diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc3662.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc3662.txt')
-rw-r--r-- | doc/rfc/rfc3662.txt | 955 |
1 files changed, 955 insertions, 0 deletions
diff --git a/doc/rfc/rfc3662.txt b/doc/rfc/rfc3662.txt new file mode 100644 index 0000000..032b8bd --- /dev/null +++ b/doc/rfc/rfc3662.txt @@ -0,0 +1,955 @@ + + + + + + +Network Working Group R. Bless +Request for Comments: 3662 Univ. of Karlsruhe +Category: Informational K. Nichols + Consultant + K. Wehrle + Univ. of Tuebingen/ICSI + December 2003 + + + A Lower Effort Per-Domain Behavior (PDB) for Differentiated Services + +Status of this Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2003). All Rights Reserved. + +Abstract + + This document proposes a differentiated services per-domain behavior + (PDB) whose traffic may be "starved" (although starvation is not + strictly required) in a properly functioning network. This is in + contrast to the Internet's "best-effort" or "normal Internet traffic" + model, where prolonged starvation indicates network problems. In + this sense, the proposed PDB's traffic is forwarded with a "lower" + priority than the normal "best-effort" Internet traffic, thus the PDB + is called "Lower Effort" (LE). Use of this PDB permits a network + operator to strictly limit the effect of its traffic on "best- + effort"/"normal" or all other Internet traffic. This document gives + some example uses, but does not propose constraining the PDB's use to + any particular type of traffic. + +1. Description of the Lower Effort PDB + + This document proposes a differentiated services per-domain behavior + [RFC3086] called "Lower Effort" (LE) which is intended for traffic of + sufficiently low value (where "value" may be interpreted in any + useful way by the network operator), in which all other traffic takes + precedence over LE traffic in consumption of network link bandwidth. + One possible interpretation of "low value" traffic is its low + priority in time, which does not necessarily imply that it is + generally of minor importance. From this viewpoint, it can be + + + + + +Bless, et al. Informational [Page 1] + +RFC 3662 Lower Effort PDB December 2003 + + + considered as a network equivalent to a background priority for + processes in an operating system. There may or may not be memory + (buffer) resources allocated for this type of traffic. + + Some networks carry traffic for which delivery is considered + optional; that is, packets of this type of traffic ought to consume + network resources only when no other traffic is present. + Alternatively, the effect of this type of traffic on all other + network traffic is strictly limited. This is distinct from "best- + effort" (BE) traffic since the network makes no commitment to deliver + LE packets. In contrast, BE traffic receives an implied "good faith" + commitment of at least some available network resources. This + document proposes a Lower Effort Differentiated Services per-domain + behavior (LE PDB) [RFC3086] for handling this "optional" traffic in a + differentiated services domain. + + There is no intrinsic reason to limit the applicability of the LE PDB + to any particular application or type of traffic. It is intended as + an additional tool for administrators in engineering networks. + + Note: where not otherwise defined, terminology used in this document + is defined as in [RFC2474]. + +2. Applicability + + A Lower Effort (LE) PDB is for sending extremely non-critical traffic + across a DS domain or DS region. There should be an expectation that + packets of the LE PDB may be delayed or dropped when other traffic is + present. Use of the LE PDB might assist a network operator in moving + certain kinds of traffic or users to off-peak times. Alternatively, + or in addition, packets can be designated for the LE PDB when the + goal is to protect all other packet traffic from competition with the + LE aggregate, while not completely banning LE traffic from the + network. An LE PDB should not be used for a customer's "normal + internet" traffic, nor should packets be "downgraded" to the LE PDB + for use as a substitute for dropping packets that ought