit the damage DB traffic
+ could inflict on other traffic. This will be reflected in the DB
+ device's burst tolerance described in section 2.1.
+
+3.9 Micro flow awareness
+
+ Some DB implementations may choose to provide queuing and scheduling
+ at a finer granularity, (for example, per micro flow), than is
+ indicated solely by the packet's DSCP. Such behavior is NOT
+ precluded by the DB PHB definition. However, such behavior is also
+ NOT part of the DB PHB definition. Implementors are free to
+ characterize and publicize the additional per micro flow capabilities
+ of their DB implementations as they see fit.
+
+3.10 Arrival rate 'R'
+
+ In the absence of additional information, R is assumed to be limited
+ by the slowest interface on the device.
+
+ In addition, an DB device may be characterized by different values of
+ R for different traffic flow scenarios (for example, for traffic
+ aimed at different ports, total incoming R, and possibly total per
+ output port incoming R across all incoming interfaces).
+
+4. IANA Considerations
+
+ This document suggests one experimental codepoint, 101111. Because
+ the DSCP is taken from the experimental code space, it may be re-used
+ by other experimental or informational DiffServ proposals.
+
+5. Conclusion.
+
+ This document defines DB behavior in terms of a bound on delay
+ variation for traffic streams that are rate shaped on ingress to a DS
+ domain. Two parameters - capped arrival rate (R) and a 'score' (S),
+ are defined and related to the target delay variation bound. All
+ claims of DB 'conformance' for specific implementations of DB
+ behavior are made with respect to particular values for R, S, and the
+ implementation's ability to tolerate small amounts of burstiness in
+ the arriving DB traffic stream.
+
+
+
+
+
+
+
+Armitage, et al. Informational [Page 7]
+
+RFC 3248 Delay Bound alternative revision of RFC 2598 March 2002
+
+
+Security Considerations
+
+ To protect itself against denial of service attacks, the edge of a DS
+ domain MUST strictly police all DB marked packets to a rate
+ negotiated with the adjacent upstream domain (for example, some value
+ less than or equal to the capped arrival rate R). Packets in excess
+ of the negotiated rate MUST be dropped. If two adjacent domains have
+ not negotiated an DB rate, the downstream domain MUST use 0 as the
+ rate (i.e., drop all DB marked packets).
+
+ Since PDBs constructed from the DB PHB will require that the upstream
+ domain police and shape DB marked traffic to meet the rate negotiated
+ with the downstream domain, the downstream domain's policer should
+ never have to drop packets. Thus these drops (or a summary of these
+ drops) SHOULD be noted (e.g., via rate-limited SNMP traps) as
+ possible security violations or serious misconfiguration.
+
+ Overflow events on an DB queue MAY also be logged as indicating
+ possible denial of service attacks or serious network
+ misconfiguration.
+
+Acknowledgments
+
+ This document is the product of the volunteer 'EF Resolve' design
+ team, building on the work of V. Jacobson, K. Nichols, K. Poduri [1]
+ and clarified through discussions with members of the DiffServ
+ working group (particularly the authors of [2]). Non-contentious
+ text (such as the use of DB with tunnels, the security
+ considerations, etc.) were drawn directly from equivalent text in RFC
+ 2598.
+
+Intellectual Properties Considerations
+
+ To establish whether any considerations apply to the idea expressed
+ in this document, readers are encouraged to review notices filed with
+ the IETF and stored at:
+
+ http://www.ietf.org/ipr.html
+
+
+
+
+
+
+
+
+
+
+
+
+
+Armitage, et al. Informational [Page 8]
+
+RFC 3248 Delay Bound alternative revision of RFC 2598 March 2002
+
+
+References
+
+ [1] Jacobson, V., Nichols, K. and K. Poduri, "An Expedited Forwarding
+ PHB", RFC 2598, June 1999.
+
+ [2] Davie, B., Charny, A., Baker, F., Bennett, J.C.R., Benson, K., Le
+ Boudec, J.Y., Chiu, A., Courtney, W., Davari, S., Firoiu, V.,
+ Kalmanek, C., Ramakrishnan, K. and D. Stiliadis, "An Expedited
+ Forwarding PHB (Per-Hop Behavior)", RFC 3246, March 2002.
+
+ [3] Bradner, S., "Key words for use in RFCs to Indicate Requirement
+ Levels", BCP 14, RFC 2119, March 1997.
+
+ [4] Nichols, K., Blake, S., Baker, F. and D. Black, "Definition of
+ the Differentiated Services Field (DS Field) in the IPv4 and IPv6
+ Headers", RFC 2474, December 1998.
+
+ [5] Black, D., Blake, S., Carlson, M., Davies, E., Wang, Z. and W.
+ Weiss, "An Architecture for Differentiated Services", RFC 2475,
+ December 1998.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Armitage, et al. Informational [Page 9]
+
+RFC 3248 Delay Bound alternative revision of RFC 2598 March 2002
+
+
+Authors (volunteer EF Design Team members)
+
+ Grenville Armitage
+ Center for Advanced Internet Architectures
+ Swinburne University of Technology,
+ Melbourne, Australia
+ EMail: garmitage@swin.edu.au
+
+ Brian E. Carpenter (team observer, WG co-chair)
+ IBM Zurich Research Laboratory
+ Saeumerstrasse 4
+ 8803 Rueschlikon
+ Switzerland
+ EMail: brian@hursley.ibm.com
+
+ Alessio Casati
+ Lucent Technologies
+ Swindon, WI SN5 7DJ United Kingdom
+ EMail: acasati@lucent.com
+
+ Jon Crowcroft
+ Marconi Professor of Communications Systems
+ University of Cambridge
+ Computer Laboratory
+ William Gates Building
+ J J Thomson Avenue
+ Cambridge
+ CB3 0FD
+ Phone: +44 (0)1223 763633
+ EMail: Jon.Crowcroft@cl.cam.ac.uk
+
+ Joel M. Halpern
+ P. O. Box 6049
+ Leesburg, VA 20178
+ Phone: 1-703-371-3043
+ EMail: jmh@joelhalpern.com
+
+ Brijesh Kumar
+ Corona Networks Inc.,
+ 630 Alder Drive,
+ Milpitas, CA 95035
+ EMail: brijesh@coronanetworks.com
+
+ John Schnizlein
+ Cisco Systems
+ 9123 Loughran Road
+ Fort Washington, MD 20744
+ EMail: john.schnizlein@cisco.com
+
+
+
+Armitage, et al. Informational [Page 10]
+
+RFC 3248 Delay Bound alternative revision of RFC 2598 March 2002
+
+
+Full Copyright Statement
+
+ Copyright (C) The Internet Society (2001). All Rights Reserved.
+
+ This document and translations of it may be copied and furnished to
+ others, and derivative works that comment on or otherwise explain it
+ or assist in its implementation may be prepared, copied, published
+ and distributed, in whole or in part, without restriction of any
+ kind, provided that the above copyright notice and this paragraph are
+ included on all such copies and derivative works. However, this
+ document itself may not be modified in any way, such as by removing
+ the copyright notice or references to the Internet Society or other
+ Internet organizations, except as needed for the purpose of
+ developing Internet standards in which case the procedures for
+ copyrights defined in the Internet Standards process must be
+ followed, or as required to translate it into languages other than
+ English.
+
+ The limited permissions granted above are perpetual and will not be
+ revoked by the Internet Society or its successors or assigns.
+
+ This document and the information contained herein is provided on an
+ "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
+ TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
+ BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
+ HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
+ MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is currently provided by the
+ Internet Society.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Armitage, et al. Informational [Page 11]
+