to simply be + dropped as unauthorized. The LE PDB is expected to be applicable to + networks that have some unused capacity at some times of day. + + This is a PDB that allows networks to protect themselves from + selected types of traffic rather than giving a selected traffic + aggregate preferential treatment. Moreover, it may also exploit all + unused resources from other PDBs. + + + + + + + + +Bless, et al. Informational [Page 2] + +RFC 3662 Lower Effort PDB December 2003 + + +3. Technical Specification + +3.1. Classification and Traffic Conditioning + + There are no required traffic profiles governing the rate and bursts + of packets beyond the limits imposed by the ingress link. It is not + necessary to limit the LE aggregate using edge techniques since its + PHB is configured such that packets of the aggregate will be dropped + in the network if no forwarding resources are available. The + differentiated services architecture [RFC2475] allows packets to be + marked upstream of the DS domain or at the DS domain's edge. When + packets arrive pre-marked with the DSCP used by the LE PDB, it should + not be necessary for the DS domain boundary to police that marking; + further (MF) classification for such packets would only be required + if there was some reason for the packets to be marked with a + different DSCP. + + If there is not an agreement on a DSCP marking with the upstream + domain for a DS domain using the LE PDB, the boundary must include a + classifier that selects the appropriate LE target group of packets + out of all arriving packets and steers them to a marker that sets the + appropriate DSCP. No other traffic conditioning is required. + +3.2. PHB configuration + + Either a Class Selector (CS) PHB [RFC2474], an Experimental/Local Use + (EXP/LU) PHB [RFC2474], or an Assured Forwarding (AF) PHB [RFC2597] + may be used as the PHB for the LE traffic aggregate. This document + does not specify the exact DSCP to use inside a domain, but instead + specifies the necessary properties of the PHB selected by the DSCP. + If a CS PHB is used, Class Selector 1 (DSCP=001000) is suggested. + + The PHB used by the LE aggregate inside a DS domain should be + configured so that its packets are forwarded onto the node output + link when the link would otherwise be idle; conceptually, this is the + behavior of a weighted round-robin scheduler with a weight of zero. + + An operator might choose to configure a very small link share for the + LE aggregate and still achieve the desired goals. That is, if the + output link scheduler permits, a small fixed rate might be assigned + to the PHB, but the behavior beyond that configured rate should be + that packets are forwarded only when the link would otherwise be + idle. This behavior could be obtained, for example, by using a CBQ + [CBQ] scheduler with a small share and with borrowing permitted. A + PHB that allows packets of the LE aggregate to send more than the + configured rate when packets of other traffic aggregates are waiting + for the link is not recommended. + + + + +Bless, et al. Informational [Page 3] + +RFC 3662 Lower Effort PDB December 2003 + + + If a CS PHB is used, note that this configuration will violate the + "SHOULD" of section 4.2.2.2 of RFC 2474 [RFC2474] since CS1 will have + a less timely forwarding than CS0. An operator's goal of providing + an LE PDB is sufficient cause for violating the SHOULD. If an AF PHB + is used, it must be configured and a DSCP assigned such that it does + not violate the "MUST" of paragraph three of section 2 of RFC 2597 + [RFC2597] which provides for a "minimum amount of forwarding + resources". + +4. Attributes + + The ingress and egress flow of the LE aggregate can be measured but + there are no absolute or statistical attributes that arise from the + PDB definition. A particular network operator may configure the DS + domain in such a way that a statistical metric can be associated with + that DS domain. When the DS domain is known to be heavily congested + with traffic of other PDBs, a network operator should expect to see + no (or very few) packets of the LE PDB egress from the domain. When + there is no other traffic present, the proportion of the LE aggregate + that successfully crosses the domain should be limited only by the + capacity of the network relative to the ingress LE traffic aggregate. + +5. Parameters + + None required. + +6. Assumptions + + A properly functioning network. + +7. Example uses + + o Multimedia applications [this example edited from Yoram Bernet]: + + Many network managers want to protect their networks from certain + applications, in particular, from multimedia applications that + typically use such non-adaptive protocols as UDP. + + Most of the focus in quality-of-service is on achieving attributes + that are better than Best Effort. These approaches can provide + network managers with the ability to control the amount of + multimedia traffic that is given this improved performance with + excess relegated to Best Effort. This excess traffic can wreak + havoc with network resources even when it is relegated to Best + Effort because it is non-adaptive and because it can be + significant in volume and duration. These characteristics permit + it to seize network resources, thereby compromising the + performance of other, more important applications that are + + + +Bless, et al. Informational [Page 4] + +RFC 3662 Lower Effort PDB December 2003 + + + included in the Best Effort traffic aggregate but that use + adaptive protocols (e.g., TCP). As a result, network managers + often simply refuse to allow multimedia applications to be + deployed in resource constrained parts of their network. + + The LE PDB enables a network manager to allow the deployment of + multimedia applications without losing control of network + resources. A limited amount of multimedia traffic may (or may + not) be assigned to PDBs with attributes that are better than Best + Effort. Excess multimedia traffic can be prevented from wreaking + havoc with network resources by forcing it to the LE PDB. + + o For Netnews and other "bulk mail" of the Internet. + + o For "downgraded" traffic from some other PDB when this does not + violate the operational objectives of the other PDB or the overall + network. As noted in section 2, LE should not be used for the + general case of downgraded traffic, but may be used by design, + e.g., when multicast is used with a value-added DS-service and + consequently the Neglected Reservation Subtree problem [NRS] + arises. + + o For content distribution, peer-to-peer file sharing traffic, and + the like. + + o For traffic caused by world-wide web search engines while they + gather information from web servers. + +8. Experiences + + The authors solicit further experiences for this section. Results + from simulations are presented and discussed in Appendix A. + +9. Security Considerations for LE PDB + + There are no specific security exposures for this PDB. See the + general security considerations in [RFC2474] and [RFC2475]. + +10. History of the LE PDB + + The previous name of this PDB, "bulk handling", was loosely based on + the United States' Postal Service term for very low priority mail, + sent at a reduced rate: it denotes a lower-cost delivery where the + items are not handled with the same care or delivered with the same + timeliness as items with first-class postage. Finally, the name was + changed to "lower effort", because the authors and other DiffServ + Working Group members believe that the name should be more generic in + order to not imply constraints on the PDB's use to a particular type + + + +Bless, et al. Informational [Page 5] + +RFC 3662 Lower Effort PDB December 2003 + + + of traffic (namely that of bulk data). + + The notion of having something "lower than Best Effort" was raised in + the Diffserv Working Group, most notably by Roland Bless and Klaus + Wehrle in their Internet Drafts [LBE] and [LE] and by Yoram Bernet + for enterprise multimedia applications. One of its first + applications was to re-mark packets within multicast groups [NRS]. + Therefore, previous discussions centered on the creation of a new + PHB. However, the original authors (Brian Carpenter and Kathleen + Nichols) believe this is not required and this document was written + to specifically explain how to get less than Best Effort without a + new PHB. + +11. Acknowledgments + + Yoram Bernet contributed significant amounts of text for the + "Examples" section of this document and provided other useful + comments that helped in editing. Other Diffserv WG members suggested + that the LE PDB is needed for Napster traffic, particularly at + universities. Special thanks go to Milena Neumann for her extensive + efforts in performing the simulations that are described in Appendix + A. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Bless, et al. Informational [Page 6] + +RFC 3662 Lower Effort PDB December 2003 + + +Appendix A. Experiences from a Simulation Model + + The intention of this appendix is to show that a Lower Effort PDB + with a behavior as described in this document can be realized with + different implementations and PHBs respectively. Overall, each of + these variants show the desired behavior but also show minor + differences in certain traffic load situations. This comparison + could make the choice of a realization variant interesting for a + network operator. + +A.1. Simulation Environment + + The small DiffServ domain shown in Figure 1 was used to simulate the + LE PDB. There are three main sources of traffic (S1-S3) depicted on + the left side of the figure. Source S1 sends five aggregated TCP + flows (A1-A5) to the receivers R1-R5 respectively. Each aggregated + flow Ax consists of 20 TCP connections, where each aggregate + experiences a different round trip time between 10ms and 250ms. + There are two sources of bulk traffic. B1 consists of 100 TCP + connections sending as much data as possible to R6 and B2 is a single + UDP flow also sending as much as possible to R7. + + ................... + . . R1 + . . / + . . /-R2 + . . / + S1==**=>[BR1] [BR4]==**==>---R3 + . \\ // . \ + . \\ // . \-R4 + . ** ** . \ + . \\ // . R5 + . \\ // . + S2=++=>[BR2]-++-[IR1]==**==++==::==[IR2] . + (Bulk) . // \\ . + . // :: . + . :: \\ . + . // ++ . + .// \\. + S3==::==>[BR3] [BR5]==++==>R6 + (UDP) . . || + . . || + . . :: + .................... || + VV + R7 + + Figure 1: A DiffServ domain with different flows + + + +Bless, et al. Informational [Page 7] + +RFC 3662 Lower Effort PDB December 2003 + + + In order to show the benefit of using the LE PDB instead of the + normal Best Effort (BE) PDB [RFC3086], different scenarios are used: + + A) B1 and B2 are not present, i.e., the "normal" situation without + bulk data present. A1-A5 use the BE PDB. + + B) B1 and B2 use the BE PDB for their traffic, too. + + C) B1 and B2 use LE PDB for their traffic with different PHB + implementations: + + 1) PHB with Priority Queueing (PQ) + 2) PHB with Weighted Fair Queueing (WFQ) + 3) PHB with Weighted RED (WRED) + 4) PHB with WFQ and RED + + C1) represents the case where there are no allocated resources for + the LE PDB, i.e., LE traffic is only forwarded if there are unused + resources. In scenarios C2)-C4), a bandwidth share of 10% has been + allocated for the LE PDB. RED parameters were set to w_q=0.1 and + max_p=0.2. In scenario C2), two tail drop queues were used for BE + and LE and WFQ scheduling was set up with a weight of 9:1 for the + ratio of BE:LE. In scenario C3), a total queue length of 200000 + bytes was used with the following thresholds: min_th_BE=19000, + max_th_BE=63333, min_th_LE=2346, max_th=7037. WRED allows to mark + packets with BE or LE within the same microflow (e.g., letting + applications pre-mark packets according to their importance) without + causing a reordering of packets within the microflow. In scenario + C4), each queue had a length of 50000 bytes with the same thresholds + of min_th=18000 and max_th=48000 bytes. WFQ parameters were the same + as in C2). + + The link bandwidth between IR1 and IR2 is limited to 1200 kbit/s, + thus creating the bottleneck in the network for the following + situations. In all situations, the 20 TCP connections within each + aggregated flow Ax (flowing from S1 to Rx) used the Best Effort PDB. + Sender S2 transmitted bulk flow B1 (consisting of 100 TCP connections + to R6) with an aggregated rate of 550 kbit/s, whereas the UDP sender + S3 transmitted with a rate of 50 kbit/s. + + + + + + + + + + + + +Bless, et al. Informational [Page 8] + +RFC 3662 Lower Effort PDB December 2003 + + + The following four different situations with varying traffic load for + the Ax flows (at application level) were simulated. + + Situation | I | II | III | IV | + ----------------------------+------+------+------+------| + Sender Rate S1 [kbit/s] | 1200 | 1080 | 1800 | 800 | + Sender Rate S2 [kbit/s] | 550 | 550 | 550 | 550 | + Sender Rate S3 [kbit/s] | 50 | 50 | 50 | 50 | + Bandwidth IR1 -> IR2 | 1200 | 1200 | 1200 | 1200 | + Best Effort Load (S1) | 100% | 90% | 150% | 67% | + Total load for link IR1->IR2| 150% | 140% | 200% | 117% | + + In situation I, there are no unused resources left for the B1 and B2 + flows. In situation II, there is a residual bandwidth of 10% of the + bottleneck link between IR1 and IR2. In situation III, the traffic + load of A1-A5 is 50% higher than the bottleneck link capacity. In + situation IV, A1-A5 consume only 2/3 of the bottleneck link capacity. + B1 and B2 require together 50% of the bottleneck link capacity. + + The simulations were performed with the freely available discrete + event simulation tool OMNeT++ and a suitable set of QoS mechanisms + [SimKIDS]. Results from the different simulation scenarios are + discussed in the next section. + +A.2. Simulation Results + + QoS parameters listed in the following tables are averaged over the + first 160s of the transmission. Results of situation I are shown in + Figure 2. When the BE PDB is used for transmission of bulk flows B1 + and B2 in case B), one can see that flows A1-A5 throttle their + sending rate to allow transmission of bulk flows B1 and B2. In case + C1), not a single packet is transmitted to the receiver because all + packets get dropped within IR1, thereby protecting Ax flows from Bx + flows. In case C2), B1 and B2 consume all resources up to the + configured limit of 10% of the link bandwidth, but not more. C3) + also limits the share of B1 and B2 flows, but not as precisely as + with WFQ. C4) shows slightly higher packet losses for Ax flows due + to the active queue management. + + + + + + + + + + + + + +Bless, et al. Informational [Page 9] + +RFC 3662 Lower Effort PDB December 2003 + + ++-------------------------+--------+-----------------------------------+ +| | | Bulk Transfer with PDB: | +| QoS Parameter | A) | B) | C) Lower Effort | +| |No bulk | Best | 1) 2) 3) 4) | +| Flows |transfer|Effort| PQ | WFQ | WRED |RED&WFQ| ++----------------+--------+--------+------+------+------+------+-------+ +| | A1 | 240 | 71 | 240 | 214 | 225 | 219 | +| | A2 | 240 | 137 | 240 | 216 | 223 | 218 | +| | A3 | 240 | 209 | 240 | 224 | 220 | 217 | +| Throughput | A4 | 239 | 182 | 239 | 222 | 215 | 215 | +| [kbit/s] | A5 | 238 | 70 | 238 | 202 | 201 | 208 | +| | B1 | - | 491 | 0 | 82 | 85 | 84 | +| | B2 | - | 40 | 0 | 39 | 31 | 38 | ++----------------+--------+--------+------+------+------+------+-------+ +|Total Throughput| normal | 1197 | 669 | 1197 | 1078 | 1084 | 1078 | +| [kbit/s] | bulk | - | 531 | 0 | 122 | 116 | 122 | ++----------------+--------+--------+------+------+------+------+-------+ +| | A1 | 0 | 19.3 | 0 | 6.3 | 5.7 | 8.6 | +| | A2 | 0 | 17.5 | 0 | 6.0 | 5.9 | 8.9 | +| | A3 | 0 | 10.2 | 0 | 3.2 | 6.2 | 9.1 | +| Paket Loss | A4 | 0 | 12.5 | 0 | 4.5 | 6.6 | 9.3 | +| [%] | A5 | 0 | 22.0 | 0 | 6.0 | 5.9 | 9.0 | +| | B1 | - | 10.5 | 100 | 33.6 | 38.4 | 33.0 | +| | B2 | - | 19.6 | 100 | 19.9 | 37.7 | 22.2 | ++----------------+--------+--------+------+------+------+------+-------+ +| Total Packet | normal | 0 | 14.9 | 0 | 5.2 | 6.1 | 9.0 | +| Loss Rate [%] | bulk | 0 | 11.4 | 100 | 29.5 | 38.2 | 29.7 | ++----------------+--------+--------+------+------+------+------+-------+ +| Transmitted | | | | | | | | +| Data [MByte] | normal | 21.9 | 12.6 | 21.9 | 19.6 | 20.3 | 20.3 | ++----------------+--------+--------+------+------+------+------+-------+ + + Figure 2: Situation I - Best Effort traffic uses 100% of the + available bandwidth + + + + + + + + + + + + + + + + + +Bless, et al. Informational [Page 10] + +RFC 3662 Lower Effort PDB December 2003 + + + Results of situation II are shown in Figure 3. In case C1), LE + traffic gets exactly the 10% residual bandwidth that is not used by + the Ax flows. Cases C2) and C4) show similar results compared to + C1), whereas case C3) also drops packets from flows A1-A5 due to + active queue management. + ++-------------------------+--------+-----------------------------------+ +| | | Bulk Transfer with PDB: | +| QoS Parameter | A) | B) | C) Lower Effort | +| |No bulk | Best | 1) 2) 3) 4) | +| Flows |transfer|Effort| PQ | WFQ | WRED |RED&WFQ| ++----------------+--------+--------+------+------+------+------+-------+ +| | A1 | 216 | 193 | 216 | 216 | 211 | 216 | +| | A2 | 216 | 171 | 216 | 216 | 211 | 216 | +| | A3 | 216 | 86 | 216 | 216 | 210 | 216 | +| Throughput | A4 | 215 | 121 | 215 | 215 | 211 | 215 | +| [kbit/s] | A5 | 215 | 101 | 215 | 215 | 210 | 215 | +| | B1 | - | 488 | 83 | 83 | 114 | 84 | +| | B2 | - | 39 | 39 | 39 | 33 | 38 | ++----------------+--------+--------+------+------+------+------+-------+ +|Total Throughput| normal | 1078 | 672 | 1077 | 1077 | 1053 | 1077 | +| [kbit/s] | bulk | - | 528 | 122 | 122 | 147 | 122 | ++----------------+--------+--------+------+------+------+----+-+-------+ +| | A1 | 0 | 9.4 | 0 | 0 | 1.8 | 0 | +| | A2 | 0 | 14.6 | 0 | 0 | 2.0 | 0 | +| | A3 | 0 | 22.4 | 0 | 0 | 2.1 | 0 | +| Paket Loss | A4 | 0 | 15.5 | 0 | 0 | 1.8 | 0 | +| [%] | A5 | 0 | 17.4 | 0 | 0 | 1.9 | 0 | +| | B1 | - | 11.0 | 32.4 | 32.9 | 35.7 | 33.1 | +| | B2 | - | 21.1 | 20.3 | 20.7 | 34.0 | 22.2 | ++----------------+--------+--------+------+------+------+------+-------+ +| Total Packet | normal | 0 | 14.9 | 0 | 0 | 1.9 | 0 | +| Loss Rate [%] | bulk | - | 12.0 | 28.7 | 29.1 | 35.3 | 29.8 | ++----------------+--------+--------+------+------+------+------+-------+ +| Transmitted | | | | | | | | +| Data [MByte] | normal | 19.8 | 12.8 | 19.8 | 19.8 | 19.5 | 19.8 | ++----------------+--------+--------+------+------+------+------+-------+ + + Figure 3: Situation II - Best Effort traffic uses 90% of the + available bandwidth + + + + + + + + + + + +Bless, et al. Informational [Page 11] + +RFC 3662 Lower Effort PDB December 2003 + + + Results of simulations for situation III are depicted in Figure 4. + Due to overload caused by flows A1-A5, packets get dropped in all + cases. Bulk flows B1 and B2 nearly get their maximum throughput in + case B). As one would expect, in case C1) all packets from B1 and B2 + are dropped, in cases C2) and C4) resource consumption of bulk data + is limited to the configured share of 10%. Again the WRED + implementation in C3) is not as accurate as the WFQ variants and lets + more BE traffic pass through IR1. + ++-------------------------+--------+-----------------------------------+ +| | | Bulk Transfer with PDB: | +| QoS Parameter | A) | B) | C) Lower Effort | +| |No bulk | Best | 1) 2) 3) 4) | +| Flows |transfer|Effort| PQ | WFQ | WRED |RED&WFQ| ++----------------+--------+--------+------+------+------+------+-------+ +| | A1 | 303 | 136 | 241 | 298 | 244 | 276 | +| | A2 | 316 | 234 | 286 | 299 | 240 | 219 | +| | A3 | 251 | 140 | 287 | 259 | 236 | 225 | +| Throughput | A4 | 168 | 84 | 252 | 123 | 209 | 219 | +| [kbit/s] | A5 | 159 | 82 | 132 | 101 | 166 | 141 | +| | B1 | - | 483 | 0 | 83 | 73 | 83 | +| | B2 | - | 41 | 0 | 38 | 31 | 38 | ++----------------+--------+--------+------+------+------+------+-------+ +|Total Throughput| normal | 1199 | 676 | 1199 | 1079 | 1096 | 1079 | +| [kbit/s] | bulk | - | 524 | 0 | 121 | 104 | 121 | ++----------------+--------+--------+------+------+------+------+-------+ +| | A1 | 9.6 | 17.6 | 12.1 | 9.3 | 8.6 | 12.8 | +| | A2 | 8.5 | 13.6 | 8.4 | 9.8 | 8.1 | 14.5 | +| | A3 | 8.8 | 18.7 | 7.7 | 11.6 | 7.8 | 13.6 | +| Paket Loss | A4 | 14.9 | 22.3 | 11.2 | 18.9 | 8.2 | 12.4 | +| [%] | A5 | 12.8 | 19.0 | 15.6 | 19.7 | 8.3 | 14.3 | +| | B1 | - | 11.9 | 100 | 32.1 | 39.5 | 33.0 | +| | B2 | - | 17.3 | 100 | 22.5 | 37.7 | 22.8 | ++----------------+--------+--------+------+------+------+------+-------+ +| Total Packet | normal | 10.4 | 17.3 | 10.3 | 12.2 | 8.2 | 13.4 | +| Loss Rate [%] | bulk | - | 12.4 | 100 | 29.1 | 39.0 | 29.9 | ++----------------+--------+--------+------+------+------+------+-------+ +| Transmitted | | | | | | | | +| Data [MByte] | normal | 22.0 | 12.6 | 22.0 | 20.2 | 20.6 | 20.3 | ++----------------+--------+--------+------+------+------+------+-------+ + + Figure 4: Situation III - Best Effort traffic load is 150% + + + + + + + + + +Bless, et al. Informational [Page 12] + +RFC 3662 Lower Effort PDB December 2003 + + + In situation IV, 33% or 400 kbit/s are not used by Ax flows and the + results are listed in Figure 5. In case B) where bulk data flows B1 + and B2 use the BE PDB, packets of Ax flows are dropped, whereas in + cases C1)-C4) flows Ax are protected from bulk flows B1 and B2. + Therefore, by using the LE PDB for Bx flows, the latter get only the + residual bandwidth of 400 kbit/s but not more. Packets of Ax flows + are not affected by Bx traffic in these cases. + ++-------------------------+--------+-----------------------------------+ +| | | Bulk Transfer with PDB: | +| QoS Parameter | A) | B) | C) Lower Effort | +| |No bulk | Best | 1) 2) 3) 4) | +| Flows |transfer|Effort| PQ | WFQ | WRED |RED&WFQ| ++----------------+--------+--------+------+------+------+------+-------+ +| | A1 | 160 | 140 | 160 | 160 | 160 | 160 | +| | A2 | 160 | 124 | 160 | 160 | 160 | 160 | +| | A3 | 160 | 112 | 160 | 160 | 160 | 160 | +| Throughput | A4 | 160 | 137 | 160 | 160 | 159 | 160 | +| [kbit/s] | A5 | 159 | 135 | 159 | 159 | 159 | 159 | +| | B1 | - | 509 | 361 | 362 | 364 | 362 | +| | B2 | - | 43 | 40 | 39 | 38 | 40 | ++----------------+--------+--------+------+------+------+------+-------+ +|Total Throughput| normal | 798 | 648 | 798 | 798 | 797 | 798 | +| [kbit/s] | bulk | - | 551 | 401 | 401 | 402 | 401 | ++----------------+--------+--------+------+------+------+------+-------+ +| | A1 | 0 | 9.2 | 0 | 0 | 0 | 0 | +| | A2 | 0 | 12.2 | 0 | 0 | 0 | 0 | +| | A3 | 0 | 14.0 | 0 | 0 | 0 | 0 | +| Paket Loss | A4 | 0 | 9.3 | 0 | 0 | 0 | 0 | +| [%] | A5 | 0 | 6.6 | 0 | 0 | 0 | 0 | +| | B1 | - | 7.3 | 21.2 | 21.8 | 25.0 | 21.3 | +| | B2 | - | 14.3 | 19.4 | 20.7 | 24.5 | 20.7 | ++----------------+--------+--------+------+------+------+------+-------+ +| Total Packet | normal | 0 | 10.2 | 0 | 0 | 0 | 0 | +| Loss Rate [%] | bulk | - | 8.0 | 21.0 | 21.7 | 25.0 | 21.2 | ++----------------+--------+--------+------+------+------+------+-------+ +| Transmitted | | | | | | | | +| Data [MByte] | normal | 14.8 | 12.1 | 14.8 | 14.8 | 14.7 | 14.7 | ++----------------+--------+--------+------+------+------+------+-------+ + + Figure 5: Situation IV - Best Effort traffic load is 67% + + In summary, all the different scenarios show that the "normal" BE + traffic can be protected from traffic in the LE PDB effectively. + Either no packets get through if no residual bandwidth is left (LE + traffic is starved), or traffic of the LE PDB can only consume + resources up to a configurable limit. + + + + +Bless, et al. Informational [Page 13] + +RFC 3662 Lower Effort PDB December 2003 + + + Furthermore, the results substantiate that mass data transfer can + adversely affect "normal" BE traffic (e.g., 14.9% packet loss in + situations I and II, even 10.2% in situation IV) in situations + without using the LE PDB. + + Thus, while all presented variants of realizing the LE PDB meet the + desired behavior of protecting BE traffic, they also show small + differences in detail. A network operator has the opportunity to + choose a realization method to fit the desired behavior (showing this + is - after the proof of LE's efficacy - the second designation of + this appendix). For instance, if operators want to starve LE traffic + completely in times of congestion, they could choose PQ. This causes + LE traffic to be completely starved and not a single packet would get + through in case of full load or overload. + + On the other hand, for network operators who want to permit some + small amount of throughput in the LE PDB, one of the other variants + would be a better choice. + + Referring to this, the WFQ implementation showed a slightly more + robust behavior with PQ, but had problems with synchronized TCP + flows. WRED behavior is highly dependent on the actual traffic + characteristics and packet loss rates are often higher compared to + other implementations, while the fairness between TCP connections is + better. The combined solution of WFQ with RED showed the overall + best behavior, when an operator's intent is to keep a small but + noticeable throughput in the LE PDB. + + + + + + + + + + + + + + + + + + + + + + + + +Bless, et al. Informational [Page 14] + +RFC 3662 Lower Effort PDB December 2003 + + +Normative References + + [RFC3086] Nichols, K. and B. Carpenter, "Definition of + Differentiated Services Per Domain Behaviors and Rules for + their Specification", RFC 3086, April 2001. + + [RFC2474] Nichols, K., Blake, S., Baker, F. and D. Black, + "Definition of the Differentiated Services Field (DS + Field) in the IPv4 and IPv6 Headers", RFC 2474, December + 1998. + + [RFC2475] Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z. + and W. Weiss, "An Architecture for Differentiated + Services", RFC 2475, December 1998. + +Informative References + + [RFC2597] Heinanen, J., Baker, F., Weiss, W. and J. Wroclawski, + "Assured Forwarding PHB Group", RFC 2597, June 1999. + + [CBQ] Floyd, S. and V. Jacobson, "Link-sharing and Resource + Management Models for Packet Networks", IEEE/ACM + Transactions on Networking, Vol. 3, No. 4, pp. 365-386, + August 1995. + + [LBE] Bless, R. and K. Wehrle, "A Lower Than Best-Effort Per-Hop + Behavior", Work in Progress, September 1999. + + [LE] Bless, R. and K. Wehrle, "A Limited Effort Per-Hop + Behavior", Work in Progress, February 2001. + + [SimKIDS] Wehrle, K., Reber, J. and V. Kahmann, "A simulation suite + for Internet nodes with the ability to integrate arbitrary + Quality of Service behavior", in Proceedings of + Communication Networks And Distributed Systems Modeling + And Simulation Conference (CNDS 2001), Phoenix (AZ), USA, + pp. 115-122, January 2001. + + [NRS] Bless, R. and K. Wehrle, "Group Communication in + Differentiated Services Networks", in Proceedings of IEEE + International Workshop on "Internet QoS", Brisbane, + Australia, IEEE Press, pp. 618-625, May 2001. + + + + + + + + + +Bless, et al. Informational [Page 15] + +RFC 3662 Lower Effort PDB December 2003 + + +Authors' Addresses + + Roland Bless + Institute of Telematics, Universitaet Karlsruhe (TH) + Zirkel 2 + 76128 Karlsruhe + Germany + + EMail: bless@tm.uka.de + URI: http://www.tm.uka.de/~bless/ + + + Kathleen Nichols + 325M Sharon Park Drive #214 + Menlo Park, CA 94025 + + EMail: knichols@ieee.org + + + Klaus Wehrle + University of Tuebingen, Computer Networks and Internet + Morgenstelle 10c, 72076 Tuebingen, Germany & + International Computer Science Institute (ICSI) + 1947 Center Street, Berkeley, CA, 94704, USA + + EMail: Klaus.Wehrle@uni-tuebingen.de + URI: http://net.informatik.uni-tuebingen.de/~wehrle/ + + + + + + + + + + + + + + + + + + + + + + + + +Bless, et al. Informational [Page 16] + +RFC 3662 Lower Effort PDB December 2003 + + +Full Copyright Statement + + Copyright (C) The Internet Society (2003). All Rights Reserved. + + This document and translations of it may be copied and furnished to + others, and derivative works that comment on or otherwise explain it + or assist in its implementation may be prepared, copied, published + and distributed, in whole or in part, without restriction of any + kind, provided that the above copyright notice and this paragraph are + included on all such copies and derivative works. However, this + document itself may not be modified in any way, such as by removing + the copyright notice or references to the Internet Society or other + Internet organizations, except as needed for the purpose of + developing Internet standards in which case the procedures for + copyrights defined in the Internet Standards process must be + followed, or as required to translate it into languages other than + English. + + The limited permissions granted above are perpetual and will not be + revoked by the Internet Society or its successors or assignees. + + This document and the information contained herein is provided on an + "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING + TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING + BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION + HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF + MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + + + + + + + + + + + +Bless, et al. Informational [Page 17] + |